RFC2 host software

zhaozj2021-02-16  61

Organization: China Interactive Publishing Network (http://www.china-pub.com/)

RFC Document Chinese Translation Program (http://www.china-pub.com/compters/emook/aboutemook.htm)

E-mail: Ouyang@china-pub.com

Translator: charliechen (charliechen charliecy@263.net)

Translation time: 2001-4-2

Copyright: This Chinese translation copyright belongs to China Interactive Publishing Network. Can be used for non-commercial use free reprint, but the translation and copyright information of this document must be retained.

Network Working Group Bill Duvall

Request for Comments: 2 SRI

RFC 2 - Host Software

(RFC 2 Host Soft Ware)

table of Contents

1 link 1

1A Control Link 1

1B main link 2

1C auxiliary link 2

2 operation link 3

2A Control Link 3

2B main link 3

2C auxiliary link 4

3. Error check 5

4 Monitor function 7

4A Network I / O Driver 7

4B Network Status 9

5 executable operation 9

5A main link 9

5B auxiliary link 9

5c special execution function 10

6 initial calibration 10

1 link

1A Control Link

1A1 Logic Link 0 Controllink as any of the two hosts

1A1A Network Any two hosts exist only one control link. If there is N host on the network, there is an N-1 control link for each host.

1A2 Purpose of communication between major terms

1A2A creates a user link

1A2B interrupts user links

1A2C passes the interrupt through the link according to the status and / or program

1A2D Monitor Communication

1A3 IMP automatically tracks all messages sent through link 0

1B main link

1B1 A user with other hosts on the network with other hosts on the network

1B1A main link must be the first link established between a host user and other hosts

The 1b1b main link is globally in the user, and the user program can open the main link, she always opens before it is clearly closed.

The 1B1C master link is regarded as similar to the remote host through a normal data phone or directly connected TTY, that is, the remote host thinks that a master link is a normal TTY user.

1B1D main links are used to pass (user) control information to remote hosts, for example, it is used to log in to remote hosting standard login procedures for remote hosts)

1C auxiliary link

1C1 User program can establish any auxiliary link between him or the connected host

1C1A These links can transmit binary or characters

The auxiliary link established by the 1C1B subsystem is local, so these links will close when the subsystem exits.

2 operation link

2A control link

2A1 system is loaded while establishing a link

2A2 Controlling the status of the link may be activated or non-activated

2A2A Control Link Status must reflect the relationship between the host

2B main link

2B1 User or call the calling program to establish the main link with the controller

The network identity number of the 2B1A host must be included in the calling program.

2b1b Attempts to establish an unwanted master link to the special host, it is considered to be an error, and the request is set to the default.

2B1C standard transmission character set

2b1c1 data transfer is performed by the standard character set through the main link and control link.

2B1C1A uses 8 ASCII

2B1D (Get Link) Create a link from host A to host B, as follows 2B1D1 A From its assignment table Select a current unused link to B

2b1d2 a Send a link by link 0 - connection message to B

2b1d3 a waiting

2b1d3a b Send a message about that link

2b1d3b waiting for a period of time

2b1d4 If an information is considered to be obtained from B, it will be verified whether it is true

2B1D4A a confirmation B link

2b1d4a1 sends a successful return to the requester from the monitor. The link number is returned to the requester, the link is established

2B1D4B B requests to establish this link. This means that: b is trying to establish a link to A, but with A.

2B1D4B1 If the network ID number of A (NA) is greater than the network ID number of B (NB), a ignoring the request and continues to wait for the link to the link.

2B1D4B2 If it is NA

2b1d4b2a allows requests from B to establish links.

2B1D4B2B sends a need for confirmation message

2B1D4B2C A interrupt itself, repeat allocation process

Other information about links from B1D4C from B

2B1D4C1 This is a wrong condition, the same

2b1d4c1a a incorrectly selected a previously allocated link as an allocation

2B1D4C1B B transmit information through an unallocated link

2B1D4C1C or B sent to A to a change in the transmission process during transmission

2b1d4c2 In this case, A taken action:

2b1d4c2a sends a disconnected message to the connection to B

2b1d4c2b believes that the state of the host B is wrong, starting to enter the error branch process

2b1d5 If you cannot receive information about the link from B within a specified period of time, it is considered that the host B is in an error state.

2b1d5a a send a message to the link to B

2b1d5b call error handling branch

2C auxiliary link

2C1 User Program Send Call Instruction to the Monitor to establish a secondary link

2C1A requests must be detailed in detail and the data established by the monitor

2C1A1 connected to the main link number of B

2C1B two mainframes (A and B) user programs must request auxiliary link

2C1C If NA> NB, host A uses the above way (gain link) to continue to establish a link to host B

2C1D If NA

2C1D1 Waiting for the host B to establish this link (after watching the associated link)

2C1D2 waiting for a while

2C1D2A is, the host B does not respond to host a request

2C1D2B host a and b procedures should specify the waiting time to determine if it is timeout

3. Error check

3A The error check is performed by all messages sent by the network to isolate hardware and software errors.

3B A check code related to the order will be added to each message

3B1 The following algorithm will be used:

3b1a is formed by adding a length of 1 in a consecutive string to form a length of 1, and

Minimum position added to

------------

| | |

- field 1 ----

Add ------------

| | |

-- field 2 -

--------------

| | | | |

--------------

/

/ Addition ---> | | |

------------

| | |

-- Results ----

3B1A1 This method is called folding

3B1A2 If appropriately folded after the addition, you can add fields and fold in parallel.

------- ------- -------- ---------

| Field 4 | Field 3 | Field 2 | Field 1 |

------- ------- -------- ---------

------- ------- -------- ---------

| Field 8 | Field 7 | Field 6 | Field 5 |

------- ------- -------- ---------

addition

--------- ------- ------- -------

| | | | | | |

--------- ------- ------- -------

| | | | | | |

| | | | | V

| | | | | ---------

| | | | | | |

| | | | | ---------

| | | | | |

| | | | / ---------

| | | `-> | | |

| | | | ---------

| | | | |

| | / ---------

| | `-----------> | |

| | ---------

| | |

| / ---------

| `---------------------> | |

| ---------

|

/ -

`----- carry ------------------------> |

-

addition

------- ---------

| | | | |

- carry - ---------

|

/ -----

Add method` -----> | |

---

------- | |

- Result -

3B1A2A uses this method, if there is n field, the first N-1 field carry is automatically added to the next higher word

The low position of the segment, so by folding, simply add the value of the [N] result field to the entry of the n ranges, then plus one

The addition of the appropriate size from that addition, and repeats a certain number of times to obtain the result.

3B1A3 The resulting check code calculated in this manner has the advantages of use on different word long machines.

3B1A3A If calculating the generated check code if the string of the appropriate length is calculated, and select the appropriate length of the check code field,

The verification technology of each machine will be quite ideal.

3B1A3A1 field length: 288 bits (? Did not translate: Lowest Common Denomenator Of (24, 32, 36))

3B1A3A2 check code length: 8 bits (fit for all machines)

3b1b If a message is split into a few sets of fields, each group uses this check mode, then each group will get one

A check code associated with the order and add it to the check code of the next group.

3c The two sides entries provide a device to meet the requirements when the host enters the request for the message check confirmation mode. This check is confirmed

Send by control link

4 monitor function

4A network I / O driver

4A1 input

4A1A input message from IMP

4A1B error checks for messages

4A1B1 check and inspection

4A1B2 If the response mode is opened, send "Received Messages" response by controlling the link

4A1C character transformation

4A1C1 has a considerable possibility character transformation is done in IMP

4A1C2 This requires further study of BBN

4A1C3 has two things that need to be mainly considered

Is the 4A1C3A transformation made of the table or completed by the algorithm?

4A1C3A1 At the beginning, it seems that it is the best way to use the table.

4A1C3B which news should be transformed, is it all necessary to transform (of course not !!!)? Which of the way

What is the difference?

4A1D head decoding, send a message to the recipient specified by the source, link

4A2 output

4A2A structure head

4A2B character transformation

4A2B1 note note of the output conversion section

4A2C generates checksum

4A2D checklink status

4A2D1 If there is no RFNM after transmitting the last message on the link, wait

4A2E Transfer message to IMP

4A2F If the response mode is open, wait

4A2F1 RFNM from the destination IMP

The host of the 4A2F2 destination makes a response via link 0

4B network status

4B1 Status of other hosts on the network

4B1A If an IMP is closed, then its host will also close

4B2 Status of control links

4B3 responds to the status query from other hosts

4B4 Informs other hosts, auxiliary links on interrupt bases

4B5 Informs Other Host About Program Use the Lord, Second Link Status

5 executable operation

5A master link

5A1 requires a host number as a parameter

5A1A establishes the main link

5A1B connection main control TTY to the main link

5A1C input / output by main link

5A1D asks the main link status

5A1D1 does not know how to do it exactly, but it seems useful to it

5A1E disconnected and main link control Tty

5A1F kills the main link

5b auxiliary link

5B1 establish auxiliary link

5b1a requires a host number as a parameter

5b1b Returns a logical link number similar to file index. This logical link number is passed to it as a parameter to assist it

5b2 input / output by auxiliary link

5B3 inquiry auxiliary link status

5b3a does not know how to do it exactly, but it seems useful

5B4 kill auxiliary link

5C special execution function

5C1 transparent. By link input / output

5C1A This may be used to block I / O transmission through the link

The function of the controller in the 5C1B instance is to transmit a buffer IMP.

5C1C buffer keeps the same

5C1C1 This means that the head and other control information must be included in the buffer

5C1D is the purpose of making network debugging

6 initial verification

6A initial inspection network with a link to analog data phone mode

6A1 All messages are a character length

6A2 For the controller, the link is transparent and controlled by the user program using a special executable operation.

6A2A Initialization Test has two support procedures on different hosts, for example, from DDT to DDT

6A2B is connected in parallel through telephone links or other similar

[This RFC WAS PUT INTO MACHINE READABLE FORM for Entry]

[INTO THE ONLINE RFC Archives by Robbie Bennet 10/1998]

[This RFC WAS nroffed by kelly tardif, viagenie 10/1999]

RFC 2 Host Software RFC 2 Host Software

1

1

RFC Chinese Document Translation Plan

转载请注明原文地址:https://www.9cbs.com/read-27265.html

New Post(0)