⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc187.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
           |             |             |        LMID(1)       LMID(2)       LMID(n)        -----------------------------------        |                                 |      LMSN(1)       LMSN(2)             LMSN(n)The Express Exchange is a combination of functions. It is basically acommunication handler and store and forward switch. The 'EE' has theability to keep track of all messages in the network by TEN (definedearlier). It is therefore possible to record and reflect the entirestatus of the network down to any detail desired.PROTOCOLThe protocol for operating a network system has different levels ofcontrol. The 'EE' must exercise control on the communication linkbetween any pair of stations. The NC maintains control at the net joblevel. However, the functions that each unit performs are combined tohandle special control cases. These complimentary functions will bediscussed in detail as they arise in the protocol discussion.                                                                [Page 6]First of all, there must be a series of initialization messages sentfrom one station to another before any actual message transmission takesplace. These messages are sent between each station and positiveacknowledgments must be received in order to complete the initial handshaking.At any point during the transmission of messages an error can occurwhich will be detected by a negative acknowledgement. The message inerror will be retransmitted several times. If the error persists, theline is timed out and will be retried later. The assumption here is theline may be temporarily noisy and we give it time to quiesce.When a station receives an initialization message it is possible torespond in several ways depending on the status of the user system.(1) The station receiving the initialization message can acknowledge    that it is ready to receive and transmit.(2) Temporarily cannot receive certain logical messages (actual data    transmissions) but can receive special control messages.  This    option allows a user system to selectively process net jobs as    facilities on his system become available.(3) Unable to receive traffic (in other words, the user system is    logically or physically disconnected from the network).(4) Unable to receive new network job requests but able to handle    traffic for jobs in progress. The user system may have several    jobs in progress that are transmitting and receiving messages.    This acknowledgement gives the user system the ability to allow    these jobs to continue normal processing.The last alternative gives the CI at each user system the mechanism toselectively demultiplex itself to handling one logical message. Thetemporarily deactivated.Thus, all user systems can selectively halt messages throughout theentire network. The destination system can selectively halt all messagesfor a given NJID or selective halt logical messages within a net job.The adjacent system would keep accepting messages until its buffers werefilled to some operational threshold limit that must be maintained tokeep the network from coming to a complete standstill, and would issueselective halts to systems sending to it. It is conceivable that themessage blocks of one logical message would be stored in distributedsegments throughout the network.The same selective halt mechanism can be applied in reverse through aresume message. The resume message can apply to an entire set ofmessages for a net job or selective logical messages within a job. Thereinitiation of a transmission takes place between any two stations thatwish to allow more message blocks to be transmitted. The destination                                                                [Page 7]station must resume on a particular logical message to allow the messageto reach its final destination and complete transmission through thenetwork. The LMID of the message header enables the 'EE' and 'NC' tocooperate in controlling and cleaning up network operation. Not onlydoes this cooperation between logical levels reduce a duplication ofeffort but it enables the control to become realistic and practical.Complete separation of communications and control functions could causea loss of useful information that may not be obtained by other means.For example, if a file transmission consisted of many blocks and atransmission error occurred that the network was unable to recover.  The'EE' would notify the 'NC' of the error occurrence on this filetransmission and then 'NC' would issue purge messages to the 'EE's forthose particular 'logic message' blocks. This mechanism-allows a general'clean-up' and management of all file transmissions.There is also the condition when a receiving system goes down. When thisoccurs there may be a number of network jobs involved with that usersystem. If the user system remains down for an extended period of timeand the 'EE' buffer resources are filled to threshold limit, it may benecessary to purge pending message blocks. The 'EE' will notify the 'NC'of the user system being down and the 'NC' will issue purge commands tothe 'EE' for all pending messages of those netjobs involved with thedown user system. However, in our present implementation the 'EE' usesdisk storage as a logical extension of core for message buffering. Inthis operation, the freeing of real core buffers becomes a simple matterof moving the messages on to disk for later retrieval. In some instancesof transmission a file may be scored in segments at several locationsuntil the receiving system is able to receive it. Network bufferresources are treated as a logically simple entity that may bephysically distributed.When the user system comes back on the air the involved user network jobwill be restarted by issuing resume transmit commands to the 'EE'.  Ifthe user is, an interactive user controlling the network, he would benotifed of the problem and status of his file transmission. He couldthen reinstate his command at a later time. The batch network jab wouldbe restarted at a point where no unnecessary retransmission would occur.It has not been determined how long files should reside in a store andforward node before being purged from the network. If a backing storagedevice is available to network operation, the file can remain for alonger time but still not indefinitely.                                                                [Page 8]NC PROTOCOLThe File Transmission Protocol of the 'NC' is primarily concerned withthe control and transfer of user files for storage, temporary use at aremote system, and execution.The commands and status messages that pertain to the second level logicof the 'NC' are sent and interpreted by the sending and receivingsystems. All initiation of file transfers result from direct usercommands to the 'NC'.The sending system will first be interrogated to determine if the fileis resident at that system. The user must provide the necessaryinformation to locate the file if it is not catalogued at that system.This information consists of the physical attributes, such as volume andserial number. A negative acknowledgement to this message would resultin the termination of a net job step with the reason for terminationreturned to the originator.When a positive acknowledgement is received by the 'NC' it has twooptions available. It must first determine the amount of unused bufferspace in the 'EE' and based on the size of the file to be transferred,decide whether to have the data set sent immediately or wait for anacknowledgement to the receive message.If the 'NC' decides to move the file regardless of the state of thereceiving system, the 'NC' will issue a send or receive message to bothsystems simultaneously. A negative response to the 'receive' message istaken as a definite refusal by the receiving system to accept the datatransmission. This may result from insufficient resources to handle thejob. If the file was transmitted from the receiving system and isresident in the network storage facilities, the user will be notified ofits exact location so that he may move it from that point at a latertime. If the 'NC' chose the second option, the file would still beresident at the originating system.A positive acknowledgement will allow the file to continue its normalflow through the network. Queuing in the 'EE' is always done in orderthat 'receive' messages will be sent before the actual data files. Thepossibilities include loading the file directly into the job stream(this step assumes the appropriate JCL is included in the text of thefiles) or cataloguing the file at the remote system or storing it fortemporary immediate use. All network files are catalogues with a uniquename that includes User ID (unique at his home node), home node ID(unique in the network) and his own data name which is unique in his ownwork. The 'receive' message may also contain some special instructionsto print or punch a file.                                                                [Page 9]When the sending and receiving stations have completed the filetransfer, they send status messages back to the 'NC' indicating thecompleted action. These status messages enable the 'NC' to keep a recordof user network job steps and their progress through the network. Thesestatus messages play an important part in insuring proper checkpointrestart for the network.Files routed specifically for execution require a third status messagefrom the receiving user system. The system must indicate when and howthe job completed execution. This status message will also contain theappropriate accounting information to allow dynamic updating of networkuser and system accounting information. It is not clear at this timewhat should be accounted for in the network, but it is an area of primeconcern to operational networks.An error in the second logic level can occur during the filetransmission. There may be an error moving files from devices into theline buffers or reading from the line buffers. When this occurs, theoperating system must pass this information to the 'NC'. The 'NC' willthen terminate the task involved in this job step and purge all thenetwork buffers containing blocks of this message transmission.When the 'NC' receives the file error message it will immediately send a'release' message to all the network tasks supporting this job step.This action will cause the user systems to end all pending tasksassociated with this net job step. In addition a purge message for thatjob step will be sent to the 'EE' to purge the message from its buffers.If there is more than one 'EE' involved, the purge message would bepassed to all other 'EE's.This is another example of the 'EE' and 'NC' combining functionalcapability and providing effective management of network traffic. Themapping of message Into the job step allows the 'NC' to selectivelychoose all messages it wishes to purge.The protocol the user must use for interactive use of the network isdifferent, There are some standard message types that are provided forinteractive use to insure the proper message recognition from one systemto another, Terminal type traffic will be sent across the networkthrough the normal netting' interface, The control information that aterminal sends to the operating system must be incorporated in thenetwork protocol by the 'CI'.The interactive user can request a direct connection to the remotesystem through the 'NC'. The 'NC' will notify the remote system of theuser request and establish the user's direct link, The 'NC' becomes amonitor of the conversation but no longer becomes involved with themessages. Other conversational messages are sent back and forth through                                                               [Page 10]the 'EE' with no interaction by the 'NC'. In the event one of thesystems goes down breaking the logical link, the 'NC' must notify theother system to terminate the waiting task, In most cases a user systemwill be isolated from the second user system by other stations and the'NC' is a convenient way of notifying other user systems about the"disaster."Once the user's connection is established, three types of messages maybe generated, These messages are identified by the 'AC' field in theheader. The three basic transmission types covered by the protocol are:a response requested - with or without text included in the message, atext message which is simply a response to the first or just data to beprinted at the user's terminal, and finally, an interrupt message whichindicates the user wishes to stop a task or talk directly to theoperating system.It is important to note that regardless of what type of conditionsexist, there are always enough buffers left to receive an interruptmessage and terminate or flush any existing task and the associatedoperation it may be supporting.CONCLUSIONThe protocol concepts discussed in this paper were developed tofacilitate the transfer of data between two or more independent systems.The protocol is able to handle the various pathological cases that mayarise during network operation, A fundamental design consideration indeveloping these concepts was to maintain complete recovery from anyrecoverable error condition.Many of the concepts have been used in an operational star network, witha single 'EE' and 'NC' located in the central system and a 'CI' locatedat each participating system. The successful operation of the networkhas proven the feasibility of this protocol.ACKNOWLEDGMENTThe authors wish to acknowledge the design and implementation effort ofthe contributing members of the Computer Science Department of the T. J.Watson Research Center.       [ This RFC was put into machine readable form for entry ]           [ into the online RFC archives by Tim Buck 5/97 ]                                                               [Page 11]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -