Skip to main content

Full text of "Accounting System Primer"

See other formats


LIBRARY  OF  THE 

UNIVERSITY  OF  ILLINOIS 

AT  URBANA-CHAMPAIGN 

510.84 
1463c 
*o.8l-90 


ENfiWEER"^ 


51976 

The  person  charging  this  material  is  re- 
sponsible for  its  return  to  the  library  from 
which  it  was  withdrawn  on  or  before  the 
Latest  Date  stamped  below. 

Theft,  mutilation,  and  underlining  of  books 
are  reasons  for  disciplinary  action  and  may 
result  in  dismissal  from  the  University. 

UNIVERSITY    OF     ILLINOIS     LIBRARY    AT    URBANA-CHAMPAIGN 


CONFE 


WW      6REC* 


ill  ill 


iJU/ift 


L161  — O-1096 


Digitized  by  the  Internet  Archive 

in  2012  with  funding  from 

University  of  Illinois  Urbana-Champaign 


http://archive.org/details/accountingsystem89alsb 


CONFERENCE  ROl 


ENGINEERING  LIBRARY 
UNIVERSITY  OF  ILLINOIS 

BRBANAi  ILLINOIS 


:ed  Computation 


UNIVERSITY  OF  ILLINOIS  AT  URBANA-CHAMPAIGN 

URBANA.  ILLINOIS  61801 


m    5  1976 


~>     L"     IHHIO& 


CAC  Document  No.  89 


Accounting  System  Primer 

by 

Peter  A.  Alsberg 
and 
John  R.  Mullen 


Revised  August  1974 


cNCWEOWItt  UBKAKT 


Table  of  Contents 
—  Page 

Introduction  

The  Computers  Involved  

Ledger  Program  Overview   

Entering  Transactions  into  the  Ledger   4 

Syntax  Diagram  Examples   

q 
Examples  of  Transactions  

Checking  and  Freezing  Temporary  Transactions  11 

Examples  of  Temporary  Transactions  Requests   14 

Generating  Reports  on  Permanent  Transactions  15 

Adding  Accounts,  Classes,  Subclasses,  and  Synonyms 17 

Examples  of  Name  Modification   

20 
Miscellaneous  Commands  

Security • 

2S 
Getting  into  the  Accounting  System  

Where  to  Get  Help   


Table  of  Figures 

Figure  Page 

1  Entering  Transactions  .  8 

2  Checking,  Editing,  and  Freezing  Temporary  Transactions   ......  13 

3  Report  Generation  16 

4  Creating  and  Naming  Accounts,  Classes  and  Subclasses   18 

5  Connecting  to  Multics  26 

6  A  Sample  Session   


Introduction 

The  Center  for  Advanced  Computation  accounting  system  was  built  by  the 
Center  for  Advanced  Computation  to  reduce  the  paper  work  in  the  business  office 
and  speed  up  the  preparation  of  reports.   The  system  knows  about  the  University 
of  Illinois  accounting  procedures  and  has  been  tuned  to  these  procedures.   It 
may  not  be  acceptable  for  use  in  other  environments. 

The  only  program  currently  running  in  the  system  is  a  ledger  program. 
The  ledger  program  is  of  interest  primarily  to  the  accountant.   At  present  it 
contains  no  sophisticated  retrieval  or  analysis  capabilities.   It  can  only  record 
transactions  and  write  these  transactions  back  out  completely  itemized  and  organized 
by  account,  by  month,  by  year,  and  by  expense  class  and  subclass. 

If  sufficient  interest  is  shown,  other  facilities  will  be  added  to  the 
system  to  facilitate  budget  preparation,  to  sound  alarms  when  expenses  increase 
at  a  rate  that  jeopardizes  budgets  and  to  allow  the  retrieval  of  the  full  history 
of  any  purchase  order  over  a  multi-year  period.   Eventually,  we  expect  that  the 
system  will  maintain  personnel  files  to  help  facilitate  budget  preparation  and 
automatically  log  payroll  transactions  into  the  ledger  system.   We  are  also  looking 
at  a  facility  to  reduce  the  amount  of  time  spent  rationalizing  departmental  records 
to  the  monthly  university  statement  for  each  account. 


The  Computers  Involved 

The  system  runs  on  the  Multics  computing  system  at  MIT  in  Cambridge, 
Massachusetts.   We  use  Multics  because 

1.  it  is  easily  available  from  the  Urbana  campus; 

2.  it  is  the  cheapest  system  for  building  this  kind  of  accounting  system; 

3.  we  can  build  the  complete  system  in  a  much  shorter  time  than  on  any 
other  computer; 

A.   Multics  is  the  only  system  currently  available  that  provides  us  with  a  high 
degree  of  security  and  privacy. 

The  link  from  the  University  of  Illinois  to  the  Multics  computer  at 
MIT  is  the  ARPA  computer  network.   All  that  the  user  normally  sees  is  a  typewriter- 
like terminal  in  his  own  office.  A  local  computer  at  the  Center  for  Advanced 
Computation,  called  ANTS  (ARPA  Network  Terminal  System),  makes  it  easy  to  use  the 
ARPA  network  and  the  accounting  system  at  Multics.   The  accounting  system  user 
makes  only  one  phone  call  and  types  5  or  6  words.   From  that  point  on  he  is  inside 
the  accounting  system  at  Multics  and  he  can  forget  about  networks  and  telephone 
lines  and  local  computers  like  ANTS. 


Ledger  Program  Overview 

The  ledger  program  treats  each  department  separately.   The  departmental 
data  contained  in  the  accounting  system  can  only  be  read  and  written  by  specifically 
authorized  persons  in  each  department.   These  data  access  permissions  are  controlled 
on  a  department  by  department  and  individual  by  individual  basis.   The  programmers 
at  the  Center  for  Advanced  Computation  can  show  you  how  to  set  the  various  data 
access  privileges. 

Each  department  can  choose  its  own  expense  classes  independent  of  the 
expense  classifications  used  in  other  departments.   However,  expense  classifications 
apply  to  all  accounts  in  the  one  department.  All  expense  classes  must  be  broken 
into  expense  subclasses.   For  example,  a  department  might  choose  a  simple  three 
class  scheme:  wages,    equipment,    and  other.      Wages  might  be  broken  down  into 
subclasses  like:  faculty ',   professional,   non- academic,    undergraduate  hourly , 
graduate  research  assistants,    etc.  Similarly,  the  equipment   class  and  the  other 
class  can  be  broken  down  into  a  variety  of  subclasses.   Departments  may  have  a 
very  large  number  of  accounts,  classes,  and  subclasses  if  they  choose.   Depart- 
ments may  also  specify  multiple  names  and  abbreviations  for  each  of  their  accounts, 
classes,  and  subclasses. 


Entering  transactions  Into  the  ledger 

The  transactions  in  the  ledger  system  are  either  temporary  or  frozen. 
When  transactions  are  first  entered  into  the  system  they  are  only  temporary. 
While  they  are  temporary  you  can  change  the  values  of  some  of  the  fields  of  the 
transaction,  delete  a  transaction  altogether  or  perform  various  checks  and  request 
sub-totals  to  check  the  validity  of  the  temporary  transactions.   ONCE  A  TEMPORARY 
TRANSACTION  HAS  BEEN  FROZEN  IT  CAN  NEVER  BE  CHANGED  AGAIN .   The  frozen  transactions 
form  a  permanent  record.   These  frozen  transactions  cannot  be  tampered  with  in 
any  way.   They  cannot  be  intentionally  or  unintentionally  altered  or  deleted. 

Since  frozen  transactions  are  so  permanent,  special  care  must  be  taken 
to  insure  their  accuracy.   If,  somehow,  you  still  make  a  mistake  and  freeze  an 
erroneous  transaction,  the  only  way  to  correct  the  error  is  to  enter  an  offsetting 
transaction.   A  good  working  technique  is  to  enter  10  or  20  transactions,  check 
them  for  accuracy  and  freeze  them.   Then  go  on  to  the  next  10  or  20  transactions. 
If  for  any  reason  either  your  terminal,  your  telephone  line,  ANTS,  the  ARPA  network, 
or  Multics  should  fail,  do  not  worry.   The  accounting  system  is  set  up  so  that 
it  remembers  everything  you  did.   The  worst  that  can  happen  is  that  you  might 
have  to  retype  the  very  last  line  you  were  working  on  when  your  terminal  or  the 
telephone  line  or  one  of  the  various  computers  failed. 

All  input  lines  are  terminated  by  a  carriage  return.   It  is  possible 
to  enter  a  textual  description  of  each  transaction.   Sometimes  this  description 
may  require  more  room  than  is  available  on  a  single  line.   This  is  no  problem. 
You  can  continue  descriptive  information  onto  the  next  line  and  the  next  and  the 
next  after  that.   In  fact,  the  system  is  set  up  so  that  you  could  write  several 
hundred  pages  of  description  for  one  transaction  if  you  really  wanted  to.   To 
continue  a  textual  description  onto  the  next  line  on  your  terminal,  type  a  plus, 
"+",  as  the  first  character  on  the  next  line.   All  continued  lines  will  begin 
with  a  plus. 


In  order  to  enter  a  transaction  you  must  specify  the  seven  fields  in 
the  transaction.   These  fields  are  an  action,  a  reference  code,  a  dollar  amount, 
a  subclass,  an  account,  a  date,  and  the  text  field  we  just  mentioned.   Each  of 
these  fields  is  separated  by  one  or  more  blanks.   With  the  exception  of  the  text 
field,  none  of  the  other  fields  may  contain  a  blank.   When  you  specify  the  names 
of  subclasses,  accounts,  and  classes  you  should  be  careful  in  your  use  of  upper 
and  lower  case.   The  accounting  system  knows  the  difference  between  an  upper  case 
and  a  lower  case  letter.   Each  class,  subclass,  and  account  may  have  several  names 
or  synonyms.   For  example,  you  might  have  a  subclass  with  the  name  Teaching_assistants. 
This  subclass  may  also  have  synonyms  TA,  ta,  and  gradta.   These  additional  names 
are  for  your  convenience.   The  accounting  system  knows  they  all  identify  the  same 
subclass  and  does  not  care  which  one  you  use. 

Even  with  the  heavy  use  of  short  synonyms  it  would  still  be  a  terrible 
bore  to  type  in  all  seven  fields  all  of  the  time.   If  you  are  entering  a  series 
of  transactions  and  the  last  few  fields  of  the  next  transaction  are  the  same  as 
the  last  transaction  then  you  don't  have  to  type  in  the  last  few  fields.   Type 
the  first  fields.   When  you  get  to  the  fields  that  are  the  same,  type  your  carriage 
return  to  terminate  the  transaction.   The  accounting  system  will  automatically 
copy  the  missing  fields  from  the  last  transaction.   You  might  also  want  to  use 
the  ditto  convention.   If  the  reference,  dollar  amount,  subclass,  account,  or 
date  field  of  the  next  transaction  is  the  same  as  the  last  transaction  you  can 
simply  enter  a  ditto  mark  (")  in  that  field.   The  accounting  system  will  automatically 
copy  the  dittoed  field  value  from  the  previous  transaction. 

The  format  of  a  transaction  is  shown  graphically  in  figure  1.   The  graph 
in  figure  1  is  called  a  syntax  diagram.  A  syntax  diagram  describes  all  of  the 
legal  ways  that  a  request  can  be  formed.   The  rules  for  syntax  diagrams  are  simple: 


1.  follow  the  path  from  left  to  right 

2.  where  single  or  multiple  characters  appear,  those  characters  must  be 
put  in  the  request  in  exactly  the  same  way  they  appear  in  the  syntax 
diagram 

3.  where  phrases  appear  in  pointy  brackets,  e.g.  <subclass  name>,  they 
describe  the  kind  of  thing  which  must  be  put  in  the  request  at  that 
point. 

Syntax  Diagram  Examples: 

j —  a  — v     /—  cat— \ 
\—  the-/   V_dog— / 

Means  that  the  only  legal  requests  are 
a  cat 
the  cat 
a  dog 
the  dog 


<name  of  animal>- 

has  a  very  large  number  of  phrases 
a  dog 


an  elephant 

dog 

cat 

mouse 

the  mouse 


(note  we  took  the  bottom  path  in 
the  first  phrase  and  skipped 
the  article  altogether) 


etc. 


The  ledger  system  has  a  very  simple  ledger  format.   There  are  only  two 
columns  of  importance,  the  cash  and  the  obligation  columns.   When  you  enter  a 
transaction  you  must  specify  what  actions  are  to  be  performed  on  the  cash  and 
obligation  columns.   You  can  either  debit  or  credit  one  or  both  of  the  cash  and 
obligation  columns.   For  example,  to  have  a  transaction  debit  the  cash  column 
you  would  use  the  action  code  "dc".   To  have  it  credit  the  obligation  column  you 
would  use  the  action  code  "co".   You  could  specify  that  the  transaction  debit 
the  cash  column  and  credit  the  obligation  column  by  using  the  action  code  "dcco". 
An  action  like  dcco  would  commonly  be  used  when  recording  an  expense  against  a 
continuous  purchase  order. 

The  next  field  in  the  transaction  is  the  reference  code  field.   Normally, 
the  reference  code  will  contain  a  university  purchase  order  number  or  a  departmental 
requisition  number.   The  reference  code  is  very  important.   Eventually  it  will 
be  used  to  provide  a  history  of  transactions  so  that  you  might,  for  example,  go 
back  many  years  and  retreive  all  transactions  that  occurred  relative  to  a  given 
purchase  order  of  requisition.   The  reference  code  must  be  at  least  one  character 
long  and  may  be  up  to  eight  characters  long.   Any  character  is  valid  except  for 
the  blank.   You  can  feel  free  to  use  letters,  digits,  and  marks  of  punctuation 
in  a  reference  code.   The  third  field  of  the  transaction  is  the  amount  field. 
The  amount  to  be  debited  or  credited  to  the  cash  or  obligation  column  is  specified 
in  dollars.   No  dollar  sign  should  be  typed  in  this  field.   Only  digits  and  the 
decimal  point  are  allowed.   If  an  even  dollar  amount  is  specified,  you  do  not  have 
to  use  the  decimal  point.   For  example,  $17.00  could  be  entered  as  17  or  17.00 
If  the  second  digit  after  the  decimal  point  is  a  0  it  may  be  omitted.   For  example, 
$17.20  could  be  entered  as  17.2.   No  more  than  2  digits  are  allowed  after  the  decimal 
point.   The  maximum  dollar  amount  that  can  be  recorded  in  this  system  is  approximately 
$343  million-.   Therefore,  each  transaction,  total  and  subtotal  must  be  less  than 
343  million  dollars  for  each  department. 


The  fourth  and  fifth  field  in  the  transactions  specify  a  subclass  name 
or  synonym  and  an  account  name  or  synonym. 

The  sixth  field  in  the  transaction  is  the  date  field.   The  date  must 
be  written  in  month-day-year  format  with  the  month,  day,  and  years  specified  as 
one  or  two  digits  and  separated  by  hyphens  or  slashes.   The  accounting  system  always 
knows  what  day  it  is.   If  you  specify  an  asterisk  (*)  in  the  date  field  it  will 
simply  use  today's  date. 

The  seventh  field  in  the  transaction  is  the  text  field.  The  text  field 
is  optional.  It  may  contain  blanks  and  it  may  be  continued  over  many  lines  using 
the  +  convention. 


cc  =  credit  cash 

dc  =  debit  cash 

co  =  credit  obligation 

do  =  debit  obligation 

dcco  =  debit  cash  and  credit  obligation 

etc. 

ref.  code  =  1  to  8  character  reference  code  (examples:  ABC  15x.3(L)  1347-L) 

amount    =  amount  to  be  debited  or  credited  in  dollars  without  the  dollar 
sign  (examples:  17  17.  17.00  17.2  17.23  14329.30) 

subclass   =  any  of  the  subclass  names  or  synonyms  established  for  the  dept. 

account   =  any  of  the  account  names  or  synonyms  established  for  the  dept . 

date      =  date  in  mm-dd-yy  format  (examples:  8-13-73  10-3-72  2-38-75) 

text      =  an  arbitrarily  long  description  of  a  transaction.   If  the  first 
character  on  the  next  line  is  a  "+"  then  the  next  line,  will  be 
treated  as  a  continuation  of  the  text  field.   As  many 
continuation  lines  as  desired  can  be  added  to  the  text  field 
by  using  additional  lines  beginning  with  a  "+" . 

*         =  in  a  date,  an  asterisk  means  today's  date 

=  a  ditto  in  a  field  means  that  the  same  field  on  the  immediately 
previous  transaction  should  be  copied  into  the  field  of  this 
transaction 

Entering  Transactions 

figure  1 

8 


Examples  of  Transactions 

The  symbol  (CR)  is  a  carriage  return. 

1.  add  $15,700.00  to  wages  and  subtract  it  from  the  equipment  allocation  for 
the  NSF-Adaras  account 

cc  budget  15700  wages  NSF-Adams  *  adjust  budget  (CR) 
dc   "      "   equipment  (CR) 

The  first  transaction  gave  wages  more  cash.   We  made  up  the  reference  code 
"budget".   The  text  field  contains  a  short  explanation  of  what  was  done.   The 
asterisk  specifies  today's  date.   The  second  transaction  subtracted  the  cash 
from  the  equipment  subclass.   The  reference,  amount,  account  and  date  fields 
are  the  same  as  the  previous  transaction  so  we  only  specified  the  action  and 
subclass  and  used  the  ditto  and  carriage  return  conventions  to  automatically 
copy  the  4  identical  fields.  The  text  field  of  the  second  transaction  will 
be  empty. 

2.  Obligate  purchase  order  1773-M  for  $100.37  of  machine  parts  on  account 
44-77-36-735  (with  alias  44/735) 

do  1773-M  100.37  shop-equip  44/735  *  misc.  machine  parts  (CR) 

3.  The  machine  parts  of  2  came  in  but  they  only  cost  $98.73.   Expense  it  and 
de-obligate  it. 

dc  1773-M  98.37  shop-equip  44/735  *  price  less  than  P.O.  (CR> 
co    "   100.37  (CR) 


The  first  transaction  shows  that  the  equipment  was  paid  for  and  how  much  it 
cost.   The  second  transaction  reduces  the  obligation  column  for  that  subclass 
by  the  amount  originally  obligated.   If  the  delivered  parts  had  cost  the  same 
as  was  obligated,  the  whole  thing  could  have  been  done  in  one  transaction: 

dcco  1773-M  100.37  shop-equip  44/735  * 


10 


Checking  and  Freezing  Temporary  Transactions 

Figure  2  is  a  syntax  diagram  which  shows  all  of  the  legal  requests  used 
to  process  temporary  transactions.   All  of  the  key  words  used  when  processing  temporary 
transactions  have  a  one  letter  synonym,  their  first  letter.  All  requests  to  work 
with  temporary  transactions  must  be  preceded  by  the  word  "temp"  or  its  synonym 
"t".   The  purpose  for  this  is  two  fold.   The  most  important  reason  is  that  it  will 
constantly  reinforce,  in  your  own  mind,  the  difference  between  temporary  and  permanent 
transactions.   The  second  reason  is  that  the  print  and  total  commands  will  also 
work,  in  a  slightly  different  fashion,  on  permanent  transactions.   By  putting  the 
t  or  temp  before  the  print  and  total  commands,  the  accounting  system  knows  that 
you  want  to  print  or  total  temporary  transactions  as  oppsed  to  permanent  transactions . 

Temporary  transactions  are  kept  in  their  own  buffer.   There  can  be  up 
to  approximately  25,000  temporary  transactions  in  that  buffer.   Each  transaction 
has  a  number  assigned  by  the  system.   When  you  ask  to  have  a  transaction  in  the 
temporary  buffer  printed,  the  accounting  system  will  also  tell  you  what  number 
it  has  assigned  to  the  transaction.   This  number  is  used  to  reference  the  transaction 
whenever  you  want  to  edit  it,  delete  it,  print  it,  etc.   There  are  7  commands  which 
can  be  used  in  the  temporary  buffer:  count,  print,  total,  set,  replace,  delete, 
and  freeze. 

The  count  command  tells  you  how  many  temporary  transactions  are  stored 

in  the  temporary  buffer.   If  any  temporary  transactions  have  been  deleted  the  count 

command  will  tell  you  how  many. 

The  print  command  prints  one  or  more  transactions.   When  you  ask  for 
a  print  of  a  transaction,  all  of  the  fields  in  the  transaction  are  reported  to 

you.   The  transaction  number  assigned  by  the  accounting  system  is  also  printed. 

The  print  command  may  have  0,  1,  or  2  numbers  following  it.   If  there  are  no  numbers, 


11 


- 


then  it  is  assumed  that  the  entire  temporary  buffer  should  be  printed.   If  there 
is  just  one  number,  then  the  single  transaction  with  that  number  will  be  printed. 
If  two  numbers  follow  the  print  command  then  the  second  number  must  be  greater 
than  the  first  number  and  all  transactions  from  the  first  number  up  through  and 
including  the  second  number  will  be  printed. 

The  total  command  produces  an  adding  machine  tape  for  temporary  transactions. 
The  total  debits  and  credits  to  both  the  cash  and  obligation  columns  of  the  specified 
transactions  is  computed  and  typed  out  for  you.   As  in  the  print  command,  the  entire 
buffer,  a  single  transaction,  or  a  group  of  contiguous  transactions  may  be  totalled. 

The  set  command  allows  you  to  correct  a  single  field  on  a  single  transaction 
in  temporary  buffer.  Following  the  set  command  is  a  transaction  number,  the  field 
name,  and  the  new  value  to  be  placed  into  the  field.   Figure  2  shows  the  allowed 
field  names.  Notice  that  most  of  the  fields  have  short  synonyms  available  for 

your  convenience. 

The  replace  command  allows  you  to  enter  a  new  transaction  and  have  it 
replace  a  single  existing  transaction.   The  replace  command  and  the  transaction 
number  are  typed  and  are  followed  by  the  new  transaction.   For  your  convenience 
the  accounting  system  will  assume  that  the  last  transaction  entered  was  the  transaction 
that  was  being  replaced.  Therefore,  the  ditto  and  carriage  return  conventions 
will  copy  fields  automatically  from  the  temporary  transaction  being  replaced. 

The  delete  command  will  delete  an  entire  buffer,  a  single  transaction, 
or  a  range  of  transactions.   To  protect  you  from  your  own  typographical  errors, 
the  delete  command  will  ask  you  if  you  are  sure  you  want  to  delete  the  specified       I 
transactions.   You  must  reply  "yes"  or  "no"  before  the  delete  will  be  performed. 
If  the  accounting  system  decides  that  these  are  too  many  deleted  transactions  in 
the  temporary  buffer  it  will  discard  them  and  renumber  the  remaining  temporary 
transactions . 


12 


The  temporary  freeze  command  will  freeze  all  of  the  transactions  in  the 
buffer,  a  single  transaction,  or  a  group  of  transactions.   Like  the  delete  command, 
the  freeze  command  will  also  ask  you  if  you  are  sure  you  want  to  freeze  the  indicated 
transaction.  Again,  you  must  reply  "yes"  or  "no".   Like  the  delete  command  the 
freeze  command  may  renumber  the  transactions.   If  this  happens  all  frozen  and  deleted 
transactions  in  the  buffer  will  be  discarded.   The  remaining  n  transactions  will 
be  numbered  sequentially  from  one  to  n  in  the  order  in  which  they  were  entered 
into  the  temporary  buffer. 


number- 


l^r-  replace-^ 


number>- 


to 


:l< 


number 


<number> <field  name> <new  value> 


<number> <new  transaction>- 


field  names  =  act      ref        amt  sub       acct     date  text 

action   reference  amount  subclass  account 

code       dollar  class 
dollars 

Checking,  Editing,  and  Freezing  Temporary  Transactions 

figure  2 


13 


Examples  of  Temporary  Transactions  Requests 

1.  The  following  4  requests  will  all  print  the  number  of  active  and  deleted 
temporary  transactions  in  the  buffer: 

temp  count 
t  count 
temp  c 
t  c 

2.  The  following  commands  will  print  all  of  the  transactions  in  the  temporary 
buffer: 

t  P 

temp  print 

3.  The  following  requests  will  produce  an  adding  machine  tape  for  the  fifth  through 
the  17th  transaction  in  the  temporary  buffer: 

t  total  5  17 
t  t  5  thru  17 

4.  The  following  commands  will  freeze  the  entire  buffer: 
t  f 

t  freeze 

5.  The  following  commands  will  be  required  to  delete  transactions  4,  7,  and  9: 
t  d  4 

t  d  7 
t  d  9 

6.  The  following  commands  will  change  the  action  and  dollar  amount  fields  of 
transaction  12  to  "dc"  and  $100.00  respectively. 

temp  set  12  act  dc 
t  s  12  amt  100 
or 

t  r  12  dc  "  100 

14 


Generating  Reports  on  Permanent  Transactions 

There  are  three  commands  that  work  on  permanent  transactions.   They  are 
the  tabulate,  print,  and  total  commands.  Actually,  you  will  only  use  the  tabulate 
command  and  probably  never  use  the  print  or  total  command. 

The  tabulate  command,  as  currently  implemented,  will  only  print  ledger 
sheets  for  all  accounts  in  the  department  or  for  one  account.   In  the  future  facil- 
ities will  be  added  to  allow  you  to  prepare  ledger  sheets  which  give  sub-totals 
for  individual  classes  or  subclasses  only  in  one  account  or  across  all  accounts 
in  your  department.   Figure  3  is  a  syntax  diagram  for  the  tabulate  request.   The 
tabulate  command  has  a  synonym  "tab".   The  second  phrase  in  the  tabulate  request 
specifies  whether  all  accounts  in  the  department  or  just  a  single  account  are  to 
be  tabulated.   The  account  name  specified  in  the  case  of  a  single  account  can  be 
any  one  of  the  synonyms  for  the  account.   The  third  phrase  in  the  tabulate  command 
is  optional.   If  it  is  not  present,  then  the  default  is  an  itemized  ledger  sheet. 
This  third  phrase  specifies  in  what  detail  you  would  like  the  ledger  prepared. 
The  least  detailed  would  be  by  class.   If  you  specified  by  subclass  then  both  class 
and  subclass  totals  would  be  prepared  and  printed  for  each  account.   If  you  speci- 
fied by  item,  then  the  ledger  would  have  a  class  grouping.   Within  each  class  would 
be  printed  each  subclass  total  and  within  each  subclass  would  be  printed  an  item- 
ized list  of  all  those  transactions  which  occurred  in  that  subclass  for  the  specified 
account  and  month.   The  optimal  phrase  "with  text"  indicates  that  the  text  associated 
with  each  itemized  transaction  will  be  printed.   Normally,  the  text  will  not  be 
printed.   The  last  phrase  specifies  the  date.   The  date  is  given  in  the  standard 
month,  day,  year  format  with  the  month,  day,  and  year  being  one  or  two  digit  numbers 
separated  by  a  hyphen.   The  day  in  the  date  field  is  ignored.   The  tabulate  command 
is  only  concerned  about  the  month.   Tabulate  will  automatically  tabulate  all  infor- 
mation for  a  given  month.   If  this  last  field  has  the  form  "from  <date  to  date>" 
then  the  two  months  indicated  and  all  the  months  in  between  will  be  separately 

tabulated  on  the  ledger  sheets. 

15 


The  print  and  total  commands  perform  the  same  function  on  permanent  transac- 
actions  that  the  temporary  print  and  the  temporary  total  commands  perform  on  temporary 
transactions.   Instead  of  specifying  a  range  of  temporary  transaction  numbers, 
a  range  of  dates  is  specified.   These  dates  must  be  in  the  same  month.   If  only 
one  date  is  specified,  then  all  the  transactions  for  all  the  accounts,  classes, 
and  subclasses,  that  were  made  on  that  day,  will  be  printed  in  the  order  in  which 
they  were  made.   If  two  dates  are  specified  then  similar  action  is  taken  for  all 
dates  from  the  first  date  through  the  last  date  inclusive. 


tabulate -t,  p 
tab — — H_ 


—  print 


total 


r—  class— . 

<account  name>^by-/subclass  \j-tor-  <date> 

-accounts—— -A    V_item_y  /  v.from  <date>  thru  <date> 


from  — <date> to <date> 


Report  Generation 
figure  3 


Examples  of  reports  on  permanent  transactions 

1.  to  prepare  a  ledger  for  account  46/733  with  expenses  aggregated  to  the  class 
level  for  the  fiscal  year-to-date  (assuming  it  is  October  21,  1973)  type 

tab  46/733  by  class  from  7-1-73  to  10-1-73 

2.  to  prepare  a  ledger  of  all  the  accounts  in  the  department,  completely  itemized, 
sorted  and  subtotaled  by  subclass  and  class  for  October,  1973  type 

tab  accounts  by  item  for  10-1-73 

3.  to  include  the  text  associated  with  the  transactions  for  the  request  above  type 

tab  accounts  by  item  with  text  for  10-1-73 


16 


Adding  Accounts,  Classes,  Subclasses,  and  Synonyms 

Accounts,  classes,  subclasses,  and  synonyms  can  be  added  freely  while 
sitting  at  your  terminal.   Requests  to  add  new  accounts,  etc.,  can  be  interspersed 
with  the  entry  of  transactions  or  any  other  command.   Once  created,  an  account, 
class,  or  subclass  can  never  be  destroyed.   However,  it  can  be  renamed  and  synonyms 
can  be  added  and  deleted  freely.   Thus,  you  never  need  fear  a  mistake  when  adding 
a  synonym  or  when  renaming  an  existing  account,  class,  or  subclass.   These  actions 
can  always  be  reversed.   However,  once  created,  an  account,  class,  or  subclass  is 
with  you  forever.  Any  letter,  digit  or  punctuation  mark  except  a  blank  can  be 
used  in  a  name.  Account  names  and  synonyms  can  be  up  to  32  characters  in  length. 
For  classes  and  subclasses  the  limits  are  20  and  16  characters  respectively.   Figure  4 
is  a  syntax  diagram  that  illustrates  those  commands  which  create  accounts,  classes, 
and  subclasses  and  which  can  add,  change,  and  delete  existing  names. 

The  create  command  will  create  one  or  more  new  accounts  or  classes  or  one 
or  more  new  subclasses  within  an  existing  class.   The  names  and  synonyms  given  to 
accounts,  classes,  and  subclasses  must  all  be  unique  within  each  set  of  accounts, 
within  each  set  of  classes  and  within  each  set  of  subclasses.   However,  it  is  possible 
for  you  to  give  the  name  w  to  an  account,   w  to  a  class  and  w  to  a  subclass 
without  confusion  on  the  part  of  the  accounting  system.   Because  of  the  way  you  specify 
requests,  the  accounting  system  always  knows  whether  you  are  talking  about  the  account  w, 
the  class  w,  or  the  subclass  w.   Whenever  a  class  is  created  with  a  given  name,  a 
subclass  with  the  identical  name  is  automatically  created.   The  name  given  to  each 
account,  class,  or  subclass  in  a  create  statement  will  be  the  principal  name  of  that 
account,  class,  or  subclass.   The  principal  name  is  the  name  that  will  be  printed 
on  ledger  sheets  and  by  the  print  command  for  both  temporary  and  permanent  transac- 
tions.  Therefore,  you  should  choose  those  names  to  be  as  complete  and  as  descriptive 
as  possible. 


17 


The  synonym  command  adds  additional  names  to  any  single  account,  class, 
.or  subclass.   You  can  add  an  arbitrary  number  of  synonyms  to  any  existing  name. 
The  rename  command  will  change  the  principal  name  or  any  synonym  that  currently 
exist  for  an  account,  a  class,  or  subclass.   The  remove  command  will  remove  synonyms 
from  any  account,  class,  or  subclass.   If  the  principal  name  of  an  account,  class, 
or  subclass  is  removed,  then  the  longest  synonym  automatically  becomes  the  principal 
name.   If  there  are  no  synonyms,  then  the  accounting  system  will  not  allow  you  to 
remove  the  principal  name. 


create 


account 
accounts 


class 
lasses 


subclass— 
subclasses- 


<new  name> 


in — <class  name>— <l—  <new  subclass  name>- 


y-synonym 
/-synonyms 
~"V — syn- 
\ — syns 


for 


account 
-  class- 
subclass 


-<name> 


is— a  \t' 


are 


r 


t_< 


synonym- 


rename 


-remove 


account 
-  class  - 
subclass 


account— 
-class  — 
subclass- 


•<old  name> to — <new  name>- 


synonym 
syn  - 
name 


A — sL.<old  name>— i- 


maximum  length  of  names: 

account  names  <^  32  characters 
class  names  <^  20  characters 
subclass  names  <^  16  characters 

names  may  contain  any  letter,  digit,  punctuation,  or  other  character  except 
the  blank 


Creating  and  Naming  Accounts,  Classes  and  Subclasses 

figure  4 


18 


Examples  of  Name  Modification 

1.  Add  two  new  classes  named  wages  and  miscellaneous 

create  classes  wages  miscellaneous 

2.  Add  the  synonyms  w  to  wages  and  m  and  misc  to  miscellaneous 

synonyms  for  class  miscellaneous  are  m  misc 
syn  for  class  wages  is  w 

3.  Add  the  subclasses  hourly,  GRA,  and  faculty  to  the  class  wages 

create  subclasses  in  wages  hourly  GRA  faculty 

4.  Rename  the  GRA  subclass  to  be  graduate-student 

rename  subclass  GRA  to  graduate-student 

5.  Delete  the  synonym  m  from  miscellaneous 

remove  subclass  name  m 


19 


Miscellaneous  Commands 

The  jjjit  co„nd  exits  the  accounting  system  and  returns  to  the  multics 
supervisor,  at  this  point  you  will  most  llkely  _  tQ  type  ^  „iogout„  ^^ 

The  logout  command  will  then  log  you  out  of  Multics  and  automatically  break  your 
ARPA  Network  connection  to  Multics. 

The  help.  command  will  glve  you  information  about  the  accounting  system. 
To  get  help  with  any  command  simply  type  "help  Command  name>".   Typlng  „help„  ^  J 
a  command  name  will  show  a  list  of  what  help  is  available.  For  example,  if  you 
don't  remember  what  the  tabulate  command  syntax  is,  type 
help  tabulate    (6r). 


20 


Security 

Security  has  been  built  into  the  accounting  system  from  the  ground  up. 
It  is  not  an  add  on.   It  exists  in  the  first  version.   Security  is  one  of  the 
principal  reasons  we  use  Multics.  No  other  computer  system  would  let  us  build  as 
secure  a  data  system. 

Security  is  under  the  control  of  the  individual  department.   In  particular, 
it  is  not  under  the  control  of  the  CAC. 

All  security  systems  can  be  broken.   The  degree  of  security  is  measured 
as  the  dollar  cost  to  break  security  (e.g.  through  sophisticated  equipment,  bribes, 
etc.).   The  security  that  your  accounting  data  enjoys  in  this  accounting  system 
should  be  the  same  as  or  better  than  it  enjoys  in  your  current  system  of  open  offices 
and  locked  file  drawers.   In  the  following  paragraphs  we  will  briefly  discuss  the 
nature  of  the  security  system  and  the  ways  in  which  it  can  be  broken. 

Each  department  has  its  own  Multics  project.   Each  project  has  a  project 
administrator.   The  project  administrator  can  specify  who  is  allowed  to  use  the 
data  recorded  for'  that  project  and  the  manner  in  which  he  is  allowed  to  use  it. 
Each  person  who  uses  Multics  has  a  registered  name  on  Multics.   This  name  is  normally 
his  last  name.   If  there  is  already  someone  registered  on  the  system  with  his  last 
name,  then  his  first  and  possibly  his  middle  initials  are  included  before  his  last 
name  so  that  he  can  be  differentiated.   No  two  persons  have  the  same  registered 
name.   Each  person,  also,  has  a  password  which  is  linked  to  his  registered  name. 
The  password  is  chosen  by  the  user  and  can  be  changed  at  will.   No  one  but  the 
individual  person  knows  his  password.   This  information  is  not  available  to  the 
project  administrator  or  even  to  the  Multics  system  administrator.   It  is  extremely 
important  that  you  never  let  anyone  know  your  password  or  use  a  terminal  logged 
in  under  your  name.   If  it  is  important  that  someone  have  access  to  the  accounting 
system  data,  .then  he  should  be  registered  on  Multics  with  his  own  name  and  his 


21 


own  password.   He  should  have  his  various  data  access  permissions  set  explicitly 
by  the  project  administrator.   It  only  takes  a  few  minutes  to  register  a  new  user 
and  the  whole  process  is  normally  handled  over  the  telephone. 

Each  piece  of  data  in  the  accounting  system  has  an  access  control  list. 
The  access  control  list  describes  which  registered  Multics  users  have  permission 
to  read  the  data  and  which  registered  users  have  permission  to  update  the  data. 
The  access  control  list  is  controlled  by  the  project  administrator  -  not  by  CAC 
programmers.   If  he  desires,  the  project  administrator  at  the  department  could 
grant  access  to  CAC  programmers.   He  might  do  this  if  he  needed  special  help. 
Once  he  no  longer  needed  the  help  he  could  immediately  delete  the  permission  to 
access  the  data. 

There  are  5  basic  ways  the  security  system  could  be  broken: 

1.  The  project  administrator  at  the  department  or  one  of  the  registered  Multics 
users  of  the  department  who  has  permission  to  access  departmental  accounting  data 
might  release  his  password  to  some  other  person.   New  personnel  should  have  con- 
stantly stressed  to  them  the  importance  of  keeping  their  password  a  secret.   Even 
the  project  administrator  has  no  need  to  ever  know  the  password  of  one  of  his 
workers.   If  a  password  is  requested  by  the  project  administrator,  the  password 
should  not  be  given  and  the  request  should  be  viewed  with  suspicion. 

2.  The  project  administrator  might  intentionally  sabotage  the  security  system.   He 
has  the  power  to  grant  both  read  and  update  access  to  unauthorized  personnel. 
The  project  administrator  should  be  a  trusted  departmental  employee-possibly  the 
business  manager. 

3.  The  Multics  system  administrator  at  MIT  could  collaborate  with  unauthorized 
personnel  and  grant  them  read  or  update  permission.   It  is  a  laborious  but 
straightforward  task  for  the  system  administrator  to  do  this.   It  would  not  be 

in  the  best  Interest  of  the  system  administrator  to  collaborate  in  such  a  venture, 


22 


k   Quite  to  the  contrary  it  could  be  extremely  detrimental  to  his  own  interest. 
Unless  he  is  extremely  careful,  he  can  leave  behind  obvious  signs  of  his  tam- 
pering.  Furthermore,  the  tampering  can  be  detected  while  it  is  in  progress. 

4.  The  project  administrator  and  one  CAC  accounting  system  programmer  could 
collaborate  so  that  they  could  tamper  with  permanent  accounting  system  records. 
The  programmer  normally  has  no  interest  in  tampering  with  permanent  records  unless 
bribed.   Furthermore,  this  kind  of  tampering  leaves  easily  detected  signs  that 
cannot  be  hidden.   Should  a  tampered  data  file  be  discovered,  the  original  data 
file  can  be  readily  restored  in  its  original  form  using  the  automatic  Multics 
back-up  procedures.   Tampering  with  the  back-up  system  would  have  to  be  done 

at  MIT  and  would  require  the  physical  destruction  of  many  reels  of  magnetic  tape. 

5.  All  of  the  CAC  programmers  could  conspire  together  to  introduce  a  "trojan  horse" 
into  the  accounting  system.   In  this  case  the  accounting  system  is  the  trojan 
horse  and  contains  within  it  a  small  piece  of  program  which  violates  security. 
Whenever  the  project  administrator  or  some  other  authorized  person  runs  the 
accounting  system,  this  small  piece  of  illegal  code  is  executed  and  might 
surreptitiously  write  confidential  data  into  the  files  of  another  project. 

Once  the  data  has  left  the  control  of  the  original  department  it  may  be 
read  by  unauthorized  personnel.   The  trojan  horse  attack  could  be  recognized 
by  a  programmer  familiar  with  the  accounting  system  program.   Alternatively,  a 
careful  and  lengthy  examination  of  the  accounting  system  program  by  an  external 
programmer  could  reveal  the  trojan  horse. 

Security  can  be  violated  if  departmental  personnel  intentionally  allow  it 
to  be  violated.   Alternatively,  intentional  cooperation  is  required  among  a  limited 
and  readily  identified  set  of  people  to  break  security.   There  is  no  inherent  vested 
interest  in  this  small  group  which  would  lead  them  to  initiate  or  cooperate  with  a 
security  break.   If  bribed,  the  possibility  of  discovery  is  significant  and  sub- 
sequent penalties  would  be  severe. 

23 


Since  the  people  who  are  capable  of  breaking  the  system  are  few,  and 
since  the  cooperation  of  geographically  dispersed  and  non-interested  parties  is 
required,  we  feel  the  automated  accounting  system  is  at  least  as  secure  as  current, 
manual  systems. 


24 


Getting  Into  the  Accounting  System 

In  order  to  use  the  accounting  system  you  must  connect  the  terminal  in 
your  office  to  the  ANTS  system  on  the  second  floor  of  the  Center  for  Advanced 
Computation.   This  is  done  by  making  a  simple  phone  call.   The  next  connection 
that  must  be  made  is  an  ARPA  Network  connection  so  that  you  can  talk  to  Multics. 
A  simple  command  to  the  ANTS  system  will  instruct  it  to  do  this  for  you.   Once 
you  are  connected  to  Multics  you  will  have  to  log  into  Multics,  identify  yourself 
and  give  your  password.   Once  you've  logged  into  the  Multics  system,  all  that  remains 
to  do  is  to  type  the  command  to  Multics  that  will  start  up  the  accounting  system. 
When  you  are  through  with  the  accounting  system  you  type  the  command  "quit"  to 
leave  the  accounting  system,  "logout"  to  leave  Multics,  and  then  hang  up  your  phone. 
This  sounds  like  a  great  deal  of  work  to  do  and  a  lot  to  remember.   Actually  it  is 
straight  forward.   It  takes  a  small  amount  of  time  and  less  typing  than  some  of 
the  longer  accounting  system  commands. 

You  do  not  have  to  be  concerned  about  your  computer  terminal  being 
compatible  with  Multics.   The  only  system  that  it  is  important  to  be  compatible 
with  is  ANTS.   Currently,  ANTS  supports  10,  15,  and  30  characters  per  second  full  duplex 
ASCII  terminals.   Examples  of  these  kinds  of  terminals  are  all  models  of  Teletypes  and 
most  of  the  thermal-printers  (Texas  Instruments,  NCR,  Teleterm,  etc.).   In  order 
for  your  terminal  to  be  able  to  connect  to  ANTS,  it  must  be  in  full  duplex  mode. 
If  you  have  a  separate  acoustical  coupler  (that  little  box  that  you  put  the  phone 
in)  it  may  have  a  separate  switch  which  also  has  to  be  set  to  full  duplex  (as 
opposed  to  half  duplex).   Once  you  have  done  this  the  system  will  work  with  ANTS. 
If  you  are  lucky  enough  to  have  a  multi-speed  terminal,  set  the  speed  to  its  fastest 
level  (for  most  terminals  this  is  30  characters  per  second  or  300  baud).  Don't 
worry  about  the  speed  setting,  ANTS  handles  a  wide  variety  of  speeds  automatically. 
The  faster  speeds  are  simply  for  your  own  convenience. 


25 


Now  that  you  have  your  terminal  set  at  full  duplex  (and  possibly  the 
acoustic  coupler  too)  and  you  have  set  your  terminal  speed,  it  is  time  to  make  a 
phone  call.   Using  a  normal  desk  telephone,  dial  333-7086.   The  phone  will  ring 
once  or  twice  then  be  automatically  answered.   You  will  hear  a  high  pitched  tone 
when  ANTS  answers  the  phone.  At  this  time  place  the  telephone  hand  set  into  the 
acoustic  coupler  (that's  the  little  phone  cradle  on  your  terminal  or  in  the  separate 
acoustic  coupler  box).  Make  sure  the  phone  is  right  side  up.   The  cord  should  come 
out  through  a  little  notch  which  may  even  be  labelled  "cord".   Somewhere  on  the 
terminal  or  the  separate  acoustic  coupler  there  will  be  a  little  green  light  which 
may  have  the  word  "carrier"  written  under  it.   When  the  little  light  comes  on,  you  are 
connected  to  ANTS. 

The  next  thing  to  do  is  to  help  ANTS  figure  out  what  speed  your  terminal  is. 
Start  typing  the  upper  case  character  "Q".   Keep  typing  these  Q's  at  the  rate  of 
about  1  per  second  until  ANTS  either  sends  you  a  nice  long  message  telling  you  that 
ANTS  is  on  the  other  end  of  the  phone  line  or  until  it  starts  typing  the  Q's  back 
to  you.   If  it  answers  by  typing  Q's  then  hit  a  carriage  return.   It  will  tell  you 
that  the  message  full  of  Q's  has  "no  destination"  and  has  been  discarded.   It  will 
then  give  you  the  ANTS  hail.   The  hail  tells  you  what  version  of  the  ANTS  system  is 
running  and  other  information  of  absolutely  no  interest  to  you. 

ANTS  requires  you  to  log  in  before  you  can  talk  to  Multics.   To  do  this  type 
"tLOGIN"  followed  by  your  name.   There  is  no  charge  for  using  ANTS;  your  name  is 
used  only  to  identify  users  of  ANTS. 

Now  it  is  time  to  connect  to  Multics.   That's  simple..  Type  "+CONNECT  MULTICS' 
That  is  a  command  to  ANTS  to  connect  you  to  Multics  at  MIT.   ANTS  will  tell  you  when 
the  connection  is  open  to  Multics  and  then  Multics  will  respond  by  typing  the  Multics 
hail.   The  Multics  hail  is  two  lines  long  and  will  tell  you  what  time  of  day  it  is, 
how  many  users  (load  units)  are  on  the  system,  and  which  version  of  Multics  is  running. 
If  nothing  happened,  you  probably  forgot  to  type  the  carriage  return  at  the  end  of 
the  +C0NNECT  MULTICS  command  -  type  the  carriage  return  now. 

26 


After  you  receive  the  Multics  hail,  you  are  ready  to  login.   To  login, 
type  the  Multics  command  "login  <registered  user  name>".   Don't  forget  the  carriage 
return!   For  example,  a  user  whose  registered  name  was  "Corbally"  would  log  into 
Multics  by  saying  "login  Corbally".   Multics  will  ask  you  for  your  password,  but, 
before  you  type  it,  it  will  completely  black  out  the  area  into  which  you  are  going 
to  type  your  password.   Therefore,  no  one  can  ever  see  it.   It  is  a  good  idea  to 
change  your  password  every  week  or  two.  Use  a  password  that  is  easy  to  remember 
but  hard  for  someone  to  guess.   In  particular,  don't  use  passwords  like  your  name, 
your  wife's  name,  your  dog's  name,  your  kid's  name,  your  department  name,  etc. 
Be  original.   Passwords  can  be  changed  at  login  time.   If  you  want  to  change  your 
password  type  the  four  characters  "-cpw") .  after  your  name  on  the  login  line 
(e.g.  "login  Corbally  -cpw").   This  tells  Multics  that  you  want  to  change  your  pass- 
word. Multics  will  then  blackout  an  area  into  which  you  will  type  your  old  password, 
It  will  then  ask  you  for  the  new  password  and  blackout  another  area  into  which  you 
can  type  the  new  password.   If  it  was  successful,  it  will  tell  you  that  the  pass- 
word has  been  changed. 

Now  that  you  are  logged  into  Multics  it  is  time  to  start  up  the  accounting 
system.   To  start  up  the  accounting  system  simply  type  the  Multics  command 
"accounting_system".  When  you  are  through  with  the  accounting  system  you  will 
type  the  accounting  system  command  "quit".   This  will  bring  you  back  to  the  point 
at  which  you  were  when  you  logged  in.  You  must  now  type  the  command  "logout" 
and  Multics  will  automatically  log  you  out  and  close  your  ARPA  network  connection. 
Once  ANTS  tells  you  that  the  connection  to  Multics  has  been  closed,  you  can  hang 
up  your  telephone.   If  the  only  Multics  program  you  ever  use  is  the  accounting 
system,  contact  the  CAC  programmers.   They  will  show  you  how  to  automatically  start 
the  accounting  system  right  after  login  and  to  have  Multics  automatically  log  you 
out  when  you. type  the  accounting  system  command  "quit". 


27 


Time  to  review  all  this.   The  steps  you  have  to  go  through  are: 

1.  Set  your  terminal  (and  separate  acoustical  coupler  if  you  have  one)  to  full  duplex 

2.  Set  the  terminal  speed  to  that  which  you  want  to  use 

3.  Dial  333-7086  to  get  ANTS 

4.  When  you  hear  the  high  pitched  tone  put  the  telephone  hand  set  into  the 
acoustic  coupler  phone  cradle  (with  the  cord  in  the  right  direction) 

5.  Wait  for  the  green  carrier  light  to  come  on  (either  on  your  terminal  or  separate 
acoustic  coupler) 

6.  Type  upper  case  Q's  until  ANTS  responds 

7.  Type  +LOGIN  <your  name> 

8.  Type  tCONNECT  MULTICS  (don't  forget  the  carriage  return) 

9.  Log  into  Multics 

10.  Initiate  the  accounting  system  (unless  the  accounting  system  initiation  has 
been  made  automatic) 

11.  Do  your  accounting  system  work 

12.  Quit  the  accounting  system 

13.  Log  out  of  Multics  (unless  logout  is  automatic) 

14.  Wait  for  ANTS  to  tell  you  your  Multics  connection  is  closed 

15.  Hang  up  your  telephone 

16.  Turn  off  the  terminal  (and  the  acoustic  coupler  if  it  is  separate) 


28 


r 

JHTER    FDR    ADVANCED    COMPUTATION 

fN   T    S         MARK    r.  02/04       OF:  FRIDAY?     Q3'£9s74    12:42    AM 

li 

bGIN  MULLEN 

lM  VDU  APE  MULLEN   ?  DM  DI3      ?IN  MESSAGE    MDDE . 

ijNNECT     MULTICS 

£4  ATTEMPTING  CONNECTION  TD  MULTICS 
|4  CONNECTION  OPEN  TD  MULTICS 


I..T  I  C£  23  .  1  5A  !  MIT?  CftMER  I  I'bE  ?  MftSS  . 

tiD  =  11.0  dut  df  7  0.0  units:  users  =  11 

tie  IN     JMULLEN 

|>swdrd : 

c.ir  account  is  near  its  termination  date. 

[i  are  protected  from  preemption  until  0725  . 

ijllen  cac  logged  in  0  3  •••' '2  6  ■•'  '7  4   3325.0  edt  mon  from  network  terminal  "cftcft 

(■■T   login  0S'""£6'"74   2323.5  edt  Mon  from  Network  terminal  "caca"  . 

DU  HAt'E  MAIL 13  MESSAGES?  93  LINES. 

•325   4.374   2  0.176   202 


COUNT I NG+S YSTEM 


University  of  Illinois 

AT 

Urbana  -  Champaign 


Center  Fop  Advanced  Computation 
Accounting  System    Version   2.0 

:yright  ic>    1973  by  the  Board  of  Trustees  of    the  University  of  Illinoi: 

:«i=iy''s  date  is   8-- 26-'" 74 
■er  your  reeuest 
temp  count 

re  ape  no  temporary  transactions. 

EUIT 

325  2.27  0  2  0.932  166 

PUT 

illen  CAC  logged  OUT  03--' 26.-: 74   2325.9  edt  Mon 

I  USAGE  7  SEC?  MEMORY  USAGE  42.9  UNITS. 

|ieup 
6        MULLEN         ON    DI3  <=         MULTICS      CLOSED 


Figure  6  shows  a  sample  session  using  the  accounting   system.      It 
covers  steps  6  thru  13  above. 


29 


Where  to  Get  Help 

Computing  systems  never  work  the  way  they  are  supposed  to.   When  they  stop 
working  correctly  they  do  it  in  surprisingly  devious  ways.  Most  failures  (called 
crashes)  will  occur  when  ANTS  crashes  or  when  the  entire  Multics  system  crashes. 
Hopefully,  you  will  not  experience  too  many  errors  in  the  actual  accounting  system 
program.   When  Multics  crashes  it  will  take  one  of  two  forms.   1)  Multics  crashed 
before  you  tried  to  connect  to  it  and  is  still  down.   In  this  case,  ANTS  will  tell 
you  that  Multics  is  dead  when  you  try  to  connect  to  it  and  will  abort  the  connection 
attempt.   2)  Multics  dies  when  you  are  inside  the  accounting  system.  ANTS  will 
tell  you  by  printing  out  a  message  that  it  has  just  closed  your  Multics  connection 
(usually  in  the  middle  of  one  of  your  nice  long  printouts) .   When  Multics  dies  it 
normally  takes  15  to  20  minutes  to  get  it  back  up  and  running  again.   So  try  con- 
necting again  in  15  or  20  minutes.   If  you  are  the  nervous  type,  call  333-0707. 
Tell  whoever  answers  who  you  are.  Ask  him  if  he  knows  when  Multics  will  come  up  or 
if  he  can  find  out.   Even  if  he  is  not  an  accounting  system  or  Multics  programmer 
he  will  probably  be  able  to  help  you  (usually  by  finding  an  accounting  system 
or  Multics  programmer).   If  no  one  answers  at  333-0707  try  333-8150.   That's  the 
ANTS  machine  room.  Ask  the  ANTS  operator.  He  may  know  the  answer. 

When  ANTS  dies  your  terminal  simply  stops  working.   You  may  be  typing 
away  furiously  and  nothing  is  being  printed.  A  sure  sign  of  failure  is  if  your 
green  carrier  light  goes  out  (this  is  usually  caused  when  you  jiggle  the  telephone 
in  the  acoustic  coupler  cradle  or  bang  too  hard  on  your  terminal  in  anger) .   If 
you  accidentally  interrupted  the  phone  call  or  if  ANTS  crashed,  recovery  is  very 
rapid.   Simply  start  back  at  dialing  333-7086.   By  the  time  you  have  dialed  the 
number,  ANTS  has  probably  automatically  recovered  from  any  crash  and  is  working 
again.   If  ANTS  crashes  on  you,  the  ARPA  Network  will  tell  Multics  about  it. 
Multics  will  automatically  quit  the  accounting  system  and  log  you  out.   To  restart 


30 


yourself,  connect  to  Multics,  login,  and  initiate  the  accounting  system.   You  may 
have  to  re-enter  the  last  command  you  typed.   If  you  were  entering  transactions  into 
the  temporary  buffer  find  the  last  transaction  in  the  buffer  and  print  it  so  you 
know  where  you  left  off. 

For  more  serious  problems  or  just  confusing  situations  call  the  accounting 
system  programmers.   Their  phone  number  is  included  with  the  primer.   You  should 
feel  free  to  call  this  number.  Don't  be  embarrassed  because  you  think  your  question 
is  stupid  or  because  you  feel  you  might  be  imposing  upon  the  programmers.   Unless 
we  know  those  points  of  the  system  which  confused  you,  we  don't  know  how  to  fix  it 
so  the  next  user  never  has  to  ask  that  question.   The  programmers  will  be  hard  to 
impose  upon.   They  are  proud  of  their  system  and  like  to  talk  about  it.   They  are 
much  more  likely  to  impose  upon  you.   We  have  found  that  they  tend  to  want  to  tell 
you  far  more  than  you  ever  cared  to  know  about  what  you  thought  was  a  simple 
question. 


31