Re: cron oddity?

2006-11-17 Thread glen herrmannsfeldt
(someone wrote, regarding different ls output)

 sudo ls   -lGgh /srv/ftp/pub
 -r--r--r--   1  14M Nov  7 16:02 GE_Mainline_Ansys ver2.ppt
 HUH?   when I do it manually the output is
 sudo ls   -lGgh /srv/ftp/pub
 -r--r--r--   1  14M 2006-11-07 16:02 GE_Mainline_Ansys ver2.ppt

As others have said, it might be an environment variable.

It is also possible that there are different versions of ls
in different directories, such as /bin/ls, /usr/bin/ls,
or even /sbin/ls or /usr/sbin/ls.  Changes to the path would
then change which one was used.

I have run into this more often with ps, where a ucb-like
ps and SysV like ps exist on the same system.

-- glen


360/30 timing

2006-11-08 Thread glen herrmannsfeldt
Jim Bohnsack wrote:

 Back around 1970 or so, I did a performance study on a S/360-30.  
 At that time, IBM published instruction times 
 somewhere--don't remember where.  But I came up with a 
 result that said that a mod 30 was an 18 kip machine.

For some reason I have the 360/30 Functional Characteristics
sitting next to my computer, instead of upstairs where it
is supposed to be.

AR22us
ADR   61us
CP45+4M us
DR413us
DDR   1619us
MVC   31+3N us
SRDA  76us
SVC   44us

18 kips would be 56us, maybe about right assuming
not too much floating point.  

-- glen


TCP ports and SMTP clients

2006-10-22 Thread glen herrmannsfeldt
Alan Ackerman [EMAIL PROTECTED] wrote:

 Usually, high port numbers are assigned to clients. 
 Clients on VM include FTP, TELNET, NFS, and 
 Charlotte (web browser).

That is usual for most TCP/IP systems.  High source ports
are assigned to any client, not just the obvious ones.

 All the more reason why they MUST get you the contents of 
 (some of) the packets. With that you might be able to identify 
 which client. Why did they think it was email, if they could 
 not see the contents of the packets?

As designed, TCP and UDP ports under 1024 are reserved, and
on most systems non-privileged users can't use them.
Other than that, there is usually no restriction on which
port numbers can be used by client or server.

Note, though, that it is easy to connect to any destination
port, with no privilege normally required.  On unix systems,
mail is usually sent directly by sendmail run by the sender.

Anyone can open a connection to port 25 and type SMTP
commands into that connection.  That is TCP/IP as designed.

-- glen


3270 data stream

2006-10-12 Thread glen herrmannsfeldt
I have scanned GC23-0059-2,  3270 Data Stream Programmers Reference,
and sent it to bitsavers.  I don't know that it is actually available yet.

I do see that Gc23-0059-7 is available from IBM in paper or electronic form.

-- glen

 


Re: block letter routine

2006-08-09 Thread glen herrmannsfeldt
The source to older versions of JES2 and JES3 are available,
at least I believe they are.  It must be in there somewhere.

-- glen


Cleaning Fluid

2006-07-21 Thread glen herrmannsfeldt
David Boyes [EMAIL PROTECTED] wrote:

 Does anyone still know of a source that sells 3420 cleaning fluid and
 supplies? In the process of working through these old tapes from
 Princeton, I'm burning through the small supply I have of the stuff
 rapidly (2 pints so far), and still have a few thousand tapes to go.=20

The popular cleaning fluids are mixtures of isopropanol and
1,1,2 Dichloro 1,2,2, Difluoro ethane, I believe called Freon TF.
I have no idea if that is what yours is, though.

Ordinary rubbing alcohol is 70% isopropanol, but many stores
(grocery stores or drug stores) also have 99% isopropanol.
If you have a near by chemistry lab you can get reagent grade,
which is probably 99.99% or so. (Not counting the water that
will get in as soon as you open the bottle.)

 The amount of oxide flaking and just general destruction these tapes
 have is amazing - gunk everywhere. Hats off to the data recovery folks -
 I'd really hate to have to do this all the time. Freeze drying, careful
 rereading, multiple retries... sheesh. Phase of the moon for some of
 these volumes.=20

Are you warming the heads?  I have heard over the years that
it the favorite way to reduce flaking.  The first time I heard
that one was an article in Popular Science about a video tape
recorder that used 0.25in tape linear recording at 120in/s.
(Many years before Beta, or even U-matic.)  Warming the heads
was necessary to prevent scraping the oxide off even of new
tapes at that speed.

There is also supposed to be a last chance system that
uses a fluid, such as cleaning fluid, on the head while
reading the tape.  As I understand it, it only
works once.  After that, the tape is ruined.  I have never
tried, or even seen this done, though.

-- glen


Token Ring vs. Ethernet

2006-06-09 Thread glen herrmannsfeldt
Rich Seifert (who worked on the original 10Mbit ethernet)
in his Gigabit Ethernet book has some explanation about this.

Token Ring requires more complicated hardware, keeping the
price higher.  The higher price reduces demand, making it harder
to reach the economy of scale point.  

There is a lot of hardware to manage tokens, create one if the
active token is lost, etc.  Also, TR has a priority system allowing
eight priority levels.  There is no system to manage or assign priority,
so everyone uses the highest priority level, making the extra hardware
useless.

There is a story about a conference where IBM announced the TR
card for the original IBM PC.  Someone asked about ethernet, and
the speaker suggested that if one found an ethernet card for
less than $200, buy it.  The next speaker was from 3com announcing
the 3C501 for $199.  (I believe I have the prices right, but it
has been some time since I first heard this.)

-- glen


Dumb IP Question

2006-05-18 Thread glen herrmannsfeldt
Tom Duerbusch [EMAIL PROTECTED] wrote:

 From my understanding, when a client connected to the server stack at a
 particular port, that port is tied up and no one else can connect to
 it.

 If I remember correctly, when you FTP to port 21, the FTP server
 responses with another port that you should use for the rest of the FTP
 session.  This keeps port 21 from being tied up during long FTP
 sessions.  Right?

As far as TCP is concerned, a connection is identified by the 
{source address, source port, destination address, destination port}
combination.  When a packet comes in, that is what is used to find
the appropriate destination.  Since TCP is a stream protocol, 
the packets are processed by TCP, retransmissions are requested,
and data is delivered only after it is back in stream format.
Boundaries between requests to TCP don't necessarily generate
separate TCP packets, and packet boundaries aren't seen on
by receiving program.

UDP usually only processes the {destination address, destination port}
combination.  Some servers will decode the source address, source
port, but it is the responsibility of the receiving program.  
Many stateless servers can handle UDP without a subtask for 
each client, just replying to each request.  Data is delivered
preserving packet boundaries.

Under unix, programs accepting a TCP connection usually fork()
to create a subtask to handle the connection.  It might be that
new requests that come in before the fork() get the busy signal.

Most print servers boxes can only handle one connection at a time,
and will refuse any additional connections.  That is not a TCP
limitation, but a higher level protocol limitation.  Sendmail, 
I believe, also refuses connections when too many are already 
open to avoid overloading the machine.

-- glen


Virtual memory implementation in S/370

2006-05-15 Thread glen herrmannsfeldt
(I wrote)

VAX uses a two level system where page tables are paged.
There is kernel space, which isn't paged and holds the first
level tables referencing pagable second level tables.

z/Archtecture has three levels.
(someone else wrote)

 Actually, z/Architecture has 5 levels. So far, 
 the existed hardware only uses 3 of them.

I thought of that right after sending it.

Above the addressing within a page, it is, more or
less, 10 bits per level.  (For S/370, one could consider
the 32 bit addressing for the 360/67, which is fairly
similar.)  

For an undergrad operating system course I did a report
comparing S/370 and VAX virtual memory systems (around the
time when VAX was new).  I remember finding more similarities
than differences, especially both using the two level system.

So for 64 bit addressing of 4K pages, (64-12)/10 is about five.
Allowing the hardware to use three until more addressing bits
are needed is a nice feature.

-- glen


Virtual memory implementation in S/370 (a.f.c x-post)

2006-05-11 Thread glen herrmannsfeldt
Marten Kemp [EMAIL PROTECTED] writes:
 The recent thread about virtual memory sparked a (kind of)
 idle question: why did the implementation in the S/370
 have a two-level scheme (segment and page)? My original
 thought was that it facilitated definition of discontiguous
 parts of an address space.

Well, mostly it is because smaller systems don't have enough
real memory to hold a one level page table.

The segment/page system allows page tables to be paged out,
with the invalid bit in the segment table.

VAX uses a two level system where page tables are paged.
There is kernel space, which isn't paged and holds the first
level tables referencing pagable second level tables.

z/Archtecture has three levels.

-- glen