DataMuseum.dk

Presents historical artifacts from the history of:

CR80 Wang WCS documentation floppies

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CR80 Wang WCS documentation floppies

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦b59878e3d⟧ Wang Wps File

    Length: 3236 (0xca4)
    Types: Wang Wps File
    Notes: Spelunked
    Names: »~ORPHAN75.08«

Derivation

└─⟦b3a67856d⟧ Bits:30006040 8" Wang WCS floppy, CR 0065A
    └─ ⟦this⟧ »~ORPHAN75.08« 

WangText

+…00……00……00……00…K…0a……00……00…K…0b…K
…19… …18……0c……18……05……17……0f……17… …16……0b……16……0e……16…
…15……0a……15……0d……15……0e……15……0f……15……05……14……09……14……0e……14……0f……14……86…1                                             …02…           …02…   …02…        

…02…CPS/SDS/003

…02…OKH/810801…02……02…
MESSAGE MANAGEMENT SYSTEM
…02……02…CAMPS







                    T̲A̲B̲L̲E̲ ̲O̲F̲ ̲C̲O̲N̲T̲E̲N̲T̲S̲



   1  GENERAL ...................................... 
    10

     1.1  PURPOSE AND SCOPE .........................
       10
     1.2  APPLICABLE DOCUMENTS AND PROJECT REFERENCES
       10
       1.2.1  Applicable Documents ..................
         10

     1.3  TERMS AND ABBREVIATIONS ...................
       11
       1.31  Terms ................................. 
        11
       1.3.2  Abbreviations .........................
         11

   2  SUMMARY OF REQUIREMENTS .......................
     12

     2.1  PACKAGE DESCRIPTION .......................
       12
       2.1.1  Package Interrelatios ................ 
        12
         2.1.1.1  Application Packages ..............
           12
         2.1.1.2  Checkpoint Transmission ...........
           13
         2.1.1.3  DMA Data Transfer .................
           13

     2.2  PACKAGE FUNCTIONS .........................
       16
       2..1  Main Functions ........................ 
        16
         2.2.1.1  Storage Structure .................
           16
         2.2.1.2  CIF Directories ...................
           20
         2.2.1.3  CIF and View Structure ............
           20
           2.2.1.3.1  CIFs, Fields, and Vies ....... 
            20
             2.2.1.3.1.1  Field .....................
               20
             2.2.1.3.1.2  Field Group ...............
               20
             2.2.1.3.1.3  CIF .......................
               21
             2.2.1.3.1.4  View ......................
               23

           2.2.1.3.2  Creationand Deletion ......... 
            26
             2.2.1.3.2.1  CIF Creation and Deletion .
               26
             2.2.1.3.2.2  View Creation and
                          Deletion ..................
                           26
             2.2.1.3.2.3  Field Creation and Deletion
               27

           2.2.1.3.3  Field Access ................. 
            28
           2.2.1.3.4  Disk Space Allocation .........
             29


         2.2.1.4  CIF Attributes ....................
           32
           2.2.1.4.1  Permanent CIF .................
             32
           2.2.1.4.2  Recoveable CIF ............... 
            32
           2.2.1.4.3  Security Profile ..............
             34
           2.2.1.4.4  Application Control Information
             34
           2.2.1.4.5  CIF Versions ..................
             34

         2.2.1.5  CIF Storage and Retrieval .........
           35
         2.2.1.5.1  Storage .......................  
         35
           2.2.1.5.2  Retrieval .....................
             36

         2.2.1.6  CIF and View Referencing ..........
           39
         2.2.1.7  Commands ..........................
           39

       2.2.2  Functional Responsibilities........... 
        41
         2.2.2.1  Initialization, Close Down, and
                  Restart ...........................
                   41
         2.2.2.2  Checkpointing and Recovery ........
           42
           2.2.2.2.1  Checkpoints ...................
             42
             2.2.2.2.1.1  SAVE Commad .............. 
              43
             2.2.2.2.1.2  Checkpoint Array ..........
               44
             2.2.2.2.1.3  Recovery Level ............
               44

           2.2.2.2.2  Recovery Actions ..............
             44

         2.2.2.3  Error Detection and Error Handling 
           47
         2.2.2.4