home *** CD-ROM | disk | FTP | other *** search
- From Simple Software Company....................producers of SlickWare !
-
- Telecommunications for the Beginner
- by G.M. Raymond
-
- Welcome to the world of Slick Communications. This text is intended for
- the new telecommunicator who is interested in learning about the world
- of modem and computer communications. Perhaps you have already heard
- about modem telecommunications and just want more information. This
- article will tend to serve the needs of either person.
-
- Your first question may be "Just what is a Modem good for ?". The most
- common use is to access other computers. This could be to exchange data
- with other computers within a company or to access computers of other
- individuals or companies. This computer connection can be made via an
- ordinary telephone system or on a special leased line or network.
- Perhaps the most ordinary use today for individuals, is to use their
- modem to call other private or commercial systems, known as BBS's (short
- for Bulletin Board Systems). These BBS's provide a place for program
- writers to market their products (called ShareWare) and an electronic
- mail forum for messages, questions, and anything of interest to
- telecommunicators. Most people elect to download programs. We will talk
- more about that later.
-
- First, lets get a handle on terms and definitions. To communicate via
- voice, be it wire or radio, it is necessary to MOdulate our voice signal
- onto the electrical current carried by wire or radio wave. Then, on the
- receiving end, DEModulate the current back into intelligent audible
- sound waves. Essentially we do the same thing with a computer. We take
- data and send it out and reinterpret it on the received end. So, this is
- the job of the MODEM. The humble modem is actually a very sophisticated
- piece of elec-tronics. Just as standardization took hold of
- broadcasting, with AM and FM dominating the available channels today;
- there has been a slow but consistent push to standardize the methods of
- exchanging data between computer modems. First, you should understand
- that the modem, like the computer itself, is just a dumb machine. It too
- (the modem) need a soft-ware program to operate. These are generally
- referred to as Terminal programs or comm software. Naturally, we are
- partial to SLICK terminal because we sell it. Fortunately, most all
- modems still being manufactured today, use a set of instructions called
- Hayse commands which have more or less become the industry standard.
- Most all modems and software found on todays market will have the
- necessary configurability to adjust to each other as well as the
- computer. We need to talk about this more.
-
- Your modem will connect to your computer via a connection referenced as
- a serial port. It might be interesting at this point to state that any
- external peripherals (printers, modems, monitors etc.) will attach to
- either a serial or parallel interconnection. The basic difference
- between the two methods lies in how the signal is moved through the
- cable. In a serial connection, each bit of data is sent sequentially
- (that is, one after another). It takes 8 bits of data to represent a
- single character of which there are 255 characters in total. (The
- alphabet and most common punctuation are in the range of ascii [decimal
- 33] to [decimal 127]). So, with a serial connection, eight signals must
- pass to have one character arrive on the other end. By comparison, with
- a parallel connection, all eight bits are sent together on eight
- separate wires in the cable. With this system, each character arrives
- intact and almost eight times faster. The parallel method is ideal for
- supplying devices like printers with input data because of its speed.
- The biggest drawback is signal attenuation when trying to use long
- cables (i.e.,stay under 12 feet) and finding accurate method of error
- checking the integrity of the data sent. (i.e. did a character Z
- actually arrive as a "Z"). Sending data serially has certain drawbacks
- when it comes to this error checking procedure. Several methods have
- been developed that have become standards. If you are only interested in
- sending the alphabet, you do not need the full byte or all eight bits,
- only seven will do nicely. This is because the decimal value of 127 in
- binary form is 0111-1111, requiring only 7 bit positions. Starting from
- right to left, each of these bits represents a decimal value of
- 1,2,4,8,16,32, and 64. The sum of these bits equals 127. If the left
- most bit were to be used (1111-1111), its value alone equals 128 so by
- using 8 bits all 255 characters could be encoded and transmitted. That
- is, a range of values from zero (0) to 255. (Yes, zero has a value). The
- bottom line, 7 bit rate transfers are faster but useful only for text
- data. (sometimes referred to as low ascii- [under 128]). On the other
- hand, the eighth bit can be useful for parity checking which we will
- discuss later. If we were to actually use the 8th bit for character
- data this would eliminate parity verification. Hence a setting of 7E1 is
- useful for character (English text) only. This also precludes a setting
- of 8E1 or 8E2. Yes, the 7 is the number of data bits used, the E, O or N
- indicates the use of parity or NO parity. The one (1) is for the number
- stop & startbits.
-
- EXE Files are made up of ascii characters throughout the entire ascii
- range of zero through 255. (yes, zero is a value to be counted....in
- fact the computer could not survive without it). Just to be safe then
- with only a small sacrifice in speed, 8 data bits is the way to go. The
- next consideration is also one of protocol. Do we use 1 or 2 extra bits
- to signal the start or stopping point of the group of 8. There is an
- argument that can be made that two are more reliable than one but it
- also can be said the loss in double the transmitting time isnt worth the
- extra margin of accuracy. By preference, most choose only 1 stopbit for
- their protocol. Now we have to talk about parity. This is nothing more
- than a simple way of testing each character for accuracy on the
- receiving end. There can be either EVEN, ODD or NO parity. Parity is
- simply a checking of the transmitted bits per byte (character) to
- determine if the seven positions make up an odd or even number. A zero
- is used as the eight bit if the other seven result in an ODD number of
- ones and a 1 (one) is used to indicate an even number. i.e. 01000001
- (normal capitol A) becomes 11000001, when parity is set to ODD. The
- reverse is true for EVEN Parity. (0 means even) Parity checking is not
- only time consuming but also inefficient. It is rarely used today on
- anything but older DEC mainframes. Finally, we arrive at 8-N-1. Eight
- bits, No parity, and 1 stopbit as the desired order of doing business.
-
- The IBM Personal Computer or clone has various internal addresses for
- its four normally available serial ports. We reference these as COM1,2,3
- & 4 but this is not in-fact the actual location pointer required by the
- hardware. $3F8,$2F8,$3E8 and $2E8 are the correct locations for these
- ports as defined in their hexadecimal format. (a number system using a
- base of 16 to represent larger decimal values in smaller numbers of
- bytes, i.e. 65,536 is equal to FF-FFh [a two byte value]). Next, you
- must determine what Interrupt Request line is to be used internally with
- each comm port. The usual arrangement is COM1,$3F8&IRQ-4;
- COM2,$2F8&IRQ-3. Seldom will you use more than two comm ports on a
- system although it is not out of the realm of possibility. It really
- doesn't matter what port address you use on a modem until you begin to
- use other serial ports for devices like mousses or null modem cables (to
- link up two CPU's by cable). With more than one serial connection, it is
- sometimes important what device goes on what port as well as having them
- properly addressed in order for everything to work together smoothly. A
- good modem will have either switches or jumper pins for you to tell it
- what comm address it is looking for and with what interrupt. There is
- also a redundant process here because you must also configure the
- software to operate with the same values.
-
- Probably the biggest headache of all is setting the software to tell the
- modem what it wants after you determine what the modem normally sets up
- as defaults to begin with. We are talking about the various internal
- registers of the modem that hold instructions. Every modem will
- initialize with a pre set factory designed default setting. Very often
- it happens that a good modem will default to all the correct settings on
- its own and you are just wasting your time re coding an initialization
- string that will only repeat for a second time the built in factory
- settings. Here, several of the more important registers to think about
- are the CD and DTR registers. Normally you want software control over
- these and NOT have them forced on by either dip switch or jumper
- settings. Most all problems related to problems with hanging up or
- auto-answer can be traced to these registers. If your modem defaults to
- &C1 and &D2, great. If not, you need to set them. (via the hardware if
- able and or software modem initialization string.)
-
- Here are some other recommended settings and what they accomplish.
- M1 ..... Speaker On for Dial,Carrier Detect,HandShake and Result
- Code, then off as DATA begins.
- V1 ..... Verbal Result Codes (CONNECT 2400 rather than a "3")
- X4 ..... Show All Result Codes
- E0 ..... NO local modem Echo of characters. (The host does this)
- &C1 .... Software control of Carrier Detect Status
- &D2 .... Software control of Data Terminal Ready state.
- S7 ..... DTMF (touch tone) dialing speed (usually 70ms aprox is ok)
- S0 ..... set this to 0 to prevent your modem from answering your
- phone line or X to the number of rings before pickup.
-
- This will give you a good idea but please remember, when all else fails,
- read the modem manual. It might be a good point now to bring up another
- related subject. Most computers will not respond to the high order
- graphics and ANSI color signals without the short program (found in the
- DOS diskette) called ANSI.SYS placed where it can be read after being
- called via a statement in the computer CONFIG.SYS program. The added
- line to the SYS file is simply DEVICE=C:\PATH\ANSI.SYS. Of course
- substitute PATH for the actual directory path to the location of the
- ANSI.SYS file. This will allow monochrome systems to receive ANSI
- graphics and at least see the graphics if not the color, and color
- systems to come alive. My hats off to the guys who can write good
- quality ansi graphics for they are truly artist as well as programmers.
-
- It might also be wise to mention that the only difference between an
- internal modem and an external one is the price. There is little
- advantage in my mind in using external modems. Aside from their cost
- increase due to the necessity of having a built in power supply plus an
- external case they are more apt to both receive interference (due to
- poorly shielded cables) as well as generate RFI. Since most PC have at
- least two or three expansion slots left over after over zealous
- purchasing, there is usually plenty of room inside the computer case to
- install the modem. This is usually nothing more than slipping the card
- snuggle into an available slot and using one screw to secure it in
- place. There are usually two modular jacks on the back, the upper one
- for cabling to the phone line source and the second for plugging in a
- regular phone for whatever use you may have of it.
-
- Assuming all has gone well at this point you are ready to boot up the
- computer and run the software. Most all terminal programs first clear
- all registers with an ATZ command then send the initialization string.
- Unfortunately a lot of programs either blank the screen during this
- process or simply don't allow the bytes to appear on screen in this
- phase. I am against this kind of design because you never know if the
- modem swallowed the string without spiting it up. Meaning, accepted it
- and set registers accordingly or rejected it with an ERROR rather than a
- friendly "Ok" reply. The error always indicates that one of the commands
- in the modem string is unfamiliar to that brand. This either means its
- hardware controllable only (Dip Switches,etc) or not an option of that
- brand of modem. If just ONE command is at fault, the entire string is
- rejected. Most modems will accept up to 40 characters in a command
- string but some will go as high as 255.
-
- If you are preparing to buy a modem for the first time, be careful. Like
- any products, there are good ones and buggy one. Sticking with Brand
- names usually is best and although most modems are being made overseas,
- there are several US and Canadian companies making superb products. If
- you want the latest state of the art, look for a modem that supports the
- newest error checking and compression technique called MNP-5 (for Micro
- Comm Network Protocol, level 5). Finally, if you can afford it, there
- are several high speed modems around that run at 9600 baud or better.
- The high speed models almost always work at all the lower standard
- speeds as well. But, in any case, don't buy anything below 2400 baud. I
- say this because the price may be tempting as there are companies
- selling older 300/1200 baud rigs for well under fifty bucks. So what
- DOES modem speed have to do with anything ? Well, if your one of those
- folks fond of quoting "Time is Money" you can certainly save a lot with
- a faster modem. Let's see what happens here. First of all, what is a
- baud or baud rate ? Its the number of BITS per second capable of being
- transmitted. Now, if an average sheet of paper is 80 columns across and
- 66 lines deep this counts out to exactly 5280 characters per page if
- completely filled. Now remember, each character may require 7 or 8 bits
- to construct. Then we need the extra stop bit, parity bits if any and
- framing bits. We might end up with as many as five additional bits per
- character by the time they are formatted for transmission. So, for
- argument sake, use the value 12 bits X 5280 characters. This is 63,360
- bits. If we send them at the rate of 300 baud this will take (63360/300)
- seconds. Or about 210 seconds or 3 and one half minutes. At 1200baud
- it's four times faster or only 52 seconds. At the 2400 baud rate we
- half this down to around 25 seconds. Since an average text page is
- really only half the maximum characters available this means in one
- minute at 2400 baud you could transmit four normal business letters.
- Since AT&T is not free and they have both minimum and time based rates
- on toll calls, there is no question that under some situations a high
- speed modem could easily pay for itself. The average size programs
- today run between 30 and 70k. (each k equals 1024 bits). Most good
- modems running at 2400 baud will average about 4 seconds per k. Why did
- I use the word average ? Well first of all, I left out a lot of detail
- that might have technocrats pulling out their hair. In any case, its
- neither my ability or intention to get too technical here but since were
- into speed somewhat as a subject of exploration, let's talk about
- SLOWDOWNS. Remember earlier we discussed a parity check at the byte
- level for catching errors ? We said that in most cases it was no longer
- used. Well, the reason for that is due in part to more elegant ways of
- catching errors. Probably the first and simplest of all methods is the
- CHECKSUM. Remember, the setting of each one of the eight bits of a byte
- (zeros or ones) determine its decimal (and character) value up to 255.
- So, every byte has a decimal value as well as a character value. (i.e.
- capital A is decimal 65). With two bytes we can carry a decimal value up
- to 65k. This means we could sum the value of 255 characters and send the
- total in two bytes of data. If the sum on the received end is not the
- same as the previously sent checksum value, the packet is rejected with
- a NAK and a request for retransmitting is made. By limiting the packet
- size to 128 bytes shorter transitions of interference (line noise, etc)
- wont cause bigger delays due to retransmitting of large packets. This
- gives rise to a common mistaken idea that while monitoring a download,
- and errors are reported by the protocol software, that the file is
- corrupted. No, it only means that for every error it cost you more time
- to receive the same packet without error by retransmitting. In any case,
- CHECKSUM was how it began and IT'S STILL HERE. I guess that speaks for
- its staying power. But, like everything, it has been greatly improved
- upon. Now Cyclic Redundant Checking, or simply CRC protocols are the
- rage. Its more difficult to explain in simple terms but the bottom line
- is a CRC value is calculated for each packet transmitted and compared
- with what is calculated on the received end. Again the two must agree.
- The accuracy derived from CRC methods lies in its ability to pass every
- bit through a 16 (or 32) bit shift register that does an Exclusive OR
- with the 6th,8th,11th and 15th bit of the 16 bit register. Each bit
- causes the value of the register (which can be expressed in four hex
- numbers) to change to a new value. By the time the last bit is processed
- a number is derived that represents a CRC value for the ordered group.
- This method is almost infallible. The method was originally developed
- to test the accuracy of the bit content (program) stored in the ROM's of
- the PC. Programmers specializing in writing transfer protocols soon
- began to incorporate it into their creations. Now, its used almost
- exclusively.
-
- There are several ways to ask a modem to dial a number for you. You can
- do it manually or call a number from a previously created dialing
- directory that is accessed by the software. To do it by hand simply type
- ATDT followed by the number if you have Touch Tone Service. Or ATDP for
- pulse dial. The string will look like this: ATDT288-6550 (note, the
- modem ignores the hyphen). Or, if it's long
- distance....ATDT1-504-288-6550. Suppose you wish to defeat Call Waiting
- for this call only (if left on, it can cause trouble), the string is
- ATDT*70,288-6550. *70 is the AT&T temporary disable wait instruction,
- the comma is a modem 3 second delay command before continuing with the
- dial. (this allows time for the command to be received and for AT&T to
- give back a dial tone). After entering your dial string you should hear
- the modem taking the line off hook (signaled by the appearance of the
- dialtone in the speaker), the DTMF dial pulses going out, the ring or
- busy tone at the destination number followed by the host modem answer
- tone and handshake, followed by a CONNECT message on your screen. The
- standard for a plain CONNECT is a 300 baud logon. CONNECT 1200 and
- CONNECT 2400 are self explanatory. Some host systems require a few
- carriage returns before you will see anything on the screen but most
- will automatically begin displaying after the connect message. Most of
- the people who operate BBS's are hobbyist. It's another form of hobby
- and social activity all rolled into one similar in a lot of ways to ham
- radio. Few Boards will give you total access to everything immediately
- but there are exceptions. Most will request your real first and last
- name, a local phone and address, (or out of state,if that be the case).
- Some SYSOP'S (SYStem OPerators[the guy who owns or manages the Board])
- will even phone you back to verify at least your phone number. Some have
- even more stringent requirements, but, most will simply give you access
- next time they sit at the console and get caught up with their
- duties.(usually 24 to 48 hours). When BBS's first cranked up in the
- earlier eighties, Sysop's were sort of groping along to try and
- determine what their users wanted. The use of phoney names and cloaked
- identity was very common. The misuse of BBS's for a while even
- threatened their legality as so called hackers exchanged information
- they newly acquired. Most of this was in the form of either passwords to
- big mainframes, private telephone code access numbers and pirated
- software. Fortunately, BBS's have grown up and matured into very
- legitimate forums of information exchange. To this day I still do not
- have a clear understanding of the word Hacker. It seems to mean many
- things depending on who you are talking to. Hardly any Sysops run Boards
- that they wrote the program for. They usually use a commercial product
- that seems to best fit their own idea of what a Board should be like.
- Sometimes they simply fall victim to a bad recommendation from a so
- called expert or seasoned user. If nothing else, one thing you will
- learn quickly in this business is that there are a great deal of self
- proclaimed experts. What's really funny is the true complicity of the
- machines vrs the real depth of knowledge of most of these so called
- experts. I think the old saying "A little knowledge is dangerous..." is
- most appropriate here in computer land. Lots of the questions that come
- pouring fourth when attempting to gain registration as a user are
- therefor not the creative genus of the Sysop but rather the dumb
- invention of an other- wise great code writer who had to think up
- something to ask during that phase of Logon. (Logging Onto a System).
- One of my personal gripes is the Sex, Age questions.....why not race too
- and make it a total violation of first amendments rights. Anyway, like
- it or not, you have to comply with the rules if you expect to get and
- stay in the game.
-
- Most Boards allow some limited ability on first Logon, like reading the
- Bulletins and E-Mail (Electronic Mail). A Menu will appear giving you
- the choices available. Since it's well known that 99 % of all registered
- users only check in to see what's new in the Files Directories, some BBS
- automatically advise on what's new at time of initial Logon. Some
- Sysops have the mistaken notion that running a BBS can be a neat way to
- accumulate a lot of good software. It really works in the other
- direction. A good Sysop will have access to files long before his local
- users will. He quickly realizes it's he who will ALWAYS be providing the
- latest stuff and not his users. For this reason I suggest steering away
- from any Boards that demand certain Upload/Down load ratios (what you
- contribute vrs what you take). In any case, most contributors cause more
- problems than they cure. They will repackage (re archive or compress a
- file under an altered name) in order to re transmit it for credit.
- Sometimes they leave important things out that could be grounds for
- license violations of the software. Then there is the Virus thing.
- Although at this point I see NO PROBLEMS AT ALL in this area, the
- potential is there. Perhaps for curiosity sake a few definitions might
- be in order. There are usually three adjectives tossed about; Virus,
- Worm & Trojan. Each has a separate but similar meaning with some
- crossover effects. Basically, a Virus is a segment of code that is
- capable of altering your operating system file (usually COMMAND.COM) in
- such a way as to cause the virus code to be written into any files you
- transfer to floppy either via the operating system or the executable
- files themselves. This replicates the code (like a virus multiplying)
- onto disks that may ultimately infect other machines. The code
- theoretically could be constructed to remain dormant until a certain
- system date comes up or after the machine is booted so many times. Then
- it could pop its ugly head and cause all kinds of trouble. Possibilities
- are a reformat of your hard drives, a crippling slowing down of the CPU
- clock cycle, altering Interrupt vectors causing system crashes, locking
- the CPU into a constant reboot cycle....the list is endless. A Worm is
- identical to a Virus in damage possibilities but its not intended to be
- passed on or replicate itself. A Trojan on the other hand is in my
- opinion the worst possible threat. This is a program that sells itself
- as a game or utility while in fact is purely intended to cause harm to
- your system. Why is it so dangerous as compared to a Virus or Worm ? It
- has to do with Intelligence itself. The kind of PhD education,
- experience and training it would take to write an effective Virus or
- Worm generally would ethically and morally preclude the creator from
- doing it in the first place. He would in reality have to be off balance
- and suffering severe mental and emotional distress to conceive of this
- as punishment or payback. In any case there are perhaps less than a few
- dozen minds in the country who are even capable. BUT, the Trojan is a
- different story. First, almost any college educated hobbyist could, via
- the readily available high speed modern compilers available today in any
- software store, write a simple trojan that starts by playing music,
- let's say, while using that to mask the sound of your hard drive
- reformatting. It would not take much creativity to come up with an idea
- and write the code for it. Anyone familiar with Pascal or "C" could do
- it. For that matter it could be done in BASIC. Well, "What can be done
- ?" you ask. Actually a lot if you are willing to take the effort. Keep a
- virgin copy of COMMAND.COM locked away on a diskette with a known good
- copy of the two operating system files. Use a CRC checking Utility to
- determine the CRC value of the original copies, including their exact
- byte length. The man who could alter a file, imbed a Virus, and do it in
- such a way as not to effect the CRC and byte length of the file just
- doesn't exist because that'd almost impossible. (yea, I did say almost).
- Also, just as every criminal act must have a motive, no hacker would
- take the time unless he could get some kind of ego trip going. Once he
- bit your hand it would be meaningless unless he got to inform you that
- you were a sucker and taken !. To do this he would probably have an
- ASCII message in the code to that effect. There are many utilities
- capable of scanning an executable file for hidden messages. There are
- also a number of utilities that are capable of searching through an
- executable file for calls to certain DOS Interrupts that would be
- necessary to play havoc with the central processor or mass storage
- devices (hard drives, tapes, etc). Right now, in my opinion, this whole
- business of Virus etc. is more a question of knowledge and preparation
- rather than fear and reality. Cuba could send a strike force up the
- Mississippi to invade the US via New Orleans. There are even occasional
- reports of vessels at the mouth of the river. What does reason and logic
- say about this ?. One real tragedy of human nature involved with
- personal computers is the user who either unknowingly or while engaged
- in experimentation trashes his hard drive or corrupts his files and
- rather than accept personal responsibility claims foul Viruses did him
- in. Sort of like a modern version of "Crying Wolf". Its been done so
- often, will we believe it if it ever actually does begin to happen ?
-
- Now lets talk about archived files. An archived file is rather like a
- file box. A repository or collection of a number of separate files,
- organized or indexed in such a matter as to make retrieval quick and
- easy. There is one special difference however. The files are compressed
- to their minimum possible size before being stored in the archive. This
- compression technique can be based on a number of either compatible or
- no compatible methods. The first clue is the extension on a file. Here
- are several very common ones: .ARC, .PAK, .ZIP, .LIB, .ZOO. Generally
- these are not compatible methods and each requires its own special
- utility (work program) to compress and un-compress. There is even
- another method called suitcase files which have an ordinary extension of
- .EXE, but when executed immediately begin spawning many additional files
- that come from within the main suitcase file itself. They are
- automatically uncompressed as they are re written back to disk by
- instruction or programming from within the suitcase. Since they look
- like any other executable file it is sometimes difficult for the
- inexperienced to tell them apart as being suitcase files. There is a
- trend developing, due mostly to the influence of BBS's, to standardize
- the algorithm's (formulas) used to archive. There is to this day no
- clear cut winner. However, ZIP files (for being Zippered up) are showing
- up everywhere, perhaps becoming the dominate method. Time will tell. In
- the meanwhile, it can't hurt to begin collecting the top four or five
- Compression utilities. Then, no matter what you encounter, you will be
- prepared. Most all good BBS's carry them all in the Archive/ Compression
- directory of their Files department. Aside from going with the flow,
- things to consider if you have a lot of personal use for storing files
- are: The speed of both compressing and un-compressing, (remember, time
- is money); the degree or % of compression (how much space are you really
- saving); ease of use; extra utilities (i.e. the ability to password
- protect, etc etc); registration cost; support if you need it; and
- suit-caseing ability. I fine features I like in each of the popular
- methods but again due to BBS impact, find myself working most often with
- Zippered files.
-
- Now its time to talk about how to get the files to your end of the
- computer, (downloading), then we will discuss the opposite situation,
- contributing a file to someone elses system (uploading). As with most
- situations there is sort of a convention of thought when it comes to the
- keys used to manipulate a communications program. Normally, PgUp and
- PgDn bring the upload or download menu into view. Lets start first with
- downloading. Assuming you found your way into the Files section of a BBS
- and had opportunity to request a display of all (N)ew files since your
- last time on (or perhaps used the BBS searching utility to determine if
- what you want is present) your next step is to request a (D)ownload.
- Some BBS require that you be within the specific file directory that the
- file is located before starting, some will allow a download from any
- location within the files section. As soon as you request a download,
- the BBS will usually first as for the desired protocol (method of
- sending the file which must be the same on both ends). Some BBS have
- your preference protocol as a default. (a protocol you requested on
- initial registration). Then, the name of the file is requested. If you
- type it in wrong or its really not there, the BBS usually informs you.
- Otherwise you get a message to continue on your end. YOU DON'T have
- all-day, usually 60 seconds. Here is where you hit PgDn on your end.
- Depending on the protocol selected you may or may not have to retype the
- file name on your end BUT you must pick the EXACT same protocol. From
- here on the process is rather automatic and you can usually go about
- some other duties in the room until it beeps that its finished. The file
- will either be deposited into your default directory or if the comm
- program allows, wherever you instructed it to go. Lets talk about
- protocols for a moment. The common one are Ascii, Xmodem, Ymodem and
- Zmodem. Most everything else is variations of these such as Clink,
- Mlink, Jmodem, Lynx, etc etc. Its true that a few protocols are
- inter-compatable but if you go by the rule of sameness for BOTH ends,
- you can't go wrong. Some protocols allow the selection of multiple
- filename's for transfer such as Ymodem/Batch and Zmodem. My own
- preference is Ymodem/Zmodem when available. Zmodem has a few intelligent
- features that under some trying circumstances could be handy. It has the
- ability to reduce or increase packet size depending on quality of
- transmission conditions. It also has a crash recovery mode. Meaning, if
- you lost connection halfway through a file transfer, you could reconnect
- and pick up where you left off (without repeating the entire file). On
- the other side of the coin there are still a large number of systems
- using only Xmodem and Kermit. Kermit is a protocol used when a personal
- computer has to exchange data with a big main frame. Its seldom ever
- used PC to PC. Because of computer design, storage design etc. packet
- sizes can vary from 128 bytes of data too several k. Sizes of 1k
- (1024bytes) are the more common. The only real reason for limiting size
- is quality of transmission medium. If a transmission medium is 100%
- capable, there really be no need to limit packet sizes. On clean
- systems, Jmodem is popular because of its ability to run up to 8k
- packets. This saves a small amount of time but in my opinion not worth
- the risk of some corrupted bytes getting through. (a byte whos value has
- been altered from its original value by a change in one or more of its 8
- bits)
-
- If you desire, you can obtain services on Telephone Network systems that
- are on the average much cheeper than regular long distance services. US
- Sprint has a Telenet System that only cost $1.00 per your for the first
- 30 hours of time. Yes, there are a few hooks. You pay 30 buck a month
- regardless of the minimum used and are limited to perhaps only 40 or
- less cities. Still, considering AT&T at $6+ per hour this can save
- money. Slick has a special set of built in Macros to make logging on to
- Telenets PcPursuit service an easy process.
-
- Lets talk now about some simple rules of BBS etiquette. First, never
- drop carrier (hang up) when you are finished. Take the time to leave via
- the proper exit (Goodby or Off key). Dropping carrier is the equivalent
- of having a guest suddenly leave your home and SLAM the door on the way
- out. Second, dont POST (leave messages) in ALL Capitol Letters. This is
- the equivalent to shouting in someone's face. Third, if you are going to
- use someone's else's BBS, operate according to his rules. If you don't
- like the rules, go some-where else where the rules are more to your
- liking. Finally, be cautious. If you are intent on pranks you should be
- aware that most ALL forms of communication are supervised and protected
- by federal laws. Its easy to get caught when on a phone system today as
- everything is a matter of record. With ESS offices, the system can
- log/trace anything, anytime it's necessary.
-
- EOF
-