Computer Centre Bulletin, Volume 2 Number 10, 6th October 1969
User Manual: Computer Centre Bulletin, Volume 2 Number 10, 6th October 1969
Open the PDF directly: View PDF .
Page Count: 16
Download | |
Open PDF In Browser | View PDF |
UNIVERSITY OF QUEENSLAND COMPUTER CENTRE COMPUTER CENTRE BULLETIN _ - . ... uu~==~========================= Volume 2, Number 10. Editor: 6th October, 1969. H. L Smythe. ";'.\" .. :" THIS EDITION This issue of the Bulletin contains two major articles that should be of interest to the reader, one discussing, in general terms, the position of the law and computers, and the other describing the addition of hardware to the PDP 10 to improve further the efficiency of multi-programming. The Bulletin continues to inform readers of FORTRAN errors on the PDP 10, and a Letter to the Editor is also published. LETTERS TO THE EDITOR Recent events have shown that man is capable of travelling to the moon and back in less than two weeks. In the same amount of time, it is possible for any of us, using more conventional means of transport, to travel around the world, even stopping off for occasional sight seeing. In far less than two weeks, as recent history shows us, a war can commence and be won - or lost, according to one's particular outlook. Yet recently, some data I submitted to the Computer Centre were still awaiting preparation after two weeks. The only apparent movement was the transposition of my name from the end of a list to a position third from the top. The data were eventually prepared two weeks and five days after their submission and subsequently analysed by the GE 225 in four minutes. It seems to me that this situation is ludicrous and unnecessary. If the university is able to spend a large. sum on a modern computer, surely it should be possible to provide those ancillary services necessary to ensure its efficient use. If one has to wait for over two weeks to have one's data prepared, efficient use of the computer is not being made. Surely it is possible to have faster data preparation than thts. Many of us have either seen or heard of centres where a delay of more than a day for data preparation is the exception rather than the rule. 144 I have no immediate ambition to travel to the mooh, to have a round-the-world trip, or participate in a war, however little time is required. But together, I am sure, with many others at the University of Queensland, I would like to receive my prepared data cards before I have had time to forget MaZcoZm A. CoZston (Department of Kenmore~ Q. 4069. what they are all about. 5 GZencarron Street~ Education)~ [Ed. Note:- Mr. Colston's lett~r raises a query about the type and quality of service that the Computer Centre provides for keY-punching. The Centre is essentially a scientific data-processing centre, not a The data preparation service we offer is only a token service. In'fact, departments with significant punching reciuestshave installed keypunches for their own data preparation, data-preparation centre. Our records show that the average turnaround time for punching is approximately three days. There are, however, periods when the delay builds up because of sickness or changes of staff. This is unfortunate, but,to guarantee a maximum.turnaround time of only one or two days, key-punching staff would have to be increased considerably in order to cope with the peak demands rather than the average. This would mean a significant increase in charges for punching, and would, no doubt, inspire numerous Letters to the Editor! Incidentally, Mr. Colston's implication that the University purchased the computer and finances the ancillary services, is incorrect. The comp~ter was purchased with funds from a variety of sources, the University contributing about one-third. In particular,the University does not contribute to the Centre's data-preparation section. In fact, the cost of providing the key-punch service is barely covered by the charges ~hat are made.] .. FORTRAN IV ERRORS 1. It has been discovered that certain types of integer expressions do not compile correctly on the PDP 10. For example: K = L*(N-l)+(M*(N-ll)/2 At first sight, this would seem to be a fundamental ta~ling ot the comp~ler. However, a number of circumstances must exist before the error occurs. (a) There must be some common expression in the statement. example, this is (N-l). In the above 1'....... ..... 6,.. ~ 11 'BETTER GET THE A.S.1.0. ONTO THIS' (b) This common expression must be further operated on by other var;taole$, different for each occurrence of the common expTession, e.g. L*(N-l) and M*(N-l} (c) The last of these composite expressions :must oe further operated on by an integer divide, e.g. (M*(N-lll/2 Incorrect code is generated by the compiler. conditions does not exist~ If anyone of the aoove the correct code wtll oe produced, It is emphasized that the problem occurs only with integer expressions. 146 2. Variable dimensioning of arrays is permissible within subroutines and is a convenient means of creating a generalized routine for, say, matrix manipulation. Where the type of an array is not implicitly defined, the appropriate type statement must appear before the dimensioning statement for correct results, although documentation would lead one to believe that the order of specification statements is not significant. Thus: SUBROUTINE SR(A,Nl,N2) COMPLEX A DIMENSION A(Nl,N2) or SUBROUTINE SR(A,Nl,N2) COMPLEX A(Nl,N2) are correct, but SUBROUTINE SR(,A,Nl,N2) DIMENSION A(Nl,N2) COMPLEX A will lead to incorrect results. 3. GE 225 FORTRAN IV ERROR The form of expression that may be used as a subscript, is limited to a few simple expression types and does not include the use of a subscripted integer variable. Thus, an expression of the form: 141 DIMENSION A(12),II(15),JJ(15),X(15) A(II(J)) = A(II(J)) + X(JJ(J)) will not produce correct code although no compilation error is generated. While the compiler may, in fact, produce the correct code in some similar cases, it cannot be relied upon to do this, and thus should not be used. Any suspected errors should be reported to the Administrative Officer (Mr. John Jauncey, extension 8471). PDP 10 MEMORY PROTECTION, AND RELOCATION E. In a previous article, Mu~tiprooessing J. SokoU Conoepts by 1. Oliver (Vol. 2, No.3, 3rd March, 1969), reference was made to the concept of multiprogramming and the necessity for special hardware to provide this method of operation. This feature is available on the PDP 10 and allows a preset number of programs to be executed, even though they may not all exist in core at the same time. This is achieved by swapping programs between core memory and the fixed head disk (which has the characteristics of a drum) as dictated by the core space requirements of the program to be executed. Thus, in the process of execution, a program may be swapped in and out of core many times. Under these conditions , it is desirable that a program be capable of execution regardless of where it is stored in memory. provided by hardware relooation. This capability is Since a number of programs, including the executive for controlling the operation of the whole system, may exist in memory at the one time, provision must be made to ensure that these programs do not destroy one another, and this is provided by hardware proteotion. Before describing the operation of the relocation and protection hardware, it is necessary to consider the events leading to the execution of a program. As a result of compilation or assembly of a source program, a relocatable 148 object program is produced, where the instruction addresses are relative to zero. By means of a relocatable or linking loader, a number of relocatable \ programs and subprograms may be combined, or linked into a composite program ready for execution. The linking of program A, consisting of subprograms AI, A2 and A3 of length k, m and n, respectively, is illustrated in Figure 1. 0 0 Al Al k-l -k ------- - -- ------ k+m Program A2 0 A A3 A2 m-I k+m+n o n-I Before linking After linking Figure 1. LinkJ.ng of. Program A The addresses of programs AI' A2 and A3 were each originally relative to zero. After operation of the relocatable loader, addresses of programs A2 and A3 have undergone software relocation by an amount k, and k + m respectively, and now all addresses in the complete program A are relative to zero. So far then, the individual subprograms and .components of a complete program have been linked together, relocation of addresses has taken place, and the program is ready for execution. However, the program will not be stored from physical location zero since the resident executive occupies the first 16K of memory. determine what physical space the program will occupy. The executive will To ensure that the program will be executed correctly in the physical addressing space, relocation of addresses must be performed. This is achieved by hardware reZocation during execution of the program. To simplify the design and implementation of the protection and relocation hardware, core memory is divided in blocks of lK words. To ensure that each program is loaded at the start of a block, each program is allocated an integral number of lK blocks. The program A illustrated in Figure 1 occupies k + m + n locations, and may require PI + 1 blocks of core memory, designated o to f l ' Clearly, a portion of the last block, PI' may not be utilized. When a program is placed in core memory for execution, it must be stored beginning at a lK boundary. As shown in Figure 2, the program A occupies PI + 1 blocks, starting at block RI' However, the addresses in program A are still Block No. Q Executive (Pl+l)K words A Other User Programs P A Other User Programs Non~ 1/ 777777 __e~/x_i.s_t~~_nt~~. logical addressing space Figure 2. physical addressing space Logical and Physical Addressing 150 relative to zero prior to execution. The valuesof protection, P l , and relocation Rl , are placed in the protection and relocation registers respectively by the executive. When execution begins, a memory reference is first checked to ensure that it is legal. The number of the block of memory being addressed is compared with the contents of the protection register, and if the block number exceeds Pl' execution of program A is interrupted and control is transferred to another program. In this case, the executive would indicate that an illegal memory reference had occurred. If the protection check is satisfactory., then relocation is performed to transform the relative program address to an absolute physical memory address. This is achieved by adding the contents of the relocation register, R1 , to the relative program address. This is not done on all addresses. Index registers and accumulators reference one of the first sixteen locations in memory, and since these are integrated circuit registers with a very low access time, relocation is not performed to allow all programs to use these high performance registers. Program A may be swapped out of core and later swapped back in'to continue execution. If this occurs, it is not necessary for A to occupy the same physical area that it occupied previously, nor is it likely or desirable. Before execution of A is continued, the executive reloads the relocation register with the appropriate relocation constant. base address. This constant is sometimes referred to as the A program may also dynamically alter its memory requirements, in which case the executive will modify the contents of the protection register to allow more or less memory to be used by a program. In a static situation, during which swapping is not in operation, a number of programs may exist in core memory. $aheduZel'~ A program in the executive, known as the determines which program should be run next. When this is determined, the executive will set the appropriate values in the protection and relocation register, and pass control to the selected program. After a short period of time, control may be passed to another program which requires use of the processor, but with values for pro.tection and relocation which apply to this particular program. So far, the operation of a simple form of relocation and protection which was incorporated in the PDP 10 has been described. Recently; additional hardware has been installed in the PDP 10 to improve further the efficiency of multiprogramming. This additional hardware includes a second set of proteation and relocation registers, and the advantages of this feature are now discussed. 151 It is possible that a number of jobs may require a FORTRAN compilation. In the original PDP 10 system, a copy of FORTRAN compiler was loaded for each job which required it, requiring 11K of memory for each copy of the compiler. With more than two such jobs, swapping was necessary to service other programs requesting access to the processor. As the number of programs requiring execution increases. then the processor is involved in a larger amount of swapping, and so processor efficiency decreases. It also results in a poor response time of terminals in a time-sharing system. A program may be designed so that it is capable of being re-entered by a number of different programs. With this capability. a be shared by any task in the system which requires it. re~entrant program may For frequently-used programs such as the FORTRAN compiler, this capability is very desirable, since only one copy of the compiler is required in core. In general, a re-entrant program consists of a pure part and an impure part. The pure part is that part of a program which is never modified during execution, and would normally include most of the instructions and constants, while the impure part may be modified during execution. and would include areas for buffers, tables and results. In the case of the PDP 10 FORTRAN compiler, the pure part occupies9K, while the minimum size of the impure part is 2K. With 32K of memory available, a maximum of 11 FORTRAN compilations could be performed without the need for swapping. If swapping is necessary. only the impure part is swapped out onto disk, with a resultant saving in the swapping time, and more economic utilization of disk storage. For flexibility, it is desirable that the two parts of are-entrant program occupy non-contiguous areas of memory, and~ to ensure execution of either part and access from one part to the other, two sets of protection and relocation registers are used. To ensure that the pure part is not altered, the hardware can be enabled to prevent information being written into this part. In this environment, as control is passed from one job to another, the executive now must load both set~ of 152 reg~sters with the appropriate values. Figure 3 illustrates the transformation from logical addresses to physical addresses with the two sets of registers. PI and RI are the values of protection and relocation for the impure part, while P 2 and R2 are the values of protection and relocation for the pure part. o PI 0 Impure A Executive f RI f Other Users 1 -t R2 II roo- - I~ Impure A x Other Users x Pure A 1 Pure A 1// Other Users Illegal I___ 777777 ...I__ -L logical addressing space Figure 3. 7777 77 l/NIon-existent/ / / / I l?li.y~;tcal I I I I address:;[.ng space Relation between Logical and Physical addressing.space with dual protection· and relocation 153 There is no doubt that the re-entrant hardware will improve the efficiency of the multiprogramming capability of the PDP 10. The executive and system programs such as the FORTRAN compiler have been modified to make use of the re-entrant hardware, difference in batch jobs. Externally, there will be no noticeable When time sharing is provided,however, it should mean that a larger number of users will be serviced without any reduction in response time. THE lAW AND COMPUTERS This artiole is adapted from the Inaugural Leoture of Douglas J. Whalan, LL.B. (N.Z.), LL.M. (N.Z.), Ph.D. (Otago), Professor of Law in the University of Queensland. The University of Queensland Press is to publish the leoture in its Inaugural Leoture Series. Professor Whalan was born in New Zealand in 1929, qualifying as a solioitor (1950) and barrister (1951) of tne Supreme Coux>t of New ZeaZand. In 1958, he was appointed Senior Leoturer in Law at the University of Auokland, and gained the first Dootorate of Philosophy in Law to be awarded by a New Zealand University. While on study .leave in London in 1963-1964, Professor Whalan furthered his researoh into the registration of titles to land. From 1964-1967 he was suooessively Visiting Fellow, Fellow and Senior Fellow in the Researoh Sohool of Sooial Soienoes at the Australian National University, and, in 1967, he was appointed Professor of Law at the University of Queensland. Professor Whalan is a member of a Federal Attorney-General's Working Group on Refo~ in the Australian Capital Territory. His publioations inolude a book on the law of trusts and trustees, and numerous artioles on the fields of wills, equity, registration of titles t9 land, and oomputers and the law. In his Inaugural Lecture, Professor Whalan pointed out that the issue of the law and computers was of vital importance to the development of law in society. He strongly deprecated the fact that, in its attitude towards computers, Australian society was, like Gaul, divided into three parts - one part fears, one sneers, and the other cheers. the law barely hears I Regrettably, said Professor Whalan, This is one of the principal themes of the lecture: either lawyers quickly wake up or they will be run over by the rapidly-revolving wheels of the computer revolution. Professor Whalan also discussed the legal problems arising from the application of computer technology to fields such as tort, evidence, individual freedom and privacy. 154 The conclusion he reaChes is that radical legislative changes are urgently needed to meet the demands of the computer age. adapt; The lawyer must think for the future, be flexible and ready to above all, he must recognize that scientific devel.opments can be used to assist him, not to enslave him. Professor Whalan described briefly .four main ways of using the computer in legal practice and analysis. Firstly, the computer is an invaluable tool which can rapidly and efficiently perform the more mundane functions of costing, accounting, and general clerical and office management work. However, the problem of confidentiality arises as material will be processed outside the regulating bounds of the law office by an independent person who is not bound by legal ethics. Secondly, the computer provides convenient facilities for storage as a memory bank that never forgets. This power to retrieve information can be used to produce legal documents composed of stored data, and, at a more advanced level, it may be used to assist lawyers in analysing and comparing matter. Thirdly, statistical material can be processed with different variables used, and predictions may be made to assess future trends. England, Professor Whalan pointed out, was using data collected on accident cases and awards in this way. Fourthly, and perhaps the most complex of all, court judgments and statutes could be stored, indexed and analysed to determine prevailing judicial attitudes and plan future legislation. As this process depends very much on the particular interpretation that the person doing the processing gives to certain phrases, the number of combinations and resulting complexity are greatly increased. Professor Whalan said that he was not being unrealistic in his desire to use computer techniques to revolutionize law and to rationalize law reform in Australasia. His conclusions, in fact, were derived from successful methods that were already operating in several U.S. jurisdicttons, and would soon be instituted in England. While he admitted that the great cost of the computer was an inhibiting factor, he said that this was no suitable reason for postponing feasibility studies. Professor Whalan then went on to discuss SOme of the areas in which problems were likely to arise with the application of computer law. technology to most fields of One major problem area was the quest;tcm 0f the valj:d;t.tY' of evidence. As most data are supplied to a computer through human agency, the aearsay rule is held to apply unless all the data are sworn to in the Court by the particular individual 155 who initially supplied the data. urgent legislation. This problem, said Professor Whalan, requires Professor Whalan also mentioned the difficulties in probing and investigating evidence as he pointed out that identical output can result from the same program and data run on similar computers. With interesting far-sightedness, Professor Whalan suggested the use of the simulation processes to aid in the obtaining of evidence by setting up the conditions of the situation. Professor Whalan then discussed the issue of to~t or civil iiability, an increasingly significant question as computers become generally accepted in all kinds of enterprise. In this context, Professor Whalan pointed out that it could become negligence not to use the superior facilities of a computer! Will it, he asked, be negligence to disregard the use of simulation models to test stresses and strains when building an aircraft or a motor car or a bridge? Will it be negligence for the doctor to ignore the availability of computer diagnostic programs? Problems are also raised as to precisely where liability lies should a mistake occur. These are only a few of the issues that will be reality for Australian law in the very near future. While Professor Whalan indicated that there was cause for concern with numerous other fields such as insurance, copyright, patents, property and labour relations, he felt that the issues of in particular required serious thought. p~ivaay and individual f~eedom He warned that, if no legislative action is taken, individual freedom will be blighted and our personal rights of privacy destroyed by indiscriminate access to computerized information. With an apt misquotation of Sir Winston Churchill, Professor Whalan said that never in the history of human endeavour has there been the opportunity for so much to be made available to so many by so few. He pointed out that not since the Domesday Book of William the Conqueror was such a vast amount of personal information available about the individual, ranging from his health record to his business and financial assets. This was accessible to both governmental and private authorities, to be used and misused. The computer simply collates quickly and efficiently all the scattered records existing in various places about each person. With grim accuracy, it can add and delete information, recall selected facts instantly, and, ominously, forget nothing. Professor Whalan pointed out that legislation must be enacted concerning data banks: 156 it should not be piecemeal, but rather an overall legislative provision dealing with the problem as a whole. Professor Whalan also suggested that information supplied unknowingly through the use of secret or bugging devices be dealt with severely. information supplied knowingly had considerable complications. However, Should, for example, information given willingly for one purpose be used for another purpose? Should governmental and private agencies have access to the same memory dumps? How can a person know whether the information supplied about him is accurate or not? If inaccurate, can the person sue for damages, and whom lor what} does he sue? Broadly, said Professor Whalan, rules must be established to restrict access to records, be they accurate or inaccurate. PrOfessor Whalan then put forth the interesting concept of habeas notae ("that you may have the writings") to control information banks. Thus, if a person knows or suspects that a record is maintained about him in a data bank or computer complex, he will be legally empowered to ask for a copy of its contents. Professor Whalan said that the idea of habeas notae could be extended to include records other than those which are maintained by the computer. Towards the end of his lecture, Professor Whalan pointed out that today's legislation explosion must be tamed and rechannelled with the aid of computer technology. There was a great need to stem this legislative and interpretative explosion, the 39 miles of law books in the American Library of Congress being a typical example. Professor Whalan urged lawyers to take advantage of the computer age, to use the computer to lessen burdens of technical routine, and make the lawyer freer to think and create. He did not envisage the computer replacing the judge and jury. but said it was a useful tool to handle the ever-growing quantity of legal material. Law must be stable, he said, but it must not stand still. By harnessing computer facilities, the lawyer will be relieved of laborious detail; he will be free to analyse, interpret and plan for the future. 157
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Has XFA : No XMP Toolkit : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-21:37:19 Modify Date : 2017:08:06 06:04:06-07:00 Create Date : 2010:06:20 16:04:28+10:00 Metadata Date : 2017:08:06 06:04:06-07:00 Format : application/pdf Document ID : uuid:6a4a2bf1-419f-4d47-8c86-934e430ffa48 Instance ID : uuid:aa4c5544-dafa-ec44-a33e-0ee8f2766a0b Producer : Adobe Acrobat 9.0 Paper Capture Plug-in Page Layout : SinglePage Page Count : 16EXIF Metadata provided by EXIF.tools