• Keine Ergebnisse gefunden

NETWORK PRODUCTSNETWORK ACCESS METHODVERSION 1HOST APPLICATION PROGRAMMINGREFERENCE MANUAL

N/A
N/A
Protected

Academic year: 2022

Aktie "NETWORK PRODUCTSNETWORK ACCESS METHODVERSION 1HOST APPLICATION PROGRAMMINGREFERENCE MANUAL"

Copied!
356
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

60499500

CONTRpL DATA

/ g ^ N

NETWORK PRODUCTS

NETWORK ACCESS METHOD VERSION 1

HOST APPLICATION PROGRAMMING REFERENCE MANUAL

CDC® OPERATING SYSTEM:

NOS 2

(2)

REVISION RECORD

Revision A (12/01/76) B (04/01/77) C (07/01/77) D (04/28/78) E (08/15/78) F (12/18/78) G (01/15/79) H (08/10/79) J (12/11/79) K (04/18/80) L (10/31/80) M (05/29/81) N (02/26/82) P (01/14/83)

R (09/30/83) S (09/19/84) T (09/30/85) U (12/16/85) V (07/31/86) W (04/23/87)

D e s c r i p t i o n

Original Release. PSR level 439.

Revised to PSR level 446 for technical corrections.

Revised to PSR level 452 for technical corrections.

Completely revised for NAM Version 1.1 release at PSR level 472 to include support of remote and foreign NPUs, asynchronous and HASP TIPs, virtual terminals, IAF, and TVF.

Revised at PSR level 477 for technical corrections.

Revised at PSR level 485 for technical corrections.

Revised at PSR level 485 for additional technical corrections.

Revised to reflect release of NAM Version 1.2. Included are descriptions of the binary debug log file and postprocessor, special editing support, and QTRM.

Revised to reflect addition of connection duplexing, upline block truncation, block header break markers, QTRM connection switching, and various technical corrections.

Revised at PSR level 517 to reflect the addition of 714 printer support, and various t e c h n i c a l c o r r e c t i o n s .

Revised at PSR level 528 to reflect the addition of QTRM support of application-to- a p p l i c a t i o n c o n n e c t i o n s , t h e u s e r - i n t e r r u p t c a p a b i l i t y, a n d v a r i o u s t e c h n i c a l

c o r r e c t i o n s .

Revised for NAM Version 1.3 release at PSR level 541 to include 2780/3780 terminal support, changes to supervisory messages, PRU interface, and various technical c o r r e c t i o n s .

Revised at PSR level 559 to reflect release of NAM Version 1.4, which supports NOS Version 2.0 and includes the disable flag parameter on the LST/HDX/R supervisory message and miscellaneous technical corrections.

Revised at PSR level 580 to reflect release of NAM Version 1.5 and CCP Version 3.5, which run only under the NOS Version 2 operating system. This manual, which was previously known as the NAM Reference Manual, is no longer applicable to products operating under NOS 1. It has been reorganized to document information needed by a general networks user, who must consider NAM as well as CCP when writing a network application. This is a complete reprint.

Revised at PSR level 596 to reflect release of NAM Version 1.6 and CCP Version 3.6, supporting multiple-host networks. This is a complete reprint.

Revised at PSR level 617 to reflect release of NAM Version 1.7 and CCP Version 3.7 to document support of a 3270 bisynchronous terminal class and miscellaneous technical c o r r e c t i o n s .

Revised at PSR level 642 to reflect release of NAM Version 1.8 and CCP Version 3.8. This manual was previously known as the NAM Version 1/CCP Version 3 Host Application

Programming Reference Manual. Miscellaneous technical changes are included.

Revised at PSR level 647 to reflect release of NAM Version 1.8, CCP Version 3.8, and CDCNET Version 1.0. Miscellaneous technical corrections are included.

Revised at PSR level 664 to reflect release of NAM Version 1.8, CCP Version 3.8, and CDCNET Version 1.1. Miscellaneous technical, corrections are included.

Revised at PSR level 678 to reflect release of NAM Version 1.8, CCP Version 3.8, and CDCNET Version 1.2. Miscellaenous technical corrections are included.

REVISION LETTERS I, 0, Q, AND X ARE NOT USED

©COPYRIGHT CONTROL DATA CORPORATION 1976, 1977, 1978, 1979, 1980, 1981, 1982, 1983, 1984, 1985, 1986, 1987 All Rights Reserved

Printed in the United States of America

Address comments concerning this manual to:

CONTROL DATA CORPORATION

Technology and Publications Division P. 0. BOX 3492

SUNNYVALE, CALIFORNIA 94088-3492

or use Comment Sheet in the back of this manual

/-*a^.

i i 60499500 W

(3)

LIST OF EFFECTIVE PAGES

New features, as well as changes, deletions, and additions to information in this manual are indicated by bars in the margins or by a dot near the page number if the entire page is affected. A bar by the page number indicates pagination rather than content has changed.

Page Front Cover Title Page i i

i i i / i v v v i v i i / v i i i

i x t h r u x i i x i i i / x i v

X V

1-1

1-2 thru 1-6 1-7

1-8 1-8.1 1 - 8 . 2

1-9 thru 1-14 2-1

2-2 2-3 2-4 2-5 2-6 2-7 2-8 2^9 2-10 2-11

2-12 thru 2-14 2-15 thru 2-18 2-19

2-20 2-21

2-22 thru 2-25 2-26

2-27 2-28 2-29

2-30 thru 2-33 2-34

2-35

2-36 thru 2-39 3-1

3-2 thru 3-6 3-7 thru 3-10 3-11

3-12

3-12.1/3-12.2 3-13 thru 3-16 3-17

3-18 thru 3-21 3-22

3-23 3-24 3-25 3-26 3-27 3-28

Revision Page

-

3-29

-

3-30

W 3-30.1

W 3-30.2

V 3-31

u

3-32 thru 3-44

V 3-45

V 3-46

V 3-47 thru 3-50

T 3-51 thru 3-53

R 3-54 thru 3-57

U 3-58

V 3-59

V 3-60

U 3-61

U 3-62 thru 3-68

T 3-68.1 thru 3-68.6

U 3-69 thru 3-79

R 3-80

R 3-81

T 4-1

R 4-2

T 4-3

R 4-4

T 4 - 4 . 1 / 4 - 4 . 2

R 4-5 thru 4-10

U 4 - 1 0 . 1

T 4 - 1 0 . 2

S 4-11 thru 4-15

U 4-16

V 4-17 thru 4-19

U 5-1

S 5-2

T 5-3

W 5-4

T 5-5

W 5-6

T 5-7 thru 5-11

W 5-12

V 5-13

U 5-14

T 5-15

U 5-16

V 5-17

U 6-1

V 6-2

V 6-3

U 6 - 4

T 6-5

V 6-6

T 6-7

V 6-8

W 6-9

W 6-10

T 6-11

V 6-12

W 6-13 thru 6-15

W 6-16

Revision Page

V 6-17

V 7-1 thru 7-15

V 7-16

V 7-17 thru 7-24

V 7-25

T 7-26 thru 7-38

V 8-1

V 8-2 thru 8-12

T 8-13

V 8-14 thru 8-34

T 8 - 3 4 . 1

V 8 - 3 4 . 2

V 8 - 3 4 . 3 / 8 - 3 4 . 4

U 8-35 thru 8-66

W A-l thru A-3

V A-4

V A-5 thru A-19

U A-20 thru A-23

V A-24 thru A-32

U A-33 thru A-36

R A-3 7

R A-3 8

W A-3 9

W A-40 thru A-46

W A-47

V A-48

V B - l

V B-2

T B-2.1/B-2. 2

V B-3

T B-4

R B-5

V B-6

W B-7 thru B-9

R C-l thru C-l3

R D - l

T D-2

R Index-1 thru -6

T Comment Sheet/Mail

R Back Cover

T T R T T V T T S S R R T W R V R V

Revision R R T R T R R V w V V V V T R

S R S T R T T S R S R W H W T T V V T

U

V V V W

60499500 W

i i i / i v

(4)

r j

i^k

r>

^

0 * \

(5)

PREFACE

/fP^>N-

This manual supplies reference information to both Network Access Method (NAM) Version 1.7 and Commu

nications Control Program (CCP) Version 3.7 users, t y p i c a l l y e i t h e r p r o g r a m m e r s o r a n a l y s t s w h o a r e writing a network application or who would like to l e a r n m o r e a b o u t h o w t h e v a r i o u s p o r t i o n s o f t h e n e t w o r k fi t t o g e t h e r.

T h i s m a n u a l d e s c r i b e s h o w a p p l i c a t i o n p r o g r a m s interface to the computer network. The NAM 1/CCP 3 Te r m i n a l I n t e r f a c e r e f e r e n c e m a n u a l d e s c r i b e s h o w t h e t e r m i n a l u s e r g a i n s a c c e s s t o t h e s e a p p l i c a t i o n s . A l s o , t h i s m a n u a l f a m i l i a r i z e s t h e r e a d e r w i t h t h e n e t w o r k p r o c e s s i n g u n i t ( N P U ) a n d t h e Communications Control Program (CCP). Knowledge of the NPU and CCP, however, is not necessary to write an application program.

NAM and CCP operate under control of the NOS 2 operating system for the CONTROL DATA® CYBER 180 Computer Systems; CYBER 170 Computer Systems; CDC ® CYBER 70 Computer System models 71, 72, 73, and 74;

and 6000 Computer Systems.

N A M i s t h e s u b s e t o f t h e h o s t c o m p u t e r s o f t w a r e that provides communication between an application p r o g r a m i n t h e h o s t c o m p u t e r a n d o t h e r a p p l i c a t i o n p r o g r a m s o r d e v i c e s a c c e s s i n g t h e n e t w o r k ' s resources.

The Communications Control Program is software that r e s i d e s i n a 2 5 5 x s e r i e s n e t w o r k p r o c e s s i n g u n i t t h a t a l l o w s a d e v i c e t o a c c e s s t h e h o s t c o m p u t e r over communications lines.

WHO SHOULD READ THIS MANUAL

This manual is directed at a programmer or analyst w h o i s f a m i l i a r w i t h s u b s y s t e m a p p l i c a t i o n s p r o g r a m m i n g , c o m p i l e r a n d a s s e m b l e r p r o g r a m m i n g conventions, terminal communication protocols, other n e t w o r k s o f t w a r e p r o d u c t s , a n d t h e p r o g r a m m i n g

requirements of supported devices.

HOW THIS MANUAL IS ORGANIZED

S e c t i o n 1 i n t r o d u c e s t h e N A M a n d C C P s o f t w a r e . S e c t i o n 2 d e s c r i b e s t h e p r o t o c o l s g o v e r n i n g i n f o r mation exchanged for communication between NAM and e a c h a p p l i c a t i o n p r o g r a m , a n d b e t w e e n a p p l i c a t i o n programs and their connections. Section 3 describes the synchronous and asynchronous supervisory mes s a g e s u s e d b y a p p l i c a t i o n p r o g r a m s . S e c t i o n 4 d e s c r i b e s t h e l a n g u a g e a n d i n t e r n a l i n t e r f a c e s required by an application program. Section 5 dis cusses the application interface program statements used by NAM to access the network and to send and receive messages. Section 6 discusses the structure a n d e x e c u t i o n o f a n a p p l i c a t i o n p r o g r a m j o b a s a b a t c h o r s y s t e m o r i g i n t y p e fi l e . S e c t i o n 7 contains a FORTRAN program using AIP; section 8 d e s c r i b e s Q T R M . S e c t i o n 9 d e s c r i b e s n e t w o r k failure and techniques of recovery.

Additional reference information for the Communica tions Control Program can be found in other network p r o d u c t a n d o p e r a t i n g s y s t e m p u b l i c a t i o n s . U s e t a b l e 0 - 1 t o l o c a t e t h i s i n f o r m a t i o n .

TABLE 0-1. LOCATION OF CCP REFERENCE INFORMATION

I n f o r m a t i o n

Manual That Contains Information NOS

Version 2 Adminis t r a t i o n Handbook

NAM 1/CCP 3 Te r m i n a l

I n t e r f a c e s Reference Manual

NOS Version 2 System Analysis Handbook

Communicat ions Control Pro gram Version 3 D i a g n o s t i c Handbook

NOS Version 2

Opera t i o n s Handbook

Communications Control Program I n t e r n a l Maintenance Specif icatlont CCP overview, concepts,

and functions Character sets CCP glossary Mnemonics

S t a t i s t i c s Halt Codes

60499500 S

(6)

TABLE 0-1. LOCATION OF CCP REFERENCE INFORMATION (Contd)

I n f o r m a t i o n

Manual That Contains Information NOS

Version 2 Adminis t r a t i o n Handbook

NAM 1/CCP 3 Te r m i n a l I n t e r f a c e s Reference Manual

NOS Version 2 System Analysis Handbook

Communications Control Pro gram Version 3 D i a g n o s t i c Handbook

NOS ' Version 2 Opera t i o n s Handbook

Communications Control Program I n t e r n a l Maintenance S p e c i fi c a t l o n t D i a g n o s t i c s

Customer Engineering error messages Dump information NPU operating

i n s t r u c t i o n s Memory map

Naming conventions NPU dumping, loading, a n d i n i t i a l i z i n g d e t a i l s

tAvailable from Software Manufacturing Distribution (SMD), 4201 Lexington Ave. North, Arden Hills, Minnesota 55112

RELATED PUBLICATIONS

R e l a t e d m a t e r i a l i s c o n t a i n e d i n t h e p u b l i c a t i o n s listed below. Other manuals may be needed, such as the hardware, firmware, or emulator software refer e n c e m a n u a l f o r t h e d e v i c e s s e r v i c e d b y a g i v e n program. Also, communication standards and device operating literature can be useful.

The Software Publications Release History gives the t i t l e s a n d r e v i s i o n l e v e l s o f s o f t w a r e m a n u a l s available for the Programming System Report (PSR) level of NOS 2 and its product set installed at your s i t e .

The following manuals are of primary interests

P u b l i c a t i o n P u b l i c a t i o n

Number Network Products

Network Access Method Version Network Definition Language

Reference Manual 60480000

Network Products

Network Access Method Version 1/

Communications Control Program Version 3

Terminal Interfaces Reference Manual 60480600

NOS Version 2 Reference Set, Volume 1

Introduction to Interactive Usage 60459660

NOS Version 2 Reference Set, Volume 3

System Commands 60459680

NOS Version 2 Reference Set, Volume 4

Program Interface 60459690

v i 60499500 S

(7)

The following manuals are of secondary interest:

/ ^ ^

P u b l i c a t i o n

Communications Control Program Version 3 Diagnostic Handbook

COMPASS Version 3 Reference Manual COBOL Version 5 Reference Manual

CYBER Cross System Version 1 Build Utilities Reference Manual CYBER Cross System Version 1 Macro Assembler Reference Manual CYBER Cross System Version 1 Micro Assembler Reference Manual CYBER Cross System Version 1 PASCAL Reference Manual FORTRAN Version 5 Reference Manual

Hardware Performance Analyzer (HPA) User Reference Manual

Message Control System Version 1 Reference Manual

NOS Version 2 Diagnostic Index NOS Version 2

Installation Handbook NOS Version 2

Manual Abstracts NOS Version 2

Administration Handbook NOS Version 2

Operations Handbook NOS Version 2 Analysis Handbook Network Products

Remote Batch Facility Version 1 Reference Manual

Software Publications Release History TAF Version 1

Reference Manual

2551-1, 2551-2, 2552-2 Network Processor Unit Hardware Reference Manual

2560 Series Synchronous Communications Line Adapter Hardware Maintenance Manual

P u b l i c a t i o n Number 60471500 60492600 60497100 60471200 96836500 96836400 96836100 60481300 60459460 60480300 60459390 60459320 60485500 60459840 60459310 60459300

60499600 60481000 60459500 60472800 74700700

60499500 S v i i

(8)

P u b l i c a t i o n

P u b l i c a t i o n N u m b e r

2561 Series Asynchronous Communications

L i n e A d a p t e r H a r d w a r e M a i n t e n a n c e M a n u a l 7 4 7 0 0 9 0 0 2563 Series SDLC Line Adapter

H a r d w a r e M a i n t e n a n c e M a n u a l 7 4 8 7 3 2 9 0 C D C m a n u a l s c a n b e o r d e r e d f r o m C o n t r o l D a t a C o r p o r a t i o n , L i t e r a t u r e a n d D i s t r i b u t i o n S e r v i c e s , 3 0 8 N o r t h D a l e S t r e e t , St. Paul, Minnesota 55103.

T h i s p r o d u c t i s i n t e n d e d f o r u s e o n l y a s described in this document. Control Data can n o t b e r e s p o n s i b l e f o r t h e p r o p e r f u n c t i o n i n g of undescribed features or parameters.

v i i i 6 0 4 9 9 5 0 0 R

(9)

CONTENTS

N O T A T I O N S x i i i

1 . N E T W O R K P R O D U C T S : A N O V E R V I E W 1 - 1

C o m p u t e r N e t w o r k 1 - 1

C o m m u n i c a t i o n s N e t w o r k 1 - 2

S e r v i c e s N e t w o r k 1 - 2

S o f t w a r e C o m p o n e n t s o f t h e N e t w o r k 1 - 2 N e t w o r k A c c e s s M e t h o d 1 - 2 P e r i p h e r a l I n t e r f a c e P r o g r a m 1 - 4 N e t w o r k I n t e r f a c e P r o g r a m 1 - 4 A p p l i c a t i o n I n t e r f a c e P r o g r a m 1 - 4 Q u e u e d Te r m i n a l R e c o r d M a n a g e r 1 - 4 N e t w o r k D e fi n i t i o n L a n g u a g e P r o c e s s o r 1 - 4 N e t w o r k S u p e r v i s o r 1 - 5 C o m m u n i c a t i o n S u p e r v i s o r 1 - 5 N e t w o r k V a l i d a t i o n F a c i l i t y 1 - 5

N e t w o r k U t i l i t i e s 1 - 5

N e t w o r k D u m p A n a l y z e r 1 - 5 L o a d F i l e G e n e r a t o r 1 - 5 D e b u g L o g F i l e P r o c e s s o r 1 - 6 H a r d w a r e P e r f o r m a n c e A n a l y z e r 1 - 6 N A M A p p l i c a t i o n P r o g r a m s 1 - 6 C D C C Y B E R C r o s s S y s t e m S o f t w a r e 1 - 6 Network Processing Unit and Communications

C o n t r o l P r o g r a m 1 - 6

N e t w o r k P r o c e s s i n g U n i t 1 - 6

| C o m m u n i c a t i o n s C o n t r o l P r o g r a m 1 - 7 B a s e S y s t e m S o f t w a r e 1 - 7

| S y s t e m A u t o s t a r t M o d u l e 1 - 7

S e r v i c e M o d u l e 1 - 8

H o s t I n t e r f a c e P r o g r a m 1 - 8 T e r m i n a l I n t e r f a c e P r o g r a m 1 - 8 L i n k I n t e r f a c e P r o g r a m 1 - 8 B l o c k I n t e r f a c e P r o g r a m 1 - 8 I n - L i n e a n d O n - L i n e D i a g n o s t i c s 1 - 8 N P U C o n s o l e D e b u g g i n g A i d s 1 - 8 P e r f o r m a n c e a n d S t a t i s t i c s P r o g r a m s 1 - 8

| T h e P a c k e t S w i t c h i n g N e t w o r k ( P S N ) 1 - 8

N A M C o n c e p t s 1 - 8

V i r t u a l T e r m i n a l s 1 - 9

L o g i c a l C o n n e c t i o n s 1 - 9

O w n i n g C o n s o l e s 1 - 1 0

N e t w o r k A c c e s s M e t h o d O p e r a t i o n 1 - 1 0 A p p l i c a t i o n P r o g r a m C o n c e p t s 1 - 1 2 C o n n e c t i o n P r o c e s s i n g F l o w 1 - 1 2 S u p p o r t e d T e r m i n a l s 1 - 1 2 2 . I N F O R M A T I O N P R O T O C O L S 2 - 1

I n f o r m a t i o n F l o w 2 - 1

S t r u c t u r e P r o t o c o l s 2 - 1 P h y s i c a l P r o t o c o l s a n d N e t w o r k B l o c k s 2 - 1 L o g i c a l P r o t o c o l a n d P h y s i c a l B l o c k s 2 - 1 N e t w o r k D a t a B l o c k s 2 - 2 T r a n s m i s s i o n B l o c k s 2 - 4 I n t e r a c t i v e T e r m i n a l I n p u t C o n c e p t s 2 - 4 L i n e M o d e O p e r a t i o n 2 - 4 B l o c k M o d e O p e r a t i o n 2 - 4 P h y s i c a l a n d L o g i c a l L i n e s 2 - 5 E n d - o f - L i n e I n d i c a t o r s 2 - 5 Multiple Logical Lines in One Message 2-5 E n d - o f - B l o c k I n d i c a t o r s 2 - 6 I n t e r a c t i v e Te r m i n a l O u t p u t C o n c e p t s 2 - 7

B a t c h D e v i c e D a t a 2 - 7

60499500 S

A p p l i c a t i o n - t o - A p p l i c a t i o n I n p u t a n d

O u t p u t C o n c e p t s 2 - 7

I n f o r m a t i o n I d e n t i fi c a t i o n P r o t o c o l s 2 - 7 A p p l i c a t i o n P r o g r a m M e s s a g e T y p e s 2 - 7 A p p l i c a t i o n B l o c k T y p e s 2 - 7 B l o c k B u f f e r A r e a s 2 - 8 B l o c k H e a d e r A r e a 2 - 8

B l o c k T e x t A r e a 2 - 8

C o n n e c t i o n I d e n t i fi e r s 2 - 9 A p p l i c a t i o n C o n n e c t i o n N u m b e r 2 - 9 A p p l i c a t i o n L i s t N u m b e r 2 - 9 Data Message Content and Sequence Protocols 2-10

I n t e r a c t i v e V i r t u a l T e r m i n a l D a t a 2 - 1 0 L i n e T u r n a r o u n d C o n v e n t i o n 2 - 1 1 Interactive Virtual Terminal Exchange

M o d e s 2 - 1 1

N o r m a l i z e d M o d e O p e r a t i o n 2 - 1 1 Upline Character Sets and Editing

M o d e s 2 - 1 2

D o w n l i n e C h a r a c t e r S e t s 2 - 1 4 P a g e W i d t h a n d P a g e L e n g t h 2 - 1 4 F o r m a t E f f e c t o r s 2 - 1 4 T r a n s p a r e n t M o d e O p e r a t i o n 2 - 1 9 A p p l i c a t i o n - t o - A p p l i c a t i o n

C o n n e c t i o n D a t a 2 - 2 2 . 1 A p p l i c a t i o n C h a r a c t e r T y p e s 2 - 2 3

C h a r a c t e r B y t e C o n t e n t 2 - 2 4 B l o c k H e a d e r C o n t e n t 2 - 2 4 Supervisory Message Content and Sequence

P r o t o c o l s 2 - 3 1

A s y n c h r o n o u s M e s s a g e s 2 - 3 5 S y n c h r o n o u s M e s s a g e s 2 - 3 6 B l o c k H e a d e r C o n t e n t 2 - 3 6 3 . S U P E R V I S O R Y M E S S A G E S 3 - 1

M e s s a g e M n e m o n i c s 3 - 1

M e s s a g e S e q u e n c e s 3 - 1

C o n n e c t i n g D e v i c e s t o A p p l i c a t i o n s 3 - 1 C o n n e c t i n g A p p l i c a t i o n s t o A p p l i c a t i o n s 3 - 1 4 M o n i t o r i n g C o n n e c t i o n s 3 - 2 4 . 1 T e r m i n a t i n g C o n n e c t i o n s 3 - 2 4 . 2 M a n a g i n g C o n n e c t i o n L i s t s 3 - 2 5

C o n t r o l l i n g L i s t P o l l i n g 3 - 2 5 C o n t r o l l i n g L i s t D u p l e x i n g 3 - 2 6 C o n t r o l l i n g D a t a F l o w 3 - 2 9 M o n i t o r i n g D o w n l i n e D a t a 3 - 2 9 Controlling or Bypassing Upline and

D o w n l i n e D a t a 3 - 3 5

Discarding Upline and Downline Data o n A p p l i c a t l o n - t o - A p p l i c a t i o n

C o n n e c t i o n s 3 - 3 5

Discarding Downline Data on

D e v i c e - t o - A p p l i c a t i o n C o n n e c t i o n s 3 - 3 5 Bypassing Downline Data on an

A p p l i c a t i o n - t o - A p p l i c a t i o n

C o n n e c t i o n 3 - 3 5

Terminal Use of User Interrupts for

P r i o r i t y D a t a 3 - 3 8

C o n t r o l l i n g U p l i n e B l o c k C o n t e n t 3 - 3 9 C o n v e r t i n g a n d R e p a c k i n g D a t a 3 - 3 9 Repacking Synchronous Supervisory

M e s s a g e B l o c k s 3 - 4 1

Exchanging Transparent Data With Devices 3-42 T r u n c a t i n g U p l i n e B l o c k s 3 - 4 2 M a n a g i n g D e v i c e C h a r a c t e r i s t i c s 3 - 4 3

i x

(10)

Changing Device Characteristics Requesting Device Characteristics Host Operator Commands

Host Shutdown Error Reporting

4. USER PROGRAM INTERFACE DESCRIPTIONS Language Interfaces

Parameter List and Calling Sequence Requirements

Predefined Symbolic Names Predefied Symbolic Values COMPASS Assembler Language

Application Interface Program Macro Call Formats

F i e l d A c c e s s U t i l i t i e s Compiler-Level Languages

Application Interface Program Subroutine Call Formats F i e l d A c c e s s U t i l i t i e s

Queued Terminal Record Manager U t i l i t i e s

I n t e r n a l I n t e r f a c e s

Application Interface Program and

Network Interface Program Communication Worklist Processing

Parallel Mode Operation Other Software Communication 5. APPLICATION INTERFACE PROGRAM

CALL STATEMENTS Syntax

Network Access Statements

Connecting to Network (NETON) Disconnecting From Network (NETOFF) Network Block Input/Output Statements

Specific Connections

Inputing to Single Buffer (NETGET) Inputing to Fragmented Buffer

Array (NETGETF)

Outputing From Single Buffer (NETPUT) Outputing From Fragmented Buffer

Array (NETPUTF) Connections on Lists

Inputing to Single Buffer (NETGETL) Inputing to Fragmented Buffer

Array (NETGTFL) Processing Control Statements

Suspending Processing (NETWAIT) Controlling Parallel Mode (NETSETP)

Checking Completion of Worklist Processing (NETCHEK)

3-45 Debugging Application Programs 6-6

3-54 F a t a l E r r o r s 6-6

3-56 Debugging Methods 6-6

3-60 Debug Log File and Associated

3-60 U t i l i t i e s

Statistical File and Associated

6-16

U t i l i t i e s 6-15

4-1 Dependencies for Program Use 6-16

4-1 Memory Requirements 6-17

4-1 4-1 4-2

7. SAMPLE FORTRAN PROGRAM 7-1

Configuration Requirements 7-1

4-2 Job Command Portion 7-1

Program Portion 7-1

4-2 Program Output 7-1

4-10 4-11

8. QUEUED TERMINAL RECORD MANAGER 8-1

4-12

4-12 Network Information Table 8-1

Subroutines 8-11

4-13 Initiating Network Access (QTOPEN) 8-11

4-15 Sending Data (QTPUT)

Obtaining Data or Connection

8-12

4-15 Status (QTGET) 8-13

4-15 Sending a Synchronous Supervisory

4-16 Message (QTTIP) 8-14

4-16 Linking an Application to Another

5-1 5-1 5-1 5-1 5-4 5-4 5-4 5-4 5-6 5-7o 5-8 5-10 5-10 5-12 5-14 5-14 5-15 5-16 6. CHARACTERISTICS OF AN APPLICATION PROGRAM 6-1 N O S S y s t e m C o n t r o l P o i n t F a c i l i t y 6 - 1

B a t c h J o b S t r u c t u r e 6 - 1

C o m m a n d s 6 - 2

J o b I d e n t i fi c a t i o n 6 - 3

P r o g r a m C o n t e n t 6 - 3

P r o g r a m E x e c u t i o n T h r o u g h I A F 6 - 3

| T y p e s o f A p p l i c a t i o n P r o g r a m s 6 - 4

D i s a b l e d 6 - 5

U n i q u e I d e n t i fi e r 6 - 5

P r i v i l e g e d 6 - 5

I Have More Than One Copy (on any One Host) 6-6R e q u e s t S t a r t a b l e 6 - 6 R e s t r i c t e d o r G e n e r a l A c c e s s 6 - 6 M a n d a t o r y o r P r i m a r y 6 - 6

Application (QTLINK)

Ending a Single Connection (QTENDT) Ending Communication With the

Network (QTCLOSE) Output Formatting and Editing

Format Effectors

Display-Code Output Editing Output Queuing Using QTRM Sample Program

9. NETWORK FAILURE AND RECOVERY Application Programs

Host

Network Processing Unit Logical Link

Trunk Line Terminal

APPENDIXES

Character Data Input, Output, and Central Memory Representation Diagnostic Messages

Glossary

8-14 8-14 8-15 8-15 8-16 8-16 8-16 8-18 9-1 9-1 9-1 9-1 9-1 9-1 9-1 9-1

A - l B - l C - l D Application Program Call Statement Summary D-l

INDEX FIGURES

1 - 1 O v e r v i e w o f a C D C N e t w o r k 1 - 1 1-2 The Interfaces Between the Network

P r o d u c t E l e m e n t s 1 - 3 1-3 The Relationship Between the Parts of

t h e C o m m u n i c a t i o n s C o n t r o l P r o g r a m 1 - 7 1 - 4 T y p i c a l C o n n e c t i o n s i n t h e N e t w o r k 1 - 1 0

60499500 S

(11)

1-5 Network Access Method Components 1 - 6 Ty p i c a l A p p l i c a t i o n P r o g r a m

Processing Flow

2 - 1 P h y s i c a l a n d L o g i c a l I n f o r m a t i o n S t r u c t u r e s

2-2 Block Reassembly Points

2 - 3 A p p l i c a t i o n - t o - A p p l i c a t i o n C o n n e c t i o n Data Exchanges

2-4 Application Block Header Content for Upline Network Data Blocks

2-5 Application Block Header Content for Downline Network Data Blocks 2-6 Supervisory Message General Content,

Asynchronous Messages and Synchronous Messages of Application Character Type 2

2-7 Supervisory Message General Content, Synchronous Messages of Application Character Type 3

2-8 Application Block Header Content for Upline Supervisory Messages 2-9 Application Block Header Content for

Downline Supervisory Messages 3-1 Supervisory Message Mnemonic Structure 3 - 2 D e v i c e - t o - A p p l i c a t l o n C o n n e c t i o n

Supervisory Message Sequences 3-3 Connection-Request (CON/REQ/R)

Supervisory Message Format, Device-to-Application Connections 3-4 Connection-Accepted (CON/REQ/N)

Supervisory Message Format, All Connection Types

3-5 Connection-Rejected (CON/REQ/A) Supervisory Message Format, All Connection Types

3 - 6 I n i t i a l ! z e d - C o n n e c t i o n ( F C / I N I T / R ) Supervisory Message Format 3 - 7 C o n n e c t i o n - I n i t i a l i z e d ( F C / I N I T / N )

Supervisory Message Format 3-8 Connection-Broken (CON/CB/R) Supervisory Message Format 3-9 End-Connection (CON/END/R)

Supervisory Message Format 3-10 Connection-Ended (CON/END/N) Supervisory Message Format

3 - 11 A p p l i c a t i o n - t o - A p p l i c a t i o n C o n n e c t i o n Supervisory Message Sequences 3-12 Request-Application-Connection

(CON/ACRQ/R) Supervisory Message Format

3-13 Application-Connection-Rej ect (CON/ACRQ/A) Supervisory Message Format

3-14 Connection-Request (CON/REQ/R) Super visory Message Format, Application- to-Application Connections

3-15 Connection Monitoring Message Sequences 3-16 Inactive-Connection (FC/INACT/R)

Supervisory Message Format 3-17 Connection Termination Message

Sequences

3-18 Connection List Polling Control Message Sequences

3-19 Connection List Duplexing Message Sequences

3-20 Turn-List-Processing-Off (LST/OFF/R) Supervisory Message Format

3-21 Turn-Llst-Processing-On (LST/ON/R) Supervisory Message Format 3-22 Change-Connection-List (LST/SWH/R)

Supervisory Message Format 3 - 2 3 Tu r n - O n - H a l f - D u p l e x - L i s t - P r o c e s s i n g

(LST/HDX/R) Supervisory Message Format

1-11 3-24

1-13

3-25 2-2

2-3 3-26

2-23 3-27

2-25 3-28

2-29 3-29

3-30 2-32 3-31

3-32

2-34 3-33

2-36 2-38 3-34

3-1 3-35

3-5 3-36

3-6 3-37

3-12 3-38

3-39

3-13 3-40

3-14 3-41

3-14 3-15 3-42 3-16 3-43

3-44

3-16 3-45

3-17 3-46

3-18 3-20 3-23 3-24.1 3-24.1 3-24.2 3-26 3-26 3-27 3-27 3-27 3-28

3-47 3-48 3-49 3-50 3-51 3-52 3-53 3-54

Tu r n - O n - F u l l - D u p l e x - L i s t - P r o c e s s i n g (LST/FDX/R) Supervisory Message

F o r m a t 3 - 2 9

Block-Delivered (FC/ACK/R) Supervisory

M e s s a g e F o r m a t 3 - 3 0

Block-Not-Delivered (FC/NAK/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 0 A p p l i c a t i o n - t o - A p p l i c a t i o n C o n n e c t i o n

B r e a k a n d R e s e t M e s s a g e S e q u e n c e 3 - 3 1 Break (FC/BRK/R) Supervisory Message

F o r m a t 3 - 3 2

Reset (FC/RST/R) Supervisory Message

F o r m a t 3 - 3 2

Te r m i n a l U s e r - C a u s e d B r e a k S e q u e n c e 3 - 3 3 User-Interrupt (INTR/USR/R) Supervisory

M e s s a g e F o r m a t 3 - 3 3

Break-Indication-Marker (BI/MARK/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 4 A p p l i c a t i o n - I n t e r r u p t - R e s p o n s e

(INTR/RSP/R) Supervisory Message

F o r m a t 3 - 3 4

Resume-Output-Marker (RO/MARK/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 4 A p p l i c a t i o n - I n t e r r u p t ( I N T R / A P P / R )

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 6 A p p l i c a t i o n - I n t e r r u p t - R e s p o n s e

(INTR/RSP/R) Supervisory Message

F o r m a t 3 - 3 6

Terminate-Output-Marker (TO/MARK/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 3 7 Downline Data Flow Control Supervisory

M e s s a g e S e q u e n c e s 3 - 3 7 User-Interrupt-Request (INTR/USR/R)

Supervisory Message Format for

P r i o r i t y D a t a 3 - 3 8

U s e r I n t e r r u p t f o r P r i o r i t y D a t a

S u p e r v i s o r y M e s s a g e S e q u e n c e 3 - 3 8 Change-Input-Character-Type

S u p e r v i s o r y M e s s a g e S e q u e n c e 3 - 3 9 Change-Input-Character-Type (DC/CICT/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 4 0 Block Truncation Supervisory Message

S e q u e n c e 3 - 4 2

Block Truncation (DC/TRU/R) Supervisory

M e s s a g e F o r m a t 3 - 4 3

Te r m i n a l C h a r a c t e r i s t i c s R e d e fi n i t i o n

S u p e r v i s o r y M e s s a g e S e q u e n c e s 3 - 4 5 Te r m i n a l - C h a r a c t e r i s t i c s - R e d e fi n e d

(TCH/TCHAR/R) Supervisory Message

F o r m a t 3 - 4 6

D e fi n e - Te r m i n a l - C h a r a c t e r i s t i c s (CTRL/DEF/R) Supervisory Message

F o r m a t 3 - 4 8

D e fi n e - M u l t i p l e - Te r m i n a l - C h a r a c t e r i s t i c s (CTRL/CHAR/R) Supervisory Message

F o r m a t 3 - 4 9

D e fi n e - M u l t i p l e - Te r m i n a l - C h a r a c t e r i s t i c s Abnormal Response (CTRL/CHAR/A)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 0 M u l t i p l e - Te r m i n a l - C h a r a c t e r l s t i c s -

Defined (CTRL/CHAR/N) Supervisory

M e s s a g e F o r m a t 3 - 5 0

R e q u e s t - Te r m i n a l - C h a r a c t e r i s t i c s (CTRL/RTC/R) Supervisory Message

F o r m a t 3 - 5 5

R e q u e s t - Te r m i n a l - C h a r a c t e r i s t i c s Abnormal Response (CTRL/RTC/A)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 5 D e v i c e - C h a r a c t e r i s t i c s - D e fi n i t i o n

(CTRL/TCD/R) Supervisory Message

F o r m a t 3 - 5 6

Host Operator Command Supervisory

M e s s a g e S e q u e n c e s 3 - 5 7

60499500 S x i

(12)

3-55 Host Operator Request-to-Activate- Debug-Code (HOP/DB/R) Supervisory

M e s s a g e F o r m a t 3 - 5 7

3-56 Host Operator Request-to-Turn-Off- Debug-Code (HOP/DE/R) Supervisory

M e s s a g e F o r m a t 3 - 5 8

3-57 Host Operator Request-to-Dump-Field- Length (HOP/DU/R) Supervisory

M e s s a g e F o r m a t 3 - 5 8

3-58 Host Operator Request-to-Turn-AIP- Traffic-Logging-On (HOP/TRACE/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 8 3-59 Host Operator Request-to-Turn-AIP-

Traffic-Logging-Off (HOP/NOTR/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 9 3-60 Host Operator Request-to-Release-

Debug-Log-File (HOP/REL/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 9 3-61 Host Operator Request-to-Restart-

Statistics-Gathering (HOP/RS/R)

S u p e r v i s o r y M e s s a g e F o r m a t 3 - 5 9 3-62 Host Shutdown Supervisory Message

Sequences

3-63 Host-Shutdown (SHUT/INSD/R) Supervisory Message Format

3-64 Logical-Error Supervisory Message Sequence

3-65 Logical-Error (ERR/LGL/R) Supervisory Message Format

4-1 NFETCH Macro Call Format 4-2 NSTORE Macro Call Format 4-3 NFETCH Integer Function FORTRAN

Call Format

4-4 NSTORE Subroutine FORTRAN Call Format 4-5 QTRM Interface Level Analogy

5-1 NETON Statement FORTRAN Call Format 5-2 Supervisory Status Word Format 5-3 NETON Statement FORTRAN Example 5-4 NETOFF Statement FORTRAN Call Format 5-5 NETGET Statement FORTRAN Call Format 5-6 NETGET Statement FORTRAN 5 Examples 5-7 NETGETF Statement FORTRAN Call Format 5-8 NETGETF Statement Text Area Address

Array

5-9 NETGETF Statement FORTRAN 5 Examples 5-10 NETPUT Statement FORTRAN Call Format 5-11 NETPUT Statement FORTRAN 5 Example 5-12 NETPUTF Statement FORTRAN Call Format 5-13 NETPUTF Statement Text Area Address

A r r a y

5-14 NETPUTF Statement FORTRAN 5 Example 5-15 NETGETL Statement FORTRAN Call Format 5-16 NETGETL Statement FORTRAN 5 Example 5-17 NETGTFL Statement FORTRAN Call Format 5-18 NETGTFL Statement Text Area Address

Array

5-19 NETGTFL Statement FORTRAN 5 Example 5-20 NETWAIT Statement FORTRAN Call Format 5-21 NETWAIT Statement FORTRAN 5 Examples 5-22 NETWAIT Statement FORTRAN Call Format 5-23 NETSETP and NETCHEK Statement

FORTRAN 5 Examples

5-24 NETCHEK Statement FORTRAN Call Format 6-1 Typical Job Structure for System Input 6-2 Interactive Program Execution Procedure

E x a m p l e 6 - 3

6-3 6-4 6-5 6-6 6-7 6-8 6-9 6-10 6-11 6-12 6-13 6-14 6-15 7-1

3-60 7-2

7-3 3-61

3-61 7-4 3-62 7-5

4-10 8-1

4-11 8-2

4-12 8-38-4

4-13 8-5

4-14 8-6

5-2 8-7

5-3 8-8

5-3

5-4 8-9

5-4

5-5 8-10

5-6 8-11

5-7 8-128-13 5-7

5-8 5-8

5-9

TABI

5-9 l - l

5-10 1-2

5-11 2-1

5-125-12 2-2

5-13 2-3

5-145-14 2-4 5-155-15 2-5 3-1

5-16 3-2

5-17 4-1

6-2 4-2

4-3

NETDBG Utility FORTRAN Call Statement

F o r m a t 6 - 7

NETREL Utility FORTRAN Call Statement

F o r m a t 6 - 8

NETSETF Utility FORTRAN Call Statement

F o r m a t 6 - 8

NETLOG Utility FORTRAN Call Statement

F o r m a t 6 - 9

NETDMB Utility FORTRAN Call Statement

F o r m a t 6 - 9

D L F P C o m m a n d G e n e r a l F o r m a t 6 - 1 0 D L F P C o m m a n d E x a m p l e s 6 - 1 0 D L F P D i r e c t i v e K e y w o r d F o r m a t 6 - 1 1 D L F P D i r e c t i v e E x a m p l e s 6 - 1 2 G e n e r a l F o r m a t o f D L F P O u t p u t 6 - 1 3 NETSTC Utility FORTRAN Call Statement

F o r m a t 6 - 1 5

NETLGS Utility FORTRAN Call Statement

F o r m a t 6 - 1 5

General Format of One Period Listing

i n S t a t i s t i c a l F i l e 6 - 1 6 C o m m a n d P o r t i o n o f R M V 3 J o b 7 - 1 P r o g r a m P o r t i o n o f R M V 3 7 - 2 Possible Dialogs Supported by Sample

F O R T R A N P r o g r a m 7 - 2 5

Debug Log File Listing for Sample

F O R T R A N P r o g r a m 7 - 2 6

S t a t i s t i c a l F i l e L i s t i n g f o r S a m p l e

F O R T R A N P r o g r a m 7 - 3 8

N e t w o r k I n f o r m a t i o n T a b l e F o r m a t 8 - 2 QTOPEN Statement COBOL Call Format 8-11 Q T P U T S t a t e m e n t C O B O L C a l l F o r m a t 8 - 1 2 Q T G E T S t a t e m e n t C O B O L C a l l F o r m a t 8 - 1 3 Q T L I N K S t a t e m e n t C O B O L C a l l F o r m a t 8 - 1 4 QTENDT Statement COBOL Call Format 8-14 QTCLOSE Statement COBOL Call Format 8-15 Algorithm for Output Buffering

U s i n g Q T R M 8 - 1 7

Sample Program ECH0-RMV2 Source

L i s t i n g 8 - 1 9

E C H 0 - R M V 2 J o b C o m m a n d s 8 - 2 5 D e b u g L o g F i l e L i s t i n g f o r E C H 0 - R M V 2 8 - 2 6 S t a t i s t i c s F i l e L i s t i n g f o r E C H 0 - R M V- 2 8 - 3 6 E C H 0 - R M V 2 S a m p l e D i a l o g 8 - 3 7

D e v i c e T y p e s 1 - 9

S u p p o r t e d T e r m i n a l C l a s s e s 1 - 1 4 Default Message Delimiter and

T r a n s m i s s i o n K e y s 2 - 6 Format Effector Operations for

A s y n c h r o n o u s a n d X . 2 5 C o n s o l e s 2 - 1 5 Format Effector Operations for

S y n c h r o n o u s C o n s o l e s 2 - 2 0 Embedded Format Control Operations

f o r C o n s o l e s 2 - 2 1

C h a r a c t e r E x c h a n g e s W i t h C o n n e c t i o n s 2 - 2 5 L e g a l S u p e r v i s o r y M e s s a g e s 3 - 2 Va l i d F i e l d N u m b e r s a n d F i e l d Va l u e s 3 - 5 1

R e s e r v e d S y m b o l s 4 - 3

A I P I n t e r n a l P r o c e d u r e s 4 - 1 7 A I P I n t e r n a l T a b l e s a n d B l o c k s 4 - 1 8

,<^^\

/ * ^ \

| x i i 60499500 S

(13)

NOTATIONS

T h r o u g h o u t t h i s m a n u a l , t h e f o l l o w i n g c o n v e n t i o n s are used in the presentation of statement formats, operator type-ins, and diagnostic messages:

< c t >

UPPERCASE

lowercase

[ ]

{ }

input parameter

U p p e r c a s e l e t t e r s i n d i c a t e a c r o n y m s , w o r d s , o r m n e m o n i c s e i t h e r r e q u i r e d b y t h e n e t w o r k s o f t w a r e a s i n p u t , o r p r o d u c e d a s o u t p u t .

L o w e r c a s e l e t t e r s i d e n t i f y v a r i a b l e s f o r w h i c h v a l u e s are supplied by the NAM or t e r m i n a l u s e r , o r b y t h e network software as output.

E l l i p s i s i n d i c a t e s t h a t o m i t t e d e n t i t i e s r e p e a t t h e f o r m a n d f u n c t i o n o f t h e e n t i t y l a s t g i v e n .

S q u a r e b r a c k e t s e n c l o s e e n t i t i e s t h a t a r e o p t i o n a l ; i f o m i s s i o n o f a n y e n t i t y causes the use of a default e n t i t y , t h e d e f a u l t i s u n d e r l i n e d .

Braces enclose entities from which one must be chosen.

T h i s t e r m I d e n t i fi e s a n A I P call statement parameter for w h i c h v a l u e s a r e s u p p l i e d

to AIP by the programmer.

LF

©

HD

The <ct> symbol represents t h e n e t w o r k c o n t r o l c h a r a c t e r d e fi n e d f o r t h e t e r m i n a l . T h i s c h a r a c t e r m u s t b e t h e fi r s t c h a r a c t e r o f the command entered.

The LF symbol represents a o n e - l i n e v e r t i c a l r e p o s i t i o n i n g o f t h e c u r s o r o r o u t p u t m e c h a n i s m . L F a l s o d e s i g n a t e s a c h a r a c t e r o r c h a r a c t e r c o d e a s s o c i a t e d w i t h s u c h a l i n e f e e d o p e r a t i o n .

A circle around a character r e p r e s e n t s a c h a r a c t e r k e y t h a t i s p r e s s e d i n c o n j u n c t i o n w i t h a c o n t r o l key (CTL, CNTRL, CONTRL, CONTROL, or equivalent).

The boxed cr symbol repre sents the terminal key that causes message transmission;

u s u a l l y, t h i s k e y c a u s e s a c a r r i a g e r e t u r n o p e r a t i o n . T r a n s m i s s i o n k e y s a r e described in more detail in section 2.

return parameter T h i s t e r m i d e n t i fi e s a n A I P c a l l s t a t e m e n t p a r a m e t e r f o r w h i c h v a r i a b l e s a r e supplied to AIP by the pro grammer and in which values are placed by AIP.

U n l e s s o t h e r w i s e s p e c i fi e d , a l l r e f e r e n c e s t o n u m bers are to decimal values, all references to bytes are to 8-bit bytes, and all references to characters a r e t o 7 - b i t A S C I I - c o d e d c h a r a c t e r s . F i e l d s defined as unused should not be assumed to contain zeros.

60499500 R x i i i

(14)

0*%

0 ^ t

0^%

(15)

NETWORK PRODUCTS: AN OVERVIEW

This section introduces the Control Data Corporation CYBER 170 network products, their relationships to each other, and their significance to the data com m u n i c a t i o n s u s e r. N e t w o r k p r o d u c t s i s a g r o u p o f programs and hardware that provides communications services to geographically dispersed users.

As shown in figure 1-1, a CDC network consists of a computer network, a communications network, and a services network.

COMPUTER NETWORK

The computer network includes host computer systems p a c k e t - s w i t c h i n g n e t w o r k s ( P S N s ) , t e r m i n a l s , a n d the host software associated with network communi cations .

E a c h c o m p o n e n t o f t h e c o m p u t e r n e t w o r k p r o v i d e s i n p u t , o u t p u t , c o n t r o l , o r s t o r a g e r e s o u r c e s t o t h e s e r v i c e s a n d c o m m u n i c a t i o n s n e t w o r k . T h e p r i m a r y h o s t c o m m u n i c a t i o n s o ft w a r e i s c a l l e d t h e N e tw o r k Access Method (NAM).

/0™B\

Services Network Computer Network

Communications Network

Figure 1-1. Overview of a CDC Network

60499500 R l - l

(16)

COMMUNICATIONS NETWORK

The communications network includes network proc essing units (NPUs) and the connecting communication l i n e s n e e d e d t o t r a n s p o r t b l o c k s o f d a t a b e t w e e n h o s t c o m p u t e r s a n d t e r m i n a l s . T h e p r i m a r y C D C

s o f t w a r e i n a n N P U i s c a l l e d t h e C o m m u n i c a t i o n s Control Program (CCP).

The size and complexity of a communications network varies from a simple network with one local (front- end) NPU, or a network with one local NPU and one or more remote NPUs, to a more complex network with m u l t i p l e l o c a l N P U s a n d m u l t i p l e r e m o t e N P U s . Attached to these NPUs are terminal devices, such a s e n t r y / d i s p l a y s t a t i o n s .

Because the communications network minimizes termi nal type dependency and removes many of the terminal s w i t c h i n g o p e r a t i o n s f r o m t h e h o s t , t h e h o s t c a n process data more efficiently.

SERVICES NETWORK

The services network consists of the network appli cation programs in each host computer and the users of those programs. Each application program gives the terminal user or another application a specific d a ta p r o ce ssi ng ca pa b i l i ty.

SOFTWARE COMPONENTS OF THE NETWORK

Figure 1-2 shows the interfaces between the elements o f t h e n e t w o r k . T h e l e f t p a r t o f t h e fi g u r e s h o w s the network host software elements, which are the software elements located in the CDC CYBER 170 host computer. The middle section shows the Communi cations Control Program (CCP), which is the software element located in the network processing unit. As s h o w n i n t h e r i g h t p o r t i o n o f fi g u r e 1 - 2 , C C P communicates with the terminals while the Network Access Method (NAM) communicates with application p r o g r a m s . R e f e r t o fi g u r e 1 - 2 w h i l e r e a d i n g t h e r e m a i n d e r o f t h i s o v e r v i e w s e c t i o n o n n e t w o r k products.

T h e n e t w o r k h o s t s o f t w a r e i s c o l l e c t i v e l y c a l l e d the Network Access Method or NAM. NAM is used in several contexts throughout this manual and in the other network products documentation. NAM can refer to the interface between application programs and t h e c o m m u n i c a ti o n s n e tw o r k ; to th e p r o g r a m s th a t implement that interface, including the Applications I n t e r f a c e P r o g r a m ( A I P ) , t h e N e t w o r k I n t e r f a c e Program (NIP), and the Peripheral Interface Program (PIP); or to the product NAM, which also includes t h e N e t w o r k S u p e r v i s o r ( N S ) , t h e C o m m u n i c a t i o n s Supervisor (CS), and the Network Validation Facility (NVF).

I n fi g u r e 1 - 2 , N A M r e f e r s t o t h e s e t o f p r o g r a m s that implement the interface between the application programs and communications network.

N e t w o r k h o s t s o f t w a r e , s h o w n i n t h e l e f t p a r t o f fi g u r e 1 - 2 , i n c l u d e s :

Network Access Method

Network Definition Language Processor 1-2

Network Supervisor Communications Supervisor N e t w o r k Va l i d a t i o n F a c i l i t y N e t w o r k u t i l i t i e s

Network Access Method application programs CYBER Cross System

NETWORK ACCESS METHOD

The Network Access Method is the primary network host software. NAM interfaces between applications in the same host or between applications and the Communications Control Program in an NPU.

Because the connections among NPUs can become extremely complex, the Network Access Method acts as an interface between host computer software at o n e e n d o f t h e n e t w o r k a n d t h e t e r m i n a l s a t t h e other end.

A s i m p l e f r o n t - e n d N P U c o n fi g u r a t i o n a p p e a r s t h e same through the Network Access Method as a more complex linkage system; message routing by the host computer is performed in the same manner for both c o n fi g u r a t i o n s . T h e p h y s i c a l a n d l o g i c a l c o n fi g u ration of the elements involved in Network Access Method operation Is described in the Network Defi n i t i o n L a n g u a g e r e f e r e n c e m a n u a l ( l i s t e d i n t h e p r e f a c e ) .

T h e h o s t c o m p u t e r e x e c u t e s C D C - w r i t t e n o r s i t e - written service programs called application programs that are connected to the network via the Network Access Method (NAM). An application program can c o m m u n i c a t e w i t h o t h e r a p p l i c a t i o n p r o g r a m s o r s e r v i c e t e r m i n a l s c o n n e c t e d t o t h e n e t w o r k . A l l c o n n e c t i o n s t o t h e n e t w o r k a r e e s t a b l i s h e d b y a portion of the network software called the Network Validation Facility, and the flow of data and proc essing along them is controlled through NAM.

NAM incorporates the following features:

• I t i s e q u a l l y s u i t a b l e f o r a p p l i c a t i o n p r o g r a m s written in COMPASS or high-level languages, such as FORTRAN.

e It i mp ose s no da ta st r uc tur es on an appl i cat i on program.

• I t p r o v i d e s a w a y t o h a n d l e u n p r e d i c t a b l e events, such as terminal operator interrupts.

• I t p r o v i d e s c o m p l e t e i s o l a t i o n o f n e t w o r k c o m munications from the operating system.

• I t s u p p o r t s d i s t i n c t c l a s s e s o f t e r m i n a l s b y n o r m a l i z i n g d a t a f o r m a t s a n d o p t i o n a l l y p e r forming code conversion. Seventeen classes are defined by CDC; additional classes can be de fined by sites that provide their own supporting

software.

• I t p e r m i t s a n a p p l i c a t i o n p r o g r a m t o s u p p o r t c l u s t e r s o f r e a l t e r m i n a l d e v i c e s a s i f t h e d e v i c e s w e r e s e p a r a t e l y a d d r e s s a b l e l o g i c a l e n t i t i e s c a l l e d v i r t u a l t e r m i n a l s . V i r t u a l t e r m i n a l s a r e d e s c r i b e d a t t h e e n d o f t h i s s e c t i o n .

60499500 R

(17)

"S

\

3 o o» I -i- Vt 01 o -» I +J o —'

CO -r- -r-

60499500 S 1-3

(18)

Basic services provided by NAM include:

Network Interface Program

N A M e s t a b l i s h e s m e s s a g e p a t h s ( l o g i c a l c o n n e c t i o n s ) b e t w e e n a n a p p l i c a t i o n p r o g r a m a n d terminals or between two applications (provided b o t h p a r t i e s h a v e t h e c o r r e c t n e t w o r k a c c e s s sec u r i t y p ermis si o n s) .

NAM breaks logical connections when asked to by the application program or the terminal, or when n e t w o r k c o n d i t i o n s m a k e i t n e c e s s a r y ( f o r e x ample, when a network shutdown occurs).

After logical connections have been established, NAM passes incoming messages to the application, and accepts and forwards outgoing messages from t h e a p p l i c a t i o n .

NAM queues incoming messages until the appli cation program requests them. This allows the a p p l i c a t i o n t o s e r v i c e i t s c o n n e c t i o n s w i t h terminals and other applications in any desired o r d e r.

N A M p r o v i d e s t h e a p p l i c a t i o n p r o g r a m w i t h i t s own set of protocols, making knowledge of de tailed network protocols unnecessary.

For incoming traffic, NAM allows the application program to group terminals with similar or re lated processing needs.

NAM queues outgoing messages to regulate data flow through the network.

N A M d e t e c t s i n a c t i v i t y o n a n y i n t e r a c t i v e d a t a p a t h a n d r e p o r t s t h e c o n d i t i o n t o t h e a p p l i cation program.

NAM resolves resource contention among appli cation programs.

A n i n s t a l l a t i o n o p t i o n i s a v a i l a b l e t o l o g m e s s a g e traffic for application program debugging. A second i n s t a l l a t i o n o p t i o n p e r m i t s t h e l o g g i n g o f a p p l i cation program and message traffic statistics.

NAM consists of four major modules:

Peripheral Interface Program Network Interface Program Application Interface Program Queued Terminal Record Manager

Peripheral Interface Program

The Peripheral Interface Program (PIP) is a periph e r a l p r o c e s s o r u n i t p r o g r a m t h a t i n t e r f a c e s t h e central processor executed routines of NAM to the channel-connected local NPUs.

PIP moves blocks of data between the central memory buffers of NAM and the NPU and reads and writes disk

| fi l e s u s e d b y b a t c h d e v i c e s o r f o r fi l e t r a n s f e r.

PIP also can detect when a local NPU needs initial i z i n g . I f t h e N P U c a n n o t s t a r t i t s o w n l o a d i n g , P I P r e q u e s t s t h e n e t w o r k s u p e r v i s o r t o l o a d t h e bootstrap program into the NPU.

1-4

The Network Interface Program (NIP) executes as a s y s t e m c o n t r o l p o i n t . N I P c o o r d i n a t e s t h e u s e o f the communications network by all application pro grams, buffers data between the application programs and the network, and manages the logical connec

tions .

Each application program can have several connec tions; each connection is associated with a terminal d e v i c e o r w i t h a n o t h e r a p p l i c a t i o n p r o g r a m . N I P translates between network addresses and the more c o n v e n i e n t l o g i c a l a d d r e s s e s t h a t r e p r e s e n t t h e connection to the application. NIP also establishes new connections as they are requested and terminates connections that are no longer needed or that have f a i l e d .

An application can request NAM to convert the data o n a l o g i c a l c o n n e c t i o n f r o m t h e n e t w o r k f o r m a t . Such conversions determine the format and encoding of characters seen by the application.

Application Interface Program

The Application Interface Program (AIP) is a set of subprograms and buffers that resides in the appli c a t i o n p r o g r a m ' s fi e l d l e n g t h a n d p r o v i d e s a n i n t e r f a c e t o N I P a n d t h e n e t w o r k . T h i s m a n u a l i s primarily concerned with the use of AIP.

AIP statements are provided so that the application program can connect to and disconnect from the net w o r k . A I P s t a t e m e n t s a l s o c o n t r o l i n f o r m a t i o n exchange between the application program and NAM b u f f e r s . T h i s i n f o r m a t i o n c a n b e d a t a , o r i t c a n be supervisory messages that coordinate the appli c a t i o n ' s e x e c u t i o n w i t h e v e n t s t h a t h a v e o c c u r r e d in the network. NAM might pass a supervisory mes sage to inform the application of a new connection t h a t i s r e q u e s t i n g s e r v i c e , o r t h a t a f a i l u r e h a s occurred. In the same way, the application program uses supervisory messages to communicate with NAM and the network elements.

Queued Terminal Record Manager

The Queued Terminal Record Manager (QTRM) is a set of subprograms that resides in the application pro g r a m ' s fi e l d l e n g t h a n d p r o v i d e s a h i g h l e v e l p r o c e d u r a l i n t e r f a c e t o t h e n e t w o r k . T h i s p a c k a g e p e r m i t s i n d i r e c t u s e o f a s u b s e t o f A I P ' s f e a t u r e s b y p r o g r a m s w i t h u n s o p h i s t i c a t e d c o m m u n i c a t i o n s r e q u i r e m e n t s . T h i s u t i l i t y p e r m i t s p r o g r a m s t o have a communications interface functionally similar to their mass storage interface. QTRM is discussed in section 8 of this book.

NETWORK DEFINITION LANGUAGE PROCESSOR

Before the network software can route data through t h e n e t w o r k a n d i n t e r f a c e t o o p e r a t o r s f o r s u p e r v i s i o n , t h e d e fi n i t i o n o f t h e n e t w o r k c o n fi g u a t i o n m u s t fi r s t b e c o m m u n i c a t e d t o t h e s o f t w a r e . T h e Network Definition Language (NDL) is used to de s c r i b e t h i s c o n fi g u r a t i o n . T h e N e t w o r k D e fi n i t i o n Language processor (NDLP), a batch utility, trans l a t e s t h i s c o n fi g u r a t i o n a n d p r e p a r e s a n e t w o r k c o n fi g u r a t i o n fi l e ( N C F ) a n d a l o c a l c o n fi g u r a t i o n fi l e ( L C F ) .

60499500 S

(19)

The NCF contains configuration information required by the network.

The LCF contains host information required by the Network Validation Facility, such as automatic login p a r a m e t e r s a n d a p p l i c a t i o n i n f o r m a t i o n . T h e L C F a l l o w s t h e n e t w o r k v a l i d a t i o n f a c i l i t y t o v a l i d a t e a n d c o n n e c t t e r m i n a l s t o a p p l i c a t i o n s o r a p p l i c a t i o n s t o a p p l i c a t i o n s .

T h e N D L i s d e s c r i b e d i n t h e N e t w o r k D e fi n i t i o n Language reference manual listed in the preface.

NETWORK SUPERVISOR

T h e N e t w o r k S u p e r v i s o r ( N S ) e x e c u t e s a s a N A M a p p l i c a t i o n . I t i n t e r f a c e s b e t w e e n t h e N P U s a n d CCP program files in the host. NS loads an NPU on request with the appropriate copy of the Communi c a t i o n s C o n t r o l P r o g r a m f r o m t h e h o s t ' s n e t w o r k load file (NLF). NS also saves NPU dumps in the host's network dump file (NDF). The load and dump files are shown in figure 1-2.

The host operator can obtain status information for N P U l o a d i n g o r d u m p i n g o p e r a t i o n s i n v o l v i n g t h e copy of NS in the operator's host. More than one host can run a copy of NS; so that NS can load NPUs which are not accessible from a specific host.

COMMUNICATION SUPERVISOR

The Communication Supervisor (CS) program executes as a NAM application. It can communicate with the n e t w o r k o p e r a t o r s ( N O P ) . C S a l l o w s a n e t w o r k operator at a terminal (an NPU operator or a diag nostic operator [DOP]) or at a host console (a host operator [HOP]) to obtain and change the status of network elements under its supervision, to communi c a t e w i t h u s e r s a t t e r m i n a l s , a n d t o r u n d i a g n o s t i c s . C S a l s o r e s p o n d s t o r e q u e s t s f o r n e t w o r k configuration data from an NPU.

CS can run in one or more hosts. It also assists

| the NPUs by providing them with terminal configura t i o n i n f o r m a t i o n f r o m t h e n e t w o r k c o n fi g u r a t i o n fi l e .

NETWORK VALIDATION FACILITY

The Network Validation Facility (NVF) also executes a s a N A M a p p l i c a t i o n . I t v a l i d a t e s t h e t e r m i n a l u s e r ' s a c c e s s t o t h e h o s t a n d a n a p p l i c a t i o n p r o g r a m ' s a c c e s s t o t h e c o m p u t e r n e t w o r k . N V F a l s o m a i n t a i n s a n d r e p o r t s a p p l i c a t i o n s t a t u s t o t h e host operator (HOP). As figure 1-2 shows, the NOS v a l i d a t i o n fi l e a n d t h e l o c a l c o n fi g u r a t i o n fi l e (LCF) supply validation information to NVF.

N V F v e r i fi e s s u c h t e r m i n a l u s e r i n f o r m a t i o n a s f a m i l y n a m e , u s e r n a m e , a n d p a s s w o r d . B e f o r e a t e r m i n a l u s e r c a n a c c e s s a n a p p l i c a t i o n p r o g r a m ,

| s u c c e s s f u l l o g i n m u s t o c c u r . W h e n l o g i n i s s u c c e s s f u l l y c o m p l e t e d , t h e N e t w o r k Va l i d a t i o n F a c i l i t y c a u s e s N A M t o n o t i f y t h e a p p l i c a t i o n p r o g r a m i d e n t i fi e d i n t h e l o g i n s e q u e n c e t h a t a terminal requests connection.

T h e N e t w o r k V a l i d a t i o n F a c i l i t y a l s o p e r f o r m s switching between application programs. NVF causes terminal disconnection processing when disconnection i s a p p r o p r i a t e .

T h e N e t w o r k Va l i d a t i o n F a c i l i t y c o n t r o l s a p p l i c a t i o n p r o g r a m a n d t e r m i n a l a c c e s s t o t h e n e t w o r k , a s f o l l o w s :

• A n a p p l i c a t i o n p r o g r a m w i s h i n g t o c o m m u n i c a t e with terminals requests access to the network.

This request is passed by NAM to the NVF for v a l i d a t i o n . ( N V F a l s o p e r f o r m s s i m i l a r v a l i d a t i o n o f t e r m i n a l r e q u e s t s f o r h o s t a c c e s s . ) O n c e N V F h a s d e t e r m i n e d t h a t a n a p p l i c a t i o n program or terminal is allowed to use the host's r e s o u r c e s , i t m a k e s c a l l s t o N A M t h a t c r e a t e t h e l o g i c a l c o n n e c t i o n f o r t h e t r a n s f e r o f d a t a between the application program and the network.

NVF also requests NAM to modify or delete these connections when terminal users request to com m u n i c a t e w i t h o t h e r a p p l i c a t i o n p r o g r a m s o r leave the network.

• W h e n a n a p p l i c a t i o n p r o g r a m n o l o n g e r d e s i r e s t o us e t he n etw o rk , i t c al l s another NAM pro c e d u r e . T h i s r e q u e s t a l s o i s p a s s e d t o N V F, which causes NAM to delete all connections used f o r t h e a p p l i c a t i o n p r o g r a m - j u s t a s i t d o e s f o r a t e r m i n a l o r t e r m i n a l d e v i c e l e a v i n g t h e network.

NETWORK UTILITIES

F o u r u t i l i t y p r o g r a m s e i t h e r a r e i n c l u d e d w i t h o r used by network host products:

The Network Dump Analyzer (NDA) The Load File Generator (LFG) The Debug Log File Processor (DLFP) The Hardware Performance Analyzer (HPA)

Network Dump Analyzer

The network dump analyzer (NDA) produces a formatted printout from NPU dump files created by the Network S u p e r v i s o r. T h e s i t e a n a l y s t c a n u s e t h e s e d u m p s to help analyze CCP software or NPU hardware fail ures. The network dump analyzer uses the network d u m p fi l e ( N D F ) , w h i c h i s s h o w n i n fi g u r e 1 - 2 , a s i n p u t .

You can find more information about the NPU dump a n a l y z e r i n t h e N O S Ve r s i o n 2 A n a l y s i s H a n d b o o k | l i s t e d i n t h e p r e f a c e .

Load File Generator

The load file generator (LFG) reformats CCP program files produced by the CDC CYBER Cross System's link and edit programs into a single random access file used by the Network Supervisor to load NPUs. This fi l e i s t h e n e t w o r k l o a d fi l e ( N L F ) , w h i c h i s o n e of the NPU files shown in figure 1-2.

Yo u c a n fi n d m o r e i n f o r m a t i o n a b o u t t h e l o a d fi l e g e n e r a t o r i n t h e N O S I n s t a l l a t i o n H a n d b o o k l i s t e d in the preface.

60499500 S 1-5

(20)

Debug Log File Processor

T h e d e b u g l o g fi l e p r o c e s s o r ( D L F P ) c o n v e r t s t h e d e b u g l o g fi l e g e n e r a t e d b y t h e A p p l i c a t i o n I n t e r face Program into a printable report. The program mer can selectively list logged information through DLFP directives.

You can find more information about the debug log file processor in section 6 of this manual.

Hardware Performance Analyzer

A fourth utility program, the hardware performance analyzer (HPA), is part of the NOS operating system.

T h i s u t i l i t y p r o g r a m p r o d u c e s r e p o r t s f r o m i n f o r m a t i o n o n t h e a c c o u n t a n d e r r o r l o g d a y fi l e s . N e t w o r k p r o d u c t s s o f t w a r e m a k e s s t a t i s t i c a l , e r r o r,

and alarm message entries into these dayfiles.

You can find more information about the hardware performance analyzer in the HPA reference manual

l i s t e d i n t h e p r e f a c e .

NAM APPLICATION PROGRAMS

T h e h o s t c o m p u t e r e x e c u t e s C D C - w r i t t e n o r s i t e - written service programs called application programs that are connected to the network through NAM. An a p p l i c a t i o n p r o g r a m c a n c o m m u n i c a t e w i t h o t h e r application programs or terminals connected to the network.

The CDC-provided NAM application programs are:

I n t e r a c t i v e F a c i l i t y ( I A F ) , w h i c h a l l o w s y o u t o create files and to create or execute programs from a device without using card readers or line printers. IAF is described in Volumes 1 and 3 of the NOS 2 Reference Set.

CDC CYBER CROSS SYSTEM SOFTWARE

The CDC CYBER Cross System software allows you to i n s t a l l , m o d i f y, a n d m a i n t a i n t h e C C P s o f t w a r e . I t is composed of these programs:

PA S C A L , w h i c h i s a c o m p i l e r p a t t e r n e d a f t e r ALGOL-60. By using PASCAL, you can define tasks in statements that are processed by the compiler t o y i e l d a v a r i a b l e n u m b e r o f a c t u a l p r o g r a m i n s t r u c t i o n s .

Formatter, which reformats PASCAL output into an object code format compatible with the com munications processor macro assembler output Macro Assembler, which assembles communications p r o c e s s o r m a c r o m e m o r y s o u r c e p r o g r a m s a n d produces relocatable binary output. The source p r o g r a m s a r e w r i t t e n w i t h s y m b o l i c m a c h i n e , pseudo, and macro instructions.

M i c r o A s s e m b l e r, w h i c h p r o v i d e s t h e l a n g u a g e needed to write a micro memory program. This a s s e m b l e r t r a n s l a t e s s y m b o l i c s o u r c e p r o g r a m i n s t r u c t i o n s i n t o o b j e c t m a c h i n e i n s t r u c t i o n s . Link Editor, which accepts object program mod ules and generates a memory image, suitable for executing in the 255x NPU.

A u t o l i n k u t i l i t y , w h i c h s i m p l i fi e s p r o g r a m assignment and maximizes the amount of space assigned to handling buffers.

Expand utility, which includes several hardware and software variables used to define a CCP load file for a given NPU configuration.

S e e t h e p r e f a c e f o r m a n u a l s t h a t c o n t a i n m o r e information on the CDC CYBER Cross System.

Remote Batch Facility (RBF), which permits you t o e n t e r a j o b fi l e f r o m a r e m o t e c a r d r e a d e r a n d t o r e c e i v e j o b o u t p u t a t a r e m o t e b a t c h device. RBF is described in the Remote Batch Facility reference manual.

Tr a n s a c t i o n F a c i l i t y ( TA F ) , w h i c h p e r m i t s y o u t o i m p l e m e n t o n - l i n e t r a n s a c t i o n p r o c e s s i n g under NOS by writing programs to be used by t e r m i n a l s . T A F i s d e s c r i b e d i n t h e T A F reference manual.

Te r m i n a l V e r i fi c a t i o n F a c i l i t y ( T V F ) , w h i c h p r o v i d e s t e s t s y o u c a n u s e t o v e r i f y t h a t a n i n t e r a c t i v e c o n s o l e i s s e n d i n g a n d r e c e i v i n g d a t a c o r r e c t l y. T V F i s d i s c u s s e d i n t h e Te r minal Interfaces reference manual.

Message Control System (MCS), which allows you to queue, route, and journal messages between COBOL programs and terminals. MCS is described in the Message Control System reference manual.

T h e q u e u e fi l e t r a n s f e r f a c i l i t y ( Q T F ) , w h i c h a l l o w s y o u t o t r a n s f e r q u e u e fi l e s b e t w e e n h o s t s . T h e u s e o f t h i s f e a t u r e i s d e s c r i b e d i n

the NOS Version 1 Reference Set, Volume 3.

P e r m a n e n t F i l e Tr a n s f e r F a c i l i t y ( P T F ) , w h i c h allows you to transfer permanent files between w a i t s . T h e u s e o f t h i s f e a t u r e i s d o c u m e n t e d

in the NOS Version 2 Reference Set, Volume 3.

NETWORK PROCESSING UNIT AND COMMUNICATIONS CONTROL PROGRAM

T h i s s u b s e c t i o n d i s c u s s e s t h e f o l l o w i n g n e t w o r k p r o d u c t s , w h i c h a r e p a r t o f t h e c o m m u n i c a t i o n s n e t w o r k a n d a l l o w a t e r m i n a l t o a c c e s s t h e h o s t computer over communication lines:

The 255x series network processing unit (NPU), which connects a host to a terminal

The Communications Control Program (CCP), which is the software in the NPU

The middle portion of figure 1-2 shows the communi cations network.

NETWORK PROCESSING UNIT

An NPU handles front-end or remote data communica tions for the CDC CYBER 170 host. The Communica tions Control Program resides within the NPU.

To understand CCP, you must have a basic under standing of the hardware on which CCP runs. Refer to the hardware manuals listed in the preface for a description of the hardware components of the NPU.

1-6 60499500 S

Referenzen

ÄHNLICHE DOKUMENTE

Allerdings wird verschiedentlich auch darauf verwiesen, dass beim Zugang zu einem Forschungsfeld weder eine fixe Grenze überschritten werde noch sich das Feld nach Überschreiten

We begin with a lemma that bounds the size of the new incomplete trees formed during the explore process in terms of the rope length, the distance from the start node to the root of

An optional reserved word value (YES or NO) for an optional stand-alone keyword; this parameter specifies the status assigned to this communication line at

1. The firmware must recognize and decode the input SelBUS transfer that has occurred. If the input transfer requested Con- troller or Peripheral Device status,

The number of spirals on a sunflower is always a Fibonacci number (or a number very close to a Fibonacci number), for instance in the large picture of on the previous slide there are

unfolding theorem whose proof requires some preparations about isochoric unfoldings and it requires a generalization of the classical Brieskorn module of a hypersurface singularity

This paper provides new results on: the computation of the Nakamura number, lower and upper bounds for it or the maximum achievable Nakamura number for subclasses of simple games

AA contributed to the design of the work, the acquisition, and inter- pretation of data; revised the draft; approved the final version of the manuscript; and agreed to be