----- Original Message -----
From: "Paul Koning" <pkoning(a)equallogic.com>
To: <cctalk(a)classiccmp.org>
Sent: Thursday, September 16, 2004 4:23 PM
Subject: Re: RSTS/E Question
>>>> "Ashley" == Ashley Carder <wacarder(a)usit.net> writes:
Ashley> ----- Original Message ----- From: "Ron Hudson"
Ashley> <ron.hudson(a)sbcglobal.net> To: "General Discussion: On-Topic
Ashley> and Off-Topic Posts" <cctalk(a)classiccmp.org> Sent: Thursday,
Ashley> September 16, 2004 4:01 PM Subject: Re: RSTS/E Question
> > Ron> In a real PDP11 you would have
actual terminals/ttys
> connected > Ron> to physical serial ports. In my case I have
> Telnet > Ron> sessions..but I don't know how many I can have.. I
> suppose one > Ron> for each job (20 or so?) or does the DZ11 limit
> the number of > Ron> KBn: s I can have?
> >
> > It sure does. If it's a DZ (whether real, or emulated one tied
> to a > Telnet session at the emulator) it by definition has 8
> ports.
> >
> > If you want 20 sessions, and they are hooked to DZs, then you'd
> have > to have at least 3 DZs...
> >
> > paul
> >
> >
> Hmm.. In the simulator, I type show dz
>
> DZ, address=17760100-17760137*, vector=300-334, lines=32, attached
> to 232, 8b, 0 connections
>
> Does this mean I have 32 KBn: (KB0 - KB31??)
Ashley> The console is KB0: and it does not use a DZ11 line. I
Ashley> believe that any configured pseudo keyboards would use the
Ashley> next numbers in the series PK1:, PK2:, for example. ...
The order is: KL/DL11-A; DL11-C/D; DL11-E; PK; DJ11; DH11; DZ11.
Note that PKn: is the controlling end of a pseudo keyboard. If you
asked for two, then the controlling end is PK0 and PK1, which control
respectively KB1 and KB2 (assuming your only single-line interface is
the console). Writing to PK0 is "typing" on KB1.
By the way, Linux has the same concept -- "pty". The "master pty"
is
the PKn:, the "slave pty" is the matching KBm:.
The standard use for PKs is batch jobs and network terminal sessions.
paul
Thanks for the lesson, Paul. It's nice to have someone here on the list who
knows this stuff from the inside, rather than an old hacker like me, who
dabbled with it 27 years ago from the outside, trying to find out what
was going on on the inside.
We didn't really use PKs at our implementation in the late 1970s, but there
were two PKs configured in the system, and several of us wrote programs
to use them to do long running tasks like calculate long lists of prime
numbers
and such.
Ashley