Home

o - Textfiles

image

Contents

1. depress sense switch 1 for type out This message means that the input from the tape can be monitored as it comes in Monitoring is initiated by depressing the sense switch Raising the switch at any point simply shuts off the type out and has no effect on the way the program runs A virgin copy of PAT is available in case it should be expedient to make a fresh start with an uncluttered symbol table This clean version is read only in the sense that it cannot be saved in the way that the working version can To call in the fresh version of PAT get PEST in the control mode and type ina P Pest will indicate that the read only version has been requested by typing requested From this point on the regular procedures apply EDITOR Input to PAT If an e is typed PAT will be initialized to expect input from the EDITOR see EDITOR Output for PAT Processing The program acknowledges ne selection by typing editor input The message depress sense switch 1 for type out reminds the user that the input from the edited file can be monitored as it comes in by depressing sense switch 1 Raising the switch at any subse quent time simply shuts off the type out and has no further effect on the running of the program Input Independent PAT PEST Conventions Because PAT requires a name for each program it assembles it requests please type a three character identifying
2. gives the user the choice of printing the PAT symbol table in whole or in part or by typing a character other than an or a of bypassing this operation altogether only difference between the entire and the partial symbol table listing is that the null tail and the symbols with this tailing are elided If the SOM key is pressed while the symbols under a particular tail are being typed out the remainder of the symbols under this tail will not be typed out Instead the next tail in sequence will be announced and the symbols associated with it will be listed Thus by judicious use of the SOM key any selected portion of the symbol table can be listed Preserving the Symbol Table PEST preserves the PAT symbol table by copying the entire PAT pro gram back on drum overlaying the previous version The message save this version of PAT type announces that the decision whether or not to save the version of PAT currently in core must be made The first set of symbols to be typed consists of those with no tail the null tail remaining tails appear in alphabetical order i e a a a b a b c b b a Symbols with the same tail are also listed in alphabetical order 12 Any character other than a y will transfer control back to PEST leaving the old version of PAT unchanged If the new version is saved control is handed back to PEST after PAT has been saved LOADING
3. LOADING CODE FOR EXECUTION OR DEBUGGING DEBUG Space Requirements for DB DEBUGI1 To Call DEBUGI Use of DEBUGI Space Requirements for DEBUGI TERMINATE APPENDIXI MAGNETIC TAPE DATA INPUT APPENDIX II CORE MAP FOR PEST SYSTEM APPENDIX PHOENIX SUPPLEMENTARY OPCODES APPENDIX IV REPRESENTATION OF ICS 1 CHARACTERS APPENDIX V DRUM MAP REFERENCES Page oo oo N AR to SECTION I INTRODUCTION PEST PAT EDITOR SYSTEM TENTATIVE is a program which puts at the user s disposal the tools necessary to assemble and run a program on the PHOENIX computer PEST is an interim non time sharing monitor which will be used until the time sharing MONITOR is operational Under PEST control a programmer may use PAT the macro assembler the EDITOR and two debugging programs DEBUG and DEBUGI1 SECTION II DISCUSSION LOADING PEST FROM TAPE To load PEST into the machine perform the following operations 1 2 3 4 5 6 7 Mount a PEST system tape preferably with the protect ring removed on one of the tape drives Set tape drive selector to logical At this point the tape should be at load point LOAD switch light on and the READY switch should be lighted At the console with the CPU SINGLE INSTRUCTION switch down press the MASTER RESET button Figure 1 Press the LD FROM button A short bootstrap loader will be automatically loaded Push th
4. PROCEDURE A The system will accept card images on magnetic tape at two different points PEST will accept a tape containing up to four files which are for warded to the EDITOR The four files will be arbitrarily labeled by the EDITOR as FILEA FILEB FILEC and FILED Such a tape can be ob tained by following Procedure B below PAT will accept a tape containing one file which must be in a different format from those for the EDITOR The tape is prepared by following procedures B and C below The PHOENIX ICS character codes and combinations of card code characters used to represent them are shown in Appendix IV PROCEDURE B Submit a reel of tape and a deck of cards to the 7 3 facility and request a PRESTO run If an unlabeled tape is used the first card in the deck must be a card with CTL NOLABEL it with the C in column 6 and the N in column 1f A tape file is defined to be a sequence of card images delimited by an end of file mark An end of file mark can be requested by inserting at the appropriate place in the deck two control cards viz 1 a card with 4 5 6 7 8 and 9 punched in column 1 followed immediately by 19 2 a card with CTL FILE where the is in column 6 and the F is in column 19 No control cards are needed at the end of the deck After the last card two end of file marks are automatically written on the tape The tape when it comes back will have one 2
5. 120 1160 021 H h 061 N N 121 161 022 I i 062 0 O 122 162 023 J j 063 P P 123 163 024 K k 064 Q Q 124 9Q 2 164 025 L 1 065 R R 125 1165 026 M m 066 5 S 126 8 166 027 N n 067 T T 227 _ 167 9S space 030 o 070 0 130 170 tab 031 P p 071 V V 131 171 B backspace 032 Q 072 W W 132 172 8X index 033 R r 073 X 133 173 earriage return 034 S 6 074 Y Y 134 174 partial message 035 T t 075 Z 2 1135 175 end message U null V delete H R Hollerith Representation For example the sequence 2 51 A Q must be represented on an IBM card by 2 5 fASAS QS 24 APPENDIX V DRUM MAP Field octal 0 PEST 1 2 inclusive EDITOR files 21 3g EDITOR 31 40 PAT 51 52 PAT files 53 54 Code loader DB DB1 99 75 EDITOR PAT interface 76 193 Code storage 25 REFERENCES 1 Isquith User s Manual for the EDITOR The MITRE Corporation Bedford Massachusetts MTR 222 27 June 1966 U E M ben Aaron PAT User s Manual The MITRE Corporation Bedford Massachusetts MTR 220 U 8 The MITRE Corporation Reference Manual for the PHOENIX Digital Computer TM 3870 Bedford Massachusetts 15 Nov 1963 U 4 M ben Aaron User s Guide to Symbolic Debugging on the PHOENIX Computer The MITRE Corporation Bedford Massachusetts 5 The MITRE Corporation 7038 Facility Manual Second Edition 0 Bedford Massachus
6. Each program should have a unique name Once this name has been entered the PAT program proper takes over If the input is from the typewriter the input status light Figure 2 will be energized indicating that PAT is waiting for input from the keyboard If input is from magnetic tape or the EDITOR the input will be automatically read in from the appropriate source 2 From this point on the PAT ground rules apply The Aftermath After PAT has successfully processed the source program it will give the user the following options in the order described Typing a Listing The message a listing of the output code type a y please gives the programmer the choice of having the output code listed Any character other than a y will suppress the listing Saving the Output Code The output code if any can be saved on drum for subsequent execution under the control of the PEST program It will be accessible through the three character name given to it at the start of the PAT run 10 skay XINJOHd 77 910614 135 501015 80983 1NdNI SNVUI 7 91 6 v 11 The message a y to save this code for running will indicate that the time to make the choice has come Any character other than a y will cause the output code to be discarded Typing the Symbol Table The message symbol table printout e entire partial
7. Legitimate Control Characters Table I lists the legitimate control characters and describes their actions Illegitimate Control Characters An attempt to type in a character not enumerated in the above table will cause the message Table I Legitimate Control Characters loads code for execution bringe in brings in EDITOR loads EDITOR files from magnetic tape brings in working copy PAT 8 brings fresh read only version of PAT s mer illegal command to be typed out This is followed by a return to the start of the program FILES FROM TAPE Data can be entered into the EDITOR files from a suitably prepared tape Appendix I PEST will normally load only four files from the tape If there are more than four files on the tape PEST will complain too many files on tape only 4 loaded and control will be handed back to PEST At this point the tape will be posi tioned just beyond an end of file mark and be well placed for reading further files from tape The PEST command which initiates the action of loading files from tape is the typing of an f The response is files to be prepared from tape please mount protected source tape on tape drive please type a y when ready If any character other than a y is typed in PEST will loop back and try the last two messages again When a y is typed in PEST will load the tape
8. WORD ARGUMENT OPERATION PUT AC IN RTH REGSTR 22 PHOENIX SUPPLEMENTARY OPCODES Cont d RESET SAB SETACBIT SKP SLEZ SKPOC SKPI SKPSSW SGZ SMA SNA SNLZ SNOV SNPZA SNZ SNZA SPA SPZA STASH R SZA SZB TBL WRD XAB RESET SET TO ZERO THE SWITCH SKIP IF AC BIT IS 1 SET AC BIT TO 1 SKIP LOCATIONS SKIP IF AC LE PLUS ZERO NR MASKED TO AC SKIP IF PUP OP COMP SKIP IF PUP IDLE SKIP ON SENSE SWITCH 1 2 3 SKIP IF GR PLUS ZERO SKIP MINUS AC SKIP NEGATIVE AC SKIP IF AC NOT LESS ZERO ARITHMETIC SKIP IF NO OVERFLOW SKIP IF NOT PLUS ZERO AC SKIP IF NON ZERO ARITHMETIC AC SKIP IF NON ZERO AC ARITHMETIC SKIP IF POSITIVE AC SKIP IF PLUS ZERO AC STASH AC IN LIVE REGISTER R SKIP IF AC IS ZERO ARITHMETIC SKIP IF ZERO ARITHMETIC BR ADDRESS FIELD BITS 7 FIELD ONE FULL WORD ARGUMENT EXCHANGE AC AND BR The R refers to the registers in Table 9 46 3 of Reference 1 23 APPENDIX IV REPRESENTATION OF ICS 1 CHARACTERS ICS Octal 002 2 003 3 3 004 4 4 A 005 5 5 B 006 6 6 C 007 7 7 D 010 8 8 050 E E 110 501 lt 150 011 9 9 051 F F 11 G gt 151 012 052 G G 112 152 013 b 053 H H 113 153 014 C c 054 I I 114 154 015 D d 055 J J 115 1 1155 016 E 056 116 6 1 1156 017 f 057 L L 117 9 MUST 020 G g 060 M M
9. a D brings in dbl a d brings in db If the symbolic input to PAT ended with an end statement is the address named in the end statement If no end statement was included wil be g In this case as in the case where the starting location was intended to be control will not be transferred and PEST will keep typing the same message asking for an x a D or a d even if an x is typed in In short control cannot be transferred to location f directly If the user really wants to start a program at f it must be done under control of one of its debugging programs It should be remembered that locations f through 3 7 are used by the trap instructions and interrupts If any character other than an x d or D is typed in PEST expects that more code is to be loaded so it cycles back and types please type in name of program to be loaded again and the sequence repeats itself A program to be executed under control of either of the debugging programs must not overlap that program in core of course Appendix II 14 DEBUG DEBUG or DB is a debugging program which provides minimal 4 capabilities for debugging a program on the PHOENIX computer It requires a relatively small amount of core storage To call DBZ the command d is typed in The system responds debugf requested The typewriter subroutines must be initialized by the SOM key The user may wish to retur
10. onto drum and build a drum list to hand down to the EDITOR The successful completion of the operation will be signalled by the message files from tape successfully loaded Before these files can be used with the EDITOR the EDITOR must be reinitialized by using its reinitialize command THE EDITOR UNDER PEST CONTROL When PEST is in the control mode and an is typed in the program responds by typing out the rest of the message editor requested PEST will then move the EDITOR program from the drum to core and it will transfer control to the EDITOR The first action the EDITOR expects is striking of the SOM key which will cause initialization of the typewriter subroutines and typing of the message editor is ready From this point on the EDITOR program is firmly in control EDITOR Output for PAT Processing After the editing phase is complete it will generally be the practice to down an edited file to for processing This process is accom plished by opening the relevant file and then ordering the EDITOR to terminate This procedure causes the opened file to be copied starting in a particu lar field on the drum so that it can be accessed by PAT Control then returns to PEST PAT UNDER PEST CONTROL When PEST is in the control mode and a p is typed in the program responds by typing out the rest of the message pat requested PEST will then move the PAT p
11. word record for each card image each word containing four 6 bit BCD characters PROCEDURE C The output tape from a PRESTO run procedure B must be processed by the PHOENIX program TXFM into a form acceptable to PAT The output from TXFM is a tape containing card images in the form of 27 word records each word containing three ICS characters A copy of the program TXFM is available at the PHOENIX maintenance console 20 APPENDIX II CORE MAP FOR PEST SYSTEM Location octal 176 PEST drum bootstrap 208 4000 PEST control 4000 10000 PEST buffers 63008 75227 DB1 75230 76137 PEST code loading functions 76140 77777 DB 21 NUL ABS ADI ARG ARGAC ARGI ARGR ARGX ARGZERO CLA CPL DAP DZA FETCH R GET R GO JMP LAI LAR LAZ LDZ MBZ NIL NOP PUT R APPENDIX III PHOENIX SUPPLEMENTARY OPCODES ZERO BASE W ADDR TAG ABSOLUTE VALUE OF AC ADD A IMMEDIATE ARGUMENT 24 BITS TO AC ARGUMENT IS AC ARGUMENT I 16 BITS ARGUMENT R 16 BITS INDEX TO AC ARGUMENT ZERO LOAD ZERO INTO AC COMPLEMENT AC DEPOSIT ADDRESS PART OF AC INTO DEPOSIT ZERO ADDRESS AT FETCH LIVE REGISTER R TO AC GET RTH REGISTER TO AC TRANSFER CONTROL UNCONDITIONALLY TO TRANSFER CONTROL UNCONDITIONALLY TO LOAD IMMEDIATE LOAD ADDRESS REMOTE FROM LOAD ZERO INTO AC LOAD ZERO INTO ZERO BIT IN AC ONE FULL
12. 2 Foreign announcement and dissemination of this report by DDC is not authorized 3 0 5 Government agencies may obtain copies of this report directly from DDC Other qualified DDC users shall request through QUE 4 U S military agencies may obtain copies of this report directly from DDC Other qualified users shall request through 47 5 distribution of this report is controlled Qual ified DDC users shall request through If the report has been furnished tc the Office of Technical Services Department of Commerce for sale to the public indi cate this fact and enter the price if known 11 SUPPLEMENTARY NOTES Use for additional explana tory notes 12 SPONSORING MILITARY ACTIVITY Enter the name of the departmental project office or laboratory sponsoring pay ing for the research and development Include address 13 ABSTRACT Enter an abstract giving a brief and factual Summary of the document indicative of the report even though it may also appear elsewhere in the body of the technical re port If additional space is required a continuation sheet shall be attached It ia highly desirable that the abstract of clasaified reports be unclassified Each paragraph of the abstract shall end with an indication of the military aecurity classification of the in formation in the paragraph represented as TS S C or U There is no limitation cn the length of the abstract How eve
13. 5511 FILE COPY MTR 219 ESD ACCESSION LIST ESD RECORD COPY mast RETURN d 3 cys SCIENTIFIC amp TECHNICAL INFORMATION DIVISION BUILDING 1211 ESD TR 66 301 USER S MANUAL FOR PEST A MONITOR PROGRAM FOR THE PHOENIX COMPUTER October 1966 M ben Aaron Prepared for DEPUTY FOR ENGINEERING AND TECHNOLOGY DIRECTORATE OF COMPUTERS ELECTRONIC SYSTEMS DIVISION AIR FORCE SYSTEMS COMMAND UNITED STATES AIR FORCE L G Hanscom Field Bedford Massachusetts PEN KE M g 1 N L P a Tu L e 15 Project 508F Distribution of this document is unlimited Prepared by THE MITRE CORPORATION Bedford Massachusetts Contract AF 19 628 5165 px 2 ADALYA This document may be reproduced to satisfy official needs of U S Government agencies No other repro duction authorized except with permission of Electronic Systems Division ATTN ESTI When US Government drawings specifications or Other data are used for any purpose other than a definitely related government procurement operation the government thereby incura no responsibility nor any obligation whatsoever and the fact that the government may have formulated furnished or in any way supplied the said drawings specifications or other data is not to be regarded by implication or otherwise as in any manner licensing the holder or any other person or corporation or conveying any
14. CODE FOR EXECUTION OR DEBUGGING This section presupposes that one or more programs have been com piled by PAT and that the PAT option of saving the code has been exercised PEST provides the facilities for calling for this code by name and having it loaded into core in the appropriate locations If a non unique name was chosen only the most recent version is accessible To accomplish loading the user types a c and the response is loader requested type a y for code list printout If a y is typed in the names of the stored programs will be typed out preceded by name of code and followed by end of code list If anv other character is typed in no listing will be produced The next request by the program will be please type in name of program to be loaded At this point a three character name which should be one of the names in the list is expected from the user When this has been typed in the designated program will be retrieved from the drum and loaded into core Should the user request a program which is not named in the list of stored programs the message 13 program identity unknown try again please will appear and the program will then cycle back to type y for code list printout PEST will indicate that the specified program has been found and loaded by typing out program loaded and ready to transfer to location x transfers control
15. al If military show rank end branch of service The name of the principal author is an absolute minimum requirement 6 REPORT DATZ Enter the date of the report as day month year or month year If more than one date appears on the report use date of publication 7a TOTAL NUMBER OF PAGES The total page count shouid follow normal pagination procedures i e enter the number of pagea containing information 7b NUMBER OF REFERENCES Enter the total number of references cited in the report 8a CONTRACT OR GRANT NUMBER If appropriate enter the applicable number of the contract or grant under which the report was written 8b 8 amp 8d PROJECT NUMBER Enter the appropriate military department identification such as project number subproject number system numbers task number etc 9a ORIGINATOR S REPORT NUMBER S Enter the offi cial report number by which the document will be identified and controlled by the originating activity This number must be unique to this report 9b OTHER REPORT NUMBER S If the report has been assigned any other report numbers either by the originator or by the sponsor also enter this number s 10 AVAILABILITY LIMITATION NOTICES Enter any lim itations on further dissemination of the report other than those GPO 886 551 imposed by security classification using standard statements such as 1 Qualified requesters may obtain copies of this report from DDC
16. e COMPUTE button Raise the CPU SINGLE INSTRUCTION switch The tape will load itself onto the drum When PEST is successfully loaded the message pest on drum please bring in drum bootstrap will be typed out Tabs should now be set if not already set The recommended tab settings are at 15 25 50 60 and 87 spaces to the right of the left hand margin 210540 4 JO Suoipog JO e1061J C HYVIV 13538 0339084 3H21IMS 3SN3S NOI LINY LSNI 319NIS Nd 9 javi 13534 311480 mous vILSVM 69146 LOADING PEST FROM DRUM To call in PEST from drum 1 Depress the CPU SINGLE INSTRUCTION switch i e put in single step position 2 Press the MASTER RESET button 3 Press the LD FROM DRUM button 4 Press the COMPUTE button 5 To transfer control to this program put CPU SINGLE INSTRUCTION switch up i e into the automatic position Steps 1 through 4 cause a core loader to be transferred from the drum into core Step 5 causes the remainder of the PEST program to be read into core from drum and control to be transferred to the PEST program proper The program will then pause waiting for the SOM key to initialize the typewriter subroutines The first action of PEST after receiving the SOM pulse is to type out the message control The program then waits for an appropriate control character to be typed in
17. etts May 1965 Note These references are corporate reports not reviewed by the Directorate of Security Review Department of Defense for public release 26 Unclassified Security Classification DOCUMENT CONTROL DATA R amp D Security classification of title body of abstrect and indexing annotation muet be entered when the overail report ia elassified 1 ORIGINATING ACTIVITY Corporate author Qe REPORT SECURITY CLASSIFICATION The MITRE Corporation Unclassified 3 REPORT TITLE USER S MANUAL FOR PEST A MONITOR PROGRAM FOR THE PHOENIX COMPUTER 4 DESCRIPTIVE NOTES Type of report and inclueive dates N A 5 AUTHOR S Last name firet name initial ben Aaron Max 6 REPORT DATE 76 TOTAL NO OF PAGES 7b NO OF REFS October 1966 28 5 8 OR GRANT NO 9a ORIGINATOR S REPORT NUMBER S AF19 628 5165 ESD TR 66 301 5 PROJECT NO 508F 9 b NO S ether numbers that may be aesigned MTR 219 10 AVAIL ABILITY LIMITATION NOTICES Distribution of this document is unlimited 11 SUPPL EMENTARY NOTES 12 SPONSORING MILITARY ACTIVITY Directorate of Com puters Electronic Systems Division L G Hanscom Field Bedford Massachusetts 13 ABSTRACT PEST is a non time shared program which gives a user access to an editor and an assembler on PHOENIX a computer developed by The MITRE Corporation PEST allows the user to enter edit assemble l
18. m as it was when captured The command for this action is a T which initiates the following sequence of messages Termination requested please mount unprotected blank tape on tape drive 1 please type y to indicate output tape ready When these requests are complied with PEST will create a new tape and signal completion of the action by the message output tape complete 16 The newly created tape is a PEST system tape containing all system programs current user files and changes made to PAT and EDITOR symbol tables Upon request a fresh PEST system tape may be obtained This tape contains all system programs but no user files or definitions The PAT symbol table contains the PHOENIX machine opcodes and those symbols essential to the operation of PAT The EDITOR files contain a set of PHOENIX supplementary opcodes given in Appendix III The user may at his discretion either add them to PAT or discard them The entire cycle can now be repeated using this tape After terminating control will be handed back to the PEST program Should the user wish to continue working with the PEST system currently on drum he should proceed as usual It should be noted that whenever a PEST system is loaded from tape an EDITOR file should be opened if PAT is to be run The user must not assume that the file previously opened for handing down to PAT is still in existence 17 APPENDK I MAGNETIC TAPE DATA INPUT
19. n to the PEST program at some point If there is reasonable assurance that the core region from 26 to 176 is untouched control can be transferred by typing in 2fg If the status of the core region in question is in doubt the PEST pro gram will have to be brought in from drum in the usual way Space Requirements for DBf The area of core occupied by DB is given in Appendix II DEBUGI DEBUGI DB1 is a symbolic debugging program providing operation definition capabilities to assist and expedite the difficult and time consuming process of checking out programs To Call DEBUGI To call DB1 the command D is typed in The system responds Debugl requested The typewriter subroutines must be initialized by means of the SOM key 15 Use of DEBUGI The use of DB1 is fully described in Reference 4 The user may wish to return to the PEST program at some point If there is reasonable assurance that the core region from 20 8 to 176 8 is un touched control can be transferred by typing in start 29 If the status of the core region in question is in doubt the PEST program will have to be brought in from drum in the usual way Space Requirements for DEBUGI The area of core occupied by DEBUGI is shown in Appendix II TERMINATE When the user wishes to capture the system in a particular state as a backup or when getting off the machine PEST will make a tape which when loaded in will recreate the syste
20. oad debug and execute a symbolic program DD 1473 Unclassified Security Classification Uncl ifi Security Classification KEY WORDS DIGITAL COMPUTER ON LINE OPERATING SYSTEM NON TIME SHARED INSTRUCTIONS 1 ORIGINATING ACTIVITY Enter the name and address of the contractor subcontractor grantee Department of De fense activity or other organization corporate author issuing the report 2a REPORT SECURITY CLASSIFICATION Enter the over all security classification of the report Indicate whether Restricted Data is included Marking is to be in accord ance with appropriate security regulations 2b GROUP Automatic downgrading is specified in DoD Di rective 5200 10 and Armed Forces Industrial Manual Enter the group number Also when applicable show that optional markings have been used for Group 3 and Group 4 as author ized 3 REPORT TITLE Enter the complete report title in all capital letters Titles in all cases should be unclassified If a meaningful title cannot be selected without classifica tion show title classification in all capitals in parenthesis immediately following the title 4 DESCRIPTIVE NOTES If appropriate enter the type of report e g interim progress summary annual or final Give the inclusive dates when a specific reporting period is covered 5 AUTHOR S Enter the name s of author s as shown on or in the report Enter last name first name middle initi
21. r the suggested length is from 150 to 225 words 14 KEY WORDS Key words are technically meaningful terms or short phrases that characterize a report and may be used as index entries for cataloging the report Key words must be selected so that no security classification is required Identi fiers such as equipment model designation trade name military project code name geographic location may be used as key words but will be followed by an indication of technical con text The assignment of links rules and weights is optional Security Classification
22. rights or permission to manufacture use or sell any patented invention that may in any way be related thereto Do not return this copy Retain or destroy ESD TR 66 301 MTR 219 USER S MANUAL FOR PEST A MONITOR PROGRAM FOR THE PHOENIX COMPUTER October 1966 M ben Aaron Prepared for DEPUTY FOR ENGINEERING AND TECHNOLOGY DIRECTORATE OF COMPUTERS ELECTRONIC SYSTEMS DIVISION AIR FORCE SYSTEMS COMMAND UNITED STATES AIR FORCE L G Hanscom Field Bedford Massachusetts Project 508F Distribution of this document is unlimited Prepared by THE MITRE CORPORATION Bedford Massachusetts Contract AF 19 628 5165 ABSTRACT PEST is a non time shared program which gives a user access to an editor and an assembler on PHOENIX a computer developed by The MITRE Corporation PEST allows the user to enter edit assemble load debug and execute a symbolic program REVIEW AND APPROVAL This technical report has been reviewed and is approved CHARLES LAUSTRUP Colonel USAF Director of Computers iii TABLE OF CONTENTS SECTION I INTRODUCTION SECTION DISCUSSION LOADING PEST FROM TAPE LOADING PEST FROM DRUM Legitimate Control Characters Illegitimate Control Characters FILES FROM TAPE THE EDITOR UNDER PEST CONTROL EDITOR Output for PAT Processing PAT UNDER PEST CONTROL Typewriter Input to PAT Tape Input to PAT EDITOR Input to PAT Input Independent PAT PEST Conventions The Aftermath
23. rogram from the drum to core and transfer control to the PAT program The first action the PAT program expects is striking of the SOM key which will cause initialization of the typewriter subroutines and typing of the message pat ready This message is immediately followed by a request to the user to specify the mode of input of the source language The request takes the form of the typeout typet m If any other character is typed in the message illegal input source try again will be typed out and the sequence just described starts again with the message pat ready Typewriter Input to PAT If a t is typed PAT will be initialized to expect input from the type writer keyboard The program will acknowledge the input of the t by completing the message typewriter input selected With typewriter input PAT s PASS1 error messages will be printed out as the errors occur The assembly can be terminated at any time by typing in right parentheses until PAT seizes control Tape Input to PAT If an m is typed PAT will be initialized to expect input from a suitably prepared magnetic tape see Appendix I The program acknowledges the request by typing mag tape input needs protected source tape on tape drive please signal tape ready by typing a If any character other than a y is typed in the message will be repeated When a y is typed in the next message out will be

Download Pdf Manuals

image

Related Search

Related Contents

JETSPRAY JS7  VINIFICATEUR SR NATUREO  Association Ludique de l`Agglomération Boulonnaise  Fujitsu Port Replicator PR05 (USB)    Manual de Instruções  Installation of the Opener  

Copyright © All rights reserved.
Failed to retrieve file