Equipment
The equipment required consists of a communications receiver, an
antenna, an interface unit/software and a computer.
Communications receiver - This is the name given to a good quality
high frequency receiver. Suitable models can be obtained,
second-hand, at around £100; new receivers cost upwards of £175.
There is no point is buying a radio simply designed to pick up
shortwave broadcasts which will lack the sensitivity, selectivity and
resolution necessary. A minimum specification would be:
Coverage 500 kHz--30 MHz
Resolution >100 Hz
** Page 100
Modes AM, Upper Side Band, Lower Side Band,
CW (Morse)
Tuning would be either by two knobs, one for MHz, one for kHz, or
by keypad. On more expensive models it is possible to vary the
bandwidth of the receiver so that it can be widened for musical
fidelity and narrowed when listening to bands with many signals close
to one another.
Broadcast stations transmit using AM (amplitude modulation), but
in the person-to-person contacts of the aeronautical, maritime and
amateur world, single-side-band-suppressed carrier techniques are
used--the receiver will feature a switch marked AM, USB, LSB, CW etc.
Side-band transmission uses less frequency space and so allows more
simultaneous conversations to take place, and is also more efficient
in its use of the power available at the transmitter. The chief
disadvantage is that equipment for receiving is more expensive and
must be more accurately tuned. Upper side band is used on the whole
for voice traffic, and lower side band for data traffic. (Radio
amateurs are an exception: they also use lower side-band for voice
transmissions below 10 MHz.) Suitable sources of supply for
communications receivers are amateur radio dealers, whose addresses
may be found in specialist magazines like Practical Wireless, Amateur
Radio, Ham Radio Today.
Antenna - Antennas are crucial to good shortwave reception--the sort
of short 'whip' aerial found on portable radios is quite insufficient
if you are to capture transmissions from across the globe. When using
a computer close to a radio you must also take considerable care to
ensure that interference from the CPU and monitor don't squash the
signal you are trying to receive. The sort of antenna I recommend is
the 'active dipole', which has the twin advantages of being small and
of requiring little operational attention. It consists of a couple of
1-meter lengths of wire tied parallel to the ground and meeting in a
small plastic box. This is mounted as high as possible, away from
interference, and is the 'active' part. From the plastic box descends
coaxial cable which is brought down to a small power supply next to
the receiver and from there the signal is fed into the receiver
itself. The plastic box contains special low-noise transistors.
It is possible to use simple lengths of wire, but these usually
operate well only on a limited range of frequencies, and you will
need to cover the entire HF spectrum. Active antennas can be obtained
by mail order from suppliers advertising in amateur radio
magazines--the Datong is highly recommended.
** Page 101
Interface The 'interface' is the equivalent of the modem in landline
communications; indeed, advertisements of newer products actually refer to
radio modems. Radio tele-type, or RTTY, as it is called, is traditionally
received on a modified teleprinter or telex machine; and the early interfaces
or terminal units (TUs) simply converted the received audio tones into 'mark'
and 'space' to act as the equivalent of the electrical line conditions of a
telex circuit. Since the arrival of the microcomputer, however, the design
has changed dramatically and the interface now has to perform the following
functions:
1 Detect the designated audio tones
2 Convert them into electrical logic states
3 Strip the start/stop bits, convert the Baudot code into ASCII
equivalents, reinsert start/stop bits
4 Deliver the new signal into an appropriate port on the computer.
(If RS232C is not available, then any other port, e.g. Game, that
is)
A large number of designs exist: some consist of hardware
interfaces plus a cassette, disc or ROM for the software; others
contain both the hardware for signal acquisition and firmware for its
decoding in one box.
Costs vary enormously and do not appear to be related to quality
of result. The kit-builder with a ZX81 can have a complete set-up for
under £40; semi-professional models, including keyboards and screen
can cost in excess of £1000.
The kit I use is based on the Apple II (because of that model's
great popularity in the USA, much hardware and software exists); the
interface talks into the game port and I have several items of
software to present Baudot, ASCII or Morse at will. There is even
some interesting software for the Apple which needs no extra
hardware--the audio from the receiver is fed direct into the cassette
port of the Apple, but this method is difficult to replicate on other
machines because of the Apple's unique method of reading data from
cassette.
** Page 102
Excellent inexpensive hard/firmware is available for many Tandy
computers, and also for the VlC20/Commodore 64. On the whole US
suppliers seem better than those in the UK or Japan-- products are
advertised in the US magazines QST and 73.
Setting Up Particular attention should be paid to linking all the
equipment together; there are special problems about using sensitive
radio receiving equipment in close proximity to computers and VDUs.
Computer logic blocks, power supplies and the synchronising pulses on
VDUs are all excellent sources of radio interference (rfi). RFI
appears not only as individual signals at specific points on the
radio dial, but also as a generalised hash which can blank out all
but the strongest signals.
Interference can escape from poorly packaged hardware, but also
from unshielded cables which act as aerials. The remedy is simple to
describe: encase and shield everything, connecting all shields to a
good earth, preferably one separate from the mains earth. In
practice, much attention must be paid to the detail of the
interconnections and the relative placing of items of equipment. In
particular, the radio's aerial should use coaxial feeder with a
properly earthed outer braid, so that the actual wires that pluck the
signals from the ether are well clear of computer-created rfi. It is
always a good idea to provide a communications receiver with a proper
earth, though it will work without one: if used with a computer, it
is essential.
Do not let these paragraphs put you off; with care excellent
results can be obtained. And bear in mind my own first experience:
ever eager to try out same new kit, I banged everything together with
great speed--ribbon cable, poor solder joints, an antenna taped
quickly to a window in a metal frame less than two meters from the
communications receiver--and all I could hear from 500 kHz to 30
MHz, wherever I tuned, was a great howl-whine of protest...
Where to listen
Scanning through the bands on a good communications receiver, you
realise just how crowded the radio spectrum is. The table in Appendix
VI gives you an outline of the sandwich-like fashion in which the
bands are organised.
The 'fixed' bands are the ones of interest; more particularly, the
following ones are where you could expect to locate news agency
transmissions (in kHz):
** Page 103
3155 -- 3400 14350 -- 14990
3500 -- 3900 15600 -- 16360
3950 -- 4063 17410 -- 17550
4438 -- 4650 18030 -- 18068
4750 -- 4995 18168 -- 18780
5005 -- 5480 18900 -- 19680
5730 -- 5950 19800 -- 19990
6765 -- 7000 20010 -- 21000
7300 -- 8195 21850 -- 21870
9040 -- 9500 22855 -- 23200
ggoo -- 9995 23350 -- 24890
10100 -- 11175 25010 -- 25070
11400 -- 11650 25210 -- 25550
12050 -- 12330 26175 -- 28000
13360 -- 13600 29700 -- 30005
13800 -- 14000
In addition, amateurs tend to congregate around certain spots on the
frequency map: 3590, 14090, 21090, 28090, and at VHF/UHF: 144.600,
145.300, MHz 432.600, 433.300.
Tuning In
Radio Teletype signals have a characteristic two-tone warble sound
which you will hear properly only if your receiver is operating in
SSB (single-side-band) mode. There are other digital tone-based
signals to be heard: FAX (facsimile), Helschcrieber (which uses a
technique similar to dot-matrix printers and is used for Chinese and
related pictogram-style alphabets), SSTV (slow scan television, which
can take up to 8 seconds to send a low-definition picture), and
others.
But with practice, the particular sound of RTTY can easily be
recognised. More experienced listeners can also identify shifts and
speeds by ear.
You should tune into the signal watching the indicators on your
terminal unit to see that the tones are being properly captured--
typically, this involves getting two LEDs to flicker simultaneously.
The software will now try to decode the signal, and it will be up
to you to set the speed and 'sense'. The first speed to try is 66/7
words per minute, which corresponds to 50 baud, as this is the most
common. On the amateur bands, the usual speed is 60 words per minute
(45 baud); thereafter, if the rate sounds unusually fast, you try 100
words per minute (approximately 75 baud).
** Page 104
By 'sense' or 'phase' is meant whether the higher tone corresponds
to logical 1 or logical 0. Services can use either format; indeed
the same transmission channel may use one 'sense' on one occasion and
the reverse 'sense' on another. Your software can usually cope with
this. If it can't, all is not lost: you retune your receiver to the
opposite, side-band and the phase will thereby be reversed. So, if
you are listening on the lower side-band (LSB), usually the
conventional way to receive, you simply switch over to USB (upper
side-band), retune the signal into the terminal unit, and the sense'
will have been reversed.
Many news agency stations try to keep their channels open even if
they have no news to put out: usually they do this by sending test
messages like: 'The quick brown fox....' or sequences like
'RYRYRYRYRYRY...' such signals are useful for testing purposes, if
a little dull to watch scrolling up the VDU screen.
You will discover many signals that you can't decode: the
commonest reason is that the transmissions do not use European
alphabets, and all the elements in the Baudot code have been
re-assigned--some versions of Baudot use not one shift, but two, to
give the required range of characters. Straightforward en- crypted
messages are usually recognisable as coming in groups of five
letters, but the encryption can also operate at the bit- as well as
at the character-level -- in that case, too, you will get
gobbleydegook.
A limited amount of ASCII code as opposed to Baudot is to be
found, but mostly on the amateur bands.
Finally, an error-correction protocol, called SITOR, is
increasingly to be found on the maritime bands, with AMTOR, an amateur
variant, in the amateur bands, SITOR has various modes of operation
but, in its fullest implementation, messages are sent in blocks which
must be formally acknowledged by the recipient before the next one is
despatched. The transmitter keeps trying until an acknowledgement is
received. You may even come across, on the amateur bands, packet
radio, which has some of the features of packet switching on digital
land lines. This is one of the latest enthusiasms in amateur radio
with at least two different protocols in relatively wide use.
Discussion of SITOR and packet radio is beyond the scope of this
book, but the reader is referred to BARTG (the British Amateur Radio
Teletype Group) and its magazine Datacom for further information. You
do not need to be a licensed radio amateur to join. The address is:
27 Cranmer Court, Richmond Road, Kingston KT2 SPY.
Operational problems of radio hacking are covered at the end of
Appendix I, the Baudot code is given Appendix IV and an outline
frequency plan is to be found in Appendix VI.
** Page 105
The material that follows represents some of the types of common
transmissions: news services, test slips (essentially devices for
keeping a radio channel open), and amateur. The corruption in places
is due either to poor radio propagation conditions or to the presence
of interfering signals.
REVUE DE LA PRESSE ITALIENNE DU VENDREDI 28 DECEMBRE 1984
LE PROCES AUX ASSASSINS DE L~ POIELUSZKO, LA VISITE DE
M. SPADOLINI A ISRAEL, LA SITUATION AU CAMBODGE ET LA GUER-
ILLA AU MOZAMBIQUE FONT LES TITES DES PAGES POLITIQUES
MOBILISATION TO WORK FOR THE ACCOUNT OF 1985
- AT THE ENVER HOXHA AUTOMOBILE AND
TRACTOR COMBINE IN TIRANA 2
TIRANA, JANUARY XATA/. - THE WORKING PEOPLE OF THE ENVER HOXH~/
AUTOMOBILE AND TRACTOR COMBINE BEGAN THEIR WORR WITH VIGOUR
AND MOBILISATION FOR THE ACCOUNT OF 1985. THE WORK IN THIS
IMPROVOWNT CENTER FOR MECHANICAL INDUSTRY WAS NOT INTERRUPTED
FOR ONE MOMENT AND THE WORKING PEOPLE 8~S ONE ANOTHER FOR
FRESHER GREATER VICTORIES UNDER THE LEADERSHIP OF THE PARTY
WITH ENVER HOXHA AT THE HEAD, DURING THE SHIFTS, NEAR
THE FURNANCES~ PRESSES ETC.. JUST LIKE SCORES OF WORKING COLLE-
CTIVES OF THE COUNTRY WHICH WERE NOT AT HOME DURING THE NEW
YEAR B
IN THE FRONTS OF WORK FOR THE BENEFITS OF THE SOCI-
ALIST CONSTRUCTION OF THE COUNTRY.
PUTTING INTO LIFE THE TEACHINGS OF THE PARTY AND THE INSTRU-
CTIONS OF COMRADE ENVER HOXHA, THE WORKING COLLECTIVE OF THIS
COMBINE SCORED FRESH SUCCESSES DURING 1984 TO REALIZE THE
INDICES OF THE STATE PLAN BY RASING THE ECEONOMIC EFFECTIVE-
NESS. THE WORKING PEOPLE SUCCESSFULLY REALIZED AND OVERFUL
FILLED THE OBJECTIVE OF THE REVOLUTIONARY DRIVE ON THE HIGHER
EFFECTIOVENESS OF PRODUCTION, UNDERTAKEN IN KLAIDQAULSK SO~
WITHIN 1984 THE PLANNED PRODUCTIVITY, ACCORDING TO THE INDEX
OF THE FIVE YEAR PLAN, WAS OVERFULFILLED BY 2 PER CENT.
MOREOVER, THE FIVE YEAR PLAN FOR THE GMWERING OF THE COST OF
PRODUCTION WAS RAISED 2 MONTHS AHEAD OF TIME, ONE FIVE YEAR
PLAN FOR THE PRODUCTION OF MACHINERIES LAND EQUIPMENT AND
THE PRODUCTION OF THE TRACTORS WAS OVER-
FULFILLED. THE NET INCOME OF THE FIVE YEAR PLAN WAS REALIZED
WITHIN 4 YEARS. ETCM
YRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRY
RYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYR
** Page 106
YRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRY
YRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRY
RYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYR~ u UL ~v_.~v
GJ4YAD GJ4YAD DE G4DF G4DF
SOME QRM BUT MOST OK. THE SHIFT IS NORMAL...SHIFT IS NORMAL.
FB ON YOUR RIG AND NICE TO MEET YOU IN RTTY. THE WEATHER HERE
TODAY IS FINE AND BEEN SUNNY BUT C9LD. I HAVE BEEN IN THIS MODE
BEFORE BUT NOT FOR A FEW YEARS HI HI.
GJ4YAD GJ4YAD DE G4DF G4DF
PSE KKK
G4ElE G4EJE DE G3IMS G3IMS
TNX FOR COMING BACk. RIG HERE IS ICOM 720A BUT I AM SENDING
AFSk; NOT FSk'. I USED TO HAVE A CREED BUT CHUCKED IT OUT IT WAS
TOO NOISY AND NOW HAVE VIC2D SYSTEM AND SOME US kIT MY SON
BROUGHT ME HE TRAVELS A LOT.
HAD LOTS OF TROUBLE WITH RFI AND HAVE NOT YET CURED IT. VERTY BAD
QRM AT MOMENT. CAN GET NOTHING ABOVE 1CI MEGS AND NOT MUCH EX-G ON
S(:). HI HI. SUNSPOT COUNT IS REALLY LOW.
G4EJE G4EJE DE G3IMS G3IMS
~I.Of;KKKk'KKKK
RYRYRYRYRYRYRYRYRYR
~K~fk'KKKKKKK
G3IMS G3IMS DE G4EJE G4EJE
FB OM. URM IS GETTING WORSE. I HAVE ALWAYS LIk.ED ICOM RIGS BUT
THEY ARE EXEPENSIVE. CAN YOU RUN FULL 1QCI PER CENT DUTY CYCLE ON
RTTY OR DO YOU HAVE TO RUN AROUND 50 PER CENT. I GET OVER-HEATING
ON THIS OLD YAESU lQl. WHAT SORT OF ANTENNA SYSTEM DO YOU USE.
HERE IS A TRAPPED VERTICAL WITH 8CI METERS TUNED TO RTTY SPOT AT
~;59(:1.
I STILL USE CREED 7 THOUGH AM GETTING FED UP WITH MECHANICAL
BREAK- W WN AND NOISE BUT I HAVE HEARD ABOUT RFI AND HOME
COMPUTER5. MY NEPHEW HAS A SPECTRUM, CAN YOU GET RTTY SOFTWARE
FOR THAT/.
G3IMs G3IMS DE G4EJE G4EJE
** Page 107
CHAPTER 10
Hacking: the Future
Security is now probably the biggest single growth area within the
mainstream computer business. At conference after conference,
consultants compete with each other to produce the most frightening
statistics.
The main concern, however, is not hacking but fraud. Donn Parker,
a frequent writer and speaker on computer crime based at the Stanford
Research Institute has put US computer fraud at $3000 million a year;
although reported crimes amount to only $100 million annually. In
June 1983 the Daily Telegraph claimed that British computer-related
frauds could be anything between £500 million and £2.5 billion a
year. Detective Inspector Ken McPherson, head of the computer crime
unit at the Metropolitan Police, was quoted in 1983 as saying that
within 15 years every fraud would involve a computer. The trouble is,
very few victims are prepared to acknowledge their losses. To date,
no British clearing bank has admitted to suffering from an
out-and-out computer fraud, other than the doctoring of credit and
plastic ID cards. Few consultants believe that they have been immune.
However, to put the various threats in perspective, here are two
recent US assessments. Robert P Campbell of Advanced Information
Management, formerly head of computer security in the US Army,
reckons that only one computer crime in 100 is detected; of those
detected, 15 per cent or fewer are reported to the authorities, and
that of those reported, one in 33 is successfully prosecuted--a
'clear-up' rate of one in 22,000.
And Robert Courtney, former security chief at IBM produced a list
of hazards to computers: 'The No 1 problem now and forever is errors
and omissions'. Then there is crime by insiders, particularly
non-technical people of three types: single women under 35; 'little
old ladies' over 50 who want to give the money to charity; and older
men who feel their careers have left them neglected. Next, natural
disasters. Sabotage by disgruntled employees. Water damage. As for
hackers and other outsiders who break in, he estimates it is less
than 3 per cent of the total.
** Page 108
Here in the UK, the National Computing Centre says that at least
90 per cent of computer crimes involve putting false information into
a computer, as opposed to sophisticated logic techniques; such crimes
are identical to conventional embezzlement: looking for weaknesses
in an accounting system and taking advantage. In such cases the
computer merely carries out the fraud with more thoroughness than a
human, and the print-out gives the accounts a spurious air of being
correct.
In the meantime, we are on the threshold of a new age of
opportunities for the hacker. The technology we can afford has
suddenly become much more interesting.
The most recent new free magazines to which I have acquired
subscriptions are for owners of the IBM PC, its variants and clones.
There are two UK monthlies for regular users, another for corporate
buyers and several US titles.
The IBM PC is only partly aimed at small business users as a
stand-alone machine to run accounting, word processing, spread- sheet
calculation and the usual business dross; increasingly the marketing
is pitching it as an executive work-station, so that the corporate
employee can carry out functions not only local to his own office,
but can access the corporate mainframe as well--for data, messaging
with colleagues, and for greater processing power.
In page after page, the articles debate the future of this
development--do employees want work-stations? Don't many bosses still
feel that anything to do with typing is best left to their secretary?
How does the executive workstation relate to the mainframe? Do you
allow the executive to merely collect data from it, or input as well?
If you permit the latter, what effect will this have on the integrity
of the mainframe's files? How do you control what is going on? What
is the future of the DP professional? Who is in charge?
And so the articles go on. Is IBM about to offer packages which
integrate mainframes and PCs in one enormous system, thus effectively
blocking out every other computer manufacturer and software publisher
in the world by sheer weight and presence?
I don't know the answers to these questions, but elsewhere in
these same magazines is evidence that the hardware products to
support the executive workstation revolution are there--or, even if
one has the usual cynicism about computer trade advertising ahead of
actual availability, about to be.
The products are high quality terminal emulators, not the sort of
thing hitherto achieved in software--variants on asynchronous
protocols with some fancy cursor addressing--but cards capable of
supporting a variety of key synchronous communications, like 327x
(bisynch and SDLC), and handling high-speed file transfers in CICs,
TSO, IMS and CMS.
** Page 109
These products feature special facilities, like windowing or
replicate aspects of mainframe operating systems like VM (Virtual
Machine), giving the user the experience of having several different
computers simultaneously at his command. Other cards can handle IBM's
smaller mini- mainframes, the Systems/34 and /38. Nor are other
mainframe manufacturers with odd-ball comms requirements ignored:
ICL, Honeywell and Burroughs are all catered for. There are even
several PC add-ons which give a machine direct X.25; it can sit on a
packet-switched network without the aid of a PAD.
Such products are expensive by personal micro standards, but it
means that, for the expenditure of around £8000, the hacker can call
up formidable power from his machine. The addition of special
environments on these new super micros which give the owner direct
experience of mainframe operating systems--and the manuals to go with
them--will greatly increase the population of knowledgeable computer
buffs. Add to this the fact that the corporate workstation market, if
it is at all succesful, must mean that many executives will want to
call their mainframe from home --and there will be many many more
computer ports on the PTSN or sitting on PSS.
There can be little doubt that the need for system security will
play an increasing role in the specification of new mainframe
installations. For some time, hardware and software engineers have
had available the technical devices necessary to make a computer
secure; the difficulty is to get regular users to implement the
appropriate methods--humans can only memorise a limited number of
passwords. I expect greater use will be made of threat monitoring
techniques: checking for sequences of unsuccessful attempts at
logging in, and monitoring the level of usage of customers for
extent, timing, and which terminals or ports they appear on.
The interesting thing as far as hackers are concerned is that it
is the difficulty of the exercise that motivates us, rather than the
prospect of instant wealth. It is also the flavour of naughty, but
not outright, illegality. I remember the Citizens Band radio boom of
a few years ago: it started quietly with just a handful of London
breakers who had imported US sets, really simply to talk to a few
friends. One day everyone woke up, switched on their rigs and
discovered overnight there was a whole new sub-culture out there,
breathing the ether. Every day there were more and more until no
spare channels could be found. Then some talented engineers found out
how to freak the rigs and add another 40 channels to the original 40.
And then another 40. Suddenly there were wholesalers and retailers
and fanzines, all selling and promoting products the using or
manufacturing of which was illegal under British law.
** Page 110
Finally, the government introduced a legalised CB, using different
standards from the imported US ones. Within six months the illegal
scene had greatly contracted, and no legal CB service of comparable
size ever took its place. Manufacturers and shop- keepers who had
expected to make a financial killing were left with warehouses full
of the stuff. Much of the attraction of AM CB was that it was
forbidden and unregulated. There is the desire to be an outlaw, but
clever and not too outrageous with it, in very many of us.
So I don't believe that hacking can be stopped by tougher
security, or by legislation, or even by the fear of punishment.
Don't get me wrong: I regard computers as vastly beneficial. But
they can threaten our traditional concepts of freedom, individuality
and human worth I like to believe hacking is a curious
re-assertion of some of those ideas.
The challenge of hacking is deeply ingrained in many computer
enthusiasts; where else can you find an activity the horizons of
which are constantly expanding, where new challenges and dangers can
be found every day, where you are not playing a visibly artificial
'game', where so much can be accessed with so little resource but a
small keyboard, a glowing VDU, an inquisitive and acquisitive brain,
and an impish mentality?
** Page 111
APPENDIX I
Trouble Shooting
The assumption is that you are operating in the default mode of
300/300 baud asynchronous using CCITT tones, 7 bits, even parity, one
stop bit, full-duplex/echo off, originate. You have dialled the
remote number, seized the line and can hear a data tone. Something is
not working properly. This is a partial list of possibilities.
The screen remains blank.
* A physical link has failed -- check the cables between computer,
modem and phone line.
* The remote modem needs waking up--send a <cr> or failing that, a
ENQ (<ctrl>E), character.
* The remote modem is operating at a different speed. Some modems
can be brought up to speed by hitting successive <cr>s; they usually
begin at 110 baud and then go to 300,so two successive <cr>s should
do the trick.
* The remote modem is not working at V21 standards, either because
it is a different CCITT standard, e.g. V22, V22 bis, V23 etc or
operates on Bell (US) tones.
* Since different standards tend to have different 'wake-up' tones
which are easily recognised with practice, you may be able to spot
what is happening. It shouldn't need to be said that if you are
calling a North American service you should assume Bell tones.
* Both your modem and that of the remote service are in answer or in
originate and so cannot 'speak' to each other. Always assume you are
in the originate mode.
* The remote service is not using ASCII/International Alphabet No 5.
The screen fills with random characters
* Data format different from your defaults--check 7 or 8 bit
characters, even/odd parity, stop and start bits.
* Mismatch of characters owing to misdefined protocol--check
start/stop, try alternately EOB/ACK and XON/XOF.
* Remote computer operating at a different speed from you-- try, in
order, 110, 300, 600, 1200, 75.
** Page 112
* Poor physical connection--if using an acoustic coupler check
location of handset, if not, listen on line to see if it is noisy or
crossed.
* The remote service is not using ASCII/International Alphabet No 5.
Every character appears twice
* You are actually in half-duplex mode and the remote computer as
well as your own are both sending characters to your screen--switch
to full-duplex/echo off.
All information appears on only one line, which is constantly
overwritten.
* The remote service is not sending line feeds--if your terminal
software has the facility, enable it to induce line feeds when each
display line is filled. Many on-line services and public dial-up
ports let you configure the remote port to send line feeds and vary
line length. Your software may have a facility to show control
characters, in which case you will see <ctrl>J if the remote service
is sending line feeds.
Wide spaces appear between display lines.
* The remote service is sending line feeds and your software is
inducing another one simultaneously--turn off your induced carriage
return facility. In 'show control character' mode, you will see
<ctrl>Js.
Display lines are broken awkwardly
* The remote service is expecting your screen to support more
characters than it is able. Professional services tend to expect 80
characters across whilst many personal computers may have less than
40, so that they can be read on a tv screen. Check if your software
can help, but you may have to live with it. Alternatively, the
remote computer may let you reconfigure its character stream.
Most of the display makes sense, but every so often it becomes
garbled
* You have intermittent line noise--check if you can command the
remote computer to send the same stream again and see if you get the
garbling.
* The remote service is sending graphics instructions which your
computer and software can't resolve.
** Page 113
The display contains recognisable characters in definite groupings,
but otherwise makes no sense The data is intended for an intelligent
terminal, which will combine the transmitted data with a local
program so that it makes sense.
* The data is intended for batch processing.
* The data is encrypted Although the stream of data appeared
properly on your vdu, when you try to print it out, you get
corruption and over-printing
* Most printers use a series of special control characters to enable
various functions--line feeds, back-space, double- intensity, special
graphics etc. The remote service is sending a series of control
characters which, though not displayed on your screen, are
'recognised' by your printer, though often in not very helpful ways.
You may be able to correct the worst problems in software, e.g. by
enabling line-feeds; alternatively many printers can be re-configured
in hardware by appropriate settings of DIL switches internally.
When accessing a viewdata service, the screen fills with squares.
* The square is the standard display default if your viewdata
terminal can't make sense of the data being sent to it.
* Check physical connections and listen for line noise.
* The viewdata host does not work to UK viewdata standards-- French
viewdata uses parallel attributes and has a number of extra features.
The CEPT standard for Europe contains features from both the UK and
French systems and you may be able to recognise some of the display.
North American videotex is alpha-geometric and sends line drawing
instructions rather than characters.
* The viewdata host has enhanced graphics features, perhaps for
dynamically redefined character sets, alphageometric instructions, or
alpha-photographic (full resolution) pictures. If the host has some
UK standard-compatible features, you will be able to read them
normally. If the cursor jumps about the screen, the host has dynamic
graphics facilities. If the viewdata protocol is anything at all like
the UK standard, you should see regular clear-screens as each new
page comes up; however, advanced graphics features tend to work by
suppressing clear-screens.
** Page 114
* The service you have dialled is not using viewdata. PSS is
accessible at 75/1200, as are one or two direct-dial services. In
this case you should be seeing a conventional display or trying one
of the other suggestions in this appendix. It is usual to assume that
any subscriber dialling into a 75/1200 port has only a 40 character
display.
You can't see what you are typing
* The remote computer is not echoing back to you--switch to
half-duplex. If the remote computer's messages now appear doubled;
that would be unusual but not unique; you will have to toggle back to
full-duplex for receive.
Data seems to come from the remote computer in jerky bursts rather
than as a smooth stream.
* If you are using PSS or a similar packet-switched service and it
is near peak business hours either in your time zone or in that of
the host you are accessing, the effect is due to heavy packet
traffic. There is nothing you can do--do not send extra commands to
'speed things up' as those commands will arrive at the host
eventually and cause unexpected results.
* The host is pausing for a EOB/ACK or XON/XOF message-- check your
protocol settings--try sending ctrl-Q or ctrl-F.
You have an apparently valid password but it is not accepted.
* You don't have a valid password, or you don't have all of it.
* The password has hidden control characters which don't display on
the screen. Watch out for <ctrl>H -- the back-space, which will
over-write an existing displayed character.
* The password contains characters which your computer doesn't
normally generate--check your terminal software and see if there is a
way of sending them.
Most of the time everything works smoothly, but you can't get past
certain prompts
* The remote service is looking for characters your computer doesn't
normally generate. Check your terminal software and see if there is a
way of sending them.
A list or file called up turns out to be boring--can you stop it?
* Try sending <ctrl>S; this may simply make the remote machine
pause, until a <ctrl>Q is sent--and you may find the list resumes
where it left off. On the other hand it may take you on to a menu.
* Send a BREAK signal (<ctrl>1). If one BREAK doesn't work, send
another in quick succession.
** Page 115
You wish to get into the operating system from an applications
program.
* Don't we all? There is no standard way of doing this, and indeed
it might be almost impossible, because the operating system can only
be addressed by a few privileged terminals, of which yours (and its
associated password) is not one. However, you could try the
following:
* Immediately after signing on, send two BREAKs (<ctrl>1).
* Immediately after signing on, try combinations of ESC, CTRL and
SHIFT. As a desperate measure, send two line feeds before signing
on--this has been known to work!.
* At an options page, try requesting SYSTEM or some obvious
contraction like SYS or X. If in the Basic language, depending on the
dialect, SYSTEM or X in immediate mode should get you the operating
system.
You are trying to capture data traffic from a short-wave radio and are having
little success
* Your computer could be emitting so much radio noise itself that
any signal you are attempting to hear is squashed. To test: tune your
radio to a fairly quiet short-wave broadcast and then experiment
listening to the background hash with the computer switched first
on, then off. If the noise level drops when you turn off the
computer, then you need to arrange for more rf suppression and to
move the computer and radio further apart. Another source of rf noise
is the sync scan in a tv tube.
* If you can hear the two-tones of rtty traffic but can't get
letters resolved, check that your terminal unit is locking on to the
signal (often indicated by LEDs); you should then at least get some
response on your screen, if it doesn't make immediate sense.
* Once you have letters on screen, try altering the speed at which
you are receiving (see chapter 10); check also that you are reading
in the right 'sense', ie that mark and space have not been reversed.
* In addition to signals sent with the conventional International
Telegraphic Code No 2 (Baudot), variants exist for foreign letter
sets, like Cyrillic, which your software may not be able to resolve.
* There are other data-type services which sound a little like RTTY,
but are not: they include FAX (facsimile) hellschreiber ( a form of
remote dot-matrix printing), SITOR (see chapter 10) and special
military/diplomatic systems.
** Page 116
APPENDIX II
Glossary
This glossary collects together the sort of name, word, abbreviation
phrase you could come across during your network adventures
and for which you may not be able to find a precise definition
ACK
Non--printing character used in some comms protocols to indicate that
a block has been received and that more can be sent; used in
association with EOB.
ANSI
American National Standards Institute--one of a number of standards
organizations.
Answer mode
When a modem is set up to receive calls--the usual mode for a host.
The user's computer will be in originate.
ARQ
Automatic Repeat Request--method of error correction.
ASCII
American Standard Code for Information Interchange--alternate name
for International Telegraph Alphabet No 5: 7-bit code to symbolise
common characters and comms instructions, usually transmitted as
8-bit code to include a parity bit.
ASR
Automatic Send Receive--any keyboard terminal capable of generating a
message into off-line storage for later transmission; includes
paper-tape telex machines as well as microcomputers.
Asynchronous
Description of communications which rely on 'start' and 'stop' bits
to synchronise originator and receiver of data--hence asynchrnous
protocols, channels, modems, terminals etc.
** Page 117
Backward channel
Supervisory channel, not used as main channel of communication; in
viewdata the 75 baud back from the user to the host.
Baud
Measure of the signalling rate on a data channel, number of
signalling elements per second.
Baseband
Modulation is direct on the comms line rather than using audio or
radio frequencies; used in some local area networks. A baseband or
'short-haul' modem can be used to link computers in adjacent offices,
but not over telephone lines.
Baudot
5-bit data code used in telegraphy, telex and RTTY--also known as
International Telegraph Alphabet No 2.
Bell
(1) non-printing character which sounds a bell or bleep, usually
enabled by <ctrl> G; (2) Common name for US phone company and, in
this context, specifiers for a number of data standards and services,
e.g. Bell 103a, 202a, 212a, etc--see Appendix V
Bit Binary digit
value 0 or 1.
Broadband
Broadband data channels have a wider bandwidth than ordinary
telephone circuits--12 times in fact, to give a bandwidth of 48kHz,
over which may simultaneous high-speed data transfers can take place.
Broadcast service
Data service in which all users receive the same information
simultaneously, without the opportunity to interrogate or query;
e.g. news services like AP, Reuters News, UPI etc. See also on-line
service.
Bisynchronous
IBM protocol involving synchronous transmission of binary coded data.
** Page 118
BLAISE
British Library Automated Information Service-- substantial
bibliographic on-line host.
BREAK
Non-printing character used in some data transmission protocols and
found on some terminals--can often be regenerated by using <ctrl> 1.
BSC
Binary Synchronous Communications--see bisynchronous.
I Byte
Group of bits (8) representing one data character.
Call accept
In packet-switching, the packet that confirms the party is willing to
proceed with the call.
Call redirection
In packet-switching, allows call to be automatically redirected from
original address to another, nominated address.
Call request
In packet-switching, packet sent to initiate a datacall.
CCITT
Comite Consultatif International Telephonique et Telegraphique
--committee of International Telecommunications Union which sets
international comms standards. Only the US fails to follow its
recommendations in terms of modem tones, preferring 'Bell' tones. The
CCITT also sets such standards as V21, 24, X25 etc.
Character terminal
In packet-switching, a terminal which can only access via a PAD.
Cluster
When two or more terminals are connected to a data channel at a
single point.
Common Carrier
A telecommunications resource providing facilities to the public.
** Page 119
Connect-time
Length of time connected to a remote computer, often the measure of
payment. Contrast with cpu time or cpu units, which measures how
much 'effort' the host put into the communication.
CPS
Characters Per Second.
Cpu Time
In an on-line session, the amount of time the central processor
actually spends on the interaction process, as opposed to connect-
time; either can be used as the basis of tariffing.
CRC
Cyclic Redundancy Check--error detection method.
CUG
Closed User Group--group of users/terminals who enjoy privacy with
respect to a public service.
Datacall
In packet-switching, an ordinary call, sometimes called a 'switched
virtual call'.
Dataline
In packet-switching, dedicated line between customer's terminal and
packet-switch exchange (PSE).
DCE
Data Circuit-terminating Equipment--officialese for modems.
DTE
Data Terminal Equipment--officialese for computers.
EBCDIC
Extended Binary Coded Decimal Interchange Code--IBM's alternative to
ASCII, based on an 8-bit code, usually transmitted synchronously. 256
characters are available.
Emulator
Software/hardware set-up which makes one device mimic another, e.g. a
personal computer may emulate an industry-standard dumb terminal like
the VT100. Compare simulator, which gives a device the attributes of
another, but not necessarily in real time, e.g. when a large mini
carries a program making it simulate another computer to develop
software.
** Page 120
Euronet-Diane
European direct access information network.
Datel
BT's name for its data services, covering both the equipment and the
type of line, e.g. Datel 100 corresponds to telegraph circuits, Datel
200 is the usual 300/300 asynchronous service, Datel 400 is for
one-way transmissions e.g. monitoring of remote sites, Datel 600 is
a two- or four-wire asynchronous service at up to 1200 baud, Datel
2400 typically uses a 4-wire private circuit at 2400 baud
synchronous, etc. etc.
DES
Data Encryption Standard--a US-approved method of encrypt- ing data
traffic, and somewhat controversial in its effectiveness.
Dialog
Well-established on-line host available world-wide covering an
extensive range of scientific, bibiographic and news services. Also
known as Lockheed Dialog.
Dial-up
Call initiated via PTSN, no matter where it goes after that; as
opposed to service available via permanent leased line.
Duplex
Transmission in two directions simultaneously, sometimes called
full-duplex; contrast half-duplex, in which alternate transmissions
by either end are required. NB this is terminology used in data
communications over land-lines. Just to confuse matters, radio
technology refers to simplex, when only one party can transmit at a
time and a single radio frequency is used; two-frequency-simplex or
half-duplex when only one party can speak but two frequencies are
used, as in repeater and remote base working; and full-duplex, when
both parties can speak simultaneously and two radio frequencies are
used, as in radio-telephones.
Echo
(1) When a remote computer sends back to the terminal each letter as
it is sent to it for confirming re-display locally. (2) Effect on
long comms lines caused by successive amplifications
--echo-suppressors are introduced to prevent disturbance caused by
this phenomenon, but in some data transmission the echo- suppressors
must be switched off.
** Page 121
EIA
Electronic Industries Association, US standards body.
ENQ
Non-printing character signifying 'who are you?' and often sent by
hosts as they are dialled up. When the user's terminal receives ENQ
it may be programmed to send out a password automatically.
Corresponds to <esc> E.
EOB
End Of Block--non-printing character used in some protocols, usually
in association with ACK.
Equalisation
Method of compensation for distortion over long comms channels.
FDM
Frequency Division Multiplexing--a wide bandwidth transmission
medium, e.g. coaxial cable, supports several narrow band- width
channels by differentiating by frequency; compare time division
multiplexing.
FSK
Frequency Shift Keying--a simple signalling method in which
frequencies but not phase or amplitude are varied according to
whether '1' or '0' is sent--used in low-speed asynchronous comms both
over land-line and by radio.
Handshaking
Hardware and software rules for remote devices to communicate with
each other, supervisory signals such as 'wait', 'acknowledge',
'transmit', 'ready to receive' etc.
HDLC
In packet-switching, High Level Data Link Control procedure, an
international standard which detects and corrects errors in the
stream of data between the terminal and the exchange--and to provide
flow control. Host The 'big' computer holding the information the
user wishes to retrieve.
** Page 122
Infoline
Scientific on-line service from Pergamon.
ISB
see sideband.
ISO
International Standards Organisation.
LAN
Local Area Network--normally using coaxial cable, this form of
network operates at high speed over an office or works site, but no
further. May have inter-connect facility to PTSN or PSS.
LF
Line Feed--cursor moves active position down one line--usual code is
<ctrl>J; not the same as carriage return, which merely sends cursor
to left-hand side of line it already occupies. However, in many
protocols/terminals/set-ups, hitting the <ret> or <enter> button
means both <lf> and <cr>.
Logical Channel
Apparently continuous path from one terminal to another.
LSB
see sideband.
KSR
Keyboard Send Receive--terminal with keyboard on which anything that
is typed is immediately sent. No off-line preparation facility, e.g.
teletypewriter, 'dumb' terminals.
Macro software
Facility frequently found in comms programs which permits the
preparation and sending of commonly-used strings of information,
particularly passwords and routing instructions.
Mark
One of the two conditions on a data communications line, the other
being 'space'; mark indicates 'idle' and is used as a stop bit.
** Page 123
Message switching
When a complete message is stored and then forwarded, as opposed to a
packet of information. This technique is used in some electronic mail
services, but not for general data transmission.
Modem
Modulator-demodulator.
Multiplexer
Device which divides a data channel into two or more independent
channels .
MVS
Multiple Virtual Storage--IBM operating system dating from mid-70s.
NUA
Network User Address, number by which each terminal on a
packet-switch network is identified (character terminals don't have
them individually, because they use a PAD). In PSS, it's a 10-digit
number.
NUI
Network User Identity, used in PSS for dial-up access by each user.
Octet
In packet-switching, 8 consecutive bits of user data, e.g. 1
character.
On-line service
Interrogative or query service available for dial-up. Examples
include Lockheed Dialog, Blaise, Dow Jones News Retrieval, etc;
leased-line examples include Reuters Monitor, Telerate.
Originate
Mode-setting for a modem operated by a user about to call another
computer.
OSI
Open Systems Interconnect--intended world standard for digital
network connections--c.f. SNA. Packet terminal Terminal capable of
creating and disassembling packets, interacting with a
packet-network, c.f. character terminal.
** Page 124
PAD
Packet Assembly/disassembly Device--permits 'ordinary' terminals to
connect to packet switch services by providing addressing, headers,
(and removal), protocol conversion etc.
Parity checking
Technique of error correction in which one bit is added to each data
character so that the number of bits is always even (or always odd).
PDP/8 & /11
Large family of minis, commercially very sucessful, made by DEC. the
PDP 8 was 12-bit, the PDP 11 is 16-bit. The LSI 11 have strong family
connections to the PDP 11, as have some configurations of the
desk-top Rainbow.
Polling
Method of controlling terminals on a clustered data network, where
each is called in turn by the computer to see if it wishes to
transmit or receive.
Protocol
Agreed set of rules.
PSE
Packet Switch Exchange--enables packet switching in a network.
PTSN
Public Switched Telephone Network--the voice-grade telephone network
dialled from a phone. Contrast with leased lines, digital networks,
conditioned lines etc.
PTT
jargon for the publicly-owned telecommunications authority/ utility
PVC
Permanent Virtual Circuit--a connection in packet switching which is
always open, no set-up required.
** Page 125
Redundancy checking
Method of error correction.
RS232C
The list of definitions for interchange circuit: the US term for
CCITT V24--see Appendix III.
RSX-ll
Popular operating system for PDP/11 family.
RTTY
Radio Teletype -- method of sending telegraphy over radio waves.
RUBOUT
Back-space deleting character, using <ctrl>H.
Secondary channel
Data channel, usually used for supervision, using same physical path
as main channel; in V23 which is usually 600 or 1200 baud
half-duplex, 75 baud traffic is supervisory but in viewdata is the
channel back from the user to the host, thus giving low-cost full
duplex.
Segment
Chargeable unit of volume on PSS.
Serial transmission
One bit at a time, using a single pair of wires, as opposed to
parallel transmission, in which several bits are sent simultaneously
over a ribbon cable. A serial interface often uses many more than two
wires between computer and modem or computer and printer, but only
two wires carry the data traffic, the remainder being used for
supervision, electrical power and earthing, or not at all.
Sideband
In radio the technique of suppressing the main carrier and limiting
the transmission to the information-bearing sideband. To listen at
the receiver, the carrier is re-created locally. The technique, which
produces large economies in channel occupany, is extensively used in
professional, non-broadcast applications. The full name is single
side-band, supressed carrier. Each full carrier supports two
sidebands, an upper and lower, USB and LSB respectively; in general,
USB is used for speech, LSB for data, but this is only a
convention--amateurs used LSB for speech below 10 MHz, for example.
ISB, independent side-band, is when the one carrier supports two
sidebands with separate information on them, usually speech on one
and data on the other. If you listen to radio teletype on the 'wrong'
sideband, 'mark' and 'space' values become reversed with a consequent
loss of meaning.
** Page 126
SITOR
Error-correction protocol for sending data over radio-path using
frequent checks and acknowledgements.
SNA
System Network Architecture-- IBM proprietary networking protocol,
the rival to OSI.
Space
One of two binary conditions in a data transmission channel, the
other being 'mark'. Space is binary 0.
Spooling
Simultaneous Peripheral Operation On-Line--more usually, the ability,
while accessing a database, to store all fetched information in a
local memory buffer, from which it may be recalled for later
examination, or dumped to disc or printer.
Start/Stop
Asynchronous transmission; the 'start' and 'stop' bits bracket each
data character.
Statistical Multiplexer
A statmux is an advanced multiplexer which divides one physical link
between several data channels, taking advantage of the fact that not
all channels bear equal traffic loads.
STX
Start Text--non-printing character used in some protocols.
SVC
Switched Virtual Circuit--in packet switching, when connection
between two computers or computer and terminal must be set up by a
specific call.
** Page 127
SYN
Non-printing character often used in synchronous transmission to tell
a remote device to start its local timing mechanism.
Synchronous
Data transmission in which timing information is super-imposed ~,n
pure data. Under this method 'start/stop' techniques are not used
and data exchange is more efficient, hence synchronous channel,
modem, terminal, protocol etc.
TDM
Time Division Multiplex--technique for sharing several data channels
along one high-grade physical link. Not as efficient as statistical
techniques.
Telenet
US packet-switch common carrier.
Teletex
High-speed replacement for telex, as yet to find much commercial
support.
Teletext
Use of vertical blanking interval in broadcast television to transmit
magazines of text information, e.g. BBC's Ceefax and IBA's Oracle.
Telex
Public switched low-speed telegraph network.
TOPIC
The Stock Exchange's market price display service; it comes down a
leased line and has some of the qualities of both viewdata and
teletext.
Tymnet
US packet-switch common carrier.
V-standards
Set of recommendations by CCITT--see Appendix III.
VAX
Super-mini family made by DEC; often uses Unix operating system.
** Page 128
Viewdata
Technology allowing large numbers of users to access data easily on
terminal based (originally) on modified tv sets. Information is
presented in 'page' format rather than on a scrolling screen and the
user issues all commands on a numbers-only keypad. Various standards
exist of which the UK one is so far dominant; others include the
European CEPT standard which is similar to the UK one, a French
version and the US Presentation Level Protocol. Transmission speeds
are usually 1200 baud from the host and 75 baud from the user.
Viewdata together with teletext is known jointly as videotex(t).
Virtual
In the present context, a virtual drive, store, machine etc is one
which appears to the user to exist, but is merely an illusion
generated on a computer; thus several users of IBM's VM operating
system each think they have an entire separate computer, complete
with drives, discs and other peripherals--in fact the one actual
machine can support several lower-level operating systems
simultaneously.
VT52/100
Industry-standard general purpose computer terminals with no storage
capacity or processing power but with the ability to be locally
programmed to accept a variety of asynchronous transmission
protocols--manufactured by DEC. The series has developed since the
VT100
X-standards
Set of recommendations by CCITT--see Appendix III.
XON/XOF
Pair of non-printing characters sometimes used in protocols to tell
devices when to start or stop sending. XON often corresponds to
<ctrl>Q and XOF to <ctrl>S.
80-80
Type of circuit used for telex and telegraphy--mark and space are
indicated by conditions of--or + 80 volts. Also known in the UK as
Tariff J. Usual telex speed is 50 baud, private wire telegraphy (news
agencies etc) 75 baud.
** Page 129
APPENDIX III
Selected CCITT Recommendations
V series: Data transmission over telephone circuits
V1 Power levels for data transmission over telephone lines
V3 International Alphabet No S (ASCII)
V4 General structure of signals of IA5 code for data
transmission over public telephone network
V5 Standardisation of modulation rates and data signalling
rates for synchronous transmission in general switched
network
V6 Ditto, on leased circuits
V13 Answerback simulator
V15 Use of acoustic coupling for data transmission
V19 Modems for parallel data transmission using telephone
signalling frequencies
V20 Parallel data transmission modems standardised for
universal use in the general switched telephone network
V21 200 baud modem standardised
V22 1200 bps full-duplex 2-wire modem for PTSN
V22bis 2400 bps full-duplex 2-wire modem for PTSN
V23 600/1200 bps modem for PTSN
V24 List of definitions for interchange circuits between data
terminal equipment and data circuit-terminating equipment
V25 Automatic calling and/or answering equipment on PTSN
V26 2400 bps modem on 4-wire circuit
V26bis 2400/1200 bps modem for PTSN
V27 4800 bps modem for leased circuits
V27bis 4800 bps modem (equalised) for leased circuits
V27 4800 bps modem for PTSN
V29 9600 bps modem for leased circuits
V35 Data transmission at 48 kbits/sec using 60-108 kHz band
circuits
** Page 130
X series: recommendations covering data networks
X1 International user classes of services in public data networks
X2 International user facilities in public data networks
X3 Packet assembly/disassembly facility (PAD)
X4 General structure of signals of IA5 code for transmission
over public data networks
X20 Interface between data terminal equipment and data
circuit-terminating equipment for start-stop transmission
services on public data networks
X20bis V21-compatible interface
X21 Interface for synchronous operation
X25 Interface between data terminal equipment and data
circuit-terminating equipment for terminals operating in
the packet-switch mode on public data networks
X28 DTE/DCE interface for start/stop mode terminal equipment
accessing a PAD on a public data network
X29 Procedures for exchange of control information and user
data between a packet mode DTE and a PAD
X95 Network parameters in public data networks
X96 Call progress signals in public data networks
X121 International addressing scheme for PDNs
** Page 131
APPENDIX IV
Computer Alphabets
Four alphabets are in common use for computer communications:
ASCII, also known as International Telegraphic Alphabet No 5; Baudot,
used in telex and also known as International Telegraphic Alphabet No
2; UK Standard videotex, a variant of ASCII; and EDCDIC, used by IBM.
ASCII
This is the standard, fully implemented character set. There are a
number of national variants: # in the US variant is £ in the UK
variant. Many micro keyboards cannot generate all the characters
directly, particularly the non-printing characters used for control
of transmission, effectors of format and information separators. The
'keyboard' column gives the usual method of providing them, but you
should check the firmware/software manuals for your particular
set-up. You should also know that many of the 'spare' control
characters are often used to enable special features on printers.
HEX DEC ASCII Name Keyboard Notes
00 0 NUL Null ctrl @
01 1 SOH Start heading ctrl A
02 2 STX Start text ctrl B
03 3 ETX End text ctrl C
04 4 EOT End transmission ctrl D
05 5 ENQ Enquire ctrl E
06 6 ACK Acknowledge ctrl F
07 7 BEL Bell ctrl G
08 8 BS Backspace ctrl H or special key
09 9 HT Horizontal tab ctrl I or special key
OA 10 LF Line feed ctrl J
OB 11 VT Vertical tab ctrl K
0C 12 FF Form feed ctrl L
** Page 132
OD 13 CR Carriage return ctrl M or special key
OE 14 SO Shift out ctrl N
OF 15 Sl Shift in ctrl O
10 16 DLE Data link escape ctrl P
11 17 DC1 Device control 1 ctrl Q also XON
12 18 DC2 Device control 2 ctrl R
13 19 DC3 Device control 3 ctrl S also XOF
14 20 DC4 Device control 4 ctrl T
15 21 NAK Negative acknowledge ctrl U
16 22 SYN Synchronous Idle ctrl V
17 23 ETB End trans. block ctrl W
18 24 CAN Cancel ctrl X
19 25 EM End medium ctrl Y
1A 26 SS Special sequence ctrl Z spare
1B 27 ESC Escape check manuals to
transmit
1C 28 FS File separator
1D 29 GS Group separator
1E 30 RS Record separator
1F 31 US Unit separator
20 32 SP Space
21 33 ~
22 34 "
23 35 # £
24 36 $
25 37 %
26 38 &
27 39 ' Apostrophe
28 40 (
29 41 )
2A 42 ~
2B 43 +
2C 44 , Comma
2D 45 -
2E 46 . Period
2F 47 / Slash
30 48 0
31 49 1
32 50 2
33 51 3
34 52 4
35 53 5
36 54 6
37 55 7
** Page 133
38 56 8
39 57 9
3A 58 : Colon
3B 59 ; Semicolon
3C 60 <
3D 61
3E 62 >
3F 63 ?
40 64 @
41 65 A
42 66 B
43 67 C
44 68 D
45 69 E
46 70 F
47 71 G
48 72 H
49 73 1
4A 74 J
4B 75 K
4C 76 L
4D 77 M
4E 78 N
4F 79 O
50 80 P
51 81 Q
52 82 R
53 83 S
54 84 T
55 85 U
56 86 V
57 87 W
58 88 X
59 89 Y
5A 90 Z
5B 91 [
5C 92 \ Backslash
5D 93 1
5E 94 ^ Circumflex
5F 95 _ Underscore
60 96 Grave accent
61 97 a
62 98 b
** Page 134
63 99 c
64 100 d
65 101 e
66 102 f
67 103 9
68 104 h
69 105 i
6A 106 j
6B 107 k
6C 108 l
6D 109 m
6E 110 n
6F 111 o
70 112 p
71 113 q
72 114 r
73 115 s
74 116 t
75 117 u
76 118 v
77 119 w
78 120 x
79 121 y
7A 122 z
7B 123 {
7C 124
7D 125 }
7E 126 ~ Tilde
7F 127 DEL Delete
Baudot
This is the telex/telegraphy code known to the CCITT as International
Alphabet No 2. It is essentially a 5-bit code, bracketed by a start
bit (space) and a stop bit (mark). Idling is shown by 'mark'. The
code only supports capital letters, figure and two 'supervisory'
codes: 'Bell' to warn the operator at the far end and 'WRU'--'Who are
you?' to interrogate the far end 'Figures' changes all characters
received after to their alternates and 'Letters' switches back. The
letters/figures shift is used to give the entire character set.
** Page 135
Viewdata
This is the character set used by the UK system, which is the most
widely used, world-wide. The character-set has many features in
common with ASCII but also departs from it in significant ways,
notably to provide various forms of graphics, colour controls,
screen-clear (ctrl L) etc. The set is shared with teletext which in
itself requires further special codes, e.g. to enable sub-titling to
broadcast television, news flash etc. If you are using proper
viewdata software, then everything will display properly; if you are
using a conventional terminal emulator then the result may look
confusing. Each character consists of 10 bits:
Start binary 0
7 bits of character code
Parity bit even
Stop binary 1
ENQ (Ctrl E) is sent by the host on log-on to initiate the
auto-log-on from the user's terminal. If no response is obtained, the
user is requested to input the password manually. Each new page
sequence opens with a clear screen instruction (Ctrl L, CHR$12)
followed by a home (Ctrl M, CHR$14).
Some viewdata services are also available via standard asynchronous
300/300 ports (Prestel is, for example); in these cases, the graphics
characters are stripped out and replaced by ****s; and the pages will
scroll up the screen rather than present themselves in the
frame-by-frame format.
** Page 136
*** Original contains a diagram of Viewdata Graphic Character Set.
** Page 137
If you wish to edit to a viewdata system using a normal keyboard,
or view a viewdata stream as it comes from a host using
'control-show' facilities, the table below gives the usual
equivalents. The normal default at the left-hand side of each line is
alphanumeric white. Each subsequent 'attribute', i.e. if you wish to
change to colour, or a variety of graphics, occupies a character
space. Routing commands and signals to start and end edit depend on
the software installed on the viewdata host computer: in Prestel
compatible systems, the edit page is *910#, options must be entered
in lower case letters and end edit is called by <esc>K.
esc A alpha red esc Q graphics red
esc B alpha green esc R graphics green
esc C alpha yellow esc S graphics yellow
esc D alpha blue esc T graphics blue
esc E alpha magenta esc U graphics magenta
esc F alpha cyan esc V graphics cyan
esc G alpha white esc W graphics white
esc H flash esc I steady
esc L normal height esc M double height
esc Y contiguous graphics esc Z separated graphics
esc ctrl D black background esc-shift M new background
(varies)
esc J start edit esc K end edit
EBCDIC
The Extended Binary Coded Decimal Interchange Code is a 256-state
8-bit extended binary coded digit code employed by IBM for internal
purposes and is the only important exception to ASCII. Not all 256
codes are utilised, being reserved for future expansion, and a number
are specially identified for application- specific purposes. In
transmission, it is usual to add a further digit for parity checking.
Normally the transmission mode is synchronous, so there are no
'start' and 'stop' bits. The table shows how EBCDIC compares with
ASCII of the same bit configuration.
** Page 138
IBM control characters:
EBCDIC bits Notes
NUL 0000 0000 Nul
SOH 0000 0001 Start of Heading
STX 0000 0010 Start of Text
ETX 0000 0011 End of Text
PF 0000 0100 Punch Off
HT 0000 0101 Horizontal Tab
LC 0000 0110 Lower Case
DEL 0000 0111 Delete
0000 1000
RLF 0000 1001 Reverse Line Feed
SMM 0000 1010 Start of Manual Message
VT 0000 1011 Vertical Tab
FF 0000 1100 Form Feed
CR 0000 1101 Carriage Return
SO 0000 1110 Shift Out
Sl 0000 1111 Shift In
DLE 0001 0000 Data Link Exchange
DC1 0001 0001 Device Control 1
DC2 0001 0010 Device Control 2
TM 0001 0011 Tape Mark
RES 0001 0100 Restore
NL 0001 0101 New Line
BS 0001 0110 Back Space
IL 0001 0111 Idle
CAN 0001 1000 Cancel
EM 0001 1001 End of Medium
CC 0001 1010 Cursor Control
CU1 0001 1011 Customer Use 1
IFS 0001 1100 Interchange File Separator
IGS 0001 1101 Interchange Group Separator
IRS 0001 1110 Interchange Record Separator
IUS 0001 1111 Interchange Unit Separator
DS 0010 0000 Digit Select
SOS 0010 0001 Start of Significance
FS 0010 0010 Field Separator
0010 0011
BYP 0010 0100 Bypass
LF 0010 0101 Line Feed
ETB 0010 0110 End of Transmission Block
** Page 139
EBCDIC bits Notes
ESC 0010 0111 Escape
0010 1000
0010 1001
SM 0010 1010 Set Mode
CU2 0010 1011 Customer Use 1
0010 1100
ENQ 0010 1101 Enquiry
ACK 0010 1110 Acknowledge
BEL 0010 1111 Bell
0011 0000
0011 0001
SYN 0011 0010 Synchronous Idle
0011 0011
PN 0011 0100 Punch On
RS 0011 0101 Reader Stop
UC 0011 0110 Upper Case
EOT 0011 0111 End of Transmission
0011 1000
0011 1001
0011 1010
CU3 0011 1011 Customer Use 3
DC4 0011 1100 Device Control 4
NAK 0011 1101 Negative Acknowledge
0011 1110
SUB 0011 1111 Substitute
SP 0100 0000 Space
** Page 140
APPENDIX V
Modems and Services
The table below shows all but two of the types of service you are likely to
come across; V-designators are the world-wide 'official names given by the
CCITT; Bell-designators are the US names:
Service Speed Duplex Transmit Receive Answer
Designator 0 1 0 1
V21 orig 300(*) full 1180 980 1850 1650 -
V21 ans 300(*) full 1850 1650 1180 980 2100
V23 (1) 600 half 1700 1300 1700 1300 2100
V23 (2) 1200 f/h(**) 2100 1300 2100 1300 2100
V23 back 75 f/h(**) 450 390 450 390 -
Bell 103 orig 300(*) full 1070 1270 2025 2225 -
Bell 103 ans 300(*) full 2025 2225 1070 1270 2225
Bell 202 1200 half 2200 1200 2200 1200 2025
(*)any speed up to 300 baud, can also include 75 and 110 baud
services
(**)service can either be half-duplex at 1200 baud or asymmetrical
full duplex, with 75 baud originate and 1200 baud receive (commonly
used as viewdata user) or 1200 transmit and 75 receive (viewdata
host)
The two exceptions are:
V22 1200 baud full duplex, two wire
Bell 212A The US equivalent
Both these services operate by detecting phase as well as tone.
British Telecom markets the UK services under the name of Datel as
follows--for simplicity The list covers only those services which use
the PTSN or are otherwise easily accessible--4-wire services, for
example are excluded.
** Page 141
Datel Speed Mode Remarks
100(H) 50 async Teleprinters, Baudot code
100(J) 75-110 async News services etc, Baudot code
50 async Telex service, Baudot code
200 300 async full duplex, ASCII
400 600 Hz async out-station to in-station only
600 1200 async several versions exist--for 1200
half-duplex; 75/1200 for viewdata
users; 1200/75forviewdata hosts; and
a rare 600 variant. The 75 speed is
technically only for supervision but
gives asymetrical duplex
BT has supplied the following modems for the various services-- the
older ones are now available on the 'second-user' market:
Modem No Remarks
1200 half-duplex--massive
2 300 full-duplex--massive
11 4800 synchronous--older type
12 2400/1200 synchronous
13 300 full-duplex--plinth type
20(1) 1200 half-duplex--'shoe-box' style
(2) 1200/75 asymetrical duplex--'shoe-box' style
(3) 75/1200 asymetrical duplex--'shoe-box' style
21 300 full-duplex--modern type
22 1200 half-duplex--modern type
24 4800 synchronous--modern type (made by Racal)
27A 1200 full duplex, sync or async (US made &
modified from Bell 212A to CCITT tones)
27B 1200 full duplex, sync or async (UK made)
You should note that some commercial 1200/1200 full duplex modems
also contain firmware providing ARQ error correction protocols;
modems on both ends of the line must have the facilities, of course.
** Page 142
BT Line Connectors
Modems can be connected directly to the BT network ('hard- wired')
simply by identifying the pair that comes into the building. Normally
the pair you want are the two outer wires in a standard 4 x 2 BT
junction box. (The other wires are the 'return' or to support a
'ringing' circuit.)
A variety of plugs and sockets have been used by BT. Until
recently, the standard connector for a modem was a 4-ring jack, type
505, to go into a socket 95A. Prestel equipment was terminated into a
similar jack, this time with 5 rings, which went into a socket type
96A. However, now all phones, modems, viewdata sets etc, are
terminated in the identical modular jack, type 600. The corresponding
sockets need special tools to insert the line cable into the
appropriate receptacles.
Whatever other inter-connections you see behind a socket, the two
wires of the twisted pair are the ones found in the centres of the
two banks of receptacles. North America also now uses a modular jack
and socket system, but not one which is physically compatible with UK
designs...did you expect otherwise?
** Page 143
APPENDIX VI
The Radio Spectrum
The table gives the allocation of the radio frequency spectrum up
30 MHz. The bands in which radio-teletype and radio-data traffic are
most common are those allocated to 'fixed' services, but data traffic
is also found in the amateur and maritime bands.
LF,MF,HF, RADIO FREQUENCY SPECTRUM TABLE
9 -- 14 Radionavigation
14 -- 19.95 Fixed/Maritime mobile
20 Standard Frequency & Time
20.05 -- 70 Fixed & Maritime mobile
70 -- 90 Fixed/Maritime mobile/Radionavigation
90 -- 110 Radionavigation
110 -- 130 Fixed/Maritime mobile/Radionavigation
130 -- 148.5 Maritime mobile/Fixed
148.5 -- 255 Broadcasting
255 -- 283.5 Broadcasting/Radionavigation(aero)
283.5 -- 315 Maritime/Aeronautical navigation
315 -- 325 Aeronautical radionavigation/Maritime
radiobeacons
325 -- 405 Aeronautical radionavigation
405 -- 415 Radionavigation (410 = DF)
415 -- 495 Aeronautical radionavigation/Maritime mobile
495 -- 505 Mobile (distress & calling) > 500:cw&rtty
505 -- 526.5 Maritime mobile/Aeronautical navigation
526.5 -- 1606.5 Broadcasting
1606.5 -- 1625 Maritime mobile/Fixed/Land mobile
1625 -- 1635 Radiolocation
1635 -- 1800 Maritime mobile/Fixed/Land mobile
1800 -- 1810 Radiolocation
1810 -- 1850 Amateur
1850 -- 2000 Fixed/Mobile
** Page 144
2000 -- 2045 Fixed/Mobile
2045 -- 2160 Maritime mobile/Fixed/Land mobile
2160 -- 2170 Radiolocation
2170 -- 2173.5 Maritime mobile
2173.5 -- 2190.5 Mobile (distress & calling) >2182--voice
2190.5 -- 2194 Maritime & Mobile
2194 -- 2300 Fixed & Mobile
2300 -- 2498 Fixed/Mobile/Broadcasting
2498 -- 2502 Standard Frequency & Time
2502 -- 2650 Maritime mobile/Maritime radionavigation
2650 -- 2850 Fixed/Mobile
2850 -- 3025 Aeronautical mobile (R)
3025 -- 3155 Aeronautical mobile (OR)
3155 -- 3200 Fixed/Mobile/Low power hearing aids
3200 -- 3230 Fixed/Mobile/Broadcasting
3230 -- 3400 Fixed/Mobile/Broadcasting
3400 -- 3500 Aeronautical mobile (R)
3500 -- 3800 Amateur/Fixed/Mobile
3800 -- 3900 Fixed/Aeronautical mobile (OR)
3900 -- 3930 Aeronautical mobile (OR)
3930 -- 4000 Fixed/Broadcasting
4000 -- 4063 Fixed/Maritime mobile
4063 -- 4438 Maritime mobile
4438 -- 4650 Fixed/Mobile
4650 -- 4700 Aeronautical mobile (R)
4700 -- 4750 Aeronautical mobile (OR)
4750 -- 4850 Fixed/Aeronautical mobile (OR)/
Land mobile/Broadcasting
4850 -- 4995 Fixed/Land mobile/Broadcasting
4995 -- 5005 Standard Frequency & Time
5005 -- 5060 Fixed/Broadcasting
5060 -- 5450 Fixed/Mobile
5450 -- 5480 Fixed/Aeronautical mobile (OR)/Land mobile
5480 -- 5680 Aeronautical mobile (R)
5680 -- 5730 Aeronautical mobile (OR)
5730 -- 5950 Fixed/Land mobile
5950 -- 6200 Broadcasting
6200 -- 6525 Maritime mobile
6525 -- 6685 Aeronautical mobile (R)
6685 -- 6765 Aeronautical mobile ~OR)
6765 -- 6795 Fixed/lSM
7000 -- 7100 Amateur
7100 -- 7300 Broadcasting
7300 -- 8100 Maritime mobile
** Page 145
8100 -- 8195 Fixed/Maritime mobile
8195 -- 8815 Maritime mobile
8815 -- 8965 Aeronautical mobile (R)
8965 -- 9040 Aeronautical mobile ~OR)
9040 -- 9500 Fixed
9500 -- 9900 Broadcasting
ggoo -- 9995 Fixed
9995 -- 10005 Standard Frequency & Time
10005 -- 10100 Aeronautical mobile (R)
10100 -- 10150 Fixed/Amateur(sec)
10150 -- 11175 Fixed
11175 -- 11275 Aeronautical mobile (OR)
11275 -- 11400 Aeronautical mobile (R)
11400 -- 11650 Fixed
11650 -- 12050 Broadcasting
2050 -- 12230 Fixed
12230 -- 13200 Maritime mobile
13200 -- 13260 Aeronautical mobile (OR)
13260 -- 13360 Aeronautical mobile (R)
13360 -- 13410 Fixed/Radio Astronomy
13410 -- 13600 Fixed
13600 -- 13800 Broadcasting
13800 -- 14000 Fixed
14000 -- 14350 Amateur
14350 -- 14990 Fixed
14990 -- 15010 Standard Frequency & Time
15010 -- 15100 Aeronautical mobile (OR)
15100 -- 15600 Broadcasting
15600 -- 16360 Fixed
16360 -- 17410 Maritime mobile
17410 -- 17550 Fixed
17550 -- 17900 Broadcasting
17900 -- 17970 Aeronautical mobile (R)
17970 -- 18030 Aeronautical mobile (OR)
18030 -- 18052 Fixed
18052 -- 18068 Fixed/Space Research
18068 -- 18168 Amateur
18168 -- 18780 Fixed
18780 -- 18900 Maritime mobile
18900 -- 19680 Fixed
** Page 146
19680 -- 19800 Maritime mobile
19800 -- 19990 Fixed
19990 -- 20010 Standard Frequency & Time
20010 -- 21000 Fixed
21000 -- 21450 Amateur
21450 -- 21850 Broadcasting
21850 -- 21870 Fixed
21870 -- 21924 Aeronautical fixed
21924 -- 22000 Aeronautical (R)
22000 -- 22855 Maritime mobile
22855 -- 23200 Fixed
23200 -- 23350 Aeronautical fixed & mobile (R)
23350 -- 24000 Fixed/Mobile
24000 -- 24890 Fixed/Land mobile
24890 -- 24990 Amateur
24990 -- 25010 Standard Frequency & Time
25010 -- 25070 Fixed/Mobile
25070 -- 25210 Maritime mobile
25210 -- 25550 Fixed/Mobile
25550 -- 25670 Radio Astronomy
25670 -- 26100 Broadcasting
26100 -- 26175 Maritime mobile
26175 -- 27500 Fixed/Mobile (CB) (26.975-27.2835 ISM)
27500 -- 28000 Meteorological aids/Fixed/Mobile (CB)
28000 -- 29700 Amateur
29700 -- 30005 Fixed/Mobile
Note: These allocations are as they apply in Europe, slight variations occur
in other regions of the globe.
** Page 147
APPENDIX VII
Port-finder Flowchart
This flow-chart will enable owners of auto-diallers to carry out
an automatic search of a range of telephone numbers to determine
which of them have modems hanging off the back.
It's a flow-chart and not a program listing, because the whole
exercise is very hardware dependent: you will have to determine what
sort of instructions your auto-modem will accept, and in what form;
you must also see what sort of signals it can send back to your
computer so that your program can 'read' them.
You will also need to devise some ways of sensing the phone line,
whether it has been seized, whether you are getting 'ringing', if
there is an engaged tone, a voice, a number obtainable tone, or a
modem whistle. Line seizure detect, if not already available on your
modem, is simply a question of reading the phone line voltage; the
other conditions can be detected with simple tone decoder modules
based on the 567 chip.
The lines from these detectors should then be brought to a A/D
board which your computer software can scan and read.