60499500
CONTRpL DATA
/ g ^ N
NETWORK PRODUCTS
NETWORK ACCESS METHOD VERSION 1
HOST APPLICATION PROGRAMMING REFERENCE MANUAL
CDC® OPERATING SYSTEM:
NOS 2
REVISION RECORD
Revision A (12/01/76) B (04/01/77) C (07/01/77) D (04/28/78) E (08/15/78) F (12/18/78) G (01/15/79) H (08/10/79) J (12/11/79) K (04/18/80) L (10/31/80) M (05/29/81) N (02/26/82) P (01/14/83)
R (09/30/83) S (09/19/84) T (09/30/85) U (12/16/85) V (07/31/86) W (04/23/87)
D e s c r i p t i o n
Original Release. PSR level 439.
Revised to PSR level 446 for technical corrections.
Revised to PSR level 452 for technical corrections.
Completely revised for NAM Version 1.1 release at PSR level 472 to include support of remote and foreign NPUs, asynchronous and HASP TIPs, virtual terminals, IAF, and TVF.
Revised at PSR level 477 for technical corrections.
Revised at PSR level 485 for technical corrections.
Revised at PSR level 485 for additional technical corrections.
Revised to reflect release of NAM Version 1.2. Included are descriptions of the binary debug log file and postprocessor, special editing support, and QTRM.
Revised to reflect addition of connection duplexing, upline block truncation, block header break markers, QTRM connection switching, and various technical corrections.
Revised at PSR level 517 to reflect the addition of 714 printer support, and various t e c h n i c a l c o r r e c t i o n s .
Revised at PSR level 528 to reflect the addition of QTRM support of application-to- a p p l i c a t i o n c o n n e c t i o n s , t h e u s e r - i n t e r r u p t c a p a b i l i t y, a n d v a r i o u s t e c h n i c a l
c o r r e c t i o n s .
Revised for NAM Version 1.3 release at PSR level 541 to include 2780/3780 terminal support, changes to supervisory messages, PRU interface, and various technical c o r r e c t i o n s .
Revised at PSR level 559 to reflect release of NAM Version 1.4, which supports NOS Version 2.0 and includes the disable flag parameter on the LST/HDX/R supervisory message and miscellaneous technical corrections.
Revised at PSR level 580 to reflect release of NAM Version 1.5 and CCP Version 3.5, which run only under the NOS Version 2 operating system. This manual, which was previously known as the NAM Reference Manual, is no longer applicable to products operating under NOS 1. It has been reorganized to document information needed by a general networks user, who must consider NAM as well as CCP when writing a network application. This is a complete reprint.
Revised at PSR level 596 to reflect release of NAM Version 1.6 and CCP Version 3.6, supporting multiple-host networks. This is a complete reprint.
Revised at PSR level 617 to reflect release of NAM Version 1.7 and CCP Version 3.7 to document support of a 3270 bisynchronous terminal class and miscellaneous technical c o r r e c t i o n s .
Revised at PSR level 642 to reflect release of NAM Version 1.8 and CCP Version 3.8. This manual was previously known as the NAM Version 1/CCP Version 3 Host Application
Programming Reference Manual. Miscellaneous technical changes are included.
Revised at PSR level 647 to reflect release of NAM Version 1.8, CCP Version 3.8, and CDCNET Version 1.0. Miscellaneous technical corrections are included.
Revised at PSR level 664 to reflect release of NAM Version 1.8, CCP Version 3.8, and CDCNET Version 1.1. Miscellaneous technical, corrections are included.
Revised at PSR level 678 to reflect release of NAM Version 1.8, CCP Version 3.8, and CDCNET Version 1.2. Miscellaenous technical corrections are included.
REVISION LETTERS I, 0, Q, AND X ARE NOT USED
©COPYRIGHT CONTROL DATA CORPORATION 1976, 1977, 1978, 1979, 1980, 1981, 1982, 1983, 1984, 1985, 1986, 1987 All Rights Reserved
Printed in the United States of America
Address comments concerning this manual to:
CONTROL DATA CORPORATION
Technology and Publications Division P. 0. BOX 3492
SUNNYVALE, CALIFORNIA 94088-3492
or use Comment Sheet in the back of this manual
/-*a^.
i i 60499500 W
LIST OF EFFECTIVE PAGES
New features, as well as changes, deletions, and additions to information in this manual are indicated by bars in the margins or by a dot near the page number if the entire page is affected. A bar by the page number indicates pagination rather than content has changed.
Page Front Cover Title Page i i
i i i / i v v v i v i i / v i i i
i x t h r u x i i x i i i / x i v
X V
1-1
1-2 thru 1-6 1-7
1-8 1-8.1 1 - 8 . 2
1-9 thru 1-14 2-1
2-2 2-3 2-4 2-5 2-6 2-7 2-8 2^9 2-10 2-11
2-12 thru 2-14 2-15 thru 2-18 2-19
2-20 2-21
2-22 thru 2-25 2-26
2-27 2-28 2-29
2-30 thru 2-33 2-34
2-35
2-36 thru 2-39 3-1
3-2 thru 3-6 3-7 thru 3-10 3-11
3-12
3-12.1/3-12.2 3-13 thru 3-16 3-17
3-18 thru 3-21 3-22
3-23 3-24 3-25 3-26 3-27 3-28
Revision Page
-
3-29-
3-30W 3-30.1
W 3-30.2
V 3-31
u
3-32 thru 3-44V 3-45
V 3-46
V 3-47 thru 3-50
T 3-51 thru 3-53
R 3-54 thru 3-57
U 3-58
V 3-59
V 3-60
U 3-61
U 3-62 thru 3-68
T 3-68.1 thru 3-68.6
U 3-69 thru 3-79
R 3-80
R 3-81
T 4-1
R 4-2
T 4-3
R 4-4
T 4 - 4 . 1 / 4 - 4 . 2
R 4-5 thru 4-10
U 4 - 1 0 . 1
T 4 - 1 0 . 2
S 4-11 thru 4-15
U 4-16
V 4-17 thru 4-19
U 5-1
S 5-2
T 5-3
W 5-4
T 5-5
W 5-6
T 5-7 thru 5-11
W 5-12
V 5-13
U 5-14
T 5-15
U 5-16
V 5-17
U 6-1
V 6-2
V 6-3
U 6 - 4
T 6-5
V 6-6
T 6-7
V 6-8
W 6-9
W 6-10
T 6-11
V 6-12
W 6-13 thru 6-15
W 6-16
Revision Page
V 6-17
V 7-1 thru 7-15
V 7-16
V 7-17 thru 7-24
V 7-25
T 7-26 thru 7-38
V 8-1
V 8-2 thru 8-12
T 8-13
V 8-14 thru 8-34
T 8 - 3 4 . 1
V 8 - 3 4 . 2
V 8 - 3 4 . 3 / 8 - 3 4 . 4
U 8-35 thru 8-66
W A-l thru A-3
V A-4
V A-5 thru A-19
U A-20 thru A-23
V A-24 thru A-32
U A-33 thru A-36
R A-3 7
R A-3 8
W A-3 9
W A-40 thru A-46
W A-47
V A-48
V B - l
V B-2
T B-2.1/B-2. 2
V B-3
T B-4
R B-5
V B-6
W B-7 thru B-9
R C-l thru C-l3
R D - l
T D-2
R Index-1 thru -6
T Comment Sheet/Mail
R Back Cover
T T R T T V T T S S R R T W R V R V
Revision R R T R T R R V w V V V V T R
S R S T R T T S R S R W H W T T V V T
U
V V V W
60499500 W
i i i / i v
r j
i^k
r>
^
0 * \
PREFACE
/fP^>N-
This manual supplies reference information to both Network Access Method (NAM) Version 1.7 and Commu
nications Control Program (CCP) Version 3.7 users, t y p i c a l l y e i t h e r p r o g r a m m e r s o r a n a l y s t s w h o a r e writing a network application or who would like to l e a r n m o r e a b o u t h o w t h e v a r i o u s p o r t i o n s o f t h e n e t w o r k fi t t o g e t h e r.
T h i s m a n u a l d e s c r i b e s h o w a p p l i c a t i o n p r o g r a m s interface to the computer network. The NAM 1/CCP 3 Te r m i n a l I n t e r f a c e r e f e r e n c e m a n u a l d e s c r i b e s h o w t h e t e r m i n a l u s e r g a i n s a c c e s s t o t h e s e a p p l i c a t i o n s . A l s o , t h i s m a n u a l f a m i l i a r i z e s t h e r e a d e r w i t h t h e n e t w o r k p r o c e s s i n g u n i t ( N P U ) a n d t h e Communications Control Program (CCP). Knowledge of the NPU and CCP, however, is not necessary to write an application program.
NAM and CCP operate under control of the NOS 2 operating system for the CONTROL DATA® CYBER 180 Computer Systems; CYBER 170 Computer Systems; CDC ® CYBER 70 Computer System models 71, 72, 73, and 74;
and 6000 Computer Systems.
N A M i s t h e s u b s e t o f t h e h o s t c o m p u t e r s o f t w a r e that provides communication between an application p r o g r a m i n t h e h o s t c o m p u t e r a n d o t h e r a p p l i c a t i o n p r o g r a m s o r d e v i c e s a c c e s s i n g t h e n e t w o r k ' s resources.
The Communications Control Program is software that r e s i d e s i n a 2 5 5 x s e r i e s n e t w o r k p r o c e s s i n g u n i t t h a t a l l o w s a d e v i c e t o a c c e s s t h e h o s t c o m p u t e r over communications lines.
WHO SHOULD READ THIS MANUAL
This manual is directed at a programmer or analyst w h o i s f a m i l i a r w i t h s u b s y s t e m a p p l i c a t i o n s p r o g r a m m i n g , c o m p i l e r a n d a s s e m b l e r p r o g r a m m i n g conventions, terminal communication protocols, other n e t w o r k s o f t w a r e p r o d u c t s , a n d t h e p r o g r a m m i n g
requirements of supported devices.
HOW THIS MANUAL IS ORGANIZED
S e c t i o n 1 i n t r o d u c e s t h e N A M a n d C C P s o f t w a r e . S e c t i o n 2 d e s c r i b e s t h e p r o t o c o l s g o v e r n i n g i n f o r mation exchanged for communication between NAM and e a c h a p p l i c a t i o n p r o g r a m , a n d b e t w e e n a p p l i c a t i o n programs and their connections. Section 3 describes the synchronous and asynchronous supervisory mes s a g e s u s e d b y a p p l i c a t i o n p r o g r a m s . S e c t i o n 4 d e s c r i b e s t h e l a n g u a g e a n d i n t e r n a l i n t e r f a c e s required by an application program. Section 5 dis cusses the application interface program statements used by NAM to access the network and to send and receive messages. Section 6 discusses the structure a n d e x e c u t i o n o f a n a p p l i c a t i o n p r o g r a m j o b a s a b a t c h o r s y s t e m o r i g i n t y p e fi l e . S e c t i o n 7 contains a FORTRAN program using AIP; section 8 d e s c r i b e s Q T R M . S e c t i o n 9 d e s c r i b e s n e t w o r k failure and techniques of recovery.
Additional reference information for the Communica tions Control Program can be found in other network p r o d u c t a n d o p e r a t i n g s y s t e m p u b l i c a t i o n s . U s e t a b l e 0 - 1 t o l o c a t e t h i s i n f o r m a t i o n .
TABLE 0-1. LOCATION OF CCP REFERENCE INFORMATION
I n f o r m a t i o n
Manual That Contains Information NOS
Version 2 Adminis t r a t i o n Handbook
NAM 1/CCP 3 Te r m i n a l
I n t e r f a c e s Reference Manual
NOS Version 2 System Analysis Handbook
Communicat ions Control Pro gram Version 3 D i a g n o s t i c Handbook
NOS Version 2
Opera t i o n s Handbook
Communications Control Program I n t e r n a l Maintenance Specif icatlont CCP overview, concepts,
and functions Character sets CCP glossary Mnemonics
S t a t i s t i c s Halt Codes
60499500 S
TABLE 0-1. LOCATION OF CCP REFERENCE INFORMATION (Contd)
I n f o r m a t i o n
Manual That Contains Information NOS
Version 2 Adminis t r a t i o n Handbook
NAM 1/CCP 3 Te r m i n a l I n t e r f a c e s Reference Manual
NOS Version 2 System Analysis Handbook
Communications Control Pro gram Version 3 D i a g n o s t i c Handbook
NOS ' Version 2 Opera t i o n s Handbook
Communications Control Program I n t e r n a l Maintenance S p e c i fi c a t l o n t D i a g n o s t i c s
Customer Engineering error messages Dump information NPU operating
i n s t r u c t i o n s Memory map
Naming conventions NPU dumping, loading, a n d i n i t i a l i z i n g d e t a i l s
tAvailable from Software Manufacturing Distribution (SMD), 4201 Lexington Ave. North, Arden Hills, Minnesota 55112
RELATED PUBLICATIONS
R e l a t e d m a t e r i a l i s c o n t a i n e d i n t h e p u b l i c a t i o n s listed below. Other manuals may be needed, such as the hardware, firmware, or emulator software refer e n c e m a n u a l f o r t h e d e v i c e s s e r v i c e d b y a g i v e n program. Also, communication standards and device operating literature can be useful.
The Software Publications Release History gives the t i t l e s a n d r e v i s i o n l e v e l s o f s o f t w a r e m a n u a l s available for the Programming System Report (PSR) level of NOS 2 and its product set installed at your s i t e .
The following manuals are of primary interests
P u b l i c a t i o n P u b l i c a t i o n
Number Network Products
Network Access Method Version Network Definition Language
Reference Manual 60480000
Network Products
Network Access Method Version 1/
Communications Control Program Version 3
Terminal Interfaces Reference Manual 60480600
NOS Version 2 Reference Set, Volume 1
Introduction to Interactive Usage 60459660
NOS Version 2 Reference Set, Volume 3
System Commands 60459680
NOS Version 2 Reference Set, Volume 4
Program Interface 60459690
v i 60499500 S
The following manuals are of secondary interest:
/ ^ ^
P u b l i c a t i o n
Communications Control Program Version 3 Diagnostic Handbook
COMPASS Version 3 Reference Manual COBOL Version 5 Reference Manual
CYBER Cross System Version 1 Build Utilities Reference Manual CYBER Cross System Version 1 Macro Assembler Reference Manual CYBER Cross System Version 1 Micro Assembler Reference Manual CYBER Cross System Version 1 PASCAL Reference Manual FORTRAN Version 5 Reference Manual
Hardware Performance Analyzer (HPA) User Reference Manual
Message Control System Version 1 Reference Manual
NOS Version 2 Diagnostic Index NOS Version 2
Installation Handbook NOS Version 2
Manual Abstracts NOS Version 2
Administration Handbook NOS Version 2
Operations Handbook NOS Version 2 Analysis Handbook Network Products
Remote Batch Facility Version 1 Reference Manual
Software Publications Release History TAF Version 1
Reference Manual
2551-1, 2551-2, 2552-2 Network Processor Unit Hardware Reference Manual
2560 Series Synchronous Communications Line Adapter Hardware Maintenance Manual
P u b l i c a t i o n Number 60471500 60492600 60497100 60471200 96836500 96836400 96836100 60481300 60459460 60480300 60459390 60459320 60485500 60459840 60459310 60459300
60499600 60481000 60459500 60472800 74700700
60499500 S v i i
P u b l i c a t i o n
P u b l i c a t i o n N u m b e r
2561 Series Asynchronous Communications
L i n e A d a p t e r H a r d w a r e M a i n t e n a n c e M a n u a l 7 4 7 0 0 9 0 0 2563 Series SDLC Line Adapter
H a r d w a r e M a i n t e n a n c e M a n u a l 7 4 8 7 3 2 9 0 C D C m a n u a l s c a n b e o r d e r e d f r o m C o n t r o l D a t a C o r p o r a t i o n , L i t e r a t u r e a n d D i s t r i b u t i o n S e r v i c e s , 3 0 8 N o r t h D a l e S t r e e t , St. Paul, Minnesota 55103.
T h i s p r o d u c t i s i n t e n d e d f o r u s e o n l y a s described in this document. Control Data can n o t b e r e s p o n s i b l e f o r t h e p r o p e r f u n c t i o n i n g of undescribed features or parameters.
v i i i 6 0 4 9 9 5 0 0 R
CONTENTS
N O T A T I O N S x i i i
1 . N E T W O R K P R O D U C T S : A N O V E R V I E W 1 - 1
C o m p u t e r N e t w o r k 1 - 1
C o m m u n i c a t i o n s N e t w o r k 1 - 2
S e r v i c e s N e t w o r k 1 - 2
S o f t w a r e C o m p o n e n t s o f t h e N e t w o r k 1 - 2 N e t w o r k A c c e s s M e t h o d 1 - 2 P e r i p h e r a l I n t e r f a c e P r o g r a m 1 - 4 N e t w o r k I n t e r f a c e P r o g r a m 1 - 4 A p p l i c a t i o n I n t e r f a c e P r o g r a m 1 - 4 Q u e u e d Te r m i n a l R e c o r d M a n a g e r 1 - 4 N e t w o r k D e fi n i t i o n L a n g u a g e P r o c e s s o r 1 - 4 N e t w o r k S u p e r v i s o r 1 - 5 C o m m u n i c a t i o n S u p e r v i s o r 1 - 5 N e t w o r k V a l i d a t i o n F a c i l i t y 1 - 5
N e t w o r k U t i l i t i e s 1 - 5
N e t w o r k D u m p A n a l y z e r 1 - 5 L o a d F i l e G e n e r a t o r 1 - 5 D e b u g L o g F i l e P r o c e s s o r 1 - 6 H a r d w a r e P e r f o r m a n c e A n a l y z e r 1 - 6 N A M A p p l i c a t i o n P r o g r a m s 1 - 6 C D C C Y B E R C r o s s S y s t e m S o f t w a r e 1 - 6 Network Processing Unit and Communications
C o n t r o l P r o g r a m 1 - 6
N e t w o r k P r o c e s s i n g U n i t 1 - 6
| C o m m u n i c a t i o n s C o n t r o l P r o g r a m 1 - 7 B a s e S y s t e m S o f t w a r e 1 - 7
| S y s t e m A u t o s t a r t M o d u l e 1 - 7
S e r v i c e M o d u l e 1 - 8
H o s t I n t e r f a c e P r o g r a m 1 - 8 T e r m i n a l I n t e r f a c e P r o g r a m 1 - 8 L i n k I n t e r f a c e P r o g r a m 1 - 8 B l o c k I n t e r f a c e P r o g r a m 1 - 8 I n - L i n e a n d O n - L i n e D i a g n o s t i c s 1 - 8 N P U C o n s o l e D e b u g g i n g A i d s 1 - 8 P e r f o r m a n c e a n d S t a t i s t i c s P r o g r a m s 1 - 8
| T h e P a c k e t S w i t c h i n g N e t w o r k ( P S N ) 1 - 8
N A M C o n c e p t s 1 - 8
V i r t u a l T e r m i n a l s 1 - 9
L o g i c a l C o n n e c t i o n s 1 - 9
O w n i n g C o n s o l e s 1 - 1 0
N e t w o r k A c c e s s M e t h o d O p e r a t i o n 1 - 1 0 A p p l i c a t i o n P r o g r a m C o n c e p t s 1 - 1 2 C o n n e c t i o n P r o c e s s i n g F l o w 1 - 1 2 S u p p o r t e d T e r m i n a l s 1 - 1 2 2 . I N F O R M A T I O N P R O T O C O L S 2 - 1
I n f o r m a t i o n F l o w 2 - 1
S t r u c t u r e P r o t o c o l s 2 - 1 P h y s i c a l P r o t o c o l s a n d N e t w o r k B l o c k s 2 - 1 L o g i c a l P r o t o c o l a n d P h y s i c a l B l o c k s 2 - 1 N e t w o r k D a t a B l o c k s 2 - 2 T r a n s m i s s i o n B l o c k s 2 - 4 I n t e r a c t i v e T e r m i n a l I n p u t C o n c e p t s 2 - 4 L i n e M o d e O p e r a t i o n 2 - 4 B l o c k M o d e O p e r a t i o n 2 - 4 P h y s i c a l a n d L o g i c a l L i n e s 2 - 5 E n d - o f - L i n e I n d i c a t o r s 2 - 5 Multiple Logical Lines in One Message 2-5 E n d - o f - B l o c k I n d i c a t o r s 2 - 6 I n t e r a c t i v e Te r m i n a l O u t p u t C o n c e p t s 2 - 7
B a t c h D e v i c e D a t a 2 - 7
60499500 S
A p p l i c a t i o n - t o - A p p l i c a t i o n I n p u t a n d
O u t p u t C o n c e p t s 2 - 7
I n f o r m a t i o n I d e n t i fi c a t i o n P r o t o c o l s 2 - 7 A p p l i c a t i o n P r o g r a m M e s s a g e T y p e s 2 - 7 A p p l i c a t i o n B l o c k T y p e s 2 - 7 B l o c k B u f f e r A r e a s 2 - 8 B l o c k H e a d e r A r e a 2 - 8
B l o c k T e x t A r e a 2 - 8
C o n n e c t i o n I d e n t i fi e r s 2 - 9 A p p l i c a t i o n C o n n e c t i o n N u m b e r 2 - 9 A p p l i c a t i o n L i s t N u m b e r 2 - 9 Data Message Content and Sequence Protocols 2-10
I n t e r a c t i v e V i r t u a l T e r m i n a l D a t a 2 - 1 0 L i n e T u r n a r o u n d C o n v e n t i o n 2 - 1 1 Interactive Virtual Terminal Exchange
M o d e s 2 - 1 1
N o r m a l i z e d M o d e O p e r a t i o n 2 - 1 1 Upline Character Sets and Editing
M o d e s 2 - 1 2
D o w n l i n e C h a r a c t e r S e t s 2 - 1 4 P a g e W i d t h a n d P a g e L e n g t h 2 - 1 4 F o r m a t E f f e c t o r s 2 - 1 4 T r a n s p a r e n t M o d e O p e r a t i o n 2 - 1 9 A p p l i c a t i o n - t o - A p p l i c a t i o n
C o n n e c t i o n D a t a 2 - 2 2 . 1 A p p l i c a t i o n C h a r a c t e r T y p e s 2 - 2 3
C h a r a c t e r B y t e C o n t e n t 2 - 2 4 B l o c k H e a d e r C o n t e n t 2 - 2 4 Supervisory Message Content and Sequence
P r o t o c o l s 2 - 3 1
A s y n c h r o n o u s M e s s a g e s 2 - 3 5 S y n c h r o n o u s M e s s a g e s 2 - 3 6 B l o c k H e a d e r C o n t e n t 2 - 3 6 3 . S U P E R V I S O R Y M E S S A G E S 3 - 1
M e s s a g e M n e m o n i c s 3 - 1
M e s s a g e S e q u e n c e s 3 - 1
C o n n e c t i n g D e v i c e s t o A p p l i c a t i o n s 3 - 1 C o n n e c t i n g A p p l i c a t i o n s t o A p p l i c a t i o n s 3 - 1 4 M o n i t o r i n g C o n n e c t i o n s 3 - 2 4 . 1 T e r m i n a t i n g C o n n e c t i o n s 3 - 2 4 . 2 M a n a g i n g C o n n e c t i o n L i s t s 3 - 2 5
C o n t r o l l i n g L i s t P o l l i n g 3 - 2 5 C o n t r o l l i n g L i s t D u p l e x i n g 3 - 2 6 C o n t r o l l i n g D a t a F l o w 3 - 2 9 M o n i t o r i n g D o w n l i n e D a t a 3 - 2 9 Controlling or Bypassing Upline and
D o w n l i n e D a t a 3 - 3 5
Discarding Upline and Downline Data o n A p p l i c a t l o n - t o - A p p l i c a t i o n
C o n n e c t i o n s 3 - 3 5
Discarding Downline Data on
D e v i c e - t o - A p p l i c a t i o n C o n n e c t i o n s 3 - 3 5 Bypassing Downline Data on an
A p p l i c a t i o n - t o - A p p l i c a t i o n
C o n n e c t i o n 3 - 3 5
Terminal Use of User Interrupts for
P r i o r i t y D a t a 3 - 3 8
C o n t r o l l i n g U p l i n e B l o c k C o n t e n t 3 - 3 9 C o n v e r t i n g a n d R e p a c k i n g D a t a 3 - 3 9 Repacking Synchronous Supervisory
M e s s a g e B l o c k s 3 - 4 1
Exchanging Transparent Data With Devices 3-42 T r u n c a t i n g U p l i n e B l o c k s 3 - 4 2 M a n a g i n g D e v i c e C h a r a c t e r i s t i c s 3 - 4 3
i x
Changing Device Characteristics Requesting Device Characteristics Host Operator Commands
Host Shutdown Error Reporting
4. USER PROGRAM INTERFACE DESCRIPTIONS Language Interfaces
Parameter List and Calling Sequence Requirements
Predefined Symbolic Names Predefied Symbolic Values COMPASS Assembler Language
Application Interface Program Macro Call Formats
F i e l d A c c e s s U t i l i t i e s Compiler-Level Languages
Application Interface Program Subroutine Call Formats F i e l d A c c e s s U t i l i t i e s
Queued Terminal Record Manager U t i l i t i e s
I n t e r n a l I n t e r f a c e s
Application Interface Program and
Network Interface Program Communication Worklist Processing
Parallel Mode Operation Other Software Communication 5. APPLICATION INTERFACE PROGRAM
CALL STATEMENTS Syntax
Network Access Statements
Connecting to Network (NETON) Disconnecting From Network (NETOFF) Network Block Input/Output Statements
Specific Connections
Inputing to Single Buffer (NETGET) Inputing to Fragmented Buffer
Array (NETGETF)
Outputing From Single Buffer (NETPUT) Outputing From Fragmented Buffer
Array (NETPUTF) Connections on Lists
Inputing to Single Buffer (NETGETL) Inputing to Fragmented Buffer
Array (NETGTFL) Processing Control Statements
Suspending Processing (NETWAIT) Controlling Parallel Mode (NETSETP)
Checking Completion of Worklist Processing (NETCHEK)
3-45 Debugging Application Programs 6-6
3-54 F a t a l E r r o r s 6-6
3-56 Debugging Methods 6-6
3-60 Debug Log File and Associated
3-60 U t i l i t i e s
Statistical File and Associated
6-16
U t i l i t i e s 6-15
4-1 Dependencies for Program Use 6-16
4-1 Memory Requirements 6-17
4-1 4-1 4-2
7. SAMPLE FORTRAN PROGRAM 7-1
Configuration Requirements 7-1
4-2 Job Command Portion 7-1
Program Portion 7-1
4-2 Program Output 7-1
4-10 4-11
8. QUEUED TERMINAL RECORD MANAGER 8-1
4-12
4-12 Network Information Table 8-1
Subroutines 8-11
4-13 Initiating Network Access (QTOPEN) 8-11
4-15 Sending Data (QTPUT)
Obtaining Data or Connection
8-12
4-15 Status (QTGET) 8-13
4-15 Sending a Synchronous Supervisory
4-16 Message (QTTIP) 8-14
4-16 Linking an Application to Another
5-1 5-1 5-1 5-1 5-4 5-4 5-4 5-4 5-6 5-7o 5-8 5-10 5-10 5-12 5-14 5-14 5-15 5-16 6. CHARACTERISTICS OF AN APPLICATION PROGRAM 6-1 N O S S y s t e m C o n t r o l P o i n t F a c i l i t y 6 - 1
B a t c h J o b S t r u c t u r e 6 - 1
C o m m a n d s 6 - 2
J o b I d e n t i fi c a t i o n 6 - 3
P r o g r a m C o n t e n t 6 - 3
P r o g r a m E x e c u t i o n T h r o u g h I A F 6 - 3
| T y p e s o f A p p l i c a t i o n P r o g r a m s 6 - 4
D i s a b l e d 6 - 5
U n i q u e I d e n t i fi e r 6 - 5
P r i v i l e g e d 6 - 5
I Have More Than One Copy (on any One Host) 6-6R e q u e s t S t a r t a b l e 6 - 6 R e s t r i c t e d o r G e n e r a l A c c e s s 6 - 6 M a n d a t o r y o r P r i m a r y 6 - 6
Application (QTLINK)
Ending a Single Connection (QTENDT) Ending Communication With the
Network (QTCLOSE) Output Formatting and Editing
Format Effectors
Display-Code Output Editing Output Queuing Using QTRM Sample Program
9. NETWORK FAILURE AND RECOVERY Application Programs
Host
Network Processing Unit Logical Link
Trunk Line Terminal
APPENDIXES
Character Data Input, Output, and Central Memory Representation Diagnostic Messages
Glossary
8-14 8-14 8-15 8-15 8-16 8-16 8-16 8-18 9-1 9-1 9-1 9-1 9-1 9-1 9-1 9-1
A - l B - l C - l D Application Program Call Statement Summary D-l
INDEX FIGURES
1 - 1 O v e r v i e w o f a C D C N e t w o r k 1 - 1 1-2 The Interfaces Between the Network
P r o d u c t E l e m e n t s 1 - 3 1-3 The Relationship Between the Parts of
t h e C o m m u n i c a t i o n s C o n t r o l P r o g r a m 1 - 7 1 - 4 T y p i c a l C o n n e c t i o n s i n t h e N e t w o r k 1 - 1 0
60499500 S
1-5 Network Access Method Components 1 - 6 Ty p i c a l A p p l i c a t i o n P r o g r a m
Processing Flow
2 - 1 P h y s i c a l a n d L o g i c a l I n f o r m a t i o n S t r u c t u r e s
2-2 Block Reassembly Points
2 - 3 A p p l i c a t i o n - t o - A p p l i c a t i o n C o n n e c t i o n Data Exchanges
2-4 Application Block Header Content for Upline Network Data Blocks
2-5 Application Block Header Content for Downline Network Data Blocks 2-6 Supervisory Message General Content,
Asynchronous Messages and Synchronous Messages of Application Character Type 2
2-7 Supervisory Message General Content, Synchronous Messages of Application Character Type 3
2-8 Application Block Header Content for Upline Supervisory Messages 2-9 Application Block Header Content for
Downline Supervisory Messages 3-1 Supervisory Message Mnemonic Structure 3 - 2 D e v i c e - t o - A p p l i c a t l o n C o n n e c t i o n
Supervisory Message Sequences 3-3 Connection-Request (CON/REQ/R)
Supervisory Message Format, Device-to-Application Connections 3-4 Connection-Accepted (CON/REQ/N)
Supervisory Message Format, All Connection Types
3-5 Connection-Rejected (CON/REQ/A) Supervisory Message Format, All Connection Types
3 - 6 I n i t i a l ! z e d - C o n n e c t i o n ( F C / I N I T / R ) Supervisory Message Format 3 - 7 C o n n e c t i o n - I n i t i a l i z e d ( F C / I N I T / N )
Supervisory Message Format 3-8 Connection-Broken (CON/CB/R) Supervisory Message Format 3-9 End-Connection (CON/END/R)
Supervisory Message Format 3-10 Connection-Ended (CON/END/N) Supervisory Message Format
3 - 11 A p p l i c a t i o n - t o - A p p l i c a t i o n C o n n e c t i o n Supervisory Message Sequences 3-12 Request-Application-Connection
(CON/ACRQ/R) Supervisory Message Format
3-13 Application-Connection-Rej ect (CON/ACRQ/A) Supervisory Message Format
3-14 Connection-Request (CON/REQ/R) Super visory Message Format, Application- to-Application Connections
3-15 Connection Monitoring Message Sequences 3-16 Inactive-Connection (FC/INACT/R)
Supervisory Message Format 3-17 Connection Termination Message
Sequences
3-18 Connection List Polling Control Message Sequences
3-19 Connection List Duplexing Message Sequences
3-20 Turn-List-Processing-Off (LST/OFF/R) Supervisory Message Format
3-21 Turn-Llst-Processing-On (LST/ON/R) Supervisory Message Format 3-22 Change-Connection-List (LST/SWH/R)
Supervisory Message Format 3 - 2 3 Tu r n - O n - H a l f - D u p l e x - L i s t - P r o c e s s i n g
(LST/HDX/R) Supervisory Message Format
1-11 3-24
1-13
3-25 2-2
2-3 3-26
2-23 3-27
2-25 3-28
2-29 3-29
3-30 2-32 3-31
3-32
2-34 3-33
2-36 2-38 3-34
3-1 3-35
3-5 3-36
3-6 3-37
3-12 3-38
3-39
3-13 3-40
3-14 3-41
3-14 3-15 3-42 3-16 3-43
3-44
3-16 3-45
3-17 3-46
3-18 3-20 3-23 3-24.1 3-24.1 3-24.2 3-26 3-26 3-27 3-27 3-27 3-28
3-47 3-48 3-49 3-50 3-51 3-52 3-53 3-54
Tu r n - O n - F u l l - D u p l e x - L i s t - P r o c e s s i n g (LST/FDX/R) Supervisory Message
F o r m a t 3 - 2 9
Block-Delivered (FC/ACK/R) Supervisory
M e s s a g e F o r m a t 3 - 3 0
Block-Not-Delivered (FC/NAK/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 0 A p p l i c a t i o n - t o - A p p l i c a t i o n C o n n e c t i o n
B r e a k a n d R e s e t M e s s a g e S e q u e n c e 3 - 3 1 Break (FC/BRK/R) Supervisory Message
F o r m a t 3 - 3 2
Reset (FC/RST/R) Supervisory Message
F o r m a t 3 - 3 2
Te r m i n a l U s e r - C a u s e d B r e a k S e q u e n c e 3 - 3 3 User-Interrupt (INTR/USR/R) Supervisory
M e s s a g e F o r m a t 3 - 3 3
Break-Indication-Marker (BI/MARK/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 4 A p p l i c a t i o n - I n t e r r u p t - R e s p o n s e
(INTR/RSP/R) Supervisory Message
F o r m a t 3 - 3 4
Resume-Output-Marker (RO/MARK/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 4 A p p l i c a t i o n - I n t e r r u p t ( I N T R / A P P / R )
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 6 A p p l i c a t i o n - I n t e r r u p t - R e s p o n s e
(INTR/RSP/R) Supervisory Message
F o r m a t 3 - 3 6
Terminate-Output-Marker (TO/MARK/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 7 Downline Data Flow Control Supervisory
M e s s a g e S e q u e n c e s 3 - 3 7 User-Interrupt-Request (INTR/USR/R)
Supervisory Message Format for
P r i o r i t y D a t a 3 - 3 8
U s e r I n t e r r u p t f o r P r i o r i t y D a t a
S u p e r v i s o r y M e s s a g e S e q u e n c e 3 - 3 8 Change-Input-Character-Type
S u p e r v i s o r y M e s s a g e S e q u e n c e 3 - 3 9 Change-Input-Character-Type (DC/CICT/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 4 0 Block Truncation Supervisory Message
S e q u e n c e 3 - 4 2
Block Truncation (DC/TRU/R) Supervisory
M e s s a g e F o r m a t 3 - 4 3
Te r m i n a l C h a r a c t e r i s t i c s R e d e fi n i t i o n
S u p e r v i s o r y M e s s a g e S e q u e n c e s 3 - 4 5 Te r m i n a l - C h a r a c t e r i s t i c s - R e d e fi n e d
(TCH/TCHAR/R) Supervisory Message
F o r m a t 3 - 4 6
D e fi n e - Te r m i n a l - C h a r a c t e r i s t i c s (CTRL/DEF/R) Supervisory Message
F o r m a t 3 - 4 8
D e fi n e - M u l t i p l e - Te r m i n a l - C h a r a c t e r i s t i c s (CTRL/CHAR/R) Supervisory Message
F o r m a t 3 - 4 9
D e fi n e - M u l t i p l e - Te r m i n a l - C h a r a c t e r i s t i c s Abnormal Response (CTRL/CHAR/A)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 0 M u l t i p l e - Te r m i n a l - C h a r a c t e r l s t i c s -
Defined (CTRL/CHAR/N) Supervisory
M e s s a g e F o r m a t 3 - 5 0
R e q u e s t - Te r m i n a l - C h a r a c t e r i s t i c s (CTRL/RTC/R) Supervisory Message
F o r m a t 3 - 5 5
R e q u e s t - Te r m i n a l - C h a r a c t e r i s t i c s Abnormal Response (CTRL/RTC/A)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 5 D e v i c e - C h a r a c t e r i s t i c s - D e fi n i t i o n
(CTRL/TCD/R) Supervisory Message
F o r m a t 3 - 5 6
Host Operator Command Supervisory
M e s s a g e S e q u e n c e s 3 - 5 7
60499500 S x i
3-55 Host Operator Request-to-Activate- Debug-Code (HOP/DB/R) Supervisory
M e s s a g e F o r m a t 3 - 5 7
3-56 Host Operator Request-to-Turn-Off- Debug-Code (HOP/DE/R) Supervisory
M e s s a g e F o r m a t 3 - 5 8
3-57 Host Operator Request-to-Dump-Field- Length (HOP/DU/R) Supervisory
M e s s a g e F o r m a t 3 - 5 8
3-58 Host Operator Request-to-Turn-AIP- Traffic-Logging-On (HOP/TRACE/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 8 3-59 Host Operator Request-to-Turn-AIP-
Traffic-Logging-Off (HOP/NOTR/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 9 3-60 Host Operator Request-to-Release-
Debug-Log-File (HOP/REL/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 9 3-61 Host Operator Request-to-Restart-
Statistics-Gathering (HOP/RS/R)
S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 9 3-62 Host Shutdown Supervisory Message
Sequences
3-63 Host-Shutdown (SHUT/INSD/R) Supervisory Message Format
3-64 Logical-Error Supervisory Message Sequence
3-65 Logical-Error (ERR/LGL/R) Supervisory Message Format
4-1 NFETCH Macro Call Format 4-2 NSTORE Macro Call Format 4-3 NFETCH Integer Function FORTRAN
Call Format
4-4 NSTORE Subroutine FORTRAN Call Format 4-5 QTRM Interface Level Analogy
5-1 NETON Statement FORTRAN Call Format 5-2 Supervisory Status Word Format 5-3 NETON Statement FORTRAN Example 5-4 NETOFF Statement FORTRAN Call Format 5-5 NETGET Statement FORTRAN Call Format 5-6 NETGET Statement FORTRAN 5 Examples 5-7 NETGETF Statement FORTRAN Call Format 5-8 NETGETF Statement Text Area Address
Array
5-9 NETGETF Statement FORTRAN 5 Examples 5-10 NETPUT Statement FORTRAN Call Format 5-11 NETPUT Statement FORTRAN 5 Example 5-12 NETPUTF Statement FORTRAN Call Format 5-13 NETPUTF Statement Text Area Address
A r r a y
5-14 NETPUTF Statement FORTRAN 5 Example 5-15 NETGETL Statement FORTRAN Call Format 5-16 NETGETL Statement FORTRAN 5 Example 5-17 NETGTFL Statement FORTRAN Call Format 5-18 NETGTFL Statement Text Area Address
Array
5-19 NETGTFL Statement FORTRAN 5 Example 5-20 NETWAIT Statement FORTRAN Call Format 5-21 NETWAIT Statement FORTRAN 5 Examples 5-22 NETWAIT Statement FORTRAN Call Format 5-23 NETSETP and NETCHEK Statement
FORTRAN 5 Examples
5-24 NETCHEK Statement FORTRAN Call Format 6-1 Typical Job Structure for System Input 6-2 Interactive Program Execution Procedure
E x a m p l e 6 - 3
6-3 6-4 6-5 6-6 6-7 6-8 6-9 6-10 6-11 6-12 6-13 6-14 6-15 7-1
3-60 7-2
7-3 3-61
3-61 7-4 3-62 7-5
4-10 8-1
4-11 8-2
4-12 8-38-4
4-13 8-5
4-14 8-6
5-2 8-7
5-3 8-8
5-3
5-4 8-9
5-4
5-5 8-10
5-6 8-11
5-7 8-128-13 5-7
5-8 5-8
5-9
TABI
5-9 l - l
5-10 1-2
5-11 2-1
5-125-12 2-2
5-13 2-3
5-145-14 2-4 5-155-15 2-5 3-1
5-16 3-2
5-17 4-1
6-2 4-2
4-3
NETDBG Utility FORTRAN Call Statement
F o r m a t 6 - 7
NETREL Utility FORTRAN Call Statement
F o r m a t 6 - 8
NETSETF Utility FORTRAN Call Statement
F o r m a t 6 - 8
NETLOG Utility FORTRAN Call Statement
F o r m a t 6 - 9
NETDMB Utility FORTRAN Call Statement
F o r m a t 6 - 9
D L F P C o m m a n d G e n e r a l F o r m a t 6 - 1 0 D L F P C o m m a n d E x a m p l e s 6 - 1 0 D L F P D i r e c t i v e K e y w o r d F o r m a t 6 - 1 1 D L F P D i r e c t i v e E x a m p l e s 6 - 1 2 G e n e r a l F o r m a t o f D L F P O u t p u t 6 - 1 3 NETSTC Utility FORTRAN Call Statement
F o r m a t 6 - 1 5
NETLGS Utility FORTRAN Call Statement
F o r m a t 6 - 1 5
General Format of One Period Listing
i n S t a t i s t i c a l F i l e 6 - 1 6 C o m m a n d P o r t i o n o f R M V 3 J o b 7 - 1 P r o g r a m P o r t i o n o f R M V 3 7 - 2 Possible Dialogs Supported by Sample
F O R T R A N P r o g r a m 7 - 2 5
Debug Log File Listing for Sample
F O R T R A N P r o g r a m 7 - 2 6
S t a t i s t i c a l F i l e L i s t i n g f o r S a m p l e
F O R T R A N P r o g r a m 7 - 3 8
N e t w o r k I n f o r m a t i o n T a b l e F o r m a t 8 - 2 QTOPEN Statement COBOL Call Format 8-11 Q T P U T S t a t e m e n t C O B O L C a l l F o r m a t 8 - 1 2 Q T G E T S t a t e m e n t C O B O L C a l l F o r m a t 8 - 1 3 Q T L I N K S t a t e m e n t C O B O L C a l l F o r m a t 8 - 1 4 QTENDT Statement COBOL Call Format 8-14 QTCLOSE Statement COBOL Call Format 8-15 Algorithm for Output Buffering
U s i n g Q T R M 8 - 1 7
Sample Program ECH0-RMV2 Source
L i s t i n g 8 - 1 9
E C H 0 - R M V 2 J o b C o m m a n d s 8 - 2 5 D e b u g L o g F i l e L i s t i n g f o r E C H 0 - R M V 2 8 - 2 6 S t a t i s t i c s F i l e L i s t i n g f o r E C H 0 - R M V- 2 8 - 3 6 E C H 0 - R M V 2 S a m p l e D i a l o g 8 - 3 7
D e v i c e T y p e s 1 - 9
S u p p o r t e d T e r m i n a l C l a s s e s 1 - 1 4 Default Message Delimiter and
T r a n s m i s s i o n K e y s 2 - 6 Format Effector Operations for
A s y n c h r o n o u s a n d X . 2 5 C o n s o l e s 2 - 1 5 Format Effector Operations for
S y n c h r o n o u s C o n s o l e s 2 - 2 0 Embedded Format Control Operations
f o r C o n s o l e s 2 - 2 1
C h a r a c t e r E x c h a n g e s W i t h C o n n e c t i o n s 2 - 2 5 L e g a l S u p e r v i s o r y M e s s a g e s 3 - 2 Va l i d F i e l d N u m b e r s a n d F i e l d Va l u e s 3 - 5 1
R e s e r v e d S y m b o l s 4 - 3
A I P I n t e r n a l P r o c e d u r e s 4 - 1 7 A I P I n t e r n a l T a b l e s a n d B l o c k s 4 - 1 8
,<^^\
/ * ^ \
| x i i 60499500 S
NOTATIONS
T h r o u g h o u t t h i s m a n u a l , t h e f o l l o w i n g c o n v e n t i o n s are used in the presentation of statement formats, operator type-ins, and diagnostic messages:
< c t >
UPPERCASE
lowercase
[ ]
{ }
input parameter
U p p e r c a s e l e t t e r s i n d i c a t e a c r o n y m s , w o r d s , o r m n e m o n i c s e i t h e r r e q u i r e d b y t h e n e t w o r k s o f t w a r e a s i n p u t , o r p r o d u c e d a s o u t p u t .
L o w e r c a s e l e t t e r s i d e n t i f y v a r i a b l e s f o r w h i c h v a l u e s are supplied by the NAM or t e r m i n a l u s e r , o r b y t h e network software as output.
E l l i p s i s i n d i c a t e s t h a t o m i t t e d e n t i t i e s r e p e a t t h e f o r m a n d f u n c t i o n o f t h e e n t i t y l a s t g i v e n .
S q u a r e b r a c k e t s e n c l o s e e n t i t i e s t h a t a r e o p t i o n a l ; i f o m i s s i o n o f a n y e n t i t y causes the use of a default e n t i t y , t h e d e f a u l t i s u n d e r l i n e d .
Braces enclose entities from which one must be chosen.
T h i s t e r m I d e n t i fi e s a n A I P call statement parameter for w h i c h v a l u e s a r e s u p p l i e d
to AIP by the programmer.
LF
©
HD
The <ct> symbol represents t h e n e t w o r k c o n t r o l c h a r a c t e r d e fi n e d f o r t h e t e r m i n a l . T h i s c h a r a c t e r m u s t b e t h e fi r s t c h a r a c t e r o f the command entered.
The LF symbol represents a o n e - l i n e v e r t i c a l r e p o s i t i o n i n g o f t h e c u r s o r o r o u t p u t m e c h a n i s m . L F a l s o d e s i g n a t e s a c h a r a c t e r o r c h a r a c t e r c o d e a s s o c i a t e d w i t h s u c h a l i n e f e e d o p e r a t i o n .
A circle around a character r e p r e s e n t s a c h a r a c t e r k e y t h a t i s p r e s s e d i n c o n j u n c t i o n w i t h a c o n t r o l key (CTL, CNTRL, CONTRL, CONTROL, or equivalent).
The boxed cr symbol repre sents the terminal key that causes message transmission;
u s u a l l y, t h i s k e y c a u s e s a c a r r i a g e r e t u r n o p e r a t i o n . T r a n s m i s s i o n k e y s a r e described in more detail in section 2.
return parameter T h i s t e r m i d e n t i fi e s a n A I P c a l l s t a t e m e n t p a r a m e t e r f o r w h i c h v a r i a b l e s a r e supplied to AIP by the pro grammer and in which values are placed by AIP.
U n l e s s o t h e r w i s e s p e c i fi e d , a l l r e f e r e n c e s t o n u m bers are to decimal values, all references to bytes are to 8-bit bytes, and all references to characters a r e t o 7 - b i t A S C I I - c o d e d c h a r a c t e r s . F i e l d s defined as unused should not be assumed to contain zeros.
60499500 R x i i i
0*%
0 ^ t
0^%
NETWORK PRODUCTS: AN OVERVIEW
This section introduces the Control Data Corporation CYBER 170 network products, their relationships to each other, and their significance to the data com m u n i c a t i o n s u s e r. N e t w o r k p r o d u c t s i s a g r o u p o f programs and hardware that provides communications services to geographically dispersed users.
As shown in figure 1-1, a CDC network consists of a computer network, a communications network, and a services network.
COMPUTER NETWORK
The computer network includes host computer systems p a c k e t - s w i t c h i n g n e t w o r k s ( P S N s ) , t e r m i n a l s , a n d the host software associated with network communi cations .
E a c h c o m p o n e n t o f t h e c o m p u t e r n e t w o r k p r o v i d e s i n p u t , o u t p u t , c o n t r o l , o r s t o r a g e r e s o u r c e s t o t h e s e r v i c e s a n d c o m m u n i c a t i o n s n e t w o r k . T h e p r i m a r y h o s t c o m m u n i c a t i o n s o ft w a r e i s c a l l e d t h e N e tw o r k Access Method (NAM).
/0™B\
Services Network Computer Network
Communications Network
Figure 1-1. Overview of a CDC Network
60499500 R l - l
COMMUNICATIONS NETWORK
The communications network includes network proc essing units (NPUs) and the connecting communication l i n e s n e e d e d t o t r a n s p o r t b l o c k s o f d a t a b e t w e e n h o s t c o m p u t e r s a n d t e r m i n a l s . T h e p r i m a r y C D C
s o f t w a r e i n a n N P U i s c a l l e d t h e C o m m u n i c a t i o n s Control Program (CCP).
The size and complexity of a communications network varies from a simple network with one local (front- end) NPU, or a network with one local NPU and one or more remote NPUs, to a more complex network with m u l t i p l e l o c a l N P U s a n d m u l t i p l e r e m o t e N P U s . Attached to these NPUs are terminal devices, such a s e n t r y / d i s p l a y s t a t i o n s .
Because the communications network minimizes termi nal type dependency and removes many of the terminal s w i t c h i n g o p e r a t i o n s f r o m t h e h o s t , t h e h o s t c a n process data more efficiently.
SERVICES NETWORK
The services network consists of the network appli cation programs in each host computer and the users of those programs. Each application program gives the terminal user or another application a specific d a ta p r o ce ssi ng ca pa b i l i ty.
SOFTWARE COMPONENTS OF THE NETWORK
Figure 1-2 shows the interfaces between the elements o f t h e n e t w o r k . T h e l e f t p a r t o f t h e fi g u r e s h o w s the network host software elements, which are the software elements located in the CDC CYBER 170 host computer. The middle section shows the Communi cations Control Program (CCP), which is the software element located in the network processing unit. As s h o w n i n t h e r i g h t p o r t i o n o f fi g u r e 1 - 2 , C C P communicates with the terminals while the Network Access Method (NAM) communicates with application p r o g r a m s . R e f e r t o fi g u r e 1 - 2 w h i l e r e a d i n g t h e r e m a i n d e r o f t h i s o v e r v i e w s e c t i o n o n n e t w o r k products.
T h e n e t w o r k h o s t s o f t w a r e i s c o l l e c t i v e l y c a l l e d the Network Access Method or NAM. NAM is used in several contexts throughout this manual and in the other network products documentation. NAM can refer to the interface between application programs and t h e c o m m u n i c a ti o n s n e tw o r k ; to th e p r o g r a m s th a t implement that interface, including the Applications I n t e r f a c e P r o g r a m ( A I P ) , t h e N e t w o r k I n t e r f a c e Program (NIP), and the Peripheral Interface Program (PIP); or to the product NAM, which also includes t h e N e t w o r k S u p e r v i s o r ( N S ) , t h e C o m m u n i c a t i o n s Supervisor (CS), and the Network Validation Facility (NVF).
I n fi g u r e 1 - 2 , N A M r e f e r s t o t h e s e t o f p r o g r a m s that implement the interface between the application programs and communications network.
N e t w o r k h o s t s o f t w a r e , s h o w n i n t h e l e f t p a r t o f fi g u r e 1 - 2 , i n c l u d e s :
Network Access Method
Network Definition Language Processor 1-2
Network Supervisor Communications Supervisor N e t w o r k Va l i d a t i o n F a c i l i t y N e t w o r k u t i l i t i e s
Network Access Method application programs CYBER Cross System
NETWORK ACCESS METHOD
The Network Access Method is the primary network host software. NAM interfaces between applications in the same host or between applications and the Communications Control Program in an NPU.
Because the connections among NPUs can become extremely complex, the Network Access Method acts as an interface between host computer software at o n e e n d o f t h e n e t w o r k a n d t h e t e r m i n a l s a t t h e other end.
A s i m p l e f r o n t - e n d N P U c o n fi g u r a t i o n a p p e a r s t h e same through the Network Access Method as a more complex linkage system; message routing by the host computer is performed in the same manner for both c o n fi g u r a t i o n s . T h e p h y s i c a l a n d l o g i c a l c o n fi g u ration of the elements involved in Network Access Method operation Is described in the Network Defi n i t i o n L a n g u a g e r e f e r e n c e m a n u a l ( l i s t e d i n t h e p r e f a c e ) .
T h e h o s t c o m p u t e r e x e c u t e s C D C - w r i t t e n o r s i t e - written service programs called application programs that are connected to the network via the Network Access Method (NAM). An application program can c o m m u n i c a t e w i t h o t h e r a p p l i c a t i o n p r o g r a m s o r s e r v i c e t e r m i n a l s c o n n e c t e d t o t h e n e t w o r k . A l l c o n n e c t i o n s t o t h e n e t w o r k a r e e s t a b l i s h e d b y a portion of the network software called the Network Validation Facility, and the flow of data and proc essing along them is controlled through NAM.
NAM incorporates the following features:
• I t i s e q u a l l y s u i t a b l e f o r a p p l i c a t i o n p r o g r a m s written in COMPASS or high-level languages, such as FORTRAN.
e It i mp ose s no da ta st r uc tur es on an appl i cat i on program.
• I t p r o v i d e s a w a y t o h a n d l e u n p r e d i c t a b l e events, such as terminal operator interrupts.
• I t p r o v i d e s c o m p l e t e i s o l a t i o n o f n e t w o r k c o m munications from the operating system.
• I t s u p p o r t s d i s t i n c t c l a s s e s o f t e r m i n a l s b y n o r m a l i z i n g d a t a f o r m a t s a n d o p t i o n a l l y p e r forming code conversion. Seventeen classes are defined by CDC; additional classes can be de fined by sites that provide their own supporting
software.
• I t p e r m i t s a n a p p l i c a t i o n p r o g r a m t o s u p p o r t c l u s t e r s o f r e a l t e r m i n a l d e v i c e s a s i f t h e d e v i c e s w e r e s e p a r a t e l y a d d r e s s a b l e l o g i c a l e n t i t i e s c a l l e d v i r t u a l t e r m i n a l s . V i r t u a l t e r m i n a l s a r e d e s c r i b e d a t t h e e n d o f t h i s s e c t i o n .
60499500 R
"S
\
3 o o» I -i- Vt 01 o -» I +J o —'
CO -r- -r-
60499500 S 1-3
Basic services provided by NAM include:
Network Interface Program
N A M e s t a b l i s h e s m e s s a g e p a t h s ( l o g i c a l c o n n e c t i o n s ) b e t w e e n a n a p p l i c a t i o n p r o g r a m a n d terminals or between two applications (provided b o t h p a r t i e s h a v e t h e c o r r e c t n e t w o r k a c c e s s sec u r i t y p ermis si o n s) .
NAM breaks logical connections when asked to by the application program or the terminal, or when n e t w o r k c o n d i t i o n s m a k e i t n e c e s s a r y ( f o r e x ample, when a network shutdown occurs).
After logical connections have been established, NAM passes incoming messages to the application, and accepts and forwards outgoing messages from t h e a p p l i c a t i o n .
NAM queues incoming messages until the appli cation program requests them. This allows the a p p l i c a t i o n t o s e r v i c e i t s c o n n e c t i o n s w i t h terminals and other applications in any desired o r d e r.
N A M p r o v i d e s t h e a p p l i c a t i o n p r o g r a m w i t h i t s own set of protocols, making knowledge of de tailed network protocols unnecessary.
For incoming traffic, NAM allows the application program to group terminals with similar or re lated processing needs.
NAM queues outgoing messages to regulate data flow through the network.
N A M d e t e c t s i n a c t i v i t y o n a n y i n t e r a c t i v e d a t a p a t h a n d r e p o r t s t h e c o n d i t i o n t o t h e a p p l i cation program.
NAM resolves resource contention among appli cation programs.
A n i n s t a l l a t i o n o p t i o n i s a v a i l a b l e t o l o g m e s s a g e traffic for application program debugging. A second i n s t a l l a t i o n o p t i o n p e r m i t s t h e l o g g i n g o f a p p l i cation program and message traffic statistics.
NAM consists of four major modules:
Peripheral Interface Program Network Interface Program Application Interface Program Queued Terminal Record Manager
Peripheral Interface Program
The Peripheral Interface Program (PIP) is a periph e r a l p r o c e s s o r u n i t p r o g r a m t h a t i n t e r f a c e s t h e central processor executed routines of NAM to the channel-connected local NPUs.
PIP moves blocks of data between the central memory buffers of NAM and the NPU and reads and writes disk
| fi l e s u s e d b y b a t c h d e v i c e s o r f o r fi l e t r a n s f e r.
PIP also can detect when a local NPU needs initial i z i n g . I f t h e N P U c a n n o t s t a r t i t s o w n l o a d i n g , P I P r e q u e s t s t h e n e t w o r k s u p e r v i s o r t o l o a d t h e bootstrap program into the NPU.
1-4
The Network Interface Program (NIP) executes as a s y s t e m c o n t r o l p o i n t . N I P c o o r d i n a t e s t h e u s e o f the communications network by all application pro grams, buffers data between the application programs and the network, and manages the logical connec
tions .
Each application program can have several connec tions; each connection is associated with a terminal d e v i c e o r w i t h a n o t h e r a p p l i c a t i o n p r o g r a m . N I P translates between network addresses and the more c o n v e n i e n t l o g i c a l a d d r e s s e s t h a t r e p r e s e n t t h e connection to the application. NIP also establishes new connections as they are requested and terminates connections that are no longer needed or that have f a i l e d .
An application can request NAM to convert the data o n a l o g i c a l c o n n e c t i o n f r o m t h e n e t w o r k f o r m a t . Such conversions determine the format and encoding of characters seen by the application.
Application Interface Program
The Application Interface Program (AIP) is a set of subprograms and buffers that resides in the appli c a t i o n p r o g r a m ' s fi e l d l e n g t h a n d p r o v i d e s a n i n t e r f a c e t o N I P a n d t h e n e t w o r k . T h i s m a n u a l i s primarily concerned with the use of AIP.
AIP statements are provided so that the application program can connect to and disconnect from the net w o r k . A I P s t a t e m e n t s a l s o c o n t r o l i n f o r m a t i o n exchange between the application program and NAM b u f f e r s . T h i s i n f o r m a t i o n c a n b e d a t a , o r i t c a n be supervisory messages that coordinate the appli c a t i o n ' s e x e c u t i o n w i t h e v e n t s t h a t h a v e o c c u r r e d in the network. NAM might pass a supervisory mes sage to inform the application of a new connection t h a t i s r e q u e s t i n g s e r v i c e , o r t h a t a f a i l u r e h a s occurred. In the same way, the application program uses supervisory messages to communicate with NAM and the network elements.
Queued Terminal Record Manager
The Queued Terminal Record Manager (QTRM) is a set of subprograms that resides in the application pro g r a m ' s fi e l d l e n g t h a n d p r o v i d e s a h i g h l e v e l p r o c e d u r a l i n t e r f a c e t o t h e n e t w o r k . T h i s p a c k a g e p e r m i t s i n d i r e c t u s e o f a s u b s e t o f A I P ' s f e a t u r e s b y p r o g r a m s w i t h u n s o p h i s t i c a t e d c o m m u n i c a t i o n s r e q u i r e m e n t s . T h i s u t i l i t y p e r m i t s p r o g r a m s t o have a communications interface functionally similar to their mass storage interface. QTRM is discussed in section 8 of this book.
NETWORK DEFINITION LANGUAGE PROCESSOR
Before the network software can route data through t h e n e t w o r k a n d i n t e r f a c e t o o p e r a t o r s f o r s u p e r v i s i o n , t h e d e fi n i t i o n o f t h e n e t w o r k c o n fi g u a t i o n m u s t fi r s t b e c o m m u n i c a t e d t o t h e s o f t w a r e . T h e Network Definition Language (NDL) is used to de s c r i b e t h i s c o n fi g u r a t i o n . T h e N e t w o r k D e fi n i t i o n Language processor (NDLP), a batch utility, trans l a t e s t h i s c o n fi g u r a t i o n a n d p r e p a r e s a n e t w o r k c o n fi g u r a t i o n fi l e ( N C F ) a n d a l o c a l c o n fi g u r a t i o n fi l e ( L C F ) .
60499500 S
The NCF contains configuration information required by the network.
The LCF contains host information required by the Network Validation Facility, such as automatic login p a r a m e t e r s a n d a p p l i c a t i o n i n f o r m a t i o n . T h e L C F a l l o w s t h e n e t w o r k v a l i d a t i o n f a c i l i t y t o v a l i d a t e a n d c o n n e c t t e r m i n a l s t o a p p l i c a t i o n s o r a p p l i c a t i o n s t o a p p l i c a t i o n s .
T h e N D L i s d e s c r i b e d i n t h e N e t w o r k D e fi n i t i o n Language reference manual listed in the preface.
NETWORK SUPERVISOR
T h e N e t w o r k S u p e r v i s o r ( N S ) e x e c u t e s a s a N A M a p p l i c a t i o n . I t i n t e r f a c e s b e t w e e n t h e N P U s a n d CCP program files in the host. NS loads an NPU on request with the appropriate copy of the Communi c a t i o n s C o n t r o l P r o g r a m f r o m t h e h o s t ' s n e t w o r k load file (NLF). NS also saves NPU dumps in the host's network dump file (NDF). The load and dump files are shown in figure 1-2.
The host operator can obtain status information for N P U l o a d i n g o r d u m p i n g o p e r a t i o n s i n v o l v i n g t h e copy of NS in the operator's host. More than one host can run a copy of NS; so that NS can load NPUs which are not accessible from a specific host.
COMMUNICATION SUPERVISOR
The Communication Supervisor (CS) program executes as a NAM application. It can communicate with the n e t w o r k o p e r a t o r s ( N O P ) . C S a l l o w s a n e t w o r k operator at a terminal (an NPU operator or a diag nostic operator [DOP]) or at a host console (a host operator [HOP]) to obtain and change the status of network elements under its supervision, to communi c a t e w i t h u s e r s a t t e r m i n a l s , a n d t o r u n d i a g n o s t i c s . C S a l s o r e s p o n d s t o r e q u e s t s f o r n e t w o r k configuration data from an NPU.
CS can run in one or more hosts. It also assists
| the NPUs by providing them with terminal configura t i o n i n f o r m a t i o n f r o m t h e n e t w o r k c o n fi g u r a t i o n fi l e .
NETWORK VALIDATION FACILITY
The Network Validation Facility (NVF) also executes a s a N A M a p p l i c a t i o n . I t v a l i d a t e s t h e t e r m i n a l u s e r ' s a c c e s s t o t h e h o s t a n d a n a p p l i c a t i o n p r o g r a m ' s a c c e s s t o t h e c o m p u t e r n e t w o r k . N V F a l s o m a i n t a i n s a n d r e p o r t s a p p l i c a t i o n s t a t u s t o t h e host operator (HOP). As figure 1-2 shows, the NOS v a l i d a t i o n fi l e a n d t h e l o c a l c o n fi g u r a t i o n fi l e (LCF) supply validation information to NVF.
N V F v e r i fi e s s u c h t e r m i n a l u s e r i n f o r m a t i o n a s f a m i l y n a m e , u s e r n a m e , a n d p a s s w o r d . B e f o r e a t e r m i n a l u s e r c a n a c c e s s a n a p p l i c a t i o n p r o g r a m ,
| s u c c e s s f u l l o g i n m u s t o c c u r . W h e n l o g i n i s s u c c e s s f u l l y c o m p l e t e d , t h e N e t w o r k Va l i d a t i o n F a c i l i t y c a u s e s N A M t o n o t i f y t h e a p p l i c a t i o n p r o g r a m i d e n t i fi e d i n t h e l o g i n s e q u e n c e t h a t a terminal requests connection.
T h e N e t w o r k V a l i d a t i o n F a c i l i t y a l s o p e r f o r m s switching between application programs. NVF causes terminal disconnection processing when disconnection i s a p p r o p r i a t e .
T h e N e t w o r k Va l i d a t i o n F a c i l i t y c o n t r o l s a p p l i c a t i o n p r o g r a m a n d t e r m i n a l a c c e s s t o t h e n e t w o r k , a s f o l l o w s :
• A n a p p l i c a t i o n p r o g r a m w i s h i n g t o c o m m u n i c a t e with terminals requests access to the network.
This request is passed by NAM to the NVF for v a l i d a t i o n . ( N V F a l s o p e r f o r m s s i m i l a r v a l i d a t i o n o f t e r m i n a l r e q u e s t s f o r h o s t a c c e s s . ) O n c e N V F h a s d e t e r m i n e d t h a t a n a p p l i c a t i o n program or terminal is allowed to use the host's r e s o u r c e s , i t m a k e s c a l l s t o N A M t h a t c r e a t e t h e l o g i c a l c o n n e c t i o n f o r t h e t r a n s f e r o f d a t a between the application program and the network.
NVF also requests NAM to modify or delete these connections when terminal users request to com m u n i c a t e w i t h o t h e r a p p l i c a t i o n p r o g r a m s o r leave the network.
• W h e n a n a p p l i c a t i o n p r o g r a m n o l o n g e r d e s i r e s t o us e t he n etw o rk , i t c al l s another NAM pro c e d u r e . T h i s r e q u e s t a l s o i s p a s s e d t o N V F, which causes NAM to delete all connections used f o r t h e a p p l i c a t i o n p r o g r a m - j u s t a s i t d o e s f o r a t e r m i n a l o r t e r m i n a l d e v i c e l e a v i n g t h e network.
NETWORK UTILITIES
F o u r u t i l i t y p r o g r a m s e i t h e r a r e i n c l u d e d w i t h o r used by network host products:
The Network Dump Analyzer (NDA) The Load File Generator (LFG) The Debug Log File Processor (DLFP) The Hardware Performance Analyzer (HPA)
Network Dump Analyzer
The network dump analyzer (NDA) produces a formatted printout from NPU dump files created by the Network S u p e r v i s o r. T h e s i t e a n a l y s t c a n u s e t h e s e d u m p s to help analyze CCP software or NPU hardware fail ures. The network dump analyzer uses the network d u m p fi l e ( N D F ) , w h i c h i s s h o w n i n fi g u r e 1 - 2 , a s i n p u t .
You can find more information about the NPU dump a n a l y z e r i n t h e N O S Ve r s i o n 2 A n a l y s i s H a n d b o o k | l i s t e d i n t h e p r e f a c e .
Load File Generator
The load file generator (LFG) reformats CCP program files produced by the CDC CYBER Cross System's link and edit programs into a single random access file used by the Network Supervisor to load NPUs. This fi l e i s t h e n e t w o r k l o a d fi l e ( N L F ) , w h i c h i s o n e of the NPU files shown in figure 1-2.
Yo u c a n fi n d m o r e i n f o r m a t i o n a b o u t t h e l o a d fi l e g e n e r a t o r i n t h e N O S I n s t a l l a t i o n H a n d b o o k l i s t e d in the preface.
60499500 S 1-5
Debug Log File Processor
T h e d e b u g l o g fi l e p r o c e s s o r ( D L F P ) c o n v e r t s t h e d e b u g l o g fi l e g e n e r a t e d b y t h e A p p l i c a t i o n I n t e r face Program into a printable report. The program mer can selectively list logged information through DLFP directives.
You can find more information about the debug log file processor in section 6 of this manual.
Hardware Performance Analyzer
A fourth utility program, the hardware performance analyzer (HPA), is part of the NOS operating system.
T h i s u t i l i t y p r o g r a m p r o d u c e s r e p o r t s f r o m i n f o r m a t i o n o n t h e a c c o u n t a n d e r r o r l o g d a y fi l e s . N e t w o r k p r o d u c t s s o f t w a r e m a k e s s t a t i s t i c a l , e r r o r,
and alarm message entries into these dayfiles.
You can find more information about the hardware performance analyzer in the HPA reference manual
l i s t e d i n t h e p r e f a c e .
NAM APPLICATION PROGRAMS
T h e h o s t c o m p u t e r e x e c u t e s C D C - w r i t t e n o r s i t e - written service programs called application programs that are connected to the network through NAM. An a p p l i c a t i o n p r o g r a m c a n c o m m u n i c a t e w i t h o t h e r application programs or terminals connected to the network.
The CDC-provided NAM application programs are:
I n t e r a c t i v e F a c i l i t y ( I A F ) , w h i c h a l l o w s y o u t o create files and to create or execute programs from a device without using card readers or line printers. IAF is described in Volumes 1 and 3 of the NOS 2 Reference Set.
CDC CYBER CROSS SYSTEM SOFTWARE
The CDC CYBER Cross System software allows you to i n s t a l l , m o d i f y, a n d m a i n t a i n t h e C C P s o f t w a r e . I t is composed of these programs:
PA S C A L , w h i c h i s a c o m p i l e r p a t t e r n e d a f t e r ALGOL-60. By using PASCAL, you can define tasks in statements that are processed by the compiler t o y i e l d a v a r i a b l e n u m b e r o f a c t u a l p r o g r a m i n s t r u c t i o n s .
Formatter, which reformats PASCAL output into an object code format compatible with the com munications processor macro assembler output Macro Assembler, which assembles communications p r o c e s s o r m a c r o m e m o r y s o u r c e p r o g r a m s a n d produces relocatable binary output. The source p r o g r a m s a r e w r i t t e n w i t h s y m b o l i c m a c h i n e , pseudo, and macro instructions.
M i c r o A s s e m b l e r, w h i c h p r o v i d e s t h e l a n g u a g e needed to write a micro memory program. This a s s e m b l e r t r a n s l a t e s s y m b o l i c s o u r c e p r o g r a m i n s t r u c t i o n s i n t o o b j e c t m a c h i n e i n s t r u c t i o n s . Link Editor, which accepts object program mod ules and generates a memory image, suitable for executing in the 255x NPU.
A u t o l i n k u t i l i t y , w h i c h s i m p l i fi e s p r o g r a m assignment and maximizes the amount of space assigned to handling buffers.
Expand utility, which includes several hardware and software variables used to define a CCP load file for a given NPU configuration.
S e e t h e p r e f a c e f o r m a n u a l s t h a t c o n t a i n m o r e information on the CDC CYBER Cross System.
Remote Batch Facility (RBF), which permits you t o e n t e r a j o b fi l e f r o m a r e m o t e c a r d r e a d e r a n d t o r e c e i v e j o b o u t p u t a t a r e m o t e b a t c h device. RBF is described in the Remote Batch Facility reference manual.
Tr a n s a c t i o n F a c i l i t y ( TA F ) , w h i c h p e r m i t s y o u t o i m p l e m e n t o n - l i n e t r a n s a c t i o n p r o c e s s i n g under NOS by writing programs to be used by t e r m i n a l s . T A F i s d e s c r i b e d i n t h e T A F reference manual.
Te r m i n a l V e r i fi c a t i o n F a c i l i t y ( T V F ) , w h i c h p r o v i d e s t e s t s y o u c a n u s e t o v e r i f y t h a t a n i n t e r a c t i v e c o n s o l e i s s e n d i n g a n d r e c e i v i n g d a t a c o r r e c t l y. T V F i s d i s c u s s e d i n t h e Te r minal Interfaces reference manual.
Message Control System (MCS), which allows you to queue, route, and journal messages between COBOL programs and terminals. MCS is described in the Message Control System reference manual.
T h e q u e u e fi l e t r a n s f e r f a c i l i t y ( Q T F ) , w h i c h a l l o w s y o u t o t r a n s f e r q u e u e fi l e s b e t w e e n h o s t s . T h e u s e o f t h i s f e a t u r e i s d e s c r i b e d i n
the NOS Version 1 Reference Set, Volume 3.
P e r m a n e n t F i l e Tr a n s f e r F a c i l i t y ( P T F ) , w h i c h allows you to transfer permanent files between w a i t s . T h e u s e o f t h i s f e a t u r e i s d o c u m e n t e d
in the NOS Version 2 Reference Set, Volume 3.
NETWORK PROCESSING UNIT AND COMMUNICATIONS CONTROL PROGRAM
T h i s s u b s e c t i o n d i s c u s s e s t h e f o l l o w i n g n e t w o r k p r o d u c t s , w h i c h a r e p a r t o f t h e c o m m u n i c a t i o n s n e t w o r k a n d a l l o w a t e r m i n a l t o a c c e s s t h e h o s t computer over communication lines:
The 255x series network processing unit (NPU), which connects a host to a terminal
The Communications Control Program (CCP), which is the software in the NPU
The middle portion of figure 1-2 shows the communi cations network.
NETWORK PROCESSING UNIT
An NPU handles front-end or remote data communica tions for the CDC CYBER 170 host. The Communica tions Control Program resides within the NPU.
To understand CCP, you must have a basic under standing of the hardware on which CCP runs. Refer to the hardware manuals listed in the preface for a description of the hardware components of the NPU.
1-6 60499500 S