Google
 

Trailing-Edge - PDP-10 Archives - tops10v704_docc - 10,7/docupd/util.mem
There are 2 other files named util.mem in the archive. Click here to see a list.















                       TOPS-10 User Utilities Manual


|                        Electronically Distributed
|  
|  
|  
|            This manual contains descriptions of  the  TOPS-10
|            utilities,  their  formats, and their usage.  This
|            manual  supercedes  the  TOPS-10  User   Utilities
|            Manual  published in July, 1986.  The order number
|            for that manual, AA-0998B-TB, is obsolete.



             Operating System:             TOPS-10 Version 7.04

             Software:                    DECnet-10 Version 4.0
                                             GALAXY Version 5.1










   digital equipment corporation                   maynard, massachusetts


|  TOPS-10 Software Update Tape No. 04, December 1990

   First Printing, March 1975
   Revised, June 1986
|  Revised, June 1990
|  Revised, December 1990



   The information in this document is subject to change  without  notice
   and  should  not  be  construed  as  a commitment by Digital Equipment
   Corporation.  Digital Equipment Corporation assumes no  responsibility
   for any errors that may appear in this document.

   The software described in this document is furnished under  a  license
   and  may  be  used or copied only in accordance with the terms of such
   license.

   No responsibility is assumed for the use or reliability of software on
   equipment that is not supplied by Digital Equipment Corporation or its
   affiliated companies.



|  Copyright C 1975, 1986, 1990 Digital Equipment Corporation.

   All Rights Reserved.



   The following are trademarks of Digital Equipment Corporation:

   CI             DECtape     LA50             SITGO-10
   DDCMP          DECUS       LN01             TOPS-10
   DEC            DECwriter   LN03             TOPS-20
   DECmail        DELNI       MASSBUS          TOPS-20AN
   DECnet         DELUA       PDP              UNIBUS
   DECnet-VAX     HSC         PDP-11/24        UETP
   DECserver      HSC-50      PrintServer      VAX
   DECserver 100  KA10        PrintServer 40   VAX/VMS
   DECserver 200  KI          Q-bus            VT50
   DECsystem-10   KL10        ReGIS
   DECSYSTEM-20   KS10        RSX              d i g i t a l



                                      CONTENTS



   PREFACE


   CHAPTER 1       SAVING AND RESTORING FILES USING BACKUP


   CHAPTER 2       CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING 
                   CREDIR


   CHAPTER 3       GETTING CROSS-REFERENCE LISTINGS USING CREF


   CHAPTER 4       COMPARING FILES USING FILCOM


   CHAPTER 5       LISTING GLOBAL SYMBOLS USING GLOB


   CHAPTER 6       NETWORK FILE TRANSFER USING NFT 


   CHAPTER 7       CONTROLLING SUBJOBS USING OPSER 


   CHAPTER 8       LOCAL FILE TRANSFER USING PIP


   CHAPTER 9       LISTING DISK QUOTAS USING QUOLST


   CHAPTER 10      FORMATTING TEXT FILES USING RUNOFF


   CHAPTER 11      SETTING SEARCH LISTS USING SETSRC 


   CHAPTER 12      DISPLAYING SYSTEM STATISTICS USING SYSDPY


   INDEX

























































                                     iv














                                  PREFACE



   This manual describes the user utilities available with TOPS-10.   The
   program descriptions are arranged alphabetically.

   Before you read this manual,  you  should  be  familiar  with  TOPS-10
   command  usage,  file specifications, and terminology.  If you need to
   refer to any of the elements of the TOPS-10 command environment,  read
   Chapter 1 of the TOPS-10 Operating System Commands Manual.  Before you
   attempt to use the programs described in this User  Utilities  Manual,
   you must be familiar with the following concepts:

         o  monitor and user levels

         o  special control characters

         o  switches and arguments

         o  file specifications

         o  device names

         o  wildcard constructions

         o  search lists and directory paths















                                     v


   CONVENTIONS USED IN THIS MANUAL

   The following conventions are used in this manual:

   Convention     Meaning

   addr           Program or location address.

   arg            An argument to a command.

   core           Referring to main (processor) memory.

   CTRL/x         A control character.

   date           A date in the form of two digits  for  the  day,  three
                  letters  for  the  month,  and two digits for the year.
                  (For example, 22-AUG-86 represents August 22, 1986.)

   date-time      The date and time in the standard format.  For example,
                  13-SEP-86:13:00:00 represents September 13, 1986 at one
                  p.m..

   density        The density of a magnetic tape.

   dev:           Any logical or physical device name.  (You must include
   device-name    a colon (:) when a device name is part of a
   devnn          file specification.)
   devnnu
   devu

   [directory]    A directory name.  This can be either a UFD or an SFD.
   [dir]          

   expression     A numeric expression.

   file.ext       A file name  and  a  file  extension,  separated  by  a
                  period.

   file name      A name of a file.

   file-spec      A   file   specification   written   in   the   format:
                  dev:file.ext[directory].

   fs             File structure.

   hh:mm:ss       The time of day using a  24-hour  clock,  where  hh  is
                  hours, mm is minutes, and ss is seconds.

   id             An identifier.

   job            A job number.



                                     vi


   jobname        The name of the job.

   letter         An alphabetic character.

   line-number    Referring to the number of the line.

   list           A list of arguments.

   logical-name   A logical device name, chosen by the user.
   log-name
   log

   memory         The decimal number of memory words measured in K or  P.
                  (1K  is  equal to 1024 words; 1P (page) is equal to 512
                  words.)

   MFD            A master file directory.

   <nnn>          A protection code.

   nnnn           A tape density.

   n              A decimal number, such as a unit number.

   ^name^         A DECtape identifier.

   nodelist       A list of all the systems in a network environment.

   PPN            A project-programmer number.

   program        A program name.

   proj,prog      A project-programmer number.

   [proj,prog]    The name of a user-file directory.

   SFD            A sub-file directory .

   spec           A specification of a file.

   str            A file structure name.

   /switch        A command line modifier.

   time           Referring to a time of day.

   UFD            A user-file directory.

   v              Version number.

   x              A numeric or text variable.



                                    vii


   $              The symbol printed on your terminal when you press  the
                  ESCape (or ALTmode) key.

   ^x             A character that is printed when you press the  CONTROL
                  key  while  you  type  a  character key.  (For example,
                  typing a CTRL/C prints ^C at your terminal.)

   <CTRL/x>       Indicates that you should press the CONTROL key at  the
                  same time as the key indicated here by "x".

   <DEL>          Indicates when you should press the  DELETE  or  RUBOUT
                  key.

   <RET>          Indicates when you should press the RETURN key.

   <ESC>          Indicates when you should press the ESCape (or ALTmode)
                  key.

   All examples, commands, switches, values, and arguments are  shown  in
   uppercase.   This  is for the sake of distinction.  Examples are shown
   as they would appear on  a  terminal  that  does  not  have  lowercase
   ability.
































                                     8











                                 CHAPTER 1

                  SAVING AND RESTORING FILES USING BACKUP



   Function

   The BACKUP program saves disk files on magnetic tape and places all or
   some  of  these files back onto the disk.  You can save your disk area
   on magnetic tape and restore all of your files or  a  subset  of  your
   files  back  to your area.  You can also use this program to move your
   files from one  system  to  another.   Please  refer  to  the  TOPS-10
   Operator's Guide for detailed information about the BACKUP program.


   Format

        R BACKUP
        /command

   where:  command is one of the BACKUP commands, which are in verb form.
           BACKUP  prompts with a slash (/), after which you respond with
           one of three command types:

            o  Action command

            o  Status-setting command

            o  Tape-positioning command



   Action Commands

   Action commands perform I/O on the tape specified  in  the  last  TAPE
   command.   You  must  specify a tape using the TAPE command before you
   use an action command.  TAPE is  described  under  the  status-setting
   commands for BACKUP.

   SAVE file-spec                Saves the specified disk files on tape.

   RESTORE file-spec             Restores the  specified  tape  files  to


                                    1-1
                  SAVING AND RESTORING FILES USING BACKUP


                                 disk.

   CHECK file-spec               Verifies that  the  tape  and  the  disk
                                 files are the same.

|  [N]PRINT file-spec            Prints a directory of  the  entire  tape
|                                specified   by   file-spec.    N  is  an
|                                optional prefix meaning  narrow.   PRINT
|                                produces  the  effect of a NODIRECTORIES
|                                command; that is,  no  user  directories
|                                are printed.

   The file-spec arguments are optional.  File  specifications  may  have
   wildcards.   You  can  specify  input  and  output  files  in the form
   output=input, or you can specify input alone.  Use commas to  separate
   file-spec entries in a list.

   If you do not supply  an  argument  with  an  action  command,  BACKUP
   defaults to a file-spec as follows:

         o  For anyone logged-in under [1,2], the default  file  spec  is
            ALL:*.*  [*,*,*,*,*,*,*].   This  specifies  all files on all
            UFDs, and all SFDs of all file structures, with no renaming.

         o  For all  other  users,  the  default  file  spec  is  ALL:*.*
            [PPN,*,*,*,*,*]  where PPN is the user's PPN.  This specifies
            all files in the user's areas should be  saved  with  a  disk
            structure   specified,   and   restored  to  the  appropriate
            structure.


   Action Command Switches

   You can use the following switches in the file specification list  for
   the  action  commands.   These  switches  can  be  either permanent or
   temporary.  Input files are those being transferred from disk to tape.
   Output files are those being transferred from tape to disk.

   /ABEFORE date                 On  input  file,  includes  only   files
                                 accessed before the specified date.

   /ASINCE date                  On  input  file,  includes  only   files
                                 accessed since the specified date.

   /BEFORE date-time             On  input  file,  includes  only   files
                                 created before the specified date-time.

   /ERNONE                       On input file,  gives  an  error  if  no
                                 files match.

   /ERPROTECTION                 On input file, gives an error  if  there
                                 is a protection failure.


                                    1-2
                  SAVING AND RESTORING FILES USING BACKUP


   /ERSUPERSEDE                  On output file, does not restore a  file
                                 from tape if it already exists on disk.

   /ESTIMATE n                   On output file,  estimates  output  size
                                 (n).

   /LENGTH low:high              On input file, includes the file only if
                                 file length is between low (minimum file
                                 size) and high (maximum file size).

   /MBEFORE nD:hh:mm:ss          On  input  file,  includes  only   files
                                 modified     before    date-time.     nD
                                 represents the number of days.

   /MSINCE nD:hh:mm:ss           On  input  file,  includes  only   files
                                 modified since date-time.  nD represents
                                 the number of days.

   /OKNONE                       On input file, does not give an error if
                                 no files match your file specification.

   /OKPROTECTION                 On input file, does not give an error if
                                 there is a protection failure.

   /OKSUPERSEDE                  On  output  file,  always  restores  the
                                 file,  even  if  the  file is already on
                                 disk.
|  
|  /[NO]PHYSICAL                 On input or  output  file,  ignores  any
|                                logical names.

   /PROTECTION nnn               On  output  file,  sets  the  protection
                                 code.

   /SINCE date-time              On input file, includes only those files
                                 created since the specified date-time.

   /STRS                         On input file, examines  all  structures
                                 for the file.

   /VERSION v                    On output file, sets the version  number
                                 of the file.

   Runtime Commands

   You can issue the following runtime commands during the  execution  of
   any  action  commands.   BACKUP  prompts with an exclamation point (!)
   when ready to accept a runtime command.

   [NO]DIRECTORIES               Prints every directory processed.

   EXIT                          Exits from BACKUP when done.


                                    1-3
                  SAVING AND RESTORING FILES USING BACKUP


   [NO]FILES                     Prints   every   file   and    directory
                                 processed.

   GO                            Continues after a STOP.

   HELP                          Lists BACKUP commands and explanations.

   KILL                          Aborts execution of the  current  action
                                 verb.

   PAUSE                         Does not exit from BACKUP when done.

   RESET                         Resets  all  status  settings  to  their
                                 original defaults when done.

   SILENCE                       Stops printing every directory or file.

   STOP                          Stops   action   temporarily;   can   be
                                 continued by GO.

   WHAT                          Displays current file name and status.


   Status-Setting Commands

   Status-setting commands specify one or  more  parameters  that  affect
   future action commands.

   ABEFORE date                  Includes only files accessed before  the
                                 specified date.

   [NO]APPEND                    Appends to the existing list file.

   ASINCE date                   Includes only the files  accessed  since
                                 the specified date.

   BEFORE date-time              Includes  only  the  files  created  and
                                 modified before the specified date-time.
|  
|  BLOCKINGFACTOR n              Sets the number of disk blocks per  tape
|                                block  read  or  written  on  tape.  The
|                                default value is 4 for comptability with
|                                tapes written by BACKUP without blocking
|                                factor capability.  The specified  value
|                                must  be  in  the  range of 4 to 96, and
|                                must be a multiple  of  4  disk  blocks.
|                                Due  to KS20 UNIBUS adapter limitations,
|                                the maximum blocking factor on a KS10 is
|                                56.
|  
|                                Tape blocking is writing  a  tape  block
|                                that  contains more than one disk block.


                                    1-4
                  SAVING AND RESTORING FILES USING BACKUP


|                                Older versions of BACKUP (version  prior
|                                to   %6(700))  may  be  said  to  use  a
|                                blocking factor of 4, because they write
|                                4  disk  blocks  per tape block.  Higher
|                                blocking factors permit  BACKUP  to  fit
|                                more  information  in  less  space.  The
|                                higher the  blocking  factor  specified,
|                                the  smaller the amount of space between
|                                tape blocks.

   [NO]CPOINT                    Uses checkpoints.

   [NO]DATE75                    Always  accepts  files   with   possible
                                 DATE75 problems.

   [NO]DELETE                    Deletes disk files after saving them.

   DENSITY nnnn                  Sets the  tape  density.   The  density,
                                 expressed in bits per inch (bpi), can be
                                 200, 556, 800, 1600, or 6250.

   [NO]DIRECTORIES               Prints  each  user's   directory   while
                                 running.

   [NO]ENCRYPT                   Encrypts (codes) the files.  This  makes
                                 the files impossible to read without the
                                 keyword.

   ERRMAX n                      Set maximum number of  recoverable  tape
                                 errors.  Default is 100.

   [NO]EXEMPT                    Exempts  project-programmer  numbers  of
                                 the  form [A,*] and [*,B], where A and B
                                 are less than 7, from  date,  time,  and
                                 length restrictions.

   [NO]FILES                     Prints each file name while running.

   INITIAL file                  Starts processing at the specified file.

   [NO]INTERCHANGE               Runs in interchange  mode.   Interchange
                                 is   used   to   copy   files  from  one
                                 installation   to   another   with    no
                                 directory   dependencies.    Interchange
                                 mode forces a blocking factor of  4  for
                                 compatability  with  other programs such
                                 as TOPS-20 DUMPER.

   LENGTH low:high               Includes  only  files  whose  length  is
                                 between low (minimum file size) and high
                                 (maximum file size).



                                    1-5
                  SAVING AND RESTORING FILES USING BACKUP


   [NO]LIST file-spec            While running, creates a listing file on
                                 file-spec.   LIST produces the effect of
                                 a NODIRECTORIES  command;  that  is,  no
                                 user directories will be printed.

   MBEFORE date-time             Includes only files that were  moved  or
                                 modified before the specified time.

   MESSAGE [NO]PREFIX            Suppresses the error message prefix.

   MESSAGE [NO]FIRST             Suppresses the first line of  the  error
                                 message text.

   MSINCE date-time              Includes only files that have been moved
                                 or modified since the specified time.

   [NO]MULTIREEL                 Allows multiple reels during a save.

|  [NO]NFS                       Does not save files that have the RP.NFS
|                                RIB status bit set.

   OPTION name                   Uses line BACKUP:name from a  SWITCH.INI
                                 file.

   PARITY (even,odd)             Sets the tape parity.

   [NO]REPEAT                    Repeats a split file on the continuation
                                 tape.

   RESUME n                      Sets a  checkpoint  block  number  where
                                 processing  resumes  after  a crash that
                                 occurred during a checkpointed  SAVE  or
                                 RESTORE.

|  [NO]SDELETE                   Deletes a file without  respect  to  its
|                                protection   code,   if   the  user  has
|                                sufficient privilege to rename the  file
|                                to a lower protection code.

   SILENCE                       Does not print file names or directories
                                 while running.

   SINCE date-time               Includes only  those  files  created  or
                                 modified since the specified date-time.

   SORT DIRECTORIES x            Sorts  directories  within   each   file
                                 structure  in order of x when saving.  x
                                 is ALPHABETICAL, LOCATION, or NONE.

   SORT FILES x                  Sorts files within each directory in the
                                 order   of   x.    x   is  ALPHABETICAL,
                                 LOCATION, or NONE.


                                    1-6
                  SAVING AND RESTORING FILES USING BACKUP


   SSNAME name                   Specifies the saveset name.  Use ALL  to
                                 include all savesets.

   SUPERSEDE ALWAYS              Restores   all    files    from    tape,
                                 superseding  files on disk that have the
                                 same file name.

   SUPERSEDE NEVER               Does not restore  files  that  have  the
                                 same name as an existing file.

   SUPERSEDE OLDER               Restores only the files that  are  newer
                                 than the files on disk of the same name.

   TAPE MTxn:                    Uses tape unit  MTxn:.   If  a  magnetic
                                 tape  drive has the logical name BACKUP,
                                 then  the  TAPE   verb   need   not   be
                                 specified.

   TPNUM x                       Sets  the  number  of  the  tape  to   x
                                 (decimal).

|  [NO]UNIQUE                    Generates unique  extension  numbers  in
|                                the  range  000 to 999 if the file being
|                                restored from  tape  already  exists  on
|                                disk.   Enabling  this  feature  implies
|                                /ERSUPERSEDE.

   UPROTECTION nnn               Sets the protection code for the created
                                 directories.

|  [NO]USAGE                     Enables USAGE accounting.  When USAGE is
|                                enabled,    BACKUP   writes   accounting
|                                records to the system ACTDAE, for  every
|                                directory in a save operation.  You must
|                                have  [1,2]  privileges  to  enable   or
|                                disable accounting
|  
|  [NO]USETI                     Runs in USETI mode.

   [NO]WRITE                     Writes onto disk during a RESTORE.  This
                                 is the default action.

   Tape-Positioning Commands

   Use these commands before action commands or after action commands are
   finished processing.

   EOT volid-list                Skips to the end-of-tape mark  for  each
                                 tape  in  the list.  The volid-list is a
                                 list of  the  volume-identifications  of
                                 each tape.



                                    1-7
                  SAVING AND RESTORING FILES USING BACKUP


   REWIND volid-list             Rewinds to the beginning of the tape for
                                 each tape in the list.

   SKIP n volid-list             Skips the specified number  of  savesets
                                 forward for each tape in the list.

   SKIP 0 volid-list             Backs up to the  start  of  the  current
                                 saveset for each tape in the list.

   SKIP -n volid-list            Skips the specified number  of  savesets
                                 backward for each tape in the list.

   UNLOAD volid-list             Unloads each tape in the list  from  its
                                 drive.


   Characteristics

   The BACKUP program:

        Places your terminal at user level.

        Destroys your core image.

   Examples

        1.  To save the entire contents of DSKB:  on magnetic tape and at
            the  same  time produce a directory listing, run BACKUP while
            logged in under [1,2].

                 .R BACKUP<RET>
                 /TAPE MTA0<RET>
                 /LIST DSK:BACKUP.LOG<RET>
                 /SAVE DSKB:<RET>
                 !1,2 DSKB
                  1,3
                  1,4
                 .
                 .
                 .

                 .

            BACKUP prints each UFD as it begins to save files  from  that
            area.   If the tape becomes full before the save is complete,
            BACKUP stops, types out the full file specification and block
            number  of the current file being saved, unloads the magnetic
            tape and prints the following message:

                 $BKPEOT REACHED EOT -- MOUNT NEW TAPE THEN TYPE "GO"

            When you type GO, BACKUP continues the save on the new  tape.


                                    1-8
                  SAVING AND RESTORING FILES USING BACKUP


            A file can be split across tapes.

        2.  Copy the file FILE.MAC from tape to disk.

                 .R BACKUP<RET>
                 /TAPE MTB0<RET>
                 /REWIND<RET>
                 /RESTORE FILEB.MAC=FILEA.MAC<RET>
                 !10,123 DSKB
                 DONE            
                 /UNLOAD<RET>
                 /^C

                 .








































                                    1-9
























































                                    2-1











                                 CHAPTER 2

         CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR



   Function

   The CREDIR  program  creates  directories  and  sub-file  directories.
   CREDIR   creates   sub-file   directories   (SFDs)  on  any  specified
   structures, and it automatically creates  any  necessary  higher-level
   directories.   If  you  do not specify a structure, CREDIR creates the
   SFD on every structure in your search list.

   You can use CREDIR to create ersatz device directories.  CREDIR allows
   you  to  create  directories  on  all  structures  associated  with  a
   specified ersatz device.  As it creates each directory,  CREDIR  tells
   you  the  name of the unit and the protection code associated with the
   directory.


   Format

        R CREDIR
        Create directory:  dev:[dir]/switch

   where:  dev:[dir] is the device name and the directory  specification.
           You  can specify an ersatz device name.  /switch can be any of
           the switches listed below.

   By default, CREDIR creates the directory on device DSK:.   The  system
   assigns the default protection code defined by the system manager.  If
   no code was defined, <775> is the default.

   You can use the following switches to modify the CREDIR program:

   /ALLOCATE:nnnn                Specifies the number of blocks allocated
                                 for the SFD.

   /ERNONE                       Prints an error message if there are  no
                                 files in the request.

   /ERPROTECTION                 Prints an error message if  the  request


                                    2-1
         CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR


                                 fails   due   to   a   protection   code
                                 violation.

   /HELP:arg                     Prints the  HELP  text  for  the  CREDIR
                                 program.   You  can  specify  S  as  the
                                 argument to get a list of  the  switches
                                 to the program.

   /IN:nnnn                      Specifies the logged-in quota.

   /NAME:name                    Specifies  a  mnemonic  name   for   the
                                 directory.

   /NOOPTION                     Suppresses processing  of  the  defaults
                                 from your SWITCH.INI file.

   /OKNONE                       Does not print an error message if there
                                 are  no  files  that  match  a  wildcard
                                 specification.

   /OKPROTECTION                 Does not print an error message  if  the
                                 SFD cannot be accessed because of a file
                                 protection violation.

   /OPTION:name                  Uses any lines in your  SWITCH.INI  file
                                 that are specified as CREDIR:name.

   /OUT:nnnn                     Specifies the logged-out quota  for  the
                                 SFD.

   /PHYSICAL                     Specifies  that  the  device   name   is
                                 physical, and to ignore logical names.

   /PROTECTION:nnn               Gives the SFD the protection you specify
                                 in nnn.

   /RUN:file-spec                Runs  the  program  you  specified  when
                                 CREDIR has finished running.

   /RUNCOR:n                     Runs the program you specified with /RUN
                                 in nK of memory when CREDIR has finished
                                 running.

   /RUNOFFSET:n                  Runs the program you specified with /RUN
                                 with  an  offset  of n.  If you omit the
                                 switch,  the  default  is  0.   If   you
                                 specify the switch, but omit a value for
                                 n, the default is 1.  If the  offset  is
                                 1,  the  file  uses  an indirect command
                                 file.

   /STRS                         Searches for the SFD in  all  structures


                                    2-2
         CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR


                                 in  your  job's  search  list,  and uses
                                 every occurrence.

   Characteristics

   The CREDIR program:

        Destroys your core image.

        Requires LOGIN.

        Places your terminal at user level.


   Examples

        1.  The following example shows the creation and use  of  an  SFD
            and directory paths.

            Show a list of  all  the  files  in  your  UFD  with  a  file
            extension .TST.

                 .DIRECT *.TST<RET>

                 NUMB  TST   0   <055>   dd-mmm-yy    DSKC:   [27,5434]
                 109   TST   5   <055>   dd-mmm-yy
                 FILL  TST   1   <055>   dd-mmm-yy
                 PAY3  TST   1   <055>   dd-mmm-yy
                    TOTAL OF 7 BLOCKS IN 4 FILES ON DSKC: [27,5434]

            Run the CREDIR program.  Create a sub-file  directory  called
            TEST.  Use the /EXIT switch to exit from CREDIR.

                 .R CREDIR<RET>

                 Create directory:  [27,5434,TEST]<RET>
                         CREATED DSKC:[27,5434,TEST].SFD/PROTECTION:775

                 Create directory: /EXIT

            Request a list of all your files named TEST.

                 .DIR TEST.*<RET>

                 TEST  FOR   1   <055>   dd-mmm-yy    DSKC: [27,5434]
                 TEST  SFD   1   <775>   dd-mmm-yy
                    TOTAL OF 2 BLOCKS IN 2 FILES ON DSKC: [27,5434]

            The directory shows an SFD named TEST.

            Use RENAME to transfer all files with the extension .TST from
            your UFD to your SFD.


                                    2-3
         CREATING DIRECTORIES AND SUB-FILE DIRECTORIES USING CREDIR


                 .RENAME [27,5434,TEST]=*.TST<RET>
                 FILES RENAMED:
                 DSKC:NUMB.TST
                 DSKC:109.TST
                 DSKC:FILL.TST
                 DSKC:PAY3.TST

            Show that your UFD no longer  contains  the  files  with  the
            extension .TST.

                 .DIR *.TST<RET>

                 %WLDNSF No such files as DSKC:*.TST[27,5434]

            Show  that  the  files  have  been  transferred  to  the  SFD
            [27,5434,TEST].

                 .DIR [27,5434,TEST]<RET>

                 NUMB TST  0   <055>  dd-mmm-yy    DSKC:[27,5434,TEST]
                 109  TST  5   <055>  dd-mmm-yy
                 FILL TST  1   <055>  dd-mmm-yy
                 PAY3 TST  1   <055>  dd-mmm-yy
                    TOTAL OF 7 BLOCKS IN 4 FILES ON DSKC:  [27,5434,TEST]


        2.  The following example shows the use of CREDIR with  the  SCAN
            switch /PROTECTION.

                 .R CREDIR<RET>

                 Create directory:   DSKB:[,,A,B,C]/PROTECTION:755<RET>
                    CREATED DSKB:[27,4072,A].SFD/PROTECTION:755
                    CREATED DSKB:[27,4072,A,B].SFD/PROTECTION:755
                    CREATED DSKB:[27,4072,A,B,C].SFD/PROTECTION:755
                 Create directory: /EXIT

                 .
















                                    2-4











                                 CHAPTER 3

                GETTING CROSS-REFERENCE LISTINGS USING CREF



   Function

   The CREF program produces a sequentially numbered assembly listing  of
   a program, and one or more of the following tables:

         o  Cross reference table for all operands, such  as  labels  and
            assignments

         o  Cross reference table for all user-defined operators, such as
            macro calls and OPDEFs

         o  Cross reference table for all op codes and  pseudo-ops.   You
            must specify the /O switch to produce this table.

   The cross-reference files are printed on the line printer if you  have
   generated  such  files  using  the  /CREF switch with a COMPILE, LOAD,
   DEBUG, or EXECUTE command.  The file containing  the  names  of  these
   CREF  files  is then deleted so that subsequent CREF commands will not
   process them again.

   When the logical device name LPT:  is assigned to a device other  than
   the  line  printer,  the CREF files are stored on that device with the
   same file name and the extension .LST.  If output to the line  printer
   is  not  currently  spooled, you must set spooling before running CREF
   (see the SET SPOOL command in the TOPS-10  Operating  System  Commands
   Manual).


   Formats

        R CREF/switch
        * file spec

        CREF  file-spec/switch

   where:  file-spec is a valid file specification.  When  you  supply  a
           file  specification,  CREF produces a cross-referenced listing


                                    3-1
                GETTING CROSS-REFERENCE LISTINGS USING CREF


           file for the specified file.  If you do not give  an  argument
           to  the  command, CREF uses the argument saved from a previous
           COMPILE-class command.  CREF prompts with an asterisk (*) when
           you  use the R CREF command or if there is no stored argument.
           /switch is one or more of the following switches:

           /A      Advances magtape by one file (may be repeated).

           /B      Backspaces magtape by one file (may be repeated).

           /C      Cancels SWITCH.INI switch defaulting.

           /D      Permits  default  switches  you  specified   in   your
                   SWITCH.INI file.

           /H      Types the HELP text for CREF.

           /K      Does not list user-defined symbol tables.

           /M      Suppresses user macros, OPDEFs, and symbol table.

           /O      Lists the opcodes.

           /P      Preserves (does not delete) input files.

           /R      Restarts listing and prompts for line number.

           /S      Suppresses  program  listing  and  lists  only  symbol
                   tables.

           /W      Rewinds tape.

           /Z      Deletes the current contents of the DECtape directory.


   Characteristics

   The CREF program:

        Leaves your terminal at monitor level.

        Destroys your core image.

        Requires LOGIN.


   Examples

        1.  Compile the files contained in the command  file  PROMAC  and
            produce CREF listing files on the disk.

                 .COMPILE/CREF@PROMAC<RET>


                                    3-2
                GETTING CROSS-REFERENCE LISTINGS USING CREF


                 FORTRAN:  INPUT1
                 MAIN.
                 FORTRAN:  INPUT2
                 MAIN.

            Process and list the cross-referenced listing files  produced
            by  the COMPILE command.  The argument is the stored argument
            that was used in the COMPILE command.

                 .SET SPOOL LPT<RET>
                 .CREF<RET>
                 CREF:INPUT1
                 CREF:INPUT2
                 .

        2.  Compile and load the files  contained  in  the  command  file
            CONALL.   Produce  a  loader  map with the file name NAME and
            CREF files on disk.

                 .LOAD/CREF/MAP:NAME@CONALL<RET>
                 MACRO:  HIGH
                 MACRO:  SHARE
                 EXIT

            Assign the logical name LPT to magnetic tape unit  1.   Store
            the CREF files on MTA1: to be output at a later time.

                 .ASSIGN MTA1 LPT<RET>
                 MTA261 ASSIGNED

                 .CREF<RET>
                 CREF:  HIGH
                 CREF:  SHARE
                 .




















                                    3-3
























































                                    4-1











                                 CHAPTER 4

                        COMPARING FILES USING FILCOM



   Function

   The FILCOM program compares two files and  displays  any  differences.
   Generally,  this  comparison  is  line-by-line  for  ASCII  files  and
   word-by-word  for  binary  files.   FILCOM  determines  the  type   of
   comparison  to  use  by examining either the switches specified in the
   command string or the extensions of the files.  Switches  always  take
   precedence over file extensions.


   Format

        R FILCOM
        *output-file-spec=input-file-spec,input-file-spec/switch

   where:   *  is  the  FILCOM  prompt,  file-spec  is   a   valid   file
           specification, output-file-spec specifies the name and area on
           which the results should be stored, and input-file-spec  is  a
           list of the files to be compared.

   The FILCOM program takes the following defaults if you  omit  some  of
   the above information:

         o  If you omit the output specification, the  output  device  is
            assumed   to   be   TTY:.    If  you  omit  the  output  file
            specification, you must still type the equal sign.

         o  If you specify only the output file name, the default  output
            device is DSK:.

         o  If you omit the output file name, the second input file  name
            is  used,  unless  it  is  null.  In this case, the file name
            FILCOM is used.

         o  If you omit the output file extension,  .SCM  is  used  on  a
            source compare and .BCM is used on a binary compare.



                                    4-1
                        COMPARING FILES USING FILCOM


         o  If you omit the [directory] in either  the  input  or  output
            file specifications, your default directory is assumed.

         o  If you omit an input device name, it is assumed to be DSK:.

         o  If you omit the file name of the second  input  file,  it  is
            taken from the first input file.

         o  You must place a dot following the file name  of  the  second
            input  file  to  explicitly  indicate a null extension if the
            extension of the first input file is not null.  For  example,
            to   compare   FILE.MAC   and  FILE.   (that  is,  with  null
            extension), use the following command string:

                 R FILCOM<RET>
                 *=FILE.MAC,FILE.

         o  The second input file specification cannot be null  unless  a
            binary  compare  is being performed.  In a binary compare, if
            the first input file is not followed by a comma and a  second
            input  file  descriptor, the input file is compared to a zero
            file and is output in its entirety.  This gives you a  method
            of listing a binary file.  (Refer to Example 4.)


   /switch is one of the options listed below.  A switch can  follow  the
   input  file-specs.   The following switches are used for a binary file
   comparison:


|  /E             Specifies that the input files  are  executable  (.EXE)
|                 files.

   /H             Prints a list of switches  available  (help  text  from
                  device HLP:).

   /nL            Specifies the lower limit for a partial binary  compare
                  (n  is  an  octal number).  This switch, when used with
                  the /nU switch, allows a binary  file  to  be  compared
                  only within the specified limits.

   /Q             Prints the message ?FILES ARE DIFFERENT when the  files
                  are different, but does not list the differences.  This
                  switch is useful when you test batch control files  for
                  differences  but  do  not  want  a  log  file  of these
                  differences.

   /nU            Specifies the upper limit for a partial binary  compare
                  (n  is  an  octal number).  This switch, when used with
                  the /nL switch, allows a binary  file  to  be  compared
                  only within the specified limits.



                                    4-2
                        COMPARING FILES USING FILCOM


   /W             Compares files in binary  mode  without  expanding  the
                  files first.  This switch is used to compare two binary
                  files with ASCII extensions.

   /X             Expands .SAV files  before  comparing  them  in  binary
                  mode.   This  action removes differences resulting from
                  zero compression.

   If you did not specify any switches  in  the  command  string,  FILCOM
   compares  the  files  in  the  mode  the  extension  implies.   FILCOM
   recognizes the following extensions as binary:

        .APL      .ATR      .BAC      .BIN
        .BUG      .CAL      .CHN      .DAE
        .DBS      .DCR      .DMP      .EXE
        .HGH      .LOW      .MSB      .OVL
        .QUC      .QUD      .QUE      .QUF
        .REL      .RIM      .RMT      .RTB
        .SAV      .SCH      .SFD      .SHR
        .SVE      .SYM      .SYS      .UFD
        .UNV      .XPN

   Binary files are compared word by word, starting at word 0, except for
   the following cases:

         o  Files with  extensions  .SHR  and  .HGH  are  assumed  to  be
            high-segment files.  Because the word count starts at 400000,
            upper and lower limits, if used, must  be  greater  than  (or
            equal to in the case of the lower limit) 400000.

         o  Files with extensions .SAV, .LOW, and .SVE are assumed to  be
            compressed   core   image   files  and  are  expanded  before
            comparing.

         o  Files with the extension .EXE  are  assumed  to  be  in  .EXE
            format.

   Conflicts are resolved by switches or defaults.  If a conflict  arises
   in  the  absence  of  switches,  the  files are assumed to be ordinary
   binary files.

   The following switches are used for an ASCII source file comparison:

   /A             Compares files in ASCII mode.  This switch is  used  to
                  force comparison of two files to be done in ASCII.

   /B             Compares blank lines.  Without this switch, blank lines
                  are ignored.

   /C             Ignores comments  (all  text  on  a  line  following  a
                  semicolon)  and  spacing  (spaces  and  tabs).   A line
                  consisting entirely  of  comments  or  spacing  is  not


                                    4-3
                        COMPARING FILES USING FILCOM


                  treated as if it were a blank line; differences in such
                  lines are not ignored.

   /H             Prints a list of switches  available  (help  text  from
                  device HLP:).

   /nL            Specifies the number of lines that determine a match (n
                  is  an  octal number).  A match means that n successive
                  lines  in  each  input  file  have  been  found  to  be
                  identical.   When  a  match  is  found, all differences
                  occurring before the match and after the previous match
                  are listed.  In addition, the first line of the current
                  match is listed after  the  differences,  to  help  you
                  locate   the  place  within  each  file  at  which  the
                  differences occurred.  The default value for n is 3.

   /O             Instructs FILCOM to include a label and offset  in  the
                  differences  listing  for ASCII files.  There are three
                  types of messages.  One message is:

                  [;At top of file + nL]

                  nL, a decimal number, represents the  number  of  lines
                  from  the  top  of the file that the difference occurs.
                  If a difference occurs at the top of the  file,  nL  is
                  not listed.  Another message is:

                  [;At Label + nL]

                  Label is the MACRO label closest to the difference  and
                  nL represents the decimal number of lines away from the
                  label that the difference occurs.   If  the  difference
                  occurs at the label, nL is not listed.  The message for
                  PDP-11 files is:

                  [;At Label + nL + following label name]

                  Label is the local label  name  in  the  form  nn$,  nL
                  represents  the  decimal number of lines from the local
                  label where the difference occurs, and following  label
                  name  is  the name of the block label.  The block label
                  name  is  listed  as  further  help  in  locating   the
                  difference,  since  local  label  names  are not always
                  unique.  If the difference occurs at the  label,  nL  +
                  following  label  name  are not listed.  The label name
                  for all labels must be in the first ten  characters  of
                  the line.  Label name refers to file 1.

   /Q             Prints the message ?FILES ARE DIFFERENT, when the files
                  are different, but does not list the differences.

   /S             Ignores spaces and tabs.


                                    4-4
                        COMPARING FILES USING FILCOM


   /T             Instructs  FILCOM  to  generate  output  even   if   no
                  differences  are  found.   Ordinarily,  FILCOM does not
                  produce  a  list  of  differences  if  there   are   no
                  differences in the files.

   /U             Compares in update mode.  This means  that  the  output
                  file  consists  of  the second input file with vertical
                  bars (or backslashes for 64-character printers) next to
                  the  lines  that differ from the first input file.  Any
                  lines found in the first input  file  but  not  in  the
                  second are designated by a bullet (o).  This feature is
                  useful when updating a  document  because  the  changes
                  made to the latest edition are flagged with change bars
                  in the left margin.  The latest edition of the document
                  is the second input file.


   FILCOM Output

   In most cases, headers consisting of the device, file name, extension,
   and creation date of each input file are listed before the differences
   are listed.  However, headers do not appear  on  output  from  the  /U
   switch (update mode on source compare).

   Output from a source compare has the following notation  in  the  left
   column of the output after the headers:

        n)m

   n is the number of the input file, and m is the  page  number  of  the
   input file (refer to the examples).

   The right column lists the differences occurring  between  matches  in
   the  input files.  Following the list of differences, a line identical
   in each file is listed for reference purposes.

   The output from the /U switch differs from the above-described  output
   in that the output file created is the second input file with vertical
   bars in the left column next to the lines that are different from  the
   first input file.

   The output from a binary compare prints  the  following  line  on  the
   output  device  when  FILCOM  encounters  a difference between the two
   input files:

        octal loc 1st file-word  2nd file-word XOR of both words

   If the exclusive OR (XOR) of the two words differs only in  the  right
   half, the third word listed is the absolute value of the difference of
   the two right halves.  This usually indicates an address that changed.

   If one input file is shorter than the other, after the end of file  is


                                    4-5
                        COMPARING FILES USING FILCOM


   encountered  on  the shorter file, the remainder of the longer file is
   listed.


   Characteristics

   The FILCOM program:

        Places your terminal at user level.

        Destroys your core image.

        Requires LOGIN.


   Examples

        1.  You have the following two ASCII files on disk:

                 .TYPE FILE1.TST<RET>
                 A
                 B
                 C
                 D
                 E
                 F
                 G
                 H
                 I
                 J
                 K
                 L
                 M
                 N
                 O
                 P
                 Q
                 R
                 S
                 T
                 U
                 V
                 W
                 X
                 Y
                 Z




                 .TYPE FILE2.TST<RET>
                 A


                                    4-6
                        COMPARING FILES USING FILCOM


                 B
                 C
                 G
                 H
                 I
                 1
                 2
                 3
                 N
                 O
                 P
                 Q
                 R
                 S
                 T
                 U
                 V
                 4
                 5
                 W
                 X
                 Y
                 Z

            To compare the two files and print the  differences  on  your
            terminal, use the following sequence.

            Run the FILCOM program.

                 .R FILCOM<RET>

            Compare the two files on disk and output the  differences  on
            your terminal.  By default, three consecutive identical lines
            determine a match.

                 *=FILE1.TST,FILE2.TST<RET>

                 FILE 1) DSKC:FILE1.TST[27,5434] CREATED: 0825 dd-mmm-yyyy
                 FILE 2) DSKC:FILE2.TST[27,5434] CREATED: 0826 dd-mmm-yyyy

                 1)1      D
                 1        E
                 1)       F
                 1)       G
                 ****
                 2)1      G
                 **************
                 1)1      J
                 1)       K
                 1)       L
                 1)       M
                 1)       N


                                    4-7
                        COMPARING FILES USING FILCOM


                 ****
                 2)1      1
                 2)       2
                 2)       3
                 2)       N
                 **************
                 1)1      W
                 ****
                 2)1      4
                 2)       5
                 2)       W
                 **************

                 %FILES ARE DIFFERENT

        2.  To compare the two files and print  the  differences  on  the
            line printer, use the following command.  In this example the
            number of successive lines that determines a match  has  been
            set to four with the /4L switch.

                 */4L = FILE1.TST,FILE2.TST<RET>
                 FILE 1) DSKC:FILE1.TST[27,5434] CREATED 0825 dd-mmm-yyyy
                 FILE 2) DSKC:FILE2.TST[27,5434] CREATED 0826 dd-mmm-yyyy

                 1)1      D
                 1)       E
                 1)       F
                 1)       G
                 1)       H
                 1)       I
                 1)       J
                 1)       K
                 1)       L
                 1)       M
                 1)       N
                 ****
                 2)1      G
                 2)       H
                 2)       I
                 2)       1
                 2)       2
                 2)       3
                 2)       N
                 **************
                 1)1      W
                 ****
                 2)1      4
                 2)       5
                 2)       W
                 **************

                 %FILES ARE DIFFERENT


                                    4-8
                        COMPARING FILES USING FILCOM


        3.  To compare the two files so that the  second  input  file  is
            output  with  vertical  bars  in  the left column next to the
            lines  that  differ  from  the  first  input  file,  use  the
            following command sequence:

                 .R FILCOM<RET>

                 */U=FILE1.TST,FILE2.TST<RET>
                          A
                          B
                          C
                 |        G
                          H
                          I
                 |        1
                 |        2
                 |        3
                          N
                          O
                          P
                          Q
                          R
                          S
                          T
                          U
                          V
                 |        4
                 |        5
                          W
                          X
                          Y
                          Z

                 %FILES ARE DIFFERENT

            File number two is displayed.  The lines with  vertical  bars
            indicate the differences between the two files.

















                                    4-9
























































                                    5-1











                                 CHAPTER 5

                     LISTING GLOBAL SYMBOLS USING GLOB



   Function

   The  GLOB  program  reads  multiple  binary  files  and  produces   an
   alphabetical  cross-referenced list of all the global symbols (symbols
   accessible to other programs) that it encounters.  This  program  also
   searches files in library search mode, checking for global symbols, if
   the program file was loaded by LINK in library search mode.  (See  the
   LINK manual.)

   The GLOB program has two phases of operation:

        1.  Phase one scans the input files and builds an internal symbol
            table.

        2.  Phase two produces output based on the symbol table.

   Because of these phases, you can enter commands to GLOB in one of  two
   ways.   The first way is to specify one command string containing both
   the output and input specifications; this is the command string format
   most  system  programs  accept.  The second is to separate the command
   string into a series of input commands and output commands.


   Formats

        R GLOB

        *output file-spec=input file-spec(/switch,/switch)<ESC>

   where:  * is the GLOB prompt, and  /switch  is  one  or  more  of  the
           switches listed below.


        R GLOB

        followed by one or more input commands in the form:



                                    5-1
                     LISTING GLOBAL SYMBOLS USING GLOB


             file-spec, file-spec,...<RET>

        and then one or more output commands in the form:

             output file-spec=<ESC>

   When you separate your input to GLOB into input  commands  and  output
   commands,  the  input commands contain only input specifications.  The
   output commands  contain  only  output  specifications.   Each  output
   command  causes  a listing to be generated; any number of listings can
   be printed from the symbol table  generated  from  the  current  input
   files,  as  long  as  no  input  commands occur after the first output
   command.  When GLOB encounters an input command after output has  been
   generated, it destroys the current symbol table and begins a new one.

   An ESCape (or ALTmode) terminates the command input and  signals  GLOB
   to print the cross-referenced listing.  A listing is not printed until
   GLOB encounters an ESCape.  Press ESCape at the  end  of  the  command
   string  shown in command format 1 or at the end of each output command
   shown in command format 2.

   If you omit some of the information in a  GLOB  command,  the  program
   takes the following defaults:

         o  If the device is omitted, it is assumed to be DSK:.  However,
            if  the  entire  output  specification is omitted, the output
            device is TTY:.

         o  If the output file name is omitted, it is  the  name  of  the
            last  input file on the line (Command Format 1) or is GLOB if
            the line contains only output commands  (Command  Format  2).
            The input file names are required.

         o  If the output extension is omitted, .GLB  is  used.   If  the
            input  extension is omitted, it is assumed to be .REL, unless
            the null extension is explicitly specified by a dot following
            the file name.

         o  If the directory area [directory] is  omitted,  your  default
            directory is used.

   Switches to GLOB control the type of global listings  to  be  printed.
   If  you issue several switches, enclose them in parentheses.  Only the
   most recently specified switch (except for L, M, P, Q,  and  X,  which
   are  always  in effect) is in effect at any given time.  If you do not
   specify any switches, GLOB prints all global  symbols.   The  switches
   and their functions are:

   /A        Prints all global  symbols.   This  is  the  default  if  no
             switches are specified.

   /E        Prints  only  erroneous  (multiply  defined  or   undefined)


                                    5-2
                     LISTING GLOBAL SYMBOLS USING GLOB


             symbols.

   /F        Prints nonrelocatable (fixed) symbols only.

   /H        Prints a list of the switches available from HLP:GLOB.HLP.

   /L        Scans programs  only  if  they  contain  globals  previously
             defined and not yet satisfied (library search mode).

   /M        Turns off scanning mode resulting from the /L switch.

   /N        Prints only symbols that are never referenced.

   /P        Prints all routines that define a symbol to  have  the  same
             value.   The  routine  that  defines  the  symbol  first  is
             printed, followed by a plus (+) sign.   Subsequent  routines
             that define the symbol are printed, preceded by a plus sign.

   /Q        Suppresses the printing  of  subsequent  defining  routines,
             which result from the /P switch.

   /R        Prints only relocatable symbols.

   /S        Prints symbols with nonconflicting values that  are  defined
             in more than one program.

   /X        Suppresses the header page when the  output  device  is  not
             your  terminal,  and  includes  the  header  when it is your
             terminal.  Without this switch, the header is printed on all
             devices except your terminal.


   Output from GLOB

   The listing header is in the format:

        Flags  Symbol  Octal Value  Defined  Referenced

   The flags are:

   Flags     Meaning

   M         Multiply-defined symbol (shows all values).

   N         Never referred to (was not declared external in any  of  the
             binary programs).

   S         Multiply specified symbol (that is, defined in more than one
             program  but  with  nonconflicting values).  The name of the
             first  program  in  which  the  symbol  was  encountered  is
             followed by a plus sign.



                                    5-3
                     LISTING GLOBAL SYMBOLS USING GLOB


   U         Undefined symbol.

   Symbols are listed in alphabetical  order  according  to  their  ASCII
   collating  sequence.   An  apostrophe (') follows the octal value of a
   relocatable symbol.  The value is then relative to  the  beginning  of
   the program in which the symbol is defined.


   Characteristics

   The GLOB program:

        Requires LOGIN.

        Places your terminal at user level.

        Destroys your core image.


   Example

   Run the GLOB program, and print all global symbols in the program MAIN
   (on  DSK:),  and SUB40 and SUB50 (on DTA2:) on the line printer.  Each
   symbol is printed with its value, the program in which it is  defined,
   all programs in which it is referenced, and any error flags.

        .R GLOB<RET>

        *LPT:=MAIN.REL,DTA2:SUB40,SUB50<ESC>

   The programs to  be  scanned  are  BATCH.REL  and  DATA.REL  on  DTA4,
   NUMBER.REL  and  CLASS.REL  on  DTA6:,  and MATH.REL and LIBRAR.REL on
   DSK:.

        *DTA4:BATCH.REL,DATA.REL,DTA6:NUMBER.REL,CLASS.REL<RET>
        *DSK:MATH.REL,LIBRAR.REL<RET>

   Print only nonrelocatable symbols on the line printer.

        *LPT:=/F4<ESC>

   Print only relocatable symbols  in  the  file  named  SYMBOL  in  your
   default directory.

        *DSK:SYMBOL=/R<ESC>

   Print all erroneous symbols on the terminal.  EXTSYM is  an  undefined
   symbol appearing in the program SUBRTE.

        *TTY:=/E<ESC>

        U EXTSYM SUBRTE


                                    5-4
                     LISTING GLOBAL SYMBOLS USING GLOB


   Return to monitor level.

        *^C

        .

















































                                    5-5
























































                                    6-1











                                 CHAPTER 6

                      NETWORK FILE TRANSFER USING NFT



   Function

   The Network File Transfer (NFT) utility allows  you  to  access  files
   residing   on   DECnet   hosts   that   provide  network  file  access
   capabilities.  By using NFT, you can perform a variety  of  operations
   such  as  copying,  deleting,  renaming,  or  listing  files;  listing
   directories; and submitting files to a batch system.  NFT  allows  you
   to  perform  operations at the local host as well as at a remote host.
   You may also use NFT to copy a file from one remote host to another.

   NFT processes text files, programs, data files, control files, or  any
   other  sequential  file.   However,  only  ASCII  file  transfers  are
   supported between a TOPS-10 host and a non-TOPS-10 host.


   Format

        R NFT
        * command output-file-spec = input-file-spec/switches

   where:  command is one of the NFT commands described below.  file-spec
           is one or more standard file specifications.  Depending on the
           command, either the output-file-spec or both file-specs may be
           omitted.

   The NFT commands are:

   Command                       Action

   COPY [output file-spec=]      Copies files from:
     input file-spec             local node to remote node
                                 local node to local node
                                 remote node to local node
                                 remote node to remote node

   DELETE file-spec(s)           Deletes files from  a  local  or  remote
                                 node.


                                    6-1
                      NETWORK FILE TRANSFER USING NFT


   DIRECT [output file-spec=]    Lists the directory from the
     input file-spec             specified node.

   EXIT                          Exits from NFT.

   HELP                          Displays a list of NFT commands.

   PRINT file-spec               Prints a file  at  the  specified  node.
                                 NFT  does  not  check  that  the file is
                                 actually printed at a remote node.   The
                                 file  must  be located at the node in an
                                 acceptable format;  and  print  spooling
                                 must be available at the node.

   RENAME output file-spec(s)=
   input file-spec               Changes the  name  or  attributes  of  a
                                 file.  Valid only for nodes that support
                                 remote renaming.

   SET DEFAULT [node::=]
     /USERID[:uid[:acct[:psw]]]  Sets  the  defaults   for   the   access
                                 information   for  one  or  more  remote
                                 nodes.  The defaults  remain  in  effect
                                 until  you change them using another SET
                                 DEFAULT command or exit from  NFT.   NFT
                                 applies the defaults in SWITCH.INI after
                                 it  sets  the  defaults  from  the   SET
                                 DEFAULT command.

   SUBMIT file-spec              Submits  a  batch  control  file  or   a
                                 command  file on a local or remote node.
                                 NFT does not  check  that  the  file  is
                                 actually submitted.  The control/command
                                 file  must  be  at  the   node   in   an
                                 acceptable  format;  and  the  batch  or
                                 command file facility must be  supported
                                 and available at the node.

   TYPE [output file-spec=]      Displays the specified file on your
     input file-spec             terminal.

   In  addition  to  the  standard  commands,  commands  called  DAP-mode
   commands   are  available.   They  are  the  DDELET  (delete),  DDIREC
   (direct), DRENAM (rename), and DSUBMI (submit) commands.  You can  use
   these  commands  to quickly manipulate a single file on a single host,
   or if the remote host does not  appear  to  accept  the  standard  NFT
   command.   If  you  use these commands, you can include only one input
   file specification.   These  commands  may  execute  faster  than  the
   standard  commands  because they do not have the same command scanning
   and checking as the standard commands.  In some cases,  they  may  not
   give the same amount or type of information as the standard commands.



                                    6-2
                      NETWORK FILE TRANSFER USING NFT


   All NFT and DAP-mode commands described  above  work  between  TOPS-10
   hosts,  and  with  your  files  on the local host.  However, a command
   works on a non-TOPS-10 host only if that  host  has  also  implemented
   that facility.  For example, you can copy files between a TOPS-10 host
   and a VMS host because both hosts have implemented the COPY facility.

   For those commands with input and/or output file  specifications,  the
   defaults  for the command string are listed below.  Though most of the
   defaults are the  same  for  all  the  commands,  some  commands  have
   different  defaults.   The  exceptions  are  noted  with  each field's
   default.

   Field          Default

   node           local node
                  all remote nodes for SET DEFAULT
                  unchanged for RENAME output

   device         DSK:  for local node, none for remote node
                  TTY:  for DIRECT and TYPE output
                  unchanged for RENAME output

   directory      no explicit directory
                  unchanged for RENAME output

   file name      output - input file name
                         - generated name for DIRECT
                         - unchanged for RENAME
                  input  - *
                         - must be specified for DELETE

   file type      output - input file type
                         - DIR for DIRECT
                         - unchanged for RENAME
                  input  - *
                         - must be specified for DELETE
                         - CTL for SUBMIT
                         - none for PRINT

   I/O mode       file creation mode, assumed to be ASCII
                  ASCII for DIRECT and TYPE


   The switches you can use with NFT are listed below:

   /ASCII         Transfers in ASCII mode.  Use the /ASCII switch for all
                  ASCII file transfers to or from a non-TOPS-10 host.

   /[NO]BAUD      Does [not] print the baud rate of data transfer in  the
                  totals  summary.   This  switch applies to the COPY and
                  TYPE commands only.  The default for network  transfers
                  is /BAUD, /NOBAUD is the default for local transfers.


                                    6-3
                      NETWORK FILE TRANSFER USING NFT


   /BINARY        Transfers in binary mode.  Use the /BINARY  switch  for
                  all file transfers between TOPS-10 hosts.

   /[NO]MOAN      Does [not] issue general warning complaints.   Use  the
                  /MOAN  switch to instruct NFT to issue warnings when it
                  encounters  a  dubious  condition.   Such  a  condition
                  typically requires NFT to make a guess (for example, in
                  a file copy operation, the data type or data byte size)
                  in  order  to  complete  the  command.   The default is
                  /NOMOAN.

   /[NO]OKERROR   Use the /[NO]OKERROR  switch  to  control  whether  NFT
                  aborts  the  command  if  an  error  occurs.   /OKERROR
                  directs NFT to  ignore  file  access  and  I/O  errors,
                  issuing  warning messages.  /NOOKERROR instructs NFT to
                  abort the current command on the first occurrence of  a
                  file  access  or  I/O  error.   The  default setting is
                  /NOOKERROR.

   /TOTALS[:list] Use the /TOTALS switch to control  the  totals  summary
                  displayed  at  the  end  of the command execution.  The
                  various TOTALS quantities (files,  errors,  baud  rate,
                  and so on) can be individually controlled by specifying
                  the :list argument.  If  a  quantity-name  is  preceded
                  with  a  NO, that quantity will not be listed.  If more
                  than one quantity  is  specified,  separate  them  with
                  commas, and enclose the list with parentheses.  /TOTALS
                  or /TOTALS:ALL directs NFT to print a totals summary of
                  all applicable quantities at the completion (successful
                  or otherwise) of  the  current  command.   /TOTALS:NONE
                  instructs   NFT  to  omit  the  summary.   The  /TOTALS
                  quantities are:


                   o  BITS - List the total number of data bits.

                   o  BYTES - List the total number of data bytes.

                   o  WORDS - List the total number of 36-bit words.

                   o  RECORDS - List the total number of records.

                   o  BLOCKS - List the total number of 128-word blocks.

                   o  PAGES - List the total number of 512-word pages.

                   o  FILES - List the total number of files.

                   o  BAUD - List the effective data transfer rate  (bits
                      per second).




                                    6-4
                      NETWORK FILE TRANSFER USING NFT


                   o  ERRORS - List the total number of execution errors.


                  The default quantities are WORDS,  BLOCKS,  FILES,  and
                  BAUD.  NFT ignores inappropriate arguments.

   /USERID:id     Use this  switch  to  specify  the  access  information
                  (userid,  account,  and  password) when using NFT for a
                  non-TOPS-10 host.  You include the /USERID switch  with
                  the file specification of the remote file.  If you omit
                  an argument from the switch, NFT prompts you  for  that
                  argument.   If  the  remote  host  does not require the
                  information, you can press the <RET> key.  The form  of
                  the /USERID switch is:

                       /USERID:uid:acct:psw

                  where uid is user-name, acct is an account string,  and
                  psw is a password.  If you omit the account or password
                  argument, you must still include  its  preceding  colon
                  (:).  For example, if you omit the password:

                       /USERID:smith:1776:

                  NFT prompts you for it.  You then  supply  a  password,
                  which NFT does not echo.

                  NFT automatically prompts you for access information if
                  you include /USERID without arguments in the form:

                       NFT   /USERID

                  You  can  include  this  command  and  switch  in  your
                  SWITCH.INI  file.   If  you  include arguments with the
                  /USERID switch in  SWITCH.INI,  you  are  specifying  a
                  particular   userid.   You  can  override  this  switch
                  setting by including an explicit /USERID:uid switch  on
                  a  command  line  to  NFT.   You  can  also use the SET
                  DEFAULT command to specify access information  for  one
                  or  all  remote nodes.  Defaults set this way apply for
                  the duration of the current NFT session.

                  For a TOPS-10 remote file, you can omit the PPN if  the
                  userid and the project-programmer number are identical.
                  For example, you can enter:

                  *DIRECT IRIS::[27,777]/USERID:27,777::FOO

                  as:

                  *DIRECT IRIS::/USERID:27,777::FOO
   Characteristics


                                    6-5
                      NETWORK FILE TRANSFER USING NFT


   The NFT program:

        Requires LOGIN.

        Destroys your core image.

        Leaves your terminal at user level.


   Examples

        1.  Copy a file from  the  local  node  to  a  remote  VMS  host.
            Override the /USERID specified in your SWITCH.INI file.

                 .R NFT
                 *COPY ROSE::/USER=PLANNI
                 For remote ROSE::*.*
                  User-id: BARSTOW
                  Account: 
                  Password:
                  ROSE::COMMUNITY:[BARSTOW]PLANNI..2 <=
                 DSKC:[52,654]PLANNI
                 Total of 398 words in 4 blocks in 1 file at 20395 baud

        2.  Copy a file from a TOPS-20 host to a RSTS host  while  logged
            in  on a TOPS-10 host.  You must specify a /USERID switch for
            each remote host.

                 .R NFT
                 *COPY LILY::/USER=DAISY::PLANNING-GUIDE/USER
                 For remote DAISY::PLANNING-GUIDE.*
                  User-id: THRING
                  Account: 
                  Password:
                 For remote LILY::*.*
                  User-id: 15,177
                  Account: 
                  Password:
                  LILY::SY:[15,177]PLANNI <=
                 DAISY::PS:[THRING]PLANNING-GUIDE..5
                 Total of 483 words in 4 blocks in 1 file at 5851 baud

        3.  Delete all the files with name UUOSYM from a directory  on  a
            TOPS-20  host.  You must include the /USERID switch, but need
            not explicitly specify the directory because it is  the  same
            as the userid.

                 .R NFT
                 *DELETE DAISY::UUOSYM.*/USER
                 For remote DAISY::UUOSYM.*
                  User-id: THRING
                  Account: 


                                    6-6
                      NETWORK FILE TRANSFER USING NFT


                  Password:
                 DAISY::PS:[THRING]UUOSYM.REL.1
                  DAISY::PS:[THRING]UUOSYM.UNV.1
                 Total of 33 blocks in 2 files

        4.  Access a directory not your own  on  a  remote  TOPS-10  host
            called  IRIS.   Since  your  account on the system allows you
            read access to the  directory,  you  can  specify  the  other
            directory and your userid and read the directory.

                 .R NFT
                 *DIRECT IRIS::[17,353]/USER
                 For remote IRIS::[17,353]*.*
                  User-id: 27,777
                  Account: 
                  Password:
                 IRIS::DSKA:[1,2]DSKA.BAK
                 IRIS::DSKA:[1,2]DSKA1.FUL
                 IRIS::DSKA:[1,2]INC.BAK
                 IRIS::DSKA:[1,2]FUL.BAK
                 IRIS::DSKA:[1,2]DSKA.INC
                 IRIS::DSKA:[1,2]INC.MIC
                 IRIS::DSKA:[1,2]FUL.MIC
                 Total of 7 files

        5.  To access  accounts  with  different  access  information  on
            several  remote nodes, set the default access information for
            all of them.

                 .R NFT
                 *SET DEFAULT ROSE::=/USER:BARSTOW:HAHA:HOHUM
                 *SET DEFAULT IRIS::=/USER:27,777:WRITER:FOFUM
                 *SET DEFAULT LILY::=/USER:15,177:SCHOLAR:FEEFI
                 *SET DEFAULT DAISY::=/USER
                 *COPY ROSE::=DAISY::FCC.ASC
                 For remote DAISY::FCC.ASC.*
                  User-id:thing
                  Account:
                  Password:
                                 .
                                 .
                                 .

        6.  Submit a command file to the VMS command  file  processor  on
            host ROSE:.  You have included a /USERID switch for that host
            in your SWITCH.INI file so you do not have  to  include  that
            switch in the command string.

                 .R NFT
                 *SUBMIT ROSE::ABVAX.CTL
                  ROSE::COMMUNITY:[BARSTOW]ABVAX.CTL.1
                 Total of 1 file


                                    6-7
























































                                    7-1











                                 CHAPTER 7

                      CONTROLLING SUBJOBS USING OPSER



   Function


   The OPSER program allows you to control up to  14  subjobs  from  your
   terminal.   OPSER  acts  as  the  supervisor of the subjobs by passing
   monitor-level or user-level commands to all or  to  selected  subjobs.
   OPSER can retrieve output from the various subjobs.

   OPSER  subjobs  run  on  pseudo-terminals  (PTYs).   It  performs  all
   pseudo-terminal  initialization.   You  provide  the  subjob  name and
   either an  OPSER-provided  subjob  number  or  a  user-assigned  name.
   System programs or your programs that require a dedicated terminal can
   be run as subjobs of OPSER.  By running jobs on PTYs, OPSER  maintains
   an I/O link between you and the running jobs.


   Format

        R OPSER
        *:command

   where:  An asterisk (*) is the OPSER prompt if no subjobs are  in  use
           or  if  subjobs are waiting for commands.  OPSER responds with
           an exclamation point when a subjob is running.  You can  enter
           commands  whenever  OPSER  is operating.  Each command must be
           preceded by a colon and may be abbreviated to a unique set  of
           characters.

   Commands to OPSER and their functions are:

   Command                  Function

   :AUTO/hh:mm              Processes the named file as a list of
    filename                interactive  commands.   The  AUTO  file   is
                            terminated  by  either  an end-of-file or the
                            operator typing a line on the console.   AUTO
                            files   may   call   other  files,  including


                                    7-1
                      CONTROLLING SUBJOBS USING OPSER


                            themselves.  The optional /hh:mm switch  sets
                            the  time to run the auto file.  If this time
                            has passed, the AUTO file runs immediately.

   :AUTO/+hh:mm             Processes the AUTO file after the amount
    filename                of time specified by the +hh:mm has elapsed.

   :AUTO/>hh:mm             Processes the AUTO file at the next
    filename                occurrence of hh:mm.

   :AUTO/<hh:mm             Does not process the AUTO file if time
    filename                has already gone past hh:mm.

   ^B                       Sends ^O (CTRL/O) to the subjob.

   ^C                       Returns you to monitor level even if you have
                            active   subjobs   running.   Use  the  :EXIT
                            command (described below) in most cases.

   :CLOSE                   Closes the log file  without  opening  a  new
                            one.

   :CONTINUE                Continues processing the AUTO file  after  it
                            has  been  interrupted  by  a  CTRL/C.   This
                            allows you to gain control of a subjob during
                            AUTO file processing.

   :CURRENT                 Displays the name of the current  subjob,  if
                            defined;  otherwise,  displays  the number of
                            the  current  subjob.   Output  from  another
                            subjob  does not affect the definition of the
                            current subjob.

   :DAYTIME                 Displays the current date and time.

   :DEFINE xxx=n            Associates the symbol xxx  as  the  name  for
                            subjob  n.   The symbol B is reserved for the
                            subjob running BATCON.

   :DEVICE dev:log:n        Assigns the device (dev:), and  logical  name
                            (log)  to  subjob  n.   The  logical  name is
                            optional, but you must include a  null  field
                            if  the logical name is omitted, for example,
                            :DEVICE CDR::3.  The REENTER  command  aborts
                            the request.

   :ERROR n,m,p             Displays  only  error  messages.   (That  is,
                            ignores  nonerror  messages  from  subjob n.)
                            Printing resumes with the :REVIVE command.

   :EXIT                    Exits to the monitor if subjobs  are  not  in
                            use; otherwise, give a list of those that are


                                    7-2
                      CONTROLLING SUBJOBS USING OPSER


                            running.  This  should  be  used  instead  of
                            CTRL/C,  because  :EXIT  does not return your
                            job to monitor level if there are any  active
                            subjobs.  (Also refer to :MONITOR.)

   :FREE                    Displays the first free subjob number.

   :HELP                    Displays text  that  briefly  explains  OPSER
                            commands.

   :JCONT n                 Continues the specified currently halted job.

   :KILL n,m,p              Logs out  the  specified  subjobs.   This  is
                            identical to :KJOB.

   :KJOB n,m,p              Logs out the specified  subjobs,  saving  all
                            files.

   :LOGIN proj,prog         Logs in a new subjob.  If you do not  type  a
                            project-programmer number, OPSER assumes your
                            project-programmer number.

   :MONITOR                 Exits to the monitor,  even  if  subjobs  are
                            running.

   :MSGLVL n                Determines whether the response to the  :WHAT
                            command  includes  the  JOBSTS bits.  If n=0,
                            the bits are  included.   If  n=1,  they  are
                            eliminated.   If  you  do  not specify n, the
                            JOBSTS bits are not included.

   :QUEUE <line>            Initiates the first free subjob and sends the
                            typed-in line to the system queue manager.

   :RESOURCES               Displays the list  of  the  available  system
                            resources.

   :REVIVE n                Resumes normal echoing of output from  subjob
                            n  (that  is, clears the effects of :SILENCE,
                            :TSILENCE, and :ERROR for subjob n).

   :SCHED                   Displays the schedule  bits  as  set  by  the
                            operator.

                            Bit  Meaning

                            0    Regular timesharing.

                            1    No further LOGINs except from CTY.

                            2    No further LOGINs from remote terminals,
                                 and no answering of data sets.


                                    7-3
                      CONTROLLING SUBJOBS USING OPSER


                            4    Batch jobs only.

                            100  Device  MOUNTs  can  be   done   without
                                 operator intervention.

                            200  Unspooling allowed.

                            400  No operator coverage.

                            1000 No automatic down-line loading of nodes.

   :SEND                    Simulates the SEND command, sending a line of
                            text to the operator's terminal.

   :SILENCE n               Suppresses all output from subjob n.

   :SLOGIN proj,prog        Logs  one  subjob  in  but   suppresses   its
                            response.  If you omit the project-programmer
                            number, OPSER uses yours.

   :STOP n                  Puts the specified subjob at  monitor  level.
                            This  is  equivalent to typing two CTRL/Cs in
                            interactive mode.

   :SYSTAT x                Runs SYSTAT with argument x  over  the  first
                            free  subjob.   The argument can be any valid
                            SYSTAT  argument.   (Refer  to  the   TOPS-10
                            Operating   System   Commands   Manual.)  The
                            argument is optional.

   :TIME                    Displays the total  running  time  since  the
                            last   :TIME   command,   followed   by   the
                            integrated product of running time  and  core
                            size.

   :TLOG file-spec          Creates a log file with the  specified  name.
                            If  the  file  already  exists,  a message is
                            printed to  determine  whether  the  existing
                            file  should  be  superseded.   If not, OPSER
                            appends  the  file  to  the   existing   one.
                            Default for file-spec is OPSER.LOG on DSK:.

   :TSILENCE n              Suppresses all output from subjob n (same  as
                            the :SILENCE command) but places entries into
                            the log file.

   :TTYTST                  Tests this terminal by printing all the ASCII
                            characters   between   octal   40   and  174,
                            inclusive.

   :WHAT n,m,p              Prints the status of the specified subjobs on
                            the  terminal.   The status includes a SYSTAT


                                    7-4
                      CONTROLLING SUBJOBS USING OPSER


                            with the time, the time of the last input and
                            the last output, a listing of the JOBSTS bits
                            depending upon the value of :MSGLVL, and  the
                            time of the next timed AUTO file.

   :WHERE devn:             Prints  the  node  number  of  the   device's
                            physical location.

   When a  subjob  number  or  name  is  required  in  a  command  string
   (indicated  by  n,  m,  p),  you  can specify the subjob in any of the
   following ways:

         o  Omit it, in which case the last subjob typed into is used.

         o  Specify ALL, in which case all active subjobs are implied.

         o  Specify a decimal number, or a list of numbers  separated  by
            commas,  from  0  to  the  OPSER limit, which designates that
            particular subjob number.

         o  Specify a name, or a  list  of  names  separated  by  commas,
            previously  assigned  to a particular subjob with the :DEFINE
            command.


   Characteristics

   The OPSER program:

        Requires LOGIN.

        Destroys your core image.

        Places your terminal at user level.


   Example

   The following is an example of an automatic startup file.

        .TYPE SYS:TTY4.ATO<RET>
        :TLOG DSKN:OPSER4.LOG
        :SLOG
        :DEF L1=
        :SLOG
        :DEF L0=
        :SLOG
        :DEF M=
        :SLOG
        :DEF B=
        :TSILEN ALL
        L1-AS LPT1


                                    7-5
                      CONTROLLING SUBJOBS USING OPSER


        L1-R LPTSPL
        L1-FREEZ
        L1-MLIMIT 5000

        .

















































                                    7-6











                                 CHAPTER 8

                       LOCAL FILE TRANSFER USING PIP



   Function

   The PIP program transfers files between standard I/O  devices  at  the
   local system.  It can perform simple editing and magnetic tape control
   operations during transfer operations.


   Format

        R PIP
        * output file-spec(s)/switches = input file-spec(s)/switches

   where:  * is the PIP prompt; output file-spec and input file-spec  are
           file specifications which may include wildcards; and = (equals
           sign) separates the output from the  input  files.   You  must
           include this, even if you omit either file specification.

   /switch  is  one  or  more  of  the  options  described  below.   Each
   description  includes  any  restrictions on combining that switch with
   other switches.

   Switch      Meaning

   /A          Does not split lines between output buffers;  starts  each
               line with a new word.  Used for FORTRAN ASCII input.  This
               switch may be used with /C, /E, /G, /M, /N,  /O,  /Q,  /S,
               /V, and /Z.

   /B          Copies in binary mode.  This switch is legal with /G,  /M,
               /P, /Q, and /X.

   /C          Deletes trailing spaces and converts  multiple  spaces  to
               tabs.   You  can  use this switch with /A, /E, /G, /J, /M,
               /N, /O, /Q, /S, /T, /V, /W, /X, and /Z.

   /D          Deletes one or more files  from  the  destination  device.
               You  can  only specify a destination device in the command


                                    8-1
                       LOCAL FILE TRANSFER USING PIP


               string.  You may use the /X switch with /D.

   /E          For card reader input, ignores card sequence numbers.   In
               other  words,  this  switch replaces characters in columns
               73-80 with spaces.  This switch can be used with  the  /A,
               /C, /G, /J, /M, /N, /O, /Q, /S, /X, and /Z switches.

   /F          Gives a limited (fast) version of the  directory  for  the
               specified device.  You may not use any other switches with
               this one.

   /G          Ignores I/O errors and continue processing  after  issuing
               an error message.  This switch is always legal.

   /H          Copies in image binary mode.  You can use /H with /G,  /M,
               /X, and /Z.

   /I          Copies in image mode.  You can use this  switch  with  /G,
               /M, /X, and /Z.

   /J          Converts    non-printing     control     characters     to
               control-character  format  for  terminal output.  That is,
               001, <CTRL/A>, is output as ^A.  /A, /C, /E, /M,  /W,  and
               /X are permitted with this switch.

   /L          Lists the directory for the  specified  device.   You  may
               only use /Z with this switch.

   (Mx)        Magnetic tape switches, enclosed in parentheses.  They are
               listed  below.   You  may  not use /D, /F, or /U with this
               switch.

               Switch         Meaning

               (M8)           800 bpi density (default value)
               (M5)           556 bpi density
               (M2)           200 bpi density
               (ME)           Even parity (odd parity is default)
               (M#nA)         Advance tape  reel  n  files.   #n  omitted
                              means one file.
               (M#nB)         Backspace tape reel n  files.   #n  omitted
                              means one file.
               (M#nD)         Advance tape reel n  records.   #n  omitted
                              means one record.
               (M#nP)         Backspace tape reel n records.  #n  omitted
                              means one record.
               (MW)           Rewind tape reel.
               (MT)           Skip to logical end-of-tape.
               (MU)           Rewind and unload.
               (MF)           Mark end-of-file.

   /N          Deletes line sequence numbers from an ASCII file.  If  tab


                                    8-2
                       LOCAL FILE TRANSFER USING PIP


               follows  the  sequence  number, deletes the tab also.  You
               may use /A, /C, /E, /G, /M,  /Q,  /X,  and  /Z  with  this
               switch.

   /O          Resequences or adds line  sequence  numbers  to  an  ASCII
               file,  incrementing by 1.  You may use /A, /C, /E, /G, /M,
               /X, and /Z with this switch.

   /P          Converts  FORTRAN  format  control  characters  for   line
               printer listing.  You may use /B and /Z with this switch.

   /Q          Lists a summary of switches on the specified device.   You
               may not use /Q with /D, /F, /R, and /V.

   /R          Renames the source file to the  name  of  the  destination
               file.  /X may be used with /R.

   /S          Resequences or adds line  sequence  numbers  to  an  ASCII
               file,  incrementing  by  10.   /A,  /C, /T, and /Z are all
               valid with /S.

   /T          Deletes trailing spaces from the transferred file.   Keeps
               one  space  and  the line termintor for an all-space line.
               You may use /C, /S, and /Z with this switch.

   /U          Obsolete.

   /V          Matches angle brackets.  If there is  an  unmatched  angle
               bracket, creates a file listing those lines with unmatched
               angle brackets.  You may use /G, /M, and /Z with /V.

   /W          Converts tabs to spaces.  /C and /Z are  legal  with  this
               switch.

   /X and /DX  Copies  the  specified  files  without  concatenating  the
               files.   /DX  copies  all but the specified files.  If you
               omit the /X  switch,  PIP  concatenates  the  files  while
               copying.  You may not use /F or /L with this switch.

   /Y          Obsolete.

   /Z          Zeroes the  directory  of  the  destination  device.   PIP
               attempts  to  delete all the files named in the directory,
               depending on the protection codes.  You may not  use  this
               switch with /D or /R.

   PIP can transfer files in either ASCII or binary mode.  PIP  uses  the
   file  extension  in  the file specification to determine which mode to
   use.  Whenever possible, PIP transfers files in a binary mode since it
   is faster.  The binary modes are:  binary, image, and image binary.

   PIP performs a specific series of tests on a file extension  in  order


                                    8-3
                       LOCAL FILE TRANSFER USING PIP


   to  determine  the mode to use during a transfer operation.  PIP looks
   for:

         o  The presence of a data mode switch.  If no switch  is  found,
            PIP goes to the next test.

         o  The presence  of  a  known  (standard)  file  extension  that
            specifies a binary mode of transfer.  If no binary extensions
            are found, PIP goes to the next test.

         o  The input and the output devices specified, to  determine  if
            they  are  capable of handling binary data.  If either of the
            devices cannot handle binary, the transfer is made  in  ASCII
            mode.   If  both  devices can handle binary data, PIP goes to
            the next test.

         o  The presence of the /X switch in the command string; if it is
            found,  the  transfer is made in binary mode.  If an X option
            is not found, PIP goes to the next test.

         o  The  presence  of  commas  (non-delimiters)  in  the  command
            string;  if commas are found, ASCII mode is indicated.  If no
            commas are found, the transfer is made in binary mode.


   Characteristics

   The PIP program:

        Requires LOGIN.

        Destroys your core image.

        Places your terminal at user level.


   Examples

        1.  Run PIP, and list your directory on your terminal.

                 .R PIP
                 *TTY:/L=

        2.  Transfer files from area [11,7]  to  your  directory  without
            concatenation.

                 *DSK:/X=DSK:[11,7]filea.rel,filea.mac

        3.  Combine all the files on the tape on MTA0:  into one file  in
            your directory.

                 *DSK:TAPE.MAC=MTA0:*


                                    8-4
                       LOCAL FILE TRANSFER USING PIP


        4.  Rename the file MONI.MAC to MONI.CBL

                 *DSK:MONI.CBL/R=MONI.MAC

        5.  Change the directory access code of [57,123] to <222>.

                 *DSKA:[57,123].UFD<222>/R=[57,123].UFD

        6.  Transfer a file from MTA1:  to MTA2:  at 200  bpi  with  even
            parity.

                 *MTA2:(M2E)=MTA1:(ME2)

        7.  Backspace MTA0:  to the start of the previous file.  (MB)  is
            equivalent to (M#1B).

                 *MTA0:(MB)=

        8.  Backspace MTA2:  to the start of the current file.

                 *MTA2:(M#0B)=

































                                    8-5
























































                                    9-1











                                 CHAPTER 9

                      LISTING DISK QUOTAS USING QUOLST



   Function

   The QUOLST program prints the amount of disk space used and the amount
   left  on  each  file  structure  in your search list.  In addition, it
   prints the amount of space the  file  structures  have  left  for  all
   users.  The information printed on your terminal is:

         o  The structure name.

         o  The number of blocks allocated.

         o  The number of blocks left in  the  logged-in  quota,  in  the
            logged-out quota, and on the structure.



   Format

        R QUOLST


   Characteristics

   The QUOLST program:

        Destroys your core image.

        Leaves your terminal at monitor level.


   Example

        .R QUOLST<RET>

        USER:  27,5434
        STR     USED     LEFT:(IN)   (OUT)   (SYS)
        DSKC:   1355     8645        3645    61995


                                    9-1
                      LISTING DISK QUOTAS USING QUOLST


        DSKB:     0     10000        5000    96870

        .



















































                                    9-2











                                 CHAPTER 10

                     FORMATTING TEXT FILES USING RUNOFF



   Function

   The RUNOFF program formats text files using commands you insert into a
   file.  You create the file and insert the RUNOFF commands using one of
   the standard TOPS-10 text editors.


   Format

        R RUNOFF
        *file-spec

   where:  * is the RUNOFF prompt; file-spec is a file specification with
           standard defaults and wildcard features.  The normal extension
           for a file that RUNOFF processes is .RNO.  The processed  file
           has  an  extension of .MEM.  You can queue this file to a line
           printer, or display it on your terminal.

   The commands listed below are inserted into the  text  file  to  cause
   RUNOFF  to  perform  some  action.   All  RUNOFF commands begin with a
   period (.).  You can abbreviate all commands.

   Some commands require either numeric or  text  arguments.   In  either
   instance,  you  type  the  command,  one space, and then the argument.
   When you have several commands to input, you can list all of  them  on
   one line, separating them with periods.  However, if the first command
   has a comment or takes text as its argument, you must use a  semicolon
   to separate the commands.  Comments must be preceded by an exclamation
   point (!).

   Command                  Function

   .APPENDIX "text"         Starts appendix with "text" as its name.

   .AUTOPARAGRAPH           Treats leading spaces as new paragraph.

   .AUTOTABLE               Treats lines without leading  spaces  as  new


                                    10-1
                     FORMATTING TEXT FILES USING RUNOFF


                            paragraph.

   .BEGIN BAR               Starts a change bar,  which  appears  in  the
                            left hand margin.

   .BLANK n                 Skips n lines.

   .BREAK                   Starts a new output line.

   .CENTER n                Centers the next line around column n/2.

   .CHAPTER "text"          Starts chapter with text as name.

   .COMMENT                 Ignores this command.

   .CONTROL CHARACTERS      Allows control characters  to  print  in  the
                            text.

   .DISABLE BAR             Ignores change bars.

   .DO INDEX "title"        Outputs index with rest of line as title.

   .ELSE                    Changes sense of IF/IFNOT.

   .ENABLE BAR              Allows change bars.

   .ENDIF name              Ends conditional input.

   .END BAR                 Ends change bar.

   .END FOOTNOTE            Ends a footnote definition.

   .END LIST                Ends a list.

   .END LITERAL             Ends a literal block of text.

   .END NOTE                Ends a NOTE command.

   .END SELECTION           Stops selection until single line prefix.

   .END SUBPAGE             Stops subpage numbering (resumes page).

   .FIGURE n                Makes space for n-line figure.

   .FIGURE DEFERRED n       Same as FIGURE except the figure  may  be  on
                            next page.

   .FILL                    Resumes filling and justifying each line.

   .FIRST TITLE             Includes title on first page.

   .FLAGS ALL               Enables existing flag characters.


                                    10-2
                     FORMATTING TEXT FILES USING RUNOFF


   .FLAGS type "ch"         Changes flag character of the specified  type
                            to "ch".

   .FOOTNOTE n              Starts n-line footnote.

   .HEADER x                Issues "page" in case x, where  x  is  UPPER,
                            LOWER, or MIXED case.

   .HEADER LEVEL n          Starts section at  level  n  (1-5);  rest  is
                            name.

   .IF                      Starts conditional input if VARIANT name.

   .IFNOT name              Starts conditional input if not VARIANT name.

   .INDENT n                Indents next line n spaces.

   .INDEX                   Inserts rest of this line in index.

   .JUSTIFY                 Resumes justifying text.

   .LEFT n                  Starts next line n columns from left margin.

   .LEFT MARGIN n           Sets left margin.

   .LIST n                  Starts list of items with spacing n.

   .LIST ELEMENT            Starts of item in a list.

   .LITERAL n               Starts a literal block of text n lines long.

   .LOWER CASE              Starts footnotes and text in lower case.

   .NO AUTOPARAGRAPH        Stops autoparagraph mode.

   .NO AUTOTABLE            Stops autotable mode.

   .NO CONTROL CHARACTERS   Does not allow control characters.

   .NO FILL                 Stops fill and justify.

   .NO FLAGS ALL            Disables existing flag  characters  except  .
                            and !.

   .NO FLAGS type           Does not use flag characters of the specified
                            type.

   .NO HEADER               Suppresses page headers.

   .NO JUSTIFY              Stops justifying.

   .NO NUMBER               Stops page numbering.


                                    10-3
                     FORMATTING TEXT FILES USING RUNOFF


   .NO PAGING               Stops splitting into pages.

   .NO PERIOD               Stops   double    spacing    after    period,
                            exclamation   point,  semicolon,  colon,  and
                            question mark.

   .NO SELECTION            Accepts all text as input.

   .NO SPACE                Suppresses space on this end of line.

   .NO SUBTITLE             Suppresses subtitles.

   .NOTE text               Starts  indented  note  with  heading  "text"
                            centered.   If  you  omit "text," RUNOFF uses
                            the heading NOTE.

   .NUMBER n                Resumes page numbering at page n.

   .NUMBER APPENDIX n       Sets appendix number to n.

   .NUMBER CHAPTER n        Sets chapter number to n.

   .NUMBER INDEX            Sets chapter number to "INDEX".

   .NUMBER LEVEL            Sets next HEADER LEVEL to a, b, c,...
     a, b, c,...

   .NUMBER LIST d, c        Sets list counter depth d to c.

   .NUMBER PAGE n           Resumes page numbering at page n.

   .NUMBER SUBPAGE ch       Sets subpage number to ch (A-Z).

   .PAGE                    Starts new page.

   .PAGE SIZE n,m           Sets page size to n lines by m columns
   .PAPER SIZE n,m          Sets paper size to n lines by m columns.

   .PAGING                  Resumes breaking into pages.

   .PARAGRAPH n, v, t       Starts a new paragraph,  indented  n  spaces,
                            starting  v  blank  lines  below the previous
                            paragraph, and having  t  as  the  TEST  PAGE
                            value.

   .PERIOD                  Double  spaces  after   period,   exclamation
                            point, semicolon, colon, and question mark.

   .PRINT INDEX             Starts printing index.

   .RIGHT n                 Right adjusts next line n columns left of the
                            margin.


                                    10-4
                     FORMATTING TEXT FILES USING RUNOFF


   .RIGHT MARGIN n          Sets right margin to n.

   .SELECTION string        Sets selection string.

   .SKIP n                  Skips n*spacing lines.

   .SPACING n               Sets spacing (default=1).

   .STANDARD n              Sets standard setup of width n.

   .SUBINDEX                Indexes with "#" used to delimit sub-indices.

   .SUBPAGE                 Starts subpage numbering.

   .SUBTITLE or .SUBTTL     Uses rest of line as subtitle.

   While inputting your text, you have the option  of  including  special
   characters  to  alter  the  case  and mode operations.  You type these
   characters immediately before the word or group of words you  want  to
   arrange.   Just  like RUNOFF commands, these special characters do not
   appear in your output after running RUNOFF.  Special  text  characters
   include:

     Flag
   Character                Function

   Underscore (_)           Takes next character as text.

   Circumflex (^)           Uppercases next character.

   Back-slash (\)           Lowercases next character.

   Number sign (#)          Treats as an expandable space.

   Ampersand (&)            Underlines next character.

   Less-than (<)            Capitalizes the following word.

   Greater-than (>)         Indexes the following word.

   Exclamation point (!)    Ends footnote or begins comment.

   Period (.)               Treats what follows as a RUNOFF command.

   Semicolon (;)            Used to separate multiple commands.


   Characteristics

   The RUNOFF program:

        Requires LOGIN.


                                    10-5
                     FORMATTING TEXT FILES USING RUNOFF


        Destroys your core image.

        Places your terminal at user level.



   Examples

        1.  Use the .LIST and .LIST ELEMENT commands to create a list.

                 .NF.LS
                 .LE;Page numbers on every page except the first,
                 .LE;Spacing 1 between lines,
                 .LE;Fill and justify,
                 .LE;Tab stops 9,17,25,33,41,49,57,65,
                 .LE;Left margin 0,
                 .LE;Right margin 60,
                 .LE;Page size - Width 60 characters, Length 58 lines.
                 .ELS

            Your output would look like the following:

                 1.  Page numbers on every page except the first,

                 2.  Spacing 1 between lines,

                 3.  Fill and justify,

                 4.  Tab stops 9,17,25,33,41,49,57,65,

                 5.  Left margin 0,

                 6.  Right margin 60,

                 7.  Page size - Width 60 characters, Length 58 lines.

        2.  To get header levels in your text, you can insert commands in
            your text as follows:

                 .FLAG CAPITALIZE
                 .CHAPTER EXAMPLE 5
                 .HL 1 FIRST LEVEL OF SECTION 1
                 The command .<HEADER <LEVEL starts a section at the level
                 specified and takes the following text as the header.##The
                 n can be in the range from 1 to 5.
                 .HL 1 SECOND LEVEL OF SECTION 1
                 The sections are incremented by 1, and the number is
                 output in the form i.j.k.l.m.##If this is a chapter 
                 oriented document, the i is the chapter number;#otherwise, the
                 i is the number of the .<HI 1 level.
                 .HL 1 THIRD LEVEL OF SECTION 1
                 This command acts as


                                    10-6
                     FORMATTING TEXT FILES USING RUNOFF


                 .SKIP 3;.NOFILL
                          .<BREAK .<TEST <PAGE 9;.<BLANK 3
                 .SKIP 3;.FILL
                 followed by the section number.##<HEADER <LEVEL<S 1 AND 2
                 end with a .<BREAK.##<HEADER <LEVEL<S 3, 4, AND 5 end with
                 a space dash space combination (_#-_#).



   Your output would look like:












                                 CHAPTER 1

                                 EXAMPLE 5



   1.1  FIRST LEVEL OF SECTION 1

   The command .HEADER LEVEL starts a section at the level specified  and
   takes  the  following  text  as the header.  The n can be in the range
   from 1 to 5.



   1.2  SECOND LEVEL OF SECTION 1

   The sections are incremented by 1, and the number  is  output  in  the
   form  i.j.k.l.m.  If this is a chapter oriented document, the i is the
   chapter number; otherwise, the i is the number of the .HL 1 level.



   1.3  THIRD LEVEL OF SECTION 1

   This command acts as


        .BREAK .TEST PAGE 9;.BLANK 3




                                    10-7
                     FORMATTING TEXT FILES USING RUNOFF


   followed by the section number.  HEADER LEVELs 1  and  2  end  with  a
   .BREAK.   HEADER  LEVELS  3,  4,  and  5  end  with a space dash space
   combination (#-#).



















































                                    10-8











                                 CHAPTER 11

                     SETTING SEARCH LISTS USING SETSRC



   Function

   You can use the SETSRC program to change your job search list  or  the
   system search list.  You must be logged in under [1,2] to create a new
   system search list.  A search list is the order of the file structures
   that  are to be searched whenever you implicitly or explicitly specify
   the generic device DSK:.  The system manager  originally  defines  the
   search  list to include the file structures that you can access.  With
   the SETSRC program, you  can  alter  the  search  list  by  adding  or
   deleting file structures.

   The search list is of the form:

        fs1:, fs2:, fs3:, FENCE, fs4:

   where:  fs is the name of the file structure.

   The file structures on the left of the FENCE form  the  active  search
   list  and represent the generic device DSK:  for your job.  The active
   search list is  a  list  of  the  file  structures  that  the  monitor
   searches,  and  the  order  in  which  the  file  structures are to be
   searched.  The search goes from left to right.

   The files to the right of the FENCE compose the  passive  search  list
   and  represent the file structures that were once in the active search
   list.  File structures are kept in the passive  search  list  so  that
   quotas  can be checked on a DISMOUNT or KJOB command; these structures
   are not searched.  The FENCE is the boundary between  the  active  and
   passive search lists.

   You can change the job's  search  list  by  adding  or  deleting  file
   structures, using the MOUNT and DISMOUNT commands.  Because the SETSRC
   program does not create a UFD if one does not  exist,  use  the  MOUNT
   command  to  create  a  UFD.   Refer  to  the TOPS-10 Operating System
   Commands Manual for a description of the MOUNT and DISMOUNT commands.




                                    11-1
                     SETTING SEARCH LISTS USING SETSRC


   Format

        R SETSRC
        *command/switch

   When the program prompt (*) appears, you can respond with any  of  the
   following commands:

   Command             Function

   A fs1, fs2,...      Adds one or more file structures to  the  existing
                       active search list.  The file structures (with any
                       switches) are appended to the beginning or the end
                       of   the  active  search  list  according  to  the
                       following specifications:

                        o  If no asterisk appears in  the  specifications
                           (for  example,  fs1,  fs2)  or  if an asterisk
                           appears before the file structure  names  (for
                           example,  *,fs1, fs2), the file structures are
                           added to the end of the search list.

                        o  If an  asterisk  follows  the  file  structure
                           names  (for  example,  fs1, fs2, *,), the file
                           structures are added to the beginning  of  the
                           search list.

                        o  If the asterisk appears in the middle  of  the
                           file  structures  (for  example, fs1, *, fs2),
                           the file structures before  the  asterisk  are
                           added  to the beginning of the search list and
                           the file structures  after  the  asterisk  are
                           added to the end.

   C fs1,fs2,...       Creates a new search list for this job.  Any  file
                       structures in the current search list that are not
                       in the new list are moved to  the  passive  search
                       list.

   CP[dir]             Creates a new default directory  path.   You  must
                       specify the new path with this command.

   CS fs1,fs2,...      Creates a new system search  list  (that  is,  the
                       file  structure search list for device SYS:).  You
                       must be logged in under [1,2] to use this command.

   H                   Prints  information  (HELP)  about  the  available
                       commands.

   M/switch            Modifies  the  current  search   list   and   DSK:
                       specification  by altering the switch settings for
                       individual file structures.  This command does not


                                    11-2
                     SETTING SEARCH LISTS USING SETSRC


                       add  or  remove  file  structures  from the search
                       list.

   R fs1,fs2,...       Removes file  structures  from  the  search  list.
                       They  are  placed into the passive search list, so
                       that on subsequent  LOGOUTs  or  DISMOUNTs,  quota
                       limits  can  be  checked.   This  command does not
                       affect ersatz devices.

   T                   Prints the job search list.

   TP                  Prints the default directory path.

   TS                  Prints the system search list.

   You can use the following  switches  in  the  SETSRC  command  string.
   Switches that modify file structures must appear immediately after the
   file structure name that  they  modify.   Other  switches  can  appear
   anywhere  in  the  command string.  The switches can be abbreviated as
   long as the abbreviation is unique.

   Switch              Function

   /CREATE             Allows  new  files  to  be  created  on  the  file
                       structure.  This is the default.

   /LIB:[proj,prog]    Used with the C or M command only, /LIB  sets  the
                       job's library directory to the UFD [proj,prog] and
                       adds it to your DSK:  specification.   This  means
                       that if a file is not found in your directories in
                       your search list, the library directory will  then
                       be  searched  for  the  file.   If  you  only type
                       LIB:[PPN] to SETSRC, it interprets this as M/LIB.

   /NEW                Adds   the   directory   [1,5]   to   your    SYS:
                       specification.   This  means  that when the system
                       directory is searched, the directory [1,5] will be
                       searched  before the directory [1,4].  This switch
                       can be typed in directly as a command by  omitting
                       the   C  or  M  command  and  the  slash  (NEW  is
                       equivalent to M/NEW).

   /NOCREATE           Does not allow new files to be created on the file
                       structure  when you specify DSK:, but allows files
                       to be superseded.  Files can  be  created  on  the
                       file  structure  if you specify the file structure
                       name explicitly.  You may specify this  switch  as
                       /N.

   /NOLIB              Removes  the  library  directory  from  your  DSK:
                       specification.  This switch is only valid with the
                       C or M command.


                                    11-3
                     SETTING SEARCH LISTS USING SETSRC


   /NONEW              Removes  the  [1,5]  directory  from   your   SYS:
                       specification.  This switch is only valid with the
                       C or M command.

   /NOSCAN             Cancels the scan switch for  the  directory  path.
                       You  can use this switch only with the CP command.
                       If  you  type  NOSCAN  at   the   prompt,   SETSRC
                       interprets it as CP[dir]/NOSCAN.

   /NOSYS              Removes the SYS:   specification  from  your  DSK:
                       specification.  This switch is only valid with the
                       C or M command.

   /NOWRITE            Does not allow writing on the file  structure  for
                       this   job   (that   is,  the  file  structure  is
                       read-only).  You may specify this switch as /R.

   /SCAN               Sets the scan switch for the directory path.  When
                       you  search for a file, scanning allows the search
                       to include higher-level SFDs and the UFD.  You can
                       use  this switch only with the CP command.  If you
                       type SCAN at the prompt, SETSRC interprets  it  as
                       CP[dir]/SCAN.

   /SYS                Adds  the  SYS:   specification   to   your   DSK:
                       specification.   If a file cannot be found in your
                       directories in your search list or in your library
                       directory    (if    /LIB:[proj,prog]    has   been
                       specified), the system directory [1,4]  will  then
                       be  searched  for  the  file.   This switch can be
                       typed in directly as a command by omitting  the  C
                       or  M  command and the slash.  For example, SYS is
                       equivalent to M/SYS.

   /WRITE              Allows writing on the file structure.  This is the
                       default.


   Characteristics

   The SETSRC program:

        Places your terminal at user level.

        Destroys your core image.


   Example

   Your search list is defined as DSKB:.

        .R SETSRC<RET>


                                    11-4
                     SETTING SEARCH LISTS USING SETSRC


        *T<RET>
        *DSKB:, FENCE

   Add DSKA:  to the end of the search list.

        *A DSKA:<RET>

   Your search list is now defined as DSKB:,DSKA:.

        *T<RET>
        DSKB:,DSKA:,FENCE

   Add DSKC:  to the beginning of the search list.

        *A DSKC:,*<RET>

        *T<RET>

        DSKC:,DSKB:,DSKA:,FENCE

   Remove DSKA:  from the search list.

        *R DSKA:<RET>

        *T<RET>

        DSKC:,DSKB:,FENCE,DSKA:

   Disable writing on DSKB:.

        *M DSKB:/NOWRITE<RET>

   Set your library directory  to  [27,500]  and  add  it  to  your  DSK:
   specification.

        *M/LIB:[27,500]<RET>

   Add SYS:  to your search list.

        *SYS<RET>

        *T<RET>
        /LIB:[27,500]/SYS DSKC:,DSKB:/NOWRITE,FENCE,DSKA:

   Your DSK:  and SYS:  specifications are listed first, followed by your
   search list.

        *TS<RET>

   The system search list is defined as DSKA:,DSKB:,DSKC:.

        *DSKA:,DSKB:,DSKC:


                                    11-5
                     SETTING SEARCH LISTS USING SETSRC


        .





















































                                    11-6











                                 CHAPTER 12

                 DISPLAYING SYSTEM STATISTICS USING SYSDPY



   Function

   The SYSDPY program allows you to display system status and the  status
   of  network links and user jobs, formatted for your particular type of
   terminal.  SYSDPY features a display-oriented output format with  many
   commands  for  controlling  the types of information to include in the
   display.

   When you first start the SYSDPY program, it displays the status of the
   user  jobs  and  the  system  statistics.  It is ready to receive user
   commands at any time.  Your commands are not echoed on the screen, but
   are reflected in the changes in the display.


   Format

   To start the SYSDPY program,  type  the  R  command  followed  by  the
   special  version of SYSDPY that is designed for your type of terminal.
   The different versions of SYSDPY and the terminal types for which they
   are designed are:

        Version      Terminal

        SYSDPA       DIGITAL VT05A
        SYSDPB       DIGITAL VT05B (2400 baud)
        SYSDPY       DIGITAL VT06 (Datapoint 3300)
        SYSVBX       DIGITAL VB10C graphics display
        SYSV50       DIGITAL VT50
        SYSV52       DIGITAL VT52
        SYSV61       DIGITAL VT61
        SYSANS       DIGITAL VT100 or other ANSI terminal
        SYSDLT       Delta Data Telterm
        SYSHLZ       Hazeltine 2000

   Any unprivileged user can run SYSDPY, but the output of certain system
   statistics  is  restricted to privileged jobs only.  If you are logged
   in as [1,2], or your job has SPY privileges, you can use all available


                                    12-1
                 DISPLAYING SYSTEM STATISTICS USING SYSDPY


   SYSDPY commands.

   When SYSDPY first starts running,  it  displays  the  normal  job  and
   system  status  (equivalent  to  the N command).  At any time, you can
   type any of the one-letter  commands  described  below,  which  change
   either  the type of information displayed, or allow you to control the
   display of information.   The  file  DOC:SYSDPY.MAN  contains  a  full
   description  of  the  information in the various displays.  You do not
   need to press RETURN after you type a SYSDPY command.   To  exit  from
   SYSDPY, type <CTRL/Z> or <CTRL/C>.

   If you need help, type H.  This prints a short  listing  of  available
   commands.

   Commands to SYSDPY are:

   A       Changes SYSDPY's normal scroll setting to  no-scroll.   SYSDPY
           usually  scrolls  through the display, advancing one screenful
           each update pass.  (Refer to the + and - commands.)

   C       Displays the DECnet link status for  all  open  links  on  the
           system.

   E       Displays  Ethernet  status.   This   includes   all   Ethernet
           channels,  all  KLNI  controllers, and enabled protocol types.
           The E command summarizes datagram traffic and the  free  queue
           errors.

   F       Lists file system statistics for each disk unit in the system.
           This   information   includes  I/O  counts,  error  summaries,
           structure membership, and a summary of swapping units.

   H       Lists the help text.

   I       Lists incremental statistics, which  are  changes  in  certain
           values  since  the  last update cycle.  The values incremented
           are:  system uptime, job runtimes, disk reads and writes,  CPU
           statistics,  network  I/O  (byte)  counts, TTY I/O counts, and
           network message counts.  A + (plus sign) immediately preceding
           the uptime value indicates incremental mode.

   J       Lists jobs only, without any system statistics.  The jobs  are
           listed in columns.

   K       Displays CI network information, including open paths to nodes
           on  the  CI network, packet transmission and reception counts,
           and port recoverable error counts.

   L       Writes   the   contents   of   the   screen   to   the    file
           LPT:SYSDPY.LOG[-].   SYSDPY  logs  the  screen each time it is
           updated.  If this log file already exists, SYSDPY appends  the
           new  data  to  it.  A form feed separates each screen.  Typing


                                    12-2
                 DISPLAYING SYSTEM STATISTICS USING SYSDPY


           <CTRL/Z> to SYSDPY closes the file.

   M       Lists normal job data and an expanded memory  summary  showing
           both virtual and physical job memory usage.  The M job display
           does not show system statistics.

   N       Lists the default statistics, which include a  column  of  job
           status information, and a column of system status information.
           Some of the system statistics listed are  CPU  idle  and  lost
           time, and available disk structures.

   O       Suppresses statistics from [1,2] jobs for  the  J,  N,  and  M
           displays.  A second O command resumes display of [1,2] jobs.

   Q       Lists the system queues, just as the QUEUE program  does,  but
           in DPY mode.  This command requires GALAXY Version 4 or later.

   R       Refreshes the entire screen immediately.  SYSDPY automatically
           refreshes  the  screen  at various intervals, depending on the
           terminal in use.  The R command resets the  automatic  refresh
           counter.

   S       Changes the SYSDPY display from the default to the disk reads,
           disk  writes,  and  the user name for all jobs listed in the N
           display.  SYSDPY resumes displaying system statistics when you
           type the S command a second time.

   T       Displays ANF network topology and the NCL  numbers  associated
           with each node.  This display requires PEEK or SPY privileges.

   V       Attempts to lock SYSDPY  in  memory  and  run  it  in  a  high
           priority  run  queue  (HPQ).   In addition, SYSDPY updates the
           screen once per second, unless you previously set  the  update
           time  to  another  value  (using  the  W command).  A second V
           command clears the lock and  HPQ  setting,  and  restores  the
           update  time  to ten seconds.  If you issued a SET HPQ command
           before running SYSDPY,  the  V  command  locks  the  job,  but
           doesn't change the HPQ.

           SYSDPY automatically clears the  V  state  after  1000  update
           cycles,  or  if  you  issue  a Q command.  The system does not
           issue an error message if SYSDPY fails to lock or run in  HPQ.
           This command requires LOCK or HPQ privileges.

   nW      Sets the wait time between screen updates to n  seconds.   The
           default  update  time is ten seconds, and one second for the V
           display.  You may specify n as any number between  0  and  60.
           Zero  means  one  clock  tick.   If you do not specify a time,
           SYSDPY assumes the default wait time of ten seconds.

   Z       Lists all known LAT servers and some LAT traffic statistics.



                                    12-3
                 DISPLAYING SYSTEM STATISTICS USING SYSDPY


   \       Displays ANF network statistics.   This  information  includes
           the  number of network messages sent and received according to
           message type (such as DATA or NEIGHBORS), a histogram  of  the
           data  messages sent and received as a function (log base 2) of
           the data message size, and network free core usage.

   *       Displays the DECnet node status for all nodes  in  the  DECnet
           network.   Use  the  A  command to change the display from all
           network nodes to just those nodes with active links.  Use  the
           ^  command  (described  below)  to change the display from all
           known nodes to only those nodes with which the local node  has
           had contact.

   n+      Advances the screen by n lines or n  jobs,  depending  on  the
           current display.  If you do not specify n, SYSDPY advances one
           screen.  When you type the + command,  you  clear  auto-scroll
           (refer to the A command).

   n-      Scrolls the screen backwards by n lines or jobs, depending  on
           the current display.  If you do not specify n, SYSDPY reverses
           one  screen.   When  you  type  the  -  command,   you   clear
           auto-scroll (refer to the A command).

   !       Displays idle jobs or DECnet nodes, depending on  the  current
           display.   Typing  the  !  command again stops display of idle
           jobs or nodes.

   #       Changes the listing in the "Where" column of the  job  display
           from  the  PTY  number  to the controlling job number of a job
           being controlled by another job.

   %       Changes the listing in the "Runtime" column of the job display
           from  the actual runtime to the percentage of the CPU that the
           runtime represents.

   ^       Eliminates certain statistics from the  display.   For  the  N
           display,   the   first  part  of  the  system  statistics  are
           eliminated, for a DECnet display, non-valid delay  time  nodes
           are   not   shown,  and  for  the  F  display,  error  summary
           information is not included.

   <ESC>   Freezes the current screen until you type another command.

   SPACE   Updates the screen display immediately, but  does  not  change
           any SYSDPY parameters.


   Characteristics

   The SYSDPY program:

        Destroys your core image.


                                    12-4
                 DISPLAYING SYSTEM STATISTICS USING SYSDPY


        Requires LOGIN.

        Places your terminal at user level.


   Example

   Run SYSDPY on a VT100 terminal to examine job and  system  statistics.
   SYSDPY  continually  scrolls  through this information; you can type a
   command at any time to alter the display.


   .R SYSANS<RET>

   Job  Who  Where What  #P State Runtime  This is RL417A DEC10 Development
   1  [OPR]  D156 STOMPR 26 SL    00:01.81 08-Mar-90 12:08:01 UP:30:53:43 
   2  [OPR]  D156 QUASAR 118 HS V 02:52.16      ID OV LS  UPTIME   CTX UUO DBL CSH
   3  [OPR]  D156 ACTDAE 106 HS V 02:06.93 CPU0 80 22  0 30:53:43    3  24   2   1
   4  [OPR]   CTY OPR    66 HB V  00:03.46 CPU1 86  9  0 30:53:45    3  24   3   2
   5  [OPR]  D156 NML    34 HB V  05:35.66 CPU2 88  9  0 30:53:39    2  10   3   1
   6  [OPR]  D156 ORION  77 HS V  00:15.91      DSKI DSKO SWPI SWPO MTAI MTAO
   7  [OPR]  D156 NEBULA 66 HB V  00:01.60 CPU0    3    1    0    0    0    0
   8  [OPR]  D156 CATLOG 127 HB V 00:00.76 CPU1   10    0    0    0    0   20
   9  10,56   75  SPACE  10 ^C    07:00.91 CPU2    4    0    0    0    0    0
   10 [OPR]  D156 FAL-10 187 HS   01:56.21 ANF In:0    Out:1    Cor:2170
   11 [OPR]  D156 MX     108 HB V 03:19.28 DCN In:3103 Out:33   Blk:6/80=8%
   12 10,6030 74  MS     174 ^C   00:48.91 ETH In:4315 Out:116  Dgm:71/1
   13 [SELF]  J27 SYSANS 25 RN+   00:01.00 TTY In:0    Out:30   Cnk:548/1072=51%
   14 [OPR]  D156 MIC    22 HS    00:11.43 IPCF S:10   Out:0    W/P:23/6
   15 30,6014 77         4  ^C    00:20.90 Mem:1000/6726 Shr:352 JRN:1/1/18
   16 [OPR]   30  SYSTAT 25 ^C    00:07.83 Use:1292/1944 Swp:652/99664 ASR:.00
   17 [OPR]   100 DIRECT 52 ^C    00:07.25 FRU:9604/25632=37.46%
   18 30,5674 102 MS     166 ^C   01:02.55 HDE:2 POK:12/22
   19 10,115 D100 CALNDR 24 ^C    00:02.21 Job:28/100 Det:16
   20 [OPR]  D156 FILDAE 21 SL    00:48.43 Struc  Mnt  Free    Struc  Mnt  Free
   21 [OPR]  D156 DAEMON 11 HB+   00:05.96 1026   0   272220   DSKS   1   78250
   22 10,2100 105 DC     5  ^C    00:43.01 DSKD   0   97540    GENL   0   177610
   23 [OPR]  D156 DTELDR 19 HS    02:46.96 DSKP   3   266500   DSKN   3   525250
















                                    12-5
                 DISPLAYING SYSTEM STATISTICS USING SYSDPY


   Now type the E command to SYSDPY to examine Ethernet status.  When you
   type the command, it does not echo on your terminal.

   E

   Ethernet Status of RL226A DEC10 Development dd-mmm-yy hh:mm:ss UP:05:00:46

   Chan/Kont     State      E-Net Address          DgmXmt     DgmRcv
   ETH-0         Online   AA-00-04-00-6E-1C         35048     107327
     NI-0        Online   AA-00-03-03-00-22         34395     100269
     NI-1        Online   AA-00-03-03-00-13           653       7058

   Protocol         State    Kont      User         DgmXmt     DgmRcv    FQE
     60-04 LAT      Online   NI-0   System           34365      97026      5
     90-00 Loopback Online   NI-0   System               0          2      0
     60-02 RmtCon   Online   NI-0   System              30       3239      0
     -Inf-          Online          Job 17 Ctx 1         0          0      0
     60-01 DNA/MOP  Online   NI-0   Job 17 Ctx 1         0          2      0
     60-03 DECnet   Online   NI-1   System             653       7058      3
     -Inf-          Online          Job 23 Ctx 1         0          0      0

   Exit from SYSDPY by typing <CTRL/Z>.
































                                    12-6
                                        
























































                                    12-7
                                        


                                   INDEX



               -A-                     Directories, 2-1
                                       Directory paths, 11-2
   Accessing tapes, 1-1                Disks, 9-1
   Action commands, 1-1                Displaying system statistics,
     runtime commands, 1-3                 12-1
     switches, 1-2
   Active search list, 11-1                        -E-
   ANF network topology, 12-3
   ASCII source file comparison, 4-3   Ersatz devices, 2-1
   Assembly listing, 3-1               Ethernet, 12-2
   AUTO files, 7-1
                                                   -F-
               -B-
                                       FENCE, 11-1
   Backing up files, 1-1               FILCOM
   BACKUP                                examples, 4-6
     examples, 1-8                       program, 4-1
     prompts, 1-3                      File Access Listener (FAL), 6-1
   Baud rate, 6-3                      File transfer, 6-1
   Binary                              Flags in GLOB output, 5-3
     file comparison, 4-2
     files, 5-1                                    -G-
     mode, 6-4
     transfer modes, 8-3               GLOB
                                         example, 5-4
               -C-                       program, 5-1
                                       Global symbols, 5-1
   Changing directory paths, 11-2
   CI network information, 12-2                    -H-
   Commands
     to NFT, 6-1                       High-segment files, 4-3
     to OPSER, 7-1
     to RUNOFF, 10-1                               -L-
     to SETSRC, 11-2
     to SYSDPY, 12-2                   Listing global symbols, 5-1
   Comparing files, 4-1                Local file transfer, 8-1
   Compressed core image files, 4-3    Logged-in quota, 2-2
   Creating directories, 2-1           Logged-out quota, 2-2
   CREDIR
     examples, 2-3
     switches, 2-1                                 -M-
   Cross-referenced listings, 3-1
                                       MACRO label, 4-4
               -D-
    
   Data Access Protocol (DAP), 6-1                 -N-
   DECnet, 6-1, 12-2
   Defaults for GLOB, 5-2              Network File Transfer, 6-1


                                  Index-1
                                        


               -O-                                 -S-
    
   OPSER program, 7-1                  Search lists, 2-1, 11-1
   Output                              Spooled output, 3-1
     from FILCOM, 4-5                  Status-setting commands, 1-4
     from GLOB, 5-3                    Sub-file directories (SFDs), 2-1
                                       SWITCH.INI file, 2-2
               -P-                     Symbol tables, 5-1
                                       SYSDPY versions, 12-1
   Passive search list, 11-1           System status, 12-1
   Pseudo-terminals (PTYs), 7-1
                                                   -T-
               -Q-
                                       Tape positioning, 1-7
   QUOLST program, 9-1                 Text formatting, 10-1
    
               -R-                                 -U-
    
   Relocatable symbols, 5-3            User id, 6-5
   Restoring files, 1-1                User-file directories (UFDs), 2-1,
   Running subjobs, 7-1                    11-1

































                                  Index-2