.ds u \s-1UNIX\s+1 .ds m \f2U\s-1NIX\s+1 User's Manual\^\fP .ds :? Administrative Advice for UNIX .PH "''''" .OH "'\s9\f2\*(:?\fP''\\\\nP\s0'" .EH "'\s9\\\\nP''\f2\*(:?\^\fP\s0'" .tr ~ .nr Hb 3 .nr Hs 3 .nr Hu 4 .ds HF 3 3 2 3 2 .bd S 3 3 .de Ds .DS 1 .br .lg 0 \!.lg 0 .ss 20 \!.ss 20 .br .. .de Dl .DS .br .lg 0 \!.lg 0 .ss 20 \!.ss 20 .br .. .de De .br \!.ss 12 .ss 12 .lg \!.lg .br .DE .. .TL Administrative Advice for U\s-2NIX\s+2 .AU "R. C. Haight" RCH MH .MT 4 .P The material presented here is based on the author's experiences and opinions. Nevertheless, it may prove useful. The material on phototypesetting was contributed by D.~W. Smith. .H 1 "ADMINISTRATOR'S ROAD MAP" Getting started as a \s-1UNIX\s+1\(dg\s-1\s+1 .FS \(dg UNIX is a Trademark of Bell Laboratories. .FE system administrator is hard work. There are no real shortcuts to a working knowledge of the system. You will need time for reading, study and hands-on experimenting. Don't commit yourself to ``going live'' with your system until you have had two weeks to teach yourself your job, and get the initial hardware quirks ironed-out. .P Don't consign the .I "Setting Up U\s-1NIX\s+1\^" document to oblivion after your initial system ``gen''. In addition to needing it again whenever you add/change equipment, you will find that it contains valuable material about system tuning (buffers, .I clist s, etc.) that appears nowhere else. .P As an administrator, you should be familiar with a lot of the distributed documentation. The .I "Internals, Operations, and Administration\^" papers from .I "Documents for U\s-1NIX\s+1\^" should all be studied, as well as the .I Introduction , .I "How to Get Started" , and most of the entries of the \*m. In that manual, you should pay special attention to: .I acct \(**(1M), .I chmod (1), .I chown (1), .I config (1M), .I cpio (1), .I date (1), .I df (1), .I du (1), .I ed (1), .I env (1), .I find (1), .I fsck (1M), .I kill (1), .I mail (1), .I mkdir (1), .I mkfs (1M), .I ncheck (1M), .I ps (1), .I rm (1), .I rmdir (1), .I shutdown (1M), .I stty (1), .I su (1), .I sync (1M), .I time (1), .I volcopy (1M), .I wall (1M), .I who (1), and .I write (1) in Section 1; all of Section 4; .I acct (5) in Section 5; and .I crash (8) and .I vaxops (8) in Section 8. .H 1 "SYSTEM CAPACITY" The figures below are approximations based on our experience over several years: .Dl .TS center box ; ci ci ci ci ci ci l n . Number of Hardware Configuration Simultaneous Users _ PDP-11/23; 256K-byte memory; 2 RL01 disks* \04 .sp .2v PDP-11/34; 256K-byte memory with cache; ~~~~~~2 RL01 disks* \08 .sp .2v PDP-11/45; 248K-byte memory; RP03 disk* 16 .sp .2v Above with RP06 (RP04, RP05) disk* 20 .sp .2v Above with memory cache 25 .sp .2v PDP-11/70; 512K-byte memory; ~~~~~~RP06 (RP04, RP05) disks* ~~~~~~(2 or more drives) 32 .sp .2v Above with 768K-byte memory and ~~~~~~a disk drive (or fixed-head disk) ~~~~~~set aside for the root file system 40 .sp .2v VAX-11/780; 1M-byte memory; ~~~~~~at least 3 RP06 disks* 48 .TE .ti +.9i \s-1* \|Or equivalent.\s+1 .De See .I "Setting Up U\s-1NIX\s+1\^" for the list of supported hardware options. .H 1 "DISK FREE SPACE" Making files is easy under \*u. It has been said that the only standard thing about all \*u systems is the message-of-the-day telling users to clean up their files. Administratively, both free disk blocks and free inodes (\*u talk for file headers) can be a problem. If the free inode count falls below 100, the system spends most of its time rebuilding the free inode array. If a file system runs out of space, the system prints ``no-space'' messages and does little else. To avoid problems, the following start-of-day free counts should be maintained: .BL "" compact .LI The file system containing \f2/tmp\^\fP (temporary files): .br .ns .DL "" compact .LI 16-user system: 1,500 free blocks. .LI 40-user system: 3,000 free blocks. .LE .LI The file system containing \f2/usr\^\fP: .br .ns .DL "" compact .LI 3,000 to 6,000 free blocks, depending on load. .LE .LI Other user file systems: .br .ns .DL "" compact .LI 6% to 10% free, depending on user habits (3,000 blocks minimum). .LE .LE .P This brings up an associated problem: how big should file systems be? Our preference is to set aside space on each drive for a copy of root/swap and use the rest of the pack for a single file system. However, if you have user groups that fight over disk space, it may be better to split them up arbitrarily (i.e., divide a pack into more than one file system). Warning: if you set up different disk drives with differing cylinder partitions between file systems, it will probably lead to an operations goof someday. .H 1 "A VERY FEW WORDS ABOUT SYSTEM TUNING" .BL "" compact .LI As shipped, \*u has .I no\^ programs with the text-bit mode set (see .I chmod (1)). The top contenders for the .I t -bit are .I nroff\^ and .I troff\^ followed (generally) by the larger phases of the C compiler (including the assembler and loader). The .I t -bit is only meaningful with pure text programs (\c .I ld (1) options .I \-i\^ or .I \-n ). Don't overdo it, and keep .I t -bit programs in the root file system. .LI File system reorganization (described below) can help throughput, but at the expense of down time. If you do it when your users are all asleep, it can help. .LI If you use normal .I shutdown\^ and .I filesave.u\^ procedures, the file system check program (\c .I fsck (1M), .I \-S\^ option) will help keep the disk free list in reasonable order. .LI Try to keep disk drive usage balanced. If you have over 20 users, the .I root\^ file system (\c .I /bin , .I /tmp , .I /etc , and .I swap ) deserves a drive of its own. .LI If you have a noisy modem (poorly executed do-it-yourself null-modem) or a disconnected modem cable, \*u will spend a lot of \s-1CPU\s+1 time trying to get it logged in. A random check of systems uncovers a lot of this going on. .LE .H 1 "WHY YOU MUST HAVE A SPARE DISK DRIVE" .BL "" compact .LI Without a spare disk drive, the system will be .I down\^ when a drive is .I down . .LI Without a spare drive, it is difficult to reorganize file systems or to restore user files. .LE .H 1 "DISK PACKS" .BL "" compact .LI Buy only fully \s-1ECC\s+1 correctable packs and test them. .LI If a pack develops uncorrectable errors, recondition it, or get rid of it. .LE .P \s-1RP06\s+1 disk packs used with \*u need not be totally error-free, but must be ``flag-free''. The term flag-free means that there should be no unrecoverable \s-1ECC\s+1 (Error Correcting Code) errors. Technically, proper \s-1ECC\s+1 handling can recover from 11-bit error bursts. However, we hear that the length of bursts can grow as a pack ages. We recommend that no pack that has more than 8-bit error bursts be accepted. For the \s-1PDP\s+1-11, the following explanation may help (paraphrased from a \s-1DEC\s+1 source). .P In reading the formatter printout, \s-1ECC\s+1 correctable errors are identified by the headings ``\s-1DATA ERROR DURING WRITE CHECK\s+1.''\ Error-register values are printed below the message. The two registers of interest are \s-1RPER1\s+1 and \s-1RPEC2\s+1. A \s-1RPER1\s+1 value of 1000000 indicates \s-1ECC\s+1 (no other bits on). The \s-1RPEC2\s+1 register describes the bit span of the error. For example, \s-1RPEC2\s+1=003774 means that there was an unacceptable 9-bit (binary 0000011111111100) error burst; \s-1RPEC2\s+1=000240 is an acceptable 3-bit span (0000000010100000\*\-there may be zero bits mixed in). If such acceptable errors account for all ``unrecoverable'' errors reported (and there aren't too many of them), then you have a flag-free pack. .P On the \s-1VAX\s+1, even this scant information was not available, so we have written our own formatter (it tells its tale in English); see .I rp6fmt (8). We plan to make this program available in the future (along with other \*u-oriented diagnostics) for the \s-1PDP\s+1-11 as well. .H 1 "PROTECTING USER FILES" Users, especially inexperienced ones, occasionally remove their own files. Open files are sometimes lost when the system crashes. Once in a great while, an entire file system will be destroyed (picture a disk controller that goes bad and writes when it should read). Here is a suggested file backup procedure: .BL "" compact .LI Each day, copy all user file systems to backup packs. Keep these packs 3 to 5 days before re-using them. .LI Once a week, copy each file system to tape. Keep weekly tapes for 8 weeks. .LI Keep bi-monthly tapes ``forever'' (they should be re-copied once a year). .LE .P The most recent weekly tapes should be kept off premises. The other tapes should be in a fire-proof safe, if you can afford one. .P When \*u goes down, active files can get scrambled. Your users will not want to start the day over every time your system fails. In addition to good backup, you .I must\^ have file-system patching expertise available (on-site or on-call). If you ever re-boot the system for general use without checking out the file systems, terrible things will happen (we once had five duplicate entries on a file-system free list\-this ruined over 100 new files in just three days). Study .I fsck (1M) and .I crash (8), as well as .I "F\s-1SCK\s+1\-The U\s-1NIX/TS\s+1 File System Check Program" . .H 1 "UNIX FILE SYSTEM BACKUP PROGRAMS" The following backup programs are distributed: .BL "" compact .LI .I Dump/restor : This is a familiar tape-based system that has been used for several years. Full dumps are usually taken when the .I dump\^ program warns that an incremental dump will run to more than one reel. .LI .I Find/cpio : \*u is distributed in .I cpio\^ format. The .I \-cpio\^ option of the .I find\^ command has made it time-competitive with .I dump/restor . However, it does not produce a ``perfect'' restore from a full dump plus incremental dump (new and changed files are \s-1OK\s+1, but file removal information is lost). Because of this, full dumps should be taken fairly often (weekly/bi-weekly). .I Cpio\^ is the only program listed here that makes system-independent copies. It can be used to move files between various versions of \s-1UNIX/RT\s+1 and \s-1UNIX\s+1, and can be used in system conversion. .LI .I Volcopy : physical file system copying to disk or tape. For those who can afford a spare drive, .I volcopy\^ to disk provides convenient file restore and quick recovery from disk disasters (remember the spare drive). Tape .I volcopy\^ provides good long-term backup because the file system can be read-in fairly quickly, mounted, and browsed over. Disk and tape .I volcopy\^ are generally used together for short- and long-term backup. .I Volcopy\^ can also be used for full dumps with either .I dump/restor\^ or .I cpio/find . .LE .P The table below summarizes attributes of these programs. The file system size is 65,500 blocks in all cases; times are in minutes; judgements are subjective. .Dl .TS center box ; cI cI cI cI cI l c c c c . dump/restor find/cpio volcopy (disk) volcopy (tape) _ Full dump time 40 40 2 15 Incremental dump time 6 7 \- \- Full restore time 40(?) 80 2 15 Incremental restore time 8 10 \- \- Ease of restoring: ~~~~~~one file fair fair good fair ~~~~~~a directory poor fair good good ~~~~~~scattered files poor poor good good ~~~~~~full restore fair fair very good good Needs tape drive yes yes no yes Needs spare file system ~~~~~~(only when restoring) no no \- yes Needs spare disk drive ~~~~~~(two \s-1CPU\s+1s can share) \- \- yes \- Maintains pack/tape labels no no yes yes Handles multi-reel tape yes yes \- yes 512 blocks per record 1,10 1,10 88 10 Interactive ~~~~~~(i.e., ties up console) no(?) yes yes yes May require separate ~~~~~~I\/D space no no no* no .TE .ti +0.2i \s-1* \|Blocks per record are cut to 22 without separate I/D space.\s+1 .De .P We strongly recommend the spare disk drive: as explained in Section~5 above, the speed and convenience of .I volcopy\^ are by no means the only advantage of a spare drive. .H 1 "CONTROLLING DISK USAGE" If your \*u system is a success, you will soon run out of disk space: .BL "" compact .LI During the considerable delay before you can get more drives, you will need to control usage: .br .ns .DL "" compact .LI Try to maintain the start-of-day counts recommended above. Watch usage during the day by executing the .I df\^ command regularly. .LI The .I du (1) command should be executed (after hours) regularly (e.g., daily) and the output kept (in an accessible file) for later comparison. In this way you can spot users who are rapidly increasing their disk usage. .LI The .I find (1) can be used to locate inactive (or large) files. Example: .Ds find / \-mtime +90 \-atime +90 \-print >somefile .De records in ``somefile'' the names of files neither written nor accessed in the last 90 days. Of course, this works best if you are super-user. .LE .LI You will also have to balance usage between file systems. To do this you will have to move user directories. Users should be taught to accept file system name changes (and to program around them\-preferably ahead of time). The user's login directory name (available in the shell variable \s-1\f2HOME\^\fP\s+1) should be utilized to minimize path name dependencies. User groups with more extensive file system structures should set up a shell variable to refer to the file system name (e.g.: \s-1\f2FS\^\fP\s+1). .LI The .I find (1) and .I cpio (1) commands can be used to move user directories and to manipulate the file system tree. The following sequence is useful (it moves, via magnetic tape, the directory trees .I userx\^ and .I usery\^ from file system .I filesys1\^ to file system .I filesys2\^ where, presumably, more space is available): .Ds cd /filesys1 find userx usery \-cpio /dev/rmt0 cd /filesys2 mkdir userx usery chown userx userx chown usery usery cpio \-idmB </dev/rmt0 #~~~Make sure new copy is \s-1OK\s+1 #~~~Change userx and usery login directories in the /etc/passwd file rm \-rf /filesys1/userx /filesys1/usery .De When moving more than one user in this way: .br .ns .DL "" compact .LI Keep users with common interests in the same file system (they may have linked files). .LI Move groups of users who may have linked files with a single .I cpio\^ (otherwise linked files will be unlinked and duplicated). .LE .LE .H 1 "REORGANIZING FILE SYSTEMS" The procedure for moving users described above can be expanded to provide a way to reorganize whole file systems. Reorganization can improve system response time. This is particularly true of the .I root\^ file system (which must be reorganized with all other file systems unmounted) and .I /usr . Unfortunately, reorganization of large file systems is slow. .H 1 "KEEPING DIRECTORY FILES SMALL" Directories larger than 5K bytes (320 entries) are very inefficient because of file system indirection. A \*u user once complained that it took the system ten minutes to complete the login process; it turned out that his login directory was 25K bytes long, and the login program spent that time fruitlessly looking for a non-existent \f3.\fP\f2profile\^\fP file. A large .I /usr/mail\^ or .I /usr/spool/uucp\^ directory can also really slow the system down. The following will ferret out such directories: .Ds find / \-type d \-size +10 \-print .De .P Removing files from directories does not make the directories get smaller (the empty directory entries are available for reuse). The following will ``compact'' \f2/usr/mail\^\fP (or any other directory): .Ds mv /usr/mail /usr/omail mkdir /usr/mail chmod 777 /usr/mail cd /usr/omail find \f3.\fP \-print \(bv cpio \-plm \f3.\|.\|\fP/mail cd \f3.\|.\fP rm \-rf omail .De .H 1 "ADMINISTRATIVE USE OF ``CRON''" The program .I cron (1M) is useful in the administration of the system; it can be used to: .BL "" compact .LI Turn off the programs in directory \f2/usr/games\^\fP during prime time. .LI Run programs off-hours: .br .ns .DL "" compact .LI accounting; .LI file system administration; .LI long-running, user-written shell procedures (using the .I su (1) command), for example: .Ds su \- userx userx_shell arg \f3.\|.\|.\fP .De .LE .LE .H 1 "WATCH OUT FOR FILES AND DIRECTORIES THAT GROW" .BL "" compact .LI Accounting files: .br .ns .DL "" compact .LI .I /usr/adm/wtmp "\*\-login information;" .LI .I /usr/adm/pacct "\*\-process accounting; gets big quickly." .LE .LI Other files: .br .ns .DL "" compact .LI .I /usr/lib/cronlog "\*\-status log of commands executed by \f2cron\^\fP(1M);" .LI .I /usr/spool \*\-spooling directory for line printers, .I uucp (1C), etc., and whose sub-directories should be compacted as described above. .LE .LE .H 1 "ALLOCATING RESOURCES TO USERS" A prospective user should obtain connect-time and file-space authorization through appropriate channels. Once this is done, the user should apply for a login by providing the following information to the ``system administrator'': .BL "" compact .LI User's name. .LI Suggested login name (not more than 8 characters, beginning with a lower-case letter). .LI Relationships to other users (this influences the choice of the file system). .LI Estimate of required file space (this also influences the choice of the file system). .LE .P Users should be forced to have passwords (not more than 8 characters long, but more than 5, and .I not\^ in Webster's Unabridged); .I passwd (5) explains how to do that. .H 1 "THE MATTER OF ACCOUNTING AND USAGE" You should run the accounting programs even if you do not ``bill'' for service. Otherwise, your users' habits (especially .I bad\^ habits) will be a mystery to you. Accounting information can also help you find performance bottlenecks, unused logins, bad phone lines, etc. .H 1 "DIAL LINE UTILIZATION" If prime-time dial line utilization gets much over 70%, users will start to encounter busy signals when dialing in. This, in turn, will lead to ``line hogging''. The only solutions are to get a larger (another) machine, or to get rid of users. Manual policing will help some, but ``automatic'' policing will be \f2invariably\^\fP subverted by users. .H 1 "``BIRD-DOGGING''" When the system is busy (lines busy and/or slow response), someone should determine why this is so. The .I who (1) command lists the people logged in. The .I ps (1) command shows what they are doing. (The .I /etc/whodo\^ command combines the output of .I who\^ and .I ps .)~ Unfortunately, .I ps\^ operates from heuristics that can consistently fail to report certain processes in a busy system. That is, one must be careful about hanging up an apparently inactive line. The .I acctcom (1M) command can read the shell accounting file \f2/usr/adm/pacct\^\fP backwards from the most recent entry. It will print entries for selected lines or login names. .H 1 "300/1,200-BAUD TERMINALS" Don't use upper-case-only terminals. Get full-duplex, full-\s-1ASCII\s+1 terminals. Hardware horizontal tabbing is very desirable, because it increases output speed and lowers system overhead. A fair proportion of your terminals should provide for correspondence-quality hard-copy output to take advantage of the \*u word-processing capabilities; see .I term (7). .H 1 "LINE PRINTERS" Most line printers are troublesome and impose considerable overhead on the system. Most also lack hardware tabs, character overstrike capability, etc. A printer that will work over an asynchronous link (DC1/DC3 protocol required) may be the best bet. .H 1 "SECURITY" The current \*u is not tamper-proof. You can't keep people from ``breaking'' the system, but you can usually detect that they have done so. The following command will mail (to root) a list of all ``set user~\s-1ID\s+1'' programs owned by .I root\^ (super-user): .Ds find / \-user root \-perm \-4100 \-exec ls \-l {\|} \e\f3;\fP \(bv mail root .De .P Any surprises in .I root 's mail should be investigated. Related advice: .BL "" compact .LI Change the super-user password regularly. Don't pick obvious passwords (choose 6-to-8 character nonsense strings that combine alphabetics with digits or special characters). .LI If you have dial ports and do not .I require\^ passwords, you are courting trouble. .LI The \f2chroot\^\fP(1M) ans \f2su\^\fP(1) commands are inherently dangerous, as are .I group\^ passwords; consider removing them from ``production'' systems. .LI Login directories, \&\f3.\fP\f2profile\^\fP files, and files in .I /bin , .I /usr/bin , .I /lbin , and .I /etc\^ that are writable by others than their respective owners are security weak spots; police your system regularly against them. .LI Remember, no time-sharing system with dial ports is really secure. Don't keep top-secret stuff on the system. .LE .H 1 "COMMUNICATING WITH YOUR USERS" The directory .I /usr/news\^ and the .I news (1) command are provided as a way to get .I brief\^ announcements to your users. More pressing items (one-liners) can be entered in the .I /etc/motd\^ (message of the day) file; .I motd\^ and (new to the user) .I news\^ are announced at login time. .P To reach users who are already logged in, use the .I wall (1M) (write all) command. Don't use .I wall\^ while logged-in as super-user, except in emergencies. .P The .I /usr/news\^ directory should be cleaned out every few weeks so that nothing older than, say, three months is ever found there. The .I motd\^ file should be cleaned out daily. .P We have found that, on most systems, a file in .I /usr/news\^ will reach 50% of the users within a day and over 80% of the users within a week. .H 1 "TROUBLESHOOTING" It would be easy to write a book on this topic. The following are some of the key items: .AL a .LI Dealing with the hardware service contractor: .BL "" compact .LI Before you take out a hardware service contract (with \s-1DEC\s+1 or with someone else), be sure that the contractor agrees to get along with the \*u software (``It's the hardware,'' says you; ``It's the software,'' says the hardware service contractor). .LI Keep on top of problems. For instance, \s-1DEC\s+1 has a problem-aging priority scheme. Find out about any such scheme that your contractor may have, and make them prove that it is being followed. Remember that an unreported problem is getting no priority at all. If a problem persists, escalate it up your contractor's local management chain; it may also be effective to complain to your contractor's sales representative. .LI If you are serious about service to your users, you should have an extended-period service contract (e.g., 16 hours/day, 6 days/week). Arrange for preventive maintenance, non-critical repair, and add-on installation work to be done before or after prime time. .LI If you have a service contract, learn the details. In particular, make sure that preventive maintenance is scheduled in advance and that it is completed. .LI Ask the hardware service contractor to provide and maintain a ``site log''. You will have to work on the log, as well. .LI Make sure that your hardware vendor (as well as your hardware service contractor, if the two are different) agrees to the presence of non-\s-1DEC\s+1 equipment on your system (even if you have none to start with). .LI Run error logging. Keep console sheets. Make sure error messages are shown to your contractor's Customer Engineers. .LI Take core dumps after system crashes and interpret results for Customer Engineers. .LI Keep down-time records and make sure that your hardware service contractor knows about them. .LE .LI Dealing with the telephone services vendor: .P You are most apt to have telephone problems when you rearrange or add equipment. You may also have occasional central office, trunking, and modem failures: .BL "" compact .LI Be specific with repair operators: tell them that the trouble involves .I data\^ equipment. .LI If your first call fails to get results, ask for the ``supervisor'' on the second call, and, if necessary, escalate further to get the problem solved. .LE .LI Some obvious problem areas: .BL "" compact .LI Disk Drives\-Over 50% of your problems are likely to be related to the disk subsystem. As mentioned earlier, the way to keep your system .I up\^ is to have a spare disk drive. Remember: .br .ns .DL "" compact .LI Preventive maintenance of disk drives is very important. .LI Make sure that the Customer Engineers who service your hardware see the error-logging printouts and console error messages produced by \*u (and that they understand them). .LI Disk failure can ruin a \*u file system. The .I only\^ defense is to make a complete, daily file backup! (See \f2Protecting User Files\^\fP above.) .LI Many administrators believe the the \s-1RP04\s+1 disk drives fail more often than \s-1RP06\s+1s and take longer to fix. .LE .LI Dial Ports\-In this area, as well as in the area of synchronous data interfaces, there is room for finger-pointing among all your vendors. Check for obvious things: .br .ns .DL "" compact .LI Is the system in ``multi-user'' mode? .LI Is the \f2/etc/inittab\^\fP file \s-1OK\s+1? .LI Are any cables loose (\f2both\^\fP ends)? .LI In some telephone offices, trunk-hunting is based on 10-number groups. Hunting \f2between\^\fP such groups can fail independently of anything else. .LE The possibilities for trouble are many. The ``decision table'' below attempts to describe some alternatives; it is meant primarily for users of \s-1DH11/DZ11\s+1 asynchronous devices. If you are unfamiliar with the format, (vertical) Rule 3 reads: ``If line rings \f2and\^\fP ring light shows \f2and\^\fP computer does \f2not\^\fP answer \f2and\^\fP switching the modem solves the problem, then it is likely to be a telephone company problem; also, busy out that line.'' .LI Early experience with the \s-1DZ11\s+1 has been poor. Several different problems have cropped up including bad line units and a stuck interrupt bit that crashes the system. Don't install \s-1DZ\s+1s without giving them the full diagnostic treatment. .LI Synchronous Ports\-High-speed synchronous interface devices are even more trouble than dial equipment. The following is a list of potential trouble spots: .br .ns .DL "" compact .LI Your \*u software. .LI Your interface device (e.g., \s-1DQS11B\s+1). .LI Cable to your modem. .LI Your modem. .LI The communications line. .LI Other modem. .LI Other cable. .LI Other interface device. .LI Other system's software. .LE Think of the finger-pointing possibilities. The best defense is a good line monitor. .LI Power Supply Modules\-There are a lot of them, and they do fail, more or less regularly. Hard failure can be detected at the console; voltage drift is tougher. Failure of the \s-1FP11\s+1 (floating-point unit) power supply can be slow to fix, because Customer Engineers are likely to work back from the far end of the ``bus'', taking a long time to find the problem. .LE .LE .Dl .TS center box ; cI s s s s s s s s s s rBp-2 c1 c1 c1 c1 c1 c1 c1 c1 c1 c1 cBp-2 c1 c1 c1 c1 c1 c1 c1 c1 c1 c1 r c1 c1 c1 c1 c1 c1 c1 c1 c1 c1 . Asynchronous Line Problems Rules:\^ 1 2 3 4 5 6 7 8 9 0 _ Condition: Line rings N Y Y Y Y Y Y Y Y Y Ring light shows on telephone console \- N Y Y Y Y Y Y Y Y Computer answers \- \- N N Y Y Y Y Y Y Login message received on terminal \- \- \- \- N N Y Y Y Y Switching modem solves problem \- \- Y N Y N \- \- \- \- User can login \- \- \- \- \- \- N N N Y Telephone console shows data received \- \- \- \- \- \- Y Y N \- Problem affects whole \s-1DH/DZ\s+1 (up to 16 lines) \- \- \- \- \- \- Y N \- \- _ .T& cBp-2 c1 c1 c1 c1 c1 c1 c1 c1 c1 c1 r c1 c1 c1 c1 c1 c1 c1 c1 c1 c1 . Diagnosis and/or Action: No problem \- \- \- \- \- \- \- \- \- X PDP-11 hardware problem likely \- \- \- X \- X X \- \- \- Telephone problem likely X X X \- X \- \- \- X \- May be a problem with user's terminal \- \- \- \- \- \- \- X \- \- Busy out bad line(s) X X X X X X X \- X \- .TE .De .H 1 "DATASET OPTIONS" The following dataset options seem to work with \*u: .Ds The 801C-L1 (Auto-Call Unit): .in +\n(Sin Jumpers: .in +\n(Sin \f2E2\^\fP to \f2E3\^\fP \f2E6\^\fP to \f2E5\^\fP .in -\n(Sin*2u .De .Ds .in +\n(Sin Options: .in +\n(Sin Y, X, T, B, ZG, ZP, G, R, ZT .in -\n(Sin*2u .De .Ds .in +\n(Sin Switches (0 = open, 1= closed, i.e., side next to number is down): .in +\n(Sin \f2S1\^\fP = 1000[1] (Bracketed switches are missing on some models.) \f2S2\^\fP = 0101 \f2S3\^\fP = 11010 \f2S4\^\fP = 11[00] .in -\n(Sin*2u .De .Ds The 212A-L1 (1,200-baud full-duplex): .in +\n(Sin Options: .in +\n(Sin E, ZF, YF, YC, YG, YJ, YK, S, V, A, T, ZH, W, YP, YR .in -\n(Sin*2u .De .Ds .in +\n(Sin Switches: .in +\n(Sin \f2S1\^\fP = [0]001 \f2S2\^\fP = 110001000 \f2S3\^\fP = 11110000 \f2S5\^\fP = 00 .in -\n(Sin*2u .De .H 1 "NULL MODEM WIRING" Improperly wired null modems can cause spurious interrupts, especially at higher baud rates. A single bad modem on a 9,600-baud line can waste 15% of your \s-1CPU\s+1 power. The following (symmetrical) wiring plan will prevent such problems: .Ds pin 1 to 1 pin 2 to 3 pin 3 to 2 strap pin 4 to 5 in the same plug pin 6 to 20 pin 7 to 7 pin 8 to 20 pin 20 to 6 and 8 ground unused pins .De .H 1 "113D, 103J DATA SET PROBLEMS" The \s-1DH11\s+1 and \s-1DJ11\s+1 multiplexers normally have a jumper connecting pin 25 to pin 4 (request to send), thus asserting pin 25 when the line is opened. This jumper should be removed for any lines connected to 113Ds or 103Js (also applies to 103Js with 801s). '\" .H 1 "OPTIONAL HARDWARE MODIFICATIONS FOR DQS11B" '\" .BL "" compact '\" .LI '\" To change the 6-second time-out to 12 seconds: '\" ``Replace R4-M8506 module with 47k ohms.'' '\" .LI '\" To use the \s-1DQS11B\s+1 with an \s-1ACU\s+1 '\" (bit 8 of \s-1CSR\s+1 resets \f2data terminal ready\^\fP): '\" ``In module M8506, add E1605 to E1613, and E1614 to BS1 '\" (location E16 on module layout; '\" F16 on prints). '\" On back-plane, delete D3K1 to D4P2, and D4P2 to D3U1; '\" add D3U1 to D3K1, and D2S1 to D4P2.'' '\" .LE .H 1 "PHOTOTYPESETTING EQUIPMENT AND SUPPLIES" Read this section if you plan to use the phototypesetting software of \*u. .HU "Phototypesetter." The phototypesetter and fonts currently supported by \*u are manufactured by: .Ds .ta 2i Wang Graphic Systems, Inc. Executive Drive Hudson, \s-1NH\s+1 03051 (603-889-8550) .De .P The phototypesetter is an on-line \s-1C/A/T\s+1 System 1 with a high-speed turret. The external paper tape reader on the typesetter is not needed, because the typesetter is connected to the \s-1PDP-11\s+1 \s-1CPU\s+1 via a \s-1DR11C\s+1. .P .HU "PDP 11/45 Only." The following modification (developed by \s-1DEC\s+1 Field Service) should be made to the \s-1DR11C\s+1 (without this modification, the system may crash when the typesetter is powered down): ``Add two 390-ohm resistors\-from E-18 pin 6 to ground, and from E-18 pin 3 to ground. Put a piece of insulating tubing over the leads so that they do not short out the `etch' runs that they cross.'' .HU "Fonts." There are eight fonts that are normally used, as shown in the table below. The first three of the these provide the most-often used (serif) typeface. The last three are used when a sans-serif typeface is desired. The fourth font contains a number of Greek characters and mathematical symbols; see \f2N\s-1ROFF\s+1/T\s-1ROFF\s+1 User's Manual\^\fP by J.~F. Ossanna. The fifth font is useful for typesetting text that you wish to look like terminal or printer output, e.g., for examples of programs. Wang Graphic Systems, Inc. offers a variety of other fonts. For .I troff\^ to be able to use these fonts, corresponding font tables must be built and compiled into the directory \f2/usr/lib/font\^\fP. .Dl .TS center box ; li ci li l l c . Name Part Number Troff Name _ BT Times Roman 802-016A R Times Italic 802-013A I Times Bold 802-014A B BT PI Font #4 Special Characters 829-021B S BT PI Font #6 Constant Width 829-046A CW Geneva (Helvetica) Regular 803-032B G or H Geneva (Helvetica) Regular Italic 803-033B GI or HI Geneva (Helvetica) Medium 803-034B GM or HM .TE .De .P Other fonts for which the source font tables are supplied are: .Dl .TS center box ; ci ci l c . Name Troff Name _ Boston Condensed BC News Condensed C Century Schoolbook Expanded CE Century Schoolbook Italic CI Century Bold Italic CK Century Schoolbook CS Futura (Utica) Demibold FD or UD Text Greek GR Geneva Light L Geneva Light Italic LI Palatino PA Palatino Bold PB Palatino Italic PI Stymie Bold SB Stymie Medium Italic SI Stymie Medium SM .TE .De .HU "Paper and Chemicals." The phototypesetter ``prints'' onto photo-mechanical paper, which can be obtained from a photographic supply house and is specified as: .BL "" compact .LI Kodak Ektamatic Paper, Grade S, Type 2250, 8 in.\(mu150 ft., Spec. 175 (or equivalent). .LE .P Also obtainable from such a supply house are the chemicals for the developing process: .BL "" compact .ta 2.3i .LI Kodak Ektamatic A10 Activator (or equivalent). .LI Kodak Ektamatic S40 Stabilizer (or equivalent). .LE .P These chemicals should be ordered in 9.5-liter (2.5-gallon) containers for the circulator. .HU "Developer." A Kodak Ektamatic Processor Model 214K (or equivalent) is used to process the paper from the typesetter. A light-proof box attached to the 214K (to hold the output cassette from the typesetter) is called an ``Autofeeder'' and can be obtained from: .Ds .ta 2i Peripheral Graphics, Inc. Andover Industrial Center York Street Andover, \s-1MA\s+1 01810 (617-475-9005) .De .HU "Circulator and Dryer." A circulator and a paper dryer, as well as a shelf for the dryer can be obtained from: .Ds .ta 2i Mohr Enterprises 8015 North Ridgeway Ave. Skokie, \s-1IL\s+1 60076 (312-674-8890) .De The needed parts are: .BL "" compact .LI \s-1ME\s+1-8 Mohrflow: circulator to increase the usability of the chemicals. .LI \s-1ME\s+1-5 Mohrdry: dryer for the photo-mechanical paper. .LI Dryer Extension: shelf to support the dryer; it connects to the circulator cabinet. .LE .P Also obtainable from Mohr Enterprises are cleaners for the developer and circulator. Such cleaning is needed every 2 to 4 weeks, depending on the volume of work: .BL "" compact .LI R-53 Mohrchem Activator Cleaner Concentrate. .LI R-57 Mohrchem Stabilizer Cleaner Concentrate. .LE .P Each quart bottle makes 9.5 liters (2.5 gallons) of reusable cleaner to clean the tubing, rollers, and tray of the developer and circulator. Equivalent cleaners can also be obtained elsewhere. .sp .I "June 1980"