Документ взят из кэша поисковой машины. Адрес оригинального документа : http://mirror.msu.net/pub/rfc-editor/rfc-ed-all/ien/ien158.txt
Дата изменения: Mon Jun 25 23:16:00 2001
Дата индексирования: Tue Oct 2 09:25:47 2012
Кодировка:





IEN 158 Jack Haverty
Bolt Beranek and Newman
1 October 1980



XNET Formats for Internet Protocol Version 4
Jack Haverty
Bolt Beranek and Newman Inc.
October 1,1980


This IEN is intended to capture in print the formats used

currently in the version 4 XNET protocol; most of the data is

courtesy of Ray Tomlinson.


Version 4 XNET is identical with version 2.5 XNET with the

exceptions listed below. The version 2.5 format is described in

RFC 643. It should be noted that the manner in which the

protocol is used by a user program (such as the PDP10 XNET

program), and by the various target-machine XNET servers, is not

defined herein. In particular there are several problems and

heuristics in dealing with the operation of the protocol in the

internet environment, where individual packets may be duplicated,

lost, and reordered.


Changes from the version 2 formats include the following:

1) XNET header and data is embedded in a IN V4 packet instead of
a V2.5 packet.

2) Packet format changed to add Port, Sequence number, and
Checksum fields.

3) Change in asynchronous reply codes.

4) Addition of ACK bit to opcode field.

5) Positive acknowledgement of all messages.






IEN 158 Jack Haverty
Bolt Beranek and Newman
1 October 1980





Packet Format

+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! Port !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! LSB Sequence MSB !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! Checksum !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! PID !CNT!ACK! Opcode !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! LSB Argument 1 MSB !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! LSB Argument 2 MSB !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
! !
! Data !
! !
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+

The IN protocol is set to the XNET protocol number (17 octal).

Host to target opcodes

NOP 0 No operation.
DEBUG 1 Start debugging a process or address space.
ENDBUG 2 End debugging a process or address space.
HALT 3 Halt the process.
DPOSIT 4 Deposit in memory.
RESUME 5 Resume execution of a process.
EXAM 6 Examine memory.
DSV 7 Deposit state vector (r0-r5,sp,pc,ps).
SETBPT 10 Set breakpoint.
REMBPT 11 Remove breakpoint.
ONESTP 12 Single step process (using trace trap).
PROCD 13 Proceed from breakpoint.
CREAP 14 Create a new process (or address space).
DSTROY 15 Destroy (delete) a process or address space.
XIOREP 16 Reply to XIO output (not used anymore).
XINREP 17 Reply to XIO input.
DEFALL 20 Define and allocate memory to an address space.
SAP 21 Start all processes.
SAVDSK 22 Save on disk.
GETDSK 23 Get from disk.
ENTRST 24 Enter address space into restart table.






IEN 158 Jack Haverty
Bolt Beranek and Newman
1 October 1980




Opcodes from target to host machine.

HALTED 77 Process halted (FREEP with arguments of 0).
TRAPPED 76 Process trapped due to error.
TTRAP 75 Trace trap.
BPT 74 Breakpoint hit.
XIOIN 73 XIO input request.
XIOOUT 72 XIO output request.


Checksum


The checksum is the same as that for the IN header; ones

complement of ones complement sum of words in the packet from

Port field to last data word inclusive. In case of an odd number

of data bytes, an additional byte of zeroes is assumed for

checksum purposes.


Port number


The port number is a unique number relative to the host

machine which appears in every packet for a particular debugging

session. It is suggested that this number be derived from the

time of day so that each session will be unique over a long

period of time.


Sequence number


The first packet of a session (first use of a particular

port number) is numbered 0. Subsequent packets increment by 1

modulo 2**16. Packets initiated by the target machine (opcodes






IEN 158 Jack Haverty
Bolt Beranek and Newman
1 October 1980



72-77) are also numbered starting from 0. The target machine is

allowed to execute packets out of order but must never execute a

packet twice unless the effect is harmless. For example, an

examine packet should be re-executed so that the data may be

returned to the sender. Deposit or resume should not be re-

executed. The host machine is responsible for correct ordering

of critical functions. For example, it must not send a RESUME

command until all prior deposits have been acknowledged.


Acknowledgements


Each packet must be acknowledged by the receiver. An

acknowledgement consists of the original header plus any

requested data (e.g. EXAM) with the ACK bit set.

Acknowledgements are not cumulative; an acknowledgement

acknowledges only the one packet with the matching sequence

number. If the target debugger is incapable of performing the

requested function, it should set the CNT (can't) bit instead of

the ACK bit. Both bits may be set meaning that the function is

available but the data required is no longer available. This

might be the result of a duplicate packet.