home *** CD-ROM | disk | FTP | other *** search
Text File | 1990-09-22 | 175.4 KB | 4,023 lines |
-
-
-
-
-
-
-
- =================================================
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- IDCCOM (tm) - FAST-TELECOMMUNICATIONS PACKAGE
-
-
- Documentation for IDCCOM.EXE
-
-
- Written by Gary Conway and Shawn Merrick
-
-
- Infinity Design Concepts, Inc.
-
-
- Louisville, Kentucky
-
-
- Copyright (c) 1990 All rights reserved
-
-
- Version 1.1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
-
-
-
-
-
- =================================================
-
-
-
-
-
-
-
-
-
-
- IDCCOM.EXE is a shareware program. IDCCOM.EXE is
- and will remain the property of Infinity Design
- Concepts Inc. This program may not be used in any
- connection with commercial ventures, nor as a sales
- aid, without the expressed written consent of the
- author. All rights are reserved.
-
-
- Infinity Design Concepts, Inc.
- 1052 Parkway Drive
- Louisville, Kentucky 40217-2333
- Voice: (502) 636-1234
- Data: (502) 635-5471
- CIS: 72657,3006
-
- Member IEEE AOPA NSPE KSPE WINGS
-
-
- All new releases of IDCCOM.EXE and all other IDC
- software can be located -FIRST- on ;
-
-
- IDC BBS SYSOP - Chuck Crumpton
- (502)-635-5471
- 300/1200/2400 24hrs. N81
- Louisville, Kentucky 40217-2333
-
-
-
- IDCCOM is a trademark of Infinity Design Concepts Inc.
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
-
-
-
-
-
- =================================================
-
-
- REGISTRATION
-
-
- If you find yourself using IDCCOM, please take the
- time to do the right thing and that is purchase
- your copy. You have been provided the opportunity
- to freely test the program before even thinking
- about purchasing. This is only fair, so, in
- fairness, you should reciprocate and purchase your
- copy, if you continue using the software.
-
- Why register ?
-
- 1) You get the COMCFG.EXE program for customizing
- IDCCOM.
- 2) You get notification of updates to all IDC
- software.
- 3) You get online phone support.
- 4) You get the IDCSYS.EXE, SYSOP control program
- 5) You get the script language implementation
- 6) You get FILTANSI program to help in setting up
- the ANSI/non-ANSI BBS files
- 7) You get the COMSAVE and COMREST programs which
- will save/restore IDCCOM's configuration
- Customers residing outside of the United States of
- America should send a check or money order drawn on
- a U.S. bank or in U.S. funds or use a credit card.
-
- You will find the registration form in the archive
- with this document under the name REGISTER.FRM.
- Please use this form for registration.
-
- Infinity Design Concepts, Inc.
- 1052 Parkway Drive
- Louisville, Kentucky 40217-2333
- Voice: (502)636-1234 Modem: (502)635-5471
-
- The user is granted the right to make unlimited copies
- of the SHAREWARE versions of the program (except
- COMCFG.EXE, COMCFG.DOC and IDCSYS.EXE) and to
- distribute these copies as desired without profit,
- EXCEPT that Infinity Design Concepts, Inc. reserves the
- SOLE right to distribute the program(s) for profit.
-
-
- NOTE: COMCFG.EXE and IDCSYS.EXE are NOT shareware
- programs and may not be released to the general public
- in any form under any circumstances whatsoever.
-
-
- =================================================
-
-
-
-
-
-
- =================================================
-
-
- TABLE OF CONTENTS
-
- Page
- LIMITED WARRANTY.......................................... 1
- LICENSE AGREEMENT......................................... 2
- SINGLE PRICING............................................ 3
- SITE LICENSING............................................ 3
- FOREWORD.................................................. 5
- FEATURES AND BENEFITS..................................... 6
- INITIAL SETUP............................................. 7
- BPS vs BAUD (read me, be wiser)........................... 7
- DTE AND DCE (what the heck?).............................. 7
- INSTALLATION.............................................. 8
- COMMAND AND TERMINAL MODES................................ 9
- HELP SCREEN............................................... 9
- EDITING USER INPUTS....................................... 9
- DIALING DIRECTORY......................................... 10
- MODEM RESULT CODES........................................ 10
- MODEM STRINGS............................................. 11
- FILE PATHS................................................ 11
- MACRO KEY DEFINITIONS..................................... 13
- COMMAND LINE OPTIONS...................................... 14
- CAPTURE FILE.............................................. 14
- IDCCOM COMMANDS........................................... 15
- DIALING COMMANDS...................................... 15
- COMMUNICATION PARAMETERS.............................. 15
- EDIT MODEM STRINGS.................................... 15
- FILE COMMANDS......................................... 15
- TRANSFER COMMANDS..................................... 16
- UPLOADING MULTIPLE FILES (via picklist- a must see!).. 16
- MISCELLANEOUS COMMANDS................................ 18
- SCRIPT FILES.............................................. 18
- FILE COMMANDS............................................. 19
- VIEW FILE............................................. 19
- EDIT FILE............................................. 19
- LIST DIRECTORY........................................ 19
- DELETE FILE(S)........................................ 19
- COPY FILE............................................. 20
- RUNNING IDCSHELL(tm)...................................... 20
- RUNNING NARC(tm).......................................... 20
- MOUSE SUPPORT............................................. 20
- EGA/VGA SUPPORT........................................... 20
- DIRECT CONNECTING TWO COMPUTERS WITHOUT MODEMS
- FILES USED BY IDCCOM...................................... 21
- HOST MODE................................................. 23
- IDCCOM.LVL file....................................... 26
- IDCCOM.FDR file....................................... 28
- SETTING UP HOST MODE.................................. 29
-
-
- =================================================
-
-
-
-
-
-
- =================================================
-
-
- IDCCOM.DOR file....................................... 31
- USING THE REDIRECT.SYS driver......................... 32
- SCREEN BLANKER........................................ 32
- DOOR SYSTEM FOR HOST MODE............................. 32
- MESSAGE SYSTEM........................................ 33
- HOST MODE LOG FILE.................................... 34
- SYSOP FUNCTIONS....................................... 34
- IDCSYS - SYSOP PROGRAM................................ 35
- TRANSFER PROTOCOLS........................................ 35
- XMODEM CHECKSUM, CRC and 1K........................... 37
- YMODEM and YMODEM-G................................... 37
- ASCII................................................. 38
- MEGALINK.............................................. 38
- ZMODEM................................................ 39
- CRC/CHECKSUM ERROR CHECKING............................... 40
- HALF/FULL DUPLEX.......................................... 42
- HARDWARE AND SOFTWARE HANDSHAKING (RTS/CTS, XON/XOFF)..... 42
- COMPUTER TO MODEM SIGNALS................................. 44
- COMCFG - CONFIGURATION PROGRAM............................ 45
- APPENDIX 1 - modem init strings........................... 46
- ZOOM MX2400
- PRACTICAL PERIPHERALS PM2400
- HAYES 9600
- ANCHOR VOLKSMODEM 1200
- EVEREX EV-920 1200
- APPENDIX 2 - modem result codes........................... 48
- APPENDIX 3 - ANSI sequences supported..................... 50
- APPENDIX 4 - COM ports and interrupt lines................ 51
- APPENDIX 5 - script file language......................... 52
- APPENDIX 6 - acknowledgements............................. 55
- INDEX..................................................... 56
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
-
-
-
-
-
- =================================================
-
-
- LIMITED WARRANTY
-
- INFINITY DESIGN CONCEPTS INC. warrants to the original
- purchaser of IDCCOM that:
-
- 1. the diskettes included in the software packages are
- free from material defects under normal use for
- three months following their purchase;and
- 2. the program is properly recorded on the diskettes.
-
- Other than as set forth above, INFINITY DESIGN CONCEPTS
- INC (hereinafter referred to as IDC) makes no warranty
- of any kind, whether express or implied, regarding the
- program(s) and disclaims any warranty of
- merchantability or fitness for a particular purpose.
- The software program(s) are hereafter referred to as
- the "Product". The entire risk as to the results and
- performance of the Product is assumed by you. IDC will
- not be liable for any damages arising out of your use
- of, or misuse of the Product, including incidental or
- consequential damages and loss of profits, even if
- advised of the possibility of such damages. In
- particular, IDC shall not be liable for any loss of any
- programs or data or for the cost of recovering such
- programs or data. Your sole remedy under this Limited
- Warranty is to return the materials, all diskettes and
- documentation to IDC for replacement or refund.
-
- This Limited Warranty gives you specific legal rights.
- You may have other rights which vary from state to
- state. Some states do not allow the exclusion or
- limitation of incidental or consequential damages, so
- the above limitations or exclusions may not apply to
- you. Additionally, some states do not allow exclusions
- or limitations of implied warranties or limitations on
- how long any implied warranty lasts, so the above
- limitations may not apply to you.
-
- IDCCOM.EXE is a shareware program. IDCCOM.EXE is and
- will remain the property of IDC. This program may not
- be used in any connection with commercial ventures, nor
- as a sales aid, without the expressed written consent
- of the author. All rights are reserved.
-
-
-
-
-
-
- =================================================
-
- Page 1
-
-
-
-
-
-
- =================================================
-
-
- INFINITY DESIGN CONCEPTS LICENSE AGREEMENT
-
- What is purchased and Term of License Agreement
-
- The program and its related documentation are
- copyrighted. This license agreement gives your certain
- limited rights to use our Product. However, you do not
- become the owner of the Product. IDC retains title to
- all Products and all copies of Products, including
- partial copies. All rights not specifically granted are
- reserved by IDC. You have purchased a non-exclusive
- right to use the Product pursuant to the terms of this
- License Agreement. The License that you have acquired
- is effective until terminated on a breach by you of any
- of the terms and conditions of this License Agreement.
- On termination of this License, your right to use the
- Product ceases immediately.
-
- Permitted Uses
-
- You may use the Product on any one compatible computer
- that you own or use, using it on only one computer at a
- time. The License purchased by you to use the Product
- includes your personal use and use in your business or
- profession. Multiple user site licenses are available
- and have their own license terms.
-
- Uses Not Permitted
-
- You may not:
-
- 1. use the Product in a computer service business,
- network, timesharing, or multiple user arrangement
- unless each user is separately licensed by IDC;
- 2. modify or alter the Product or related materials;
- 3. translate, reverse engineer, decompile or
- disassemble the Product;
- 4. make copies of COMCFG.EXE or IDCSYS.EXE;
- 5. grant sublicenses,leases,or other rights in the
- Products to others;
- 6. remove or obscure any copyright,patent,trademark or
- other similar notices;
- 7. export or reexport the Product outside the United
- States without securing the proper authorization
- prior to such shipment.
-
-
-
-
- =================================================
-
- Page 2
-
-
-
-
-
-
- =================================================
-
-
- SINGLE PRICING
-
- Single copy of IDCCOM w/documentation on disk 50.00
- Postage and handling inside NORTH AMERICA 3.50
- Postage and handling OUTSIDE NORTH AMERICA 7.00
-
-
- SITE LICENSING
-
-
- If you plan on using IDCCOM(TM) in a corporation,
- government office, or for any business purpose
- whatsoever, registration is mandatory. Quantity
- discounts are available under a Site License agreement,
- described below.
-
- A single MASTER copy of IDCCOM and its documentation
- will be supplied on disk. The site license customer is
- responsible for printing the documentation and copying
- the disk for distribution. Backup copies of the MASTER
- disk are not counted toward the total copies of the
- site license.
-
- For all site licenses, the customer must appoint a
- single contact person, who shall be responsible for all
- contact with IDC. Should a problem occur, that person
- -- and only that person -- shall contact IDC to report
- the problem and arrange for its resolution. All product
- updates shall be forwarded to the contact person. When
- filling out the registration form, please specify the
- contact person's name and phone number to prevent any
- delay in updates and service.
-
-
- SITE LICENSE AND QUANTITY PRICING
-
- Quantity Discount
- --------------------------
- 11 - 20 5%
- 21 - 30 10%
- 41 - 50 20%
- 51 - 100 25%
- 101 - 200 30%
- 201 - 300 35%
- 301 - 500 40%
- 501+ 50%
-
-
-
- =================================================
-
- Page 3
-
-
-
-
-
-
- =================================================
-
-
- Documentation developed by IDC
- Principal writer: Gary Conway
-
-
- IDCCOM was developed and programmed entirely in
- assembler by Gary Conway and Shawn Merrick using
- the Microsoft MASM 5.1 package and the Norton
- Editor. The program is comprised of about 25
- different modules, representing over 60,000 lines
- of source code and many, many hours of writing,
- testing, debugging, arguing, sweating, cussing and
- listening. All libraries and all routines were
- developed internally by IDC. Some routines were
- developed in QuickBASIC or QuickC and then
- rewritten in assembly language.
-
- We at IDC would like to express our gratitude to
- Hayes Microcomputer products for their kind
- assistance and generosity in helping us develop
- IDCCOM for use with the HAYES 9600 bps modems.
-
- Information and all elements contained within this
- product are copyrighted and all rights are reserved
- by IDC.
-
- (c) 1990 INFINITY DESIGN CONCEPTS INC. ALL RIGHTS
- RESERVED
-
- Infinity Design Concepts, Inc.
- 1052 Parkway Drive
- Louisville, Kentucky 40217-2333
- (502) 636-1234
- CIS: 72657,3006
-
-
- NARC,IDC,IDCshell and IDCCOM are trademarks of
- Infinity Design Concepts Inc. IBM,IBM-PC, IBM-
- XT,IBM-AT,IBM-PS/2,Micro Channel Bus, and PC-DOS
- are trademarks of International Business Machines.
- MS-DOS is a trademark of Microsoft Corporation.
- Norton Editor is a trademark of Peter Norton
- Computing, Inc. CP/M is copyright Digital Research
- Inc. UNIX is a trademark of Bell Laboratories.
- Kaypro is a trademark of Kaypro Corporation. ALR is
- a trademark of Advanced Logic Research.
-
-
-
-
- =================================================
-
- Page 4
-
-
-
-
-
-
- =================================================
-
-
- FOREWORD
-
- In the ever advancing world of PC software, we have
- also seen ever advancing file sizes. This is easily
- understood from the standpoint that new and more
- advanced features tend to bloat filesize and all
- too many computer users accept this as a necessary
- evil and some just don't care at all.
-
- There are those who argue that along with the
- rampant increases in file sizes, we are also seeing
- increases in resource sizes; ram, hard disks, etc.
- While this is true, the fact remains that all too
- many software developers demonstrate a blatant
- disregard for customer resources. For example, how
- many communications packages are taking up over
- 200K on harddisks? IDCCOM is little more than 80K
- and has all of the same functions (if not more), in
- a fraction of the space.
-
- There can only be two answers to this question; 1.
- We at IDC are super intelligent extra-terrestial
- beings or 2. Some software developers are lazy.
- Well I can tell you with extreme accuracy that the
- first answer is wrong, so that leaves us with the
- second. The use of high level languages offers
- portability, but at the expense of resource space
- and execution speed.
-
- At IDC, we have made the decision that available
- resources and execution speed are more important
- than trying to generate sales in several operating
- environments. The only way to take full advantage
- of available resources and minimize execution
- times, is to write in assembler. There is no other
- language that even compares with the speed of
- assembler and the infinite number of options that
- assembler offers for flexibility. Many programmers
- actually fear assembler, but all software would
- benefit if all programmers had at least a working
- knowledge of assembly language.
-
- IDCCOM is an interrupt driven communications
- package for use on IBM PC and compatible computers.
- Video adapters supported include, MGA, CGA, EGA,
- VGA, MCGA and HERCULES adaptors. BPS rates of up to
- 19,200 bps are supported as well as any I/O port
- configuration.
-
- =================================================
-
- Page 5
-
-
-
-
-
-
- =================================================
-
-
-
- FEATURES AND BENEFITS OF IDCCOM
-
- o allows multiple phone directories
- o circular dialing cue via tagged phone numbers
- o capture mode will capture/filter our ANSI sequences
- o powerful picklist capabilities for uploads, downloads and
- deleting
- o SMALL and FAST (easy on your resources)
- o Microsoft and compatible mouse support
- o EGA/VGA color support
- o full featured BBS program, including
- multiple file areas
- multiple access levels
- log file with SYSOP error messages for debugging
- date sequenced log file
- automatic ANSI filtering (no need for two sets of
- bulletins and message files)
- message system uses a message database, as opposed
- to single files for each message as found in some
- BBS software
- This amounts to a HUGE savings in YOUR disk space
- o only ONE file needed to run the entire system !
- o self-configuring
- o V.42 support
- o ZIPVIEW (tm) BBS zip file viewer
- o SYSOP control program for registered SYSOPS
- o XMODEM, YMODEM, YMODEM-G, ZMODEM, MEGALINK, ASCII file
- transfer protocols are all built in and extremely robust,
- plus two external protocols of your own choosing
- o run NARC (tm) directly from IDCCOM to view/print/extract
- newly uploaded/downloaded zipfiles
- o run IDCSHELL (tm) directory from IDCCOM for full disk
- management and zipfile creation
- o COM 1 thru COM 4 support (completely configurable)
- o interrupt driven serial port access
- o HELP always available
- o pull down window, point and shoot command access
- o BPS rates thru 19200 BPS
- o SUPERIOR file transfer progress reporting, file size, time
- etc.
- o script file language
- o screen blanker
- o ANSI driver built in
- o Extremely robust HOST mode, will not leave your hard
- disk with fragmented clusters in the event of power
- outage or other common BBS type hangups
-
-
- =================================================
-
- Page 6
-
- =================================================
-
-
- INITIAL SETUP
-
-
- IDCCOM was designed to be the easiest and most
- forgiving of all the telecommunications software as
- far as initial setup. The first time the program is
- run, it walks you through the setup, showing every
- step of the way.
-
- WHAT YOU NEED TO HAVE HANDY WHEN RUNNING IDCCOM THE FIRST TIME
-
- 1. The COM port number that your modem is connected
- to. (See APPENDIX 4)
- 2. The maximum bps "baud" rate your modem supports.
- 3. Your modem initialization string. (See
- APPENDIX 1)
- 4. Your modem result codes. (See APPENDIX 2)
-
-
- BPS vs BAUD
-
-
- Among the MANY misnomers in the telecommunications
- community, BPS (bit per second) and BAUD (from
- J.M.E BAUDOT, inventor circa 1903) are two of the
- leaders in gross misuse and misunderstanding.
-
- BAUD is the number of SIGNALS sent per second.
-
- BPS is the number of BINARY DIGITS of data
- (represented as sound) per second.
-
- BPS is simply the data rate. For example, at 300bps
- (Bell 103 standard), BPS and BAUD are the same;
- there are 300 signals per second (BAUD) and 300
- bits per second (BPS). However, at 1200bps, via
- Bell 212A standard, there are two channels, each
- operating at 600 BAUD, but throughput is 2x600 =
- 1200 bps. For these reasons of accuracy, IDCCOM
- uses the term BPS rate, not BAUD, when referring to
- the modem and DTE/DCE speeds.
-
- For example, your modem is 1200/2400/4800/9600 BPS,
- not BAUD!
-
- DTE AND DCE
-
- DTE stands for DATA TERMINAL EQUIPMENT, which
- usually for BBSing, is the computer, e.g. the
- data terminal.
-
- DCE stands for DATA COMMUNICATIONS EQUIPMENT, which
- is most cases for BBSing, is the modem.
-
- =================================================
-
- Page 7
-
- =================================================
-
-
- INSTALLATION
-
-
- Installation of IDCCOM is a real snap compared to
- other communications packages. Simply create a
- directory for the files and copy all files into the
- directory. Change to that directory and type IDCCOM
- (ENTER) and the program will step you through the
- initial setup, creating all the necessary files.
- You may skip any of the steps without saving your
- data, but it is highly suggested that all necessary
- information be entered. This is particularly
- important if you want IDCCOM to perform correctly!
-
-
- The following assumes that the IDCCOM files are
- located on a diskette in A: drive and you wish to
- install the programs to C: drive. <ENTER> means
- that you should press the ENTER key on your
- keyboard.
-
- EXAMPLE SEQUENCE:
-
- A: <ENTER>
- MD C:\IDCCOM <ENTER>
- COPY A:*.* C:\IDCCOM <ENTER>
- C: <ENTER>
- CD \IDCCOM <ENTER>
- IDCCOM <ENTER>
-
-
- From here, you will simply follow the on screen
- prompts and fill in the appropriate information
- when requested. Don't be afraid to experiment, you
- cannot hurt anything!
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 8
-
- =================================================
-
-
- COMMAND AND TERMINAL MODES
-
-
- The first thing to note about IDCCOM is that there
- are two modes of operation; COMMAND MODE and
- TERMINAL MODE.
-
- TERMINAL MODE is the mode where you are "ON-LINE"
- and all characters sent to the screen
- are also sent to the modem. Also all
- characters that you type will be sent
- to the modem.
-
- COMMAND MODE is where commands may be issued to
- IDCCOM. The ESCAPE key toggles between
- command mode and terminal mode. In
- this mode, the pull down windows are
- on screen.
-
- When IDCCOM first comes up, you will be in terminal
- mode, that is, every character that you type, will
- also go to the modem and every character that comes
- from the modem will be displayed on the screen.
-
- You can get to command mode by pressing the ESCAPE
- key. The main pull down windows will be displayed
- and you may execute any of the functions by either
- navigating with the arrow keys, highlighting the
- desired command and pressing ENTER - OR- you may
- use the characters that are displayed in the square
- brackets in the windows as shortcut keys. Any time
- the menus are up (command mode), you may press any
- of the shortcut keys, no matter which window is
- currently pulled down.
-
-
- HELP ALWAYS AVAILABLE
-
-
- As with all IDC software, the F1 key is the help
- key and may be used just about anywhere in the
- program to invoke a help screen, that lists all of
- the commands available for the task at hand.
-
-
- EDITING USER INPUTS
-
-
- There are many times during the execution of
- IDCCOM, that you will be asked to enter textual
- responses. There are several editing commands
- available in all of the dialogue boxes.
- CONTROL-Y - erase entire line
-
- =================================================
-
- Page 9
-
- =================================================
-
-
- BACKSPACE - delete the character left of the
- cursor
- ESCAPE - abort the operation
-
- DIALING DIRECTORY
-
-
-
- The dialing directory can be invoked from command
- mode by pressing the "D" key, or by highlighting
- "directory" under the DIALING window and pressing
- ENTER. The dialing directory allows you to store up
- to 100 phone numbers, along with various other
- information, including;
-
- 1. total number of times called
- 2. total time on each system
- 3. last date and time called
- 4. password used for each system
- 5. default up/down load protocol
- 7. parity, data bits and stop bits
- 8. BPS rate
-
- You may also "tag" any or all of the entries.
- Tagged files are used when using the CIRCULAR
- DIALER command. Each tagged entry will be dialed in
- order, until a connect is made or until the opera
- tion is interrupted by the ESCAPE key.
-
-
-
- MODEM RESULT CODES
- (see also APPENDIX 2 - result codes)
-
- Modem result codes are a means for the computer and
- software to understand the current status of the
- modem and phone line. When the modem connects to a
- remote system, a result code is sent to the
- terminal, such as CONNECT 2400, or BUSY etc. It is
- important that the modem result codes and text be
- set up correctly for your modem. Most modems can be
- configured to send either NUMERIC or VERBOSE result
- codes. You may use either, but we recommend that
- you use the VERBOSE method, since it is easier to
- understand what CONNECT 1200 means, as opposed to a
- numeric value of "5", for example.
-
- When entering the modem result codes in IDCCOM,
- remember that you must enter the NUMERIC code
- first, then a comma, and then the VERBOSE text
- EXACTLY AS IT APPEARS IN YOUR MODEM MANUAL.
-
-
-
- =================================================
-
- Page 10
-
- =================================================
-
-
- MODEM STRINGS
- (see also APPENDIX 1 - modem strings)
-
- The modem init strings are used to set the modem up
- for specific operations. Note that some modems will
- not accept mixed case, that is AtdT, for example,
- consult your modem manual.
-
- INIT STRING is sent to the modem when IDCCOM is
- first invoked, or when you select the
- INITIALIZE MODEM command from the
- menus.
-
- (IMPORTANT NOTE: the modem must be set up to echo
- characters back to the computer,
- usually this is done with the E1
- command.)
-
- DIAL STRING is sent to the modem before dialing any
- phone numbers, it will usually be
- something like ATDT for tone dialing,
- or ATP for pulse dialing.
-
- HOST STRING is used to set up the HOST mode.
-
- HANGUP STRING is used just in case your system does
- not support the DTR signal. Normally,
- the preferred method for hanging up the
- modem is to drop the DTR signal for a
- specific length of time and that will
- cause the modem to disconnect from the
- phone line. In order for this to work,
- the cable between the computer and
- modem must have the DTR wire installed
- and the modem must be configured for
- DTR to be active. On HAYES and
- compatible modems, this is usually
- accomplished with the &D2 command. On
- systems where the &D2 command is not
- available, the hangup string will
- accomplish the same purpose.
-
- RESET STRING is used to reset the modem. It is sent
- when IDCCOM is first invoked and again
- after each call in HOST mode.
-
- FILE PATHS
-
- The file paths window lets you configure IDCCOM so
- that it knows where to find and/or place files. The
- paths that you configure here are stored in the
- PATHNAME FILE, where the default filename is
- IDCCOM.PTH in the current directory.
-
- =================================================
-
- Page 11
-
- =================================================
-
-
-
-
- PHONE DIRECTORY FILE
-
- This entry gives the name and optionally the
- directory where the phone directory file will be
- located. The default value here is IDCCOM.DIR.
-
- MACRO FILE
-
- This entry gives the name and optionally the
- directory where the macro key file is located. The
- default value here is IDCCOM.MAC.
-
- MODEM STRING FILE
-
- This entry gives the name and optionally the
- directory where the modem string file is located.
- The default value here is IDCCOM.MDM
-
- RECEIVE PATH
-
- This entry gives the subdirectory where files will
- be stored when they are received from a remote
- system, in either terminal or host mode.
-
- TRANSMIT PATH
-
- This entry gives the subdirectory where files are
- stored that are to be transmitted by IDCCOM.
-
- PATHNAME FILE
-
- This entry gives the name and optionally the
- directory where the paths will be stored. The
- default name is IDCCOM.PTH in the default
- directory.
-
- RESULT CODE FILE
-
- This entry gives the name and optionally the
- directory where the modem result codes will be
- stored. The default name is IDCCOM.RES.
-
- EDITOR PATHNAME
-
- This entry will tell IDCCOM where to find your
- editor. You must include the complete filename,
- e.g. C:\WS\WS.EXE
-
- IDCSHELL (tm)
-
- This entry will tell IDCCOM where to find IDCSHELL.
-
- =================================================
-
- Page 12
-
- =================================================
-
-
- You must include the complete filename, e.g.
- C:\IDC\IDCSHELL.EXE
-
-
- NARC (tm)
-
- This entry will tell IDCCOM where to find NARC. You
- must include the complete filename, e.g.
- C:\IDC\NARC.EXE
-
- ZIPVIEW (tm)
-
- This entry will tell IDCCOM where to find
- ZIPVIEW.EXE. You must include the complete
- filename, e.g. C:\IDC\ZIPVIEW.EXE.
-
-
-
- MACRO KEY DEFINITIONS
-
- IDCCOM allows configuring 10 macro keys, ALT-F1
- through ALT-F10. You may enter any text you like
- here. Note that to include a carriage return at the
- end of a string, you would insert the "|" character
- where you want the carriage return. Any control or
- ALT-xxx characters may also be used in macros.
-
- You may use any of the macro keys to send repeated
- strings of characters to the modem and to the
- screen. You might want to store your name, address
- and phone number here to make it easier when
- logging into new boards.
-
-
- NOTE ON SPECIAL CHARACTERS IN MACROS:
- The "|" character may be used in any macro
- key to send a carriage return character and
- the %P or %p characters may be used to cause
- the macro key to send the password for the
- currently dialed number. As a result, these
- characters may not appear anywhere else in
- your macro keys, as they will always be
- interpreted as described above.
-
-
- There is another macro key, F10, which sends the
- current password from the dialing directory for the
- number that was last dialed. This macro key is not
- configurable. Note that a carriage return is NOT
- automatically sent after this command.
-
-
-
-
- =================================================
-
- Page 13
-
- =================================================
-
-
- COMMAND LINE OPTIONS
-
- There are several options that may be used when
- invoking IDCCOM from the command line. These
- options provide information to IDCCOM for startup.
-
- The options:
-
-
- /Q - tells IDCCOM not to send modem init
- strings
- FILE.SCR - tells IDCCOM to start the script file
- named FILE.SCR immediately
-
-
- CAPTURE FILE
-
- The capture feature of IDCCOM allows capturing data
- that is received over the modem and storing that
- data to a file.
-
- The capture mode of IDCCOM is turned ON/OFF from
- the pull downs, or with the K key. When turning the
- capture mode ON, IDCCOM will display the default
- capture filename (IDCCOM.CAP) and ask you if you
- want to change it. If you answer YES, then IDCCOM
- will ask for the new filename. If the file already
- exists, then new captured data will be appended to
- the existing file.
-
- When capture mode is toggled OFF, IDCCOM will ask
- how you wish to dispose of the characters that were
- captured, as follows;
-
- PAUSE - pause the capture for resuming later
- SAVE - save the data to the specified file
- ERASE - erase all data in the capture buffer
- ESCAPE- disregard the toggle OFF command
-
- Note that capture has two modes, 1. capture all
- characters that are received, including ANSI
- sequences, or 2. filter out all ANSI sequences and
- capture only the text. This option is toggled from
- the pull downs or with the 3 key in COMMAND MODE.
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 14
-
- =================================================
-
-
- IDCCOM COMMANDS
- (short-cut keys)
-
- DIALING COMMANDS
-
- A - invokes IDCCOM's host mode and waits for calls
- D - brings up the dialing directory screen
- H - hangs up the modem by dropping DTR and sending the
- hangup string to the modem
- L - sends modem init string to the modem
- R - redial the last number dialed
- O - continuously dials all tagged phone numbers until a
- connection is made
-
-
- COMMUNICATION PARAMETERS
-
- B - toggles between all available BPS rates 300-19200
- S - toggles number of stop bits 1 or 2
- U - toggles duplex mode from HALF to FULL
- Y - toggle between all valid combinations of the above
- 0 - toggle between all available port numbers (1-4)
- 5 - toggle XON/XOFF software handshaking ON and OFF
- 6 - toggle RTS/CTS hardware handshaking ON and OFF
- 2 - toggle result mode between NUMERIC and VERBOSE
- 8 - toggle FORCED CARRIER (for direct connect)
-
- NOTE: the "8" command above, will toggle between a
- carrier active mode and a forced carrier mode. If
- you wish to connect two computers together
- directly, you can use a NULL-MODEM cable and toggle
- FORCED CARRIER ON, so that the software is fooled
- into thinking that carrier is present. See the
- section entitled "DIRECT CONNECTING TWO COMPUTERS
- WITHOUT MODEMS".
-
-
- EDIT MODEM STRINGS
-
- E - edit HOST MODE,DIAL,HANGUP and INIT strings for modem
- 7 - edit modem result codes
-
- FILE COMMANDS
-
- F2 - display files list of specified drive/path
- F3 - view a file w/PgUP,PgDn,Home,End and arrow keys
- F4 - send a file to the parallel printer LPT1:
- F6 - copy a file
- F7 - delete file(s) (with picklist)
- F9 - edit a file with your editor (set path in PATH screen)
-
-
-
-
- =================================================
-
- Page 15
-
- =================================================
-
-
- TRANSFER COMMANDS
-
- PGUP - invokes protocol selection menu for UPLOADING
- PGDN - invokes protocol selection menu for DOWNLOADING
-
-
- UPLOADING FILE(S)
-
- When uploading files is chosen with the PGUP key
- from terminal mode a window will pop up that shows
- all of the currently available transfer protocols.
- If you have made the call from the dialing
- directory or the circular dialer, then the
- highlight bar will be on the default protocol you
- have selected for that BBS. You may then select the
- protocol desired from the list by pressing ENTER.
-
-
- UPLOADING MULTIPLE FILES
-
- After the protocol has been selected, a dialogue
- box will appear asking for the filename(s) to
- upload. You may enter a filename or filenames
- separated by spaces. Each filename may be complete
- with drive and path, or a wildcard mask -OR- you
- may press the ENTER key (enter nothing) and a
- listing of files will be displayed where you may
- "tag" files that you wish to upload. The files that
- are displayed by default are those in your TRANSMIT
- directory (see the FILE PATHS) section. You may
- also then use the "D" command from the picklist and
- change drive/directory/filemask. The F1 key will
- display all commands that are available for the
- picklist.
-
-
- PICKLIST COMMANDS.
-
- F1 = display help screen
- H = display help screen
- ? = display help screen
- F6 = tag all entries
- F7 = invert tag status of all entries
- ESC = abort upload
- ENTER = tagging complete, proceed with upload
- SPACE = toggle tag status of current entry
- D = enter new drive/directory/mask
- T = tag current entry
- U = untag current entry
- W = enter wildcard filemask and tag all
- matching files
-
-
-
- =================================================
-
- Page 16
-
- =================================================
-
-
- You may also use the arrow keys, PGUP,PGDN,HOME and
- END keys for list navigation.
-
- The picklist will display the total number of
- tagged files, total number of tagged bytes and the
- estimated upload time at the current BPS rate.
-
- DOWNLOADING FILE(S)
-
- After selecting the download function with the PGDN
- key and selecting a protocol, depending on whether
- or not the protocol is a batch protocol or not, you
- will be asked for a filename for your machine. If
- the selected protocol is a batch transfer protocol
- (MEGALINK,YMODEM,ZMODEM etc.), then you will not be
- asked for a filename for your machine. All files
- that are downloaded will be sent to the default
- RECEIVE directory, unless a path is entered when
- you are asked for the filename, in which case, the
- path entered will be used as opposed to the default
- RECEIVE directory.
-
-
- EXTERNAL PROTOCOLS (EXTERN1 AND EXTERN2)
-
- IDCCOM provides a means for using external file
- transfer protocols, via two batch files.
- EXTERN1.BAT and EXTERN2.BAT. When one of these
- protocols is selected from the transfer window,
- IDCCOM executes the appropriate batch file.
- Arguments are passed to the batch files in the
- following order,
-
-
- %1 = BPS (300/1200/2400/4800/9600/19200)
- %2 = COMPORT (1-4)
- %3 = S or R (send or receive)
- %4 = download path (path or NOT USED)
- %5 - %9 = wildcard filename(s) to send or recv
-
- See EXTERN1.BAT and EXTERN2.BAT for examples of how
- to use the passed parameters.
-
- To set one of the batch files up for DSZ and the
- zmodem protocol, you would use the following.
-
- IF %3x=Rx GOTO RECEIVE
- REM must be sending
- DSZ port %2 speed %1 %3z %4 %5 %6 %7 %8 %9
- GOTO DONE
- :RECEIVE
- DSZ port %2 speed %1 %3z
- :DONE
-
- =================================================
-
- Page 17
-
- =================================================
-
-
-
-
- MISCELLANEOUS COMMANDS
-
- C - clear the screen
- F - view/edit IDCCOM PATHS
- (upload,dnload,idcshell,narc,zipview etc)
- I - execute IDCSHELL (path must be set up with "F"
- command)
- J - toggle auto-linefeed mode ON and OFF
- M - view/edit macro key assignments
- N - execute NARC (path must be set up with "F"
- command)
- V - display version of IDCCOM
- X - exit IDCCOM
- 4 - toggle between 25 and 43 or 50 line screen
- modes
- G - start the timer
- K - toggle capture mode ON and OFF
- P - toggle printer echo ON and OFF
- T - show elapsed time since timer was started with
- "G" command
- 3 - toggle ANSI capture ON and OFF
- Z - ZIPVIEW (tm)
- F5 - shell to DOS
- F8 - show serial base port address and Int #
- F10 - send current password stored in phone
- directory for the number just dialed
-
- SCRIPT FILES
-
- (NOT SUPPORTED IN SHAREWARE VERSION)
-
- IDCCOM supports script files and a script file
- language that make logging onto boards somewhat
- easier. When you create an entry in the dialing
- directory, you may also specify the name of the
- script file that you wish to have associated with
- that entry. When the number for the entry is
- dialed, the script file will be read automatically
- and the instructions in the file will be executed.
- The default file extension for the script files
- is .SCR, but you may override this by including any
- extension that you wish when you create/edit the
- dialing directory entry. For a listing of the
- supported script language commands, see APPENDIX 5.
-
- The script file itself, is merely a text file that
- you may create with any text editor. You would then
- write in the commands that you want executed when
- the script file is run. We have supplied several
- example script files with the IDCCOM package, so
- you may want to refer to those files in conjunction
-
- =================================================
-
- Page 18
-
- =================================================
-
-
- with APPENDIX 5 to see just how to set one up.
-
- A script file may also be supplied on the command
- line when IDCCOM is invoked,
-
- IDCCOM HOST.SCR
-
- This would cause the HOST script file to be
- executed when IDCCOM loads.
-
- NOTE that the ESC key will abort a script in
- progress.
-
-
-
- FILE COMMANDS
-
- VIEW FILE
-
- This command will ask for a filename to view and
- then display the file on the screen a page at a
- time. Movement through the file is accomplished
- with the standard editing keys, Home, End, PgUp,
- PgDn and the arrow keys (or the mouse). The end the
- view, simply press ESCAPE.
-
- EDIT FILE
-
- The edit command will call YOUR editor. In order
- for IDCCOM to locate your editor, you must set the
- correct path with the FILE PATHS command.
-
-
- LIST DIRECTORY
-
- The list directory command will ask for a filemask,
- you may enter a complete drive:\path\filespec or by
- simply pressing ENTER will display all files in the
- current directory.
-
-
- DELETE FILE(S)
-
- The delete file command will ask for a filename and
- then delete it. You may enter a complete
- drive:\path\filespec.
-
- You may optionally press the ENTER key without
- entering a filename and the picklist will appear.
- You may then tag files that you want to delete.
- Pressing ESCAPE will abort without deleting any
- files.
-
-
- =================================================
-
- Page 19
-
- =================================================
-
-
- COPY FILE
-
- The copy file command will ask for a filename to
- copy and a destination drive:\path\filename.
-
-
- RUNNING IDCSHELL (tm)
-
- IDCshell may be executed directly from IDCCOM with
- the "I" command or by highlighting IDCSHELL in the
- MISC window. In order for IDCCOM to find IDCSHELL,
- you must set the correct path with the FILE PATHS
- command.
-
- RUNNING NARC (tm)
-
- NARC may be executed directly from IDCCOM (great
- for viewing those ZIP files after you download!).
- In order for IDCCOM to find NARC, you must set the
- correct path with the FILE PATHS command.
-
-
-
- MOUSE SUPPORT
-
- As with all IDC software, mouse support is provid
- ed. If a mouse driver is detected, IDCCOM will
- invoke the mouse support system. The left mouse
- button emulates the ENTER key and the right mouse
- button emulates the ESCAPE key and mouse movement
- emulates the arrow keys. Any mouse that adheres to
- the MICROSOFT MOUSE STANDARDS will work.
-
-
- EGA/VGA SUPPORT
-
- Users with EGA or VGA video cards can take advan
- tage of 43 screen lines in EGA mode or 50 lines in
- VGA. From COMMAND MODE, press the "4" key or high
- light the selection under the MISC window and press
- ENTER. If an EGA or VGA card is detected, the video
- mode will be toggled between 25 and 43/50 line
- modes. Note that if you exit the program in 43/50
- line mode, then IDCCOM will remember this the next
- time the program is executed and return to the same
- mode.
-
- When IDCCOM is invoked, it saves the current video
- mode and resets this same mode when the program is
- exited.
-
-
-
-
- =================================================
-
- Page 20
-
- =================================================
-
-
- DIRECT CONNECTING TWO COMPUTERS WITHOUT MODEMS
-
- IDCCOM will allow you to connect two computers
- together without the use of modems via a NULL modem
- cable. This feature is very painless to use. Simply
- FORCE CARRIER with the "8" command or from the pull
- down windows and connect the computers serial ports
- together through a NULL modem cable. You may then
- transfer files very easily and quickly with the
- picklist windows available from the upload window.
-
-
- FILES USED BY IDCCOM
-
-
-
- FILES USED BOTH IN TERMINAL AND HOST MODE
-
- Files created automatically by IDCCOM
-
- IDCCOM.DIR - phone directory file
- IDCCOM.MAC - keyboard macros
- IDCCOM.PTH - paths for files
- IDCCOM.MDM - modem strings
- IDCCOM.RES - modem result codes
- IDCCOM.CAP - capture file
-
-
- HOST MODE FILES
-
- Files created/modified/used by SYSOP
-
-
- ANSI screens
-
- LOGONSCR.BBS - main welcome screen at logon
- MAINMENU.BBS - main menu for host mode
- IDCCOM.HLP - caller command help screen
- FIRSTCAL.BBS - help file displayed to first time
- callers
- FILES.BBS - directory listing file (one for each
- directory)
- PROTOCOL.BBS - show available transfer protocols
- PROTOCOL.HLP - help file, describing transfer
- protocols
- IDCDOOR.MNU - menu file for door system
- BULLET.MNU - bulletin system menu
- MESSAGE.HLP - ANSI help file for message system
- LOGOFF.BBS - ANSI file displayed at user logoff
- BULLETxx - bulletin xx file (00-99)
-
- Plain text files
-
-
- =================================================
-
- Page 21
-
- =================================================
-
-
- IDCCOM.LVL - user level/function mapping file
- IDCCOM.FDR - user level/directory mapping file
- IDCCOM.DOR - user level/door mapping file
- IDCDOORx.BAT - doors 0-9 execute via batch files
- ZVIEW.BAT - batch file to run ZIPVIEW
- DOSSHELL.BAT - batch file for executing DOS shell
-
- Files created automatically by IDCCOM
-
- IDCCOM.MSG - message base file
- IDCCOM.HDR - message file index
- IDCCOM.USR - caller file, all callers to system
- IDCCOM.LOG - host mode caller activity log
- NEWUSERS.BBS - names of those who have answered
- sign on questionnaire in host mode
-
- External files
-
- ZIPVIEW.EXE - IDC's door program for viewing
- zipfiles online
- IDCSHELL.EXE - IDC's DOS shell and zipfile builder
- NARC.EXE - IDC's zip/arc file extractor,viewer
- etc.
- REDIRECT.SYS - serial device driver for local echo
- for sysop during external doors/shell
- to dos
- COMSAVE.EXE - program which saves IDCCOM
- configuration to separate file,
- IDCCOM.CFG
- COMREST.EXE - program which reads IDCCOM.CFG file
- and restores IDCCOM'S configuration
- FILTANSI.EXE - program which will display an ANSI
- file, filtering out any ANSI
- sequences. Particularly useful to the
- SYSOP when building the host mode
- menu, bulletin and help files.
- ROLLDATE.COM - TSR that will change the DOS date at
- midnight on XT,AT, PCjr and PS/2 class
- machines (necessary since the DOS time
- will roll over at midnight, but not
- the DOS date)
-
-
- You may set the following text files up so that
- they may not be aborted with CONTROL-C or CONTROL-K
- by inserting a CONTROL-T character as the FIRST
- character on the FIRST LINE of the file.
-
- LOGONSCR.BBS
- IDCCOM.HLP
- MAINMENU.BBS
- FILES.BBS
- PROTOCOL.BBS
-
- =================================================
-
- Page 22
-
- =================================================
-
-
- IDCDOOR.MNU
- BULLET.MNU
- BULLETxx
- LOGOFF.BBS
- MESSAGE.HLP
- FIRSTCAL.BBS
-
- You may also insert a "More" message at any point
- in any of the above files by inserting a CONTROL-E
- in the file where the more prompt is desired.
-
-
-
-
- HOST MODE
-
- The host mode included with IDCCOM is a complete
- BBS system. Included is password protected logon,
- user time limits, user call limits, validation
- procedures, access levels, multiple file
- directories, help and a bulletin system.
-
- UNIQUE FEATURES OF HOST MODE
-
- One of the several unique features of host mode is
- the ability of using single files for the menus,
- help screens, files screens and bulletins. Some BBS
- software forces the SYSOP to maintain two sets of
- files for the above information, one for ANSI and
- one for NON-ANSI, however, IDCCOM needs only a
- single ANSI set. When a user logs on and chooses
- NON-ANSI, then the files are stripped of their ANSI
- sequences before they are displayed.
-
- Another excellent feature for the SYSOP,
- particularly at setup time, is the IDCCOM.LOG file
- and the error messages that are entered there for
- the SYSOP. When errors are encountered processing
- critical files such as IDCCOM.LVL (access level
- file) and IDCCOM.FDR (file directory access mapping
- file), then an entry is made in the IDCCOM.LOG file
- that describes the error, shows the offending
- filename and shows the offending line in that file.
-
- A running log file "IDCCOM.LOG" is created and logs
- all caller activity. The IDCCOM.LOG file is an
- ASCII file that may be edited with any word
- processor. Entries are made in this file that
- describe log on/off time, transferred files and
- error messages for initial setup debugging and
- functions performed or denied.
-
-
-
- =================================================
-
- Page 23
-
- =================================================
-
-
- AUTOLOGOFF
-
- If a caller stays on line for more than 5 minutes
- and no characters are received, the system assumes
- the caller has fallen asleep and is automatically
- logged off. The system will then reset and wait for
- the next caller. An appropriate message is entered
- in the IDCCOM.LOG file.
-
- LOGGING ON
-
- The IDCCOM logon sequence allows for protocol
- negotiation when connecting MNP to NON-MNP modems.
- This is accomplished by inserting a 10 second pause
- after carrier is detected. If the caller presses
- the ENTER key, then the pause is bypassed and the
- logon sequence is begun, or the logon is
- automatically begun in 10 seconds. This 10 second
- period allows for the negotiation strings to be
- ignored in the case of MNP to NON-MNP modem
- connections. When IDCCOM answers the phone, it will
- ask the caller if his system can display ANSI
- graphics. If the answer is yes, then all menus and
- bulletins that have been drawn in ANSI will be
- displayed in ANSI. If the caller answers no, then
- ANSI sequences will be filtered out of the menu,
- bulletin, help and directory files before they are
- sent to the modem.
-
- New callers will be asked for name, address, phone,
- city, state and zip before proceeding. This
- information is then written to the NEWUSERS.BBS
- file, which can then be used to automatically
- validate callers with the IDCSYS program.
-
- TWO MINUTE WARNING
-
- When the caller is within two minutes of expiring
- his daily time limit, a bell and a two minute
- warning message will be displayed.
-
- THE ANSI DRIVER
-
- IDCCOM has a complete ANSI driver built in so there
- is no need to load ANSI.SYS in the CONFIG.SYS file.
- This is done to avoid having callers send ANSI
- sequences which may be destructive to the host
- system, key remapping, for example. For a complete
- listing of the supported ANSI sequences, see
- APPENDIX 3.
-
-
-
-
- =================================================
-
- Page 24
-
- =================================================
-
-
- DOS DATE
-
- Since DOS rolls the time ONLY over at midnight, the
- DATE is left behind. Since IDCCOM relies on the DOS
- date for user call limits, it is necessary that the
- date always be correct. In order to overcome this
- shortcoming of DOS, we have supplied a TSR program
- called ROLLDATE.COM, simply have it execute at boot
- from your AUTOEXEC.BAT file.
-
-
- HOST MODE COMMANDS
-
- F - file finder, locates a file in any directory
- that caller has available for his access level
-
- P - page sysop. Allows caller to page the sysop for
- a chat, if callers access level permits
-
- M - message system. Allows user to enter message
- system, if messages are available for his
- access level
-
- B - bulletin system. Displays BULLET.MNU file
- and caller may then select BULLETxx file for
- display
-
- U - upload file(s). If callers access level permits
-
- D - download file(s). If callers access level
- permits
-
- C - change directory. Allows user to enter any
- directory that is available for his access
- level
-
- L - list files. Displays FILES.BBS file in current
- directory.
-
- H - displays IDCCOM.HLP file
-
- A - toggle ANSI graphics on and off
-
- X - toggle expert mode on and off. When ON, the
- IDCCOM.MNU file will be displayed after each
- command
-
- T - type file. Allows caller to type files to the
- screen in the current directory, if his access
- level permits
-
- Z - execute ZIPVIEW (tm). If callers access level
- permits, ZIPVIEW allows viewing the contents of
-
- =================================================
-
- Page 25
-
- =================================================
-
-
- zip files
-
- G - goodbye, hangup, end session
-
- S - shell to DOS. Allows caller access to DOS on
- the local system if his access level permits.
- This command is available to SYSOPS (A access
- level) by default.
-
- O - DOOR system, if caller has access. The
- IDCCOM.DOR file is used to map caller access
- levels to the DOORS. The IDCDOOR.MNU file is
- displayed and users can select the door to
- enter. IDCDOORx.BAT files are used to execute
- each of the doors mapped by the IDCCOM.DOR
- file.
- HOST MODE DIRECTORIES
-
- The host mode allows using many subdirectories.
- Each subdirectory is assigned an access level (or
- levels) that is the required minimum for access to
- that directory. When a caller first logs on to the
- system, he will be in the MAIN directory. This
- directory is defined in the FILE PATHS section
- under the TRANSMIT directory. This directory will
- always be available to all callers, however, their
- upload, download and viewing access will be limited
- by their access level assignment.
-
- Other directories can be set up using the
- IDCCOM.FDR file (see that section in the manual).
- Once a caller changes directory (assuming his
- access level permits this function), all file
- activities will take place in that directory.
-
-
- IDCCOM.LVL file
-
-
- The host mode requires that the SYSOP establish
- access levels for each caller. This can be
- automated using the IDCCOM.LVL file. There are 26
- levels of access that may be used, represented by
- the letters A-Z, with A being the highest level of
- access and Z the lowest. Note that if lower case
- letters are used in the IDCCOM.LVL file, they are
- automatically converted to upper case.
-
- The A level is permanently set to SYSOP level and
- may not be changed. The A level is reserved and any
- caller with an A level has access to the complete
- system, including the DOS shell, so give this level
- out sparingly and only to trusted friends.
-
- =================================================
-
- Page 26
-
- =================================================
-
-
-
- This file is used in host mode to determine the
- access levels and the functions that are allowed
- for each level. Each line defines an access level
- and the allowed functions for that level. For
- example:
-
- [N] DN,UP,TF
-
- This would allow all users with an "N" access level
- access to DOWNLOADS, UPLOADS and TYPE FILE
- functions. Access levels may range from A-Z. IDCCOM
- does not distinguish between upper and lower case,
- therefore either may be used. The functions
- definable for access levels are,
-
-
- DO - DOS shell access allowed
- UP - uploads allowed
- DN - downloads allowed
- MS - allowed to read and send messages
- FI - files display access
- CH - chat function access
- ZV - ZIPVIEW (tm) access
- TF - type file function access
- CD - change directory access
- FF - find file
- DR - door system access
- BU - bulletin system access
- PR - create private mail
-
- There are two entries that have special meaning and
- are formatted a little bit differently than as
- explained above.
-
- [X] VALID (4,60) UP,DN,MS,FI,CH,ZV,TF
- [Z] NEW (2,30) MS,CH,TF
-
- Notice the two keywords VALID and NEW. These are
- used to tell IDCCOM what access level to associate
- with NEW callers and VALIDated callers. If these
- two entries are not found in the IDCCOM.LVL file,
- then they are set as shown above by default.
-
- Note also, that the "A" access level is reserved
- for SYSOPS and ALWAYS has access to ALL functions,
- including DOS and the access attributes for this
- level are fixed and will not be changed by the
- IDCCOM.LVL file.
-
-
-
-
-
- =================================================
-
- Page 27
-
- =================================================
-
-
- EXAMPLE FILE:
-
- ; this is a comment line
- ' this is also a comment line
- * this is another comment line
- [C] (4,60) UP,DN,TF,MS,CH,ZV
- [D] (2,60) UP,DN,DO
- [M] VALID (2,20) UP,DN,MS
- [X] NEW (1,15) MS,CH,TF
-
- IDCCOM.FDR file
-
-
- This file created by the SYSOP to map access levels
- to specific file directories. Each access level may
- have its own special directories for files. IDCCOM
- is set up in a hierarchical fashion, such that all
- B access level callers have access to all
- directories that have C-Z access callers have, all
- G level callers have access to H-Z, etc.
-
- The format for each line in the file is as follows;
-
-
- [ACCESS_LEVEL] [DESCRIPTION] [FULL_PATH_NAME]
-
- Comments are also allowed in this file, with the
- same syntax as in the IDCCOM.LVL file. See the
- IDCCOM.FDR file for more information and examples.
-
- An example file might be,
-
- [B] [GENERAL UTILS] [F:\UTILITIES]
- [Z] [GENERAL FILES] [F:\IDCCOM\GENERAL]
-
- These lines would assign specific directories to
- callers with access level B and Z. Note that these
- assignments represent the MINIMUM access level
- required to gain access to the directory, i.e. all
- B level callers will not only have access to
- F:\UTILITIES but will also have access to
- F:\IDCCOM\GENERAL. You can make a given directory
- private to any given access level by inserting an
- equal sign after the access level. For example,
-
- [Z=] [GENERAL FILES] [F:\IDCCOM\GENERAL]
-
- This line will allow ONLY Z level callers access to
- the F:\IDCCOM\GENERAL directory.
-
- Note that the SYSOP (level A) always has full
- access to all directories (even those with the
- equal sign).
-
- =================================================
-
- Page 28
-
- =================================================
-
-
-
-
- SETTING UP HOST MODE
-
-
- The host mode provided with IDCCOM is extremely
- flexible in its setup. You can spend some time and
- really get it tweaked to perfection, or you can run
- it immediately out of the box with little or no
- setup. The choice is yours depending on what your
- intended use of the BBS system is.
-
- One of the many aids that IDCCOM provides in
- setting up the host mode is error messages written
- to the IDCCOM.LOG file when errors are encountered
- during debugging the initial setup or when errors
- actually occur during host mode online operation.
- When these errors occur using the IDCCOM.FDR and
- IDCCOM.LVL files (see their sections in the
- manual), not only the error message is written to
- the log file, but also the offending line so you
- may easily see just why the error occurred.
-
-
- The following files are supplied as samples with
- the IDCCOM package and may be used as is, but you
- will probably want to change the text and/or colors
- in some of them.
-
-
- LOGONSCR.BBS - host mode welcome file (sign on screen)
- MAINMENU.BBS - main menu file
- IDCCOM.HLP - caller command help screen
- PROTOCOL.BBS - show available transfer protocols
- LOGOFF.BBS - logon screen
- MESSAGE.HLP - message system help file
-
- These two files must be setup to match your system.
- See the sections in the manual on setting up these
- files and examine the files themselves for
- examples.
-
- IDCCOM.LVL - user level/function mapping file
- IDCCOM.FDR - user level/directory mapping file
-
- When setting up the file directories, you should
- first establish how many access levels you will
- need. For example, the SYSOP will have level A, a
- new caller might have level Z, a validated caller
- might have level X and a trusted friend might have
- level B. Translating this for the IDCCOM.LVL file,
- we might have,
-
-
- =================================================
-
- Page 29
-
- =================================================
-
-
-
- [B] (5,100) DN,UP,FI,CH,CD,TF,MS
- [X] VALID (4,60) DN,UP,FI,CH,CD,TF,MS
- [Z] NEW (2,30) CH,MS
-
- The first line establishes the parameters and
- functions available for level B callers. The B
- level caller will have 5 calls per day for a total
- of 100 minutes per day. He can download, upload,
- chat, list files, change directories, type files
- and enter messages.
-
- You may establish as many as 26 access levels,
- ranging from A to Z inclusive. If you are going to
- have multiple file directories, then you will also
- need to set up the IDCCOM.FDR file. This file
- establishes which directories a given caller has
- access to. Each directory is given a minimum access
- level that is required to gain access. For example,
-
-
- [B] [For friends only] [F:\DOS]
- [X] [Validated callers] [F:\IDCCOM\UTILS]
-
- This mapping context will allow callers with an X
- access level, access to the F:\IDCCOM\UTILS
- directory on disk. They may TYPE FILES, LIST FILES
- and DOWNLOAD files from this directory when online.
-
- The B level callers, will have access to the F:\DOS
- directory AS WELL AS access to all levels below it.
- In this case the F:\IDCCOM\UTILS directory also.
- Note that there is one exception to this and that
- is the following case,
-
- [D=] [Special friends] [F:\SYSTEM]
-
- If this line is added to the lines above, then ONLY
- level D callers will have access to the F:\SYSTEM
- directory, the B level users will not.
-
- Note, however, that the SYSOP (A level) callers
- will always have access to every directory.
-
- You will also want to make sure that your ANSWER
- MODE string is set, see the MODEM STRINGS section.
-
-
- To make HOST mode fully automatic, you will want to
- set up the AUTOEXEC.BAT file so that IDCCOM is
- executed at boot time and include the REDIRECT.SYS
- driver in your CONFIG.SYS file. We also highly
- recommend that you set up the AUTOEXEC.BAT file so
-
- =================================================
-
- Page 30
-
- =================================================
-
-
- that it runs CHKDSK each time it boots. This can be
- done with full automation using the YESNO program
- from IDC located in the IDCUTILS package. Notice
- that the /F option is included in the CHKDSK line
- below and that usually CHKDSK will wait for a Y or
- N answer. Since this is not desirable since the
- SYSOP will more than likely not be present when the
- system is forced to reboot, this line must be
- automated to feed the necessary response to CHKDSK.
- The YESNO program does just that. This step will
- eliminate any lockups and/or disk fragmentation
- that might occur if the board is interrupted by a
- power outage at a critical time.
-
- SAMPLE AUTOEXEC.BAT file:
-
- ECHO OFF
- CLS
- REM YESNO.COM is located in the IDCUTILS package
- REM the next line will run chkdsk and fix and lost
- REM clusters automatically
- YESNO "Y" 13 | CHKDSK /F
- REM next, install the midnight rollover function
- ROLLDATE
- CD\IDCCOM
- IDCCOM HOST.SCR
-
-
- SAMPLE CONFIG.SYS file for COM1:
-
- SHELL=C:\COMMAND.COM C:\ /P
- BREAK=OFF
- DEVICE=REDIRECT.SYS 1
- FILES=20
- BUFFERS=15
-
- NOTE: the HOST.SCR file contains a single line
- consisting of the word HOST
-
-
- IDCCOM.DOR file
-
- This file is used to map door numbers to
- descriptions. These descriptions are displayed to
- the host mode caller when the "O" OPEN DOOR command
- is issued online.
-
- The format for the file is,
-
- [ACCESS LEVEL] [DESCRIPTION] [DOOR NUMBER]
-
- For complete information on the format of the file,
- see the IDCCOM.DOR file on the disk. For full
-
- =================================================
-
- Page 31
-
- =================================================
-
-
- information about the DOORS system, see the DOOR
- SYSTEM FOR HOST MODE section.
-
-
- USING THE REDIRECT.SYS driver
-
-
- The REDIRECT driver is a serial port driver that
- can be used in host mode so that whenever a caller
- is shelled to dos, running ZIPVIEW or some other
- external program, the SYSOP will be able to
- visually monitor the callers activities.
-
- Normally, when the caller executes an external
- program, the SYSOP is virtually cutoff from what is
- happening on his system, since the external program
- controls all input and output and since all I/O has
- been redirected by the invoking batch file via a
- CTTY COMx command, the I/O events are not displayed
- on the local screen, only on the callers screen.
-
- REDIRECT.SYS sets up a logical device named IDCDOS.
- IDCDOS intercepts all I/O and makes sure that all
- modem activity is echoed to the local screen. Note
- that the SYSOP can use the F1 key to terminate a
- call at any time when the REDIRECT driver is
- active.
-
- SEE THE REDIRECT.DOC FILE FOR COMPLETE INSTRUCTIONS
-
- SCREEN BLANKER
-
- When host mode is initiated, the screen blanker is
- automatically hooked into the timer tick interrupt.
- After 5 minutes of inactivity, that is, no local
- keyboard activity and no calls received, the screen
- will blank.
-
- If the space bar is pressed, the screen is restored
- and the screen blanker is reset.
-
-
- DOOR SYSTEM FOR HOST MODE
-
- The door system allows the sysop to offer external
- programs for the callers to run. The doors are
- configured with the IDCCOM.DOR file. See that file
- for complete instructions on the format of the
- file.
-
- IDCCOM supports up to 10 doors (0-9) and each door
- may be assigned a minimum access level, just as
- with the file directories.
-
- =================================================
-
- Page 32
-
- =================================================
-
-
-
-
- WATCHDOG TIMER -
-
-
- Whenever a door is opened, ZIPVIEW is run or a
- shell to dos is performed in host mode by a REMOTE
- caller (not the SYSOP), a watchdog timer is invoked
- that monitors the callers time on the system and
- the carrier detect signal.
-
-
- The watchdog timer is activated when,
-
- 1. host mode is not in local test mode
- 2. a DOOR is opened
- 3. caller shells to DOS
- 4. ZIPVIEW
-
-
- The watchdog timer reboots the computer IFF
-
- 1. host mode is NOT in local test mode
- 2. the CARRIER signal is lost
- 3. the callers time limit expires
-
-
- In order to take full advantage of the watchdog
- system, the AUTOEXEC.BAT file should be set up to
- load and execute IDCCOM in host mode automatically,
- using a script file.
-
-
-
- MESSAGE SYSTEM
-
- IDCCOM stores all messages in the IDCCOM.MSG file
- and uses the IDCCOM.HDR file as an index into the
- message database, unlike some other software that
- uses separate files for each message. The database
- approach is much more compact and less wasteful of
- your valuable disk resources, since even a 1 byte
- file takes up at least 1k and as much as 16k of
- disk space, depending on cluster size on your
- disks. When DOS stores a file on your disk, it
- allocates a minimum of 1 cluster to the file. The
- IDC program DISK.EXE (IDCUTILS package) can be used
- to see what your cluster size is.
-
- In the message section, the user may read messages,
- answer messages, check for mail, scan the messages,
- reply to a message or go directly to a message by
- entering the message number.
-
- =================================================
-
- Page 33
-
- =================================================
-
-
-
- IDCCOM will remember the last message read and
- automatically start reading messages there the next
- time the caller logs in.
-
-
- HOST MODE LOG FILE
-
- Each time a call is received, a entry is made in
- the IDCCOM.LOG file, giving the callers name,
- password (attempts), time, date and files
- uploaded/downloaded and how he logged off.
-
- Entries are also made in the log file that describe
- any serious disk errors that occurred during upload
- or download. This same message is displayed for the
- caller when it occurs, but the log entry is made
- anyway so that the SYSOP can see visually exactly
- what was transpiring when the error occurred.
-
-
- SYSOP FUNCTIONS
-
-
- NOTE: SYSOP function keys are only available at the
- MAIN MENU prompt, except CTRL-X, which is always
- available.
-
-
- The CTRL-H key combination displays all of the
- SYSOP control functions available when a caller is
- online. Note that the SYSOP functions only work on
- the local terminal and are not available to call
- ers. The registered version of IDCCOM comes with
- IDCSYS.EXE which is a program that allows the SYSOP
- to validate, ban, delete, set call and time limits
- or update callers records. The shareware version of
- the program only allows validation while the caller
- is online. The online SYSOP functions are;
-
- CTRL-H - display list of available SYSOP
- commands
- CTRL-X - terminate caller immediately and hangup
- CTRL-V - validate current caller
- CTRL-S - display caller statistics
- CTRL-R - reset callers time to 0
- CTRL-L - toggle printer echo ON/OFF
- CTRL-P - SYSOP initiated chat mode
- CTRL-Z - end chat
-
- Note that none of the output from the SYSOP
- functions is echoed to the modem, so that these
- functions are invisible to the caller, with the
-
- =================================================
-
- Page 34
-
- =================================================
-
-
- exception of the validation function, which informs
- the caller of his new status.
-
-
- IDCSYS - SYSOP PROGRAM
-
- (NOT INCLUDED IN SHAREWARE VERSION)
-
- The sysop control program allows the sysop to
- monitor and change user statistics for the HOST
- mode. Users may be added, updated, edited, deleted,
- validated and globally validated from the
- NEWUSERS.BBS file automatically.
-
- The IDCSYS program allows automatic validation of
- all callers who have filled out the validation
- questionnaire.
-
- Users access levels, calls per day, daily time
- limit, password, name, address, city, state, zip,
- phone, banned and deleted status may all be edited
- with the IDCSYS program. Message base maintenance
- functions are also provided, such as viewing,
- deleting and packing messages from the message
- database.
-
-
- TRANSFER PROTOCOLS
-
- IDCCOM supports all of the current major protocols,
- including true YMODEM. The transfer protocols that
- have been implemented in some cases by some of the
- current telecommunications software, unfortunately,
- do not adhere to the standards set forth by the
- protocol authors. This creates many problems in the
- BBS community, simply because some software authors
- do not bother to do their homework, because, it
- certainly is not due to a lack of documentation.
-
- There are those programs that call XMODEM 1K,
- YMODEM, which is certainly incorrect. IDCCOM does
- not perpetuate these myths and uses the correct
- naming conventions. There are some implementations
- of XMODEM that do not know how to differentiate
- between XMODEM CHECKSUM and XMODEM CRC and some
- YMODEMS that do not fall back to 128 block size,
- giving a greatly bloated filesize after the
- transfer. These same implementations of YMODEM also
- do not include the filesize in the header, also
- giving erroneous filesizes.
-
- IDCCOM adheres very rigidly to the specifications
- laid down by the protocol authors, Ward Christensen
-
- =================================================
-
- Page 35
-
- =================================================
-
-
- and Chuck Forsberg. No other authors names are
- listed, because most of the newer protocols are
- merely derivatives of the originals and the
- differences are so slight, that the number of
- protocols we have today has become ridiculous.
- IDC's transfer algorithms are robust and exhibit
- very fast error recovery and response times.
-
- To reiterate the major guidelines for YMODEM, the
- following is an excerpt from YMODEM.DOC by Chuck
- Forsberg.
-
- "YMODEM Refers to the XMODEM/CRC (optional 1k
- blocks) protocol with batch transmission as
- described below. In a nutshell, YMODEM means
- BATCH.
-
-
- YMODEM MINIMUM REQUIREMENTS
-
- All programs claiming to support YMODEM must meet
- the following MINIMUM requirements:
- + The sending program shall send the pathname (file
- name) in block 0.
-
- + The pathname shall be a null terminated ASCII
- string as described below.
-
- + The receiving program shall use this pathname for
- the received file name, unless explicitly
- overridden.
-
- + The sending program shall use CRC-16 in response
- to a "C" pathname nak, otherwise use 8 bit
- checksum.
-
- + The receiving program must accept any mixture of
- 128 and 1024 byte blocks within each file it
- receives. Sending programs may switch between
- 1024 and 128 byte blocks at the end of file(s),
- and when the frequency of retransmissions so
- suggests.
-
- + The sending program must not change the length of
- an unacknowledged block.
-
- + At the end of each file, the sending program
- shall send EOT up to ten times until it receives
- an ACK character. (This is part of the XMODEM
- spec.)
-
- + The end of a transfer session shall be signified
- by a null (empty) pathname.
-
- =================================================
-
- Page 36
-
- =================================================
-
-
-
- Programs not meeting all of these requirements are
- not YMODEM compatible, and shall not be described
- as supporting YMODEM.
-
- Meeting these MINIMUM requirements does not
- guarantee reliable file transfers under stress.
- Particular attention is called to XMODEM's single
- character supervisory messages that are easily
- corrupted by transmission errors."
-
-
-
- XMODEM CHECKSUM, CRC and 1K
-
- XMODEM CHECKSUM, the first modem transfer protocol,
- uses 128 byte packets, a three byte header and a
- single byte checksum after the data packet. The
- header begins with an SOH character, followed by
- the packet number and compliment. After each packet
- is sent, the sender waits for an ACK or NAK from
- the receiver and will either resend the packet (if
- NAKed) or send the next packet.
-
- The protocol is determined by the receiver. If the
- receiver sends an initial NAK (transmitter should
- check for several for robustness), then XMODEM
- CHECKSUM should be engaged by the transmitter. If
- the receiver sends an initial "C" then the
- transmitter should engage CRC error checking and
- send a two byte CRC, instead of the single byte
- checksum after the data packet.
-
- If the receiver opens with "CK", then the
- transmitter should engage CRC and 1k packets and
- use the STX character to signal the start of
- packet instead of the SOH character. IDCCOM follows
- very strictly the protocol specification laid down
- in YMODEM.DOC, which is a conglomeration of
- information from the protocol authors.
-
- YMODEM and YMODEM-G
-
- This protocol is very similar to XMODEM 1K and
- often confused with it. The packet size is 1K (like
- XMODEM 1K), but has a first packet size of 128
- bytes for the header packet. The header contains
- the file name, file size, file date/time, mode and
- serial number. All error checking is done via CRC16
- and if too many errors occur, the protocol will
- drop back to 128 byte packets. The protocol is
- inherently a batch protocol with the end of batch
- being signaled by a 128 byte packet with NUL data.
-
- =================================================
-
- Page 37
-
- =================================================
-
-
- After each packet is sent, the transmitter clears
- the line and waits for an ACK or NAK.
-
- YMODEM-G is essentially the same as YMODEM, except
- that the whole file is sent before the transmitter
- looks for any status information from the receiver
- and no filename header packet is sent. No resending
- of packets is done, therefore this protocol is very
- prone to errors and should only be used on MNP or
- other error correcting modems (which it was
- designed for). YMODEM-G BATCH is also the same,
- except the opening filename packet is sent just as
- in the normal YMODEM. The YMODEM-G protocols
- require hardware handshaking, e.g. that CTS/RTS be
- active.
-
- ASCII
-
- This is not really a protocol at all, but merely a
- way of sending ASCII data. XON/XOFF handshaking is
- used and files may be transferred in a batch mode.
- Note that IDCCOM incorporates ASCII batch transfers
- via multiple wildcard filenames on the command line
- or via the picklist.
-
- MEGALINK
-
- This protocol was developed by Paul Meiners of GT
- fame. MEGALINK is network friendly and all
- necessary characters are "folded" so as not to
- interfere with telenetworks. The protocol resembles
- YMODEM BATCH to a great extent with a few
- significant improvements. An opening header is sent
- that includes the filename, filesize, filedate, CRC
- version and sending programs name. The packet size
- is 512 bytes.
-
- MEGALINK is also a batch oriented protocol. Ini
- tially, the protocol sends a single packet and
- requests status from the receiver. If enough
- packets are sent without error, then the protocol
- enables a STREAM mode, where several packets are
- sent before the transmitter requests status. This
- is a very nice protocol with, however, two
- shortcomings. First, if the receiver detects that a
- file already exists, it does not notify the
- transmitter, it simply aborts and waits for the
- transmitter to time-out (very kludgey) and second,
- the CRC-32 is mathematically inaccurate.
- Preconditioning is incorrect and postconditioning
- is not done at all.
-
-
-
- =================================================
-
- Page 38
-
- =================================================
-
-
- ZMODEM
-
- The ZMODEM protocol was developed for the public
- domain by Chuck Forsberg of Omen Technology under a
- contract with TELENET.
-
- ZMODEM is a batch oriented transfer protocol that
- supports a conversational mode between the
- transmitter and receiver and allows for differences
- in implementations to be negotiated. All data is
- checked via CRC computations and network support is
- provided throughout.
-
- A ZMODEM session is initiated by the transmitter,
- which differs from most protocols where the session
- is initiated by the receiver. Feature negotiation
- is handled by exchanging FRAMES of varying types,
- whereby the transmitter and receiver can inform
- each other of their needs and capabilities, such as
- control character escaping, buffer sizes, CRC32
- capabilities and more.
-
- A simple transfer session is depicted below,
-
- TRANSMITTER RECEIVER
-
- "rz",CR
- ZRQINIT
- ZRINIT
- ZFILE
- ZRPOS
- ZDATA
- ZEOF
- ZRINIT
- ZFIN
- ZFIN
- OO
-
- The transmitter sends the ASCII string, "rz" and a
- carriage return, followed by the ZRQINIT frame to
- get the receiver started. The receiver responds
- with a ZRINIT frame that describes its
- capabilities. The transmitter then sends a ZFILE
- frame with the filename, size, date, mode, serial
- number, files remaining and number of bytes
- remaining to be sent.
-
- The receiver will then respond with a ZRPOS frame,
- which tells the transmitter where to start in the
- file, usually at the first byte, but the receiver
- may specify any location within the file. This
- sequence provides a mechanism whereby ZMODEM can
- pickup where it left off in an aborted file
-
- =================================================
-
- Page 39
-
- =================================================
-
-
- transfer.
-
- The transmitter will then send the data and a ZEOF
- frame. The receiver will then respond with an error
- or a ZRINIT frame.
-
- Once the file has been transferred successfully,
- the transmitter sends a ZFIN frame and expects a
- ZFIN frame back from the receiver. If this is the
- last file being sent, the transmitter sends the
- "OO" characters for "Over and Out".
-
-
- This is a very simple example of a ZMODEM transfer
- and there are other events that may complicate
- matters greatly, for example, the receiver may send
- a ZCHALLENGE frame that contains a random number,
- expecting the transmitter to echo this number in a
- ZACK frame. This mechanism allows the receiver to
- be assured that there is a valid transmitting
- program on the other end.
-
- ZMODEM also allows for ZCOMMAND and ZCOMPL frames
- that permit the transmitter to issue instructions
- to the receiver.
-
-
- For a complete discussion of the ZMODEM protocol,
- see the ZMODEM.DOC file that comes with DSZ.EXE.
-
-
- CRC/CHECKSUM ERROR CHECKING
-
-
- Anyone who has done any file transfers via modem
- has undoubtedly seen line noise and transfer
- errors. This is reasonable, since phone lines run
- all over, are located outside and are thus
- susceptible to lightning strikes, power glitches,
- channel interference, signal fading, atmospheric
- conditions and other phenomenon that add a degree
- of nervousness to file transfers.
-
- For these reasons, it is essential that transfer
- protocols concern themselves with transmission
- errors. The first popular transfer protocol was
- XMODEM and made use of CHECKSUM error checking.
- With checksum, the transmitter merely adds all of
- the bytes in the packet (ignoring overflow) and
- sends this sum to the receiver as the checksum
- byte. The receiver then adds all of the bytes in
- the received packet (again ignoring overflow) and
- tests to make sure this sum matches that sent by
-
- =================================================
-
- Page 40
-
- =================================================
-
-
- the transmitter. If they do not match, the receiver
- NAK's the packet and the transmitter resends the
- packet.
-
- Since checksum is merely the addition of all the
- bytes in the packet, it is easy to see how errors
- could still slip by. For example, the numbers 2,4,6
- add up to 12, however, so do, 8,1,3 as do
- other combinations. For a packet size of 128 bytes,
- there are many combinations that will yield the
- same checksum, only one of which will be correct,
- but the receiver will take any of the combinations
- as correct.
-
- It is apparent, then that a great number of errors
- go undetected with checksum error checking and a
- better method was needed. The CRC algorithms were a
- natural here. CRC or cyclic redundancy check will
- catch the following errors,
-
- * all one or two bit errors
- * all odd numbers of bit errors
- * all burst errors less than or equal to the
- degree of the polynomial used
- * most burst errors greater than the degree
- of the polynomial used
-
- In a system using CRC, the message sent is
- considered to be a binary polynomial M(X). In
- XMODEM this is a 1024 bit polynomial, where each
- bit is viewed as a coefficient. The message
- polynomial M(X) is multiplied by X^k and then
- divided by an arbitrary generator polynomial G(X)
- of degree k, which results in a quotient Q(X) and a
- remainder R(X)/G(X).
-
- X^k * M(X) R(X)
- ---------- = Q(X) + ------
- G(X) G(X)
-
- rearranging modulo-2 and recognizing that addition
- and subtraction are equivalent operations in
- binary, we find,
-
- X^k * M(X) + R(X) = Q(X) * G(X)
-
- The transmitter appends the CRC to the message,
- M(X) + R(X) and the receiver multiplies this by X^k
- and because of the above equation, this result is
- evenly divisible by the generator polynomial. If
- the division results in a zero answer, then it is
- assumed no errors have occurred, however, a non-
- zero answer indicates an error has occurred.
-
- =================================================
-
- Page 41
-
- =================================================
-
-
-
- The CRC-16 algorithm used in XMODEM CRC treats the
- entire data packet as an integer, 128 bytes times 8
- bits = 1024 bits. This 1024 bit integer is then
- multiplied by X^k or 2^16 (65536) and divided by
- the CRC polynomial, which is X^16 + X^12 + X^5 + 1
- or 65536 + 4096 + 32 + 1 = 69665 for the CRC-16
- used in xmodem. This is the SDLC(IBM,CCIT)
- polynomial.
-
-
- HALF/FULL DUPLEX
-
- There has been much confusion on the matter of half
- and full duplex in telecommunications. Perhaps an
- example will help clear this up.
-
- There are really three categories for data
- communications, SIMPLEX, HALF-DUPLEX and FULL-
- DUPLEX.
-
-
- SIMPLEX Like your local radio station,
- you can listen, but you cannot
- talk
-
- HALF-DUPLEX Like two walkie-talkies, only
- one person may speak at a time
-
- FULL-DUPLEX Like a telephone, both parties
- may speak at the same time
-
- In modeming, FULL DUPLEX mode means that the local
- terminal sends all characters to the modem and
- depends on the modem or the remote computer to ECHO
- the characters back so they will be displayed
- locally.
-
- In HALF DUPLEX mode, the local terminal does not
- expect an echo from the remote system, therefore
- the local terminal must display the characters
- itself.
-
-
- HARDWARE AND SOFTWARE HANDSHAKING RTS/CTS XON/XOFF
-
-
- When performing communications via modem, some way
- must be provided for the modems and computers to
- tell each other when they are busy and when they
- are free to send or receive data. This is what is
- known as "handshaking". If the computer wants to
- send data to the modem but the modem is not ready
-
- =================================================
-
- Page 42
-
- =================================================
-
-
- because it is busy doing something else, like
- sending the last character, the computer must make
- sure that the modem is ready to accept the next
- character of data, or data will be lost. The
- computer does this by checking the signal on one of
- the wires going between the modem and computer.
-
- When the signal is "HIGH", then the modem is
- telling the computer that it is CLEAR TO SEND DATA,
- or CTS for short. The computer can also tell the
- modem that is would like to send data to it by
- making the REQUEST TO SEND (or RTS) line "HIGH".
- With this mechanism, we have a method by which the
- computer equipment (DTE) and the modem equipment
- (DCE) can exchange data.
-
- This method is called HARDWARE HANDSHAKING
- (RTS/CTS), that is physical wires and chips are
- used to control the passing of data. Another method
- of accomplishing the same thing is called SOFTWARE
- HANDSHAKING. In this case, no wires or chips are
- involved all handshaking signals are handled by the
- software. This is usually the case in BBS work,
- however, with the faster modems becoming more
- readily available, we are seeing more and more need
- for the hardware handshaking method.
-
- With the 9600 bps V.42, X.25 and MNP modems, where
- computer to modem speed (DTE to DCE speed) can be
- 19200 bps, it is essential that the hardware
- RTS/CTS methods of flow control be implemented. In
- these cases, the computer is speaking to the modem
- at 19200 bps and the modem is compressing the data
- and speaking to the other modem across the phone
- line at 9600 bps, but throughput tends to look more
- like the phone line connection was actually made at
- 19200 bps.
-
-
- RTS/CTS flow control must also be implemented when
- using any of the non-error checking transfer
- protocols such as YMODEM-G.
-
- In order to make use of the RTS/CTS handshaking,
- your modem must be capable of using the signals,
- your computer must be capable of using the signals
- and the computer to modem cable must have all of
- the wires needed (very many cables do not!).
-
- In IDCCOM, the XON/XOFF and RTS/CTS handshaking
- protocols are implemented and can be either turned
- on or off from the parameters menu.
-
-
- =================================================
-
- Page 43
-
- =================================================
-
-
-
-
- COMPUTER TO MODEM SIGNALS
-
- There are many wires that connect the modem to the
- computer and each of them has a distinct name or
- mnemonic assigned by the IEEE standard RS-232C
- interface specification. Following is a brief
- explanation of these signals to help you better
- understand the complex events in
- telecommunications.
-
-
- TXD - transmit data line
-
- This wire is the one where data is transmitted from
- the computer to the modem
-
- RXD - receive data line
-
- This wire is the one where data is received by the
- computer from the modem
-
- RTS - request to send
-
- This wire is used by the computer to signal the
- modem that it wants to send data
-
- CTS - clear to send
-
- This wire is used by the modem to signal the
- computer that it is not busy and the computer may
- send its data
-
- DSR - data set ready
-
- This wire is used by the modem to signal the
- computer that the modem is ready to operate. Note
- that some cables and/or some ports do not support
- this pin
-
- DCD - data carrier detect
-
- This wire is the signal from the modem to the
- computer that tells the computer whether or not a
- carrier signal is present on the phone line
-
- DTR - data terminal ready
-
- This wire is a signal from the computer to the
- modem and the modem can be configured to respond by
- hanging up the phone
-
-
- =================================================
-
- Page 44
-
- =================================================
-
-
- RI - ring indicator
-
- This wire is a signal from the modem to the
- computer saying that a ring has been detected on
- the phone line
-
-
- COMCFG - CONFIGURATION PROGRAM
-
- (NOT INCLUDED IN SHAREWARE VERSION)
-
- The COMCFG program allows changing colors, mouse
- sensitivity, video write method and sound ON/OFF.
- In order to run COMCFG, it must be in the same
- directory as IDCCOM.EXE and the two programs must
- have the same version numbers.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 45
-
- =================================================
-
-
- APPENDIX 1 - modem init strings
-
- Blank spaces may be included in any of the modem
- strings as they will be ignored by the modem,
- however you must be careful not to overflow the
- modem's buffer, otherwise the command may be
- ignored by the modem. Note that some modems (HAYES,
- for example) require that case may not be mixed in
- commands, e.g. "aT" is not acceptable, it must be
- "AT" or "at".
-
-
- Suggested INIT strings for the following modems
-
- 1. ZOOM MX2400 bps modems
- 2. PRACTICAL PERIPHERALS PM2400
- ==============================================================
-
- AT&D2 S11=55 S10=6 S9=1 E1
-
- NOTE: you may use up to 40 characters on the ZOOM modems.
-
- AT - gets attention of modem
- &D2 - follow DTR signal (for hangup)
- S11=55 - sets speed of touchtone dialing (in msec.)
- S10=6 - carrier loss to hangup delay (how fast modem
- hangs up once it has lost carrier
- S9=1 - how fast the modem will detect carrier
- E1 - enable character echo in command mode
-
-
-
- HAYES 9600 bps including V.42 and X.25 products
- ===============================================================
-
- NOTE: you may use up to 255 characters on the HAYES 9600
- bps modems
-
- AT&C1&D2 S11=55 S10=6 S9=1 W1E1
- AT - gets attention of modem
- &C1 - monitor CARRIER DETECT
- &D2 - hang up when DTR drops
- S11=55 - sets speed of touchtone dialing (in msec.)
- S10=6 - carrier loss to hangup delay
- S9=1 - how fast the modem will detect carrier
- W1 - shows DTE/DCE speed negotiation progress
- messages
- E1 - enable character echo in command mode
-
-
-
-
-
-
- =================================================
-
- Page 46
-
- =================================================
-
-
- ANCHOR VOLKSMODEM 1200
- ===============================================================
-
- ATZV0Q0E0S0=0
-
- AT - gets attention of modem
- Z - reset modem (very helpful on this modem)
- V1 - send result codes as text strings
- Q0 - send result codes
- E1 - command echo on
- S0=0 - disable automatic answer function
-
-
-
- EVEREX EV-920 1200
- ===============================================================
-
- ATX2 S11=55 S10=6 S9=1
-
- NOTE: you may use up to 40 characters on the ZOOM modems.
-
- AT - gets attention of modem
- X2 - turn on ALL result codes
- S11=55 - sets speed of touchtone dialing (in msec.)
- S10=6 - carrier loss to hangup delay (how fast modem
- hangs up once it has lost carrier
- S9=1 - how fast the modem will detect carrier
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 47
-
- =================================================
-
-
- APPENDIX 2 - modem result codes
-
- The following result codes fit the following
- modems;
-
- 1. ZOOM MX2400
- 2. PRACTICAL PERIPHERALS PM2400
-
- numeric verbose
- 0 OK
- 1 CONNECT
- 2 RING
- 3 NO CARRIER
- 4 ERROR
- 5 CONNECT 1200
- 6 NO DIALTONE
- 7 BUSY
- 8 NO ANSWER
- 10 CONNECT 2400
-
-
- HAYES 9600 result codes
-
- numeric verbose
- 0 OK
- 1 CONNECT
- 2 RING
- 3 NO CARRIER
- 4 ERROR
- 5 CONNECT 1200
- 6 NO DIALTONE
- 7 BUSY
- 8 NO ANSWER
- 10 CONNECT 2400
- 11 CONNECT 4800
- 12 CONNECT 9600
- 14 CONNECT 19200
- 40 CARRIER 300
- 46 CARRIER 1200
- 47 CARRIER 2400
- 48 CARRIER 4800
- 50 CARRIER 9600
- 70 PROTOCOL:NONE
- 71 PROTOCOL:ERROR-CONTROL/LAP-B
- 72 PROTOCOL:ERROR-CONTROL/LAP-B/HDX
- 73 PROTOCOL:ERROR-CONTROL/AFT
-
-
-
-
-
-
-
-
- =================================================
-
- Page 48
-
- =================================================
-
-
- ANCHOR VOLKSMODEM 1200 result codes
-
- numeric verbose
- 0 OK
- 1 CONNECT
- 2 RING
- 3 BUSY
- 3 NO CARRIER
- 4 ERROR
- 5 CONNECT 1200
-
-
- EVEREX EV-920 - 1200 bps result codes
- (must use X2 command for full result codes)
-
- numeric verbose
- 0 OK
- 1 CONNECT
- 2 RING
- 3 NO CARRIER
- 4 ERROR
- 5 CONNECT 1200
- 6 NO TONE
- 7 BUSY
- 9 PHONE OFF-HOOK
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 49
-
- =================================================
-
-
- APPENDIX 3 - ANSI sequences supported
-
-
-
- ESC [ n A - cursor up n lines
- ESC [ n B - cursor down n lines
- ESC [ n C - cursor right n columns
- ESC [ n D - cursor left n columns
- ESC [ row;col f - cursor position
- ESC [ f - home cursor
- ESC [ row;col H - cursor position
- ESC [ H - home cursor
- ESC [ J - erase from cursor to end of screen
- ESC [ 1 J - erase from beginning of screen to cursor
- ESC [ 2 J - erase screen, home cursor
- ESC [ K - erase from cursor to end of line
- ESC [ 1 K - erase from beginning of line to cursor
- ESC [ 2 K - erase line
- ESC [ m - turn off all attributes
- ESC [ atr;atr m - set color attributes
- ESC [ s - save cursor position
- ESC [ u - restore cursor position
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 50
-
- =================================================
-
-
- APPENDIX 4 - COM ports and interrupt lines (IRQ)
-
-
- IDCCOM uses the "standard" port settings depicted in the
- following table. Note that the port numbers are given in
- hexadecimal (as they are listed in the manuals).
-
-
- Port I/O PORT ADDRESS STANDARD IRQ NUMBER
- ------ ---------------- -------------------
- 1 3F8-3FF IRQ4
- 2 2F8-2FF IRQ3
- 3 3E8-3EF IRQ4
- 4 2E8-2EF IRQ3
-
-
- Alternate port numbers for some serial cards;
-
- x 2E0-2E7
-
-
- The PS/2 class machines provide COM 3 and COM 4 support
- at the following port numbers;
-
- 3 3220 IRQ3
- 4 3228 IRQ3
-
-
- When installing serial cards in your machine, you must
- ensure that no two ports have the same number. Serial
- ports are used by MIDI interface cards, internal modem
- cards, mouse cards, serial printers and external modems.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 51
-
- =================================================
-
-
- APPENDIX 5 - script file language
-
-
- The script file itself may be made up of any of the
- following commands. Blank lines are ignored. Tabs
- and spaces may be used throughout for spacing
- purposes.
-
-
- ; - a comment line
- * - a comment line
- ' - a comment line
- :label - define labels (just
- like .BAT files)
- ALARM - sounds klaxxon alarm and
- waits for a keypress
- BEEP - make a beep
- CAPTURE ON/OFF - toggle capture mode ON/OFF
- CAPFILE <filename> - specify filename for
- capture file
- CD <directory> - change disk directories
- CLEAR - clear the screen
- CYCLE - repeat execution of the
- current script file
- DIAL <555-1212> - dial a specified phone
- number
- PHONEDIR <###> - dial "number" entry in the
- phone directory
- ECHO ON/OFF - turns echo of all script
- commands to local screen
- on or off. (used
- primarily for debugging
- scripts) Note that using
- this command without any
- arguments, e.g. ECHO
- toggles the echo flag
- EXIT - hangup and exit IDCCOM
- FLUSH - flush any serial chars in
- buffer
- FORMFEED - send a formfeed to the
- printer
- KBFLUSH - flush local keyboard
-
- MACRO n - send a macro key n, where
- 1 ¢≤ n ≤ 10
- MACRO 1 - sends macro key 1
- MACRO F10 - sends macro key 10
- MACRO 1O - sends macro key 10
-
- GOTO label - goto the label
- HANGUP - hangup the modem
- HOST - enter host mode
- IFCD goto label - if carrier is detected,
-
- =================================================
-
- Page 52
-
- =================================================
-
-
- then goto label
- IFNOTCD goto label - if carrier is not detect
- ed, then goto label
- PRINT ON/OFF - turns printer echo ON and
- OFF
- PAUSE nnn - wait for a "n" seconds and
- proceed. Maximum pause is
- 255 seconds. Anything
- larger will be converted
- modulo 256
- QUIT - exit from script
- RECV <protocol file(s) - send file(s) (see XMIT
- below)
-
- NOTE: for SEND and SENDLN you may also give "$PW" as
- an argument and the password from the current
- directory entry will be sent. Note that you must have
- used the PHONEDIR command prior to this so that the
- password will be set up.
-
- SEND "text" - send "text" to modem and
- local
- SENDLN "text" - send "text" to modem and
- add carriage return and
- local echo
- SENDCTRL char - send a control character
- to modem
- SET <baud n81 port n> - set modem parameters
- WAITFOR "text" - wait for "text" to be
- received from modem
- WAITTIME nn - set max time for WAITFOR
- routine (59 seconds max)
- WRITE "text" - send "text" to local
- screen only
- WRITELN "text" - send "text" to local
- screen only w/cr,lf
- XMIT <protocol file(s)> - send "files" via protocol.
- Use mnemonics for
- protocols, e.g. YB XM,
- same as IDCCOM
-
- NOTE: all <text> is to be enclosed in " or '
- characters label names are limited to 10 characters.
- If names longer than 10 characters are used, only the
- first 10 will be read.
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 53
-
- =================================================
-
-
- SENDING AND RECEIVING FILES IN SCRIPT FILES
-
- Mnemonics to be used with the XMIT and RECV functions
- are as follows. The command line syntax is
-
- XMIT -xx fubar.txt fubar.doc
- Where xx is one of the following;
-
- "XC" ; xmodem CRC
- "XM" ; xmodem checksum
- "XK" ; xmodem 1K
- "YB" ; ymodem
- "YG" ; ymodem-G
- "GB" ; ymodem-G batch
- "ML" ; megalink
- "ZM" ; zmodem
- "AS" ; Ascii
- "E1" ; external 1
- "E2" ; external 2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 54
-
- =================================================
-
-
- APPENDIX 6 - acknowledgements
-
- The following are excellent references for the
- specifications for the file transfer protocols. We
- have found them to be accurate sources for the
- specifications, rules and operating considerations of
- the transfer protocols.
-
- YMODEM.DOC - Chuck Forsberg, incl. excerpts from
- Ward C.
- MEGALINK.DOC - Paul Meiners
- ZMODEM.DOC - Chuck Forsberg
-
- Many thanks to Keith Petersen for his kind assistance
- and suggestions and for running Royal Oaks for mega-
- years.
-
- Many thanks to Ward Christensen for being so
- generous, ingenious and timely (although cryptic).
-
- Many thanks to Charles Taylor, for his undying
- affluence in locating bugs and incinerating bad
- ideas.
-
- Many thanks to Curt Edwards, as always, an endless
- source of good ideas and working insight.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- =================================================
-
- Page 55
-
- =================================================
-
-
- INDEX
-
- ACK, 36, 37, 38
- Acknowledgements, 5, 55
- Allocates, 33
- ALR, 4
- ANCHOR, 5, 47, 49
- ANSI, 3, 5, 6, 14, 18, 21, 22, 23, 24, 25, 50
- AOPA, 2
- Appended, 14
- Archive, 3
- ASCII, 5, 6, 23, 36, 38, 39, 54
- Assembler, 4, 5
- ATX, 47
- AUTOEXEC, 25, 30, 31, 33
- AUTOLOGOFF, 24
- Automation, 31
- Auto-linefeed, 18
-
- BAUD, 4, 7, 53
- BAUDOT, 7
- Board, 31
- Boot, 25, 30
- Boots, 31
- BPS, 4, 5, 6, 7, 10, 15, 17, 43, 46, 49
- BREAK, 31
- BUFFERS, 31
- Building, 22
- Bulletin, 21, 22, 23, 24, 25, 27
- Bulletins, 6, 23, 24
- BULLETxx, 21, 23, 25
-
- CAPFILE, 52
- CAPTURE, 4, 6, 14, 18, 21, 52
- Captured, 14
- Capturing, 14
- CCIT, 42
- CD, 8, 27, 30, 31, 52
- CFG, 22
- CGA, 5
- CHECKSUM, 5, 35, 36, 37, 40, 41, 54
- Chips, 43
- CHKDSK, 31
- Christensen, 35, 55
- CLS, 31
- Color, 6, 50
- Colors, 29, 45
- COM, 5, 6, 7, 22, 25, 31, 51
- COMCFG, 3, 5, 2, 45
- COMPORT, 17
- COMREST, 3, 22
- COMSAVE, 3, 22
- COMx, 32
-
- =================================================
-
- Page 56
-
- =================================================
-
-
- CONFIG, 24, 30, 31
- Confusion, 42
- CONNECTING, 4, 15, 21, 24
- Connections, 24
- Consisting, 31
- CONTROL-C, 22
- CONTROL-E, 23
- CONTROL-K, 22
- CONTROL-T, 22
- CONTROL-Y, 9
- Conway, 1, 4
- Copyright, 1, 2, 4
- CRC, 5, 35, 36, 37, 38, 39, 40, 41, 42, 54
- CTRL-H, 34
- CTRL-L, 34
- CTRL-P, 34
- CTRL-R, 34
- CTRL-S, 34
- CTRL-V, 34
- CTRL-X, 34
- CTRL-Z, 34
- CTS, 5, 15, 38, 42, 43, 44
- CTTY, 32
-
- DCD, 44
- DCE, 4, 7, 43, 46
- Denied, 23
- DIAL, 11, 15, 52
- DIALER, 10, 16
- DIALING, 4, 6, 10, 11, 13, 15, 16, 18, 46, 47
- DIALTONE, 48
- DIRECT, 4, 15, 21
- Disconnect, 11
- Dispose, 14
- Dnload, 18
- DOOR, 5, 21, 22, 26, 27, 31, 32, 33
- Doors, 22, 26, 32
- DOR, 5, 22, 26, 31, 32
- DOS, 18, 22, 25, 26, 27, 30, 32, 33
- DOSSHELL, 22
- Download, 17, 20, 25, 26, 30, 34
- Downloaded, 6, 17, 34
- DOWNLOADING, 16, 17
- Downloads, 6, 27
- Downs, 14
- DR, 27
- Drop, 11, 37
- DSR, 44
- DSZ, 17, 40
- DTE, 4, 7, 43, 46
- DTR, 11, 15, 44, 46
- DUPLEX, 5, 15, 42
-
-
- =================================================
-
- Page 57
-
- =================================================
-
-
- EDIT, 4, 15, 18, 19
- Edwards, 55
- EGA, 4, 5, 6, 20
- EOT, 36
- ERROR-CONTROL, 48
- ESC, 16, 19, 50
- ESCAPE, 9, 10, 14, 19, 20
- EV, 5, 47, 49
- EVEREX, 5, 47, 49
- Executing, 22
- EXTERN, 17
-
- FAST-TELECOMMUNICATIONS, 1
- FDR, 4, 22, 23, 26, 28, 29, 30
- FILTANSI, 3, 22
- FIRSTCAL, 21, 23
- Flow, 43
- Folded, 38
- Fooled, 15
- FORCE, 21
- FORCED, 15, 31
- Fraction, 5
- Fragmentation, 31
- FULL-DUPLEX, 42
-
- GOTO, 17, 52, 53
-
- HALF, 5, 15, 42
- HALF-DUPLEX, 42
- Handling, 3
- HANGUP, 11, 15, 26, 34, 46, 47, 52
- HDR, 22, 33
- HDX, 48
- Help, 3, 4, 6, 9, 16, 21, 22, 23, 24, 29, 42, 44
- HERCULES, 5
- Hierarchical, 28
- HLP, 21, 22, 23, 25, 29
- HOST, 4, 5, 6, 11, 12, 15, 19, 21, 22, 23, 24, 25, 26,
- 27, 29, 30, 31, 32, 33, 34, 35, 52
- H-Z, 28
-
- IDCDOORx, 22, 26
- IDCDOS, 32
- IDCSHELL, 4, 6, 12, 13, 18, 20, 22
- IDCSYS, 3, 5, 2, 24, 34, 35
- IDCUTILS, 31, 33
- IEEE, 2, 44
- IFCD, 52
- IFF, 33
- IFNOTCD, 53
-
- JJ, 18
-
-
- =================================================
-
- Page 58
-
- =================================================
-
-
- Kaypro, 4
- Kentucky, 1, 2, 3, 4
- KSPE, 2
-
- LICENSE, 4, 2, 3
- LICENSING, 4, 3
- LOGOFF, 21, 23, 29
- LOGONSCR, 21, 22, 29
-
- MAC, 12, 21
- MACRO, 4, 12, 13, 18, 52
- Macros, 13, 21
- MAINMENU, 21, 22, 29
- Maintenance, 35
- MASM, 4
- MCGA, 5
- MD, 8
- MDM, 12, 21
- Mega, 55
- MEGALINK, 5, 6, 17, 38, 54, 55
- Meiners, 38, 55
- Merrick, 1, 4
- MGA, 5
- MIDI, 51
- Midnight, 22, 25, 31
- ML, 54
- MNP, 24, 38, 43
- MNU, 21, 23, 25, 26
- Modeming, 42
- Modem's, 46
-
- NARC, 4, 6, 13, 18, 20, 22
- Network, 2, 38, 39
- NEWUSERS, 22, 24, 35
- Non-ANSI, 3, 23
- NON-MNP, 24
- NORTH, 3
- Norton, 4
- NSPE, 2
- NUL, 37
- NULL, 21, 36
- NULL-MODEM, 15
- NUMERIC, 10, 15, 48, 49
-
- Oaks, 55
- OFF-HOOK, 49
- ON-LINE, 9
- Option, 14, 31
- Overcome, 25
-
- Packet, 37, 38, 40, 41, 42
- Packets, 37, 38
- Packing, 35
-
- =================================================
-
- Page 59
-
- =================================================
-
-
- PARAMETERS, 4, 15, 17, 30, 43, 53
- Parity, 10
- Password, 10, 13, 18, 23, 34, 35, 53
- PATH, 12, 15, 16, 17, 18, 19, 20, 28
- PAUSE, 14, 24, 53
- PCjr, 22
- Petersen, 55
- PgDn, 15, 16, 17, 19
- PgUP, 15, 16, 17, 19
- PHONEDIR, 52, 53
- Picklist, 4, 6, 15, 16, 17, 19, 21, 38
- PRICING, 4, 3
- Protocol, 10, 16, 17, 21, 22, 24, 29, 35, 36, 37, 38,
- 39, 40, 48, 53
- PROTOCOLS, 5, 6, 16, 17, 21, 29, 35, 36, 38, 39, 40, 43,
- 53, 55
- PTH, 11, 12, 21
-
- QuickBASIC, 4
- QuickC, 4
- QUIT, 53
-
- Radio, 42
- Ram, 5
- Reboot, 31
- Reboots, 33
- RECEIVE, 12, 17, 42, 44
- REM, 17, 31
- RES, 12, 21
- RESET, 11, 24, 32, 34, 47
- ROLLDATE, 22, 25, 31
- Rollover, 31
- RTS, 5, 15, 38, 42, 43, 44
-
- SAMPLE, 31
- SDLC, 42
- SENDCTRL, 53
- SENDLN, 53
- Serial, 6, 18, 21, 22, 32, 37, 39, 51, 52
- SETUP, 4, 7, 8, 23, 29
- Shell, 18, 22, 26, 27, 31, 33
- Short-cut, 15
- SIGNALS, 5, 7, 43, 44
- SIMPLEX, 42
- SOH, 37
- STX, 37
-
- Tagging, 16
- TELENET, 39
- Telephone, 42
- TERMINAL, 4, 7, 9, 10, 12, 16, 21, 34, 42, 44
- TRANSMIT, 12, 16, 26, 44
- TSR, 22, 25
-
- =================================================
-
- Page 60
-
- =================================================
-
-
- TXD, 44
-
- UNIQUE, 23
- UNIX, 4
- Upload, 16, 17, 18, 21, 25, 26, 30, 34
- Uploaded, 6, 34
- UPLOADING, 4, 16
- Uploads, 6, 27
-
- VERBOSE, 10, 15, 48, 49
- VGA, 4, 5, 6, 20
- Video, 5, 20, 45
- VOLKSMODEM, 5, 47, 49
-
- Wait, 24, 31, 53
- WAITFOR, 53
- WAITTIME, 53
- Walkie-talkies, 42
- WARNING, 24
- Warranties, 1
- WARRANTY, 4, 1
- WATCHDOG, 33
- WINGS, 2
- WRITELN, 53
-
- XMODEM, 5, 6, 35, 36, 37, 40, 41, 42, 54
- XMODEM's, 37
- XOFF, 5, 15, 38, 42, 43
- XON, 5, 15, 38, 42, 43
-
- YESNO, 31
- YMODEM, 5, 6, 17, 35, 36, 37, 38, 54, 55
- YMODEMS, 35
- YMODEM-G, 5, 6, 37, 38, 43, 54
-
- ZACK, 40
- ZCHALLENGE, 40
- ZCOMMAND, 40
- ZCOMPL, 40
- ZDATA, 39
- ZEOF, 39, 40
- ZFILE, 39
- ZFIN, 39, 40
- Zip, 6, 20, 22, 24, 26, 35
- ZIPVIEW, 6, 13, 18, 22, 25, 27, 32, 33
- ZMODEM, 5, 6, 17, 39, 40, 54, 55
- ZOOM, 5, 46, 47, 48
- ZRINIT, 39, 40
- ZRPOS, 39
- ZRQINIT, 39
- ZVIEW, 22
-
-
-
- =================================================
-
- Page 61