Document 6493219
Transcription
Document 6493219
Behavior Research Methods & Instrumentation 1981, Vol. 13 (2),221-226 Low-cost microcomputer networking: How to get high throughput on a low budget ADAM V. REED Graduate Faculty ofSocial andPolitical Science NewSchoolforSocial Research. New York. New York 10011 DANIEL LEWART HolmdelHigh School. Holmdel. New Jersey 07733 and LINDA H. SCHNEIDER New York University. New York. New York 10003 A very low-cost, high-throughput laboratory data acquisition and experiment control.ysteDl may be configured by using a 8tar network architecture with a IOW-C08t microcomputer u network controller and one or more microprocessor-based single-board controllen a. satellites. A network of this type, using Apple II microcomputer (fl,600 with 48K RAM and one minidiskette drive) a8 main node and up to seven KIM-I microcontrollers (fl69 each) a8 satellites is described, and its development is discussed in detail. This paper describes the local network approach to the problem of increasing the throughput of laboratory computer systems. The main advantage of this approach is low cost. A rough rule of thumb used by system planners is that with the traditional single-processor approach, every doubling of throughput triples the cost of the system. With the network approach, each satellite processor adds about 10% to the cost of hardware for the system. With this kind of cost advantage, it is rather surprising that the network approach is not more widely used in experimental laboratories. One likely explanation for this is the mystique acquired by networking in the early days of computing. According to this mystique, network development requires sophisticated development systems and large amounts of professional effort. One of our goals for this paper is to show how outdated this mystique has become in the last couple of years. The microcomputer network described in the present paper was developed with the network controller, a standard integer-version Apple II microcomputer, as its own resident development system. The software development effort took a total of 10 h of the first author's time, as well as about 16 h of spare time contributed by the second author while he was a student at Holmdel High School. The hardware interface was built by the third author in slightly under 5 h. While a psychologist who is not also a computer engineer may have to add between $500 and $1,000 in consultants' fees to the cost of the network described in this paper, a microcomDaniel Lewart is now at the Massachusetts Institute of Technology. Copyright 1981 Psychonomic Society, Inc. puter network could still constitute the most costeffective approach to adequate system throughput. A computer network is a system of two or more independently programmable processors, at least one of which is capable of exerting complete control over all the others under the direction of its own program. Our design objectives were to provide adequate throughput for current experiments, to provide future expansion capability up to twice the maximum requirements of any single foreseeable experiment in cognitive psychology, and to minimize development time for the present system as well as for future experiments. Note that a capability for simultaneous execution of several experiments was not one of our design objectives. In general, the most cost-effective way of running several experiments is to run them on separate systems. HARDWARE The Central (Controller) Node The Apple II was originally chosen as a laboratory computer primarily because its all-socketed construction facilitated the hardware modifications (Reed, 1979) necessary for tachistoscopic stimulus presentation and accurate timing of stimulus-response latencies. Socketed construction also minimizes down time, since most malfunctions may be repaired on site by removing the malfunctioning integrated circuit (Ie) from its socket and plugging in a replacement. The Apple also meets both requirements for a central node in a local computer network. The first of these requirements is that the central node be equipped with digital input and output lines capable of communicating with satellite processors. 221 0005 -7878/81/020221-06$00.85/0 222 REED, LEWART, AND SCHNEIDER The other requirement is that the central node be usable as a development system for real-time routines being developed for implementation on the satellite processor. If real-time program development is being done in assembly language, this means that central node software must include a symbolic assembler capable of assembling code to an object (OBJ) location in random-access memory (RAM) other than the actual logical origin (ORG) the program is to have on the system on which it will be eventually executed. In general, any assembler having separate OBJ and ORG pseudooperations or assembler directives will be capable of doing the job. The assembler included in the Microproducts, Inc., development system package for the Apple II is equipped with these features, and it is this package that is currently used on the network to develop real-time software for the KIM-I. Unfortunately, assemblers seldom have the above features in the same package with interactive assembly capabilities necessary for network development. The networking software for the Apple II was actually developed without a symbolic assembler. We used the interactive miniassembler included in the firmware of the standard integer-version Apple II. The absence of symbolic labeling capability in this firmware was more than made up for by its interactive debugging and structuring features. The integer-version Apple II is equipped with a debugging monitor that has go (run), list (disassemble), trace, single step, register examine, and register fill commands, as well as multiple command sequence capability. Any debugging monitor command sequence may be executed without leaving the miniassembler. Moreover, the go command emulates a JSR subroutine call, a feature that encourages FORTH-like structured programming. An interactive assembler of this type facilitates the segmenting of code into short externally callable subroutines, each of which is fully debugged and tested at the time it is written, and before the programmer goes on to write the next segment. The Satellite Node(s) The microcomputer/microcontroller selected for the function of a satellite in a laboratory microcomputer network must satisfy four criteria. First, the instruction set of its processor should be the same as that of the central node's, a condition essential to uncomplicated cross-development of real-time software for experiments. Second, an external device, capable of being simulated by the central node processor, should be able to load desired information into the satellite's memory, to obtain a dump of the satellite's memory on demand, and to start program execution at any desired location in the satellite's memory. Our requirement of reducing development effort to the minimum added an extension of this condition: The software for all of the above functions had to be already present as firmware in the satellite's read-only memory (ROM). This would free us from having to write any real-time networking software for any microcomputer other than the central node, on which adequate development software was known to be available. The third and fourth conditions were the obvious ones: The satellite had to be able to perform the functions necessary to carry out its role in psychological experiments, and it had to fit our budget. The first of the above conditions narrowed consideration to microcomputers using the 6502 processor used in the Apple II. The second condition narrowed consideration to the several industrial microcomputer/ microcontroller boards designed for use with ASR serial terminals, and for using the terminal's local storage facility (originally, the paper-tape facility of the ASR 33 Teletype) for memory loading and dumping and the keyboard of the terminal for control commands, including the command to begin execution at a specified location in memory. The boards in this category included the JOLT and the SUPERJOLT, the KIM-I, the SYM, the SUPERKIM, and the AIM-65. We selected the KIM-I, at $159 the second cheapest of the above boards, primarily because the second author was already thoroughly familiar with this unit, having used it as the central component of his personal computer system. With 30 digital input/output (I/O) lines and two precision timers, it clearly had the capability for taking over the task of monitoring and recording subject responses while the Apple dealt with precise presentation of experimental stimuli. The Hardware Interface While the serial interface of the KIM-I is designed for 20-rnA current-loop operation, serial information is actually sent and received for processing at standard 5-V transistor-to-transistor logic (TTL) levels. Hence, we decided to attach the interface cable to the KIM with clip-on connectors bypassing the 20-rnA current-loop circuits. The resulting interface is shown in Figure 1. In keeping with our decision to minimize design time, we did not bother to balance the transmission line. The interface shown in Figure 1 works fine to 3 kbaud. KIM-I firmware limits transmission rates to 9.6 kbaud in any case, and the relative improvement obtainable by designing a balanced-line interface would have been limited to that rate. Apart from connectors, the interface shown in Figure 1 consists of three wires and one resistor. On the Apple II side of the interface, a single KIM-l is attached to Input SWO and to Output ANO. Three KIM-Is could be connected by using SWO-SW2 and ANO-AN2. A multiplexer routing SWO and ANO according to ANI-AN3 may be used with existing software to run a network comprising up to seven KIM-Is, with one of the eight possible multiplexer codes reserved for loading and starting all the satellites simultaneously. SOFTWARE Teletype Emulation In developing network control software for the Apple II, we minimized development work by making maximum use of published software. Sender software for LOW-COST MICROCOMPUTER NETWORKING "f1 ""D TA,e t/o 223 r-------tA.-A cdltTItDi. TTY nOD RTltll II'. ... PBS....--...;''-i H) a: o It 4' • l- ! v z z ItITVIt.. OATIt UI o u TTY OTIt IITRH (~I TTY 1C1ID .J C ... ...err: 0: X CI 1147 Go cltS ...----4--+---+---_~ A-I Go ellIS TT PT 2 MEGOHMS vee (+5v.) Figure 1. Circuit diagram of the KIM-I TTY interface circuit and the Apple 11/ KIM-I network interface connection. Teletype emulation was adapted from the TTYDRNER program (see Apple Computer, Inc., Note I, p. 119) by R. Wigginton and S. Wozniak. This program was revised to run at 30 times its original baud rate. The KIM-I TrY input routine was adapted to the hardware available on the Apple II by replacing its timing subroutines by corresponding subroutines from TTYDRNER (Apple Computer, Inc., Note 1), again modified to run at 3 kbaud. NetworkControl A IK area of the Apple's memory was set aside for an input map of the KIM's memory. We then wrote a program for the Apple that uses the KIM's built-in TTY dump routine to transfer an exact map of all of KIM's RAM (except for the stack area in the top half of Page 1) to the map area in the Apple. A similar program transfers the content of a similar IK-byte "output map" area from the Apple to the KIM (taking care not to overwrite RAM locations used by the KIM TrY load routines the program invokes). A third Apple program starts the KIM at a location in KIM-I RAM specified by 4 bytes of RAM in the Apple II. A fourth program for the Apple sends out a synchronization pulse that can be read by the sequence BIT 1740 other. Finally, we insure the transfer of control back to the Apple by having the Apple wait for its input to go high. The KIM is programmed to return to "TrY" control by ending its program with an unconditional JMP IDBC. Since all Apple II programs are also usable as subroutines, it was a simple matter to combine the above programs into two programs used in actual applications of the network. The first of these maps from the Apple to the KIM and then starts the latter at the desired location. The second waits until the KIM returns to Apple control and then maps the KIM to the Apple. Each of these programs takes approximately 15 sec. This is not an unreasonable amount of time, especially since the KIM has an unbroken block of 512 locations usable for data storage. This is enough to store 4 bytes of data from each of 128 trials, a reasonable size for a session in most psychological experiments. If the amount of storage or I/O in the KIM proves inadequate, it may be readily expanded, or additional nodes may be added to the network, and so on. REFERENCE NOTE I. Apple Computer Inc. Apple 11 R(/ennce Mtlnlltll. Apple Part No. 03().()()()4-(J(). Cupertino, Calif: Author. (Available from Computer, Inc., 10260 Bandley Drive, Cupertino, California 9SOl4). BPL#FB when this sequence is executed by the KIM-I. This simple protocol synchronizes the satellite node(s) to within 6 microsec with the central node and with each REFERENCE A. V. Microcomputer display timil1l: Problems and solutions. Belulvior RU«lrch Methods tl Instrumentation, 1979, 11, S72-S76. REED, 224 REED, LEWART, AND SCHNEIDER Appendix A Network Software Memory Map (Apple D) 9200-95FF Map of KIM for next invocation of BAOO or 8C40 8EOO-9lFF Map of KIM from last invocation of 8BOO or 8C40 8AOC 8A82 8BOO 8COO 8000 Accept one character from Kim into A. OUtput character in A to KIM. Map KIM to Apple (16 sec): 0000-017F to 8EOO-8F7F l780-l7FF to 8F80-8FFF 0200-03FF to 9000-91FF· Map Apple to KIM (12 sec); 9200-92EF to OOOO-OOEF 9300-937F to 0100-017F 9380-93EF to l780-l7EF 9400-95FF to 0200-03FF. Start KIM at the indicated IDea t i on . The command format is *HHHH SOOOG, where HHHH is the starting address for the KIM. 8063 Transfer control back to Apple after KIM does 8033 JMP lDBC. Send a synchronization pulse to be read by the KIM loop BIT 1740; BPL loop. 8D2A Synchronize (8D33), then wait until KIM returns 8040 Map Apple to KIM; start KIM at desired location; control (8063). wai t until KIM returns control; then map KIM to Apple. Command format analogous to 8DOO. Takes 30 sec plUS time to execute KIM program. Appendix B Network Software Listing ....SAOO8A028A04BA068AOE'SA09BAOA8AOBBAOC- eaoo- 8ROEBAOFSA10SA12SAIS8A17BAIA8A1DSA20BA228A248A268A28BA2A8A2D8A2ESA308A3::".8A348A358A::'E.- 8A37BA398A388A3C8A3DBA3ESA3F8A408A428A44- A9 DC 85 3S A9 SA 85 39 60 00 00 00 SA 48 9S 48 A2 08 2C 61 CO 10 FB 20 40 8A 20 44 8A AD 61 CO 49 FF 29 80 46 4A 05 4A S5 4A 20 40 8A CA DO ED 20 44 8A 68 A8 68 AA R~, 4A 09 80 60 00 00 00 00 A9 09 DO 02 A9 04 LDA STA LDR STA RTS BRK BRK BRK TXA PHA TYA PHA LDX BIT BPL JSR ,JSR LDA EOR AHD LSR ORA STA JSR DEX B~IE .J8R PLA TRY PLA TRX LDA ORA RTS BRK BRK BRK BRI< LOA 8NE LDA .SOC $38 "SSA $39 .SOB SC061 S8A12 SBA40 SSA44 .e061 .SFF .S80 S4A S4A S4A S8A40 S8A1D SSA44 .4A .SSO .S09 .SA46 .S04 SA46SA47SA49SA4AflA4CSA4D8A4FSA518ASSSA578AS9SASBSASD8A5FSA61SA638A64SA6S8A66SA67SA68SA6A8A6BSA6O8A6FSA70SA72SA748A76BA7B8A7ABA7CSA7E8A818A828AS38A84BA87BAS98ASASABCSA8D8ASFSA92SA948A978A9A8A9BSA9C8R9ESARO8ARtSAA3SAA6SAA88AAB8ARDBABO8AB3SAB58AB78AB9BABBBABD8ABFSAC 08ACt8AC48AC58AC78AC8SAC98ACB8ACESADO8AD3BAD58A068AD88AD98ADB8ADC8ADE8AEOSAE1SRE28RE3- 48 AS' 20 4A 90 FO 68 ES' 01 DO F5 60 S6 3F 29 7F 49 30 e9 OA 90 02 69 SS A2 03 OA OA OA OA OA 2'::' 3E CA 10 FA A6 3F 60 A9 S2 SS 36 A9 SA S5 37 A9 48 85 21 A5 24 8D FB 60 48 48 AD F8 CS 24 68 80 03 4S A9 AO 2C CO FO 03 EE F8 20 C1 68 48 90 E6 49 OD OA 00 OD BD FS A9 8A 20 C1 AS' 58 20 A8 AD F8 FO 08 E5 21 E9 F7 90 04 €>9 1F BS 24 68 60 8e F7 OS AO OB 18 48 80 05 RD ~9 90 03 AO 58 A9 09 48 A9 20 4A 90 FD 6S E9 01 DO FS 68 6A 88 DO E3 8A 8A 8A SA 8A SA 8A Fe BA SA PHA LOA LSR Bee PLA SBe BHE RTS STX A....O EOR CMP BCC AOC LOX ASL. ASL. ASL. ASL. ASL. ROL. OEX BPL. LDX RTS LDA STA LDA STA LOA STA LDA STA RTS PHA PHA LDA CMP PLR BCS PHA LOA BIT BEQ INC ,JSR PLA PHR BCC EOR ASL. B....E STA LDA ,JSR LDA JSR LDA BEQ SBC SBC Bce ADC STA PL.A RTS STV ...20 .SA49 •• 01 .SA46 S3F .. S7F .S30 "SOA SSA61 .. see .S03 S3E S8A67 S3F .. SS2 S36 ..S8A S37 .. S48 S21 S24 S8AFS S8AFS s24 SSA9F "SAO saRCO SSR97 S8AF8 S8AC1 S8A84 "SOD SSABO S8AFS .. S8A S8ACl .. S5B 'FCAS S8AF8 .8ABO S21 . .F7 SSABF .$lF .24 SBAF7 PHP CO CO LOV CL.C PHA BCS LOA BCC LDA LDA PHA LOA LSR Bce PLA sac B....E PLA ROR DEY B....E "OB S8RDO SC059 seAD3 SC058 .. S09 .. S20 S8ADS .S01 S8RDS SSRC8 LOW-COST MICROCOMPUTER NETWORKING 8AE58AESSAE9- AC F7 SA 2S 60 LOY PLP RTS $SAF7 S80088038B05S808SBOA8800S80F8811S8138815S81SS819S81BS810SB20S823S826S829S8288820882ES830S831S8338835S836S83SSB3AS83CS83ES841S843S845S84SS84AS84CS84ES851S853S855885SS859S85C885FS862S863S865S867SB69S868S86DS86F8872S8738875887688788879S87888;'08B7F88B1S8S2S8S5S887S8SAS88D8SSFS8928894S896S898889A88908COOSC01SC03SC068C089C09scooSCOF- 4C 87 A9 51 20 82 AD 00 20 OC 29 7F C9 38 DO F7 A2 06 20 OC CA DO FA A2 lS 20 DC 20 55 20 DC 20 55 A5 3E 91 42 C8 30 05 CA DO EA FO 05 60 A9 00 S5 42 A9 8E S5 43 20 03 S4 42 AD 00 20 30 AO 00 S4 42 E6 43 20 30 S4 42 AO 00 20 30 60 20 36 20 4S 20 48 60 A9 AD S5 42 A9 88 S5 43 81 42 30 OE 20 82 C8 DO F6 C8 84 46 60 AD 00 FO EE. 29 7F FO F4 OA 20 A8 FO EB 20 79 20 59 A4 46 20 63 A9 SO 8'5 42 A9 SF S5 43 20 03 60 OS A9 4C 20 82 A9 38 20 S2 A9 00 85 FS S~ F9 .JMP LOA ,JSR LOY ,JSR AHO CMP BHE LOX ,JSR OEX 8HE LOX 3SR ,JSR ,JSR ,JSR LOA STA IHY 8MI OEX 8HE BEQ RTS LOA STA LOA STA 3SR STY LOY 3SR LOY STY IHC ,JSR STY LOY 3SR RTS ,JSR ,JSR 3SR RTS LOA STA LOA STA LOA 8MI 3SR IHY BHE IHY STY RTS LOY 8EQ AND 8EQ ASL ,JSR 8EQ ,JSR 3SR LOY JSR LOA $SBS7 .$51 $SAS2 "$00 $SAOC .$7F . .38 SSBOA .$06 $SAOC S8 SA SA 8A SA SA SA SA S8 S8 S8 S8 88 S8 S8 SA FC S8 SB 88 STA S8 SA 8A LOA STA ,JSR RTS CLO LOA 3SR LOA ,JSR LDR STA STA $SB15 .$1S SSAOC $eA:55 SSAOC $SA:55 S3E <$42), Y .S835 .SB10 $S80A .$00 $42 "SSE .43 $SB03 $42 "SOO $S830 "SOO .42 S43 .SB30 $42 .SOO $SB30 $SB36 .SB4S .SB4S "$AO .42 .SS8 .43 <S42),Y .SB7D $SAS2 $8868 $46 .$00 .SB63 .$7F S8B75 SFCAS $S872 $S879 $8859 .46 $S863 41$80 $42 4I$SF .43 $8803 .. S4C .SAS2 .$38 .8A82 "$00 SFe SF9 SC11SC13SC1:5SC1SSC1ASC10SC1FSC22SC24SC27SC29SC28eC20SC30SC32SC3:5SC37SC3ASC30SC3ESC3FSC40SC428C44SC46SC47SC498C48SC4CSC4ESC50SC52SC:53SC5:5SC57SC59SC58SC5CSC5FSC61SC64SC66SC69SC68SC60SC70SC728C74SC76SC7SSC7A8C7CSC7DSC7FSCS28C84SCS7SC898caB8CSDSCBF8C908C928C958C978C998C9ASC98BC9CSC9DSCAOSCA2SCA4SCA68CASSCAA8CADSCAFSCBO8CB38C84SC868CBSSCBA8CBCSCBD6CBE- 8CBF- AD A2 20 A2 20 A2 20 S4 20 A4 DO A9 20 A:5 20 A5 20 4C 00 00 00 A9 S:5 S5 3S A:5 E5 AA A5 E5 DO 8A FO C9 90 A9 AA 20 A5 20 A5 20 AD 81 20 EE. DO E6 E6 DO E6 CA DO 20 A9 20 E6 DO EE. DO 60 A5 20 A5 85 4A 4A 4A 4A 20 29 C9 90 69 69 20 A5 60 20 18 65 85 90 E6 60 00 00 00 ES E7 CO SC EA CO SC FA CO SC FO 40 SC FO ES 00 97 SC F9 80 SC F8 eo SC 90 SC 00 F6 F7 E7 FA ES F8 07 3A CO 02 CO BO se E8 80 8C EA 80 8C 00 FA 80 BC EA 02 E8 FA 02 FB EA 90 se 38 82 8A FS 85 F9 81 F6 97 8C F7 FC A2 SC OF OA 02 DE. 30 82 SA FC '37 Be F7 F7 02 F6 LOY LOX 3SR LOX 3SR LOX ,JSR STY ,JSR LOY 8HE LOA 3SR LOA 3SR LOA 3SR 31'1P BRI< 8RI< BRK LOA STA STA SEC LOA S8C TAX LOA S8C 8HE TXA BEQ CMP 8CC LOA TAX .JSR LOA ,JSR LOA ,JSR LOY LOA ,JSR INC SNE INC INC SHE IHC OEX 8HE .JSR LOA ,JSR IHC BHE INC SNE RTS LOA ,JSR LOA STA LSR LSR LSR LSR 3SR AND CMP 8CC AOC AOC .JSR LOA RTS .JSR CLC ROC STA 8CC INC RTS SRK BRK 8RK "ES "$E7 $SCCO UEA $SCCO "$FA $SCCO $FO $SC40 $FO $SC13 "SOO $SC97 SF9 $Sceo SFS sacac $eC90 .SOO $F6 $F7 $E7 'FA 'ES $F8 .SC:59 $SCSF "SCO .SC:58 .SCO 'SC80 .E8 $SC80 SEA $SC80 .$00 <SFA), 'y' SSC80 $EA $SC76 $E8 $FA SSC7C .F8 .SC69 S8C90 .$3B SSAS2 $FS .BC40 .F9 $SC40 $F6 .8C97 $F7 'Fe $SCA2 .SOF "SOA 'SCAB .. S06 .$30 $SA82 'FC SSC97 .F7 .F7 SSCBC .F6 225 226 REED, LEWART, AND SCHNEIDER 8CCO8CC38CC48CC78CC98CCA8CCB8CCC8000800380068009800C800F801280158018801B801ES0208023802:5S02SS029S02A8020803080318032803380368039803C8030803ES03F8040S0438045S0488041'18040805080538055- 20 E8 B9 95 C8 60 00 00 AD 20 AO 20 AD 20 AO 20 AO 20 A9 20 A9 20 60 00 20 20 60 00 00 2C 2C 2C 60 00 00 00 20 A9 20 A9 20 20 20 A9 20 C4 8C E8 88 00 00 02 82 SA 01 02 828A 02 02 82 8A 03 02 S2 8A 04 02 82 8A AS A8 FC 47 S2 81'1 33 80 63 SO 59 CO 59 CO 58 CO 00 FF AS FF A8 00 63 FF A8 8C FC FC 80 80 FC J'SR IHX LOA STA IHY RTS BRK BRK LOA J'SR LOA J'SR LOA 3SR LOA J'SR LOA J'SR LOA J'SR LOA J'SR RTS BRK J'SR 3SR RTS BRK BRK BIT BIT BIT RTS BRK BRK BRK 3SR LOA .JSR LOA .JSR J'SR .JSR LOA .JSR $8CC4 $8BE8,Y $OO,X $0200 $SA82 $0201 $8A82 .0202 $8A82 $0203 $8AS2 $0204 $8A82 .$A8 $FCA8 ••47 $8AS2 8058805A805080608061806:2806380668068806A806C80608BAO8BA88BBO88888BCO8BC8~ ecoo$S033 $S063 SCOS8CEOSCE8SCFO8CF8- ll$FF $FCA8 $8BOO A9 FF 20 A8 FC 20 00 8B 60 00 00 20 OC 8A 29 7F C9 20 00 F7 60 00 31 37 46 37 2E 04 30 33 04 SO FF FF 20 04 46 46 2E 04 31 37 SO 00 00 00 LOA J'SR J'SR RTS BRK BRK J'SR AHO CMP BHE RTS BRK 20 04 2E 04 31 37 2E 04 38 30 00 00 46 30 46 31 20 00 46 20 37 37 03 00 FO 00 80 00 00 00 00 FO 00 00 00 00 80 SO 00 00 00 00 93 17 94 00 00 00 92 01 93 00 00 00 00 00 00 00 00 00 00 93 CO 00 00 00 .92 ·93 02 00 00 00 $8AOC .$7F .$20 $8063 SC059 .CO~9 SCOS8 Appendix C Network Initialization Procedure for Satellites $8COO .$FF $FCA8 .$FF $FCA8 $8000 $8063 ••FF $FCA8 1. Set KIM-l KBD-TTY switch to KBD. 2. Press the following sequence of keys on the KIM keyboard: (RS) (AD) 17F2 (DA) 18 (+) 00 (AD) This sequence sets the baud rate to 3,000 baud. 3. Set the KBD-TTY switch to TTY. 4. Run appropriate network software from the Apple II.