Organization: China Interactive Publishing Network (http://www.china-pub.com/)
RFC Document Chinese Translation Program (http://www.china-pub.com/compters/emook/aboutemook.htm)
E-mail: Ouyang@china-pub.com
Translator: charliechen (charliechen charliecy@263.net)
Translation time: 2001-4-2
Copyright: This Chinese translation copyright belongs to China Interactive Publishing Network. Can be used for non-commercial use free reprint, but the translation and copyright information of this document must be retained.
Network Working Group Bill Duvall
Request for Comments: 2 SRI
RFC 2 - Host Software
(RFC 2 Host Soft Ware)
table of Contents
1 link 1
1A Control Link 1
1B main link 2
1C auxiliary link 2
2 operation link 3
2A Control Link 3
2B main link 3
2C auxiliary link 4
3. Error check 5
4 Monitor function 7
4A Network I / O Driver 7
4B Network Status 9
5 executable operation 9
5A main link 9
5B auxiliary link 9
5c special execution function 10
6 initial calibration 10
1 link
1A Control Link
1A1 Logic Link 0 Controllink as any of the two hosts
1A1A Network Any two hosts exist only one control link. If there is N host on the network, there is an N-1 control link for each host.
1A2 Purpose of communication between major terms
1A2A creates a user link
1A2B interrupts user links
1A2C passes the interrupt through the link according to the status and / or program
1A2D Monitor Communication
1A3 IMP automatically tracks all messages sent through link 0
1B main link
1B1 A user with other hosts on the network with other hosts on the network
1B1A main link must be the first link established between a host user and other hosts
The 1b1b main link is globally in the user, and the user program can open the main link, she always opens before it is clearly closed.
The 1B1C master link is regarded as similar to the remote host through a normal data phone or directly connected TTY, that is, the remote host thinks that a master link is a normal TTY user.
1B1D main links are used to pass (user) control information to remote hosts, for example, it is used to log in to remote hosting standard login procedures for remote hosts)
1C auxiliary link
1C1 User program can establish any auxiliary link between him or the connected host
1C1A These links can transmit binary or characters
The auxiliary link established by the 1C1B subsystem is local, so these links will close when the subsystem exits.
2 operation link
2A control link
2A1 system is loaded while establishing a link
2A2 Controlling the status of the link may be activated or non-activated
2A2A Control Link Status must reflect the relationship between the host
2B main link
2B1 User or call the calling program to establish the main link with the controller
The network identity number of the 2B1A host must be included in the calling program.
2b1b Attempts to establish an unwanted master link to the special host, it is considered to be an error, and the request is set to the default.
2B1C standard transmission character set
2b1c1 data transfer is performed by the standard character set through the main link and control link.
2B1C1A uses 8 ASCII
2B1D (Get Link) Create a link from host A to host B, as follows 2B1D1 A From its assignment table Select a current unused link to B
2b1d2 a Send a link by link 0 - connection message to B
2b1d3 a waiting
2b1d3a b Send a message about that link
2b1d3b waiting for a period of time
2b1d4 If an information is considered to be obtained from B, it will be verified whether it is true
2B1D4A a confirmation B link
2b1d4a1 sends a successful return to the requester from the monitor. The link number is returned to the requester, the link is established
2B1D4B B requests to establish this link. This means that: b is trying to establish a link to A, but with A.
2B1D4B1 If the network ID number of A (NA) is greater than the network ID number of B (NB), a ignoring the request and continues to wait for the link to the link.
2B1D4B2 If it is NA 2b1d4b2a allows requests from B to establish links. 2B1D4B2B sends a need for confirmation message 2B1D4B2C A interrupt itself, repeat allocation process Other information about links from B1D4C from B 2B1D4C1 This is a wrong condition, the same 2b1d4c1a a incorrectly selected a previously allocated link as an allocation 2B1D4C1B B transmit information through an unallocated link 2B1D4C1C or B sent to A to a change in the transmission process during transmission 2b1d4c2 In this case, A taken action: 2b1d4c2a sends a disconnected message to the connection to B 2b1d4c2b believes that the state of the host B is wrong, starting to enter the error branch process 2b1d5 If you cannot receive information about the link from B within a specified period of time, it is considered that the host B is in an error state. 2b1d5a a send a message to the link to B 2b1d5b call error handling branch 2C auxiliary link 2C1 User Program Send Call Instruction to the Monitor to establish a secondary link 2C1A requests must be detailed in detail and the data established by the monitor 2C1A1 connected to the main link number of B 2C1B two mainframes (A and B) user programs must request auxiliary link 2C1C If NA> NB, host A uses the above way (gain link) to continue to establish a link to host B 2C1D If NA 2C1D1 Waiting for the host B to establish this link (after watching the associated link) 2C1D2 waiting for a while 2C1D2A is, the host B does not respond to host a request 2C1D2B host a and b procedures should specify the waiting time to determine if it is timeout 3. Error check 3A The error check is performed by all messages sent by the network to isolate hardware and software errors. 3B A check code related to the order will be added to each message 3B1 The following algorithm will be used: 3b1a is formed by adding a length of 1 in a consecutive string to form a length of 1, and Minimum position added to ------------ | | | - field 1 ---- Add ------------ | | | -- field 2 - -------------- | | | | | -------------- / / Addition ---> | | | ------------ | | | -- Results ---- 3B1A1 This method is called folding 3B1A2 If appropriately folded after the addition, you can add fields and fold in parallel. ------- ------- -------- --------- | Field 4 | Field 3 | Field 2 | Field 1 | ------- ------- -------- --------- ------- ------- -------- --------- | Field 8 | Field 7 | Field 6 | Field 5 | ------- ------- -------- --------- addition --------- ------- ------- ------- | | | | | | | --------- ------- ------- ------- | | | | | | | | | | | | V | | | | | --------- | | | | | | | | | | | | --------- | | | | | | | | | | / --------- | | | `-> | | | | | | | --------- | | | | | | | / --------- | | `-----------> | | | | --------- | | | | / --------- | `---------------------> | | | --------- | / - `----- carry ------------------------> | - addition ------- --------- | | | | | - carry - --------- | / ----- Add method` -----> | | --- ------- | | - Result - 3B1A2A uses this method, if there is n field, the first N-1 field carry is automatically added to the next higher word The low position of the segment, so by folding, simply add the value of the [N] result field to the entry of the n ranges, then plus one The addition of the appropriate size from that addition, and repeats a certain number of times to obtain the result. 3B1A3 The resulting check code calculated in this manner has the advantages of use on different word long machines. 3B1A3A If calculating the generated check code if the string of the appropriate length is calculated, and select the appropriate length of the check code field, The verification technology of each machine will be quite ideal. 3B1A3A1 field length: 288 bits (? Did not translate: Lowest Common Denomenator Of (24, 32, 36)) 3B1A3A2 check code length: 8 bits (fit for all machines) 3b1b If a message is split into a few sets of fields, each group uses this check mode, then each group will get one A check code associated with the order and add it to the check code of the next group. 3c The two sides entries provide a device to meet the requirements when the host enters the request for the message check confirmation mode. This check is confirmed Send by control link 4 monitor function 4A network I / O driver 4A1 input 4A1A input message from IMP 4A1B error checks for messages 4A1B1 check and inspection 4A1B2 If the response mode is opened, send "Received Messages" response by controlling the link 4A1C character transformation 4A1C1 has a considerable possibility character transformation is done in IMP 4A1C2 This requires further study of BBN 4A1C3 has two things that need to be mainly considered Is the 4A1C3A transformation made of the table or completed by the algorithm? 4A1C3A1 At the beginning, it seems that it is the best way to use the table. 4A1C3B which news should be transformed, is it all necessary to transform (of course not !!!)? Which of the way What is the difference? 4A1D head decoding, send a message to the recipient specified by the source, link 4A2 output 4A2A structure head 4A2B character transformation 4A2B1 note note of the output conversion section 4A2C generates checksum 4A2D checklink status 4A2D1 If there is no RFNM after transmitting the last message on the link, wait 4A2E Transfer message to IMP 4A2F If the response mode is open, wait 4A2F1 RFNM from the destination IMP The host of the 4A2F2 destination makes a response via link 0 4B network status 4B1 Status of other hosts on the network 4B1A If an IMP is closed, then its host will also close 4B2 Status of control links 4B3 responds to the status query from other hosts 4B4 Informs other hosts, auxiliary links on interrupt bases 4B5 Informs Other Host About Program Use the Lord, Second Link Status 5 executable operation 5A master link 5A1 requires a host number as a parameter 5A1A establishes the main link 5A1B connection main control TTY to the main link 5A1C input / output by main link 5A1D asks the main link status 5A1D1 does not know how to do it exactly, but it seems useful to it 5A1E disconnected and main link control Tty 5A1F kills the main link 5b auxiliary link 5B1 establish auxiliary link 5b1a requires a host number as a parameter 5b1b Returns a logical link number similar to file index. This logical link number is passed to it as a parameter to assist it 5b2 input / output by auxiliary link 5B3 inquiry auxiliary link status 5b3a does not know how to do it exactly, but it seems useful 5B4 kill auxiliary link 5C special execution function 5C1 transparent. By link input / output 5C1A This may be used to block I / O transmission through the link The function of the controller in the 5C1B instance is to transmit a buffer IMP. 5C1C buffer keeps the same 5C1C1 This means that the head and other control information must be included in the buffer 5C1D is the purpose of making network debugging 6 initial verification 6A initial inspection network with a link to analog data phone mode 6A1 All messages are a character length 6A2 For the controller, the link is transparent and controlled by the user program using a special executable operation. 6A2A Initialization Test has two support procedures on different hosts, for example, from DDT to DDT 6A2B is connected in parallel through telephone links or other similar [This RFC WAS PUT INTO MACHINE READABLE FORM for Entry] [INTO THE ONLINE RFC Archives by Robbie Bennet 10/1998] [This RFC WAS nroffed by kelly tardif, viagenie 10/1999] RFC 2 Host Software RFC 2 Host Software 1 1 RFC Chinese Document Translation Plan