TOPS-20 TOPS-20 System Manager's Guide System Manager's Guide | Electronic Distribution June 1990 | June 1990 This document is intended for the person who is responsible for making final decisions for setting up and maintaining the efficient operation of a TOPS-20 installation. Change bars in margins indicate material that has been added or changed since the previous printing of this manual. OPERATING SYSTEM: OPERATING SYSTEM: TOPS-20 (KL Model B) Version 7.0 digital equipment corporation maynard, massachusetts First Printing, September 1985 Revised, June 1988 | Revised, June 1990 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may only be used or copied in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital Equipment Corporation or its affiliated companies. | Copyright C 1985, 1988, 1990 Digital Equipment Corporation All Rights Reserved. Printed in U.S.A. The following are trademarks of Digital Equipment Corporation: CI DECtape LA50 SITGO-10 DDCMP DECUS LN01 TOPS-10 DEC DECwriter LN03 TOPS-20 DECmail DELNI MASSBUS TOPS-20AN DECnet DELUA PDP UNIBUS DECnet-VAX HSC PDP-11/24 UETP DECserver HSC-50 PrintServer VAX DECserver 100 KA10 PrintServer 40 VAX/VMS DECserver 200 KI Q-bus VT50 DECsystem-10 KL10 ReGIS DECSYSTEM-20 KS10 RSX d i g i t a l CONTENTS PREFACE CHAPTER 1 DOCUMENTATION 1.1 DOCUMENTS AVAILABLE FROM DIGITAL . . . . . . . . . 1-1 1.2 DOCUMENTS PREPARED AT YOUR INSTALLATION . . . . . 1-2 1.2.1 System Log . . . . . . . . . . . . . . . . . . . 1-3 1.2.2 Mountable Structure Sign-Up Log . . . . . . . . 1-6 1.2.3 System Access Request Form . . . . . . . . . . . 1-6 1.2.4 Operator Work Request Form . . . . . . . . . . . 1-9 1.2.5 Operator Shift Change Log . . . . . . . . . . . 1-9 CHAPTER 2 PREPARING FOR SOFTWARE INSTALLATION 2.1 SECURING THE COMPUTER ROOM . . . . . . . . . . . . 2-1 2.2 HANDLING USER REQUESTS . . . . . . . . . . . . . . 2-1 2.3 ORDERING SUPPLIES . . . . . . . . . . . . . . . . 2-2 2.4 SCHEDULING OPERATOR TASKS . . . . . . . . . . . . 2-2 2.5 SELECTING SYSTEM FEATURES . . . . . . . . . . . . 2-4 CHAPTER 3 AFTER SOFTWARE INSTALLATION 3.1 OVERVIEW . . . . . . . . . . . . . . . . . . . . . 3-1 3.2 SPECIAL SYSTEM DIRECTORIES . . . . . . . . . . . . 3-1 3.2.1 . . . . . . . . . . . . . . . . 3-2 3.2.2 . . . . . . . . . . . . . . . . . . . . 3-3 3.2.3 Restoring the Directory . . . . . . . . 3-6 3.2.4 . . . . . . . . . . . . . . . . . . . . 3-7 3.2.5 Restoring the Directory . . . . . . . 3-16 3.2.6 and . . . . . . . . 3-17 3.2.7 , , , and . . . . . . . . . . . . . . . . 3-18 3.2.8 Other Useful Directories . . . . . . . . . . . 3-18 3.3 SYSTEM-LOGICAL NAMES . . . . . . . . . . . . . . 3-20 3.3.1 SYSTEM: . . . . . . . . . . . . . . . . . . . 3-21 3.3.2 SYS: . . . . . . . . . . . . . . . . . . . . . 3-21 3.3.3 NEW: . . . . . . . . . . . . . . . . . . . . . 3-21 3.3.4 OLD: . . . . . . . . . . . . . . . . . . . . . 3-22 3.3.5 HLP: . . . . . . . . . . . . . . . . . . . . . 3-22 3.3.6 SERR: . . . . . . . . . . . . . . . . . . . . 3-22 3.3.7 DMP: . . . . . . . . . . . . . . . . . . . . . 3-23 3.3.8 DEFAULT-EXEC: . . . . . . . . . . . . . . . . 3-23 3.3.9 POBOX: . . . . . . . . . . . . . . . . . . . . 3-24 3.3.10 NRT: . . . . . . . . . . . . . . . . . . . . . 3-24 3.3.11 SPOOL: . . . . . . . . . . . . . . . . . . . . 3-25 iii 3.4 CONSOLE FRONT-END FILES . . . . . . . . . . . . 3-25 3.5 TAILORING THE BATCH SYSTEM . . . . . . . . . . . 3-29 3.6 CHECKING THE SOFTWARE (UETP) . . . . . . . . . . 3-29 3.7 REMOTE PRINTERS . . . . . . . . . . . . . . . . 3-30 3.7.1 Remote Printing Requirements . . . . . . . . . 3-31 3.7.2 Defining DQS and LAT Printers . . . . . . . . 3-32 3.7.3 Setting DQS Printing Characteristics . . . . . 3-33 3.8 TERMINAL PRINTERS . . . . . . . . . . . . . . . 3-34 CHAPTER 4 CREATING STRUCTURES 4.1 OVERVIEW . . . . . . . . . . . . . . . . . . . . . 4-1 4.2 THE SYSTEM STRUCTURE . . . . . . . . . . . . . . . 4-2 4.2.1 What Is the System Structure? . . . . . . . . . 4-2 4.2.2 The Contents of the System Structure . . . . . . 4-3 4.3 ONE-STRUCTURE SYSTEMS . . . . . . . . . . . . . . 4-4 4.4 MOUNTABLE STRUCTURES . . . . . . . . . . . . . . . 4-5 4.4.1 Differences Between Mountable and System Structures . . . . . . . . . . . . . . . . . . . 4-5 4.4.2 Similarities Between Mountable and System Structures . . . . . . . . . . . . . . . . . . 4-5 4.5 MULTIPLE-STRUCTURE SYSTEMS . . . . . . . . . . . . 4-7 4.5.1 Choosing Structure Names . . . . . . . . . . . . 4-9 4.5.2 Mounting Structures Having the Same Name . . . 4-11 4.5.3 Maximum Size of Structures . . . . . . . . . . 4-11 4.5.4 Increasing the Size of Structures . . . . . . 4-13 4.5.5 Setting Up Structures for Maximum Availability 4-14 4.5.6 Taking Structures Off-Line . . . . . . . . . . 4-15 4.5.7 Mounting Structures from Another Installation 4-16 4.6 SHARING STRUCTURES (DISK DRIVES) BETWEEN TWO SYSTEMS . . . . . . . . . . . . . . . . . . . . 4-17 4.7 DETERMINING SWAPPING SPACE ON THE SYSTEM STRUCTURE . . . . . . . . . . . . . . . . . . . 4-19 4.7.1 What Is Swapping? . . . . . . . . . . . . . . 4-19 4.7.2 When to Increase Swapping Space . . . . . . . 4-19 4.8 DETERMINING THE AVAILABLE DISK SPACE . . . . . . 4-21 4.8.1 Determining Disk Space Before Installation . . 4-21 4.8.2 Determining Disk Space After Installation . . 4-23 CHAPTER 5 CREATING DIRECTORIES 5.1 HAVING THE OPERATOR CREATE AND MAINTAIN ALL DIRECTORIES (CENTRAL CONTROL) . . . . . . . . . . 5-2 5.2 DELEGATING THE CREATION AND MAINTENANCE OF DIRECTORIES TO PROJECT ADMINISTRATORS (PROJECT CONTROL) . . . . . . . . . . . . . . . . . . . . . 5-2 5.3 COMBINING CENTRAL AND PROJECT CONTROL . . . . . . 5-3 5.4 CENTRAL AND PROJECT CONTROL DESCRIPTIONS . . . . . 5-3 5.4.1 Central Control . . . . . . . . . . . . . . . . 5-4 5.4.2 Central Control Using Subdirectories . . . . . . 5-7 iv 5.4.3 Project Control . . . . . . . . . . . . . . . 5-14 5.4.4 Combined Central and Project Control . . . . . 5-22 5.5 ALLOCATING DISK STORAGE QUOTAS . . . . . . . . . 5-23 5.6 ENFORCING DISK STORAGE QUOTAS . . . . . . . . . 5-24 5.7 PROTECTING DIRECTORIES AND FILES . . . . . . . . 5-26 5.7.1 Directory and File Protection Digits . . . . . 5-26 5.7.2 Changing Directory and File Protection . . . . 5-29 5.8 ESTABLISHING GROUPS . . . . . . . . . . . . . . 5-29 5.9 GIVING USERS SPECIAL CAPABILITIES . . . . . . . 5-38 5.10 PRINTING DIRECTORY INFORMATION . . . . . . . . . 5-40 CHAPTER 6 CREATING ACCOUNTS 6.1 SETTING UP THE SYSTEM TO USE ACCOUNTS . . . . . . 6-2 6.1.1 Enabling or Disabling Account Validation . . . . 6-2 6.1.2 Setting up Account Validation with Existing Files . . . . . . . . . . . . . . . . . . . . . 6-2 6.1.3 Setting up the System for Accounting Shift Changes . . . . . . . . . . . . . . . . . . . . 6-3 6.2 SELECTING AN ACCOUNTING SCHEME . . . . . . . . . . 6-3 6.3 CREATING AN ACCOUNT DATA BASE . . . . . . . . . . 6-7 6.3.1 Entering Accounting Data into Files . . . . . . 6-8 6.3.2 Sample Data Files . . . . . . . . . . . . . . 6-14 6.3.3 Running the ACTGEN Program . . . . . . . . . . 6-17 6.3.4 Data Base Failures/Recovery . . . . . . . . . 6-19 6.4 VALIDATING ACCOUNTS . . . . . . . . . . . . . . 6-19 CHAPTER 7 SYSTEM BACKUP PROCEDURES 7.1 SAVING ALL FILES IN ALL DIRECTORIES . . . . . . . 7-2 7.1.1 Full Dumps . . . . . . . . . . . . . . . . . . . 7-3 7.1.2 Incremental Dumps . . . . . . . . . . . . . . . 7-3 7.1.3 Security of Backup Tapes . . . . . . . . . . . . 7-4 7.2 A COMMON BACKUP POLICY . . . . . . . . . . . . . . 7-4 7.3 MAGNETIC TAPE REQUIREMENTS . . . . . . . . . . . . 7-4 7.4 MAKING A SYSTEM CRASH TAPE . . . . . . . . . . . . 7-6 7.5 MAKING A CRASH TAPE USING BATCH . . . . . . . . . 7-8 7.6 SAVING THE CONSOLE FRONT-END FILE SYSTEM . . . . 7-10 CHAPTER 8 TAPE STORAGE 8.1 FILE ARCHIVING . . . . . . . . . . . . . . . . . . 8-2 8.1.1 Setting Up the System to Use File Archiving . . 8-3 8.1.2 What Happens When Users Archive Files . . . . . 8-3 8.1.3 What Happens When Users Retrieve Files . . . . . 8-5 8.1.4 When to Create Archive Tapes . . . . . . . . . . 8-5 8.1.5 Processing Retrieval Requests . . . . . . . . . 8-7 8.2 FILE MIGRATION . . . . . . . . . . . . . . . . . . 8-7 8.2.1 Setting Up the System to Use File Migration . . 8-8 v 8.2.2 Using the REAPER Program . . . . . . . . . . . . 8-8 8.2.3 Using the DUMPER Program . . . . . . . . . . . 8-10 8.2.4 Processing Retrieval Requests for Migrated Files . . . . . . . . . . . . . . . . . . . . 8-11 8.2.5 Recycling Migration (and Archive) Tapes . . . 8-11 8.3 TAPE DRIVE ALLOCATION . . . . . . . . . . . . . 8-12 8.3.1 When to Use Tape Drive Allocation . . . . . . 8-12 8.3.2 How to Enable/Disable Tape Drive Allocation . 8-13 8.3.3 Tape Mounting Policy . . . . . . . . . . . . . 8-13 8.4 TAPE LABELING . . . . . . . . . . . . . . . . . 8-13 8.4.1 Why Tape Labels? . . . . . . . . . . . . . . . 8-14 8.4.2 Setting Up the System to Use Tape Labels . . . 8-16 8.4.3 Initializing Tapes and Drives to Use Labels . 8-17 8.5 SHARING TAPE DRIVES BETWEEN TWO SYSTEMS . . . . 8-18 CHAPTER 9 SYSTEM PROBLEMS/CRASHES 9.1 RESTORING A SINGLE FILE . . . . . . . . . . . . . 9-2 9.2 RESTORING A SINGLE DIRECTORY . . . . . . . . . . . 9-2 9.3 RESTORING . . . . . . . . . . . . 9-3 9.3.1 Rebuilding the System Structure 9-5 9.4 RESTORING THE ENTIRE FILE SYSTEM . . . . . . . . . 9-9 9.4.1 Re-creating the File System on the System Structure . . . . . . . . . . . . . . . . . . . 9-9 9.4.2 Re-creating Mountable Structures . . . . . . 9-10 9.5 POWER FAILURES . . . . . . . . . . . . . . . . . 9-11 9.6 REMOTE DIAGNOSTIC LINK (KLINIK) . . . . . . . . 9-11 9.7 MAKING THE CI UNAVAILABLE ON NON-CFS SYSTEMS . . 9-12 9.8 MAKING THE NI UNAVAILABLE . . . . . . . . . . . 9-12 9.9 OFFLINE DISKS . . . . . . . . . . . . . . . . . 9-12 9.9.1 Operator Procedures . . . . . . . . . . . . . 9-13 9.10 DUMPING ON NON-FATAL SYSTEM ERRORS . . . . . . . 9-14 9.10.1 Enabling DUMP-ON-BUGCHK . . . . . . . . . . . 9-14 9.10.2 Disabling DUMP-ON-BUGCHK . . . . . . . . . . . 9-14 9.10.3 "Dumpable Structures" . . . . . . . . . . . . 9-15 9.10.4 Copying the Dump File . . . . . . . . . . . . 9-15 9.10.5 Time Considerations . . . . . . . . . . . . . 9-16 9.10.6 Controlling DUMP-ON-BUGCHK . . . . . . . . . . 9-17 CHAPTER 10 SYSTEM PERFORMANCE 10.1 THE CLASS SCHEDULER . . . . . . . . . . . . . . 10-2 10.1.1 Overview . . . . . . . . . . . . . . . . . . . 10-2 10.1.2 Who Should Use the Class Scheduler? . . . . . 10-4 10.1.3 How to Begin Using the Class Scheduler . . . . 10-6 10.1.4 Procedures to Turn On the Class Scheduler . . 10-8 10.1.5 Changing Class Percentages During Timesharing 10-10 10.1.6 Disabling the Class Scheduler During Timesharing . . . . . . . . . . . . . . . . . 10-11 vi 10.1.7 Getting Information About Class Scheduler Status . . . . . . . . . . . . . . . . . . . . 10-11 10.1.8 A Sample Session . . . . . . . . . . . . . . . 10-13 10.1.9 An Alternative to Using Accounts . . . . . . . 10-14 10.2 SCHEDULING LOW PRIORITY TO BATCH JOBS . . . . . 10-15 10.3 FAVORING INTERACTIVE VERSUS COMPUTE-BOUND PROGRAMS . . . . . . . . . . . . . . . . . . . . 10-15 10.4 IMPROVING PROGRAM STARTUP TIME . . . . . . . . . 10-17 10.5 REINITIALIZING DISK PACKS . . . . . . . . . . . 10-18 10.6 DYNAMIC DUAL PORTING . . . . . . . . . . . . . . 10-19 CHAPTER 11 ACCESS CONTROLS 11.1 ACCESS CONTROL PROGRAM . . . . . . . . . . . . . 11-1 11.1.1 Starting the ACJ . . . . . . . . . . . . . . . 11-2 11.1.2 Defining the ACJ Environment . . . . . . . . . 11-3 11.1.3 ENABLE and DISABLE Commands . . . . . . . . . 11-3 11.1.3.1 ENABLE/DISABLE Command Functions . . . . . . 11-5 11.1.3.2 ENABLE/DISABLE Function Qualifiers . . . . . 11-14 11.1.4 USER Command . . . . . . . . . . . . . . . . . 11-15 11.1.5 SET Command . . . . . . . . . . . . . . . . . 11-17 11.1.6 SHOW Command . . . . . . . . . . . . . . . . . 11-18 11.1.7 WRITE Command . . . . . . . . . . . . . . . . 11-19 11.1.8 SAVE Command . . . . . . . . . . . . . . . . . 11-19 11.1.9 Summary . . . . . . . . . . . . . . . . . . . 11-20 11.1.10 Reviewing the Log Files . . . . . . . . . . . 11-21 11.1.10.1 Log File Format . . . . . . . . . . . . . . 11-21 11.1.10.2 Log File Examples . . . . . . . . . . . . . 11-22 11.2 PASSWORD ENCRYPTION . . . . . . . . . . . . . . 11-23 11.2.1 Moving Structures Among Systems . . . . . . . 11-25 11.2.2 Adding Encryption Algorithms to the System . . 11-25 11.2.3 Using DUMPER . . . . . . . . . . . . . . . . . 11-26 11.3 PASSWORD MANAGEMENT . . . . . . . . . . . . . . 11-28 11.3.1 Setting Password Length . . . . . . . . . . . 11-28 11.3.2 Changing Passwords Regularly . . . . . . . . . 11-28 11.3.3 Disallowing Certain Passwords . . . . . . . . 11-29 11.4 LAST LOGIN INFORMATION . . . . . . . . . . . . . 11-30 11.5 PREVENTING FAST LOGINS . . . . . . . . . . . . . 11-31 11.6 PREVENTING NOT-LOGGED-IN SYSTAT . . . . . . . . 11-31 11.7 SECURING FILES . . . . . . . . . . . . . . . . . 11-32 11.7.1 Secure Files and the ACJ . . . . . . . . . . . 11-33 11.7.2 Securing Important Files . . . . . . . . . . . 11-33 11.8 SECURITY HINTS . . . . . . . . . . . . . . . . . 11-34 CHAPTER 12 THE COMMON FILE SYSTEM 12.1 OVERVIEW . . . . . . . . . . . . . . . . . . . . 12-1 12.1.1 CFS HARDWARE . . . . . . . . . . . . . . . . . 12-2 12.1.2 CFS SOFTWARE . . . . . . . . . . . . . . . . . 12-6 12.1.3 CFS USERS . . . . . . . . . . . . . . . . . . 12-7 vii 12.1.4 CFS and DECnet . . . . . . . . . . . . . . . . 12-7 12.1.5 CFS and TIGHTLY-COUPLED SYSTEMS . . . . . . . 12-8 12.1.6 Limitations . . . . . . . . . . . . . . . . . 12-8 12.1.7 "Cluster Data Gathering" . . . . . . . . . . . 12-9 12.1.8 Cluster GALAXY . . . . . . . . . . . . . . . . 12-9 12.2 PLACEMENT OF FILES . . . . . . . . . . . . . . . 12-10 12.2.1 Update Files . . . . . . . . . . . . . . . . . 12-11 12.2.2 Files on Served Disks . . . . . . . . . . . . 12-11 12.2.3 Mail Files . . . . . . . . . . . . . . . . . . 12-11 12.2.4 Sharing System Files . . . . . . . . . . . . . 12-12 12.3 LOAD BALANCING . . . . . . . . . . . . . . . . . 12-13 12.3.1 Dedicating Systems . . . . . . . . . . . . . . 12-13 12.3.2 Assigning Users to Systems . . . . . . . . . . 12-14 12.4 STRUCTURE NAMES . . . . . . . . . . . . . . . . 12-15 12.5 SYSTEM LOGICAL NAMES . . . . . . . . . . . . . . 12-15 12.6 SHARING STRUCTURES AMONG SYSTEMS . . . . . . . . 12-15 12.6.1 Sharing System Structures . . . . . . . . . . 12-16 12.6.2 Sharing the Login Structure . . . . . . . . . 12-16 12.6.2.1 Creating the Login Structure . . . . . . . . 12-16 12.6.2.2 Enabling "Login Structure" . . . . . . . . . 12-17 12.6.2.3 Disabling "Login Structure" . . . . . . . . 12-17 12.6.2.4 PS: and BS: Directories . . . . . . . . . . 12-17 12.7 RESTRICTING STRUCTURES TO ONE SYSTEM . . . . . . 12-18 12.8 DISMOUNTING STRUCTURES . . . . . . . . . . . . . 12-19 12.9 MAKING THE CI UNAVAILABLE TO A SYSTEM . . . . . 12-20 12.10 USING DUMPER . . . . . . . . . . . . . . . . . . 12-20 12.11 ERRORS . . . . . . . . . . . . . . . . . . . . . 12-21 12.11.1 Communication Problems . . . . . . . . . . . . 12-21 12.11.2 Massbus Problems with Dual-Ported Disk Drives 12-24 12.12 SHUTTING DOWN A CFS SYSTEM . . . . . . . . . . . 12-24 CHAPTER 13 LAT TERMINAL SERVERS 13.1 OVERVIEW . . . . . . . . . . . . . . . . . . . . 13-1 13.2 LAT SOFTWARE . . . . . . . . . . . . . . . . . . 13-2 13.3 DECNET . . . . . . . . . . . . . . . . . . . . . 13-4 13.4 CONTROLLING LAT FROM THE HOST . . . . . . . . . 13-4 13.5 STARTING AND STOPPING LAT . . . . . . . . . . . 13-8 13.6 LAT GROUPS . . . . . . . . . . . . . . . . . . . 13-9 13.7 HOST SERVICES . . . . . . . . . . . . . . . . . 13-10 13.7.1 Service Ratings . . . . . . . . . . . . . . . 13-10 13.8 MONITORING LAT FROM THE HOST . . . . . . . . . . 13-11 13.8.1 Displaying User Information . . . . . . . . . 13-11 13.8.2 Displaying Host Parameters . . . . . . . . . . 13-12 13.8.3 Displaying Server Information . . . . . . . . 13-12 13.8.4 Displaying LAT Counters . . . . . . . . . . . 13-13 13.8.5 Displaying Pending Requests for LAT Application Terminals . . . . . . . . . . . . 13-14 13.8.6 Displaying All Print Requests for LAT Application Terminals . . . . . . . . . . . . 13-15 viii INDEX FIGURES 1-1 Sample System Log (Hardware Maintenance) . . . . . 1-4 1-2 Sample System Log (Problem Report) . . . . . . . . 1-5 1-3 Sample Mountable Structure Sign-Up Log . . . . . . 1-7 1-4 System Access Request . . . . . . . . . . . . . . 1-8 1-5 Operator Work Request . . . . . . . . . . . . . 1-10 1-6 Operator Shift Change Log . . . . . . . . . . . 1-11 4-1 System with 3 Disk Drives and 2 Structures . . . . 4-7 4-2 Three-Structure System . . . . . . . . . . . . . . 4-8 4-3 Domestic and Foreign Structures . . . . . . . . 4-16 4-4 Shared Disk Drive . . . . . . . . . . . . . . . 4-18 5-1 File-Sharing Group . . . . . . . . . . . . . . . 5-33 5-2 Library Group . . . . . . . . . . . . . . . . . 5-35 5-3 Teacher-Student Group . . . . . . . . . . . . . 5-37 6-1 Accounting Scheme 1 . . . . . . . . . . . . . . . 6-6 6-2 Accounting Scheme 2 . . . . . . . . . . . . . . . 6-7 6-3 Correct-Data Accounting Files . . . . . . . . . 6-15 6-4 Unionbank Accounting Files . . . . . . . . . . . 6-16 8-1 Organization of Labeled Tapes . . . . . . . . . 8-15 8-2 TX02 Tape Subsystem . . . . . . . . . . . . . . 8-18 12-1 Two Systems with Massbus Disks and HSC50-based Disks . . . . . . . . . . . . . . . . . . . . . 12-2 12-2 Two Systems with Massbus Disks . . . . . . . . . 12-3 13-1 A LAT Network . . . . . . . . . . . . . . . . . 13-1 TABLES 3-1 Files . . . . . . . . . . . . . . . . . . 3-3 3-2 STR: Files . . . . . . . . . . . . . . . . 3-7 3-3 Console Front-End Files . . . . . . . . . . . . 3-26 4-1 Differences Between Mountable and System Structures . . . . . . . . . . . . . . . . . . . . 4-6 4-2 Similarities Between Mountable and System Structures . . . . . . . . . . . . . . . . . . . . 4-6 4-3 Sample Device Names . . . . . . . . . . . . . . 4-10 4-4 Maximum Size Structures . . . . . . . . . . . . 4-13 4-5 Determining Swapping Space . . . . . . . . . . . 4-20 4-6 Calculating Available Disk Space . . . . . . . . 4-22 5-1 Directory Protection Digits . . . . . . . . . . 5-27 5-2 File Protection Digits . . . . . . . . . . . . . 5-28 5-3 Special Capabilities . . . . . . . . . . . . . . 5-38 6-1 Summary of Account Data File Commands . . . . . . 6-9 8-1 Tape Drive Allocation . . . . . . . . . . . . . 8-12 9-1 BUGHLTS . . . . . . . . . . . . . 9-3 11-1 DUMPER Directory Restorations . . . . . . . . . 11-27 12-1 Comparison of CFS and DECnet . . . . . . . . . . 12-8 . x PREFACE PREFACE _______ ______ _________ _____ The TOPS-20 System Manager's Guide is written for the person who is responsible for establishing policies and procedures for a timesharing and/or batch processing installation using the TOPS-20 Operating System. Usually, this person is responsible for setting up and ____ maintaining both the system hardware and software. The Site __________ _____ _______________ __________ ________ ______ ___ Management Guide, the TOPS-10/TOPS-20 Operator's Hardware Device and ___________ _____ _______ __________ _____ Maintenance Guide, and the TOPS-20 Operator's Guide provide you and your operations people with the necessary information to maintain your system hardware. These three manuals are referenced throughout this guide. This guide deals primarily with your system software. It contains general suggestions for planning the installation of your software and for setting up your computer room to begin operations. The guide contains hints and suggestions for your system's operation, including when, and many times why, particular functions or procedures should be considered. It assumes that your system operator is responsible for implementing many of the decisions you make. In most cases, where lengthy implementation procedures are required, the appropriate reference is noted. Chapters 1 and 2 describe the documentation, system logs, and special forms that you should have available to you, and in some cases, to system users. Chapter 2 also includes preliminary planning functions that you can do before the software is installed. xi Chapter 3 describes the system directories and files that your system contains immediately after you install the software. It also describes the mechanisms you can use to change the installed TOPS-20 batch system and to test the integrity of your newly installed or updated system. In addition, it describes requirements for remote printing and for printing on devices attached to terminals. Chapter 4 describes using your disk-pack and disk-drive resources to set up disk structures in a way that best suits your installation's needs. It also includes guidelines for determining the available disk space that you have to create user directories. Chapter 5 describes creating and maintaining directories. It includes a detailed description of the three methods of administration you can choose from to control the creation and maintenance of directories. It describes how to use directory and file protection codes to expand or limit the type of access users can have to directories and files, and how to place users and directories in groups so that users can share files. Chapter 6 describes the TOPS-20 accounting facility. This description includes how to choose an accounting scheme, how to create accounting files, and how to set the system to begin validating accounts. Chapter 7 describes backing up your disk structures onto magnetic tape soon after software installation. It recommends the supplies needed and procedures that you should follow to save all your directories and files on a daily basis, and how to create a system crash tape in the event of a major problem with the file system. Chapter 8 describes how you can use magnetic tapes to store important files (file archiving) and to save valuable disk space by copying infrequently accessed files to tape (file migration). It also describes how to give control of tape drive usage to the system and the operator (tape drive allocation), and how to set up your system to use labeled tapes (tape labeling). xii Chapter 9 describes the procedures you must follow in the event that you have a problem with the file system or that a user has lost the files in a directory. It also describes using your system crash tape and your daily backup tapes to resolve these problems. In addition, it describes how to prevent "offline" disks from hanging user jobs, and discusses dumping memory for nonfatal system errors. Chapter 10 describes the tuning mechanisms that allow you to change the behavior of your system. Each description includes why you may want to use a particular mechanism, how to use it, and the effects it may have on your system. Chapter 11 describes the access control mechanisms that you can use to alter system policy decisions or to increase security against unauthorized system use. This chapter includes the type of policy changes you may want to make at your installation. Chapter 12 describes the Common File System, a software feature of TOPS-20. This chapter discusses the rules, options, and restrictions associated with sharing files among systems. Chapter 13 describes the Local Area Transport (LAT) software, for use with terminal servers in Ethernet local area networks. xiii The following conventions and symbols are used throughout this guide: Convention/Symbol Description Convention/Symbol Description n- n refers to the latest version of a particular file, for example, 7-CONFIG.CMD. UPPERCASE In user input representations, indicates information that must be entered exactly as shown. lowercase In user input representations, indicates variable information that is determined by you. underlining Indicates the information that you must type at your terminal. () In user input representations, encloses guide word information. Pressing the ESCAPE or ALTMODE key on your terminal causes guidewords to be printed by the computer. Indicates you should press the RET or RETURN key on your terminal. Unless otherwise noted, pressing RETURN terminates all command or input strings. Indicates you should press the ESC key on your terminal. CTRL/key Indicates you should press the CTRL key on your terminal. The CTRL key is always used in conjunction with another key, for example, CTRL/Z. xiv CHAPTER 1 CHAPTER 1 DOCUMENTATION DOCUMENTATION Section 1.1 describes the documentation provided by DIGITAL and recommends the manuals with which you should be familiar to manage your system. Section 1.2 describes adding your own documentation, for example, special forms, to the documentation you receive from DIGITAL. Be sure you have all available documentation convenient to your system users. 1.1 DOCUMENTS AVAILABLE FROM DIGITAL 1.1 DOCUMENTS AVAILABLE FROM DIGITAL All documentation for the TOPS-20 Operating System is contained in the _______ ________ ________ ____ TOPS-20 Software Notebook Set. This notebook set contains information pertaining to the most recent version of TOPS-20. It is organized functionally to facilitate referencing manuals. Each manual contains cross references to other manuals within the set that further explain a subject. This manual assumes that you are familiar with some of the manuals in the notebook set. In particular, you should be familiar with the _______ __________ _____ _______ ______ _____ information in the TOPS-20 Operator's Guide, the TOPS-20 User's Guide, ____________ _________ _______ _______________ __________ the DECSYSTEM-20 Technical Summary, the TOPS-10/TOPS-20 Operator's ________ ______ ___ ___________ _____ _______ ____ _____ _ Hardware Device and Maintenance Guide, and the TOPS-20 KL10 Model B ____________ _____ Installation Guide. Any additional documents that you need depend on the configuration of your system. For example, if your system has IBM emulation and ___ termination (DNxx), you should be familiar with the IBM _____________________ ______ Emulation-Termination Manual. It includes installation procedures and descriptions of the operator and user interfaces. If your system has DECnet, you should be familiar with the various DECnet-20 manuals. If you are using LAT terminal servers in an Ethernet local area network, refer to the documentation that is provided with LAT terminal servers, in addition to chapter 13 of this manual. _______ ________ ________ ___ In addition to the TOPS-20 Software Notebook Set, you receive the TOPS-20 Beware File Listing. It is distributed with the software 1-1 DOCUMENTATION DOCUMENTATION installation and distribution magnetic tapes. Before installing a new version of the software on your system, read the Beware File. It contains last-minute changes to the software that have not been documented, and hints or suggestions for installing or using the new software. With each new system, you should also receive two stand-alone documents, which are documents not included in the notebook set. These manuals assist you in 1) preparing your site for the hardware ____ ___________ ______ installation, the Site Preparation Guide, and 2) maintaining and ____ reporting problems about your system's software and hardware, the Site __________ ______ Management Guide. NOTE ____ Your Sales Representative delivers the Site ___________ ______ Preparation Guide, and your Field Service ____ __________ ______ Representative delivers the Site Management Guide. _______ ______ _________ _____ This manual (the TOPS-20 System Manager's Guide) deals primarily with installing and maintaining the software on your system. Therefore, it ____ ___________ _____ is assumed that you have already used the Site Preparation Guide to install your system hardware. ____ __________ _____ The Site Management Guide is designed for use by both you (along with your operations people) and your Field Service Representative. You should begin using this manual immediately after you install your hardware. It contains schedules, procedures, and logs for recording and evaluating all information pertinent to the operation and care of the system. The manual belongs to DIGITAL, but it is kept and maintained at your computer site. For added convenience and organization, many system managers keep all their important system ____ __________ ______ information in the same binder as the Site Management Guide. For example, they keep system logs and operator shift change information in the same binder, along with other special forms. Section 1.2 describes several forms that you may include in a system log book or, ____ __________ ______ as suggested here, in the Site Management Guide. DIGITAL places a major emphasis on the documentation provided to its customers. The Software Publications Department continues to solicit suggestions for improvement and corrections from the users of its documentation. Encourage users to comment on the manuals you receive with your system. For convenience, a Reader Comment Form is located at the back of each manual. 1.2 DOCUMENTS PREPARED AT YOUR INSTALLATION 1.2 DOCUMENTS PREPARED AT YOUR INSTALLATION Sections 1.2.1 through 1.2.5 describe some forms that may be useful at your installation. A sample form is provided in each section. 1-2 DOCUMENTATION DOCUMENTATION 1.2.1 System Log 1.2.1 System Log Every system must have a system log for recording problems and procedures relating to both hardware and software. All operators and system programmers should record the following types of activities in the log, along with the date, time, and their names: o System backup procedures o Beginning and ending of timesharing (for example, the times the system was started and stopped for preventive maintenance or repair) o Problems in hardware or software AND the actions taken to correct the problems (always save the CTY (operator terminal) output or copy of the typescript) o New or revised software installed o New users or changes to existing user data or directories o New structures or changes to existing structures Most system problems are easier to solve (and, hence, less costly) if ____ __________ you keep an accurate record of all activities. The Site Management _____ Guide has a section set aside for system log information. This section contains preprinted forms that you can use to record system log information, or you can design your own forms. You can store ____ __________ _____ these forms in the Site Management Guide or in a separate binder. You should design your log so that it is easy to use and read. Remember, you are likely to have the most problems when the system is new, so NOW is the time to start using the log. The following two pages contain sample left- and right-hand pages of a log book. The left-hand page (Figure 1-1) contains information concerning hardware maintenance; the right-hand page (Figure 1-2) is a problem report, containing: o The time of the entry o A "Y" or "N" answer to whether the system had to be reloaded o The name of the person making the entry o A few words describing the nature of the activity o A record of calls to Digital Field Service (F/S) o A description of the device or program causing the problem o Remarks about the entry 1-3 DOCUMENTATION DOCUMENTATION ____________________________________________________________________ | | | SYSTEM LOG | | MAINTENANCE PERFORMED DATE__________ | | | | | | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| | | |____________________________________________________________________| Figure 1-1: Sample System Log (Hardware Maintenance) Figure 1-1: Sample System Log (Hardware Maintenance) 1-4 DOCUMENTATION DOCUMENTATION ____________________________________________________________________ | | | PAGE__________ | |____________________________________________________________________| | | | SYSTEM LOG DATE__________ | |____________________________________________________________________| | | | | | | | | | | R | | | | | | | | E | | | F/S | | | | | L | | MONITOR OR | A | | | | | O | | HARDWARE | T | DEVICE | | | TIME | A | NAME | MAINTENANCE | T | OR | ENTRY | | | D | | ACTIVITY | N | PROGRAM | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| | | | | | | | | |______|___|______|_____________|_____|_________|____________________| Figure 1-2: Sample System Log (Problem Report) Figure 1-2: Sample System Log (Problem Report) 1-5 DOCUMENTATION DOCUMENTATION 1.2.2 Mountable Structure Sign-Up Log 1.2.2 Mountable Structure Sign-Up Log In addition to keeping the system log, you should also record requests from users to mount structures. (Chapter 4 describes how to set up and use structures.) Without a formal scheduling procedure, some users may monopolize the use of a structure and frustrate other users, who do not have the opportunity to mount and use their structures, usually because there are no disk drives available. To avoid this situation, set up a procedure whereby users inform the operator when they need to use a structure. The operator can then schedule the length of time specified on the request log. On a busy day, when many users are issuing mount requests for structures, the operator checks the log before granting or denying the mount requests. This scheduling allows you to service many requests for mounting structures in a fair and orderly manner. The sample mountable structure sign-up log shown in Figure 1-3 contains: o The scheduled mounting time o The scheduled time needed to use the structure o The actual time the structure was mounted o The actual time the structure was removed o The name of the user who initiated the request o The structure name (or pack ID) o A column for any special instructions or notes Remember that this log is only a sample; you should design a form that best suits your own requirements. 1.2.3 System Access Request Form 1.2.3 System Access Request Form Some installations have many users requesting access to the system for the first time. You need standard information from these users before you can process their requests and create directories for them. For example, you must know which system they need to access (if you have more than one system), their names, selected passwords, departments, accounts, etc. You can organize these requests by providing a System Access Request Form that is kept in an easy-to-access area, perhaps outside the computer room. You can require signatures of department managers on the access form to ensure that prospective users have approval to charge computer usage to accounts. Figure 1-4 is a sample of a system access request form. If you are using CFS-20 software, refer to Chapter 12, The Common File System, for further considerations in assigning users to systems. 1-6 DOCUMENTATION DOCUMENTATION ____________________________________________________________________ | | | MOUNTABLE STRUCTURE | | SIGN - LOG PAGE__________ | | | | DATE__________ | |____________________________________________________________________| | | | | | | | SCHEDULED | ACTUAL | | | | |_______________|________________| | | | | | | | | | | | |MOUNTING| TIME |MOUNTING| TIME | USER | PACK | NOTES | | TIME |NEEDED| TIME |REMOVED| NAME | ID(s) | | |________|______|________|_______|______|_______|____________________| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |________|______|________|_______|______|_______|____________________| Figure 1-3: Sample Mountable Structure Sign-Up Log Figure 1-3: Sample Mountable Structure Sign-Up Log 1-7 DOCUMENTATION DOCUMENTATION SYSTEM ACCESS REQUEST SYSTEM NAME:_______________________________ DEPT.:____________________ YOUR NAME:_________________________________ ACCT.:____________________ PROJECT:______________________________________________________________ PERM. ACCESS? ____YES ____NO (FROM:______________TO:______________) SUPERVISOR:___________________________ MGR:___________________________ SIGNATURE SIGNATURE ---------------------------------------------------------------------- DIRECTORY NAME (1-39 CHAR.):__________________________________________ __ PASSWD.:___________________ DIR. PROT.(DEF.777700) |__| OTHER:________ __ __ *DO YOU REQUIRE PRIVILEGES ON THE SYSTEM? |__| N |__| Y (TYPE:______) __ __ DO YOU WANT TO CREATE SUBDIRS.? |__| N |__| Y (HOW MANY?_____ MAX.= 8) __ DO YOU WANT TO BE IN A GROUP WITH OTHER USERS OR DIRECTORIES? |__| N __ |__| Y (NAME OF USER(S) OR DIR.(S):__________ ___________ ___________) BRIEFLY DESCRIBE THE TYPE OF WORK YOU WILL PERFORM. FOR EXAMPLE, CREATING AND EDITING FILES, APPLICATIONS PROGRAMMING, COMPILER PROGRAMMING, ETC._____________________________________________________ ---------------------------------------------------------------------- OPERATIONS USE ONLY DIR. PASSWD. STRUCTURE WORKING QUOTA PERM. QUOTA ________ ___________ _______________ _________________ ___________ USER GROUP DIR. GROUP ACCOUNT _________________________ __________________________ _________________________ __________________________ ___________ SUBDIRECTORIES SCHED. CLASS PRIVILEGES DATE CREATED ____________________ ________________ ________________ ____________ COMMENTS:_____________________________________________________________ *MUST BE APPROVED BY OPERATIONS MANAGEMENT Figure 1-4: System Access Request Figure 1-4: System Access Request 1-8 DOCUMENTATION DOCUMENTATION 1.2.4 Operator Work Request Form 1.2.4 Operator Work Request Form You may want a form that allows users to request work from the operator. Examples of requests made to the operator are initializing tapes, transferring files between systems, and making changes to directories. You should set up a procedure for handling these requests. Figure 1-5 is a sample of an operator work request form. 1.2.5 Operator Shift Change Log 1.2.5 Operator Shift Change Log You may want to set up a binder to contain operator shift change information. Each operator records new procedures, or special instructions that the incoming operator needs to know. The incoming operator reads the operator shift log before starting the new shift. For example, the first shift operator changes the procedure for storing tapes, and records the new procedure in the shift change log. The information in the shift change log should not concern problems with the system, but should contain important information about the system or the computer room. The incoming operator still reads the system log book to determine the status of the system and any problems that have occurred during the previous shift. Figure 1-6 is a sample of an operator shift change log. 1-9 DOCUMENTATION DOCUMENTATION OPERATOR WORK REQUEST _____________________________________________________________________ || NAME:____________________________ || NAME OF SYSTEM:_________________ DIRECTORY NAME:__________________ || PRIORITY: NORMAL_____ RUSH______ DATE SUBMITTED:__________________ || DEPT. NO.:______________________ PHONE EXT.:______________________ || ACCOUNT:________________________ __________________________________||_________________________________ _____________________________________________________________________ _______ | | | | | | | JOB 1 | INPUT _________|OUTPUT ________ DONE |INSTRUCTIONS: |_______| _______________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|______________________|____________________ _________________________|______________________|____________________ _____________________________________________________________________ _______ | | | | | | | JOB 2 | INPUT _________|OUTPUT ________ DONE |INSTRUCTIONS: |_______| _______________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|_______________ ____ |____________________ _________________________|_______________ |____||____________________ _________________________|______________________|____________________ _________________________|______________________|____________________ _____________________________________________________________________ OPERATOR:___________________ || OPERATOR COMMENTS:___________________ ____________________________ ||______________________________________ SYSTEM:_____________________ ||______________________________________ ____________________________ ||______________________________________ DATE COMPLETE:_______________||______________________________________ _____________________________||______________________________________ Figure 1-5: Operator Work Request Figure 1-5: Operator Work Request 1-10 DOCUMENTATION DOCUMENTATION ____________________________________________________________________ | | | OPERATOR SHIFT CHANGE LOG | |____________________________________________________________________| | | | | | | DATE | OPERATOR | SHIFT | COMMENTS | |________|__________|_________|______________________________________| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |________|__________|_________|______________________________________| Figure 1-6: Operator Shift Change Log Figure 1-6: Operator Shift Change Log 1-11 2-1 CHAPTER 2 CHAPTER 2 PREPARING FOR SOFTWARE INSTALLATION PREPARING FOR SOFTWARE INSTALLATION You can establish many of the policies and procedures for your computer site before you install the software. It may help you later if some of the preliminary decisions and preparations are done before you begin setting up the system and handling requests from users. The following suggestions for preparing your installation are not all-inclusive. Some TOPS-20 installations have specific requirements or restrictions that are not considered here. You can use this list as a guideline for the types of decisions you can make in the early stages of setting up your computer site. 2.1 SECURING THE COMPUTER ROOM 2.1 SECURING THE COMPUTER ROOM Select the type of computer room security you need and a method of enforcement. Many system managers do not allow non-operations people to enter the computer room. Establish an open- or closed-door policy, and notify users of your policy. If you decide on a closed-door policy, notify users of the procedures that they should use to contact you (or the operator) and to submit their job requests. 2.2 HANDLING USER REQUESTS 2.2 HANDLING USER REQUESTS Determine how user requests will be handled. You can handle jobs on a first-come basis, or on a priority basis. You can set up request boxes outside the computer room that the operator checks regularly. You can also establish a location where users can leave disks and tapes for the operator to mount. Post a sign-up sheet so that users can specify the time they need the tape or disk mounted. Chapter 1 describes sample forms that can be completed by users to request initial access to the system and to request that work be done by the operator. 2-1 PREPARING FOR SOFTWARE INSTALLATION PREPARING FOR SOFTWARE INSTALLATION 2.3 ORDERING SUPPLIES 2.3 ORDERING SUPPLIES Assign someone the responsibility for ordering paper supplies, ribbons, cards, and magnetic tapes. Chapter 7 provides an estimate of the number of tapes you should have to begin a backup procedure immediately after you install the software. Be sure you have enough CTY (operator terminal) and line printer paper to begin operations. 2.4 SCHEDULING OPERATOR TASKS 2.4 SCHEDULING OPERATOR TASKS The operator performs tasks either on a regular basis or on an as-needed basis. Decide which operator tasks will be performed on a regular schedule. Be sure to include hardware, software, and documentation related tasks. These regularly scheduled tasks can be performed daily, weekly, or monthly. The following lists are samples of hardware- and software-related tasks that your operator may perform. Hardware-Related Tasks Hardware-Related Tasks Regular Schedule As-Needed Schedule Regular Schedule As-Needed Schedule __________________________________________________________________ Clean tops of disk drives. Replenish paper in the line printer. Clean magnetic tape drives. Remove reports from the line printer and distribute (perhaps to mail boxes). Vacuum line printer to remove Replenish paper in operator's paper chad. console. Load mountable structures Physically load and unload according to a schedule. magnetic tape and disk drives. __________________________________________________________________ 2-2 PREPARING FOR SOFTWARE INSTALLATION PREPARING FOR SOFTWARE INSTALLATION Regular Schedule As-Needed Schedule Regular Schedule As-Needed Schedule Software-Related Tasks Software-Related Tasks __________________________________________________________________ Bring up system after weekly Bring up system after a crash. maintenance. Run scheduled batch production Maintain the batch system for jobs. users. Save the contents of disk on Save special disk areas on magnetic tape. magnetic tape. Create a system "crash" tape Restore selected user disk for backup. areas as needed. Run the SPEAR program for daily Interact with users. error analysis. Submit a daily control file for Create and update user accounting. directories. Create the Message-of-the-Day Monitor disk space. with the MAIL program. __________________________________________________________________ Establish a location for keeping the hard-copy output from the CTY. Your Field Service Representative needs this information if you have problems with your system. Have the operator tear off the copy and store it daily. Documentation-related tasks include: o keeping a hand-written log of system activities (System Log) o recording operator shift change information (Operator Shift Change Log) o coordinating the mounting and dismounting of structures (Mountable Structure Sign-up Log) Chapter 1 describes creating a system log, an operator shift change log, and a mountable structure sign-up log. 2-3 PREPARING FOR SOFTWARE INSTALLATION PREPARING FOR SOFTWARE INSTALLATION 2.5 SELECTING SYSTEM FEATURES 2.5 SELECTING SYSTEM FEATURES Determine the system features you want to enable during software installation. When you install the software, you create a file called n-CONFIG.CMD. This file is read by a start-up program (n-SETSPD) when the system is started for the first time and each subsequent time that you reload and start the system. The n-CONFIG.CMD file defines the line speeds for your terminals and many system parameters. Most of the decisions you must make concerning the parameters in this file are described throughout this manual. As you read each chapter, you can list the parameters that you want to place in the n-CONFIG.CMD file. Many system managers choose to introduce new pieces of software slowly. Therefore, you may want to disable some of the parameters until you have run the new software for awhile. You can edit the n-CONFIG.CMD file to add new software features to the system. You should edit the file at a convenient time before you reload the system. Then, when the system restarts, the new software features are enabled. NOTE | The operator can run the n-SETSPD program | interactively during timesharing to override many of _______ | the n-CONFIG.CMD options, as described in the TOPS-20 __________ _____ | Operator's Guide. Chapters 3 through 13 describe setting up and maintaining your system. Read these chapters thoroughly. They contain important information to help you make decisions both before and after you install the software. 2-4 CHAPTER 3 CHAPTER 3 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.1 OVERVIEW 3.1 OVERVIEW After you install the TOPS-20 software, your system contains all the directories and files necessary for you to start preparing for timesharing and batch processing. This chapter describes the directories, files, and system logical names created during software installation. Also included are suggestions for creating additional directories and logical names to assist you and system users. 3.2 SPECIAL SYSTEM DIRECTORIES 3.2 SPECIAL SYSTEM DIRECTORIES You initialize the file system during software installation. At this time, the system automatically creates nine directories on the disk that you defined as the system structure. These directories are: Sections 3.2.1 through 3.2.7 describe these directories and their use. Section 3.2.8 describes additional directories you can create and how they are useful. Chapter 5 also describes creating directories and discusses the structure of directories. 3-1 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.2.1 3.2.1 The contains a separate file for each first-level directory on the system structure as follows: STR: -------------------------------------------------- | | | | | | STR: ... STR: ... STR: (where STR: is the name of the structure). The is the most important directory created. Without _____ it, directories and files cannot be accessed. You must NEVER modify this directory. The system maintains a backup copy of that can be accessed if the original copy is destroyed. (Refer to Section 9.3, RESTORING .) Each structure you create in addition to the system structure has a . The on any structure points to all the first-level directories created under the . After you install the software, give the DIRECTORY command for . The output on your terminal appears similar to the example below. Note that each directory is a file in the . The differences between this list and the one on your terminal depend on the model system you have and the type of unbundled software you have purchased. _________ _________________________ $DIRECTORY (OF FILES) STR: STR: ACCOUNTS.DIRECTORY.1 BACKUP-COPY-OF-ROOT-DIRECTORY.IMAGE.1 BOOTSTRAP.BIN.1 DSKBTTBL..1 FRONT-END-FILE-SYSTEM.BIN.1 INDEX-TABLE.BIN.1 NEW-SUBSYS.DIRECTORY.1 NEW-SYSTEM.DIRECTORY.1 OPERATOR.DIRECTORY.1 ROOT-DIRECTORY.DIRECTORY.1 SPOOL.DIRECTORY.1 SUBSYS.DIRECTORY.1 SYSTEM.DIRECTORY.1 SYSTEM-ERROR.DIRECTORY.1 UETP.DIRECTORY.1 Total of 14 Files 3-2 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.2.2 3.2.2 The directory contains data and program files that the system uses during normal operation. Table 3-1 lists many of the files that appear in this directory. Table 3-1: Files Table 3-1: Files __________________________________________________________________ File Name Explanation File Name Explanation __________________________________________________________________ 0DUMP11.BIN Contains a dump of front-end memory after the front end crashes. 2060-MONBIG.EXE The smallest runnable non-ARPANET monitor. 2060-MONMAX.EXE The largest runnable non-ARPANET monitor. n-CONFIG.CMD Contains definitions of line speeds, system logical names, printer VFU files, magnetic tape logical unit numbers, DECnet parameters, and additional system-dependent parameters. These system parameters are set every time the system starts. The value n equals the latest release of TOPS-20. n-PTYCON.ATO Contains the commands that are given automatically at the operator's console every time the system starts. You may modify this file to suit your own installation. The value n equals the latest release of TOPS-20. n-SETSPD.EXE Program that reads the n-CONFIG.CMD file and sets up the parameters that it contains. The value n equals the latest release of TOPS-20. n-SYSJOB.EXE Program that runs in a process created by the monitor and takes commands from the file n-SYSJOB.RUN. The value n equals the latest release of TOPS-20. 3-3 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-1: Files (Cont.) Table 3-1: Files (Cont.) File Name Explanation File Name Explanation n-SYSJOB.RUN Contains commands that SYSJOB processes. The value n equals the latest release of TOPS-20. ACCOUNTS-TABLE.BIN Contains the information necessary to validate accounts. AN-MONBIG.EXE The smallest ARPANET timesharing monitor. AN-MONDCN.EXE A monitor that includes ARPANET and DECnet. AN-MONMAX.EXE The largest ARPANET timesharing monitor. BUGS.MAC Contains a list of all BUGHLT, BUGINF, and BUGCHK messages. CHECKD.EXE Program that creates structures and checks file-system consistency. COMAND.CMD An installation-specific systemwide COMAND.CMD file. DEVICE-STATUS.BIN Contains status information for tape drives, disk drives, and disk structures. It is maintained by MOUNTR. DUMP.CPY Contains a copy of main memory at the time of the last system crash. It is copied from DUMP.EXE to maintain a history of crashes. This file is written by the n-SETSPD program when the system is rebooted. DUMP.EXE Contains a copy of main memory at the time of the last system crash. You must have this file to get a system dump after a crash. ERRMES.BIN Contains binary system error messages. EXEC.EXE The TOPS-20 Command Processor. 3-4 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-1: Files (Cont.) Table 3-1: Files (Cont.) File Name Explanation File Name Explanation FEDDT.EXE A DDT program used for debugging the front end. HOSTS.TXT Defines ARPANET host names and their number translations. | | INTERNET.ADDRESS Defines the system's TCP/IP address | for AN20, CI20, and NIA20 interfaces. | | INTERNET.GATEWAYS Defines the network gateways for | reaching host systems on remote | networks. | | INTERNET.NAMESERVERS Lists name server hosts. IPALOD.EXE Program that loads the CI20 microcode. (The microcode is contained in the file.) After the loading has completed, TOPS-20 starts the CI. KNILDR.EXE Program that loads the NIA20 microcode. (The microcode is contained in the file.) It is run automatically at system startup to start the NI. LOGIN.CMD An installation-specific systemwide LOGIN.CMD file. LOGOUT.CMD An installation-specific systemwide LOGOUT.CMD file. MONITR.EXE The current monitor. MONNAM.TXT Contains the monitor name printed at the beginning of the system greeting line. PROGRAM-NAME-CACHE.TXT Contains a list of the programs that should be loaded into the program-name cache. Read by the MAPPER program. REAPER.CMD Contains a list of default commands to REAPER. The REAPER program reads this file each time it is run. 3-5 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-1: Files (Cont.) Table 3-1: Files (Cont.) File Name Explanation File Name Explanation RSX20F.MAP Contains symbol locations for the front-end processor. It is used by the FEDDT program. SYSJOB.HLP Contains information about the SYSJOB program. SYSTEM.CMD Contains OPR commands and is read by the OPR program at system startup. TAPNAM.TXT Text file that contains the installation identifier that is written on VOL1 labels for labeled tapes. TGHA.EXE Program that analyzes and corrects MOS memory problems. TGHA.HLP Contains information about the TGHA program. TOPS-20.DOC Text file that contains summary information about the latest release of TOPS-20. __________________________________________________________________ 3.2.3 Restoring the Directory 3.2.3 Restoring the Directory If the contents of are accidentally lost or destroyed, you can restore the directory from the TOPS-20 Installation Tape or your latest system backup tape. (Refer to Chapter 7 for information about creating system backup tapes.) Use the procedure below to restore directory. If you have enabled tape drive allocation, use the MOUNT command instead of the ASSIGN command. (Refer to Section 8.3 for information about using tape drive allocation.) 1. Mount the appropriate tape (in this example, it is on drive MTA0:). 2. Give the following commands at your terminal. ______ _____ @ENABLE (CAPABILITIES) ______ _____ _____ $ASSIGN (DEVICE) MTA0: ____ _____ _ _____ _____ $SKIP (DEVICE) MTA0: 4 FILES ___ _____ _____ $RUN (PROGRAM) MTA0: 3-6 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION ____ _____ _____ DUMPER> TAPE (DEVICE) MTA0: _______ _____________ ________ _____ DUMPER> RESTORE (TAPE FILES) DSK*:<*>*.*.* (TO) DUMPER TAPE #1 , , FRIDAY 1-NOV-88 330 LOADING FILES INTO END OF SAVESET ____ _____ DUMPER>EXIT $ 3.2.4 3.2.4 The directory contains system programs (and their help files) that the user may want to run. The directory protection code set for prevents users from changing the files in this directory. Many of the file protections require users to enable WHEEL or OPERATOR capabilities to use the files. (Refer to Chapter 5 for information about directory and file protections and special capabilities.) Table 3-2 lists the programs and files commonly placed in . An asterisk precedes all unbundled software. Table 3-2: STR: Files Table 3-2: STR: Files __________________________________________________________________ Programs Explanation Programs Explanation __________________________________________________________________ ACTGEN.EXE Program that takes information from accounting files and creates the account validation data base. ACTGEN.HLP Contains information about the ACTGEN program. ACTSYM.UNV A file of universal symbols for USAGE accounting programs. ANAUNV.UNV A file of ARPANET universal symbols. *B362LB.REL BLISS functions needed to rebuild the Record Management Services facility (RMS-20) from AUTOPATCH. *BASIC.EXE The BASIC compiler. BATCON.EXE Program that controls batch jobs. CDRIVE.EXE Program that controls card readers. 3-7 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation CHECKD.EXE Program that creates structures and checks file-system consistency (same as in ). CHECKD.HLP Contains information about the CHECKD program. CHKPNT.EXE Program that makes accounting entries in the file CHECKPOINT.BIN. CHKPNT.HLP Contains information about the CHKPNT program. CMD.REL A library file of routines for the COMND monitor call. CMD.UNV A file of universal symbols for the COMND monitor call. *COBDDT.HLP Contains information about COBDDT. *COBDDT.REL The COBOL debugging program. *COBOL.EXE The COBOL compiler. *COBOL.HLP Contains information about the COBOL compiler. CREF.EXE Program that produces a cross-reference listing. CREF.HLP Contains information about the CREF program. DIL.LIB A library file of data definitions for COBOL programs that use the Data Interchange Library (DIL) facility. DIL.REL The DIL subroutines. DILV7.FOR Contains data definitions for FORTRAN programs that use DIL. DITV7.FOR Contains data definitions for FORTRAN programs that use the data transmission component of DIL. DIXV7.FOR Contains data definitions for FORTRAN programs that use the data conversion component of DIL. DLUSER.EXE Program that saves and restores the directory parameters. DLUSER.HLP Contains information about the DLUSER program. 3-8 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation DUMPER.EXE Program that saves and restores files to and from magnetic tape. DUMPER.HLP Contains information about the DUMPER program. DX20LD.EXE Program that loads DX20 microcode. DXMCA.ADX Microcode for DX20 tape subsystem controller. EDDT.REL A component of the debugging program for the TOPS-20 monitor. EDIT.EXE A line-oriented text editor. EDIT.HLP Contains information about the EDIT program. FE.EXE Program that is used when copying files from the front-end file system to the TOPS-20 file system and vice versa. FE.HLP Contains information about the FE program. FEDDT.EXE The debugging program for the front end. FILCOM.EXE Program that compares the contents of two files. FILCOM.HLP Contains information about the FILCOM program. FILDDT.EXE A DDT program used for examining the contents of system dumps (DUMP.CPY). *FORDDT.HLP Contains information about the FORDDT program. *FORDDT.REL The FORTRAN debugging program. FORMAT.EXE Program used to format RP04/RP06 disk packs while the system is in timesharing mode. FORMAT.HLP Contains information about the FORMAT program. *FOROTS.EXE The FORTRAN object-time system (operating system interface). *FORTRA.EXE The FORTRAN compiler. GALGEN.EXE Program that creates the parameter file (GALCNF) for building the GALAXY programs. 3-9 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation GLOBS.UNV A file of universal symbols for the TOPS-20 monitor. GLXLIB.EXE Object-time system used by the GALAXY programs. HELP.HLP Contains information about the HELP command. *IBMSPL.EXE Spooling program that sends IBM-batch-job files to remote IBM host and retrieves the output. INFO.EXE Program that gives information to programs using IPCF. *ISAM.EXE Program that maintains COBOL single-key indexed sequential files. *ISAM.HLP Contains information about the ISAM program. KDDT.REL A component of the debugging program for the TOPS-20 monitor. KNILDR.EXE Program that loads the NIA20 microcode. LCPORN.REL The LCP subprocess to the OPR program. LCPTAB.REL The LCP command table. *LIBARY.EXE Program that creates, maintains, and lists the contents of COBOL library files. *LIBARY.HLP Contains information about the LIBARY program. *LIBO12.EXE The COBOL object-time system (operating system interface). *LIBOL.REL Contains the COBOL library subroutines. LINK.EXE Program that loads relocatable binary programs. LINK.HLP Contains information about the LINK program. LISSPL.EXE Cluster LPTSPL listener that receives print requests from remote cluster LPTSPLs and forwards the requests to QUASAR. LP64.RAM Translation RAM file for a 64-character line printer. Read by n-SETSPD. 3-10 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation LP96.RAM Translation RAM file for a 96-character line printer. Read by n-SETSPD. LPTSPL.EXE Program that controls output to local line printers as well as TTY, LAT, DQS, and cluster printers. MACREL.REL Run-time file for macros in MACSYM. MACRO.EXE The MACRO assembler. MACRO.HLP Contains information about the MACRO assembler. MACSYM.UNV Contains system macros. MS.EXE Program that sends messages to users. MS.HLP Contains information about the MAIL program. MS.EXE Program that receives mail from the MAIL program and places it in the appropriate mailbox. MAKDMP.EXE Program that produces a standard DUMP.EXE file in . MAKLIB.EXE Program that creates relocatable subroutine libraries. MAKLIB.HLP Contains information about the MAKLIB program. MAKRAM.EXE Program that creates a translation RAM file for line printers. MAKRAM.HLP Contains information about the MAKRAM program. MAKVFU.EXE Program that creates a vertical formatting unit (VFU) file. MAKVFU.HLP Contains information about the MAKVFU program. MAPPER.EXE Program that loads the program-name cache. (Refer to Section 10.4, Improving Program Startup Time.) MDDT.REL A component of the debugging program for the TOPS-20 monitor. 3-11 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation MONSYM.REL Object file that contains monitor call symbol definitions. MONSYM.UNV Contains symbol definitions for monitor calls. MOUNTR.EXE Program that mounts tapes and structures. MSCPAR.UNV A file of universal symbols used to build the MSCP component of the TOPS-20 monitor. NEBULA.EXE The cluster GALAXY message router between nodes in a cluster. *NFT.EXE DECnet file transfer program. *NFT.HLP Contains information about the NFT.EXE program. *NMLT20 DECnet program that performs the network control program functions. NORMAL.VFU Vertical formatting unit file for line printers. OPR.EXE Program that the operator uses to interface with all jobs and devices on the system. OPR.HLP Contains information about the OPR program. ORION.EXE Program that processes messages sent by the OPR, MOUNTR, LPTSPL, QUASAR, EXEC, etc. programs. OVRLAY.REL Overlay manager for the LINK program. PA1050.EXE The TOPS-10 Compatibility Package. PAT.EXE Version of PA1050 that can be used in debugging. PHYPAR.UNV A file of universal symbols for TOPS-20 input/output programs. PLEASE.EXE Program that establishes a dialog with the operator. PROLOG.UNV A file of universal symbols used to build the TOPS-20 monitor. PTYCON.EXE Program that controls many jobs from a single terminal. 3-12 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation PTYCON.HLP Contains information about the PTYCON program. QUASAR.EXE Program that does the central queuing and scheduling for the batch system. RDMAIL.EXE Program that allows a user to read mail sent with the MAIL program. RDMAIL.HLP Contains information about the RDMAIL program. REAPER.EXE Program that marks files for migration to magnetic tape. REAPER.HLP Contains information about the REAPER program. *RERUN.EXE Restarts COBOL programs. *RERUN.HLP Contains information about the RERUN program. RETRFB.SPE Contains SPEAR report templates. RFB.EYE Contains internal definitions for the RETRIEVE function of the SPEAR program. RMS.EXE RMS-20 used in Section 0 of memory to get XRMS.EXE. RMSCOB.EXE RMS-20 used by COBOL V12B programs. RMSFAL.EXE Program that 'listens' for DECnet file transfers. RMSINI.REL Routine called by BLISS and MACRO programs to initialize RMS-20. RMSINT.R36 Unsupported BLISS interface file for RMS-20. RMSINT.UNV MACRO interface file for RMS-20. RMSUTL.EXE The RMS-20 file maintenance utility. RSXFMT.EXE Utility program used for converting TOPS-20 files to a format used by the front end and vice versa. RSXFMT.HLP Contains information about the RSXFMT program. RUNOFF.EXE Program that helps with text preparation. 3-13 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation RUNOFF.HLP Contains information about the RUNOFF program. SCAPAR.UNV A parameter file of symbols for the SCA inter-system communication routines. SDDT.EXE DDT debugger for programs without a symbol table. *SELOTS.EXE Program that interfaces between the COBOL language and the COBOL object-time system (LIBOL). (It is used with versions of COBOL up to and including version 11.) SERCOD.UNV Contains definitions for the SYSERR error codes. *SIX12.REL The BLISS debugger. *SORT.EXE Program that sorts files record by record. *SORT.HLP Contains information about the SORT program. SPRINT.EXE Program that creates batch jobs from card input. SPROUT.EXE Output spooler for card punch, paper tape punch, and plotter. SPEAR.EXE Segment of SPEAR program. SPRRET.EXE Segment of SPEAR program. SPRSUM.EXE Segment of SPEAR program. SYSJOB.HLP Contains information about the SYSJOB program. SYSTAP.CTL Control file that creates a system backup tape. TCX.EXE A DIGITAL Standard Runoff index utility. TCX.HLP Contains information about the TCX utility. TERMINAL.HLP Contains information about the TERMINAL command. TOC.EXE A DIGITAL Standard Runoff utility for creating a table of contents. TOC.HLP Contains information about the TOC utility. TV.EXE A character-oriented text editor. 3-14 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-2: STR: Files (Cont.) Table 3-2: STR: Files (Cont.) Programs Explanation Programs Explanation UDDT.EXE DDT debugger for programs with a symbol table. ULIST.EXE Program for printing information about directories and users. ULIST.HLP Contains information about the ULIST program. VERIFY.EXE Program that is used during software installation to determine the integrity of files. It verifies checksums and version numbers of the .EXE files. WATCH.EXE Program for observing system performance. WATCH.HLP Contains information about the WATCH program. *XPORT.REL Library containing the BLISS transportable I/O, memory, and string functions. XRMS.EXE RMS-20 library that is mapped to an extended (nonzero) section for execution of RMS functions. __________________________________________________________________ NOTE All the .HLP files can be displayed using the HELP command; for example, the command @HELP WATCH displays the WATCH.HLP file. 3-15 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.2.5 Restoring the Directory 3.2.5 Restoring the Directory If the contents of are accidentally lost or destroyed, you can restore the directory from the TOPS-20 Installation Tape or your latest system backup tape. (Refer to Chapter 7 for information about creating system backup tapes.) Use the procedure below to restore the directory. If you have enabled tape drive allocation, use the MOUNT command instead of the ASSIGN command. (Refer to Section 8.3 for information about using tape drive allocation.) 1. Mount the appropriate tape (in this example, it is on drive MTA0:) 2. Give the following commands at your terminal. ______ _____ @ENABLE (CAPABILITIES) ______ _____ _____ $ASSIGN (DEVICE) MTA0: ____ _____ _ _____ _____ $SKIP (DEVICE) MTA0: 4 FILES ___ _____ _____ $RUN (PROGRAM) MTA0: ____ _____ _____ DUMPER> TAPE (DEVICE) MTA0: ____ _ _____ DUMPER> SKIP (NUMBER OF SAVESETS) 1 _______ _____________ ________ DUMPER> RESTORE (TAPE FILES) DSK*:<*>*.*.* (TO) _____ DUMPER TAPE # 1 , , SATURDAY, 3-NOV-88 330 LOADING FILES INTO STR: END OF SAVESET ____ _____ DUMPER> EXIT $ 3-16 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.2.6 and 3.2.6 and The first time you install the TOPS-20 software, the DLUSER program creates the directories and . They do not contain files. You can use these directories when a new release becomes available and you are updating the existing system. When DIGITAL distributes an updated monitor on the TOPS-20 Installation Tape, you restore the first two savesets from this tape to the directories and respectively. You use these directories until you feel comfortable with the new software. Should you have any problems with the new software, you can easily revert to _______ __ _____ _ using the old software. Appendix A of the TOPS-20 KL Model B ____________ _____ Installation Guide detail the procedures to update one software release to another. If you have no problems with the new monitor, and you are comfortable with it, copy all the files in the directory into the directory and all the files in the directory into the directory . You can now delete all the files in and . The directories and remain empty until a new version of the TOPS-20 software is distributed. NOTE After you copy the new files into the directories and , you cannot revert to the old system software unless you reinstall the system using the old monitor or backup tapes. 3-17 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.2.7 , , , and 3.2.7 , , , and - After installation, the directory contains one file, SYSTEM-DATA.BIN. This file contains all the accounting system entries for each user. If the directory is destroyed, the accounting system creates a new SYSTEM-DATA.BIN file. After the first LOGIN on the system, the system creates the CHECKPOINT.BIN file. This file stores accounting entries for each user during the time the user is logged in. After a user logs out, the accounting data stored in CHECKPOINT.BIN is copied to the SYSTEM-DATA.BIN file. When the system comes up after a crash, the monitor examines CHECKPOINT.BIN to determine which users were logged in at the time of the crash, and stores the data in CHECKPOINT.BIN in SYSTEM-DATA.BIN. Therefore, users who did not log out in the normal fashion, because of a crash, are still charged for their log-in time. - The directory normally contains the file PTYCON.LOG. This file usually contains a record of all the activities that occur under the operator jobs that are controlled by PTYCON. The directory may also contain files the operator needs to run the system. - The directory contains files that the spooling system needs before performing any input or output. They are kept in this area until they can be output to a slow-speed device such as a line printer. This area is also used for input of files from the local card reader, if one is attached. It may also be used for input of files from IBM remote stations. The file PRIMARY-MASTER-QUEUE-FILE.QUASAR is created in this directory. It contains a copy of the input queues so that they are not destroyed if the system crashes. You must either delete this file or process all entries in the queues before installing a new version of the batch system that has a different queue format. The GALAXY.DOC file describes the new software components and tells you if the queue format has changed. - The directory contains the file ERROR.SYS. The ERROR.SYS file contains entries about system errors and is read by the system error recovery program, SPEAR. 3.2.8 Other Useful Directories 3.2.8 Other Useful Directories You may want to create additional directories for storing different versions of programs or text. Some useful directories are listed below. You should give these directories the proper protection number and make them files-only directories. 3-18 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Directory and File Protection Directories and files that are executed or read by the entire user community should not be given the default protection 777700, which allows no access. They should be given the directory protection 777740 and the file protection 777752 or 777712. (Section 5.7 describes directory and file protections.) The directory can contain versions of your software that are not completely tested or that are drastically different from the current versions. If you create a directory , users will find it more convenient if you also create the system-logical name NEW: defined as PUB:, SYS:, where PUB: is the system structure. This logical name allows them to run all new software by merely typing NEW: and the program name. If there is no file with the given name in , the system uses the version currently on . (Refer to Section 3.3 for a description of logical names.) The directory can contain the old version of software as newer versions appear on . If programs or data do not work with new software, the user has a chance to correct the problems before the older software is no longer available. Users will find it convenient if you also define the system-logical name OLD: as PUB:,SYS:, where PUB: is the system structure. By creating the directories and , you gradually introduce new software to system users. When a new version becomes available, place it in the directory . When the software has been in use awhile, move the version in to , and the version in to . Store the version in on a system back-up tape. Every time you change a version of the software, you should send a system-wide message to all users. The directory contains documents and help files that describe the system software. As different versions of software appear on , , and , you should make a list of changes incorporated in the new versions and place it in the directory . You can move all files with the file type .HLP from to the directory . The HELP command still works correctly if you define the system-logical name HLP: to be PUB:,SYS:, where PUB: is the system structure. 3-19 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION The directory contains messages from users to the operator. These messages are usually general system comments or complaints. When a user wants to send the operator a message that does not require an immediate response, he can send a message to the directory using the MAIL program. (Refer to the description of _______ ____ _________ the MAIL program in the TOPS-20 User Utilities ______ Guide.) A typical message may be a request for supplies, for example, LA36 paper or ribbon. Creating the directory avoids constant interruptions to the operator from users issuing PLEASE requests. The operator can read the messages in at a specified time each day, or simply when he has time. 3.3 SYSTEM-LOGICAL NAMES 3.3 SYSTEM-LOGICAL NAMES A logical name is a descriptive word used to establish a search route to locate files. It can be up to 39 alphanumeric characters; however, it is usually three to six alphanumeric characters. Because logical names are used in place of device names, they always end with a colon. Logical names tell the system where and in what order to search for files. When a user types a logical name, the system searches the directories in the order they were defined or listed by the logical name. Although users can define logical names for their own use _______ ______ _____ (refer to the TOPS-20 User's Guide), the logical names described here can be used by all users of the system. You can define system-logical names in the n-CONFIG.CMD file. During installation, several systemwide logical names are defined by the monitor, and may be overridden in the n-CONFIG.CMD file. They are SYS:, defined as PUB:, PUB:; SYSTEM:, defined as PUB:, PUB:; DEFAULT-EXEC:, defined as SYSTEM:EXEC.EXE; and POBOX:, defined as the public structure. (PUB: is the system structure.) You may decide to add other logical names to aid users in accessing files. If you want the logical names to be permanent, place the definitions (using an editor) in the n-CONFIG.CMD file on the system structure. SYSTEM:, SYS:, DEFAULT-EXEC:, POBOX:, and some other frequently used system-logical names are explained below. 3-20 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.3.1 SYSTEM: 3.3.1 SYSTEM: The logical name, SYSTEM:, defines a search list that contains all the system programs and files that the system needs to operate. SYSTEM: should always contain the directory on the system structure. If you are updating the system with a new monitor, the definition of SYSTEM: in the n-CONFIG.CMD file also contains the directory . For example, DEFINE SYSTEM: STR:,STR: where: STR: is the name of the system structure. 3.3.2 SYS: 3.3.2 SYS: The logical name SYS: defines a search list that contains all the system programs a user may want to run. SYS: should always contain the directory and any other library directories that contain commonly used programs. If you are updating the system with a new monitor, the definition of SYS: in the n-CONFIG.CMD file also contains the directory . For example, DEFINE SYS: STR:,STR: where: STR: is the name of the system structure. Be sure to set the protection on the library files in (or ) to 777740. This protection allows access by all users. 3.3.3 NEW: 3.3.3 NEW: The logical name NEW: defines a search list containing a directory that has new software, followed by the system-logical name SYS:. The definition for this, which you would put in n-CONFIG.CMD, is the following: DEFINE NEW: STR:,SYS: 3-21 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION With this systemwide logical name, the user can give the command: ______ ____ ____ _____ @DEFINE (LOGICAL NAME) SYS: (AS) NEW: Now, when the user runs a program, the system looks first in the directory STR:, and then in the normal system search list SYS:. This way, the user always gets the most recent version of any program. 3.3.4 OLD: 3.3.4 OLD: If you have old versions of programs, defining the system-logical name OLD: may be helpful to users. The usual definition of the logical name OLD: is: DEFINE OLD: STR:,SYS: The definition OLD: has the same type of effect as the definition NEW:. If the user gives the command: ______ ____ _________ @DEFINE (LOGICAL NAME) SYS: (AS) OLD: whenever he runs a program, he will get the oldest version available. 3.3.5 HLP: 3.3.5 HLP: If you want to keep programs and documentation in separate directories, you should store the documentation in . The HELP command searches the directories identified by the logical name HLP:, so you must define the logical name HLP: to be the directory . The definition of HLP: in n-CONFIG.CMD should be: DEFINE HLP: STR: 3.3.6 SERR: 3.3.6 SERR: The logical name SERR: is defined by the system at startup. It points to the area on the system structure. The system writes the ERROR.SYS file to this area, which may be used later to produce reports. 3-22 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.3.7 DMP: 3.3.7 DMP: When the system is re-booted after a crash, the file DUMP.EXE is overwritten with a copy of memory. Upon system startup, the n-SETSPD program copies the contents of DUMP.EXE to the DUMP-version-name.CPY file on the system structure (name is the name of the bug, and version is the edit number of the monitor that was running at the time of the crash). System crashes cause DUMP.EXE to be overwritten, but new versions of the .CPY file accumulate. To keep the system structure clear of .CPY files, define DMP: in the n-CONFIG.CMD file as follows: DEFINE DMP: STR: The structure and directory are your choice; you should not specify a filename. Versions of the .CPY file hereafter accumulate in the defined area. ___ In CFS configurations, systems should not share a common DMP: definition, because this could lead to confusion about which dump came from which system. If the DUMP-ON-BUGCHK feature is enabled, the n-SETSPD program is run after continuable system errors, and it copies to DMP: all new DUMP.EXE files that it finds from its scan of dumpable structures. Refer to Section 9.10 for complete information on DUMP-ON-BUGCHK. As n-SETSPD copies a file to the area defined by DMP:, it sends a message to the CTY specifying where it's copying the file to and from. For example: Copying system dump from: STR:DUMP.EXE.1 to: PS60:DUMP-12345-WSPNEG.CPY.1 3.3.8 DEFAULT-EXEC: 3.3.8 DEFAULT-EXEC: The logical name DEFAULT-EXEC: defines a search list that points to the TOPS-20 Command Processor (EXEC). When users log in or give the PUSH command, the EXEC program is activated. Some experienced users may choose to run their own copies of the EXEC, not the standard system version. Such users can define DEFAULT-EXEC: to be the file name for their private EXEC, and can take advantage of this feature after giving the PUSH command. This command must be given at the EXEC level, while in batch or interactive mode. PUSH commands issued from other program levels may invoke the standard system version, unless the program has been written to use DEFAULT-EXEC: if it is defined. By default, DEFAULT-EXEC: is defined as SYSTEM:EXEC.EXE. ____________ _________ _______ _______ ________ Refer to the DECSYSTEM-20 Technical Summary and the TOPS-20 Commands _________ ______ Reference Manual for more complete information on the EXEC. 3-23 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.3.9 POBOX: 3.3.9 POBOX: The logical name POBOX: defines a search list that points to structures where users' mail files reside. Mail sent to a user goes to the first MAIL.TXT.1 file in the user's directory that the system encounters in its search. By default, POBOX: is defined as the public structure. You can redefine POBOX: in the n-CONFIG.CMD file. By redefining POBOX:, you can prevent users' mail files from filling up the public structure. In CFS-20 configurations, redefining POBOX: is especially useful. You can define POBOX: to be the same structure for all systems, establishing a central location for all mail files in the configuration. Then, no matter what system users log onto, they are automatically directed to this one area when they give commands to access their mail. They do not have to spend time logging onto various systems to access mail that would otherwise have been sent to a public structure (which is a separate structure for each system unless the "login structure" feature is enabled). To set up this central location, the same DEFINE command should be entered in each system's n-CONFIG.CMD file. Refer to Chapter 12, The Common File System, for further information on CFS-20. 3.3.10 NRT: 3.3.10 NRT: The logical name NRT: (Network Remote Terminal) is applicable only if your system has DECnet communications software. When a user issues the SET HOST command to connect to a remote system, the CTERM-SERVER communications program is run by default. If the remote node does not support CTERM, the host system tries to connect the user again, this time using the program defined by NRT:. ________ Examples 1. For TOPS-20 to TOPS-20 communications, give the following definition: DEFINE NRT: SYS:SETHOST.EXE 2. For multi-operating system DECnet communications, you can specify the HOST program (located on the TOPS-20 tools tape): DEFINE NRT: HOST.EXE 3-24 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.3.11 SPOOL: 3.3.11 SPOOL: The logical name SPOOL: directs the system to the directory on the system structure. The GALAXY batch and spooling components read and write files in this area. Also, the monitor writes spooled files to this area. (Section 3.2.7 contains detailed information on . 3.4 CONSOLE FRONT-END FILES 3.4 CONSOLE FRONT-END FILES The console front-end computer consists of a PDP-11 with 28K 16-bit words of memory. When the system is brought up for timesharing, the front-end monitor, RSX20F, is loaded in the PDP-11 memory and started. The TOPS-20 monitor is loaded in KL10 main memory and started. Thus, you have two computers working together. Both computers have their own monitor and related software. The front-end file system consists of the RSX20F monitor and related programs (tasks) and files. During software installation, these front-end files are transferred from floppy disks to a special area on the system structure unless an RP07 is being used as the system structure. If an RP07 is being used as the system structure, only the files on the TOPS-20 Installation Tape will be placed on the RP07. The front-end files, on the floppy disks, must be placed on a dual-ported RP06 disk drive attached to the PDP-11 front end. (Refer _______ __ _____ _ ____________ _____ to the TOPS-20 KL Model B Installation Guide for the procedure for creating the front-end file system when using an RP07 disk drive as the system structure.) The area the front-end files are placed on is called the FRONT-END FILES area, or FILES-11 area. Once this area has been set-up, there is normally no need to get these files again from floppy disks. The floppy disks used to install the system become backup devices in case the system structure is destroyed, or in the case where an RP07 is being used as the system structure, they can be used to recreate your front-end file structure. It is a good idea to make an extra copy of your installation floppies in the event one of your original floppies is destroyed and you need to restore the FRONT-END FILES area. Refer to Chapter 7, System Backup Procedures, for a description of the COP program that is used to copy floppy disks. As previously stated, the front-end files must always be placed on a dual-ported RP06 attached to the PDP-11 front end. This allows the front-end processor to access these files while the main processor accesses TOPS-20 files on the same or different disk packs. 3-25 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION The RSX20F monitor and its related programs do the following: o Control input/output and communications devices. o Interface with the main computer. o Load the TOPS-20 monitor at system startup, and reload TOPS-20 if a crash occurs. o Report system errors to TOPS-20. o Perform system diagnostic functions. Table 3-3 lists the programs and files located in the FRONT-END FILES area, with a brief description of each. Files with the file type TSK are programs that can be run under the front-end monitor RSX20F; files with the type MCB contain the microcode for the host processor (KL10); files with the type EXB are bootstrap programs used to load the TOPS-20 monitor; and files with the type CMD are programs that record information about system errors. This information is read by the system error recovery program, SPEAR. Beginning with TOPS-20 Version 6, console front-end filenames include edit-level numbers that indicate the versions of the particular programs, for example, F11ACP.TSK;1505. Table 3-3: Console Front-End Files Table 3-3: Console Front-End Files __________________________________________________________________ File Contents or Function File Contents or Function __________________________________________________________________ BF16N1.A11 MOS memory-timing RAM file. It is a nonexecutable file containing MOS memory data. BF64N1.A11 Timing file for 64K RAM chips. BOO.TSK Used to boot RSX20F. BOOT.EXB The central processor disk bootstrap program that boots TOPS-20 from disk. CLOCK.CMD Saves contents of memory locations for diagnosing errors that are purposely induced by Field Service. COP.TSK Copies the contents of floppy disks. CRAM.CMD Saves contents of memory locations for diagnosing CRAM parity errors. 3-26 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-3: Console Front-End Files (Cont.) Table 3-3: Console Front-End Files (Cont.) File Contents or Function File Contents or Function DEX.CMD Saves contents of memory locations for diagnosing Deposit Examine failures (PI level 0 interrupt). DMO.TSK Dismounts a front-end device and allows a reboot. DRAM.CMD Saves contents of memory locations for diagnosing DRAM parity errors. EBUS.CMD Saves contents of memory locations for diagnosing EBUS parity errors. FMPAR.CMD Saves contents of memory locations for diagnosing fast memory parity errors. F11ACP.TSK File handler for front-end disk files. HALT.CMD Saves contents of memory locations for diagnosing KL halt errors. INI.TSK Initializes a front-end files area. KLDISC.TSK Provides the KLINIK line disconnect service. KLI.TSK KLINIT program for initializing the central processor (KL20). Loads microcode, configures cache and main memory, loads bootstrap. KLRING.TSK Provides the KLINIK line ring service. KLX.MCB KL10 microcode file. KPALV.CMD Saves contents of memory locations for diagnosing keep alive cease errors. LHALT.CMD Saves contents of memory locations for diagnosing KL halt errors. Provides more information than HALT.CMD LOGXFR.TSK Transfers the PARSER.LOG file to the TOPS-20 error file. MIDNIT.TSK Updates the time of day through midnight. MOU.TSK Mounts a device for use with the front end. MTBOOT.EXB Boots a TOPS-20 monitor from magnetic tape. 3-27 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION Table 3-3: Console Front-End Files (Cont.) Table 3-3: Console Front-End Files (Cont.) File Contents or Function File Contents or Function PARSER.TSK The front-end command parser (prompts PAR>). The primary means of access to front-end programs. PIP.TSK Front-end program for file transfer. RED.TSK Tells the system where to look for the front-end files device, SY0:. RP2DBT.EXB A front-end BOOT file with the DX20 microcode loaded for the RP20 disk sybsystem. RP2MBT.EXB A front-end MTBOOT file with the DX20 microcode loaded for the RP20 disk sybsystem. RSX20F.MAP Contains symbolic definitions for RSX20F. RSX20F.SYS Virgin image of front-end monitor (RSX20F). SAV.TSK Saves the front-end monitor and bootstrap on disk. SETSPD.TSK Sets system parameters, such as line speeds. TIMEO.CMD Saves contents of memory locations for diagnosing protocol timeout errors. TKTN.TSK Terminates tasks, reports errors, and requests reloads. T20ACP.TSK Interfaces between front-end and TOPS-20 file systems. UFD.TSK Sets up user-file directories in the front-end files area. ZAP.TSK Makes binary modifications to task images. __________________________________________________________________ 3-28 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.5 TAILORING THE BATCH SYSTEM 3.5 TAILORING THE BATCH SYSTEM Most installations use the parameters and defaults in the distributed version of the batch system. However, you can modify some of these parameters if required by the batch processing procedures at your installation. DIGITAL distributes a program with the TOPS-20 software that allows you to tailor the standard batch system to the requirements of your installation. This program, called GALGEN.EXE, is located in the directory on the system structure. You can run GALGEN at the time the system software is installed or at a later date. In either case, you must have a working batch system before you can generate a new one using GALGEN. This means if you are installing the system, you must first install the batch system that is distributed with every new version of the TOPS-20 software (on the software installation tape). You can then run the GALGEN program and tailor the batch system before it becomes available for general use. If you tailor the batch system at a later date, you can run the GALGEN program with users logged in. However, for safety reasons, the system should be stand-alone during the critical phase of stopping the old batch system and starting the new one. The batch queues, however, need not be empty. That is, batch jobs can be waiting to be processed at the time you bring the system down. _______ __ _____ _ ____________ _____ The TOPS-20 KL Model B Installation Guide contains the procedures for running the GALGEN program. 3.6 CHECKING THE SOFTWARE (UETP) 3.6 CHECKING THE SOFTWARE (UETP) After the system software is installed, you or the Software Specialist can run the User Environment Test Package (UETP). UETP is a collection of programs, data files, and batch control files designed to allow you to test the integrity of various system elements. In addition to testing that the hardware has been properly installed, UETP ensures that the TOPS-20 Operating System is running and that the languages you have selected for your operation are available. UETP creates a moderate load on the system, consisting of various defined procedures that closely resemble the load in an actual operation. Later, you may want to tailor UETP to test a software load that more closely resembles your particular system's use. _______________ ____ ___________ ____ _______ _________ ______ The TOPS-10/TOPS-20 User Environment Test Package Reference Manual describes UETP, the individual component tests, typical message information, and the procedures for adding new tests. 3-29 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.7 REMOTE PRINTERS 3.7 REMOTE PRINTERS The DECSYSTEM-20s at your site may be included in a DECnet network, local area network, or CFS-20 cluster. These networks provide TOPS-20 users with numerous printing options. Users, not restricted to local printers on the systems they logged in to, can direct output to remote printers attached to: o VMS systems in a DECnet network -- Distributed Queue Service (DQS) printers. o LAT servers in a local area network -- LAT printers. o Other TOPS-20 systems in a CFS-20 cluster -- cluster printers. 3-30 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.7.1 Remote Printing Requirements 3.7.1 Remote Printing Requirements ___ o Use of DQS printers requires DECnet. ___ ________ o Use of LAT printers requires a LAT server running at least Version 5.1 of the LAT protocol. Digital-supported LAT printers must be one of the following devices: LA50, LA75, LA100, LA120, LN03. When starting up a LAT printer, the operator must enter a description for the printer with the /TERMINAL-CHARACTERISTIC: switch to the OPR>START PRINTER command. (If the switch is omitted, the system prompts the operator for this information.) You or a system programmer must establish values for the switch argument in the LPTSPL module, LPTUSR.MAC. Instructions for doing this are included in the GALAXY documentation file. _______ _______ o Use of a remote cluster printer requires DECnet. In addition, "cluster GALAXY" must be enabled on both the requesting and serving systems if users are to have access to the full set of remote-printer functions. These functions include: obtaining information on remote print queues, canceling remote print requests, and receiving notification of queuing and completing of the remote print job. A system that is servicing remote cluster print jobs must run LPTSPL and LISSPL. A system that is sending print jobs to a system that services them must run LPTSPL. A cluster printer must be started on this system also. For example, if system SYSA sends print requests to system SYSB, the operator gives the following command from SYSA: _____ _______ _______ ____ ______ ____ _________ OPR>START PRINTER CLUSTER unit number NODE SYSB where: unit number designates a printer at SYSB _______ __ _____ _ ____________ _____ Refer to the TOPS-20 KL Model B Installation Guide and the _______ __________ _____ TOPS-20 Operator's Guide for further information on installing and enabling cluster printing. 3-31 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.7.2 Defining DQS and LAT Printers 3.7.2 Defining DQS and LAT Printers To specify a DQS or LAT printer with the PRINT/REMOTE-PRINTER: command, users must first define that printer with the SET REMOTE-PRINTING PRINTER command, which indicates where the printer resides in the network. It can provide a useful alias for the printer as well. Users can issue the command interactively at the terminal or from a jobwide command file. More conveniently, however, users can invoke the command for each available printer from a systemwide command file that you create. You should name this file REMOTE-PRINTING.CMD and place it in the SYSTEM: area. Users can invoke the commands in this file with the TAKE command or the SET REMOTE-PRINTING SYSTEM-DEFINITIONS command. (You can also place these commands in COMAND.CMD if all users on a system are expected to want to use this facility.) Here is a sample systemwide printer-definition file: SET REMOTE-PRINTING PRINTER LN03 SWE$LN03 SYSA SET REMOTE-PRINTING PRINTER LISTING SI$8700 SYSB SET REMOTE-PRINTING PRINTER LATOP LC14 LAT99 The SET REMOTE-PRINTING PRINTER command has three arguments. The first argument assigns an alias to the remote printer. The second argument is the name of a VMS printer queue (SWE$LN03) or a LAT port or service (LC14) or the name of an existing alias (SET REMOTE-PRINTING PRINTER LAT03 LN03). The third argument is the name of the system or LAT server that controls the printer. _______ ________ _________ ______ Refer to the TOPS-20 Commands Reference Manual for a complete description of the command. The REMOTE-PRINTING.CMD file can also contain specifications for DQS printing characteristics, as described in section 3.7.3. 3-32 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.7.3 Setting DQS Printing Characteristics 3.7.3 Setting DQS Printing Characteristics Users can specify how they want their DQS printed output to appear. For example, they may desire a "landscape" or "portrait" page orientation, or 65 or 90 characters per line. They can specify these and other characteristics with the PRINT/CHARACTERISTICS command. However, the printing characteristics must first be established with the SET REMOTE-PRINTING CHARACTERISTIC command. Like the printer definitions described in Section 3.7.2, the printing characteristics can be established by invoking the appropriate command from the terminal, a jobwide command file, or the systemwide command file, SYSTEM:REMOTE-PRINTING.CMD. Here is a systemwide command file that contains printing characteristics and printer definitions: SET REMOTE-PRINTING CHARACTERISTIC PORTRAIT 52 SET REMOTE-PRINTING CHARACTERISTIC P65 59 SET REMOTE-PRINTING CHARACTERISTIC P75 53 SET REMOTE-PRINTING CHARACTERISTIC P80 58 SET REMOTE-PRINTING CHARACTERISTIC P90 52 SET REMOTE-PRINTING CHARACTERISTIC P100 51 SET REMOTE-PRINTING CHARACTERISTIC P132D 54 SET REMOTE-PRINTING CHARACTERISTIC LANDSCAPE 0 SET REMOTE-PRINTING CHARACTERISTIC L100 50 SET REMOTE-PRINTING CHARACTERISTIC L132 0 SET REMOTE-PRINTING CHARACTERISTIC TR10P_BOLD 61 SET REMOTE-PRINTING CHARACTERISTIC TR14P_BOLD 62 SET REMOTE-PRINTING CHARACTERISTIC TR18P_BOLD 63 SET REMOTE-PRINTING CHARACTERISTIC CONDENSED 100 SET REMOTE-PRINTING CHARACTERISTIC OVERHEAD 101 SET REMOTE-PRINTING PRINTER LISTING SI$8700 SYSA SET REMOTE-PRINTING PRINTER LN03 CS$LN03 SYSB SET REMOTE-PRINTING PRINTER LATOP LC14 LAT99 The SET REMOTE-PRINTING CHARACTERISTIC command has two arguments. The first argument is the name of a characteristic, for example, PORTRAIT, or P90 (portrait orientation with 90 characters per line). The second argument is the numeric value that your site has assigned to that characteristic for the particular printer queue or to the name of an existing characteristic. You can also place this command in the COMAND.CMD file if all users on a system are expected to want to use this facility. _______ ________ _________ ______ Refer to the TOPS-20 Commands Reference Manual for a complete description of the command. 3-33 AFTER SOFTWARE INSTALLATION AFTER SOFTWARE INSTALLATION 3.8 TERMINAL PRINTERS 3.8 TERMINAL PRINTERS Your site may have printers attached to dedicated, hardwired terminal lines, such as an LA50, LA100, LA120-RA, or LA120-RB. These local printers are called terminal printers. The operator starts them with the following command: _____ _______ ______________________________________________ OPR>START PRINTER unit/DEVICE:TTYn/TERMINAL-CHARACTERISTIC: where: unit is the number that designates a printer n is the terminal line number You or a system programmer must assign a descriptive value to each of these printers in the LPTSPL module, LPTUSR.MAC. Instructions for doing this are included in the GALAXY documentation file. The argument that the operator gives to the /TERMINAL-CHARACTERISTIC: switch with the OPR>START PRINTER command must match a value in LPTUSR.MAC. 3-34 CHAPTER 4 CHAPTER 4 CREATING STRUCTURES CREATING STRUCTURES 4.1 OVERVIEW 4.1 OVERVIEW One of the first decisions you must make about your new (or upgraded) installation is what type of disk storage environment best suits your needs. Some of the considerations that determine your decision are: o How large will the data base be? o How many users will be using the system? o How experienced will these users be? o Will there be a full-time operator? o How often will you run diagnostics and how critical is it that the system remain available during this maintenance? o Must all files be available to all users at all times during system operation? o Are multiple systems part of a CFS configuration? Refer also to Chapter 12, The Common File System. The mountable structure facility of TOPS-20 provides several options for making this decision. The option you choose depends on the answers to the previous questions and the number of disk packs and drives that are available. For example, if your installation has a number of disk packs and two or more drives, you can store data and program files on different structures. A structure is a collection of data and program files contained on one or more disk packs and referenced under one name. When you install your software, you create a structure known as the system structure (sometimes called the boot structure). All packs in this structure remain on-line at all times during system operation. If your system structure does not encompass all of your available drives you can create and mount other structures. 4-1 CREATING STRUCTURES CREATING STRUCTURES Sections 4.2 through 4.8 describe the system structure and how you can best utilize your disk resources and create and use other structures. 4.2 THE SYSTEM STRUCTURE 4.2 THE SYSTEM STRUCTURE Sections 4.2.1 and 4.2.2 provide an overview of what the system structure is, including its relationship to the system and its contents. NOTE Unless you have enabled the "login structure" feature in a CFS-20 configuration, described in Section 12.6.2, the public, system, boot, and login structures all denote the same structure. 4.2.1 What Is the System Structure? 4.2.1 What Is the System Structure? The system structure is the most important structure on your system. It is created and brought on-line at system installation when you answer the appropriate questions in the installation dialog. (Refer _______ __ _____ _ ____________ _____ to the TOPS-20 KL Model B Installation Guide.) The name of the system structure can be up to six characters. The system structure can be one or more disk packs, depending on the configuration of your system and your disk drive resources. You may use one or more RP06 or RP07 disks as the system structure; the maximum number of disks per structure is given in Table 4-4. You may NOT use an RA60, RA81, or RP20 as the system structure. While installing the software, you copy the console front-end files to the system structure pack that is mounted on a dual-ported drive (usually drive 0). The dual port allows the front-end processor and the central processor to access the data on the system structure. However, if you are using an RP07 as the system structure, you must reserve space for the front-end files on an RP06 disk that is dual-ported to the PDP-11 front end. If the disk structure containing the front-end files has multiple packs, the first pack of the structure must be permanently mounted on the dual-ported drive. All disk packs in the system structure must be online at all times, because this structure contains all the programs, files, and swapping area that the system needs to operate. The structure also contains all user directories necessary to support users logging into the system. (If the "login structure" feature is enabled in a CFS-20 configuration, the login structure contains these directories and must also be online at all times.) If the file system is destroyed on the system structure, or if a drive that contains all or part of the structure malfunctions, the system halts. Refer to Chapter 9 in this 4-2 CREATING STRUCTURES CREATING STRUCTURES _______ __________ _____ manual and to the TOPS-20 Operator's Guide for the steps that you and the operator must follow if you have problems with the file system or if a drive goes down. You can have another structure online that is capable of being used as the system structure. This structure must have a unique name, however, at least while it is mounted. (Section 4.5.2 provides information about mounting structures having the same name.) Section 4.5.5 discusses why you would have such a structure. | If you include the ENABLE JOB0-CTY-OUTPUT command in the n-CONFIG.CMD | file, the operator is notified at the console terminal when disk space | becomes low on the system structure. If you are using CFS-20 software, refer to Chapter 12, The Common File System, for additional information on the system structure. 4.2.2 The Contents of the System Structure 4.2.2 The Contents of the System Structure The following list provides an overview of the contents of the system structure: 1. The default TOPS-20 command processor, EXEC, which is usually found in or . 2. A (Section 3.2.1) that points to the location on disk of all first-level directories on the system structure, including the special system directories. 3. All the files in the directories and (Sections 3.2.2 and 3.2.4). 4. The directories , , , , and (Sections 3.2.6 and 3.2.7). 5. The front-end monitor (RSX20F) and the console front-end files (Section 3.4). This normally appears in the . If you are using the RP07 as the system structure, the front-end file system must reside on an RP06 dual-ported disk drive. 6. The required swapping area. The size of this area depends on the TOPS-20 monitor you are using. For example, 2060-MONMAX uses up to 15,000 pages of disk space for swapping. (Refer to Section 4.7 for a description of the swapping area.) 4-3 CREATING STRUCTURES CREATING STRUCTURES 7. A HOME block that contains the following parameters: o the structure's physical name o the number of disk packs in the structure o which pack this is in the structure o the address and number of pages used for the front-end file system (usually 950) o the address and number of pages set aside for swapping o the address of the and its backup copy o the serial number of the KL CPU to be booted from the structure 8. A directory for every user who requires access to the system. Users must log into a directory on the system structure to use the system. Afterwards, they can mount and connect to a different structure and directory. (If the "login structure" is enabled, CFS-20 users log in to the designated public structure.) 4.3 ONE-STRUCTURE SYSTEMS 4.3 ONE-STRUCTURE SYSTEMS A one-structure system consists of a single structure, the system structure, which is always on-line. All packs in the structure must be on-line for the system to operate. Usually, a one-structure system has only one or two disk drives. Smaller TOPS-20 installations choose to keep all their directories and files on one structure for some of the following reasons: o It is the simplest system. o It is the easiest system to maintain. o There is no requirement to physically remove packs from the drives, for example, for security reasons. o The majority of users are inexperienced. o All files are available at all times, and thus are easy to access. 4-4 CREATING STRUCTURES CREATING STRUCTURES o A full-time operator may be unnecessary. o There is only one disk drive (only one structure supported). Chapter 5 describes the methods you can use to create and maintain directories on your one-structure system. 4.4 MOUNTABLE STRUCTURES 4.4 MOUNTABLE STRUCTURES If the system structure does not encompass all available disk drives, you can create and mount other structures on the unused drives. These "mountable" structures are created using the CHECKD program. The _______ __________ _____ TOPS-20 Operator's Guide describes creating structures with CHECKD. NOTE The system structure is the only structure created at installation time. All other structures are created (using the CHECKD program) and brought on-line during system operation. 4.4.1 Differences Between Mountable and System Structures 4.4.1 Differences Between Mountable and System Structures Unlike the system structure, a mountable structure can be mounted and dismounted during timesharing. Also, it need not contain a front-end file system. Therefore, a mountable structure does not have to reside on a dual-ported disk drive. Although a mountable structure has its own and directory system, a user cannot log into a mountable structure, but must log in as a user on the system structure. A user can then mount a different structure and connect to directories. Table 4-1 summarizes the differences between a mountable and system structure. 4.4.2 Similarities Between Mountable and System Structures 4.4.2 Similarities Between Mountable and System Structures There are, however, many similarities between the system structure and mountable structures. Both contain user directories and files. A mountable structure can have a front-end file system, and can be used in place of the system structure to load the system for timesharing. A mountable structure is created with the eight special directories (mentioned in Chapter 3) as for a system structure. Likewise, a mountable structure has a HOME block that contains information such as the name of the structure and the number of disk units in the structure. These and other similarities are summarized in Table 4-2. 4-5 CREATING STRUCTURES CREATING STRUCTURES Table 4-1: Differences Between Mountable and System Structures Table 4-1: Differences Between Mountable and System Structures __________________________________________________________________ System Structure Mountable Structures System Structure Mountable Structures __________________________________________________________________ Always up during timesharing Can be mounted and dismounted Has a front-end file system Need not have a front-end file (unless an RP07) system Resides on a drive that is dual Need not reside on a ported with the front-end dual-ported disk drive computer (unless an RP07) Used for logging into the Cannot be used for logging into system the system Belongs to the system Can belong to a private user Has the , , Need not have these directories , , unless the structure will be , and used as the public structure; directories can be deleted from the structure Must contain a swapping area Need not contain a swapping area unless the structure is to be mounted as the public structure __________________________________________________________________ Table 4-2: Similarities Between Mountable and System Structures Table 4-2: Similarities Between Mountable and System Structures __________________________________________________________________ System Structure Mountable Structures System Structure Mountable Structures __________________________________________________________________ Has a HOME block Has a HOME block Has a front-end files area Can have a front-end files area (unless an RP07) Is used to load the system Can be used to load the system if the proper file areas and files have been established Contains system files May contain system files 4-6 CREATING STRUCTURES CREATING STRUCTURES System Structure Mountable Structures System Structure Mountable Structures Has a Has a Contains user files Contains user files All packs must be on-line for All packs in the structure must the system to operate be on-line to use the structure __________________________________________________________________ 4.5 MULTIPLE-STRUCTURE SYSTEMS 4.5 MULTIPLE-STRUCTURE SYSTEMS A multiple-structure system consists of a system structure and one or more additional structures. Figure 4-1 illustrates a system with three disk drives and two structures. The two-pack system structure MASTER: must be online during timesharing. The one-pack mountable structure ADMIN: can be removed during timesharing. Another one-pack structure can be mounted in its place. UNIT 0 UNIT 1 UNIT 2 ______ ______ ______ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |______| |______| |______| STRUCTURE MASTER: STRUCTURE ADMIN: Figure 4-1: System with 3 Disk Drives and 2 Structures Figure 4-1: System with 3 Disk Drives and 2 Structures Using Figure 4-1, suppose you want structure ADMIN: to remain on-line at all times during system operation. The structure is automatically mounted if you turn on the drive that contains the _______ __________ structure before the system is brought up. The TOPS-20 Operator's _____ Guide describes mounting structures automatically. In addition to the system structure and perhaps another permanent on-line structure, you may choose to keep one or more disk drives available for users to mount and dismount "private" packs during timesharing. 4-7 CREATING STRUCTURES CREATING STRUCTURES Figure 4-2 illustrates a system with three disk drives and three one-pack structures, the system structure MASTER:, ADMIN:, and PROG:. UNIT 0 UNIT 1 UNIT 2 ______ ______ ______ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |______| |______| |______| STRUCTURE STRUCTURE STRUCTURE MASTER: ADMIN: PROG: Figure 4-2: Three-Structure System Figure 4-2: Three-Structure System In this example, MASTER: contains all the directories necessary to support log-ins. ADMIN: contains the same, a superset, or a subset of the same directories as those on MASTER: and remains online at all times during system operation. The drive that contains PROG: is used for short-term mounting of different one-pack structures. PROG: remains online only for the time it is needed. There can be up to 64 structures online at one time. Several of the advantages in a mountable structure environment are: o Some users or groups of users may require a structure exclusively for their use. They can 'own' or possibly pay for the use of certain structures. o Service engineers can mount their own pack on the short-term drive and perform some diagnostics without disturbing normal system operation. o Creating structures on mountable packs provides additional security to that already within the system. For example, you can create a structure that contains highly confidential data, remove it from the drive(s) when you are done with it, and lock it in a security cabinet or safe. At the end of the day, the operator locks up any confidential structures. o In this type of environment, you are not limited in the size of your system's data base. You can create as many structures as you have disk packs to contain them, and you can mount as many at one time as your system can support. 4-8 CREATING STRUCTURES CREATING STRUCTURES The principal disadvantages of using mountable structures are the need for scheduling both access to the data and operator coverage to install and remove packs on the drives, as described in Section 1.2.2, Mountable Structure Sign-Up Log. There is also some risk that packs will be damaged during handling. After the system is operating and structures have been created, the operator responds to requests from users to mount and dismount structures. Section 4.5.5 describes how to place user directories on your mountable structures to obtain maximum availability to priority jobs. 4.5.1 Choosing Structure Names 4.5.1 Choosing Structure Names Each device on the system has a name, called the physical device name, which is used when giving commands to the software. Unlike the generic device name that applies to a class of devices, for example: TTY:, DSK:, LPT:, the physical device name applies to a particular device on the system; for example, TTY6: and LPT0:. The physical device names for disks are structure names. A structure name can be from one to six alphanumeric characters of your choice, and, like other device names, must be followed by a colon. The colon indicates to the software that a device is being used and not, for example, a file. It is important to carefully assign a unique name to each structure that you create. Section 4.5.2, Mounting Structures Having the Same Name, explains why this precaution avoids confusion for users if an operator is unavailable during timesharing. Because structure names are used in the device field (dev:) of a file specification, you should not create any structures with the same name as a defined (or valid) device name. Table 4-3 lists device names that may be defined in your system. For the same reason, avoid naming a structure with a defined logical name, for example, SYS:, SYSTEM:, NEW:, OLD:, HLP:, etc., because the system searches the list of defined systemwide logical names before device names. (Refer to Section 3.3 for a description of logical names.) Refer to Chapter 12, The Common File System, for structure-naming considerations in a CFS environment. 4-9 CREATING STRUCTURES CREATING STRUCTURES Table 4-3: Sample Device Names Table 4-3: Sample Device Names __________________________________________________________________ DSK: CDP: MTAn: FEn: MTn: TTY: LPT: TTYn: LPTn: PTYn: PLPTn: NUL: CDR: PLT: PCDRn: PLTn: PCDPn: DCN: TCP: SRV: Where n is the unit number of the device. __________________________________________________________________ To avoid duplication, you can get a list of all structure names known to the system by giving the operator command, SHOW STATUS STRUCTURE. These structures do not have to be online. Their presence in the listing indicates that they were previously specified in a SET STRUCTURE command, or once mounted on the system. 4-10 CREATING STRUCTURES CREATING STRUCTURES 4.5.2 Mounting Structures Having the Same Name 4.5.2 Mounting Structures Having the Same Name A situation may arise requiring you to mount a structure that has the same name as a structure that is already online. Perhaps another installation has requested that you mount its system structure (named SYSA:) for testing purposes, but you already have a structure named SYSA: online. Because the system notices ambiguous structure names, you must mount the structure under a different name. Each structure that is mounted is identified with two names: the physical identification and the alias. Usually, these names are the same. The physical identification is the actual structure name written in the HOME block of that structure. The alias is the name that you use to reference the structure while it is mounted. After a structure is mounted,it is known only by its alias. The MOUNT command is used to mount a structure and give it an alias different from the physical identification. This allows two or more structures with the same physical name to be mounted simultaneously. The system _______ distinguishes them by their different aliases. (The TOPS-20 __________ _____ Operator's Guide describes this procedure.) Note that the structures must be mounted one at a time. That is, structures cannot be online simultaneously before the MOUNT command is given. One of the structues must be mounted first. It may be necessary to power down disk drives and bring them up again. 4.5.3 Maximum Size of Structures 4.5.3 Maximum Size of Structures The maximum size of a structure is approximately 805,680 pages. A structure of this size requires 3 RP20 disk drives (5 spindles). Structures of the maximum size, however, may not be practical for your installation. Smaller structures enhance the reliability and availability of the system. Remember that you can have up to 64 structures on-line at one time. 4-11 CREATING STRUCTURES CREATING STRUCTURES Also, if a structure is contained on more than one disk pack, the packs and drive units for that structure must all be the same type, that is, either all RP06s, RP07s, RP20s, RA60s, or RA81s. For example, NOT SUPPORTED SUPPORTED ______ ______ ______ ______ | | | | | | | | | | | | | | | | | RP06 | | RP07 | | RP07 | | RP07 | | | | | | | | | | | | | | | | | |______| |______| |______| |______| STRUCTURE ADMIN: STRUCTURE ADMIN: Table 4-4 shows the maximum structure size using RP06, RP07, RP20, RA60, and RA81 disk drives. For all drive types, there can be 12,000 directories per structure and 5,000 files per directory. NOTE The number of directories per structure and files per directory that can be created is approximate. This is because the disk space needed to create a directory or file varies according to the lengths of the names chosen for directories and files. 4-12 CREATING STRUCTURES CREATING STRUCTURES Table 4-4: Maximum Size Structures Table 4-4: Maximum Size Structures __________________________________________________________________ Type of Max.No.Packs No. Pages Type of Max.No.Packs No. Pages Disk Drive Per Structure Per Pack Disk Drive Per Structure Per Pack __________________________________________________________________ RP04 6 38000 RP06 3 76000 RP07 1 216376 RP20 5 201420 RA60 6 90516 RA81 5 200928 __________________________________________________________________ 4.5.4 Increasing the Size of Structures 4.5.4 Increasing the Size of Structures You can add more disk packs to increase the size of a mountable structure (not the system structure) during timesharing. To do this, you must: o Dump the entire file structure onto magnetic tape using the DUMPER program o Run the CHECKD program, specifying the new configuration, to re-create the structure o Restore all the directories and files from magnetic tape using the DUMPER program IMPORTANT If possible, re-create the structure and restore the files to a different set of packs from the structure that you dumped. This precaution ensures that you do not lose any valuable data should you have problems reading the tape back to disk. That is, you still have the original structure intact and can rerun DUMPER and copy the structure to another tape. 4-13 CREATING STRUCTURES CREATING STRUCTURES To increase the size of the system structure, you must shut down the system and follow the installation procedure for bringing up this structure with more disk packs. Refer to Chapter 9, System _______ __ _____ _ ____________ _____ Problems/Crashes, and to the TOPS-20 KL Model B Installation Guide. 4.5.5 Setting Up Structures for Maximum Availability 4.5.5 Setting Up Structures for Maximum Availability Before you create structures and place user directories on them, you should determine which users must be on the system at all times. Place these users' directories and files on the system structure, or on another structure that is always available during timesharing. Divide the remaining users of the system by priority, and place their directories and files on the other structures. Although these users have log-in directories on the system structure, their large working area where they create and store files is on the other on-line structures. You may want to help users set up their LOGIN.CMD and BATCH.CMD files so that they can mount, connect, and access the appropriate directory on the structure where their files are located, if it is not the system structure. Dividing users into categories and placing them on structures accordingly ensures that the failure of one disk drive does not prevent the most important users from using the system. For example, if the drive that contains ADMIN: goes down, you can remove the ADMIN: pack from the broken drive, and mount it on another drive that contains a less critical structure. Also, on-line disk diagnostics can be performed during timesharing. Sometimes, the service engineer can dismount a non-critical structure, mount the maintenance pack, and perform preventive maintenance or trouble-shooting with only a portion of the user community off-line. To increase system availability, you can create another system structure for backup using the CHECKD program. After you create this structure, you should follow the procedures in your software installation manual for creating the front-end files area. The _______ __________ _____ TOPS-20 Operator's Guide describes using the CHECKD program to create a backup system structure. If you have problems with the primary system structure, having a second system structure available allows you to resume timesharing without reinstalling the system. The backup system structure can be mounted and online at all times under another name, or it can be kept in storage and mounted as a backup if the regular system structure is destroyed. If the backup system structure is kept in storage, the operator must update the structure periodically with the System Backup Tape and the latest incremental dumper tapes. (Chapter 7, System Backup, describes creating and using your System Backup Tape and incremental tapes.) Occasionally updating your backup system structure (in storage) keeps it reasonably up-to-date. 4-14 CREATING STRUCTURES CREATING STRUCTURES If you keep your backup system structure online at all times, and you have important files that are constantly accessed by the user community, you can improve your system performance by placing these files on the backup system structure. Now your swapping area and the files that you access frequently are not on the same disk. This procedure is useful with any structure that you keep on-line at all times. If multiple systems are part of a CFS configuration, refer to Chapter 12, The Common File System, for further discussion of placement of files and user directories. 4.5.6 Taking Structures Off-Line 4.5.6 Taking Structures Off-Line When a structure must be taken off-line, the operator should notify users that it will be dismounted at a certain time. Users should give the DISMOUNT command for the structure before the specified time. If the users do not cooperate, the operator can dismount the structure (via the DISMOUNT command to OPR) without leaving files in an unknown state. Files that are open simply become inaccessible, and the user who had the files open receives an error. For information on dismounting structures in a CFS environment, refer to Chapter 12, The Common File System. 4-15 CREATING STRUCTURES CREATING STRUCTURES 4.5.7 Mounting Structures from Another Installation 4.5.7 Mounting Structures from Another Installation If you mount a structure from another installation, or perhaps a structure that contains confidential data, some of the user names on this structure may match the user names on your system structure. You must mount this structure in what is called a FOREIGN state, to avoid the mishap of your users accessing directories that do not belong to them. The same is true if you bring one of your structures to another installation. You should have the operator at the installation SET the structure FOREIGN and then mount it. Figure 4-3 illustrates this concept. _________________________________ | | | YOUR INSTALLATION | | | | _________ _________ | _________ | | | | | | | | | | | | | __| | | | | SYSTEM | | PROG: | <----------| FOREIGN | | | STR: | | | __ | STR: | | | | | | | | | | |_________| |_________| | |_________| | | | | | DOMESTIC | |_________________________________| Figure 4-3: Domestic and Foreign Structures Figure 4-3: Domestic and Foreign Structures 4-16 CREATING STRUCTURES CREATING STRUCTURES A structure is brought online in one of two states, DOMESTIC or FOREIGN, according to the setting that the operator last specified for this structure with the SET STRUCTURE command. The system uses the FOREIGN state as the default if a SET STRUCTURE command has never been given for this structure. The structure remains in the specified state until the operator changes the state with the SET STRUCTURE or the UNDEFINE command. Note that the setting is unchanged across system crashes and reloads. You should bring a structure online as DOMESTIC only if the directories on that structure were created for the same people as those on the system structure. One can be a subset of the other, but a given directory name should represent the same person on both. Conversely, you should bring a structure on-line as FOREIGN if the directories on that structure were not necessarily created for the same people as those on the system structure. This is because a user who is logged into a directory on the system structure is the owner of an identically named directory on a DOMESTIC structure, and can give the CONNECT or ACCESS command to that directory without giving a password (provided the directory protection allows this type of access for the owner, which is the usual case). However, a user who logs into the system structure and gives the CONNECT or ACCESS command to a directory with an identical name on a FOREIGN structure must give the associated password. 4.6 SHARING STRUCTURES (DISK DRIVES) BETWEEN TWO SYSTEMS 4.6 SHARING STRUCTURES (DISK DRIVES) BETWEEN TWO SYSTEMS If you have two DECSYSTEM-20s and one or more structures that contain data common to both of these systems, you may want to set up your system to share disk drives alternately. For example, you could allow System A to use the drive that contains structure ADMIN: in the morning and allow System B to use this structure on the same drive in ___ _______ _______ ________ ______ ___ _____ __ ___ the afternoon. THE SYSTEMS CANNOT, HOWEVER, ACCESS THE DRIVE AT THE ____ ____ SAME TIME. (Refer to Chapter 12, The Common File System, for the exception.) Also, if one of your systems goes down, you can still use the drive that is connected to both systems. A drive that is to be shared by two systems must be supported by both systems. For example, you cannot connect an RM03 disk drive to a DECSYSTEM-2020 and a DECSYSTEM-2065 because the 2065 system does not support RM03s. Also, the shared drive must be dual-ported. Your field service representative must make the appropriate connections from each DECSYSTEM-20 to a port on the disk drive. Be sure to have the field service representative tell you which system is connected to which port on the drive. Figure 4-4 illustrates this connection. 4-17 CREATING STRUCTURES CREATING STRUCTURES ______________ / /| /_____________/ | | | | ---------- A --->| Dual-Ported | |<--- B ---------------------- | | DRIVE | | | | |_____________|/ | | | | ______________ ______________ | | | | | | | ------| DECSYSTEM-20 | | DECSYSTEM-20 |----- |______________| |______________| | | | | _____|_____ _____|_____ | | | | | FRONT-END | | FRONT-END | |___________| |___________| Figure 4-4: Shared Disk Drive Figure 4-4: Shared Disk Drive The port switch on this drive must be in either the A or B position, unless the systems are part of a CFS configuration. Otherwise, TOPS-20 will not permit either system to access the disk while it is in the A/B position. Error messages will be generated. To use the drive, place the port switch in the position that corresponds to the first system that is using the drive (A or B). The operator mounts a structure using the normal procedure. After the first system is no longer allowed to use the drive, the operator gives the DISMOUNT command for the structure. To use the drive on the second system, the operator leaves the pack on the drive (if you are using the same structure), turns the drive off-line, changes the port switch to the corresponding system, and turns the drive back on. Then, the operator (or a user) gives the MOUNT command to mount the structure on this system. The system automatically recognizes that another drive is on-line and mounts the structure. 4-18 CREATING STRUCTURES CREATING STRUCTURES 4.7 DETERMINING SWAPPING SPACE ON THE SYSTEM STRUCTURE 4.7 DETERMINING SWAPPING SPACE ON THE SYSTEM STRUCTURE Sections 4.7.1 and 4.7.2 describe what swapping space is and how to determine the amount of swapping space that you should allocate for your system. 4.7.1 What Is Swapping? 4.7.1 What Is Swapping? The number of user processes that can fit into main memory simultaneously depends on the size of the individual processes, the size of the memory-resident portion of the monitor, and the size of memory physically available. (Only a portion of the TOPS-20 monitor resides in main memory at one time.) If a user wishes to run a process that is not currently in memory, process space must be provided. This may necessitate moving some other process out of memory. The user's program or data that is transferred out of memory is placed on disk in the swapping area. The system sets aside a portion of the disk storage space on the system structure specifically for this purpose. On some timesharing systems, a program must be entirely in main memory to execute. Swapping then consists of moving entire programs between disk and memory. Under TOPS-20, only portions of a program (those containing the instructions and data currently being referenced) need be in memory. Other portions of the program are brought into memory from disk as they are needed. In this case, swapping consists of moving portions of a program or data between disk and memory. The monitor decides which portions of which programs to swap, and when. The size of a program is measured in a unit called a page. When swapping occurs, some of these pages are copied between memory and disk. 4.7.2 When to Increase Swapping Space 4.7.2 When to Increase Swapping Space For the most part, the size of your swapping space depends on the cumulative size of processes you estimate will be on the system at any one time. Table 4-5 contains guidelines for estimating the amount of swapping space required for an approximate number of user jobs based on typical requirements. This amount is given in response to the question, "HOW MANY PAGES FOR SWAPPING?" in the software installation procedures. The actual disk space used for swapping depends on the number of pages you give. The system rounds the number of pages given upward to an integral number of cylinders. The swapping space is divided equally among the disk packs in the system structure. 4-19 CREATING STRUCTURES CREATING STRUCTURES You can allow for swapping space on structures other than the system structure. However, this is necessary only if you plan to mount the structure as the system structure in the future. Allocating swapping space avoids re-creating the structure should you decide to mount it as the system structure. All the monitors are designed to default to an appropriate number of pages for swapping. In most cases, you can take this default. The guidelines in Table 4-5 apply to systems whose users perform many editing jobs and an average or small amount of debugging programs and production jobs. If your users perform a great number of debugging and production jobs and only a small amount of editing, you should double the size of your swapping space. However, if you double the size of your swapping space, check the maximum swapping space allowed _______ __ _____ _ ____________ for the monitor you are running. (The TOPS-20 KL Model B Installation _____ Guide lists the maximum number of swapping pages you can use with each monitor.) You cannot exceed this maximum. If you enter a number that is larger than the maximum, the monitor uses the maximum allowed. If you must exceed the maximum, you can bring up a larger existing monitor, or you can tailor your monitor by following the instructions in the BUILD.MEM file. This file is located in the documentation files saveset on the TOPS-20 Software Distribution tape. Table 4-5: Determining Swapping Space Table 4-5: Determining Swapping Space __________________________________________________________________ Estimated Recommended Number of Estimated Recommended Number of Number of Jobs Pages for Swapping* Number of Jobs Pages for Swapping* __________________________________________________________________ 20 or less 3000 21 to 30 4500 31 to 40 6000 41 to 50 7500 __________________________________________________________________ * For each additional 10 jobs, increase the number of pages for swapping by approximately 1,500. If disk space is available, it is better to overestimate the swapping space needed. If not enough swapping space has been reserved, system service may be disrupted. | If you include the ENABLE JOB0-CTY-OUTPUT command in the | n-CONFIG.CMD file, the operator is notified at the console terminal | when swapping space becomes low. 4-20 CREATING STRUCTURES CREATING STRUCTURES 4.8 DETERMINING THE AVAILABLE DISK SPACE 4.8 DETERMINING THE AVAILABLE DISK SPACE 4.8.1 Determining Disk Space Before Installation 4.8.1 Determining Disk Space Before Installation To determine the available disk space that you will have to divide among your users before installing the system, first calculate the swapping space required by your system (Section 4.7.2). Second, insert the number you calculated for swapping space into the formula shown in Table 4-6, and perform the appropriate steps. Table 4-6 outlines how to calculate the available disk space on the system structure. If you are calculating the available disk space on other structures, follow this same procedure but eliminate reserving space for any directories or areas that are not on that structure. If any possibility exists that a structure may be used as the system structure, reserve the swapping space. Note that if you plan to enable the "login structure" feature in a CFS-20 cluster (see Section 12.6.2), much more swapping space is available on the system structures. This is because user directories will reside on the shared login structure. NOTE Remember that as your system expands, the number of pages in the and directories increases. Also, the number of pages reserved for directory should be increased if: (1) you maintain large operator log files (2) users copy large numbers of files or large files to LPT:. A large backlog of user file retrieval requests can also use up much of the area. 4-21 CREATING STRUCTURES CREATING STRUCTURES Table 4-6: Calculating Available Disk Space Table 4-6: Calculating Available Disk Space _____________________________________________________________________ | TOTAL DISK SPACE: | | | | Number of RP06 disk drives * 76000 pages = ____________________ | | per drive TOTAL DISK SPACE | | | | _____OR:___________________________________________________________ | | Number of RP07 disk drives * 216376 pages = ____________________ | | per drive TOTAL DISK SPACE | | | | _____OR:___________________________________________________________ | | Number of RP20 disk drives * 201420 pages = ____________________ | | per spindle TOTAL DISK SPACE | | | | _____OR:___________________________________________________________ | | Number of RA60 disk drives * 90516 pages = ____________________ | | per drive TOTAL DISK SPACE | | | | _____OR:___________________________________________________________ | | Number of RA81 disk drives * 200928 pages = ____________________ | | per drive TOTAL DISK SPACE | | | | RESERVED DISK SPACE: | | | | Front-end file system = 950 | | | | Swapping Space = | | (Enter number of pages | | selected and allocated | | for swapping) | | | | = 1876 | | = 1780 | | = 2 | | = 2 | | = 500 | | = 1701 | | = 9 | | = 1000 | | ____________________ | | TOTAL RESERVED SPACE | | SUBTRACT TOTAL RESERVED SPACE | | FROM TOTAL DISK SPACE ____________________ | | AVAILABLE DISK SPACE | |_____________________________________________________________________| 4-22 CREATING STRUCTURES CREATING STRUCTURES 4.8.2 Determining Disk Space After Installation 4.8.2 Determining Disk Space After Installation Shortly after you have installed the system, you can log in as OPERATOR and give the command INFORMATION (ABOUT) DISK-USAGE. One line of output tells you the actual number of system pages that are available on the system structure. You can divide this disk storage among your users. (Refer to Chapter 5, Creating Directories.) However, be careful about over-allocating disk space on the system structure. If the space allowed to user directories exceeds the space free on the system structure after installation, then users can fill up the entire system structure. But if TOPS-20 cannot free up adequate space by expunging the system structure, then system service may be disrupted. Even if space can be freed to allow the system to keep running, some user programs may be disrupted. 4-23 5-1 CHAPTER 5 CHAPTER 5 CREATING DIRECTORIES CREATING DIRECTORIES A prospective user who requires access to the system must be assigned a user name (normally the user's surname), a password, an account, and disk storage quotas, and must have a directory created for him or her on the public structure. Optionally, you can assign certain capabilities and/or make the user or the user's directory a member of one or more groups. (Refer to Section 5.8 for a description of how to establish group relationships among users and Section 5.9 for a description of the capabilities you can assign to users.) You can also create additional directories for users on mountable structures. This chapter describes three methods you can use to create and maintain directories. Using one method, the operator creates and maintains all the directories on the system. A second method allows you to delegate the responsibility for creating and maintaining directories to project administrators. The third method combines the first two methods, thus providing additional flexibility. Sections 5.1 through 5.3 explain these methods and the determining factors for choosing one of them. These sections also include some of the decisions necessary to assign user names and capabilities, and how to allocate disk storage according to the method you use to create and maintain directories. (Refer to Chapter 4 to determine the amount of disk space available to divide among the directories you create.) Chapter 6 describes how to set up an accounting scheme and how to assign and validate accounts. You should read Chapter 6 if you want to allow users to log into the system and charge their computer usage to valid accounts immediately after you have created their directories. Refer to Chapter 12, The Common File System, for considerations in creating directories in a CFS-20 environment. 5-1 CREATING DIRECTORIES CREATING DIRECTORIES 5.1 HAVING THE OPERATOR CREATE AND MAINTAIN ALL DIRECTORIES (CENTRAL 5.1 HAVING THE OPERATOR CREATE AND MAINTAIN ALL DIRECTORIES (CENTRAL CONTROL) CONTROL) In this type of installation, the operator creates a directory on the public structure for each new user and specifies the appropriate parameters. The name of the directory is the same as the assigned user name. Each user informs the operator when a change to his directory parameters is required. This type of operation allows you _______ _______ as system manager to have central administrative control over all directories and parameters. Therefore, central control means that you or the operator create and maintain all the directories for all your system users. Central control has two types of directory schemes. One scheme allows you to create up to approximately 5,000 directories per structure. The other scheme allows you to use subdirectories and create up to approximately 12,000 directories per structure. NOTE The number of directories allowed per structure is approximate, because the disk space needed to create a directory or file varies. 5.2 DELEGATING THE CREATION AND MAINTENANCE OF DIRECTORIES TO PROJECT 5.2 DELEGATING THE CREATION AND MAINTENANCE OF DIRECTORIES TO PROJECT ADMINISTRATORS (PROJECT CONTROL) ADMINISTRATORS (PROJECT CONTROL) _______ An alternative type of installation involves project administrative _______ control. Under this type of control, the operator creates directories only for the users who have been designated as project administrators, (e.g., the representatives of major departments). The project administrators, in turn, create subdirectories for users within their departments or projects and control the assignment of those users' directory parameters. This type of control allows you to delegate the responsibility for creating and maintaining directories for other users and still maintain ultimate control over your system and its resources. Therefore, project control means that most of the directories created by you or the operator are project directories (e.g., MATH might be the assigned name of a project). The system's resources, such as disk space, are divided among these project directories either equally or according to the expected size of the project. Subdirectories are then created under project directories for users within the project. The people who have been appointed project leaders or administrators are responsible for creating, assigning parameters to, and maintaining the subdirectories within their project. The resources that you allocate to the project directory are divided among its subdirectories by the project administrators. Under project control, you are allowed to create up to approximately 12,000 directories (including subdirectories) per structure. 5-2 CREATING DIRECTORIES CREATING DIRECTORIES 5.3 COMBINING CENTRAL AND PROJECT CONTROL 5.3 COMBINING CENTRAL AND PROJECT CONTROL A combination of central and project control can be used if you want to keep the majority of the user directories at the management level of control and separate only a portion of your system into projects and administrative control. Therefore, combining central and project control means that the operator creates and maintains directories for most of the system users and creates project directories for special projects. The project administrators create directories under the project directories and are responsible for maintaining them. Combining the two types of control still allows up to approximately 12,000 directories per structure. 5.4 CENTRAL AND PROJECT CONTROL DESCRIPTIONS 5.4 CENTRAL AND PROJECT CONTROL DESCRIPTIONS Sections 5.4.1 through 5.4.4 describe the two types of central control, project control, and the combination of central and project control. Each description includes: o The determining factors for choosing a particular control o The directory format for each type of control o The procedure for assigning user names o The procedure for creating user directories o The procedure for creating files-only directories o The restrictions, if any, that apply to using a particular control Also, any additional considerations that apply to headings within each description are included. Read each description thoroughly. The first central control description contains very general information and suggestions that apply to all the directory schemes. 5-3 CREATING DIRECTORIES CREATING DIRECTORIES 5.4.1 Central Control 5.4.1 Central Control ___________ ________ DETERMINING FACTORS: o Your business installation is relatively uncomplicated; therefore, there is no need to separate projects and assign the creation and control of directories to various administrators. All the directories on the system are created and maintained by you or the system operator. o You are sure that the number of directories you need is less than approximately 5,000. _______ FORMAT: can point to approximately 5,000 directories per structure. All directories under are on one level. _________ ____ ______ ASSIGNING USER NAMES: The user name that you assign should include the user's last name. This convention is true for any type of directory scheme that you use. The system uses this name when recording the authors of files, sending mail to users, and displaying system status. If you follow this convention, you can easily identify who is using the system when you give a SYSTAT command. If just using last names will not result in duplications, you can simply use the last names. Otherwise, you might want to use the first and middle initials followed by the last name. (If a user has no middle initial, you can use a dash in its place.) It is most convenient for users when user names begin with unique characters, allowing use of "recognition" when typing user or directory names. Use of leading initials often yields this result. ________ ____ ____________ CREATING USER DIRECTORIES: All directories are created using the ^ECREATE command. (Only users who have WHEEL or OPERATOR capability enabled can use this command.) In the next example, the operator is connected to the public structure PUBLIC: and uses the ^ECREATE command to create a new directory named for the user who has been assigned the user name BECKER. Also, the operator assigns the password MARTIN. ______ _____ @ENABLE (CAPABILITIES) ________ ____________________ $^ECREATE (NAME) PUBLIC: [NEW] ________ ___________ $$PASSWORD MARTIN _____ $$ _______ _____ $DISABLE (CAPABILITIES) @ 5-4 CREATING DIRECTORIES CREATING DIRECTORIES This directory is called the user's logged-in directory and is always on the public structure. Whenever the user logs into the system, he is connected to this directory. He can remain in this directory or connect to and use files in another directory. _______ ________ _______ ________ _________ ______ Refer to the TOPS-20 Operator Command Language Reference Manual for a complete description of the ^ECREATE command that the operator uses to create new directories, and the ULIST program that prints information about all the directories on the system. After creating a new directory (either files-only or user), remember to update the tape containing the monitor, TOPS-20 Command Processor, DLUSER, DLUSER data, DUMPER, , and . (Refer to Chapter 7, System Backup Procedures.) _______________ CONSIDERATIONS: If two users have mistakenly been assigned the same user name and you try to create the second directory with this duplication, the system prints [OLD] instead of [NEW]. Give the ABORT subcommand, assign the user a slightly different user name, and reissue the ^ECREATE command with the new directory name. A common practice is to precede such names with the user's first initial. This allows recognition on the user or directory name without typing the entire name and the distinguishing character. For instance, if you have the two users Stephanie Sheldon and Andrew Sheldon, you should assign them the user names S-SHELDON and A-SHELDON or SSHELDON and ASHELDON rather than use the names SHELDON-S and SHELDON-A. ________ __________ ____________ CREATING FILES-ONLY DIRECTORIES: If a user wants to have a library area in addition to his logged-in directory, you can create a files-only directory on the public structure or on another structure. The user can gain owner privileges to this directory by giving the CONNECT command and the password associated with the directory. If the directory is located on a regulated mountable structure,the user must also give the MOUNT command to use the structure before he gives the CONNECT command. The user cannot give the ACCESS command for or log into a files-only directory. For example, if you have a user named BECKER who processes payroll on a regular basis, he may want to develop the payroll programs in his directory and keep the payroll data in a more restricted directory. To accomplish this, you can create on the public structure the logged-in directory and the files-only directory . The directory can be on some other structure, (e.g., ADMIN:). BECKER now has normal protection on his directory, more restrictive protection on the directory and can still CONNECT to by giving its password. BECKER cannot, however, give the ACCESS command for or log into . 5-5 CREATING DIRECTORIES CREATING DIRECTORIES The next example shows how to create the directory on the public structure MAIN:. ______ _____ @ENABLE (CAPABILITIES) ________ ___________________ $^ECREATE (NAME) MAIN: [NEW] ________ ___________ $$PASSWORD MONIES _____ _____ $$FILES (ONLY) __________ ___________ $$PROTECTION (OF DIRECTORY) 774000 _______ __________ ___________ $$DEFAULT (FILE) PROTECTION 770200 _____ $$ _______ _____ $DISABLE (CAPABILITIES) @ Now if user BECKER logs in and wants to use the files in , he can give the following CONNECT command: _______ ______________ @CONNECT (TO DIRECTORY) ___________ Password: monies _______ ________ _______ ________ _________ ______ The TOPS-20 Operator Command Language Reference Manual describes all the parameters you can give to directories and describes how to create directories on mountable structures. _______________ CONSIDERATIONS: When you create additional directories on mountable structures, consider if files-only directories are suitable. Some users will not want to give the CONNECT command to a directory each time they require owner access to the files in that directory. Also, files-only directories are members of groups only as directory group members and not user group members. Therefore, if you create ALL the directories on a structure as files-only, you cannot establish any valid user group relationships among those directories. (Refer to Section 5.8 for a description of setting up groups.) Conversely, if you create user directories, users can give the ACCESS command to their additional directory and gain owner and group privileges without connecting to the directory, and they can use other directories on the structure as group members. Also, if the name of the directory you create is the same as the user's logged-in directory, and the structure is mounted as DOMESTIC, the user does not have to specify a password when giving the CONNECT or ACCESS command to the directory. (Refer to Section 4.5.7.) This is valuable when the user is submitting a batch job. No password is required on the batch input; therefore, security is preserved. In addition to creating user directories on the structure, you can create files-only directories to be used as library areas. 5-6 CREATING DIRECTORIES CREATING DIRECTORIES It is also possible to create only one user directory on a structure and to create all other directories as files-only. In this case, all users required to use a files-only directory on the structure could give the ACCESS command to the user directory (gaining owner and group privileges), and use the files in a files-only directory according to the group protection codes set. This would be useful if you have a private structure that contains several library areas that are common to the owners of the private disk pack(s). Each owner could give the ACCESS command for the one user directory and gain group privileges to all the library directories. Therefore, these users would need only one password to gain access to all the information on the pack. Note that defined groups may provide better security controls than passwords. If the password for the ADMIN: directory is MONIES, it might be guessed, or user BECKER may write it down or tell it to some other user. On the other hand, group membership can be centrally controlled, and the access can be withdrawn, if necessary. Also, the directory structure provides a record of group memberships, which can be displayed with the ULIST program. Wise use of directory protections can allow user members of a group to connect to a files-only directory without giving a password. _______ ______ _____ _______ ________ _________ Refer to the TOPS-20 User's Guide or the TOPS-20 Commands Reference ______ Manual for a complete description of the CONNECT and ACCESS commands. _____________ RESTRICTIONS: The number of directories you create per structure cannot exceed approximately 5,000. This number is an approximation because the disk space that it takes to create a directory or file varies. 5.4.2 Central Control Using Subdirectories 5.4.2 Central Control Using Subdirectories ___________ ________ DETERMINING FACTORS: o As stated in the previous directory scheme, your installation does not warrant segregation of projects and control. However, this directory scheme allows more directories per structure than the previous central control scheme. You or the operator can create up to approximately 12,000 directories per structure and assign and maintain all the directory parameters. o You can easily expand into a form of project control by adding project directories, and still maintain control at the management level over the majority of the user directories. (Refer to Section 5.4.4, Combined Central and Project Control.) 5-7 CREATING DIRECTORIES CREATING DIRECTORIES _______ FORMAT: points to 26 directories. The name of each directory is a letter of the alphabet, , , , ..., . The directories point to all user and files-only directories. The single-letter directories are on one level below . The user and files-only directories are on a second level below and are pointed to by the alphabetic directories. Also, the directories pointed to by the single letter directories, (e.g., ), can be allowed to create directories under them. Perhaps user A. JONES wants to create one or two subdirectories to store special files, such as memos. The user is responsible for maintaining the directory he created and is allowed to use only the disk quota you originally allocated to his logged-in directory. Refer to Section 5.4.3, Project Control, if you would like to allow some users to create directories of their own. _________ ____ ______ ASSIGNING USER NAMES: Each user name that you assign should be as close as possible to the user's last name prefixed by a first initial and a period. For example, Charles Baker would be assigned the user name C.BAKER. Under this type of directory scheme, you must follow the principle of prefixing the name with the first initial and a period. ________ ____ ____________ CREATING USER DIRECTORIES: Have the operator create 26 directories using the ^ECREATE command. The name of each directory is a letter of the alphabet, that is, through . The theory behind creating these alphabetic directories is the same as described in Section 5.4.3. That is, you must create directories that are allowed to have subdirectories. The directories , , ..., can have approximately 5,000 user and files-only directories under them. Therefore, you must include some of the same parameters in these directories, as you would in project directories. _______ ________ _______ ________ _________ ______ Refer to the TOPS-20 Operator Command Language Reference Manual for a complete description of the parameters that are defined when the operator uses the ^ECREATE command to create directories, and the ULIST program that prints information about all directories on the system. The procedures for creating the alphabetic directories and the user and files-only directories under them are described below. In the example, COMMON: is the name of the public structure. 5-8 CREATING DIRECTORIES CREATING DIRECTORIES NOTE The general considerations described in Section 5.4.1 for creating directories are also applicable to this directory description. Even though the alphabetic directories are not associated with users, they must be created as log-in directories. However, do not assign passwords. This prevents users from gaining access to these directories. ______ _____ @ENABLE (CAPABILITIES) ________ _______________ $^ECREATE (NAME) COMMON: [NEW] $$ Assign each directory a large number for creating subdirectories, for example, 400. _______ ______________ ________ $$MAXIMUM SUBDIRECTORIES (ALLOWED) 400 Because many user directories are created under each of these alphabetic directories and the page quota (disk space) from these alphabetic directories is divided among (or passed on to) the user directories, you must assign the alphabetic directories a very large permanent and working page quota. Assigning them a sufficiently large page quota prevents any of these alphabetic directories from exceeding their page quota, thus requiring you to make a change to the quota at a later time. Therefore, assign each directory at least 500,000 pages of permanent and working disk page quota. _________ ___________ $$PERMANENT (DISK STORAGE PAGE LIMIT) 500000 _______ ___________ $$WORKING (DISK STORAGE PAGE LIMIT) 500000 Assign a list of SUBDIRECTORY-USER-GROUP numbers to each directory. The list should be the same for each directory. The range of numbers you use depends on how many groups you plan to establish, (e.g., 5 groups, 10 groups, 40 groups). The numbers used in the following examples are for illustration; you can choose any sequence: _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 200 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 201 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 202 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 203 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 204 Later, when you create a user directory and place that user in a user group, you must enter one of the numbers in this list. No other numbers will be valid. (Refer to Section 5.4.3, for a more detailed description of why you are using this list of numbers, and Section 5.8 for establishing valid group relationships.) 5-9 CREATING DIRECTORIES CREATING DIRECTORIES In the following example, the operator is connected to the public structure COMMON: and creates the first two directories, and : ______ _____ @ENABLE (CAPABILITIES) ________ _______________ $^ECREATE (NAME) COMMON: [NEW] ______________________ ________ $$MAXIMUM-SUBDIRECTORIES (ALLOWED) 400 _______ ___________ $$WORKING 500000 _________ ___________ $$PERMANENT 500000 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 200 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 201 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 202 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 203 _______________________ ________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 204 _____ $$ $ ________ _______________ $^ECREATE (NAME) COMMON: [NEW] ___ ___ _____ $$MAX 400 !You can use abbreviations _______ ___________ $$WORKING 500000 _________ ___________ $$PERMANENT 500000 ___ ________ $$SUB 200 ___ ________ $$SUB 201 ___ ________ $$SUB 202 ___ ________ $$SUB 203 ___ ________ $$SUB 204 _____ $$ $ !Continue creating directories $ !through in exactly the same manner. After all 26 directories are created, you can give the DIRECTORY command to see all the directory files that have been created under . ___ _______________________ $DIR COMMON: COMMON: A.DIRECTORY.1 B.DIRECTORY.1 C.DIRECTORY.1 . . . Z.DIRECTORY.1 Next, after all 26 alphabetic directories have been successfully created, the operator again uses the ^ECREATE command and creates all the user directories. 5-10 CREATING DIRECTORIES CREATING DIRECTORIES In the example below, the operator is connected to the public structure COMMON: and creates a directory named for the user who has been assigned the user name A.JONES. This directory is A. Jones' log-in directory on the public structure. Each time A. Jones logs into the system, he is connected to directory . In this example, the operator also assigns the password 2BY4. The operator gives the directory the system default of 250 pages for both working and permanent disk quota. Because he is using the default, he does not have to make any entries for these two parameters. The 250 pages given to this directory are taken from the superior directory's quota (directory ). (The PRESERVE subcommand can be issued to avoid having the disk space quota subtracted from the superior directory's allocation.) The operator also places user A.JONES in user group 202 and places directory in directory group 202. ______ _____ @ENABLE (CAPABILITIES) ________ _____________________ $^ECREATE (NAME) COMMON: [NEW] ________ _________ $$PASSWORD 2BY4 _____________ ________ $$USER-OF-GROUP (NUMBER) 202 _______________ ________ $$DIRECTORY-GROUP (NUMBER) 202 _____ $$ _______ _____ $DISABLE (CAPABILITIES) @ After creating any new directories (either files-only or user), you should update the backup tape that contains the monitor, TOPS-20 Command Processor, DLUSER, DLUSER data, DUMPER, , and . (Refer to Chapter 7, System Backup Procedures.) _______________ CONSIDERATIONS: If users have duplicate first initials and last names, you can use middle initials. For example, if two users have the name C.BAKER, you can assign either one of them a user name in the form CL.BAKER or C.LBAKER. If you use the form CL.BAKER you must create a directory in addition to directory . If you do not create this additional directory with the user's first and middle initial, you will receive error messages and will not be able to create the directory . If, instead, you assign user Baker the user name C.LBAKER (the preferred method), you can create the directory as described above using the standard procedure. You do not need to create the additional directory . Alternatively, you could create two levels of "initial" directories, and assign users to third-level directories based on their first and middle initials followed by their last names, for example, C.L.BAKER. If a user requires special capabilities to perform privileged functions, the operator can include the parameter for the capability in the user's directory accordingly. (Refer to Section 5.9 for a description of the capabilities you can assign to certain users who require them.) 5-11 CREATING DIRECTORIES CREATING DIRECTORIES ________ __________ ____________ CREATING FILES-ONLY DIRECTORIES: If a user wants a library area in addition to the logged-in directory, you can create a files-only directory. Files-only directories can also be prefixed by a letter and a period. Because the first name initials of users do not always encompass every letter in the alphabet, you may want to use those infrequently used letters as the prefix to the files-only directories, e.g., or . Alternatively, you can place the files-only directories under a special prefix, such as LIB., or place them directly under the root directory. The example below shows how to create the directory on the public structure PUBLIC:. The operator assigns the password SQUASH, makes the directory files-only, takes the 250-page default for working and permanent disk storage quotas, and places the directory in directory group number 202. (User members of groups 202 can now accesss this directory and the files it contains according to group protections.) ______ _____ @ENABLE (CAPABILITIES) ________ ______________________ $^ECREATE (NAME) PUBLIC: [NEW] ________ ___________ $$PASSWORD SQUASH _______________ $$FILES-ONLY _______________ ________ $$DIRECTORY-GROUP (NUMBER) 202 _____ $$ _______ _____ $DISABLE (CAPABILITIES) @ _______ __________ _____ Follow the procedures in the TOPS-20 Operator's Guide for creating directories on mountable structures. _______________ CONSIDERATIONS: The CONSIDERATIONS described in the previous central control description (Section 5.4.1) for files-only directories also apply to this description. 5-12 CREATING DIRECTORIES CREATING DIRECTORIES If the number of files-only directories you want to create is small, you can create them on the same level as the alphabetic directories. That is, can be created as . Your directory scheme may look like: ------------------ | | | | | | ... ... -------------------------- | | | | or: ... ... ... --------- | | _____________ RESTRICTIONS: The number of directories you can create per structure cannot exceed approximately 12,000. The number of subdirectories under a single-letter directory, for example, , cannot exceed approximately 5,000. If you reach the maximum number of directories allowed per structure, the system prints the message: ?MAXIMUM DIRECTORY NUMBER EXCEEDED -- INDEX TABLE NEEDS EXPANDING 5-13 CREATING DIRECTORIES CREATING DIRECTORIES If you reach the maximum number of subdirectories that a single letter directory can point to, the system prints the message: ?SUPERIOR DIRECTORY FULL You can define up to only 40 user groups with the ^ECREATE command, because all the user groups must be specified as subdirectory user groups in the superior single-letter directory. This is not as great a problem when all the user directories are directly under the ROOT-DIRECTORY. If you make a superior directory FILES-ONLY, be sure to make all its subdirectories FILES-ONLY. Otherwise, you will be unable to recreate the subdirectories (refer to Chapter 9) if the structure is damaged, until all the superior directories are made not FILES-ONLY. 5.4.3 Project Control 5.4.3 Project Control ___________ ________ DETERMINING FACTORS: o The complexity and perhaps geography of your organization warrants separating small or large groups of users into projects. The responsibility for creating and maintaining the directories within a project can be given to an administrator. This is especially helpful if a large number of users have directories on the system. This method frees the operator from spending an excessive amount of time creating directories and changing directory parameters. o Even though you delegate the task of creating and managing groups of directories to project administrators, you still maintain ultimate control of the overall system and its resources. This means that you still determine and allocate the disk space that each project uses. The administrator distributes the disk space you allocate to directories within the project. Also, administrators can create and maintain directories for their projects without having WHEEL or OPERATOR capabilities by using the TOPS-20 BUILD command. Therefore, you do not weaken the security of your system. Unless you give WHEEL or OPERATOR capabilities to an administrator, he cannot assign those capabilities to other users. 5-14 CREATING DIRECTORIES CREATING DIRECTORIES o In addition to allowing administrators to create directories for a project, you can allow other users of the system to create subdirectories. These users can separate and store files in a subdirectory. According to the protection they place on their subdirectories, they can share their files with other users without losing the security of their superior directory. The users are responsible for maintaining the directories they create. o Up to 12,000 directories (including subdirectories) can be created per structure. _______ FORMAT: can point to approximately 5,000 directories per structure. Each directory under can point to approximately 5,000 subdirectories. Each subdirectory can also point to approximately 5,000 subdirectories directly under it. The number of subdirectory levels is determined by a maximum length of 39 alphanumeric characters, because each subdirectory name contains the name or names of any superior directories above it. For example, the user who owns directory under creates the subdirectory . The new subdirectory name (LAB-12) has its superior directory's name (PHYSICS) as its prefix. The period separates the different levels of the directory name and is counted as one of the characters in the directory name. _________ ____ ______ ASSIGNING USER NAMES: The names that you assign to users should be as close as possible to the user's last name. In addition, the project names that you assign and that will be used for project directory names should be closely related to the project, e.g., PHYS might be used for Physics and PHYED for Physical Education. When you give a SYSTAT command, the user surnames and obvious project names make it easier to identify who is using the system, and under which project. ________ _______ ___ ____ ____________ CREATING PROJECT AND USER DIRECTORIES: The user and project directories that points to (first-level directories) are created by you or the operator using the ^ECREATE command. 5-15 CREATING DIRECTORIES CREATING DIRECTORIES The procedures you should use and the parameters that you must include in these directories are described below. Create all project directories as log-in (user) directories. You would not create a project directory as files-only, because files-only directories cannot have log-in directories created under them. However, log-in project (or user) directories can have both log-in and files-only subdirectories. Assign a disk storage quota to each project directory. This quota must be large enough to accommodate both the files that are contained in the directory and the directories that are created under it. Each time a directory is created under a project directory, that directory's disk quota is taken from the project directory's disk quota. The total disk quota for directories created under a project directory cannot exceed the quota originally given to the project directory. In the example below, the operator begins to create the project directory . He creates the directory as a log-in directory on the public structure ORANGE: and assigns the password H20. This procedure allows an administrator to log into the directory, giving its password, and create the required subdirectories. He may also want to store his files in this directory. The operator gives the directory a 10,000-page working and a 10,000-page permanent disk storage quota. ______ _____ @ENABLE (CAPABILITIES) ________ __________________ $^ECREATE (NAME) ORANGE: [NEW] ________ ________ $$PASSWORD H20 _______ __________ $$WORKING 10000 _________ __________ $$PERMANENT 10000 $$ Next, the operator enters the parameter that allows the owner of the project directory to create subdirectories. This parameter, called MAXIMUM-SUBDIRECTORIES (ALLOWED), specifies how many directories can be created under the directory. Unless you enter this parameter (the default is 0), the owner of the directory cannot create subdirectories. For example, all users of the system can type the BUILD command to the TOPS-20 Command Processor, but only those users who have the MAXIMUM-SUBDIRECTORIES (ALLOWED) parameter in their directory with a number greater than zero can actually use the BUILD command to create subdirectories. 5-16 CREATING DIRECTORIES CREATING DIRECTORIES The following entry in the sample project directory allows the administrator to create 100 subdirectories. ______________________ ________ $$MAXIMUM-SUBDIRECTORIES (ALLOWED) 100 The administrator who is responsible for this sample project might create 60 directories under the project directory and give each subdirectory approximately 50 pages of working and permanent disk quota. He keeps enough pages in the project directory to allow that directory's files to grow and to create additional subdirectories. _______ ________ _________ ______ (Refer to the TOPS-20 Commands Reference Manual for the description of the BUILD command, including distributing working and permanent storage quotas and maximum subdirectory quotas.) Also, some of the MAXIMUM-SUBDIRECTORIES (ALLOWED) quota given to the project directory can be given to a subdirectory so that directories under it can be created. The quota for the project directory is decremented by the amount of quota given to the subdirectory. For example, directory is given a subdirectory quota of 100. The administrator creates the directory under and gives the directory a subdirectory quota of 10. The number of subdirectories that can now be created under is 89. If the administrator creates another subdirectory under called and gives that directory a subdirectory quota of 6, the number of subdirectories that can now be created under is 82. ___________ _________ ______ If the administrator gives an INFORMATION (ABOUT) DIRECTORY command, the output line for maximum subdirectory quota is: MAXIMUM NUMBER OF SUBDIRECTORIES ALLOWED 84 The two directories and that were created under account for the two subdirectories not shown in the subtraction. Next, the operator enters the parameter that allows the administrator for this project to place users in groups. The administrator can use the group facility as described in Section 5.8 to set up library directories and allow file sharing among members of the project. The SUBDIRECTORY-USER-GROUP parameter accepts a number between 1 and 262143 as its argument. You can list a range of numbers that the administrator can use to establish groups within the project; however, you must enter each number separately. Be careful to assign a range of numbers that is unique to that project. For example, project directory may be given the range: 5-17 CREATING DIRECTORIES CREATING DIRECTORIES _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2600 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2601 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2602 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2603 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2604 Project directory may be given the following range of numbers different from project CHEM. _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 3001 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 3002 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 3003 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 3004 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 3005 If you assign the same range of numbers to different projects, you can cause a security break among projects. For example, a user in group 2602 in project CHEM should not be able to access, as a group member, the directories and files in project PHYSICS. The range of numbers placed in a project (or user) directory's parameter list does not imply that the directory or any of its subdirectories has access to those groups. It means only that the administrator (or owner of the directory) can use those group numbers to establish group relationships among that directory and its subdirectories. The following example shows the completed parameter list for the sample project directory : ______ _____ @ENABLE (CAPABILITIES) ________ __________________ $ ^ECREATE (NAME) ORANGE: [NEW] ________ ________ $$PASSWORD H20 _______ __________ $$WORKING 10000 _________ __________ $$PERMANENT 10000 _______ ______________ ________ $$MAXIMUM SUBDIRECTORIES (ALLOWED) 100 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2600 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2601 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2602 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2603 _______________________ _________ $$SUBDIRECTORY-USER-GROUP (ALLOWED) 2604 _____ $$ _______ _____ $ DISABLE (CAPABILITIES) @ _______ __________ _____ Refer to the TOPS-20 Operator's Guide for a complete description of the ^ECREATE command that the operator uses to create new directories, and the ULIST program that prints information about all the directories on the system. 5-18 CREATING DIRECTORIES CREATING DIRECTORIES After creating a new directory (either user or files-only), remember to update the backup tape that contains the monitor, TOPS-20 Command Processor, DLUSER, DLUSER data, DUMPER, , and . (Refer to Chapter 7, System Backup Procedures.) _______________ CONSIDERATIONS: If two projects or users have mistakenly been assigned the same name, and you try to create the second directory with this duplication, the system prints [OLD] instead of [NEW]. Give the ABORT subcommand, assign the user or project a slightly different name, and reissue the ^ECREATE command with the new directory name. A subdirectory is just like any other directory. It can be logged into (if it is not specified as files-only), it can be a member of user and directory groups, and it obeys the usual protection mechanisms. Therefore, there are no implied rights between a directory and its subdirectories, or between two subdirectories of the same directory. Files have three protection fields: owner, group, and world; and each directory has the same three protection fields. Refer to Section 5.7 for a description of directory and file protections. The only additional rights that the owner of a directory has over that directory's subdirectory is the power to change its parameters (e.g., directory protection, password, or group memberships), or to use the KILL subcommand, which deletes the subdirectory. 5-19 CREATING DIRECTORIES CREATING DIRECTORIES If you or another user choose to delete a directory, you must first delete any subdirectories under the directory. You cannot delete a directory or subdirectory that has existing subdirectories. This protection insures that someone (possibly an administrator of a project) does not accidentally delete a directory that points to a large portion of the database. The operator or administrator must connect to the directory immediately above the lowest level subdirectory to begin deleting any directories. For example, if the owner of the directory wants to delete the directory , he must first connect to directory and delete any of its subdirectories. Then, he connects to directory and gives the KILL subcommand to delete directory . Note that the operator is the only person who can delete the directory . If you or the administrator choose to grant special capabilities to a user, you can include the parameter for the capability in the user's directory. (Refer to Section 5.9 for a description of the capabilities you can assign to certain users.) You should instruct the administrator to inform you when special capabilities are given to a system user. You are protected against users randomly giving other users special capabilities, because the operator or the administrator who assigns special capabilities to a user must have (as a user) those same capabilities. A person with WHEEL or OPERATOR capabilities can assign any capability to another user. Also, the user or operator who is assigning the capabilities must have those capabilities enabled at the time the privileged parameter is entered into the user's directory. Once a SUBDIRECTORY-USER-GROUP number has been allocated to a project directory, be careful about removing it. If it is in use in any of the subdirectories, either as a USER-OF-GROUP number or as a SUBDIRECTORY-USER-GROUP number, you will be unable to recreate the subdirectories (refer to Chapter 9) if the structure is damaged, until you manually restore the SUBDIRECTORY-USER-GROUP number into all the superiors. 5-20 CREATING DIRECTORIES CREATING DIRECTORIES ________ __________ ____________ CREATING FILES-ONLY DIRECTORIES: Administrators or users can have library areas in addition to their logged-in directories. They can use the BUILD command and create files-only directories under their logged-in directories, provided you have given them the capability to do so by adding the MAXIMUM SUBDIRECTORIES (ALLOWED) parameter to the directory that will contain the subdirectories. _______________ CONSIDERATIONS: Refer to the CONSIDERATIONS under the first description of Central Control, Section 5.4.1. These considerations also apply to Project Administrative Control. _____________ RESTRICTIONS: o You cannot exceed approximately 12,000 directories per structure. o The number of directories that a superior directory points to cannot exceed approximately 5,000. If you reach the maximum number of directories that you can create on a structure, the system prints the message: ?MAXIMUM DIRECTORY NUMBER EXCEEDED -- INDEX TABLE NEEDS EXPANDING If either you or an administrator reach the maximum number of directories that can be created under a superior directory, the system prints the message: ?SUPERIOR DIRECTORY FULL o Files-only directories cannot have log-in subdirectories. If you want to allow a user to create user (log-in) subdirectories under his directory, you must make his directory a log-in directory. 5-21 CREATING DIRECTORIES CREATING DIRECTORIES 5.4.4 Combined Central and Project Control 5.4.4 Combined Central and Project Control ___________ ________ DETERMINING FACTORS: o Only a portion of your organization warrants being separated into projects. The directories for the majority of the user community are created and maintained at the central management level. But, where project administration is appropriate, the task of creating and managing directories within a project is given to administrators. o For example, if your company has groups of users with terminals in several distant locations, you may want to have the administrator at the remote location create and maintain all the directories for that site. You can create a project directory for the remote location, perhaps using the name of the site as the project directory name (for example, or , , ...). The remaining user directories at the central location are created by the system operator. _______ FORMAT: points to all the project directories and 26 alphabetically named directories, through . The project directories point to the user and files-only directories that an administrator creates for a given project. The directories through point to user and files-only directories created and maintained by the operator. These directories can also be allowed to have subdirectories. _________ ____ ______ ASSIGNING USER NAMES: If you create any user directories that are pointed to by , assign project names and user names in the same manner as described under Project Control, Section 5.4.3. Again, assign the 26 directories that will point to the majority of the user directories, the names , , .... . The user names that will be the directory names under the alphabetic directories should, as previously stated, be the user's surname prefixed by a first initial and a period. (Refer to Section 5.4.2, Central Control Using Subdirectories.) ________ ____ ___ __________ ____________ CREATING USER AND FILES-ONLY DIRECTORIES: Create the user, files-only, and through directories by following the instructions in Section 5.4.2. Create the project directories according to the instructions in Section 5.4.3, and distribute the description of the BUILD command _______ ________ _________ ______ (TOPS-20 Commands Reference Manual) to the administrators who are responsible for creating the user directories within their project. 5-22 CREATING DIRECTORIES CREATING DIRECTORIES _______________ CONSIDERATIONS: All the considerations that apply to both Central and Project Control also apply to combining the two types of control. You may want to allow users whose directories are created by the operator to create several directories under their logged-in directories. For example, user A.SMITH creates the subdirectory to store files that he wants to keep separate from his programming files. This user uses the BUILD command to create the number of subdirectories that he is allowed to create and divides the quota for his logged-in directory among the directories he creates. In general, users can store files in these directories or, if they set the appropriate protection, can share the files in these directories with other users. _____________ RESTRICTIONS: Combined Central and Project Control allows up to approximately 12,000 directories per structure. The number of directories that a superior directory can point to cannot exceed approximately 5,000. If you reach the maximum number of directories per structure, the system prints the message: ?MAXIMUM DIRECTORY NUMBER EXCEEDED -- INDEX TABLE NEEDS EXPANDING If you reach the maximum number of directories that a superior directory can point to, the system prints the message: ?SUPERIOR DIRECTORY FULL 5.5 ALLOCATING DISK STORAGE QUOTAS 5.5 ALLOCATING DISK STORAGE QUOTAS In Chapter 4 you determined the amount of disk space that is available on the system structure after installation. Once you know the available disk space, you can decide how to allocate it among the directories you create. Each directory is given a number of pages for both working-storage and permanent-storage allocations. Working storage refers to the disk space that a user can have during the time he is logged-in. Permanent storage refers to the total disk space that a user can have to store files after he has logged-out. 5-23 CREATING DIRECTORIES CREATING DIRECTORIES The number of pages that you should assign to directories depends on whether you (or the operator) are creating all the directories on the system (central control) or you are delegating the task of creating and maintaining directories to project administrators (project control). When using central control, you may divide the disk space equally among directories, giving regard to special requirements of certain users. In the case in which the operator creates project directories, you should allocate a disk quota large enough to accommodate the expected size of each project. Remember that project directories must distribute their disk space to the directories created under them. Several important points about working and permanent allocations are discussed below. Assign a large (2000-3000 page) working-storage allocation to users who perform considerable sorting because the temporary files required for this operation can occupy substantial disk space. As the number of users on the system increases and your disk space on the public structure becomes low, you can decrease the working-storage and permanent allocations on the public structure to add new log-in directories. If you have additional disk drives not used by the public structure, you can accommodate the directories with many or large files by creating other structures and directories. Users will log into their directories on the public structure, request the operator to mount the proper structure using the MOUNT command, and access their additional directories with the ACCESS and/or CONNECT command. Note that in setting up the system, it is easier to accustom users from the start to use other structures than to reorganize the structures and retrain users after space has run out on the public structure. 5.6 ENFORCING DISK STORAGE QUOTAS 5.6 ENFORCING DISK STORAGE QUOTAS Working-storage allocations are strictly enforced. Users cannot exceed their working-storage allocations unless they enable WHEEL or OPERATOR capabilities. (Refer to Section 5.9 for a description of the special capabilities that can be given to users who require them.) If users request additional space, you can increase their allocations as required. If a user exceeds his working-storage allocation and attempts to create or change a file, the system prints the following error message: ?QUOTA EXCEEDED The user must decrease his disk usage to less than the working-storage allocation for the directory (in which the file is being changed or created) before he can create or change any more files. 5-24 CREATING DIRECTORIES CREATING DIRECTORIES The system informs a user if he is over this permanent storage allocation when he logs off the system or connects to a different directory. The system prints the following message after the CONNECT or LOGOUT commands: OVER PERMANENT STORAGE ALLOCATION BY nn PAGES This message reminds users that although they may not be over their working-storage allocation, they have exceeded their expected total disk usage. Users should delete any files that are unnecessary for their job. Also, because permanent quotas are not enforced, it is wise to instruct the operator or administrator to police each directory's disk usage. The operator should run the CHKPNT program _______ daily to keep a record of each directory's disk usage. The TOPS-20 __________ _____ Operator's Guide contains the description of running the CHKPNT program. If you are using the file migration facility (refer to Chapter 8), you may want to run the REAPER program with the TRIM command to force users to stay below their permanent quotas. Every time the available disk space on the system structure is less than 500 pages, the system prints the following warning messages: 13-Jun-98 10:20:33 Disk space low on structure STR:, 122 free [STR: Deleted files will be expunged from structure STR: in 30 seconds] After 30 seconds, the system starts expunging any deleted files in all directories on the structure mentioned in the warning message. The system prints this message when the expunging is complete: [STR: Expunge of structure STR: completed] The operator gets the following message: 13-Jun-89 10:59:59 Expunge completed for structure STR:, 1993 free If anyone tries to create or change a file when there is no more disk space available, the system prints an error message similar to the one below: ?FILE OR SWAPPING SPACE EXCEEDED Again, the operator or administrator should check to see how many users are over permanent allocations. Also, if you are using the file migration facility, you may want to migrate files on the system more frequently if you are constantly running low on systemwide disk space. (Refer to Chapter 8 for a description of file migration.) 5-25 CREATING DIRECTORIES CREATING DIRECTORIES 5.7 PROTECTING DIRECTORIES AND FILES 5.7 PROTECTING DIRECTORIES AND FILES Every directory and file has a protection number associated with it. The system uses a default protection number for each directory and file when the directory or file is created. Whenever a user accesses a file, the system first checks the directory protection. If that protection allows the user the appropriate access to the directory, the system then checks the protection of the individual file. 5.7.1 Directory and File Protection Digits 5.7.1 Directory and File Protection Digits The directory and file protection numbers have three 2-digit fields. The first field applies to the owner of the directory or file, the second field to members of the same group as this directory, and the third field to all other users (or world). Protection Code ____________________________________ | dd | dd | dd | ____________________________________ Owner Group World The default protection for directories and files is 777700. A directory or file protection of 77 in any given field allows full access. For example, the default protection allows the owner and members of his group full access but all other users no access. Protection Code ___________________________________ | 77 | 77 | 00 | ___________________________________ Owner Group World 5-26 CREATING DIRECTORIES CREATING DIRECTORIES Table 5-1 contains a list of the directory protection digits. Table 5-1: Directory Protection Digits Table 5-1: Directory Protection Digits __________________________________________________________________ Digits Privilege Digits Privilege __________________________________________________________________ 04 Permits creating files in the directory. 10 Permits connecting to the directory without giving a password and changing the accounts and protection numbers of the files therein. Thus it gives many of the privileges the directory owner has. (Refer to the _______ _______ _____ _________ ______ TOPS-20 Monitor Calls Reference Manual.) 40 Permits, subject to the protection on the individual file, listing the names of the files with the DIRECTORY command and reading the file, e.g., via the TYPE, PRINT, or LIST commands. __________________________________________________________________ These protection codes are actually bits in a protection word. To get more than one protection, add the digits (octal) corresponding to the protection you want. Thus, 44 allows listing the files and creating new files. There are unused bits in the protection number; therefore, to provide complete access to files, use 77. Useful digit pairs are: 00 Permits no access. 40 Permits the files to be listed and read. 77 Permits full (owner) access. A file protection number has the same format as a directory protection number, but the meanings of the digits are different. Table 5-2 contains a list of file protection digits. 5-27 CREATING DIRECTORIES CREATING DIRECTORIES Table 5-2: File Protection Digits Table 5-2: File Protection Digits __________________________________________________________________ Digits Privilege Digits Privilege __________________________________________________________________ 02 Permits wildcarding of the file. 04 Permits appending to the file. 10 Permits executing the file. 20 Permits writing and deleting the file. 40 Permits reading the file. __________________________________________________________________ Obtain a protection number by adding the file protection digits of the different protections you need. For example, protection number 775200 allows the owner full privileges; the members of the same group reading, executing, and directory listing privileges; and all other users no privileges. Useful digit pairs are: 00 Permits listing the file with the DIRECTORY command only if the file is specified explicitly and completely. 12 Permits executing and using the DIRECTORY command to list the file only. This protection is useful when, for example, you purchase a program and agree in your contract not to allow any of your system users to read, write into, or copy the file. Set the protection on an execute-only file to 771212. The TOPS-20 Beware file provides additional considerations for setting up execute-only files. 52 Permits reading, executing, and using the DIRECTORY command to list the file. 77 Permits full access. The system checks protection numbers starting with the two rightmost digits. Therefore, users do not restrict members of a group by assigning the file protection 770052, because the group gets at least the execute, read, and directory list access (52) granted to all users. 5-28 CREATING DIRECTORIES CREATING DIRECTORIES Also, because the system checks the directory protection before the file protection, files that have been given a low file protection are still secure in a directory with the default directory protection. For example, suppose the user KOHN tries to type the file EDIT.MAC in the directory . The protection on the directory is 777700 and the protection on the file EDIT.MAC is 777752. User KOHN and directory are not in the same group, so the world protection applies. First, the system checks the directory protection, 777700. The last two digits (00) apply and permit no access to the directory. User KOHN is not allowed to type the file, even though the corresponding protection on the file (52) would allow the file to be read, executed, and listed with the DIRECTORY command if KOHN were allowed access to files in the directory. 5.7.2 Changing Directory and File Protection 5.7.2 Changing Directory and File Protection Users can change file protection numbers via the SET FILE PROTECTION command or the RENAME command. Users can change directory protection numbers via the SET DIRECTORY PROTECTION or BUILD command. You can, however, prevent users from making changes to their directory protection numbers by including the DISABLE DIRECTORY-PARAMETER-SETTING command in the system file called n-CONFIG.CMD on the system structure. If you make this entry in n-CONFIG.CMD, only users with WHEEL or OPERATOR capabilities can change directory parameters (via the ENABLE and SET DIRECTORY PROTECTION commands). NOTE Make an entry in n-CONFIG.CMD only if you DO NOT want to allow users to change their directory protections; otherwise, the system assumes that you want to use the system default command of ENABLE _______ __ DIRECTORY-PARAMETER-SETTING. (Refer to the TOPS-20 KL _____ _ ____________ _____ Model B Installation Guide for a description of the parameters that are placed in the n-CONFIG.CMD file.) 5.8 ESTABLISHING GROUPS 5.8 ESTABLISHING GROUPS You can let users share files by placing users and directories in groups. Members of a group can access directories and files in that group according to the middle digits of the directory and file protection code fields, as described in Section 5.7.1. 5-29 CREATING DIRECTORIES CREATING DIRECTORIES Each group that you establish has two types of members: USERS and . Each group is identified by a number. This number is included as one of the directory parameters in each directory belonging to the group. Any directory (including subdirectories) or user can belong to as many as 40 groups. You can set up group relationships in the individual directories by using the DIRECTORY-GROUP and USER-OF-GROUP subcommands to the ^ECREATE and BUILD commands. The following example shows that you have placed user Smith in user group 268 and directory group 418: ______ _____ @ENABLE (CAPABILITIES) ________ _________________ $^ECREATE (NAME) MAIN: ________ _________ $$PASSWORD SOAR _______ ________ $$WORKING 500 _________ ________ $$PERMANENT 500 _____________ ________ $$USER-OF-GROUP 268 _______________ ________ $$DIRECTORY-GROUP 418 $$ The DIRECTORY-GROUP or USER-OF-GROUP parameter that you place in the user's directory determines: 1) if this user can access another directory's files as a group member 2) if the files in this user's directory can be accessed by another user as a group member, or 3) both. The diagrams on the following pages illustrate the difference between being a member of a group as a directory and/or as a user. When a user accesses a file in a directory that is a member of the same group, the system first checks to see if this user is the owner of the directory. When, in this example, it finds that the user is not the owner, the system then checks to see if the user is in the same group as this directory. In this case, the user and directory are in the same group; that is, the group numbers match. The system now checks the group protection code field of the directory being accessed. If the group protection allows the type of access that the user requested, the system proceeds to check the group protection on the individual file. If you are setting up groups on different structures, there is no correlation between a group number on one structure and the same group number on another structure. For example, group 202 on MAIN: does not necessarily have the same user and directory members as group 202 on another structure. 5-30 CREATING DIRECTORIES CREATING DIRECTORIES _______ Example ------------------------------ | | | |<------------------USER | | |DIRECTORY GROUP NUMBER LIST | | n | | . | | . | | . | | n | | | | | | | |USER GROUP NUMBER LIST | | n | | . | | . | | . | | n | ------------------------------ Each directory has two lists of group numbers: Directory Group Numbers and User Group Numbers. Directory Group Numbers identify the various groups of which this is a member. User Group Numbers are associated with users and identify the various groups of which each user is a member. 5-31 CREATING DIRECTORIES CREATING DIRECTORIES _______ Example ---------------------------- | | | |<----------------USER | | |DIRECTORY GROUP NUMBER LIST| | n | | . | | . | | . | | n | ---------------------------- ----------------------------- |USER GROUP NUMBER LIST | | n | | . | | . | | . | | n | ----------------------------- The Directory Group Numbers are important to users who require access to this directory. Those users who have a matching group number in the User Group Number List can access this according to its group protection code. The User Group Numbers are important to the owner of this directory. This owner can access any directory that has a matching group number in its Directory Group Number List. Note: Because files-only directories are not associated with a user, they do not contain User Group Numbers. There are three common types of groups: 1. A file-sharing group, whose users can access a set of library directories and each other's logged-in directories. 2. A library group, whose users can access a set of library directories and their own logged-in directories, but not each other's logged-in directories. 3. A teacher-student group, in which the teacher can access the students' directories and the students can access their own logged-in directories, but not their classmates' directories or the teacher's directory. 5-32 CREATING DIRECTORIES CREATING DIRECTORIES Figures 5-1 through 5-3 illustrate these three common groups and the association between USER and members of a group. In a file-sharing group (Figure 5-1), users share all their files according to the group protection field, both in the library directories (here it is ) and in their logged-in directories. User PORADA User HOLLAND _________________ _________________ | | | | | Directory Group | | Directory Group | | Number List | A | Number List | | 3, 2 < 2, 4 | | | x | | | | User Group | x | | User Group | | Number List | B x | | Number List | | 1, 2------------- xxxxxxxxxxxxxxxxx 2, 6 | |_________|_______| | | |_____x___________| | | | x | | | x | ----------- x | x C | xxxxxxxxxxxxxxxxxx D | x | v | _______v_________ | | | | | Directory Group | | | Number List | ----------------> 2, 8 | | | | User Group | | Number List | | None | |_________________| Legend: 1. A User HOLLAND can access directory 2. B User PORADA can access directory 3. C User PORADA can access directory 4. D User HOLLAND can access directory Figure 5-1: File-Sharing Group Figure 5-1: File-Sharing Group 5-33 CREATING DIRECTORIES CREATING DIRECTORIES In Figure 5-1, the two users, PORADA and HOLLAND, are members of the same group (group 2). The directories , , and are also members of group 2. Users PORADA and HOLLAND can access their own directory and files according to the owner protection code fields. PORADA can access directories and according to the group protection code fields, and conversely, HOLLAND can access directories and according to their group protection code fields. The other numbers shown in the figure indicate that a user or directory can be a member of more than one group. In a library group (Figure 5-2), USER members can access all the members but not each other's logged-in directories. The library directories are usually files-only directories. This figure illustrates a library group that consists of the files-only directories: , , , and users: ALUSIC, BROPHY and KOHN. This library group illustrates that just because you are a member of a group as a user, your logged-in directory need not belong to the same group. 5-34 CREATING DIRECTORIES CREATING DIRECTORIES USER KOHN | V +-----------------+ | | | | | DIRECTORY GROUP | | NUMBER LIST | | | | 1 | | | | USER GROUP | | NUMBER LIST | | | | 2---------|-------------- +-------|---------+ | | | | | +-----------------+ | +-----------------+ | +-----------------+ | | | | | | | | | | | | | | | | | DIRECTORY GROUP | | | DIRECTORY GROUP | | | DIRECTORY GROUP | | NUMBER LIST | | | NUMBER LIST | | | NUMBER LIST | | | | | | | | | | 2<-------|-------|------>2 | |----|------>2 | | | | | | | | USER GROUP | | USER GROUP | | USER GROUP | | NUMBER LIST | | NUMBER LIST | | NUMBER LIST | | | | | | | | NONE | | NONE | | NONE | +-----------------+ +-----------------+ +-----------------+ USER BROPHY USER ALUSIC | | V V +-----------------+ +-----------------+ | | | | | | | | | DIRECTORY GROUP | | DIRECTORY GROUP | | NUMBER LIST | | NUMBER LIST | | | | | | 3 | | 5 | | | | | | USER GROUP | | USER GROUP | | NUMBER LIST | | NUMBER LIST | | | | | | 2 | | 2 | +-----------------+ +-----------------+ Figure 5-2: Library Group Figure 5-2: Library Group 5-35 CREATING DIRECTORIES CREATING DIRECTORIES In Figure 5-2, users KOHN, ALUSIC and BROPHY are not directory group members of the same group; however, they are all user group members in the same group (group 2). User KOHN can access directory according to the owner protection field and can access directories , , and according to the group protection field. KOHN can access and according to the "world" protection field. Although the arrows have not been drawn from users BROPHY and ALUSIC, their access privileges are the same as KOHN's. 5-36 CREATING DIRECTORIES CREATING DIRECTORIES TEACHER WILEY | V +---------------------------+ | | | | |DIRECTORY GROUP NUMBER LIST| | | | NONE | | | | USER GROUP NUMBER LIST | | | | 5 | +------------|--------------+ | STUDENT HURLEY | STUDENT HALL | | | V | V +---------------------------+ | +---------------------------+ | | | | | | | | | | |DIRECTORY GROUP NUMBER LIST| | |DIRECTORY GROUP NUMBER LIST| | | | | | | 5<------------|-------------|------------>5 | | | | | | | USER GROUP NUMBER LIST | | | USER GROUP NUMBER LIST | | | | | | | NONE | | | NONE | +---------------------------+ | +---------------------------+ | STUDENT MILLER | STUDENT RUSSELL | | | V | V +---------------------------+ | +---------------------------+ | | | | | | | | | | |DIRECTORY GROUP NUMBER LIST| | |DIRECTORY GROUP NUMBER LIST| | | | | | | 5<------------|-------------|------------>5 | | | | | | USER GROUP NUMBER LIST | | USER GROUP NUMBER LIST | | | | | | NONE | | NONE | +---------------------------+ +---------------------------+ Figure 5-3: Teacher-Student Group Figure 5-3: Teacher-Student Group 5-37 CREATING DIRECTORIES CREATING DIRECTORIES In a teacher-student group (Figure 5-3), the teacher, WILEY, is a member of the group as a USER, while the directories , , , and are members. The teacher, WILEY, can access the files in the directories , , , and according to the group protection. The students whose logged-in directories are in this group as members can access the files in according to the protection set for all users, because only their directories are members of the group; they are not members of the group as users. 5.9 GIVING USERS SPECIAL CAPABILITIES 5.9 GIVING USERS SPECIAL CAPABILITIES You can give special capabilities to certain users; they are WHEEL, OPERATOR, SEMI-OPERATOR, CONFIDENTIAL, MAINTENANCE, IPCF, ENQ-DEQ, | INTERNET-WIZARD, and ABSOLUTE-INTERNET-SOCKETS. Each capability that you give to a user is placed in the user's directory parameter list when you create or change the directory. The person who enters the capability in a user's directory must have that capability himself, and have it enabled at the time the capability is entered into the directory parameter list. You should grant these capabilities only to users who absolutely need them. Table 5-3 lists all the available capabilities and a brief description of their function. Table 5-3: Special Capabilities Table 5-3: Special Capabilities __________________________________________________________________ Capability Description Capability Description __________________________________________________________________ WHEEL Allows the user to modify any system parameters or data. In particular, the WHEEL capability is needed if the user wants to give the ^EEDDT or ^EQUIT commands. OPERATOR Allows the user all capabilities required to control the system. The user cannot, however, give the ^EEDDT or ^EQUIT commands. SEMI-OPERATOR Allows the user to execute only a subset of the operator commands -- to get system status information and to control certain devices. CONFIDENTIAL Allows the user to obtain accounting information for another user's job. 5-38 CREATING DIRECTORIES CREATING DIRECTORIES Capability Description Capability Description MAINTENANCE Allows the user (usually the field service representative) to perform certain maintenance functions, but he cannot give the ^E commands. IPCF Allows the user to perform the privileged _______ functions of IPCF. (Refer to the TOPS-20 _______ _____ _________ _______ Monitor Calls Reference Manual.) ENQ-DEQ Allows the user to perform global ENQUEUE/DEQUEUE functions. | | INTERNET-WIZARD Allows the user to perform certain INTERNET | privileged functions. | | ABSOLUTE-INTERNET- Allows the user to place absolute socket | SOCKETS numbers in his programs. | | INTERNET-ACCESS Allows the directory owner to establish | INTERNET network connections. DECNET-ACCESS Allows the directory owner to establish DECNET network connections. __________________________________________________________________ With the exception of WHEEL and OPERATOR, these capabilities are not listed in a format where having one capability means you also have the capabilities listed below it. The user who has WHEEL capabilities can perform the OPERATOR, SEMI-OPERATOR, CONFIDENTIAL, MAINTENANCE, IPCF, and ENQ-DEQ functions. The user who has OPERATOR capabilities can also perform these privileged functions with the exception of the ^EEDDT and ^EQUIT commands. But the user who has CONFIDENTIAL capabilities can only perform functions that are allowed by this capability; that is, he cannot perform MAINTENANCE, IPCF, ENQ-DEQ, | INTERNET WIZARD, and ABSOLUTE INTERNET SOCKETS functions, unless he has been given the individual capability. The same principle is true for the remaining capabilities. Also, you are giving capabilities to a user, not the user's directory. Therefore, if user HALL has WHEEL capabilities, other users who connect to or access the directory do not obtain WHEEL capabilities. However, if they log in as user HALL, they will obtain HALL's capabilities. For this reason, users with special capabilities (especially WHEEL and OPERATOR) should be especially careful in selecting and protecting their passwords. They should be encouraged to change them often, and to use passwords that cannot be readily guessed. 5-39 CREATING DIRECTORIES CREATING DIRECTORIES 5.10 PRINTING DIRECTORY INFORMATION 5.10 PRINTING DIRECTORY INFORMATION The ULIST program prints information about directories on the system _______ __________ ______ and is described in the TOPS-20 Operator's Guide. In addition to listing information about each directory, the ULIST program can list information about groups, capabilities, and related information. The LIST subcommand of the ^ECREATE command prints information about the directory or user name you are currently creating, and the ^EPRINT command also prints the information on an individual basis. 5-40 CHAPTER 6 CHAPTER 6 CREATING ACCOUNTS CREATING ACCOUNTS The TOPS-20 accounting facility allows you to assign and charge computer usage to valid accounts. It provides you with a means for 1) adding security to your system, 2) determining charges for computer usage and billing users by account, and 3) associating classes with accounts for use by the class scheduler. You can use account validation for one or all of these reasons. One or more accounts can be assigned to a user for specific tasks and validated each time they are used. All accounting data, including records of CPU time, structures used, and peripherals used under a valid account, are stored in a usage file and can be used later for reports and billing. This chapter describes how to set up the system to use accounts and _______ _____ ____ establish an accounting data base. The TOPS-20 USAGE File _____________ Specification describes how to create accounting reports from the Usage file and establish billing procedures. The following sections include: o How to set up your system to use accounts o How to select an accounting scheme o How to use your accounting scheme and create the necessary base account and subaccount files o How to run the account generator program (ACTGEN), which takes these account data files and creates the accounting data base o What the operator can do if the accounting data base does not work properly o How to initialize your system to start validating accounts 6-1 CREATING ACCOUNTS CREATING ACCOUNTS 6.1 SETTING UP THE SYSTEM TO USE ACCOUNTS 6.1 SETTING UP THE SYSTEM TO USE ACCOUNTS 6.1.1 Enabling or Disabling Account Validation 6.1.1 Enabling or Disabling Account Validation During software installation, you can specify whether you wish to create the account data base and validate accounts. You can make an entry in the n-CONFIG.CMD file that specifies either DISABLE ACCOUNT-VALIDATION or ENABLE ACCOUNT-VALIDATION. If you do not make an entry in the n-CONFIG.CMD file for accounting, the system assumes ENABLE ACCOUNT-VALIDATION. If you enter DISABLE ACCOUNT-VALIDATION, meaning you do not wish to use the account validation facility, the system checks each account only for length. The purpose of the check is to ensure that the maximum number of alphanumeric characters has not been exceeded in each account. No other checking is performed. If a user attempts to use or create an account greater than 39 characters, the system simply | truncates the entry to the 39-character maximum. The created entry is | sure to be of valid length if you enable account validation in the | future. If you have instructed the system to ENABLE ACCOUNT-VALIDATION but have not yet created an account validation data base, you receive a warning on the console terminal (CTY) when the system starts operation. The message is: ACCOUNTS-TABLE.BIN NOT FOUND - ACCOUNT VALIDATION IS DISABLED The system continues its normal operation; however, no accounts are validated (except for length checking) until you create the necessary account data files and run the account generator program (ACTGEN) to create your account data base. You should not receive the above warning message if you have created your account data base prior to bringing the system up for operation. Users can log into the system using their valid accounts. 6.1.2 Setting up Account Validation with Existing Files 6.1.2 Setting up Account Validation with Existing Files If you are using account validation on a system that already has files, the accounts for these existing files should be updated before account validation is enabled in the n-CONFIG.CMD file. Notify the users who created these files to change the existing account on every file to their new account(s). This procedure ensures accurate billing immediately after the system is brought up and that daily DUMPER tapes contain files with valid accounts. This means that if you must restore files from a backup tape, the correct account for each file is properly restored; therefore, the disk file storage continues to be _______ __________ _____ accurately charged. (Refer to the TOPS-20 Operator's Guide for the procedure to follow if all files do not get updated.) 6-2 CREATING ACCOUNTS CREATING ACCOUNTS 6.1.3 Setting up the System for Accounting Shift Changes 6.1.3 Setting up the System for Accounting Shift Changes The accounting facility also allows you to change your billing rates for system usage at selected times during the day. This action is called an accounting shift change. Accounting shift changes are selected by day-of-week and time-of-day. You must enter the appropriate commands in the n-CONFIG.CMD file to initiate accounting shift changes. The n-SETSPD program reads these commands each time the system is reloaded. The format of the command placed in the n-CONFIG.CMD file is: CHANGE time days-of-week You can use any format for the time and day, that is, 1500, 15:00, 3:00pm, MONDAY, MON. Or, you can use the keywords ALL, WEEKENDS, and WEEKDAYS. The default for days-of-week is ALL. The following is a typical set of commands that may appear in the n-CONFIG.CMD file: ______ ____ ________ CHANGE 9:00 WEEKDAYS ______ _____ _______________ CHANGE 10:00 WEEKENDS,MONDAY ______ _____ ____________________ CHANGE 12:00 TUESDAY,THURSDAY,SAT ______ _____ CHANGE 17:00 The CHANGE (ACCOUNTING SHIFT NOW) command to the CHKPNT program provides you with a means of changing shifts during system operation. This command causes an accounting session to end and a new accounting session to begin for all active jobs on the system. Refer to the _______ __________ _____ TOPS-20 Operator's Guide for a description of all the commands that can be given to the CHKPNT program. 6.2 SELECTING AN ACCOUNTING SCHEME 6.2 SELECTING AN ACCOUNTING SCHEME The first thing you must do before you create account data files is set up an accounting scheme. This procedure includes deciding which accounts you wish to create, their expiration dates if you are going to open and close accounts, the names of the users who can use (or charge to) those accounts and, if you are using the class scheduler, the scheduling class associated with each account. 6-3 CREATING ACCOUNTS CREATING ACCOUNTS The TOPS-20 account validation facility allows several levels of project administration in a group of accounts having the same base account. For example: DENVER <-----Base Account ------ | | | CHEM <-----Subaccount --------- | | | | | | Subaccount-----> OVERHEAD LAB-12 <-----Subaccount The accounts you would create using the above example are: DENVER DENVER.CHEM DENVER.CHEM.OVERHEAD and DENVER.CHEM.LAB-12 In this example, users at Denver University taking a particular lab course in chemistry (e.g., 12) would log in and charge to their assigned account, DENVER.CHEM.LAB-12. All accounts that you assign to users can have a maximum length of 39 alphanumeric characters. The system allows you to use a hyphen (-) within the accounts you create (e.g., LAB-12), but no other punctuation (including spaces) can be used. Note that the system uses the period (.) as a delimiter to separate each part of multi-level accounts and the period is counted as one of the 39 characters. Therefore, DENVER.CHEM.OVERHEAD is a user account with 20 characters. 6-4 CREATING ACCOUNTS CREATING ACCOUNTS The type of accounting scheme you use depends on the form of project administration you have at your installation. Multi-level accounts are usually created through a form of project administration similar to that used when allowing certain users (perhaps heads of departments) to create subdirectories. (Refer to Chapter 5, Creating Directories.) Remember that subdirectories are just like any other directory. Therefore, users must have accounts to log into their directory. Generally, all files that contain data pertaining to base accounts are created by you or the operator, and all files that contain subaccount data are created by one, or perhaps more than one, project administrator. A project administrator, for example, might be the head of the Chemistry Department. (This could be the same person who handles the subdirectory creation for a group or groups of users.) Allocating the subaccount file creation to a project administrator allows you to collect or budget for one base account (e.g., DENVER.CHEM) and not be directly concerned with the subaccounts. In the example, the head of the Chemistry Department is responsible for creating the subaccount files under DENVER.CHEM., that is, LAB-12 and OVERHEAD. Section 6.3 describes how to create these account data files using a sample accounting scheme. Figures 6-1 and 6-2 illustrate several ways that you can set up your accounting scheme. Figure 6-1 is a simple scheme that a small organization might use. It also allows you, as system manager, to have complete control over all accounts because you are aware of every account assigned. Figure 6-1 shows that the manager at Correct Data Company has decided to set up one base account for Correct Data and one base account for each customer using his system. He used the customer name for the accounts. All the people who use the system at Correct Data can charge their computer usage to the Correct Data account, CORRECT-DATA. Unionbank, L & P Food, and Town Square Magazine submitted the names of those people who will be using the system from their respective sites. These are the only people who will be able to log in from their site and charge to their assigned account. The manager at Correct Data also planned expiration dates for each customer account. 6-5 CREATING ACCOUNTS CREATING ACCOUNTS SAMPLE COMPANY: Correct Data TYPE OF BUSINESS: Timesharing House PRIMARY MODE OF OPERATION: Batch _____________________________________ ACCOUNT CORRECT-DATA USER Hudson, Holland, Gerard, Gionet, King, Kelly, Kohn (Note: These 7 people are all the users at Correct Data) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ACCOUNT UNIONBANK USER Warriner, Bloomstran, Prest, Pendergast EXPIRES June 1, 1986 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ACCOUNT LP-FOOD USER Schied, Queeny, Smith EXPIRES July 1, 1986 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ACCOUNT TOWN-SQUARE USER Markley, Gerhard, Dole EXPIRES July 15, 1986 Figure 6-1: Accounting Scheme 1 Figure 6-1: Accounting Scheme 1 Using the same sample company, Figure 6-2 shows how a simple accounting scheme of this type can be expanded into a form of project administration. Here, Correct Data and one of its customers, Unionbank, broke down the base accounts into subaccounts. Because Correct Data bills Unionbank for all its computer usage as one account, the manager at Correct Data is not concerned with how Unionbank subdivides its account, and is probably not aware of the subaccounts at Unionbank. The manager at Unionbank, however, is concerned with the computer usage costs incurred by each department within his company. He supplies Correct Data with the name of the file that contains his subaccount information. 6-6 CREATING ACCOUNTS CREATING ACCOUNTS SAMPLE COMPANY: Correct Data TYPE OF BUSINESS: Timesharing House PRIMARY MODE OF OPERATION: Batch _____________________________________________ ACCOUNT CORRECT-DATA USER Hudson, Holland SUBACCOUNT PAYROLL USER Gerard, Kelly SUBACCOUNT OVERHEAD USER Gionet, Kohn, Kelly EXPIRES December 31, 1986 SUBACCOUNT PROGRAMMING USER King, Carlson _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ACCOUNT UNIONBANK USER Warriner SUBACCOUNT TRUST USER Bloomstran SUBACCOUNT LOANS USER Prest SUBACCOUNT MSTRCHG USER Prest, Pendergast SUBACCOUNT PAYROLL USER Bloomstran Figure 6-2: Accounting Scheme 2 Figure 6-2: Accounting Scheme 2 Section 6.3 describes how to enter the information for Figures 6-1 and 6-2 into files that are used to create an account data base. 6.3 CREATING AN ACCOUNT DATA BASE 6.3 CREATING AN ACCOUNT DATA BASE Sections 6.3.1 through 6.3.3 describe how to use your selected accounting scheme and create the necessary files for your data base. Specifically, these sections include how to enter accounting data into files, how to run the account generator program (ACTGEN) to create the data base, and what to do if an error occurs. 6-7 CREATING ACCOUNTS CREATING ACCOUNTS 6.3.1 Entering Accounting Data into Files 6.3.1 Entering Accounting Data into Files Base and subaccount files are created using a text editor. The format below shows the combination of entries you can make in accounting files using the CREATE command. Each file you or a project administrator creates can contain one or more accounts. Each account can point to one subaccount file, where additional account information is stored pertaining to that account. Following the format is a summary of the valid commands in an account file. ACCOUNT DATA FILE FORMAT ______ _____________________________ @CREATE (FILE) filename.type INPUT: filename.type.1 _______ _______________________________________________ 00100 ACCOUNT account/SUBACCOUNT:dev:filename.type- _______________________ 00200 /CLASS:n/ALLOW:n,n ____ _______________________ 00300 USER name,name,name,... _________ ____________________ 00400 DIRECTORY dev: _____ ______________ _____ ___________ 00500 GROUP (ON STRUCTURE) dev:/USER:user group number _____ ___ __________ ________________________ _____ ___________ 00600 GROUP (ON STRUCTURE) dev:/DIRECTORY:directory group number _____ 00700 _______ *EU In addition to the above entries, each entry in the file can have an expiration date in the form: /EXPIRES:dd-mm-yy hh:mm This switch indicates when the account will no longer be valid for that entry in the file. For example: USER name1,name2/EXPIRES:10-JAN-86,name3,name4 In the above example, name2 can no longer use this account after 10 January 1986. Name1, name3, and name4, however, can continue to use the account beyond that date. You could also place the switch immediately following the USER entry. For example: USER/EXPIRES:10-JAN-86, name1, name2, name3, name4 This format specifies that none of the users in the list can use the account after a certain date. The account, however, remains open, and you can place another list of users in the file who can use the account. Table 6-1 summarizes the account data file commands. You can type the entire command, or just the characters necessary to distinguish one command from another. For example, ACCOUNT can be typed as AC. 6-8 CREATING ACCOUNTS CREATING ACCOUNTS Because the ACCOUNT command has several modifiers, you may have to continue typing the modifiers on the next line. To do this, use a hyphen at the end of the line and continue typing the ACCOUNT modifiers on the next line. For example, _______ ___________________________ ____________ 0100 ACCOUNT TEST/SUBACCOUNT:SYSA: ACCOUNT.TXT- __________________ 0200 /CLASS:2/ALLOW:1,3 Table 6-1: Summary of Account Data File Commands Table 6-1: Summary of Account Data File Commands __________________________________________________________________ Command Description Command Description __________________________________________________________________ ACCOUNT Specifies the name of the account that you or a project administrator wish to assign. Note: The ACCOUNT command must be the first entry in an account data file because all subsequent entries up to the next ACCOUNT entry are modifiers. /SUBACCOUNT: Modifies the ACCOUNT command. It includes the specification of the file where additional data for the account can be found. Note: The ACCOUNT command accepts only one /SUBACCOUNT:modifier. Example: One of your accounting files contains the following commands. ACCOUNT CORRECT-DATA/SUBACCOUNT: ACCT.TXT ACCOUNT UNIONBANK/SUBACCOUNT: ACCTG.TXT ACTGEN looks in ACCT.TXT for more account data for the account CORRECT-DATA, and it looks in ACCTG.TXT for more data for account UNIONBANK. 6-9 CREATING ACCOUNTS CREATING ACCOUNTS Table 6-1: Summary of Account Data File Commands (Cont.) Table 6-1: Summary of Account Data File Commands (Cont.) Command Description Command Description /CLASS:n Modifies the ACCOUNT command and is used in conjunction with the class scheduler. It specifies the scheduling class that is valid for this account. For example, ACCOUNT CHEM-207/CLASS:3 means that class 3 is valid when using the account CHEM-207. ACTGEN places this information in the system's accounting data base for use by the class scheduling routines. Use the /CLASS:n switch only if you have selected to specify class scheduling by account. (Refer to Section 10.1 for a complete description of using the class scheduler by account.) When a user gives an account that does not have a valid class associated with it, the system uses the default class, class 0. If the account has a class associated with it, that class is used. The percentage of CPU time that classes can receive is defined in the n-CONFIG.CMD file. To use class scheduling by account, you must have: o made the appropriate entries in the n-CONFIG.CMD file. o updated your ACCOUNTS.CMD file (and subaccount files) to specify the classes that are associated with each account. o run ACTGEN with the INSTALL command to update the ACCOUNTS-TABLE.BIN file. o given the ENABLE CLASS-SCHEDULER command to OPR or brought the system down and back up again to start class scheduling. 6-10 CREATING ACCOUNTS CREATING ACCOUNTS Table 6-1: Summary of Account Data File Commands (Cont.) Table 6-1: Summary of Account Data File Commands (Cont.) Command Description Command Description /ALLOW:n,n Modifies the ACCOUNT command and is used in conjunction with the class scheduler. It allows you to delegate the assigning of classes to subaccounts by project administrators. It specifies the class or classes that can be used by subaccounts of this account. For example, ACCOUNT CHEM/SUBACCOUNT:MORE.TXT- /CLASS:2/ALLOW:1,3 means the CHEM account is in class 2, and that subaccounts created under CHEM can be in either class 1 or class 3. If no /ALLOW switch is given, the administrator is not restricted to using certain classes and, therefore, can give the subaccounts any class. For example, the administrator can give them the same class as the superior directory. The /ALLOW switch is useful when you want the superior account to be in perhaps a higher percentage class than its inferior accounts. Remember that if the administrator does not give a /CLASS switch to the subaccount, users who log into or change to this subaccount will be in class 0. USER Specifies one user or the list of users who are allowed to use this account. * Specifies that an account is valid for all users on a system. The * is a special argument to the USER command. Example: One instance when you might use * is if you have not established an accounting scheme but would like to allow users to log into the system. You could set up one account and use the * to indicate that all users can use that account. You could also use the * as follows: ACCOUNT MATH-101 USER: MATH.* 6-11 CREATING ACCOUNTS CREATING ACCOUNTS Table 6-1: Summary of Account Data File Commands (Cont.) Table 6-1: Summary of Account Data File Commands (Cont.) Command Description Command Description This means that all users with a user name beginning with MATH can use the MATH-101 account. For example, the users assigned the user names MATH.SMITH, MATH.JONES, and MATH.BROWN can all use this account. DIRECTORY Specifies a directory name. It indicates that the account is valid for anyone with write access to the directory. This feature allows users to create or store files in systemwide or groupwide directories and to charge them to an "overhead" account different from their own account. The usage charged to this directory could be absorbed by system or project administration. This command also prevents users from being charged for file storage in files-only directories. Note: The DIRECTORY command also accepts a form of the wildcard entry. The valid forms are: *:<*>, dev:<*>, or *:. The asterisk indicates that users with write access to any of the directories matching the wildcard entry may charge their file creation to a certain account. Example: The file that contains account data for account CORRECT-DATA.UNIONBANK.FUND has the entry: DIRECTORY PS: This entry means that anyone with write access to directory can use the account CORRECT-DATA.UNIONBANK.FUND when storing files there. 6-12 CREATING ACCOUNTS CREATING ACCOUNTS Table 6-1: Summary of Account Data File Commands (Cont.) Table 6-1: Summary of Account Data File Commands (Cont.) Command Description Command Description GROUP Specifies that an account is valid for use by certain user and directory groups on a structure. (Refer to Section 5.8 for a description of groups.) /USER:nnn Modifies the GROUP command and can be used in /DIRECTORY:nnn any combination. (nnn is a decimal user or directory group number.) /EXPIRES: can be placed after either modifier to indicate when an account becomes invalid for use by the group. Note: Using the GROUP command is helpful if many people are eligible to use an account. Specifying their group number (if they are in a group) eliminates typing a long list of names incorrectly. __________________________________________________________________ 6-13 CREATING ACCOUNTS CREATING ACCOUNTS 6.3.2 Sample Data Files 6.3.2 Sample Data Files The examples below show how you could enter the information in Figures 6-1 and 6-2 into account data files. The first example shows the data file for Figure 6-1. Tabs and comment lines beginning with an exclamation point (!) can be used within the file for ease in reading or formatting the file. This file in particular contains all the base accounts and should be stored in your directory. You may find it easier when you run ACTGEN if you name the file ACCOUNTS.CMD. ACCOUNTS.CMD is the default file that the TAKE command under ACTGEN looks for. (Refer to Section 6.3.3 for running ACTGEN and giving the TAKE command.) ______ _________________________ @CREATE (FILE) ACCOUNTS.CMD Input: ACCOUNTS.CMD.1 _____ ____ ________ ___________ __ _________ _____________ 00100 !This file contains definitions of top-level accounts _______ _________________ 00200 ACCOUNT CORRECT-DATA ____ _________________________________ 00300 USER Hudson,Holland,Gerard,Gionet ____ ____________________ 00400 USER King,Kelly,Kohn _______ _______________________________ 00500 ACCOUNT UNIONBANK/EXPIRES;1-JUN-86 ____ _________________________________________ 00600 USER Warriner,Bloomstran,Prest,Pendergast _______ _____________________________ 00700 ACCOUNT LP-FOOD/EXPIRES:1-JUL-86 ____ ________________________ 00800 USER Schied,Queeny,Smith _______ __________________________________ 00900 ACCOUNT TOWN-SQUARE/EXPIRES:15-JUL-86 ____ _________________________ 01000 USER Markley,Gerhard,Dole _____ 01100 _______ *EU NOTE Lines 300 and 400 contain all the users at Correct Data. However, you would not use the asterisk (*) because it would enable all the users of the system, including the users at Unionbank, L & P Food, and Town Square to charge to the CORRECT-DATA account. Figures 6-3 and 6-4 show what information to enter into base and subaccount files for Figure 6-2. Each block in Figures 6-3 and 6-4 contains information to be entered into a separate file. Some of the blocks contain subaccount (/SUB:) entries that point to other files containing more information about that particular account. 6-14 CREATING ACCOUNTS CREATING ACCOUNTS Figure 6-3 shows which entries to make for account CORRECT-DATA and its subaccounts (the top half of Figure 6-2.) Figure 6-4 shows which entries to make for account UNIONBANK and its subaccounts (the bottom half of Figure 6-2.) Note that all the base account entries for both Correct Data and Unionbank are contained in the file ACCOUNTS.CMD. +-----------------------------------------------+ | ACCOUNTS.CMD | | ACCOUNT CORRECT-DATA/SUB:ACCOUNT.TXT | | USER Hudson, Holland | | ACCOUNT CORRECT-DATA/SUB:ACCT.TXT | | ACCOUNT CORRECT-DATA/SUB:ACCTG.TXT | +-----------------------------------------------+ | | | | -------------------------|----------------------- | | | | | | | | | | | | +-------------------+ +------------------------+ +-------------------+ |ACCOUNT.TXT| |ACCT.TXT | |ACCTG.TXT | |ACCOUNT PAYROLL | |ACCOUNT OVERHEAD- | |ACCOUNT PROGRAMMING| |USER Gerard, Kelly | |/EXPIRES:31-DEC-86 | |USER King, Carlson | +-------------------+ |USER Gionet, Kohn, Kelly| +-------------------+ +------------------------+ Figure 6-3: Correct-Data Accounting Files Figure 6-3: Correct-Data Accounting Files The accounts that will be created are: CORRECT-DATA.PAYROLL CORRECT-DATA.OVERHEAD CORRECT-DATA.PROGRAMMING Note that users Hudson and Holland can use any account number that begins with CORRECT-DATA, but user Gerard can use only the account CORRECT-DATA.PAYROLL. User Kelly can use the accounts CORRECT-DATA.PAYROLL and CORRECT-DATA.OVERHEAD. The file type for account data files is optional. Your project administrators can use any file type, for example, .TXT, .CMD, or .ABC. 6-15 CREATING ACCOUNTS CREATING ACCOUNTS +----------------------------------------------+ |ACCOUNTS.CMD | |ACCOUNT CORRECT-DATA/SUB:ACCOUNT.TXT| |USER Hudson | +----------------------------------------------+ | | +----------------------------------------------+ | ACCOUNT.TXT | | ACCOUNT UNIONBANK/SUB:ACCT.TXT | | USER Warriner | | | | ACCOUNT UNIONBANK/SUB:ACCO.TXT | | | | ACCOUNT UNIONBANK/SUB:MCA.TXT | +----------------------------------------------+ | | ----------------------------|----------------------------- | | | +--------------------+ +---------------------+ +----------------------+ |ACCT.TXT| |ACCO.TXT | |MCA.TXT | |ACCOUNT TRUST | |ACCOUNT LOANS- | |ACCOUNT MSTRCHG | |USER Bloomstran | |/SUB:LO.TXT | |USER Pendergast, Prest| | | |USER Prest | +----------------------+ |ACCOUNT PAYROLL | | | |USER Bloomstran | |ACCOUNT LOANS- | +--------------------+ |/SUB:DATA.TXT | +---------------------+ | | ------------------------------------- | | +--------------------+ +-----------------------+ | LO.TXT | | DATA.TXT | | ACCOUNT INSTAL | | ACCOUNT COMM | | USER Thomas | | USER Mills | | | +-----------------------+ | ACCOUNT CORP | | USER Thomas, Mills | +--------------------+ Figure 6-4: Unionbank Accounting Files Figure 6-4: Unionbank Accounting Files 6-16 CREATING ACCOUNTS CREATING ACCOUNTS The accounts that will be created are: CORRECT-DATA.UNIONBANK.TRUST CORRECT-DATA.UNIONBANK.PAYROLL CORRECT-DATA.UNIONBANK.MSTRCHG CORRECT-DATA.UNIONBANK.LOANS.INSTAL CORRECT-DATA.UNIONBANK.LOANS.CORP CORRECT-DATA.UNIONBANK.LOANS.COMM 6.3.3 Running the ACTGEN Program 6.3.3 Running the ACTGEN Program After you create the base account files and the project administrator notifies you that all his subaccount files are complete, you can tell the operator to run the ACTGEN program. ACTGEN takes the accounting information in these files and creates an account validation data base. It is through this data base that the monitor validates all accounts entered by the users of your system. ACTGEN is a privileged program, so you must enable WHEEL or OPERATOR capabilities before giving the ACTGEN command. The command appears as follows: ______ _____ @ENABLE (CAPABILITIES) ___________ $ACTGEN ACTGEN> Valid commands that can be given to ACTGEN are HELP, EXIT, TAKE, CTRL/A, and INSTALL. The HELP command lists information to assist you when running the ACTGEN program. The EXIT command terminates the program and returns you to the TOPS-20 command level ($). The TAKE command accepts as its argument either a file specification or a carriage return. A carriage return defaults to your connected directory and the filename ACCOUNTS.CMD. If you do not name your base account file ACCOUNTS.CMD, the file you specify should be the one that contains your base account information and points to all the existing subaccount files. The TAKE command tells ACTGEN to look in the specified (or default) file for account information. It also tells ACTGEN to look at any subaccount file specifications for additional information pertaining to the account(s) in the base account file. Using Figures 6-1 and 6-2, the manager, Hudson, would specify the TAKE command as follows: ______ _____ @ENABLE (CAPABILITIES) ___________ $ACTGEN ____ _____ ACTGEN> TAKE (COMMANDS FROM FILE) 6-17 CREATING ACCOUNTS CREATING ACCOUNTS If the manager in these examples had named his base account file MACCT.TXT, he would specify the TAKE command as follows: ____ ______________________ ACTGEN> TAKE (COMMANDS FROM FILE) MACCT.TXT CAUTION If the data files that are pointed to by your base account file are located on structures other than the system structure, be sure the required structures are mounted. Otherwise, the ACTGEN program will fail on those accounts that have subaccount files on unmounted structures. ACTGEN takes all the information specified in the account files, forms the valid accounts, and creates a new version of the file ACCOUNTS-TABLE.BIN in the directory where ACTGEN is running. Each time the ACTGEN program is run successfully, a new version of this file is created. While ACTGEN is creating the data base file, it checks for duplicate entries, e.g., two accounts of the same name, and the length of the accounts. If an error occurs, an appropriate message is printed on the terminal where ACTGEN is running, but the program continues to build the data base, using only the accurate data. You should make a note of the error on an error log sheet that you have prepared and later correct the appropriate files using an editor. ACTGEN also checks expiration dates. If two or more expiration dates are given for the same entry in a file, the system uses the earliest date. For example: if you specify May 15, 1987 as the expiration date for account MATH and your project administrator specifies August 30, 1987 for the account MATH.LAB-201, the system will stop validating all accounts beginning with MATH as of May 15, 1987. You can press CTRL/A while ACTGEN is running to stop the program and return to ACTGEN command level. The data files are closed and no new version of the data base file ACCOUNTS-TABLE.BIN is created from this session. The INSTALL command starts account validation. When you enter this command, ACTGEN copies the ACCOUNTS-TABLE.BIN file in your connected directory (or the directory where ACTGEN created the file) to ACCOUNTS-TABLE.BIN on the system structure and enables account validation using this new data base. Because the new version of ACCOUNTS-TABLE.BIN is kept in the directory where ACTGEN was run and not in the directory , you have a means of correcting any errors that might occur without disturbing the version currently running in the ACCOUNTS-TABLE.BIN file on the system structure. You can give the INSTALL command after you have corrected any problems. 6-18 CREATING ACCOUNTS CREATING ACCOUNTS If you do not receive any errors while ACTGEN is creating the data base file (ACTGEN has successfully completed the accounting file and you receive the ACTGEN prompt), you can give the INSTALL command immediately. You should keep track of which version of the ACCOUNTS-TABLE.BIN file you are using. A log book that contains the date that ACTGEN was run and the version number of the data base file is helpful should a system problem occur and you are not sure of which data base file you were using. To find out which version you are using, enable capabilities and give the DIRECTORY command for ACCOUNTS-TABLE.BIN on the system structure. The generation number indicates the version that is presently running. The system looks in the current data base file each time it validates a given account. 6.3.4 Data Base Failures/Recovery 6.3.4 Data Base Failures/Recovery If your accounting files were set up inaccurately, or you entered random incorrect data into the data base file, account validation will not work properly. You are aware of this because users cannot log in and/or use accounts that are normally valid for them. Therefore, the account OPERATOR is set up for the user OPERATOR and is always valid. The operator can log into with the OPERATOR account, fix the files that are in error, and run ACTGEN to get account validation working again. 6.4 VALIDATING ACCOUNTS 6.4 VALIDATING ACCOUNTS An account is validated when a user gives any one of the following TOPS-20 commands. o LOGIN - A user must have a valid account to successfully log into the system o SET ACCOUNT (TO) argument o Any queue commands, for example, PRINT, SUBMIT, if the account is different from the currently validated account o SET FILE ACCOUNT (OF FILES) arguments (TO) argument o File creation with an explicit account 6-19 CREATING ACCOUNTS CREATING ACCOUNTS The system records the computer time used for valid accounts. This includes CPU time, time used per structure,[1] and peripherals used per job, that is, the number of pages printed on the line printer, tape mounts, tape records read/written, card reader usage, and disk storage. The computer usage incurred by each account is stored in the accounting USAGE.OUT file. This file is used for reports and billing. _______ _____ ____ _____________ (Refer to the TOPS-20 Usage File Specification for information about reading and using this file). How often you run ACTGEN and create a new data base file depends on how frequently you change your accounts. If you expect to have frequent changes (e.g., opening and closing accounts), you may want to establish a standard time each week to run ACTGEN. Your administrators should inform the operator when changes are made to their subaccount files. NOTE Once ACTGEN is run and the data base file has been created, you can dump all the account files to magnetic tape and conserve some of your disk space. You must copy the files to disk the next time you need to run the ACTGEN program. --------------- [1] To account for the time used on a structure, you must set the _______ __________ _____ structure as REGULATED. Refer to the TOPS-20 Operator's Guide for a description of REGULATED and NONREGULATED structures. 6-20 CHAPTER 7 CHAPTER 7 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES All the disk packs on your system must be backed up on magnetic tape. This procedure provides both a permanent record of the contents of the disk and a precautionary measure in the event a disk pack and/or its contents are destroyed. On the first day of operation, start a system backup procedure that includes: 1. Saving all the files in all the directories on all structures 2. Saving the directory parameters and critical system programs 3. Saving the front-end file system (one time only) These procedures should become a part of the operator's scheduled duties. It is important to start backing up the system immediately after installation. If you follow the backup procedures as they are _______ __________ ______ outlined here and in the TOPS-20 Operator's Guide, you can restore the file system quickly and easily should a mishap occur. ______ DUMPER The following sections discuss using the DUMPER program to save files. Make sure when you restore these files with DUMPER that you are running the correct version of DUMPER with your TOPS-20 monitor and that the tape version is compatible with the software. Otherwise, directory passwords could become unusable and you may have to manually respecify them with the BUILD command. Refer to Section 11.2, Password Encryption, for details. In addition, project-programmer numbers, supported in TOPS-20 Version 6, may not be restored at all with incompatible versions of the software. In a CFS configuration, DUMPER must run on the system to which the tape drives are attached. 7-1 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES To simplify backup and restore operations, you can create DUMPER command files for the operator. Rather than type a list of commands to DUMPER, the operator can then just give the TAKE command with a command file name as an argument. DUMPER will sequentially execute commands contained in the file. _______ ____ _________ _____ _______ __________ _____ The TOPS-20 User Utilities Guide and the TOPS-20 Operator's Guide discuss the DUMPER program in detail. 7.1 SAVING ALL FILES IN ALL DIRECTORIES 7.1 SAVING ALL FILES IN ALL DIRECTORIES Have the operator run the DUMPER program (with the /FULL-INCREMENTAL switch to the SAVE command) to save all files in all directories. This procedure includes saving all the directories on the system structure and all the directories on any additional structures you have created. You can save all the files (a full dump) or just the files that have changed since the last time the operator ran DUMPER (an incremental dump). Start a library of the magnetic tapes from the DUMPER operations. Each structure should be copied to a separate tape(s). Each tape should be identified with the system model number or name, for example, 2060, or System-A, the date, the type of save (full or incremental), the name of the structure, and the tape number. (A tape set name may replace the tape number, if labeled tapes are used.) A typical identification may look like: SYSTEM-A (2060) SYSTEM-A (2060) 30-JANUARY-1988 30-JANUARY-1988 Incremental OR: Full ADMIN: ADMIN: Tape #1 of 2 Tape #3 of 3 In addition to keeping the tapes, keep the listing of their contents. (The operator includes a command to DUMPER to list the contents of the magnetic tapes on the line printer.) These DUMPER log files can be conveniently kept in a binder with the most recent listing on top. Identify each binder with the system model or name, for example, 2065 or System-A. (Chapter 9, System Problems/Crashes describes how to use these log files to restore directories and files.) Tell users that backup files do exist and post the times when the operator normally creates the backup tapes. Many system managers do not allow users to enter the computer room to mount and use the tapes themselves. 7-2 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES NOTE ____ ___ The DUMPER program DOES NOT save the files in the console front-end file system. If you lose these files, you must restore them from the floppy disks. (Refer to Section 7.6) 7.1.1 Full Dumps 7.1.1 Full Dumps Full dumps contain all the information on the system, with the exception of the console front-end files, and can be used to restore many of the files that were on the system to their previous state. Therefore, full dumps contain a copy of every file in every directory on every structure. NOTE Full dumps are known as FULL-INCREMENTAL dumps. This name corresponds to the /FULL-INCREMENTAL switch that you give with the SAVE command to DUMPER. 7.1.2 Incremental Dumps 7.1.2 Incremental Dumps Incremental dumps (using the /INCREMENTAL switch with the SAVE command) cause DUMPER to save the files that have never been saved (new files) and the files that have been updated since the last time an incremental DUMPER operation was performed. Many managers request an incremental dump Monday through Thursday and a full dump on Friday. The File Descriptor Block (FDB) of each file contains the information necessary to determine if the file has been updated since it was last saved during an incremental DUMPER operation. A file that has changed since the last time it was saved is automatically saved again on tape; otherwise, it is passed over. The operator should give the INCREMENTAL switch to DUMPER and specify each structure one at a time. By running DUMPER for each structure individually, the operator can copy each structure onto a separate tape. After running DUMPER and copying the structures that are presently on-line, the operator should mount any additional structures that have been used that day and run DUMPER for them also. An incremental dump is faster than a full dump and requires less magnetic tape. By specifying a value with the /INCREMENTAL switch, you can cause modified files to be written to more than one incremental backup tape. This is helpful if you want to be certain you can recover the files, even if one of the tapes has data errors. 7-3 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES 7.1.3 Security of Backup Tapes 7.1.3 Security of Backup Tapes It is a good idea to protect the security of your backup tapes. If you allow a non-privileged user to mount them, he or she may gain access to confidential information, such as other user's data files. If the unencrypted passwords were saved along with other directory parameters, a technically sophisticated user can retrieve them from the DUMPER backup tapes, and thus obtain unauthorized access to the privileged accounts on the system. 7.2 A COMMON BACKUP POLICY 7.2 A COMMON BACKUP POLICY A common backup policy is outlined below. You can set up your own backup policy. 1. Each day, take an incremental save of the files that have changed from the previous day's backup tape. Keep the incremental saves until a full save is made, at which time you can recycle the incremental tapes. 2. At the end of the week, take a full save of all the files on the system. Keep the full saves for six months, at which time you can recycle the tapes into the backup system. 3. Every six months, take a full save and keep it for a number of years, or if you choose, indefinitely. 7.3 MAGNETIC TAPE REQUIREMENTS 7.3 MAGNETIC TAPE REQUIREMENTS You need a supply of magnetic tapes to start a system backup procedure. This section provides a guideline for the number of tapes you should have on hand for your installation. It is assumed that there are 2400 feet per reel of tape. 7-4 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES __________________________________________________________________ Type of Reels Per Bits Per Type of Reels Per Bits Per Disk Drive Drive Inch Disk Drive Drive Inch __________________________________________________________________ RP06 7 1600 RP06 2 6250 RA60 9 1600 RA60 3 6250 RP20 (one 19 1600 spindle) RP20 (both 37 1600 spindles) RP20 (one 6 6250 spindle) RP20 (both 12 6250 spindles) RP07 7 6250 RP07 19 1600 RA81 6 6250 RA81 19 1600 __________________________________________________________________ Therefore, the number of tapes you stock depends on the type of disks at your installation. It also depends on the backup procedure you use. For example, if you save your daily incremental tape dumps for a longer time than usual, it takes longer to recycle these tapes into the backup system, and thus you need more tapes. Generally, during the first month after installation, you may need approximately 36 (2400 ft.) tapes for each RP06 or RA60, 45 tapes (6250 bit/in) or 180 tapes (1600 bit/in) for each RP20 disk (2 spindles), and 72 tapes for each RP07 or RA81 (1600 bit/in). 7-5 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES NOTE These estimates assume a magnetic tape blocking factor of 1. You can specify a higher blocking factor and save much space on your tapes. Before doing this, however, there are cautions that you must consider. _______ ____ The description of DUMPER in the TOPS-20 User _________ _____ Utilities Guide explains how and when you can increase blocking factors. 7.4 MAKING A SYSTEM CRASH TAPE 7.4 MAKING A SYSTEM CRASH TAPE As the name implies, the system crash tape is used to re-create the system structure should it become unusable. This tape is created in addition to the tapes that contain FULL-INCREMENTAL and INCREMENTAL saves of all files and directories. You should make a new system crash tape whenever you add a new user, change any directory parameters, or make a change (patch) to: o The monitor you are running o The TOPS-20 Command Processor o The DLUSER program o The DUMPER program Therefore, the crash tape contains only the files necessary to recover user directory parameters and important system programs. User files themselves are restored from the FULL-INCREMENTAL and INCREMENTAL saves of the public structure. Label this tape SYSTEM BACKUP TAPE and include the system structure name; DECSYSTEM-20 model number or name, for example, 2060 or System-B; and the date and time the tape was created. You should follow this procedure once a day if users are allowed to change their own directory parameters. (Refer to Section 5.7.2 for information about allowing users to change directory parameters.) If you are not using password encryption (refer to Section 11.2), be careful to protect the backup tapes against reading by unauthorized users, because all the passwords for your users will be accessible. If you are also using mountable structures, you should periodically run DLUSER to copy their directory parameters to a file on another structure, preferably the system structure. Then, if the mountable structure is destroyed, you will be able to recreate the directories. 7-6 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES NOTE Do not use a labeled tape when creating a System Crash Tape. The reason for this is that the installation software that is used to create the system structure cannot read tape labels. The order of files on the crash tape is: 1. MONITR.EXE 2. EXEC.EXE 3. DLUSER.EXE 4. DLUSER data files 5. DUMPER.EXE 6. DUMPER save sets containing the directories: Notice that the format of this tape is the same as the TOPS-20 Installation Tape that you used to install the TOPS-20 software. 7-7 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES 7.5 MAKING A CRASH TAPE USING BATCH 7.5 MAKING A CRASH TAPE USING BATCH You can create a batch job to make your crash tape or type the commands at the operator's terminal. Example 1 shows the standard control file that you can submit as a batch job to create this tape. In the example, PUB: is the name of the system structure. EXAMPLE 1 SYSTAP Control File ____ ___________________ @TYPE(FILE) SYS:SYSTAP.CTL ! Obtain a tape drive @MOUNT TAPE TAPE:/WRITE/LABEL:UNLABELED !Systems not using Tape Drive Allocation must replace the !MOUNT TAPE command with @ASSIGN MTA0: and @DEFINE TAPE: !(AS) MTA0: commands. @ENABLE (CAPABILITIES) @REWIND (DEVICE) TAPE: !Save the monitor @GET (PROGRAM) PUB:MONITR.EXE @SAVE (ON FILE) TAPE: !Save the TOPS-20 Command Language Interpreter @GET (PROGRAM) SYSTEM:EXEC.EXE @SAVE (ON FILE) TAPE: !Save the DLUSER program @GET (PROGRAM) SYS:DLUSER.EXE @SAVE (ON FILE) TAPE: !Run the same DLUSER program, saving the directory structure !on tape @START *DUMP (TO FILE) TAPE: *EXIT !Save DUMPER @GET (PROGRAM) SYS:DUMPER.EXE @SAVE (ON FILE) TAPE: !Run the same DUMPER, saving SYSTEM: and SYS: @START *TAPE (DEVICE) TAPE: *LIST (LOG INFORMATION ON FILE) SYSTAP.LPT *SSNAME SYSTEM-FILES *SAVE (DISK FILES) PUB:,PUB: *SSNAME SUBSYS-FILES *SAVE (DISK FILES) PUB:,PUB: *EXIT 7-8 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES !Print the DUMPER log file @PRINT SYSTAP.LPT/NOTE:BACKUP TAPE @DISMOUNT TAPE: @ !Systems not using Tape Drive Allocation must replace the !DISMOUNT TAPE: command with @UNLOAD (DEVICE) TAPE: and !@DEASSIGN TAPE: commands. To run SYSTAP, submit the batch control file using the TOPS-20 SUBMIT command. In the event the system structure becomes unusable, the crash tape can now be used by following the instructions in the _______ __ _____ _ ____________ _____ TOPS-20 KL Model B Installation Guide. HINT: Before you store the crash tape, verify that you have made a usable tape. That is, mount the new crash _______ __ _____ tape, follow the instructions in the TOPS-20 KL Model _ ____________ _____ B Installation Guide to load the monitor, and use DUMPER to get a listing of the tape's contents. 7-9 SYSTEM BACKUP PROCEDURES SYSTEM BACKUP PROCEDURES 7.6 SAVING THE CONSOLE FRONT-END FILE SYSTEM 7.6 SAVING THE CONSOLE FRONT-END FILE SYSTEM The DUMPER program does not save the contents of the console front-end file system. You can, however, make a backup copy of the file system by copying your floppy disks using the front-end program COP (for copy). You should make at least one backup copy of your console front-end file system (refer to Section 3.4). To run the COP program, follow the steps outlined below. You need not stop timesharing when following these steps. 1. At the operator's console, type CTRL/backslash; the system prints PAR>. ______________ CTRL/backslash PAR> 2. Type MCR COP and press the RETURN key; the system prints the COP prompt. ___ ________ PAR>MCR COP COP> 3. Place the floppy disk to be copied in drive 0 and the floppy to contain the new files in drive 1. Be sure to mount the floppy disks correctly; this includes checking that the paper containing the floppy directory is not accidentally attached to the back of the floppy disk. 4. Type DX1:=DX0: and press the RETURN key; the system starts the copying, which takes a few minutes. After the copying is complete, the system verifies the copy and prints a message. Type CTRL/Z to exit COP. ______________ COP>DX1:=DX0: COP - STARTING VERIFY __ COP>^Z 5. To return to TOPS-20 Command Level, type a CTRL/backslash; the system prints PAR>; type another CTRL/Z, or type QUIT and press the RETURN key. ______________ CTRL/backslash __ PAR>^Z @ 7-10 CHAPTER 8 CHAPTER 8 TAPE STORAGE TAPE STORAGE Chapters 1 through 6 deal primarily with setting up and using your disk resources. Chapter 7, System Backup, describes how to save all the data from your disk structures onto magnetic tape. These tapes are the backup tapes that you use to restore directories and perhaps entire disk structures if something happens to the disks (refer to Chapter 9). In addition to using magnetic tapes for system backup tapes, you can use magnetic tapes to store other types of data and save valuable disk space. This chapter describes two other uses for magnetic tapes, File Archiving and File Migration. It also describes how you can allow the system and the operator to control all tape drive assignments, Tape Drive Allocation, and how you can set up some or all of your tapes to contain labels, Tape Labeling. These uses are described in the following order. o FILE ARCHIVING o FILE MIGRATION o TAPE DRIVE ALLOCATION o TAPE LABELING In addition, the last section of the chapter discusses how to set up two DECSYSTEM-20s to share a TX02 tape subsystem. File archiving provides you and users of the system with a voluntary way to move important files from the disk to magnetic tape for long-term storage. These tapes are stored separately from your system backup tapes. Users can access these tape files as easily as they access files on the disk. When users want to restore archived files to disk, they give a command to the TOPS-20 command processor. The system then tells the operator which tapes to mount and proceeds to restore the files. Section 8.1 describes why you would use the file archiving facility, and how to set up your system to archive files to magnetic tape. 8-1 TAPE STORAGE TAPE STORAGE File migration provides you with a means of controlling the use of disk space. File migration is especially useful if your disk space is very low on a particular structure, for example, the system structure. This type of disk space control is, for the most part, involuntary on the part of the user. Old unused disk files are periodically moved (migrated) to magnetic tape by the system operator. Again, you should store these tapes separately from your system backup tapes. Users still maintain easy access to these files and retrieve them the same way as they retrieve archived files. Section 8.2 describes why and when you would use the file migration facility and how to set up your system to migrate files to magnetic tape. If you use the file archiving or file migration facilities, or both, remember that these tapes are in addition to your system backup tapes. They are not replacements. You must continue to run the DUMPER program and create full and incremental system backup tapes. Tape drive allocation provides the system and computer operator with complete control over tape drive usage. This means that it prevents users from issuing the ASSIGN command and reserving tape drives for their jobs. When users issue the MOUNT command, the TOPS-20 Tape Drive Allocation system and the operator control the allocation of tape drives. You must use the tape drive allocation facility if you use tape labeling; however, using tape drive allocation does not restrict you to using labeled tapes. Tape labeling provides a means of storing label information on the tape itself that identifies the tape and describes the data on the tape. This label information is in an industry standard format so you can read and write tapes to be used with different computers. Tape labels can also add more security and reliability to your tape system. Section 8.4 describes why you would use tape labels, and also how to set up your system to begin labeling tapes. There are no dependencies among file archiving, file migration, and tape labeling. For example, you can use the file archiving facility without using file migration or tape labeling. Each tape facility can be used separately. There is, however, the dependency that tape drive allocation must be turned on to use tape labels. 8.1 FILE ARCHIVING 8.1 FILE ARCHIVING File archiving provides a means of storing data on magnetic tape and freeing valuable disk space. This type of off-line storage allows users to store (archive) important files on tape, keeping their disk space below their permanent allocation, and still have easy access to those files. If your installation has more than one computer system, the archive tapes can be common to all systems. You can put files on tape from 8-2 TAPE STORAGE TAPE STORAGE one system, move a directory and its files to another system, and still retrieve files from the tape in the ordinary manner. Unlike general system backup tapes, the tapes that contain archived files are usually kept for a much longer time, for example, seven to ten years. 8.1.1 Setting Up the System to Use File Archiving 8.1.1 Setting Up the System to Use File Archiving When you receive the TOPS-20 Installation Tape and have brought up the TOPS-20 monitor, your system contains a built-in default of 3650 days for recycling archived tapes. To change the 3650 day (10 year) default, you can enter a command in the n-CONFIG.CMD file. The command you use is: ARCHIVE-TAPE-RECYCLE-PERIOD days Select a length of time that is appropriate for your installation. Place the ARCHIVE-TAPE-RECYCLE-PERIOD command in the n-CONFIG.CMD file during software installation, or edit the file at a later date when you are planning to reload the system. Each time the DUMPER program copies an archived file to tape, it places the expiration date argument in the FDB of the file. The MAIL program notifies users when a file on tape has reached its expiration date. If the file is no longer needed, the user can discard (using the DISCARD command) the information in the file's FDB that points to the file on tape. After all the files on a tape have passed their expiration dates and no users have FDBs in their directories that point to that tape, the tape can be recycled. Refer to Section 8.2.5 for additional information on how to recycle tapes. 8.1.2 What Happens When Users Archive Files 8.1.2 What Happens When Users Archive Files Users archive files voluntarily by giving the ARCHIVE command. After a specific generation of a file has been archived (e.g., MYFILE.CBL.6), it cannot change. Users can obtain copies of archived files by using the RETRIEVE command, but cannot alter those files. _______ ______ _____ The TOPS-20 User's Guide describes the ARCHIVE and RETRIEVE commands. 8-3 TAPE STORAGE TAPE STORAGE When you establish your installation's policy for file archiving and notify users of its availability, you may want to instruct users to archive source files only. For example, files with a file type .CBL, .MAC, .TXT, .RNO, or .FOR should be archived; but, files with the file type .REL, .EXE, or .MEM should not be. This restriction saves space on your magnetic tapes. To completely archive a file, two copies must exist in the archives. This means that each archived file is stored on two tapes. Having the archived file on two tapes provides you with a backup tape if later you cannot retrieve a file off one of the tapes. The DUMPER program, which is used to archive files, records both tape identifying numbers in the FDBs of the files being archived. The diagrams below illustrate what happens when a user archives a file. First, the user creates a file. The File Descriptor Block (FDB), among other file information, contains a pointer to the location of the file on the disk. Pointer to File FDB ---------------------------------> DISK on the Disk The user gives the ARCHIVE command for this file. The first or next time the operator runs DUMPER with the ARCHIVE command, the system locates all files that have been marked for archival by the ARCHIVE command and copies these files to tape. The FDB now contains pointers to the file on the disk and to the file on the tape. ----------- | | Pointer to File on the Disk | | ---------------------------------------------> DISK | | | FDB | | | | | Pointer to File on Tape | | ---------------------------------------------> TAPE ----------- 8-4 TAPE STORAGE TAPE STORAGE The second or subsequent time the operator runs DUMPER with the ARCHIVE command (remember that archived files are contained on two tapes), DUMPER copies the file again to the second tape. DUMPER then deletes the pointer to the location of the file on the disk. DUMPER places another pointer in the file's FDB to the second tape that contains the file and deletes the contents of the file on disk. After a user archives a file, the file name no longer appears in the user's directory list. The user must give the DIRECTORY command with the ARCHIVE or INVISIBLE subcommand to see the file name. ----------- | | ----------------------------------------> TAPE | | | FDB | Two Pointers to Tape | | | | | | ----------------------------------------> TAPE ----------- 8.1.3 What Happens When Users Retrieve Files 8.1.3 What Happens When Users Retrieve Files Users request files be returned to disk (retrieved) by using the RETRIEVE command. When the operator runs DUMPER to process retrieval requests, DUMPER notifies the operator of the second tape that contains the file. If the file cannot be copied from the tape (e.g., the tape is bad), DUMPER notifies the operator of the first tape that contains the file. When DUMPER returns a file to disk, the FDB of that file now contains two pointers to tape and one to the disk. The pointer to the file on the disk remains in the FDB until the file is deleted from disk. 8.1.4 When to Create Archive Tapes 8.1.4 When to Create Archive Tapes You can select how often the operator runs DUMPER to archive files. However, running DUMPER (with the ARCHIVE command) every day before or after your general system backup procedure is probably closest to your present schedule. The steps below provide an example of a typical procedure. These steps assume that this is the first time you are archiving files. Although you do not have to use this procedure, it is one that best _______ __________ _____ utilizes your tape resources. (The TOPS-20 Operator's Guide describes the procedure for running DUMPER with the ARCHIVE command.) 8-5 TAPE STORAGE TAPE STORAGE ____ _________ Step Procedure 1. The operator runs DUMPER and performs the normal (incremental or full) backup procedures for the entire system. (Refer to Chapter 7, System Backup Procedures.) 2. The operator mounts a brand new tape (a tape that has been initialized if you are using tape labels; refer to Section 8.4.3) to contain the archived files, for example, TAPE 1. 3. The operator runs DUMPER with the ARCHIVE command. DUMPER locates all files marked for archival and copies them to tape. 4. The next evening (or the next time system backup is performed), the operator mounts a brand new tape, e.g., TAPE 2. He does NOT mount the tape used the first time. 5. The operator runs DUMPER with the ARCHIVE command. This time DUMPER finishes the archival run of the previous night by making a second copy of those files. In addition, DUMPER locates all the files newly marked for archival and copies them to tape for the first time. 6. The operator repeats this process every day until the tapes are full. 7. For example, the third night, the operator mounts the first tape, TAPE 1. 8. The operator runs DUMPER. DUMPER finishes the archival run of the previous night by making a second copy of the previous night's files. It also locates all the files newly marked for archival and copies them to tape. 9. The fourth night, the operator mounts the second tape, TAPE 2. Again, DUMPER finishes the archival run of the previous night by making a second copy of those files. It also locates all the files newly marked for archival and copies them to tape. NOTE DUMPER checks tapes for duplicate files. It does not write both copies of the same file on the same tape. If the wrong tape is mounted, DUMPER outputs an error message. 8-6 TAPE STORAGE TAPE STORAGE 8.1.5 Processing Retrieval Requests 8.1.5 Processing Retrieval Requests When a user gives the RETRIEVE command to request an archived file, the request is stored in a queue. You must establish a policy for how often the operator should process the retrieval requests contained in _______ __________ _____ the queue. (The TOPS-20 Operator's Guide describes how to process retrieval requests.) If you have encouraged users to archive their files, you should instruct the operator to process the request queue frequently. 8.2 FILE MIGRATION 8.2 FILE MIGRATION Some installations must control the use of disk space by periodically migrating files to magnetic tape. This forced file migration allows the management of an installation to move old unused disk files to a less expensive storage medium. Similar to archived files, migrated files are still easily accessible to the user. File migration also allows you to keep users' directories below their permanent allocation. (Refer to Section 5.5 for a description of permanent and working storage allocations.) Whether you use the file migration facility depends almost entirely on your disk space resources. If users are archiving files regularly, if their directories are usually below their allowed permanent disk allocation, and your system is not continuously interrupted with "disk space low" messages, you may choose not to migrate files. Otherwise, if you are constantly receiving the [CAUTION - DISK SPACE LOW ON structure name] message, you may want to forcibly migrate files from the disk. Sections 8.2.1 through 8.2.3 describe using file migration. They include: o the program you must run before migrating files to tape o the command that can be placed in the n-CONFIG.CMD file to change the default tape recycle period o when to run the REAPER program that marks files for migration and marks for deletion the contents of archived and/or migrated files o a sample of the REAPER.CMD file that you can use as a default file to be read by the REAPER program o when to run the DUMPER program that locates files marked for migration and copies them to tape 8-7 TAPE STORAGE TAPE STORAGE o when to process retrieval requests for migrated files o when to recycle migrated (and archived) tapes 8.2.1 Setting Up the System to Use File Migration 8.2.1 Setting Up the System to Use File Migration When you receive the TOPS-20 Installation Tape and have brought up the new TOPS-20 monitor, your system contains a built-in default of 180 days for recycling migrated tapes. This default is placed in the FDB of each file as it is migrated to tape. To change the 180-day default, you can enter a command in the n-CONFIG.CMD file to inform the system when you plan to recycle your migrated tapes. This command is: TAPE-RECYCLE-PERIOD days Select a length of time that is appropriate for your installation. The default of 180 days, however, is a standard time period. You can place the TAPE-RECYCLE-PERIOD command in the n-CONFIG.CMD file at the _______ __ _____ _ time you install the system (refer to the TOPS-20 KL Model B ____________ _____ Installation Guide). Or, you can edit the n-CONFIG.CMD file at a later date. Remember that if you edit the file at a later date, you must reload the system to process the commands in the n-CONFIG.CMD file. CAUTION If you decide to change the 180 day default, place the TAPE-RECYCLE-PERIOD command with the new argument in the n-CONFIG.CMD file and reload the system. Otherwise, the default recycling period does not change until the next system reload. 8.2.2 Using the REAPER Program 8.2.2 Using the REAPER Program The REAPER program is the tool used to free disk space. It performs the following functions: o Marks for migration the files that have not been referenced for a specified period of time o Marks for deletion the disk contents of archived or migrated files, either after they have been successfully copied to tape, or after they have been returned to disk with the RETRIEVE command, and have not been referenced for a specified period of time 8-8 TAPE STORAGE TAPE STORAGE o Trims directories that are over permanent disk allocation by marking files in those directories for migration o Deletes (purges) the tape pointers in FDBs on the disk that have reached their tape storage expiration date. That is, the file's FDB will no longer contain a pointer to the contents of the file on tape. You can instruct the operator to run the REAPER program and perform one, several, or all of these functions. The operator can give a list of commands to REAPER or use the TAKE command with the default argument SYSTEM:REAPER.CMD. After the system is installed, the directory contains a default REAPER.CMD file. You can use this file as it is or use an editor and change the default parameters. The default SYSTEM:REAPER.CMD file appears similar to the following. ____ ______________________ $TYPE (FILENAME) SYSTEM:REAPER.CMD !Sample REAPER policy file !Directories not to be considered (specify the structure and !directory) SKIP PUB:,PUB:,PUB:,PUB: PERIOD 60 !Specifies the age limit on !files MIGRATE !Migrate files older than PERIOD days DELETE-CONTENTS !Delete the contents of !unreferenced files older than !PERIOD with tape backup TRIM !Trim directories over perm allocation !back to perm allocation ORDER *.TMP,*.LST,*.REL !TAKE files in this order !during TRIM Note that the SKIP command includes a list of directories that are not to be touched by the REAPER program. You can add other system or user directories to this list. The list can contain approximately 75 directories. Be sure that the operator always includes this command when running the REAPER program; otherwise, you may accidentally migrate some very important files from the disk. You can use more than one SKIP command to specify additional directories to be skipped, rather than list them all in one command. That way, if there is an error in processing one command, it will not affect the processing of the other commands. This is especially useful when SKIP commands are included in a file. 8-9 TAPE STORAGE TAPE STORAGE The REAPER program accepts the following commands. BEGIN (Processing files) DELETE-CONTENTS (Of old offline files) EXIT (To monitor) LIST (Output to file) MIGRATE (Old files to offline storage) ORDER (For trimming) PERIOD (For migration) | POLICY (does a TAKE on SYSTEM:REAPER.CMD) PURGE (Expired FDBs from disk) SCAN (Only) SKIP (Directories) TAKE (Commands from file) TAPE (Check of tapes in use) TRIM (Directories over allocation) _______ __________ _____ The TOPS-20 Operator's Guide provides a complete description of all the commands that can be given to the REAPER program or placed in the REAPER.CMD file. Typically, you give a number of commands to REAPER, one for each operation you want performed. The availability of disk space determines how often you run the REAPER program. If your disk space is low, you may want to run the REAPER program daily to free up as much disk space as possible. Other installations may run it once a month or less. 8.2.3 Using the DUMPER Program 8.2.3 Using the DUMPER Program After the REAPER program marks files for migration, the operator runs the DUMPER program to copy the files to tape. Similar to an archived file, a migrated file is not completely migrated until two copies of the file exist on magnetic tape. Section 8.1.4 describes a procedure for copying archived files to tape. You can use this same procedure for migrated files, by using the MIGRATE command instead of ARCHIVE. If you use both the file archiving facility and the file migration facility, do not merge archived and migrated files on the same tapes. The expiration dates for migrated files differ greatly from the expiration dates on archived files. If you put them on the same tape, you will end up saving migrated files for approximately ten years and use up all your tape resources very quickly. 8-10 TAPE STORAGE TAPE STORAGE 8.2.4 Processing Retrieval Requests for Migrated Files 8.2.4 Processing Retrieval Requests for Migrated Files When a user gives a DIRECTORY command, the files that have been migrated to tape still appear in the directory list; however, each file has a notation (;OFFLINE) beside the filename to indicate that the file is contained on tape and not on the disk. The versions of migrated files that have been copied to tape can be returned to disk, and unlike archived files, they can be altered and/or renamed in the ordinary manner. The user requests that a migrated file be returned to disk with the RETRIEVE command. These requests are stored in the same queue as archive requests until the operator processes the queue. _______ __________ _____ The TOPS-20 Operator's Guide describes how to process retrieval requests. Retrieval requests for migrated or archived files should be processed frequently. 8.2.5 Recycling Migration (and Archive) Tapes 8.2.5 Recycling Migration (and Archive) Tapes When all the migrated or archived files on a tape have passed their expiration dates and all pointers to these files on the disk have been deleted, you can recycle the tape. The PURGE command to REAPER checks tape expiration dates and notifies users by the MAIL program when migrated or archived files on tape are about to expire. Users can retrieve the file to disk again or discard the tape pointer on disk if they no longer need the file. The operator can determine if a tape can be recycled by giving the TAPE command to REAPER. If a tape is not mentioned in the TAPE output list, this means that none of the disk structures that are on-line at this time and specified to REAPER contain FDB pointers to that tape. However, be sure that you check all possible places for on-line (disk) pointers to this tape. That is, run REAPER with the TAPE command on all the disk structures on all systems that may contain pointers to this tape. If files have passed their expiration date and pointers to them still exist on the disk, the operator can run REAPER with the PURGE command to delete these pointers. The operator should be certain that files are no longer needed before using the PURGE command. HINT When a migration tape is full, have the operator use the PRINT command to DUMPER to obtain a hard-copy listing of the tape contents. 8-11 TAPE STORAGE TAPE STORAGE 8.3 TAPE DRIVE ALLOCATION 8.3 TAPE DRIVE ALLOCATION Tape drive allocation provides the system, and not the user, with complete control over tape drive usage. When accessing a magnetic tape, the user must give a MOUNT command to request that the operator mount the tape on a drive. Once the operator responds to the user's request, the user can access the tape. When the user is finished with the tape, the user gives the DISMOUNT command to release the tape drive back to the system. From the user's point of view, the MOUNT and DISMOUNT commands replace the ASSIGN and DEASSIGN commands. The operator selects the drive for the user, and the system informs the user how to access the tape. Using tape labeling requires that you use tape drive allocation; however, this does not restrict you to the use of labeled tapes only. 8.3.1 When to Use Tape Drive Allocation 8.3.1 When to Use Tape Drive Allocation Table 8-1 lists the differences between using and not using tape drive allocation. Table 8-1: Tape Drive Allocation Table 8-1: Tape Drive Allocation __________________________________________________________________ Tape Drive Allocation No Tape Drive Allocation Tape Drive Allocation No Tape Drive Allocation __________________________________________________________________ You must make an entry in No entry required in the the n-CONFIG.CMD file to n-CONFIG.CMD file. use tape drive allocation. Users can use labeled and No support for labeled tapes. This unlabeled tapes. means that all tapes, whether they contain labels or not, are treated as unlabeled. Users cannot give the Users can give the ASSIGN and ASSIGN and DEASSIGN DEASSIGN commands for allocated tape commands for allocated tape drives and cannot use the MOUNT and drives, but must give the DISMOUNT commands. MOUNT and DISMOUNT commands. The operator should not use The operator may unload tapes using the UNLOAD button on tape the UNLOAD button on the tape drive. drives, but should use the DISMOUNT command to OPR. __________________________________________________________________ 8-12 TAPE STORAGE TAPE STORAGE 8.3.2 How to Enable/Disable Tape Drive Allocation 8.3.2 How to Enable/Disable Tape Drive Allocation To use tape drive allocation enter the command ______ __________ __________ ENABLE TAPE-DRIVE ALLOCATION in the n-CONFIG.CMD file. You can disable tape drive allocation on a tape drive by using the SET TAPE-DRIVE MTAn: UNAVAILABLE command. 8.3.3 Tape Mounting Policy 8.3.3 Tape Mounting Policy Occasionally, you may mount a tape that the system cannot read. For example, the operator mounts a tape that has a density of 800 bits per inch (bits/in) on a drive that does not support this density. The system checks tapes for labels; even if this tape contains labels, the incorrect density prevents the system from recognizing them. With such errors, the system can be set up to immediately unload the tape and protect it from being accidentally erased, or it can treat the tape as unlabeled and continue processing. If you do not want the system to classify these tapes as unlabeled, you can place the TAPE-RECOGNITION-ERRORS command in the n-CONFIG.CMD file with the appropriate argument. The format of this command follows: REGARD-AS-UNLABELED TAPE-RECOGNITION-ERRORS UNLOAD The system uses REGARD-AS-UNLABELED if no entry is made in the n-CONFIG.CMD file. If REGARD-AS-UNLABELED is in effect, you should instruct operators to be especially careful when mounting tapes with write rings. The tape's contents cannot be overwritten if the write ring is not inserted. 8.4 TAPE LABELING 8.4 TAPE LABELING This section describes what tape labels are and how, as system manager, you can initiate using them. Magnetic tape labels are records that are interspersed with user-defined data on a tape. They are informational records that describe the user data in a standard fashion that is recognized by many computer systems. 8-13 TAPE STORAGE TAPE STORAGE The TOPS-20 tape labeling system allows you to read and write tape labels that conform to ANSI (American National Standards Institute) and DEC standards. The tape labeling system also allows you to read tapes that are labeled according to IBM labeling standards. Tape labeling is an option. You can start or continue to run your system using unlabeled tapes. If you have hundreds of unlabeled tapes at your installation, you may decide not to convert entirely to a labeled shop. Instead, you may have a combination of labeled and unlabeled tapes. Sections 8.4.1 through 8.4.3 describe the advantages of using tape labels and how to set up your system to begin labeling tapes. The _______ ____ __________ ______ TOPS-20 Tape Processing Manual provides a complete description of the ANSI, DEC, and IBM standard label formats and how to use them. It also describes the interface between the operator and magnetic tapes and the user and magnetic tapes. 8.4.1 Why Tape Labels? 8.4.1 Why Tape Labels? An unlabeled tape has a gummed label on the outside of the reel that identifies the contents of the tape. When the operator selects, mounts, and types the identity of an unlabeled tape, the system assumes that the mounted tape is the one that the user (or job) requested. No checking is performed by the system. A labeled tape, however, contains standardized information on the tape itself that identifies and describes the data on the tape. This internal label information is in addition to the gummed label on the outside of the reel. With labeled tapes, the operator selects a tape (by looking at the outside gummed label), mounts the tape on any available drive, but does not type in any identifying information at the terminal. When a user issues a MOUNT request for a labeled tape that is already mounted, the system automatically locates the drive containing the tape requested, and checks to ensure that the correct tape has been mounted. This facility for automatically locating and checking tapes is described further below. A labeled tape consists of a volume label group, followed by one or more files. (A volume is a reel of magnetic tape.) The volume label group is a set of one or more records at the beginning of the tape. It contains a volume identifier, commonly referred to as a VOLID, and other identifying information. (See Figure 8-1.) You, as system manager, select the VOLIDs to be used at your installation. The VOLID is a name containing from one to six alphanumeric characters. A user requests access to a specific volume by specifying its VOLID to the system. 8-14 TAPE STORAGE TAPE STORAGE Each file on a labeled tape contains a file header label group, the file data (written by the user program), and a file trailer label group. (See Figure 8-1). Optionally, the file can contain user labels, whose contents are specified and examined only by user programs. Volume labels, header labels, trailer labels, and user _______ ____ __________ ______ labels are described in the TOPS-20 Tape Processing Manual. _____________________________________________________________________________ | | V L | H | | T | | H | | T | | | O A | E | | R | | E | | R | | | L B | A | | A | | A | | A | | | U E | D | FILE DATA | I | | D | FILE DATA | I | | | M L | E | | L | | E | | L | | | E | R | | E | | R | | E | | | | | | R | | | | R | |_|_______|_____|_______________|_____|_|_____|_______________|_____|_____ Figure 8-1: Organization of Labeled Tapes Figure 8-1: Organization of Labeled Tapes Because every labeled tape contains a unique identifier, or VOLID, the system can read this VOLID and ensure that the correct tape has been mounted. This automatic checking improves the reliability of your tape system. It significantly reduces the likelihood of an operator mounting the wrong tape. Also, some or all of your tape drives can be set to automatically recognize tape volumes as they are mounted. This process is called automatic volume recognition (AVR). Setting AVR means that after the operator mounts a tape, the system automatically reads the first record and inspects it for label information. If the tape contains no labels, the system classifies it as unlabeled and the operator must key in a volume identifier for the tape. If a request for the tape is pending, the system readies the tape for use by the requesting job. If a request for the tape is not pending, the system stores the VOLID in a table and waits for a request. Therefore, automatic volume recognition provides the following benefits. o The operator does not have to type tape-identifying information to the system when mounting a labeled tape. o It provides a faster connection between a user's job and the tape requested. o The operator can mount a tape long before it is needed. When a job requests the tape, the system locates the drive that contains the requested tape and readies it for use. 8-15 TAPE STORAGE TAPE STORAGE Tape labels also improve the security of your tape system. DEC-standard labels identify the owner, as well as the volume, in the volume label. The file labels specify protection codes for the individual files. These labels protect a tape from being inadvertently written on and valuable data destroyed by a user who does not have the appropriate access rights to the tape or its files. In addition to the added reliability, security, and volume recognition, labeled tapes provide you with a means of interchanging tapes between DECSYSTEM-20s and other computers. This interchange capability extends the mobility of data between different systems. You can write ANSI- and DEC-standard labeled tapes and mount these tapes on other systems using ANSI- or DEC-standard labels, and vice versa. You can mount a labeled tape that was written in EBCDIC with labels conforming to IBM's OS standards, and read it on a DECSYSTEM-20 as if it were ANSI-standard labeled. Finally, if you are using the TOPS-20 tape drive allocation facility, you can charge users for their tape usage. Note that you must use tape drive allocation with labeled tapes, but you can use it with unlabeled tapes also. The accounting usage file contains entries for _______ _____ ____ _____________ all tape-mount requests. The TOPS-20 USAGE File Specification describes the formats of these entries and how they are used in reports and billing. 8.4.2 Setting Up the System to Use Tape Labels 8.4.2 Setting Up the System to Use Tape Labels To use tape labels, you must have at least one tape drive that is 9-track and has the capability of using tapes at a density of 800, 1600, or 6250 bits per inch (bits/in). There is no restriction on the number of these drives you use. The TOPS-20 Tape Labeling system can be used with as many drives as are allowed for your system. Also, you must enter the ENABLE TAPE-DRIVE-ALLOCATION command in the _______ __ _____ _ ____________ _____ n-CONFIG.CMD file. The TOPS-20 KL Model B Installation Guide describes the format of this command and how to enter it into the n-CONFIG.CMD file at the time you install the system. If you do not enter this command during software installation, you can edit the n-CONFIG.CMD file at a later date. However, if you edit the file at a later date, you must shut the system down and bring it back up again to process the commands in the n-CONFIG.CMD file. 8-16 TAPE STORAGE TAPE STORAGE 8.4.3 Initializing Tapes and Drives to Use Labels 8.4.3 Initializing Tapes and Drives to Use Labels Tapes must be initialized before they can contain labels. An initialized tape contains a volume label set followed by an empty file. The operator issues commands to OPR to initialize tapes for use by the TOPS-20 Tape Labeling system. All the necessary volume labels _______ __________ _____ are then created on a tape. (Refer to the TOPS-20 Operator's Guide for a description of using OPR to initialize tapes.) You should initialize as many scratch tapes as you will need to store your system's data before users start issuing MOUNT requests for tapes. Then, when a user issues a MOUNT command without specifying a VOLID, the operator mounts an initialized scratch tape of the appropriate label type. TOPS-20 then readies (loads) the tape for write access by the user program. In addition to initializing tapes, you can set some or all of your tape drives to use the automatic volume recognition facility (AVR). As described earlier, AVR sets your tape drives to automatically recognize tape volumes as they are mounted. To turn on automatic volume recognition, have the operator enter the following command in the SYSTEM.CMD file: ENABLE AUTOMATIC-VOLUME-RECOGNITION (FOR) object Where object is either TAPE-DRIVE MTAn: or TAPE-DRIVES. You can turn off AVR by entering the following command in the SYSTEM.CMD file: DISABLE AUTOMATIC-VOLUME-RECOGNITION (FOR) object These commands can be given to OPR at any time to enable or disable AVR for any or all drives on the system. It is generally a good practice to enable AVR for all drives. 8-17 TAPE STORAGE TAPE STORAGE 8.5 SHARING TAPE DRIVES BETWEEN TWO SYSTEMS 8.5 SHARING TAPE DRIVES BETWEEN TWO SYSTEMS If you have two DECSYSTEM-20s, you can set up the systems to share a TX02 tape subsystem by use of the TX03 option, as Figure 8-2 shows: ______________ ______________ | | | | | DECSYSTEM-20 | | DECSYSTEM-20 | |______________| |______________| | | ___|___ ___|___ | DX20 |____ ____| DX20 | |_______| | | |_______| | | | | | | | | | | Standard Single ___|______________|___ TX03 Dual-Channel Channel----->| | | |<-----Option |________| |_______| | | | TX02 | | | |______________________| / | | | \ / | | | \ __/_ __|_ __|_ __|_ _\__ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |<--------Tape Drives | | | | | | | | | | |____| |____| |____| |____| |____| Figure 8-2: TX02 Tape Subsystem Figure 8-2: TX02 Tape Subsystem Note, however, that use of the drives must be under strict operator control. Without this control, it is likely that two users, on different systems, will eventually end up using the same tape. 8-18 TAPE STORAGE TAPE STORAGE Operator control is required because: o Unlike disk drives, there is no mechanism to control the porting of a tape drive between systems. If the tape drive is available to the TX02, then it is available to any system to which the TX02 is connected. o Furthermore, the MOUNTR programs on the two systems do not communicate, so they cannot coordinate access to the drives. Thus, the MOUNTRs on the two systems would allow two users access to the same physical tape drive. ________ __________ Operator Procedures 1. All drives that are not to be used by a particular system should be set unavailable to MOUNTR with the OPR command: OPR> SET TAPE-DRIVE MTAx: UNAVAILABLE This command takes away control of the tape drive from MOUNTR and writes an entry in the DEVICE-STATUS.BIN file. During system reloads, MOUNTR reads this file, and if a tape drive has been set unavailable, will never try to access or assign the drive. Note that if DEVICE-STATUS.BIN is ever damaged, then a new file is created at system startup. However, all data and settings will have been lost, including data for the drives that have been set unavailable. Therefore, the operator will need to repeat this step. 2. Setting the drive unavailable to MOUNTR does not prevent a user from reserving the drive with the ASSIGN command. To prevent a user from assigning a tape that is set unavailable to MOUNTR, a program under control of the operator should assign to itself all of the "unavailable" drives. This program should be run at system startup, before any users are allowed to log in. You could also control the assignment of tape drives with an access control program. Refer to Section 11.1, Access Control Program. 8-19 TAPE STORAGE TAPE STORAGE An example of re-porting a tape drive from system A to system B follows. The operator: 1. Removes the tape (if any) from the tape drive that is to be ported over to system B. 2. Sets the drive unavailable to MOUNTR on system A. ( OPR> SET TAPE-DRIVE MTAx: UNAVAILABLE ) 3. Assigns the drive to a process under control of the operator on system A. 4. Deassigns the drive from the process that is under operator control on system B. 5. Sets the drive available to MOUNTR on system B. ( OPR> SET TAPE-DRIVE MTAx: AVAILABLE ) | In a CFS-20 cluster, a tape drive can be used from only one system at | a time. A user may receive the error message: "Device in use by | another system." 8-20 CHAPTER 9 CHAPTER 9 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES This chapter describes the actions to take when you are faced with various system problems. You may have to correct a problem with the file system, act immediately after a power failure, or remove the CI from system use. There may be times when you cannot trace a problem. At such times, Digital Field Service can remotely run diagnostic programs on your system. The following sections address these topics. Errors that require you to correct a problem in the file system seldom occur. However, if a problem of this nature arises, you can perform four classes of file system corrections. From the least to most severe, they are: o Restore a single file in a directory o Restore a single directory (other than ) o Restore o Restore the entire file system _______ __________ _____ The TOPS-20 Operator's Guide provides all the necessary information for the operator to correct these types of problems. Sections 9.1 through 9.4 provide you with an overview of how these problems are solved. 9-1 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 9.1 RESTORING A SINGLE FILE 9.1 RESTORING A SINGLE FILE If you receive a request to restore a file for a user, you can use the following procedure. 1. Look in the binder that contains the listing of the DUMPER log files. (Chapter 7 describes creating DUMPER log files.) 2. Write down the file specification (including the structure and directory) to be restored, and the date and number of the tape containing the file. Be sure to indicate the destination structure and directory if one or both are different from the structure and directory from which the file was saved. 3. Submit a request to the operator to restore the file. 9.2 RESTORING A SINGLE DIRECTORY 9.2 RESTORING A SINGLE DIRECTORY If you receive a request to restore a directory, you can use the following procedure. 1. Determine the structure that contains the directory. 2. Make sure you have a copy of the files in this directory on a DUMPER tape. (Check the log files.) 3. Give the ^ECREATE command with the LIST subcommand. Write down the list of parameters, for example, the directory number, allocation, etc. You may need this information when you re-create the directory. 4. Give the ^ECREATE command with the KILL subcommand for the _______ __________ _____ directory. (The TOPS-20 Operator's Guide provides additional procedures for deleting a single directory if the ^ECREATE command with the KILL subcommand is unsuccessful.) 5. Using your DUMPER backup tapes, first restore the files from the last FULL-INCREMENTAL DUMPER operation. Then, restore files from each INCREMENTAL tape until the time when the files were lost. Be sure the operator gives the CREATE command to DUMPER to restore the directory parameters. If the directory contains unreproducible information and it is not backed up on tape, call Digital Software Services for assistance. It ___ may be possible to reconstruct the directory without losing the valid information in it. 9-2 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 9.3 RESTORING 9.3 RESTORING Each structure has its own and a backup that is used by the system if the primary is bad. The directory contains a pointer to each first-level directory on a structure, as well as several important system files. (Chapter 5 illustrates how points to directories.) If is lost on the system structure, users cannot access any files in the system. If is lost on a mountable structure, users cannot access files on that structure. You can tell that the on the system structure is bad if the operator's console prints any one of the BUGHLTs listed in Table 9-1. When a BUGHLT appears on the console, the system stops. A BUGHLT appears in the form: ********** *BUGHLT name AT dd-mm-yy hh:mm:ss *JOB:n, USER: user-name *ADDITIONAL DATA: data,data,data ********** The lines beginning with JOB: or ADDITIONAL DATA: may not appear. Table 9-1: BUGHLTS Table 9-1: BUGHLTS __________________________________________________________________ BUGHLT Meaning BUGHLT Meaning __________________________________________________________________ BADROT is invalid FILIRD The system could not initialize FILMAP The system could not map into memory BADXT1 The index table is missing and cannot be created __________________________________________________________________ 9-3 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES may also be bad if you get the BOOT error ?FIL NOT FND. If this error appears, be sure you have mounted all devices correctly. To recover from a bad , first determine which structure contains the bad directory. If the bad is on a mountable structure, you can run CHECKD with RECONSTRUCT _______ ROOT-DIRECTORY and specify the proper structure. The TOPS-20 __________ _____ Operator's Guide details the procedure for determining the structure and using CHECKD for reconstructing on mountable structures. If the bad is on the system structure, you can instruct the system to use the backup system structure and rebuild this directory. Section 9.3.1 describes this procedure. NOTE If your first attempt to rebuild fails, call your DIGITAL Field Service Representative. _____ NEVER try to rebuild this directory twice on any structure. 9-4 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 9.3.1 Rebuilding the System Structure 9.3.1 Rebuilding the System Structure To rebuild on the system structure, halt the central _______ processor and perform Steps 7 through 21 in Chapter 2 of the TOPS-20 ____ _____ _ ____________ ______ KL10 Model B Installation Guide. The steps are shown below for reference. 1. Type CTRL/backslash on the operator's console; the system prints PAR>. 2. Type SHUTDOWN and press the RETURN key; the system prints a few message lines. _____________ PAR>SHUTDOWN **HALTED** %DECSYSTEM-20 NOT RUNNING 3. Mount System Floppy A in drive 0 (Step 7). 4. Mount System Floppy B in drive 1 (Step 8). 5. Mount the TOPS-20 Installation Tape on MTA0: (Step 9). If the TOPS-20 Installation Tape is not your most recent system backup tape, mount your SYSTEM BACKUP TAPE that contains the monitor, TOPS-20 Command Processor, DLUSER, DLUSER data, DUMPER, and save sets containing and . (Refer to Section 3.2 for a description of special system directories.) 6. Place the front-end HALT switch in the ENABLE position (Step 10). 7. Set the front-end switch register to 000007 (octal) (Step 11). 9-5 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 8. Press the ENABLE and SWITCH REGISTER switches simultaneously (Step 12). RSX-20F VB16-00 8:55 1-JAN-88 [SY0: REDIRECTED TO DX0:] [DX0: MOUNTED] [DX1: MOUNTED] KLI -- VERSION VB1600 RUNNING KLI -- ENTER DIALOG [NO,YES,EXIT,BOOT]? KLI> NOTE The version and edit numbers in this manual may differ from the numbers printed on your console. The numbers on your console must be equal to or greater than the numbers in this manual. 9. Type YES and press the RETURN key (Step 13). ________ KLI>YES KLI -- KL10 S/N: 2136., MODEL B, 60 HERTZ KLI -- KL10 HARDWARE ENVIRONMENT MOS MASTER OSCILLATOR EXTENDED ADDRESSING INTERNAL CHANNELS CACHE KLI -- RELOAD MICROCODE [YES,VERIFY,FIX,NO]? KLI> 10. Type YES KLX and press the RETURN key (Step 14). ___ ________ KLI>YES KLX KLI -- MICROCODE VERSION 2.0 [407] LOADED NOTE If your system has cache memory, the following question appears previous to the question in Step 11. (Step 15.) KLI -- RECONFIGURE CACHE (FILE,ALL,YES,NO)? Type ALL and press the RETURN key (Step 16). ________ KLI>ALL KLI -- ALL CACHES ENABLED KLI -- CONFIGURE KL MEMORY [FILE, ALL, REVERSE, FORCE, YES, NO]? KLI> 9-6 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 11. Type ALL and press the RETURN key (Step 17). KLI -- CONFIGURE KL MEMORY [FILE, ALL, REVERSE, FORCE, YES, NO]? ________ KLI>ALL LOGICAL MEMORY CONFIGURATION . . . KLI -- LOAD KL BOOTSTRAP [YES, NO, FILENAME]? KLI> 12. Type MTBOOT and press the RETURN key (Steps 18 and 19). ___________ KLI>MTBOOT KLI -- CONFIGURATION FILE ALTERED KLI -- WRITE CONFIGURATION FILE [YES,NO]? KLI>NO BOOTSTRAP LOADED AND STARTED BOOT V11.0(315) MTBOOT> 13. Type /L and press the RETURN key (Step 20). _______ MTBOOT> /L [BOOT: STARTING CHN:n DX20x:0 MICROCODE Vn(n)][OK] [BOOT: LOADING][OK] MTBOOT> NOTE The message concerning the DX20 microcode is printed only if you are installing the TOPS-20 software on a DECSYSTEM-20 with a DX20 tape or disk controller. 14. Type /G143 and press the RETURN key (Step 21). __________ MTBOOT> /G143 [FOR ADDITIONAL INFORMATION TYPE "?" TO ANY OF THE FOLLOWING QUESTIONS.] DO YOU WANT TO REPLACE THE FILE SYSTEM ON THE SYSTEM STRUCTURE? NOTE Read Step 15 carefully before answering this question. 9-7 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 15. Type N and press the RETURN key. You DO NOT want to clear all the information on the disk packs. If you want to retain all the information in the file system, always type N. DO YOU WANT TO REPLACE THE FILE SYSTEM ON ______ THE SYSTEM STRUCTURE? N [PS MOUNTED] RECONSTRUCT ROOT-DIRECTORY? 16. Type Y and press the RETURN key. This causes the backup copy of to be used. ______ RECONSTRUCT ROOT-DIRECTORY? Y [RECONSTRUCTION PHASE 1 COMPLETED] %%NO SETSPD System restarting, wait... ENTER CURRENT DATE AND TIME: The system restarts and runs CHECKD to reconstruct the bit table. The bit table contains one bit for every page in the file system. If the bit is on, the page is available; if the bit is off, the page is in use. 17. Type the date and time and press the RETURN key. Type Y and press the RETURN key to confirm the date and time. ________ _________ ENTER CURRENT DATE AND TIME: 1-JAN-81 0931 YOU HAVE ENTERED THURSDAY, 01-JANUARY-1981 9:31AM, ______ IS THIS CORRECT (Y,N) Y WHY RELOAD? 18. Type OTHER and press the RETURN key. __________ WHY RELOAD? OTHER [REBUILDING BIT TABLE] NOTE You should type a response to WHY RELOAD?, that reminds you of why you did this procedure. This response is stored in the ERROR.SYS file. Refer to the _______ ____ _____ _ ____________ _____ TOPS-20 KL10 Model B Installation Guide for a complete list of valid abbreviations. 9-8 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 19. The system prints some standard messages, the output from CHECKD, RUNNING DDMP, and the output from SYSJOB and PTYCON. [REBUILDING BIT TABLE] [WORKING ON STRUCTURE - PS:] output from CHECKD RUNNING DDMP output from SYSJOB and PTYCON _______ __________ _____ Refer to the TOPS-20 Operator's Guide for samples of the output from CHECKD, SYSJOB and PTYCON. 20. Log in as user OPERATOR. TOPS-20 SYSTEM, TOPS-20 Monitor 7(21017) _____ ________ ___ _____________ @LOGIN (USER) OPERATOR (PASSWORD) --- (ACCOUNT) OPERATOR Job 1 On TTY1 3-MAY-88 10:33:32 9.4 RESTORING THE ENTIRE FILE SYSTEM 9.4 RESTORING THE ENTIRE FILE SYSTEM If you are still receiving random errors and cannot use the system, you may have to restore the entire file system on the system structure. Before doing this, you should contact your software specialist to ensure that resorting to this procedure is necessary. The procedure requires shutting down the system and reinstalling the file system. 9.4.1 Re-creating the File System on the System Structure 9.4.1 Re-creating the File System on the System Structure The following steps outline the procedure for restoring the file system on the system structure. 1. Type CTRL/backslash to start the front-end command parser. CTRL/backslash PAR> 2. Type SHUTDOWN to stop the central processor; the system prints a few messages. _____________ PAR>SHUTDOWN **HALTED** %DECSYSTEM-20 NOT RUNNING 9-9 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES _______ __ _____ _ 3. Start at Step 9 in Chapter 2 of the TOPS-20 KL Model B ____________ _____ Installation Guide and follow all the steps through Step 60. In Step 9, instead of mounting the TOPS-20 Installation Tape, mount your system structure SYSTEM BACKUP TAPE that contains the monitor, TOPS-20 Command Processor, DLUSER, DLUSER data, DUMPER, and save sets containing and . 4. After performing Step 60, restore your entire file system using DUMPER. First run DUMPER, then mount your first reel of the most recent full DUMPER tape and follow the procedures _______ __________ _____ in the TOPS-20 Operator's Guide. 5. Re-create the front-end file system by following the _______ __ _____ _ directions in Chapter 4 of the TOPS-20 KL Model B ____________ _____ Installation Guide. 6. Finally, restart the system by following the directions in _______ __ _____ _ ____________ _____ Chapter 5 of the TOPS-20 KL Model B Installation Guide. NOTE Restore the incremental saves to obtain the most recently saved files. Before restoring each incremental tape, type DUMPER>CREATE to restore all the directories that were created since the last time you ran the DLUSER program. 9.4.2 Re-creating Mountable Structures 9.4.2 Re-creating Mountable Structures If, after your efforts to correct errors on a structure other than the system structure (using the command RECONSTRUCT ROOT-DIRECTORY to CHECKD), you still cannot use the structure, you can re-create that structure and restore all the directories and files. You can restore structures other than the system structure during timesharing. To restore a mountable structure you must: 1. Give the SET STRUCTURE IGNORED command to the OPR program to prevent other users from mounting the structure while you are re-creating it. 2. Run CHECKD to create the structure. 3. Run DLUSER to restore directory parameters for the structure if you previously used the program to save the parameters. 4. Run DUMPER using the backup tapes for this structure. Give the CREATE and RESTORE commands to DUMPER to restore all the directories and files. 9-10 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES _______ __________ _____ The TOPS-20 Operator's Guide details the procedures for running CHECKD and DUMPER to re-create a structure. 9.5 POWER FAILURES 9.5 POWER FAILURES Unfortunately, power failures and brown-outs sometimes occur at installations. You should be aware of the immediate steps to perform and transmit this information to your operations people. The kind of attention you should direct to this type of problem depends on the type of outage you have. These steps can protect your system from physical damage and perhaps unnecessary loss of files. If your system experiences a total power failure, you should: 1. Immediately power-off all components of the system. 2. Inform your DIGITAL Field Service representative as to when you expect to resume power. The field service representative may ask to be present while you bring your system back up. If your system experiences a short instance of a power failure or brown-out, the system may recover on its own. You may not have any problems and, usually, all your data remains intact. If you notice a problem, call your Field Service representative. High-performance computer systems are sensitive to the quality of the electrical power supply. An investment in a power conditioner or an uninterruptible power supply may more than repay itself in improved system reliability and availability. Your Field Service representative may be able to assist you in evaluating the need for such equipment. 9.6 REMOTE DIAGNOSTIC LINK (KLINIK) 9.6 REMOTE DIAGNOSTIC LINK (KLINIK) You may occasionally have a problem with your system and cannot determine the cause. The remote diagnostic link, available on all systems, allows a DIGITAL Field Service engineer to access your system from a remote location and run diagnostic programs. This capability is called KLINIK. The DIGITAL engineer accesses KLINIK through a terminal and telephone line at the DIGITAL Service Center. The _______ __________ _____ TOPS-20 Operator's Guide describes when and how to use the KLINIK capability. 9-11 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 9.7 MAKING THE CI UNAVAILABLE ON NON-CFS SYSTEMS 9.7 MAKING THE CI UNAVAILABLE ON NON-CFS SYSTEMS The CI, a computer-interconnect bus, is a key piece of hardware for connecting systems in a CFS-20 configuration and for connecting HSC50-based disks (RA81s and RA60s) to a system. Ordinarily, you need do nothing at all to operate the CI. However, you may need to disengage a system from the CI so Field Service personnel can correct problems with the CI20 or the HSC50. At those times, you should instruct the operator to make the CI unavailable by means of the SET PORT CI UNAVAILABLE command. (Refer to the TOPS-20 Operator's Guide for details.) When the CI is unavailable to a system, users cannot access HSC50-based disks, which rely on the CI to transmit data. The procedure calls for the operator to dismount any structures that the system indicates are mounted on these disk drives. To put the CI back in operation, the operator gives the command: ___ ____ __ ______________ OPR>SET PORT CI AVAILABLE Structures that were affected must then be remounted. Refer to Chapter 12, THE COMMON FILE SYSTEM, for information on disengaging the CI on CFS systems. 9.8 MAKING THE NI UNAVAILABLE 9.8 MAKING THE NI UNAVAILABLE A system may need to be disengaged from the NI so that field service personnel can diagnose problems with the NI or the NIA20. To make the NI unavailable to a system, the operator gives the command: ___ ____ __ ________________ OPR>SET PORT NI UNAVAILABLE This command prevents users of the system from using LAT terminal servers as well as any other software that uses the NI. If DECnet or TCP/IP software is installed, it cannot use the NI for data transfer between systems. To make the NI available again, the operator gives the command: ___ ____ __ ______________ OPR>SET PORT NI AVAILABLE 9.9 OFFLINE DISKS 9.9 OFFLINE DISKS When a disk unit becomes unavailable to a system, all jobs accessing the disk "hang" until the disk becomes available again. When the disk comes back online, input/output activity continues from the point where it left off. 9-12 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES Also, some jobs may try to begin accessing the disk after it went offline but before it becomes available again. They hang in the same way that interrupted jobs, described above, hang. You can specify that offline disks be made unavailable to these new jobs by putting the following command in the n-CONFIG.CMD file: ENABLE OFFLINE-STRUCTURES mm:ss where: mm:ss is the "structure timeout interval" in minutes:seconds format. The structure timeout interval is the length of time from when the system recognizes that a disk unit has gone offline to when it marks the structure as offline. The maximum value for mm:ss is 15 minutes; the minimum is 1 second. It should be noted that if just one disk of a multidisk structure becomes unavailable, then the entire structure is marked offline. After a structure is marked offline, it becomes unavailable to new jobs requesting input/output service. The system sends an error message to any requestor trying to access the structure. This command is in effect by default with a timeout interval of 5 seconds. To disable the feature, enter the following command in the configuration file: DISABLE OFFLINE-STRUCTURES A good reason to disable the feature is to prevent batch jobs from terminating when they receive the error message indicating that the desired structure has been set offline. You may want batch jobs to hang until the disk is restored for use. 9.9.1 Operator Procedures 9.9.1 Operator Procedures Privileged commands corresponding to the ones above are available to the operator during timesharing: $^ESET OFFLINE-STRUCTURES mm:ss $^ESET NO OFFLINE-STRUCUTRES Operators may want to set the timeout interval to a value higher than five seconds if they are able to correct the disk problem within the specified period. However, new user requests will then hang until the disk is marked offline (or the problem is corrected). 9-13 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 9.10 DUMPING ON NON-FATAL SYSTEM ERRORS 9.10 DUMPING ON NON-FATAL SYSTEM ERRORS The monitor can dump its memory area to a disk file when BUGCHKs and BUGINFs occur. This feature, called DUMP-ON-BUGCHK, helps you debug the system of nonfatal, "continuable" errors by providing a dump file for examination. 9.10.1 Enabling DUMP-ON-BUGCHK 9.10.1 Enabling DUMP-ON-BUGCHK The DUMP-ON-BUGCHK feature is enabled in the n-CONFIG.CMD file with the following command: ENABLE DUMP-ON-BUGCHK FACILITY At least one of the following commands is further required to enable dumping of all or specific BUGCHKs or BUGINFs that can be dumped: ENABLE DUMP-ON-BUGCHK ALL-BUGCHKS ENABLE DUMP-ON-BUGCHK ALL-BUGINFS ENABLE DUMP-ON-BUGCHK BUG bugname where: bugname is the name of a BUGCHK or BUGINF With the first two commands, each BUGCHK or BUGINF is dumped only once per loading of the system. The third command causes a dump to be taken each time that the specified BUGCHK or BUGINF occurs. Dumps are taken only as often as the DUMP-ON-BUGCHK timeout allows, which is 15 seconds by default. The following command overrides the timeout constraint and allows a dump to be taken as often as a specified bug occurs: ENABLE DUMP-ON-BUGCHK BUG bugname IGNORE-DUMP-TIMEOUT 9.10.2 Disabling DUMP-ON-BUGCHK 9.10.2 Disabling DUMP-ON-BUGCHK You may want to disable this feature to save memory space that the monitor uses to implement it, or after you've looked at the considerations in Section 9.10.5. You could save the feature for times when the system is experiencing problems. If the feature is disabled, the system produces only the "crash" dumps associated with fatal errors, but not "continuable" dumps. To disable DUMP-ON-BUGCHK, enter the following command in the n-CONFIG.CMD file: DISABLE DUMP-ON-BUGCHK The DOB-ON-BUGCHK facility is disabled by default. 9-14 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES 9.10.3 "Dumpable Structures" 9.10.3 "Dumpable Structures" The operator can specify where continuable dumps are written with the command: ___ _________ ____ _____________ OPR>SET STRUCTURE str: DUMPABLE where: str: is the name of a structure that is to be considered "dumpable." This command can be given for more than one structure. Note that the system structure is always dumpable. The dumpable status of a structure remains intact across crashes and system reloads. A continuable dump is written to the DUMP.EXE file on a dumpable structure. The system writes the file to the first structure that meets the following conditions: o The structure is dumpable. o The structure is not being initialized or dismounted. o The structure is not offline, in maintenance mode, or write locked. o The data in the monitor's structure data block for the structure appears to be uncorrupted. o Any DUMP.EXE files on the structure have been copied (see the following section) and therefore will not be overwritten. 9.10.4 Copying the Dump File 9.10.4 Copying the Dump File After the dump, the n-SETSPD program scans all dumpable structures and copies any previously uncopied DUMP.EXE files to an area on DMP:, if this logical name is defined. Otherwise, it copies the files to other areas on the same structures. The new files have unique names of the form: 9-15 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES str:DUMP-nnnn-bug.CPY.n where: str is the name of the structure nnnn is the edit number of the monitor that was running at the time of the crash bug is the name of the BUGCHK or BUGINF n is the file generation number An informational message similar to the following is sent to the CTY after each copy: Copying system dump from: ABC:DUMP.EXE.1 to: XYZ:DUMP-21002-FSPOUT.CPY.1 9.10.5 Time Considerations 9.10.5 Time Considerations The DUMP-ON-BUGCHK facility (DOB) turns off timesharing while the system is being dumped. If DOB takes an extended period of time, LAT, | DECnet, or INTERNET connections may be lost. Therefore, you should specify the fastest available device for DOB dumps. The following are sample DOB times for various disk types and memory sizes: ______________________________________________________________________ Device Memory Size DOB Time (megawords) (seconds) ______________________________________________________________________ RP07 1.5 06 RP07 4.0 16 RP06 1.5 11 RP06 4.0 32 RA60/81 1.5 21 RA60/81 4.0 56 ______________________________________________________________________ 9-16 SYSTEM PROBLEMS/CRASHES SYSTEM PROBLEMS/CRASHES Problems could occur in the following areas during extended dump periods: ____ ____ ________ _____ o Data from Terminal Lines During continuable dumps, the system is not in sufficient communication with the front end to ensure that terminal input data gets processed. (The monitor enters "secondary _______ ______ _________ ______ protocol" -- refer to the RSX-20F System Reference Manual for details). This data could get lost. It is a problem particularly with lines doing high-speed input. ______ o DECnet If other nodes in a DECnet network have their timeout periods set at a value lower than the time it takes for a continuable dump on this system, inter-system links could timeout. ___ o LAT A LAT server has a default maximum timeout value of two minutes, which should suffice for continuable dumps on the host. However you can decrease the server timeout period. If you make it too short, all jobs on the host could become detached after the dump. 9.10.6 Controlling DUMP-ON-BUGCHK 9.10.6 Controlling DUMP-ON-BUGCHK For your convenience, there is an unsupported program on the tools tape that can help you control the DUMP-ON-BUGCHK facility. The tool is called DOBOPR. It includes documentation that you can access with the program's HELP command. 9-17 10-1 CHAPTER 10 CHAPTER 10 SYSTEM PERFORMANCE SYSTEM PERFORMANCE The configurations of systems running TOPS-20 and the mix of jobs on these systems vary from installation to installation. TOPS-20 is designed to provide better response to interactive users than to provide higher throughput to computational tasks. On systems with a typical mix of interactive and batch jobs, this design provides both good response and adequate throughput. Therefore, if your system has many timesharing users and an average amount of batch processing jobs, you will find that your system's response is good and most users are satisfied. If you have a mix of jobs or a configuration different from a typical system, you may want to change the response of your system to provide better service to specific users. TOPS-20 provides several tuning mechanisms that allow you to experiment with and change the behavior of your system. One mechanism allows you to favor classes of users by allocating each class a specified percentage of the CPU. Another mechanism allows you to favor computational jobs over interactive jobs. A third mechanism allows you to disable features that normally provide better performance, but that may not be applicable at your installation. This chapter describes the mechanisms for tuning your system's response and provides guidelines for using these mechanisms. Because the response of your system can be felt during actual use only, you can expect system tuning to be an experimental and iterative process. By analyzing the statistics from the WATCH program and by gathering inputs from your users, you can determine the best way to tune your system. The tuning mechanisms include: o The class scheduler, which allows you to divide the central processor (CPU) resource among groups of users o Assigning low priority to batch jobs for installations that do not use the class scheduler 10-1 SYSTEM PERFORMANCE SYSTEM PERFORMANCE o Bias control, which allows you to favor either interactive or compute-bound jobs on your system o The program name cache for improving the startup time of frequently used programs o Reinitializing disk packs in heavily used structures for improving file processing time Each mechanism can be used independently. Unless otherwise noted, there is no interrelationship among them. 10.1 THE CLASS SCHEDULER 10.1 THE CLASS SCHEDULER Occasionally, certain jobs monopolize the central processor's time while other more critical jobs wait for the CPU. You may want to control the amount of CPU time a job receives. You can use the class scheduler to provide an even distribution of CPU time or to provide more CPU time to critical jobs on the system. Some system managers may want to allocate a larger amount of processor time to special users than to other system users. Sections 10.1.1 through 10.1.9 describe: o an overview of the class scheduler o who should use the class scheduler o how to begin using the class scheduler o turning on the class scheduler o changing class percentages o disabling the class scheduler o getting information about class scheduler status o a sample session using class scheduler commands o an alternative to using the class scheduler with accounts. 10.1.1 Overview 10.1.1 Overview The class scheduler allows you to allocate percentages of the central processor's time to individual classes of users. Each job in a class receives a portion of the class percentage. Therefore, by using the class scheduler, you can provide a consistent service to predefined groups of users. 10-2 SYSTEM PERFORMANCE SYSTEM PERFORMANCE The diagram below illustrates the concept of classes and percentages of CPU time allocated to each class. Note that you can set up a class to include all batch jobs. This allows you to control batch jobs separately from timesharing jobs. The batch class is given a high percentage or a low percentage. Now, each time a user submits a batch job, the scheduler uses the batch class and not the user's class. Section 10.1.4, Step 5, describes how to create a batch class. __________________ | | | | | | | RESEARCH | | 40% | CLASS 2 | | | | |__________________| | | | | | BATCH | CLASS 1 | 30% | | | |__________________| | | | ADMINISTRATION | CLASS 0 | 20% | |__________________| | STUDENTS | |________10%_______| CLASS 3 You can define class memberships by using the TOPS-20 accounting facility or by writing your own access control program. Section 10.1.9 provides an overview of using an access control program to define classes. The following description applies to using the class scheduler with the accounting facility. Using the accounting facility, you can associate a class number with each account on the system. Each account has only one class associated with it. Therefore, only a user who has access to more than one account can have access to more than one class. The user changes classes by changing accounts. To use this method, you must enable account validation so that users are required to use a valid account. Section 10.1.4 describes the accounting file entries. The scheduler periodically computes the time used by classes and individual jobs within a class. The scheduler's first concern is that a class receive its share of the CPU time. The scheduler gives a greater percentage of time to the class that is the farthest away from its target (the total percentage allocated to the class). The scheduler's second concern is that each job within a class receive its fair share. Periodically, the scheduler computes the average amount 10-3 SYSTEM PERFORMANCE SYSTEM PERFORMANCE of CPU time that a job has accrued. This quantity determines the job's priority within the class. A job that is requesting the CPU and is farthest way from receiving its fair share within the class receives a greater percentage of time within that class. Generally, the CPU has unused time. This unused time is called windfall. Windfall occurs if one or more classes has no logged-in jobs, or if one or more classes has an insufficient demand for the CPU to use all of its class percentage. You can handle windfall in one of two ways: allocate it or withhold it. Allocating windfall means that the excess CPU time is awarded proportionately to the active classes. (In this discussion, the term active class refers to a class that has logged-in users requesting CPU time.) Higher percentage classes receive proportionately more of the available windfall than lower percentage classes. This means classes can receive slightly more than their allowed percentages when there is windfall available. Note that windfall is distributed proportionately to each class and not to each job within a class. Withholding windfall means that the excess CPU time is idle time and it is not distributed to the active classes. It also means that classes do not receive more than the percentage allowed for them. Usually, it is better to allocate windfall, and not withhold it so you don't throw away valuable computer time. 10.1.2 Who Should Use the Class Scheduler? 10.1.2 Who Should Use the Class Scheduler? As mentioned earlier, the class scheduler allows you to divide the user community into defined classes and allocate a percentage of CPU time to each class. This intended use may not be beneficial or practical for some systems. Tradeoffs do exist and some installations do not require class scheduling. Therefore, read the following paragraphs and determine if your system needs this type of control. Several instances that can benefit from using the class scheduler are: o You can elect to sell portions of CPU time. For example, customer X can purchase some percentage of computer time at a proportional cost. You should, in this case, invite customer X to your installation and provide an environment that simulates the kind of response this customer can expect at this percentage. Because it is impossible to create the environment exactly as the customer will experience it at all times, customer X may decide later to change the purchase to a different percentage. 10-4 SYSTEM PERFORMANCE SYSTEM PERFORMANCE o If you have a natural division among the users of the system, you can divide these users into classes, then distribute CPU time to these classes with respect to their importance on the system. For example, in an educational environment, you may have administrative users (doing payroll, grades, etc.), faculty users (perhaps working on a funded research project), and student users (who are computer science majors). Using the class scheduler, you can establish three classes and distribute the CPU time according to the importance or pay rate of each class. o If you wish to give preference to batch jobs, you can use the class scheduler to give the batch class a high percentage of the CPU. Conversely, you may not want to use the class scheduler for some of the following reasons: o If you have not realized a need in the past for class scheduling, or if you have a new system and do not see an immediate requirement for class scheduling, you should not set it up. o Systems with minimal amounts of memory may experience an increase in swapping. This additional overhead may offset any advantage gained by using the class scheduler. o In addition to other tasks, the scheduler constantly maintains usage values for each class and job. Because of this extra overhead, the overall system throughput decreases. Therefore, use the class scheduler if allocating percentages to individually defined classes outweighs the throughput depreciation. o To give batch jobs a low priority on the system, you do not have to use the class scheduler. Section 10.2 describes placing the BATCH-BACKGROUND command in the n-CONFIG.CMD file to place all batch jobs in a low priority (or background) queue. 10-5 SYSTEM PERFORMANCE SYSTEM PERFORMANCE 10.1.3 How to Begin Using the Class Scheduler 10.1.3 How to Begin Using the Class Scheduler If you elect to use the class scheduler, first divide the system users into classes. Next, determine the amount of CPU time each class should receive. Percentages given to classes are typically in units of 5, that is, 5%, 10%, 15%, ....100%. The sum of the percentages given to all classes cannot exceed 100 percent. The result of these two steps depends on the reason you elected to use the class scheduler, and how you plan to use it at your installation. Because of this system dependency, step-by-step procedures for selecting classes and allocating the CPU cannot be given. The following discussion provides you with guidelines for setting up the class scheduler to meet your system's needs. o Start with as few classes as possible, three or perhaps four. The class scheduler allows eight. Later, you can divide classes further, if necessary. o Determine the number of logged-in users you expect in each class. Be sure that you do not overload a class, making it impossible to give a sufficient percentage of the CPU to each job in the class. Also, you can limit the number of users in a class, but you cannot limit the number of jobs. For example, the SUBMIT command creates an additional job. Therefore, consider the type of work that users in a class perform. o Estimate the percentage of CPU time (or time purchased) each class should receive. This is a difficult step; however, you can experiment with and later alter the percentages you choose. (Section 10.1.5 describes how you can change class percentages.) If a class consists of a large number of users who are generally logged in at the same time, be sure to give this class sufficient CPU time. For example, using the diagram below, class 2 has 60 members. It also has 60 percent of the CPU. This means that if approximately 60 jobs in class 2 are demanding the CPU, each job will receive approximately 1 percent. (It may be slightly greater than 1 percent if you allocate windfall.) This also means that on a per-job basis, users in class 2, with the higher percentage, may not get as much of the CPU as users in class 0 or class 1. o In order to avoid possible performance problems, no class should be allocated less than 5% of the CPU. 10-6 SYSTEM PERFORMANCE SYSTEM PERFORMANCE ___________________ | | | | | | | | | | | 60% | CLASS 2 | | | | | | | | | | |___________________| | | | WINDFALL | | | |___________________| | | | 15% | CLASS 1 |___________________| |_________5%________| CLASS 0 o The above diagram illustrates that you can allocate less than 100 percent of the CPU to classes. However, the total percentage for all classes cannot exceed 100 percent. o The system uses class 0 as a default for any account that does not have a valid class assigned to it. Therefore, you can divide a portion of the system into well-defined classes and have all other users receive the percentage given to the default class. o You can set up the class scheduler so that one class, perhaps the default class, receives only windfall. For example, suppose you allow some users to log into an account that is not yet assigned a class. These users are assigned to the default class 0. Or, suppose several users log in infrequently, read mail, and perform little computing. These users may log into an account that is not assigned a class (and, therefore, are assigned the default class, 0), or an account that is associated with class 0. You subsequently assign a zero percentage to class 0. These users may receive enough windfall to get their job done. However, they are not allocated CPU time and can have periods of extremely slow or no response. You may find, after experimenting with this type of procedure, that it is better to associate each account with a class and give the class a very low percentage of the CPU. 10-7 SYSTEM PERFORMANCE SYSTEM PERFORMANCE o Situations may arise that affect the scheduler's ability to give a class its percentage of the CPU. For example, the members of a class cannot use the amount of CPU time allocated to the class. Also, a situation may arise where the demands of the class exceed the percentage of CPU time given the class, and windfall is available but not allocated. In either case, you should reevaluate both the percentages given to classes, and whether or not you want to continue withholding or allocating windfall. 10.1.4 Procedures to Turn On the Class Scheduler 10.1.4 Procedures to Turn On the Class Scheduler After dividing users into classes and estimating the amount of CPU time, follow these steps to set up classes and turn on the class scheduler. ____ _________ Step Procedure 1. Edit the ACCOUNTS.CMD file on the system structure (and the subaccount files, if any, that contain all your accounting data). Follow the procedure in Chapter 6, Creating Accounts, for modifying or creating each account with the /CLASS:n switch. For example, _______ _____________ ACCOUNT COMP1/CLASS:1 _____ ___________________ USERS KOHN,HOLLAND,MILLER means that when users Kohn, Holland, and Miller log into or change their account to COMP1, they are placed in class 1. Each account has only one class associated with it. Therefore, only the user who has access to more than one account can have access to more than one class. A job can be in only one class at any one time. 2. Run the ACTGEN program. Give the TAKE command and specify the ACCOUNTS.CMD file (or the file containing the accounting data). 3. When ACTGEN returns its prompt, give the INSTALL command. This command updates the ACCOUNTS-TABLE.BIN file that the system uses to validate accounts. 4. Edit the n-CONFIG.CMD file to include the CREATE commands that specify the classes. Be sure account validation is enabled. That is, check that the DISABLE ACCOUNT VALIDATION command is NOT in the file. (The system default is ENABLED.) If account validation is disabled, users can use any account and therefore any class they choose. Enter the following commands in the order shown below. 10-8 SYSTEM PERFORMANCE SYSTEM PERFORMANCE The CREATE command defines the class number and the percentage of CPU time the class should receive. For example, ______ _ ___ CREATE 0 .40 means that the default class, 0, should receive 40 percent of the CPU. Enter the CREATE command for each of the classes that you defined in the ACCOUNTS.CMD file. For example, ______ _ ___ CREATE 0 .40 ______ _ ___ CREATE 1 .20 ______ _ ___ CREATE 2 .30 NOTE Remember that class 0 is the default class. Any user whose account (this includes subaccounts) is not associated with a specific class is placed in class 0. 5. Next, if you have decided to place all batch jobs in a separate class, enter the BATCH-CLASS command. For example, ___________ _ BATCH-CLASS 2 means that all batch jobs will be placed in class 2 regardless of the user's associated class. You must use the CREATE command to define the percentage of CPU time that the batch class should receive. Note that timesharing users can be in the same class as well, if the account they use is associated with that class. The CREATE command in step 4 defines class 2 to receive 30 percent of the processor. If you do not place a BATCH-CLASS command in the n-CONFIG.CMD file, the scheduler treats all batch jobs the same as timesharing jobs. 6. Finally, enter the ENABLE CLASS-SCHEDULING command. Be sure this is the last command entered. If you reverse the order, that is, you enter ENABLE CLASS-SCHEDULING before the CREATE commands and BATCH command, all users will receive zero percent of the CPU. The ENABLE CLASS-SCHEDULING command turns on the class scheduler at the next system reload. It also specifies if you are using accounting or an access control program (policy program) for class scheduling and if you are allocating or withholding the windfall. The format of this command is: 10-9 SYSTEM PERFORMANCE SYSTEM PERFORMANCE ENABLE CLASS-SCHEDULING ACCOUNTS WITHHELD POLICY-PROGRAM ALLOCATED For example, ______ ________________ ________ _________ ENABLE CLASS-SCHEDULING ACCOUNTS ALLOCATED means turn on the class scheduler, use the accounting method, and allocate the windfall. Always allocate the windfall. Do not withhold windfall unless you have a very good reason to do so, and you are sure that your class scheme works. The entry, ______ ________________ ______________ _________ ENABLE CLASS-SCHEDULING POLICY-PROGRAM ALLOCATED means turn on the class scheduler, use the policy (access control) program, and allocate the windfall. 7. At the next system reload (the system is brought down and back up again) the new commands in the n-CONFIG.CMD file take effect. 10.1.5 Changing Class Percentages During Timesharing 10.1.5 Changing Class Percentages During Timesharing During timesharing, you can change the percentage that a class receives by using the SET command to OPR. This change lasts until either the next system reload, or you make another change using the SET command. The format of the SET command appears: SET SCHEDULER CLASS (number) m (to percent) n n can be from 0-99 inclusive. Note that the decimal point required in the CREATE command is not allowed in this command. To make the percentage that a class receives permanent, edit the CREATE commands in the n-CONFIG.CMD file. For example, you can edit the commands ______ _ ___ CREATE O .60 ______ _ ___ CREATE 1 .30 ______ _ ___ CREATE 2 .10 to ______ _ ___ CREATE 0 .10 ______ _ ___ CREATE 1 .05 ______ _ ___ CREATE 2 .80 10-10 SYSTEM PERFORMANCE SYSTEM PERFORMANCE Next, reload the system to process the commands in the n-CONFIG.CMD file. The classes that received a low percentage before you made the change now receive a higher percentage of CPU time. Changing class percentage may be useful if you decide that users in one or two classes should receive a greater percentage of CPU time than other classes during the day. However, these high-percentage classes may not require this time during the evening shift. If you have a recurring need for such changes, you may want to put the appropriate commands into files for use with the TAKE command in OPR. 10.1.6 Disabling the Class Scheduler During Timesharing 10.1.6 Disabling the Class Scheduler During Timesharing You can turn the class scheduler off and back on during timesharing by using the DISABLE and ENABLE commands to OPR. The class scheduler remembers the class percentages that were in effect before the DISABLE command was given. For example, suppose you use the SET command to change the percentage that class 1 should receive from 05 to 15 percent. Then, you give the DISABLE CLASS-SCHEDULER command, and later give the ENABLE CLASS-SCHEDULER command. The class scheduler uses 15 percent for class 1. If you reload the system after disabling the class scheduler, the class scheduler is enabled again and uses the percentages given in the n-CONFIG.CMD file. 10.1.7 Getting Information About Class Scheduler Status 10.1.7 Getting Information About Class Scheduler Status Several TOPS-20 commands provide information about different class scheduler statistics. The INFORMATION (ABOUT) SYSTEM-STATUS command informs you if: o the class scheduler is enabled or disabled o the accounting method or an access control program is being used o windfall is allocated or withheld o the system's batch jobs are in a separate class. For example ___________ __________________ @INFORMATION (ABOUT) SYSTEM-STATUS CLASS SCHEDULING BY ACCOUNTS ENABLED, WINDFALL ALLOCATED, BATCH CLASS 1. 10-11 SYSTEM PERFORMANCE SYSTEM PERFORMANCE The INFORMATION (ABOUT) MONITOR-STATISTICS command provides a table that shows each active class, its target use of the CPU, its current use of the CPU, and the load averages for that class. For example, ___________ _______________________ @INFORMATION (ABOUT) MONITOR-STATISTICS Class Share Use Loads 0 0.80 0.79 6.56 4.36 3.57 1 0.15 0.21 5.46 1.38 .95 2 0.05 0.00 0.00 0.00 0.00 The SYSTAT command outputs load averages for either the entire system or a specific class. When the class scheduler is disabled, these averages represent the load of the entire system. For example, ___________ @SYSTAT Wed 11-Jul-88 10:17:09 Up 11:38:12 52+16 Jobs Load av 5.30 4.03 4.86 The last three numbers following Load av indicate the average number of runnable processes over a period of one minute, five minutes, and fifteen minutes. These numbers start at zero. The higher the numbers the longer a job has to wait for CPU time on the average. Using the example, over a fifteen minute period, a given job demanding the CPU waits approximately 4.86 times longer to run than it would if it were the only job running on the system. When the class scheduler is enabled, these load averages represent the status of the job doing the SYSTAT command and not the entire system. For example, ___________ @SYSTAT Wed 11-Jul-88 10:28:07 Up 11:49:12 52+10 Jobs Load av (class 1) 1.79 2.36 2.88 The last three numbers following Load av indicate the load averages of the class that the job giving the SYSTAT command is in. The SYSTAT command with the CLASS argument provides a breakdown of each job on the system. This breakdown includes the class each job is in, the average share of the class percentage that this job can receive, and _______ ________ how much CPU time the job is currently using. The TOPS-20 Commands _________ ______ Reference Manual describes these commands in detail. 10-12 SYSTEM PERFORMANCE SYSTEM PERFORMANCE 10.1.8 A Sample Session 10.1.8 A Sample Session The following examples show: o The ACCOUNTS.CMD file after associating classes with accounts. o The procedures that you follow after editing all your accounting files. o A sample of the class scheduling commands that are placed in the 7-CONFIG.CMD file. !The ACCOUNTS.CMD file has been edited. ____ ________________________________ $TYPE (FILE) MAIN:ACCOUNTS.CMD ACCOUNT MYBANK/CLASS:2 USERS BLOUNT,KONEN,ENGEL ACCOUNT TRUST/CLASS:1 USERS BRAITHWAITE,HURLEY,HALL,CRISS ACCOUNT OVERHEAD USERS SAMBERG,BERKOWITZ,TAYLOR ACCOUNT PROG/CLASS:3 USERS BLOUNT,KOHN,HOLLAND $ !Notice that account OVERHEAD uses the default class, 0. !Next, run the ACTGEN program. ___ ___________ $RUN ACTGEN ____ ________________________________ ACTGEN>TAKE (COMMANDS FROM) MAIN:ACCOUNTS.CMD !After ACTGEN finishes and returns its prompt, give the !INSTALL command to create a new version of the !ACCOUNTS-TABLE.BIN file ____________ ACTGEN>INSTALL !After ACTGEN finishes and returns its prompt, give the !EXIT command _________ ACTGEN>EXIT $ 10-13 SYSTEM PERFORMANCE SYSTEM PERFORMANCE ____ ________________________ $TYPE SYSTEM:7-CONFIG.CMD !Terminal Speeds TERMINAL 1 SPEED 2400 TERMINAL 2 SPEED 9600 TERMINAL 3 SPEED 2400 TERMINAL 4 SPEED 2400 TERMINAL 5 SPEED 300 TERMINAL 6 SPEED 300 DEFINE SYS: MAIN: DEFINE SYSTEM: MAIN: DEFINE NEW: MAIN:,SYS: DEFINE OLD: MAIN:,SYS: DEFINE HLP: MAIN:,SYS: MAGTAPE 0 40672 TU72 MAGTAPE 1 37719 TU72 PRINTER 0 VFU SYS:NORMAL.VFU PRINTER 0 LOWERCASE RAM SYS:LP96.RAM TIMEZONE 6 !Commands for the class scheduler CREATE 0 .05 CREATE 1 .45 CREATE 2 .25 CREATE 3 .15 BATCH-CLASS 3 ENABLE CLASS-SCHEDULING ACCOUNTS ALLOCATED $ To start the Class Scheduler, either reload the system, or give the ENABLE CLASS-SCHEDULER command to OPR. If you edited the n-CONFIG.CMD file to remove the DISABLE ACCOUNT VALIDATION command, you must reload the system so you can start validating accounts. 10.1.9 An Alternative to Using Accounts 10.1.9 An Alternative to Using Accounts Chapter 11 describes the access control program (policy program) that is used to grant and restrict access to various system hardware and software. This same program also includes the appropriate monitor calls to handle class scheduler decisions. Among the requests it can | define are classes at login. NOTE You CANNOT run the access control program to implement class scheduler decisions at the same time you use the accounting method. You must use one or the other. 10-14 SYSTEM PERFORMANCE SYSTEM PERFORMANCE 10.2 SCHEDULING LOW PRIORITY TO BATCH JOBS 10.2 SCHEDULING LOW PRIORITY TO BATCH JOBS The decision to favor batch jobs or to run them as background tasks depends on the type of batch environment you have at your installation. For example, if users submit batch jobs that are long and/or that do not require completion immediately, you can give batch jobs a low priority. Conversely, if batch jobs are the primary jobs on the system, you can give them a high priority. Section 10.1 describes how to place batch jobs in either a high or low percentage class by including the BATCH n command in the n-CONFIG.CMD file. When a user submits a batch job, the scheduler uses the batch class and not the user's class. You must use the class scheduler to give batch jobs a high priority. If you are not using the class scheduler, you can give batch jobs a | low priority. Do this in one of two ways: | | o Enter the BATCH-BACKGROUND command in the n-CONFIG.CMD file. This command specifies that all batch jobs run on the lowest priority queue, also known as the background queue. This means that after processing all interactive jobs, the scheduler selects and runs batch jobs waiting in the queue. They receive left-over CPU time. You can enter the BATCH-BACKGROUND command into the n-CONFIG.CMD file. The command takes effect the next time you reload the system. NOTE The BATCH-BACKGROUND command is intended for those who are not using the class scheduler on their system but want to give the batch jobs a low priority. You should not use this command when you enable the class scheduler. | o The operator can issue the SET SCHEDULER BATCH-CLASS n | command at the OPR> prompt, where n can be BACKGROUND (batch | jobs are run in the lowest priority queue or NONE (batch jobs | receive no CPU time). 10.3 FAVORING INTERACTIVE VERSUS COMPUTE-BOUND PROGRAMS 10.3 FAVORING INTERACTIVE VERSUS COMPUTE-BOUND PROGRAMS This section describes how you can influence the scheduler to favor either interactive or compute-bound programs. You do this by using the bias control, which is analogous to turning a knob over a range of settings (from 1 to 20). When you select a lower number, the scheduler favors users running interactive programs. When you select a higher number, the scheduler favors users running computational programs. 10-15 SYSTEM PERFORMANCE SYSTEM PERFORMANCE NOTE You can use bias control with or without the class scheduler enabled. However, the effect of the bias control is less noticeable when used with the class scheduler. After you install TOPS-20 software, the system uses the default bias control number 11. This setting distributes the scheduler's attention evenly to interactive and compute-bound programs. New users of TOPS-20 can use the default setting until they need to favor particular types of programs. Previous users of TOPS-20 may want to experiment with new control settings. For example, the bias controls can serve as a good tool for favoring different types of users at different times of the day. For instance, you can set the bias to a low number during the day to favor on-line users and to a high number during the evening to favor batch users. The response you receive from your user community should determine the appropriateness of the selected settings. Setting the bias toward interactive programs gives better response to the terminal user. Also, this setting may produce a higher system overhead, because the scheduler swaps jobs and switches from different tasks more often in its effort to favor interactive programs. Generally, setting the bias toward interactive programs is beneficial only if you have sufficient memory. Both the swapping rate and the scheduler overhead are likely to increase in small systems with too little memory. If your system has adequate memory, the scheduler overhead should be fairly constant over most of the bias settings. Setting the bias toward computational programs should reduce system overhead and increase the total system throughput. However, the response to the terminal user may decrease slightly. In some cases, the improvement in system throughput more than compensates for the lessened response time, and users are more satisfied. As you experiment with the bias settings, remember that setting the bias control to the extremes can prevent certain types of programs from running for long time periods. After you select a bias control number that fits your system's operation, enter the BIAS CONTROL command in the n-CONFIG.CMD file or use the SET SCHEDULER BIAS-CONTROL command to the OPR program. 10-16 SYSTEM PERFORMANCE SYSTEM PERFORMANCE The format of the command in the n-CONFIG.CMD file is: BIAS CONTROL m The format of the command to OPR is: SET SCHEDULER BIAS-CONTROL (TO) m where m is the bias control number. You can change the bias setting during timesharing by using the SET SCHEDULER BIAS-CONTROL command. However, when you reload the system, the bias setting in the n-CONFIG.CMD file takes effect. If you want your change to be permanent, edit the n-CONFIG.CMD file at a convenient time before you reload the system. Any time you are unsure of the current setting of the bias control, give the INFORMATION (ABOUT) SYSTEM-STATUS command to determine its setting. 10.4 IMPROVING PROGRAM STARTUP TIME 10.4 IMPROVING PROGRAM STARTUP TIME Some of the programs on your system are run frequently. This involves constant searching for the same file on disk, bringing the program pages into memory, and allocating swapping space when the program is swapped out of memory. By storing these programs in an easy-to-access area, some of the startup time is saved. To improve the startup time of the frequently used system programs, TOPS-20 keeps a program name cache. The PROGRAM-NAME-CACHE.TXT file is placed in the directory on the system structure automatically at installation time, and contains a list of programs and files to be copied into the program name cache. These are: SYS:PA1050.EXE SYS:MACRO.EXE SYS:EDIT.EXE SYS:TV.EXE SYS:LINK.EXE SYSTEM:ERRMES.BIN Each time you reload the system, the MAPPER.EXE program runs under the SYSJOB program at the operator's console. MAPPER.EXE reads the PROGRAM-NAME-CACHE.TXT file and loads the program name cache. Now, when requests are made for these programs, the system looks first in the program name cache to see if it can retrieve the required pages quickly. 10-17 SYSTEM PERFORMANCE SYSTEM PERFORMANCE To further improve system performance, you can edit the PROGRAM-NAME-CACHE.TXT file and add the filenames of your own frequently accessed programs. For example, if your system uses the FORTRAN language, you may want to add the files: SYS:FORTRA.EXE SYS:FOROTS.EXE SYS:FORLIB.REL Your list can contain the names of up to 16 executable files. Therefore, select the files to be placed in the program name cache carefully. You should consider only the executable files that are started frequently by a large number of users. You can also add library files to the program name cache, for example, SYS:FORLIB.REL. However, these types of files use up swapping space. If you have too many or very large files, you may create a detrimental effect on your system's performance. The total library file pages that you cache should be no greater than 200 to 300. Give the VDIRECTORY command for the library files you want to cache and check the number of pages in each file. If you edit the cache file, the revised file takes effect (MAPPER creates a new version of the cache) the next time you reload the system. Alternatively, you can create a new version of the cache immediately by entering the following commands at the operator's console. _______ ^ESPEAK !talk to SYSJOB ____ ______ KILL MAPPER !kill old version of cache ___ ______________ RUN SYS:MAPPER.EXE !read new file and create !new version of cache __ ^Z !exit 10.5 REINITIALIZING DISK PACKS 10.5 REINITIALIZING DISK PACKS After many files are created, they may no longer be contiguous on the structure (disk(s)). This scattering of files may increase the time it takes to process them. You may decrease processing time by reinitializing the disk packs in your heavily used structures. For example, the system structure may be a likely candidate for reinitialization. This procedure places files into a contiguous format and can be scheduled as part of a backup procedure. How often you reinitialize your packs depends on the work load of the system and whether you notice a difference in system performance after following this procedure. 10-18 SYSTEM PERFORMANCE SYSTEM PERFORMANCE Reinitializing disk packs requires that you dump all the directories and files to tape, re-create the structure (and, in the case of the system structure, reinstall the system), and restore all the directories and files. Therefore, if you do not notice any appreciable difference in your system performance after doing this, don't schedule it on a regular basis, if at all. _______ __________ _____ The TOPS-20 Operator's Guide describes re-creating the system structure and other structures. Have the operator use this procedure for reinitializing disk packs. If possible, have the operator re-create the structure and restore the files to a different pack (or set of packs) from the structure that you dumped. This ensures that you do not lose your files should you have problems reading the tape back to disk. That is, you still have the original structure intact and can run DUMPER again to copy the files to another tape. 10.6 DYNAMIC DUAL PORTING 10.6 DYNAMIC DUAL PORTING Dynamic dual porting refers to a disk drive that is dual-ported to one system only. When one of the channels is busy transferring data for another disk unit, input/output is automatically switched through the other disk channel. Dynamic dual porting improves the performance of input and output operations. It is activated automatically after field service properly sets up the RP06 or RP07 disk drive(s), and the operator places the drives' port switches in the A/B position. Dynamic dual porting is not supported for RP20 disks. If it is tried, only one path to the RP20 is used. ____________ _________ _______ The DECSYSTEM-20 Technical Summary describes the hardware associated with input and output operations. 10-19 11-1 CHAPTER 11 CHAPTER 11 ACCESS CONTROLS ACCESS CONTROLS TOPS-20 provides control mechanisms that help you: o Govern the access to many of your system's resources and services o Reduce or prevent unauthorized access to the system o Provide an audit trail to help investigate occurrences of unauthorized access The following sections discuss these topics. 11.1 ACCESS CONTROL PROGRAM 11.1 ACCESS CONTROL PROGRAM Previous chapters deal with administrative policies for allocating resources. For example, Chapter 10 describes the policy decisions you can make regarding the scheduler, and Chapter 8 describes the policy decisions you can make regarding tape drive allocation and labeled tape support. In addition, you can make policy decisions that govern the access to specific system resources. For instance, TOPS-20 allows a user to change the speed of a terminal, assign a device, enable capabilities at any time of day, mount a magnetic tape, and mount a disk structure. However, you may want to restrict or disallow use of some of these facilities. You may want only specified users at specified times of the day and, perhaps, at specified terminals, to use certain facilities. A particular mechanism lets you control the access to such resources and services. With it, you have an additional means for collecting accounting or other information. 11-1 ACCESS CONTROLS ACCESS CONTROLS | The following sections describe how to use this access control | mechanism through the TOPS-20 access control program (ACJ). This | program carries out your policy decisions in many areas. It can control scheduling classes, the bias control, batch background queue, logging in, use of physical resources (tape drives, terminals, structures), and enabling capabilities. When a user requests a resource (like ASSIGN TTY34:), your program identifies the user, the | user's controlling terminal, and the type of request being made. The program can merely log this information in a file, or make a decision and tell the monitor to either grant or deny the request. | | | 11.1.1 Starting the ACJ | 11.1.1 Starting the ACJ | | You can start the ACJ in three ways: | _____ _________________________ | 1. $^ESET SYSTEM-ACCESS-CONTROL-JOB | | The advantage of starting the ACJ with ^ESET is that there is | no corresponding ^ESET NO command to disable the ACJ. | Starting the ACJ this way or by way of the configuration file | is the most secure. | ______ _________________________ | 2. ENABLE SYSTEM-ACCESS-CONTROL-JOB command in the configuration | file | | 3. $ESPEAK command: | _______ | $^ESPEAK | [Please type SYSJOB commands - end with ^Z] ___ ______________ | RUN SYSTEM:ACJ.EXE __ | ^Z | | The disadvantage of using the ^ESPEAK command is that | privileged users can disable the ACJ: | _______ | $^ESPEAK | [Please type SYSJOB commands - end with ^Z] ____ ___ | KILL ACJ __ | ^Z 11-2 ACCESS CONTROLS ACCESS CONTROLS 11.1.2 Defining the ACJ Environment | 11.1.2 Defining the ACJ Environment | | To tailor the ACJ environment, run the ACJDEC program: | ___ ______ | @RUN ACJDEC ____ | ACJDEC>HELP | ACJ 7(105) commands: | DISABLE (function) ALL|name | ENABLE (function) ALL|name [profile] | HELP (message) | SAVE (program in) ACJ.EXE | SET (mode) keywords | SHOW ALL|FUNCTION [f]|SETTING [s]|USER [u] | TAKE (commands from) ACJPROFILE.CMD | USER name [profile] | WRITE (commands to) ACJPROFILE.CMD | | This program WRITEs your tailored settings (according to your | ENABLE/DISABLE, SET, and USER commands) into the ACJPROFILE.CMD file. | The ACJ executable image is later created with the SAVE command and | implements the policy decisions specified in the profile file. Note | that the TAKE command resets any of your previous ACJ settings and | should be issued as the first command in your ACJDEC session. | | The following sections describe the ACJDEC commands. | | | 11.1.3 ENABLE and DISABLE Commands | 11.1.3 ENABLE and DISABLE Commands | | The ENABLE and DISABLE commands enable the ACJ to receive requests and | disable it from receiving them for a particular user function. The | command format is: | | ACJDEC>ENABLE function qualifier | ACJDEC>DISABLE function | | Where: | function | o function is one of the following: | | ACCESS ARPANET-ACCESS ASSIGN-DEVICE | ASSIGN-DUE-TO-OPENF ATTACH-JOB CAPABILITIES | CLASS-ASSIGNMENT CLASS-SET-AT-LOGIN CREATE-DIRECTORY | CREATE-FORK CREATE-JOB CREATE-LOGICAL-NAME | CTERM DECNET-ACCESS DETACH | ENQ-QUOTA GETAB HSYS | INFO LATOP LOGIN | LOGOUT MDDT MTA-ACCESS | SECURE-CHFDB SECURE-DELF SECURE-OPENF | SECURE-RNAMF SYSGT TERMINAL-SPEED | TLINK TTMSG USER-TEST 11-3 ACCESS CONTROLS ACCESS CONTROLS | NOTE | | It is recommended that you enable the | following functions: | | ASSIGN-DEVICE LOGIN | ATTACH-JOB LOGOUT | CAPABILITIES MDDT | CREATE-DIRECTORY SMON | | Also, if your site is using "secure" files | (see Section 11.7), enable all the SECURE | functions. | | Section 11.1.3.1 describes the ENABLE/DISABLE command | functions. | qualifier | o qualifier is one of the following: | | [NO] CONSOLE [NO] DENY-BATCH [NO] DENY-CTY | [NO] DENY-DECNET [NO] DENY-DETACHED [NO] DENY-LAT | [NO] DENY-LOCAL [NO] DENY-PTY [NO] DENY-TCP | [NO] LOG [NO] POLICY | | | NOTE | | The following qualifiers are frequently used: | | [NO]LOG [NO]POLICY | | The defaults are LOG and POLICY. | | Section 11.1.3.2 describes the ENABLE/DISABLE command | function qualifiers. 11-4 ACCESS CONTROLS ACCESS CONTROLS 11.1.3.1 ENABLE/DISABLE Command Functions | 11.1.3.1 ENABLE/DISABLE Command Functions - | | NOTE | | You can specify ALL to enable or disable all | functions. | | | o ENABLE ACCESS | | This function controls the ACCESS, CONNECT, and END-ACCESS user | commands. It is recommended that this function be enabled with | the POLICY and LOG qualifiers so that an audit trail of failed | accesses and user connections to their "owned" subdirectories is | created. (Owned subdirectories are directories on any | file structure that is DOMESTIC.) Directory owners are always | allowed to connect to their "owned" subdirectories. | | o ENABLE ARPANET-ACCESS | | This function controls access to TCP/IP. The ACJ is activated | each time a user tries to initiate an outgoing TCP/IP connection. | The implemented policy allows access for users with SC%ANA | capability only. To log all TCP/IP access and allow all users | TCP/IP access, enable this function with NO POLICY. | | o ENABLE ASSIGN-DEVICE and ENABLE ASSIGN-DUE-TO-OPENF | | These identical functions help prevent two users on separate | systems from accessing the same tape drive at the same time, if | the two systems are not in the same CFS-20 cluster. This is | important when there are shared tape drives between two or more | systems. | | Only users with enabled WHEEL or OPERATOR privileges are allowed | to assign magtape devices. The functions prevent non-enabled | users from assigning magtape devices that are set UNAVAILABLE with | the OPR command. All other devices are allowed. | | It is recommended that you enable this function with the POLICY | and NOLOG qualifiers. 11-5 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE ATTACH-JOB | | Like LOGIN, the ATTACH function controls user access to the | system. The attach is denied if: | | The job is a batch job. | | The target job's user profile indicates that the target user | cannot log in to the source's line type. | | WHEEL-only logins are set for the source line type and the | target job is not a WHEEL user. | | The target job is a batch job and the source job is not an | enabled WHEEL. | | The source job has OPERATOR capabilities enabled and the | target job is a user with WHEEL. | | The source job is controlled by a user with OPERATOR | capability and the target job is a user with WHEEL | capabilities. | | It is recommended that you enable the ATTACH function with the LOG | and POLICY qualifiers. 11-6 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE CAPABILITIES | | This function controls the enabling of the capabilities described | in Section 5.9. | | To allow all users to enable at any time and to log all capability | changes, enable the CAPABILITIES function with the NO POLICY | qualifier. Issue the DISABLE CAPABILITIES command to allow | enabling at any time with no logging of activity. | | Setting WHEEL or OPERATOR capabilities is disallowed during | non-prime time unless you have issued the USER | ENABLE-NON-PRIME-TIME command (described in Section 11.1.4). | | If you use the USER ENABLE-NON-PRIME-TIME command (described in | Section 11.1.4), it is recommended that you also use the LOG and | POLICY qualifiers. | | The CAPABILITIES function provides an audit trail of all users who | enable capabilities. | | o ENABLE CLASS-ASSIGNMENT | | The ACJ is activated for all attempts to set a job's scheduler | class using the SKED% monitor call. An example of this is the OPR | command SET JOB x SCHEDULER-CLASS y. However, if a user is not | WHEEL or OPERATOR and is trying to set another job's class, the | ACJ is not consulted and the user receives a CAPX1 error. | | o ENABLE CLASS-SET-AT-LOGIN | | The ACJ is activated each time a job logs in only if the class | scheduler is on and class assignments are set by the policy | program. | | The policy implemented is to use a SKED% monitor call to set the | job in a particular class as specified by the user profile | CLASS-AT-LOGIN (see Section 11.1.4). Because class zero is the | default class, no SKED% monitor call is done if the CLASS-AT-LOGIN | in the user profile is set to zero or if there is no user profile | associated with the user logging in. If the job cannot be set in | the proper class, the ACJ log file entry is marked as "unusual." 11-7 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE CREATE-DIRECTORY | | This function prevents unauthorized manipulation of directories. | It provides an audit trail of changes to directories and attempted | break-ins since the last new username was created or a capability | was changed. | | This function has the following effects: | | Users with OPERATOR capabilities are not allowed to make new | usernames or changes to existing usernames on DOMESTIC | structures. With TOPS-20, the boot structure and the public | structure are always DOMESTIC and cannot be made FOREIGN. | | Setting passwords or user or directory groups on any | is not allowed. | | Only enabled WHEELs can change the following directory | attributes: | | SECURE | FILES-ONLY | WHEEL | OPERATOR or SEMI-OPERATOR | | Nonprivileged users must create subdirectories with the | FILES-ONLY and NO SECURE attributes. | | It is recommended that you enable the CREATE-DIRECTORY function | with the LOG and POLICY qualifiers. | | o ENABLE CREATE-FORK | | This function controls the ability to create job forks. Each time | a user runs a program, a process (fork) is created. The CFORK% | monitor call is used to create forks. The ACJ is activated for | each CFORK% monitor call that creates more than FKCNT forks. | (FKCNT is a monitor cell that system programmers can patch; it is | defaulted to 5.) The ACJ always allows the CFORK% monitor call. | | o ENABLE CREATE-JOB | | This function controls access to the CRJOB monitor call. The ACJ | allows only enabled WHEELs or OPERATORs to perform the CRJOB%. To | log all CRJOB-created jobs but let any user use CRJOB, enable this | function with NO POLICY. 11-8 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE CREATE-LOGICAL-NAME | | This function controls the ability to create systemwide logical | names. The ACJ is activated for each of the following CRLNM% | monitor call functions when the user is not a WHEEL or OPERATOR: | CLNS1, .CLNSA, or .CLNSY. The LOG qualifier provides an audit | trail of logical name activity. | | o ENABLE CTERM | | This function enables incoming CTERM connections by way of the SET | HOST command. It also creates an audit trail, which provides the ______ | origin of the connecting user. (The @SYSTAT command displays user | origins.) | | It is recommended that you enable this function with the LOG | qualifier. | | o ENABLE DECNET-ACCESS | | This function allows access to the network for users with | DECNET-ACCESS capability. | | It is recommended that you enable this function with the LOG | qualifier to provide an audit trail of users who are accessing | other systems through DECnet connections. | | o ENABLE DETACH | | This function controls the ability to detach jobs by way of the | DETACH command. The ACJ always allows users to detach jobs. The | LOG qualifier provides an audit trail. | | o ENABLE ENQ-QUOTA | | This function controls user setting of ENQ quota. The ACJ allows | only a WHEEL or OPERATOR to perform the function. | | o ENABLE GET-DIRECTORY | | The GTDIR% monitor call provides information about a directory. | | The ACJ always allows the GTDIR% monitor call to succeed. This | function is primarily to assure an audit trail whenever a user | gets information about a directory (INFORMATION DIRECTORY | command). 11-9 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE GETAB | | This function controls use of the GETAB% monitor call (SYSTAT and | INFORMATION MONITOR commands) to get information from the monitor. | The ACJ is activated for each GETAB% when the previous context is | not monitor. The ACJ always allows the GETAB%. | | You should enable this function with caution, because it increases | system overhead and slows system response, especially when the | activity is logged. | | o ENABLE HSYS | | This function allows only users with enabled WHEEL, OPERATOR, or | MAINTENANCE privileges to shut down the system with the ^ECEASE | command. | | o ENABLE INFO | | This function controls access to the INFO% monitor call to get | information about systems in a CFS-20 cluster (SYSTAT NODE | command) or to send clusterwide notices. | | You should enable this function with caution, because it increases | system overhead and slows system response, especially when the | activity is logged. | | o ENABLE LATOP | | This function allows enabled wheels and operators to implement | .LARHC (request host connect) functions in the LATOP% monitor | call. To log all LATOP% .LARHC functions and allow all users | access to LATOP%'s .LARHC functions, enable this function with NO | POLICY. These functions are performed regularly by LPTSPL for LAT | printers. | | o ENABLE LOGIN | | The LOGIN function controls access to the system. A login request | is denied if: | | The user tries to log in to . | | The user is over quota on the ps: directory. | | You specified with the USER command (described in Section | 11.1.4) that the user cannot log in to this terminal line | type. | | WHEEL-only logins are set and the user does not have WHEEL | capability. 11-10 ACCESS CONTROLS ACCESS CONTROLS | The login attempt is on a non-batch PTY. | | The user has OPERATOR capability and is trying to log in to a | directory with WHEEL capability. | | It is important to enable the LOGIN function so that there is an | audit trail for tracking "unusual" logins. | | It is recommended that you enable the LOGIN function with the LOG | and POLICY qualifiers. | | o ENABLE LOGOUT | | The ACJ is consulted each time a user attempts to log out. The | logout request is denied if the user is over quota on the | ps: directory. | | The LOGOUT function helps capture a user session in an audit trail | by showing when the user logged out. | | It is recommended that you enable the LOGOUT function with the LOG | and POLICY qualifiers. | | o ENABLE MDDT | | This function allows access to internal monitor data structures. | | All non-WHEEL users are prevented from entering MDDT, because | through MDDT, users can violate system security or crash the | system. It is important to enable this function with the LOG and | POLICY qualifiers so that an audit trail of MDDT entry is | available in case of security problems. | | o ENABLE MTA-ACCESS | | This function controls access to magnetic tapes. The ACJ is | activated for labeled MTA access in the following situations: | | o The label type is TOPS-20 and access is by non-owner and there | is a protection failure. | | o ANSI labels are used and volume accessibility is not "full." | | o EBCDIC labels are used and the accessibility byte is from 1 to | 3 inclusive. | | The ACJ always allows the access. 11-11 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE SECURE | | Four ENABLE/DISABLE command functions control access to "secure" | files. These functions are described below. Refer to Section | 11.7 for details on secure files. | | ENABLE SECURE CHFDB% allows a request to set or clear a file | SECURE, based on settings in the ACCESS.CONTROL file. If there is | no ACCESS.CONTROL file in the same directory as the file to be set | secure, the request is allowed and logged as "unusual." | | ENABLE SECURE DELF% allows the request to delete a secure file | based on settings in the ACCESS.CONTROL file. If there is no | ACCESS.CONTROL file in the same directory as the file to be | deleted, the request is allowed and logged as "unusual." | | SECURE OPENF% allows the request to open a secure file based on | settings in the ACCESS.CONTROL file. If a read, write, or append | access is attempted to a secure file and no ACCESS.CONTROL file is | in the same directory as the secure file, the access is allowed | and logged as "unusual." | | SECURE RNAMF% allows the request to rename a secure file based on | settings in the ACCESS.CONTROL file. If rename access is | attempted to a secure file and there is no ACCESS.CONTROL file in | the same directory, the access is allowed and logged as "unusual." | | o ENABLE SET-TIME | | The STAD% monitor call sets the system time. The ACJ always | allows the monitor call to succeed. This function is primarily to | assure an audit trail whenever the system date and time are | changed. | | o ENABLE SMON | | The SMON% monitor call sets or clears operating system features | (such as account validation, logins allowed,...) and is usually | invoked with commands in SYSTEM:7-CONFIG and the ^ESET command. | The ACJ is activated for each SMON%. | | The ACJ allows only enabled WHEELs or OPERATORs to use the monitor | call. | | It is recommended that you enable the function with the LOG and | POLICY qualifiers, because SMON% changes TOPS-20 operating system | parameters. 11-12 ACCESS CONTROLS ACCESS CONTROLS | o ENABLE STRUCTURE-MOUNT | | This function controls mounting of disk structures. The ACJ is | activated for every MSTR% monitor call "increment mount count" | function (.MSIMC function). A job must have a "regulated" file | structure mounted in order to use it. | | The ACJ always allows the increment of the mount count and lets | normal file and directory protection handle security. | | o ENABLE SYSGT | | The SYSGT% monitor call extracts information from the monitor | (SYSTAT and INFORMATION MONITOR commands). The ACJ is activated | for each SYSGT% when the previous context is not monitor. The ACJ | always allows the SYSGT%. | | You should enable this function with caution, because it increases | system overhead and slows system response, especially when the | activity is logged. | | o ENABLE TERMINAL-SPEED | | This function disallows the setting of terminal baud rate with the | SET TERMINAL command unless the WHEEL or OPERATOR privilege is | enabled. | | o ENABLE TLINK | | The ACJ is activated when the following commands are invoked from | outside the monitor: ADVISE, TALK, BREAK, and REFUSE. The ACJ | always allows these functions; however users can override them | with the REFUSE commands. | | If the user is set SPY-ON (see Section 11.1.4), the log entry will | be marked as "unusual." | | o ENABLE TTMSG | | The ACJ is activated when the ^ESEND and SEND commands are invoked | from outside the monitor. The ACJ allows only enabled WHEELs or | OPERATORs to use these commands and the associated monitor call | (TTMSG%). | | o ENABLE USER-TEST | | This function is reserved for customer use. System programmers | should refer to function code 400000 of the GETOK monitor call. 11-13 ACCESS CONTROLS ACCESS CONTROLS 11.1.3.2 ENABLE/DISABLE Function Qualifiers | 11.1.3.2 ENABLE/DISABLE Function Qualifiers - | | The following are qualifiers that you can specify with the ENABLE and | DISABLE commands described in Section 11.1.3.1. | | o [NO]POLICY | | Causes the enforcement of the ACJ policy on a particular | ENABLE function. The default is POLICY. The NO POLICY | qualifier is often combined with the LOG qualifier; without | this qualifier, the effect is similar to the DISABLE | function. | | o [NO]LOG | | Creates an entry in the ACJ log file that describes the | function. The default is LOG. | | o [NO] CONSOLE | | The CONSOLE keyword enables display of the logging string to | the console terminal. The default is NO CONSOLE. | | o [NO] DENY-BATCH | | The DENY-BATCH keyword causes a request for this function | from any batch job to always be denied. The default is NO | DENY-BATCH. | | o [NO] DENY-CTY | | The DENY-CTY keyword causes a request by a job logged into | the system's console terminal (the CTY) to always be denied. | The default is NO DENY-CTY. | | o [NO] DENY-DECNET | | The DENY-DECNET keyword causes a request by a job which is | attached to the system through DECnet (NRT or CTERM protocol) | to always be denied. The default is NO DENY-DECNET. | | o [NO] DENY-DETACHED | | The DENY-DETACHED keyword causes a request by a detached job | to always be denied. The default is NO DENY-DETACHED. | | o [NO] DENY-LAT | | The DENY-LAT keyword causes a request by a job attached to | the system through a LAT terminal to always be denied. The | default is NO DENY-LAT. 11-14 ACCESS CONTROLS ACCESS CONTROLS | o [NO] DENY-LOCAL | | The DENY-LOCAL keyword causes a request by a job logged into | any terminal local to the system to always be denied. The | default is NO DENY-LOCAL. | | o [NO] DENY-PTY | | The DENY-PTY keyword causes a request by a job attached to a | PTY that is not a batch job to always be denied. The default | is NO DENY-PTY. | | o [NO] DENY-TCP | | The DENY-TCP keyword causes a request by a job attached to | the system through TCP/IP (TELNET protocol) to always be | denied. The default is NO DENY-TCP. | | | 11.1.4 USER Command | 11.1.4 USER Command | | You can make ACJ profile entries for users: | | ACJDEC>USER username keyword | | Where: | | o username is a particular user or all users (*) | | o keyword is one of the following: | | CLASS-AT-LOGIN n | | Sets scheduler class "n" at login. The default is CLASS-AT-LOGIN 0 | | [NO] ENABLE-NON-PRIME-TIME | | Lets users enable capabilities at times other than prime time (see | Section 11.1.5). If you want to let anyone enable at any time, enable | the CAPABILITIES function with the NO POLICY qualifier, or issue the | DISABLE CAPABILITIES command. The default is NO | ENABLE-NON-PRIME-TIME. | | [NO] LOGIN-BATCH | | Lets batch jobs log in. The default is NO LOGIN-BATCH. Note that the | LOGIN-PTY keyword controls non-batch PTY logins. 11-15 ACCESS CONTROLS ACCESS CONTROLS | [NO] LOGIN-CTY | | Lets a job log in to the system through the system's console terminal | (the CTY). The default is LOGIN-CTY. | | [NO] LOGIN-DECNET | | Lets a job log in to the system through DECnet using the NRT or CTERM | protocol. Do not confuse this keyword with remote DECnet access using | the RMSFAL (which is controlled by the LOGIN-DETACHED keyword). The | default is LOGIN-DECNET. | | [NO] LOGIN-DETACHED | | Lets a job log in detached. Digital-supplied software that does | detached logins is limited to DIU (Data Interchange Utility) and | RMSFAL (RMS File Access Listener). | | [NO] LOGIN-LAT | | Lets a job log in to the system through a LAT terminal. | | [NO] LOGIN-LOCAL | | Lets a job log in to terminal lines connected to the DECSYSTEM-20 | (RSX20F console front end) that are not configured as REMOTE. LOCAL | lines are normally connected directly to terminals rather than to | communications equipment such as modems or port selecters. | | [NO] LOGIN-PTY | | Lets a job log in to a PTY that is not a batch job. | | [NO] LOGIN-REMOTE | | Lets a job log in to terminal lines connected to the DECSYSTEM-20 | (RSX20F console front end) that are configured as REMOTE. REMOTE | lines are normally connected to modems or port-selecting equipment and | not directly to terminals. | | [NO] LOGIN-TCP | | Lets a job log in to the system through a TCP/IP terminal (TELNET | protocol). | | [NO] SPY-ON | | Users will be spied on when logging in or attaching to jobs. The | default is NO SPY-ON. 11-16 ACCESS CONTROLS ACCESS CONTROLS _______ | EXAMPLE | | USER command keywords are normally combined. For example, if a user | should be able to log in only from a batch job and for DECnet access | using RMSFAL, you should set the keywords for that user as follows: | | NO LOGIN-CTY | NO LOGIN-DECNET | NO LOGIN-LAT | NO LOGIN-LOCAL | NO LOGIN-PTY NO | LOGIN-REMOTE | NO LOGIN-TCP | | In the example above, only LOGIN-BATCH and LOGIN-DETACHED are allowed. | | | 11.1.5 SET Command | 11.1.5 SET Command | | You can tailor the ACJ environment with the SET command: | | ACJDEC>SET keyword | | Where keyword is one of the following: | | ACCESS-LOG-FILE PRIME-TIME-BEGIN | PRIME-TIME-END SPY-CHECK-INTERVAL | SPY-LOG-DIRECTORY LOG-FILE-CACHE-SWEEP-INTERVAL | | The SET command keywords are described below: | | ACCESS-LOG-FILE filespec | | Sets the log file specification. The default is SYSTEM:LOGFILE.LOG. | | LOG-FILE-CACHE-SWEEP-INTERVAL n | | Sets the log file cache sweep interval. The log file is updated every | few seconds (or whenever it is about to be read or renamed). The log | file cache sweep interval defaults to 30 seconds. The cache can be | disabled by setting the log file cache sweep interval to zero; this | forces the log file to be updated each time a line is written to it. | | PRIME-TIME-BEGIN time | | Sets the time at which prime time begins on each weekday. This time | is used when you issue the USER ENABLE-PRIME-TIME command (described | in Section 11.1.4) with the ENABLE CAPABILITIES command. The default | beginning time is 07:00 (7 AM). 11-17 ACCESS CONTROLS ACCESS CONTROLS | PRIME-TIME-END time | | Sets the time at which prime time ends on each weekday. This time is | used when you issue the USER ENABLE-PRIME-TIME command with the ENABLE | CAPABILITIES command. The default ending time is 18:00 (6 PM). | | SPY-CHECK-INTERVAL seconds | | Sets the time between TLINK% monitor calls to jobs that are being | spied on. Shorter times increase overhead but lower the risk that | spying data will be lost. The default is 10 seconds. | | SPY-LOG-DIRECTORY string | | Sets the initial part of the specification for spy log files. The | string will have "-nodename.username" appended to it to complete the | file specification. The default is SYSTEM:ACJ-SPY, so spy log files | are of the form "SYSTEM:ACJ-SPY-nodename.username." | | The ACJ always makes spy log files secure. | | | 11.1.6 SHOW Command | 11.1.6 SHOW Command | | The SHOW command displays the items changed with the ENABLE, DISABLE, | SET, and USER commands. The SHOW command is followed by one of the | following keywords: | | o ALL | | Shows all information. | | o FUNCTION ALL keyword | | Shows the profile of all functions or of a particular | function. | | o SETTINGS ALL keyword | | Shows all items or a particular item changed by the SET | command. | | o USER ALL * or username | | Shows all user profiles or a particular user profile. 11-18 ACCESS CONTROLS ACCESS CONTROLS 11.1.7 WRITE Command | 11.1.7 WRITE Command | | When you have finished issuing ACJDEC commands, write the ACJ settings | to the profile file: | | ACJDEC>WRITE filename | | Where filename is the name of the profile file. The default filename | is ACJPROFILE.CMD. | | The following is a sample profile file: | | Set PRIME-TIME-BEGIN 07:30 | Set PRIME-TIME-END 18:00 | Enable ACCESS | Enable ARPANET-ACCESS NO POLICY | Enable ASSIGN-DEVICE NO LOG | Enable ASSIGN-DUE-TO-OPENF NO LOG | Enable ATTACH-JOB | Enable CAPABILITIES DENY-DECNET DENY-TCP | Enable CREATE-DIRECTORY | Enable CTERM | Enable DECNET-ACCESS NO POLICY | Enable LOGIN | Enable LOGOUT | Enable MDDT DENY-BATCH DENY-DETACHED | Enable SECURE-CHFDB | Enable SECURE-DELF | Enable SECURE-OPENF | Enable SECURE-RNAMF | User FS ENABLE-NON-PRIME-TIME | | | 11.1.8 SAVE Command | 11.1.8 SAVE Command | | When you have written the profile file, create the ACJ: | | ACJDEC>SAVE filename | | Where filename is the name of the access control program. The default | filename is ACJ.EXE. 11-19 ACCESS CONTROLS ACCESS CONTROLS 11.1.9 Summary | 11.1.9 Summary | | Follow these steps to implement the ACJ: | | 1. Run the ACJDEC.EXE program: | ___ __________ | @RUN ACJDEC.EXE | | ACJDEC> | | 2. Set up the ACJ and user environments: | ____ ______________ | ACJDEC>TAKE ACJPROFILE.CMD | ___ ________________ _____ | ACJDEC>Set PRIME-TIME-BEGIN 07:30 | ______ ______ | ACJDEC>Enable ACCESS | ____ __ _____________________ | ACJDEC>User FS ENABLE-NON-PRIME-TIME | . | . | . | | 3. Write the commands into the ACJPROFILE.CMD command file: | _____ | ACJDEC>WRITE | | 4. Create the ACJ.EXE policy program from the current settings: | ____ _______ | ACJDEC>SAVE SYSTEM: | | ACJ.EXE.1 Saved | | 5. Start the ACJ policy program: | _____ _________________________ | $^ESET SYSTEM-ACCESS-CONTROL-JOB 11-20 ACCESS CONTROLS ACCESS CONTROLS 11.1.10 Reviewing the Log Files | 11.1.10 Reviewing the Log Files | | You should review daily the log files produced by the ACJ for possible | unusual activity. Careful monitoring results in greater system | security, because repeat penetrations cause the most severe security | problems. The log file is always made "secure" (see Section 11.7) to | prevent unauthorized access. A new generation of the log file is | created each time the ACJ is run and each night at midnight. | | | 11.1.10.1 Log File Format | 11.1.10.1 Log File Format - | | The log file is split into pages with a header on each page. The | first line of the header contains the ACJ version, system nodename, | current date/time, and page number. The second and third lines | summarize the activity so far: number of requests allowed, denied, | and failed; CPU time used; and "uptime" of the ACJ. | | Each activity results in one line of text in the log file. The first | item is the time of day. The second item is the username requesting | the operator. (For the LOGIN function, the username that is trying to | log in is in this field.) The next field is the access control | function. Following the function, there is information about the job. | This information consists of the job number, controlling job if the | job is being run on a PTY, "batch" if it is a batch job, terminal | number, network origin string if the job originates from a network | terminal, and the job's current program name. Finally, the enabled | capabilities of the process attempting access are displayed. | | Following that fixed information is a comma and information that is | specific to this request type. For example, if a user is enabling | capabilities, the desired capabilities are shown. | | At the end of the line one of three strings may appear. | | o [Denied] indicates that the ACJ denied the request. For | example, a user tried to log in but is not allowed to log in | to that terminal type. | | o [Failed] indicates that the ACJ allowed the request but that | the action failed. For example, a user tried to log in but | gave a bad password. | | o [Unusual] indicates that the ACJ allowed the request but it | is in some way unusual. For example, a user logged in when | that user is set SPY-ON. The conditions under which the | request is considered unusual are documented in Section | 11.1.3, ENABLE and DISABLE commands. 11-21 ACCESS CONTROLS ACCESS CONTROLS 11.1.10.2 Log File Examples | 11.1.10.2 Log File Examples - | | This section shows sample entries from a typical ACJ log file. | | The following is a sample ACJ log file header. It shows that the log | file was started at midnight and that the ACJ has been up about 12 | hours, processing 790 requests. | | ACJ 7(100) on GARK, Thursday, February 2, 1989 00:00:00, page 1 | Allowed 782 requests, denied 8 requests, 5 requests failed | Used 1:09.32 in 11:57:56.69 | | The following log file entries show a batch job execution. User | OPERATOR running BATCON opened a PTY, assigned it to itself, and | created a job, which logged in to user SCHMITT. That user enabled | capabilities, and then the batch job ran to completion. The job | running BATCON then logged out the batch job. | | 00:00:47 OPERATOR Open-assign job 194 ctrl 193 TTY233 GALAXY opr | ana, device PTY7 | 00:00:47 OPERATOR Assign job 194 ctrl 193 TTY233 GALAXY opr ana, | TTY241 | 00:00:48 OPERATOR CRJOB job 194 ctrl 193 TTY233 GALAXY opr ana | 00:00:48 SCHMITT Login job 206 batch TTY241 EXEC, by OPERATOR job | 194 ctrl 193 TTY233 GALAXY | 00:00:49 SCHMITT Caps job 206 batch TTY241 ENABLE, desired whl | 00:01:36 OPERATOR Logout job 194 ctrl 193 TTY233 GALAXY opr ana, | target SCHMITT job 206 batch TTY241 EXEC | | The next two entries show an incoming CTERM connection from user | SGAGNE on system GIDNEY, who proceeds to log in to this system. | | 08:35:49 OPERATOR Cterm job 0 Det SYSJOB, from GIDNEY::SGAGNE | 08:35:55 SGAGNE Login job 214 TTY364 GIDNEY::SGAGNE(CTM) LOGIN | | Below, user GAS tried to attach to his detached job and apparently | typed an incorrect password (see [Failed]). On the second try, he | succeeded and attached to his job. | | 09:38:48 not-logged-in Attach job 214 TTY444 LAT1(LAT) ATTACH, | target GAS job 207 Det DETACH [Failed] | 09:38:58 not-logged-in Attach job 214 TTY444 LAT1(LAT) ATTACH, | target GAS job 207 Det DETACH 11-22 ACCESS CONTROLS ACCESS CONTROLS | Below, the first entry shows the OPERATOR job running MX connecting to | system VAXVLN using DECnet. The second entry shows the MX job | delivering mail to user APUCHRIK, who has a "secure" MAIL.TXT file. | The third entry shows this same user accessing his mail file with MS. | | 09:39:32 OPERATOR DECnet job 198 ctrl 193 TTY237 MX opr ana, to | VAXVLN | 09:47:11 OPERATOR Secure-OPENF job 198 ctrl 193 TTY237 MX opr | ana, read write PUBLIC:MAIL.TXT.1 | 09:49:15 APUCHRIK Secure-OPENF job 199 TTY435 LAT1(LAT) MS, read | write preserve-dates PUBLIC:MAIL.TXT.1 | | The first line below shows a user trying to set TTY3's terminal speed. | The request is denied. The second and third lines show OPERATOR jobs | running DUMPER to save the system. The second line shows that user | RASPUZZI did not allow OPERATOR read access to a file; the access | failed and the file is not backed up. The third line shows that a | SECURE file was opened for reading, but there was no ACCESS.CONTROL | file present in that directory. The request is marked as unusual, and | access is allowed. | | 19:17:56 JWONG Terminal-speed job 216 TTY3 EXEC, TTY3 input 2400 | output 2400 [Denied] | 19:38:00 OPERATOR Secure-OPENF job 215 ctrl 206 TTY243 DUMPER opr | ana, read preserve-dates RANDOM:JAN89MAIL.TXT.1 | [Denied] | 19:38:24 OPERATOR Secure-OPENF job 211 ctrl 206 TTY241 DUMPER opr | ana, read preserve-dates WORK:BOBBIE.MAIL.1 | [Unusual] 11.2 PASSWORD ENCRYPTION 11.2 PASSWORD ENCRYPTION One way to violate system security is through unauthorized use of directory passwords. Having acquired someone's password, an intruder could log in or gain access to restricted system resources. The password encryption facility in TOPS-20, however, makes it harder to steal passwords. With encryption enabled, passwords entered into the system are translated to an indecipherable cyphertext format before they are stored or otherwise used. Nowhere in the system is the original plaintext form of a password kept. As a further security measure, no current TOPS-20 utility converts the cyphertext to plaintext. NOTE Password encryption is irreversible. Therefore, before enabling encryption, be sure you will never need to revert back to an earlier version of the operating system. 11-23 ACCESS CONTROLS ACCESS CONTROLS To enable password encryption, use the CHECKD program. You can do _______ __ this during or after system installation. (Refer to the TOPS-20 KL _____ _ ____________ _____ Model B Installation Guide for details.) With CHECKD, password encryption is enabled on a structure-by-structure basis; after the procedure, all passwords for a particular structure are encrypted as previously described. If you enable encryption after installation, run the KRYPTN program after CHECKD to convert existing plaintext passwords on a structure to cyphertext. The KRYPTN program is located on the tools tape, which is part of the TOPS-20 software installation package. Encryption should be enabled for all structures except those that will be used on a TOPS-20 pre-Version 6 system. (Section 11.2.1 discusses this topic.) You can add your own encryption algorithm to the system if you choose not to use TOPS-20's algorithm. Refer to Section 11.2.2. Because the encryption algorithm is irreversible, care is required in the following areas: o Remembering one's password o Working in a multiple-system environment o Adding new algorithms to the system o Using DUMPER Mistakes in these areas could invalidate passwords so that they may need to be respecified with BUILD or ^ECREATE. These interrelated topics are discussed in the following sections. 11-24 ACCESS CONTROLS ACCESS CONTROLS 11.2.1 Moving Structures Among Systems 11.2.1 Moving Structures Among Systems If you are in a multiple-system environment, you may need to move structures from one system to another. Problems could arise, however, if some systems are running TOPS-20 pre-Version 6 software and others are running TOPS-20 Version 6. For example, when a structure containing encrypted passwords is taken to a TOPS-20 pre-Version 6 system, any access to files on the pack that requires a password to be supplied fails, because, in validating a password, the older monitor simply compares the entered plaintext to the cyphertext stored on disk. The older monitor is unfamiliar with the encryption process. To avoid this problem, you should postpone encryption for relevant structures until all systems are upgraded. Any TOPS-20 system can correctly handle unencrypted structures. You could also encounter problems in moving structures to other systems if you use your own encryption algorithm. This topic is discussed below. 11.2.2 Adding Encryption Algorithms to the System 11.2.2 Adding Encryption Algorithms to the System You can use one or more of your own encryption algorithms exclusively or in addition to TOPS-20's algorithm. For a description of the procedures involved, refer to the monitor module, STG.MAC. Each time a password is encrypted and stored in a directory, the version number of the algorithm used to encrypt it is also stored. This allows new encryption algorithms to be added to the system with no impact on currently encrypted passwords, provided the old algorithms have not been removed from the monitor. Only passwords created since the installation of the new (current) algorithm will be encrypted with that algorithm. Older passwords invoke the appropriate algorithms during password-required accesses. If you also want existing passwords to use the new algorithm, the operator must individually respecify the passwords with BUILD or ^ECREATE. The operator does this after the new algorithm is installed. Note that KRYPTN cannot be used here to convert existing cyphertext to new cyphertext. 11-25 ACCESS CONTROLS ACCESS CONTROLS In using your own encryption algorithms, be aware that directories on structures and on DUMPER-created tapes include passwords that may be unusable at other sites. Other TOPS-20 monitors could consider the passwords' algorithm version numbers to be invalid. For example, these monitors may acknowledge only the standard TOPS-20 algorithm. Even if a site accepts the version numbers, its corresponding algorithms may be different from the algorithms at your site. Thus, on attempted password use, the cyphertext produced at this other site could never match the stored cyphertext. To address these problems, you could: o Warn sites about the nature of the passwords on a tape or structure. A site could then avoid using certain directories or respecify a password with BUILD or ^ECREATE if necessary. o Refrain from saving directory information on tapes bound for other sites. That is, do not use DUMPER's CREATE command when creating such tapes. o Ship only directories that have null passwords. These "passwords" are considered unencrypted, and should cause no problem on any system. 11.2.3 Using DUMPER 11.2.3 Using DUMPER Section 11.2.2 addressed using DUMPER with nonstandard algorithms. This section continues the discussion of DUMPER. Care must be taken when restoring directories that were saved with DUMPER's CREATE command. Incompatible versions of tapes, DUMPER, and TOPS-20, when combined, can produce a number of password-related problems. Note the system's behavior during tape restoration for the combinations in Table 11-1. In the table, tape Version 4 is the version of tape that DUMPER Version 4.1 creates. Tape Version 5 is the version of tape that DUMPER Version 5 creates. 11-26 ACCESS CONTROLS ACCESS CONTROLS Table 11-1: DUMPER Directory Restorations Table 11-1: DUMPER Directory Restorations ____________________________________________________________________ Tape Version DUMPER MONITOR Result Tape Version DUMPER MONITOR Result ____________________________________________________________________ 5 5 6 OK 4 5 6 OK (N1) 5 4.1 6 E1 4 4.1 6 OK (N1) 5 5 5 E2 4 5 5 OK 5 4.1 5 E3 4 4.1 5 OK ____________________________________________________________________ Legend: N1 Passwords are correctly encrypted for the first time using the monitor's current encryption algorithm. E1 The tape version number is incompatible with this DUMPER. DUMPER reports this fact before restoring the tape data. If directories are restored from this tape, encrypted passwords are re-encrypted, causing all uses of these passwords to fail. The passwords will then have to be individually respecified with BUILD or ^ECREATE. However, if a password is unencrypted on the tape, then it is encrypted for the first time, and will be usable. Any files on this tape are restored correctly. E2 Pre-version 6 monitors have no logic to handle encryption-related data that the tape may contain. Therefore, restored encrypted passwords are unusable and must be respecified with BUILD or ^ECREATE. Note that directory blocks on the tape may contain password descriptor information, such as the encryption version number. This descriptor data is not restored. Any files on this tape are restored correctly. E3 The tape version number is incompatible with this DUMPER. DUMPER reports this fact before restoring the tape data. This incompatibility results in the same situation as E2. 11-27 ACCESS CONTROLS ACCESS CONTROLS If these problems occur often, users and operators could refrain from saving directory information on tapes, or they could use null passwords for directories that are to be saved. Null passwords are considered to be unencrypted and should cause no access problems. 11.3 PASSWORD MANAGEMENT 11.3 PASSWORD MANAGEMENT Encryption is just one part of password management. You should also make sure that users at your site do not choose passwords that are too short or that are otherwise easy to guess, such as one's name or initials. | | | 11.3.1 Setting Password Length | 11.3.1 Setting Password Length | | You can set the minimum password length in the n-CONFIG.CMD file with | the command: | ______ _______________________ _ | ENABLE MINIMUM-PASSWORD-LENGTH n | | where: | | n is the minimum number of characters allowed for passwords, | from 1 to 39 characters. A common value for n is 8 | characters. | | Or, you can issue the command: | _____ ____ _______________________ _ | $^ESET [NO] MINIMUM-PASSWORD-LENGTH n | | The @INFORMATION SYSTEM command reports the minimum password length | set for your system. | | | 11.3.2 Changing Passwords Regularly | 11.3.2 Changing Passwords Regularly | | It would also be helpful for users to change their passwords | regularly. You can enforce this through the ^ESET command and in the | n-CONFIGURATION file: | _____ ____ ___________________ ____ _ | $^ESET [NO] PASSWORD-EXPIRATION (TO) N | | In the n-CONFIGURATION file: | ______ ___________________ _ | ENABLE PASSWORD-EXPIRATION n _______ ___________________ | DISABLE PASSWORD-EXPIRATION 11-28 ACCESS CONTROLS ACCESS CONTROLS | Where: | | n is the date after which passwords expire | | n is the number of days a password is valid since the time it | was last changed. This value for n is a number from 1 | through 366. The default number of days is 30. The | @INFORMATION SYSTEM command reports the number of days a | password is valid. | | After a password has expired, the user will be allowed to log in but | must change the password immediately. | | | 11.3.3 Disallowing Certain Passwords | 11.3.3 Disallowing Certain Passwords | | You may want to make certain combinations of characters illegal for | use as passwords. Perhaps they would be too easily guessed by an | intruder. You can place such words in the file | SYSTEM:PASSWORD.DICTIONARY and have them automatically matched against | newly supplied passwords. If a match occurs, the password is denied, | and the user must choose a new one. | | The following is a sample password dictionary file. Note that words | must be placed in the file alphabetically. | | ABORT, S, ED, ING | ABUSE, S, D, \ING | ACQUIT, S, "ED, "ING | ADMIRAL, S, 'S | | The first line shows the word ABORT. Other entries, separated by | commas, indicate suffixes that are added to ABORT. So, the first | line, in effect, contains the following words that cannot be used as | passwords: ABORT, ABORTS, ABORTED, or ABORTING. | | In the second line, the backslash character (\) removes the last | character from the base word and adds the suffix. The base word is | ABUSE. After the final E is removed and ING is added, the word | ABUSING is formed and cannot be used as a password. | | In the third line, the quote character (") duplicates the last letter | of the word before adding the suffix; ACQUIT becomes ACQUITTED. | | In the final line, the apostrophe is taken as is. The base word | ADMIRAL becomes ADMIRAL'S. 11-29 ACCESS CONTROLS ACCESS CONTROLS | You can enable and disable the dictionary-checking feature through the | ^ESET command or in the n-CONFIG.CMD file: | _____ ____ ___________________ | $^ESET [NO] PASSWORD-DICTIONARY | | In the n-CONFIG.CMD file: | ______ ___________________ | ENABLE PASSWORD-DICTIONARY _______ ___________________ | DISABLE PASSWORD-DICTIONARY | | The @INFORMATION SYSTEM command reports whether or not the password | dictionary is enabled. 11.4 LAST LOGIN INFORMATION 11.4 LAST LOGIN INFORMATION When users log into the system, the dates and times they last logged in are displayed on their terminals. This information helps alert them to instances of illegal system or account entry. For example, if users keep track of their actual login times, they can compare those times to the ones displayed. Then, if there is a discrepancy, they will know the exact time that someone else logged into their directory using their password. | The system also provides login-failure information. | | Information is provided for both interactive and noninteractive | logins. An example of a noninteractive login is one for a batch job. 11-30 ACCESS CONTROLS ACCESS CONTROLS 11.5 PREVENTING FAST LOGINS 11.5 PREVENTING FAST LOGINS By using the /FAST switch with the LOGIN command, users can bypass processing of the system's and their own LOGIN.CMD and COMAND.CMD files. Managers sometimes set up these command files to limit users' computing environments, however. For example, sets of users may be allowed only to read mail or run some other computer application. You can prevent fast logins at your site by entering the following command in the n-CONFIG.CMD file: _______ _________________ DISABLE FAST-LOGIN-OPTION The ENABLE FAST-LOGIN-OPTION command is in effect by default. You can also enable and disable fast logins with the ^ESET privileged command. _______ ______ _____ Refer to the TOPS-20 User's Guide for information on the LOGIN.CMD and _______ ________ _________ ______ COMAND.CMD files. The TOPS-20 Commands Reference Manual describes the LOGIN command. | Also, with fast logins, system mail is not displayed, nor is notice of | new mail given. | | | 11.6 PREVENTING NOT-LOGGED-IN SYSTAT | 11.6 PREVENTING NOT-LOGGED-IN SYSTAT | | You can prevent people who are not logged in to a system from finding | out the usernames of people who are logged in. If your site has | public or network access, you should disable not-logged-in SYSTAT. | Enter the following command in the n-CONFIG.CMD file: | | DISABLE NOT-LOGGED-IN-SYSTAT | | This increases security by making it harder for intruders who have | connected to a system but not yet logged in to find out valid | usernames for the system. To allow the SYSTAT command when users are | not logged in, enter the following command in the configuration file: | | ENABLE NOT-LOGGED-IN-SYSTAT 11-31 ACCESS CONTROLS ACCESS CONTROLS 11.7 SECURING FILES | 11.7 SECURING FILES | | You and users can restrict access to files and directories according | to the type of access or the particular user who attempts access: The | command @SET FILE [NO] SECURE sets a file "secure" or not secure, and | the commands @SET DIRECTORY and @BUILD cause all new files created in _______ ________ | the directory to be set secure. (Refer to the TOPS-20 Commands _________ ______ | Reference Manual for details on these commands.) | | When a request is made to access a "secure" file, the monitor asks the | ACJ for permission to open the file before the request is granted or | denied. The ACJ bases its decision on the information contained in | the ACCESS.CONTROL file, which you or users create and place in the | same directory as files that are marked as secure. This file contains | a list of filenames, access keywords, and usernames that have | unrestricted access. It is important that the ACCESS.CONTROL file be | set secure so that it cannot be changed. | | The format of the ACCESS.CONTROL file is: | | filename keyword user, keyword user,...,- | | Where: | | o filename is the name of the file to be set secure | | o keyword determines the type of access granted to users of | secure files: | | ALL (all access) | APPEND (append access) | DELETE (delete access) | NOSECURE (permission to clear the SECURE bit) | READ (read access) | RENAME (permission to rename the file from or to filename) | SECURE (permission to set a file secure) | WRITE (write access) | | o user is the user who is granted access | 11-32 ACCESS CONTROLS ACCESS CONTROLS | The following is a sample ACCESS.CONTROL file: | | ACCESS.CONTROL.* READ Operator Staff.Mike Staff.Greg,- | SECURE Operator Staff.Mike Staff.Greg,- | WRITE Staff.Mike Staff.Greg,- | RENAME Staff.Mike Staff.Greg | | ACJ.EXE.* READ Operator Staff.Greg,- | SECURE Operator Staff.Greg,- | WRITE Staff.Greg,- | NOSECURE Staff.Greg | | *.*.* READ *,- | WRITE Staff.* Operator,- | SECURE Staff.* Operator,- | RENAME Staff.*,- | ALL Staff.Mike Staff.Greg Staff.Dave | | | 11.7.1 Secure Files and the ACJ | 11.7.1 Secure Files and the ACJ | | To implement the secure-file feature, enable the SECURE policies in | the ACJ, as described in Section 11.1.3.1. Refer to the descriptions | of ENABLE SECURE-CHFDB, ENABLE SECURE-DELF, ENABLE SECURE-OPENF, and | ENABLE SECURE-RNAMF. | | | 11.7.2 Securing Important Files | 11.7.2 Securing Important Files | | It is recommended that you set secure those files that are sensitive | to the operation and health of the system. Such files include | MONITR.EXE. The ACCESS.CONTROL files should also be set secure. 11-33 ACCESS CONTROLS ACCESS CONTROLS 11.8 SECURITY HINTS | 11.8 SECURITY HINTS | | Listed below are some general tips for enhancing the security of your | TOPS-20 system. | Usernames | o Usernames: No username should be used by more that one | person at a time. It is important that each person accessing | the system do so with a username uniquely assigned to that | person. Sharing usernames hampers or, in some cases, | prevents auditing of security problems. | Capabilities | o Capabilities: Since a user with WHEEL or OPERATOR capability | has the power to change many aspects of system operation, the | WHEEL and OPERATOR capabilities should be granted to a | minimum number of usernames on the system. | | A need to access files should be handled by the directory and | user groups structure but not by granting OPERATOR | capability. | | Note that it is a particularly BAD idea to have one username | with WHEEL or OPERATOR that a number of persons use. | Backups | o Backups: A "system tape" (containing the monitor, exec, user | information, and system files from the boot structure) should | be created once a week. Not only is this useful for hardware | failures, but it can also provide a known secure copy of the | monitor and all other software running on the system with | enabled capabilities. | FILES-ONLY directories | o FILES-ONLY directories: Directories on the system's PS: | structure that are not normally used for usernames should be | set FILES-ONLY. This prevents usernames from being created, | which can lead to security problems. | OPERATOR username | o OPERATOR username: Prevent the OPERATOR username from | logging in interactively by removing or expiring its | password. OPERATOR should be used to run jobs needed for | system operator (for example, jobs under SYSJOB or PTYCON | that are logged in when the system is reloaded). | | A password does not have to be set for OPERATOR in order for | jobs to log in to OPERATOR under SYSJOB or PTYCON. Operators | should use their own usernames to back up the system areas | and run OPR. (The OPERATOR user can run DUMPER under PTYCON | to save the system areas.) | Local Changes | o Local Changes: It is important not to underestimate the | positive effect that a few minor site-specific changes have | on security. Anything that makes your system just a little | different will slow down attempted break-ins. For example, | change the ACJ log filename from the default. 11-34 CHAPTER 12 CHAPTER 12 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.1 OVERVIEW 12.1 OVERVIEW The Common File System (CFS) is a feature of TOPS-20 that allows users from more than one system to simultaneously access files. Any structure in the CFS configuration can be made available to any user for reading or writing. Each TOPS-20 system in the CFS configuration has its own operating system, main memory, system structure, console, unit-record devices, and processes to be scheduled and run. But the systems are linked through a shared file system. This unified file system can be composed of all the disk structures on all systems. These structures appear to users as local to their own systems. The main features of CFS are: o It increases file accessibility. For example, if a system is down for maintenance, users can log onto another system and still access all files that do not depend on the down system for access. o It lets you adjust loads on systems by reassigning users as loads require. (Or, users themselves may be allowed to switch systems as they see fit.) These changes need not result in file-access limitations. o It lets you reduce the time that would be involved in maintaining duplicate sets of files. o It lets you save disk space by minimizing duplication of files on different systems. | | CFS (with Cluster GALAXY software) also lets users send jobs to | printers connected to any system in the configuration. 12-1 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.1.1 CFS HARDWARE 12.1.1 CFS HARDWARE The following are typical CFS configurations: +--------------+ +--------------+ | | | | SYSTEM ----| DECSYSTEM-20 |-------DISK-------| DECSYSTEM-20 |-- SYSTEM STRUCTURE | |-------DISK-------| | STRUCTURE | +------| +------+ | | | CI20 | | CI20 | | +--------------+ +--------------+ \\ // \\ // \\ // \\ // \\ // \\ // \\ // +----------------+ | | | STAR | | | | COUPLER | | | +----------------+ || || || || +----------------+---DISK | |---DISK | HSC 50 |---DISK | |---DISK +----------------+ Figure 12-1: Two Systems with Massbus Disks and HSC50-based Disks Figure 12-1: Two Systems with Massbus Disks and HSC50-based Disks 12-2 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM +--------------+ +--------------+ | | | | SYSTEM ----| DECSYSTEM-20 |-------DISK-------| DECSYSTEM-20 |-- SYSTEM STRUCTURE | |-------DISK-------| | STRUCTURE | +------|-------DISK-------+------+ | | | CI20 |-------DISK-------| CI20 | | +--------------+ +--------------+ \\ // \\ // \\ // \\ // \\ // \\ // \\ // +----------------+ | | | STAR | | | | COUPLER | | | +----------------+ Figure 12-2: Two Systems with Massbus Disks Figure 12-2: Two Systems with Massbus Disks ____ _______ Star Coupler The star coupler provides the physical interconnection for the CI cables among DECSYSTEM-20s and HSC50s. The maximum distance between a system and the star coupler is 45 meters. A DECSYSTEM-20 can be connected to just one star coupler. That is, it can be part of only one CFS cluster. __ CI The Computer Interconnect (CI) bus is the communications link used by CFS. It also connects systems to HSC50-based disks (RA60s and RA81s). In addition, it provides access to massbus disks for systems without a direct connection to those disks, for example, to another system's system structure. Each system has four communications links to the star coupler. Two of them are for transmitting data and the other two are for receiving data. The redundant CI connections are used for increased availability and performance. When one of the connections has failed or is in use, the CI microcode chooses the other one for data transmission. At start-up, TOPS-20 verifies that at least one set of transmit and receive connections is working. 12-3 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM ____ CI20 The CI20 port adapter provides the interface between the DECSYSTEM-20 and the CI bus. Only one CI20 is allowed per system. _______ _____ Massbus Disks Multisystem access may be granted to all massbus disks. It is recommended that massbus disks intended to be shared be dual-ported between two DECSYSTEM-20s (drive port switches placed in the A/B position). With a two-system CFS cluster, this avoids the ___________ overhead involved in file-server activity, as described later in this section. However, the systems must be able to communicate with each other over the CI; they must be connected to the same star coupler. _____ Otherwise, neither system will be allowed access to the disk. Thus, ___ _________ ______________ ___ ___ _________ the following configurations are not supported: +--------------+ +--------------+ | | | | | G | | H | | |-------DISK-------| | | | (A/B) | | | | | | +--------------+ +--------------+ +--------------+ +--------------+ +--------------+ | | | | | | | G | | H | | I | | |-------DISK-------| | | | | | (A/B) | | | | | | | | | | +--------------+ +--------------+ +--------------+ | | | | | | | | | | | | --------------------------------- CI 12-4 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM +--------+ +--------+ +--------+ +--------+ | | | | | | | | | G | | H | | I | | J | | | | |-------DISK-------| | | | | | | | (A/B) | | | | | | | | | | | | +--------+ +--------+ +--------+ +--------+ | | | | | | | | | | | | | | | | ------------------------- CI ------------------------ CI In the first two figures, systems G and H are not joined in a CFS configuration. The same applies to systems H and I in the third figure. TOPS-20 maintains the integrity of data on shared disks by ensuring that the systems can, over the CI, coordinate accesses to those disks. ______ Massbus disks not directly connected to a system are called "served _____ disks" because TOPS-20's MSCP (Mass Storage Control Protocol) file-served facility makes this "outside" access possible. To enable an outside path to a massbus disk, that is, to make it a served disk, enter an ALLOW command in the n-CONFIG.CMD file, on a system to which the disk drive is connected, in the form: ALLOW serial number The drive type is one of the following: RP06, RP07, or RP20. You can obtain the serial number with the command: ____ _____________ _______________ OPR>SHOW CONFIGURATION DISK-DRIVE Note that TOPS-20 creates an RP20 serial number by adding 8000 to the disk drive unit number. Therefore, RP20 unit numbers should be unique among CFS systems. | To disallow access to a served disk that was allowed access, enter the | following command in the n-CONFIG.CMD file: | | RESTRICT serial number | | Disks are RESTRICTED by default if you do not specify ALLOW commands. NOTE Disks that make up the system structure must not be dual ported to another TOPS-20 system. 12-5 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.1.2 CFS SOFTWARE 12.1.2 CFS SOFTWARE Intersystem communication is an integral part of CFS. When TOPS-20 starts up, it makes a CFS connection with each TOPS-20 system that is already running. This establishes the contact necessary for intersystem file-system management. In reality, only one system writes to a 256K section of a file at a time. When a system needs write access to a file section, it broadcasts a request for that resource to all systems it has established contact with. If another system already owns the desired write access, that system will respond negatively. Clearance will be granted to the requesting system only after the other system has completed the write operation by writing the data back to disk from its memory. Thus, systems negotiate for write access to files and keep each other informed of the state of the disks that they share. This ensures the integrity of data on those disks. Because intersystem communication is vital to CFS operations, the systems stay alert to CI problems and to other indications that they may have lost contact with each other. Section 12.11.1, Communication Problems, discusses the actions that systems take when there is a breakdown in communications. The INFORMATION CLUSTER command displays the names of HSC50s and CFS systems that are currently accessible. ____ ___ ____ DATE and TIME When a CFS system starts up, it takes the date and time from the systems that are already running. The operator is not prompted for this information. Instead, the system types a message similar to the following on the operator's terminal: The date and time is: Wednesday, 11-MAY-1988 9:38AM This typeout serves as a check on the date and time. If no other system is running, the operator is prompted for the information. When the date and time are changed on any CFS system, such as with the ^ESET command, all other systems are notified so that they can re-synchronize. This synchronization ensures that the creation date and time of files written from one system are consistent with the other CFS systems. Otherwise, many programs that use this information could malfunction. 12-6 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.1.3 CFS USERS 12.1.3 CFS USERS CFS is transparent to users: o Users are normally unaware that someone from another system may be accessing a file at the same time that they are, except in such cases as the following. A file being read on system "A" will prevent its being renamed on system "B." o Users are not required to know about the CFS configuration. Specifically, they do not need to know how massbus disks are ported. To access files, all they need to know are structure names, as on non-CFS systems. The INFORMATION CLUSTER command lets users know what HSC50s and TOPS-20 systems are currently accessible to their systems. 12.1.4 CFS and DECnet 12.1.4 CFS and DECnet A CFS configuration differs from a DECnet network. Although a CFS configuration comprises multiple independent systems, the systems share a unified file system and cooperate in its operation. They function more as a single system than as systems merely communicating. If the optional DECnet-20 software is installed, each CFS system running DECnet is a DECnet network node with its own node name. The files in CFS disk structures may be accessible to remote systems by way of such DECnet facilities as NFT. However, a node name is needed to access files in this way. CFS users, on the other hand, do not need to specify node names. All systems in a CFS configuration must be TOPS-20 systems. In a DECnet network, however, other systems that support DECnet can be included. DECnet on a system allows access to other CFS clusters as well as DECnet communication between systems in a cluster (for example, with the SET HOST command). 12-7 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM Table 12-1: Comparison of CFS and DECnet Table 12-1: Comparison of CFS and DECnet __________________________________________________________________ Characteristic CFS DECnet Characteristic CFS DECnet __________________________________________________________________ Multiple systems X X TOPS-20 systems only X One file system X Node name in file spec X DECnet software X CI X X NI X __________________________________________________________________ 12.1.5 CFS and TIGHTLY-COUPLED SYSTEMS 12.1.5 CFS and TIGHTLY-COUPLED SYSTEMS A CFS cluster also differs from tightly-coupled multiprocessing environments. Each CFS system has its own main memory, which is not shared with another system. It also has its own system structure for booting and swapping and may have its own public structure for logging in. Also, CFS systems do not perform automatic load balancing. That is, the CPUs do not relieve each other of processing during high job loads. All jobs, including batch jobs, run only on the computer that the user logs onto. 12.1.6 Limitations 12.1.6 Limitations CFS does not coordinate use of the following facilities across systems: IPCF and OPENF OF%DUD. As an example, a DBMS application cannot span multiple systems, because DBMS uses the OPENF OF%DUD facility. Therefore, such applications should be restricted to a single system. Attempts to cross systems using these facilities will generate error messages. CFS allows for shared disk files and line printers. However, it does not provide for shared magnetic tapes. 12-8 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.1.7 "Cluster Data Gathering" 12.1.7 "Cluster Data Gathering" The "cluster data gathering" system application (CLUDGR) is enabled by default in the n-CONFIG.CMD file. This "SYSAP" collects cluster-related data so that, for example: o Users can obtain information on remote systems in the cluster by way of the SYSTAT command. | o Users can send messages throughout the cluster with the SEND | command. o Operators can obtain scheduling information on remote systems (SHOW SCHEDULER), receive structure status information from system responses during remote structure dismounts, and send messages to users throughout the cluster (^ESEND and SEND). o System programmers can use the INFO% monitor call to obtain information on remote cluster systems. (As described in Section 11.1, you can control access to the INFO% monitor call through the access control program.) You can disable and enable user, operator, and programmer CLUDGR SYSAP functions in the n-CONFIG.CMD file with the following commands: DISABLE CLUSTER-INFORMATION DISABLE CLUSTER-SENDALLS ENABLE CLUSTER-INFORMATION ENABLE CLUSTER-SENDALLS NOTE The CLUDGR SYSAP functions cannot be disabled for the GALAXY components. During timesharing, the operator can disable and enable these same functions with the following privileged commands: ^ESET [NO] CLUSTER-INFORMATION ^ESET [NO] CLUSTER-SENDALLS 12.1.8 Cluster GALAXY 12.1.8 Cluster GALAXY GALAXY is the TOPS-20 batch and spooling subsystem. In a cluster, it lets operators: o Dismount a structure from a single terminal in a cluster even if the structure is mounted on more than one system in the cluster. The dismount with removal process is automated. 12-9 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM o Mount structures on a remote system in the cluster. o Set a structure exclusive from a single terminal in a cluster even if the structure has been mounted on more than one system in the cluster. This process is automated. o Send messages to all users on remote systems in the cluster. | o Control cluster printers o Obtain remote information through most of the SHOW commands. o Obtain the status of inter-system GALAXY DECnet connections. | Cluster GALAXY lets users: | | 1. Send jobs to cluster printers | | 2. Receive information on remote print requests | | 3. Cancel remote print requests | | 4. Receive notification of remote print job queuing and | completion "Cluster GALAXY" requires DECnet, TOPS-20 version 7, and GALAXY version 6. You can disable cluster GALAXY on one or more systems by way of the GALGEN dialog. This dialogue can be run during or after system installation, and then GALAXY must be rebuilt. However, with the feature disabled, none of the remote functions listed above are available; the operating environment is as it was in GALAXY version 5, with TOPS-20 version 6.1. For example, to dismount a shared structure, the operator had to give commands from a terminal on each system on which the structure was mounted, and there was not a great deal of remote information to help the operator with this activity. This chapter assumes that the feature is enabled. 12.2 PLACEMENT OF FILES 12.2 PLACEMENT OF FILES This section offers guidelines for arranging files on CFS systems for maximum performance and efficiency. 12-10 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.2.1 Update Files 12.2.1 Update Files Simultaneous shared writing to a file from multiple systems incurs the most overhead of any CFS file access operation. This is because systems involved in shared writing spend time seeking and granting write permission and coordinating their moves in other ways. Therefore, you might want to place the involved users on the same system. 12.2.2 Files on Served Disks 12.2.2 Files on Served Disks For optimum performance, you should not place on served disks files that require frequent access from multiple systems. This applies to both reads and writes. MSCP file-server operations incur considerable overhead, because the system with the direct connection acts as a disk controller for the accessing system. Therefore, such files should reside on HSC50 disks or, in a two-system CFS configuration, on massbus disks dual ported between systems. 12.2.3 Mail Files 12.2.3 Mail Files By default, users' mail files are created and updated in their logged-in directories on the public structure. To access this mail, users log in and issue appropriate mail commands. They may have to go through this login procedure for every system that contains mail for them. You can change this default arrangement and simplify matters for the CFS user who has accounts on multiple systems. By redefining the systemwide logical name POBOX:, as described in Section 3.3.9, you can establish a central location on a sharable structure for all mail files in the CFS configuration. Then, no matter where users log in, the mail facility sees an accumulation of mail that could have been addressed to them at any system in the configuration. Mail is no longer isolated on individual public structures. An added advantage to redefining POBOX: is that public structures do not fill up with mail files. You must create a directory on the structure defined by POBOX: for every user in the CFS configuration who is to receive mail. 12-11 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.2.4 Sharing System Files 12.2.4 Sharing System Files Most of the files that normally reside on system structures can be moved to a shared structure. Rather than duplicate files in such areas as SYS: and HLP: across systems, you can keep one set of these files on a shared structure. This saves disk space and eases the task of maintaining the files. Also, time and tape are saved during DUMPER backup and restore operations. Because system files are primarily read and not often updated, system performance does not suffer because of this file sharing, provided the structure is not on a server disk. If you consolidate system files, remember to include in the definitions for the systemwide logical names the structures that contain the files. For example, if the SYS: files reside on the structure COMBO:, the definition for SYS: would be: ______ ____ ___________________ _____________________ DEFINE SYS: (AS) COMBO:, COMBO:,- __________________ __________________ MAIN:, MAIN: where: MAIN: is the name of a system structure You should define structures in this way on all the systems, giving the appropriate system structure name. Make sure that the shared structure or structures are mounted UNREGULATED so that users will be able to access the files without having to give a MOUNT command. The drawback to sharing system files is that if there is trouble with the shared structure, users on all systems suffer. Most of the SYSTEM: files must remain on the system structures, so sharing these files is not recommended. ________ _____ START-UP FILES Certain files must remain on each system structure. These files are involved in system start-up and are required before a non-system structure is made available to a system. The following files should remain in each area: 7-CONFIG.CMD 7-PTYCON.ATO 7-SETSPD.EXE 7-SYSJOB.EXE 7-SYSJOB.RUN ACCOUNTS-TABLE.BIN CHECKD.EXE DEVICE-STATUS.BIN DUMP.EXE ERRMES.BIN EXEC.EXE 12-12 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM HOSTS.TXT IPADMP.EXE IPALOD.EXE KNILDR.EXE MONITR.EXE MONNAM.TXT TGHA.EXE In addition, all the GALAXY files should remain in each area. These files come from the GALAXY saveset on the TOPS-20 Distribution _______ __ _____ _ ____________ _____ Tape. (Refer to the TOPS-20 KL Model B Installation Guide.) Command files that are used at your installation during start-up also should be kept on separate system structures. These files include SYSTEM.CMD and NETWORK.CMD. 12.3 LOAD BALANCING 12.3 LOAD BALANCING This section discusses the distribution of jobs across CFS systems. 12.3.1 Dedicating Systems 12.3.1 Dedicating Systems One way to balance loads is to establish the types of jobs that will run on particular systems. For example, you might relegate batch jobs to one system, freeing other systems to run interactive jobs unimpeded. To encourage users to adopt this arrangement, you could give batch jobs the lowest priority on all but the batch-designated system. Users will have to wait a relatively long time for completion of batch jobs on non-batch systems. Refer to Section 10.2, SCHEDULING LOW PRIORITY TO BATCH JOBS, for further information. Conversely, on the batch system, you could accord batch jobs the highest priority. Refer to Section 10.1.4, Procedures to Turn On the Class Scheduler, for details. Dedicating a system in this manner is especially useful when there are many long-running batch jobs at an installation. Another suggestion is to put software development jobs on one system and production jobs on another. Also, you may want to keep one system lightly loaded for critical jobs. DBMS applications and programming applications requiring IPCF facilities must be confined to one system. These are other items to consider if you choose to establish certain uses for particular systems. ___ ____ Keep in mind that users must log onto the systems that are to run their particular jobs. This applies to batch jobs also (without 12-13 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM DECnet). Batch jobs must be submitted by a user logged in on the system where they are to run. The control and log files may reside on shared disks. 12.3.2 Assigning Users to Systems 12.3.2 Assigning Users to Systems In the CFS environment, much of the load balancing is expected to be performed by users. The systems, for example, do not detect that one CPU is overburdened and that another one is underutilized and, accordingly, reassign users' jobs. Instead, users themselves could determine whether or not they should log off a system and log onto another one when system response is slow. Such user tools as the SYSTAT and INFORMATION SYSTEM commands and the CTRL/T function can help users in this area. These tools report on the current state of a system. Among the items reported are the number of jobs running on a system, load averages, the current setting of the bias control "knob," | and whether batch jobs are assigned to a special class. This | information can be obtained for all systems in the configuration, not | just for the user's logged-in system. If you choose this load balancing scheme, you should create directories for all users on all the system structures in the CFS configuration. Also, directory usernames should be unique throughout the configuration, as described below. Then, users can log onto any system with no problem. _________ USERNAMES Directory usernames should be unique throughout the CFS configuration. For example, there should be only one user with the username at an installation. This lets users access system resources without encountering password-related obstacles or causing security breaches. If two users on different systems have the same usernames but different passwords, their passwords will be invalid when they switch systems. If these same users should by chance have the same passwords, they will have complete access to each other's files when they switch systems. Also, if a structure is mounted on both systems as domestic, neither user will have to give a password when accessing the directory on that structure that has their username. (Refer to Section 4.5.7, Mounting Structures from Another Installation, for a discussion of foreign and domestic structures.) _________ ___ ____ ______ DIRECTORY AND USER GROUPS To facilitate user access to CFS files, you could make directory and user group numbers consistent on all structures. That way, users could change structures or systems and their access attempts would have predictable outcomes. 12-14 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.4 STRUCTURE NAMES 12.4 STRUCTURE NAMES Because the structures on all systems are part of a unified file system, structure names must be unique throughout the CFS configuration. If it is necessary to mount structures with duplicate names, the operator should mount one of the structures using an alias. (Refer to Section 4.5.2, Mounting Structures Having the Same Name.) The system recognizes a structure by its alias, which is the same as the permanent structure identification name, unless otherwise specified. Note that everyone throughout the CFS configuration must refer to a structure by the same alias. 12.5 SYSTEM LOGICAL NAMES 12.5 SYSTEM LOGICAL NAMES Logical names are implemented differently from structure names and their aliases. Logical names are local definitions that need not be unique nor consistent throughout the CFS configuration. Thus, the same logical name on two different systems can refer to two completely different disk areas. However, because users are likely to be mobile, systemwide logical names should be consistent across systems. This will avoid confusion for users who switch systems. Refer to Section 3.3, SYSTEM-LOGICAL NAMES, for further information. 12.6 SHARING STRUCTURES AMONG SYSTEMS 12.6 SHARING STRUCTURES AMONG SYSTEMS By default, all structures in the CFS configuration are accessible to all systems, provided outside paths have been established for massbus disks where necessary, using the ALLOW command (refer to Section 12.1.1, CFS HARDWARE). It is necessary to "mount" a structure on any system that is to access files on it, however. That is, the operator or a user on that system must issue a MOUNT command for the structure. | (There can be up to 64 structures online on one system.) After a structure is mounted on a system, users can access it as on non-CFS systems. Users have automatic access to their public structure files, as on non-CFS systems. If a structure has been restricted to a system through previous use of the operator command, SET STRUCTURE str: EXCLUSIVE, it can be made sharable again with the SET STRUCTURE str: SHARED command. The operator issues this command from a terminal running OPR on the system that has exclusive use of the structure. Then, MOUNT commands can be issued for the structure that has been made sharable. The default setting for structures is sharable. 12-15 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM The operator command, SHOW STATUS STRUCTURE, indicates the shared or exclusive status for all structures known to a system. _________ __________ STRUCTURE ATTRIBUTES The operator specifies attributes for a structure with the SET _______ __________ _______ STRUCTURE command, as described in the TOPS-20 Operator's Command ________ _________ ______ Language Reference Manual. They are permanent settings that do not revert to default values after system crashes and reloads. Note that all systems need not have the same attributes in effect for a structure. For example, one system can have a structure mounted as foreign and regulated, and another system can have the same structure mounted as domestic and unregulated. Except for SHARED and EXCLUSIVE, attributes are on a single-system basis only. 12.6.1 Sharing System Structures 12.6.1 Sharing System Structures Bear in mind that when system structures are shared, privileged users can create privileged accounts on any system structure, with the ^ECREATE command. This may or may not be desirable. 12.6.2 Sharing the Login Structure 12.6.2 Sharing the Login Structure In a CFS-20 cluster, it may be advantageous to set up a homogeneous environment where all user accounts reside on a shared "login structure". Then, you do not need to maintain an account on every system to which a user has access. 12.6.2.1 Creating the Login Structure 12.6.2.1 Creating the Login Structure - To create this shared structure, give the following command to the CHECKD program for every system in the cluster: ______ _______________ ____ ________ CHECKD>ENABLE LOGIN-STRUCTURE(FOR STRUCTURE)str:(FOR CPU)cpu where: str is the name of the login structure and cpu is the system's CPU serial number. The default serial number is the current system's. This command adds the CPUs' serial numbers to the login structure's home blocks. The following command displays all the serial numbers that were entered into the blocks: 12-16 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM ____ ____________________ CHECKD>SHOW (INFORMATION FOR) LOGIN-SERIAL-NUMBERS (FOR STRUCTURE) _________ str: where: str is the name of the login structure You should create a directory on this structure for each user in the cluster. (You can also put any other kind of directory on the login structure.) Users' LOGIN.CMD files and their .INIT files for various system programs should reside in these directories. 12.6.2.2 Enabling "Login Structure" 12.6.2.2 Enabling "Login Structure" - The system looks for user accounts on the login structure rather than on the boot structure when you enter the following command in the n-CONFIG.CMD file: ENABLE LOGIN-STRUCTURE 12.6.2.3 Disabling "Login Structure" 12.6.2.3 Disabling "Login Structure" - You can disable the "login structure" feature with the following commands: ____________ ____ n-CONFIG.CMD file: DISABLE LOGIN-STRUCTURE ______ _______ CHECKD program: _______ _______________ ____ ________ CHECKD>DISABLE LOGIN-STRUCTURE(FOR STRUCTURE)str:(FOR CPU)cpu where: str is the name of the shared structure and cpu is the system's CPU serial number. The default serial number is the current system's. These commands cause the system to look for user accounts on the boot structure, which is the default condition. 12.6.2.4 PS: and BS: Directories 12.6.2.4 PS: and BS: Directories - Before you enable the "login structure" feature, the public structure (PS:) is the boot structure (BS:), and is also known as the system structure. After you enable the feature, the system considers PS: to be the login structure, the structure that contains all the user login directories. 12-17 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM The special system directories, described in Section 3.2, must remain on BS:, although you may choose to move many of their files to other directories. However, the files listed in Section 12.2.4 must remain on the boot structure in : Also, the GALAXY components write files to SPOOL:, which the system defines at startup to be BS:. NOTE Except where noted, this manual assumes that you have ___ not enabled the "login structure" feature. 12.7 RESTRICTING STRUCTURES TO ONE SYSTEM 12.7 RESTRICTING STRUCTURES TO ONE SYSTEM There may be times when you want to restrict use of a structure to a particular system. Such a structure might be used for DBMS applications (refer to Section 12.1.6, Limitations), or security measures may call for restricted use. For whatever reason, the operator restricts a structure with the following command: ___ _________ ____ ______________ OPR> SET STRUCTURE str: EXCLUSIVE When the operator gives this command, the system first checks to see that the structure is not in use on other systems. If it is, the operator is given a list of those systems and asked whether or not this system should proceed with an automatic remote dismount of the structure from those systems (with the NO-REMOVAL option). This information and automatic dismount requires cluster GALAXY to be enabled. Ideally, the operator should beforehand follow the normal dismount procedure of making the structure unavailable to new users and notifying existing users of the pending dismount. The structure should be kept unavailable for all systems except the exclusive one so that the structure will not be inadvertently shared when the owning system crashes. After a structure has been dismounted from other systems, the SET STRUCTURE EXCLUSIVE command can take effect. It remains in effect on the system, as do all SET STRUCTURE specifications, throughout crashes and reloads. If users give the MOUNT command for a structure that is exclusive to another system, an error message will be issued, indicating that the structure is unavailable. Note that any system can have exclusive use of any sharable structure except another system's system structure. _______ __________ _____ Refer to the TOPS-20 Operator's Guide for details on setting structures exclusive. 12-18 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.8 DISMOUNTING STRUCTURES 12.8 DISMOUNTING STRUCTURES When issuing a DISMOUNT command for a structure, operators have the option of specifying that the structure be physically removed from a disk drive. In the CFS environment, however, the system first ensures that the structure is not in use on other systems. If a structure is mounted on another system, the operator is notified and must go through the normal procedure of dismounting the structure (with the NO-REMOVAL option) from that system. Note that with cluster GALAXY enabled, the operator can dismount structures remotely by performing all activities from an OPR terminal on the local system. The operator does not need to log onto any other system. Throughout the dismount process, the operator receives various informational messages as well as error messages if, for example, the system cannot get an exclusive lock on the structure by way of the ENQ% monitor call or communicate with nodes on which the structure is mounted. (The system cannot communicate with nodes that have the cluster GALAXY feature disabled.) _______ __________ _____ Refer to the TOPS-20 Operator's Guide for details on dismounting structures. The default setting on CFS systems is for a structure to be dismounted with the no-removal option. Sometimes the system instructs the operator to dismount structures. This can occur for the following reasons: o The operator attempts to shut down a system. o The operator attempts to make the CI unavailable to a system. | | o A system has been granted exclusive use of a structure. | | o A structure has been physically dismounted from another | system. | | Refer to Sections 12.7, 12.9, and 12.12 for details. | | These dismount instructions appear if you have included the ENABLE | JOB0-CTY-OUTPUT command in the n-CONFIG.CMD file. 12-19 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.9 MAKING THE CI UNAVAILABLE TO A SYSTEM 12.9 MAKING THE CI UNAVAILABLE TO A SYSTEM Ordinarily, you need do nothing at all to operate the CI. However, you may need to disengage a system from the CI so Field Service personnel can diagnose and/or correct problems with the CI20 or the HSC50. Or, you may wish to remove a system from the CFS configuration. At those times, you should instruct the operator to make the CI unavailable by means of the SET PORT CI UNAVAILABLE _______ __________ _____ command. (Refer to the TOPS-20 Operator's Guide for details.) When the CI is unavailable to a system, users cannot access multi-access disks (dual-ported disks, HSC50-based disks, or served disks on other systems). These disks rely on the CI to coordinate accesses and/or to transmit data. Served disks on the system disengaging from the CI will be unavailable to other systems. Dual-ported massbus disks in the A/B position will have to be powered down and switched to one system. When the operator gives the SET PORT CI UNAVAILABLE command, the system indicates the structures that need to be dismounted and the disk drives that need to be made unavailable. The operator is advised to follow the normal procedures of forewarning users before dismounting structures and making disk drives unavailable. The command option to forcibly disengage a system from the CI should be reserved for emergencies. If the operator determines that disengaging from the CI will be too disruptive to users, the operator has the option of aborting the procedure. To put the CI back in operation, the operator gives the command: ___ ____ __ ______________ OPR>SET PORT CI AVAILABLE The operator is then asked if any other TOPS-20 system is running on the CI. If yes, the system rejoining the CFS configuration must be rebooted. If no, the CI20 will be reloaded and started. If the operator answers "no" and another TOPS-20 system is found after the CI20 has started, a CFRECN BUGHLT is issued on processors with lower serial numbers than the system joining the cluster and on this processor also, if there's a system in the cluster with a higher serial number. (See Section 12.11.1 for details.) After the system rejoins the configuration, structures that were affected when the CI was made unavailable will need to be remounted. 12.10 USING DUMPER 12.10 USING DUMPER CFS offers operators and users flexibility in saving and restoring disk files. The only restriction is that DUMPER must be running on a system to which tape drives are attached. Tape drives are not served through CFS. 12-20 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.11 ERRORS 12.11 ERRORS This section discusses the actions you or the operator take when errors occur in the CFS environment. It also describes how CFS systems react to various errors. Note that there is no single hardware or software point that can disable the whole configuration. For example, systems can start up or crash with little impact on other systems. 12.11.1 Communication Problems 12.11.1 Communication Problems CFS systems are sensitive to breaks in communication, whether they are caused by CI20 errors or system crashes. Because the data integrity of shared structures depends on unbroken intersystem contact, the systems take quick action to prevent data corruption. Therefore, you may observe any of the following when systems lose contact with each other. These should be rare occurrences. o For a period of time calculated as 5 seconds per node (hosts and HSCs), no system in the configuration can access any ____________ _____ multi-access disks (dual-ported disks, HSC50-based disks, served disks on other systems). This interval allows each system to check that its own CI20 and segment of the CI bus are working. Most likely, some system's CI20 microcode has stopped and is automatically reloaded during the interval, or a system has crashed. (There may be other, unpredictable reasons for CI disruption.) Jobs that were accessing multi-access disks are suspended until data integrity is assured. If the CI20 and CI bus are working before the end of the interval, the system can resume accessing all multi-access disks except server disks on a crashed system. o A system crashes with a KLPNRL BUGHLT. This happens if the CI20 microcode takes longer to reload than 10 seconds. This BUGHLT is expected to occur rarely, because the microcode should be reloaded within a couple of seconds. 12-21 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM _____ o If communication resumes after the interval mentioned at the beginning of this section, without the faulty system having crashed and restarted, the system with the lower serial number crashes with a CFRECN BUGHLT message as the faulty system tries to establish contact with each running system. That is, a system joining the cluster illegally will crash any system already in the cluster with a lower CPU serial number. The node itself will crash if there is already a node in the cluster with a higher CPU serial number. For example, this occurs when the SET PORT CI AVAILABLE command has caused communication to resume incorrectly due to operator error, as described in Section 12.9, MAKING THE CI UNAVAILABLE TO A SYSTEM. With such a delayed reconnection, a system is likely to contain old, invalid information about the status of multi-access disks. This is because other systems are allowed to access the disks after the interval, believing a faulty system is no longer running. Therefore, systems are selected to crash so that a fresh database can be established for the disks when the systems restart. _______ EXAMPLE There are four systems in a cluster with serial numbers one through four: System Serial Number A 1 B 2 C 3 D 4 System B leaves the cluster and then tries to rejoin after the delay allowance has expired. System A crashes because its serial number is lower than system B's. System B crashes when it tries to establish contact with either systems C or D, whose serial numbers are higher than B's. Systems C and D remain running. 12-22 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM __ _______ AT STARTUP Sometimes, communication problems begin at system startup. A system that has just started up tries to communicate with each TOPS-20 system and HSC that is already running. After the SETSPD program sets the systemwide defaults, a system joining the CFS cluster checks to make sure that: o Its own CI20 is working. If there is any malfunction, the "CFS joining" process is aborted. The system makes no further attempts to communicate with other CFS nodes and remains outside the CFS cluster. o Its segment of the CI bus is working. If the areas above are satisfactory, the system starting up then checks to see if, for each cluster node: o The CI20 at the remote node is in maintenance mode (TOPS-20 nodes only, not HSCs). If so, the system knows that it cannot communicate with that node and tries to establish contact with the next node. o Its own CI20 driver has created a system block for the remote node. The driver creates this block when the remote system responds to its request for recognition. The system block allows for a virtual circuit to be established between the two systems, over which inter-node data and messages are sent on the CI. If the block does not yet exist, the system sends a message to the CTY so that the operator can take appropriate action on the remote node. This situation usually indicates a hardware problem with the remote system's CI20. If a system block has been created for a remote TOPS-20 node, the system tries to establish a CFS connection with that node by way of the virtual circuit. It is through CFS connections that systems communicate in order to coordinate access to shared disks. If the attempt fails, a message is sent to the CTY for operator action. This situation usually indicates a software problem, most likely that TOPS-20 is not running at the remote node. | If the attempt at communication is successful, a confirming BUGINF is | sent to the starting system's CTY. A system starting up makes these communication checks for every other node in the cluster. _______ __________ _____ Refer to the TOPS-20 Operator's Guide for details on the operator | information and error messages. 12-23 THE COMMON FILE SYSTEM THE COMMON FILE SYSTEM 12.11.2 Massbus Problems with Dual-Ported Disk Drives 12.11.2 Massbus Problems with Dual-Ported Disk Drives Dual-ported disk drives are accessed by each system through the massbus hardware connections. However, if for some reason a massbus path becomes unavailable to a system, the other system, with working massbus connections, can provide access to the drives affected, with the MSCP file server. The disks become "served." The operator enables this facility by powering down the disks and flipping the drive port switches from the A/B position to the position that corresponds to the servicing system. Then the operator must reboot the system with the faulty massbus link. These procedures are required because a running system will never invoke the MSCP server after identifying a massbus path for a disk. It is assumed that an ALLOW command has been entered in the n-CONFIG.CMD file for the disk drives, as described in Section 12.1.1, CFS Hardware. The operator returns the switches to the A/B position when the massbus problem is corrected. The PHYTPD BUGINF is then issued to confirm that the massbus will now be used for data transmission. 12.12 SHUTTING DOWN A CFS SYSTEM 12.12 SHUTTING DOWN A CFS SYSTEM When an operator issues the ^ECEASE command to shut down a system, outside jobs that may be accessing the system's served disks do not hang, with the following procedure. If any served disks have been mounted from other CFS systems, the operator is warned to check those systems for possible structure dismounting instructions. At the other systems, meantime, if any served disks are mounted on the system shutting down, the operator is warned of the pending shutdown and is advised to dismount the structures listed. In a CFS-20 cluster, a shutdown on one system causes "system going down" messages to be transmitted to all systems in the cluster at the sixty-minute, five-minute, and one-minute marks. For example, if SYSA is shutting down, the following messages appear clusterwide: [System SYSA going down in 60 minutes at 1-Dec-87 16:29:22] [System SYSA going down in 5 minutes at 1-Dec-87 16:29:22] [System SYSA going down in one minute!!] 12-24 CHAPTER 13 CHAPTER 13 LAT TERMINAL SERVERS LAT TERMINAL SERVERS 13.1 OVERVIEW 13.1 OVERVIEW _____ ____ _______ A local area network is a collection of computers and their resources that are linked together in a small geographic area, such as a college ___ campus or a large building. Local Area Transport (LAT) software ________ _______ enables special-purpose computers to be used as terminal servers in such a network. With LAT software, user and application terminals ____ _______ that would otherwise be individually wired to host systems (DECSYSTEM-20s, for example) are instead connected directly to a LAT terminal server. The server, in turn, is linked to one or more hosts by way of the Ethernet Network Interconnect cable (NI), as shown below: +-------+ +-------+ | LAT | | LAT | | HOST | | HOST | | | | | +---0---+ +---0---+ | | | | | | NI ===================0==================0============0======= | | | +---0---+ Application Terminal -------| LAT | User Terminal -------|SERVER | User Terminal -------| | +-------+ Figure 13-1: A LAT Network Figure 13-1: A LAT Network A LAT host might be a TOPS-20, VMS, or RSX-11 system. The LAT server 13-1 LAT TERMINAL SERVERS LAT TERMINAL SERVERS is any NI-based terminal server. An application terminal is a device under the control of an application process on the host. A printer is an example of an application terminal. An application process such as LPTSPL requests a connection to the LAT server when users want access to the device. The type of application terminal referred to in this manual is a LAT printer. Section 3.7 contains further information on LAT printers. The main features of LAT servers are: o Users can connect to any NI host that supports the LAT protocol, and it appears to them that their terminals have direct connections to those hosts. Connections between LAT ________ terminal users and hosts are called sessions. There can be up to 128 sessions on a TOPS-20 host. o By requesting multiple host connections, a LAT terminal user can enable multiple sessions at one host or at several hosts simultaneously. With one keystroke, such users can switch between their jobs on these systems. o LAT servers can balance user loads among hosts according to a rating system that you set up. o Users throughout the network can share LAT application terminals. An LN03 printer on a LAT server, for example, is not restricted to local host use. Note that LAT software runs on host systems as well as on LAT servers. This chapter discusses how to control LAT host software from a DECSYSTEM-20. You can also issue commands directly to a LAT terminal server. Refer to the documentation provided with your LAT terminal server hardware for details on those commands. 13.2 LAT SOFTWARE 13.2 LAT SOFTWARE Each host that supports the LAT protocol for interactive terminal service periodically broadcasts this fact to all LAT terminal servers. Each server maintains a list of hosts that have sent such messages. A terminal user can issue a command to the server to display this list to see which hosts are accessible. _______ The logical path between a LAT host and server is called a LAT virtual _______ circuit. There is one virtual circuit for each server/host pair that has at least one active terminal session. When a terminal user requests a connection to a host, the server creates a virtual circuit to that host if none exists. Otherwise an already existing circuit is used for data transmission. As system manager, you can decide the maximum number of virtual circuits that can exist at a host. The 13-2 LAT TERMINAL SERVERS LAT TERMINAL SERVERS number that you decide upon can affect system performance. This topic is discussed in Section 13.4. Virtual circuit messages are transmitted between host and server at _______ _____ periodic intervals determined by a circuit timer maintained in the LAT server. When the timer expires, the server assembles into a single virtual circuit message any terminal input received during the past interval for a particular host and transmits it to the host. You can set this timer only at the server. It has a recommended value of 80 milliseconds, which is the default. The data associated with a particular terminal are grouped in a _____ virtual circuit message in units called slots. A virtual circuit message may contain slots from many terminals and may contain more than one slot from a single terminal. The maximum size of a slot is another parameter that you can set. Having received a virtual circuit message, the host assembles as much terminal output data as possible into a single message and transmits it to the server. If no output is waiting for any terminal at that server, a message is sent with no slots. The host's response message acknowledges the previously received message from the server. This message will be acknowledged by the server message transmitted at the next tick of the circuit timer. To reduce NI utilization and load on the host, the server transmits a message only when there is something to send. It could happen that when the server has no data to transmit, there is more terminal output data waiting at the host. But because the last host message remains unacknowledged, output flow from the host would stop. For this reason, the host is permitted to transmit one "unsolicited" message to the server. (Refer to the description of the HOST RETRANSMIT TIMER dynamic parameter in Section 13.4 for additional information.) The host sets a flag in the message, which forces the server to respond at the next tick of the circuit timer. This "forced" response acknowledges all the host's previously transmitted messages and returns all transmit buffers so that they may be used again. The host maintains a circuit timer with a default interval of 1 second. (You can set it up to 2 seconds.) The function of the host's circuit timer differs from that of the server's circuit timer: it is __________ _____ used solely as a retransmit timer. When the host sends an "unsolicited" message, as described above, it starts its circuit timer. Because the server's circuit timer is shorter than the host's, the server should have acknowledged all outstanding host messages well before the host's timer expires. If this does not happen, the host retransmits all unacknowledged messages. This continues until either the server responds with an acknowledgement, or the retransmit limit is reached. If the retransmit limit is reached, the host assumes the connection to the server is no longer useable and detaches all LAT jobs from that server. (Refer to the description of the HOST RETRANSMIT TIMER and the HOST RETRANSMIT LIMIT dynamic parameters in 13-3 LAT TERMINAL SERVERS LAT TERMINAL SERVERS Section 13.4.) 13.3 DECNET 13.3 DECNET LAT, for the most part, is independent of DECnet. It does not require DECnet for general operations. However, DECnet is required on at least one host for start-up of LAT servers. Software from a host is loaded into the server's memory by DECnet's Network Management. This "down-line loading" of LAT servers occurs when the operator either physically boots the server or triggers a boot of the server by issuing a DECnet command from a host running DECnet. In either case, any host that has DECnet and the appropriate load files may respond to the boot, and then be selected by the server to load its memory. DECnet is also needed for "dumping" files of LAT memory images to a ________________ host for problem diagnosis on the host. Refer to the DECnet-20/PSI-20 ______ _________ _____ System Manager's Guide for the operator procedures involved in loading and dumping LAT servers. If a system supports DECnet, its node name and number are taken to be the LAT name and number also. You do not need to respecify them in the n-CONFIG.CMD file. Refer to the discussion of static parameters in Section 13.4. 13.4 CONTROLLING LAT FROM THE HOST 13.4 CONTROLLING LAT FROM THE HOST There are three ways for you or the operator or a system programmer to control LAT from a host: _________ o By rebuilding the monitor with new permanent parameters. ______ o By changing static parameters in the n-CONFIG.CMD file _______ o By changing dynamic parameters with the LAT Control Program subsystem of the OPR program The lists below briefly describe these parameters. Many are discussed more fully later. Note that you can also control LAT from the server itself. Refer to the documentation that came with your LAT server for details on server commands. _________ __________ Permanent Parameters Normally, you do not need to change permanent parameters. To change them, a system programmer familiar with monitor internals must rebuild the monitor. 13-4 LAT TERMINAL SERVERS LAT TERMINAL SERVERS o FRAME SIZE - The host or server guarantees that it can receive NI datagrams of at least this size. Usually three ( 2 transmit and 1 receive) buffers of this size are used for each LAT circuit. The default and recommended value is 1504 bytes. o MAXIMUM HOST SERVICES - Sets the maximum number of services that this host can offer. You can specify up to 254 services. The default and recommended maximum is 8. Refer to Section 13.7, HOST SERVICES. o MAXIMUM SLOTS - Sets the maximum number of slots that may be entered into a virtual circuit datagram for a given circuit. It is agreed upon by the server and host when the virtual circuit between them is established. The default and recommended value is 64. o MAXIMUM SLOT SIZE - Sets the maximum number of bytes of data (not including the slot header) that the host can accept from the server in any slot. The slot size can range from 1 to 255. The default and recommended value is 40. o MAXIMUM SERVER CACHE - Sets the maximum number of servers whose characteristics are kept in memory. The LCP command, SHOW SERVER, displays these characteristics. (Refer to Section 13.8.3, Displaying Server Information.) The default and recommended value is 20. ______ __________ Static Parameters o DEFAULT LAT ACCESS STATE - Determines LAT accessibility to and from the host. Values for the state are ON (the default) and OFF. The LAT access state can be changed dynamically with a LAT Control Program command. When the system is reloaded, however, the value for this static parameter again takes effect. Refer to Section 13.5, STARTING AND STOPPING LAT, for additional information. o HOST NAME - Uniquely identifies the host within the local area network. It may contain up to a combination of six alphabetic and numeric characters, with at least one alphabetic character. The default host name is the DECnet node name, if the system supports DECnet. If the system does not support DECnet, you must specify a name. For related information, refer also to Section 13.7. That section _______ _____ discusses host service names. o HOST NUMBER - Uniquely identifies the host within the local area network. The number can range from 0 to 65535. It is 13-5 LAT TERMINAL SERVERS LAT TERMINAL SERVERS passed to the server when the virtual circuit between host and server is established. The default number is the DECnet node number, if the system supports DECnet. This is an optional parameter for use by one of your system programmers. The n-CONFIG.CMD file commands that set these static parameters are: - NODE hostname hostnumber - LAT-STATE default LAT access state where the default LAT access state is ON or OFF _________ ______ ______ _________ _____ | Refer to the DECnet-20 PSI-20 System Manager's Guide for | DECnet-related SETSPD commands, if applicable. _______ __________ Dynamic Parameters As system manager, you will probably be most concerned with dynamic parameters: o HOST GROUP CODES - Defines the group codes for the host. They can range from 0 to 255. Code 0 is enabled by default. You can define any number of codes for a host. A LAT server will not connect to the host unless both server and host have at least one group code defined in common. Refer to Section 13.6, LAT GROUPS. o HOST IDENTIFICATION - Supplies information about the host. It appears in various displays requested by managers and users. The identification may contain up to 64 printable characters. The default identification is the TOPS-20 banner message from SYSTEM:MONNAM.TXT. o HOST NUMBER - Uniquely identifies the host within the local area network. The number can range from 0 to 65535. It is passed to the server when the virtual circuit between host and server is established. The default number is the DECnet node number if the system supports DECnet. This is an optional parameter for use by one of your system programmers. o HOST MULTICAST TIMER - Determines the interval at which the host announces to all servers that its LAT terminal service is available. The default value is 60 seconds. o HOST RETRANSMIT LIMIT - Sets the maximum number of times that the host retransmits a message at the expiration of HOST CIRCUIT TIMER. The virtual circuit is closed and all jobs associated with the virtual circuit become detached when this limit is exceeded. The default value is 30 times. 13-6 LAT TERMINAL SERVERS LAT TERMINAL SERVERS o HOST RETRANSMIT TIMER - Determines the interval at which the host retransmits any unacknowledged messages to the server. It is started when the host sends an "unsolicited" message and is stopped when the host receives any message from the server that acknowledges all outstanding messages. The default value is 1000 milliseconds (one second). It can be set from 1000 to 2000 milliseconds, however. Refer to the description of the HOST RETRANSMIT LIMIT parameter for related information. o HOST SERVICE NAME - Specifies the name of a service that the host provides for users. It may contain a combination of up to 16 alphabetic and numeric characters as well as the dollar sign ($),dash (-), and underscore (_). The default service name is the host name. Refer to Section 13.7, HOST SERVICES. o HOST SERVICE NAME RATING - Assigns a rating to a service name. It can be a fixed number in the range of 0 to 255 or it can be DYNAMIC. Refer to Section 13.7.1, Service Ratings. o LAT ACCESS STATE - Determines LAT accessibility to and from ______ the host. The default state allows LAT access. This dynamic parameter is affected by the LCP START and STOP commands. o MAXIMUM ACTIVE CIRCUITS - Sets the maximum number of LAT virtual circuits that can exist simultaneously at the host. The default value is 20. o MAXIMUM SESSIONS - Sets the maximum number of terminal sessions that may be active at the host simultaneously. The default value is equivalent to the number of terminals allowed in your system configuration. Section 13.1 discusses sessions. The dynamic parameters are changed with the LAT Control Program (LCP). To use LCP, the operator enters the following from the OPR prompt: 1. For many LCP commands: _____ ________ OPR> ENTER LCP ____ _____________ LCP> ____ _____________ LCP> ____ _____________ LCP> ____ _____________ LCP> ___________ LCP> RETURN OPR> 2. For a single command: ___ ____ _____________ OPR> LCP OPR> 13-7 LAT TERMINAL SERVERS LAT TERMINAL SERVERS The LCP commands also let you start and stop operations, check parameter values and other information, and access counters maintained by the NI and servers. These LCP functions are discussed in later __________ _______ ________ _________ ______ sections. The Operator's Command Language Reference Manual fully describes LCP. The following is a summary of the LCP commands: START STOP SET GROUPS (0,1-5,....255) SET SERVICE-NAME service-name{/RATING:{nn|DYNAMIC}| /IDENTIFICATION:"text"| nothing} SET IDENTIFICATION "text" SET NUMBER number SET MAXIMUM ACTIVE-CIRCUITS number SET MAXIMUM SESSIONS number SET MULTICAST-TIMER seconds SET RETRANSMIT LIMIT number SET RETRANSMIT TIMER number CLEAR GROUPS (0,1-5,....255) CLEAR SERVICE-NAME service-name CLEAR IDENTIFICATION CLEAR MAXIMUM CIRCUITS CLEAR MAXIMUM SESSIONS CLEAR MULTICAST-TIMER CLEAR NUMBER CLEAR RETRANSMIT LIMIT CLEAR RETRANSMIT TIMER SHOW CHARACTERISTICS SHOW HOST-INITIATED-REQUESTS SHOW PENDING-REQUESTS SHOW SESSIONS SHOW COUNTERS{/SERVER:server-name| nothing} SHOW SERVER{/ALL| server-name| nothing} ZERO COUNTERS{/SERVER:server-name| nothing} 13.5 STARTING AND STOPPING LAT 13.5 STARTING AND STOPPING LAT Support for LAT servers is enabled by default in TOPS-20. That is,the LAT access state is enabled unless specifically disabled in the n-CONFIG.CMD file. Disabling it is useful if you wish to establish 13-8 LAT TERMINAL SERVERS LAT TERMINAL SERVERS guidelines and set restrictions for LAT use before you enable it. You can set groups and the host identification, for example, before enabling LAT. The operator can enable and disable the LAT access state dynamically with the LCP START and STOP commands. The host name and number are other parameters that you specify in the n-CONFIG.CMD file (unless DECnet is supported on the host). They are required items that uniquely identify the host in the local area network. After the host name and number have been established, and the LAT access state has been enabled, the operator starts LAT by booting the server or by issuing a DECnet command from the host, as discussed in Section 13.3. It is recommended that you disable the LAT access state if LAT is not intended to be used for an extended period of time. This will improve system performance. 13.6 LAT GROUPS 13.6 LAT GROUPS _____ _____ By using group codes, you can divide the local area network into smaller networks. That is, you can allow or prevent connections between specified servers and hosts. When users give a LAT command to display the names of available services, only those services corresponding to hosts within a server's "group" are displayed. (Refer to Section 13.7 for a discussion of services.) Codes in the range of 0 to 255 can be assigned to DECSYSTEM-20s and LAT servers. A LAT server will connect to a host only if it has at least one group code defined in common with the host. (Refer to the LAT documentation set for information on assigning codes to LAT servers.) Note that code 0, the default for hosts and servers, allows universal access. When servers and hosts implement the default, users have access to all hosts. In the example below, an operator enables access between this DECSYSTEM-20 and any LAT server assigned a code in the range of 1 to 5. No connection is allowed with any other server. ___ ______ ________ LCP> SET GROUPS 1:5 _____ ______ ______ LCP> CLEAR GROUPS 0 User terminals wired to servers in any one of these groups will be able to access the system. Group settings stay in effect until reset with the CLEAR GROUPS command. 13-9 LAT TERMINAL SERVERS LAT TERMINAL SERVERS 13.7 HOST SERVICES 13.7 HOST SERVICES _______ ____ Another name for a LAT host is a service node (a node being a system in a network). This refers to the fact that hosts provide computing ________ services. Users access hosts in order to have some type of computing need served--to compile a program, update a file, or print a report, _______ for example. LAT terminal servers deliver these services to users. Users refer to hosts by the services that they offer, rather than by host name. When they request the LAT server to connect them to a host, they specify a service name that you have previously established for that host. The server maintains a list of host and service names and lets users display service names assigned to hosts in the user's group. (The server also displays any service identification text you specified.) With the SET SERVICE-NAME command, you can specify one or more services for a host: ___ ____________ ___________________________________ ____________ LCP> SET SERVICE-NAME LASER-PRINTER/IDENTIFICATION:"OMEGA System" ___ ____________ _________________ LCP> SET SERVICE-NAME ARPA-GATEWAY The default service name for a host is the host name. You may want to specify some identifying text for such services. For example, on the host ALPHA, you could give the command: ___ ____________ _______________________ ______ ____________ LCP> SET SERVICE-NAME ALPHA/IDENTIFICATION:"A DECnet System" You can assign the same service name to multiple hosts. The following section discusses this topic. 13.7.1 Service Ratings 13.7.1 Service Ratings You can arrange for LAT servers to distribute users among host systems, according to a rating system that you set up. This is useful for hosts with service names in common. Perhaps several systems are part of a CFS cluster. You can assign the same service name, CFS, on _______ ______ each host but specify a unique service rating for each one: ___ ____________ ____________ LCP> SET SERVICE-NAME CFS/RATING:3 ________________ _________________ _____________ /IDENTIFICATION: "ALPHA/BETA/OMEGA Cluster" ___ ____________ ____________ LCP> SET SERVICE-NAME CFS/RATING:9 ________________ _________________ _____________ /IDENTIFICATION: "ALPHA/BETA/OMEGA Cluster" If a user requests connection to CFS, the server will pick the host with the highest rating for that service. If, for some reason, that connection fails, the server will try the host with the next highest rating. 13-10 LAT TERMINAL SERVERS LAT TERMINAL SERVERS Ratings can be a fixed number from 0 to 255. Or they can be DYNAMIC. When hosts with common service names have DYNAMIC ratings for the service, the hosts compute ratings using an algorithm based on system load averages. Generally, the host with the lowest load average is given the highest rating. That host probably has the greatest available computing capacity. You can use common service names for any collection of hosts offering the same function. The default rating is 1 for the default service name, and 0 for services created with the SET SERVICE-NAME command. _______ ______ _______ Service Rating Example Hosts SOLAR and LUNAR, in addition to providing a timesharing service as service names SOLAR and LUNAR, each have the service name CFS. SOLAR assigns a host rating to name CFS of 5; whereas LUNAR assigns 3. A LAT terminal user, when displaying the list of available LAT services, will see SOLAR, LUNAR, and CFS. If the user connects to CFS, the server will first attempt to access SOLAR. If that fails, it will try LUNAR. 13.8 MONITORING LAT FROM THE HOST 13.8 MONITORING LAT FROM THE HOST The following sections show various LAT informational displays. 13.8.1 Displaying User Information 13.8.1 Displaying User Information The SHOW SESSIONS command displays information about connected LAT terminals: ____ _____________ LCP>SHOW SESSIONS LCP> 10:52:26 [LCP] Active LAT sessions Job Line Program Server Name Port Name User 105 326 EXEC COTTAGE PORT7 DOPEY 114 327 LPRINT PALACE *LASER-PRINTER THE_QUEEN 114 330 LPRINT PALACE ROYAL-TTY THE_QUEEN 120 331 EXEC COTTAGE PORT3 GRUMPY 113 332 EMACS PALACE KINGS-TTY THE_KING * indicates an Application Terminal The TOPS-20 SYSTAT user command shows much of this same information. 13-11 LAT TERMINAL SERVERS LAT TERMINAL SERVERS 13.8.2 Displaying Host Parameters 13.8.2 Displaying Host Parameters The SHOW CHARACTERISTICS command displays many of the LAT parameter settings: ____ ____________________ LCP>SHOW CHARACTERISTICS LCP> 09:20:41 [LCP] -- Host Characteristics -- LAT Access State: ON Host Name: ALPHA Host id: ALPHA, TOPS-20 Development System, TOPS-20 Monitor 7(20753) Host number: 140 Retransmit Limit: 60 Retransmit Timer: 1000 Multicast Timer: 30 Groups: 3:4,7,10,18,21:23,45,47 Current Maximum ------- ------- Allocated circuits 6 32 Active circuits 6 20 Sessions 8 128 Service name Rating Identification ------------ ------ ------------------------ ALPHA 1 ALPHA - More Networks per CPU SGROUP D Software Engineering Cluster The D that appears for the service name rating indicates a dynamic rating. 13.8.3 Displaying Server Information 13.8.3 Displaying Server Information The SHOW SERVER command displays information about servers with connections to this host. The host tries to keep information in memory on all servers that have connected since the last monitor load. However, this could require a very large data base. Therefore, information is kept only for the number of servers specified in the MAXIMUM SERVER CACHE permanent parameter. (Refer to Section 13.4 for information on this parameter.) When this number is exceeded, the oldest inactive entry is deleted from the data base, making room for a new entry. 13-12 LAT TERMINAL SERVERS LAT TERMINAL SERVERS You can specify a single-line summary for each server or a detailed display for a single server: ____ _______________ LCP>SHOW SERVER/ALL LCP> 14:55:32 [LCP] Summary of all servers Server Name(Number): Finance(8) Address: 08-00-2B-00-17-BA Server Name(Number): Accounting(22) Address: 08-00-2B-02-08-C0 Server Name(Number): Payroll [LAT3](3) Address: AA-00-03-01-25-38 Server Name(Number): Development(2) Address: AA-00-03-01-06-AB ____ ______ ____________ LCP>SHOW SERVER FINANCE LCP> 14:56:12 [LCP] Information about server Finance Server Number: 8 Server Location: Near vending machines Server Type: DECserver-100 Ethernet Address: 08-00-2B-00-17-BA Server Status: Connected Max Slots: 32 Data Link Size: 1518 Circuit Timer(ms): 80 Keep-alive Timer(s): 20 13.8.4 Displaying LAT Counters 13.8.4 Displaying LAT Counters The SHOW COUNTERS command displays counters kept by LAT software modules. These counters provide information such as the number of messages transmitted, the number of transmission errors, and so on. You can obtain these numbers for a single server, or you can obtain cumulative figures for all servers that have connected since the last monitor reload: ____ _____________ LCP>SHOW COUNTERS LCP> 14:48:11 [LCP] Counter totals for all servers Messages received: 33955 Messages transmitted: 36413 Messages retransmitted: 0 Sequence errors received: 21 Illegal messages received: 0 Illegal slots received: 0 Resource failures: 0 13-13 LAT TERMINAL SERVERS LAT TERMINAL SERVERS ____ _________________________________ LCP>SHOW COUNTERS/SERVER:PUBLICATIONS LCP> 14:48:34 [LCP] Counters for server PUBLICATIONS Messages received: 28189 Messages transmitted: 30132 Messages retransmitted: 0 Sequence errors received: 0 Illegal messages received: 0 Illegal slots received: 0 Resource failures: 0 The single-server counts are available even after a server has disconnected from the host. However, this availability, as the information displayed with the SHOW SERVER command, depends on the limit set with the MAXIMUM SERVER CACHE permanent parameter. The cumulative counters are incremented each time individual server counters are. It is possible that the sum of all server counters is not equal to the cumulative counts, because you can zero the counters for any server, as discussed below, or the data base may have been cleared according to the MAXIMUM SERVER CACHE parameter limitation. When using the counters to monitor performance or to isolate hardware failures, it is often desirable to be able to reset (or zero) the counters. The ZERO COUNTERS command lets you do this. You can reset counters for one server or for all the servers. Resetting the cumulative counts does not affect the counts of the individual servers. 13.8.5 Displaying Pending Requests for LAT Application Terminals 13.8.5 Displaying Pending Requests for LAT Application Terminals The SHOW PENDING-REQUESTS command displays information on pending, rejected, and canceled requests for LAT application terminals: ____ _____________________ LCP>SHOW PENDING-REQUESTS LCP> 09:20:49 [LCP] -- Current Pending Connect Requests -- Job Status Server Name Service Name Port Name User --- ------ ---------------- ---------------- ------------ ---------- 146 QUE 1 LAT100 LN03 WADDINGTON QUE nn means request was queued; entry is nn requests into the queue A total of 1 request was found LCP> 13-14 LAT TERMINAL SERVERS LAT TERMINAL SERVERS 13.8.6 Displaying All Print Requests for LAT Application Terminals 13.8.6 Displaying All Print Requests for LAT Application Terminals The SHOW HOST-INITIATED-REQUESTS command displays information on all active and pending requests for LAT application terminals: LCP>SHO HOST LCP> 09:21:10 [LCP] -- Current Host-Initiated Requests -- Job Status Server Name Service Name Port Name User --- ------ ---------------- ---------------- ---------------- --------------- 130 TTY334 LAT100 LN03 OPERATOR 146 QUE 1 LAT100 LN03 WADDINGTON TTYnnn means connect is active and terminal nnn was assigned QUE nn means request was queued; entry is nn requests into the queue A total of 2 requests were found LCP> 13-15 LAT TERMINAL SERVERS LAT TERMINAL SERVERS . INDEX -A- -A- Application terminal, 13-2 Automatic Volume Recognition ABSOLUTE-INTERNET-SOCKETS (AVR), 8-15, 8-17 capability, 5-39 AVR, 8-15, 8-17 Access control job (ACJ), 11-1 -B- class scheduler, 10-14 -B- Accounts account data file commands, B362LB.REL, 3-7 6-13 Backup ACTGEN program, 6-17 common policy, 7-4 creating, 6-1 console front end files, 7-10 creating the data base, 6-7 full dumps, 7-2 disabling, 6-2 system, 7-1 enabling, 6-2 system crash tape, 7-6, 7-8 errors, 6-19 tape requirements, 7-4 OPERATOR account, 6-19 BASIC.EXE, 3-7 selecting schemes, 6-3 Batch jobs setting up for shift changes, scheduling low priority to, 6-3 10-15 setting up with existing files, Batch system 6-2 tailoring, 3-29 validating, 6-19 BATCON.EXE, 3-7 ACCOUNTS-TABLE.BIN, 3-4 Beware file, 1-1 , 3-18 Bias controls, 10-15 ACJ, 11-2 Blocking factor ACJDEC program, 11-3 magnetic tape, 7-6 DISABLE command, 11-14 Boot Structure, 4-2 ENABLE/DISABLE command, 11-3, BS:, 12-17 11-5 BUGCHK, 9-14 ENABLE/DISABLE command BUGINF, 9-14 qualifiers, 11-14 BUGS.MAC, 3-4 HELP command, 11-3 BUILD.MEM, 4-20 log files, 11-21 -C- SAVE command, 11-19 -C- SET command, 11-17 SHOW command, 11-18 Cache starting, 11-2 program name, 10-17 TAKE command, 11-3 Capabilities, 5-38 USER command, 11-15 CDRIVE.EXE, 3-7 WRITE command, 11-19 CFS, 12-1 ACTGEN program, 6-17 ALLOW command, 12-5 ACTGEN.EXE, 3-7 batch jobs and, 12-8, 12-13 ACTGEN.HLP, 3-7 CFRECN BUGHLT, 12-20, 12-21 ACTSYM.UNV, 3-7 "cluster data gathering" AN-MONBIG.EXE, 3-4 (CLUDGR), 12-9 AN-MONDCN.EXE, 3-4 cluster GALAXY, 12-9 AN-MONMAX.EXE, 3-4 date/time, 12-6 ANAUNV.UNV, 3-7 DECnet and, 12-7 Index-1 CFS (Cont.) Cluster GALAXY, 3-31, 12-9 directory groups, 12-14 Cluster printers, 3-30 dismounting structures, 12-19, CMD.REL, 3-8 12-24 CMD.UNV, 3-8 DMP:, 3-23 COBDDT.HLP, 3-8 dual-ported disks, 12-5, 12-21, COBDDT.REL, 3-8 12-24 COBOL.EXE, 3-8 DUMPER, 12-20 COBOL.HLP, 3-8 ^ECEASE, 12-24 COMAND.CMD, 3-4 ENQ-DEQ, 12-8 Common File System errors, 12-21 see CFS exclusive structures, 12-18 Computer room security, 2-1 file server, 12-4 CONFIDENTIAL hardware, 12-2 capability, 5-39 IPCF, 12-8 CONFIG.CMD, 2-4, 3-3 limitations, 12-8 Console front-end files, 3-25, load balancing, 12-8, 12-13 4-2, 7-10 logical names, 12-15 CREF.EXE, 3-8 login structure, 12-16 CREF.HLP, 3-8 mail files, 12-11 -D- massbus disks, 12-4, 12-24 -D- MSCP file server, 12-4, 12-11, 12-24 DECnet, 9-17, 12-7 printers, 3-30 Cluster GALAXY, 12-10 privileged users, 12-16 DQS printers, 3-30 served disks, 12-5, 12-11, DECNET-ACCESS 12-20, 12-21, 12-24 capability, 5-39 sharing structures, 12-15 DEFAULT-EXEC:, 3-23 software, 12-6 Device names, 4-10 structure names, 12-15 DEVICE-STATUS.BIN, 3-4 system structure, 12-3, 12-18 Diagnostic link tape drives, 8-20 remote (KLINIK), 9-11 tightly-coupled systems and, DIL.LIB, 3-8 12-8 DIL.REL, 3-8 updating files, 12-11 DILV7.FOR, 3-8 user groups, 12-14 Directories usernames, 12-14 creating, 5-1 users, 12-7 creating (central control), 5-2, writing files, 12-11 5-4 CHECKD program, 4-13 creating (project and central login structure, 12-16 control), 5-3, 5-22 CHECKD.EXE, 3-4, 3-8 creating (project control), 5-2, CHECKD.HLP, 3-8 5-14 CHKPNT.EXE, 3-8 printing information about, CHKPNT.HLP, 3-8 5-40 CI protection code, 5-7, 5-26 making unavailable (non-CFS), restoring, 9-2 9-12 system, 3-1 CI (CFS), 12-3 Directory group numbers, 5-29 CI20, 12-4 Disk drives, 4-12 Class scheduler, 10-2 dual ported, 4-17 CLUDGR, 12-9 dual-ported (CFS), 12-21, 12-24 Index-2 Disk drives (Cont.) FE.EXE, 3-9 dynamic dual porting, 10-19 FE.HLP, 3-9 timeout interval, 9-13 FEDDT.EXE, 3-5, 3-9 unavailable, 9-12 FILCOM.EXE, 3-9 Disk packs FILCOM.HLP, 3-9 reinitializing, 10-18 FILDDT.EXE, 3-9 Disk space File archiving, 8-1, 8-2 allocating, 5-23 archive cycle, 8-3 determining, 4-21 recycling tapes, 8-3, 8-11 enforcing quotas, 5-24 retrieving files, 8-5, 8-7 permanent quota, 5-23 sample procedure, 8-5 working quota, 5-23 setting up system, 8-3 DITV7.FOR, 3-8 when to create tapes, 8-5 DIXV7.FOR, 3-8 File Descriptor Block (FDB), 8-4 DLUSER program, 9-10 File migration, 8-2, 8-7 DLUSER.EXE, 3-8 processing retrieval requests, DLUSER.HLP, 3-8 8-11 DMP:, 3-23, 9-15 recycling tapes, 8-11 Documents setting up system, 8-8 available from DIGITAL, 1-1 using DUMPER, 8-10 prepared at your site, 1-2 using REAPER, 8-8 Domestic structures, 4-16 File system DQS printers, 3-30 restoring, 9-9 DUMP-ON-BUGCHK, 9-14 Files DUMP.CPY, 3-4 protection code, 5-26 DUMP.EXE, 3-4 FORDDT.HLP, 3-9 0DUMP11.BIN, 3-3 FORDDT.REL, 3-9 DUMPER program, 7-1 Foreign structures, 4-16 CFS systems, 12-20 FORMAT.EXE, 3-9 file archiving, 8-3 FORMAT.HLP, 3-9 file migration, 8-10 FOROTS.EXE, 3-9 password encryption, 11-26 FORTRA.EXE, 3-9 DUMPER.EXE, 3-9 Front-end files, 3-25, 4-2, 7-10 DUMPER.HLP, 3-9 -G- DX20LD.EXE, 3-9 -G- DXMCA.ADX, 3-9 GALAXY documentation file, 3-31, -E- -E- 3-34 GALCNF, 3-9 ^ECEASE, 12-24 GALGEN.EXE, 3-9 EDDT.REL, 3-9 GLOBS.UNV, 3-10 EDIT.EXE, 3-9 GLXLIB.EXE, 3-10 EDIT.HLP, 3-9 Groups, 5-7 ENQ-DEQ directory, 5-29 capability, 5-39 user, 5-29 ERRMES.BIN, 3-4 -H- EXEC.EXE, 3-4 -H- -F- -F- HELP.HLP, 3-10 , 3-20 FAL.EXE, 3-13 HLP:, 3-22 FDB, 8-4 Home block, 4-4 Index-3 HOSTS.TXT, 3-5 LAT (Cont.) service ratings, 13-10 -I- -I- services, 13-5, 13-7, 13-10 sessions, 13-2, 13-7 IBMSPL.EXE, 3-10 slots, 13-3, 13-5 INFO.EXE, 3-10 starting and stopping service, INTERNET-ACCESS 13-5, 13-7, 13-8 capability, 5-39 users, 13-2, 13-11 INTERNET-WIZARD virtual circuit, 13-2, 13-6, capability, 5-39 13-7 INTERNET.ADDRESS, 3-5 LCPORN.REL, 3-10 INTERNET.GATEWAYS, 3-5 LCPTAB.REL, 3-10 INTERNET.NAMESERVERS, 3-5 LIBARY.EXE, 3-10 IPALOD.EXE, 3-5 LIBARY.HLP, 3-10 IPCF LIBO12.EXE, 3-10 capability, 5-39, 12-8 LIBOL.REL, 3-10 ISAM.EXE, 3-10 LINK.EXE, 3-10 ISAM.HLP, 3-10 LINK.HLP, 3-10 LISSPL.EXE, 3-10 -J- -J- Local Area Network, 13-1 Local Area Transport Jobs See LAT, 13-1 hung, 9-12 Logical names, 3-20 CFS, 12-15 -K- -K- LOGIN command, 6-19 dates/times of login, 11-30 KDDT.REL, 3-10 fast login, 11-31 KLINIK, 9-11 Login structure, 4-2, 12-16 KNILDR.EXE, 3-5, 3-10 LOGIN.CMD, 3-5 LOGOUT.CMD, 3-5 -L- -L- LP64.RAM, 3-10 LP96.RAM, 3-11 Labeled tapes, 8-13 LPTSPL.EXE, 3-11 LAT, 13-1 LPTUSR.MAC, 3-31, 3-34 circuit timer, 13-3 -M- counters, 13-13 -M- DECnet and, 13-4 DUMP-ON-BUGCHK, 9-17 MACREL.REL, 3-11 features, 13-2 MACRO.EXE, 3-11 groups, 13-6, 13-9 MACRO.HLP, 3-11 host identification, 13-6 MACSYM.UNV, 3-11 host name, 13-5 Magnetic tape, 8-1 host number, 13-5 backup requirements, 7-5 LCP commands, 13-7 blocking factor, 7-6 load balancing, 13-10 recycling, 8-11 multicast timer, 13-6 Mail, 3-24, 12-11 parameters, 13-4, 13-12 MAINTENANCE printers, 3-30 capability, 5-39 retransmit limit, 13-6 MAKDMP.EXE, 3-11 retransmit timer, 13-3, 13-7 MAKLIB.EXE, 3-11 server characteristics, 13-5, MAKLIB.HLP, 3-11 13-12 MAKRAM.EXE, 3-11 Index-4 MAKRAM.HLP, 3-11 Operator (Cont.) MAKVFU.EXE, 3-11 shared disk drive procedure, MAKVFU.HLP, 3-11 4-18 MAPPER.EXE, 3-11 shared tape drive procedure, MDDT.REL, 3-11 8-18 2060-MONBIG.EXE, 3-3 Operator shift change log, 1-9 MONITR.EXE, 3-5 Operator work request form, 1-9 2060-MONMAX.EXE, 3-3 , 3-18 MONNAM.TXT, 3-5 OPR, 9-15 MONSYM.REL, 3-12 OPR.EXE, 3-12 MONSYM.UNV, 3-12 OPR.HLP, 3-12 Mountable structure sign-up log, ORION.EXE, 3-12 1-6 OVRLAY.REL, 3-12 Mountable structures, 4-5, 9-10 -P- MOUNTR.EXE, 3-12 -P- MS.EXE, 3-11 MS.HLP, 3-11 PA1050.EXE, 3-12 MSCPAR.UNV, 3-12 Page, 4-19 Password encryption, 11-23 -N- -N- algorithms, 11-25 DUMPER program, 11-26 NEBULA.EXE, 3-12 multiple-system environment, Network Interconnect 11-25 See NI, 13-1 Password management, 5-7, 11-28 , 3-17 PAT.EXE, 3-12 , 3-17 Performance, 10-1 NEW:, 3-21 batch background, 10-15 , 3-19 bias controls, 10-15 NFT.EXE, 3-12 class scheduler, 10-2 NFT.HLP, 3-12 dynamic dual porting, 10-19 NI, 13-1 interactive versus setting unavailable, 9-12 compute-bound programs, NMLT20, 3-12 10-15 NORMAL.VFU, 3-12 program name cache, 10-17 NRT, 3-24 reinitializing disk packs, 10-18 Permanent storage, 5-23 -O- -O- PHYPAR.UNV, 3-12 PLEASE.EXE, 3-12 Offline structures, 9-12 POBOX:, 3-24, 12-11 OLD:, 3-22 Power failures, 9-11 , 3-19 Printers OPERATOR remote, 3-30 capability, 5-39 terminal, 3-34 Operator Privileges, 5-38, 12-16 accounting, 6-19 Program name cache, 10-17 alternative to PLEASE requests, PROGRAM-NAME-CACHE.TXT, 3-5 3-20 PROLOG.UNV, 3-12 archiving procedures, 8-5 PS:, 12-17 handling user requests, 2-1 PTYCON.ATO, 3-3 , 3-20 PTYCON.EXE, 3-12 scheduling tasks, 2-2 PTYCON.HLP, 3-13 Index-5 -Q- -Q- Security, 5-7, 11-1 access control job, 11-1 QUASAR.EXE, 3-13 computer room, 2-1 fast login, 11-31 -R- -R- labeled tapes, 8-16 last login information, 11-30 RA60, 4-13, 7-5 password encryption, 11-23 RA81, 4-13, 7-5 password management, 11-28 RDMAIL.EXE, 3-13 passwords vs groups, 5-7 RDMAIL.HLP, 3-13 SELOTS.EXE, 3-14 REAPER program, 8-8 SEMI-OPERATOR REAPER.CMD, 3-5 capability, 5-39 REAPER.EXE, 3-13 SERCOD.UNV, 3-14 REAPER.HLP, 3-13 SERR:, 3-22 Reinitializing disk packs, 10-18 SETSPD, 2-4 , 3-20 SETSPD.EXE, 3-3 Remote printers, 3-30 Shift change log, 1-9 characteristics, 3-33 SIX12.REL, 3-14 printer definitions, 3-32 Software REMOTE-PRINTING.CMD file, 3-32 after installation, 3-1 RERUN.EXE, 3-13 before installation, 2-1 RERUN.HLP, 3-13 checking (UETP), 3-29 RETRFB.SPE, 3-13 updating, 2-4, 3-17, 3-19 RFB.EYE, 3-13 SORT.EXE, 3-14 RMS.EXE, 3-13 SORT.HLP, 3-14 RMSCOB.EXE, 3-13 SPEAR.EXE, 3-14 RMSINI.REL, 3-13 SPOOL:, 3-25 RMSINT.R36, 3-13 , 3-18 RMSINT.UNV, 3-13 SPRINT.EXE, 3-14 RMSUTL.EXE, 3-13 SPROUT.EXE, 3-14 SPRRET.EXE, 3-14 definition, 3-2 SPRSUM.EXE, 3-14 rebuilding on system structure, Star coupler, 12-3 9-5 Structures restoring, 9-3 alias, 4-11 RP06, 4-13, 7-5 boot, 4-2 RP07, 4-13, 7-5 BS:, 12-17 RP20, 4-13, 7-5 differences between system and RSX20F, 3-25 mountable, 4-6 DUMP-ON-BUGCHK, 9-17 dismounting, 4-15 RSX20F.MAP, 3-6 dismounting (CFS), 12-19 RSXFMT.EXE, 3-13 domestic, 4-16 RSXFMT.HLP, 3-13 dumpable, 9-15 RUNOFF.EXE, 3-13 exclusive (CFS), 12-18 RUNOFF.HLP, 3-14 foreign, 4-16 increasing the size of, 4-13 login, 4-2, 12-16 -S- -S- mountable, 4-5, 4-7, 4-8 re-creating, 9-10 SCAPAR.UNV, 3-14 multiple, 4-7 SDDT.EXE, 3-14 names, 4-9, 4-11 Secure files, 11-4, 11-32 names (CFS), 12-15 Index-6 Structures (Cont.) TCX.EXE, 3-14 offline, 9-12 TCX.HLP, 3-14 PS:, 12-17 Terminal printers, 3-34 public, 4-2 Terminal server sharing among CFS systems, definition, 13-1 12-15 /TERMINAL-CHARACTERISTIC: switch, sharing between systems, 4-17 3-31, 3-34 size, 4-11 TERMINAL.HLP, 3-14 system, 4-2 TGHA.EXE, 3-6 system limit, 4-8 TGHA.HLP, 3-6 Structures > similarities between Timeout problems, 9-17 system and mountable, 4-6 TOC.EXE, 3-14 TOC.HLP, 3-14 files, 3-7 TOPS-20.DOC, 3-6 restoring, 3-16 Tuning mechanisms, 10-1 Supplies, 2-2 TV.EXE, 3-14 Swapping space, 4-19 -U- SYS:, 3-21 -U- SYSJOB.EXE, 3-3 SYSJOB.HLP, 3-6, 3-14 UDDT.EXE, 3-15 SYSJOB.RUN, 3-4 UETP, 3-29 SYSTAP.CTL, 3-14 ULIST program, 5-40 System ULIST.EXE, 3-15 problems, 9-1 ULIST.HLP, 3-15 selecting features, 2-4 User requests, 1-9, 2-1 System access request form, 1-6 User-group numbers, 5-29 System crash tape, 7-6, 7-8 Usernames System log, 1-3 assigning, 5-4, 5-8, 5-15, 5-22 System structure CFS, 12-14 backup, 4-14 -V- contents, 4-3 -V- definition, 4-2 dual porting, 12-5 VERIFY.EXE, 3-15 re-creating, 7-6, 7-8 VOLID, 8-14 rebuilding , -W- 9-5 -W- , 3-18 SYSTEM.CMD, 3-6 WATCH.EXE, 3-15 SYSTEM:, 3-21 WATCH.HLP, 3-15 WHEEL files, 3-3 capability, 5-39 restoring, 3-6 Windfall, 10-4 Work request form, 1-9 -T- -T- Working storage, 5-23 Tape drive allocation, 8-2, 8-12 -X- Tape drives -X- sharing between systems, 8-18 Tape labeling, 8-13 XPORT.REL, 3-15 TAPNAM.TXT, 3-6 XRMS.EXE, 3-15