Network Working Group                                        A. Bogdanov
Request for Comments: 3018                                     NKO "ORS"
Category: Experimental                                     December 2000


             Unified Memory Space Protocol Specification

Status of this Memo

  This memo defines an Experimental Protocol for the Internet
  community.  It does not specify an Internet standard of any kind.
  Discussion and suggestions for improvement are requested.
  Distribution of this memo is unlimited.

Copyright Notice

  Copyright (C) The Internet Society (2000).  All Rights Reserved.

Abstract

  This document specifies Unified Memory Space Protocol (UMSP), which
  gives a capability of immediate access to memory of the remote nodes.

Conventions used in this document

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  document are to be interpreted as described in RFC-2119 [2].

  The following syntax specification uses the augmented Backus-Naur
  Form (ABNF) as described in RFC-2234 [3].

Table of Contents

  1.  Introduction...................................................4
  2.  The UMSP Model.................................................5
    2.1  128-bit Address Space.......................................5
    2.2  Computing Model.............................................7
    2.3  System Architecture.........................................9
  3.  Instruction Format............................................11
    3.1  Instruction Header.........................................12
    3.2  Extension Headers..........................................15
    3.3  Instruction Operands.......................................17
    3.4  Address Formats............................................17
  4.  Response of the Instructions..................................19
    4.1  RSP, RSP_P.................................................20
    4.2  SND_CANCEL.................................................20
  5.  Jobs Management...............................................21



Bogdanov                      Experimental                      [Page 1]

RFC 3018             Unified Memory Space Protocol         December 2000


    5.1  Job Initiate...............................................23
      5.1.1  CONTROL_REQ............................................24
      5.1.2  CONTROL_CONFIRM........................................25
      5.1.3  CONTROL_REJECT.........................................26
    5.2  Task Initiate..............................................26
      5.2.1  TASK_REG...............................................26
      5.2.2  TASK_CONFIRM...........................................27
      5.2.3  TASK_REJECT............................................28
      5.2.4  TASK_CHK...............................................28
    5.3  Establishment of session connection........................29
      5.3.1  SESSION_OPEN...........................................29
      5.3.2  SESSION_ACCEPT.........................................31
      5.3.3  SESSION_REJECT.........................................31
      5.3.4  Connection Profile.....................................32
    5.4  Session Closing............................................33
      5.4.1  SESSION_CLOSE..........................................34
      5.4.2  SESSION_ABEND..........................................35
    5.5  Task Termination...........................................35
      5.5.1  TASK_TERMINATE.........................................36
      5.5.2  TASK_TERMINATE_INFO....................................36
    5.6  Job Completion.............................................37
      5.6.1  JOB_COMPLETED..........................................37
      5.6.2  JOB_COMPLETED_INFO.....................................38
    5.7  Activity Control of Nodes..................................38
      5.7.1  _INACTION_TIME.........................................39
      5.7.2  STATE_REQ..............................................40
      5.7.3  TASK_STATE.............................................41
      5.7.4  NODE_RELOAD............................................42
    5.8  Work without session connection............................42
  6.  Instructions of Exchange between VM...........................44
    6.1  Data Reading/Writing Instructions..........................45
      6.1.1  REQ_DATA...............................................45
      6.1.2  DATA...................................................46
      6.1.3  WRITE..................................................46
      6.1.4  WRITE_EXT..............................................47
    6.2  Comparison Instructions....................................47
      6.2.1  CMP....................................................47
      6.2.2  CMP_EXT................................................48
      6.2.3  Response to Comparison Instructions....................48
    6.3  Control Transfer Instructions..............................48
      6.3.1  JUMP, CALL.............................................48
      6.3.2  RETURN.................................................49
    6.4  Memory Control Instructions................................50
      6.4.1  MEM_ALLOC..............................................50
      6.4.2  MVCODE.................................................50
      6.4.3  ADDRESS................................................51
      6.4.4  FREE...................................................51
      6.4.5  MVRUN..................................................51



Bogdanov                      Experimental                      [Page 2]

RFC 3018             Unified Memory Space Protocol         December 2000


    6.5  Other Instructions.........................................52
      6.5.1  SYN....................................................52
      6.5.2  NOP....................................................53
    6.6  Work with Objects..........................................53
      6.6.1  Reading/Writing of the Objects Data....................54
        6.6.1.1  OBJ_REQ_DATA.......................................54
        6.6.1.2  OBJ_WRITE..........................................55
        6.6.1.3  OBJ_WRITE_EXT......................................56
      6.6.2  Comparison Instructions of the Objects Data............56
        6.6.2.1  OBJ_DATA_CMP.......................................56
        6.6.2.2  OBJ_DATA_CMP_EXT...................................57
      6.6.3  Execution of the Objects Procedures....................57
        6.6.3.1  CALL_BNUM..........................................57
        6.6.3.2  CALL_BNAME.........................................58
        6.6.3.3  GET_NUM_PROC.......................................59
        6.6.3.4  PROC_NUM...........................................59
      6.6.4  The Objects Creation...................................59
        6.6.4.1  NEW, SYS_NEW.......................................60
        6.6.4.2  OBJECT.............................................61
        6.6.4.3  DELETE.............................................61
      6.6.5  The Objects Identification.............................61
        6.6.5.1  OBJ_SEEK...........................................62
        6.6.5.2  OBJ_GET_NAME.......................................62
  7.  Chains........................................................62
    7.1  Sequence...................................................63
    7.2  Transaction................................................64
      7.2.1  _BEGIN_TR..............................................64
      7.2.2  EXEC_TR................................................65
      7.2.3  CANCEL_TR..............................................66
    7.3  Fragmented instruction.....................................66
    7.4  Buffering..................................................67
    7.5  Acknowledgement of chains..................................69
    7.6  Base-displacement Addressing...............................70
  8.  Extension Headers.............................................71
    8.1  _ALIGNMENT.................................................71
    8.2  _MSG.......................................................71
    8.3  _NAME......................................................72
    8.4  _DATA......................................................72
    8.5  _LIFE_TIME.................................................72
  9.  Search of resources...........................................73
    9.1  VM_REQ.....................................................75
    9.2  VM_NOTIF...................................................75
  10.  Security Consideration.......................................77
  11.  Used Abbreviations...........................................78
  12.  References...................................................79
  13.  Author's Address.............................................80
  14.  Full Copyright Statement.....................................81




Bogdanov                      Experimental                      [Page 3]

RFC 3018             Unified Memory Space Protocol         December 2000


1  Introduction

  UMSP is the network connection-oriented protocol.  It corresponds to
  session and presentation layers of model OSI.  The protocol is
  designed for implementation in a wide class of systems, from simple
  devices based on the dedicated processors, up to universal computers
  and clusters.

  For the data exchange, the protocol uses transport layer service with
  reliable delivery.  It is possible to use not providing reliable
  delivery protocol for the transmission of not requiring
  acknowledgement data.  This document describes use TCP and UDP.

  The creation of network environment for the organization 128-bit
  address space of memory distributed between Internet nodes is the
  basic purpose of the protocol UMSP.  The protocol defines algorithm
  of the connections management and format of network primitives.  It
  doesn't control local memory on the node.

  As against the traditional network protocols, the user applications
  on different nodes interact not by the network primitives exchanging
  or working with the dataflows, but by immediate data reading/write or
  control transfers to the code in virtual memory of the remote node.
  The user's application can know nothing about existence of the
  protocol and network, and simply use the instructions with 128-bit
  addresses.

  Firstly, it is supposed to use UMSP in systems based on the virtual
  machines (VM), executing the pseudo-code.  However, the protocol may
  be used in systems executing a processor code, for example, in
  clusters or in universal operational systems, for the organization of
  the distributed virtual address space.  Besides, the minimal profile
  of the protocol may be used in simple devices, which do not have the
  operational system.

  The protocol gives various means for set the connection parameters
  and allows building systems with a high protection level without
  restriction applications functionalities.

  UMSP can essentially simplify the distributed systems development
  process.  It gives an opportunity to unite not only information, but
  also calculating resources of the large number of polytypic computers
  without significant expenses for the programs standardization and
  development.







Bogdanov                      Experimental                      [Page 4]

RFC 3018             Unified Memory Space Protocol         December 2000


2  The UMSP Model

2.1  128-bit Address Space

  UMSP is based on the 128-bit distributed address memory space model.
  The 128-bit address contains the information about the network type,
  network node address and local memory address.  It has the following
  format:

  Octets
   0      1                                                    16
  +------+--------------+--------------------+----------------+
  |Header|     FREE     |     NODE_ADDR      |    MEM_ADDR    |
  +------+--------------+--------------------+----------------+

  Complete address length is fixed and is equal to 16 octets.

  Header

     1 octet.  Address header field completely defines the address
     format.  The header has the following format:

     Bits
      0     1     2     3     4     5     6     7
     +-----+-----+-----+-----+-----+-----+-----+-----+
     |      ADDR_LENGTH      |  NET_TYPE | ADDR_CODE |
     +-----+-----+-----+-----+-----+-----+-----+-----+

     ADDR_LENGTH

        4 bits.  The length of the network address.  This field
        contains the number of octets in the NODE_ADDR field.  The
        value 0 is not allowed.

     NET_TYPE

        2 bits.  The network type.  This field specifies a type of
        network, in which the node is.

     ADDR_CODE

        2 bits.  The length code of the local memory address.  The
        value of this field specifies the length of the local memory
        address.  The following values of the field and appropriated to
        them length of the field MEM_ADDR are defined:






Bogdanov                      Experimental                      [Page 5]

RFC 3018             Unified Memory Space Protocol         December 2000


           %b00 - 16 bit
           %b01 - 24 bit
           %b10 - 32 bit
           %b11 - 64 bit

     The values combination of the three fields of heading is named
     address format number.  These fields unequivocally define a
     network, in which the node is located.  Format number writes as
     follows:

        N <ADDR_LENGTH> - <NET_TYPE> - <ADDR_CODE>

     For example, N 4-0-2 defines the address with length of the node
     network address 4 octets and memory address with the length 32
     bits.  The network type 0 for such address format is defined for
     the network IPv4 in the presented document.  If the network type
     is equal to zero, it may be missed during the writing of the
     address format number.  For example, format N 4-0-2 and 4-2 are
     equivalent.  If both fields NET_TYPE and ADDR_CODE are set to
     zero, they may be omitted.  Thus, a format number writes as one
     figure.

     One or several address format numbers must be assigned for each
     global network, included in unified system.

  FREE

     0 - 12 octets.  This field is unused by the protocol.  It may
     contain any additional information, which is necessary for the
     control system of the node memory.  If this field is not used, the
     zero value must be set in all octets.  Using of this field results
     that the network instructions must contain only complete 16 -
     octet address and the short address of local memory cannot be
     used.

  NODE_ADDR

     1 - 13 octets.  The node address.  The format of this field is
     defined separately for each address format number.  The field of
     the node address should not necessary precisely correspond to the
     real network address.  If the real network address is longer than
     this field, it is necessary to organize in the network a subset of
     supporting the protocol UMSP addresses.








Bogdanov                      Experimental                      [Page 6]

RFC 3018             Unified Memory Space Protocol         December 2000


  MEM_ADDR

     16/24/32/64 bits.  The address of local memory.  This field is the
     memory address in system, which is set by a field NODE_ADDR.  The
     node completely responds for its memory control.  The protocol
     does not define the order of using and format of this field.

  128-bit address for the user applications is one field.  The user
  code cannot know about a physical arrangement of addressed memory.

  The 128-bit memory address may be transmits between nodes, as the
  data, for example, in the buffer of function parameters, or in the
  instruction of copying the data.  Therefore, it must identify the
  given node from any other nodes unequivocal.

  Any certain algorithm, connecting real network and 128-bit address,
  does not exist.  All used address formats must be known beforehand.

  As UMSP has its own address space, it can unite several global
  networks.  The nodes can have internal local networks or subordinated
  addressable devices connected with the node by the not-network
  communications.  Any node by address format number must have an
  opportunity to define the gateway respond for routing of this
  address.

2.2  Computing Model

  Computing model is three-layer:

     (1) Job
     (2) Task
     (3) Thread of control

  The job corresponds to the user application.  The job is distributed
  and can simultaneously be executed on many nodes.  The job control is
  carried out centralize, from the node named as Job Control Point
  (JCP).  One JCP can control the some jobs.  JCP can be located on the
  same node, on which the job is created, or on any other addressed net
  point.

  The task is the job presentation on the separate node.  The task
  includes one or several computing threads of control.  The job has
  only one task on each node.

  The job is finished, when the appropriate user application is
  finished.  At the end of the job all tasks of this job on all nodes
  are finished.




Bogdanov                      Experimental                      [Page 7]

RFC 3018             Unified Memory Space Protocol         December 2000


  The job has its isolated 128-bit address space.  The address space is
  segmented.  A segment is the local memory of one node.  Besides, the
  protocol allows working with objects.  The objects are separate
  associative memory of the node.

  The task thread represents the concrete control thread, which are
  executed by VM in the certain node.  The thread can read and write to
  any address of 128-bit address space of the job.  The control
  transfer to the address from other (remote) node, results to the
  creation of the new thread on the remote node.  The continuous code
  segment cannot be distributed on several nodes.  In addition, it is
  impossible to receive continuous memory area distributed on several
  nodes.

  The protocol does not demand to support the different tasks of not-
  crossed memory space from the separate VM node.  The supporting of
  multi-thread is not also the obligatory requirement.

  The 128-bit Global Job Identifier (GJID) is defined by protocol.  It
  is assigned on JCP, which will control the job.  All active GJID have
  the unique values in the unified system at each moment of time.

  The job can contain VM code of different types.  Different types VM
  can be situated on one or different nodes.  The mechanism of
  association of different VM types in groups on one node is
  stipulated, so to the non-uniform code can be executed on one node in
  a context of one job.  The groups are described in details in section
  9.  VM, incorporated in groups, must work in common memory space (to
  have a common subsystem of memory control).






















Bogdanov                      Experimental                      [Page 8]

RFC 3018             Unified Memory Space Protocol         December 2000


2.3  System Architecture

  System structure, based on using Virtual Machines, is given in the
  following figure:

             Node 1                              Node 2
            --------                            --------

     +--------------------+              +--------------------+
     | User Application 1 |              | User Application 1 |
     +-----------------------+           +-----------------------+
        | User Application N |              | User Application N |
        +--------------------+              +--------------------+

  +-----+  +-----+       +-----+      +-----+  +-----+       +-----+
  | VM1 |  | VM2 | . . . | VMn |      | VM1 |  | VM2 | . . . | VMn |
  +--+--+  +--+--+       +--+--+      +--+--+  +--+--+       +--+--+
     |        |             |            |        |             |
   +--------------------------+        +--------------------------+
   |                          |        |                          |
   | +-----+  U M S P         |        |          U M S P         |
   | | JCP |                  |        |                          |
   | +-----+                  |        +-------------+------------+
   +-------------+------------+                      |
                 |                             +-----+-----+
           +-----+-----+                       |    TCP    |
           |    TCP    |                       +-----+-----+
           +-----+-----+                             |
                 |                                   |
                 +-----------------/                 |
                                  /------------------+
                                 /
                                 |
                           +-----+-----+
               Node N      |    TCP    |
              --------     +-----+-----+
                                 |
                    +------------+------------+
                    | +-----+                 |
                    | | JCP | U M S P         |
                    | +-----+                 |
                    +-------------------------+

        Figure 1. Structure of the system based on use VM.







Bogdanov                      Experimental                      [Page 9]

RFC 3018             Unified Memory Space Protocol         December 2000


  One or several VM are working on upper level for UMSP.  The VM layer
  is not network level.  Last network level is UMSP.  Therefore, VM
  layer has no its own network primitives and uses together with UMSP
  the same field of operation code.

  The end services user of the protocol is the user code, which is
  executed by the virtual machine.  It has the instructions with the
  128-bit address.  VM translates these instructions to network
  commands, which are transmitted through the UMSP protocol for the
  executing by the remote machine.  Internal organization VM, command
  system and API can be anyone.  The protocol defines only format of
  primitives, which the virtual machines exchange through a network.

  The protocol does not control the jobs memory.  Control of memory
  should realize VM.  If a few VM works on one node, they may have the
  common memory space or may be completely isolated.

  UMSP uses the transport layer with reliable delivery for the data
  exchange.  This document defines of using TCP.  For the transfer of
  not requiring acknowledgement data may be used UDP.  Thus, the
  connection through TCP is obligatory.  Use of multiple connections
  TCP with multiplexing is supposed.  The control of transport
  connections is not the part of the UMSP protocol.

  The UMSP instructions do not contain network addresses of the
  receiver and sender.  The protocol requires that one address UMSP
  must correspond to the one transport layer address.  Accordingly, it
  is necessary to define unequivocal the node address on transport
  layer by the 128-bit address of memory.

  Except the TCP, it is possible to use other transport protocols or
  not network communications.  The following requirements are showed to
  them:

     o  Reliable delivery.  The transport layer must inform about
        delivery or its impossibility;
     o  The violation of a sequence of transmitted segments is allowed;
     o  The duplication of segments is not allowed;
     o  At emergency reload of nodes it is necessary to guarantee
        identification of segments concerning session connections,
        assigned up to reload;
     o  Use connectionless-mode is possible.

  VM is the independent program and the interaction with the protocol
  is necessary for it only when it executes the instructions with the
  128-bit address, concerning to other node.  VM can execute several





Bogdanov                      Experimental                     [Page 10]

RFC 3018             Unified Memory Space Protocol         December 2000


  user tasks.  Each task can contain several threads of control.  VM
  must be able to interpret the application instructions with the 128-
  bit address to one or several instructions of the UMSP protocol.

  The session connection opens between nodes for the data exchange.
  One connection is relational only with one job.  There may be several
  session connections for the different jobs simultaneously between two
  nodes.  Besides, the protocol provides the connectionless data
  exchange.

  The exchange between UMSP nodes can include the instructions of the
  following type:

     o  Immediate reading/write in memory;
     o  Requests of allocation/free memory;
     o  Comparison instructions;
     o  Call-subroutine and unconditional jump instructions;
     o  Synchronization instructions;
     o  Work with objects instructions - reading / writing in memory of
        objects and execution of objects procedures.

  UMSP does not trace the user control threads.  VM must provide itself
  the necessary order of performance of the instructions.

  The length of UMSP instructions does not depend on segment length of
  the transport layer.  The segmentation is provided for transfer of
  the long instructions.  The packing of the short instructions in one
  segment with a possibility of compression of headings is used for its
  transfer.  The minimal size of necessary for work segment is 6
  octets.  For realization of all functions, it is necessary 54 octets.

3  Instruction Format

  The UMSP instruction includes the basic header, extension headers and
  operands.  All fields have variable length.

  +----------------+----------------------+------------------------+
  |     Header     |   Extension headers  |       Operands         |
  +----------------+----------------------+------------------------+

  The header contains operation code and the information necessary for
  the instruction interpretation.

  The optional extension headers contain the additional information,
  not defined in basic header.

  The operands contain instructions data.




Bogdanov                      Experimental                     [Page 11]

RFC 3018             Unified Memory Space Protocol         December 2000


  The instruction format allows calculating common instruction length,
  without knowing definition of separate operation code.

  The instructions headers provide for the short and extended format
  for maintenance of the effective protocol work in wide range of
  network speeds.  Besides, there is a simple algorithm of the headers
  compression.

  The all instructions and extension headers the identifiers are given
  which enter the name by upper case symbols.  The identifiers of the
  instructions begin with the letter.  The identifiers of the extension
  headers begin with underlining symbol.

3.1  Instruction Header

  The header has the following format:

   Octets:
      +0                              +1
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  0: |            OPCODE             |ASK|  PCK  |CHN|EXT| OPR_LENGTH|
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  2: |                        OPR_LENGTH_EXT                         |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  4: |                         CHAIN_NUMBER                          |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  6: |                         INSTR_NUMBER                          |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  8: |                                                               |
     +                          SESSION_ID                           +
     |                                                               |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  12:|                                                               |
     +                            REQ_ID                             +
     |                                                               |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+

  OPCODE

     1 octet.  The operation code.  Value of this field is identified by
     the instruction.  Values of operation codes are divided into the
     following intervals:

            1 - 112  management instructions
          113 - 127  reserved
          128 - 223  instructions of exchange between VM
        0, 224, 255  reserved




Bogdanov                      Experimental                     [Page 12]

RFC 3018             Unified Memory Space Protocol         December 2000


  ASK

     1 bit.  The flag of response necessity.  This flag defines
     presence of field REQ_ID in header.  If ASK = 1, there is field
     REQ_ID in the instruction.  If EXT = 0, the field REQ_ID in the
     instruction are absent.

  PCK

     2 bits.  The Header compression attribute.  These bits are used
     for packing instructions headers transmitted on one connection TCP
     or for sending of the several instructions in one package UDP.
     Use of these bits is based on the assumption that two following in
     succession instructions concern to one session connection, or one
     chain, with a high probability.  The PCK bits have one of the
     following values:

     %b00 - The instruction does not belong to the definite session.
            The fields CHAIN_NUMBER, INSTR_NUMBER and SESSION_ID are
            absent in header of such instruction.
     %b01 - The given instruction concerns to the same session
            connection, as previous.  The field SESSION_ID in the
            instruction header is absent.
     %b10 - The given instruction belongs to the same connection and
            same chain, as previous.  The fields CHAIN_NUMBER,
            INSTR_NUMBER and SESSION_ID in header of such instruction
            are absent.  The INSTR_NUMBER value of the current
            instruction calculates by addition of one to INSTR_NUMBER
            value of the previous instruction.
     %b11 - The given instruction may does not concern to the same
            session, as previous.  The field SESSION_ID is present at
            it.  The presence of fields CHAIN_NUMBER and INSTR_NUMBER
            is defined by CHN flag.

  CHN

     1 bit.  The flag of chain.  Transmitted on one session connection
     and concerning one job instructions, may be unified in a chain.
     Chains are considered in details by section 7.  If SEQ = 1, the
     instruction is connected with chain and there are fields
     CHAIN_NUMBER and INSTR_NUMBER (if PCK is not set to %b10) at it.
     If bit CHN = 0, the instruction is not connected with chains and
     there are no fields CHAIN_NUMBER and INSTR_NUMBER in it.








Bogdanov                      Experimental                     [Page 13]

RFC 3018             Unified Memory Space Protocol         December 2000


  EXT

     1 bit.  The flag of extension headers presence in the instruction.
     If EXT = 1, there is one or more extension headers in the
     instruction.  If EXT = 0, the extension headers in the instruction
     are absent.

  OPR_LENGTH

     3 bits.  The number of 32 bit words in the operands field.  The
     value 0 defines absence of operands field.  The value %b111
     specifies use of the extended header format.  In the extended
     format, the length of operands is defined by the field
     OPR_LENGTH_EXT, and the field OPR_LENGTH is not used.

  OPR_LENGTH_EXT

     2 octets.  The number of 32 bit words in the operands field.  The
     field OPR_LENGTH_EXT is present in header, only if OPR_LENGTH =
     %b111.  If OPR_LENGTH < > %b111, the field OPR_LENGTH_EXT is
     absent.  If OPR_LENGTH_EXT = 0, the field of operands is absent.
     There are following reasons, on which it is necessary to use field
     OPR_LENGTH_EXT instead of OPR_LENGTH:

        (1) If operands length must be more than 24 octets
        (2) If making the fields alignment of 4 octets is more
            effective, than compression of header of 2 octets.

  CHAIN_NUMBER

     2 octets.  The number of chain.  This field contains number of
     chain, to which the given instruction concerns.  The values %x0000
     and %xFFFF are reserved.

  INSTR_NUMBER

     2 octets.  The instruction number.  This field contains the serial
     number of instruction in a chain.  The numbering begins with zero.
     Value %xFFFF is reserved.

  SESSION_ID

     4 octets.  It is the identifier of the session connection assigned
     by the instruction receiver.  During the session connection
     opening, each side sets its own identifier to connection and
     informs it to other side.  The zero value of this field specifies
     that the instruction does not concern to the definite session.
     The value %xFFFFFFFF is reserved.



Bogdanov                      Experimental                     [Page 14]

RFC 3018             Unified Memory Space Protocol         December 2000


  REQ_ID

     4 octets.  The request identifier.  It is uses for establishment
     of correspondence between requests and responds to it.

  Further, the identifier OPR_LENGTH is used at the description of the
  instructions format.  It means using of OPR_LENGTH_EXT field, if
  OPR_LENGTH = %b111.  The instruction with length of operands, which
  are not exceeding 24 octets, may be transmitted with header in the
  short format (OPR_LENGTH < > %b111) or in the extended format
  (OPR_LENGTH = %b111).  Both forms are equivalent.

  Minimal header length in the short format is 2 octets, in the
  extended format - 4 octets.  Maximal header length is 16 octets.

3.2  Extension Headers

  If the EXT flag in the instruction header set to 1, the instruction
  contains from one up to thirty extension headers.  The extension
  headers are used for the following purposes:

  o  For sending of the service information which were not provided in
     the basic header.
  o  For sending of the data of length more than 262240 octets in one
     instruction.

  The extension headers have the following common format:

  Octets:
      +0                              +1
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  0: |HXT|       HEAD_LENGTH         |       HEAD_LENGTH_EXT         |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  2: |                   continued HEAD_LENGTH_EXT                   |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  4: |HSL|HOB|HRZ|     HEAD_CODE     |         HEAD_CODE_EXT         |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  6: |                           RESERVED                            |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
  8: |                                                               |
     /                             DATA                              /
     /                                                               /
     |                                                               |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+







Bogdanov                      Experimental                     [Page 15]

RFC 3018             Unified Memory Space Protocol         December 2000


  HXT

     1 bit.  Specify length of the field of data length.  If HXT = 0,
     length of the extension header is defined by a field HEAD_LENGTH.
     The field HEAD_LENGTH_EXT in this case is absent.  If HXT = 1,
     length of header is defined by unification of fields HEAD_LENGTH
     and HEAD_LENGTH_EXT.

  HEAD_LENGTH

     7 bit.  The number of 16 bit words in DATA field.  If HXT = 0,
     this is independent field.  If HXT = 1, it is the senior bits of
     complete length field.

  HEAD_LENGTH_EXT

     3 octets.  The number of 16 bit words in DATA field.  If HXT = 0,
     this field is absent.  If HXT = 1, it is the younger bits of
     complete length field.

  HSL

     1 bit.  The flag of last header.  It is set to 1 for last
     extension header in the instruction.  In other extension headers,
     this flag is set to 0.

  HOB

     1 bit.  The flag of obligatory processing.  It defines the order
     of the instruction processing, if the receiving node does not know
     purpose of the extension header or cannot process it by any
     reason.  If HOB = 1, instruction must not be carried out.  If HOB
     = 0, it does not influence on the instruction processing.  The
     protocol must process all extension headers, irrespective of
     errors presence.

  HRZ

     1 bit.  The field is reserved for the future expansions.  This
     field must not be analyzed by the protocol on receiving.  It must
     be set to 0 at sending.

  HEAD_CODE

     5 bits.  If HXT = 0, the field contains the extension header code.
     If HXT = 1, this field joins the field HEAD_CODE_EXT.  It is the
     senior bits of the header code.




Bogdanov                      Experimental                     [Page 16]

RFC 3018             Unified Memory Space Protocol         December 2000


  HEAD_CODE_EXT

     1 octet.  If HXT = 0, this field is absent.  If HXT = 1, it is the
     younger bits of the header code.

  RESERVED

     2 octets.  If HXT = 0, this field is absent.  If HXT = 1, this
     field is reserved for further use.  The field RESERVED must not be
     analyzed by the protocol during the receiving in the current
     realization of the protocol.  It must be set to 0 at sending.

  DATA

     The data field of the extension header.  If HXT = 0, the length of
     field is 0 - 254 octets, if HXT = 1, the length is 0 - 4 * 10^9
     octets.  The format of this field is defined separately for each
     value of the header code.

  On the receiving side, the extension headers must be processed in
  that order, in what they follow in the instruction.  If the
  instruction contains more than 30 extension headers, it is considered
  erroneous.  It is necessary to break off the session connection, on
  which it was transmitted, after the reception of such instruction.

  The identifiers HEAD_LENGTH and HEAD_CODE are used further in the
  text at the description of the extended headers format.  It assumes
  using of fields HEAD_LENGTH + HEAD_LENGTH_EXT and HEAD_CODE +
  HEAD_CODE_EXT, if HXT = 1.  The headers with the code 0 - 30 can be
  sent in short (HXT = 0) and in extended (HXT = 1) format.

3.3  Instruction Operands

  The operands field contains the instruction data.  The length of
  operands field is showed in OPR_LENGTH or OPR_LENGTH_EXT and it is
  multiple to four octets.  If necessary, 1 - 3 zero-value octets are
  padded in the end of a field.  Maximal length of operands is 262140
  octets.  The extension headers are used, if the instruction must
  contain longer data.

  The format of the operands field is defined separately for each
  instruction.

3.4  Address Formats

  The following address format numbers are definite for nodes,
  immediately connected to the global IPv4 network:




Bogdanov                      Experimental                     [Page 17]

RFC 3018             Unified Memory Space Protocol         December 2000


     N 4-0-0 (4)
     N 4-0-1 (4-1)
     N 4-0-2 (4-2)

  The appropriate formats of 128-bit addresses:

  Octets:
     +0              +1              +2              +3
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  0: |0 1 0 0|0 0|0 0|                   Free                        |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  4: |                              Free                             |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  8: |            Free               |           IP address          |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  12:|           IP address          |      Local memory address     |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  0: |0 1 0 0|0 0|0 1|                   Free                        |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  4: |                              Free                             |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  8: |     Free      |                  IP address                   |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  12:|   IP address  |             Local memory address              |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  0: |0 1 0 0|0 0|1 0|                   Free                        |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  4: |                            Free                               |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  8: |                         IP address                            |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  12:|                     Local memory address                      |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

  Free

     It is not used by the protocol.

  IP address

     It sets the node address in the global IPv4 network.




Bogdanov                      Experimental                     [Page 18]

RFC 3018             Unified Memory Space Protocol         December 2000


  Local memory address

     It is described in section 2.1.

  IP-address defines the nodes of the given type unequivocally.  The
  TCP is used for the interaction with such nodes.  For sending of not
  requiring response instructions, using UDP is allowed.  IANA has
  assigned ports TCP and UDP 2110.  This port must be open for the
  listening (receiving).  TCP node, initialing the connection opening,
  or the UDP node, carrying out the package sending, can use any port.
  Using several TCP connections with multiplexing is supposed.

4  Response of the Instructions

  The protocol instructions are divided into two types:

     (1)  The management instructions transmitted on UMSP layer (OPCODE
          = 1 - 112).
     (2)  The instructions of the exchange between VM (OPCODE = 128 -
          223).

  The processing of two types of the instructions differs as follows:

  o  The field of the identifier of request REQ_ID is formed by the
     protocol in the instructions of the first type, and it is formed
     by VM for the instructions of the second type.
  o  The protocol must analyze the field REQ_ID and compare it with the
     instructions, transmitted earlier, after receiving of the response
     instruction of the first type.
  o  The protocol must not analyze the field REQ_ID after receiving of
     the response instruction of the second type.  This instruction is
     simply sent to VM.

  The response instructions have the field ASK equal to 1.  It means,
  that the header have the field REQ_ID.  The value taken from the
  confirmed instruction is written into the field REQ_ID.  The response
  instruction does not require response.

  A few VM can be connected to the protocol on the node.  Everyone VM
  can work in its own address space.  The identifiers of requests for
  different VM can coincide.  Therefore, instruction is identified by
  two fields:

  o  The session identifier SESSION_ID, which is connected with
     definite VM.
  o  The request identifier REQ_ID.





Bogdanov                      Experimental                     [Page 19]

RFC 3018             Unified Memory Space Protocol         December 2000


4.1  RSP, RSP_P

  "Response" (RSP) and "Response of the protocol" (RSP_P) instructions
  have the identical format.  The difference is only in the operation
  code:

     OPCODE = 129/1  ; correspondingly to RSP/RSP_P
     ASK = 1
     PCK = %b01/11
     EXT = 0/1
     CHN = 0
     OPR_LENGTH = 0/1
     SESSION_ID and REQ_ID - The values is taken from the confirmed
                             instruction.
     Operands:
        2 octets: The basic return code.
        2 octets: The additional return code.
     The optional extension header:
        _MSG - contains the arbitrary error description.

  The instruction without operands is used for the positive response.
  It is equivalent to zero values of the field of the basic and
  additional return codes.

  The zero basic return code is used for positive response.  The
  additional return code may have non-zero value.

  The instruction with non-zero basic return code is used for negative
  response.  The basic return code defines the error category.  The
  additional return code identifies an error.

  The instruction RSP is formed upon the VM request.  The return codes
  must be received from VM.  If the protocol cannot deliver the
  requiring response instruction to VM, it forms negative response RSP
  independently.

  The instruction RSP_P is always formed at the UMSP layer.  If the
  protocol cannot define on what instruction the RSP_P is transmitted,
  nothing actions is executed.

4.2  SND_CANCEL

  There can be a necessity to cancel sending after the part of the data
  have been already transmitted and have occupied the buffer on the
  reception side, by sending of the long fragmented instructions or
  transactions.  The protocol provides the instruction "The sending is
  canceled" (SND_CANCEL) for this purpose.  This instruction has the
  following fields value:



Bogdanov                      Experimental                     [Page 20]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 2
     ASK = 0
     PCK = %b01/10/11
     EXT = 0/1
     CHN = 1
     OPR_LENGTH = 1
     SESSION_ID - The value is taken from the cancelled chain.
     CHAIN_NUMBER - Number of the chain, which sending is cancelled.
     INSTR_NUMBER - Always has zero-value.
     Operands:
        2 octets: The basic return code.
        2 octets: The additional return code.
     The optional extension header:
        _MSG - contains the arbitrary error description.

  The instruction SND_CANCEL is used for the cancel of the partially
  transmitted transaction or fragmented instruction.  At the receiving
  the SND_CANCEL instruction, all the earlier received data in the
  chain are rejected.

5  Jobs Management

  The jobs management includes the following functions:

  o  Initiation and completion of jobs;
  o  Initiation and completion of tasks;
  o  Opening and closing of session connections;
  o  Activity control of nodes.

  The instructions with OPCODE = 1 - 112 are used for jobs management.
  These instructions must be sent through TCP.  Use UDP is not allowed,
  even if the instructions do not demand response.

  UMSP bases on model with the centralized control of the separate job.
  The reason is that the pointers control is not obviously possible in
  the decentralized system.  Any task can be finished at any moment or
  the node can be reloaded.  There is no way guaranteeing the
  notification about in the decentralized system all other nodes, on
  which the job works.  As the job continues to exist - the task
  concerning the job can be initiated on the same node again.  This
  task can allocate new dynamic resources.  The addresses for the again
  allocated resources can be crossed with addresses of resources, which
  existed on the node before the task restart.  The old pointers can be
  kept on other nodes.  It may be the formally correct pointers, but
  they will actually specify other objects.  The uncontrollable work of
  the application can be consequence of such situation.





Bogdanov                      Experimental                     [Page 21]

RFC 3018             Unified Memory Space Protocol         December 2000


  UMSP solves this task as follows:

  o  It allows defining the node, on which the task was completed,
     precisely.
  o  If the task on the node is finished before end of the job, all
     nodes, on which the job is executed, are notified of it.
  o  The repeated task initialization on the node is allowed, while all
     nodes will receive the message about the first task end.

  The protocol does not control the pointers.  VM supervises the
  pointers correctness.  VM must have architecture, in which 128 - bit
  pointers are stored in special memory areas, for this purpose.  The
  protocol informs VM about the nodes, on which task have finished the
  work.  VM must make all pointers concerning such tasks, invalid.  It
  results in exclusive situations at the access under these pointers.
  If the application provides processing exceptions, it keeps the
  capacity for work, or it is finished emergency.  Such decision allows
  excluding unguided applications working.

  For the decision of the specified questions at UMSP level, the
  control job node is defined for each job.  It names Job Control Point
  (JCP).  It may be the same node, on which the job is initiated, or it
  can be another dedicated node.  The basic JCP function is to trace
  the initialization and the end of the job tasks.  Besides, the
  dedicated JCP node may be used for the centralized users
  identification and the attack protection.

  The following identifiers are definite for the jobs and tasks
  control:

  o  Locally Task Identifier (LTID) is assigned to each active task on
     the node.  LTID length is equal to the length of local memory
     address defined for the node.  All LTID on the node must give
     unique values at each moment of time.  It is allowed to establish
     LTID, used earlier in the already completed tasks, for the again
     initiated tasks.
  o  JCP assigned the Control Task Identifier (CTID) to each task of
     the job.  Its length is equal to length of the local address
     memory on the node JCP.  All CTID on the JCP must give unique
     values at each moment of time.  As against LTID, the CTID value is
     chosen with some restrictions.
  o  Globally Task Identifier (GTID) is assigned to each task.  GTID
     has the same format, as the 128 - bit address of node memory has.
     The address of local memory is replaced on LTID in it.
  o  Globally Job Identifier (GJID) is assigned to the each job.  GJID
     is defined on the JCP node.  It has the same format, as the 128 -
     bit address of node JCP memory has.  The address of local memory




Bogdanov                      Experimental                     [Page 22]

RFC 3018             Unified Memory Space Protocol         December 2000


     is replaced on CTID of the first (initial) task of the job in it.
     GJID is used in the procedure of session connection opening for
     the definition JCP, which controls the job.

  LTID and CTID are written at the instructions in the field of length
  2/4/8 octets.  If the allocated for identifier field in the
  instruction is longer than identifier, LTID (CTID) writes in the last
  octets.  In the initial octets, the value 0 must be written.  If
  received LTID (CTID) is shorter than the local memory address, it is
  necessary to pad it with the zero octets in the beginning.

  GTID and GJID are written at the instructions in the field of length
  4-16 octets.  The field FREE is not present at these identifiers (see
  section 2.1).  It is considered, that it contains the zero-value
  octets.  Length of the identifier is defined in header of the
  address.

  By sending of instructions CONTROL_REQ, TASK_REG and SESSION_OPEN,
  the protocol uses timeout.  The value of timeout is assigned by node
  and must be more than three intervals of the maximal time of delivery
  at the transport layer.  The timeout is not influenced the waiting
  period in queue to the transport layer.

5.1    Job Initiate

  The job concerns to the user application executed on VM.  The UMSP
  job initialization can be made simultaneously with the application
  user start or during its working.

  The task, appropriated to its job, is initialized on the node
  together with the job.  LTID is binding to this task.

  If the node, on which the user application was loaded, is chosen for
  JCP, the question of the job initialization lays beyond the scope of
  the network protocol.

  Other node can be chosen as JCP for the following reasons:

  o  The job initialization node is connected to network by slow-speed
     or overloaded channel.  It is undesirable to send the managing
     traffic.
  o  The node has no computing possibilities for conducting the
     managing tables.
  o  The authentication on the detailed node is necessary.

  If the other node is chosen for JCP, the node, that initiates the
  job, must register the job at JCP.




Bogdanov                      Experimental                     [Page 23]

RFC 3018             Unified Memory Space Protocol         December 2000


5.1.1     CONTROL_REQ

  The instruction "To request a control" (CONTROL_REQ) is sending from
  the node, initial the job, to JCP of other node.  The instruction has
  the following values of fields:

     OPCODE = 3
     PCK = %b00
     CHN = 0
     ASK = 1
     EXT = 0/1
     OPR_LENGTH = 2/3  ; Depends on LTID length.
     REQ_ID - The value is assigned by the sender node protocol and
              then will be sent in the response.
     Operands:
        4 octets: The control parameters profile.  This field has the
                  following format:

           bits
            0     1     2     3     4     5     6     7
           +-----+-----+-----+-----+-----+-----+-----+-----+
           |                                               |
           +                 JOB_LIFE_TIME                 +
           |                                               |
           +-----+-----+-----+-----+-----+-----+-----+-----+
           | CMT |    Reserved     |        VERSION        |
           +-----+-----+-----+-----+-----+-----+-----+-----+
           |                   Reserved                    |
           +-----+-----+-----+-----+-----+-----+-----+-----+


           JOB_LIFE_TIME

              2 octets.  The job lifetime in seconds.  The zero-value
              signifies that the restriction of the job lifetime is
              unused.

           CMT

              1 bit.  The flag of several JCP using.  This field is
              reserved for the future expansion of the protocol.

           VERSION

              1 octet.  The number of the UMSP version.  It must
              contain the value 1.





Bogdanov                      Experimental                     [Page 24]

RFC 3018             Unified Memory Space Protocol         December 2000


           Reserved

              3 + 8 bits.  All bits must be set to 0.

        4/8 octet: LTID of task of the job, assigned on the node, which
                   initiate the job (by the sender of this
                   instruction).
     The optional extension headers:
        _JOB_NAME  -  This header contains the name of the Job.  Is
                      assigned once and must not change further.
        _INACT_TIME - This header contains the inaction time (see
                      section 5.7).

  At reception of the CONTROL_REQ instruction JCP checks the LTID value
  from the received instruction and makes the following:

  (1) If the node, which has sent CONTROL_REQ, already has registered
      on JCP the active job with such LTID, the notification about
      abnormality end of the registered job is sent, as is described in
      section 5.5.2 (it is considered, that the node was reloaded).
      After that, the sanction to an initiation of the new job is sent.
  (2) If the node has no registered job with received LTID, it allows
      the new job initiation at once.

  If JCP confirms the control, it will send the instruction
  CONTROL_CONFIRM, or else CONTROL_REJECT.

5.1.2     CONTROL_CONFIRM

  The instruction "To confirm the control" (CONTROL_CONFIRM) is sent
  from JCP as the positive response to CONTROL_REQ instruction.
  CONTROL_CONFIRM has the following values of fields:

     OPCODE = 4
     PCK = %b00
     CHN = 0
     ASK = 1 ; The instruction does not need to be responded.  This flag
               specifies presence of the REQ_ID field.
     EXT = 0/1
     OPR_LENGTH = 1-4 ; Depends of length of the GJID.
     REQ_ID - The value is taken from the instruction CONTROL_REQ
     Operands:
        4-16 octets: The GJID assigned to the job on the JCP.

  The sending of the instruction CONTROL_REQ means request of control
  and request of task initiation.  Assigned to the task CTID is part
  GJID (field of the local memory address).




Bogdanov                      Experimental                     [Page 25]

RFC 3018             Unified Memory Space Protocol         December 2000


5.1.3     CONTROL_REJECT

  The instruction "To reject the control" (CONTROL_REJECT) is sent from
  JCP as the negative response to CONTROL_REQ instruction.
  CONTROL_REJECT has the following values of fields:

     OPCODE = 4
     PCK = %b00
     CHN = 0
     ASK = 1.  The instruction does not need to be responded.  This flag
               specifies presence of the REQ_ID field.
     EXT = 0/1
     OPR_LENGTH = 1/2 ; Depends on presence of the control parameters
                        profile field.
     REQ_ID - The value is taken from the instruction CONTROL_REQ
     Operands:
        2 octets: The basic error code.  The zero-value is not
                  available.
        2 octets: The additional error code.
        4 octets: The control parameters profile (see section 5.1.1),
                  that is allowed by JCP.  This is optional field.
     The optional extension headers:
        _INACT_TIME - This header contains the inaction time (see
                      section 5.7).
        _MSG - contains the arbitrary error description.

5.2    Task Initiate

  The job is executed on several nodes simultaneously.  The task,
  appropriate to it, must be initialized on each node.  There is
  corresponding only one task to one job on the node.  Each task must
  be connected only with one job.

  The task is initiated together with the job on the node, which had
  created the job.  On the other nodes, the task is initiated during
  the receiving of the first request on the opening of the session
  connection, which is appropriate to the job.  The request about
  openings of session connection contains GJID.  GJID contains the JCP
  address.  It is necessary to receive the sanction from JCP for the
  task start.  If the request about the opening of session has been
  received from JCP node, it is not necessary to request the sanction.

5.2.1     TASK_REG

  The instruction "To register a task" (TASK_REG) is sent from the
  node, which initials the task, to JCP of the remote node.  The
  instruction has the following values of fields:




Bogdanov                      Experimental                     [Page 26]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 6/7/8 ; For length CTID of 2/4/8 octets.
     PCK = %b00
     CHN = 0
     ASK = 1
     EXT = 0/1
     OPR_LENGTH = 2-8  ; Depends on length of the GTID and LTID.
     REQ_ID - The value is assigned by the sender node protocol and
              then will be sent in the response.
     Operands:
        2/4/8 octets: CTID of the task initiated the job.  It CTID is a
                      part GJID from the instruction SESSION_OPEN.
        4-16 octets: GTID, assigned on the node, initialed session
                     connection.  GTID is formed of sender addresses (at
                     transport layer) and field LTID of the instruction
                     SESSION_OPEN.
        2/4/8 octets:  LTID, assigned on the node, initialed the task
                       (by the sender of this instruction).
     The optional extension headers:
        _INACT_TIME - This header contains the inaction time (see
                      section 5.7).

  The instruction TASK_REG must be sent only if the task with given
  GJID was not initiated on the node.

  JCP confirms initiation of a task at observance of the following
  conditions:

  (1) Task with received GTID already has registered on JCP.
  (2) Task with LTID for the node requesting for initiation has not
      registered.

  In all other cases, JCP will not confirm a task.

  If JCP confirms the task, it will send the instruction TASK_CONFIRM,
  differently TASK_REJECT.

5.2.2     TASK_CONFIRM

  The instruction "To confirm the task" (TASK_CONFIRM) is sent from JCP
  as the positive response to TASK_REG.  TASK_CONFIRM has the following
  values of fields:

     OPCODE = 9
     PCK = %b00
     CHN = 0
     ASK = 1.  The instruction does not need to be responded.  This flag
               specifies the field REQ_ID presence.
     EXT = 0/1



Bogdanov                      Experimental                     [Page 27]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPR_LENGTH = 1/2  ; Depends on length of the CTID.
     REQ_ID - The value is taken from the instruction TASK_REG.
     Operands:
        4/8 octets: The CTID assigned to the task on the JCP.
     The optional extension headers:
        _JOB_NAME - This header contains the name of the Job.

5.2.3     TASK_REJECT

  The instruction "To reject the task" (TASK_REJECT) is sent from JCP
  as the negative response to TASK_REG instruction.  TASK_REJECT has
  the following values of fields:

     OPCODE = 10
     PCK = %b00
     CHN = 0
     ASK = 1.  The instruction does not need to be responded.  This flag
               specifies presence of the REQ_ID field.
     EXT = 0/1
     OPR_LENGTH = 1
     REQ_ID - The value is taken from the instruction CONTROL_REQ
     Operands:
        2 octets: The basic error code.  The zero-value is not
                  available.
        2 octets: The additional error code.
     The optional extension headers:
        _INACT_TIME - This header contains the inaction time (see
                      section 5.7).
        _MSG - contains the arbitrary error description.

5.2.4     TASK_CHK

  With the purposes of a safety the node, which have received request
  about the opening of session connection, may check up at JCP the
  node, which has initialed connection, even if the task was already
  initiated.

  The instruction "To check up the task" (TASK_CHK) is sent from the
  node, which has received the instruction of the establishment of
  session connection SESSION_OPEN, to JCP.  The task with given GJID,
  must have existed on the node already.  The instruction TASK_CHK
  format coincides with TASK_REG.  OPCODE = 11.  The response to the
  instruction TASK_CHK JCP forms instructions TASK_REG similarly.

  JCP confirms the instruction TASK_CHK if a task with received GTID
  and LTID already has registered on JCP.

  The sending of the TASK_CHK is optional.



Bogdanov                      Experimental                     [Page 28]

RFC 3018             Unified Memory Space Protocol         December 2000


5.3    Establishment of session connection

  The session connection is established between two tasks of one job.
  The connection is established under the VM initiative and it is used
  for the exchange of the instructions between VM.

  One session connection must be connected only with one task on the
  node.  The task may have several connections with different nodes.
  Between two nodes must be only one session connection with one GJID.

  The request about the establishment of session connection contains
  the global identifier of the job GJID.  If the node receives the
  request about the establishment of connection with GJID, which is not
  presented on the given node, VM must create a new task.  If the task
  has been already initialized, the new task is not created.

  The session connection needs to be established over TCP.  After the
  connection is established, the sending of the instructions, which are
  not require of execution response, is possible through UDP.  One TCP
  connection may be used by several session connections.  One session
  connection may use several TCP connections.

  The protocol allows working without the establishment of session
  connection.  The node must have VM by default, which must execute the
  instructions without the establishment of connection.

  At the establishment of session connection, the sides agree about the
  used VM type and the subset of the protocol functions.  The session
  connection UMSP may be asymmetrical.  It means, that two sides of one
  connection can be connected with VM of the different type and provide
  the different subset of the protocol functions.

  If at an establishment of session connection the zero-type VM is
  used, it specifies group VM (see section 9).  The zero-value of
  realization VM is not allowed.

  The procedure of the establishment of session connection may contain
  from 2-way up to 8-way handshakes.

5.3.1     SESSION_OPEN

  The instruction "To open a session" (SESSION_OPEN) is used for the
  initiation of session connection and for the specification of
  connection parameters during handshake.  It has the following values
  of fields:






Bogdanov                      Experimental                     [Page 29]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 12
     PCK = %b00/11.  In the first instruction (initial) the value of
                      this field is set to %b00.  In all subsequent -
                      %b11.
     CHN = 0
     ASK = 1
     EXT = 0/1
     OPR_LENGTH = 6 - 10 ; Depends on length GJID and LTID.
     SESSION_ID - In the first instruction this field is absent.  In all
                  subsequent, it contains the identifier of sessions,
                  assigned by the instruction receiver.
     REQ_ID - This field contains the session connection identifier,
              assigned by the instruction sender.
     Operands:
        2 octets: The VM type required from the addressee.
        2 octets: The VM version required from the addressee.
        4 octets: The profile of connection required from the
                  instruction addressee.
        2 octets: The VM type of the sender.
        2 octets: The VM version of the sender.
        4 octets: The profile of connection given by the instruction
                  sender.
        2 octets: The number of 256 octet blocks in the buffer,
                  allocated for session ("window"), on the side of the
                  sender of this instruction (see section 7.4).  The
                  zero-value specifies absence of the buffer.
        4-16 octets: GJID.
        4/8 octets: LTID of the sender task, assigned on the node -
                    sender of the instruction.  It is used in the
                    instruction TASK_REG (as a part of the field GTID).

  If the VM type and version, required from the addressee, have the
  value 0, the receiving node independently chooses the VM type and
  reports it in the response.  The establishment of connection without
  binding to VM or VM group is not allowed.

  Totally, it can be transmitted up to 7 instructions SESSION_OPEN at
  the establishment of connection.  The instruction SESSION_ACCEPT is
  used for the response of the establishment of connection.  For the
  refusal of connection the instruction, SESSION_REJECT is used.

  It is possible to refuse connection on any step.  It is necessary
  either to confirm connections, or to refuse it on the eighth step.

  During the establishment of connection the following parameters may
  be changed:





Bogdanov                      Experimental                     [Page 30]

RFC 3018             Unified Memory Space Protocol         December 2000


  o  VM type and VM version;
  o  profiles of connection.

  If the repeated request about opening of session connection is
  received from the definite node, while one connection with received
  GJID have been already established, the following variants are
  possible:

  (1) If the request has arrived from the node JCP, it is necessary:
      o  To finish the existing task emergency and to deallocate all
         dynamic resources belong to it.
      o  To initiates a task without request of the JCP sanction again.
      o  To confirm the establishment of connection.
  (2) If the request arrived not from the JCP node, it is necessary to
      refuse the establishment of new session connection.  The existing
      task does not need to be changed.

5.3.2     SESSION_ACCEPT

  The instruction "To accept the session" (SESSION_ACCEPT) is used for
  positive response to the establishment of session connection.  It has
  the following values of fields:

     OPCODE = 13
     ASK = 1
     PCK = %11
     EXT = 0/1
     CHN = 0
     OPR_LENGTH = 0
     SESSION_ID - This field contains the session connection identifier
                  of assigned by the node of the addressee of the
                  instruction.
     REQ_ID - This field contains the session connection identifier,
              assigned by the instruction sender.

5.3.3     SESSION_REJECT

  The instruction "To reject the session" (SESSION_ACCEPT) is used for
  negative response to the establishment of session connection.  It has
  the following values of fields:

     OPCODE = 14
     ASK = 0
     PCK = %b11
     EXT = 0/1
     CHN = 0
     OPR_LENGTH = 1




Bogdanov                      Experimental                     [Page 31]

RFC 3018             Unified Memory Space Protocol         December 2000


     SESSION_ID - This field contains the session connection identifier
                  of assigned by the node of the addressee of the
                  instruction.
     Operands:
        2 octets: The basic error code.  The zero-value is not
                  available.
        2 octets: The additional error code.
     The optional extension headers:
        _MSG - contains the arbitrary error description.

5.3.4     Connection Profile

  The profile of connection is defined in 4-octet field of flags.  The
  flags have identifiers S0 - S31.  The number in the identifier is
  defining the serial number of bit.  If the flag is set to 1, the
  function, connected with it, is provided.  If the flag is set to 0,
  the function, connected with it, is not provided (not required).  The
  list of functions, determined at the establishment of session
  connection, are described further.

  Work with chains:

     S0 - Use of fragmented instructions.
     S1 - Use of sequences.
     S2 - Use of transactions.

  Establishment of connection:

     S3 - Use the exchange of the data without the establishment of
          connection.
     S4 - Use the exchange of the data with the establishment of
          connection.

  The instructions format:

     S5  - Reserved.  Must have set to 0.
     S6  - Use of 16-octet address in the exchange instructions.
     S7  - Use of the compressed form of header of the instruction
           (OPR_LENGTH < > %b111) is allowed
     S8  - Use of the extension form of header of the instruction
           (OPR_LENGTH = %b111) is allowed
     S9  - Use of the extension headers with the data field up to 254
           octets of length.
     S10 - Use of the extension headers with the data field up to 4 *
           10^9 octets of length.
     S11-S15  Maximal length of the data field in operands in the 4
              octet words.  These bits are the common field.  Maximal
              length in octets is computed under the formula:



Bogdanov                      Experimental                     [Page 32]

RFC 3018             Unified Memory Space Protocol         December 2000


                 <max length> = (<value of this field> + 1) * 4.
              If the value is equal %b1111, maximal length of the data
              is defined by the instruction format.
     S16-S19  These bits are the common field.  In the profile required
              from the addressee of the instruction, this field
              contains the version of the UMSP.  It must is set to the
              value %b0001.  In the profile given sender of the
              instruction, this field contains priority of the job.  The
              more is value of this field, the more priority.  The
              priority of the job is used:
              o In queues on sending to the transport layer for the
                instructions of the job.
              o For set of sending priority of the transport layer.
              o For set of computing priority of the task.
     S20 - making the border multiple of 4 octets.  If S16 = 1:
        (1)  OPR_LENGTH = %b111
        (2)  Each extension header and the field of operands begin with
              the border multiple of four octets.
        (3)  The necessary number of zero octets is added in the end of
             each header.
     S21 - Use of the procedures name of objects.
     S22 - Use of the objects name.

  The permissible instructions:

     S23 - The response of the execution on VM (instruction RSP) is
           provided.
     S24 - Use of data reading and comparison instructions.
     S25 - Use of data writing instructions.
     S26 - Use of control transfer instructions.
     S27 - Use of synchronize instruction.
     S28 - Use of instructions of work witch objects.
     S29 - Use of the immediate access to memory of object.  If this
           flag is set to 0, the access to object is solved only
           through its procedures.  If S28=0, this flag must be set to
           0.
     S30 - Use of instruction MVRUN in zero-session.
     S31 - Reserved.  Must have set to 0.

5.4    Session Closing

  Initiate closing session connection the node must only, which has
  initiated its establishment.  It uses the SESSION_CLOSE instruction
  for this purpose.  The procedure of break of connection is 3-way
  handshake.  The procedure of unconditional emergency end of
  connection is stipulated.  It can be transmitted by any node.





Bogdanov                      Experimental                     [Page 33]

RFC 3018             Unified Memory Space Protocol         December 2000


  Let node A is the initiator of the establishment of a session, and
  the node B is the second side of connection.  The node A must send
  the instruction SESSION_CLOSE for closing session.  The node A may
  recommence sending of the instructions after sending of this
  instruction.  It means that it has refused closing connection.  The
  instructions of response (see section 6) does not influence on the
  closing of connection.  The node, which has sent SESSION_CLOSE, does
  not use the timeout and can be waiting for the response beyond all
  bounds long.

  The node B, after reception of the instruction SESSION_CLOSE, sends
  in the answer the instruction RSP_P.  The zero basic return code
  responds closing session.  The non-zero basic return code cancels
  closing session.  After sending of positive response, the node must
  not use connection during 30-second timeout.  If the instruction
  SESSION_ABEND or any other instruction, except response instruction,
  has not been received from the node A after the expiration of this
  time, the node send the instruction SESSION_ABEND and considers the
  session connection closed.

  The node A sends the instruction SESSION_ABEND after reception of
  positive response on the instruction SESSION_CLOSE.  After that, the
  connection is considered closed.  The node A may refuse closing of
  connection.  For this purpose, any instruction is sent, including
  NOP.  In this case, the procedure of end interrupts, and the session
  connection is translated in the working state.

5.4.1     SESSION_CLOSE

  The instruction "To close the session" (SESSION_CLOSE) initiates the
  end of session connection.  It has the following values of fields:

     OPCODE = 15
     PCK = %b01/11
     CHN = 0
     ASK = 0
     EXT = 0/1
     OPR_LENGTH = 0/1
     SESSION_ID - Contains the session identifier assigned by the
                  addressee.
     Operands:
        2 octets: The basic termination code.
        2 octets: The additional termination code.
     The optional extension header:
        _MSG - contains the arbitrary message.

  The operands may be absent.  It is equivalent to the zero exit code.




Bogdanov                      Experimental                     [Page 34]

RFC 3018             Unified Memory Space Protocol         December 2000


5.4.2     SESSION_ABEND

  The instruction "Abend of session" SESSION_ABEND is applied to
  unconditional end of session.  The node, which has sent this
  instruction, finishes the exchange of the data on connection at both
  sides, not waiting responses from other node.  The instruction has
  the following values of fields:

     OPCODE = 16
     PCK = %b01/11
     CHN = 0
     ASK = 0
     EXT = 0/1
     OPR_LENGTH = 0/1
     SESSION_ID - Contains the session identifier assigned by the
                  addressee.
     Operands:
        2 octets: The basic termination code.
        2 octets: The additional termination code.
     The optional extension header:
        _MSG - contains the arbitrary message.

  The operands may be absent.  It is equivalent to the zero termination
  codes.

5.5    Task Termination

  The task is finished during the process of the job finishing at the
  normal end of the user application working.  This procedure is
  described in the following item.  The following situations require
  finishing the task irrespective of the job:

  o  There are not enough of computing resources for maintenance of the
     task on the node;
  o  The node finishes the work;
  o  If VM has accepted such decision for the internal reasons.

  The references to the resources allocated by the task can be on any
  node, on which the job is carried out.  Therefore, all nodes must be
  notified of the end of the task.

  Node, finishing the task, must abnormally close all session
  connections joining the finished task (to send the instruction
  SESSION_ABEND).







Bogdanov                      Experimental                     [Page 35]

RFC 3018             Unified Memory Space Protocol         December 2000


5.5.1     TASK_TERMINATE

  The instruction "To terminate the task" (TASK_TERMINATE) is sent from
  the node, on which the task is finished, to JCP.  The instruction has
  the following values of fields:

     OPCODE = 17
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0/1
     OPR_LENGTH = 2/3  ; Depends on the length of CTID.
     Operands:
        2 octets: The basic termination code.
        2 octets: The additional termination code.
        4/8 octets: CTID.
     The optional extension header:
        _MSG - contains the arbitrary message.

  After sending of the instruction TASK_TERMINATE to JCP, the node
  sends the instruction of unconditional end of connection
  ABEND_SESSION on all session connections connected with a task.
  After that, the task is considered completed.

  If the basic return code in the instruction TASK_TERMINATE is equal
  to 0, it is not required to notify other nodes about the end of the
  task.  Such situation arises, if the task did not allocate dynamic
  resources.  If the basic return code is unequal to 0, JCP must notify
  about the task end the other nodes, on which the job is carried out,
  after reception of the instruction TASK_TERMINATE.  JCP responds for
  the notification of all nodes of the job about the task end.

5.5.2     TASK_TERMINATE_INFO

  The instruction "The information on terminating of the task"
  (TASK_TERMINATE_INFO) is used for the notification about the task
  end.  It is sent from JCP to other nodes, on which the job is carried
  out.  The instruction has the following values of fields:

     OPCODE = 18
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0/1
     OPR_LENGTH = 2-5 ; Depends on the length of GTID.
     Operands:
        2 octets: The basic termination code.
        2 octets: The additional termination code.



Bogdanov                      Experimental                     [Page 36]

RFC 3018             Unified Memory Space Protocol         December 2000


        4-16 octets: GTID of the terminated task.  JCP forms GTID from
                     LTID (from the instruction TASK_REG) and address
                     of transport layer of the task.
     The optional extension header:
        _MSG - contains the arbitrary message.

  The fields of termination codes are taken from the instruction
  TASK_TERMINATE.  The job must delete (to make invalid) all references
  to resources concerning the node, on which the completed task worked,
  at reception of the instruction TASK_TERMINATE_INFO.

5.6    Job Completion

  The job is finished, when the appropriated to it the user application
  on the node, on which it was initiated, is finished.  The end of the
  job occurs under the initiative of VM.  Besides, it can be completed
  under the JCP initiative at ending the lifetime of the job or at end
  of the JCP node working.

5.6.1     JOB_COMPLETED

  The instruction "The task is completed" (JOB_COMPLETED) is sent from
  the node, which initiated the job, in the JCP side.  It has the
  following values of fields:

     OPCODE = 19
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0/1
     OPR_LENGTH = 2/3 ; Depends on the CTID length.
     Operands:
        2 octets: The basic completion code.
        2 octets: The additional completion code.
        4/8 octets: CTID of the completed task of the job.  CTID is a
                    part GJID of the job.
     The optional extension header:
        _MSG - contains the arbitrary message.

  After sending of the instruction JOB_COMPLETED to JCP, the node sends
  on all connected with the session connections of the job the
  instruction of unconditional end of connection ABEND_SESSION.  After
  that, the job is considered completed.

  JCP must notify of the end of the job the nodes, on which the job is
  carried out, after reception of the instruction JOB_COMPLETED.  JCP
  responds for the notification of all nodes of the job about end of
  the job.



Bogdanov                      Experimental                     [Page 37]

RFC 3018             Unified Memory Space Protocol         December 2000


  The instruction TASK_TERMINATE_INFO may be transferred under the
  initiative JCP, if node of the task has abnormal terminated work.

5.6.2     JOB_COMPLETED_INFO

  The instruction "The information on completion of the job"
  (JOB_COMPLETED_INFO) is used for the notification about end of the
  job.  It is sent from JCP to other nodes, on which the job is carried
  out.  The instruction has the following values of fields:

     OPCODE = 20
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0/1 ;
     OPR_LENGTH = 2-5 ; Depends on the GJID length and presence of
                        fields completion code.
     Operands:
        2 octets: The basic completion code.
        2 octets: The additional completion code.
        4-16 octets: GJID of the completed job.
     The optional extension header:
        _MSG - contains the arbitrary message.

  The fields of completion codes are optional.

  The fields of completion codes are taken from the instruction
  JOB_COMPLETED.  At reception of the instruction, JOB_COMPLETED_INFO
  the node must make the following:

  (1)  To remove all session connections, connected to the task.  At
       that, it is not necessary to send network primitives.
  (2)  To abnormally finish the task of the job and to deallocate all
       dynamic resources of the task.

  The instruction JOB_COMPLETED_INFO is used for the end of the job
  under the JCP initiative at the end of lifetime or at end of the JCP
  node working.  In these cases, the node initiated the job is the
  first addressee of the instruction.

  JCP considers the job completed after sending of all instructions
  JOB_COMPLETED_INFO.

5.7    Activity Control of Nodes

  UMSP unites nodes, which have any arrangement in the network and
  which are not having uniform controls.  Each of nodes can be
  disconnected or reloaded at any moment of time.  However, other nodes



Bogdanov                      Experimental                     [Page 38]

RFC 3018             Unified Memory Space Protocol         December 2000


  can be not notified about it.  The fact of breaking or repeated
  establishment of transport connection cannot be the indicator of
  disconnect or restart of the node.  The control of transport
  connections is not the part of the UMSP protocol and the presence of
  transport connection is not obligatory.

  Besides the separate task on the node can be finished emergency.
  Procedure described in section 5.5.1 in this case must be executed.
  If this procedure cannot be executed, must is abnormally finished
  work of the node.

  The JCP executes the functions of the control of nodes activity.  The
  instruction of request of the status TASK_REQ is sent periodically
  between tasks on nodes and JCP for this purpose.

  The following actions JCP are possible at detection of deactivating
  of the node:

  (1)  If the task initiated the job was finished, it is considered,
       that the job is completed.  JCP sends the instruction
       JOB_COMPLETED_INFO to all other nodes, on which the job was
       executed.
  (2)  JCP sends the instruction TASK_TERMINATE_INFO to all other nodes
       of the job, if the task, which has not initiated the job, is
       finished.

  The deactivating of the JCP node imposes the restriction on GJID
  appropriated by it after reloading.  The following variants are
  probable:

  (1)  The disconnection of the JCP node passed normally.  It
       transferred to all nodes, which it has controlled, instruction
       JOB_COMPLETED_INFO.  In this case, it can appropriate anyone
       GJID after reloading.
  (2)  There is the emergency disconnect of the JCP node.  It has not
       informed all nodes about the deactivating.  In this case, it
       must guarantee after reloading, that new GJID will not concur
       witch the GJID, existing up to the reload, during two maximal
       intervals of inactivity time (which sets this JCP).

  The reload of nodes, which are not being JCP, does not impose
  restrictions on LTID established on these nodes.

5.7.1     _INACTION_TIME

  The extension header "The time of inaction" (_INACTION_TIME) allows
  setting the inaction time of the node (non JCP).  It has the
  following values of fields:



Bogdanov                      Experimental                     [Page 39]

RFC 3018             Unified Memory Space Protocol         December 2000


     HEAD_CODE = 2
     HEAD_LENGTH = 1;
     HOB = 1
     DATA contains:
        2 octets: The inaction period.  The number of 0,5 second
        intervals, through which the activity of the node - sender of
        the instruction from the side JCP - will be checked.

  The inaction period must be more than three intervals of the maximal
  time of delivery at the transport layer.  The waiting period in queue
  to the transport layer does not influence on timeout.

  The header _INACTION_TIME may be attached to the following
  instructions:

  (1)  To the instruction TASK_REG.  In this case must be satisfied
       condition - on node there must not be other active tasks, which
       are controlled the JCP of addressee.  The zero-value specifies
       that the activity checking is unused.  The absence of the header
       specifies that the inaction period must be set on the JCP.
  (2)  To the instruction TASK_REJECT, if the time from the instruction
       TASK_REG does not fit for JCP.
  (3)  To the instruction TASK_CONFIRM, if instruction TASK_REG had no
       this header.

  If JCP receives the instruction TASK_REG with the attached heading
  _INACTION_TIME, it must check up presence of active tasks with sender
  node (as it can mean, that the node was reloaded).  If such tasks
  exist, for each of them it is necessary to execute procedure of end
  of the task described in section 5.6.2.  The instruction TASK_CONFIRM
  must be sent only after that.

5.7.2     STATE_REQ

  The instruction "State Request" (STATE_REQ) is sent from JCP to the
  definite task of other node.  The instruction has the following
  values of fields:

     OPCODE = 21
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0
     OPR_LENGTH = 1/2 ; Depends on the LTID length.
     Operand:
        4/8 octets: LTID, established on the node of the instruction
                    addressee.




Bogdanov                      Experimental                     [Page 40]

RFC 3018             Unified Memory Space Protocol         December 2000


  The instruction STATE_REQ will be sent in the defined task but it has
  concern with node.  It is sent, if between the node and JCP was not
  sending of the instruction during inactive time.  The task activated
  after sending of last instruction STATE_REQ does not influence the
  control of activity.

  The instruction TASK_STATE is sent in reply to STATE_REQ.  At
  expectation of the response, the timeout equal to one inaction period
  is used.  After the expiration of the timeout the node is considered
  switched - off.

  If the node not receives of any instructions from JCP during two
  intervals of inaction time, it is considered, that JCP has finished
  the work.  The actions of the node in this case are described in
  section 5.6.2 at receiving the instruction JOB_COMPLETED_INFO.  The
  check of this condition is optional for the node.

  If at JCP there are no active tasks connected with the defined node,
  the control of activity of this node will not be carried out.

5.7.3     TASK_STATE

  The instruction "Task State" (TASK_STATE) is sent from the definite
  task to JCP.  It serves for the response of the instruction
  STATE_REQ.  The instruction has the following values of fields:

     OPCODE = 22
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0
     OPR_LENGTH = 1/2/3 ; Depends on the CTID length.
     Operands:
        1 octet:  The state code of task.  The following values are
                  defined for this field:
           %x01 - The task is active and has active session
                  connections.
           %x02 - The task is active and have no session connections.
           %x03 - The task is active, have no session connections and
                  have no resources, allocated on the node.
           %x04 - The task is completed.
        1/3 octets: Reserved.  If OPR_LENGTH = 1, then this field has
                    length 1 octet, else 3 octets. JCP must not check
                    the value of this field.  It is established in zero
                    value by sending.
        2/4/8 octets: CTID connected with LTID from the instruction
                      STATE_REQ.




Bogdanov                      Experimental                     [Page 41]

RFC 3018             Unified Memory Space Protocol         December 2000


  If OPR_LENGTH = 1 that length of the reserved field is equal to one
  octet and length CTID makes two octets.  In all other cases, length
  of the reserved field is equal 3 octets and length CTID - not less
  than 4 octets.

5.7.4     NODE_RELOAD

  The instruction "The node was reloaded" (NODE_RELOAD) is sent to JCP
  as the negative response to STATE_REQ instruction.  NODE_RELOAD has
  the following values of fields:

     OPCODE = 23
     PCK = %b00
     CHN = 0
     ASK = 0
     EXT = 0
     OPR_LENGTH = 1/2 ; Depends on the LTID length.
     Operands:
        4/8 octets: LTID.  The value is taken from the instruction
                    STATE_REQ.

  The instruction RELOAD_NODE indicates, that the task with given LTID
  for given JCP on the node is absent.  At reception of this
  instruction, JCP must make the following:

  (1)  To send the instruction STATE_REQ to all tasks of the node,
       which were initiated before a sending of the penultimate
       instruction STATE_REQ.
  (2)  To wait for ending of one inaction interval after sending of the
       last instruction STATE_REQ (on which the negative response is
       received).
  (3)  To send the instructions STATE_REQ to all tasks of the node,
       which were initiated between last and penultimate instructions
       STATE_REQ (not including instructions from item 1).

  For all instructions STATE_REQ the positive response (TASK_STATE) or
  negative response (RELOAD_NODE) must be transmitted.

5.8    Work without session connection

  The protocol provides the data exchange between nodes without an
  establishment of session connection.  In this case, initialization of
  the job and tasks is not made and JCP is not used.

  The format of the instructions, transmitted without the establishment
  of connection, is completely correspond to the instructions
  transmitted by session connections.  The difference is that the field
  SESSION_ID has zero value or PCK = %b00.



Bogdanov                      Experimental                     [Page 42]

RFC 3018             Unified Memory Space Protocol         December 2000


  The node, supporting work without the establishment of session
  connection, must have VM, which executes by default the instructions
  transmitted without the establishment of connection.  In fact, these
  instructions are executed within the framework of a so-called zero-
  session (or zero-task) of this VM.  The memory address space of this
  VM is accessible without a connection establishment.

  The instruction SESSION_INIT with SESSION_ID = 0 and REQ_ID = 0
  allows to specify parameters of its zero-session and to request the
  zero-session parameters of the addressee node.  If the node, which
  has received such instruction, provides the requiring profile, it
  sends the instruction SESSION_ACCEPT.  If the profile is not
  provided, the answerback instruction SESSION_INIT will send, in which
  the field SESSION_ID and REQ_ID also have the value 0.  Actually,
  such instructions of session initialization do not establish
  connection, but have the information meaning.  The exchange of the
  data by zero-session can occur irrespective of its.

  There are the following restrictions at working without connection:

  o  The chain must be sent, only if it is completely located in one
     segment of the transport layer.
  o  It is impossible to request an allocation of memory and to create
     objects (except instruction MVRUN).  This objects is not adhered
     to the definite job and is not automatically release the resources
     at the end of the job, which has created them.
  o  Parameters of functions and the returned values must not contain
     the pointers, because the node can be reloaded at any moment.  It
     will result that the pointers will become invalid or will address
     other objects.

  The protocol cannot check those conditions.  Their realization lays
  on VM wholly.

  The work without establishment of session connection may be used in
  the following systems:

  o  In simple devices, which do not have the operational system;
  o  On servers which are executed a plenty of requests (for work
     without connection of resources is used less);
  o  In systems requiring the fast response to rare requests (if
     keeping of connection is inexpedient).









Bogdanov                      Experimental                     [Page 43]

RFC 3018             Unified Memory Space Protocol         December 2000


6  Instructions of Exchange between VM

  The instructions intended for an exchange between VM uses values
  OPCODE in range 128 - 223.  Depending on length of the operands
  field, several formats of the instruction may be defined for one
  OPCODE.  The complete instruction format is defined by aggregate of
  the values of fields OPCODE and OPR_LENGTH.

  The instruction has the field REQ_ID, if in the instruction header
  flag ASK = 1.  REQ_ID is used for the response identification.  The
  value of this field is specifies by VM.  The response is formed by
  VM, too.  The protocol does not check the response and does not
  analyze the value of the field REQ_ID for the instructions of
  exchange between VM.  One of the instructions RSP, DATA, RETURN,
  ADDRESS, OBJECT or PROC_NUM is used for sending of the response.  The
  instructions of response have ASK = 1 and the value taken from the
  confirmed instruction is record in REQ_ID.  The instructions of
  response do not require the response.

  The instructions of exchange between VM may be sent through UDP at
  observance of the following conditions:

  o  ASK = 0;
  o  The instruction is located in one segment UDP;

  The timeouts and the repeated sending are not used at UMSP layer for
  instructions of exchange between VM.  It is explained to, that the
  time of sending instructions with low priority may be very large
  because of the output queues.  Therefore, the VM must make a decision
  on timeout, as only VM has the complete information on type of the
  transmitted data.  Besides, the transport layer protocol must use the
  timeouts.

  A few VM may be connected to the protocol on the node.  VM may
  simultaneously execute several jobs.  Each job may work in its
  address space.  The protocol determines VM and job, which the
  received instruction must transfer to, on field SESSION_ID value.

  The local memory address is located in the instruction in field of
  length 2/4/8 octets.  If memory address length in the instruction is
  not equal to memory address length defined for the node, the
  following variants are possible:

  o  If memory address length is set in 24 bits for the node, the
     address is writes in the end of 4 - octets field.  The 0 value
     sets in an initial (zero) octet.





Bogdanov                      Experimental                     [Page 44]

RFC 3018             Unified Memory Space Protocol         December 2000


  o  If the instruction format assumes the memory address length not
     less than 4 octets, 2-octet address is located in the last octets.
     The first 2 octets must set to zero.
  o  If instruction is the member of a chain and it has the less length
     of the memory address, than it is defined for the node - it is
     considered, that the base-displacement addressing is used.  If the
     value of the memory base is not assigned for the chain -
     instruction is erroneous.
  o  If the instruction is not the member of a chain and has the length
     of memory address less, than it is defined for the node, it is
     considered, that the abbreviated address is used.  The complete
     address length must be received by padding in front of it the
     necessary number of zero-value octets.
  o  In all other cases, the instruction is erroneous.

  Complete 128-bit memory address writes in operands in the 16-octets
  field.  The reason of using of the complete address is that the
  additional information, using by the memory control subsystem in the
  node, may contain in its field FREE (see section 2.1).  If the FREE
  of the complete address is set to zero, it is recommended to use
  local address in operands.

  Operands field has a length, which is an integral number of 32 bits.
  The alignment is making by padding, if necessary, of the zero-value
  octets at the end of the field.

  Header fields of the instructions not defined in the formats
  description are used according to the description from section 3.

  The instruction of the transfer control JUMP, CALL, CALL_BNUM and
  CALL_BNAME may contain the information about VM of the sender.  If VM
  type and VM version of the sender are contains in the instruction,
  the call parameters are formed in a format VM of the sender.  Else,
  the call parameters have format defined by VM of the addressee.  The
  code is always connected with of specific VM.

  All instructions of the protocol work with binary data and do not
  provide operations of formats transformation.

6.1  Data Reading/Writing Instructions

6.1.1   REQ_DATA

  The instruction "To request a data" (REQ_DATA) is used for the data
  request from the remote node.  Two instructions REQ_DATA with length
  of the length field 2 and 4 octets are defined.  These instructions
  have the following values of fields:




Bogdanov                      Experimental                     [Page 45]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 130/131      ; For length of the length field of 2/4
                             octets.
     OPR_LENGTH = 1/2/3/5  ; Depends on address length.
     Operands:
        2/4 octets: The length field. The number of the required data in
                    octets.
        2/4/8/16 octets: The memory address of the required data.

  The instruction DATA, containing required data, is sent in reply to
  it.  If the data cannot be sent, the instruction RSP with the non-
  zero basic return code, comes back.

6.1.2   DATA

  The instruction "The data" (DATA) is sent in reply to the instruction
  REQ_DATA and OBJ_REQ_DATA.  The instruction has the following values
  of fields:

     OPCODE = 132
     OPR_LENGTH = 0 - 65535  ; Depends on the immediate data length of
                               the operand.
     Operands:
        0 - 262140 octets: Immediate data.  If OPR_LENGTH = 0, this
                           field are absent.
     Extension headers:
        _DATA - Contains immediate data.  If OPR_LENGTH <> 0, this
                header are absent.

  The extension header is used, if the data are more then an maximum
  operands field size.  The data must not be sent simultaneously in
  operands and in the extension header.  To make the length of data
  multiple of 4 octets, 1 - 3 zero-value octets are padded in the end
  of a field.

6.1.3   WRITE

  The instruction "To write the data" (WRITE) is used for data writing
  on the remote node.  The instruction has the following values of
  fields:

     OPCODE = 133/134/135/136  ; For memory address length of 2/4/8/16
                                 octets.
     OPR_LENGTH = 1 - 65535    ; Depends on length of the immediate
                                 data.
     Operands:
        2/4/8/16 octets: The memory address for writing the data.
        0 - 262136 octets: Immediate data for write.




Bogdanov                      Experimental                     [Page 46]

RFC 3018             Unified Memory Space Protocol         December 2000


     Extension headers:
        _DATA - Contains immediate data.  This header is present only,
                if the data does not contain in operands.

  At address length of 2 octets the data length must be 2 octets.  In
  all other cases, address length must be not less than 4 octets and
  data length must be multiple of 4 octets.  The data must not be sent
  simultaneously in operands and in the extension header.

  The instruction RSP is sent in reply to the instruction WRITE.  The
  zero basic return code defines normal executing.

6.1.4   WRITE_EXT

  The instruction "The extension writing of data" (WRITE_EXT) is used
  for the data writing on the remote node.  Length of the data may be 1
  - 262132 octets with a step 1 octet.  The instruction has the
  following values of fields:

     OPCODE = 137
     OPR_LENGTH = 3 - 65535  ; Depends on length of the immediate data.
     Operands:
        1 octets: Always set to zero.
        3 octets: The number of the write data in octets.  The zero-
                  value is not available.
        4 - 262132 octets: Immediate data for write.  The data length
                           must be multiple of 4 octets.
        4/8/16 octets: The memory address for writing the data.

  To make the immediate data multiple of four octets, the data is
  padded with 1 - 3 zero-value octets at the end of a field.

  The instruction RSP is sent in reply to the instruction WRITE_EXT.
  The zero basic return code defines normal executing.

6.2  Comparison Instructions

6.2.1   CMP

  The instruction "To compare" (CMP) is used for binary data
  comparison.  It has the following values of fields:

     OPCODE = 138/139/140/141  ; For the address length of 2/4/8/16
                                 octets.
     OPR_LENGTH = 1 - 65535    ; Depends on length of the immediate
                                 data.





Bogdanov                      Experimental                     [Page 47]

RFC 3018             Unified Memory Space Protocol         December 2000


     Operands:
        2/4/8/16 octets: The memory address for compared data.
        2 - 262136 octets: The immediate data for the comparison.

  At the address length of 2 octets the data length must be 2 octets.
  In all other cases length of the address must not be less than 4
  octets and the data length is multiple to four octets.

6.2.2   CMP_EXT

  The instruction "The extension compare" (CMP_EXT) is used for binary
  data comparison.  Length of the data may be 1 - 262132 octets with a
  step 1 octet.  The instruction has the following values of fields:

     OPCODE = 142
     OPR_LENGTH = 3 - 65535  ; Depends on length of the immediate data
                               and the address.
     Operands:
        1 octet: Always set to 0.
        3 octets: The length of compared data in octets.  The zero-value
                  is not available.
        4 - 262132 octets: The immediate data for the comparison.  The
                           length of field is multiple of 4 octets.
        4/8/16 octets: The memory address of compared data.

  To make the immediate data multiple of four octets, the data is
  padded with 1 - 3 zero-value octets at the end of a field.

6.2.3   Response to Comparison Instructions

  The instruction RSP is sent in reply to the instruction CMP, CMP_EXT
  and OBJ_CMP (see below).  If the comparison was executed, the basic
  return code is equal to zero.  The additional return code is equal to
  -1, if the data at the address memories are less then the data from
  the operand; 0, if they are equal; and 1, if they are more.  If the
  comparison cannot be executed, the basic return code of the
  instruction RSP must be non-zero.

6.3  Control Transfer Instructions

6.3.1   JUMP, CALL

  The "Unconditional jump" (JUMP) and "To Call-subroutine" (CALL)_
  instructions have an equal format and differ only by OPCODE.  These
  instructions have the following values of fields:

     OPCODE = 143/144  ; Correspondingly for the JUMP not containing
                         and containing the information about VM.



Bogdanov                      Experimental                     [Page 48]

RFC 3018             Unified Memory Space Protocol         December 2000


              145/146  ; Correspondingly the CALL not containing and
                         containing the information about VM.
     OPR_LENGTH = 2 - 65535  ; Depends on inclusion of the information
                               about VM, address length and parameters
                               length.
     Operands:
        2 octets: The VM type of the sender.  If OPCODE=143/145 this
                  field is absent.
        2 octets: The VM version of the sender.  If OPCODE=143/145 this
                  field is absent.
        4/8/16 octets: The address of memory, where is necessary to
                       transfer control.
        2 octets: The number of 32 bit words in the call parameters
                  field.
        4 - 262134 octets: The immediate data are the parameters of a
                           call.

  On the reception side the processing of the instructions of a control
  transfer occurs as follows:

  o  The memory address is checked.  If it has erroneous value, the
     negative response RSP is sent.  At this stage, the correctness of
     parameters of a call may be also checked up.
  o  If the memory address and the parameters of a call have correct
     value, the positive response RSP is sent for the instruction JUMP.
     The transmitting side considers the instruction JUMP executed
     after receiving response.
  o  For response of an execution of the instruction CALL the
     instruction RETURN is sent.  The instruction RETURN may contain
     the returned values.  If there is an exception condition in a
     thread of control created by the CALL instruction, the instruction
     RSP with a non-zero basic return code is sent instead of RETURN.

6.3.2   RETURN

  The instruction "Return of control" (RETURN) is used at return of
  control from the instructions CALL, MVRUN, CALL_BNUM and CALL_BNAME
  (see below).  Those instructions have the following values of fields:

     OPCODE = 147
     OPR_LENGTH = 0 - 65535  ; Depends on length of the immediate data.
     Operands:
        0 - 262140 octets: Immediate data returned from the subroutine.

  If it is not required to send returned value, the instruction RETURN
  does not contain operands. The data format coincides with the
  instruction, for which the response (format VM of the sender or
  addressee) will be sent.



Bogdanov                      Experimental                     [Page 49]

RFC 3018             Unified Memory Space Protocol         December 2000


6.4  Memory Control Instructions

  UMSP gives means for division of memory for a code and for the data.
  The protocol does not make checks of correctness of operations with
  memory.  The code and the data use common address space.  The control
  of memory is completely realized by VM.

6.4.1   MEM_ALLOC

  The instruction "To allocate a memory for the data" (MEM_ALLOC) is
  used for request of the allocation of memory under the data.  The
  instruction has the following values of fields:

     OPCODE = 148
     OPR_LENGTH = 1
     Operands:
        4 octets: The size of required memory in bytes.

  For the positive response on the instruction MEM_ALLOC, the
  instruction ADDRESS, for negative - RSP with the non-zero basic
  return code is sent.  The received address can be used by the
  protocol in the instructions of reading/writing, comparison and
  synchronization.

6.4.2   MVCODE

  The instruction "To move the code" (MVCODE) is used for moving of the
  executable code from one node on another.  The instruction has the
  following values of fields:

     OPCODE = 149
     OPR_LENGTH = 1 - 65535 ; Depends on length of the code field.
     Operands:
        2 octets: The VM type of addressee.
        2 octets: The VM version of addressee.
        0-262136 octets: contains the executable code.
     The extension headers:
        _DATA - contains the executable code.  This header is present
                only, if the code does not contain in operands.

  The code is always connected with VM of the definite type.  The code
  field is always transparent for the protocol.  It is formed by the VM
  of sender and must contain all the information necessary VM of the
  receiver.  The code must not simultaneously be sent in operands and
  in the extension header.






Bogdanov                      Experimental                     [Page 50]

RFC 3018             Unified Memory Space Protocol         December 2000


  For the positive response on the instruction MVCODE, the instruction
  ADDRESS, for negative - RSP with the non-zero basic return code is
  used.  The code transferred on the instruction MVCODE, may be
  executed by the instruction JUMP or CALL.

6.4.3   ADDRESS

  The instruction "The memory address" (ADDRESS) is used for the
  positive response on the instruction MEM_ALLOC and MVCODE.  ADDRESS
  has the following values of fields:

     OPCODE = 150
     OPR_LENGTH = 1/2/4; Depends on length of the address.
     Operands:
        4/8/16 octets: The address of the allocated memory.

  For the instruction, MEM_ALLOC the address specifies first byte of
  the allocated data area.  For the instruction MVCODE the contents of
  the address is defined VM, by which the code is connected.

6.4.4   FREE

  The memory allocated with the instructions MEM_ALLOC and MVCODE, must
  be explicitly release.  For this purpose, the instruction "To free
  the memory" (FREE) is used.  It has the following values of fields:

     OPCODE = 151
     OPR_LENGTH = 1/2/4; Depends on length of the address
     Operands:
        4/8/16 octets: the address of free memory.

  VM must free this memory automatically at end of the task on the
  node.

6.4.5   MVRUN

  The instruction "To move and run" (MVRUN) is used for simultaneous
  move of a code and its execution.  The instruction has the following
  values of fields:

     OPCODE = 152
     OPR_LENGTH = 1 - 65535 ; Depends on length of the code field.
     Operands:
        2 octets: The addressee VM type.
        2 octets: The addressee VM version.
        4 - 262136 octets: Contains an executable code.





Bogdanov                      Experimental                     [Page 51]

RFC 3018             Unified Memory Space Protocol         December 2000


     The extension headers:
        _DATA - Contains an executable code.  This header is present
                only, if the code does not contain in operands.

  The executable code is the transparent buffer with the binary data
  for the protocol.  The format of this field is defined by the VM and
  it must contain all the information necessary for the loader VM of
  the addressee, including parameters of a call.

  The code must not simultaneously be sent in operands and in the
  extension header.

  The answer to the instruction MVRUN is formed similarly to
  instruction CALL.  It is not necessary to release memory allocated
  for a code by this instruction.  The memory must deallocate the VM.

6.5  Other Instructions

6.5.1   SYN

  The instruction "To Synchronize" (SYN) is used for the single message
  about the data change.  The instruction has the following values of
  fields:

     OPCODE = 153/154/155 ; For length of the address 4/8/16 octets.
     OPR_LENGTH = 2 - 65535; Depends on length of the data
     Operands:
        4/8/16 octets: The memory address of the tracking data.
        2 - 131068 octets: The initial data.  Length of the data must be
                           multiple of two octets.
        2 - 131068 octets: A mask for comparison.  Length of this field
                           is equal to length of a field of the initial
                           data.

  The tracking data is set by the memory address in the first operand.
  These data are originally compared to the initial data value from the
  second operand.  If the values do not coincide, it is considered,
  that the data have changed.  The third operand allows setting a mask
  for comparison.  Set to one bits of the mask specifies bits in the
  data, which change must be traced.

  The following variants of the answer are probable on the instruction:

  o  If the address of local memory is incorrect, the instruction RSP
     with the non-zero basic return code is sent for the response.
  o  If the data do not change, in the response nothing is sent.
  o  If the data have changed, the instruction DATA with new value of
     the traced data is sent.



Bogdanov                      Experimental                     [Page 52]

RFC 3018             Unified Memory Space Protocol         December 2000


6.5.2   NOP

  The instruction "No operation" (NOP) has the following values of
  fields:

     OPCODE = 156
     OPR_LENGTH = 0 - 65535
     Operands:
        0 - 262140 octets: Encapsulated data.
     Extension headers:
        Any Extension headers.

  The instruction NOP is intended for the decision of the following
  tasks:

  o  Send the control extension headers, when there are no other
     instructions for sending in a session
  o  Encapsulate the fragmented instructions and transactions with the
     established flag of special processing (see section 7).

6.6  Work with Objects

  The protocol has a set of the instructions being expansion of the
  protocol RPC [6].  As against RPC, UMSP allows immediately to address
  memory on remote nodes and to send the pointers in parameters and
  returned values.

  The UMSP object is identified by the 4-octet number.  The values are
  divided into the following ranges:

       I -> %x00000000 - 1FFFFFFF   are assigned for standard objects
      II -> %x20000000 - 3FFFFFFF   are assigned for users objects
     III -> %x30000000 - 4FFFFFFF   free
      IV -> %x50000000 - DFFFFFFF   transient
       V -> %xE0000000 - FFFFFFFF   reserved

  The objects from a range I must be definite, as standard, and the
  specifications of their interfaces must be published.  The protocol
  does not suppose the private or not described interfaces of standard
  objects.

  The objects from a range II must be registered, but the
  specifications of their interfaces may be optional published.  These
  numbers are applied in cases, when it is required to exclude the
  probable conflict of systems of the different manufacturers.






Bogdanov                      Experimental                     [Page 53]

RFC 3018             Unified Memory Space Protocol         December 2000


  The range III can be used freely.  The objects accessible on these
  numbers may be created statically or dynamically.  These objects can
  have any interfaces.

  All objects, concerning ranges I, II and III, is common for all jobs
  on the node, including zero-session.  Their interfaces are accessible
  to all tasks on the node, depending on parameters of authentication.

  The range IV is intended for objects created dynamically within the
  framework of one job.  These objects are the isolated associative
  memory of the job.  The access to these objects must be granted only
  for one job.  The zero-session has no access to these objects.

  The protocol grants the access to the data of object, as to the
  continuous segment of memory.  The memory of objects may be
  overlapping or no overlapping with flat local memory of the node.
  The offset field is used in the instructions of work with the data of
  object.  The offset rules writing are similar to the local address
  rules writing.

  The address memory length of the node, definite for the UMSP
  protocol, limits the maximal data size of one object.  The
  instructions definite in the given section, allow to work with
  associative memory with the theoretical limiting size on one node -
  2^96 (7,9 * 10^28) Byte.

  In addition to the number, the object has the version, 2 octets
  length, and realization, 2 octets length.  The protocol requires
  obligatory compatibility from bottom-up for all realizations of one
  version of object.  The publication of new realization of standard
  object may contain only added interfaces.

  If for the sender of the instruction the version and/or the
  realization of object do not play any role or is unknown, the
  instruction may contain zero fields of the version and realization of
  object or only zero field of realization.  The zero field of the
  version and non-zero field of realization are not allowed.

6.6.1   Reading/Writing of the Objects Data

6.6.1.1  OBJ_REQ_DATA

  The instruction "To request the data of object" (OBJ_REQ_DATA) is
  used for request of data of the Object from the remote node.  The
  instruction has the following values of fields:






Bogdanov                      Experimental                     [Page 54]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 192/193   ; For length of the field of length 2/4 octets.
     OPR_LENGTH = 3/4/5 ; Depends on length of the offset field.
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        2/4 octets: The length of the required data in octets.
        2/4/8 octets: Offset required data from the beginning of object
                      in bytes.

  At length of the length field of 2 octets the offset length must be 2
  octets.  In all other cases, length of the length field and offset
  length must be not less than 4 octets.

  The instruction DATA, containing the required data, is sent for reply
  to instruction OBJ_REQ_DATA.  If the data cannot be transmitted, the
  instruction RSP from the non-zero basic return code comes back.

6.6.1.2  OBJ_WRITE

  The instruction "To write the data in object" (OBJ_WRITE) is used for
  write of the data in object.  The instruction has the following
  values of fields:

     OPCODE = 194/195/196   ; For length of the offset field of 2/4/8
                              octets.
     OPR_LENGTH = 3 - 65535 ; Depends on the data length.
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        2/4/8 octets: The offset in object for the data writes.
        2 - 262128 octets: The immediate data for write.
     The extension headers:
        _DATA - Contains immediate data for write.  This header is
                present, only if the data is not present in operands.

  At length of the field-offset of 2 octets, length of the data must be
  2 octets.  In all other cases, the offset length must be not less
  than 4 octets and the data length is multiple to four.  The data must
  not simultaneously be sent in operands and in the extension header.

  The instruction RSP is sent in reply to the instructions OBJ_WRITE.
  The zero basic return code defines the normal execution.







Bogdanov                      Experimental                     [Page 55]

RFC 3018             Unified Memory Space Protocol         December 2000


6.6.1.3  OBJ_WRITE_EXT

  The instruction "The extension writing of the data in object"
  (OBJ_WRITE_EXT) is used for write of the data in object.  Length of
  the data may be 1 - 262132 octets with the step 1 octet.  The
  instruction has the following values of fields:

     OPCODE = 197
     OPR_LENGTH = 3 - 65535; Depends on the data length and the address
                             length.
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        1 octet: Always set to 0.
        3 octets: Length written down data in octets.  The zero-value is
                  incorrect.
        4 - 262124 octets: The immediate data for write.  Length of the
                           data is multiple of 4 octets.
        2/4/8 octets: Offset in object for the data write.

  If the length of the written down data is not multiple of four
  octets, the data is padded with 1 - 3 zero octets at the end.

  The instruction RSP is sent in reply to the instructions
  OBJ_WRITE_EXT.  The zero basic return code defines the normal
  execution.

6.6.2  Comparison Instructions of the Objects Data

6.6.2.1  OBJ_DATA_CMP

  The instruction "To compare the data of object" (OBJ_DATA_CMP) is
  used for binary comparison of data of the object by the immediate
  data from operands.  The instruction has the following values of
  fields:

     OPCODE = 198/199/200  ; For length of offset field of 2/4/8
                             octets.
     OPR_LENGTH = 3 - 65535; Depends on length of the data.
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        2/4/8 octets: Offset in object for the compared data.
        2 - 262128 octets: The immediate data for comparison.





Bogdanov                      Experimental                     [Page 56]

RFC 3018             Unified Memory Space Protocol         December 2000


  At length of a field of 2 octets offset the data length must be 2
  octets.  In all other cases the offset length must be not less than 4
  octets and the data length is multiple to 4 octets.

  The response to the instruction OBJ_DATA_CMP is described in section
  6.2.3.

6.6.2.2  OBJ_DATA_CMP_EXT

  The instruction "The extension compare of data of the object"
  (OBJ_DATA_CMP_EXT) is used for binary comparison of data of the
  object by the immediate data from operands.  Length of the data may
  be 1 - 262132 octets with a step 1 octet.  The instruction has
  following values of fields:

     OPCODE = 201
     OPR_LENGTH = 5 - 65535  ; Depends on length of the immediate data
                               and the address length.
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        1 octet: Always set to 0.
        3 octets: The length of compared data in octets.  The zero-value
                  is incorrect.
        4 - 262124 octets: The immediate data for the comparison.  The
                           length of field is multiple of 4 octets.
        4/8 octets: Offset in object for the compared data.

  To make the immediate data multiple of four octets, the data is
  padded with 1 - 3 zero-value octets at the end.

  The response to the instruction OBJ_DATA_CMP_EXT is described in
  section 6.2.3.

6.6.3   Execution of the Objects Procedures

6.6.3.1  CALL_BNUM

  The instruction "To call the object procedure over number"
  (CALL_BNUM) transfers control to the object procedure over indication
  of the number.  The instruction has following values of fields:

     OPCODE = 202/203 ; Accordingly for the instructions not containing
                        and containing the information about VM.
     OPR_LENGTH = 4 - 65535 ; Depends on inclusion of the information
                              about VM and call parameters length.




Bogdanov                      Experimental                     [Page 57]

RFC 3018             Unified Memory Space Protocol         December 2000


     Operands:
        2 octets: The VM type of the sender.  If OPCODE=202 this field
                  is absent.
        2 octets: The VM version of the sender.  If OPCODE=202 this
                  field is absent.
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        4 octets: The number of the called procedure.
        4 - 262128 octets: Parameters of the call.

  The processing on the reception side is made similarly instructions
  CALL (see section 6.3.1).

6.6.3.2  CALL_BNAME

  The instruction "To call the object procedure over name" (CALL_BNAME)
  transfers control to the object procedure over indication of the
  name.  The instruction has following values of fields:

     OPCODE = 204/205  ; Accordingly for the instructions not
                         containing and containing the information
                         about VM.
     OPR_LENGTH = 3 - 65535 ; Depends on inclusion of the information
                              about VM and call parameters length.
     Operands:
        2 octets: The VM type of the sender.  If OPCODE=204 this field
                  is absent.
        2 octets: The VM version of the sender.  If OPCODE=204 this
                  field is absent.
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        4 - 262128 octets: Parameters of the call.
     The extension header:
        _NAME - Contains the name of the called procedure.

  The processing on the reception side is made similarly instructions
  CALL (see section 6.3.1).

  The names may have the procedures of the objects belonging to ranges
  III and IV.  The procedures of the objects belonging to ranges I and
  II must not have a name on the UMSP layer.  They must have the number
  only.







Bogdanov                      Experimental                     [Page 58]

RFC 3018             Unified Memory Space Protocol         December 2000


6.6.3.3  GET_NUM_PROC

  The instruction "To get the name of object procedure" (GET_NUM_PROC)
  allows receiving number of the procedure for objects in ranges III
  and IV over procedure name.  The instruction has following values of
  fields:

     OPCODE = 206
     OPR_LENGTH = 2
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
     The extension header:
        _NAME - Contains procedure name.

  For the positive response on the instruction GET_NUM_PROC, the
  instruction PROC_NUM, for negative - RSP with the non-zero basic
  return code is sent.

6.6.3.4  PROC_NUM

  The instruction "The procedure number" (PROC_NUM) is sent in reply to
  the instruction GET_NUM_PROC.  The instruction PROC_NUM has following
  values of fields:

     OPCODE = 207
     OPR_LENGTH = 3
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.
        4 octets: The number of procedure.

6.6.4   The Objects Creation

  The objects from the ranges I and II (standard and assigned for the
  user) cannot be created on the remote node through the UMSP
  interface.  These objects must be created only through API of the VM.
  The objects from the ranges III and IV can be created on the remote
  node by the protocol instructions.

  The realization of objects from the ranges I - III (not connected
  with the certain job) is difficult enough.  The reason is that the
  different jobs can have the different address spaces of memory.  The
  pointers must be processed in the context of the job, from which they
  are received.  Besides, these objects must trace the end of the jobs




Bogdanov                      Experimental                     [Page 59]

RFC 3018             Unified Memory Space Protocol         December 2000


  for deallocation of dynamic resources.  The specified requirements
  impose essential restrictions on these objects.  The protocol does
  not impose any restrictions on objects from the range IV.

  Unique key identifying object on node, is number of object.  To
  objects from the ranges, III and IV the name may be assigned.  The
  objects from range I and II must not have names on the UMSP layer.
  Within the framework of one task must not be two objects having one
  number or one name.

6.6.4.1  NEW, SYS_NEW

  The format of both instructions "New object" (NEW) and "New system
  object" (NEW_SYS) is similar.  First instruction creates object in
  the range IV, second - in the range III.  These instructions have the
  following values of fields:

     OPCODE = 208/209; Accordingly for NEW/NEW_SYS.
     OPR_LENGTH = 3
     Operands:
        2 octets: The addressee VM type.
        2 octets: The addressee VM version.
        2 octets: The version of object.
        2 octets: The realization of object.
        4 - 262136 octets: Immediate data necessary for creation of
                           object.
     The extension headers:
        _DATA - Contains immediate data, necessary for creation of
                object.  This header is present, only if the data is not
                present in operands.
        _NAME - Contains the name of object.  This header is optional.

  The instruction NEW_SYS is used for the creation of object accessible
  from any job, NEW - for creation of object accessible only from its
  job.  If the object is created, the instruction OBJECT is sent for
  the response.  If the object cannot be created, the instruction RSP
  with the non-zero basic return code is sent.

  The immediate data field is transparent for the protocol.  It is
  formed by the sender VM and it must contain the information, which is
  necessary to the addressee VM for the creation of object.  Data must
  not simultaneously be sent in operands and in the extension header.

  The field SESSION_ID of the instruction cannot have the zero value.
  The dynamic object must be created only in the context of the
  definite job.  The object is always created on VM, with which the
  session is connected.




Bogdanov                      Experimental                     [Page 60]

RFC 3018             Unified Memory Space Protocol         December 2000


  The zero values of the version and the realizations of object means,
  that the object have no these values.

  It is possible to register the name of object simultaneously with its
  creation.  The name contains in the _NAME extension header.

  All objects created upon the instructions NEW and NEW_SYS must be
  obviously deleted.  VM must automatically delete all dynamic objects,
  created and not deleted by the task, at the end of the task.

6.6.4.2  OBJECT

  The instruction "The Object" (OBJECT) is used for the positive
  response on the instruction NEW and NEW_SYS.  The instruction OBJECT
  has following values of fields:

     OPCODE = 210
     OPR_LENGTH = 2
     Operands:
        4 octets: The number of object.
        2 octets: The version of object.
        2 octets: The realization of object.

6.6.4.3  DELETE

  The instruction "To delete the object" (DELETE) is used for the
  deleting of object created on the instruction NEW or NEW_SYS.  The
  instruction DELETE has the following values of fields:

     OPCODE = 211
     OPR_LENGTH = 1
     Operands:
        4 octets: number of object

  The object may be deleted only from the job, which has created it.
  The instruction RSP is sent in reply to this instruction.

6.6.5   The Objects Identification

  At registration of object on the node, it may be identify by the
  name, the length of 4 - 254 octets.  The name contains the symbols
  ASCII.  The following versions of the protocol may define other types
  of the name.

  The name identifies with the number of object and is its synonym.
  The names of all active objects in one task on the node must be
  unique.  Thus, all active objects from the range of number I - III




Bogdanov                      Experimental                     [Page 61]

RFC 3018             Unified Memory Space Protocol         December 2000


  must have the unique names for all tasks on the node.  The protocol
  allows receiving the number of object by the name and the name of
  object by the number.

6.6.5.1  OBJ_SEEK

  The instruction "To seek the object" (OBJ_SEEK) is used for seek of
  number of the object by the name.  It has the following values of
  fields:

     OPCODE = 212
     OPR_LENGTH = 0
     The extension header:
        _NAME - contains the name of object for search.

  If the object is found - the instruction OBJECT is sent in the
  answer.  If the object is not found - the instruction RSP with the
  non-zero basic return code is sent for the response.

  The instruction OBJ_SEEK may be sent broadcast through UDP.  In this
  case, it concerns to zero-session.  The instruction may contain the
  field REQ_ID for identification of answers.  The positive responses
  in this case must be sent only.  The response may be transmitted
  through UDP.

6.6.5.2  OBJ_GET_NAME

  The instruction "To get a name of the object" (OBJ_GET_NAME) is used
  for get of the name of object by number.  It has the following values
  of fields:

     OPCODE = 213
     OPR_LENGTH = 1
     Operands:
        4 octets: number of object for getting

  If the object is present - the instruction OBJECT with the extension
  header _NAME is sent for the response.  If the object is not present
  - the instruction RSP with the non-zero basic return code is sent for
  the response.

7  Chains

  The instructions, which will be sent on one session connection, can
  be unified in a chain.  The chain is a group of the instructions
  relational with each other.  In one session, several chains
  simultaneously can be transferred.  The chains can be the following
  types:



Bogdanov                      Experimental                     [Page 62]

RFC 3018             Unified Memory Space Protocol         December 2000


  o  The sequence.
  o  The transaction
  o  The fragmented instruction.

  If the instruction is included into a chain, the flag CHN should be
  equal 1.  The field CHAIN_NUMBER of header contains number of a
  chain, INSTR_NUMBER - serial instruction number in a chain, since 0.
  The numbering of chains is conducted by the protocol.  In one session
  simultaneously can be transferred up to 65533 chains.  Values of
  numbers of chains %x0000 and %xFFFF reserved by the protocol.  One
  chain can contain up to 65535 instructions.

  The instruction with a zero serial number INSTR_NUMBER should contain
  the extension header describing a chain.  Each type of a chain has
  own initiating extension header.

  _END_CHAIN.  The extension header "End of the chain" is transferred
  in last instruction of chain, irrespective of type of the chain.  It
  has the following values of fields:

     HEAD_CODE = 6
     HEAD_LENGTH = 0
     HOB = 1

  Number of a finished chain contains in a field CHAIN_NUMBER of the
  instruction header, to which the extension header is attached.

  The instructions, included in chains, can be transferred through UDP
  only if all chain is located in one segment.

7.1 Sequence

  The sequence is a type of a chain, which unites the instructions
  dependent from each other.  The following instruction of a sequence
  can be executed on VM, only if have been executed previous.  If the
  current instruction cannot be executed, all other instructions of the
  given sequence (already sent or expecting sending) simply cancel.
  Due to this, it is possible for one computing control thread not to
  wait for the current instruction positive end and to transfer
  following at once.

  _BEGIN_SQ.  The extension header "To begin a sequence" is transferred
  in the first instruction of the sequence.  It has the following
  values of fields:

     HEAD_CODE = 3
     HEAD_LENGTH = 0
     HOB = 1



Bogdanov                      Experimental                     [Page 63]

RFC 3018             Unified Memory Space Protocol         December 2000


  Number of created chain is established in field CHAIN_NUMBER of the
  instruction header, to which the extension header is attached.  The
  field INSTR_NUMBER must have value 0.

  The initiator of creation of a sequence is VM.  It is not obligatory
  that the sequence should have known length beforehand.  It can be
  completed in any moment.  If it is necessary to finish a sequence and
  there are no instructions for sending, the instruction NOP can be
  generated.

7.2 Transaction

  The transaction is a type of the chain uniting some possibly not
  connected with each other instructions.  All transaction instructions
  must be executed all at once or must not be executed.  It is possible
  to cancel or to confirm transaction execute.  The transaction
  cancellation after execution is not stipulated.  If it is necessary,
  such mechanism should be realized at VM level, because there can be
  instructions in transaction, which are impossible to cancel, for
  example a control transfer.

  The initiator of transaction creation is VM.  The transaction length
  must be known beforehand.  The length will define a way of
  transaction transfer.  It is connected with buffering described in
  section 7.4.

7.2.1   _BEGIN_TR

  The extension header "To begin a transaction" _BEGIN_TR is
  transferred in the first transaction instruction.  It has the
  following values of fields:

     HEAD_CODE = 4
     HEAD_LENGTH = 1
     HOB = 1
     DATA - Has the following format:

     +---+---+---+---+---+---+---+---+
     |TRE|TRR|TRS|      Reserve      |
     +---+---+---+---+---+---+---+---+
     |           TIME_TR             |
     +---+---+---+---+---+---+---+---+

     TRE

        1 bit.  The flag of obligatory execution.  This flag relates
        only to completely transferred, but have not yet executed
        transaction.  If TRE = 1, the transaction must be executed at



Bogdanov                      Experimental                     [Page 64]

RFC 3018             Unified Memory Space Protocol         December 2000


        the expiration of existence time, established by field TIME_TR,
        or at emergency session end.  If TRE = 0, at end of existence
        time the transaction must be cancelled and the negative
        acknowledgement must be transferred, and at emergency session
        end - must be simply cancelled.

     TRR

        1 bit.  The flag of execution after sending.  If TRR = 1, the
        transaction must be executed after sending of all instructions,
        of which it is consists, at once.  Such transaction is executed
        after reception of the instruction with the extension header
        _END_CHAIN.  If TRR = 0, it is necessary to transfer the
        special instruction EXEC_TR of transaction acknowledgement for
        its execution.

     TRT

        1 bit.  The flag of special processing.  It is entered for a
        possibility of the further expansion of the protocol.  If TRT =
        1, before transaction execution it is necessary to make some
        additional actions above the instructions, of which it is
        consists, for example to decipher.  These actions can be
        definite in the additional extension headers transmitted in the
        transaction instructions.  The given document will not define
        cases of use of this flag.  The value TRT must be zero.

     Reserve

        Must be set to 0.

     TIME_TR

        1 octet.  Time of transaction life in 2 - second intervals
        (maximal lifetime - 8 minutes).  The receiving side begins
        readout of this time after receiving all transaction
        instructions.  The value %x00 sets transaction without
        restriction of lifetime.

  In the last instruction of transaction the header, _END_CHAIN is
  always sent.

7.2.2   EXEC_TR

  This instruction "To execute the transaction" (EXEC_TR) is
  transferred for execution transaction early transferred.  It has the
  following values of fields:




Bogdanov                      Experimental                     [Page 65]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 158
     ASK = 1
     PCK = %b01/10/11
     CHN = 1
     EXT = 0/1
     CHAIN_NUMBER - Contains the number of chain, which is necessary to
                    execute.
     INSTR_NUMBER = 0
     OPR_LENGTH = 0

7.2.3   CANCEL_TR

  The instruction "To cancel transaction" (CANCEL_TR) is transmitted
  for a cancellation of execution transaction transmitted before.  It
  has the following values of fields:

     OPCODE = 159
     ASK = 0
     PCK = %b01/10/11
     CHN = 1
     EXT = 0/1
     CHAIN_NUMBER - Contains the number of chain, which is necessary to
                    cancel.
     INSTR_NUMBER = 0
     OPR_LENGTH = 0

  The instructions, of which the cancelled transaction consists, delete
  without a possibility of restoration.

7.3 Fragmented instruction

  UMSP is designed for work with the transport protocol with the
  limited size of transmitted data segment.  The fragmentation of the
  instructions is made in the following two cases:

  (1)  If the instruction is longer than the maximal segment size of
       transport layer or,
  (2)  If the segment is formed of the several instructions and last
       instruction is not located in it completely.

  The decision on fragmentation is taken to UMSP level.

  The fragmented instruction is encapsulated in several NOP
  instructions.  Then all instructions NOP are transmitted, as one
  chain of special type.  The following algorithm is used during
  encapsulation:





Bogdanov                      Experimental                     [Page 66]

RFC 3018             Unified Memory Space Protocol         December 2000


  (1)  The fields SESSION_ID and REQ_ID from the fragmented instruction
       are written in the first NOP instruction.  If field REQ_ID is
       not present in the initial instruction, it must not be in the
       NOP instruction.  The field SESSION_ID always is present in the
       fragmented instructions.
  (2)  Then these fields delete from the initial instruction.  The
       value of all other fields of the header does not change.
  (3)  After that, the initial instruction is divided into fragments of
       necessary length.  Each fragment is located in a field of
       operands of the NOP instruction.  Other data should not be
       entered in operand field.

  _BEGIN_FRG.  The extension header "The first fragment" is transmitted
  to the NOP instruction, which contains the first fragment.  It has
  the following values of fields:

     HEAD_CODE = 5
     HEAD_LENGTH = 0/2 ; Depends on subordination of the chain.
     HOB = 1
     Data:
        2 octets: Number of the parental chain.  Fragmented instruction
                  may be a part of the sequence or transaction.
        2 octets: The instruction number in the parental chain.

  The header _END_CHAIN is transmitted in NOP instruction, which
  contains last fragment.

7.4 Buffering

  In the given item, the buffering used by the protocol on receiving of
  data is described.  The question of buffering on sending lies beyond
  the scope of the protocol.

  If the instruction is not include in a chain, it is transmitted to VM
  for execution at once and does not require buffering at the protocol
  level.  The interface UMSP - VM must provide asynchronous
  instructions sending.  It is recommended, that the productivity of
  UMSP systems, should allow to process the instructions accepted from
  network, with that speed, with what they were received.  All
  instructions are designed so that carries out the known and limited
  computing loading.  Exception is the instruction of control
  transfers, which must be processed in two stages.  The instruction
  correctness is checked firstly and its scheduling is made.  Then the
  instruction is executed.  At that must be guaranteed that the
  protocol can receive such part of processor time, which would allow
  it to work in stationary mode.  Therefore, the questions of node
  overload are deduced on VM layer and user applications layer, where
  they can be sensible controlled.



Bogdanov                      Experimental                     [Page 67]

RFC 3018             Unified Memory Space Protocol         December 2000


  For chains, the protocol provides two schemes of buffering during the
  receiving:

  (1)  At the session connection establishment, the sides agree about
       the allocated buffer ("window") size.  The window always is more
       than the maximal segment of a transport layer.  The transmitting
       side can expect for this buffer without the preliminary
       coordination with the receiving side.  The window size is
       established single for each session connection, and cannot be
       changed in subsequent.  UMSP is designed for using of transport
       layer, which informs about the data delivery.  Therefore
       transmitting side traces the current free size of the window on
       the reception side for each connection without assistance.  If
       the reception side finds out, that the data have been received,
       which cannot be placed in the window, the connection is broken
       off.

  (2)  For transactions and fragmented instructions, which size exceeds
       the window, it is necessary to request the reception node the
       sanctions to sending.  The theoretical limiting size of chain
       transmitting so is 4 Gbytes.

  REQ_BUF.  The instruction "To request the buffer" requests at VM the
  buffer allocation for sending of transaction or large fragmented
  instruction ("Window").  It has the following values of fields:

     OPCODE = 24
     ASK = 1
     PCK = b01/11
     CHN = 0
     EXT = 0/1
     OPR_LENGTH = 1
     Operands:
        4 octets: The buffer required size in octets.  The value is
                  equal to the total size of all instructions of the
                  chain, including the size of the subordinated chains.

  The instruction is formed under the initiative of the protocol and it
  uses the instruction RSP_P as acknowledgement.  However, on the
  reception side the buffer is allocated at VM level, as VM has the
  most complete information about the task.  The interface between UMSP
  and VM must give possibility of asynchronous request of such buffer.

  The instruction REQ_BUF can be used irrespective of the possibility
  to place the chain in the buffer, allocated for session (window).  It
  is necessary to take into account, that the negative acknowledgement
  can be transmitted on this instruction, but using of a "window"
  guarantees sending.



Bogdanov                      Experimental                     [Page 68]

RFC 3018             Unified Memory Space Protocol         December 2000


  The subordinated chain on reception uses the buffer of the parental
  chain.

  The sequence sending will not require about the buffer allocation in
  difference of transaction or fragmented instruction.  If the single
  connection TCP is used for sending, the sequence buffering is not
  necessary.  If the multiple connections TCP with multiplexing are
  used, the sequence requires buffering for the disorder instructions.
  In this case, it is necessary to use the buffer, allocated for
  session.

  Transactions, at which flag TRR = 0, always must request the sanction
  for sending by instruction REQ_BUF, even if they can be placed in one
  segment of transport layer.

  The buffering of the fragmented instructions and transactions, at
  which flag TRR = 1, depends on their size:

  o  If the transaction is located in one segment of transport layer,
     it is transmitted without buffering.
  o  If length of a chain is no more then "window", it can be
     transmitted without request of the buffer of window allocation.
     Thus, the place in the buffer must be reserved before the sending
     begins.  The sending cannot be begun, if it is not enough places
     in the buffer.  In this case, it is possible to wait the window
     deallocation or to use the request instruction of the buffer
     allocation at VM REQ_BUF.
  o  If length exceeds the session window size it is necessary to use
     the instruction REQ_BUF.

7.5 Acknowledgement of chains

  The field REQ_ID in chains of any type is established only in the
  first instruction and concerns to all chain.  The all following
  instructions, including last, do not contain REQ_ID.

  The transport protocol used for chains sending, must inform about the
  end of data transfer, because it is necessary for the transmitting
  side to know the free size of the allocated session window on the
  reception side.

  If the chain uses the allocated VM buffer (the sanction to sending
  REQ_BUF was requested), or the chain completely locates in transport
  layer segment, the protocol on the transmitting side does not trace
  acknowledgement.






Bogdanov                      Experimental                     [Page 69]

RFC 3018             Unified Memory Space Protocol         December 2000


  If the sequence is transmitted, the transmitting side receives the
  information about free place of the buffer on the reception side by
  acknowledgement of transport layer delivery.  It can be made, as the
  regulated sequence instructions are transmitted VM at once after
  receiving and release the buffer.

  The fragmented instructions and transactions are not transmitted VM
  until its will be completely accepted.  If session window is use, the
  occupation of places in the buffer can be calculated upon
  acknowledgement of transport layer sending.  To trace free of places
  it is necessary to check execution acknowledgement by VM.  The
  following algorithm of sending is used for this purpose:

  o  The value of field REQ_ID, which has given VM for chain sending,
     is kept and it is enters the value established by the protocol
     instead of it
  o  The new value REQ_ID is transmitted in the first instruction of
     chain
  o  The chain completely collected in the session window on the
     reception side.  After linking, it is transmitted for execution on
     VM.  At that, the chain can continue to occupy a place in the
     buffer.
  o  After execution, VM informs about it to the reception side
     protocol.
  o  The protocol clears place in the allocated buffer.
  o  Then the protocol forms and transmits on chain acknowledgement
     RSP_P, instead of RSP, as in other cases.
  o  The transmitting side protocol corrects size of free place in the
     reception side buffer after reception of acknowledgement RSP_P.
  o  Then the old value REQ_ID is restored and the acknowledgement is
     transmitted to VM.

7.6 Base-displacement Addressing

  The memory base address for the relative addressing can be
  established for the instructions from one chain.  Thus, it is
  possible to use the abbreviated address memory fields in the
  instructions of chain.  The abbreviated addresses are used, as
  displacement from base.

  _SET_MBASE.  The extension header "To set memory base" establishes
  the value of base address for chain.  It has the following values of
  fields:

     HEAD_CODE = 7
     HEAD_LENGTH = 2/4/8   ; Depends on address length.
     HOB = 1
     DATA contains:



Bogdanov                      Experimental                     [Page 70]

RFC 3018             Unified Memory Space Protocol         December 2000


        4/8/16 octets: The base address.

  The length of address is 3 octets, enters the name in last octets of
  4-octets data field.  The initial octet is set to 0.  The base-
  displacement addressing is not used for nodes with address length 2
  octets.

  The value of memory base for a sequence may change.  The base must be
  established once in any instruction for all transaction instructions.
  The repeated establishment of transaction base is a mistake, which
  results refusal of transaction execution.

8  Extension Headers

  This section contains the description of the extension headers, which
  are not connected with the definite instruction.  The description of
  the specialized extension headers describes in the appropriate
  sections of this document.

8.1 _ALIGNMENT

  The extension header "Alignment" (_ALIGNMENT) allows to make any
  extension header or field of operands multiple of 4 - 16 octets with
  the step of two octets.  The protocol does not give any rules of use
  given extension header.  It can be used arbitrarily.  The header has
  the following values of fields:

     HEAD_CODE = 8
     HEAD_LENGTH = 1-7 ; Depends on length of the data field.
     HOB = 0
     DATA contains:
        2 - 14 octets: All octets of the field have the zero-value.

  The format of the protocol instructions provides the alignment of two
  octets field without any additional means.

8.2 _MSG

  The extension header "The any message" (_MSG) allows sending the
  textual message in symbols ASCII.  The order of this header
  processing at receiving can be anyone.  The message can be written in
  a log-file, be shown on the console or be ignored.  The header has
  the following values of fields:

     HEAD_CODE = 9
     HEAD_LENGTH = 1 - 127 ; Depends on data length of field.
     HOB = 0
     DATA contains:



Bogdanov                      Experimental                     [Page 71]

RFC 3018             Unified Memory Space Protocol         December 2000


        2 - 254 octets: The any text of the message.

  The instruction may contain several headings _MSG.

8.3 _NAME

  The extension header "The Name" (_NAME) allows specifying the job
  name, name of object or name of object procedure.  The header has the
  following values of fields:

     HEAD_CODE = 10
     HEAD_LENGTH = 1 - 127 ; Depends on length of a field of data.
     HOB = 0
     DATA contains:
        2 - 254 octets: The text of the name in symbols ASCII.

8.4 _DATA

  The extension header "The Data" (_DATA) is used for data transfer in
  the instructions of exchange between VM, if the data cannot be placed
  in operands.  It allows transferring up to 4 Gbytes of data in one
  instruction.  The header has the following values of fields:

     HEAD_CODE = 11
     HEAD_LENGTH = 1 - 2 147 483 647 ; Depends on length of the data
                                       field.
     HOB = 1
     DATA contains:
        2 - 4 294 967 294  octets : Binary data in an any format.

8.5 _LIFE_TIME

  The extension header "The lifetime" (_LIFE_TIME) contains value of
  time.  It has the following values of fields:

     HEAD_CODE = 12
     HEAD_LENGTH = 1/2; Depending on length of data.
     HOB = 1
     DATA contains:
        2/4 octets: The time in 1,024 milliseconds intervals.

  The header _LIFE_TIME allows to set limiting time of sending of the
  instruction to VM of the addressee.








Bogdanov                      Experimental                     [Page 72]

RFC 3018             Unified Memory Space Protocol         December 2000


  The instruction lifetime is calculated as follows:

  o  On the transmitting side the time of waiting in a queue to the
     transport layer is taken into account.  The value of the lifetime
     decreases on the waiting time value now of the transport layer
     package formation.
  o  On the reception side the lifetime is taken into account only for
     the fragmented instructions.  The value of the lifetime decreases
     on time of the instruction assembly value.  This header is ignored
     at receiving for no-fragmented instructions.  Its value must be
     sent to VM.
  o  The time of sending at the transport layer is not taken into
     account.  For the fragmented instructions, only the time of
     sending of the first fragment is not taken into account.

  The end of lifetime at the instruction relating to sequence finishes
  the sequence sending.  The header _LIFE_TIME must not be used at
  transactions sending.

  If the instruction is fragmented, the header _LIFE_TIME is sent only
  in the instruction NOP, containing the first fragment.  This header
  deletes from the initial fragmented instruction.  If the time is
  over, when the fragmented instruction part has not been transmitted
  yet, the stayed part of the instruction is cleared.

  The instruction lifetime is established by the sender VM and must be
  sent together with data to the addressee VM.  If the time of life
  expires, the instruction is rejected and the negative response (if
  ASK = 1) is sent to it.  If ASK = 0, the response is not sent.

  The header _LIFE_TIME may be used in the multimedia systems and in
  the real time systems.  The protocol may raise the priority of
  sending for data with coming to the end lifetime.

9  Search of resources

  Virtual Machines are the identified resources of the protocol.  The
  VM standardization is not function of UMSP.  The protocol gives
  transparent environment for transportation of the code and data of
  any type.

  For VM, connected to the protocol, the following values are
  established:

  o  The VM type.  The range of values 1 - 65534.
  o  The VM version.  The range of values 1 - 65534.





Bogdanov                      Experimental                     [Page 73]

RFC 3018             Unified Memory Space Protocol         December 2000


  The protocol requires obligatory compatibility from bottom-up for VM
  of one type and different numbers of the versions (VM with larger
  number of version must be able to execute the VM code with any
  smaller number of version).

  Numbers of VM types are broken on the following ranges:

    1 - 1023       Assigned for standard VM
    1024 - 49151   Assigned for registered VM of the users
    49152 - 65534  Free (defined for dynamic and/or private VM)

  Numbers of types and versions %x0000 and %xFFFF are reserved by the
  protocol.

  Several VM of different types may be united in a group.  All VM,
  included in a group, must work in the common space of local memory
  and have the common subsystem of the jobs control.  It means, that if
  the same 128-bit address is met in anyone VM code for one task, it
  must specify one physical cell of memory.  The performance of the
  specified conditions allows executing multivendor user code
  (containing procedures for different VM) on one node.  All VM,
  included in a group, must have the different types.  The group can
  include no more than 65534 VM.  One number of group on different
  nodes may identify groups with different structure VM.

  To each group VM on the node the code of group of 2 octets length is
  assigned.  So long as the node has even one session connection, the
  codes of groups must not change.  It is recommended to change the
  code of group only at reconfiguration of the node.  The group VM is
  identified, as well as one VM.  Thus, the type VM is set to 0, and
  the number of group is assigned to VM version.

  The support of association VM in groups is optional requirement of
  the protocol.  The multivendor user code can be executed, even if the
  association in groups is not provided.  For this purpose, the
  procedures containing a different type of a code must be executed on
  different nodes.

  UMSP gives the instructions of search of the VM, which allow
  defining, what VM and the groups VM are connected at the given moment
  to the protocol on the definite node.

  The instructions of search of the VM can be sent upon TCP or UDP.
  The broadcasting dispatch can be used.  The node can independently
  notify about VM, available on it, for example at start, or to respond
  on others VM requests.  The answerback instructions must be sent
  under the same protocol, on which the request was received.




Bogdanov                      Experimental                     [Page 74]

RFC 3018             Unified Memory Space Protocol         December 2000


  VM from ranges of numbers 49152 - 65534 or any group VM may be
  identified on names.  VM with numbers 1 - 49151 must not have names
  at a layer of the instructions UMSP.

9.1 VM_REQ

  The instruction "To request the VM" (VM_REQ) allows finding out VM,
  connected on the remote node.  The instruction has the following
  values of fields:

     OPCODE = 25
     PCK = %b00
     CHN = 0
     ASK = 0/1
     EXT = 0/1
     OPR_LENGTH = 0 - 65534 ; Depending on quantity VM in operands.
     Operands:
        2 octets: The type required VM.  The value 0 is not allowed.
        2 octets: The version required VM.  The value 0 is not allowed.
                  The value %xFFFF requests the most senior version.
        .
        .
        .

        2 octets: The type required VM.
        2 octets: The version required VM.
     The optional extension header:
        _NAME - This header contains the name of required VM or VM
                group.

  The instruction without operands is used for request of all types VM,
  connected on the node.  The instruction with one VM in operands
  requests the information on one VM.  If it is contained several VM in
  operands, the group VM containing all specified VM is requested.  The
  type and version in list VM must be indexed on increase.

  To request VM, used at work without session connection, the VM type
  and VM version must have the value %xFFFF.

  The header _NAME is not connected with value of operands.  For it,
  the separate answer must be transmitted.

9.2 VM_NOTIF

  The instruction "To notify about VM" (VM_NOTIF) is used for the
  notification of one VM or one VM group attached on the node.  The
  instruction has the following values of fields:




Bogdanov                      Experimental                     [Page 75]

RFC 3018             Unified Memory Space Protocol         December 2000


     OPCODE = 26
     PCK = %b00
     CHN = 0
     ASK = 0/1
     EXT = 0/1
     OPR_LENGTH = 1 - 65534  ; Depending on quantity VM in operands.
     Operands:
        2 octets: The used transport protocol.  The following values of
                  this field are definite:
           x0100 - Single TCP connection through the port 2110.
           x0101 - Multiple TCP connection through the port 2110.
           x0102 - Single TCP connection through ports 2110 and UDP
                   through ports on receiving 2110.
           x0103 - Multiple TCP connection through ports 2110  and UDP
                   through port on receiving 2110.
           The port 2110 must be opened on the one side or both side at
           each TCP connection.
        2 octets: Reserved.  This field must not be analyzed by the
                  protocol during the receiving in the current
                  realization of the protocol.  It must be set to 0 at
                  sending.
        2 octets: The type VM.
        2 octets: The version VM.

        .
        .
        .

        2 octets: The type VM.
        2 octets: The version VM.

     The optional extension header:
        _NAME - This header contains the name by separate VM or group VM
                from operands of the instruction.

  It is necessary to generate several instructions, if it is required
  to inform about several VM or groups.  It is necessary to form the
  separate instructions for each protocol, if the node provides several
  transport protocols.

  If the instruction is used for the response to VM_REQ request, it can
  contain ASK = 1 and REQ_ID, established in value from the instruction
  of request.  If the VM group was requested, the instruction must
  contain several VM.  First VM must have the type set to 0 and the
  version must contain the number of group.  Others VM must define
  structure of group.  The type and version in VM list must be indexed
  on increase.




Bogdanov                      Experimental                     [Page 76]

RFC 3018             Unified Memory Space Protocol         December 2000


  The protocols, contained in the instruction VM_NOTIF, may differ from
  the protocol, through which this instruction is transferred.

10 Security Considerations

  The present document contains the description of the functions,
  minimally necessary for the realization of the declared task -
  immediate access to memory of the remote node.  To reduce initial
  complexity of the protocol, the decision of safety questions is not
  included in the document.  All reasons of the given unit are the
  recommendations to the further expansion of the protocol.

  For the description three nodes are used - node A and node B are
  exchanges the data.  The node G is JCP.

  Protection against sniffing, spoofing and hijacking:

     (1) The means specifies in TCP/IP can be used.
     (2) There is a possibility to create chains with the special
         processing.  To create such chain, it is necessary to transfer
         the extension header, determining the special processing, in
         the first instruction of the chain.  The instructions of chain
         can be encapsulated in the NOP instructions.  The algorithms
         of the control of instructions sequence integrity or the
         encryption can be realized in such a way.

  Protection against the man-in-the-middle:

     The protection is based on the fact, that the routes between nodes
     A - B, A - G and G - B is not crossed.  Such scheme allows
     organizing the additional managing dataflow, allowing revealing
     such type of attack.  If the specified routes pass through one
     gateway, this protection is less effective.

  Authentication:

     The protocol working is based on a principle of the centralized
     control.  It allows using several schemes of authentication.  The
     parameters of authentication are sent in the extension headers.
     The establishment of session connection can contain up to eight
     handshakes.  It also raises flexibility at a choice of
     authentication algorithm.  The realization of authentication is
     possible between three pairs nodes A - B, A - G and G - B.  All
     pairs can be used in any combination.  The node G can be specially
     allocated for realization of authentication.






Bogdanov                      Experimental                     [Page 77]

RFC 3018             Unified Memory Space Protocol         December 2000


  Protection against denial-of-service:

     The instructions of the protocol have definite computing loading.
     It allows projecting the node so, that it can process the
     instructions with such speed, with what they are accepted from the
     network.  A possible reason of an overload is the instructions
     JUMP and CALL.  VM must solve this problem.  It has the complete
     information about the user task and can make a decision on the
     amount of allocated resources.  The decision of a problem is the
     failure in service for low-priority traffic.

  Protection at the applications architecture level:

     The protocol allows creating the applications of any architecture.
     It is possible due to an asymmetric structure of connection.  It
     is possible to allocate three basic groups:

     (1) The client who is carrying out terminal functions and
         client/server technologies.  The security of such systems is
         completely defined by the server.  Such architecture is
         represented most protected.
     (2) The client, loading an active code from the server.  It is the
         least protected architecture, from the client point of view.
         On the server side, there are no special requirements upon
         protection.
     (3) The client, who is executing his code on the server.  This
         architecture is safe for the client.  It is necessary to
         strengthen the protection on the server.  The functionalities
         of such architecture do not differ from architecture of
         loading by the client of an active code.  If ones take into
         account, that the server is the specially allocated computer,
         the given architecture is optimum.

         All given technologies may be used simultaneously in any
         combination.

11 Used Abbreviations

  API    Application Programming Interface.

  CTID   JCP assigned the Control Task IDentifier to each task of the
         job.  Its length is equal to length of the local address
         memory on the node JCP.








Bogdanov                      Experimental                     [Page 78]

RFC 3018             Unified Memory Space Protocol         December 2000


  GJID   Globally Job IDentifier is assigned for the each job. GJID is
         defined on the JCP node.  It has the same format, as the 128 -
         bit address of node JCP memory has.  The address of local
         memory is replaced on CTID of the first (initial) task of the
         job in it.

  GTID   Globally Task IDentifier is assigned to each task.  GTID has
         the same format, as the 128 - bit address of node memory has.
         The address of local memory is replaced on LTID in it.

  JCP    Job Control Point.  This node will control the job.

  LTID   Locally Task IDentifier is assigned to each active task on the
         node.  LTID length is equal to the local memory address length
         defined for the node.

  VM     Virtual Machine.

12 References

  [1]  Bradner, S., "The Internet Standards Process -- Revision 3", BCP
       9, RFC 2026, October 1996.

  [2]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
       Levels", RFC 2119, March 1997.

  [3]  Crocker, D., and  P. Overell.  "Augmented BNF for Syntax
       Specifications: ABNF", RFC 2234, November 1997.

  [4]  Postel, J., "Transmission Control Protocol - DARPA Internet
       Program Protocol Specification", STD 7, RFC 793, September 1981.

  [5]  Postel, J., "User Datagram Protocol", STD 6, RFC 768, August
       1980.

  [6]  Srinivasan, R., "RPC: Remote Procedure Call Protocol
       Specification Version 2", RFC 1831, August 1995.














Bogdanov                      Experimental                     [Page 79]

RFC 3018             Unified Memory Space Protocol         December 2000


13 Author's Address

  Alexander Y. Bogdanov

  NKO "ORS"
  22, Smolnaya St.
  Moscow, Russia 125445
  RU

  Phone: +7 901 732 9760
  EMail: [email protected]








































Bogdanov                      Experimental                     [Page 80]

RFC 3018             Unified Memory Space Protocol         December 2000


14 Full Copyright Statement

  Copyright (C) The Internet Society (2000).  All Rights Reserved.

  This document and translations of it may be copied and furnished to
  others, and derivative works that comment on or otherwise explain it
  or assist in its implementation may be prepared, copied, published
  and distributed, in whole or in part, without restriction of any
  kind, provided that the above copyright notice and this paragraph are
  included on all such copies and derivative works.  However, this
  document itself may not be modified in any way, such as by removing
  the copyright notice or references to the Internet Society or other
  Internet organizations, except as needed for the purpose of
  developing Internet standards in which case the procedures for
  copyrights defined in the Internet Standards process must be
  followed, or as required to translate it into languages other than
  English.

  The limited permissions granted above are perpetual and will not be
  revoked by the Internet Society or its successors or assigns.

  This document and the information contained herein is provided on an
  "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
  TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
  BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
  HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
  MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

  Funding for the RFC Editor function is currently provided by the
  Internet Society.



















Bogdanov                      Experimental                     [Page 81]