💾 Archived View for gemini.bortzmeyer.org › rfc-mirror › rfc3018.txt captured on 2024-02-05 at 12:02:49.

View Raw

More Information

⬅️ Previous capture (2021-11-30)

-=-=-=-=-=-=-







Network Working Group                                        A. Bogdanov
Request for Comments: 3018                                     NKO "ORS"
Category: Experimental                                     December 2000


              Unified Memory Space Protocol Specification

Status of this Memo

   This memo defines an Experimental Protocol for the Internet
   community.  It does not specify an Internet standard of any kind.
   Discussion and suggestions for improvement are requested.
   Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2000).  All Rights Reserved.

Abstract

   This document specifies Unified Memory Space Protocol (UMSP), which
   gives a capability of immediate access to memory of the remote nodes.

Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 [2].

   The following syntax specification uses the augmented Backus-Naur
   Form (ABNF) as described in RFC-2234 [3].

Table of Contents

   1.  Introduction...................................................4
   2.  The UMSP Model.................................................5
     2.1  128-bit Address Space.......................................5
     2.2  Computing Model.............................................7
     2.3  System Architecture.........................................9
   3.  Instruction Format............................................11
     3.1  Instruction Header.........................................12
     3.2  Extension Headers..........................................15
     3.3  Instruction Operands.......................................17
     3.4  Address Formats............................................17
   4.  Response of the Instructions..................................19
     4.1  RSP, RSP_P.................................................20
     4.2  SND_CANCEL.................................................20
   5.  Jobs Management...............................................21



Bogdanov                      Experimental                      [Page 1]

RFC 3018             Unified Memory Space Protocol         December 2000


     5.1  Job Initiate...............................................23
       5.1.1  CONTROL_REQ............................................24
       5.1.2  CONTROL_CONFIRM........................................25
       5.1.3  CONTROL_REJECT.........................................26
     5.2  Task Initiate..............................................26
       5.2.1  TASK_REG...............................................26
       5.2.2  TASK_CONFIRM...........................................27
       5.2.3  TASK_REJECT............................................28
       5.2.4  TASK_CHK...............................................28
     5.3  Establishment of session connection........................29
       5.3.1  SESSION_OPEN...........................................29
       5.3.2  SESSION_ACCEPT.........................................31
       5.3.3  SESSION_REJECT.........................................31
       5.3.4  Connection Profile.....................................32
     5.4  Session Closing............................................33
       5.4.1  SESSION_CLOSE..........................................34
       5.4.2  SESSION_ABEND..........................................35
     5.5  Task Termination...........................................35
       5.5.1  TASK_TERMINATE.........................................36
       5.5.2  TASK_TERMINATE_INFO....................................36
     5.6  Job Completion.............................................37
       5.6.1  JOB_COMPLETED..........................................37
       5.6.2  JOB_COMPLETED_INFO.....................................38
     5.7  Activity Control of Nodes..................................38
       5.7.1  _INACTION_TIME.........................................39
       5.7.2  STATE_REQ..............................................40
       5.7.3  TASK_STATE.............................................41
       5.7.4  NODE_RELOAD............................................42
     5.8  Work without session connection............................42
   6.  Instructions of Exchange between VM...........................44
     6.1  Data Reading/Writing Instructions..........................45
       6.1.1  REQ_DATA...............................................45
       6.1.2  DATA...................................................46
       6.1.3  WRITE..................................................46
       6.1.4  WRITE_EXT..............................................47
     6.2  Comparison Instructions....................................47
       6.2.1  CMP....................................................47
       6.2.2  CMP_EXT................................................48
       6.2.3  Response to Comparison Instructions....................48
     6.3  Control Transfer Instructions..............................48
       6.3.1  JUMP, CALL.............................................48
       6.3.2  RETURN.................................................49
     6.4  Memory Control Instructions................................50
       6.4.1  MEM_ALLOC..............................................50
       6.4.2  MVCODE.................................................50
       6.4.3  ADDRESS................................................51
       6.4.4  FREE...................................................51
       6.4.5  MVRUN..................................................51



Bogdanov                      Experimental                      [Page 2]

RFC 3018             Unified Memory Space Protocol         December 2000


     6.5  Other Instructions.........................................52
       6.5.1  SYN....................................................52
       6.5.2  NOP....................................................53
     6.6  Work with Objects..........................................53
       6.6.1  Reading/Writing of the Objects Data....................54
         6.6.1.1  OBJ_REQ_DATA.......................................54
         6.6.1.2  OBJ_WRITE..........................................55
         6.6.1.3  OBJ_WRITE_EXT......................................56
       6.6.2  Comparison Instructions of the Objects Data............56
         6.6.2.1  OBJ_DATA_CMP.......................................56
         6.6.2.2  OBJ_DATA_CMP_EXT...................................57
       6.6.3  Execution of the Objects Procedures....................57
         6.6.3.1  CALL_BNUM..........................................57
         6.6.3.2  CALL_BNAME.........................................58
         6.6.3.3  GET_NUM_PROC.......................................59
         6.6.3.4  PROC_NUM...........................................59
       6.6.4  The Objects Creation...................................59
         6.6.4.1  NEW, SYS_NEW.......................................60
         6.6.4.2  OBJECT.............................................61
         6.6.4.3  DELETE.............................................61
       6.6.5  The Objects Identification.............................61
         6.6.5.1  OBJ_SEEK...........................................62
         6.6.5.2  OBJ_GET_NAME.......................................62
   7.  Chains........................................................62
     7.1  Sequence...................................................63
     7.2  Transaction................................................64
       7.2.1  _BEGIN_TR..............................................64
       7.2.2  EXEC_TR................................................65
       7.2.3  CANCEL_TR..............................................66
     7.3  Fragmented instruction.....................................66
     7.4  Buffering..................................................67
     7.5  Acknowledgement of chains..................................69
     7.6  Base-displacement Addressing...............................70
   8.  Extension Headers.............................................71
     8.1  _ALIGNMENT.................................................71
     8.2  _MSG.......................................................71
     8.3  _NAME......................................................72
     8.4  _DATA......................................................72
     8.5  _LIFE_TIME.................................................72
   9.  Search of resources...........................................73
     9.1  VM_REQ.....................................................75
     9.2  VM_NOTIF...................................................75
   10.  Security Consideration.......................................77
   11.  Used Abbreviations...........................................78
   12.  References...................................................79
   13.  Author's Address.............................................80
   14.  Full Copyright Statement.....................................81




Bogdanov                      Experimental                      [Page 3]

RFC 3018             Unified Memory Space Protocol         December 2000


1  Introduction

   UMSP is the network connection-oriented protocol.  It corresponds to
   session and presentation layers of model OSI.  The protocol is
   designed for implementation in a wide class of systems, from simple
   devices based on the dedicated processors, up to universal computers
   and clusters.

   For the data exchange, the protocol uses transport layer service with
   reliable delivery.  It is possible to use not providing reliable
   delivery protocol for the transmission of not requiring
   acknowledgement data.  This document describes use TCP and UDP.

   The creation of network environment for the organization 128-bit
   address space of memory distributed between Internet nodes is the
   basic purpose of the protocol UMSP.  The protocol defines algorithm
   of the connections management and format of network primitives.  It
   doesn't control local memory on the node.

   As against the traditional network protocols, the user applications
   on different nodes interact not by the network primitives exchanging
   or working with the dataflows, but by immediate data reading/write or
   control transfers to the code in virtual memory of the remote node.
   The user's application can know nothing about existence of the
   protocol and network, and simply use the instructions with 128-bit
   addresses.

   Firstly, it is supposed to use UMSP in systems based on the virtual
   machines (VM), executing the pseudo-code.  However, the protocol may
   be used in systems executing a processor code, for example, in
   clusters or in universal operational systems, for the organization of
   the distributed virtual address space.  Besides, the minimal profile
   of the protocol may be used in simple devices, which do not have the
   operational system.

   The protocol gives various means for set the connection parameters
   and allows building systems with a high protection level without
   restriction applications functionalities.

   UMSP can essentially simplify the distributed systems development
   process.  It gives an opportunity to unite not only information, but
   also calculating resources of the large number of polytypic computers
   without significant expenses for the programs standardization and
   development.







Bogdanov                      Experimental                      [Page 4]

RFC 3018             Unified Memory Space Protocol         December 2000


2  The UMSP Model

2.1  128-bit Address Space

   UMSP is based on the 128-bit distributed address memory space model.
   The 128-bit address contains the information about the network type,
   network node address and local memory address.  It has the following
   format:

   Octets
    0      1                                                    16
   +------+--------------+--------------------+----------------+
   |Header|     FREE     |     NODE_ADDR      |    MEM_ADDR    |
   +------+--------------+--------------------+----------------+

   Complete address length is fixed and is equal to 16 octets.

   Header

      1 octet.  Address header field completely defines the address
      format.  The header has the following format:

      Bits
       0     1     2     3     4     5     6     7
      +-----+-----+-----+-----+-----+-----+-----+-----+
      |      ADDR_LENGTH      |  NET_TYPE | ADDR_CODE |
      +-----+-----+-----+-----+-----+-----+-----+-----+

      ADDR_LENGTH

         4 bits.  The length of the network address.  This field
         contains the number of octets in the NODE_ADDR field.  The
         value 0 is not allowed.

      NET_TYPE

         2 bits.  The network type.  This field specifies a type of
         network, in which the node is.

      ADDR_CODE

         2 bits.  The length code of the local memory address.  The
         value of this field specifies the length of the local memory
         address.  The following values of the field and appropriated to
         them length of the field MEM_ADDR are defined:






Bogdanov                      Experimental                      [Page 5]

RFC 3018             Unified Memory Space Protocol         December 2000


            %b00 - 16 bit
            %b01 - 24 bit
            %b10 - 32 bit
            %b11 - 64 bit

      The values combination of the three fields of heading is named
      address format number.  These fields unequivocally define a
      network, in which the node is located.  Format number writes as
      follows:

         N <ADDR_LENGTH> - <NET_TYPE> - <ADDR_CODE>

      For example, N 4-0-2 defines the address with length of the node
      network address 4 octets and memory address with the length 32
      bits.  The network type 0 for such address format is defined for
      the network IPv4 in the presented document.  If the network type
      is equal to zero, it may be missed during the writing of the
      address format number.  For example, format N 4-0-2 and 4-2 are
      equivalent.  If both fields NET_TYPE and ADDR_CODE are set to
      zero, they may be omitted.  Thus, a format number writes as one
      figure.

      One or several address format numbers must be assigned for each
      global network, included in unified system.

   FREE

      0 - 12 octets.  This field is unused by the protocol.  It may
      contain any additional information, which is necessary for the
      control system of the node memory.  If this field is not used, the
      zero value must be set in all octets.  Using of this field results
      that the network instructions must contain only complete 16 -
      octet address and the short address of local memory cannot be
      used.

   NODE_ADDR

      1 - 13 octets.  The node address.  The format of this field is
      defined separately for each address format number.  The field of
      the node address should not necessary precisely correspond to the
      real network address.  If the real network address is longer than
      this field, it is necessary to organize in the network a subset of
      supporting the protocol UMSP addresses.








Bogdanov                      Experimental                      [Page 6]

RFC 3018             Unified Memory Space Protocol         December 2000


   MEM_ADDR

      16/24/32/64 bits.  The address of local memory.  This field is the
      memory address in system, which is set by a field NODE_ADDR.  The
      node completely responds for its memory control.  The protocol
      does not define the order of using and format of this field.

   128-bit address for the user applications is one field.  The user
   code cannot know about a physical arrangement of addressed memory.

   The 128-bit memory address may be transmits between nodes, as the
   data, for example, in the buffer of function parameters, or in the
   instruction of copying the data.  Therefore, it must identify the
   given node from any other nodes unequivocal.

   Any certain algorithm, connecting real network and 128-bit address,
   does not exist.  All used address formats must be known beforehand.

   As UMSP has its own address space, it can unite several global
   networks.  The nodes can have internal local networks or subordinated
   addressable devices connected with the node by the not-network
   communications.  Any node by address format number must have an
   opportunity to define the gateway respond for routing of this
   address.

2.2  Computing Model

   Computing model is three-layer:

      (1) Job
      (2) Task
      (3) Thread of control

   The job corresponds to the user application.  The job is distributed
   and can simultaneously be executed on many nodes.  The job control is
   carried out centralize, from the node named as Job Control Point
   (JCP).  One JCP can control the some jobs.  JCP can be located on the
   same node, on which the job is created, or on any other addressed net
   point.

   The task is the job presentation on the separate node.  The task
   includes one or several computing threads of control.  The job has
   only one task on each node.

   The job is finished, when the appropriate user application is
   finished.  At the end of the job all tasks of this job on all nodes
   are finished.




Bogdanov                      Experimental                      [Page 7]

RFC 3018             Unified Memory Space Protocol         December 2000


   The job has its isolated 128-bit address space.  The address space is
   segmented.  A segment is the local memory of one node.  Besides, the
   protocol allows working with objects.  The objects are separate
   associative memory of the node.

   The task thread represents the concrete control thread, which are
   executed by VM in the certain node.  The thread can read and write to
   any address of 128-bit address space of the job.  The control
   transfer to the address from other (remote) node, results to the
   creation of the new thread on the remote node.  The continuous code
   segment cannot be distributed on several nodes.  In addition, it is
   impossible to receive continuous memory area distributed on several
   nodes.

   The protocol does not demand to support the different tasks of not-
   crossed memory space from the separate VM node.  The supporting of
   multi-thread is not also the obligatory requirement.

   The 128-bit Global Job Identifier (GJID) is defined by protocol.  It
   is assigned on JCP, which will control the job.  All active GJID have
   the unique values in the unified system at each moment of time.

   The job can contain VM code of different types.  Different types VM
   can be situated on one or different nodes.  The mechanism of
   association of different VM types in groups on one node is
   stipulated, so to the non-uniform code can be executed on one node in
   a context of one job.  The groups are described in details in section
   9.  VM, incorporated in groups, must work in common memory space (to
   have a common subsystem of memory control).






















Bogdanov                      Experimental                      [Page 8]

RFC 3018             Unified Memory Space Protocol         December 2000


2.3  System Architecture

   System structure, based on using Virtual Machines, is given in the
   following figure:

              Node 1                              Node 2
             --------                            --------

      +--------------------+              +--------------------+
      | User Application 1 |              | User Application 1 |
      +-----------------------+           +-----------------------+
         | User Application N |              | User Application N |
         +--------------------+              +--------------------+

   +-----+  +-----+       +-----+      +-----+  +-----+       +-----+
   | VM1 |  | VM2 | . . . | VMn |      | VM1 |  | VM2 | . . . | VMn |
   +--+--+  +--+--+       +--+--+      +--+--+  +--+--+       +--+--+
      |        |             |            |        |             |
    +--------------------------+        +--------------------------+
    |                          |        |                          |
    | +-----+  U M S P         |        |          U M S P         |
    | | JCP |                  |        |                          |
    | +-----+                  |        +-------------+------------+
    +-------------+------------+                      |
                  |                             +-----+-----+
            +-----+-----+                       |    TCP    |
            |    TCP    |                       +-----+-----+
            +-----+-----+                             |
                  |                                   |
                  +-----------------/                 |
                                   /------------------+
                                  /
                                  |
                            +-----+-----+
                Node N      |    TCP    |
               --------     +-----+-----+
                                  |
                     +------------+------------+
                     | +-----+                 |
                     | | JCP | U M S P         |
                     | +-----+                 |
                     +-------------------------+

         Figure 1. Structure of the system based on use VM.







Bogdanov                      Experimental                      [Page 9]

RFC 3018             Unified Memory Space Protocol         December 2000


   One or several VM are working on upper level for UMSP.  The VM layer
   is not network level.  Last network level is UMSP.  Therefore, VM
   layer has no its own network primitives and uses together with UMSP
   the same field of operation code.

   The end services user of the protocol is the user code, which is
   executed by the virtual machine.  It has the instructions with the
   128-bit address.  VM translates these instructions to network
   commands, which are transmitted through the UMSP protocol for the
   executing by the remote machine.  Internal organization VM, command
   system and API can be anyone.  The protocol defines only format of
   primitives, which the virtual machines exchange through a network.

   The protocol does not control the jobs memory.  Control of memory
   should realize VM.  If a few VM works on one node, they may have the
   common memory space or may be completely isolated.

   UMSP uses the transport layer with reliable delivery for the data
   exchange.  This document defines of using TCP.  For the transfer of
   not requiring acknowledgement data may be used UDP.  Thus, the
   connection through TCP is obligatory.  Use of multiple connections
   TCP with multiplexing is supposed.  The control of transport
   connections is not the part of the UMSP protocol.

   The UMSP instructions do not contain network addresses of the
   receiver and sender.  The protocol requires that one address UMSP
   must correspond to the one transport layer address.  Accordingly, it
   is necessary to define unequivocal the node address on transport
   layer by the 128-bit address of memory.

   Except the TCP, it is possible to use other transport protocols or
   not network communications.  The following requirements are showed to
   them:

      o  Reliable delivery.  The transport layer must inform about
         delivery or its impossibility;
      o  The violation of a sequence of transmitted segments is allowed;
      o  The duplication of segments is not allowed;
      o  At emergency reload of nodes it is necessary to guarantee
         identification of segments concerning session connections,
         assigned up to reload;
      o  Use connectionless-mode is possible.

   VM is the independent program and the interaction with the protocol
   is necessary for it only when it executes the instructions with the
   128-bit address, concerning to other node.  VM can execute several





Bogdanov                      Experimental                     [Page 10]

RFC 3018             Unified Memory Space Protocol         December 2000


   user tasks.  Each task can contain several threads of control.  VM
   must be able to interpret the application instructions with the 128-
   bit address to one or several instructions of the UMSP protocol.

   The session connection opens between nodes for the data exchange.
   One connection is relational only with one job.  There may be several
   session connections for the different jobs simultaneously between two
   nodes.  Besides, the protocol provides the connectionless data
   exchange.

   The exchange between UMSP nodes can include the instructions of the
   following type:

      o  Immediate reading/write in memory;
      o  Requests of allocation/free memory;
      o  Comparison instructions;
      o  Call-subroutine and unconditional jump instructions;
      o  Synchronization instructions;
      o  Work with objects instructions - reading / writing in memory of
         objects and execution of objects procedures.

   UMSP does not trace the user control threads.  VM must provide itself
   the necessary order of performance of the instructions.

   The length of UMSP instructions does not depend on segment length of
   the transport layer.  The segmentation is provided for transfer of
   the long instructions.  The packing of the short instructions in one
   segment with a possibility of compression of headings is used for its
   transfer.  The minimal size of necessary for work segment is 6
   octets.  For realization of all functions, it is necessary 54 octets.

3  Instruction Format

   The UMSP instruction includes the basic header, extension headers and
   operands.  All fields have variable length.

   +----------------+----------------------+------------------------+
   |     Header     |   Extension headers  |       Operands         |
   +----------------+----------------------+------------------------+

   The header contains operation code and the information necessary for
   the instruction interpretation.

   The optional extension headers contain the additional information,
   not defined in basic header.

   The operands contain instructions data.




Bogdanov                      Experimental                     [Page 11]

RFC 3018             Unified Memory Space Protocol         December 2000


   The instruction format allows calculating common instruction length,
   without knowing definition of separate operation code.

   The instructions headers provide for the short and extended format
   for maintenance of the effective protocol work in wide range of
   network speeds.  Besides, there is a simple algorithm of the headers
   compression.

   The all instructions and extension headers the identifiers are given
   which enter the name by upper case symbols.  The identifiers of the
   instructions begin with the letter.  The identifiers of the extension
   headers begin with underlining symbol.

3.1  Instruction Header

   The header has the following format:

    Octets:
       +0                              +1
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   0: |            OPCODE             |ASK|  PCK  |CHN|EXT| OPR_LENGTH|
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   2: |                        OPR_LENGTH_EXT                         |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   4: |                         CHAIN_NUMBER                          |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   6: |                         INSTR_NUMBER                          |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   8: |                                                               |
      +                          SESSION_ID                           +
      |                                                               |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   12:|                                                               |
      +                            REQ_ID                             +
      |                                                               |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+

   OPCODE

      1 octet.  The operation code.  Value of this field is identified by
      the instruction.  Values of operation codes are divided into the
      following intervals:

             1 - 112  management instructions
           113 - 127  reserved
           128 - 223  instructions of exchange between VM
         0, 224, 255  reserved




Bogdanov                      Experimental                     [Page 12]

RFC 3018             Unified Memory Space Protocol         December 2000


   ASK

      1 bit.  The flag of response necessity.  This flag defines
      presence of field REQ_ID in header.  If ASK = 1, there is field
      REQ_ID in the instruction.  If EXT = 0, the field REQ_ID in the
      instruction are absent.

   PCK

      2 bits.  The Header compression attribute.  These bits are used
      for packing instructions headers transmitted on one connection TCP
      or for sending of the several instructions in one package UDP.
      Use of these bits is based on the assumption that two following in
      succession instructions concern to one session connection, or one
      chain, with a high probability.  The PCK bits have one of the
      following values:

      %b00 - The instruction does not belong to the definite session.
             The fields CHAIN_NUMBER, INSTR_NUMBER and SESSION_ID are
             absent in header of such instruction.
      %b01 - The given instruction concerns to the same session
             connection, as previous.  The field SESSION_ID in the
             instruction header is absent.
      %b10 - The given instruction belongs to the same connection and
             same chain, as previous.  The fields CHAIN_NUMBER,
             INSTR_NUMBER and SESSION_ID in header of such instruction
             are absent.  The INSTR_NUMBER value of the current
             instruction calculates by addition of one to INSTR_NUMBER
             value of the previous instruction.
      %b11 - The given instruction may does not concern to the same
             session, as previous.  The field SESSION_ID is present at
             it.  The presence of fields CHAIN_NUMBER and INSTR_NUMBER
             is defined by CHN flag.

   CHN

      1 bit.  The flag of chain.  Transmitted on one session connection
      and concerning one job instructions, may be unified in a chain.
      Chains are considered in details by section 7.  If SEQ = 1, the
      instruction is connected with chain and there are fields
      CHAIN_NUMBER and INSTR_NUMBER (if PCK is not set to %b10) at it.
      If bit CHN = 0, the instruction is not connected with chains and
      there are no fields CHAIN_NUMBER and INSTR_NUMBER in it.








Bogdanov                      Experimental                     [Page 13]

RFC 3018             Unified Memory Space Protocol         December 2000


   EXT

      1 bit.  The flag of extension headers presence in the instruction.
      If EXT = 1, there is one or more extension headers in the
      instruction.  If EXT = 0, the extension headers in the instruction
      are absent.

   OPR_LENGTH

      3 bits.  The number of 32 bit words in the operands field.  The
      value 0 defines absence of operands field.  The value %b111
      specifies use of the extended header format.  In the extended
      format, the length of operands is defined by the field
      OPR_LENGTH_EXT, and the field OPR_LENGTH is not used.

   OPR_LENGTH_EXT

      2 octets.  The number of 32 bit words in the operands field.  The
      field OPR_LENGTH_EXT is present in header, only if OPR_LENGTH =
      %b111.  If OPR_LENGTH < > %b111, the field OPR_LENGTH_EXT is
      absent.  If OPR_LENGTH_EXT = 0, the field of operands is absent.
      There are following reasons, on which it is necessary to use field
      OPR_LENGTH_EXT instead of OPR_LENGTH:

         (1) If operands length must be more than 24 octets
         (2) If making the fields alignment of 4 octets is more
             effective, than compression of header of 2 octets.

   CHAIN_NUMBER

      2 octets.  The number of chain.  This field contains number of
      chain, to which the given instruction concerns.  The values %x0000
      and %xFFFF are reserved.

   INSTR_NUMBER

      2 octets.  The instruction number.  This field contains the serial
      number of instruction in a chain.  The numbering begins with zero.
      Value %xFFFF is reserved.

   SESSION_ID

      4 octets.  It is the identifier of the session connection assigned
      by the instruction receiver.  During the session connection
      opening, each side sets its own identifier to connection and
      informs it to other side.  The zero value of this field specifies
      that the instruction does not concern to the definite session.
      The value %xFFFFFFFF is reserved.



Bogdanov                      Experimental                     [Page 14]

RFC 3018             Unified Memory Space Protocol         December 2000


   REQ_ID

      4 octets.  The request identifier.  It is uses for establishment
      of correspondence between requests and responds to it.

   Further, the identifier OPR_LENGTH is used at the description of the
   instructions format.  It means using of OPR_LENGTH_EXT field, if
   OPR_LENGTH = %b111.  The instruction with length of operands, which
   are not exceeding 24 octets, may be transmitted with header in the
   short format (OPR_LENGTH < > %b111) or in the extended format
   (OPR_LENGTH = %b111).  Both forms are equivalent.

   Minimal header length in the short format is 2 octets, in the
   extended format - 4 octets.  Maximal header length is 16 octets.

3.2  Extension Headers

   If the EXT flag in the instruction header set to 1, the instruction
   contains from one up to thirty extension headers.  The extension
   headers are used for the following purposes:

   o  For sending of the service information which were not provided in
      the basic header.
   o  For sending of the data of length more than 262240 octets in one
      instruction.

   The extension headers have the following common format:

   Octets:
       +0                              +1
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   0: |HXT|       HEAD_LENGTH         |       HEAD_LENGTH_EXT         |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   2: |                   continued HEAD_LENGTH_EXT                   |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   4: |HSL|HOB|HRZ|     HEAD_CODE     |         HEAD_CODE_EXT         |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   6: |                           RESERVED                            |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
   8: |                                                               |
      /                             DATA                              /
      /                                                               /
      |                                                               |
      +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+







Bogdanov                      Experimental                     [Page 15]

RFC 3018             Unified Memory Space Protocol         December 2000


   HXT

      1 bit.  Specify length of the field of data length.  If HXT = 0,
      length of the extension header is defined by a field HEAD_LENGTH.
      The field HEAD_LENGTH_EXT in this case is absent.  If HXT = 1,
      length of header is defined by unification of fields HEAD_LENGTH
      and HEAD_LENGTH_EXT.

   HEAD_LENGTH

      7 bit.  The number of 16 bit words in DATA field.  If HXT = 0,
      this is independent field.  If HXT = 1, it is the senior bits of
      complete length field.

   HEAD_LENGTH_EXT

      3 octets.  The number of 16 bit words in DATA field.  If HXT = 0,
      this field is absent.  If HXT = 1, it is the younger bits of
      complete length field.

   HSL

      1 bit.  The flag of last header.  It is set to 1 for last
      extension header in the instruction.  In other extension headers,
      this flag is set to 0.

   HOB

      1 bit.  The flag of obligatory processing.  It defines the order
      of the instruction processing, if the receiving node does not know
      purpose of the extension header or cannot process it by any
      reason.  If HOB = 1, instruction must not be carried out.  If HOB
      = 0, it does not influence on the instruction processing.  The
      protocol must process all extension headers, irrespective of
      errors presence.

   HRZ

      1 bit.  The field is reserved for the future expansions.  This
      field must not be analyzed by the protocol on receiving.  It must
      be set to 0 at sending.

   HEAD_CODE

      5 bits.  If HXT = 0, the field contains the extension header code.
      If HXT = 1, this field joins the field HEAD_CODE_EXT.  It is the
      senior bits of the header code.




Bogdanov                      Experimental                     [Page 16]

RFC 3018             Unified Memory Space Protocol         December 2000


   HEAD_CODE_EXT

      1 octet.  If HXT = 0, this field is absent.  If HXT = 1, it is the
      younger bits of the header code.

   RESERVED

      2 octets.  If HXT = 0, this field is absent.  If HXT = 1, this
      field is reserved for further use.  The field RESERVED must not be
      analyzed by the protocol during the receiving in the current
      realization of the protocol.  It must be set to 0 at sending.

   DATA

      The data field of the extension header.  If HXT = 0, the length of
      field is 0 - 254 octets, if HXT = 1, the length is 0 - 4 * 10^9
      octets.  The format of this field is defined separately for each
      value of the header code.

   On the receiving side, the extension headers must be processed in
   that order, in what they follow in the instruction.  If the
   instruction contains more than 30 extension headers, it is considered
   erroneous.  It is necessary to break off the session connection, on
   which it was transmitted, after the reception of such instruction.

   The identifiers HEAD_LENGTH and HEAD_CODE are used further in the
   text at the description of the extended headers format.  It assumes
   using of fields HEAD_LENGTH + HEAD_LENGTH_EXT and HEAD_CODE +
   HEAD_CODE_EXT, if HXT = 1.  The headers with the code 0 - 30 can be
   sent in short (HXT = 0) and in extended (HXT = 1) format.

3.3  Instruction Operands

   The operands field contains the instruction data.  The length of
   operands field is showed in OPR_LENGTH or OPR_LENGTH_EXT and it is
   multiple to four octets.  If necessary, 1 - 3 zero-value octets are
   padded in the end of a field.  Maximal length of operands is 262140
   octets.  The extension headers are used, if the instruction must
   contain longer data.

   The format of the operands field is defined separately for each
   instruction.

3.4  Address Formats

   The following address format numbers are definite for nodes,
   immediately connected to the global IPv4 network:




Bogdanov                      Experimental                     [Page 17]

RFC 3018             Unified Memory Space Protocol         December 2000


      N 4-0-0 (4)
      N 4-0-1 (4-1)
      N 4-0-2 (4-2)

   The appropriate formats of 128-bit addresses:

   Octets:
      +0              +1              +2              +3
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   0: |0 1 0 0|0 0|0 0|                   Free                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   4: |                              Free                             |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   8: |            Free               |           IP address          |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   12:|           IP address          |      Local memory address     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   0: |0 1 0 0|0 0|0 1|                   Free                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   4: |                              Free                             |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   8: |     Free      |                  IP address                   |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   12:|   IP address  |             Local memory address              |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   0: |0 1 0 0|0 0|1 0|                   Free                        |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   4: |                            Free                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   8: |                         IP address                            |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   12:|                     Local memory address                      |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   Free

      It is not used by the protocol.

   IP address

      It sets the node address in the global IPv4 network.




Bogdanov                      Experimental                     [Page 18]

RFC 3018             Unified Memory Space Protocol         December 2000


   Local memory address

      It is described in section 2.1.

   IP-address defines the nodes of the given type unequivocally.  The
   TCP is used for the interaction with such nodes.  For sending of not
   requiring response instructions, using UDP is allowed.  IANA has
   assigned ports TCP and UDP 2110.  This port must be open for the
   listening (receiving).  TCP node, initialing the connection opening,
   or the UDP node, carrying out the package sending, can use any port.
   Using several TCP connections with multiplexing is supposed.

4  Response of the Instructions

   The protocol instructions are divided into two types:

      (1)  The management instructions transmitted on UMSP layer (OPCODE
           = 1 - 112).
      (2)  The instructions of the exchange between VM (OPCODE = 128 -
           223).

   The processing of two types of the instructions differs as follows:

   o  The field of the identifier of request REQ_ID is formed by the
      protocol in the instructions of the first type, and it is formed
      by VM for the instructions of the second type.
   o  The protocol must analyze the field REQ_ID and compare it with the
      instructions, transmitted earlier, after receiving of the response
      instruction of the first type.
   o  The protocol must not analyze the field REQ_ID after receiving of
      the response instruction of the second type.  This instruction is
      simply sent to VM.

   The response instructions have the field ASK equal to 1.  It means,
   that the header have the field REQ_ID.  The value taken from the
   confirmed instruction is written into the field REQ_ID.  The response
   instruction does not require response.

   A few VM can be connected to the protocol on the node.  Everyone VM
   can work in its own address space.  The identifiers of requests for
   different VM can coincide.  Therefore, instruction is identified by
   two fields:

   o  The session identifier SESSION_ID, which is connected with
      definite VM.
   o  The request identifier REQ_ID.





Bogdanov                      Experimental                     [Page 19]

RFC 3018             Unified Memory Space Protocol         December 2000


4.1  RSP, RSP_P

   "Response" (RSP) and "Response of the protocol" (RSP_P) instructions
   have the identical format.  The difference is only in the operation
   code:

      OPCODE = 129/1  ; correspondingly to RSP/RSP_P
      ASK = 1
      PCK = %b01/11
      EXT = 0/1
      CHN = 0
      OPR_LENGTH = 0/1
      SESSION_ID and REQ_ID - The values is taken from the confirmed
                              instruction.
      Operands:
         2 octets: The basic return code.
         2 octets: The additional return code.
      The optional extension header:
         _MSG - contains the arbitrary error description.

   The instruction without operands is used for the positive response.
   It is equivalent to zero values of the field of the basic and
   additional return codes.

   The zero basic return code is used for positive response.  The
   additional return code may have non-zero value.

   The instruction with non-zero basic return code is used for negative
   response.  The basic return code defines the error category.  The
   additional return code identifies an error.

   The instruction RSP is formed upon the VM request.  The return codes
   must be received from VM.  If the protocol cannot deliver the
   requiring response instruction to VM, it forms negative response RSP
   independently.

   The instruction RSP_P is always formed at the UMSP layer.  If the
   protocol cannot define on what instruction the RSP_P is transmitted,
   nothing actions is executed.

4.2  SND_CANCEL

   There can be a necessity to cancel sending after the part of the data
   have been already transmitted and have occupied the buffer on the
   reception side, by sending of the long fragmented instructions or
   transactions.  The protocol provides the instruction "The sending is
   canceled" (SND_CANCEL) for this purpose.  This instruction has the
   following fields value:



Bogdanov                      Experimental                     [Page 20]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 2
      ASK = 0
      PCK = %b01/10/11
      EXT = 0/1
      CHN = 1
      OPR_LENGTH = 1
      SESSION_ID - The value is taken from the cancelled chain.
      CHAIN_NUMBER - Number of the chain, which sending is cancelled.
      INSTR_NUMBER - Always has zero-value.
      Operands:
         2 octets: The basic return code.
         2 octets: The additional return code.
      The optional extension header:
         _MSG - contains the arbitrary error description.

   The instruction SND_CANCEL is used for the cancel of the partially
   transmitted transaction or fragmented instruction.  At the receiving
   the SND_CANCEL instruction, all the earlier received data in the
   chain are rejected.

5  Jobs Management

   The jobs management includes the following functions:

   o  Initiation and completion of jobs;
   o  Initiation and completion of tasks;
   o  Opening and closing of session connections;
   o  Activity control of nodes.

   The instructions with OPCODE = 1 - 112 are used for jobs management.
   These instructions must be sent through TCP.  Use UDP is not allowed,
   even if the instructions do not demand response.

   UMSP bases on model with the centralized control of the separate job.
   The reason is that the pointers control is not obviously possible in
   the decentralized system.  Any task can be finished at any moment or
   the node can be reloaded.  There is no way guaranteeing the
   notification about in the decentralized system all other nodes, on
   which the job works.  As the job continues to exist - the task
   concerning the job can be initiated on the same node again.  This
   task can allocate new dynamic resources.  The addresses for the again
   allocated resources can be crossed with addresses of resources, which
   existed on the node before the task restart.  The old pointers can be
   kept on other nodes.  It may be the formally correct pointers, but
   they will actually specify other objects.  The uncontrollable work of
   the application can be consequence of such situation.





Bogdanov                      Experimental                     [Page 21]

RFC 3018             Unified Memory Space Protocol         December 2000


   UMSP solves this task as follows:

   o  It allows defining the node, on which the task was completed,
      precisely.
   o  If the task on the node is finished before end of the job, all
      nodes, on which the job is executed, are notified of it.
   o  The repeated task initialization on the node is allowed, while all
      nodes will receive the message about the first task end.

   The protocol does not control the pointers.  VM supervises the
   pointers correctness.  VM must have architecture, in which 128 - bit
   pointers are stored in special memory areas, for this purpose.  The
   protocol informs VM about the nodes, on which task have finished the
   work.  VM must make all pointers concerning such tasks, invalid.  It
   results in exclusive situations at the access under these pointers.
   If the application provides processing exceptions, it keeps the
   capacity for work, or it is finished emergency.  Such decision allows
   excluding unguided applications working.

   For the decision of the specified questions at UMSP level, the
   control job node is defined for each job.  It names Job Control Point
   (JCP).  It may be the same node, on which the job is initiated, or it
   can be another dedicated node.  The basic JCP function is to trace
   the initialization and the end of the job tasks.  Besides, the
   dedicated JCP node may be used for the centralized users
   identification and the attack protection.

   The following identifiers are definite for the jobs and tasks
   control:

   o  Locally Task Identifier (LTID) is assigned to each active task on
      the node.  LTID length is equal to the length of local memory
      address defined for the node.  All LTID on the node must give
      unique values at each moment of time.  It is allowed to establish
      LTID, used earlier in the already completed tasks, for the again
      initiated tasks.
   o  JCP assigned the Control Task Identifier (CTID) to each task of
      the job.  Its length is equal to length of the local address
      memory on the node JCP.  All CTID on the JCP must give unique
      values at each moment of time.  As against LTID, the CTID value is
      chosen with some restrictions.
   o  Globally Task Identifier (GTID) is assigned to each task.  GTID
      has the same format, as the 128 - bit address of node memory has.
      The address of local memory is replaced on LTID in it.
   o  Globally Job Identifier (GJID) is assigned to the each job.  GJID
      is defined on the JCP node.  It has the same format, as the 128 -
      bit address of node JCP memory has.  The address of local memory




Bogdanov                      Experimental                     [Page 22]

RFC 3018             Unified Memory Space Protocol         December 2000


      is replaced on CTID of the first (initial) task of the job in it.
      GJID is used in the procedure of session connection opening for
      the definition JCP, which controls the job.

   LTID and CTID are written at the instructions in the field of length
   2/4/8 octets.  If the allocated for identifier field in the
   instruction is longer than identifier, LTID (CTID) writes in the last
   octets.  In the initial octets, the value 0 must be written.  If
   received LTID (CTID) is shorter than the local memory address, it is
   necessary to pad it with the zero octets in the beginning.

   GTID and GJID are written at the instructions in the field of length
   4-16 octets.  The field FREE is not present at these identifiers (see
   section 2.1).  It is considered, that it contains the zero-value
   octets.  Length of the identifier is defined in header of the
   address.

   By sending of instructions CONTROL_REQ, TASK_REG and SESSION_OPEN,
   the protocol uses timeout.  The value of timeout is assigned by node
   and must be more than three intervals of the maximal time of delivery
   at the transport layer.  The timeout is not influenced the waiting
   period in queue to the transport layer.

5.1    Job Initiate

   The job concerns to the user application executed on VM.  The UMSP
   job initialization can be made simultaneously with the application
   user start or during its working.

   The task, appropriated to its job, is initialized on the node
   together with the job.  LTID is binding to this task.

   If the node, on which the user application was loaded, is chosen for
   JCP, the question of the job initialization lays beyond the scope of
   the network protocol.

   Other node can be chosen as JCP for the following reasons:

   o  The job initialization node is connected to network by slow-speed
      or overloaded channel.  It is undesirable to send the managing
      traffic.
   o  The node has no computing possibilities for conducting the
      managing tables.
   o  The authentication on the detailed node is necessary.

   If the other node is chosen for JCP, the node, that initiates the
   job, must register the job at JCP.




Bogdanov                      Experimental                     [Page 23]

RFC 3018             Unified Memory Space Protocol         December 2000


5.1.1     CONTROL_REQ

   The instruction "To request a control" (CONTROL_REQ) is sending from
   the node, initial the job, to JCP of other node.  The instruction has
   the following values of fields:

      OPCODE = 3
      PCK = %b00
      CHN = 0
      ASK = 1
      EXT = 0/1
      OPR_LENGTH = 2/3  ; Depends on LTID length.
      REQ_ID - The value is assigned by the sender node protocol and
               then will be sent in the response.
      Operands:
         4 octets: The control parameters profile.  This field has the
                   following format:

            bits
             0     1     2     3     4     5     6     7
            +-----+-----+-----+-----+-----+-----+-----+-----+
            |                                               |
            +                 JOB_LIFE_TIME                 +
            |                                               |
            +-----+-----+-----+-----+-----+-----+-----+-----+
            | CMT |    Reserved     |        VERSION        |
            +-----+-----+-----+-----+-----+-----+-----+-----+
            |                   Reserved                    |
            +-----+-----+-----+-----+-----+-----+-----+-----+


            JOB_LIFE_TIME

               2 octets.  The job lifetime in seconds.  The zero-value
               signifies that the restriction of the job lifetime is
               unused.

            CMT

               1 bit.  The flag of several JCP using.  This field is
               reserved for the future expansion of the protocol.

            VERSION

               1 octet.  The number of the UMSP version.  It must
               contain the value 1.





Bogdanov                      Experimental                     [Page 24]

RFC 3018             Unified Memory Space Protocol         December 2000


            Reserved

               3 + 8 bits.  All bits must be set to 0.

         4/8 octet: LTID of task of the job, assigned on the node, which
                    initiate the job (by the sender of this
                    instruction).
      The optional extension headers:
         _JOB_NAME  -  This header contains the name of the Job.  Is
                       assigned once and must not change further.
         _INACT_TIME - This header contains the inaction time (see
                       section 5.7).

   At reception of the CONTROL_REQ instruction JCP checks the LTID value
   from the received instruction and makes the following:

   (1) If the node, which has sent CONTROL_REQ, already has registered
       on JCP the active job with such LTID, the notification about
       abnormality end of the registered job is sent, as is described in
       section 5.5.2 (it is considered, that the node was reloaded).
       After that, the sanction to an initiation of the new job is sent.
   (2) If the node has no registered job with received LTID, it allows
       the new job initiation at once.

   If JCP confirms the control, it will send the instruction
   CONTROL_CONFIRM, or else CONTROL_REJECT.

5.1.2     CONTROL_CONFIRM

   The instruction "To confirm the control" (CONTROL_CONFIRM) is sent
   from JCP as the positive response to CONTROL_REQ instruction.
   CONTROL_CONFIRM has the following values of fields:

      OPCODE = 4
      PCK = %b00
      CHN = 0
      ASK = 1 ; The instruction does not need to be responded.  This flag
                specifies presence of the REQ_ID field.
      EXT = 0/1
      OPR_LENGTH = 1-4 ; Depends of length of the GJID.
      REQ_ID - The value is taken from the instruction CONTROL_REQ
      Operands:
         4-16 octets: The GJID assigned to the job on the JCP.

   The sending of the instruction CONTROL_REQ means request of control
   and request of task initiation.  Assigned to the task CTID is part
   GJID (field of the local memory address).




Bogdanov                      Experimental                     [Page 25]

RFC 3018             Unified Memory Space Protocol         December 2000


5.1.3     CONTROL_REJECT

   The instruction "To reject the control" (CONTROL_REJECT) is sent from
   JCP as the negative response to CONTROL_REQ instruction.
   CONTROL_REJECT has the following values of fields:

      OPCODE = 4
      PCK = %b00
      CHN = 0
      ASK = 1.  The instruction does not need to be responded.  This flag
                specifies presence of the REQ_ID field.
      EXT = 0/1
      OPR_LENGTH = 1/2 ; Depends on presence of the control parameters
                         profile field.
      REQ_ID - The value is taken from the instruction CONTROL_REQ
      Operands:
         2 octets: The basic error code.  The zero-value is not
                   available.
         2 octets: The additional error code.
         4 octets: The control parameters profile (see section 5.1.1),
                   that is allowed by JCP.  This is optional field.
      The optional extension headers:
         _INACT_TIME - This header contains the inaction time (see
                       section 5.7).
         _MSG - contains the arbitrary error description.

5.2    Task Initiate

   The job is executed on several nodes simultaneously.  The task,
   appropriate to it, must be initialized on each node.  There is
   corresponding only one task to one job on the node.  Each task must
   be connected only with one job.

   The task is initiated together with the job on the node, which had
   created the job.  On the other nodes, the task is initiated during
   the receiving of the first request on the opening of the session
   connection, which is appropriate to the job.  The request about
   openings of session connection contains GJID.  GJID contains the JCP
   address.  It is necessary to receive the sanction from JCP for the
   task start.  If the request about the opening of session has been
   received from JCP node, it is not necessary to request the sanction.

5.2.1     TASK_REG

   The instruction "To register a task" (TASK_REG) is sent from the
   node, which initials the task, to JCP of the remote node.  The
   instruction has the following values of fields:




Bogdanov                      Experimental                     [Page 26]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 6/7/8 ; For length CTID of 2/4/8 octets.
      PCK = %b00
      CHN = 0
      ASK = 1
      EXT = 0/1
      OPR_LENGTH = 2-8  ; Depends on length of the GTID and LTID.
      REQ_ID - The value is assigned by the sender node protocol and
               then will be sent in the response.
      Operands:
         2/4/8 octets: CTID of the task initiated the job.  It CTID is a
                       part GJID from the instruction SESSION_OPEN.
         4-16 octets: GTID, assigned on the node, initialed session
                      connection.  GTID is formed of sender addresses (at
                      transport layer) and field LTID of the instruction
                      SESSION_OPEN.
         2/4/8 octets:  LTID, assigned on the node, initialed the task
                        (by the sender of this instruction).
      The optional extension headers:
         _INACT_TIME - This header contains the inaction time (see
                       section 5.7).

   The instruction TASK_REG must be sent only if the task with given
   GJID was not initiated on the node.

   JCP confirms initiation of a task at observance of the following
   conditions:

   (1) Task with received GTID already has registered on JCP.
   (2) Task with LTID for the node requesting for initiation has not
       registered.

   In all other cases, JCP will not confirm a task.

   If JCP confirms the task, it will send the instruction TASK_CONFIRM,
   differently TASK_REJECT.

5.2.2     TASK_CONFIRM

   The instruction "To confirm the task" (TASK_CONFIRM) is sent from JCP
   as the positive response to TASK_REG.  TASK_CONFIRM has the following
   values of fields:

      OPCODE = 9
      PCK = %b00
      CHN = 0
      ASK = 1.  The instruction does not need to be responded.  This flag
                specifies the field REQ_ID presence.
      EXT = 0/1



Bogdanov                      Experimental                     [Page 27]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPR_LENGTH = 1/2  ; Depends on length of the CTID.
      REQ_ID - The value is taken from the instruction TASK_REG.
      Operands:
         4/8 octets: The CTID assigned to the task on the JCP.
      The optional extension headers:
         _JOB_NAME - This header contains the name of the Job.

5.2.3     TASK_REJECT

   The instruction "To reject the task" (TASK_REJECT) is sent from JCP
   as the negative response to TASK_REG instruction.  TASK_REJECT has
   the following values of fields:

      OPCODE = 10
      PCK = %b00
      CHN = 0
      ASK = 1.  The instruction does not need to be responded.  This flag
                specifies presence of the REQ_ID field.
      EXT = 0/1
      OPR_LENGTH = 1
      REQ_ID - The value is taken from the instruction CONTROL_REQ
      Operands:
         2 octets: The basic error code.  The zero-value is not
                   available.
         2 octets: The additional error code.
      The optional extension headers:
         _INACT_TIME - This header contains the inaction time (see
                       section 5.7).
         _MSG - contains the arbitrary error description.

5.2.4     TASK_CHK

   With the purposes of a safety the node, which have received request
   about the opening of session connection, may check up at JCP the
   node, which has initialed connection, even if the task was already
   initiated.

   The instruction "To check up the task" (TASK_CHK) is sent from the
   node, which has received the instruction of the establishment of
   session connection SESSION_OPEN, to JCP.  The task with given GJID,
   must have existed on the node already.  The instruction TASK_CHK
   format coincides with TASK_REG.  OPCODE = 11.  The response to the
   instruction TASK_CHK JCP forms instructions TASK_REG similarly.

   JCP confirms the instruction TASK_CHK if a task with received GTID
   and LTID already has registered on JCP.

   The sending of the TASK_CHK is optional.



Bogdanov                      Experimental                     [Page 28]

RFC 3018             Unified Memory Space Protocol         December 2000


5.3    Establishment of session connection

   The session connection is established between two tasks of one job.
   The connection is established under the VM initiative and it is used
   for the exchange of the instructions between VM.

   One session connection must be connected only with one task on the
   node.  The task may have several connections with different nodes.
   Between two nodes must be only one session connection with one GJID.

   The request about the establishment of session connection contains
   the global identifier of the job GJID.  If the node receives the
   request about the establishment of connection with GJID, which is not
   presented on the given node, VM must create a new task.  If the task
   has been already initialized, the new task is not created.

   The session connection needs to be established over TCP.  After the
   connection is established, the sending of the instructions, which are
   not require of execution response, is possible through UDP.  One TCP
   connection may be used by several session connections.  One session
   connection may use several TCP connections.

   The protocol allows working without the establishment of session
   connection.  The node must have VM by default, which must execute the
   instructions without the establishment of connection.

   At the establishment of session connection, the sides agree about the
   used VM type and the subset of the protocol functions.  The session
   connection UMSP may be asymmetrical.  It means, that two sides of one
   connection can be connected with VM of the different type and provide
   the different subset of the protocol functions.

   If at an establishment of session connection the zero-type VM is
   used, it specifies group VM (see section 9).  The zero-value of
   realization VM is not allowed.

   The procedure of the establishment of session connection may contain
   from 2-way up to 8-way handshakes.

5.3.1     SESSION_OPEN

   The instruction "To open a session" (SESSION_OPEN) is used for the
   initiation of session connection and for the specification of
   connection parameters during handshake.  It has the following values
   of fields:






Bogdanov                      Experimental                     [Page 29]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 12
      PCK = %b00/11.  In the first instruction (initial) the value of
                       this field is set to %b00.  In all subsequent -
                       %b11.
      CHN = 0
      ASK = 1
      EXT = 0/1
      OPR_LENGTH = 6 - 10 ; Depends on length GJID and LTID.
      SESSION_ID - In the first instruction this field is absent.  In all
                   subsequent, it contains the identifier of sessions,
                   assigned by the instruction receiver.
      REQ_ID - This field contains the session connection identifier,
               assigned by the instruction sender.
      Operands:
         2 octets: The VM type required from the addressee.
         2 octets: The VM version required from the addressee.
         4 octets: The profile of connection required from the
                   instruction addressee.
         2 octets: The VM type of the sender.
         2 octets: The VM version of the sender.
         4 octets: The profile of connection given by the instruction
                   sender.
         2 octets: The number of 256 octet blocks in the buffer,
                   allocated for session ("window"), on the side of the
                   sender of this instruction (see section 7.4).  The
                   zero-value specifies absence of the buffer.
         4-16 octets: GJID.
         4/8 octets: LTID of the sender task, assigned on the node -
                     sender of the instruction.  It is used in the
                     instruction TASK_REG (as a part of the field GTID).

   If the VM type and version, required from the addressee, have the
   value 0, the receiving node independently chooses the VM type and
   reports it in the response.  The establishment of connection without
   binding to VM or VM group is not allowed.

   Totally, it can be transmitted up to 7 instructions SESSION_OPEN at
   the establishment of connection.  The instruction SESSION_ACCEPT is
   used for the response of the establishment of connection.  For the
   refusal of connection the instruction, SESSION_REJECT is used.

   It is possible to refuse connection on any step.  It is necessary
   either to confirm connections, or to refuse it on the eighth step.

   During the establishment of connection the following parameters may
   be changed:





Bogdanov                      Experimental                     [Page 30]

RFC 3018             Unified Memory Space Protocol         December 2000


   o  VM type and VM version;
   o  profiles of connection.

   If the repeated request about opening of session connection is
   received from the definite node, while one connection with received
   GJID have been already established, the following variants are
   possible:

   (1) If the request has arrived from the node JCP, it is necessary:
       o  To finish the existing task emergency and to deallocate all
          dynamic resources belong to it.
       o  To initiates a task without request of the JCP sanction again.
       o  To confirm the establishment of connection.
   (2) If the request arrived not from the JCP node, it is necessary to
       refuse the establishment of new session connection.  The existing
       task does not need to be changed.

5.3.2     SESSION_ACCEPT

   The instruction "To accept the session" (SESSION_ACCEPT) is used for
   positive response to the establishment of session connection.  It has
   the following values of fields:

      OPCODE = 13
      ASK = 1
      PCK = %11
      EXT = 0/1
      CHN = 0
      OPR_LENGTH = 0
      SESSION_ID - This field contains the session connection identifier
                   of assigned by the node of the addressee of the
                   instruction.
      REQ_ID - This field contains the session connection identifier,
               assigned by the instruction sender.

5.3.3     SESSION_REJECT

   The instruction "To reject the session" (SESSION_ACCEPT) is used for
   negative response to the establishment of session connection.  It has
   the following values of fields:

      OPCODE = 14
      ASK = 0
      PCK = %b11
      EXT = 0/1
      CHN = 0
      OPR_LENGTH = 1




Bogdanov                      Experimental                     [Page 31]

RFC 3018             Unified Memory Space Protocol         December 2000


      SESSION_ID - This field contains the session connection identifier
                   of assigned by the node of the addressee of the
                   instruction.
      Operands:
         2 octets: The basic error code.  The zero-value is not
                   available.
         2 octets: The additional error code.
      The optional extension headers:
         _MSG - contains the arbitrary error description.

5.3.4     Connection Profile

   The profile of connection is defined in 4-octet field of flags.  The
   flags have identifiers S0 - S31.  The number in the identifier is
   defining the serial number of bit.  If the flag is set to 1, the
   function, connected with it, is provided.  If the flag is set to 0,
   the function, connected with it, is not provided (not required).  The
   list of functions, determined at the establishment of session
   connection, are described further.

   Work with chains:

      S0 - Use of fragmented instructions.
      S1 - Use of sequences.
      S2 - Use of transactions.

   Establishment of connection:

      S3 - Use the exchange of the data without the establishment of
           connection.
      S4 - Use the exchange of the data with the establishment of
           connection.

   The instructions format:

      S5  - Reserved.  Must have set to 0.
      S6  - Use of 16-octet address in the exchange instructions.
      S7  - Use of the compressed form of header of the instruction
            (OPR_LENGTH < > %b111) is allowed
      S8  - Use of the extension form of header of the instruction
            (OPR_LENGTH = %b111) is allowed
      S9  - Use of the extension headers with the data field up to 254
            octets of length.
      S10 - Use of the extension headers with the data field up to 4 *
            10^9 octets of length.
      S11-S15  Maximal length of the data field in operands in the 4
               octet words.  These bits are the common field.  Maximal
               length in octets is computed under the formula:



Bogdanov                      Experimental                     [Page 32]

RFC 3018             Unified Memory Space Protocol         December 2000


                  <max length> = (<value of this field> + 1) * 4.
               If the value is equal %b1111, maximal length of the data
               is defined by the instruction format.
      S16-S19  These bits are the common field.  In the profile required
               from the addressee of the instruction, this field
               contains the version of the UMSP.  It must is set to the
               value %b0001.  In the profile given sender of the
               instruction, this field contains priority of the job.  The
               more is value of this field, the more priority.  The
               priority of the job is used:
               o In queues on sending to the transport layer for the
                 instructions of the job.
               o For set of sending priority of the transport layer.
               o For set of computing priority of the task.
      S20 - making the border multiple of 4 octets.  If S16 = 1:
         (1)  OPR_LENGTH = %b111
         (2)  Each extension header and the field of operands begin with
               the border multiple of four octets.
         (3)  The necessary number of zero octets is added in the end of
              each header.
      S21 - Use of the procedures name of objects.
      S22 - Use of the objects name.

   The permissible instructions:

      S23 - The response of the execution on VM (instruction RSP) is
            provided.
      S24 - Use of data reading and comparison instructions.
      S25 - Use of data writing instructions.
      S26 - Use of control transfer instructions.
      S27 - Use of synchronize instruction.
      S28 - Use of instructions of work witch objects.
      S29 - Use of the immediate access to memory of object.  If this
            flag is set to 0, the access to object is solved only
            through its procedures.  If S28=0, this flag must be set to
            0.
      S30 - Use of instruction MVRUN in zero-session.
      S31 - Reserved.  Must have set to 0.

5.4    Session Closing

   Initiate closing session connection the node must only, which has
   initiated its establishment.  It uses the SESSION_CLOSE instruction
   for this purpose.  The procedure of break of connection is 3-way
   handshake.  The procedure of unconditional emergency end of
   connection is stipulated.  It can be transmitted by any node.





Bogdanov                      Experimental                     [Page 33]

RFC 3018             Unified Memory Space Protocol         December 2000


   Let node A is the initiator of the establishment of a session, and
   the node B is the second side of connection.  The node A must send
   the instruction SESSION_CLOSE for closing session.  The node A may
   recommence sending of the instructions after sending of this
   instruction.  It means that it has refused closing connection.  The
   instructions of response (see section 6) does not influence on the
   closing of connection.  The node, which has sent SESSION_CLOSE, does
   not use the timeout and can be waiting for the response beyond all
   bounds long.

   The node B, after reception of the instruction SESSION_CLOSE, sends
   in the answer the instruction RSP_P.  The zero basic return code
   responds closing session.  The non-zero basic return code cancels
   closing session.  After sending of positive response, the node must
   not use connection during 30-second timeout.  If the instruction
   SESSION_ABEND or any other instruction, except response instruction,
   has not been received from the node A after the expiration of this
   time, the node send the instruction SESSION_ABEND and considers the
   session connection closed.

   The node A sends the instruction SESSION_ABEND after reception of
   positive response on the instruction SESSION_CLOSE.  After that, the
   connection is considered closed.  The node A may refuse closing of
   connection.  For this purpose, any instruction is sent, including
   NOP.  In this case, the procedure of end interrupts, and the session
   connection is translated in the working state.

5.4.1     SESSION_CLOSE

   The instruction "To close the session" (SESSION_CLOSE) initiates the
   end of session connection.  It has the following values of fields:

      OPCODE = 15
      PCK = %b01/11
      CHN = 0
      ASK = 0
      EXT = 0/1
      OPR_LENGTH = 0/1
      SESSION_ID - Contains the session identifier assigned by the
                   addressee.
      Operands:
         2 octets: The basic termination code.
         2 octets: The additional termination code.
      The optional extension header:
         _MSG - contains the arbitrary message.

   The operands may be absent.  It is equivalent to the zero exit code.




Bogdanov                      Experimental                     [Page 34]

RFC 3018             Unified Memory Space Protocol         December 2000


5.4.2     SESSION_ABEND

   The instruction "Abend of session" SESSION_ABEND is applied to
   unconditional end of session.  The node, which has sent this
   instruction, finishes the exchange of the data on connection at both
   sides, not waiting responses from other node.  The instruction has
   the following values of fields:

      OPCODE = 16
      PCK = %b01/11
      CHN = 0
      ASK = 0
      EXT = 0/1
      OPR_LENGTH = 0/1
      SESSION_ID - Contains the session identifier assigned by the
                   addressee.
      Operands:
         2 octets: The basic termination code.
         2 octets: The additional termination code.
      The optional extension header:
         _MSG - contains the arbitrary message.

   The operands may be absent.  It is equivalent to the zero termination
   codes.

5.5    Task Termination

   The task is finished during the process of the job finishing at the
   normal end of the user application working.  This procedure is
   described in the following item.  The following situations require
   finishing the task irrespective of the job:

   o  There are not enough of computing resources for maintenance of the
      task on the node;
   o  The node finishes the work;
   o  If VM has accepted such decision for the internal reasons.

   The references to the resources allocated by the task can be on any
   node, on which the job is carried out.  Therefore, all nodes must be
   notified of the end of the task.

   Node, finishing the task, must abnormally close all session
   connections joining the finished task (to send the instruction
   SESSION_ABEND).







Bogdanov                      Experimental                     [Page 35]

RFC 3018             Unified Memory Space Protocol         December 2000


5.5.1     TASK_TERMINATE

   The instruction "To terminate the task" (TASK_TERMINATE) is sent from
   the node, on which the task is finished, to JCP.  The instruction has
   the following values of fields:

      OPCODE = 17
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0/1
      OPR_LENGTH = 2/3  ; Depends on the length of CTID.
      Operands:
         2 octets: The basic termination code.
         2 octets: The additional termination code.
         4/8 octets: CTID.
      The optional extension header:
         _MSG - contains the arbitrary message.

   After sending of the instruction TASK_TERMINATE to JCP, the node
   sends the instruction of unconditional end of connection
   ABEND_SESSION on all session connections connected with a task.
   After that, the task is considered completed.

   If the basic return code in the instruction TASK_TERMINATE is equal
   to 0, it is not required to notify other nodes about the end of the
   task.  Such situation arises, if the task did not allocate dynamic
   resources.  If the basic return code is unequal to 0, JCP must notify
   about the task end the other nodes, on which the job is carried out,
   after reception of the instruction TASK_TERMINATE.  JCP responds for
   the notification of all nodes of the job about the task end.

5.5.2     TASK_TERMINATE_INFO

   The instruction "The information on terminating of the task"
   (TASK_TERMINATE_INFO) is used for the notification about the task
   end.  It is sent from JCP to other nodes, on which the job is carried
   out.  The instruction has the following values of fields:

      OPCODE = 18
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0/1
      OPR_LENGTH = 2-5 ; Depends on the length of GTID.
      Operands:
         2 octets: The basic termination code.
         2 octets: The additional termination code.



Bogdanov                      Experimental                     [Page 36]

RFC 3018             Unified Memory Space Protocol         December 2000


         4-16 octets: GTID of the terminated task.  JCP forms GTID from
                      LTID (from the instruction TASK_REG) and address
                      of transport layer of the task.
      The optional extension header:
         _MSG - contains the arbitrary message.

   The fields of termination codes are taken from the instruction
   TASK_TERMINATE.  The job must delete (to make invalid) all references
   to resources concerning the node, on which the completed task worked,
   at reception of the instruction TASK_TERMINATE_INFO.

5.6    Job Completion

   The job is finished, when the appropriated to it the user application
   on the node, on which it was initiated, is finished.  The end of the
   job occurs under the initiative of VM.  Besides, it can be completed
   under the JCP initiative at ending the lifetime of the job or at end
   of the JCP node working.

5.6.1     JOB_COMPLETED

   The instruction "The task is completed" (JOB_COMPLETED) is sent from
   the node, which initiated the job, in the JCP side.  It has the
   following values of fields:

      OPCODE = 19
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0/1
      OPR_LENGTH = 2/3 ; Depends on the CTID length.
      Operands:
         2 octets: The basic completion code.
         2 octets: The additional completion code.
         4/8 octets: CTID of the completed task of the job.  CTID is a
                     part GJID of the job.
      The optional extension header:
         _MSG - contains the arbitrary message.

   After sending of the instruction JOB_COMPLETED to JCP, the node sends
   on all connected with the session connections of the job the
   instruction of unconditional end of connection ABEND_SESSION.  After
   that, the job is considered completed.

   JCP must notify of the end of the job the nodes, on which the job is
   carried out, after reception of the instruction JOB_COMPLETED.  JCP
   responds for the notification of all nodes of the job about end of
   the job.



Bogdanov                      Experimental                     [Page 37]

RFC 3018             Unified Memory Space Protocol         December 2000


   The instruction TASK_TERMINATE_INFO may be transferred under the
   initiative JCP, if node of the task has abnormal terminated work.

5.6.2     JOB_COMPLETED_INFO

   The instruction "The information on completion of the job"
   (JOB_COMPLETED_INFO) is used for the notification about end of the
   job.  It is sent from JCP to other nodes, on which the job is carried
   out.  The instruction has the following values of fields:

      OPCODE = 20
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0/1 ;
      OPR_LENGTH = 2-5 ; Depends on the GJID length and presence of
                         fields completion code.
      Operands:
         2 octets: The basic completion code.
         2 octets: The additional completion code.
         4-16 octets: GJID of the completed job.
      The optional extension header:
         _MSG - contains the arbitrary message.

   The fields of completion codes are optional.

   The fields of completion codes are taken from the instruction
   JOB_COMPLETED.  At reception of the instruction, JOB_COMPLETED_INFO
   the node must make the following:

   (1)  To remove all session connections, connected to the task.  At
        that, it is not necessary to send network primitives.
   (2)  To abnormally finish the task of the job and to deallocate all
        dynamic resources of the task.

   The instruction JOB_COMPLETED_INFO is used for the end of the job
   under the JCP initiative at the end of lifetime or at end of the JCP
   node working.  In these cases, the node initiated the job is the
   first addressee of the instruction.

   JCP considers the job completed after sending of all instructions
   JOB_COMPLETED_INFO.

5.7    Activity Control of Nodes

   UMSP unites nodes, which have any arrangement in the network and
   which are not having uniform controls.  Each of nodes can be
   disconnected or reloaded at any moment of time.  However, other nodes



Bogdanov                      Experimental                     [Page 38]

RFC 3018             Unified Memory Space Protocol         December 2000


   can be not notified about it.  The fact of breaking or repeated
   establishment of transport connection cannot be the indicator of
   disconnect or restart of the node.  The control of transport
   connections is not the part of the UMSP protocol and the presence of
   transport connection is not obligatory.

   Besides the separate task on the node can be finished emergency.
   Procedure described in section 5.5.1 in this case must be executed.
   If this procedure cannot be executed, must is abnormally finished
   work of the node.

   The JCP executes the functions of the control of nodes activity.  The
   instruction of request of the status TASK_REQ is sent periodically
   between tasks on nodes and JCP for this purpose.

   The following actions JCP are possible at detection of deactivating
   of the node:

   (1)  If the task initiated the job was finished, it is considered,
        that the job is completed.  JCP sends the instruction
        JOB_COMPLETED_INFO to all other nodes, on which the job was
        executed.
   (2)  JCP sends the instruction TASK_TERMINATE_INFO to all other nodes
        of the job, if the task, which has not initiated the job, is
        finished.

   The deactivating of the JCP node imposes the restriction on GJID
   appropriated by it after reloading.  The following variants are
   probable:

   (1)  The disconnection of the JCP node passed normally.  It
        transferred to all nodes, which it has controlled, instruction
        JOB_COMPLETED_INFO.  In this case, it can appropriate anyone
        GJID after reloading.
   (2)  There is the emergency disconnect of the JCP node.  It has not
        informed all nodes about the deactivating.  In this case, it
        must guarantee after reloading, that new GJID will not concur
        witch the GJID, existing up to the reload, during two maximal
        intervals of inactivity time (which sets this JCP).

   The reload of nodes, which are not being JCP, does not impose
   restrictions on LTID established on these nodes.

5.7.1     _INACTION_TIME

   The extension header "The time of inaction" (_INACTION_TIME) allows
   setting the inaction time of the node (non JCP).  It has the
   following values of fields:



Bogdanov                      Experimental                     [Page 39]

RFC 3018             Unified Memory Space Protocol         December 2000


      HEAD_CODE = 2
      HEAD_LENGTH = 1;
      HOB = 1
      DATA contains:
         2 octets: The inaction period.  The number of 0,5 second
         intervals, through which the activity of the node - sender of
         the instruction from the side JCP - will be checked.

   The inaction period must be more than three intervals of the maximal
   time of delivery at the transport layer.  The waiting period in queue
   to the transport layer does not influence on timeout.

   The header _INACTION_TIME may be attached to the following
   instructions:

   (1)  To the instruction TASK_REG.  In this case must be satisfied
        condition - on node there must not be other active tasks, which
        are controlled the JCP of addressee.  The zero-value specifies
        that the activity checking is unused.  The absence of the header
        specifies that the inaction period must be set on the JCP.
   (2)  To the instruction TASK_REJECT, if the time from the instruction
        TASK_REG does not fit for JCP.
   (3)  To the instruction TASK_CONFIRM, if instruction TASK_REG had no
        this header.

   If JCP receives the instruction TASK_REG with the attached heading
   _INACTION_TIME, it must check up presence of active tasks with sender
   node (as it can mean, that the node was reloaded).  If such tasks
   exist, for each of them it is necessary to execute procedure of end
   of the task described in section 5.6.2.  The instruction TASK_CONFIRM
   must be sent only after that.

5.7.2     STATE_REQ

   The instruction "State Request" (STATE_REQ) is sent from JCP to the
   definite task of other node.  The instruction has the following
   values of fields:

      OPCODE = 21
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0
      OPR_LENGTH = 1/2 ; Depends on the LTID length.
      Operand:
         4/8 octets: LTID, established on the node of the instruction
                     addressee.




Bogdanov                      Experimental                     [Page 40]

RFC 3018             Unified Memory Space Protocol         December 2000


   The instruction STATE_REQ will be sent in the defined task but it has
   concern with node.  It is sent, if between the node and JCP was not
   sending of the instruction during inactive time.  The task activated
   after sending of last instruction STATE_REQ does not influence the
   control of activity.

   The instruction TASK_STATE is sent in reply to STATE_REQ.  At
   expectation of the response, the timeout equal to one inaction period
   is used.  After the expiration of the timeout the node is considered
   switched - off.

   If the node not receives of any instructions from JCP during two
   intervals of inaction time, it is considered, that JCP has finished
   the work.  The actions of the node in this case are described in
   section 5.6.2 at receiving the instruction JOB_COMPLETED_INFO.  The
   check of this condition is optional for the node.

   If at JCP there are no active tasks connected with the defined node,
   the control of activity of this node will not be carried out.

5.7.3     TASK_STATE

   The instruction "Task State" (TASK_STATE) is sent from the definite
   task to JCP.  It serves for the response of the instruction
   STATE_REQ.  The instruction has the following values of fields:

      OPCODE = 22
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0
      OPR_LENGTH = 1/2/3 ; Depends on the CTID length.
      Operands:
         1 octet:  The state code of task.  The following values are
                   defined for this field:
            %x01 - The task is active and has active session
                   connections.
            %x02 - The task is active and have no session connections.
            %x03 - The task is active, have no session connections and
                   have no resources, allocated on the node.
            %x04 - The task is completed.
         1/3 octets: Reserved.  If OPR_LENGTH = 1, then this field has
                     length 1 octet, else 3 octets. JCP must not check
                     the value of this field.  It is established in zero
                     value by sending.
         2/4/8 octets: CTID connected with LTID from the instruction
                       STATE_REQ.




Bogdanov                      Experimental                     [Page 41]

RFC 3018             Unified Memory Space Protocol         December 2000


   If OPR_LENGTH = 1 that length of the reserved field is equal to one
   octet and length CTID makes two octets.  In all other cases, length
   of the reserved field is equal 3 octets and length CTID - not less
   than 4 octets.

5.7.4     NODE_RELOAD

   The instruction "The node was reloaded" (NODE_RELOAD) is sent to JCP
   as the negative response to STATE_REQ instruction.  NODE_RELOAD has
   the following values of fields:

      OPCODE = 23
      PCK = %b00
      CHN = 0
      ASK = 0
      EXT = 0
      OPR_LENGTH = 1/2 ; Depends on the LTID length.
      Operands:
         4/8 octets: LTID.  The value is taken from the instruction
                     STATE_REQ.

   The instruction RELOAD_NODE indicates, that the task with given LTID
   for given JCP on the node is absent.  At reception of this
   instruction, JCP must make the following:

   (1)  To send the instruction STATE_REQ to all tasks of the node,
        which were initiated before a sending of the penultimate
        instruction STATE_REQ.
   (2)  To wait for ending of one inaction interval after sending of the
        last instruction STATE_REQ (on which the negative response is
        received).
   (3)  To send the instructions STATE_REQ to all tasks of the node,
        which were initiated between last and penultimate instructions
        STATE_REQ (not including instructions from item 1).

   For all instructions STATE_REQ the positive response (TASK_STATE) or
   negative response (RELOAD_NODE) must be transmitted.

5.8    Work without session connection

   The protocol provides the data exchange between nodes without an
   establishment of session connection.  In this case, initialization of
   the job and tasks is not made and JCP is not used.

   The format of the instructions, transmitted without the establishment
   of connection, is completely correspond to the instructions
   transmitted by session connections.  The difference is that the field
   SESSION_ID has zero value or PCK = %b00.



Bogdanov                      Experimental                     [Page 42]

RFC 3018             Unified Memory Space Protocol         December 2000


   The node, supporting work without the establishment of session
   connection, must have VM, which executes by default the instructions
   transmitted without the establishment of connection.  In fact, these
   instructions are executed within the framework of a so-called zero-
   session (or zero-task) of this VM.  The memory address space of this
   VM is accessible without a connection establishment.

   The instruction SESSION_INIT with SESSION_ID = 0 and REQ_ID = 0
   allows to specify parameters of its zero-session and to request the
   zero-session parameters of the addressee node.  If the node, which
   has received such instruction, provides the requiring profile, it
   sends the instruction SESSION_ACCEPT.  If the profile is not
   provided, the answerback instruction SESSION_INIT will send, in which
   the field SESSION_ID and REQ_ID also have the value 0.  Actually,
   such instructions of session initialization do not establish
   connection, but have the information meaning.  The exchange of the
   data by zero-session can occur irrespective of its.

   There are the following restrictions at working without connection:

   o  The chain must be sent, only if it is completely located in one
      segment of the transport layer.
   o  It is impossible to request an allocation of memory and to create
      objects (except instruction MVRUN).  This objects is not adhered
      to the definite job and is not automatically release the resources
      at the end of the job, which has created them.
   o  Parameters of functions and the returned values must not contain
      the pointers, because the node can be reloaded at any moment.  It
      will result that the pointers will become invalid or will address
      other objects.

   The protocol cannot check those conditions.  Their realization lays
   on VM wholly.

   The work without establishment of session connection may be used in
   the following systems:

   o  In simple devices, which do not have the operational system;
   o  On servers which are executed a plenty of requests (for work
      without connection of resources is used less);
   o  In systems requiring the fast response to rare requests (if
      keeping of connection is inexpedient).









Bogdanov                      Experimental                     [Page 43]

RFC 3018             Unified Memory Space Protocol         December 2000


6  Instructions of Exchange between VM

   The instructions intended for an exchange between VM uses values
   OPCODE in range 128 - 223.  Depending on length of the operands
   field, several formats of the instruction may be defined for one
   OPCODE.  The complete instruction format is defined by aggregate of
   the values of fields OPCODE and OPR_LENGTH.

   The instruction has the field REQ_ID, if in the instruction header
   flag ASK = 1.  REQ_ID is used for the response identification.  The
   value of this field is specifies by VM.  The response is formed by
   VM, too.  The protocol does not check the response and does not
   analyze the value of the field REQ_ID for the instructions of
   exchange between VM.  One of the instructions RSP, DATA, RETURN,
   ADDRESS, OBJECT or PROC_NUM is used for sending of the response.  The
   instructions of response have ASK = 1 and the value taken from the
   confirmed instruction is record in REQ_ID.  The instructions of
   response do not require the response.

   The instructions of exchange between VM may be sent through UDP at
   observance of the following conditions:

   o  ASK = 0;
   o  The instruction is located in one segment UDP;

   The timeouts and the repeated sending are not used at UMSP layer for
   instructions of exchange between VM.  It is explained to, that the
   time of sending instructions with low priority may be very large
   because of the output queues.  Therefore, the VM must make a decision
   on timeout, as only VM has the complete information on type of the
   transmitted data.  Besides, the transport layer protocol must use the
   timeouts.

   A few VM may be connected to the protocol on the node.  VM may
   simultaneously execute several jobs.  Each job may work in its
   address space.  The protocol determines VM and job, which the
   received instruction must transfer to, on field SESSION_ID value.

   The local memory address is located in the instruction in field of
   length 2/4/8 octets.  If memory address length in the instruction is
   not equal to memory address length defined for the node, the
   following variants are possible:

   o  If memory address length is set in 24 bits for the node, the
      address is writes in the end of 4 - octets field.  The 0 value
      sets in an initial (zero) octet.





Bogdanov                      Experimental                     [Page 44]

RFC 3018             Unified Memory Space Protocol         December 2000


   o  If the instruction format assumes the memory address length not
      less than 4 octets, 2-octet address is located in the last octets.
      The first 2 octets must set to zero.
   o  If instruction is the member of a chain and it has the less length
      of the memory address, than it is defined for the node - it is
      considered, that the base-displacement addressing is used.  If the
      value of the memory base is not assigned for the chain -
      instruction is erroneous.
   o  If the instruction is not the member of a chain and has the length
      of memory address less, than it is defined for the node, it is
      considered, that the abbreviated address is used.  The complete
      address length must be received by padding in front of it the
      necessary number of zero-value octets.
   o  In all other cases, the instruction is erroneous.

   Complete 128-bit memory address writes in operands in the 16-octets
   field.  The reason of using of the complete address is that the
   additional information, using by the memory control subsystem in the
   node, may contain in its field FREE (see section 2.1).  If the FREE
   of the complete address is set to zero, it is recommended to use
   local address in operands.

   Operands field has a length, which is an integral number of 32 bits.
   The alignment is making by padding, if necessary, of the zero-value
   octets at the end of the field.

   Header fields of the instructions not defined in the formats
   description are used according to the description from section 3.

   The instruction of the transfer control JUMP, CALL, CALL_BNUM and
   CALL_BNAME may contain the information about VM of the sender.  If VM
   type and VM version of the sender are contains in the instruction,
   the call parameters are formed in a format VM of the sender.  Else,
   the call parameters have format defined by VM of the addressee.  The
   code is always connected with of specific VM.

   All instructions of the protocol work with binary data and do not
   provide operations of formats transformation.

6.1  Data Reading/Writing Instructions

6.1.1   REQ_DATA

   The instruction "To request a data" (REQ_DATA) is used for the data
   request from the remote node.  Two instructions REQ_DATA with length
   of the length field 2 and 4 octets are defined.  These instructions
   have the following values of fields:




Bogdanov                      Experimental                     [Page 45]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 130/131      ; For length of the length field of 2/4
                              octets.
      OPR_LENGTH = 1/2/3/5  ; Depends on address length.
      Operands:
         2/4 octets: The length field. The number of the required data in
                     octets.
         2/4/8/16 octets: The memory address of the required data.

   The instruction DATA, containing required data, is sent in reply to
   it.  If the data cannot be sent, the instruction RSP with the non-
   zero basic return code, comes back.

6.1.2   DATA

   The instruction "The data" (DATA) is sent in reply to the instruction
   REQ_DATA and OBJ_REQ_DATA.  The instruction has the following values
   of fields:

      OPCODE = 132
      OPR_LENGTH = 0 - 65535  ; Depends on the immediate data length of
                                the operand.
      Operands:
         0 - 262140 octets: Immediate data.  If OPR_LENGTH = 0, this
                            field are absent.
      Extension headers:
         _DATA - Contains immediate data.  If OPR_LENGTH <> 0, this
                 header are absent.

   The extension header is used, if the data are more then an maximum
   operands field size.  The data must not be sent simultaneously in
   operands and in the extension header.  To make the length of data
   multiple of 4 octets, 1 - 3 zero-value octets are padded in the end
   of a field.

6.1.3   WRITE

   The instruction "To write the data" (WRITE) is used for data writing
   on the remote node.  The instruction has the following values of
   fields:

      OPCODE = 133/134/135/136  ; For memory address length of 2/4/8/16
                                  octets.
      OPR_LENGTH = 1 - 65535    ; Depends on length of the immediate
                                  data.
      Operands:
         2/4/8/16 octets: The memory address for writing the data.
         0 - 262136 octets: Immediate data for write.




Bogdanov                      Experimental                     [Page 46]

RFC 3018             Unified Memory Space Protocol         December 2000


      Extension headers:
         _DATA - Contains immediate data.  This header is present only,
                 if the data does not contain in operands.

   At address length of 2 octets the data length must be 2 octets.  In
   all other cases, address length must be not less than 4 octets and
   data length must be multiple of 4 octets.  The data must not be sent
   simultaneously in operands and in the extension header.

   The instruction RSP is sent in reply to the instruction WRITE.  The
   zero basic return code defines normal executing.

6.1.4   WRITE_EXT

   The instruction "The extension writing of data" (WRITE_EXT) is used
   for the data writing on the remote node.  Length of the data may be 1
   - 262132 octets with a step 1 octet.  The instruction has the
   following values of fields:

      OPCODE = 137
      OPR_LENGTH = 3 - 65535  ; Depends on length of the immediate data.
      Operands:
         1 octets: Always set to zero.
         3 octets: The number of the write data in octets.  The zero-
                   value is not available.
         4 - 262132 octets: Immediate data for write.  The data length
                            must be multiple of 4 octets.
         4/8/16 octets: The memory address for writing the data.

   To make the immediate data multiple of four octets, the data is
   padded with 1 - 3 zero-value octets at the end of a field.

   The instruction RSP is sent in reply to the instruction WRITE_EXT.
   The zero basic return code defines normal executing.

6.2  Comparison Instructions

6.2.1   CMP

   The instruction "To compare" (CMP) is used for binary data
   comparison.  It has the following values of fields:

      OPCODE = 138/139/140/141  ; For the address length of 2/4/8/16
                                  octets.
      OPR_LENGTH = 1 - 65535    ; Depends on length of the immediate
                                  data.





Bogdanov                      Experimental                     [Page 47]

RFC 3018             Unified Memory Space Protocol         December 2000


      Operands:
         2/4/8/16 octets: The memory address for compared data.
         2 - 262136 octets: The immediate data for the comparison.

   At the address length of 2 octets the data length must be 2 octets.
   In all other cases length of the address must not be less than 4
   octets and the data length is multiple to four octets.

6.2.2   CMP_EXT

   The instruction "The extension compare" (CMP_EXT) is used for binary
   data comparison.  Length of the data may be 1 - 262132 octets with a
   step 1 octet.  The instruction has the following values of fields:

      OPCODE = 142
      OPR_LENGTH = 3 - 65535  ; Depends on length of the immediate data
                                and the address.
      Operands:
         1 octet: Always set to 0.
         3 octets: The length of compared data in octets.  The zero-value
                   is not available.
         4 - 262132 octets: The immediate data for the comparison.  The
                            length of field is multiple of 4 octets.
         4/8/16 octets: The memory address of compared data.

   To make the immediate data multiple of four octets, the data is
   padded with 1 - 3 zero-value octets at the end of a field.

6.2.3   Response to Comparison Instructions

   The instruction RSP is sent in reply to the instruction CMP, CMP_EXT
   and OBJ_CMP (see below).  If the comparison was executed, the basic
   return code is equal to zero.  The additional return code is equal to
   -1, if the data at the address memories are less then the data from
   the operand; 0, if they are equal; and 1, if they are more.  If the
   comparison cannot be executed, the basic return code of the
   instruction RSP must be non-zero.

6.3  Control Transfer Instructions

6.3.1   JUMP, CALL

   The "Unconditional jump" (JUMP) and "To Call-subroutine" (CALL)_
   instructions have an equal format and differ only by OPCODE.  These
   instructions have the following values of fields:

      OPCODE = 143/144  ; Correspondingly for the JUMP not containing
                          and containing the information about VM.



Bogdanov                      Experimental                     [Page 48]

RFC 3018             Unified Memory Space Protocol         December 2000


               145/146  ; Correspondingly the CALL not containing and
                          containing the information about VM.
      OPR_LENGTH = 2 - 65535  ; Depends on inclusion of the information
                                about VM, address length and parameters
                                length.
      Operands:
         2 octets: The VM type of the sender.  If OPCODE=143/145 this
                   field is absent.
         2 octets: The VM version of the sender.  If OPCODE=143/145 this
                   field is absent.
         4/8/16 octets: The address of memory, where is necessary to
                        transfer control.
         2 octets: The number of 32 bit words in the call parameters
                   field.
         4 - 262134 octets: The immediate data are the parameters of a
                            call.

   On the reception side the processing of the instructions of a control
   transfer occurs as follows:

   o  The memory address is checked.  If it has erroneous value, the
      negative response RSP is sent.  At this stage, the correctness of
      parameters of a call may be also checked up.
   o  If the memory address and the parameters of a call have correct
      value, the positive response RSP is sent for the instruction JUMP.
      The transmitting side considers the instruction JUMP executed
      after receiving response.
   o  For response of an execution of the instruction CALL the
      instruction RETURN is sent.  The instruction RETURN may contain
      the returned values.  If there is an exception condition in a
      thread of control created by the CALL instruction, the instruction
      RSP with a non-zero basic return code is sent instead of RETURN.

6.3.2   RETURN

   The instruction "Return of control" (RETURN) is used at return of
   control from the instructions CALL, MVRUN, CALL_BNUM and CALL_BNAME
   (see below).  Those instructions have the following values of fields:

      OPCODE = 147
      OPR_LENGTH = 0 - 65535  ; Depends on length of the immediate data.
      Operands:
         0 - 262140 octets: Immediate data returned from the subroutine.

   If it is not required to send returned value, the instruction RETURN
   does not contain operands. The data format coincides with the
   instruction, for which the response (format VM of the sender or
   addressee) will be sent.



Bogdanov                      Experimental                     [Page 49]

RFC 3018             Unified Memory Space Protocol         December 2000


6.4  Memory Control Instructions

   UMSP gives means for division of memory for a code and for the data.
   The protocol does not make checks of correctness of operations with
   memory.  The code and the data use common address space.  The control
   of memory is completely realized by VM.

6.4.1   MEM_ALLOC

   The instruction "To allocate a memory for the data" (MEM_ALLOC) is
   used for request of the allocation of memory under the data.  The
   instruction has the following values of fields:

      OPCODE = 148
      OPR_LENGTH = 1
      Operands:
         4 octets: The size of required memory in bytes.

   For the positive response on the instruction MEM_ALLOC, the
   instruction ADDRESS, for negative - RSP with the non-zero basic
   return code is sent.  The received address can be used by the
   protocol in the instructions of reading/writing, comparison and
   synchronization.

6.4.2   MVCODE

   The instruction "To move the code" (MVCODE) is used for moving of the
   executable code from one node on another.  The instruction has the
   following values of fields:

      OPCODE = 149
      OPR_LENGTH = 1 - 65535 ; Depends on length of the code field.
      Operands:
         2 octets: The VM type of addressee.
         2 octets: The VM version of addressee.
         0-262136 octets: contains the executable code.
      The extension headers:
         _DATA - contains the executable code.  This header is present
                 only, if the code does not contain in operands.

   The code is always connected with VM of the definite type.  The code
   field is always transparent for the protocol.  It is formed by the VM
   of sender and must contain all the information necessary VM of the
   receiver.  The code must not simultaneously be sent in operands and
   in the extension header.






Bogdanov                      Experimental                     [Page 50]

RFC 3018             Unified Memory Space Protocol         December 2000


   For the positive response on the instruction MVCODE, the instruction
   ADDRESS, for negative - RSP with the non-zero basic return code is
   used.  The code transferred on the instruction MVCODE, may be
   executed by the instruction JUMP or CALL.

6.4.3   ADDRESS

   The instruction "The memory address" (ADDRESS) is used for the
   positive response on the instruction MEM_ALLOC and MVCODE.  ADDRESS
   has the following values of fields:

      OPCODE = 150
      OPR_LENGTH = 1/2/4; Depends on length of the address.
      Operands:
         4/8/16 octets: The address of the allocated memory.

   For the instruction, MEM_ALLOC the address specifies first byte of
   the allocated data area.  For the instruction MVCODE the contents of
   the address is defined VM, by which the code is connected.

6.4.4   FREE

   The memory allocated with the instructions MEM_ALLOC and MVCODE, must
   be explicitly release.  For this purpose, the instruction "To free
   the memory" (FREE) is used.  It has the following values of fields:

      OPCODE = 151
      OPR_LENGTH = 1/2/4; Depends on length of the address
      Operands:
         4/8/16 octets: the address of free memory.

   VM must free this memory automatically at end of the task on the
   node.

6.4.5   MVRUN

   The instruction "To move and run" (MVRUN) is used for simultaneous
   move of a code and its execution.  The instruction has the following
   values of fields:

      OPCODE = 152
      OPR_LENGTH = 1 - 65535 ; Depends on length of the code field.
      Operands:
         2 octets: The addressee VM type.
         2 octets: The addressee VM version.
         4 - 262136 octets: Contains an executable code.





Bogdanov                      Experimental                     [Page 51]

RFC 3018             Unified Memory Space Protocol         December 2000


      The extension headers:
         _DATA - Contains an executable code.  This header is present
                 only, if the code does not contain in operands.

   The executable code is the transparent buffer with the binary data
   for the protocol.  The format of this field is defined by the VM and
   it must contain all the information necessary for the loader VM of
   the addressee, including parameters of a call.

   The code must not simultaneously be sent in operands and in the
   extension header.

   The answer to the instruction MVRUN is formed similarly to
   instruction CALL.  It is not necessary to release memory allocated
   for a code by this instruction.  The memory must deallocate the VM.

6.5  Other Instructions

6.5.1   SYN

   The instruction "To Synchronize" (SYN) is used for the single message
   about the data change.  The instruction has the following values of
   fields:

      OPCODE = 153/154/155 ; For length of the address 4/8/16 octets.
      OPR_LENGTH = 2 - 65535; Depends on length of the data
      Operands:
         4/8/16 octets: The memory address of the tracking data.
         2 - 131068 octets: The initial data.  Length of the data must be
                            multiple of two octets.
         2 - 131068 octets: A mask for comparison.  Length of this field
                            is equal to length of a field of the initial
                            data.

   The tracking data is set by the memory address in the first operand.
   These data are originally compared to the initial data value from the
   second operand.  If the values do not coincide, it is considered,
   that the data have changed.  The third operand allows setting a mask
   for comparison.  Set to one bits of the mask specifies bits in the
   data, which change must be traced.

   The following variants of the answer are probable on the instruction:

   o  If the address of local memory is incorrect, the instruction RSP
      with the non-zero basic return code is sent for the response.
   o  If the data do not change, in the response nothing is sent.
   o  If the data have changed, the instruction DATA with new value of
      the traced data is sent.



Bogdanov                      Experimental                     [Page 52]

RFC 3018             Unified Memory Space Protocol         December 2000


6.5.2   NOP

   The instruction "No operation" (NOP) has the following values of
   fields:

      OPCODE = 156
      OPR_LENGTH = 0 - 65535
      Operands:
         0 - 262140 octets: Encapsulated data.
      Extension headers:
         Any Extension headers.

   The instruction NOP is intended for the decision of the following
   tasks:

   o  Send the control extension headers, when there are no other
      instructions for sending in a session
   o  Encapsulate the fragmented instructions and transactions with the
      established flag of special processing (see section 7).

6.6  Work with Objects

   The protocol has a set of the instructions being expansion of the
   protocol RPC [6].  As against RPC, UMSP allows immediately to address
   memory on remote nodes and to send the pointers in parameters and
   returned values.

   The UMSP object is identified by the 4-octet number.  The values are
   divided into the following ranges:

        I -> %x00000000 - 1FFFFFFF   are assigned for standard objects
       II -> %x20000000 - 3FFFFFFF   are assigned for users objects
      III -> %x30000000 - 4FFFFFFF   free
       IV -> %x50000000 - DFFFFFFF   transient
        V -> %xE0000000 - FFFFFFFF   reserved

   The objects from a range I must be definite, as standard, and the
   specifications of their interfaces must be published.  The protocol
   does not suppose the private or not described interfaces of standard
   objects.

   The objects from a range II must be registered, but the
   specifications of their interfaces may be optional published.  These
   numbers are applied in cases, when it is required to exclude the
   probable conflict of systems of the different manufacturers.






Bogdanov                      Experimental                     [Page 53]

RFC 3018             Unified Memory Space Protocol         December 2000


   The range III can be used freely.  The objects accessible on these
   numbers may be created statically or dynamically.  These objects can
   have any interfaces.

   All objects, concerning ranges I, II and III, is common for all jobs
   on the node, including zero-session.  Their interfaces are accessible
   to all tasks on the node, depending on parameters of authentication.

   The range IV is intended for objects created dynamically within the
   framework of one job.  These objects are the isolated associative
   memory of the job.  The access to these objects must be granted only
   for one job.  The zero-session has no access to these objects.

   The protocol grants the access to the data of object, as to the
   continuous segment of memory.  The memory of objects may be
   overlapping or no overlapping with flat local memory of the node.
   The offset field is used in the instructions of work with the data of
   object.  The offset rules writing are similar to the local address
   rules writing.

   The address memory length of the node, definite for the UMSP
   protocol, limits the maximal data size of one object.  The
   instructions definite in the given section, allow to work with
   associative memory with the theoretical limiting size on one node -
   2^96 (7,9 * 10^28) Byte.

   In addition to the number, the object has the version, 2 octets
   length, and realization, 2 octets length.  The protocol requires
   obligatory compatibility from bottom-up for all realizations of one
   version of object.  The publication of new realization of standard
   object may contain only added interfaces.

   If for the sender of the instruction the version and/or the
   realization of object do not play any role or is unknown, the
   instruction may contain zero fields of the version and realization of
   object or only zero field of realization.  The zero field of the
   version and non-zero field of realization are not allowed.

6.6.1   Reading/Writing of the Objects Data

6.6.1.1  OBJ_REQ_DATA

   The instruction "To request the data of object" (OBJ_REQ_DATA) is
   used for request of data of the Object from the remote node.  The
   instruction has the following values of fields:






Bogdanov                      Experimental                     [Page 54]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 192/193   ; For length of the field of length 2/4 octets.
      OPR_LENGTH = 3/4/5 ; Depends on length of the offset field.
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         2/4 octets: The length of the required data in octets.
         2/4/8 octets: Offset required data from the beginning of object
                       in bytes.

   At length of the length field of 2 octets the offset length must be 2
   octets.  In all other cases, length of the length field and offset
   length must be not less than 4 octets.

   The instruction DATA, containing the required data, is sent for reply
   to instruction OBJ_REQ_DATA.  If the data cannot be transmitted, the
   instruction RSP from the non-zero basic return code comes back.

6.6.1.2  OBJ_WRITE

   The instruction "To write the data in object" (OBJ_WRITE) is used for
   write of the data in object.  The instruction has the following
   values of fields:

      OPCODE = 194/195/196   ; For length of the offset field of 2/4/8
                               octets.
      OPR_LENGTH = 3 - 65535 ; Depends on the data length.
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         2/4/8 octets: The offset in object for the data writes.
         2 - 262128 octets: The immediate data for write.
      The extension headers:
         _DATA - Contains immediate data for write.  This header is
                 present, only if the data is not present in operands.

   At length of the field-offset of 2 octets, length of the data must be
   2 octets.  In all other cases, the offset length must be not less
   than 4 octets and the data length is multiple to four.  The data must
   not simultaneously be sent in operands and in the extension header.

   The instruction RSP is sent in reply to the instructions OBJ_WRITE.
   The zero basic return code defines the normal execution.







Bogdanov                      Experimental                     [Page 55]

RFC 3018             Unified Memory Space Protocol         December 2000


6.6.1.3  OBJ_WRITE_EXT

   The instruction "The extension writing of the data in object"
   (OBJ_WRITE_EXT) is used for write of the data in object.  Length of
   the data may be 1 - 262132 octets with the step 1 octet.  The
   instruction has the following values of fields:

      OPCODE = 197
      OPR_LENGTH = 3 - 65535; Depends on the data length and the address
                              length.
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         1 octet: Always set to 0.
         3 octets: Length written down data in octets.  The zero-value is
                   incorrect.
         4 - 262124 octets: The immediate data for write.  Length of the
                            data is multiple of 4 octets.
         2/4/8 octets: Offset in object for the data write.

   If the length of the written down data is not multiple of four
   octets, the data is padded with 1 - 3 zero octets at the end.

   The instruction RSP is sent in reply to the instructions
   OBJ_WRITE_EXT.  The zero basic return code defines the normal
   execution.

6.6.2  Comparison Instructions of the Objects Data

6.6.2.1  OBJ_DATA_CMP

   The instruction "To compare the data of object" (OBJ_DATA_CMP) is
   used for binary comparison of data of the object by the immediate
   data from operands.  The instruction has the following values of
   fields:

      OPCODE = 198/199/200  ; For length of offset field of 2/4/8
                              octets.
      OPR_LENGTH = 3 - 65535; Depends on length of the data.
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         2/4/8 octets: Offset in object for the compared data.
         2 - 262128 octets: The immediate data for comparison.





Bogdanov                      Experimental                     [Page 56]

RFC 3018             Unified Memory Space Protocol         December 2000


   At length of a field of 2 octets offset the data length must be 2
   octets.  In all other cases the offset length must be not less than 4
   octets and the data length is multiple to 4 octets.

   The response to the instruction OBJ_DATA_CMP is described in section
   6.2.3.

6.6.2.2  OBJ_DATA_CMP_EXT

   The instruction "The extension compare of data of the object"
   (OBJ_DATA_CMP_EXT) is used for binary comparison of data of the
   object by the immediate data from operands.  Length of the data may
   be 1 - 262132 octets with a step 1 octet.  The instruction has
   following values of fields:

      OPCODE = 201
      OPR_LENGTH = 5 - 65535  ; Depends on length of the immediate data
                                and the address length.
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         1 octet: Always set to 0.
         3 octets: The length of compared data in octets.  The zero-value
                   is incorrect.
         4 - 262124 octets: The immediate data for the comparison.  The
                            length of field is multiple of 4 octets.
         4/8 octets: Offset in object for the compared data.

   To make the immediate data multiple of four octets, the data is
   padded with 1 - 3 zero-value octets at the end.

   The response to the instruction OBJ_DATA_CMP_EXT is described in
   section 6.2.3.

6.6.3   Execution of the Objects Procedures

6.6.3.1  CALL_BNUM

   The instruction "To call the object procedure over number"
   (CALL_BNUM) transfers control to the object procedure over indication
   of the number.  The instruction has following values of fields:

      OPCODE = 202/203 ; Accordingly for the instructions not containing
                         and containing the information about VM.
      OPR_LENGTH = 4 - 65535 ; Depends on inclusion of the information
                               about VM and call parameters length.




Bogdanov                      Experimental                     [Page 57]

RFC 3018             Unified Memory Space Protocol         December 2000


      Operands:
         2 octets: The VM type of the sender.  If OPCODE=202 this field
                   is absent.
         2 octets: The VM version of the sender.  If OPCODE=202 this
                   field is absent.
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         4 octets: The number of the called procedure.
         4 - 262128 octets: Parameters of the call.

   The processing on the reception side is made similarly instructions
   CALL (see section 6.3.1).

6.6.3.2  CALL_BNAME

   The instruction "To call the object procedure over name" (CALL_BNAME)
   transfers control to the object procedure over indication of the
   name.  The instruction has following values of fields:

      OPCODE = 204/205  ; Accordingly for the instructions not
                          containing and containing the information
                          about VM.
      OPR_LENGTH = 3 - 65535 ; Depends on inclusion of the information
                               about VM and call parameters length.
      Operands:
         2 octets: The VM type of the sender.  If OPCODE=204 this field
                   is absent.
         2 octets: The VM version of the sender.  If OPCODE=204 this
                   field is absent.
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         4 - 262128 octets: Parameters of the call.
      The extension header:
         _NAME - Contains the name of the called procedure.

   The processing on the reception side is made similarly instructions
   CALL (see section 6.3.1).

   The names may have the procedures of the objects belonging to ranges
   III and IV.  The procedures of the objects belonging to ranges I and
   II must not have a name on the UMSP layer.  They must have the number
   only.







Bogdanov                      Experimental                     [Page 58]

RFC 3018             Unified Memory Space Protocol         December 2000


6.6.3.3  GET_NUM_PROC

   The instruction "To get the name of object procedure" (GET_NUM_PROC)
   allows receiving number of the procedure for objects in ranges III
   and IV over procedure name.  The instruction has following values of
   fields:

      OPCODE = 206
      OPR_LENGTH = 2
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
      The extension header:
         _NAME - Contains procedure name.

   For the positive response on the instruction GET_NUM_PROC, the
   instruction PROC_NUM, for negative - RSP with the non-zero basic
   return code is sent.

6.6.3.4  PROC_NUM

   The instruction "The procedure number" (PROC_NUM) is sent in reply to
   the instruction GET_NUM_PROC.  The instruction PROC_NUM has following
   values of fields:

      OPCODE = 207
      OPR_LENGTH = 3
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.
         4 octets: The number of procedure.

6.6.4   The Objects Creation

   The objects from the ranges I and II (standard and assigned for the
   user) cannot be created on the remote node through the UMSP
   interface.  These objects must be created only through API of the VM.
   The objects from the ranges III and IV can be created on the remote
   node by the protocol instructions.

   The realization of objects from the ranges I - III (not connected
   with the certain job) is difficult enough.  The reason is that the
   different jobs can have the different address spaces of memory.  The
   pointers must be processed in the context of the job, from which they
   are received.  Besides, these objects must trace the end of the jobs




Bogdanov                      Experimental                     [Page 59]

RFC 3018             Unified Memory Space Protocol         December 2000


   for deallocation of dynamic resources.  The specified requirements
   impose essential restrictions on these objects.  The protocol does
   not impose any restrictions on objects from the range IV.

   Unique key identifying object on node, is number of object.  To
   objects from the ranges, III and IV the name may be assigned.  The
   objects from range I and II must not have names on the UMSP layer.
   Within the framework of one task must not be two objects having one
   number or one name.

6.6.4.1  NEW, SYS_NEW

   The format of both instructions "New object" (NEW) and "New system
   object" (NEW_SYS) is similar.  First instruction creates object in
   the range IV, second - in the range III.  These instructions have the
   following values of fields:

      OPCODE = 208/209; Accordingly for NEW/NEW_SYS.
      OPR_LENGTH = 3
      Operands:
         2 octets: The addressee VM type.
         2 octets: The addressee VM version.
         2 octets: The version of object.
         2 octets: The realization of object.
         4 - 262136 octets: Immediate data necessary for creation of
                            object.
      The extension headers:
         _DATA - Contains immediate data, necessary for creation of
                 object.  This header is present, only if the data is not
                 present in operands.
         _NAME - Contains the name of object.  This header is optional.

   The instruction NEW_SYS is used for the creation of object accessible
   from any job, NEW - for creation of object accessible only from its
   job.  If the object is created, the instruction OBJECT is sent for
   the response.  If the object cannot be created, the instruction RSP
   with the non-zero basic return code is sent.

   The immediate data field is transparent for the protocol.  It is
   formed by the sender VM and it must contain the information, which is
   necessary to the addressee VM for the creation of object.  Data must
   not simultaneously be sent in operands and in the extension header.

   The field SESSION_ID of the instruction cannot have the zero value.
   The dynamic object must be created only in the context of the
   definite job.  The object is always created on VM, with which the
   session is connected.




Bogdanov                      Experimental                     [Page 60]

RFC 3018             Unified Memory Space Protocol         December 2000


   The zero values of the version and the realizations of object means,
   that the object have no these values.

   It is possible to register the name of object simultaneously with its
   creation.  The name contains in the _NAME extension header.

   All objects created upon the instructions NEW and NEW_SYS must be
   obviously deleted.  VM must automatically delete all dynamic objects,
   created and not deleted by the task, at the end of the task.

6.6.4.2  OBJECT

   The instruction "The Object" (OBJECT) is used for the positive
   response on the instruction NEW and NEW_SYS.  The instruction OBJECT
   has following values of fields:

      OPCODE = 210
      OPR_LENGTH = 2
      Operands:
         4 octets: The number of object.
         2 octets: The version of object.
         2 octets: The realization of object.

6.6.4.3  DELETE

   The instruction "To delete the object" (DELETE) is used for the
   deleting of object created on the instruction NEW or NEW_SYS.  The
   instruction DELETE has the following values of fields:

      OPCODE = 211
      OPR_LENGTH = 1
      Operands:
         4 octets: number of object

   The object may be deleted only from the job, which has created it.
   The instruction RSP is sent in reply to this instruction.

6.6.5   The Objects Identification

   At registration of object on the node, it may be identify by the
   name, the length of 4 - 254 octets.  The name contains the symbols
   ASCII.  The following versions of the protocol may define other types
   of the name.

   The name identifies with the number of object and is its synonym.
   The names of all active objects in one task on the node must be
   unique.  Thus, all active objects from the range of number I - III




Bogdanov                      Experimental                     [Page 61]

RFC 3018             Unified Memory Space Protocol         December 2000


   must have the unique names for all tasks on the node.  The protocol
   allows receiving the number of object by the name and the name of
   object by the number.

6.6.5.1  OBJ_SEEK

   The instruction "To seek the object" (OBJ_SEEK) is used for seek of
   number of the object by the name.  It has the following values of
   fields:

      OPCODE = 212
      OPR_LENGTH = 0
      The extension header:
         _NAME - contains the name of object for search.

   If the object is found - the instruction OBJECT is sent in the
   answer.  If the object is not found - the instruction RSP with the
   non-zero basic return code is sent for the response.

   The instruction OBJ_SEEK may be sent broadcast through UDP.  In this
   case, it concerns to zero-session.  The instruction may contain the
   field REQ_ID for identification of answers.  The positive responses
   in this case must be sent only.  The response may be transmitted
   through UDP.

6.6.5.2  OBJ_GET_NAME

   The instruction "To get a name of the object" (OBJ_GET_NAME) is used
   for get of the name of object by number.  It has the following values
   of fields:

      OPCODE = 213
      OPR_LENGTH = 1
      Operands:
         4 octets: number of object for getting

   If the object is present - the instruction OBJECT with the extension
   header _NAME is sent for the response.  If the object is not present
   - the instruction RSP with the non-zero basic return code is sent for
   the response.

7  Chains

   The instructions, which will be sent on one session connection, can
   be unified in a chain.  The chain is a group of the instructions
   relational with each other.  In one session, several chains
   simultaneously can be transferred.  The chains can be the following
   types:



Bogdanov                      Experimental                     [Page 62]

RFC 3018             Unified Memory Space Protocol         December 2000


   o  The sequence.
   o  The transaction
   o  The fragmented instruction.

   If the instruction is included into a chain, the flag CHN should be
   equal 1.  The field CHAIN_NUMBER of header contains number of a
   chain, INSTR_NUMBER - serial instruction number in a chain, since 0.
   The numbering of chains is conducted by the protocol.  In one session
   simultaneously can be transferred up to 65533 chains.  Values of
   numbers of chains %x0000 and %xFFFF reserved by the protocol.  One
   chain can contain up to 65535 instructions.

   The instruction with a zero serial number INSTR_NUMBER should contain
   the extension header describing a chain.  Each type of a chain has
   own initiating extension header.

   _END_CHAIN.  The extension header "End of the chain" is transferred
   in last instruction of chain, irrespective of type of the chain.  It
   has the following values of fields:

      HEAD_CODE = 6
      HEAD_LENGTH = 0
      HOB = 1

   Number of a finished chain contains in a field CHAIN_NUMBER of the
   instruction header, to which the extension header is attached.

   The instructions, included in chains, can be transferred through UDP
   only if all chain is located in one segment.

7.1 Sequence

   The sequence is a type of a chain, which unites the instructions
   dependent from each other.  The following instruction of a sequence
   can be executed on VM, only if have been executed previous.  If the
   current instruction cannot be executed, all other instructions of the
   given sequence (already sent or expecting sending) simply cancel.
   Due to this, it is possible for one computing control thread not to
   wait for the current instruction positive end and to transfer
   following at once.

   _BEGIN_SQ.  The extension header "To begin a sequence" is transferred
   in the first instruction of the sequence.  It has the following
   values of fields:

      HEAD_CODE = 3
      HEAD_LENGTH = 0
      HOB = 1



Bogdanov                      Experimental                     [Page 63]

RFC 3018             Unified Memory Space Protocol         December 2000


   Number of created chain is established in field CHAIN_NUMBER of the
   instruction header, to which the extension header is attached.  The
   field INSTR_NUMBER must have value 0.

   The initiator of creation of a sequence is VM.  It is not obligatory
   that the sequence should have known length beforehand.  It can be
   completed in any moment.  If it is necessary to finish a sequence and
   there are no instructions for sending, the instruction NOP can be
   generated.

7.2 Transaction

   The transaction is a type of the chain uniting some possibly not
   connected with each other instructions.  All transaction instructions
   must be executed all at once or must not be executed.  It is possible
   to cancel or to confirm transaction execute.  The transaction
   cancellation after execution is not stipulated.  If it is necessary,
   such mechanism should be realized at VM level, because there can be
   instructions in transaction, which are impossible to cancel, for
   example a control transfer.

   The initiator of transaction creation is VM.  The transaction length
   must be known beforehand.  The length will define a way of
   transaction transfer.  It is connected with buffering described in
   section 7.4.

7.2.1   _BEGIN_TR

   The extension header "To begin a transaction" _BEGIN_TR is
   transferred in the first transaction instruction.  It has the
   following values of fields:

      HEAD_CODE = 4
      HEAD_LENGTH = 1
      HOB = 1
      DATA - Has the following format:

      +---+---+---+---+---+---+---+---+
      |TRE|TRR|TRS|      Reserve      |
      +---+---+---+---+---+---+---+---+
      |           TIME_TR             |
      +---+---+---+---+---+---+---+---+

      TRE

         1 bit.  The flag of obligatory execution.  This flag relates
         only to completely transferred, but have not yet executed
         transaction.  If TRE = 1, the transaction must be executed at



Bogdanov                      Experimental                     [Page 64]

RFC 3018             Unified Memory Space Protocol         December 2000


         the expiration of existence time, established by field TIME_TR,
         or at emergency session end.  If TRE = 0, at end of existence
         time the transaction must be cancelled and the negative
         acknowledgement must be transferred, and at emergency session
         end - must be simply cancelled.

      TRR

         1 bit.  The flag of execution after sending.  If TRR = 1, the
         transaction must be executed after sending of all instructions,
         of which it is consists, at once.  Such transaction is executed
         after reception of the instruction with the extension header
         _END_CHAIN.  If TRR = 0, it is necessary to transfer the
         special instruction EXEC_TR of transaction acknowledgement for
         its execution.

      TRT

         1 bit.  The flag of special processing.  It is entered for a
         possibility of the further expansion of the protocol.  If TRT =
         1, before transaction execution it is necessary to make some
         additional actions above the instructions, of which it is
         consists, for example to decipher.  These actions can be
         definite in the additional extension headers transmitted in the
         transaction instructions.  The given document will not define
         cases of use of this flag.  The value TRT must be zero.

      Reserve

         Must be set to 0.

      TIME_TR

         1 octet.  Time of transaction life in 2 - second intervals
         (maximal lifetime - 8 minutes).  The receiving side begins
         readout of this time after receiving all transaction
         instructions.  The value %x00 sets transaction without
         restriction of lifetime.

   In the last instruction of transaction the header, _END_CHAIN is
   always sent.

7.2.2   EXEC_TR

   This instruction "To execute the transaction" (EXEC_TR) is
   transferred for execution transaction early transferred.  It has the
   following values of fields:




Bogdanov                      Experimental                     [Page 65]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 158
      ASK = 1
      PCK = %b01/10/11
      CHN = 1
      EXT = 0/1
      CHAIN_NUMBER - Contains the number of chain, which is necessary to
                     execute.
      INSTR_NUMBER = 0
      OPR_LENGTH = 0

7.2.3   CANCEL_TR

   The instruction "To cancel transaction" (CANCEL_TR) is transmitted
   for a cancellation of execution transaction transmitted before.  It
   has the following values of fields:

      OPCODE = 159
      ASK = 0
      PCK = %b01/10/11
      CHN = 1
      EXT = 0/1
      CHAIN_NUMBER - Contains the number of chain, which is necessary to
                     cancel.
      INSTR_NUMBER = 0
      OPR_LENGTH = 0

   The instructions, of which the cancelled transaction consists, delete
   without a possibility of restoration.

7.3 Fragmented instruction

   UMSP is designed for work with the transport protocol with the
   limited size of transmitted data segment.  The fragmentation of the
   instructions is made in the following two cases:

   (1)  If the instruction is longer than the maximal segment size of
        transport layer or,
   (2)  If the segment is formed of the several instructions and last
        instruction is not located in it completely.

   The decision on fragmentation is taken to UMSP level.

   The fragmented instruction is encapsulated in several NOP
   instructions.  Then all instructions NOP are transmitted, as one
   chain of special type.  The following algorithm is used during
   encapsulation:





Bogdanov                      Experimental                     [Page 66]

RFC 3018             Unified Memory Space Protocol         December 2000


   (1)  The fields SESSION_ID and REQ_ID from the fragmented instruction
        are written in the first NOP instruction.  If field REQ_ID is
        not present in the initial instruction, it must not be in the
        NOP instruction.  The field SESSION_ID always is present in the
        fragmented instructions.
   (2)  Then these fields delete from the initial instruction.  The
        value of all other fields of the header does not change.
   (3)  After that, the initial instruction is divided into fragments of
        necessary length.  Each fragment is located in a field of
        operands of the NOP instruction.  Other data should not be
        entered in operand field.

   _BEGIN_FRG.  The extension header "The first fragment" is transmitted
   to the NOP instruction, which contains the first fragment.  It has
   the following values of fields:

      HEAD_CODE = 5
      HEAD_LENGTH = 0/2 ; Depends on subordination of the chain.
      HOB = 1
      Data:
         2 octets: Number of the parental chain.  Fragmented instruction
                   may be a part of the sequence or transaction.
         2 octets: The instruction number in the parental chain.

   The header _END_CHAIN is transmitted in NOP instruction, which
   contains last fragment.

7.4 Buffering

   In the given item, the buffering used by the protocol on receiving of
   data is described.  The question of buffering on sending lies beyond
   the scope of the protocol.

   If the instruction is not include in a chain, it is transmitted to VM
   for execution at once and does not require buffering at the protocol
   level.  The interface UMSP - VM must provide asynchronous
   instructions sending.  It is recommended, that the productivity of
   UMSP systems, should allow to process the instructions accepted from
   network, with that speed, with what they were received.  All
   instructions are designed so that carries out the known and limited
   computing loading.  Exception is the instruction of control
   transfers, which must be processed in two stages.  The instruction
   correctness is checked firstly and its scheduling is made.  Then the
   instruction is executed.  At that must be guaranteed that the
   protocol can receive such part of processor time, which would allow
   it to work in stationary mode.  Therefore, the questions of node
   overload are deduced on VM layer and user applications layer, where
   they can be sensible controlled.



Bogdanov                      Experimental                     [Page 67]

RFC 3018             Unified Memory Space Protocol         December 2000


   For chains, the protocol provides two schemes of buffering during the
   receiving:

   (1)  At the session connection establishment, the sides agree about
        the allocated buffer ("window") size.  The window always is more
        than the maximal segment of a transport layer.  The transmitting
        side can expect for this buffer without the preliminary
        coordination with the receiving side.  The window size is
        established single for each session connection, and cannot be
        changed in subsequent.  UMSP is designed for using of transport
        layer, which informs about the data delivery.  Therefore
        transmitting side traces the current free size of the window on
        the reception side for each connection without assistance.  If
        the reception side finds out, that the data have been received,
        which cannot be placed in the window, the connection is broken
        off.

   (2)  For transactions and fragmented instructions, which size exceeds
        the window, it is necessary to request the reception node the
        sanctions to sending.  The theoretical limiting size of chain
        transmitting so is 4 Gbytes.

   REQ_BUF.  The instruction "To request the buffer" requests at VM the
   buffer allocation for sending of transaction or large fragmented
   instruction ("Window").  It has the following values of fields:

      OPCODE = 24
      ASK = 1
      PCK = b01/11
      CHN = 0
      EXT = 0/1
      OPR_LENGTH = 1
      Operands:
         4 octets: The buffer required size in octets.  The value is
                   equal to the total size of all instructions of the
                   chain, including the size of the subordinated chains.

   The instruction is formed under the initiative of the protocol and it
   uses the instruction RSP_P as acknowledgement.  However, on the
   reception side the buffer is allocated at VM level, as VM has the
   most complete information about the task.  The interface between UMSP
   and VM must give possibility of asynchronous request of such buffer.

   The instruction REQ_BUF can be used irrespective of the possibility
   to place the chain in the buffer, allocated for session (window).  It
   is necessary to take into account, that the negative acknowledgement
   can be transmitted on this instruction, but using of a "window"
   guarantees sending.



Bogdanov                      Experimental                     [Page 68]

RFC 3018             Unified Memory Space Protocol         December 2000


   The subordinated chain on reception uses the buffer of the parental
   chain.

   The sequence sending will not require about the buffer allocation in
   difference of transaction or fragmented instruction.  If the single
   connection TCP is used for sending, the sequence buffering is not
   necessary.  If the multiple connections TCP with multiplexing are
   used, the sequence requires buffering for the disorder instructions.
   In this case, it is necessary to use the buffer, allocated for
   session.

   Transactions, at which flag TRR = 0, always must request the sanction
   for sending by instruction REQ_BUF, even if they can be placed in one
   segment of transport layer.

   The buffering of the fragmented instructions and transactions, at
   which flag TRR = 1, depends on their size:

   o  If the transaction is located in one segment of transport layer,
      it is transmitted without buffering.
   o  If length of a chain is no more then "window", it can be
      transmitted without request of the buffer of window allocation.
      Thus, the place in the buffer must be reserved before the sending
      begins.  The sending cannot be begun, if it is not enough places
      in the buffer.  In this case, it is possible to wait the window
      deallocation or to use the request instruction of the buffer
      allocation at VM REQ_BUF.
   o  If length exceeds the session window size it is necessary to use
      the instruction REQ_BUF.

7.5 Acknowledgement of chains

   The field REQ_ID in chains of any type is established only in the
   first instruction and concerns to all chain.  The all following
   instructions, including last, do not contain REQ_ID.

   The transport protocol used for chains sending, must inform about the
   end of data transfer, because it is necessary for the transmitting
   side to know the free size of the allocated session window on the
   reception side.

   If the chain uses the allocated VM buffer (the sanction to sending
   REQ_BUF was requested), or the chain completely locates in transport
   layer segment, the protocol on the transmitting side does not trace
   acknowledgement.






Bogdanov                      Experimental                     [Page 69]

RFC 3018             Unified Memory Space Protocol         December 2000


   If the sequence is transmitted, the transmitting side receives the
   information about free place of the buffer on the reception side by
   acknowledgement of transport layer delivery.  It can be made, as the
   regulated sequence instructions are transmitted VM at once after
   receiving and release the buffer.

   The fragmented instructions and transactions are not transmitted VM
   until its will be completely accepted.  If session window is use, the
   occupation of places in the buffer can be calculated upon
   acknowledgement of transport layer sending.  To trace free of places
   it is necessary to check execution acknowledgement by VM.  The
   following algorithm of sending is used for this purpose:

   o  The value of field REQ_ID, which has given VM for chain sending,
      is kept and it is enters the value established by the protocol
      instead of it
   o  The new value REQ_ID is transmitted in the first instruction of
      chain
   o  The chain completely collected in the session window on the
      reception side.  After linking, it is transmitted for execution on
      VM.  At that, the chain can continue to occupy a place in the
      buffer.
   o  After execution, VM informs about it to the reception side
      protocol.
   o  The protocol clears place in the allocated buffer.
   o  Then the protocol forms and transmits on chain acknowledgement
      RSP_P, instead of RSP, as in other cases.
   o  The transmitting side protocol corrects size of free place in the
      reception side buffer after reception of acknowledgement RSP_P.
   o  Then the old value REQ_ID is restored and the acknowledgement is
      transmitted to VM.

7.6 Base-displacement Addressing

   The memory base address for the relative addressing can be
   established for the instructions from one chain.  Thus, it is
   possible to use the abbreviated address memory fields in the
   instructions of chain.  The abbreviated addresses are used, as
   displacement from base.

   _SET_MBASE.  The extension header "To set memory base" establishes
   the value of base address for chain.  It has the following values of
   fields:

      HEAD_CODE = 7
      HEAD_LENGTH = 2/4/8   ; Depends on address length.
      HOB = 1
      DATA contains:



Bogdanov                      Experimental                     [Page 70]

RFC 3018             Unified Memory Space Protocol         December 2000


         4/8/16 octets: The base address.

   The length of address is 3 octets, enters the name in last octets of
   4-octets data field.  The initial octet is set to 0.  The base-
   displacement addressing is not used for nodes with address length 2
   octets.

   The value of memory base for a sequence may change.  The base must be
   established once in any instruction for all transaction instructions.
   The repeated establishment of transaction base is a mistake, which
   results refusal of transaction execution.

8  Extension Headers

   This section contains the description of the extension headers, which
   are not connected with the definite instruction.  The description of
   the specialized extension headers describes in the appropriate
   sections of this document.

8.1 _ALIGNMENT

   The extension header "Alignment" (_ALIGNMENT) allows to make any
   extension header or field of operands multiple of 4 - 16 octets with
   the step of two octets.  The protocol does not give any rules of use
   given extension header.  It can be used arbitrarily.  The header has
   the following values of fields:

      HEAD_CODE = 8
      HEAD_LENGTH = 1-7 ; Depends on length of the data field.
      HOB = 0
      DATA contains:
         2 - 14 octets: All octets of the field have the zero-value.

   The format of the protocol instructions provides the alignment of two
   octets field without any additional means.

8.2 _MSG

   The extension header "The any message" (_MSG) allows sending the
   textual message in symbols ASCII.  The order of this header
   processing at receiving can be anyone.  The message can be written in
   a log-file, be shown on the console or be ignored.  The header has
   the following values of fields:

      HEAD_CODE = 9
      HEAD_LENGTH = 1 - 127 ; Depends on data length of field.
      HOB = 0
      DATA contains:



Bogdanov                      Experimental                     [Page 71]

RFC 3018             Unified Memory Space Protocol         December 2000


         2 - 254 octets: The any text of the message.

   The instruction may contain several headings _MSG.

8.3 _NAME

   The extension header "The Name" (_NAME) allows specifying the job
   name, name of object or name of object procedure.  The header has the
   following values of fields:

      HEAD_CODE = 10
      HEAD_LENGTH = 1 - 127 ; Depends on length of a field of data.
      HOB = 0
      DATA contains:
         2 - 254 octets: The text of the name in symbols ASCII.

8.4 _DATA

   The extension header "The Data" (_DATA) is used for data transfer in
   the instructions of exchange between VM, if the data cannot be placed
   in operands.  It allows transferring up to 4 Gbytes of data in one
   instruction.  The header has the following values of fields:

      HEAD_CODE = 11
      HEAD_LENGTH = 1 - 2 147 483 647 ; Depends on length of the data
                                        field.
      HOB = 1
      DATA contains:
         2 - 4 294 967 294  octets : Binary data in an any format.

8.5 _LIFE_TIME

   The extension header "The lifetime" (_LIFE_TIME) contains value of
   time.  It has the following values of fields:

      HEAD_CODE = 12
      HEAD_LENGTH = 1/2; Depending on length of data.
      HOB = 1
      DATA contains:
         2/4 octets: The time in 1,024 milliseconds intervals.

   The header _LIFE_TIME allows to set limiting time of sending of the
   instruction to VM of the addressee.








Bogdanov                      Experimental                     [Page 72]

RFC 3018             Unified Memory Space Protocol         December 2000


   The instruction lifetime is calculated as follows:

   o  On the transmitting side the time of waiting in a queue to the
      transport layer is taken into account.  The value of the lifetime
      decreases on the waiting time value now of the transport layer
      package formation.
   o  On the reception side the lifetime is taken into account only for
      the fragmented instructions.  The value of the lifetime decreases
      on time of the instruction assembly value.  This header is ignored
      at receiving for no-fragmented instructions.  Its value must be
      sent to VM.
   o  The time of sending at the transport layer is not taken into
      account.  For the fragmented instructions, only the time of
      sending of the first fragment is not taken into account.

   The end of lifetime at the instruction relating to sequence finishes
   the sequence sending.  The header _LIFE_TIME must not be used at
   transactions sending.

   If the instruction is fragmented, the header _LIFE_TIME is sent only
   in the instruction NOP, containing the first fragment.  This header
   deletes from the initial fragmented instruction.  If the time is
   over, when the fragmented instruction part has not been transmitted
   yet, the stayed part of the instruction is cleared.

   The instruction lifetime is established by the sender VM and must be
   sent together with data to the addressee VM.  If the time of life
   expires, the instruction is rejected and the negative response (if
   ASK = 1) is sent to it.  If ASK = 0, the response is not sent.

   The header _LIFE_TIME may be used in the multimedia systems and in
   the real time systems.  The protocol may raise the priority of
   sending for data with coming to the end lifetime.

9  Search of resources

   Virtual Machines are the identified resources of the protocol.  The
   VM standardization is not function of UMSP.  The protocol gives
   transparent environment for transportation of the code and data of
   any type.

   For VM, connected to the protocol, the following values are
   established:

   o  The VM type.  The range of values 1 - 65534.
   o  The VM version.  The range of values 1 - 65534.





Bogdanov                      Experimental                     [Page 73]

RFC 3018             Unified Memory Space Protocol         December 2000


   The protocol requires obligatory compatibility from bottom-up for VM
   of one type and different numbers of the versions (VM with larger
   number of version must be able to execute the VM code with any
   smaller number of version).

   Numbers of VM types are broken on the following ranges:

     1 - 1023       Assigned for standard VM
     1024 - 49151   Assigned for registered VM of the users
     49152 - 65534  Free (defined for dynamic and/or private VM)

   Numbers of types and versions %x0000 and %xFFFF are reserved by the
   protocol.

   Several VM of different types may be united in a group.  All VM,
   included in a group, must work in the common space of local memory
   and have the common subsystem of the jobs control.  It means, that if
   the same 128-bit address is met in anyone VM code for one task, it
   must specify one physical cell of memory.  The performance of the
   specified conditions allows executing multivendor user code
   (containing procedures for different VM) on one node.  All VM,
   included in a group, must have the different types.  The group can
   include no more than 65534 VM.  One number of group on different
   nodes may identify groups with different structure VM.

   To each group VM on the node the code of group of 2 octets length is
   assigned.  So long as the node has even one session connection, the
   codes of groups must not change.  It is recommended to change the
   code of group only at reconfiguration of the node.  The group VM is
   identified, as well as one VM.  Thus, the type VM is set to 0, and
   the number of group is assigned to VM version.

   The support of association VM in groups is optional requirement of
   the protocol.  The multivendor user code can be executed, even if the
   association in groups is not provided.  For this purpose, the
   procedures containing a different type of a code must be executed on
   different nodes.

   UMSP gives the instructions of search of the VM, which allow
   defining, what VM and the groups VM are connected at the given moment
   to the protocol on the definite node.

   The instructions of search of the VM can be sent upon TCP or UDP.
   The broadcasting dispatch can be used.  The node can independently
   notify about VM, available on it, for example at start, or to respond
   on others VM requests.  The answerback instructions must be sent
   under the same protocol, on which the request was received.




Bogdanov                      Experimental                     [Page 74]

RFC 3018             Unified Memory Space Protocol         December 2000


   VM from ranges of numbers 49152 - 65534 or any group VM may be
   identified on names.  VM with numbers 1 - 49151 must not have names
   at a layer of the instructions UMSP.

9.1 VM_REQ

   The instruction "To request the VM" (VM_REQ) allows finding out VM,
   connected on the remote node.  The instruction has the following
   values of fields:

      OPCODE = 25
      PCK = %b00
      CHN = 0
      ASK = 0/1
      EXT = 0/1
      OPR_LENGTH = 0 - 65534 ; Depending on quantity VM in operands.
      Operands:
         2 octets: The type required VM.  The value 0 is not allowed.
         2 octets: The version required VM.  The value 0 is not allowed.
                   The value %xFFFF requests the most senior version.
         .
         .
         .

         2 octets: The type required VM.
         2 octets: The version required VM.
      The optional extension header:
         _NAME - This header contains the name of required VM or VM
                 group.

   The instruction without operands is used for request of all types VM,
   connected on the node.  The instruction with one VM in operands
   requests the information on one VM.  If it is contained several VM in
   operands, the group VM containing all specified VM is requested.  The
   type and version in list VM must be indexed on increase.

   To request VM, used at work without session connection, the VM type
   and VM version must have the value %xFFFF.

   The header _NAME is not connected with value of operands.  For it,
   the separate answer must be transmitted.

9.2 VM_NOTIF

   The instruction "To notify about VM" (VM_NOTIF) is used for the
   notification of one VM or one VM group attached on the node.  The
   instruction has the following values of fields:




Bogdanov                      Experimental                     [Page 75]

RFC 3018             Unified Memory Space Protocol         December 2000


      OPCODE = 26
      PCK = %b00
      CHN = 0
      ASK = 0/1
      EXT = 0/1
      OPR_LENGTH = 1 - 65534  ; Depending on quantity VM in operands.
      Operands:
         2 octets: The used transport protocol.  The following values of
                   this field are definite:
            x0100 - Single TCP connection through the port 2110.
            x0101 - Multiple TCP connection through the port 2110.
            x0102 - Single TCP connection through ports 2110 and UDP
                    through ports on receiving 2110.
            x0103 - Multiple TCP connection through ports 2110  and UDP
                    through port on receiving 2110.
            The port 2110 must be opened on the one side or both side at
            each TCP connection.
         2 octets: Reserved.  This field must not be analyzed by the
                   protocol during the receiving in the current
                   realization of the protocol.  It must be set to 0 at
                   sending.
         2 octets: The type VM.
         2 octets: The version VM.

         .
         .
         .

         2 octets: The type VM.
         2 octets: The version VM.

      The optional extension header:
         _NAME - This header contains the name by separate VM or group VM
                 from operands of the instruction.

   It is necessary to generate several instructions, if it is required
   to inform about several VM or groups.  It is necessary to form the
   separate instructions for each protocol, if the node provides several
   transport protocols.

   If the instruction is used for the response to VM_REQ request, it can
   contain ASK = 1 and REQ_ID, established in value from the instruction
   of request.  If the VM group was requested, the instruction must
   contain several VM.  First VM must have the type set to 0 and the
   version must contain the number of group.  Others VM must define
   structure of group.  The type and version in VM list must be indexed
   on increase.




Bogdanov                      Experimental                     [Page 76]

RFC 3018             Unified Memory Space Protocol         December 2000


   The protocols, contained in the instruction VM_NOTIF, may differ from
   the protocol, through which this instruction is transferred.

10 Security Considerations

   The present document contains the description of the functions,
   minimally necessary for the realization of the declared task -
   immediate access to memory of the remote node.  To reduce initial
   complexity of the protocol, the decision of safety questions is not
   included in the document.  All reasons of the given unit are the
   recommendations to the further expansion of the protocol.

   For the description three nodes are used - node A and node B are
   exchanges the data.  The node G is JCP.

   Protection against sniffing, spoofing and hijacking:

      (1) The means specifies in TCP/IP can be used.
      (2) There is a possibility to create chains with the special
          processing.  To create such chain, it is necessary to transfer
          the extension header, determining the special processing, in
          the first instruction of the chain.  The instructions of chain
          can be encapsulated in the NOP instructions.  The algorithms
          of the control of instructions sequence integrity or the
          encryption can be realized in such a way.

   Protection against the man-in-the-middle:

      The protection is based on the fact, that the routes between nodes
      A - B, A - G and G - B is not crossed.  Such scheme allows
      organizing the additional managing dataflow, allowing revealing
      such type of attack.  If the specified routes pass through one
      gateway, this protection is less effective.

   Authentication:

      The protocol working is based on a principle of the centralized
      control.  It allows using several schemes of authentication.  The
      parameters of authentication are sent in the extension headers.
      The establishment of session connection can contain up to eight
      handshakes.  It also raises flexibility at a choice of
      authentication algorithm.  The realization of authentication is
      possible between three pairs nodes A - B, A - G and G - B.  All
      pairs can be used in any combination.  The node G can be specially
      allocated for realization of authentication.






Bogdanov                      Experimental                     [Page 77]

RFC 3018             Unified Memory Space Protocol         December 2000


   Protection against denial-of-service:

      The instructions of the protocol have definite computing loading.
      It allows projecting the node so, that it can process the
      instructions with such speed, with what they are accepted from the
      network.  A possible reason of an overload is the instructions
      JUMP and CALL.  VM must solve this problem.  It has the complete
      information about the user task and can make a decision on the
      amount of allocated resources.  The decision of a problem is the
      failure in service for low-priority traffic.

   Protection at the applications architecture level:

      The protocol allows creating the applications of any architecture.
      It is possible due to an asymmetric structure of connection.  It
      is possible to allocate three basic groups:

      (1) The client who is carrying out terminal functions and
          client/server technologies.  The security of such systems is
          completely defined by the server.  Such architecture is
          represented most protected.
      (2) The client, loading an active code from the server.  It is the
          least protected architecture, from the client point of view.
          On the server side, there are no special requirements upon
          protection.
      (3) The client, who is executing his code on the server.  This
          architecture is safe for the client.  It is necessary to
          strengthen the protection on the server.  The functionalities
          of such architecture do not differ from architecture of
          loading by the client of an active code.  If ones take into
          account, that the server is the specially allocated computer,
          the given architecture is optimum.

          All given technologies may be used simultaneously in any
          combination.

11 Used Abbreviations

   API    Application Programming Interface.

   CTID   JCP assigned the Control Task IDentifier to each task of the
          job.  Its length is equal to length of the local address
          memory on the node JCP.








Bogdanov                      Experimental                     [Page 78]

RFC 3018             Unified Memory Space Protocol         December 2000


   GJID   Globally Job IDentifier is assigned for the each job. GJID is
          defined on the JCP node.  It has the same format, as the 128 -
          bit address of node JCP memory has.  The address of local
          memory is replaced on CTID of the first (initial) task of the
          job in it.

   GTID   Globally Task IDentifier is assigned to each task.  GTID has
          the same format, as the 128 - bit address of node memory has.
          The address of local memory is replaced on LTID in it.

   JCP    Job Control Point.  This node will control the job.

   LTID   Locally Task IDentifier is assigned to each active task on the
          node.  LTID length is equal to the local memory address length
          defined for the node.

   VM     Virtual Machine.

12 References

   [1]  Bradner, S., "The Internet Standards Process -- Revision 3", BCP
        9, RFC 2026, October 1996.

   [2]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
        Levels", RFC 2119, March 1997.

   [3]  Crocker, D., and  P. Overell.  "Augmented BNF for Syntax
        Specifications: ABNF", RFC 2234, November 1997.

   [4]  Postel, J., "Transmission Control Protocol - DARPA Internet
        Program Protocol Specification", STD 7, RFC 793, September 1981.

   [5]  Postel, J., "User Datagram Protocol", STD 6, RFC 768, August
        1980.

   [6]  Srinivasan, R., "RPC: Remote Procedure Call Protocol
        Specification Version 2", RFC 1831, August 1995.














Bogdanov                      Experimental                     [Page 79]

RFC 3018             Unified Memory Space Protocol         December 2000


13 Author's Address

   Alexander Y. Bogdanov

   NKO "ORS"
   22, Smolnaya St.
   Moscow, Russia 125445
   RU

   Phone: +7 901 732 9760
   EMail: a_bogdanov@iname.ru








































Bogdanov                      Experimental                     [Page 80]

RFC 3018             Unified Memory Space Protocol         December 2000


14 Full Copyright Statement

   Copyright (C) The Internet Society (2000).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.



















Bogdanov                      Experimental                     [Page 81]