the network unix system - internet archive
TRANSCRIPT
NOTICE: Return or renew all Library Materials! The Minimum Fee for
each Lost Book is $50.00. J(JN 2 7 1QQQThe person charging this material is responsible for
its return to the library from which it was withdrawnon or before the Latest Date stamped below.
Theft, mutilation, and underlining^! books are reasonsnary action aftdi'nWF' resjilt-\n dismissal fforrl the Unive
To renewrcatt Tel
UNIVERShJ
for discipli-
iversity.
A-CHAMPAIGN
L161—O-1096
Digitized by the Internet Archive
in 2012 with funding from
University of Illinois Urbana-Champaign
http://archive.org/details/networkunixsyste155holm
u
ENGINEERING LIBRARY
a a;."
fc,,*. TY Or ILLINOIS
^'-:-~:^mr IWM
I4i' fi
URBANA. ILLINOISy
jho Met \' c rk UNIX S v s t s
'
bySt eve Hd litgren
03/1S/75
CAC Document No. 155
Center for Advanced ComputationUniversity of Illinois at Urbana-Champaign
Urbana, Illinois 6l801
The Library of the
J UL 1 3 1976
University of Illinoisat Urbane- Champaign
IX 3/18/75
Count is the number of bytes to be transmittedbetween the file represented by 'filedes' and the byte arrayrepresented by 'buffer'. Mbytes is the number actuallytransmitted. For the read call/' 'nbytes* may be zero toindicate the end of file; in either case/- minus one will bereturned if there was an error.
For each open file* the system maintains a pointerto the next byte to be read or written. If n bytes aretransmitted/ the pointer advances n bytes. Data written to
a file affect only those oytes in the file which are indi-cated by the position of the write pointer and the count; noother part of the file is changed. If the system pointerindicates that any bytes being written would lie beyond theend of the file* the file is enlarged as needed.
Once the user has finished processing a file/- itshould be closed. This is affected with the following call:
close( f
i
ledes )
;
Although it is not absolutely necessary to do a
specific close on a file when finished/' '(the system closesall files when a program exits)/ it is a good practice*since the user is allowed only sixteen open files.
There are several additional system calls related toI/O which. wilt not be discussed in detail. A few of thefit ore notable ones allow the user to: get the status of a
file/, change the protection or ownership of a fite> create a
file* create a directory/' make a link to an existing file*and delete a file. For further information concerning thedifferent I/O calls the reader is directed to The UNIXProgrammer's Manual/ fifth edition* K. Thompson/ and D. M.Ritchie* June 1974.
The user communicates with the network via thesesame system calls. For example* if one wished to connect tothe the PDP-10 at Harvard* the following sequence of callsmight be used.
filedes = open( "/dev/net/harv" *2 );
if( filedes < )
printfC Harvard is dead");else
whileC (nbytes=read(f i ledes/buf *80)) > )
write ( 0*buf*nbytes );
The open instructs the system to open a Telnet connection toHarvard/ if minus one is returned/ the program prints a mes-sage and exits* otherwise the program will read any bytessent by Harvard and print them out on the controlling tele-type. This will go on until Harvard closes the connection(Read will return minus one when the connection is closed).
IX 3/18/75
UNIX Telnet
In order to communicate with remote hosts on the
ARPA network/ one first Logs in to UMIX as a normal user.The user then runs a program Telnet/ which after announcingitself leaves him with several options.
He may co
When Telnet sees a
quest as a paralcommand processor (
gar d I ess of whetheruser may simultaneoServer Telnet and c
When the T
its the host>en on the speccontrol is
er data recei v
character is
d in response
accepan op
Jhen
furthcape
c e i v e
an the user's typew
ntinue with his normal UNIX activities.UNIX command/ it will initiate the re-lel task/- in the same manner as the UNIXthe Shell). Since this may be done re-or not a network connection is open/ the
usly receive output from a foreign host'sonverse with the local UNIX system.
elnet-user opens a connection/ Telnetname and any special parameters/ and doesial file corresponding to that host,returned/ the connection is open. Anyed from the terminal not containing es-sent to the network file. Any data r e -
to a read on the network file/ is writtenri t er
.
Communication continues with the host until the userwishes to close the connection. The user simply makes thisknown to Telnet via a command/ and Telnet does a standardclose on the network file. The negotiation of closing thenetwork connection is left to the system/ freeing the userfor other computational work.
There is some character translation and invisiblecontrol information passed back and forth between theforeign host and the Telnet process. This involves recogni-tion of Telnet IACs and the translation of Carriage*eturn(CR) and Line Feed(LF) to Line Feed on all data re-eived from the network/ and the inverse translation of LF
to CR LF on all data sent to the network.
>ICP Structure
Due to the structure of both the IMP to HostC2D andlost to HostC33 network protocols/ data comes from the net-work destined not only for one of many active processes/ butfor the information of the local host as a whole. For exam-)le/ network traffic such as a Host to Host Reset/ whichgenerally signals that a foreign host has come "olive" must)e acknowledged to let that host know that the local hostitself is "alive". Therefore/ the local host must monitorlata coming from the net to perform not only a messageswitching function/ which is the bulk of network traffic/>ut to provide a control and status function.
Further/ when person associated with the local
IX 3/18/75
hostserveprovition
IIL5JeventtraffflowIt i
the s
NCP.
wishes to carry on a conversation with a networkr/ the Initial Connection ProtocolC] must be used tode a logical port at each site for succeeding informa-f low.
Experience with the ANTS Mark IC43 and ANTS Marksystems has shown that the above classes of network
s are relatively infrequent/- and that most networkic is in terms of user data flow and the associatedcontroK Host to Most Allocates and IMP to Host RFNMs).s also the case that the software required to implementtatus and control function is the bulkiest part of an
core-memorminimfor t
partsnon-ssectiopendescrprocethe k
I
resiy avi zehe N
wapponandi bedss o
e rnc
n UNdenta i la
theCP.neable(catc los
abf abI vi
IX/ t
andble f
amoFor
partsect
led t
e conove .
out 8** ?> *i
henon-or u
untthisis
i on*he N
nectTh
.5kpeci
Kernswapserof c
r earooabo
CPi onse N
word2l f
elpab I
progodeson/tedut 3
aejio
andCP D
sinile.
ofe
.
ramsaddethe
in t
.5kn) d
hanae.no
si z
the opeA large
Thusd to theNCP is
he Kernewords ofea I s witdies thn runs a
Qr and
ratikernit i
basimp I
Iancor
h use s
s a
comm
ng sye I reds desiic UNIe m e n t e
d ma kee. The r reqtatusswap pau n i c a t
stemucesrab I
X ked ins upe o
uestt ra
blees
i s
thee torne I
t wothe
t he r
s toff icuserwith
Hardware and Software Requirements
PDP-1ninecorefto e
headpointThe R
storaseconnearcoreli nes
T
1/50t racand
ncomdiskf a
F11ge;d cofut
memo
he/- wik mathr
pass/ a
nd 4
i s u
onentaiure/^
ry w
networt h memgtapeee t er
a D
twin p8k ofsed asRK05 pns log
theith 10
k s
orydr i v
mi naH11lattcorea
lattin a
sysdi a
of t warmanagees-r ' f o
Is. P
termier RF1. Useswaper connd acetern w i
I in
e f o
nent/ur Deresennal m
I fi
r fildisktainsount i
II beand
r U
twoctaptlyultixedes a
andthe
ngexp10
NIXRKO
e drthisp I exhea
re s
fosys
i nf o
andehar
was5 dii veshas
or /
d dtorer t
tern
rmatd tod w
devesk p, 32bee
an R
i sk/-
d onempofileion.128
i red
lopeacksk won exP03
f I
t hera ryss a
I
k wote
donaA twords ofpandedmovi ngoat i ngRP0.3.f i le
nd then therds ofrmi na
I
The base operating system occupies 24.5k words ofmemory. This system includes a large number of devicedrivers*- and enjoys a generous amount of space for I/Obuffers and system tables. A minimal system would require40k words of memory. It should be noted that UNIX alsorequires the memory management option offered by DEC to runat all.
The base operating system was developed by 3ellLaboratories in Murray Hill* New Jersey. The Bell installa-tion supports a high speed paper tape reader-punch/- nine-track magnetic tape/ and Dectape. 3esides the console
IX 3/18/75
terminal/- there are 14 variabte speed communication d a -
tasets/- and a 201 series dataset for spooling printout to a
communal line printer. There are also several one-of-a-kinddevices including a voice response unit/ a voice synthesiz-er/ a phototypesetter/ a digital switching networks and a
satellite PDP-11/20 which generates vectors/- curves/- and;haracters for a Tektronix 611 storage-tube display.
Pliability
As of this writing network UNIX has been running oni full time basis for about four weeks. During that period/;here were between three and four crashes a day. This is
lot a valid indicator because many of the failures were dueo hardware problems. More recently the hardware has beene-conf i gured to improve reliability and the crash rate hasieen reduced to one a day with a down time of 2-5 minutes.his is expected to continue/- but the sampling period hasnteen long enough for any dependable analysis.
vailability
Although the UNIX network software was developedithout ARPA supports the Center for Advanced Computation isilling to provide it gratis to trie people of the ARPA corn-
unity .
However/- Bell Laboratories must be contacted for a
icense to the base system itself. Bell's policy in theast has been to license the system to universities for a
Dminal fee/- $150.00/- and unfortunately for a cost of20/000.00 to "non-university" institutions.
In this light/ Bell was approached to see what theire action would be to an ARPA Network wide license. They saidhat they were open 'to suggestions. in that area. S o / shouldnough people desire a system/ perhaps a less expensiveicense fee can be negotiated.
In any case we are willing to help any group withcquisition of a system.
For further information concerning the system con-act
Steve HolagrenCenter for Advanced ComputationUniversity of Illinois-Urbana Illinois 61801
<217)-333~8469or
jft* 3/18/75
holngren at i si
Outlook and Future Plans
With the advent of Telnet in UMIX/ current plans areto run the system over the next one or two months and workout any remaining bugs. While this is going on/- extensiveDandwidth and load testing is going to take place and anyreasonable improvements made.
After Telnet has proved itself reliable/ the Opensystem call will be expanded to include further parameteri-zation. This parameterization will encompass connections tospecific sockets^ simplex connections based on a socketalready in use/ and the ability to listen on a local socket.
After those extensions/ net mail/ then network FTPand finally network RJE will be implemented. All will runas user programs so the size of the system kernel will noti ncrease .
Ultimately/ Server Telnet and Server FTP may beincorporated into the system/ but they are not a prioritypiece of work.
There is also interest in implementing some of theProcedure Call Protocol being developed by the NationalSoftware Works/ but no definite plans have been made.
Acknowledgements
•I am much indebted to Gary Grossman who participatedin the design and wrote the NCP Daemon; and to Steve Bunchwho was the the third member of our design group and wrotethe Kernel message software.
The three of us are particularly' appreciative of thecriticism and support of Dr. Hugh Folk/ Dr. Peter Alsberg/Greg Chesson/ John Mullen/ < a r I Kelley and Dave Healy.
References
1. Unix Time-Sharing SystemKen Thompson and Dennis RitchieCommunications of the ACMJuly 1974/ Vol 17/ Number 7
2. Specifications for the Interconnectionof a
Host to an IMPReport no. 1822 Bolt Beranek and Newman Inc
3/18/75
Chapter 3/ System Operation
3. Host/Host Protocol for the ARPA NetworkAlex Mckenzie*- 33NNIC Document 8246
A. Ants Mark I User's GuideKarl Kel leyCenter for Advanced Computation 2/1/74
Ants Mark Two SystemKarl KelleyCenter for Advanced Computation 1/10/74