0 programmer's. manual for the tactical …witus et al. user's manual for the tactical...

168
RESEARCH NOTE 80-15 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL OPERATIONS SYSTEM ANALYSIS PACKAGE Gary Witus, Mark Meerschaert, Donald Kleist VECTOR RESEARCH, INCORPORATED ' P.O. Box 1506 Ann Arbor, Michigan 48106 Human Factors Technical Area DTIC a FC=9=3 NO-CV Z238 190 D U. S. Army Research Institute for the Behavioral and Social Sciences LiJ May 1980 LA.=_ Contract OAHCl9-78-C-0027 Aproved for ,ubli reiease: distribution unilmittd.

Upload: others

Post on 21-Feb-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

RESEARCH NOTE 80-15

0 PROGRAMMER'S. MANUAL FOR THE

TACTICAL OPERATIONS SYSTEM

ANALYSIS PACKAGE

Gary Witus, Mark Meerschaert, Donald Kleist

VECTOR RESEARCH, INCORPORATED' P.O. Box 1506

Ann Arbor, Michigan 48106

Human Factors Technical Area

DTIC

a FC=9=3 NO-CV Z238 190

DU. S. Army

Research Institute for the Behavioral and Social Sciences

LiJ May 1980

LA.=_ Contract OAHCl9-78-C-0027

Aproved for ,ubli reiease: distribution unilmittd.

Page 2: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

SECURITY CLASSIFICATION OF THIS PAGE (Wham Data Bim _________________

REPORT DO~LLMENTATION PAGE BEFORE COhIPIMG~h FORM1. RORT NUN mGER' (b I 12. GOVT ACCESN No. 3. RECIPIENTSA.G N UMMER

7;F _f4Research Notes 80-15 1D4 ~ ~ _____________

S. 0"IL 31"dobi) S . TYPE d'FNUTP6RT A PERIOD COVERED

( }Programser's Manual for the Tactical / InemMa79ay8

I", GarY/Witus."MarkjMeerschaert, DonaldlKleist IDAHC1 9-78-C-W27<

S. PERFORMING ORGANIZATION NAME AND ADDRESS 40. PROGRAM ELEMENT PRJET. TASK

Vector Research, Incorporated, ~iwu-.~~P0 Bog 1506 C/1/M - -2Q679A793 ,1.

Ann Arbor, Michigan 48106Tak1Wrui01It. COTO FICE NAME AND ADDRESS I&--12 REPORT DATE

COCO M ~AGField Office (ii25 Februau 1980ATTN: DRDCO- FL 13 I. NUNMB9R Of' PAGES

Ft. Leavenworth, Kansas 66027 17514. MONITOING AGENCY NAME 6 AODRESS(1l 010I ein 016UiaJR1 Ofi.e) IS. SECURITY CLASS. (of Wde fopow)

US Army Research Institute for the Behavioraland Social Sciences Unclassified

ATTN: PERI-OS 1646 I!IAIK7UICATION0O1ONRAOI

5001 Eisenhower Ave Alexandria VA 22333 ______________I&. mSTA1111TION STATEMENT (of 008- RGPeat

Approved for open release; distribution unliif ted.

17. DISTRI§UTI@N STATEMENT (of Mhe 8606eF21 00100d do Noeok H51 49Meam *410 Repeat

1S. SUPPLEMENTARY NOTES

This research was technically monitored by Mr. Robert S. Andrews-andDr. Stanley M. Halpin of ARI adid LTC Larry Walker of CORADCOM.

S.KEY WORDS (Cantame am o~ rel At aessr OW..a m damtitt by block mmb)

Conmmand and Control Information Management Standing Oper~tingComunications Information Sumumarization Procedures (SOP)Computers Mathmatical Modeling Tactical OperationsData base Management Networks System (TOS)Design aid Queueing

20. AeSTRACT (Continue am rovies side It noeo..wy mIanE ihnef byc Webek )

* This document discusses the programing details of a computer programpackage for the analysis of the Tactical Operations System (TOS).The program computer code is included. These programs were producedduring the second phase of a project to develop information managementconcepts and procedures for automated battlefield commnand and controlsystems.

DD I 1473 EDITIOO OF I NOV 65 IS OBSOLETE

.< / (/ / ~ SECURITY CLASSIFICATION OF THIS PAGE (Wham0 0010-41ee

Page 3: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

mI

PREFACE

This document is one of eight reports which describe the work

performed by Vector Research, Incorporated (VRI) and its subcontractor,

Perceptronics, Incorporated, for the US Army Research Institute for the

Behavioral and Social Sciences (ARI) under the second phase of contract

number DAHC19-78-C-0027. The work described was performed over 12 months

of an anticipated 36-month three-phased project. The overall objective

of the project has been to produce procedural guidelines to be used by

divisions in the field in developing standard operating procedures for

information management in the Tactical Operations System (TOS). As a

consequence of the redirection of the TOS development effort in November

1979, the objective of this work was reinterpreted to include automated

battlefield comand control systems (ABCCS) in general, using TOS for an

explicit example of the design, human factors, and management control

considerations which must be addressed.

The VRI study team for phase II was comprised of Dr. Robert W. Blum

(Project Leader), Ms. Cathleen A. Callahan, Dr. W. Peter Cherry, Mr. Mark

G. Graulich, Mr. Donald Kleist, Mr. Mark Meerschaert, Mr. Gregory Touma,

and Mr. Gary Witus. The Perceptronics team for phase II consisted of Dr.

Michael G. Samet and Dr. Ralph E. Geiselman.

The authors wish to acknowledge the helpful contributions of Dr.

Stanley M. Halpin and Mr. Robert Andrews, who were charged with

monitoring the study for ARI; and LTC L. Walker, MAJ. A. Edmonds, and Mr.

M. Carrio, who performed a similar function for that portion of the study

effort which was jointly sponsored with ARI by the US Army Communications

Research and Development Command (CORADCOM).

Page 4: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

, ii

The eight reports are as follows:

Blum et al. Information Management for an Automated BattlefieldCommand and Control System: Executive Summary. ARI ResearchReport 1249. -- presents an overview of the project and theother seven reports.

Callahan et al. Guidelines for Managing the Flow of Informationin an Automated Battlefield Command and Control System. ARIResearch Report 1348. -- describes considerations in and-procedures for e management of contemporary ABCC systems.

Geiselman and Samet. Guideline Development for Summarization of

Tactical Data. ARI Technical Report 458. -- an analysis ofprocedures for the extraction, summarization, and presentationof critical information.

Witus et al. Analysis of Information Flow in the Tactical

Operations System (TOS). ARI Research Notes 80-12. --

describes the purpose, approach, and results of a TOS analysiswhich focused on TOS when integrated with a plannedcommunications support system.

Witus et al. Description of the Tactical Operations SystemInformation Flow Model. ARI Research Notes 80-13. --describes the representation of TOS used to develop the analysispackage and the mathematics of the model.

Witus et al. User's Manual for the Tactical Operations SystemAnalysis Package. ARI Research Notes 80-14. -- explains theuse and operation of the analysis package.

Witus et al. Programmer's Manual for the Tactical OperationsSystem Analysis Package. ARI Research Notes 80-15. --describes the programming details of the package to facilitatemodifications or transfer between host systems.

Cherry, W. All Source Analysis System: Design Issues. ARIWorking Paper HF8O-XX. -- a discussion of design issuesassociated with the emerging ASAS concept.

Accession For

DTIS GRA&I

DTIC TABUnannounced

Justificatio

*j J1 : ' C!/or --Di t ri I ;pI c i-

Av-. J

- ()

Page 5: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

CONTENTS

Page

1.0OINTRODUCTION. .. ..... ...... ..........1-1

2.0 PROGRAM CREATE. .. ..... ...... ...... .. 2-1

2.1 Variables in Program Create .. ... ...... .. 2-12.2 Basic Flow of Program Create. .. ... ........ 2-132.3 Subroutines in Create. .. ..... ...... .. 2-172.4 Data File...................2-192.5 Code of Program'Create...............2-22

3.0 PROGRAM MODIFY. .. ..... ...... ..... ..... 3-1

3.1 Structure of Program MODIFY . . . . . .3-1

3.2 Code of Program Modify .. .. ..... ..... .. 3-33.3 Flow Charts of the Program Modify

and Selected Subroutines. .. ..... .... 3-5

4.0 PROGRAM DISPLAY .. .. ..... ..... ...... .. 4-1

5.0 PROGRAM COMPUTE.. .. ..... ..... ...... .... 5-1

APPENDIX A .. .. ..... ..... ...... ..... .. A-1

APPENDIX B ...... .. ... ..... ...... ........ B-1

APPENDIX C .. .. ..... ..... .. .. .. .. .. .... C-i

Page 6: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

EXHIBITS

Number Title Page

1-1 Analysis Package Organization 1-2

2-1 Configuration Variables in CREATE 2-2

2-2 Communications System Variables in CREATE 2-5

2-3 Message Variables in CREATE 2-6

2-4 Route Cross Message Array Variables inCREATE 2-7

2-5 Engineering Data in CREATE 2-8

2-6 Environmental Variables in CREATE 2-11

2-7 Logic Variables in CREATE 2-12

2-8 Basic Flow of CREATE 2-14

2-9 Subroutines in CREATE 2-18

2-10 Output File Format 2-20

3-1 Structure of Program MODIFY 3-2

3-2 Data Modification Subroutines Used ByProgram MODIFY 3-4

3-3 Flowchart for Program MODIFY 3-6

3-4 Flowchart of Subroutine COMSYS 3-11

3-5 Flowchart of Subroutine LDFACT 3-14

3-6 Flowchart of Subroutine NOISE 3-15

5-1 Organization of COMPUTE 5-2

5-2 Flowchart for the Input andInitialization Module 5-3

5-3 Flowchart for the Traffic Flow Module 5-4

5-4 Flowchart for the Operating StatisticsModule 5-5

Page 7: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

-map

j vi

EXHIBITS

Number Title Page

5-5 Flowchart for Segment A of the OperatingStatistics Module 5-6

5-6 Flowchart for Segment B of Operating

Statistics Module 5-7

5-7 Flowchart for Subroutine TRANS 5-8

5-8 Flowchart for the Performance MeasureModule 5-10

5-9 Flowchart for the Output Module 5-11

5-10 Variables in COMPUTE 5-12

5-11 Logical "/0 Unit Assignments 5-18

iU

Page 8: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

i 1-1

1.0 INTRODUCTION

iThe purpose of this volume is to document the computer programs and

data structures in the TOS analysis package in sufficient detail to

enable a programmer to modify the package or transfer it between computer

systems. The volume is organized into five chapters and three appen-

dices. The remainder of this chapter discusses the overall organization

of the analysis package. Chapters 2.0 through 5.0 discuss, in turn, each

of the four computer programs in the package and present flowcharts,

descriptions of the variables and subroutines, and discussions of the

code. Appendix A contains a listing of the four programs. Appendix B

contains a variable name cross-reference dictionary. Appendix C contains

a statement label dictionary. All programs are written in standard

FORTRAN IV and contain internal commentary. They are currently

implemented on the Amdahl 470/V7 computer at The University of Michigan.

The analysis package performs three basic functions: (1) interact-

ing with the operator to set, alter, or examine the values of the inputs;

(2) performing the computations specified by the mathematics of the

model; and (3) displaying the outputs. The package consists of four

computer programs and one external data structure., he organization of

the package, the interactions between the programs and the data

structure, and the operator activities are shown in exhibit 1-1. Program

CREATE prompts the operator to specify values for all of the inputs in

the data file and uses them to create a new data file. Program MODIFY

reads an existing data file, and allows the user to select data elements

...

Page 9: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

1-2

EXHIBIT 1-1: ANALYSIS PACKAGE ORGANIZATION

DATA COMPUTER OPERATORSTRUCTURE PROGRAMS ACTIVITY

CREATE .. .......... Set input values

Select input variablesMODIFY .. .. ........ to examine and set new

values for them

DATA, FILE

(INPUTS)

DISPLAY . ... ........ Receive display ofinput file

Set values for 2 inputs,COMPUTE . .......... .. select output format,

receive output

Page 10: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

1-3

for display or modification. The program then creates a new data file.

Program DISPLAY reads, formats, and displays an existing data file.

Program COMPUTE performs all of the computations required by the model,

allows the operator to select the output format, and displays the

outputs.

L-A

Page 11: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-1

2.0 PROGRAM CREATE

Program CREATE was written to facilitate construction of the data

file which contains input data for the TOS simulation. Program CREATE is

written in FORTRAN IV and is set up to be run interactively from a ter-

minal. The programming code and logic are straightforward and should

facilitate implementation on any computer the potential user desires.

The remainder of this section discusses the variables and characteristics

of program CREATE.

2.1 VARIABLES IN PROGRAM CREATE

Exhibits 2-1 through 2-7 contain all of the variables used in pro-

gram CREATE, indicate the type of variable as implemented in the program,

and give a definition of the meaning of each variables. The contents of

these exhibits are:

o Exhibit 2-1: Network Configuration Data

* Exhibit 2-2: Communications System Data

- Exhibit 2-3: Message Types Data

* Exhibit 2-4: Route Cross Message Data

Exhibit 2-5: Engineering Data

Exhibit 2-6: Error Rate Data

* Exhibit 2-7: Program Execution Controls

The variables which contain information about the TOS system have

names mnemonically derived so that understanding of the meaning of the

variables is facilitated. The exceptions to this general rule are the

logic variables which are used to control the program flow.

Page 12: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-2

EXHIBIT 2-1: CONFIGURATION VARIABLES IN CREATE

Name Type Meaning

NBDE 1*4 The number of brigades

BDNAME(I) R*8 The name of Brigade I

NBN(I) 1*4 Number of battalions in Brigade I

BD(I) 1*4 Type of processor at Brigade I: = 1* if TCS, = 2 if TCT

NLINC(1) R*8 The name of the channel connectingBrigade I with the FEP

BNNAME(I,J) R*8 The name of Battalion J of Brigade I

BN(I,J) 1*4 The type of processor at Battalion '

of Brigade I: = 1 if TCS, = 2 of TCT

NLINK(I,J) R*8 The name of the channel connectingBattalion J to Brigade I

NOU 1*4 The number of Other TOS Users (Allusers which are not either brigadesor their subordinate battalionsare considered Other TOS users.)

OUNAME(1) R*8 The name of Other TOS User I

OU(I) 1*4 Type of processor at Other TOS UserI: = 1 if TCS, = 2 if TCT

NLINCK(1) R*8 Name of the channel connecting OtherTOS User I to the FEP

NC 1*4 The number of communication channelsin the TOS network

CNAMM() R*8 The name of TOS communication channel I

-- Continued --

Page 13: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-3

EXHIBIT 2-1: CONFIGURATION VARIABLES IN CREATE(Continued)

Name Type Meaning

NR 1*4 The number of routes in the TOScommunication network: equals thenumber of Other TOS users plus numberof brigades plus number ofbattalions

RP(I,l) 1*4 The number of the route. Routes arenumbered in the same order as givenfor the route name. (The followingorder of routes is followedthroughout the TOS analysis package:routes numbered 1 through NOU are theOther TOS Users; routes NOU+1 toNOU+NBDE are Brigades 1 through NBDE,next come the battalions,'first thebattalions of Brigade 1 then thebattalions of 2, etc.)

RNAM(I) R*8 The name of route I.

RP(I,2) 1*4 The node with which node Icommunicates. By convention thisequals 0 (the FEP) for Other TOSUsers and Brigades. For a Battalion,it equals the route number of itsparent brigade

NL 1*4 Number of links, eouals the number ofroutes

LP(I,1) 1*4 Equal to RP(I,1), the number of thelink

LP(I,2) 1*4 Number of channel connecting node Iwith the FEP, if I is a brigade orOther TOS User, or with the parentbrigade if I is a battalion

LP(I,3) 1*4 The number of the node with whichnode I communicates. If node Icommunicates with the FEP, LP(I,3)equals NR plus 1, if node I is abattalion, LP(I,3) is the number ofIts parent brigade

-- Continued --

Page 14: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-4

EXHIBIT 2-1: CONFIGURATION VARIABLES IN CREATE(Concluded)

Name Type Meaning

LINC(I) 1*4 The number of the channel connectingBrigade I with the FEP

LINK(I,J) 1*4 The number of the channel connectingBattalion J with Brigade I

LINCK(I)1*4The number of the channel connectingOther TOS User I with the FEP

IPD(I) 1*4 The type of processor at node I:1 If TCS, = 2 if TCT

NP 1*4 Number of processors: equal NR+1

NN 1*4 Number of nodes: equals NP + NC + 3

0

"It

Page 15: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-5

EXHIBIT 2-2: COMMUNICATIONS SYSTEM VARIABLESIN CREATE

Name Type Meaning

CD(I,1) R*4 Rise time, in milliseconds, ofChannel I

CD(I,2) R*4 Transmission rate, in characters persecond, of Channel I

CD(I,3) R*4 Proportion of time Channel I is beingused for voice communications

CD(I,4) R*4 Number of lines on Channel I

Page 16: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-6

EXHIBIT 2-3: MESSAGE VARIABLES IN CREATE

Name Type Meaning

NM 1*4 Total number of message types in thesystem

NUM 1*4 Number of user-initiated messages inthe TOS system (By implication, thenumber of TOS-generated messages isNM - NUM)

MNAM(I) R*8 The name of Message Type I. (Byconvention user-initiated messagesare numbered I through NUM andTOS-initiated messages are numberedNUM + 1 through NM)

MD(Il) R*4 The average length in characters ofMessage Type I

IMP(I,1) R*8 The name of message type caused asoutput on the same route by MessageType I: = 0, if none

IMP(I,2) R*8 The name of message type caused asoutput on another route by MessageType I: = 0, if none or if Message Iis a TOS-generated message

MP(I,1) 1*4 The number of Message Type IMP(1,1)

MP(I,2) 1*4 The number of Message Type IMP(I,2)

1C)

Page 17: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-7

EXHIBIT 2-4: ROUTE CROSS MESSAGE ARRAY VARIABLES IN CREATE(I = Route Number, J = Message Number)

Name Type Meaning

(If Jzs NUM, Message J is a user-initiated message)

RM(I,J,1) R*4 Initiation rate, in messages perhour, of Message J at Node I

RM(I,J,2) R*4 = 0, not used for user-initiatedmessages

RM(I,J,3) R*4 = 0 if I is not a battalion.Equals the probability that Message Jis deleted during hierarchical reviewat the parent brigade if I is abattalion

RM(I,J,4) R*4 = 0 if I is not a battalion.Equals the probability that Message Jis altered, but not deleted, duringhierarchical review at the parentbrigade if I is a battalion

'(If J>NUM, Message J is a TOS-initiated message)

RM(I,J,1) R*4 = a (I,J), proportionality constantused to determine the initiation rateof TOS-initiated Message J on route I

RM(I,J,2) R*4 = 8 (I,J), proportionality constantused to which determine the initia-tion rate of TOS-initiated Message Jon route I

RM(I,J,3) R*4 = 0, not used for TOS-initiatedmessages

RM(I,J,4) R*4 = 0, not used for TOS-initiatedmessages

Page 18: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-8

EXHIBIT 2-5: ENGINEERING DATA IN CREATE

Name Type Meaning

DO() R*4 Message Disk Mean access time inmilliseconds

DD(2) R*4 Data Disk Mean access time in milli-seconds

GPD(1,1) R*4 CPU, in milliseconds per message,required to originate a message, at aTCS

GPD(1,2) R*4 CPU, in milliseconds per message,required to originate a message at aTCS

GPD(2,1) R*4 CPU, time in milliseconds permessage, required to send themessage, at a TCS

GPD(2,2) R*4 CPU, time in milliseconds permessage, required to send the messageat a TCS

GPD(3,1) R*4 CPU, time in milliseconds permessage, required to receive amessage at a TCS

GPD(3,2) R*4 CPU, time in milliseconds permessage, required to receive amessage, at a TCS

GPD(4,1) R*4 CPU,ime in milliseconds per message,to template check a message, at aTCS

GPD(4,2) R*4 CPU, time in milliseconds permessage, required to template a checka message, at a TCS

GPD(5,1) R*4 CPU, time in milliseconds permessage, required to terminate amessage, at a TCS

GPD(5,2) R*4 CPU, time in milliseconds permessage, required to terminate amessage, at a TCS

-- Continued -

Page 19: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-9

EXHIBIT 2-5: ENGINEERING DATA IN CREATE(Continued)

Name Type Meaning

GPD(6,1) R*4 CPU, time in milliseconds permessage, required to terminate amessage, at a TCS

GPD(6,2) R*4 CPU, time in milliseconds permessage, required to terminate amessage, at a TCS

GPD(7,1) R*4 CPU, time in milliseconds permessage, required to originate amessage, at a TCS

GPD(7,2) R*4 CPU, time in milliseconds permessage, required to originate amessage, at a TCS

GPD(8,1) R*4 CPU, time in milliseconds permessage, required to send a message,at a TS

GPD(8,2) R*4 CPU, time in milliseconds permessage, required to send a message,,at a TCS

GPD(9,1) R*4 CPU, time in milliseconds permessage, required to send to receivea message, per message

GPD(9,2) R*4 CPU, time in milliseconds permessage, required to receive amessage, at a TCS

GPD(1O,1) R*4 CPU, time in milliseconds permessage, required to terminate amessage, at a TCS

GPD(1O,2) R*4 CPU, time in milliseconds permessage, required to terminate amessage, at a TCS

GPD(11,1) R*4 CPU, time in milliseconds permessage, required to initiate amessage, at a TCS

GPD(11,2) R*4 CPU, time in milliseconds permessage, required to initiate amessage at a TCS

-- Continued --

Page 20: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-10

!4

EXHIBIT 2-5: ENGINEERING DATA IN CREATE(Concluded)

Name Type Meaning

MD(I,2) R*4 Data base processing time, inmilliseconds, of Message Type I

MD(I,3) R*4 Number of message disk reads orwrites for Message Type I

MD(I,4) R*4. Number of data disks reads or writesfor Message Type I

PD(I) 1*4 Number of templates at node I

MD(I,4) R*4 Number of data disks reads or writesfor Message Type I

PD(I) 1*4 Number if templates at node I:= 0 if node I is not a Brigade

PD(NR+1) 1*4 Number of templates at the FEP

0-

Page 21: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-11

EXHIBIT 2-6: ENVIRONMENTAL VARIABLES IN CREATE

Name Type Meaning

LD(I,1) R*4 The bit error rate for a messagesent from Node I to the next node,in bits in error per 1000 bits

LD(I,2) R*4 The bit error rate for a messagesent to Node I, in bits in errorper 1000 bits

Page 22: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-12

EXHIBIT 2-7: LOGIC VARIABLES IN CREATE U;

Name Type Meaning

IV 1*4 = 1 if user desires short prompts

ITCT 1*4 = 1 if a TCT is present in the TOSsystem

ITCT 1*4 = 2 if a TCT is present in the TOSsystem

IST 1*4 A temporary variable to determine ifTCSs and TCTs are present

TCS 1*4 Literally, the character string "TCS"

TCT 1*4 Literally, the character string "TCT"

IFG 1*4 = 1 if the Route cross Message arrayis to be read in later 0

IW 1*4 = 1 if the user desires to call thedisplay routine to print the data onthe terminal

IWF 1*4 =1 if the user desires to create anoutput file

(I, II, III, IJ, I1, 12, J, JI, JJ, JJJ, JK, JN, JR, K, RNUM are all

indices used in the CREATE logic)

Page 23: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

1 2-13

A convention for numbering the users of the TOS system is followed

throughout all four of the computer programs. In this system, the first

users are always the non-brigade users of the TOS system. Immediately

following these are all of the brigade users. Following the brigades are

their battalion users: all the battalions of the first brigade, then all

the battalions of the second brigade, etc. In this way, the type of TOS

user can be inferred by its number without having to append additional

identifiers to the number or names. The use of this convention will

become obvious when the data file is discussed.

The arrays BDNAME, BNNAME, OUNAME, CNAM, RNAM, and MNAM are declared

as R*8 variables in program CREATE. They are, however, used as names in

CREATE and may contain strings of up to eight alpha-numeric characters.

They are included as a convenience to the user and are not used in the

logic of any of the programs in the TOS analysis package.

It should be noted that some of the variables in CREATE are

redundant. For example, the LP and RP arrays contain some of the same

information. This organization facilitated the coding of program

COMPUTE.

2.2 BASIC FLOW OF PROGRAM CREATE

Exhibit 2-8 contains a basic flowchart of program CREATE. The steps

in CREATE are implemented in a straightforward serial fashion. They are

set up so that succeeding steps use information which are input in

earlier steps. This information is used to control the internal DO

Loops so they provide the correct number of prompts.

Page 24: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-14

EXHIBIT 2-8: BASIC FLOW OF CREATE

Step 0: Set IV for long or short prompts IV = 1 short

Step 1: Brigade InformationEnter number of Brigades: NBDEFor each Brigade, enter name, type of processor, and

number of Battalions: BDNAME(I), BD(I), NBN(I)Call CHECK for BD(I) to check name

Step 2: Battalion InformationFor each Battalion, enter name and type of processor

BNNAME(I,J), BN(I,J) ((I,J) = Battalion J of Brigade I)Call CHECK for BN(I,J) to check name

Step 3: Other TOS User informationEnter number of Other TOS Users: NOUFor each Other TOS User, enter name and type of processor

OUNAME(I), OU(I)Call CHECK for OU(I) to check name

Step 4: Channel DataEnter number of communications channels: NCFor each channel, enter the name CNAM(I)

Step 5: Connect User with ChannelsFor each Battalion, enter name of channel connecting it to its

parent Brigade, NLINK(I,J)Call CHECK 1 to check name and assign channel number to

LINK(I,J)For each Brigade enter name of channel connecting it to the

FEP: NLINC(I)Call CHECK1 to check name and assign channel number to

LINC(I)For each Other TOS User, enter name of channel connecting it to

the FEP: NLINCK(I)Call CHECK1 to check name and assign channel number to

LINCK(I)

Step 6: Make Configuration AssignmentsCompute NL, NR, NP, NNFor each TOS user, assign values to RNAM(I), RP(I,1), RP(I,2),

LP(I,1), LP(I,2), LP(I,3), IPD(I)Check to determine if configuration includes both TCSs and TCTs

-- Continued

Page 25: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-15

EXHIBIT 2-8: BASIC FLOW OF CREATE(Continued)

Step 7: Message DataEnter number of messages and number of user initiated messages,

NM, NUMFor each user-initiated message enter name: MNAM(I)For each TOS-initiated message enter name: MNAM(I)For each user-initiated message enter mean length,

name of message caused as output on same route, and name ofmessage caused as output on other routes: MD(I,1), IMP(I,1),IMP(I,2)

Call CHECK2 to check message names and assign message numbersto MP(I,1) and MP(I,2)

For each TOS-initiated message, enter mean length: MD(I,1)Assign MP(I,1) = MP(I,2) - 0

Step 8: Route Cross Message Array(If Array to be inserted into file later, set 1FG=1 and bypassstep 8)For each Other TOS User, then for each Brigade, enter for each

user-initiated message the message initiation rate:RM(I,J,1). Then assign RM(I,J,2) = RM(I,J,3) = RM(I,J,4)=0

For each TOS-initiated message enter proportionalityconstants a(I,J) and 3 (1,J), RM(I,J,1) and RM(I,J,2).Then assign RM(I,J,3) = RM(I,J,4) = 0

For each Battalion, for each user-initiated message, enter themessage initiation rate, the probability that the message isdeleted at Brigade review and the probability the message isaltered at review: RM(I,J,1), RM(I,J,3), and RM(I,J,4).

Call CHECK 3 to insure probabilities are in the interval0-1; then assign RM(I,J,2) = 0

For each TOS initiated message, enter proportional-ityconstants a (I,J) and 8 (I,J), and RM(I,J,2); then assignRM(I,J,3) = RM(I,J,4) = 0

Step 9: Engineering DataEnter data disk and message disk access times: DD(l), andDD(2)Enter TCS data: GPD(I...5, 1 and 2)Enter TCT data: GPD(7...1O, 1 and 2)Enter FEP data: GPD(11, 1 and 2), and GPD(6, 1 and 2)For each channel, enter rise time, transmission rate, and

number of lines: CD(I,1), CD(I,2), and CD(I,4)For each message, enter data base processing time, number ofmessage disk reads or writes, and number of data disk readsor writes: MD(I,2), MD(I,3) and MD(I,4)

For each Brigade enter number of templates: PD(I)Enter number of templates at FEP: PD(NR+1)Assign PD(I) = 0 for all nodes not a Brigade or the FEP

Step 10: Voice Competition DataFor each channel, enter proportion of time channel is used for

voice transmission: CD(I,3)Call CHECK4 to insure CD(I,3) is in the range 0-1

-- Continued --

Page 26: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-16

EXHIBIT 2-8: BASIC FLOW OF CREATE(Concluded)

TER 11: Error Rate DataFor each Other TOS User, then for each Brigade:enter the bit error rate for a message from the user to thethe FEP and the bit error rate for a message from the FEP tothe user: LD(I,1), and LD(I,2)

Call CHECK 3 to ensure LD(I,1) and LD(I,2) are in theinterval 0-1

For each Battalion, enter the bit error rate for a message sentto the parent Brigade and the bit error rate for a message tothe Battalion.Call CHECK 3 to ensure LD(I,1) and LD(I,2) are in the

internal 0-1.

Step 12: Display DataIf user wishes to display data, enter IW=1If IW=1, call DISP, if IW 1 bypass step 12

STEP 13: Write Output FileIf user wishes to create an output file, enter IFW=1If IFW # 1, bypass step 13.If IFW=1, Write counting indices NR, NM, NN, NUM, NC, NP, NL,NOU, NBDE, and IFG

For each route write RNAM(1), RP(I,1), RP(I,2), and IPD(I)For each message write MNAM(I), MP(I,1) MP(I,2), MD(I,1)

MD(I,2), MD(I,3), and MD(I,4)For each channel, write CNAM(I), CD(I,1), CD(I,2), CD(I,3), and

CD(I,4)For each processor, write PD(I)For each link, write LP(I,1), LP(I,2), LP(I,3), LD(I,1), and

LD(I,2)For each route, for each message, write RM(I,J,1), RM(I,J,2),

RM(I,J,3), and RM(I,J,4)(or write a line of "*" if array to be input later)

Write DD(1), and DD(2)Write GPD(I,1) and GPD(I,2), for I=1,...,11

Step 14: Terminate

Page 27: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-17

Also included in the internal logic of each of the steps is a means of

prompting using either short or long forms of the prompts. If the short

form is elected in step 0, then in each succeeding step the first of a

series of similar prompts will contain a long, sentence-like prompt. All

subsequent prompts for similar data will be given in short form only.

This was instituted to decrease the running time of program CREATE.

2.3 SUBROUTINES IN CREATE

Exhibit 2-9 lists the six subroutines which are part of program

CREATE and indicates their basic functions. Five of the six subroutines

are used for error checking during the course of using the program

CREATE. The sixth subroutine permits display of the input data in an

easy to read format. Each of these subroutines is discussed in greater

detail in the following paragraphs.

Subroutine CHECK compares the name input by the user for the

processor at a node against the symbols "TCT" and "TCS". If the

processor type which is input by the user does not correspond to one of

these two names, CHECK will so indicate to the user and prompt for the

correct name. The checks and prompts will continue until the user inputs

either "TCT" or "TCT".

Subroutine CHECKI compares the channel name which the user has input

as the channel connecting two nodes with the list of channel names which

was input earlier. If the name the user has input is not contained in

the previously defined list, CHECK1 will so indicate to the user and

request another name to be input. This prompting will continue until a

proper channel name is input. When CHECK sees a proper channel name, it

will assign and return the number of that channel to the main program

where channel numbers, not names, are used for identification.

Page 28: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-18

EXHIBIT 2-9: SUBROUTINES IN CREATE

Name Function

CHECK Checks processor type

CHECK1 Checks channel name, assigns channel number

CHECK2 Checks message name, assigns message number

CHECK3 Checks probability range

CHECK4 Checks proportion range

DISP Displays data in easy to read format

Page 29: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-19

Subroutine CHECK2 performs much the same function as subroutine CHECKI.

Here the name of the message caused as an output by a particular message

is compared with the previously input list of message names. If the name

is not contained in that list, the user is prompted to enter another name

until a legal message name is seen. When this occurs, subroutine CHECK2

will determine the number of the message input and return that number to

the main program

During the course of CREATE, the user is prompted for the probabil-

ities of various actions. When the user has answered such a prompt, the

number is checked in the main program to see if it is in the range 0-1.

If the input number is outside this range, CHECK3 is called and the user

is prompted to enter a number in the range 0-1.

Subroutine CHECK4 is identical to subroutine CHECK3 except it is

used to check the input values for proportions rather than probabilities.

If the input proportion is outside the range of 0-1, CHECK4 is called.

When all the data have been input, the user is presented with the

instruction, "If you want to display the output file, enter a 1". If the

user enters a 1, subroutine DISP is called and the data are printed at

the terminal in an easy to read format. Subroutine DISP is essentially

program DISPLAY; however, the data are passed as subroutine arguments

rather than being read in from an input file, as is the case with program

DISPLAY.

2.4 DATA FILE

Exhibit 2-10 contains a description of the data file which is the

output of program CREATE. The variable names are as defined in exhibits

2-1 through 2-7 in which the formats of the lines in the output files are

Page 30: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-20

EXHIBIT 2-10: OUTPUT FILE FORMAT

Line El ements Format

COUNTERS

1 NR, NM, NN, NUM, NC, NP, NL, NOU, 10(13, 1X)NBDE, IFG

ROUTE INFORMATION

2)

thru RNAM(I, RP(I,1), RP(I,2), IPD(I) A8, 3(1X,13)

N R+1

MESSAGE INFORMATION

N R+2 )thru MDA(I), MO(I,3) (,), MD(I,, A81, E9X,3),

MNA(I), MP(I,1), MP(I,2), MD1,), A, E(9.3),NR+NM+1

CHANNEL INFORMATION

NR+NM+2

thru CNAM(I), CD(I,1), CD(I,2), CD(I,3) A8, 4(1X,E9.3)CD(I,4)

NR+NM+NC+1

NUMBER OF TEMPLATES

NR+NM+NC+2 P()2X, 13thru PDI

LINK DATA

NR+NM+NC+N P+2

thru LP(I,1), LP(I,2), LP(I,3), LD(I,1) 3(13, 1X)9LD(I,2) 2(E12.6, 1X)

NR+NM+NC+NP+NL+1

Page 31: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-21

EXHIBIT 2-10: OUTPUT FILE FORMAT(Concl uded)

ROUTE CROSS MESSAGE ARRAY(If IFG=l the array is a line of 50 "*su')

NR+NM+NC+NP+NL+2)

thru RM(1,J,l), RM(1,J,2), RM(l,J,3), RM(1,J,4) 4(E9.3,lX)

- I NR+NM+NC+NP+NL+NM+1

thru

NR+NM+NC+NP+NL '+(NR-1)*NM+2 RM(NR,J,1),RM(NR,J,2),RM(NR,J,3),RM(NR,J,4) 4(E9.3,1X)

thruNR+NM+NC+NP+NL+NR*NM+1

DISK ACCESS TIMES

NR+NM+NC+NP OD(1), DD(2) 2(E9.3, Wx+NL+NR*NM+2

GENERAL PROCESSOR DATA

NR+NM+NC+NP+NL+NR*NM+3 2(E9.3,1X)

thru GPD(I,1), GPD(I,2)

NR+NM+NC+NP+NL+NR*NM+13

Page 32: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

I

2-22

also shown. This output file is set up so that the first line contains

the counters which are used to determine the number of lines in the dif-

ferent sections of the data file. For example, NR indicates the number

of lines in the Route Information section; NM, the number of lines in the

Message Information section; etc. The file is implemented in this manner

so that the controls for reading the file would be contained within the

file itself and no other information need be given. This data file is in

a format compatible with the other three programs in the TOS analysis

package.

2.5 CODE OF PROGRAM CREATE

Program CREATE is written in FORTRAN IV using library subroutines

existing on the Amdahl 460/V7 computer at The University of Michigan.

The code is liberally interspersed with comment statements which indicate

the function of the various parts of the program.

The initial version of program CREATE was a short, simple program

which would suffice for most applications; however, during the checkout

of the other programs in the analysis package, it was obvious that addi-

tional logic needed to be included in CREATE to permit its use with vari-

ous test cases. In its simplest form, CREATE was implemented assuming a

standard division configuration which had more than one brigade, more

than one battalion for each brigade, and more than one other TOS user.

In this case, simple DO LOOPS will suffice; however, test cases were

implemented which contained only one or two nodes and in those situations

additional logic was required to bypass unnecessary DO LOOPS. Thus,

there are a large number of "IF" comparisons in CREATE. These are checks

to bypass portions of code which are not needed.

Page 33: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

2-23

The evolution of program CREATE included a decision to implement a

series of short prompts as part of the program. There are essentially

two sets of queries contained in CREATE. One set contains long,

sentence-like queries. In the other set the queries are short and are

used to prompt for subsequent entries of a similar type. Thus, there are

also numerous logic checks to determine when these short prompts are to

be called. This also necessitated additional logic to account for the

various test cases which were to be implemented, although most of that

logic would not be exercised if the program is used for the input of a

standard division configuration.

All of the input statements in program CREATE are free format and

make use of the library program, FREAD, which is available on the Amdahl

computer on which program CREATE was written. These free format read

statements were implemented to make the user's task of inputing the data

easier. If program CREATE is implemented on a different computer system,

the user must determine if FREAD is available. If FREAD is not avail-

able, the input statements need to be replaced with either conventional

formatted statements or with whatever free format subroutine is available

on the host machine.

Page 34: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-1

3.0 PROGRAM MODIFY

Program MODIFY was written to facilitate alteration of an existing

data file. The program is written in FORTRAN IV and is designed to be run

interactively from a terminal. This section provides information which

may be of use to a programmer who wishes to modify the logic of this

program or to transfer this program to a new computer system. Section

3.1 contains a description of the structure of the program MODIFY and

provides a list of the subroutines which are used. Section 3.2 contains

a discussion of the code and how to modify the existing code within the

framework of the structure described in section 3.1. Section 3.3

contains flowcharts of the main program and subroutine.

3.1 Structure of Program MODIFY

Program MODIFY is implemented as a main executive program which

calls several subroutines to perform the actual modification of input

data. Exhibit 3-1 illustrates the general structure of the program.

The data file for the TOS analysis pact-age consists of data of six

logical types. Exhibits 2-1 through 2-6 list the data by type. This

classification of data by type is reflected in the structure of program

MODIFY. The main executive program calls six subroutines to perform

modification of data, one for each type of data. Exhibit 3-2 relates

these six subroutines to the type of data which they modify.

Program MODIFY also uses three utility subroutines to perform

I/O functions. Subroutine READF reads an existing data file from I/O

Page 35: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-2

EXHIBIT 3-1: STRUCTURE OF PROGRAM MODIFY

Main Executive Program and Subroutines

utilityMANREADF subroutines

IRTE

Page 36: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-3

unit 1. Subroutine WRITEF writes a new data file onto I/O unit 2.

Subroutine FREAD is a general free-format read routine which is discussed

in section 2.3.

3.2 CODE OF PROGRAM MODIFY

The code of program MODIFY was produced using a top-down approach.

The result is a modular program which consists of a short executive main

program and a number of specialized subroutines. Section 3.1 describes

the structure of program MODIFY and lists its subroutines. A detailed

flowchart of program MODIFY is found in section 3.3.

Three utility subroutines are used to perform I/O functions. READF

reads the data file from I/O unit 1. This routine was created by copying

the code used to perform the same function in program DISPLAY. WRITEF

writes the new data file to I/O unit 2 and was created by copying code

used by program CREATE. The free-format read subroutine, FREAD, is a

library program on the Amdahl computer at The University of Michigan.

The actual modification of data is performed by the six subroutines

listed in exhibit 3-2. The six subroutines correspond to the six types

of data in the data file. The coding of these subroutines was performed

to allow modification of those data which were changed in the course of

the analysis of the TOS communications network; however, the program does

not currently allow modification of all of the data items.

Subroutine COMSYS allows the user to modify and examne any of the

communication system data. Subroutine LDFACT allows modification of some

of the route cross message data. The user is allowed to multiply message

traffic rates for the entire communications network by a factor. Sub-

routine NOISE allows the user to set bit error rates by channel, and to

Page 37: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-4

EXHIBIT 3-2: DATA MODIFICATION SUBROUTINES USED BY PROGRAM MODIFY

Subroutine Type of Data Modified

CONFIG System Configuration

COMSYS Communications System

MSG Message Data

PROC Processor Data

LDFACT Route Cross Message Data

NOISE Bit Error Rates

Page 38: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-5

display bit error rates. All of the code which displays input data was

copied from program DISPLAY. Subroutines CONFIG, MSG, and PROC are dummy

routines, since it was not necessary, in the course of the analysis of

TOS, to use program MODIFY to change the values of any of the

configuration, message, or processor data.

In order to extend the range of the current version of MODIFY to

allow modification of other data items, the programmer may write new

versions of some or all of the six special subroutines which perform data

modification. Some changes would be straightforward. For example, it

would be easy to write into subroutine PROC the ability to replace most

of the processor data; however, some other modifications are more

complex, and could involve the creation of interdependence among the six

subroutines. For example, the insertion or deletion of nodes in CONFIG,

which handles configuration data, may necessitate insertion, deletion, or

adjustment of communication system data, message data, route cross

message data, and error rate data. Such changes should preferably be

handled by requiring the user to run program CREATE to create a new data

file. The current version of MODIFY is designed to replace existing

values in the input data file, not to insert or delete data.

3.3 FLOW CHARTS OF THE PROGRAM MODIFY AND SELECTED SUBROUTINES

Exhibits 3-3 through 3-6 contains detailed flowcharts of the main

program and subroutines COMSYS, LDFACT, and NOISE.

Page 39: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-6

EXHIBIT 3-3: FLOWCHART FOR PROGRAM MODIFY

- I START

call }Read Data FileREADF from I/O Unit 1.

Prompt"Do yo u wi sh toUser alter the configuration?"

SFREAD Read response.

callI

CONFIG Alter configuration data.

Promp"Do you wish to alterUser the communications system?"

-- Continued--

Page 40: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

*1 3-7

EXHIBIT 3-3: FLOWCHART FOR PROGRAM MODIFY (Continued)

cal I Read response.FREAD

call Alter communicationsCOMSYS system data.

Prompt /"Do you wish to alterUser / 7the message data?"

cal I Read response.FREAD

call Alter message data.MSG

C

-- Continued -

Page 41: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-8

EXHIBIT 3-3: FLOWCHART FOR PROGRAM MODIFY (Continued)

Prompt "Do you wish to alterUser / the processor data?"

call Read response.FREAD

call Alter processor data.PROC

Prompt "Do you wish to alterUser the system loads?"

cal I Read response.FREAD

-- Continued--

Page 42: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-9

EXHIBIT 3-3: FLOWCHART FOR PROGRAM MODIFY (Continued)

call Alter Route CrossLDFACT Message Data.

Prompt /"Do you wish to alterUser / the error rates?"

call Read response.

call Alter error rates.NOSE

P"Do you wish to make anyUse additional changes?"

-- Continued --

Page 43: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-10

EXHIBIT 3-3: FLOWCHART FOR PROGRAM MODIFY (Concluded)

call Read response.FREAD

@ YES YS

call Write new input fileRITEF jon I/O unit 2.

STO

Page 44: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-11

EXHIBIT 3-4: FLOWCHART OF SUBROUTINE COMSYS

SPrompt "How many channels do youUser wish to enter data for?"

call User inputs NUMBFREAD

/"Enter the numbers correspondingUser to those channels."

all User inputs index ofFREAD each channel.

F ~nstruc"For each channel enter:User rise time, transmission rate,

unavailable capacity,number of lines."

Initialize DO LOOP index.

(-- Continued--

Page 45: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-12

EXHIBIT 3-4: FLOWCHART OF SUBROUTINE COMSYS (Continued)

"Eromp Enter data for channel..

call

FREAD User inputs data forchannel I.

I = I + i1 Next channel.

NO I ULast channel?

~YES

P"root y you wish to seeser current communi cations

system data?"

call Read response.FREAD

--Continued -

Page 46: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-13

EXHIBIT 3-4: FLOWCHART OF SUBROUTINE COMSYS (Concluded)

NO YES

YES

Display Use code from DISPLAYData to display this data.

Prompt "Do you wish to change moreUser communications system data?"

callFREAD Read response.

YESYE

Page 47: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-14

t

EXHIBIT 3-5: FLOWCHART OF SUBROUTINE LDFACT

ENTER

Prompt "Enter Load Factor."User

call User inputs FACTOR.FREAD

multiply alltraffic rates

by FACTOR

RETURN

Page 48: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-15

EXHIBIT 3-6: FLOWCHART OF SUBROUTINE NOISE

Prompt "How many channels do youUser 7 wish to enter data for?"

call Read NUMB.FREAD

RETURN YS NUMB =0

NO

Prompt /"Enter the numbers ofUser those channels."

FREAD of each channel.

Initialize DO LOOP index.

Prompt /"Enter error rateUser for channel..."

-- Continued --

Page 49: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-16

EXHIBIT 3-6: FLOWCHART OF SUBROUTINE NOISE (Continued)

call User inputs error rate

RE D for channel I.

j I DO LOOP over links.

NO Jon IIs link J on channel I?

j j + INext link.

NO J> NLLast link?

I + 1Next channel.

-- Continued -

Page 50: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

3-17

EXHIBIT 3-6: FLOWCHART OF SUBROUTINE NOISE (Continued)

ILast channel?

~Y ES

/Prompt/

User "Do you wish to see

current noise levels?"

call Read response.FREAD

NO ?YES?

display Use code from DISPLAYError Rates to display error rates.

P"Do you wish to changeUser /more error rates?"

call Read response.FREAD

-- Continued-

Page 51: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

i 3-18

EXHIBIT 3-6: FLOWCHART OF SUBROUTINE NOISE (Concluded)

V6

Page 52: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

4-1

4.0 PROGRAM DISPLAY

The third of the four programs in the TOS analysis package was

written to assist the user in examining the contents of the data file.

Program DISPLAY will read the data file and print the information with

appropriate headings so that the user can easily examine the contents of

the data file.

Program DISPLAY will mesh with the outputs of both program CREATE

and program MODIFY. The read statements in program DISPLAY are copies of

the write statements from the other two programs, with the word READ

inserted in the place of WRITE. This was done to assure compatibility

between the progams. Program DISPLAY is set up to operate on the Amdahl

computer at The University of Michigan. This computer allows the user to

specify input devices on the job control cards. Thus, the read state-

ments in program DISPLAY are not the normal "READ(5, )" statements which

are found in most FORTRAN codes, but rather are READ(2, ). Thus, the

user is required to inform the operating system that device two contains

the file which is to be displayed. If DISPLAY is implemented on another

computer system, the compatibility with the read statements and the job

control cards must be ensured so that program DISPLAY is linked to the

proper data file.

Program DISPLAY was written in standard FORTRAN IV. The listing

contained in Appendix A contains extensive comment lines which are used

to identify the functions being performed. The first card read from the

data file contains the counters which are used to control the DO LOOPS

Page 53: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

4-2

which make up the remainder of program DISPLAY. The ordering of the

route numbers, messages, and channels is the same as that contained in

the other three programs and is used internally in DISPLAY. Program

DISPLAY contains the option of reading data files which do not contain

the Route Cross Message Array. If such a data file is used as the input

for DISPLAY, the header for the Route Cross Message Array is printed in

the output along with a message saying that the array is to be read in

later.

Page 54: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-1

5.0 PROGRAM COMPUTE

Program COMPUTE performs the computations specified by the model and

displays the ouputs. COMPUTE is organized into five modules, as shown in

exhibit 5-1. Three of the program modules, the Traffic Flow Module, the

Operating Statistics Module, and the Performance Measure Module, corres-

pond to the three modules of the same names in the mathematical model. 1

The correspondence is not quite exact due to programming considerations

such as producing efficient code and minimizing the program's memory

requirements. Nonetheless, the primary content of the modules is

unchanged.

The program documentation consists of a series of exhibits present-

ing: (1) flowcharts; (2) descriptions of the program variables; and

(3) use of I/O units. Flowcharts for the Input and Initialization and

Traffic Flow Modules are presented in exhibits 5-2 and 5-3. A flowchart

for the Operating Statistics Module is presented in exhibit 5-4. In this

flowchart, two segments are labeled A and B. More detailed flowcharts

for these segments are presented in exhibits 5-5 and 5-6. Exhibit 5-7

contains a flowchart for a subroutine called by segment A of the Opera-

ting Statistics Module. Flowcharts for the Performance Measure Module

and the Output Module are presented in exhibits 5-8 and 5-9. A list and

description of the variables used in the program are presented in exhibit

5-10. Exhibit 5-11 shows the use of logical I/O units.

1See ARI Research Notes 80-13, Chapter 3.0.

Page 55: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-2

EXHIBIT 5-1: ORGANIZATION OF COMPUTE

Input andInitialization

Module

TrafficFlow

Module

OperatingStatistics

Module_________________

PerformanceMeasureModule

OutputModule

Page 56: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-3

EXHIBIT 5-2: FLOWCHART FOR THE INPUT ANDINITIALIZATION MODULE

Begin

Prompt forand Read

Inputs fromTerminal

ReadInputFile

Adjust all

Time Units toMinutes

Initialize

Output Arraysto Zero

Proceedto NextModule

Page 57: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-4

EXHIBIT 5-3: FLOWCHART FOR THE TRAFFIC FLOW MODULE

BeginI I

For each user originated messagetype I, and each user J: 1

Increment the rate of DCCoutput messages of type Isent to user J, where I is

the message type of DCCresponses sent to the originator

of messages of type I

S Increment the rates of DCC

output messages of type 12to all users except J, where12 is the message type of

DCC responses sent to usersother than the originator

of messages of type I

Proceedto nextmodule

J4 JI

Page 58: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-5

EXHIBIT 5-4: FLOWCHART FOR THE OPERATING STATISTICS MODULE

Begin

For each user I and each message type J:

SEGMENT A:Assign Temporaryparameter values

SEGMENT B:For each processor and channel

on the route computethe arrival rate, meanservice time and second

moment of the service time

Compute the probability thatall lines of a multiline

channel are busy

Compute the coefficientof variation for all servers

Proceedto nextnode

Page 59: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-6

EXHIBIT 5-5: FLOWCHART FOR SEGMENT A OF THE OPERATING STATISTICS MODULE

Beg in '

Set pointers tolinks, processors, and

channels on route

Compute the rate of origination plusthe rate of hierarchical review deletion plus

the rate of hierarchical review alteratio)n

or departure from DCC

Fill array with times forvarious processing activities

Call subroutine TRANS to computethe first and second moments of the

distribution of the number of

transmissions to success in eachdirection on each link on the route

Proceedto

segmentB

Page 60: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

175-7

EXHIBIT 5-6: FLOWCHART FOR SEGMENT B OF OPERATING STATISTICS MODULE

Begin

T Message Ftype is user-generatedComputati onsN Computat ions

for user's} for user'stermi nal , terminal

u~omputati ons f Computationsfrchannel from} for channel to}usr' s termi nal user's terminal/

SUser is a Fs nUser is a ksF'

Bn (i.e., 2 linksB (i.e., 2 linkson route) on route)

T TC omputations Computationsfr user's BDE ) for user's BDE

processor _j ,processor

Computat ions Computat ionsfor channel) for channel of

ofsecond l ink/ second linkJ

Computat onsh Comut ions\for FEP for FEP y

I f Computations

Sfor other DCCcomponents

Page 61: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-8

I

EXHIBIT 5-7: FLOWCHART FOR SUBROUTINE TRANSI

Compute PBCH = probability a transmissionof a character has 2 or more bits in

Serror after Hamming code or multipe.. blocking recovery

of the message received an ACK

Set FM = 1030

IPACK >In'30 F

ITSCompute FM = the expected number of '

Ctansmissions to success with no retained

message copy (RMC)

Compute SM the second moment of the

number of transmissions tosuccess wi., no RMC

RMC not usedor Reur

FM >_ 1030

(Cont inued)

Page 62: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-9

EXHIBIT 5-7: FLOWCHART FOR SUBROUTINE TRANS (Concluded)

(Conti nuati on)

Initialize: EN = 1FM =0SM = 0

•PGLEN = 0•PGLTN = 0

creompue FMbEN timesbthelprobability

frmless than or equal to EN transmi sis

of the first ACK on the ENth transmission

Increment SM by EN2 times the probabilityof the first ACK on the ENth transmission

Assign the value of PGLEN to PGLTN =the probability of ACK from less

than EN transmissions

(Increment EN by 1

TPGLEN < 0.999

F

Return

Page 63: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-10i4

EXHIBIT 5-8: FLOWCHART FOR THE PERFORMANCE MEASURE MODULE

Begi~~For the DCC components, compute and

assign values to the output array for:Expected waiting time

Expected del ayExpected queue lengthTraffic rateUtilizationCapacity

For the channels, compute and assignvalues to the output array for:

Expected waiting timeExpected delayExpected queue lengthTraffic rateUtilizationCapacity

f For the processors, compute and assign

values to the output array for:Expected waiting timeExpected delayExpected queue lengthTraffic rateUtilizationCapacity

For each user route to the DCC, computeand assign values to the otuput array for:

Expected waiting timeExpected delayTraffic rate

For each message type, compute and assign valuesto the output array for the expected waiting time.

For each message type, compute and assignvalues to the output array for:|-Expected del ayTraffic rate, ,

Page 64: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-11

EXHIBIT 5-9: FLOWCHART FOR THE OUTPUT MODULE

Begin

appropri ate So

Rank Rank Rank Rank

Routes Message Processors ChannelsTypes

Display Display for Display Display DisplayTpMessage Prfors for for DCCopnt

Rote T e Prcssr Chnnl Comonnt

Page 65: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-12

EXHIBIT 5-10: VARIABLES IN COMPUTE

NAME USE

A Temporary - Rate at which messages of type J travel toor from user I (including returns due to hierarchicalreview).

AMI Temporary - Mean time for a processing or communications

operation.

AM2 Temporary - Mean time for a processing or communicationsoperation

AM3 Temporary - Mean time for a processing or communications

operation.

B Temporary - Rate at which messages of type J arrive orleave the DCC to/from user 1.

CD (I, J) Input - channel data:CD (I, 1) = overhead time per transmission on channel ICD (I, 2) = transmission rate on channel ICD (1, 3) = fraction of time used for voice on channel ICD (1, 4) = number of links on channel I

CNAM (I) Input - name of channel I

COUT (I, J) Output - channel outputs:COUT (1, 1) = expected delay on channel ICOUT (I, 2) = expected queue length on channel ICOUT (I, 3) = traffic rate on channel ICOUT (1, 4) = utilization on channel ICOUT (1, 5) = capacity on channel ICOUT (1, 6) = rank on channel I

CS (I) Temporary - probability all lines on channel I are busy.T

C2 Temporary - pointer to channel of first link on a route.

C2 Temporary - pointer to channel of second link on a

route.

DD (I) Input - disk controller data:DD (1) = mean access time of message disk.DO (2) = mean access time of data disk.

-- Continued -- 4

Page 66: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5113

EXHIBIT 5-10: VARIABLES IN COMPUTE (Continued)

NAME USE

DOUT (I, J) Output - DCC component (except FEP) output:D (I, 1) = expected delayD (I, 2) = expectd queue lengthD (I, 3) = traffic rateD (I, 4) = utilizationD (I, 5) = capacityI = 1 => DBPI = 2 => Message Disk ControllerI = 3 => Data Disk Controller

FACT Temporary - factorial

FM Temporary - Mean number of transmissions to success inone direction on a link

FM1 Temporary - Mean number of transmissions to success in

one direction on a link

FM2 Temporary - Mean number of transmissions to success in

one direction on a link

FM3 Temporary - Mean number of transmissions to success inone direction on a link

FM4 Temporary - Mean number of transmissions to success inone direction on a link

GPD (I, J) Input - Processing time information:GPD (1, J) = TCS origination timeGPO (2, J) = TCS send timeGPD (3, J) = TCS receive timeGPD (5, J) = TCS terminate timeGPD (6, J) = FEP terminate timeGPD (7, J) = TCT terminate timeGPD (8, J) = TCT send timeGPD (9, J) = TCT receive timeGPD (10, J) = TCT terminate timeGPD (11, J) = FEP originate timeJ = 1 => per messageJ = 2 => per character

I Temporary - Counter or pointer

IA Input - Pointer to current output table

-- Continued --

Page 67: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-14

EXHIBIT 5-10: VARIABLES IN COMPUTE (Continued)

NAME USE

IB Input - Pointer to column for ranking.

IC Input - Reordering switch.

IP Temporary - Counter.

IPD (I) Input - Processor data - type of processor at node I,I => TCS, 2 => TCT.

IRMC Input - Retained Message Copy (RMC) Switch.

Ii Temporary - Pointer to message type of outputs inresponse to inputs of type I sent to the originator ofthe message of type I.

12 Temporary - Pointer to message type of outputs inresponse to inputs of type I sent to users other thanthe originator of the message of type I.

J Temporary - Counter and pointer.

JPD Temporary - Type of current processor.

K Temporary - Counter and pointer.

LARGE Temporary - 1040.

LD (I,J) Input -Link data on error ratesLD (I, 1) = Error rate on Link I for messages sent

towards the DCC.LD (I, 2) = Error rate on Link I for messages sent

towards a user.

LP (I,J) Input - Pointers to devices on links.LP (1, 1) = Processor closest to user on Link ILP (I, 2) = Channel used by Link ILP (1, 3) = Processor closest to DCC on Link I

Li Temporary - Pointer to the first link on the route froma user to the DCC.

L2 Temporary - Pointer to the second link on the route froma user to the DCC. Value zero if there is no second

link.

-- Continued --

Page 68: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-15

EXHIBIT 5-10: VARIABLES IN COMPUTE (Continued)

NAME USE

MD (I,J) Input - Message data:MD (I, 1) = Number of characters in Message Type IMD (I, 2) = DBP processing time of Message Type IMD (I, 3) = Number of message disk accesses for messages

of type IMD (I, 4) = Number of Data Disk accesses for messages

of type I

MDJI Temporary - Length of current message type

MNAM (I) Input - Message Names

MOUT (I, J) Output - Message outputs:MOUT (1, 2) = Expected delay in Message Type IMOUT (I, 2) = Traffic rate in Message Type IMOUT (1, 3) = Rank in Message Type I

MP (I,J) Input -MP (1, 1) = Message type of same-route outputs in

response to messages of type IMP (I, 2) = Message type of other-route outputs in

response to messages of type I

MS Temporary.

NBLOCK Input - Blocking number

NC Input - Number of channels

NL Input - Number of links

NM Input - Number of message types.

NN Input - Number of nodes

NO (I, J) Temporary -NO (I, 1) = Accumulator for Node I mean service timeNO (I, 2) = Node I arrival rate.

NO (I, 3) = Accumulator for Node I standard deviation ofservice time.

NONi Temporary - Utilization of a component

NP Input - Number of processors

-- Continued --

Page 69: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-16

EXHIBIT 5-10: VARIABLES IN COMPUTE (Continued)

NAME USE

NP1 Temporary - NP-i.

NR Input - Number of users.

NUM Input - Number of user input message types.

N1 Temporary - General purpose pointer.

N2 Temporary - General purpose pointer.

N3 Temporary - General purpose pointer.

N4 Temporary - General purpose pointer.

N5 Temporary - General purpose pointer.

PD (I) Input - Number of templates for screening messages at aprocessor I. (0 for TCTs).

POUT (I, J) Output - Processor outputs:POUT (1, 1) = expected delay at processor IPOUT (I, 2) = expected queue length at processor IPOUT (I, 3) = traffic rate at processor IPOUT (I, 4) = utilization at processor IPOUT (I, 5) = capacity at processor IPOUT (1, 6) = rank at processor I

RM (I, J, K) Input - Route cross message type data:RM (I, J, 1) = Initiation rate for user generated

messages, proportionality constant forTOS-generated messages.

RM (I, J, 2) Second proportionality constant for TOS-generated messages.

RM (I, J, 3) = Probability of hierarchical reviewdeletion for battalion user-generatedmessages, else zero.

RM (I, J, 4) = Probability of hierarchical reviewalteration for battalion-generatedmessages, else zero.

RMO (I, ) Temporary - Rate of each type of message at each node

RNAM (1) Input - Names of users.

-- Continued --

Page 70: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

5-17

EXHIBIT 5-10: VARIABLES IN COMPUTE (Concluded)

NAME USE

ROUT (I, J) Output - Route outputs:ROUT (I, 1) = Expected delay on route IROUT (I, 2) = Traffic rate on route IROUT (I, 3) = Rank of route I

RP (I, J) Input - Pointers to the first and second links onroute I. (Second pointer zero if no second link.)

SM Temporary - Second moment of the number of transmissionsto success on a link to the FEP.

SM1 Temporary - Second moment of the number of transmissionsto success on a link.

SM2 Temporary - Second moment of the number of transmissionsto success on a link.

SM3 Temporary - Second moment of the number of transmissionsto success on a link.

SM4 Temporary - Second moment of the number of transmissionsto success on a link.

SUM Temporary - Scratch pad.

T (I, J, K) Temporary - Times for various processing activities.

VT Temporary - Scratch pad.

VM1 Temporary - Second moment of service time.

VM2 Temporary - Second moment of service time.

VM3 Temporary - Second moment of service time.

X Temporary - Scratch pad.

Page 71: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

EXIHISIT i-!: LOG"'CAL 11/0 J111T -SS' GMMENTS

UINIT USE.

5 w rite to ocerit.-r at ter-nial

6 Read from ocerato-r at terminal.

7 Read data file.

8 W~rite out:put tables.

A

Page 72: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-1

APPENDIX A: LISTINGS OF TOS SIMULATION PACKAGE PROGRAMS

This appendix contains source listings of the programs which make up

the TOS Simulation Package. These programs are named CREATE, DISPLAY,

MODIFY, and COMPUTE. The statements within a single routine can be

referenced either by a line number or by an internal statement number.

Line numbers, shown on the left-hand side of each listing, begin with

unity for each program and continue sequentially to the end of the pro-

gram, each line being assigned a number one integer greater than its

predecessor. Internal statement numbers, appearing on the right-hand

side of each listing, begin with unit for each routine within a program.

Unlike line numbers, internal statement numbers index FORTRAN statements.

Thus, there are no internal statement numbers assigned to comment lines,

and just one integer assigned to multiline FORTRAN statements.

Page 73: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

a

'I. A-2

A 2 IN~U~ ~ ~ IN~'0-INio.1

.~,-.a~ A- - - (NININNINNININN -

2

C..V V

* I-

2 I.JI

* 1=1 V

* = I* - I C* .. C

211 =

CII 0WI. 2

* I 2

IC' C* *.I N C'SI - -

IN A* *i - A

-- or *C I . C A

* I -- .... C AI C.- ~

r --* I -u ~C C

0411 02 ..4 CrI-Il - C C

211 04 -. I(~ - -I-. 2.. .~ - 2 or

2 ....O C - -

2= IL I.4i~ oI.b~ * 2* . ci.. - 222 C *-~-. -* . ~C - .- - I-* * IL = I- 2 - I-. Cr* * .1CC. 2 ~2 =04 - II. C 2 2 C

22 2 0 -- * IN * . C -

C.J C 0-.... - - * r c -

C r..o *. .0. ~L' I. - C * I.04 = ~C.0. - 2 2 C-~N. 0. I.- .0.- -- C.

I- - 0.4 40. 2 2 C= C I-I- - .0- - .2 22 l~ C ~ C 2 ,.~ L.. i....C- - = . -. 2 -- If 2 1. .4 - 2.. 20. c.

- C ZIIL= 70. IN *-. .-. d .1.1 - IL 0- If- CC 0.... *2 - 0C N.

IL: ~

= = - . r0 = orr40 c ~ILa2;tC. 22.;. .. ,2. . -. .- u~ = C .. 2 - Oi.N.u. 1.4 ~... N.

= C-' =ce.. C C r; -. .~C.. i>...z- = e . r=. C.

.. jC 1 II- CCK~J 'C2 C = -C..; 2...tr.....CC..2N. C r r CC *C * C ~ £0- S.. Ott- CC .~.2 C C

I .~ 1.. - C 2202.. SN C 2.. 0 -0- =2II'2.4~. C *0--' 2 .. I .;.~ i.4 200

C. L~ C N = 2. C .... i~ 0.. 0 .2 0.-~= C U -* to" *.201.hI - C.. S.ZorLr..C.L

* - = *E...U .d ~CC LI - -- I0L2 . 00C - C 0. C 2 N~I- C. -- C. -c S-IN C 22 -o -

It CL~ rot * C 0.. - It C 2 2.. C.-CL.-* C -C 2 0- Ii.If.022N. C *~2I40 - 1.; I-IN -. C2or.or. * 20- C C C~IN~C. I. -~ C C .2IItO -- 2

Vz ~:~Ci ~ ~ ~ ~ ~IIIi 4t-E:.=I0-C: N.2 CC *2C.. 0-~.2O C o2 0-IL I-Cl.; 0.--~

* * 0.2C. 22 C 220G. 1.; C - C.'~ 040 - IN CC * 24 0.12 ILS - S.

* * =* 0. .0- rC

222CC - ~CU~0.. 22 L.L 2

or~C2e~INcorItrC.CN.L, CC0-'N2o, :CCN.ItACCCINI.s.dILN1INNININ N~ = 8 CIfIfIPIt ItIf

Page 74: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A ~g S N *440 4 @0;N a:; 2h44M 0.NWIOF OO N IMfl A

a, 0 r n6100V 0I o

VAV

V I A

I4

* =4'

al4 3r wc424e

c4 =

4 4 A

In.,

1. 04 4d U

-r -e - C a-

I CC.C C2r -c 10 a-0I 0 ef - r t rG .

Page 75: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-4

4r.,

W c

Ll L.

or, CL r r

It. 9 c

9 9 C

O 0 A9.9 C

Page 76: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

I i .. .. - . . . _ _ . . . . . --n , -, .. . . - - . . . . .. . . . . .F. . . . .. r . . . . . -.. . - - • r --

A-5

C a

I I

I I

* VM

V V

Page 77: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

1:I

A S ~* U~ i~i. ~O-NisW U, s~P S~C N~aii ~ ~~ON 1wUi ~ p-a AU,

- - 5.4

V17I

a''U,

5th

gags 'I

II V

ga

* =15 =* ~Js I I!,=ti C I

5.45I iS

* S I ='Ci

Aa505 - A

* I a -50 a -

* '-4,05 0.

1*415 - -if it

Cli *4Cii = .-

* .a I, - 0- .- - it*4 if - 0

C- = . is. s~ isa

- r U' C Li Sra a - - is-.

C -~ * aC C .. S.. Sr0 .2 a., - a C

is. r* *r - C

* - a - .- -5, .--. S

* C -- -~ 4)0 C. ~C Sr 5-.C N - S~ is~ *a to . . . isa a* C .~- ..-. ais NU t C. - - -- ,-.~.S 2 Sr Na .. -- N

* C a .is~a ~. . . .2. 0 C~ =.- isa Sr 05.4 - ~- I-. ~ 1 C N

- isa C .J is. )41 ** N C C- = - C4.CC hi - N -Li C 0 0 *sa I * .0 *~*. U - -a ~ Li Va 5- '5. 55 -- - ~N aba vi t- eLi *iJW -

= C' *.CU C - - is. 0 - - hi C =2 = ~ .sCis4hi C . .- .~.Z 2 ~ 542 a C 2 U*4 ... Sr 0 000iiSr *404 - --0.a5.4 -

-- - .- COa~ be C. .~ *N*4 ro a a -

s a - ~t... v 0 2 *C55 is. C C . *4 0 i' -C *~~2 ~=.hO4 0 .b4t'..i.ZCi~ . . a is.* - - -St =CCC= p. . -cc.C-= a o Li C

Li - a if2I5Li4..2 C. 2~ Sisi.J .is- 2z -= C -C *5 - - a a eta ga . $ a I N- *. ~iS N 5. - . -- ~fr...... - iii p. * C N

p. 0 - a is. = C. - S.. - C * C -a Na = t- c e C e~ is C.0.C - Cr5.0. C C 2 N

... a - a ~ C a Sc.. u~ .-. 3s... ac. at a aa. .5- £..- - C - - = S. a - - = r-5- 5.. N 5. 5. N 5- * ?$ N 5.- p.~ - N= a a . 2 a IC C C CC- C at C C Cc.2 a C

- = Li- C a.. c. ~,aa - (.5

C Sr C Sr C. 5- Cit S. CN N - U.if C C -C% N N N i'J N faN N P. N

ULi. Li U Li ULiLi Li L..sLLis .c Li LiULi Li

Aif

SC 0 0 * 0 C C C C C it Sr Sr is- it it if if 4 it 4 .4 5 C C C C if C it C C 0 C 0' 0' 0' 0' 0' *4C ~$i%.sl$NNi'.Nrs'.iViNi~.NsNNI...NrN4NjNgNr,.'NNNr.r.NiNs..rNNr.NNiNc$NNNNNr.NN...s,~NP.i~NNN 55C aC. a.V V

Page 78: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 7

C =

°..

t "2ILi

=*

:1 .1 i

Page 79: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

1,

A 2 '4 9-2U~C @1 0~ N'92 U'9 ~0' N ~21I~ 29~09O~ N 92In .01'. A-. UI N rNNNNN NN '~ I~ ~ -'22 a so a'anru, 9' c.flu' .,g9 ~

- N NNrIN9N INN INN NININ N NINNINNIN N NININ 'NN9NNNN N NNN NI'.91: 202 20. 0.V V

9299=9

'.9 1~I 'I

9 9 V1=9 V9(I~9 V

9=9

* =99 =I 91'I~ C,9 =9 99 CI 99 U9 9 0.

* 9 29 0 9* 9 C9 2

1.-I A9 9 A

909 A9=9 *999 A

* I 19' 9909III =

* NI I'. 2909 VI '.9 =I (MI I99-99 91. -9299 0 N 9- - 9.

- N C,

2 . -r * 2

2 0= I~ 9-* I'

91. = C. =~

02 9- 22 0

V C,V 2 1900

-0

.~e-0. 99' I.9.)

- * 9.. 2 V.-C,1l 1. 0MWI' CC, - =

e ~-*~ 2. C 2 C N.* V .222 = Ia CC N.* 2 ON. .M 0200 N.

9-9- - C: 22.2 .1. 0 2= S.

.1. N. .2 199 CM C, 19 2 N.0- .. - 2... .2 - 2.

- - -. - CC, - C. CO V C. C - C bJ* 9- . 0 .. 2 III 0 .. 2 2 - 2 9-

2 2119. - 2 1. V.2.2 - 9. 22 - . C, = 2* s.z .a.- -- r. .~=. 9 * 2 t~ 2 ~

C: 91. 0 -

2229- 0. 0 IO..2 .9. 2 9- MO= .. C: 20M.~ 9- 92 2'9J' 0 I'. 220219 0 0 19 CC, V

= 2 (~!N. C =fl9A1 .10 - 019J = -

-- . 9/ = 2 - - - = - U C,. C. CC 2 91. 2~ U 0 = 2 1- - - -

-- 9- 0 2291. 0. 2. * *.2'.. I C .0 . -IC .9.'9.. N - * .0 2 99291 *0 V = - It 2

C OZOIICI 2 . -- 2 9- 2 2 t- 2- 0 9-S~2 i. C, - 9-22 2 .M - N.

- CMC 2 990.2 9..~0 C: 0. I' 22 190 04. 4. S.2 *..222 2 * 9-2.M'C: * 9,2.~0 2 2 2 * 9- 5,

0 - 2 19.0 * IC~2IM 0. I~ 2 99' 9. 2 19... S. 9/. 2 2(1. -- S.2291.0 02 2 - 1142 IC C 0291,C 0 0 09.0 0022 0 CC 2 99 2 N

I.J~~= 4~0. 9- 4.20. = 0. LI2IL1J... 2 9- W.~ ~ 2 2 2 02- - - 2 2 - -. 1 C - - 2 0

9- -. 9- 9-I * 9-2 ~ - 2 9- 9-9~ - 9- -0 2 = .-. X .-.. I~ - 2 =

091. 0- C U U 22 09.19.. 9.. 0 U 00- 9-

a

Page 80: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

I.A- 9

* A a - N~2It ~OfCO~ O~4~ ~3~~O'O - N l2It.Ol~ ~ ~ A

L'~ L"tt'O 3 CC~CIt O.3tC ~I ~ = 2 4.UI C2~Q'0O'CO' O~0~' 2

- e-.gre ~ ~e.ro -,.r.r.IN l-.r.ININ N NeoN N N NNNNN NNINNNNIN NNN

C a

V

'1.-I

* = Ilug

* -Il~lI

V

II?.?

VC

* -C

01 I 0

=,l

2

I OIl

'CII

C

I A

I I A

*1 A

CI A

1=1 a = A

*11 IS

It', = -~

log - - I--

NI C * 2

* I leg CrC ~2 ~2

WI Il~4l U.

gall C = Ca

* CII ~ -.I It 1 1 C

C CO .-. ~

C- C - N- Cr2 -C

a a - e1. fr- 2 C-- OW IU CC 0*C

CSE- C I.cI.: FC.r.a.-. Cr

C *. vi*

I.. C

a a r ~ 2

- u- -aaC C~ - - C

C *~C lNL~C-~ l.~ ~ * Cr * C - -

C * 2C U.* -~ ~r

-e - =

it

2- = -r N

-- 0. a ~I.= j. =*== = - C l~*C *' -

.- I0. I- o-~ CCC = It I.~ I/l -a - N

uI * C C 2 iS C ~ 0 N

2 - C 11C 1.cE Z It - U. - - C-.

a.- c: ..-- r .1-c. IC 2Cr - C N * - 0- C

~-.r V. CC- .CCW- *C ..J - C. -. - C C U.

C**C C = .. CZM*, OW C.* a *. C C

CC ~via ~I-a a t- 20. C *I/C t Si C . C

C LI C~ 0.t~.Cr~ I- 2 - 0.. - - - a- a - 2 =

U. C 1-2 2 03 CrC-U. ~I C C -- It a.C - C -. - 2

LItO atitIf~If C ~urI 1 rI I-. 0VI~ It CrC

C ~NCCCN . IL C 22It00 0. CCC - a . 2CC

U CC~ ALJO C U. -aL~ r 2' C U. = - -

- - aa~ -- twa a - *aI I C C 5 0 - -

b.C V U.It~Wl. * It - ICIL C .It0 .. L~ - . alIt 11-

IL ~ ~ 11- * - ~ 0. 1N C * CrC It * 1 -

1-U. C C- lI-LI It I-CO l~ ~. - C-lI- C C1-.~ N

a - C a as - 2 200 a l~ Wa a 2 I' - N

C-i- It. C -- 1--C ~ *a IIC-. C a I-r~ -- * 'in- N

=~-.- L - - V. - -. u C I'- ~a=& U.It~C*.U. C - - N

CaC * C aazC caa C CC C C0.0.r C = = 2CC? CC SCIt ~ N

C * UU~ .. ,g, I- ~S C~2.ctS a u 221,5 CM I- .525 v-S

- WZr 0- - C, - -

C- -~'I It l~ in- - C- 1-fr-T aI~I C

2 2 2 2 2 *~t~cZ

C C~C C C C C C C CCC~tC~ CC~S C U C U C

It 0 1.' 0 C C It C It C I. C

It it It C 0 C ~ C C -

--

- I. -

I-

CCC ULU U C CCC U -

0-CC OClNCrc~CCOICu~.a CC~NCC.~~VCItONCIt1C C f'CN CCC-

WI

- ~2 ~

====CCCCCCCCCCCCCC#C ICC CC*CC#*C2CC C

a a0.

V

*4~

Page 81: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

. dai

I A-i 0

V V

I v

I I V..

- r- I,,=,

I- 2..I C..

,I = . . g =I .

,I.. CI= . -I

* CI.I

I 311 , =... =I. . .. . . 3..t : = . i g-

*. ,I,

2 0,

2=2 C9 0 C

Page 82: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-i

-A-I

V v

I,

I Vd

*

CI -

-I - - - .

C. ..

* .I.

*9.1P

-r . .. . . . . . . . . . . . . ._ . . . c c . . .. . . II I III . . . . .. . . . .

Page 83: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-i4

-A-1

I.:

* I

" S. ... I, C

. .. .. _-- II = , =.,-*.- -" .. ..-. "" r

vI

It, -

Page 84: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-1 3

.€ ,3

k 0

olI

6r I

- D

k- r- td-

It C91 00 1 .

- .. 1 -~ - =

,g= .

Page 85: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-i 4

A ~ 0~ 0 ~4'4a44~ f ~O~0-Na~ ~r. C7O- N~C .J~O7 CaO .N4~ a A-, u, - -- ' * ~aaaar a a~C~4flL4444y~ .tu.~ 44U4~ .. 4C~Q .09340 3.3'. f'.94. I"' -- - a an **aaaa a aaaaaaaa aa aaaa ana arC ara 0aa a -

C.V V

I 4-4* C

4U4

4~ I

-4 4

VI V

4 VI=4

9 C4=44 =

I =4,14 =04

4 =*4 - - C

*4 - 4,~ .4-I ~ ~- . - C 4-.4 - 0 C - 4- C A

* C C C C C Aa 4 4r 0 - . - .a -III 0 U 0 C C. AI .t'i = da - r U C 2

CI 0 4.'~ 22.-. '4. 4~.. 4...... I.a~.III U - 0- 44~* ~ 4-* 4-*4 N~ - - -. - -

04 -. - 0" 00 04, 00 00* '.4 - - e-~ -~ ~LII N - C 0 = 0 0 0* C..

4 4 L~4,2 ICC V'IC 4,te d~4,2

Cl 4 C UC UC ~044 E - 4-~ k~ 4' 4-C 4-C

= Ic Cl, c~ cit ci,= - r C = 22 a =- 4-Ic 4.44 4-Ic 4-0 4-ha

C 4- Ca CO C= CO CC = = 0 C C

-- I-. V CC... 02,... CC. o.. Zr....- 4,4 = N = N C N C N 72 N

4, ON - ON * UN * ON * ON.C . IC .2 4..~- .2N L4 U Q@

* 4,4 - C - C - 4,4 - t - -4, - * v~ .0 V.0 V.0 4, .0 4, .0C C - -CC. =2t 4..C.C. -CC. 1-CC.0 *0 * - 4.2 .~c0 .. asa0 .Ic0 ~ .. ~..0-4~ .- 4-* -4-. -4- -1-'-'U * -U ....U .U -'U-- 4,2 &C.. CC. &C La.. CC.. NI ~ j%~f~: :~i§

r I... . ~ IC, C- z.-- ao. 20- 0- Ca- 4,0. 4, -- = - 44.4,. 44. .1411

C .. F- .. 4-. .... 4-C *....4-C .. 4-.W~ * *....1-C * C- 0CL'IIC CC = Ul'0Z u'4CC ~C U*

0LC~ *C~.=--4L=~--=-4.C N4 0 9'. - 41W 0 * C ~''0 .. 0C CCC .. 0C S.C N22 . 44 I- * .. C .. .. C.CS. ... C.C .. CC.. C. ~444 U - - C CI * I.' OCIICLIJ U, C-. U. *C~ w.C- 3~.-------N* - - - - - * - 0 - - a- ~ a..C N

~ CL.. - ~ fl 4. U. r 4-P.r-------------t-. a. a s..,- dC -- - U.C LC U.C &C IC 0 -4- ~ I- C-.4-F.... C 4"4-C .4-C .JtC .44C ... 4-4- 93-I C 72 = ~ ~ ... ~ *...~

O CC 0 ,OCOCb CO CCCO CCC C2~ CCC CCC "~b. fl. CI. LI.. UC4,. Un..' UC 4,. UO.~ 04! 0 4, 0 C C C C 4, 0 4, ~'C - a ~. 72 C - - N N4! 4. 4, 4." t a a C ,. ~ IC

UU4.. U U ... UUUUU UUL..I

A A

~72C9 '

4C4!C~7ZNe4,Cr'rON*&-CaxCC-.N~e.z CCCC~N4

.-. CCC0-NrC,-ee~~occ~e--------*.N4N4'.~ \%IN------aaar4,u.4.r4, C.0.~ar' r'''r-r ~9'rf'-rr.rr4'.r.r- r-~r. r-r--,-r-r.r. 0

C.. C.4, V

I

Page 86: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-15

m n% r c e 0 N %C3 C0; N-g ol~w 0 N I.U 10 CI 0 N3 A= L 3rr- 3- - o' C0C 0 ,C 030 00 0 0 00 0-t a,, ~ n =a a a~ 1r fi tru mu' L n ~ ~ . u w

Vi V

Z~ I cc

3 03

3=3 0 0

3~I II3

3r ' 0 It

3.. cc cc -. ww

Page 87: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-i16

If,~ 9lf nL- o I

Vm W

I-c u

1231

I Vr

I I.

I 0r

YE' eI '

L: mw w c2,wc

Page 88: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-1 7

C. CI :

- ="

I0 Q

1=1 0 0Ua

w mCmC A-C c, vrm raco a

Page 89: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-i18

~a 91 ~ 0 KP 0a 00 0 -~9

VI a

242

9 9t9 AI

.. 4

06

C269 9 .IC C ' C L X 0 a aC

C6C

Page 90: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 19

C CC

C. taV Vr

6. L)

I l4-cr

u w6,W

rI r C,

'0ir

- -C, I14 1z !E 2 ! -

Page 91: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-20

A 2 Naaja aaa- 2ec- aN., a~ .Oa-22 0...Na- w~r~Oa-. 2@aO - Aa ~a a-a-fl~a-. a-,p- -a--22 22 22 2222 aaaa~ 'aQ OaO~0 0 a

a~aO ~ .a'aO aC.C a~aCaa'aC ~.OOa .~.OaC .Caa- a -

a: C-C Ca'.

'I V

a a

a-aI - I121

-, a-a,

* -'-a, V* I V

I V

-a ra .. l Cc-a a a

alaa-a' =* ~a a

a. * -a... C

* a, - a-a' * Na a - - A* -a Aa - *21 C C 2 A

a a - 2 U Aa~.l

Ca -

NI - - -CI a'. C) -

-. C - - -ic-Ia 2 2 - - -

2 C Call 2

I CIa -j a I -. -

~ C - C - -

* I-. - -

- 2 C C

I- a'- a U

I'- a~ 2 - - -= C) - - . -I-.- = = - 0* -= I- C 1.1 - C. - -at

a' a .~ C at C 0.- C. 2 - I~- - C* 2 2 . C-. Ia' 2 * - - N = N

- a 2 - ~ -. ~ Ca- U Ia- - -'a- - a'. -- C .- - -. a - NI-. C C...C C 2 2 2 - a r~' v. - .- N 2 N C- I-,)- - -. 2 a- ca' I- - - - 14

2 2 2 a - - IC - - = * a- C 6-.~ a a-- U a-at(., a t~ ax a- ~)) a- C -. - Ca- a S - ~ a a- C - - - 1--a- -

- a' a - = 2 1 2 2 -- -.1/I a- j-C C 0N C 2 C- C - a 2CC

- .. ~ 2 0 C 2C C ~ Ia' LN -~ .. a- 2 C. x 2 * a' SOC * 1.. .O * a- 20 * 20 4S - =- S C..- - s-- C. c~2 C ~C2 z - -x - a' 0. -

a'- - U- ~ - C - - -C a - -a- a - *a- 2 ~U - * -- - a. . N .. ~%; -- .*,~* C .- N I- N - a'-

C Ca'-L'. .--------- -- - - a - - . -C. ~iC -. a- a a-a- a' a a- a a- C a - C.-C. *. NC.~ a'- O-e -, as-C a -C C 22 a" a'C .,C C S. 0.*.a * - ,-r a'~ .- a.-xs 2 -~2 - -a--2 a 1-1-2 - .* N- C ~ c N ~xc- a V. x~a a r a2.c- 2 CS... = -CC * - It... -. C CCC a' aa-S-CCC C Ia- c-CC - VCCC C ~- a'~- C a-c-. - a- C. usc-C. 2 O.aa2 a-aLa - .a~c-a S. c-a-a IA

* Ma I~ MC 2 - C - C - C - Ca' - a Cm-r- 1-2 5 i- - I- - t- - a- - a- -2 -

C C C U C U C

a-A A

a

Page 92: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-21

C v

Iv* 1~ v

* , ^

I V

22

* log =

iio It'l

Page 93: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

II

A 2 - N1whn~C~ero A- A-' -N

CC

C

V

Ia.'424

I 4.'* .12' 4

V-44

4.'I 044

* =4

UCI

U=44

-4 24 44 t4I* £24 4

C404 CI

40. =It4 4 A1 A404 ACI Ia3 A444 A4 I

404 - 24 44 -IN: = CAol --

C**4 4-1.1 'C4 I4a~i InC.F-"? I.,-CII 4-1- =0(4 C.

I 4 -

N -

- aIt CU a

CC F- r'C - C

* La.* 2 U. =* == :~I -* l- 1- U.

N* F-.ItIal LAJO NN U N- 22 0

NF- 0 £1..- U r1- -r.11 .1 g 1.1.12 ~r C- -S. - - ItO 2C '. N Ita 4- -- It-

= 4- - 4-F- a t~ UUIt I/I

1- rr-.*1- a I-It= 0 - . CC.

S.= U a.- 00~mr- - I'- U. 1- -

NU - 1 a . - £44t a t-. -. NO - aala.cfl.e N* Z = 4- at C. C. a

* 1r 0=a-aC C-rr.C L

C I-az '-21 C.= 2CL.z0co

o a.-

UUI.I..I.t. LA

A~

aa 'A~

U AC.

C.V V

Page 94: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

I.

A = - r~'-~ ~U~f~2 0%OSN~

N -

In

S.

e

-V

S ISJ I

V

5=I

S-'

1L5

v

* .. I

V

tS~IS

V

* *5-5 g

2

S

Cs

I S

2

S~S

LI

I..,

=

=5

S2S~

CS

SCSI

2

S

2

c-S

CAl

* I

A

S

*

- I

A

.1 2

5~5

2

A

Sc-S -

St 5 =2

555 ==

CSS.., .. SSn

Sn.,

lt~lS 2- 2

I F-

5552 = c-= 2 - Sc

2.~ 2

55-5- .- F- =

5-2 0 -~5.

* CS '5-

~ c 2~ -'

ASS. C -

2 - 2 -J

- =~ 5-

- LIZC Cs

A 4 02

- - A -C

= 0 LI -

5- - -Sc ... 2 S.'

25- - = 2 * 2== S., IS- *

2 2. SN c -~

- s--c *. 2 5.'

-- - =Sc 2?- sc~CO=0 j.. = ~...C .nS.r -

- CA S-a..a.2 5-2~ .- " -C CsF- - F- 5-VJt~ = .. ~

h-C C C 2C202

- to

SLSLSLS LI LI LI

A

SN ~ CCS

Cc *=~=S.(. ~

2

C-

Page 95: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-24

* " V

*° I

°° I

o t-II a

-I I-

I A

a A €

I

Page 96: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-25

v

=2 -

-- C

, . -

0 0

V =

= C=; -

Page 97: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- IV

A-26

A M,n U,

10,,

4I

12 CIIV IC

I C4

0 rI IL

1=1 6

I~tIF

161

Page 98: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 27

A M - ID U O il4N @.M V4. 41n Ui VIN m 4C 4NP

V4 f-4

2Va

46 b;9I Im

tr wu ngo4L na

=I-4,

g L

I -C

v - a - Ow - -a : 6.W.l s

*U..

U.0 cc .1If ZIP-

16 vu W l

*C -C '

101 M V.wa

InIf' o tI.ft 1 . :. e .=

L f 06; 5L . e -

If1 SL 0 4 *I-. MAd P

* -. - .U- *ItU*c 6. a .m '

04r C. 0 v& 0 Nr W N.0C or, 0 -VN.C le.W-Xg fg g g '. * W.UUCcv

C6 -I -J - -0 - -- - N ----

1 4 1 1 ~ ~ ' .*

Page 99: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

!I A-28

r4 Mdi

,.

It

qp •

.. -w . ,w o, 9 , 6 ,..-

..... _ -. =6,14. . .: . ..-. .:.. I,..

= - ==.. = = ,,,=:: €.. = ,,.eZ

!.9:- .-- g -+ 1 .9.-"- . 1, - 4 t" . ..g+- g+++ - ; + a .,,+ ., + co-+,,,: ::-...- •

a ay=.

Page 100: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-29

a 10

*I

I Ic

N I

" e:

b44.MP-

I ~.

60l -1.

96C .. C. colit- - "-c = d

E..~2 S 0 0 ,

S-l -- - N A

fS' @ .al CL V.. q APS .&~j %At c J

c 6. *- - - - - - - - - - - - - - - - - -ta0 G0 * 4

*~~a o E S.4 4 4 -4- sQIN .0 IL M w -

101 a.S . 0 . . :

0h.~t. a.. 0 .04' W -- - - - - - --

1.-* Ir WP.El 0 . - 1* ~ ~ ~ ~ ~ ~ P Ncoo4.. 0' 4

do ------------- -- 3 S4- * f - -- --- ------* . f J 6C C *-

4. 0 1 . 5 * 5E * L

Page 101: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-30

10 U, 11 m %m %D 0. A0N N N N

-41 3

I : I4r I aQ WC

VC I.

I-I

I-I4

t, M

1f04

IC, - -

10 l. 01 I

-N a N u- s t 41cr-Iz . :c : 4Na w c 0 N w

A.t -0 ra

1411~. -1 U,44

I ~ C 16 0A* & C b. b 4 ~ C a .3

31~~1. 31 -,r^i . -

a-c-s - - .0 U - ' a --~ ~~~~~ vM* I 3 - N C ~ 40~~r Im.*a- ~

-~4d ZN~J U ~ LU ' = V

j- ."am= 0 CC64 U

.U M.a v Nl *-k UU I . , II-aw~4 f%:. . a* v i o L

a~~A a .r V. No 4N wA 4 N ~ai aM M 31 ar AV N U 4 AU, A a a ; ;1 W. a,

-- -- - -- - ------= .0 sA =-- -

Page 102: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-31

am I

4 4n

I.C.VI V

ac 0'T*

9 I6

* IL

'or,

Caas949P

aw ow 4aI

ICI V wIJr I V

.ifir

C IV a an -

amI f.; - : I . --

.)a & 1. m0 v

vc ir. ba ID-

f.;9 wN 60 40 w-A

112P. -% 0i * .

01 le4il I e w F F .pP Nrsrr r . a a ea

0 aa I

a -N. - - -

Page 103: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-32

-1461 1!

Ic I

'4,V

IL Z10 V191a~sa -

L. cc 3

WOO N.4a Ina -

a-II

*0. ;. A 0 i

a a- ar anV.- - W A

P.a 0. 4 0- 0- t-aIL, 12 M" h 4 I

ac C Lc0 0 La..

alfm f.a4I 00 -. tou U61wL

6- a;,Z -ZE au-oct :a -;-Mr-r.~. = a;we e

46 16..a~afr.3~ -

Page 104: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

..q

A- 33

- N( IN N NINN5NN. N m# INN N "NN 14 "fNNCN NtMN IN INN NNN f

I

I 6

II"IIl-9

Ir -.ol ml!.

5. -2 .1

VW' N 0; cA

lk N aSI

A...

C4 I, IN f- fF

a It-~~ ~ ~ -N

96 = L

Page 105: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

SA- 34

A U l~lat~@ 1 8

4vw

o I* II II I

I1 I* I

I- I

I 41

I-I

IU

Page 106: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-35

a I

1 V

c C;

a r4

-a9

9 a.a

q Ir I.9

9=9 VVQ0*Z .0f V

W, 3r,

;.4 2 0- ar-14C9t

*0 c 29iUS c

e Ap

*Q 91' V, P 0 V4 -r

909 AIf Cce

Page 107: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-36

F-@f9 i C M U I cc ma OD 00 C49O. W0 F' U ' Acaa2 iun6 MM

2 49

IO ItI

* I

*; C

I-..Ir V, Ir

I C , r

v0 1

I -d ig

Page 108: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-37

wI Q~ a0 I= ar- cc ww w C co222 2 0' O 0'%0''' m

t. tr..

* V V

I3 wCA - ,Cm

Z a;-I 6 C LWvC

II Ic

c I- V

L - O4 m

W . re

244CL

I- - -- - -2 b

42 q * 2

Page 109: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 38

x C N~N 1 .r% 0 C4 InNC J.1 0- O0N ! e

C~Ic ft K000 CCN N 2211

ICM

IC'C

I- tm 2 -I LrI -

tr -Ir b11"-,0k

- -I

-at-* CI I

CA a II

I ZII

C, Ar Ir V10.

Page 110: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 39

a i In 'a coriwe c 0- 4 I" InW~ 40 A

IV

2

*14 a.

I Ni~

"I LL:

I* c I- 'v

at.

u r4 a P. A - 6

I I i r Q .w -b k--.

- e~~~~ w o o .~ w o c, - a a. -a

I N I IC it t-~ b- v - . . -. ao,1 M2. m t - a. m

at- ~ ~ ~ N 2C a

f4 % 4 N 11CUI.J e C %f241 PW... N 0 I0 IC W CItC. i U ~ ~ ~ rI p q M .2 ~ U 2-

Page 111: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-40

A 2 06 N9W ,~U'2 0I~~U' 0 0;mflUo 10 U'200NU'*U"C r A

t-

Vv V

* IIC

Jz r

L: :rI

62,,

* IVV

ItI WV C V Z

I1 C4*a I .;

v k. Sr

NI w. It -.vc rI wC0 N f4A 2A a

1*1 It

Page 112: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-41

go-: N U-aP

14 C4 14 Nf N O4MC tNmC 4N f~ylm "I4f NIA.0

ahqa.

Is A

C7 A

f4 6I 4- 4

4644.It

*ba e4

It C I

IbIT

4a r

41, iV

4A.4 A

A -IA AP-* a-, 1;44.444164 4

Page 113: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-42

A U *4~WV,.*fO O-NMeu~,e,.mg.e Aa. UI wwwwweww ~- N NI~4N NNN

4N ~4~'~NN f4 NNf'4 NIN

26

V V

* II I* I

I I* I

.4,

* - I

IC.

.11 I* -g I* a",.

VI S V0 I V* = I* L~ I V121

I - I

=2IC',,

lUll 0* 211'U..

2I I - UID. - 4* .. I - U.

UDI a C.A* a. -AB U

121 . 2 AIII AIUI U S

101 4 8III 2 4INI 2101 NtC",I -Is-Il - -I~I - alOll - 0 -I - 4

C *-~ S -

- Pt -o * N8 - N 2a - a.- a U

- U- U'C. C. C.s- ..3 -

B 2 2 -2 4 2 -

= 2 S- a. a -.a ~

* 4 * S.4 - -'SIII C. - a C -N - 2 -

2 - = 0 I~ 44 4 -IC *Ua 0 2 2~ inC~W I. S

U S 40 .*.. 0 - UW ~S 0~ * ~ IJO

- 282 *S - CU.. ~ a- -

o -- .C U...W2 Ba. s- CD -. a 'SUW .1I. .. II.1a.4 aWn a. * 'SI.. a. 2t22 - 1 'S2 *4 if - B. 22 SU -, a.~3UC0LU 3U~ 'S~ ~2Ca.in.a.2U I.U U I~y~* ~S. VIS I..2I a 44

* - 0 2 - 2-8.3008.S~I.0 062C CUCCE

1.1-20 Uba aIt CU. C

Ne..* aD a aD

p2 3k O~L~ NNN"IINNN a:DDNDWWDDU8DDDWWDDWWWD

44a. a.V V

0

Page 114: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-43

al

laa

V a .Vt

a Ac

aameto

'Kg.

a. ak' ta3

4; immi CL t

ftmaeocc .V

r a:5 asc -ILWIL i 6weIV

a. .. &. a a Z

- a

Page 115: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- *

A-44

LI~ ~,wqu*ew*wwwuu, II

~@NlIfl'ONe~O N ~

.4-

V Sa

Ua

a.VV

* I~ 1 4

~, I* :.,II

* II ~

a

2* I

A* I *.I

A01

A121

AII

AI I.01III* NI

CI

I C..'( I1.-I I

I a,,* Op I

a S.

2 If 2 S.

- .. a a S.- -o S.

- .0 *e ~i' S.I- ~#- =~- =

g ~O S~

a.a.~

-4a ~* ~ -0

*~ .b~ ~

22 .2 .2 . -a. a.

* U, * U: I Ifl.~ 0 .0 U

-a. .b *b. *b~ ~

a.* I,'~ I If I I.~, I Ua ~a -- ~ a. -

S.* 0b~@~JinRIC~S a. U

S.*SUa.U~UIIUEUb a ,- a~

55W~. .m.a. *I3~ .33 a. - .

S.~pCWU1a3I,§,tuL~ 2 2 I~

.5*. ~aa S -* a. U . U a. C SI. .J ~S

hasa. a&UbqgUb. = al-u~2ULJ~l~ 3 I. UV~S

a e a- 0 Il

L...J ~j

A

A

N0N 2 g C a~N ~ 11 ~ 2 C

a

aa

aV

V

Page 116: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-45

* ~ ~~~~ -r InNNN I N' uiiIW W

a ILCrU

* Ic

tr. 45C

I; for m

t'Z2=111 I. " :

AL I~ a ,1

gze C. r-a

*z 21. 2 -

16 ic -C CS

C WI z" a .61 11 IC* C.. i

121 wP V- -46 A 6IL

r A z- 3 I

fNI4 m P a %raF

Irv 0 e4 e.0f-c 0 em A .I ~ ~ o I *r-- .- i

WI ame cc CC~~t vr vJL-

Page 117: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-460

4 4

V V

II 0I -,* ^

ICt

1.41 V

Page 118: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-47

C I C

V! V

I I

* o I* "I!

IC,

ire Vef/.u

* .Iv

' V

Page 119: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-48

=II

N' 9i W p w q o A

C.bV

EV

Ia c

to I

* I

* NI

219

IWIt

- I A

093t

M & A

90" -'' ' 2 -

42

Page 120: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-49

V V

1 A

w IA

L II ga

tr %C

*1* 6

~J. I

2o°

Page 121: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-50 I

cr. co-

MV W

w C=

v mIa Ir

ICE C ,A - t-.

al Ir -

e* W. m .Cvf.coa

r- I- r A-

lrll N fl ll '

Page 122: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- ( A-51

A 2 2~049~~U"C9'CO90 ~N~2~2O0 ~WU' A

2* 1:C C

a.V

* I

I II 9

* 9 9

*I~9-9

121909

29

V9299 V* 9~99 V

V

* I 2* '=9 0'.

* ~ I -101

I =* '.99299 bI

211 2I 299 -

~I9 9-9 *.~9 9I I C* 9 2N 9 2929

U'9299 9 A

A09 A* 929 A

99 A9U'9 IC101'19 2949 I..101I **9 2 -'299 '2

* C. -CII .J 'COIl C -

9 9 C 294 C N.4 2

-- 2 94'C N

-~ - 2 -

CS. - 2.3. - 94 -

* . C N94 .4 -

2 -2 94

EN 2 2CC - - 94 C

* - 2 0* N 22 92 - N 2 0

.5- - N N 0~ 'N-- U. .0 - - -'

-w 9- -J . - -c94 - 0 .9- N9- -- 2 2 5. - 2C N C N - 942N . - 94 2 -

.. JU. 9 2 C 2 -- SJ - N 12 * 2. 34

* .I.. - 2 - CC 0940 -- C 94 C - C

-. 0 C. - C0 =94 t- U' 2 94 9 C .. 2CZ C? C - - C~N I. C IrI

* ~2 * 192 *~IN C* - *222 .2 2 .2 5-2.0 * .2 *9C ~Z U'.C .2 * C.! '~' *94N * 0! N ~ -~ NCOO 94294 2! 23494 *!2 . 0342 'N,

trW * 0.9~ '2W 09,, -- U 945- 'N.* *----0 .94 *.. N *SU. .94 thi - NS.C * 'C~2I..NZ-9, 9411'C *'C 92lC~~ '(20' N9- OC.I'.rZ *C -99992L,2-~ ~

C94-&C.IN.CW94CC S. Cm222949- .U9- 29-9-9-9-9..gr 9-..2

9111 94=2-94192 2..C9999922 9-~ *-Cb-~~C2C0I. 2~0'C5-I/~22C05-2CV2CC 2945-532

~ 25 I.49423421J23 5. 5lJC.59- S

S Uw C24. CC 'C 2 0-- 99 ~9I~ N

9-

A'C N 0' 0' C - N ~2 U' ~ 9 20' 0 - !~. 94 0' U C N 2 0' 2 IN 9 0' IP ~. N 0'

IN N N IN IN N N N IN IN N (N N IN N N N N N N N IN IN 9'. N N N N N C

Ca.V

Page 123: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-52

,, I

I I

I I

ig -

I-.. V

i-

* ~-.,* I ,

I _

I I"1

Page 124: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-53

tBa

VC V

ICI'

-IM V::.:0 I

V7-a7 .C

dCl V C

6d WU a CM.

*~N 0= ~

hi.a I*" al U

Page 125: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 54

t~44

C-S

Vt N

-It

logeI,0I

a;. a. c-I

a c=1 ttf 3vc N w r P-f t -0 Nm t Lf

Page 126: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 55

V Vc

-. 1I

I El

'UOxIUA*2~A

1; A

I %CV

t: I-

Eli C

V. w1 .A

C~l C A

IR C CI C ' 0 ;7 1-

-1 3L -0' 4

I .- m w e'21 A. c t2 A

r- It a. r 2 IC AM A L .

g2 C2 0 0.f(IW VI vC.VL W. t. w C. -N .A

P a It CC a/ A 0 If ItC

Page 127: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 56

* a

wk I

i-

2 II

46V

*~ S VccV

In' 7,A0

Z Z1 I-& - - at4 Ir-I

r c Cc c c cc T

422

- 4=

Page 128: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-57

a LM1 0 0I c0. f 5 50 'A I-GD 00 0000 W.9

mI V) O cW 0 r.CI 0 l .C

.0 cc

W A

- 9 A

C. A~

9=A90 cc

909IIt 10.

c I61010V

U29 W E I. Aleg -cA

C I I;-0~r W 00

a C;, 0 . W

9It 9- u t- M - 09aI - a 1' I- 1.-0 a- ~

a U3 is N 9- c 0 WN

CC A- L.Zc - 0 IL 02

0;-r -'r =a N -62 It C. N nN I WaC

9.9 .9 0 * .. = C 1 - 6

Page 129: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-58

u V-

z "IL

1- 2

x I-I;

m 4u," wV . L

z Vj

w. -C - ;-V 3

c=1 C O

ht I C I -; In

v A .

a II It C LI ' aL06 oac mn rN.

1! die I

Page 130: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-59

A 0 NJJ- rfl 'a e.J4 eg i'ta 4 Pv9 Q ID a. 0 W J'f. C, L Na w A

I I

IA AISIA

Ia-I0 06

wo 00c I15WC

I I V

w I K* .. J C

I I r

& k- c =I

we a~ z m n K

IV Ire It Ld w

VI %C E -r 'r c 06-I N f4 -e N- NC N NN N Z

Page 131: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-60

U, 10 a a-- 22 22 22 "' r- wa am A

vK

CA

m~ a

M ILw ' ' V

It LiIft M

a 6;t

Page 132: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

-7 7..

A-61

AN V, 1 ON a f. W0 N WUNf N@0@N 4v &I~C a

- ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ 1 -- -'N N ~ N -rr.~. -N N r N N N N r N N

* CC

r. C.

I C..Q 0c

C.lCMC 0. grCW. . 1 .. 4-

61

a ML

I-I Vrc .t m CA0 ;7 V11 2 L 1. ,X na

a A aV

IL .l t- N

I N 2

6161~C v 60 C.W6

:r c A

r ee A~ e w f r c r c _ ,e

Page 133: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

0 W 3-'o 0 m 0 f4 I 10. C20 0N 9 f4 en k. 10 -1 A

C4 N NNN.NTN N N -414r - A - 1 m N N m f4

V 0

I A

I co IA

*J n, I

I-It

*~ ZI

11v ,

Page 134: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-63

9.94

v v

N --4

9 W C

w9 9L1

09

. .. h .

%C q; V

. = = p -

=ezo a - ==w- &o a .. - . 0 _ ,

a -,

VSL

* , ,

Page 135: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- -.------. -. - - - ~ 4 ~ --

A-64

A C 9(9 cr-a' ~ N9-9CU~1CN C aO~N -~ 3~rONC Aa U, C C C 09 09090' 09 0'O~O C 00009.9 0- - N N N NNNN N Nr.NNNNN N N9991 - 999 -

IL. C 4C C

V VC-

I II 499-I

99~I'CI

I-I-Il1.9I V

I C VI I = V

* L~ I VIC-I

'C. -, = C* .. * 2 C

* LI N =

CII 9- IL C* = C* 19.911 C IL

I = =NI - C=9 - - C

I ,.. CS I I, - -

* 9-I IL A* - I - - A IIC I... 9- A

9- A* I .C = AI 91' 0. NIL. C

.--- LI

* NI =, CC 9-9

I *.I N - C CICES - C NaI '-9 I - - - -

* CII 9- Cl- a* 9=9, - C

I 9 9- C NC- - 4

C * I-. ILIL IL9- - 0 9- N

C -- -- C 9- -- IL

(.9 . - -9- 9-9~L/09 A ..- C -c IL C

Cf - N 9-C.. If- - 5 C -- - C N - - IL C--. - -

C- - - - - - I- CC~9- VS -' N - C N" .9 C N

C (.9 C LI = - = C .-.-- - NIf IL. IIL I- - I- 9. ~C *29. * NC - LI 9- V 90 . . N 9.) N- - ..9 C ~I If C C 9-I C 5 N

- - - (91 4 - N C = 5 -- * 9- - - - 4 9-CC - - 1..

- C 9- N 19- CL-LI -.9- * =

- ($9 1 S. - 9.1 N C * = - 9- - = 0 If C..- - = - - 9-------------------= a V S C* C 0 - ~9 C * C - C ** C -* C - -

- LI 0. 11' 9-CC 5 9- C - 9- C 09 t($ 0~ .1 - U* - C * 9 -4~ C 9/I C = C r~ . a ~-u aO C 9' C C CC 5 4 - C £~ 0 - 9- 0 4

90 IL ~ K . .. I- .N .9- 9- .~ -~ -9. I C - I, II = C 5 9/ INe N - 19.. - C - - = C *N N -

C IL - 9- *. If C C -e~ ... * IL - ~- C -99/C C..- * 9.- u = C if 9 ~N I& - ~ C - C -- 9-sr. 2 .-. ~L... CNI%9IL09

* - . -.- C--------=z * C -~ - --. 4 IL *~.Z9- - - - - C-- ~ = C. - I- 9-fl-------N- C - I- - C CC V. if - - 9-ILC- 0.C - .~ CC- s-s IL* 9-ILNC N- l~ - I- C 9I. 9/. C .-- 9-U 9. - C 9-9- r-------C N= - = U 0.095 IL IC. C 9- U III 1119 C' = IL 9.. 0 9.. 19191 N

9.1 9- C 9ISC 19. C- - C CC II. U S.9%I9I*C = - 9- ~CV

1 9 C- IL. 14 IL *~ C ~9.JS=~

0- C C C a (3 IL a - CIa C- C r C 0. C. C It 9/ C S. 09.9 C

9. C 4.

C- -

C9~ 0

9.9 C-V 9-9.9. 9.IC~ ... 9.UI19./ CCC- ... LI9. 99/9.I991 1.,C~ I-ICC

C

... ~CIf.~?C~N9-09.f91INC~ ~Uif90~u09C~C.9-if9(Ce~N. 9 . ,9/I~-~09CN9-WIr.c~51 e.~NNN N9/N-------rrrfl9-*rrrifif9.if-t.CifrIfr C,09,iCC I*~U CC V'S If- I.'I9 999/9.9999199/C 1r19,I,199t19'95.W.Ii 9/It'd III' 9 C'L'9. 9.1919199-19 9f91*I99tIL' C9/'9/kU99IfIC9fItItII'It CC CC.. C..V V

Page 136: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 65

-~~~~~c I, 0 ANIIINNN Ir

Z C

0 C.V v

I I

I I

ILI

INt

v C7 V

a r

lwl M- b- '

-= a -C c I i

.2 1 I.

V. a r

121 i- , IrIrvV CI CC 2T T..17 Iw10c 1%C zItaC a* I-I N 2It

.1 U A

Page 137: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

I A--- - -- - ---

II

C6 w

C cC

cc c

z Ic ;D Tz C

Page 138: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-67

A - ONMa.0 NM a.0N a.o- a,0...N~'a. ~a.a.0-~a.,a9 AN tj~ CM~IO' r4.a.a.a.a.~'~~0Oa0~oo 4'N4'~N NNNN44NN.1.N N- - r4 NflN4~~fl flflflflflflen OXUWn flO!WWWWWCW -

LICa.V V

I I

I G. 4

C'

I~)I

I a.41

* V4 V4 V4=4 V

4 It 4 - V4=4

1!4.4.44 a.Icil

C4~44 a.. C4.,I 4 a a.* I C =44', X C -In, LI S C

- C C4*! 4- C

U~ C A* .1 - C C A40, - C = A4=4 C C - A

44 1' C AV% *

404 C444 - C4044 = C -401 C *

= a ICC C,~I4 - - a - - 4-

4C41 * I~ C 4..... a. -4=44 - * -- 0 0 a.* - z~ a c.sa ~ r

L C *4- LI 4'a. C CC 4~ - C.

&/~ C NIt' * I..

C C

* 4- -* I; C

N S N a..- 0 4, - 4'.I -

- C I. .. N =.4 C - - C

-. 0 * 44C a - 4-:0 C * lI~~ - - ICE-

4 C C.I~ C -e It' X* .L - 0 rI: - 4., h-CC Cl 0 - -

- C * C-. N .4' --- = N C. II -=* C *** N - *ufl C -

4- CCC N N .0 Co * . C 4-

* , - C.. 4- -, -. - 4* . -= LI - C Cl Ifl 44.

41* - aeC LI r CM - .44 C-- .. 0 C I I 44= Cl - C C 0 -

* - 14 CC C' C 1(1 II.a. C ~ 02 ,.'.... - C a. C~ a. -4-rn- - - 4.4; a. ~Cl ~':.-r . C V -C. ~. - -

a.' 4, ,~ C..-. 4,. C N a. 0 It I-~CC 4.4...4- ~4,44II. =4-C' C 4t' L C 'OC 4..4~ 4~ CT~~NIC ~N E0 a. I.N1 C - I.- .~

- It N4'NI4~ NN4.' 04 N CL.C * 0 --~ .c o-a'a.re-,-c'ra. rca. -a. a.,, LIlt C) C ;er' 04in.4..4..~-* C..............- N..I..I&I'.I..M.* C' V. C. I .a. #a.c.,.,-s. *,.a. ~ ~'-,-e-rn-rn-a.a. .~. .~. a. e0N.--.-~-= '.

z. ,..wt-e'~ a. ~ OZ ..CI.%C.I~44M.L.. Ls~SS.hCP..C 44N1144 I..~

- .~rPrt-rt-ttCtLrNCtt rr'.-- U4..I.*~S4*I.J ~ t-4SL' 1.1CrC 204- 2 C Z C5 a.a.a.a.a.acCCxza..CCa.a.cac eec a. a. ~LI 35C2ZCZC C.C5C*ZkC LICli LI

0. - ~NIO NC - ltC PU C N -N 0. NN4" "40 '0 NO4 tIN a. a. I-N '1.LI4.,I a.a.C' a. C' 0.4' NI/' LI1I.LILII' 4' 4-.

A A

C.. a. . a. o ~ a. lt ~ C 0 to- I0' a. II' IC I- a. a. 0N N a. It IC N a. C N' a. U~ 'C N CC'eeecI-e--rrc'0e-------4'4N4.INr'4r.sNNN--------COa.r*a.L~L~ Ca- ~ NNNNNNNN0.NNNNNNNNNNNNNNNNNNNN NE-N4-0.NN CC C

a.V V

C

Page 139: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A-68 J

a 0 C -rf C cc*~*~ 014 0 .0 0 w m ' a a 4aI C ,1 .0f

z IC

cc4Af

W4=11 16

t a ll Ca

ow W

z 'I z* - A C _ L

21 9 C==

?rI CEa

Page 140: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

POO - -P - -- -. -- --

A-69

a .7 .liia N Vf N iftZ T&. Cn i ~ l l ,uit k ' L n ,a. . ,11 C- itSf eO N it W C Naw it ArV,

Li, C22~F-W~ a~~i" it ad .'fOSC O a OO~~U

c* I

Caa

'Osr Z~ VF- It' It Ia r = zwM' Wc ,, c =(c m. mcT M c a2

Page 141: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- ,.' t.,a

°- I

~I

, - I ,

D lV

I *-, .V

I

I

-=1 .C, i *1. .. . . .. . . .. . .. . .... . . . .. . ... . . . i lIl. . . . ....I... ... lll I ] . .. .-. .. .

Page 142: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

A- 71

Ql IS2 CC

It 11 t.

ICC,

V.V

Itz 1. C

11 1 Ilo III to t

r Ilo 201,t

92 1, t-2 'tW

V* C I&W I20. . 0I-rA

INl If w or c-U

or to. or(71 CC v e oa- k

Page 143: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B-1

APPENDIX B: MERGED VARIABLE CROSS-REFERENCE LISTING

This appendix contains a merged variable cross-reference listing for

all of the programs which make up the TOS Simulation Package. These

programs are CREATE, DISPLAY, MODIFY, and COMPUTE. The merged cross-

reference lists all the occurrences of each variable in the programs

which make up the TOS Simulation Package.

Referencing of statements that a variable is used in is done using

internal statement numbers (see the discussion of internal statement

numbers in the previous description of appendix A.) Since internal

statements are numbered beginning at one within each routine, each

reference to internal statement numbers also requires specification of

the routine in which the statement is located. This is accomplished by

first listing the variable being cross-referenced, then the routine in

which occurrences of this variable appear, and to the far right, a list

of internal statement numbers referring to statements in this program

module at which the variable is referenced. If the variable is

referenced multiple times within a single statement, only one reference

appears in the cross-reference listing. Some internal statement

references in the listing may be immediately followed ty a symbol

indicating the usage of the variable in this statement. The following

key defines the usage of these symbols:

* A variable or a function is changed either through an assignment

READ, ASSIGN statement, or is used as a DO index.

? A variable may be changed because it is used as a simple argument

to a subroutine or function.

D A subprogram is defined by the SUBROUTINE, FUNCTION, ENTRY, or

EXTERNAL statement. A statement function is defined by the

statement function definition. A variable is declared in a

Page 144: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B-2

type or DIMENSION statement. For units, "D" stands for DEFINE

FILE statements.

E A variable appears in an EQUIVALENCE statement.

C A variable appears in a COMMON statement.

These suffixes are especially useful since they allow distinguishing

the use of variables in declarations from their use in executable

statements, and, in the latter case, the distinguishing between just the

referencing of a variable versus its updating. These distinctions can be

made, for the most part, just from the suffixes, without the need for

looking up the statement in the program listing.

Certain other useful pieces of information are also provided in

these cross-reference listings. The type of each variable is indicated.

The list of variable types included are "1*4" for integer variables,

"R*4" for real variables, "L*4" for logical variables, and "CHAR" for

character variables. The field in the cross-reference listing with the

heading "ATTR" distinguishes between scalars and arrays. This field is .

left blank for scalars while it contains "ARRAY" for arrays. It has been

found useful to include references to subroutines and functions in these

cross-reference listings, in addition to references to just variables.

These are distinguished from variables by having "SUBR" or "FCN" in the

ATTR field. Another type of item included in these cross-references are

RETURN or STOP statements within each program module. These are

referenced in the listing using <EXIT> as the name of the "variable".

Page 145: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B- 3

00 1 N - 01 - 101

I~~c ~ ~ 0 o

- - N N -

* - N N

-~ IC .

cr.. - C001- It N l zw r N a. a, c 3w 1,

o o r C I 0 - -r!

ww* A-

v; 4r, 2i w. w N .C in v, v-c w NNr

.I 16 N ei'v- N--

v. A- wNat

v; me~ w x- u u -'C ; w' 07 to to Na

Page 146: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B-4

ar L . 0. 00

C~ V4

0 A -, km':OC O

-N N -N i 'U

N N r-f- '* U

Ny - r N IN am' ;N6'I Cif

N - NN N0UU 6fU

N - ON N U if oN U' ' -

N A AN

r- t*N aA C NU f 0 'f t O '~f ' A CNA N - C N '- ~ -NiU'U

cz m: A LAA C

icU' r' N. 'S N f C i O S OC C Oiz 'fU~

Page 147: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B- 5

*4~r -ft.

- ~ ~ ~ ~ ~ ~ ~ ~ ~ I m ~ a - ~ N - - ~ -- ~- 0 *

N~~~~~~r~I ?-C r- w. 'D : N ~ ~-

It~ C ,O N C

* ~ ~ ~ ~ ~ 6. z *

-7 N--~a c c z c-v

a ~ ~ ~ ~ " 'a *4 4 4 *

z ~ z -r I v4~ r lrz' Q. Lr N% u.0 tr'6: Ir. C.4 . N & a

N NC NfNLL'~.

o. = = 4. 4 'c o

NIN--o N N I" a & o lo -a N

NN .. ~~ ~~ ~ T C Cl* L;U- L :o.- L-~ C~~ ~- ' W ' ' CU d ICc Nc.~ - ' - LNL

Page 148: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B-6

cc0

'0 0 ~'

C44

N r

a.~~Lr w' 0 ~

00N a. N N e4

I* a~ o a.

C~ ~~~ *a * *!L aN*

N O'N rNNN5C' 0n.~cl C N - O

Page 149: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B- 7

0~~~ N T -

O N C~~ O,.lo a ND-

U,2N NN N..C N - C aNo N N ~

N -f 1: No U

N N'a N ' a - -- Na 4 N

U' arr--rmr I0r Iol N.r 00 N1 1 I= 0 a-N N a Irra v C NW N

N .. a a , N

w NU C, o Q C. N n oi0 N & L N aaa.

14 NC 6' -r N c

o a aa 1= a 11N

uat'. zl. -% 4

m= u %dau u- - N I u IC)c =d= CE-rL .. , u'a -r- Nu. N u -d u vC L

Page 150: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

-~~~~R mu Rim".......

1B-

oo N- o-U N o N

4n N'N*N 4

NO ~ 6 cD mN o ea' - -r.4n

Cat' eeC *-~ N Ne eato . C C NmN CN NeC -- Nna, - . NC C *c N

fir'~L af' La' z c'U 'NO e -e~'aens ~ c ne~w - N ~ f'Q IC e - 0 05~ 0N

N CN Nat - - Nr'r - ~NC - C

LNt Q. r L.L4

- - c0 .' - To C -- ~ CCZ.N~~~eI ca eO a C '' C-0

N~ ~~ ~~~~~ N a" - -- N W --- -C

Page 151: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B- 9

- - 0 0 C -~ N'C N - C'1- = ~CNU% 2 N- N C NL' N NNNN - - N

A. 2*@

- - .0 100 - 1-.0r-I~~N 1-* 0 = 0.0 -. .00NIJ 1- ('a- N - Nt N ~NNN - - N

A. 4***zr- a C' N N 'ZL'(C'~ A, C1,2 0 C 00 '0CNJ~C 10 N

s.d -, NC 54 ~F4NN - - N

A. *2&Cr N tV. C - inCU'9~A5 0' 0 NC

C N ('-'' N '( C0%NU'r~ 0 .0 air

- N .0 0 CONON C .0 --C - N' - - inON.tr If Ii' ~- NC N N ~NNN - -

- - - C If 0~ C' NC0 0 - ONION

If - - N 00 ' inA4. t C N ,CN- - - N N N ~NNN -

A. N.A- N.fN C in (Alt 0 CI- Cin C NCCIC C

01 10 CC 0 10- 010~ N in0~,r. CC - -- - N -- N ~NNN N CN

* * ** A.-. O.If 0 CC 0 NOP'C V11-I. 10Nf~C 0 0 CC NC *~Nr~.

ainC 0' .CU1~ C inNCN~"N C100 = 1-C1-CNCit N C - -- Ni1N~ N NINN N C NN

A.NA. *444CC CCN.01- - N1-O~ 0 ... C000.0 in(.,NI0 ittin 4N~1-ttr 1- .0u' in C.0NNNN C~10C 1 1-4

1'CC

in N 10 NAit~ N .~NNNN N it NN

1~0 CC -= N C 0C5 If C tN1-O'NCCin 1- CCC ..- N .0CNCW104' 0N4ft... OCr- CA, ~tC

- N Nit N C ~NNNN N it N N

,.A.A. SUU * UUUNA.A.0* A.1'. A- LLJt.** 40?'01-If00 CC'C COC z.INI-NIC.0C NON.0NCC N ON00in101 00'.NiCinC

~in- 'JNin~ NA C4 OCr. C1-C in 1- .0NC'510N NCCC.NAin N N N.0 C "%INNN N in - N

5. 4 OCOC* IJLII.i * 4 ~Ot.Ii~04 4 NA- * CJC* 4 41400* * 4 ij.aO COr.. *N NN'N .C" NS4C N10 C N C~.0C10NNC'O £.0NNAIN .0010 CN - 0~~'C 10Cr-101- N 1- i0 inN NON.fC - C CC C' ~

- N - CN'AIf N NNNN in - N

I-ri- rAI-~ ri-=2 2=2 2=2 22 22

.02 242 20.0.2 0. CC-20.2 0 - -

2 222 2 0,0*

C CCCCCC CCC~CCCCC2C0CCC C CCCCC CCCC0C CCC -- - -........ 4..............~4* ** 4---- 0.0010-----------0. C~ - -

- - a. 0 ~2 a. - 4.5.

22.rt1 4.1. CC iLt-Il. 4 S2M.Nt-~ .44 24.r-t-SCW.E.-rt.-r tI0.------rr

A,----------------0CC 0...

2=2 - I -= N

- 2 2 ..I

2 2 2 C 2 22 ~

Page 152: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B-1 0

Lr. CC*

* 0 0~~k O0 C ' r -

OD u N Ir- -0

N0. , N C , a, 2 0N C U

- ~ r - irN zN - N-,NI 0

-~P 0z c I N Nt - NN MVO

4vC.

L; Z;0~ N) ZN -N C C C C

0~~~~~C Li C. cON ~ ~ NC0 . 0ONN. 0 N - N CN'N O

Page 153: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

B-il

N a' -M -,0

-M N

C) 6f a,400c

mN z 0 - -1 a- -r

P ~ ~~ ~ NU' NU 0 0 N NNON

CcCW0N o ~ N' 10 - 0 U 0

0N zS - p -1 NC c

-NN X4 N CN-

IN w U a ' U z c 0 0' tolt 0, a

UN "U NL, 'N

"4 I' I ''NN U

4o o' ' N '.

.~~~V 4 .44

*4~~ . . . . . . ..* .*

-NO~~~ CC N N N C C . NN U

N"ja i xuc ;.'C u r- aN L. w uN Cu L: - u%

4r* ~ ~~~~~ ~~~~~~~ 0c0 cJ c c00 0 0 0 0 N N * . C$U *S J4

Page 154: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-1

APPENDIX C: STATEMENT LABEL REFERENCES

This Appendix presents statement label reference listings for each

program in the analysis package. The statement labels are expressed in

terms of internal statement numbers. The program listings in Appendix A

can be consulted to look up any referenced statement. Within each

program module, for each FORTRAN statement label which appears, four

types of information are provided in the label reference listing: the

label being referenced; the internal- statement number where it is defined

(i.e., the statement in which it is a label); a type indicator ("FMT" if

it refers to a format statement, and blank otherwise); and a list of

statement in the routine in which this statement label is referenced.

Page 155: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-2

Noa. 1 0t . V-. 0Q0

-~~L 6-f '

-~ e ;r- m. x v c- C-- ~ 4 e

Page 156: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C- 3

ONC

0 -

-r c w -t v c V

*~1 0 3 w0(Uw 2 &ar IV rwW, wwt

Page 157: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-4

1 k t- r t- I-Nr -cr ci t Ic I Lb b. w U

-4r ft 16 - I l, c .0 -vNv% t' r0 '

c ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~~~~,( L. X 4ac( W r 1 1110%rI r w' IV ZoloI -0 h ,V

~~I~ 5 Or w CD cW O w. 00U IL w?~ WV,~ w ~ r ~ w hl c e' V Iil leWU -'c Ic~r arr~ ut~ F- IUr'~ F%

Page 158: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-5

£~~ ~ ~ f 26% i.* J f

v C. 0.

Page 159: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-6

ac

zo r

w

X0CC0-v iIr 99 C

In 6- C- C V' a .a .9.

Page 160: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- - -- , --- --- - -- --

C-7

C

C

0C

~5~

I-IJ~

U.

s0-S -S

05S N- N

-S 05 N

C 'CC a. NCN

a. 'C - - - ~'C US C 'C -~ - Ca'- - - - - - N 4N

N~'CCUSCN'C~'S~.W N'~CUS'CC0N0f''CU. 0Na'C-tDa'SrS 'C~N0'CrO*CC*C ,,CCe tCSNUC.0NF r- e- rtNCqrNCC- NN~~E~,a.

NN0N NNrSNNN -

C C CCCCL C CECCE CC C CC C~C C CEa a a N. S. S.M S N. N.M. '3. N.M. M.M.S. IL St N.

"555 Cl, *L-NSCWC~S-SC~S'R U ~N.l%-c~Skuw,.-cu-r'.csrS.-.,FC'..r Cr@M rCIl.CCa.a.a.c"CCC NNN -susr a~a 'C.~c~ra N.a.a.e~,oc~ e----N

- S~tN~'tNNNNNNNNNN

r Ce--NN55 .U'C.CS..f CCa. ~- 'I %NNNNNN ',INS'UrdNrNNrN

Page 161: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-8

a CD

a; - -N z 00 N -

b- v c- - i crM I

-N CV VC~~L w I r NCgce C

1,a

- -e- a - F- m

Page 162: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

iI~ c-9

I

a

N

0

KLi.,

a

aN

'C

'C aaN

if C U' - NN C N - LrN- - N N

- = C - N ~ "~ 'Ce' **~f N- 0 0 N ~r a~t~ NN

- - - N N N N NN NN N

-. Li C - - C C N (f I 'C - N ((I O~ if - 0 - a 0 'C 0 ' C C 0'CS CU'Li CO~N~rCut~0?-CNNU',''r.-U WIUICC

N(N~('.C'NNNNNNNNN N

1&'(1 ~ I~ ~£ El EEC C CE

** U ~ I. S. u.S M.S-

9C51-CNC,. .~C~'N ~ .U.w.oNuN(Nre0Ca f~r TE TT? C N" C-CN- aa~U C

(N 'N N ('a r.. NC'. N C" NNNEN N

ET~C ~0N~' ifaLiC''C'CN CECCCNNC

I

Page 163: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

- - - --.. ----

Ic-i o

* ~ ** V. 4 Ct, 4 II. *

* a - . .~C-

a 2 2

- U, a- a - = C

- U, -. - a

- C a

C- ~U 0 --

.. r N~~'WZU-c N' ~cwr C- - NNNNU.....~L - ~. a ZNa I

2 - 22 2

C C a a= 2 z a

- C- U U

C- U- r I-

- 0. ~~U-I C-C-U-e..U~ 2aCrCWZCCC C~ ~- = EESCIZZ rC1:~E C~ .2 ~U

UIL...W...1h. I,. ~.ZtL2&2 hath.LC i-b

US IL U.

C. =C C =

SVflUU.tVCOF2I~I4.CU. = LraV.C.U20Vr'I ncr mca U. NJ ~rCj'N a ~

4 IL 4 - a IL 4 -* ~ a C a aa a

- ~ -

- -tsN'IrICW - -

C C C C

Page 164: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

c-li

* U,

- 'C

Page 165: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-12

x~Z r

.r - r-

o e3 o

Page 166: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

C-1 3 -

- 0

1 f -

aN a a

S ... .. . .. . ..

e q r t

Page 167: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

,q~W&. -- 4V

C-14

I

N- Cr

-~ I~ C*~Cr N

'C w Cr

~. 0Cr -

~ -

~sr

o C N

- Cr

a Cr

C CCr- C a

C aNNaCr - a C

o CCCC~ a a -

o OCrW CrCCC

C CCfl CC

Cr - C?

- - -aN 0 ~, C NO CrCr aa oCa - -a C Cr - '.CC -~ C4 CC CrCC Cr Cr

~CCr~CWNCr0OCr C0CrC0CCraCrCCrN-,~Na.~0e CrCrNaNC,.~Cr C' Cc-r-r-a.CC-= -, -- C-.N L..'~rt-,-u VNVCr. 4 .OrC~% 9~CaCa.nflfleflflflu;g:C-C., N a,'NeaCc-,aaaCwa.~ rtun.'sr U-

C~EC~E~tCC.CC~ CCC CLrCCC3~CtC~ECCZ~EE~ CC.P.U P.C. .&L CL (Lb C. U.CL P C&C.t U LtL U(LP. C.P.U t.II. P 9

tt.r@ ~.UCP.C,~WCUU.!NCf* ~rr CttQ'N'tiN~ Cu 0NUN0t0 U. r-r..P.0ru'r.- 0CNr.rC? CC~U. V Cr0C'NCCCCC'PC( U4r.- N ~'C*~~PCrCWflCrfCWrCU CUll CC Cr 'CCaraCrfeawaCrCr. UtrCrCJCr

-'.~r-.ar'~--.CCrC~ ~ .-. ~ CNN~4NNCCCCa.CS~,~4cCC CCCCaoe0CNNN,~N ~ - - Ca a ar.-,' CrC.~-..CrCr C.*N N N N N C'C ~C N N N N N N N C' ~C a c ~c a c C a a a a a a a a a '~* a c a a a C C C C a e e a C C a

Page 168: 0 PROGRAMMER'S. MANUAL FOR THE TACTICAL …Witus et al. User's Manual for the Tactical Operations System Analysis Package. ARI Research Notes 80-14. -- explains the use and operation

~C-1 5I

t

* iri

o U

C:

I~j" J