I've carried out a close reading of the "worm" in the CSA Mandelzoom source code: this is the code that distributes itself across a Transputer network and then loads and executes programs distributed to it by a host computer. The worm itself is notspecific to Mandelzoom --- you could use it to load other programs if you wanted to.
The network initialisation and worm code are in three files, executed in this order:
SRESET.TAL -- reset the Transputer network
FLBOOT.TAL -- main worm and bootstrap loader
FLLOAD.TAL -- full loader for larger programs
I've annotated these source files with a play-by-play of what the worm is doing. The annotated files are found at the gist link below, regrettably in the opposite order to what's listed above:
https://gist.github.com/stepleton/e0181ecd11ade19124a2956da614caab
I hope this might be of interest to the rare enthusiast out there,
--Tom
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (0 / 16) |
Uptime: | 169:30:06 |
Calls: | 10,385 |
Calls today: | 2 |
Files: | 14,057 |
Messages: | 6,416,552 |