📄 rfc107.txt
字号:
Network Working GroupRequest for Comments # 107NIC # 5806 Output of the Host-Host Protocol Glitch Cleaning Committee UCLA 23 March 1971 Robert Bressler Steve Crocker William Crowter Gary Grossman Ray Tomlinson James Withe [Page 1]IntroductionThe Host-Host Protocol Glitch Cleaning Committee met for the secondtime at UCLA on 8, 9 March 1971, after canvassing the network com-munity. [The result of the (slightly larger) committee's firstmeeting are documented in RFC #102.] The committee agreed onseveral modifications to the protocol in Document #1; these modi-fications are listed below.At each of the meeting, the committee quickly treated all but oneof the extant topics. At the first meeting, the bulk of time wasspent considering the interrupt mechanism, and that discussion issummarized in RFC #102. At the second meeting, the committee spentalmost all of its time discussing the notion of bytes; this dis-cussion is summarized after the list of modifications.This RFC entirely supercedes RFC #102, and is an official modi-fication of Document #1. A revision of Document #1 will be writtenshortly which incorporates the changes listed here.NCP implementers are to incorporate these changes as soon aspossible. NCP implementers also are to estimate on what datetheis NCP's will be ready and to communicate this estimate toSteve Crocker or his secretary, Byrna Kristel. [Page 2]ModificationsI BytesHeretofore, a connection has been a bit stream. Henceforth, it is tobe a byte stream, with the byte size, S, indicated in the STR commandand in each message. The byte size meets the constraints: 1 <= S <=255.The choice of the byte size for a connection is a 3rd level protocolissue, but the size is constant for the life of a connection. Eachmessage must contain an integral number of text bytes (see below).II Message FormatThe message format is changed to the format shown in figure 1.The fields S and C are the byte size and byte count, respectively.The S field is 8 bits wide and must match the byte size specified inthe STR which created the connection. The C field is 16 bit long andspecifies the number of bytes in the text portion of the message. Azero value in the C field serves no purpose, but is explicitlypermitted.The M1 and M2 field are each 8 bits long and must contain zero. TheM3 field is zero or more bits long and must be all zero. The M3 maybe used to fill out a message to a word boundary. It is followed bypadding.The text field consists of C bytes, where each byte is S bit long.The text field starts 72 bits after the start of the message. The partition of a byte stream into messages is an artifact required by the subnet. No semantic contents be attacched to message boundaries. In particular, [Page 3] 32 bits |<--------------------------------->| +-----------------------------------+ | | | leader | | | +--------+--------+-----------------+ | | | | | M1 | S | C | | | | | +--------+--------+-----------------+ | | ^ | | M2 | | | | | | | +--------+ | | | | | | | | | | | Text | // // | | | | | | | | | | | | | | +--------+ | | | | | | | M3 | | v | | +-----------------+--------+--------+ | | | 10 --------- 0 | <-- Padding | | +-----------------+ Typical Message Figure 1 [Page 4]1. A message with a zero value for C has no meaning, although it is legal and it does use up resource allocation. (See Flow Control below.)2. A receiver may not expect to see 3rd level control infor- mation synchronized with message boundaries. Particuralrly, if the notion of record is defined for a connection, the receiver must expect multiple records and/or record frag- ments within one message. (However, control message obey special rules. See below.)III Message Data TypesNo notion of data type is defined as part of the 2nd level pro- tocol.3rd level protocols may include the notion. Data types cannot besynchronized on message boundaries.IV Reset and Reset ReplyA new pair of one bit control commands RST (reset) and RRP (resetreply) are added. The RST is interpreted as a signal to purge the NCPtables of all existing entries which arose from the Host which sent toRST. The Host receiving the RST acknowledges by returning a RRP. TheHost sending the RST may proceed to request connection after receivingeither a RST or RRP in return. An RST is returned if the second Hostcomes up after the first Host.V Flow ControlThe flow control techniques are changed in two ways. First, the Ceasemechanism is discontinued. The 10HI and 11HI message will no longerbe recognized by the Imps, and the Imps will no loger generate the10HI, 11HI or 12HI messages. [Page 5]Second, the allocation mechanism now deals with two quantities, bitsand messages. The receiver allocates each of these quantitiesseparately. The sender and receiver each must mantain a 16 bitunsigned counter for message and a 32 bit unsigned counter for bits.When sending a message, the sender subtract one from the messagecounter, and the text length from the bit counter. The receiverdecrements his counter similarly when receiving the message. Thesender is prohibited from sending if either counter would be decre-mented below zero. Similarly, the receiver is prohibited from raisingthe current message allocation above 2**16 - 1, or the current bitallocation above 2**32 - 1.The TEXT LENGTH of a message is the product of S, the byte size, andC, the number of bytes. These values always appear in the first partof the message, as described under Message Format.The ALL, GVB, and RET command are modified to treat two quantities.Their formats are given under Control Command, below. The GVB commandis further modified to make it possible to ask for none of theallocation to be returned. The new GVB command has four eight bitfields. The first two fields are the op code and the link, as before.The next two fields contain number fM and fB which control how much ofmessage and a bit allocation are to be returned. Each of thesenumbers is interpreted as "the number of 128ths of the currentallocation" to be returned if it is in the range of 0 to 128, and isto be interpreted as "all of the current allocation", if it is in therange 128 to 255.VI Control MessageThe control link is chsnged to link 0; link 1 is not to be used. Theold and new protocols may thereforre coexist.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -