GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


rfc:rfc3018

Network Working Group A. Bogdanov Request for Comments: 3018 NKO "ORS" Category: Experimental December 2000

            Unified Memory Space Protocol Specification

Status of this Memo

 This memo defines an Experimental Protocol for the Internet
 community.  It does not specify an Internet standard of any kind.
 Discussion and suggestions for improvement are requested.
 Distribution of this memo is unlimited.

Copyright Notice

 Copyright (C) The Internet Society (2000).  All Rights Reserved.

Abstract

 This document specifies Unified Memory Space Protocol (UMSP), which
 gives a capability of immediate access to memory of the remote nodes.

Conventions used in this document

 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
 document are to be interpreted as described in RFC-2119 [2].
 The following syntax specification uses the augmented Backus-Naur
 Form (ABNF) as described in RFC-2234 [3].

Table of Contents

 1.  Introduction...................................................4
 2.  The UMSP Model.................................................5
   2.1  128-bit Address Space.......................................5
   2.2  Computing Model.............................................7
   2.3  System Architecture.........................................9
 3.  Instruction Format............................................11
   3.1  Instruction Header.........................................12
   3.2  Extension Headers..........................................15
   3.3  Instruction Operands.......................................17
   3.4  Address Formats............................................17
 4.  Response of the Instructions..................................19
   4.1  RSP, RSP_P.................................................20
   4.2  SND_CANCEL.................................................20
 5.  Jobs Management...............................................21

Bogdanov Experimental [Page 1] RFC 3018 Unified Memory Space Protocol December 2000

   5.1  Job Initiate...............................................23
     5.1.1  CONTROL_REQ............................................24
     5.1.2  CONTROL_CONFIRM........................................25
     5.1.3  CONTROL_REJECT.........................................26
   5.2  Task Initiate..............................................26
     5.2.1  TASK_REG...............................................26
     5.2.2  TASK_CONFIRM...........................................27
     5.2.3  TASK_REJECT............................................28
     5.2.4  TASK_CHK...............................................28
   5.3  Establishment of session connection........................29
     5.3.1  SESSION_OPEN...........................................29
     5.3.2  SESSION_ACCEPT.........................................31
     5.3.3  SESSION_REJECT.........................................31
     5.3.4  Connection Profile.....................................32
   5.4  Session Closing............................................33
     5.4.1  SESSION_CLOSE..........................................34
     5.4.2  SESSION_ABEND..........................................35
   5.5  Task Termination...........................................35
     5.5.1  TASK_TERMINATE.........................................36
     5.5.2  TASK_TERMINATE_INFO....................................36
   5.6  Job Completion.............................................37
     5.6.1  JOB_COMPLETED..........................................37
     5.6.2  JOB_COMPLETED_INFO.....................................38
   5.7  Activity Control of Nodes..................................38
     5.7.1  _INACTION_TIME.........................................39
     5.7.2  STATE_REQ..............................................40
     5.7.3  TASK_STATE.............................................41
     5.7.4  NODE_RELOAD............................................42
   5.8  Work without session connection............................42
 6.  Instructions of Exchange between VM...........................44
   6.1  Data Reading/Writing Instructions..........................45
     6.1.1  REQ_DATA...............................................45
     6.1.2  DATA...................................................46
     6.1.3  WRITE..................................................46
     6.1.4  WRITE_EXT..............................................47
   6.2  Comparison Instructions....................................47
     6.2.1  CMP....................................................47
     6.2.2  CMP_EXT................................................48
     6.2.3  Response to Comparison Instructions....................48
   6.3  Control Transfer Instructions..............................48
     6.3.1  JUMP, CALL.............................................48
     6.3.2  RETURN.................................................49
   6.4  Memory Control Instructions................................50
     6.4.1  MEM_ALLOC..............................................50
     6.4.2  MVCODE.................................................50
     6.4.3  ADDRESS................................................51
     6.4.4  FREE...................................................51
     6.4.5  MVRUN..................................................51

Bogdanov Experimental [Page 2] RFC 3018 Unified Memory Space Protocol December 2000

   6.5  Other Instructions.........................................52
     6.5.1  SYN....................................................52
     6.5.2  NOP....................................................53
   6.6  Work with Objects..........................................53
     6.6.1  Reading/Writing of the Objects Data....................54
       6.6.1.1  OBJ_REQ_DATA.......................................54
       6.6.1.2  OBJ_WRITE..........................................55
       6.6.1.3  OBJ_WRITE_EXT......................................56
     6.6.2  Comparison Instructions of the Objects Data............56
       6.6.2.1  OBJ_DATA_CMP.......................................56
       6.6.2.2  OBJ_DATA_CMP_EXT...................................57
     6.6.3  Execution of the Objects Procedures....................57
       6.6.3.1  CALL_BNUM..........................................57
       6.6.3.2  CALL_BNAME.........................................58
       6.6.3.3  GET_NUM_PROC.......................................59
       6.6.3.4  PROC_NUM...........................................59
     6.6.4  The Objects Creation...................................59
       6.6.4.1  NEW, SYS_NEW.......................................60
       6.6.4.2  OBJECT.............................................61
       6.6.4.3  DELETE.............................................61
     6.6.5  The Objects Identification.............................61
       6.6.5.1  OBJ_SEEK...........................................62
       6.6.5.2  OBJ_GET_NAME.......................................62
 7.  Chains........................................................62
   7.1  Sequence...................................................63
   7.2  Transaction................................................64
     7.2.1  _BEGIN_TR..............................................64
     7.2.2  EXEC_TR................................................65
     7.2.3  CANCEL_TR..............................................66
   7.3  Fragmented instruction.....................................66
   7.4  Buffering..................................................67
   7.5  Acknowledgement of chains..................................69
   7.6  Base-displacement Addressing...............................70
 8.  Extension Headers.............................................71
   8.1  _ALIGNMENT.................................................71
   8.2  _MSG.......................................................71
   8.3  _NAME......................................................72
   8.4  _DATA......................................................72
   8.5  _LIFE_TIME.................................................72
 9.  Search of resources...........................................73
   9.1  VM_REQ.....................................................75
   9.2  VM_NOTIF...................................................75
 10.  Security Consideration.......................................77
 11.  Used Abbreviations...........................................78
 12.  References...................................................79
 13.  Author's Address.............................................80
 14.  Full Copyright Statement.....................................81

Bogdanov Experimental [Page 3] RFC 3018 Unified Memory Space Protocol December 2000

1 Introduction

 UMSP is the network connection-oriented protocol.  It corresponds to
 session and presentation layers of model OSI.  The protocol is
 designed for implementation in a wide class of systems, from simple
 devices based on the dedicated processors, up to universal computers
 and clusters.
 For the data exchange, the protocol uses transport layer service with
 reliable delivery.  It is possible to use not providing reliable
 delivery protocol for the transmission of not requiring
 acknowledgement data.  This document describes use TCP and UDP.
 The creation of network environment for the organization 128-bit
 address space of memory distributed between Internet nodes is the
 basic purpose of the protocol UMSP.  The protocol defines algorithm
 of the connections management and format of network primitives.  It
 doesn't control local memory on the node.
 As against the traditional network protocols, the user applications
 on different nodes interact not by the network primitives exchanging
 or working with the dataflows, but by immediate data reading/write or
 control transfers to the code in virtual memory of the remote node.
 The user's application can know nothing about existence of the
 protocol and network, and simply use the instructions with 128-bit
 addresses.
 Firstly, it is supposed to use UMSP in systems based on the virtual
 machines (VM), executing the pseudo-code.  However, the protocol may
 be used in systems executing a processor code, for example, in
 clusters or in universal operational systems, for the organization of
 the distributed virtual address space.  Besides, the minimal profile
 of the protocol may be used in simple devices, which do not have the
 operational system.
 The protocol gives various means for set the connection parameters
 and allows building systems with a high protection level without
 restriction applications functionalities.
 UMSP can essentially simplify the distributed systems development
 process.  It gives an opportunity to unite not only information, but
 also calculating resources of the large number of polytypic computers
 without significant expenses for the programs standardization and
 development.

Bogdanov Experimental [Page 4] RFC 3018 Unified Memory Space Protocol December 2000

2 The UMSP Model

2.1 128-bit Address Space

 UMSP is based on the 128-bit distributed address memory space model.
 The 128-bit address contains the information about the network type,
 network node address and local memory address.  It has the following
 format:
 Octets
  0      1                                                    16
 +------+--------------+--------------------+----------------+
 |Header|     FREE     |     NODE_ADDR      |    MEM_ADDR    |
 +------+--------------+--------------------+----------------+
 Complete address length is fixed and is equal to 16 octets.
 Header
    1 octet.  Address header field completely defines the address
    format.  The header has the following format:
    Bits
     0     1     2     3     4     5     6     7
    +-----+-----+-----+-----+-----+-----+-----+-----+
    |      ADDR_LENGTH      |  NET_TYPE | ADDR_CODE |
    +-----+-----+-----+-----+-----+-----+-----+-----+
    ADDR_LENGTH
       4 bits.  The length of the network address.  This field
       contains the number of octets in the NODE_ADDR field.  The
       value 0 is not allowed.
    NET_TYPE
       2 bits.  The network type.  This field specifies a type of
       network, in which the node is.
    ADDR_CODE
       2 bits.  The length code of the local memory address.  The
       value of this field specifies the length of the local memory
       address.  The following values of the field and appropriated to
       them length of the field MEM_ADDR are defined:

Bogdanov Experimental [Page 5] RFC 3018 Unified Memory Space Protocol December 2000

          %b00 - 16 bit
          %b01 - 24 bit
          %b10 - 32 bit
          %b11 - 64 bit
    The values combination of the three fields of heading is named
    address format number.  These fields unequivocally define a
    network, in which the node is located.  Format number writes as
    follows:
       N <ADDR_LENGTH> - <NET_TYPE> - <ADDR_CODE>
    For example, N 4-0-2 defines the address with length of the node
    network address 4 octets and memory address with the length 32
    bits.  The network type 0 for such address format is defined for
    the network IPv4 in the presented document.  If the network type
    is equal to zero, it may be missed during the writing of the
    address format number.  For example, format N 4-0-2 and 4-2 are
    equivalent.  If both fields NET_TYPE and ADDR_CODE are set to
    zero, they may be omitted.  Thus, a format number writes as one
    figure.
    One or several address format numbers must be assigned for each
    global network, included in unified system.
 FREE
    0 - 12 octets.  This field is unused by the protocol.  It may
    contain any additional information, which is necessary for the
    control system of the node memory.  If this field is not used, the
    zero value must be set in all octets.  Using of this field results
    that the network instructions must contain only complete 16 -
    octet address and the short address of local memory cannot be
    used.
 NODE_ADDR
    1 - 13 octets.  The node address.  The format of this field is
    defined separately for each address format number.  The field of
    the node address should not necessary precisely correspond to the
    real network address.  If the real network address is longer than
    this field, it is necessary to organize in the network a subset of
    supporting the protocol UMSP addresses.

Bogdanov Experimental [Page 6] RFC 3018 Unified Memory Space Protocol December 2000

 MEM_ADDR
    16/24/32/64 bits.  The address of local memory.  This field is the
    memory address in system, which is set by a field NODE_ADDR.  The
    node completely responds for its memory control.  The protocol
    does not define the order of using and format of this field.
 128-bit address for the user applications is one field.  The user
 code cannot know about a physical arrangement of addressed memory.
 The 128-bit memory address may be transmits between nodes, as the
 data, for example, in the buffer of function parameters, or in the
 instruction of copying the data.  Therefore, it must identify the
 given node from any other nodes unequivocal.
 Any certain algorithm, connecting real network and 128-bit address,
 does not exist.  All used address formats must be known beforehand.
 As UMSP has its own address space, it can unite several global
 networks.  The nodes can have internal local networks or subordinated
 addressable devices connected with the node by the not-network
 communications.  Any node by address format number must have an
 opportunity to define the gateway respond for routing of this
 address.

2.2 Computing Model

 Computing model is three-layer:
    (1) Job
    (2) Task
    (3) Thread of control
 The job corresponds to the user application.  The job is distributed
 and can simultaneously be executed on many nodes.  The job control is
 carried out centralize, from the node named as Job Control Point
 (JCP).  One JCP can control the some jobs.  JCP can be located on the
 same node, on which the job is created, or on any other addressed net
 point.
 The task is the job presentation on the separate node.  The task
 includes one or several computing threads of control.  The job has
 only one task on each node.
 The job is finished, when the appropriate user application is
 finished.  At the end of the job all tasks of this job on all nodes
 are finished.

Bogdanov Experimental [Page 7] RFC 3018 Unified Memory Space Protocol December 2000

 The job has its isolated 128-bit address space.  The address space is
 segmented.  A segment is the local memory of one node.  Besides, the
 protocol allows working with objects.  The objects are separate
 associative memory of the node.
 The task thread represents the concrete control thread, which are
 executed by VM in the certain node.  The thread can read and write to
 any address of 128-bit address space of the job.  The control
 transfer to the address from other (remote) node, results to the
 creation of the new thread on the remote node.  The continuous code
 segment cannot be distributed on several nodes.  In addition, it is
 impossible to receive continuous memory area distributed on several
 nodes.
 The protocol does not demand to support the different tasks of not-
 crossed memory space from the separate VM node.  The supporting of
 multi-thread is not also the obligatory requirement.
 The 128-bit Global Job Identifier (GJID) is defined by protocol.  It
 is assigned on JCP, which will control the job.  All active GJID have
 the unique values in the unified system at each moment of time.
 The job can contain VM code of different types.  Different types VM
 can be situated on one or different nodes.  The mechanism of
 association of different VM types in groups on one node is
 stipulated, so to the non-uniform code can be executed on one node in
 a context of one job.  The groups are described in details in section
 9.  VM, incorporated in groups, must work in common memory space (to
 have a common subsystem of memory control).

Bogdanov Experimental [Page 8] RFC 3018 Unified Memory Space Protocol December 2000

2.3 System Architecture

 System structure, based on using Virtual Machines, is given in the
 following figure:
            Node 1                              Node 2
           --------                            --------
    +--------------------+              +--------------------+
    | User Application 1 |              | User Application 1 |
    +-----------------------+           +-----------------------+
       | User Application N |              | User Application N |
       +--------------------+              +--------------------+
 +-----+  +-----+       +-----+      +-----+  +-----+       +-----+
 | VM1 |  | VM2 | . . . | VMn |      | VM1 |  | VM2 | . . . | VMn |
 +--+--+  +--+--+       +--+--+      +--+--+  +--+--+       +--+--+
    |        |             |            |        |             |
  +--------------------------+        +--------------------------+
  |                          |        |                          |
  | +-----+  U M S P         |        |          U M S P         |
  | | JCP |                  |        |                          |
  | +-----+                  |        +-------------+------------+
  +-------------+------------+                      |
                |                             +-----+-----+
          +-----+-----+                       |    TCP    |
          |    TCP    |                       +-----+-----+
          +-----+-----+                             |
                |                                   |
                +-----------------/                 |
                                 /------------------+
                                /
                                |
                          +-----+-----+
              Node N      |    TCP    |
             --------     +-----+-----+
                                |
                   +------------+------------+
                   | +-----+                 |
                   | | JCP | U M S P         |
                   | +-----+                 |
                   +-------------------------+
       Figure 1. Structure of the system based on use VM.

Bogdanov Experimental [Page 9] RFC 3018 Unified Memory Space Protocol December 2000

 One or several VM are working on upper level for UMSP.  The VM layer
 is not network level.  Last network level is UMSP.  Therefore, VM
 layer has no its own network primitives and uses together with UMSP
 the same field of operation code.
 The end services user of the protocol is the user code, which is
 executed by the virtual machine.  It has the instructions with the
 128-bit address.  VM translates these instructions to network
 commands, which are transmitted through the UMSP protocol for the
 executing by the remote machine.  Internal organization VM, command
 system and API can be anyone.  The protocol defines only format of
 primitives, which the virtual machines exchange through a network.
 The protocol does not control the jobs memory.  Control of memory
 should realize VM.  If a few VM works on one node, they may have the
 common memory space or may be completely isolated.
 UMSP uses the transport layer with reliable delivery for the data
 exchange.  This document defines of using TCP.  For the transfer of
 not requiring acknowledgement data may be used UDP.  Thus, the
 connection through TCP is obligatory.  Use of multiple connections
 TCP with multiplexing is supposed.  The control of transport
 connections is not the part of the UMSP protocol.
 The UMSP instructions do not contain network addresses of the
 receiver and sender.  The protocol requires that one address UMSP
 must correspond to the one transport layer address.  Accordingly, it
 is necessary to define unequivocal the node address on transport
 layer by the 128-bit address of memory.
 Except the TCP, it is possible to use other transport protocols or
 not network communications.  The following requirements are showed to
 them:
    o  Reliable delivery.  The transport layer must inform about
       delivery or its impossibility;
    o  The violation of a sequence of transmitted segments is allowed;
    o  The duplication of segments is not allowed;
    o  At emergency reload of nodes it is necessary to guarantee
       identification of segments concerning session connections,
       assigned up to reload;
    o  Use connectionless-mode is possible.
 VM is the independent program and the interaction with the protocol
 is necessary for it only when it executes the instructions with the
 128-bit address, concerning to other node.  VM can execute several

Bogdanov Experimental [Page 10] RFC 3018 Unified Memory Space Protocol December 2000

 user tasks.  Each task can contain several threads of control.  VM
 must be able to interpret the application instructions with the 128-
 bit address to one or several instructions of the UMSP protocol.
 The session connection opens between nodes for the data exchange.
 One connection is relational only with one job.  There may be several
 session connections for the different jobs simultaneously between two
 nodes.  Besides, the protocol provides the connectionless data
 exchange.
 The exchange between UMSP nodes can include the instructions of the
 following type:
    o  Immediate reading/write in memory;
    o  Requests of allocation/free memory;
    o  Comparison instructions;
    o  Call-subroutine and unconditional jump instructions;
    o  Synchronization instructions;
    o  Work with objects instructions - reading / writing in memory of
       objects and execution of objects procedures.
 UMSP does not trace the user control threads.  VM must provide itself
 the necessary order of performance of the instructions.
 The length of UMSP instructions does not depend on segment length of
 the transport layer.  The segmentation is provided for transfer of
 the long instructions.  The packing of the short instructions in one
 segment with a possibility of compression of headings is used for its
 transfer.  The minimal size of necessary for work segment is 6
 octets.  For realization of all functions, it is necessary 54 octets.

3 Instruction Format

 The UMSP instruction includes the basic header, extension headers and
 operands.  All fields have variable length.
 +----------------+----------------------+------------------------+
 |     Header     |   Extension headers  |       Operands         |
 +----------------+----------------------+------------------------+
 The header contains operation code and the information necessary for
 the instruction interpretation.
 The optional extension headers contain the additional information,
 not defined in basic header.
 The operands contain instructions data.

Bogdanov Experimental [Page 11] RFC 3018 Unified Memory Space Protocol December 2000

 The instruction format allows calculating common instruction length,
 without knowing definition of separate operation code.
 The instructions headers provide for the short and extended format
 for maintenance of the effective protocol work in wide range of
 network speeds.  Besides, there is a simple algorithm of the headers
 compression.
 The all instructions and extension headers the identifiers are given
 which enter the name by upper case symbols.  The identifiers of the
 instructions begin with the letter.  The identifiers of the extension
 headers begin with underlining symbol.

3.1 Instruction Header

 The header has the following format:
  Octets:
     +0                              +1
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 0: |            OPCODE             |ASK|  PCK  |CHN|EXT| OPR_LENGTH|
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 2: |                        OPR_LENGTH_EXT                         |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 4: |                         CHAIN_NUMBER                          |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 6: |                         INSTR_NUMBER                          |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 8: |                                                               |
    +                          SESSION_ID                           +
    |                                                               |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 12:|                                                               |
    +                            REQ_ID                             +
    |                                                               |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 OPCODE
    1 octet.  The operation code.  Value of this field is identified by
    the instruction.  Values of operation codes are divided into the
    following intervals:
           1 - 112  management instructions
         113 - 127  reserved
         128 - 223  instructions of exchange between VM
       0, 224, 255  reserved

Bogdanov Experimental [Page 12] RFC 3018 Unified Memory Space Protocol December 2000

 ASK
    1 bit.  The flag of response necessity.  This flag defines
    presence of field REQ_ID in header.  If ASK = 1, there is field
    REQ_ID in the instruction.  If EXT = 0, the field REQ_ID in the
    instruction are absent.
 PCK
    2 bits.  The Header compression attribute.  These bits are used
    for packing instructions headers transmitted on one connection TCP
    or for sending of the several instructions in one package UDP.
    Use of these bits is based on the assumption that two following in
    succession instructions concern to one session connection, or one
    chain, with a high probability.  The PCK bits have one of the
    following values:
    %b00 - The instruction does not belong to the definite session.
           The fields CHAIN_NUMBER, INSTR_NUMBER and SESSION_ID are
           absent in header of such instruction.
    %b01 - The given instruction concerns to the same session
           connection, as previous.  The field SESSION_ID in the
           instruction header is absent.
    %b10 - The given instruction belongs to the same connection and
           same chain, as previous.  The fields CHAIN_NUMBER,
           INSTR_NUMBER and SESSION_ID in header of such instruction
           are absent.  The INSTR_NUMBER value of the current
           instruction calculates by addition of one to INSTR_NUMBER
           value of the previous instruction.
    %b11 - The given instruction may does not concern to the same
           session, as previous.  The field SESSION_ID is present at
           it.  The presence of fields CHAIN_NUMBER and INSTR_NUMBER
           is defined by CHN flag.
 CHN
    1 bit.  The flag of chain.  Transmitted on one session connection
    and concerning one job instructions, may be unified in a chain.
    Chains are considered in details by section 7.  If SEQ = 1, the
    instruction is connected with chain and there are fields
    CHAIN_NUMBER and INSTR_NUMBER (if PCK is not set to %b10) at it.
    If bit CHN = 0, the instruction is not connected with chains and
    there are no fields CHAIN_NUMBER and INSTR_NUMBER in it.

Bogdanov Experimental [Page 13] RFC 3018 Unified Memory Space Protocol December 2000

 EXT
    1 bit.  The flag of extension headers presence in the instruction.
    If EXT = 1, there is one or more extension headers in the
    instruction.  If EXT = 0, the extension headers in the instruction
    are absent.
 OPR_LENGTH
    3 bits.  The number of 32 bit words in the operands field.  The
    value 0 defines absence of operands field.  The value %b111
    specifies use of the extended header format.  In the extended
    format, the length of operands is defined by the field
    OPR_LENGTH_EXT, and the field OPR_LENGTH is not used.
 OPR_LENGTH_EXT
    2 octets.  The number of 32 bit words in the operands field.  The
    field OPR_LENGTH_EXT is present in header, only if OPR_LENGTH =
    %b111.  If OPR_LENGTH < > %b111, the field OPR_LENGTH_EXT is
    absent.  If OPR_LENGTH_EXT = 0, the field of operands is absent.
    There are following reasons, on which it is necessary to use field
    OPR_LENGTH_EXT instead of OPR_LENGTH:
       (1) If operands length must be more than 24 octets
       (2) If making the fields alignment of 4 octets is more
           effective, than compression of header of 2 octets.
 CHAIN_NUMBER
    2 octets.  The number of chain.  This field contains number of
    chain, to which the given instruction concerns.  The values %x0000
    and %xFFFF are reserved.
 INSTR_NUMBER
    2 octets.  The instruction number.  This field contains the serial
    number of instruction in a chain.  The numbering begins with zero.
    Value %xFFFF is reserved.
 SESSION_ID
    4 octets.  It is the identifier of the session connection assigned
    by the instruction receiver.  During the session connection
    opening, each side sets its own identifier to connection and
    informs it to other side.  The zero value of this field specifies
    that the instruction does not concern to the definite session.
    The value %xFFFFFFFF is reserved.

Bogdanov Experimental [Page 14] RFC 3018 Unified Memory Space Protocol December 2000

 REQ_ID
    4 octets.  The request identifier.  It is uses for establishment
    of correspondence between requests and responds to it.
 Further, the identifier OPR_LENGTH is used at the description of the
 instructions format.  It means using of OPR_LENGTH_EXT field, if
 OPR_LENGTH = %b111.  The instruction with length of operands, which
 are not exceeding 24 octets, may be transmitted with header in the
 short format (OPR_LENGTH < > %b111) or in the extended format
 (OPR_LENGTH = %b111).  Both forms are equivalent.
 Minimal header length in the short format is 2 octets, in the
 extended format - 4 octets.  Maximal header length is 16 octets.

3.2 Extension Headers

 If the EXT flag in the instruction header set to 1, the instruction
 contains from one up to thirty extension headers.  The extension
 headers are used for the following purposes:
 o  For sending of the service information which were not provided in
    the basic header.
 o  For sending of the data of length more than 262240 octets in one
    instruction.
 The extension headers have the following common format:
 Octets:
     +0                              +1
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 0: |HXT|       HEAD_LENGTH         |       HEAD_LENGTH_EXT         |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 2: |                   continued HEAD_LENGTH_EXT                   |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 4: |HSL|HOB|HRZ|     HEAD_CODE     |         HEAD_CODE_EXT         |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 6: |                           RESERVED                            |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
 8: |                                                               |
    /                             DATA                              /
    /                                                               /
    |                                                               |
    +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+

Bogdanov Experimental [Page 15] RFC 3018 Unified Memory Space Protocol December 2000

 HXT
    1 bit.  Specify length of the field of data length.  If HXT = 0,
    length of the extension header is defined by a field HEAD_LENGTH.
    The field HEAD_LENGTH_EXT in this case is absent.  If HXT = 1,
    length of header is defined by unification of fields HEAD_LENGTH
    and HEAD_LENGTH_EXT.
 HEAD_LENGTH
    7 bit.  The number of 16 bit words in DATA field.  If HXT = 0,
    this is independent field.  If HXT = 1, it is the senior bits of
    complete length field.
 HEAD_LENGTH_EXT
    3 octets.  The number of 16 bit words in DATA field.  If HXT = 0,
    this field is absent.  If HXT = 1, it is the younger bits of
    complete length field.
 HSL
    1 bit.  The flag of last header.  It is set to 1 for last
    extension header in the instruction.  In other extension headers,
    this flag is set to 0.
 HOB
    1 bit.  The flag of obligatory processing.  It defines the order
    of the instruction processing, if the receiving node does not know
    purpose of the extension header or cannot process it by any
    reason.  If HOB = 1, instruction must not be carried out.  If HOB
    = 0, it does not influence on the instruction processing.  The
    protocol must process all extension headers, irrespective of
    errors presence.
 HRZ
    1 bit.  The field is reserved for the future expansions.  This
    field must not be analyzed by the protocol on receiving.  It must
    be set to 0 at sending.
 HEAD_CODE
    5 bits.  If HXT = 0, the field contains the extension header code.
    If HXT = 1, this field joins the field HEAD_CODE_EXT.  It is the
    senior bits of the header code.

Bogdanov Experimental [Page 16] RFC 3018 Unified Memory Space Protocol December 2000

 HEAD_CODE_EXT
    1 octet.  If HXT = 0, this field is absent.  If HXT = 1, it is the
    younger bits of the header code.
 RESERVED
    2 octets.  If HXT = 0, this field is absent.  If HXT = 1, this
    field is reserved for further use.  The field RESERVED must not be
    analyzed by the protocol during the receiving in the current
    realization of the protocol.  It must be set to 0 at sending.
 DATA
    The data field of the extension header.  If HXT = 0, the length of
    field is 0 - 254 octets, if HXT = 1, the length is 0 - 4 * 10^9
    octets.  The format of this field is defined separately for each
    value of the header code.
 On the receiving side, the extension headers must be processed in
 that order, in what they follow in the instruction.  If the
 instruction contains more than 30 extension headers, it is considered
 erroneous.  It is necessary to break off the session connection, on
 which it was transmitted, after the reception of such instruction.
 The identifiers HEAD_LENGTH and HEAD_CODE are used further in the
 text at the description of the extended headers format.  It assumes
 using of fields HEAD_LENGTH + HEAD_LENGTH_EXT and HEAD_CODE +
 HEAD_CODE_EXT, if HXT = 1.  The headers with the code 0 - 30 can be
 sent in short (HXT = 0) and in extended (HXT = 1) format.

3.3 Instruction Operands

 The operands field contains the instruction data.  The length of
 operands field is showed in OPR_LENGTH or OPR_LENGTH_EXT and it is
 multiple to four octets.  If necessary, 1 - 3 zero-value octets are
 padded in the end of a field.  Maximal length of operands is 262140
 octets.  The extension headers are used, if the instruction must
 contain longer data.
 The format of the operands field is defined separately for each
 instruction.

3.4 Address Formats

 The following address format numbers are definite for nodes,
 immediately connected to the global IPv4 network:

Bogdanov Experimental [Page 17] RFC 3018 Unified Memory Space Protocol December 2000

    N 4-0-0 (4)
    N 4-0-1 (4-1)
    N 4-0-2 (4-2)
 The appropriate formats of 128-bit addresses:
 Octets:
    +0              +1              +2              +3
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 0: |0 1 0 0|0 0|0 0|                   Free                        |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 4: |                              Free                             |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 8: |            Free               |           IP address          |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 12:|           IP address          |      Local memory address     |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 0: |0 1 0 0|0 0|0 1|                   Free                        |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 4: |                              Free                             |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 8: |     Free      |                  IP address                   |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 12:|   IP address  |             Local memory address              |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 0: |0 1 0 0|0 0|1 0|                   Free                        |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 4: |                            Free                               |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 8: |                         IP address                            |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 12:|                     Local memory address                      |
    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 Free
    It is not used by the protocol.
 IP address
    It sets the node address in the global IPv4 network.

Bogdanov Experimental [Page 18] RFC 3018 Unified Memory Space Protocol December 2000

 Local memory address
    It is described in section 2.1.
 IP-address defines the nodes of the given type unequivocally.  The
 TCP is used for the interaction with such nodes.  For sending of not
 requiring response instructions, using UDP is allowed.  IANA has
 assigned ports TCP and UDP 2110.  This port must be open for the
 listening (receiving).  TCP node, initialing the connection opening,
 or the UDP node, carrying out the package sending, can use any port.
 Using several TCP connections with multiplexing is supposed.

4 Response of the Instructions

 The protocol instructions are divided into two types:
    (1)  The management instructions transmitted on UMSP layer (OPCODE
         = 1 - 112).
    (2)  The instructions of the exchange between VM (OPCODE = 128 -
         223).
 The processing of two types of the instructions differs as follows:
 o  The field of the identifier of request REQ_ID is formed by the
    protocol in the instructions of the first type, and it is formed
    by VM for the instructions of the second type.
 o  The protocol must analyze the field REQ_ID and compare it with the
    instructions, transmitted earlier, after receiving of the response
    instruction of the first type.
 o  The protocol must not analyze the field REQ_ID after receiving of
    the response instruction of the second type.  This instruction is
    simply sent to VM.
 The response instructions have the field ASK equal to 1.  It means,
 that the header have the field REQ_ID.  The value taken from the
 confirmed instruction is written into the field REQ_ID.  The response
 instruction does not require response.
 A few VM can be connected to the protocol on the node.  Everyone VM
 can work in its own address space.  The identifiers of requests for
 different VM can coincide.  Therefore, instruction is identified by
 two fields:
 o  The session identifier SESSION_ID, which is connected with
    definite VM.
 o  The request identifier REQ_ID.

Bogdanov Experimental [Page 19] RFC 3018 Unified Memory Space Protocol December 2000

4.1 RSP, RSP_P

 "Response" (RSP) and "Response of the protocol" (RSP_P) instructions
 have the identical format.  The difference is only in the operation
 code:
    OPCODE = 129/1  ; correspondingly to RSP/RSP_P
    ASK = 1
    PCK = %b01/11
    EXT = 0/1
    CHN = 0
    OPR_LENGTH = 0/1
    SESSION_ID and REQ_ID - The values is taken from the confirmed
                            instruction.
    Operands:
       2 octets: The basic return code.
       2 octets: The additional return code.
    The optional extension header:
       _MSG - contains the arbitrary error description.
 The instruction without operands is used for the positive response.
 It is equivalent to zero values of the field of the basic and
 additional return codes.
 The zero basic return code is used for positive response.  The
 additional return code may have non-zero value.
 The instruction with non-zero basic return code is used for negative
 response.  The basic return code defines the error category.  The
 additional return code identifies an error.
 The instruction RSP is formed upon the VM request.  The return codes
 must be received from VM.  If the protocol cannot deliver the
 requiring response instruction to VM, it forms negative response RSP
 independently.
 The instruction RSP_P is always formed at the UMSP layer.  If the
 protocol cannot define on what instruction the RSP_P is transmitted,
 nothing actions is executed.

4.2 SND_CANCEL

 There can be a necessity to cancel sending after the part of the data
 have been already transmitted and have occupied the buffer on the
 reception side, by sending of the long fragmented instructions or
 transactions.  The protocol provides the instruction "The sending is
 canceled" (SND_CANCEL) for this purpose.  This instruction has the
 following fields value:

Bogdanov Experimental [Page 20] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 2
    ASK = 0
    PCK = %b01/10/11
    EXT = 0/1
    CHN = 1
    OPR_LENGTH = 1
    SESSION_ID - The value is taken from the cancelled chain.
    CHAIN_NUMBER - Number of the chain, which sending is cancelled.
    INSTR_NUMBER - Always has zero-value.
    Operands:
       2 octets: The basic return code.
       2 octets: The additional return code.
    The optional extension header:
       _MSG - contains the arbitrary error description.
 The instruction SND_CANCEL is used for the cancel of the partially
 transmitted transaction or fragmented instruction.  At the receiving
 the SND_CANCEL instruction, all the earlier received data in the
 chain are rejected.

5 Jobs Management

 The jobs management includes the following functions:
 o  Initiation and completion of jobs;
 o  Initiation and completion of tasks;
 o  Opening and closing of session connections;
 o  Activity control of nodes.
 The instructions with OPCODE = 1 - 112 are used for jobs management.
 These instructions must be sent through TCP.  Use UDP is not allowed,
 even if the instructions do not demand response.
 UMSP bases on model with the centralized control of the separate job.
 The reason is that the pointers control is not obviously possible in
 the decentralized system.  Any task can be finished at any moment or
 the node can be reloaded.  There is no way guaranteeing the
 notification about in the decentralized system all other nodes, on
 which the job works.  As the job continues to exist - the task
 concerning the job can be initiated on the same node again.  This
 task can allocate new dynamic resources.  The addresses for the again
 allocated resources can be crossed with addresses of resources, which
 existed on the node before the task restart.  The old pointers can be
 kept on other nodes.  It may be the formally correct pointers, but
 they will actually specify other objects.  The uncontrollable work of
 the application can be consequence of such situation.

Bogdanov Experimental [Page 21] RFC 3018 Unified Memory Space Protocol December 2000

 UMSP solves this task as follows:
 o  It allows defining the node, on which the task was completed,
    precisely.
 o  If the task on the node is finished before end of the job, all
    nodes, on which the job is executed, are notified of it.
 o  The repeated task initialization on the node is allowed, while all
    nodes will receive the message about the first task end.
 The protocol does not control the pointers.  VM supervises the
 pointers correctness.  VM must have architecture, in which 128 - bit
 pointers are stored in special memory areas, for this purpose.  The
 protocol informs VM about the nodes, on which task have finished the
 work.  VM must make all pointers concerning such tasks, invalid.  It
 results in exclusive situations at the access under these pointers.
 If the application provides processing exceptions, it keeps the
 capacity for work, or it is finished emergency.  Such decision allows
 excluding unguided applications working.
 For the decision of the specified questions at UMSP level, the
 control job node is defined for each job.  It names Job Control Point
 (JCP).  It may be the same node, on which the job is initiated, or it
 can be another dedicated node.  The basic JCP function is to trace
 the initialization and the end of the job tasks.  Besides, the
 dedicated JCP node may be used for the centralized users
 identification and the attack protection.
 The following identifiers are definite for the jobs and tasks
 control:
 o  Locally Task Identifier (LTID) is assigned to each active task on
    the node.  LTID length is equal to the length of local memory
    address defined for the node.  All LTID on the node must give
    unique values at each moment of time.  It is allowed to establish
    LTID, used earlier in the already completed tasks, for the again
    initiated tasks.
 o  JCP assigned the Control Task Identifier (CTID) to each task of
    the job.  Its length is equal to length of the local address
    memory on the node JCP.  All CTID on the JCP must give unique
    values at each moment of time.  As against LTID, the CTID value is
    chosen with some restrictions.
 o  Globally Task Identifier (GTID) is assigned to each task.  GTID
    has the same format, as the 128 - bit address of node memory has.
    The address of local memory is replaced on LTID in it.
 o  Globally Job Identifier (GJID) is assigned to the each job.  GJID
    is defined on the JCP node.  It has the same format, as the 128 -
    bit address of node JCP memory has.  The address of local memory

Bogdanov Experimental [Page 22] RFC 3018 Unified Memory Space Protocol December 2000

    is replaced on CTID of the first (initial) task of the job in it.
    GJID is used in the procedure of session connection opening for
    the definition JCP, which controls the job.
 LTID and CTID are written at the instructions in the field of length
 2/4/8 octets.  If the allocated for identifier field in the
 instruction is longer than identifier, LTID (CTID) writes in the last
 octets.  In the initial octets, the value 0 must be written.  If
 received LTID (CTID) is shorter than the local memory address, it is
 necessary to pad it with the zero octets in the beginning.
 GTID and GJID are written at the instructions in the field of length
 4-16 octets.  The field FREE is not present at these identifiers (see
 section 2.1).  It is considered, that it contains the zero-value
 octets.  Length of the identifier is defined in header of the
 address.
 By sending of instructions CONTROL_REQ, TASK_REG and SESSION_OPEN,
 the protocol uses timeout.  The value of timeout is assigned by node
 and must be more than three intervals of the maximal time of delivery
 at the transport layer.  The timeout is not influenced the waiting
 period in queue to the transport layer.

5.1 Job Initiate

 The job concerns to the user application executed on VM.  The UMSP
 job initialization can be made simultaneously with the application
 user start or during its working.
 The task, appropriated to its job, is initialized on the node
 together with the job.  LTID is binding to this task.
 If the node, on which the user application was loaded, is chosen for
 JCP, the question of the job initialization lays beyond the scope of
 the network protocol.
 Other node can be chosen as JCP for the following reasons:
 o  The job initialization node is connected to network by slow-speed
    or overloaded channel.  It is undesirable to send the managing
    traffic.
 o  The node has no computing possibilities for conducting the
    managing tables.
 o  The authentication on the detailed node is necessary.
 If the other node is chosen for JCP, the node, that initiates the
 job, must register the job at JCP.

Bogdanov Experimental [Page 23] RFC 3018 Unified Memory Space Protocol December 2000

5.1.1 CONTROL_REQ

 The instruction "To request a control" (CONTROL_REQ) is sending from
 the node, initial the job, to JCP of other node.  The instruction has
 the following values of fields:
    OPCODE = 3
    PCK = %b00
    CHN = 0
    ASK = 1
    EXT = 0/1
    OPR_LENGTH = 2/3  ; Depends on LTID length.
    REQ_ID - The value is assigned by the sender node protocol and
             then will be sent in the response.
    Operands:
       4 octets: The control parameters profile.  This field has the
                 following format:
          bits
           0     1     2     3     4     5     6     7
          +-----+-----+-----+-----+-----+-----+-----+-----+
          |                                               |
          +                 JOB_LIFE_TIME                 +
          |                                               |
          +-----+-----+-----+-----+-----+-----+-----+-----+
          | CMT |    Reserved     |        VERSION        |
          +-----+-----+-----+-----+-----+-----+-----+-----+
          |                   Reserved                    |
          +-----+-----+-----+-----+-----+-----+-----+-----+
          JOB_LIFE_TIME
             2 octets.  The job lifetime in seconds.  The zero-value
             signifies that the restriction of the job lifetime is
             unused.
          CMT
             1 bit.  The flag of several JCP using.  This field is
             reserved for the future expansion of the protocol.
          VERSION
             1 octet.  The number of the UMSP version.  It must
             contain the value 1.

Bogdanov Experimental [Page 24] RFC 3018 Unified Memory Space Protocol December 2000

          Reserved
             3 + 8 bits.  All bits must be set to 0.
       4/8 octet: LTID of task of the job, assigned on the node, which
                  initiate the job (by the sender of this
                  instruction).
    The optional extension headers:
       _JOB_NAME  -  This header contains the name of the Job.  Is
                     assigned once and must not change further.
       _INACT_TIME - This header contains the inaction time (see
                     section 5.7).
 At reception of the CONTROL_REQ instruction JCP checks the LTID value
 from the received instruction and makes the following:
 (1) If the node, which has sent CONTROL_REQ, already has registered
     on JCP the active job with such LTID, the notification about
     abnormality end of the registered job is sent, as is described in
     section 5.5.2 (it is considered, that the node was reloaded).
     After that, the sanction to an initiation of the new job is sent.
 (2) If the node has no registered job with received LTID, it allows
     the new job initiation at once.
 If JCP confirms the control, it will send the instruction
 CONTROL_CONFIRM, or else CONTROL_REJECT.

5.1.2 CONTROL_CONFIRM

 The instruction "To confirm the control" (CONTROL_CONFIRM) is sent
 from JCP as the positive response to CONTROL_REQ instruction.
 CONTROL_CONFIRM has the following values of fields:
    OPCODE = 4
    PCK = %b00
    CHN = 0
    ASK = 1 ; The instruction does not need to be responded.  This flag
              specifies presence of the REQ_ID field.
    EXT = 0/1
    OPR_LENGTH = 1-4 ; Depends of length of the GJID.
    REQ_ID - The value is taken from the instruction CONTROL_REQ
    Operands:
       4-16 octets: The GJID assigned to the job on the JCP.
 The sending of the instruction CONTROL_REQ means request of control
 and request of task initiation.  Assigned to the task CTID is part
 GJID (field of the local memory address).

Bogdanov Experimental [Page 25] RFC 3018 Unified Memory Space Protocol December 2000

5.1.3 CONTROL_REJECT

 The instruction "To reject the control" (CONTROL_REJECT) is sent from
 JCP as the negative response to CONTROL_REQ instruction.
 CONTROL_REJECT has the following values of fields:
    OPCODE = 4
    PCK = %b00
    CHN = 0
    ASK = 1.  The instruction does not need to be responded.  This flag
              specifies presence of the REQ_ID field.
    EXT = 0/1
    OPR_LENGTH = 1/2 ; Depends on presence of the control parameters
                       profile field.
    REQ_ID - The value is taken from the instruction CONTROL_REQ
    Operands:
       2 octets: The basic error code.  The zero-value is not
                 available.
       2 octets: The additional error code.
       4 octets: The control parameters profile (see section 5.1.1),
                 that is allowed by JCP.  This is optional field.
    The optional extension headers:
       _INACT_TIME - This header contains the inaction time (see
                     section 5.7).
       _MSG - contains the arbitrary error description.

5.2 Task Initiate

 The job is executed on several nodes simultaneously.  The task,
 appropriate to it, must be initialized on each node.  There is
 corresponding only one task to one job on the node.  Each task must
 be connected only with one job.
 The task is initiated together with the job on the node, which had
 created the job.  On the other nodes, the task is initiated during
 the receiving of the first request on the opening of the session
 connection, which is appropriate to the job.  The request about
 openings of session connection contains GJID.  GJID contains the JCP
 address.  It is necessary to receive the sanction from JCP for the
 task start.  If the request about the opening of session has been
 received from JCP node, it is not necessary to request the sanction.

5.2.1 TASK_REG

 The instruction "To register a task" (TASK_REG) is sent from the
 node, which initials the task, to JCP of the remote node.  The
 instruction has the following values of fields:

Bogdanov Experimental [Page 26] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 6/7/8 ; For length CTID of 2/4/8 octets.
    PCK = %b00
    CHN = 0
    ASK = 1
    EXT = 0/1
    OPR_LENGTH = 2-8  ; Depends on length of the GTID and LTID.
    REQ_ID - The value is assigned by the sender node protocol and
             then will be sent in the response.
    Operands:
       2/4/8 octets: CTID of the task initiated the job.  It CTID is a
                     part GJID from the instruction SESSION_OPEN.
       4-16 octets: GTID, assigned on the node, initialed session
                    connection.  GTID is formed of sender addresses (at
                    transport layer) and field LTID of the instruction
                    SESSION_OPEN.
       2/4/8 octets:  LTID, assigned on the node, initialed the task
                      (by the sender of this instruction).
    The optional extension headers:
       _INACT_TIME - This header contains the inaction time (see
                     section 5.7).
 The instruction TASK_REG must be sent only if the task with given
 GJID was not initiated on the node.
 JCP confirms initiation of a task at observance of the following
 conditions:
 (1) Task with received GTID already has registered on JCP.
 (2) Task with LTID for the node requesting for initiation has not
     registered.
 In all other cases, JCP will not confirm a task.
 If JCP confirms the task, it will send the instruction TASK_CONFIRM,
 differently TASK_REJECT.

5.2.2 TASK_CONFIRM

 The instruction "To confirm the task" (TASK_CONFIRM) is sent from JCP
 as the positive response to TASK_REG.  TASK_CONFIRM has the following
 values of fields:
    OPCODE = 9
    PCK = %b00
    CHN = 0
    ASK = 1.  The instruction does not need to be responded.  This flag
              specifies the field REQ_ID presence.
    EXT = 0/1

Bogdanov Experimental [Page 27] RFC 3018 Unified Memory Space Protocol December 2000

    OPR_LENGTH = 1/2  ; Depends on length of the CTID.
    REQ_ID - The value is taken from the instruction TASK_REG.
    Operands:
       4/8 octets: The CTID assigned to the task on the JCP.
    The optional extension headers:
       _JOB_NAME - This header contains the name of the Job.

5.2.3 TASK_REJECT

 The instruction "To reject the task" (TASK_REJECT) is sent from JCP
 as the negative response to TASK_REG instruction.  TASK_REJECT has
 the following values of fields:
    OPCODE = 10
    PCK = %b00
    CHN = 0
    ASK = 1.  The instruction does not need to be responded.  This flag
              specifies presence of the REQ_ID field.
    EXT = 0/1
    OPR_LENGTH = 1
    REQ_ID - The value is taken from the instruction CONTROL_REQ
    Operands:
       2 octets: The basic error code.  The zero-value is not
                 available.
       2 octets: The additional error code.
    The optional extension headers:
       _INACT_TIME - This header contains the inaction time (see
                     section 5.7).
       _MSG - contains the arbitrary error description.

5.2.4 TASK_CHK

 With the purposes of a safety the node, which have received request
 about the opening of session connection, may check up at JCP the
 node, which has initialed connection, even if the task was already
 initiated.
 The instruction "To check up the task" (TASK_CHK) is sent from the
 node, which has received the instruction of the establishment of
 session connection SESSION_OPEN, to JCP.  The task with given GJID,
 must have existed on the node already.  The instruction TASK_CHK
 format coincides with TASK_REG.  OPCODE = 11.  The response to the
 instruction TASK_CHK JCP forms instructions TASK_REG similarly.
 JCP confirms the instruction TASK_CHK if a task with received GTID
 and LTID already has registered on JCP.
 The sending of the TASK_CHK is optional.

Bogdanov Experimental [Page 28] RFC 3018 Unified Memory Space Protocol December 2000

5.3 Establishment of session connection

 The session connection is established between two tasks of one job.
 The connection is established under the VM initiative and it is used
 for the exchange of the instructions between VM.
 One session connection must be connected only with one task on the
 node.  The task may have several connections with different nodes.
 Between two nodes must be only one session connection with one GJID.
 The request about the establishment of session connection contains
 the global identifier of the job GJID.  If the node receives the
 request about the establishment of connection with GJID, which is not
 presented on the given node, VM must create a new task.  If the task
 has been already initialized, the new task is not created.
 The session connection needs to be established over TCP.  After the
 connection is established, the sending of the instructions, which are
 not require of execution response, is possible through UDP.  One TCP
 connection may be used by several session connections.  One session
 connection may use several TCP connections.
 The protocol allows working without the establishment of session
 connection.  The node must have VM by default, which must execute the
 instructions without the establishment of connection.
 At the establishment of session connection, the sides agree about the
 used VM type and the subset of the protocol functions.  The session
 connection UMSP may be asymmetrical.  It means, that two sides of one
 connection can be connected with VM of the different type and provide
 the different subset of the protocol functions.
 If at an establishment of session connection the zero-type VM is
 used, it specifies group VM (see section 9).  The zero-value of
 realization VM is not allowed.
 The procedure of the establishment of session connection may contain
 from 2-way up to 8-way handshakes.

5.3.1 SESSION_OPEN

 The instruction "To open a session" (SESSION_OPEN) is used for the
 initiation of session connection and for the specification of
 connection parameters during handshake.  It has the following values
 of fields:

Bogdanov Experimental [Page 29] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 12
    PCK = %b00/11.  In the first instruction (initial) the value of
                     this field is set to %b00.  In all subsequent -
                     %b11.
    CHN = 0
    ASK = 1
    EXT = 0/1
    OPR_LENGTH = 6 - 10 ; Depends on length GJID and LTID.
    SESSION_ID - In the first instruction this field is absent.  In all
                 subsequent, it contains the identifier of sessions,
                 assigned by the instruction receiver.
    REQ_ID - This field contains the session connection identifier,
             assigned by the instruction sender.
    Operands:
       2 octets: The VM type required from the addressee.
       2 octets: The VM version required from the addressee.
       4 octets: The profile of connection required from the
                 instruction addressee.
       2 octets: The VM type of the sender.
       2 octets: The VM version of the sender.
       4 octets: The profile of connection given by the instruction
                 sender.
       2 octets: The number of 256 octet blocks in the buffer,
                 allocated for session ("window"), on the side of the
                 sender of this instruction (see section 7.4).  The
                 zero-value specifies absence of the buffer.
       4-16 octets: GJID.
       4/8 octets: LTID of the sender task, assigned on the node -
                   sender of the instruction.  It is used in the
                   instruction TASK_REG (as a part of the field GTID).
 If the VM type and version, required from the addressee, have the
 value 0, the receiving node independently chooses the VM type and
 reports it in the response.  The establishment of connection without
 binding to VM or VM group is not allowed.
 Totally, it can be transmitted up to 7 instructions SESSION_OPEN at
 the establishment of connection.  The instruction SESSION_ACCEPT is
 used for the response of the establishment of connection.  For the
 refusal of connection the instruction, SESSION_REJECT is used.
 It is possible to refuse connection on any step.  It is necessary
 either to confirm connections, or to refuse it on the eighth step.
 During the establishment of connection the following parameters may
 be changed:

Bogdanov Experimental [Page 30] RFC 3018 Unified Memory Space Protocol December 2000

 o  VM type and VM version;
 o  profiles of connection.
 If the repeated request about opening of session connection is
 received from the definite node, while one connection with received
 GJID have been already established, the following variants are
 possible:
 (1) If the request has arrived from the node JCP, it is necessary:
     o  To finish the existing task emergency and to deallocate all
        dynamic resources belong to it.
     o  To initiates a task without request of the JCP sanction again.
     o  To confirm the establishment of connection.
 (2) If the request arrived not from the JCP node, it is necessary to
     refuse the establishment of new session connection.  The existing
     task does not need to be changed.

5.3.2 SESSION_ACCEPT

 The instruction "To accept the session" (SESSION_ACCEPT) is used for
 positive response to the establishment of session connection.  It has
 the following values of fields:
    OPCODE = 13
    ASK = 1
    PCK = %11
    EXT = 0/1
    CHN = 0
    OPR_LENGTH = 0
    SESSION_ID - This field contains the session connection identifier
                 of assigned by the node of the addressee of the
                 instruction.
    REQ_ID - This field contains the session connection identifier,
             assigned by the instruction sender.

5.3.3 SESSION_REJECT

 The instruction "To reject the session" (SESSION_ACCEPT) is used for
 negative response to the establishment of session connection.  It has
 the following values of fields:
    OPCODE = 14
    ASK = 0
    PCK = %b11
    EXT = 0/1
    CHN = 0
    OPR_LENGTH = 1

Bogdanov Experimental [Page 31] RFC 3018 Unified Memory Space Protocol December 2000

    SESSION_ID - This field contains the session connection identifier
                 of assigned by the node of the addressee of the
                 instruction.
    Operands:
       2 octets: The basic error code.  The zero-value is not
                 available.
       2 octets: The additional error code.
    The optional extension headers:
       _MSG - contains the arbitrary error description.

5.3.4 Connection Profile

 The profile of connection is defined in 4-octet field of flags.  The
 flags have identifiers S0 - S31.  The number in the identifier is
 defining the serial number of bit.  If the flag is set to 1, the
 function, connected with it, is provided.  If the flag is set to 0,
 the function, connected with it, is not provided (not required).  The
 list of functions, determined at the establishment of session
 connection, are described further.
 Work with chains:
    S0 - Use of fragmented instructions.
    S1 - Use of sequences.
    S2 - Use of transactions.
 Establishment of connection:
    S3 - Use the exchange of the data without the establishment of
         connection.
    S4 - Use the exchange of the data with the establishment of
         connection.
 The instructions format:
    S5  - Reserved.  Must have set to 0.
    S6  - Use of 16-octet address in the exchange instructions.
    S7  - Use of the compressed form of header of the instruction
          (OPR_LENGTH < > %b111) is allowed
    S8  - Use of the extension form of header of the instruction
          (OPR_LENGTH = %b111) is allowed
    S9  - Use of the extension headers with the data field up to 254
          octets of length.
    S10 - Use of the extension headers with the data field up to 4 *
          10^9 octets of length.
    S11-S15  Maximal length of the data field in operands in the 4
             octet words.  These bits are the common field.  Maximal
             length in octets is computed under the formula:

Bogdanov Experimental [Page 32] RFC 3018 Unified Memory Space Protocol December 2000

                <max length> = (<value of this field> + 1) * 4.
             If the value is equal %b1111, maximal length of the data
             is defined by the instruction format.
    S16-S19  These bits are the common field.  In the profile required
             from the addressee of the instruction, this field
             contains the version of the UMSP.  It must is set to the
             value %b0001.  In the profile given sender of the
             instruction, this field contains priority of the job.  The
             more is value of this field, the more priority.  The
             priority of the job is used:
             o In queues on sending to the transport layer for the
               instructions of the job.
             o For set of sending priority of the transport layer.
             o For set of computing priority of the task.
    S20 - making the border multiple of 4 octets.  If S16 = 1:
       (1)  OPR_LENGTH = %b111
       (2)  Each extension header and the field of operands begin with
             the border multiple of four octets.
       (3)  The necessary number of zero octets is added in the end of
            each header.
    S21 - Use of the procedures name of objects.
    S22 - Use of the objects name.
 The permissible instructions:
    S23 - The response of the execution on VM (instruction RSP) is
          provided.
    S24 - Use of data reading and comparison instructions.
    S25 - Use of data writing instructions.
    S26 - Use of control transfer instructions.
    S27 - Use of synchronize instruction.
    S28 - Use of instructions of work witch objects.
    S29 - Use of the immediate access to memory of object.  If this
          flag is set to 0, the access to object is solved only
          through its procedures.  If S28=0, this flag must be set to
          0.
    S30 - Use of instruction MVRUN in zero-session.
    S31 - Reserved.  Must have set to 0.

5.4 Session Closing

 Initiate closing session connection the node must only, which has
 initiated its establishment.  It uses the SESSION_CLOSE instruction
 for this purpose.  The procedure of break of connection is 3-way
 handshake.  The procedure of unconditional emergency end of
 connection is stipulated.  It can be transmitted by any node.

Bogdanov Experimental [Page 33] RFC 3018 Unified Memory Space Protocol December 2000

 Let node A is the initiator of the establishment of a session, and
 the node B is the second side of connection.  The node A must send
 the instruction SESSION_CLOSE for closing session.  The node A may
 recommence sending of the instructions after sending of this
 instruction.  It means that it has refused closing connection.  The
 instructions of response (see section 6) does not influence on the
 closing of connection.  The node, which has sent SESSION_CLOSE, does
 not use the timeout and can be waiting for the response beyond all
 bounds long.
 The node B, after reception of the instruction SESSION_CLOSE, sends
 in the answer the instruction RSP_P.  The zero basic return code
 responds closing session.  The non-zero basic return code cancels
 closing session.  After sending of positive response, the node must
 not use connection during 30-second timeout.  If the instruction
 SESSION_ABEND or any other instruction, except response instruction,
 has not been received from the node A after the expiration of this
 time, the node send the instruction SESSION_ABEND and considers the
 session connection closed.
 The node A sends the instruction SESSION_ABEND after reception of
 positive response on the instruction SESSION_CLOSE.  After that, the
 connection is considered closed.  The node A may refuse closing of
 connection.  For this purpose, any instruction is sent, including
 NOP.  In this case, the procedure of end interrupts, and the session
 connection is translated in the working state.

5.4.1 SESSION_CLOSE

 The instruction "To close the session" (SESSION_CLOSE) initiates the
 end of session connection.  It has the following values of fields:
    OPCODE = 15
    PCK = %b01/11
    CHN = 0
    ASK = 0
    EXT = 0/1
    OPR_LENGTH = 0/1
    SESSION_ID - Contains the session identifier assigned by the
                 addressee.
    Operands:
       2 octets: The basic termination code.
       2 octets: The additional termination code.
    The optional extension header:
       _MSG - contains the arbitrary message.
 The operands may be absent.  It is equivalent to the zero exit code.

Bogdanov Experimental [Page 34] RFC 3018 Unified Memory Space Protocol December 2000

5.4.2 SESSION_ABEND

 The instruction "Abend of session" SESSION_ABEND is applied to
 unconditional end of session.  The node, which has sent this
 instruction, finishes the exchange of the data on connection at both
 sides, not waiting responses from other node.  The instruction has
 the following values of fields:
    OPCODE = 16
    PCK = %b01/11
    CHN = 0
    ASK = 0
    EXT = 0/1
    OPR_LENGTH = 0/1
    SESSION_ID - Contains the session identifier assigned by the
                 addressee.
    Operands:
       2 octets: The basic termination code.
       2 octets: The additional termination code.
    The optional extension header:
       _MSG - contains the arbitrary message.
 The operands may be absent.  It is equivalent to the zero termination
 codes.

5.5 Task Termination

 The task is finished during the process of the job finishing at the
 normal end of the user application working.  This procedure is
 described in the following item.  The following situations require
 finishing the task irrespective of the job:
 o  There are not enough of computing resources for maintenance of the
    task on the node;
 o  The node finishes the work;
 o  If VM has accepted such decision for the internal reasons.
 The references to the resources allocated by the task can be on any
 node, on which the job is carried out.  Therefore, all nodes must be
 notified of the end of the task.
 Node, finishing the task, must abnormally close all session
 connections joining the finished task (to send the instruction
 SESSION_ABEND).

Bogdanov Experimental [Page 35] RFC 3018 Unified Memory Space Protocol December 2000

5.5.1 TASK_TERMINATE

 The instruction "To terminate the task" (TASK_TERMINATE) is sent from
 the node, on which the task is finished, to JCP.  The instruction has
 the following values of fields:
    OPCODE = 17
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0/1
    OPR_LENGTH = 2/3  ; Depends on the length of CTID.
    Operands:
       2 octets: The basic termination code.
       2 octets: The additional termination code.
       4/8 octets: CTID.
    The optional extension header:
       _MSG - contains the arbitrary message.
 After sending of the instruction TASK_TERMINATE to JCP, the node
 sends the instruction of unconditional end of connection
 ABEND_SESSION on all session connections connected with a task.
 After that, the task is considered completed.
 If the basic return code in the instruction TASK_TERMINATE is equal
 to 0, it is not required to notify other nodes about the end of the
 task.  Such situation arises, if the task did not allocate dynamic
 resources.  If the basic return code is unequal to 0, JCP must notify
 about the task end the other nodes, on which the job is carried out,
 after reception of the instruction TASK_TERMINATE.  JCP responds for
 the notification of all nodes of the job about the task end.

5.5.2 TASK_TERMINATE_INFO

 The instruction "The information on terminating of the task"
 (TASK_TERMINATE_INFO) is used for the notification about the task
 end.  It is sent from JCP to other nodes, on which the job is carried
 out.  The instruction has the following values of fields:
    OPCODE = 18
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0/1
    OPR_LENGTH = 2-5 ; Depends on the length of GTID.
    Operands:
       2 octets: The basic termination code.
       2 octets: The additional termination code.

Bogdanov Experimental [Page 36] RFC 3018 Unified Memory Space Protocol December 2000

       4-16 octets: GTID of the terminated task.  JCP forms GTID from
                    LTID (from the instruction TASK_REG) and address
                    of transport layer of the task.
    The optional extension header:
       _MSG - contains the arbitrary message.
 The fields of termination codes are taken from the instruction
 TASK_TERMINATE.  The job must delete (to make invalid) all references
 to resources concerning the node, on which the completed task worked,
 at reception of the instruction TASK_TERMINATE_INFO.

5.6 Job Completion

 The job is finished, when the appropriated to it the user application
 on the node, on which it was initiated, is finished.  The end of the
 job occurs under the initiative of VM.  Besides, it can be completed
 under the JCP initiative at ending the lifetime of the job or at end
 of the JCP node working.

5.6.1 JOB_COMPLETED

 The instruction "The task is completed" (JOB_COMPLETED) is sent from
 the node, which initiated the job, in the JCP side.  It has the
 following values of fields:
    OPCODE = 19
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0/1
    OPR_LENGTH = 2/3 ; Depends on the CTID length.
    Operands:
       2 octets: The basic completion code.
       2 octets: The additional completion code.
       4/8 octets: CTID of the completed task of the job.  CTID is a
                   part GJID of the job.
    The optional extension header:
       _MSG - contains the arbitrary message.
 After sending of the instruction JOB_COMPLETED to JCP, the node sends
 on all connected with the session connections of the job the
 instruction of unconditional end of connection ABEND_SESSION.  After
 that, the job is considered completed.
 JCP must notify of the end of the job the nodes, on which the job is
 carried out, after reception of the instruction JOB_COMPLETED.  JCP
 responds for the notification of all nodes of the job about end of
 the job.

Bogdanov Experimental [Page 37] RFC 3018 Unified Memory Space Protocol December 2000

 The instruction TASK_TERMINATE_INFO may be transferred under the
 initiative JCP, if node of the task has abnormal terminated work.

5.6.2 JOB_COMPLETED_INFO

 The instruction "The information on completion of the job"
 (JOB_COMPLETED_INFO) is used for the notification about end of the
 job.  It is sent from JCP to other nodes, on which the job is carried
 out.  The instruction has the following values of fields:
    OPCODE = 20
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0/1 ;
    OPR_LENGTH = 2-5 ; Depends on the GJID length and presence of
                       fields completion code.
    Operands:
       2 octets: The basic completion code.
       2 octets: The additional completion code.
       4-16 octets: GJID of the completed job.
    The optional extension header:
       _MSG - contains the arbitrary message.
 The fields of completion codes are optional.
 The fields of completion codes are taken from the instruction
 JOB_COMPLETED.  At reception of the instruction, JOB_COMPLETED_INFO
 the node must make the following:
 (1)  To remove all session connections, connected to the task.  At
      that, it is not necessary to send network primitives.
 (2)  To abnormally finish the task of the job and to deallocate all
      dynamic resources of the task.
 The instruction JOB_COMPLETED_INFO is used for the end of the job
 under the JCP initiative at the end of lifetime or at end of the JCP
 node working.  In these cases, the node initiated the job is the
 first addressee of the instruction.
 JCP considers the job completed after sending of all instructions
 JOB_COMPLETED_INFO.

5.7 Activity Control of Nodes

 UMSP unites nodes, which have any arrangement in the network and
 which are not having uniform controls.  Each of nodes can be
 disconnected or reloaded at any moment of time.  However, other nodes

Bogdanov Experimental [Page 38] RFC 3018 Unified Memory Space Protocol December 2000

 can be not notified about it.  The fact of breaking or repeated
 establishment of transport connection cannot be the indicator of
 disconnect or restart of the node.  The control of transport
 connections is not the part of the UMSP protocol and the presence of
 transport connection is not obligatory.
 Besides the separate task on the node can be finished emergency.
 Procedure described in section 5.5.1 in this case must be executed.
 If this procedure cannot be executed, must is abnormally finished
 work of the node.
 The JCP executes the functions of the control of nodes activity.  The
 instruction of request of the status TASK_REQ is sent periodically
 between tasks on nodes and JCP for this purpose.
 The following actions JCP are possible at detection of deactivating
 of the node:
 (1)  If the task initiated the job was finished, it is considered,
      that the job is completed.  JCP sends the instruction
      JOB_COMPLETED_INFO to all other nodes, on which the job was
      executed.
 (2)  JCP sends the instruction TASK_TERMINATE_INFO to all other nodes
      of the job, if the task, which has not initiated the job, is
      finished.
 The deactivating of the JCP node imposes the restriction on GJID
 appropriated by it after reloading.  The following variants are
 probable:
 (1)  The disconnection of the JCP node passed normally.  It
      transferred to all nodes, which it has controlled, instruction
      JOB_COMPLETED_INFO.  In this case, it can appropriate anyone
      GJID after reloading.
 (2)  There is the emergency disconnect of the JCP node.  It has not
      informed all nodes about the deactivating.  In this case, it
      must guarantee after reloading, that new GJID will not concur
      witch the GJID, existing up to the reload, during two maximal
      intervals of inactivity time (which sets this JCP).
 The reload of nodes, which are not being JCP, does not impose
 restrictions on LTID established on these nodes.

5.7.1 _INACTION_TIME

 The extension header "The time of inaction" (_INACTION_TIME) allows
 setting the inaction time of the node (non JCP).  It has the
 following values of fields:

Bogdanov Experimental [Page 39] RFC 3018 Unified Memory Space Protocol December 2000

    HEAD_CODE = 2
    HEAD_LENGTH = 1;
    HOB = 1
    DATA contains:
       2 octets: The inaction period.  The number of 0,5 second
       intervals, through which the activity of the node - sender of
       the instruction from the side JCP - will be checked.
 The inaction period must be more than three intervals of the maximal
 time of delivery at the transport layer.  The waiting period in queue
 to the transport layer does not influence on timeout.
 The header _INACTION_TIME may be attached to the following
 instructions:
 (1)  To the instruction TASK_REG.  In this case must be satisfied
      condition - on node there must not be other active tasks, which
      are controlled the JCP of addressee.  The zero-value specifies
      that the activity checking is unused.  The absence of the header
      specifies that the inaction period must be set on the JCP.
 (2)  To the instruction TASK_REJECT, if the time from the instruction
      TASK_REG does not fit for JCP.
 (3)  To the instruction TASK_CONFIRM, if instruction TASK_REG had no
      this header.
 If JCP receives the instruction TASK_REG with the attached heading
 _INACTION_TIME, it must check up presence of active tasks with sender
 node (as it can mean, that the node was reloaded).  If such tasks
 exist, for each of them it is necessary to execute procedure of end
 of the task described in section 5.6.2.  The instruction TASK_CONFIRM
 must be sent only after that.

5.7.2 STATE_REQ

 The instruction "State Request" (STATE_REQ) is sent from JCP to the
 definite task of other node.  The instruction has the following
 values of fields:
    OPCODE = 21
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0
    OPR_LENGTH = 1/2 ; Depends on the LTID length.
    Operand:
       4/8 octets: LTID, established on the node of the instruction
                   addressee.

Bogdanov Experimental [Page 40] RFC 3018 Unified Memory Space Protocol December 2000

 The instruction STATE_REQ will be sent in the defined task but it has
 concern with node.  It is sent, if between the node and JCP was not
 sending of the instruction during inactive time.  The task activated
 after sending of last instruction STATE_REQ does not influence the
 control of activity.
 The instruction TASK_STATE is sent in reply to STATE_REQ.  At
 expectation of the response, the timeout equal to one inaction period
 is used.  After the expiration of the timeout the node is considered
 switched - off.
 If the node not receives of any instructions from JCP during two
 intervals of inaction time, it is considered, that JCP has finished
 the work.  The actions of the node in this case are described in
 section 5.6.2 at receiving the instruction JOB_COMPLETED_INFO.  The
 check of this condition is optional for the node.
 If at JCP there are no active tasks connected with the defined node,
 the control of activity of this node will not be carried out.

5.7.3 TASK_STATE

 The instruction "Task State" (TASK_STATE) is sent from the definite
 task to JCP.  It serves for the response of the instruction
 STATE_REQ.  The instruction has the following values of fields:
    OPCODE = 22
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0
    OPR_LENGTH = 1/2/3 ; Depends on the CTID length.
    Operands:
       1 octet:  The state code of task.  The following values are
                 defined for this field:
          %x01 - The task is active and has active session
                 connections.
          %x02 - The task is active and have no session connections.
          %x03 - The task is active, have no session connections and
                 have no resources, allocated on the node.
          %x04 - The task is completed.
       1/3 octets: Reserved.  If OPR_LENGTH = 1, then this field has
                   length 1 octet, else 3 octets. JCP must not check
                   the value of this field.  It is established in zero
                   value by sending.
       2/4/8 octets: CTID connected with LTID from the instruction
                     STATE_REQ.

Bogdanov Experimental [Page 41] RFC 3018 Unified Memory Space Protocol December 2000

 If OPR_LENGTH = 1 that length of the reserved field is equal to one
 octet and length CTID makes two octets.  In all other cases, length
 of the reserved field is equal 3 octets and length CTID - not less
 than 4 octets.

5.7.4 NODE_RELOAD

 The instruction "The node was reloaded" (NODE_RELOAD) is sent to JCP
 as the negative response to STATE_REQ instruction.  NODE_RELOAD has
 the following values of fields:
    OPCODE = 23
    PCK = %b00
    CHN = 0
    ASK = 0
    EXT = 0
    OPR_LENGTH = 1/2 ; Depends on the LTID length.
    Operands:
       4/8 octets: LTID.  The value is taken from the instruction
                   STATE_REQ.
 The instruction RELOAD_NODE indicates, that the task with given LTID
 for given JCP on the node is absent.  At reception of this
 instruction, JCP must make the following:
 (1)  To send the instruction STATE_REQ to all tasks of the node,
      which were initiated before a sending of the penultimate
      instruction STATE_REQ.
 (2)  To wait for ending of one inaction interval after sending of the
      last instruction STATE_REQ (on which the negative response is
      received).
 (3)  To send the instructions STATE_REQ to all tasks of the node,
      which were initiated between last and penultimate instructions
      STATE_REQ (not including instructions from item 1).
 For all instructions STATE_REQ the positive response (TASK_STATE) or
 negative response (RELOAD_NODE) must be transmitted.

5.8 Work without session connection

 The protocol provides the data exchange between nodes without an
 establishment of session connection.  In this case, initialization of
 the job and tasks is not made and JCP is not used.
 The format of the instructions, transmitted without the establishment
 of connection, is completely correspond to the instructions
 transmitted by session connections.  The difference is that the field
 SESSION_ID has zero value or PCK = %b00.

Bogdanov Experimental [Page 42] RFC 3018 Unified Memory Space Protocol December 2000

 The node, supporting work without the establishment of session
 connection, must have VM, which executes by default the instructions
 transmitted without the establishment of connection.  In fact, these
 instructions are executed within the framework of a so-called zero-
 session (or zero-task) of this VM.  The memory address space of this
 VM is accessible without a connection establishment.
 The instruction SESSION_INIT with SESSION_ID = 0 and REQ_ID = 0
 allows to specify parameters of its zero-session and to request the
 zero-session parameters of the addressee node.  If the node, which
 has received such instruction, provides the requiring profile, it
 sends the instruction SESSION_ACCEPT.  If the profile is not
 provided, the answerback instruction SESSION_INIT will send, in which
 the field SESSION_ID and REQ_ID also have the value 0.  Actually,
 such instructions of session initialization do not establish
 connection, but have the information meaning.  The exchange of the
 data by zero-session can occur irrespective of its.
 There are the following restrictions at working without connection:
 o  The chain must be sent, only if it is completely located in one
    segment of the transport layer.
 o  It is impossible to request an allocation of memory and to create
    objects (except instruction MVRUN).  This objects is not adhered
    to the definite job and is not automatically release the resources
    at the end of the job, which has created them.
 o  Parameters of functions and the returned values must not contain
    the pointers, because the node can be reloaded at any moment.  It
    will result that the pointers will become invalid or will address
    other objects.
 The protocol cannot check those conditions.  Their realization lays
 on VM wholly.
 The work without establishment of session connection may be used in
 the following systems:
 o  In simple devices, which do not have the operational system;
 o  On servers which are executed a plenty of requests (for work
    without connection of resources is used less);
 o  In systems requiring the fast response to rare requests (if
    keeping of connection is inexpedient).

Bogdanov Experimental [Page 43] RFC 3018 Unified Memory Space Protocol December 2000

6 Instructions of Exchange between VM

 The instructions intended for an exchange between VM uses values
 OPCODE in range 128 - 223.  Depending on length of the operands
 field, several formats of the instruction may be defined for one
 OPCODE.  The complete instruction format is defined by aggregate of
 the values of fields OPCODE and OPR_LENGTH.
 The instruction has the field REQ_ID, if in the instruction header
 flag ASK = 1.  REQ_ID is used for the response identification.  The
 value of this field is specifies by VM.  The response is formed by
 VM, too.  The protocol does not check the response and does not
 analyze the value of the field REQ_ID for the instructions of
 exchange between VM.  One of the instructions RSP, DATA, RETURN,
 ADDRESS, OBJECT or PROC_NUM is used for sending of the response.  The
 instructions of response have ASK = 1 and the value taken from the
 confirmed instruction is record in REQ_ID.  The instructions of
 response do not require the response.
 The instructions of exchange between VM may be sent through UDP at
 observance of the following conditions:
 o  ASK = 0;
 o  The instruction is located in one segment UDP;
 The timeouts and the repeated sending are not used at UMSP layer for
 instructions of exchange between VM.  It is explained to, that the
 time of sending instructions with low priority may be very large
 because of the output queues.  Therefore, the VM must make a decision
 on timeout, as only VM has the complete information on type of the
 transmitted data.  Besides, the transport layer protocol must use the
 timeouts.
 A few VM may be connected to the protocol on the node.  VM may
 simultaneously execute several jobs.  Each job may work in its
 address space.  The protocol determines VM and job, which the
 received instruction must transfer to, on field SESSION_ID value.
 The local memory address is located in the instruction in field of
 length 2/4/8 octets.  If memory address length in the instruction is
 not equal to memory address length defined for the node, the
 following variants are possible:
 o  If memory address length is set in 24 bits for the node, the
    address is writes in the end of 4 - octets field.  The 0 value
    sets in an initial (zero) octet.

Bogdanov Experimental [Page 44] RFC 3018 Unified Memory Space Protocol December 2000

 o  If the instruction format assumes the memory address length not
    less than 4 octets, 2-octet address is located in the last octets.
    The first 2 octets must set to zero.
 o  If instruction is the member of a chain and it has the less length
    of the memory address, than it is defined for the node - it is
    considered, that the base-displacement addressing is used.  If the
    value of the memory base is not assigned for the chain -
    instruction is erroneous.
 o  If the instruction is not the member of a chain and has the length
    of memory address less, than it is defined for the node, it is
    considered, that the abbreviated address is used.  The complete
    address length must be received by padding in front of it the
    necessary number of zero-value octets.
 o  In all other cases, the instruction is erroneous.
 Complete 128-bit memory address writes in operands in the 16-octets
 field.  The reason of using of the complete address is that the
 additional information, using by the memory control subsystem in the
 node, may contain in its field FREE (see section 2.1).  If the FREE
 of the complete address is set to zero, it is recommended to use
 local address in operands.
 Operands field has a length, which is an integral number of 32 bits.
 The alignment is making by padding, if necessary, of the zero-value
 octets at the end of the field.
 Header fields of the instructions not defined in the formats
 description are used according to the description from section 3.
 The instruction of the transfer control JUMP, CALL, CALL_BNUM and
 CALL_BNAME may contain the information about VM of the sender.  If VM
 type and VM version of the sender are contains in the instruction,
 the call parameters are formed in a format VM of the sender.  Else,
 the call parameters have format defined by VM of the addressee.  The
 code is always connected with of specific VM.
 All instructions of the protocol work with binary data and do not
 provide operations of formats transformation.

6.1 Data Reading/Writing Instructions

6.1.1 REQ_DATA

 The instruction "To request a data" (REQ_DATA) is used for the data
 request from the remote node.  Two instructions REQ_DATA with length
 of the length field 2 and 4 octets are defined.  These instructions
 have the following values of fields:

Bogdanov Experimental [Page 45] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 130/131      ; For length of the length field of 2/4
                            octets.
    OPR_LENGTH = 1/2/3/5  ; Depends on address length.
    Operands:
       2/4 octets: The length field. The number of the required data in
                   octets.
       2/4/8/16 octets: The memory address of the required data.
 The instruction DATA, containing required data, is sent in reply to
 it.  If the data cannot be sent, the instruction RSP with the non-
 zero basic return code, comes back.

6.1.2 DATA

 The instruction "The data" (DATA) is sent in reply to the instruction
 REQ_DATA and OBJ_REQ_DATA.  The instruction has the following values
 of fields:
    OPCODE = 132
    OPR_LENGTH = 0 - 65535  ; Depends on the immediate data length of
                              the operand.
    Operands:
       0 - 262140 octets: Immediate data.  If OPR_LENGTH = 0, this
                          field are absent.
    Extension headers:
       _DATA - Contains immediate data.  If OPR_LENGTH <> 0, this
               header are absent.
 The extension header is used, if the data are more then an maximum
 operands field size.  The data must not be sent simultaneously in
 operands and in the extension header.  To make the length of data
 multiple of 4 octets, 1 - 3 zero-value octets are padded in the end
 of a field.

6.1.3 WRITE

 The instruction "To write the data" (WRITE) is used for data writing
 on the remote node.  The instruction has the following values of
 fields:
    OPCODE = 133/134/135/136  ; For memory address length of 2/4/8/16
                                octets.
    OPR_LENGTH = 1 - 65535    ; Depends on length of the immediate
                                data.
    Operands:
       2/4/8/16 octets: The memory address for writing the data.
       0 - 262136 octets: Immediate data for write.

Bogdanov Experimental [Page 46] RFC 3018 Unified Memory Space Protocol December 2000

    Extension headers:
       _DATA - Contains immediate data.  This header is present only,
               if the data does not contain in operands.
 At address length of 2 octets the data length must be 2 octets.  In
 all other cases, address length must be not less than 4 octets and
 data length must be multiple of 4 octets.  The data must not be sent
 simultaneously in operands and in the extension header.
 The instruction RSP is sent in reply to the instruction WRITE.  The
 zero basic return code defines normal executing.

6.1.4 WRITE_EXT

 The instruction "The extension writing of data" (WRITE_EXT) is used
 for the data writing on the remote node.  Length of the data may be 1
 - 262132 octets with a step 1 octet.  The instruction has the
 following values of fields:
    OPCODE = 137
    OPR_LENGTH = 3 - 65535  ; Depends on length of the immediate data.
    Operands:
       1 octets: Always set to zero.
       3 octets: The number of the write data in octets.  The zero-
                 value is not available.
       4 - 262132 octets: Immediate data for write.  The data length
                          must be multiple of 4 octets.
       4/8/16 octets: The memory address for writing the data.
 To make the immediate data multiple of four octets, the data is
 padded with 1 - 3 zero-value octets at the end of a field.
 The instruction RSP is sent in reply to the instruction WRITE_EXT.
 The zero basic return code defines normal executing.

6.2 Comparison Instructions

6.2.1 CMP

 The instruction "To compare" (CMP) is used for binary data
 comparison.  It has the following values of fields:
    OPCODE = 138/139/140/141  ; For the address length of 2/4/8/16
                                octets.
    OPR_LENGTH = 1 - 65535    ; Depends on length of the immediate
                                data.

Bogdanov Experimental [Page 47] RFC 3018 Unified Memory Space Protocol December 2000

    Operands:
       2/4/8/16 octets: The memory address for compared data.
       2 - 262136 octets: The immediate data for the comparison.
 At the address length of 2 octets the data length must be 2 octets.
 In all other cases length of the address must not be less than 4
 octets and the data length is multiple to four octets.

6.2.2 CMP_EXT

 The instruction "The extension compare" (CMP_EXT) is used for binary
 data comparison.  Length of the data may be 1 - 262132 octets with a
 step 1 octet.  The instruction has the following values of fields:
    OPCODE = 142
    OPR_LENGTH = 3 - 65535  ; Depends on length of the immediate data
                              and the address.
    Operands:
       1 octet: Always set to 0.
       3 octets: The length of compared data in octets.  The zero-value
                 is not available.
       4 - 262132 octets: The immediate data for the comparison.  The
                          length of field is multiple of 4 octets.
       4/8/16 octets: The memory address of compared data.
 To make the immediate data multiple of four octets, the data is
 padded with 1 - 3 zero-value octets at the end of a field.

6.2.3 Response to Comparison Instructions

 The instruction RSP is sent in reply to the instruction CMP, CMP_EXT
 and OBJ_CMP (see below).  If the comparison was executed, the basic
 return code is equal to zero.  The additional return code is equal to
 -1, if the data at the address memories are less then the data from
 the operand; 0, if they are equal; and 1, if they are more.  If the
 comparison cannot be executed, the basic return code of the
 instruction RSP must be non-zero.

6.3 Control Transfer Instructions

6.3.1 JUMP, CALL

 The "Unconditional jump" (JUMP) and "To Call-subroutine" (CALL)_
 instructions have an equal format and differ only by OPCODE.  These
 instructions have the following values of fields:
    OPCODE = 143/144  ; Correspondingly for the JUMP not containing
                        and containing the information about VM.

Bogdanov Experimental [Page 48] RFC 3018 Unified Memory Space Protocol December 2000

             145/146  ; Correspondingly the CALL not containing and
                        containing the information about VM.
    OPR_LENGTH = 2 - 65535  ; Depends on inclusion of the information
                              about VM, address length and parameters
                              length.
    Operands:
       2 octets: The VM type of the sender.  If OPCODE=143/145 this
                 field is absent.
       2 octets: The VM version of the sender.  If OPCODE=143/145 this
                 field is absent.
       4/8/16 octets: The address of memory, where is necessary to
                      transfer control.
       2 octets: The number of 32 bit words in the call parameters
                 field.
       4 - 262134 octets: The immediate data are the parameters of a
                          call.
 On the reception side the processing of the instructions of a control
 transfer occurs as follows:
 o  The memory address is checked.  If it has erroneous value, the
    negative response RSP is sent.  At this stage, the correctness of
    parameters of a call may be also checked up.
 o  If the memory address and the parameters of a call have correct
    value, the positive response RSP is sent for the instruction JUMP.
    The transmitting side considers the instruction JUMP executed
    after receiving response.
 o  For response of an execution of the instruction CALL the
    instruction RETURN is sent.  The instruction RETURN may contain
    the returned values.  If there is an exception condition in a
    thread of control created by the CALL instruction, the instruction
    RSP with a non-zero basic return code is sent instead of RETURN.

6.3.2 RETURN

 The instruction "Return of control" (RETURN) is used at return of
 control from the instructions CALL, MVRUN, CALL_BNUM and CALL_BNAME
 (see below).  Those instructions have the following values of fields:
    OPCODE = 147
    OPR_LENGTH = 0 - 65535  ; Depends on length of the immediate data.
    Operands:
       0 - 262140 octets: Immediate data returned from the subroutine.
 If it is not required to send returned value, the instruction RETURN
 does not contain operands. The data format coincides with the
 instruction, for which the response (format VM of the sender or
 addressee) will be sent.

Bogdanov Experimental [Page 49] RFC 3018 Unified Memory Space Protocol December 2000

6.4 Memory Control Instructions

 UMSP gives means for division of memory for a code and for the data.
 The protocol does not make checks of correctness of operations with
 memory.  The code and the data use common address space.  The control
 of memory is completely realized by VM.

6.4.1 MEM_ALLOC

 The instruction "To allocate a memory for the data" (MEM_ALLOC) is
 used for request of the allocation of memory under the data.  The
 instruction has the following values of fields:
    OPCODE = 148
    OPR_LENGTH = 1
    Operands:
       4 octets: The size of required memory in bytes.
 For the positive response on the instruction MEM_ALLOC, the
 instruction ADDRESS, for negative - RSP with the non-zero basic
 return code is sent.  The received address can be used by the
 protocol in the instructions of reading/writing, comparison and
 synchronization.

6.4.2 MVCODE

 The instruction "To move the code" (MVCODE) is used for moving of the
 executable code from one node on another.  The instruction has the
 following values of fields:
    OPCODE = 149
    OPR_LENGTH = 1 - 65535 ; Depends on length of the code field.
    Operands:
       2 octets: The VM type of addressee.
       2 octets: The VM version of addressee.
       0-262136 octets: contains the executable code.
    The extension headers:
       _DATA - contains the executable code.  This header is present
               only, if the code does not contain in operands.
 The code is always connected with VM of the definite type.  The code
 field is always transparent for the protocol.  It is formed by the VM
 of sender and must contain all the information necessary VM of the
 receiver.  The code must not simultaneously be sent in operands and
 in the extension header.

Bogdanov Experimental [Page 50] RFC 3018 Unified Memory Space Protocol December 2000

 For the positive response on the instruction MVCODE, the instruction
 ADDRESS, for negative - RSP with the non-zero basic return code is
 used.  The code transferred on the instruction MVCODE, may be
 executed by the instruction JUMP or CALL.

6.4.3 ADDRESS

 The instruction "The memory address" (ADDRESS) is used for the
 positive response on the instruction MEM_ALLOC and MVCODE.  ADDRESS
 has the following values of fields:
    OPCODE = 150
    OPR_LENGTH = 1/2/4; Depends on length of the address.
    Operands:
       4/8/16 octets: The address of the allocated memory.
 For the instruction, MEM_ALLOC the address specifies first byte of
 the allocated data area.  For the instruction MVCODE the contents of
 the address is defined VM, by which the code is connected.

6.4.4 FREE

 The memory allocated with the instructions MEM_ALLOC and MVCODE, must
 be explicitly release.  For this purpose, the instruction "To free
 the memory" (FREE) is used.  It has the following values of fields:
    OPCODE = 151
    OPR_LENGTH = 1/2/4; Depends on length of the address
    Operands:
       4/8/16 octets: the address of free memory.
 VM must free this memory automatically at end of the task on the
 node.

6.4.5 MVRUN

 The instruction "To move and run" (MVRUN) is used for simultaneous
 move of a code and its execution.  The instruction has the following
 values of fields:
    OPCODE = 152
    OPR_LENGTH = 1 - 65535 ; Depends on length of the code field.
    Operands:
       2 octets: The addressee VM type.
       2 octets: The addressee VM version.
       4 - 262136 octets: Contains an executable code.

Bogdanov Experimental [Page 51] RFC 3018 Unified Memory Space Protocol December 2000

    The extension headers:
       _DATA - Contains an executable code.  This header is present
               only, if the code does not contain in operands.
 The executable code is the transparent buffer with the binary data
 for the protocol.  The format of this field is defined by the VM and
 it must contain all the information necessary for the loader VM of
 the addressee, including parameters of a call.
 The code must not simultaneously be sent in operands and in the
 extension header.
 The answer to the instruction MVRUN is formed similarly to
 instruction CALL.  It is not necessary to release memory allocated
 for a code by this instruction.  The memory must deallocate the VM.

6.5 Other Instructions

6.5.1 SYN

 The instruction "To Synchronize" (SYN) is used for the single message
 about the data change.  The instruction has the following values of
 fields:
    OPCODE = 153/154/155 ; For length of the address 4/8/16 octets.
    OPR_LENGTH = 2 - 65535; Depends on length of the data
    Operands:
       4/8/16 octets: The memory address of the tracking data.
       2 - 131068 octets: The initial data.  Length of the data must be
                          multiple of two octets.
       2 - 131068 octets: A mask for comparison.  Length of this field
                          is equal to length of a field of the initial
                          data.
 The tracking data is set by the memory address in the first operand.
 These data are originally compared to the initial data value from the
 second operand.  If the values do not coincide, it is considered,
 that the data have changed.  The third operand allows setting a mask
 for comparison.  Set to one bits of the mask specifies bits in the
 data, which change must be traced.
 The following variants of the answer are probable on the instruction:
 o  If the address of local memory is incorrect, the instruction RSP
    with the non-zero basic return code is sent for the response.
 o  If the data do not change, in the response nothing is sent.
 o  If the data have changed, the instruction DATA with new value of
    the traced data is sent.

Bogdanov Experimental [Page 52] RFC 3018 Unified Memory Space Protocol December 2000

6.5.2 NOP

 The instruction "No operation" (NOP) has the following values of
 fields:
    OPCODE = 156
    OPR_LENGTH = 0 - 65535
    Operands:
       0 - 262140 octets: Encapsulated data.
    Extension headers:
       Any Extension headers.
 The instruction NOP is intended for the decision of the following
 tasks:
 o  Send the control extension headers, when there are no other
    instructions for sending in a session
 o  Encapsulate the fragmented instructions and transactions with the
    established flag of special processing (see section 7).

6.6 Work with Objects

 The protocol has a set of the instructions being expansion of the
 protocol RPC [6].  As against RPC, UMSP allows immediately to address
 memory on remote nodes and to send the pointers in parameters and
 returned values.
 The UMSP object is identified by the 4-octet number.  The values are
 divided into the following ranges:
      I -> %x00000000 - 1FFFFFFF   are assigned for standard objects
     II -> %x20000000 - 3FFFFFFF   are assigned for users objects
    III -> %x30000000 - 4FFFFFFF   free
     IV -> %x50000000 - DFFFFFFF   transient
      V -> %xE0000000 - FFFFFFFF   reserved
 The objects from a range I must be definite, as standard, and the
 specifications of their interfaces must be published.  The protocol
 does not suppose the private or not described interfaces of standard
 objects.
 The objects from a range II must be registered, but the
 specifications of their interfaces may be optional published.  These
 numbers are applied in cases, when it is required to exclude the
 probable conflict of systems of the different manufacturers.

Bogdanov Experimental [Page 53] RFC 3018 Unified Memory Space Protocol December 2000

 The range III can be used freely.  The objects accessible on these
 numbers may be created statically or dynamically.  These objects can
 have any interfaces.
 All objects, concerning ranges I, II and III, is common for all jobs
 on the node, including zero-session.  Their interfaces are accessible
 to all tasks on the node, depending on parameters of authentication.
 The range IV is intended for objects created dynamically within the
 framework of one job.  These objects are the isolated associative
 memory of the job.  The access to these objects must be granted only
 for one job.  The zero-session has no access to these objects.
 The protocol grants the access to the data of object, as to the
 continuous segment of memory.  The memory of objects may be
 overlapping or no overlapping with flat local memory of the node.
 The offset field is used in the instructions of work with the data of
 object.  The offset rules writing are similar to the local address
 rules writing.
 The address memory length of the node, definite for the UMSP
 protocol, limits the maximal data size of one object.  The
 instructions definite in the given section, allow to work with
 associative memory with the theoretical limiting size on one node -
 2^96 (7,9 * 10^28) Byte.
 In addition to the number, the object has the version, 2 octets
 length, and realization, 2 octets length.  The protocol requires
 obligatory compatibility from bottom-up for all realizations of one
 version of object.  The publication of new realization of standard
 object may contain only added interfaces.
 If for the sender of the instruction the version and/or the
 realization of object do not play any role or is unknown, the
 instruction may contain zero fields of the version and realization of
 object or only zero field of realization.  The zero field of the
 version and non-zero field of realization are not allowed.

6.6.1 Reading/Writing of the Objects Data

6.6.1.1 OBJ_REQ_DATA

 The instruction "To request the data of object" (OBJ_REQ_DATA) is
 used for request of data of the Object from the remote node.  The
 instruction has the following values of fields:

Bogdanov Experimental [Page 54] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 192/193   ; For length of the field of length 2/4 octets.
    OPR_LENGTH = 3/4/5 ; Depends on length of the offset field.
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       2/4 octets: The length of the required data in octets.
       2/4/8 octets: Offset required data from the beginning of object
                     in bytes.
 At length of the length field of 2 octets the offset length must be 2
 octets.  In all other cases, length of the length field and offset
 length must be not less than 4 octets.
 The instruction DATA, containing the required data, is sent for reply
 to instruction OBJ_REQ_DATA.  If the data cannot be transmitted, the
 instruction RSP from the non-zero basic return code comes back.

6.6.1.2 OBJ_WRITE

 The instruction "To write the data in object" (OBJ_WRITE) is used for
 write of the data in object.  The instruction has the following
 values of fields:
    OPCODE = 194/195/196   ; For length of the offset field of 2/4/8
                             octets.
    OPR_LENGTH = 3 - 65535 ; Depends on the data length.
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       2/4/8 octets: The offset in object for the data writes.
       2 - 262128 octets: The immediate data for write.
    The extension headers:
       _DATA - Contains immediate data for write.  This header is
               present, only if the data is not present in operands.
 At length of the field-offset of 2 octets, length of the data must be
 2 octets.  In all other cases, the offset length must be not less
 than 4 octets and the data length is multiple to four.  The data must
 not simultaneously be sent in operands and in the extension header.
 The instruction RSP is sent in reply to the instructions OBJ_WRITE.
 The zero basic return code defines the normal execution.

Bogdanov Experimental [Page 55] RFC 3018 Unified Memory Space Protocol December 2000

6.6.1.3 OBJ_WRITE_EXT

 The instruction "The extension writing of the data in object"
 (OBJ_WRITE_EXT) is used for write of the data in object.  Length of
 the data may be 1 - 262132 octets with the step 1 octet.  The
 instruction has the following values of fields:
    OPCODE = 197
    OPR_LENGTH = 3 - 65535; Depends on the data length and the address
                            length.
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       1 octet: Always set to 0.
       3 octets: Length written down data in octets.  The zero-value is
                 incorrect.
       4 - 262124 octets: The immediate data for write.  Length of the
                          data is multiple of 4 octets.
       2/4/8 octets: Offset in object for the data write.
 If the length of the written down data is not multiple of four
 octets, the data is padded with 1 - 3 zero octets at the end.
 The instruction RSP is sent in reply to the instructions
 OBJ_WRITE_EXT.  The zero basic return code defines the normal
 execution.

6.6.2 Comparison Instructions of the Objects Data

6.6.2.1 OBJ_DATA_CMP

 The instruction "To compare the data of object" (OBJ_DATA_CMP) is
 used for binary comparison of data of the object by the immediate
 data from operands.  The instruction has the following values of
 fields:
    OPCODE = 198/199/200  ; For length of offset field of 2/4/8
                            octets.
    OPR_LENGTH = 3 - 65535; Depends on length of the data.
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       2/4/8 octets: Offset in object for the compared data.
       2 - 262128 octets: The immediate data for comparison.

Bogdanov Experimental [Page 56] RFC 3018 Unified Memory Space Protocol December 2000

 At length of a field of 2 octets offset the data length must be 2
 octets.  In all other cases the offset length must be not less than 4
 octets and the data length is multiple to 4 octets.
 The response to the instruction OBJ_DATA_CMP is described in section
 6.2.3.

6.6.2.2 OBJ_DATA_CMP_EXT

 The instruction "The extension compare of data of the object"
 (OBJ_DATA_CMP_EXT) is used for binary comparison of data of the
 object by the immediate data from operands.  Length of the data may
 be 1 - 262132 octets with a step 1 octet.  The instruction has
 following values of fields:
    OPCODE = 201
    OPR_LENGTH = 5 - 65535  ; Depends on length of the immediate data
                              and the address length.
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       1 octet: Always set to 0.
       3 octets: The length of compared data in octets.  The zero-value
                 is incorrect.
       4 - 262124 octets: The immediate data for the comparison.  The
                          length of field is multiple of 4 octets.
       4/8 octets: Offset in object for the compared data.
 To make the immediate data multiple of four octets, the data is
 padded with 1 - 3 zero-value octets at the end.
 The response to the instruction OBJ_DATA_CMP_EXT is described in
 section 6.2.3.

6.6.3 Execution of the Objects Procedures

6.6.3.1 CALL_BNUM

 The instruction "To call the object procedure over number"
 (CALL_BNUM) transfers control to the object procedure over indication
 of the number.  The instruction has following values of fields:
    OPCODE = 202/203 ; Accordingly for the instructions not containing
                       and containing the information about VM.
    OPR_LENGTH = 4 - 65535 ; Depends on inclusion of the information
                             about VM and call parameters length.

Bogdanov Experimental [Page 57] RFC 3018 Unified Memory Space Protocol December 2000

    Operands:
       2 octets: The VM type of the sender.  If OPCODE=202 this field
                 is absent.
       2 octets: The VM version of the sender.  If OPCODE=202 this
                 field is absent.
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       4 octets: The number of the called procedure.
       4 - 262128 octets: Parameters of the call.
 The processing on the reception side is made similarly instructions
 CALL (see section 6.3.1).

6.6.3.2 CALL_BNAME

 The instruction "To call the object procedure over name" (CALL_BNAME)
 transfers control to the object procedure over indication of the
 name.  The instruction has following values of fields:
    OPCODE = 204/205  ; Accordingly for the instructions not
                        containing and containing the information
                        about VM.
    OPR_LENGTH = 3 - 65535 ; Depends on inclusion of the information
                             about VM and call parameters length.
    Operands:
       2 octets: The VM type of the sender.  If OPCODE=204 this field
                 is absent.
       2 octets: The VM version of the sender.  If OPCODE=204 this
                 field is absent.
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       4 - 262128 octets: Parameters of the call.
    The extension header:
       _NAME - Contains the name of the called procedure.
 The processing on the reception side is made similarly instructions
 CALL (see section 6.3.1).
 The names may have the procedures of the objects belonging to ranges
 III and IV.  The procedures of the objects belonging to ranges I and
 II must not have a name on the UMSP layer.  They must have the number
 only.

Bogdanov Experimental [Page 58] RFC 3018 Unified Memory Space Protocol December 2000

6.6.3.3 GET_NUM_PROC

 The instruction "To get the name of object procedure" (GET_NUM_PROC)
 allows receiving number of the procedure for objects in ranges III
 and IV over procedure name.  The instruction has following values of
 fields:
    OPCODE = 206
    OPR_LENGTH = 2
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
    The extension header:
       _NAME - Contains procedure name.
 For the positive response on the instruction GET_NUM_PROC, the
 instruction PROC_NUM, for negative - RSP with the non-zero basic
 return code is sent.

6.6.3.4 PROC_NUM

 The instruction "The procedure number" (PROC_NUM) is sent in reply to
 the instruction GET_NUM_PROC.  The instruction PROC_NUM has following
 values of fields:
    OPCODE = 207
    OPR_LENGTH = 3
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.
       4 octets: The number of procedure.

6.6.4 The Objects Creation

 The objects from the ranges I and II (standard and assigned for the
 user) cannot be created on the remote node through the UMSP
 interface.  These objects must be created only through API of the VM.
 The objects from the ranges III and IV can be created on the remote
 node by the protocol instructions.
 The realization of objects from the ranges I - III (not connected
 with the certain job) is difficult enough.  The reason is that the
 different jobs can have the different address spaces of memory.  The
 pointers must be processed in the context of the job, from which they
 are received.  Besides, these objects must trace the end of the jobs

Bogdanov Experimental [Page 59] RFC 3018 Unified Memory Space Protocol December 2000

 for deallocation of dynamic resources.  The specified requirements
 impose essential restrictions on these objects.  The protocol does
 not impose any restrictions on objects from the range IV.
 Unique key identifying object on node, is number of object.  To
 objects from the ranges, III and IV the name may be assigned.  The
 objects from range I and II must not have names on the UMSP layer.
 Within the framework of one task must not be two objects having one
 number or one name.

6.6.4.1 NEW, SYS_NEW

 The format of both instructions "New object" (NEW) and "New system
 object" (NEW_SYS) is similar.  First instruction creates object in
 the range IV, second - in the range III.  These instructions have the
 following values of fields:
    OPCODE = 208/209; Accordingly for NEW/NEW_SYS.
    OPR_LENGTH = 3
    Operands:
       2 octets: The addressee VM type.
       2 octets: The addressee VM version.
       2 octets: The version of object.
       2 octets: The realization of object.
       4 - 262136 octets: Immediate data necessary for creation of
                          object.
    The extension headers:
       _DATA - Contains immediate data, necessary for creation of
               object.  This header is present, only if the data is not
               present in operands.
       _NAME - Contains the name of object.  This header is optional.
 The instruction NEW_SYS is used for the creation of object accessible
 from any job, NEW - for creation of object accessible only from its
 job.  If the object is created, the instruction OBJECT is sent for
 the response.  If the object cannot be created, the instruction RSP
 with the non-zero basic return code is sent.
 The immediate data field is transparent for the protocol.  It is
 formed by the sender VM and it must contain the information, which is
 necessary to the addressee VM for the creation of object.  Data must
 not simultaneously be sent in operands and in the extension header.
 The field SESSION_ID of the instruction cannot have the zero value.
 The dynamic object must be created only in the context of the
 definite job.  The object is always created on VM, with which the
 session is connected.

Bogdanov Experimental [Page 60] RFC 3018 Unified Memory Space Protocol December 2000

 The zero values of the version and the realizations of object means,
 that the object have no these values.
 It is possible to register the name of object simultaneously with its
 creation.  The name contains in the _NAME extension header.
 All objects created upon the instructions NEW and NEW_SYS must be
 obviously deleted.  VM must automatically delete all dynamic objects,
 created and not deleted by the task, at the end of the task.

6.6.4.2 OBJECT

 The instruction "The Object" (OBJECT) is used for the positive
 response on the instruction NEW and NEW_SYS.  The instruction OBJECT
 has following values of fields:
    OPCODE = 210
    OPR_LENGTH = 2
    Operands:
       4 octets: The number of object.
       2 octets: The version of object.
       2 octets: The realization of object.

6.6.4.3 DELETE

 The instruction "To delete the object" (DELETE) is used for the
 deleting of object created on the instruction NEW or NEW_SYS.  The
 instruction DELETE has the following values of fields:
    OPCODE = 211
    OPR_LENGTH = 1
    Operands:
       4 octets: number of object
 The object may be deleted only from the job, which has created it.
 The instruction RSP is sent in reply to this instruction.

6.6.5 The Objects Identification

 At registration of object on the node, it may be identify by the
 name, the length of 4 - 254 octets.  The name contains the symbols
 ASCII.  The following versions of the protocol may define other types
 of the name.
 The name identifies with the number of object and is its synonym.
 The names of all active objects in one task on the node must be
 unique.  Thus, all active objects from the range of number I - III

Bogdanov Experimental [Page 61] RFC 3018 Unified Memory Space Protocol December 2000

 must have the unique names for all tasks on the node.  The protocol
 allows receiving the number of object by the name and the name of
 object by the number.

6.6.5.1 OBJ_SEEK

 The instruction "To seek the object" (OBJ_SEEK) is used for seek of
 number of the object by the name.  It has the following values of
 fields:
    OPCODE = 212
    OPR_LENGTH = 0
    The extension header:
       _NAME - contains the name of object for search.
 If the object is found - the instruction OBJECT is sent in the
 answer.  If the object is not found - the instruction RSP with the
 non-zero basic return code is sent for the response.
 The instruction OBJ_SEEK may be sent broadcast through UDP.  In this
 case, it concerns to zero-session.  The instruction may contain the
 field REQ_ID for identification of answers.  The positive responses
 in this case must be sent only.  The response may be transmitted
 through UDP.

6.6.5.2 OBJ_GET_NAME

 The instruction "To get a name of the object" (OBJ_GET_NAME) is used
 for get of the name of object by number.  It has the following values
 of fields:
    OPCODE = 213
    OPR_LENGTH = 1
    Operands:
       4 octets: number of object for getting
 If the object is present - the instruction OBJECT with the extension
 header _NAME is sent for the response.  If the object is not present
 - the instruction RSP with the non-zero basic return code is sent for
 the response.

7 Chains

 The instructions, which will be sent on one session connection, can
 be unified in a chain.  The chain is a group of the instructions
 relational with each other.  In one session, several chains
 simultaneously can be transferred.  The chains can be the following
 types:

Bogdanov Experimental [Page 62] RFC 3018 Unified Memory Space Protocol December 2000

 o  The sequence.
 o  The transaction
 o  The fragmented instruction.
 If the instruction is included into a chain, the flag CHN should be
 equal 1.  The field CHAIN_NUMBER of header contains number of a
 chain, INSTR_NUMBER - serial instruction number in a chain, since 0.
 The numbering of chains is conducted by the protocol.  In one session
 simultaneously can be transferred up to 65533 chains.  Values of
 numbers of chains %x0000 and %xFFFF reserved by the protocol.  One
 chain can contain up to 65535 instructions.
 The instruction with a zero serial number INSTR_NUMBER should contain
 the extension header describing a chain.  Each type of a chain has
 own initiating extension header.
 _END_CHAIN.  The extension header "End of the chain" is transferred
 in last instruction of chain, irrespective of type of the chain.  It
 has the following values of fields:
    HEAD_CODE = 6
    HEAD_LENGTH = 0
    HOB = 1
 Number of a finished chain contains in a field CHAIN_NUMBER of the
 instruction header, to which the extension header is attached.
 The instructions, included in chains, can be transferred through UDP
 only if all chain is located in one segment.

7.1 Sequence

 The sequence is a type of a chain, which unites the instructions
 dependent from each other.  The following instruction of a sequence
 can be executed on VM, only if have been executed previous.  If the
 current instruction cannot be executed, all other instructions of the
 given sequence (already sent or expecting sending) simply cancel.
 Due to this, it is possible for one computing control thread not to
 wait for the current instruction positive end and to transfer
 following at once.
 _BEGIN_SQ.  The extension header "To begin a sequence" is transferred
 in the first instruction of the sequence.  It has the following
 values of fields:
    HEAD_CODE = 3
    HEAD_LENGTH = 0
    HOB = 1

Bogdanov Experimental [Page 63] RFC 3018 Unified Memory Space Protocol December 2000

 Number of created chain is established in field CHAIN_NUMBER of the
 instruction header, to which the extension header is attached.  The
 field INSTR_NUMBER must have value 0.
 The initiator of creation of a sequence is VM.  It is not obligatory
 that the sequence should have known length beforehand.  It can be
 completed in any moment.  If it is necessary to finish a sequence and
 there are no instructions for sending, the instruction NOP can be
 generated.

7.2 Transaction

 The transaction is a type of the chain uniting some possibly not
 connected with each other instructions.  All transaction instructions
 must be executed all at once or must not be executed.  It is possible
 to cancel or to confirm transaction execute.  The transaction
 cancellation after execution is not stipulated.  If it is necessary,
 such mechanism should be realized at VM level, because there can be
 instructions in transaction, which are impossible to cancel, for
 example a control transfer.
 The initiator of transaction creation is VM.  The transaction length
 must be known beforehand.  The length will define a way of
 transaction transfer.  It is connected with buffering described in
 section 7.4.

7.2.1 _BEGIN_TR

 The extension header "To begin a transaction" _BEGIN_TR is
 transferred in the first transaction instruction.  It has the
 following values of fields:
    HEAD_CODE = 4
    HEAD_LENGTH = 1
    HOB = 1
    DATA - Has the following format:
    +---+---+---+---+---+---+---+---+
    |TRE|TRR|TRS|      Reserve      |
    +---+---+---+---+---+---+---+---+
    |           TIME_TR             |
    +---+---+---+---+---+---+---+---+
    TRE
       1 bit.  The flag of obligatory execution.  This flag relates
       only to completely transferred, but have not yet executed
       transaction.  If TRE = 1, the transaction must be executed at

Bogdanov Experimental [Page 64] RFC 3018 Unified Memory Space Protocol December 2000

       the expiration of existence time, established by field TIME_TR,
       or at emergency session end.  If TRE = 0, at end of existence
       time the transaction must be cancelled and the negative
       acknowledgement must be transferred, and at emergency session
       end - must be simply cancelled.
    TRR
       1 bit.  The flag of execution after sending.  If TRR = 1, the
       transaction must be executed after sending of all instructions,
       of which it is consists, at once.  Such transaction is executed
       after reception of the instruction with the extension header
       _END_CHAIN.  If TRR = 0, it is necessary to transfer the
       special instruction EXEC_TR of transaction acknowledgement for
       its execution.
    TRT
       1 bit.  The flag of special processing.  It is entered for a
       possibility of the further expansion of the protocol.  If TRT =
       1, before transaction execution it is necessary to make some
       additional actions above the instructions, of which it is
       consists, for example to decipher.  These actions can be
       definite in the additional extension headers transmitted in the
       transaction instructions.  The given document will not define
       cases of use of this flag.  The value TRT must be zero.
    Reserve
       Must be set to 0.
    TIME_TR
       1 octet.  Time of transaction life in 2 - second intervals
       (maximal lifetime - 8 minutes).  The receiving side begins
       readout of this time after receiving all transaction
       instructions.  The value %x00 sets transaction without
       restriction of lifetime.
 In the last instruction of transaction the header, _END_CHAIN is
 always sent.

7.2.2 EXEC_TR

 This instruction "To execute the transaction" (EXEC_TR) is
 transferred for execution transaction early transferred.  It has the
 following values of fields:

Bogdanov Experimental [Page 65] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 158
    ASK = 1
    PCK = %b01/10/11
    CHN = 1
    EXT = 0/1
    CHAIN_NUMBER - Contains the number of chain, which is necessary to
                   execute.
    INSTR_NUMBER = 0
    OPR_LENGTH = 0

7.2.3 CANCEL_TR

 The instruction "To cancel transaction" (CANCEL_TR) is transmitted
 for a cancellation of execution transaction transmitted before.  It
 has the following values of fields:
    OPCODE = 159
    ASK = 0
    PCK = %b01/10/11
    CHN = 1
    EXT = 0/1
    CHAIN_NUMBER - Contains the number of chain, which is necessary to
                   cancel.
    INSTR_NUMBER = 0
    OPR_LENGTH = 0
 The instructions, of which the cancelled transaction consists, delete
 without a possibility of restoration.

7.3 Fragmented instruction

 UMSP is designed for work with the transport protocol with the
 limited size of transmitted data segment.  The fragmentation of the
 instructions is made in the following two cases:
 (1)  If the instruction is longer than the maximal segment size of
      transport layer or,
 (2)  If the segment is formed of the several instructions and last
      instruction is not located in it completely.
 The decision on fragmentation is taken to UMSP level.
 The fragmented instruction is encapsulated in several NOP
 instructions.  Then all instructions NOP are transmitted, as one
 chain of special type.  The following algorithm is used during
 encapsulation:

Bogdanov Experimental [Page 66] RFC 3018 Unified Memory Space Protocol December 2000

 (1)  The fields SESSION_ID and REQ_ID from the fragmented instruction
      are written in the first NOP instruction.  If field REQ_ID is
      not present in the initial instruction, it must not be in the
      NOP instruction.  The field SESSION_ID always is present in the
      fragmented instructions.
 (2)  Then these fields delete from the initial instruction.  The
      value of all other fields of the header does not change.
 (3)  After that, the initial instruction is divided into fragments of
      necessary length.  Each fragment is located in a field of
      operands of the NOP instruction.  Other data should not be
      entered in operand field.
 _BEGIN_FRG.  The extension header "The first fragment" is transmitted
 to the NOP instruction, which contains the first fragment.  It has
 the following values of fields:
    HEAD_CODE = 5
    HEAD_LENGTH = 0/2 ; Depends on subordination of the chain.
    HOB = 1
    Data:
       2 octets: Number of the parental chain.  Fragmented instruction
                 may be a part of the sequence or transaction.
       2 octets: The instruction number in the parental chain.
 The header _END_CHAIN is transmitted in NOP instruction, which
 contains last fragment.

7.4 Buffering

 In the given item, the buffering used by the protocol on receiving of
 data is described.  The question of buffering on sending lies beyond
 the scope of the protocol.
 If the instruction is not include in a chain, it is transmitted to VM
 for execution at once and does not require buffering at the protocol
 level.  The interface UMSP - VM must provide asynchronous
 instructions sending.  It is recommended, that the productivity of
 UMSP systems, should allow to process the instructions accepted from
 network, with that speed, with what they were received.  All
 instructions are designed so that carries out the known and limited
 computing loading.  Exception is the instruction of control
 transfers, which must be processed in two stages.  The instruction
 correctness is checked firstly and its scheduling is made.  Then the
 instruction is executed.  At that must be guaranteed that the
 protocol can receive such part of processor time, which would allow
 it to work in stationary mode.  Therefore, the questions of node
 overload are deduced on VM layer and user applications layer, where
 they can be sensible controlled.

Bogdanov Experimental [Page 67] RFC 3018 Unified Memory Space Protocol December 2000

 For chains, the protocol provides two schemes of buffering during the
 receiving:
 (1)  At the session connection establishment, the sides agree about
      the allocated buffer ("window") size.  The window always is more
      than the maximal segment of a transport layer.  The transmitting
      side can expect for this buffer without the preliminary
      coordination with the receiving side.  The window size is
      established single for each session connection, and cannot be
      changed in subsequent.  UMSP is designed for using of transport
      layer, which informs about the data delivery.  Therefore
      transmitting side traces the current free size of the window on
      the reception side for each connection without assistance.  If
      the reception side finds out, that the data have been received,
      which cannot be placed in the window, the connection is broken
      off.
 (2)  For transactions and fragmented instructions, which size exceeds
      the window, it is necessary to request the reception node the
      sanctions to sending.  The theoretical limiting size of chain
      transmitting so is 4 Gbytes.
 REQ_BUF.  The instruction "To request the buffer" requests at VM the
 buffer allocation for sending of transaction or large fragmented
 instruction ("Window").  It has the following values of fields:
    OPCODE = 24
    ASK = 1
    PCK = b01/11
    CHN = 0
    EXT = 0/1
    OPR_LENGTH = 1
    Operands:
       4 octets: The buffer required size in octets.  The value is
                 equal to the total size of all instructions of the
                 chain, including the size of the subordinated chains.
 The instruction is formed under the initiative of the protocol and it
 uses the instruction RSP_P as acknowledgement.  However, on the
 reception side the buffer is allocated at VM level, as VM has the
 most complete information about the task.  The interface between UMSP
 and VM must give possibility of asynchronous request of such buffer.
 The instruction REQ_BUF can be used irrespective of the possibility
 to place the chain in the buffer, allocated for session (window).  It
 is necessary to take into account, that the negative acknowledgement
 can be transmitted on this instruction, but using of a "window"
 guarantees sending.

Bogdanov Experimental [Page 68] RFC 3018 Unified Memory Space Protocol December 2000

 The subordinated chain on reception uses the buffer of the parental
 chain.
 The sequence sending will not require about the buffer allocation in
 difference of transaction or fragmented instruction.  If the single
 connection TCP is used for sending, the sequence buffering is not
 necessary.  If the multiple connections TCP with multiplexing are
 used, the sequence requires buffering for the disorder instructions.
 In this case, it is necessary to use the buffer, allocated for
 session.
 Transactions, at which flag TRR = 0, always must request the sanction
 for sending by instruction REQ_BUF, even if they can be placed in one
 segment of transport layer.
 The buffering of the fragmented instructions and transactions, at
 which flag TRR = 1, depends on their size:
 o  If the transaction is located in one segment of transport layer,
    it is transmitted without buffering.
 o  If length of a chain is no more then "window", it can be
    transmitted without request of the buffer of window allocation.
    Thus, the place in the buffer must be reserved before the sending
    begins.  The sending cannot be begun, if it is not enough places
    in the buffer.  In this case, it is possible to wait the window
    deallocation or to use the request instruction of the buffer
    allocation at VM REQ_BUF.
 o  If length exceeds the session window size it is necessary to use
    the instruction REQ_BUF.

7.5 Acknowledgement of chains

 The field REQ_ID in chains of any type is established only in the
 first instruction and concerns to all chain.  The all following
 instructions, including last, do not contain REQ_ID.
 The transport protocol used for chains sending, must inform about the
 end of data transfer, because it is necessary for the transmitting
 side to know the free size of the allocated session window on the
 reception side.
 If the chain uses the allocated VM buffer (the sanction to sending
 REQ_BUF was requested), or the chain completely locates in transport
 layer segment, the protocol on the transmitting side does not trace
 acknowledgement.

Bogdanov Experimental [Page 69] RFC 3018 Unified Memory Space Protocol December 2000

 If the sequence is transmitted, the transmitting side receives the
 information about free place of the buffer on the reception side by
 acknowledgement of transport layer delivery.  It can be made, as the
 regulated sequence instructions are transmitted VM at once after
 receiving and release the buffer.
 The fragmented instructions and transactions are not transmitted VM
 until its will be completely accepted.  If session window is use, the
 occupation of places in the buffer can be calculated upon
 acknowledgement of transport layer sending.  To trace free of places
 it is necessary to check execution acknowledgement by VM.  The
 following algorithm of sending is used for this purpose:
 o  The value of field REQ_ID, which has given VM for chain sending,
    is kept and it is enters the value established by the protocol
    instead of it
 o  The new value REQ_ID is transmitted in the first instruction of
    chain
 o  The chain completely collected in the session window on the
    reception side.  After linking, it is transmitted for execution on
    VM.  At that, the chain can continue to occupy a place in the
    buffer.
 o  After execution, VM informs about it to the reception side
    protocol.
 o  The protocol clears place in the allocated buffer.
 o  Then the protocol forms and transmits on chain acknowledgement
    RSP_P, instead of RSP, as in other cases.
 o  The transmitting side protocol corrects size of free place in the
    reception side buffer after reception of acknowledgement RSP_P.
 o  Then the old value REQ_ID is restored and the acknowledgement is
    transmitted to VM.

7.6 Base-displacement Addressing

 The memory base address for the relative addressing can be
 established for the instructions from one chain.  Thus, it is
 possible to use the abbreviated address memory fields in the
 instructions of chain.  The abbreviated addresses are used, as
 displacement from base.
 _SET_MBASE.  The extension header "To set memory base" establishes
 the value of base address for chain.  It has the following values of
 fields:
    HEAD_CODE = 7
    HEAD_LENGTH = 2/4/8   ; Depends on address length.
    HOB = 1
    DATA contains:

Bogdanov Experimental [Page 70] RFC 3018 Unified Memory Space Protocol December 2000

       4/8/16 octets: The base address.
 The length of address is 3 octets, enters the name in last octets of
 4-octets data field.  The initial octet is set to 0.  The base-
 displacement addressing is not used for nodes with address length 2
 octets.
 The value of memory base for a sequence may change.  The base must be
 established once in any instruction for all transaction instructions.
 The repeated establishment of transaction base is a mistake, which
 results refusal of transaction execution.

8 Extension Headers

 This section contains the description of the extension headers, which
 are not connected with the definite instruction.  The description of
 the specialized extension headers describes in the appropriate
 sections of this document.

8.1 _ALIGNMENT

 The extension header "Alignment" (_ALIGNMENT) allows to make any
 extension header or field of operands multiple of 4 - 16 octets with
 the step of two octets.  The protocol does not give any rules of use
 given extension header.  It can be used arbitrarily.  The header has
 the following values of fields:
    HEAD_CODE = 8
    HEAD_LENGTH = 1-7 ; Depends on length of the data field.
    HOB = 0
    DATA contains:
       2 - 14 octets: All octets of the field have the zero-value.
 The format of the protocol instructions provides the alignment of two
 octets field without any additional means.

8.2 _MSG

 The extension header "The any message" (_MSG) allows sending the
 textual message in symbols ASCII.  The order of this header
 processing at receiving can be anyone.  The message can be written in
 a log-file, be shown on the console or be ignored.  The header has
 the following values of fields:
    HEAD_CODE = 9
    HEAD_LENGTH = 1 - 127 ; Depends on data length of field.
    HOB = 0
    DATA contains:

Bogdanov Experimental [Page 71] RFC 3018 Unified Memory Space Protocol December 2000

       2 - 254 octets: The any text of the message.
 The instruction may contain several headings _MSG.

8.3 _NAME

 The extension header "The Name" (_NAME) allows specifying the job
 name, name of object or name of object procedure.  The header has the
 following values of fields:
    HEAD_CODE = 10
    HEAD_LENGTH = 1 - 127 ; Depends on length of a field of data.
    HOB = 0
    DATA contains:
       2 - 254 octets: The text of the name in symbols ASCII.

8.4 _DATA

 The extension header "The Data" (_DATA) is used for data transfer in
 the instructions of exchange between VM, if the data cannot be placed
 in operands.  It allows transferring up to 4 Gbytes of data in one
 instruction.  The header has the following values of fields:
    HEAD_CODE = 11
    HEAD_LENGTH = 1 - 2 147 483 647 ; Depends on length of the data
                                      field.
    HOB = 1
    DATA contains:
       2 - 4 294 967 294  octets : Binary data in an any format.

8.5 _LIFE_TIME

 The extension header "The lifetime" (_LIFE_TIME) contains value of
 time.  It has the following values of fields:
    HEAD_CODE = 12
    HEAD_LENGTH = 1/2; Depending on length of data.
    HOB = 1
    DATA contains:
       2/4 octets: The time in 1,024 milliseconds intervals.
 The header _LIFE_TIME allows to set limiting time of sending of the
 instruction to VM of the addressee.

Bogdanov Experimental [Page 72] RFC 3018 Unified Memory Space Protocol December 2000

 The instruction lifetime is calculated as follows:
 o  On the transmitting side the time of waiting in a queue to the
    transport layer is taken into account.  The value of the lifetime
    decreases on the waiting time value now of the transport layer
    package formation.
 o  On the reception side the lifetime is taken into account only for
    the fragmented instructions.  The value of the lifetime decreases
    on time of the instruction assembly value.  This header is ignored
    at receiving for no-fragmented instructions.  Its value must be
    sent to VM.
 o  The time of sending at the transport layer is not taken into
    account.  For the fragmented instructions, only the time of
    sending of the first fragment is not taken into account.
 The end of lifetime at the instruction relating to sequence finishes
 the sequence sending.  The header _LIFE_TIME must not be used at
 transactions sending.
 If the instruction is fragmented, the header _LIFE_TIME is sent only
 in the instruction NOP, containing the first fragment.  This header
 deletes from the initial fragmented instruction.  If the time is
 over, when the fragmented instruction part has not been transmitted
 yet, the stayed part of the instruction is cleared.
 The instruction lifetime is established by the sender VM and must be
 sent together with data to the addressee VM.  If the time of life
 expires, the instruction is rejected and the negative response (if
 ASK = 1) is sent to it.  If ASK = 0, the response is not sent.
 The header _LIFE_TIME may be used in the multimedia systems and in
 the real time systems.  The protocol may raise the priority of
 sending for data with coming to the end lifetime.

9 Search of resources

 Virtual Machines are the identified resources of the protocol.  The
 VM standardization is not function of UMSP.  The protocol gives
 transparent environment for transportation of the code and data of
 any type.
 For VM, connected to the protocol, the following values are
 established:
 o  The VM type.  The range of values 1 - 65534.
 o  The VM version.  The range of values 1 - 65534.

Bogdanov Experimental [Page 73] RFC 3018 Unified Memory Space Protocol December 2000

 The protocol requires obligatory compatibility from bottom-up for VM
 of one type and different numbers of the versions (VM with larger
 number of version must be able to execute the VM code with any
 smaller number of version).
 Numbers of VM types are broken on the following ranges:
   1 - 1023       Assigned for standard VM
   1024 - 49151   Assigned for registered VM of the users
   49152 - 65534  Free (defined for dynamic and/or private VM)
 Numbers of types and versions %x0000 and %xFFFF are reserved by the
 protocol.
 Several VM of different types may be united in a group.  All VM,
 included in a group, must work in the common space of local memory
 and have the common subsystem of the jobs control.  It means, that if
 the same 128-bit address is met in anyone VM code for one task, it
 must specify one physical cell of memory.  The performance of the
 specified conditions allows executing multivendor user code
 (containing procedures for different VM) on one node.  All VM,
 included in a group, must have the different types.  The group can
 include no more than 65534 VM.  One number of group on different
 nodes may identify groups with different structure VM.
 To each group VM on the node the code of group of 2 octets length is
 assigned.  So long as the node has even one session connection, the
 codes of groups must not change.  It is recommended to change the
 code of group only at reconfiguration of the node.  The group VM is
 identified, as well as one VM.  Thus, the type VM is set to 0, and
 the number of group is assigned to VM version.
 The support of association VM in groups is optional requirement of
 the protocol.  The multivendor user code can be executed, even if the
 association in groups is not provided.  For this purpose, the
 procedures containing a different type of a code must be executed on
 different nodes.
 UMSP gives the instructions of search of the VM, which allow
 defining, what VM and the groups VM are connected at the given moment
 to the protocol on the definite node.
 The instructions of search of the VM can be sent upon TCP or UDP.
 The broadcasting dispatch can be used.  The node can independently
 notify about VM, available on it, for example at start, or to respond
 on others VM requests.  The answerback instructions must be sent
 under the same protocol, on which the request was received.

Bogdanov Experimental [Page 74] RFC 3018 Unified Memory Space Protocol December 2000

 VM from ranges of numbers 49152 - 65534 or any group VM may be
 identified on names.  VM with numbers 1 - 49151 must not have names
 at a layer of the instructions UMSP.

9.1 VM_REQ

 The instruction "To request the VM" (VM_REQ) allows finding out VM,
 connected on the remote node.  The instruction has the following
 values of fields:
    OPCODE = 25
    PCK = %b00
    CHN = 0
    ASK = 0/1
    EXT = 0/1
    OPR_LENGTH = 0 - 65534 ; Depending on quantity VM in operands.
    Operands:
       2 octets: The type required VM.  The value 0 is not allowed.
       2 octets: The version required VM.  The value 0 is not allowed.
                 The value %xFFFF requests the most senior version.
       .
       .
       .
       2 octets: The type required VM.
       2 octets: The version required VM.
    The optional extension header:
       _NAME - This header contains the name of required VM or VM
               group.
 The instruction without operands is used for request of all types VM,
 connected on the node.  The instruction with one VM in operands
 requests the information on one VM.  If it is contained several VM in
 operands, the group VM containing all specified VM is requested.  The
 type and version in list VM must be indexed on increase.
 To request VM, used at work without session connection, the VM type
 and VM version must have the value %xFFFF.
 The header _NAME is not connected with value of operands.  For it,
 the separate answer must be transmitted.

9.2 VM_NOTIF

 The instruction "To notify about VM" (VM_NOTIF) is used for the
 notification of one VM or one VM group attached on the node.  The
 instruction has the following values of fields:

Bogdanov Experimental [Page 75] RFC 3018 Unified Memory Space Protocol December 2000

    OPCODE = 26
    PCK = %b00
    CHN = 0
    ASK = 0/1
    EXT = 0/1
    OPR_LENGTH = 1 - 65534  ; Depending on quantity VM in operands.
    Operands:
       2 octets: The used transport protocol.  The following values of
                 this field are definite:
          x0100 - Single TCP connection through the port 2110.
          x0101 - Multiple TCP connection through the port 2110.
          x0102 - Single TCP connection through ports 2110 and UDP
                  through ports on receiving 2110.
          x0103 - Multiple TCP connection through ports 2110  and UDP
                  through port on receiving 2110.
          The port 2110 must be opened on the one side or both side at
          each TCP connection.
       2 octets: Reserved.  This field must not be analyzed by the
                 protocol during the receiving in the current
                 realization of the protocol.  It must be set to 0 at
                 sending.
       2 octets: The type VM.
       2 octets: The version VM.
       .
       .
       .
       2 octets: The type VM.
       2 octets: The version VM.
    The optional extension header:
       _NAME - This header contains the name by separate VM or group VM
               from operands of the instruction.
 It is necessary to generate several instructions, if it is required
 to inform about several VM or groups.  It is necessary to form the
 separate instructions for each protocol, if the node provides several
 transport protocols.
 If the instruction is used for the response to VM_REQ request, it can
 contain ASK = 1 and REQ_ID, established in value from the instruction
 of request.  If the VM group was requested, the instruction must
 contain several VM.  First VM must have the type set to 0 and the
 version must contain the number of group.  Others VM must define
 structure of group.  The type and version in VM list must be indexed
 on increase.

Bogdanov Experimental [Page 76] RFC 3018 Unified Memory Space Protocol December 2000

 The protocols, contained in the instruction VM_NOTIF, may differ from
 the protocol, through which this instruction is transferred.

10 Security Considerations

 The present document contains the description of the functions,
 minimally necessary for the realization of the declared task -
 immediate access to memory of the remote node.  To reduce initial
 complexity of the protocol, the decision of safety questions is not
 included in the document.  All reasons of the given unit are the
 recommendations to the further expansion of the protocol.
 For the description three nodes are used - node A and node B are
 exchanges the data.  The node G is JCP.
 Protection against sniffing, spoofing and hijacking:
    (1) The means specifies in TCP/IP can be used.
    (2) There is a possibility to create chains with the special
        processing.  To create such chain, it is necessary to transfer
        the extension header, determining the special processing, in
        the first instruction of the chain.  The instructions of chain
        can be encapsulated in the NOP instructions.  The algorithms
        of the control of instructions sequence integrity or the
        encryption can be realized in such a way.
 Protection against the man-in-the-middle:
    The protection is based on the fact, that the routes between nodes
    A - B, A - G and G - B is not crossed.  Such scheme allows
    organizing the additional managing dataflow, allowing revealing
    such type of attack.  If the specified routes pass through one
    gateway, this protection is less effective.
 Authentication:
    The protocol working is based on a principle of the centralized
    control.  It allows using several schemes of authentication.  The
    parameters of authentication are sent in the extension headers.
    The establishment of session connection can contain up to eight
    handshakes.  It also raises flexibility at a choice of
    authentication algorithm.  The realization of authentication is
    possible between three pairs nodes A - B, A - G and G - B.  All
    pairs can be used in any combination.  The node G can be specially
    allocated for realization of authentication.

Bogdanov Experimental [Page 77] RFC 3018 Unified Memory Space Protocol December 2000

 Protection against denial-of-service:
    The instructions of the protocol have definite computing loading.
    It allows projecting the node so, that it can process the
    instructions with such speed, with what they are accepted from the
    network.  A possible reason of an overload is the instructions
    JUMP and CALL.  VM must solve this problem.  It has the complete
    information about the user task and can make a decision on the
    amount of allocated resources.  The decision of a problem is the
    failure in service for low-priority traffic.
 Protection at the applications architecture level:
    The protocol allows creating the applications of any architecture.
    It is possible due to an asymmetric structure of connection.  It
    is possible to allocate three basic groups:
    (1) The client who is carrying out terminal functions and
        client/server technologies.  The security of such systems is
        completely defined by the server.  Such architecture is
        represented most protected.
    (2) The client, loading an active code from the server.  It is the
        least protected architecture, from the client point of view.
        On the server side, there are no special requirements upon
        protection.
    (3) The client, who is executing his code on the server.  This
        architecture is safe for the client.  It is necessary to
        strengthen the protection on the server.  The functionalities
        of such architecture do not differ from architecture of
        loading by the client of an active code.  If ones take into
        account, that the server is the specially allocated computer,
        the given architecture is optimum.
        All given technologies may be used simultaneously in any
        combination.

11 Used Abbreviations

 API    Application Programming Interface.
 CTID   JCP assigned the Control Task IDentifier to each task of the
        job.  Its length is equal to length of the local address
        memory on the node JCP.

Bogdanov Experimental [Page 78] RFC 3018 Unified Memory Space Protocol December 2000

 GJID   Globally Job IDentifier is assigned for the each job. GJID is
        defined on the JCP node.  It has the same format, as the 128 -
        bit address of node JCP memory has.  The address of local
        memory is replaced on CTID of the first (initial) task of the
        job in it.
 GTID   Globally Task IDentifier is assigned to each task.  GTID has
        the same format, as the 128 - bit address of node memory has.
        The address of local memory is replaced on LTID in it.
 JCP    Job Control Point.  This node will control the job.
 LTID   Locally Task IDentifier is assigned to each active task on the
        node.  LTID length is equal to the local memory address length
        defined for the node.
 VM     Virtual Machine.

12 References

 [1]  Bradner, S., "The Internet Standards Process -- Revision 3", BCP
      9, RFC 2026, October 1996.
 [2]  Bradner, S., "Key words for use in RFCs to Indicate Requirement
      Levels", RFC 2119, March 1997.
 [3]  Crocker, D., and  P. Overell.  "Augmented BNF for Syntax
      Specifications: ABNF", RFC 2234, November 1997.
 [4]  Postel, J., "Transmission Control Protocol - DARPA Internet
      Program Protocol Specification", STD 7, RFC 793, September 1981.
 [5]  Postel, J., "User Datagram Protocol", STD 6, RFC 768, August
      1980.
 [6]  Srinivasan, R., "RPC: Remote Procedure Call Protocol
      Specification Version 2", RFC 1831, August 1995.

Bogdanov Experimental [Page 79] RFC 3018 Unified Memory Space Protocol December 2000

13 Author's Address

 Alexander Y. Bogdanov
 NKO "ORS"
 22, Smolnaya St.
 Moscow, Russia 125445
 RU
 Phone: +7 901 732 9760
 EMail: a_bogdanov@iname.ru

Bogdanov Experimental [Page 80] RFC 3018 Unified Memory Space Protocol December 2000

14 Full Copyright Statement

 Copyright (C) The Internet Society (2000).  All Rights Reserved.
 This document and translations of it may be copied and furnished to
 others, and derivative works that comment on or otherwise explain it
 or assist in its implementation may be prepared, copied, published
 and distributed, in whole or in part, without restriction of any
 kind, provided that the above copyright notice and this paragraph are
 included on all such copies and derivative works.  However, this
 document itself may not be modified in any way, such as by removing
 the copyright notice or references to the Internet Society or other
 Internet organizations, except as needed for the purpose of
 developing Internet standards in which case the procedures for
 copyrights defined in the Internet Standards process must be
 followed, or as required to translate it into languages other than
 English.
 The limited permissions granted above are perpetual and will not be
 revoked by the Internet Society or its successors or assigns.
 This document and the information contained herein is provided on an
 "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
 TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
 BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
 MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

 Funding for the RFC Editor function is currently provided by the
 Internet Society.

Bogdanov Experimental [Page 81]

/data/webs/external/dokuwiki/data/pages/rfc/rfc3018.txt · Last modified: 2000/12/19 23:10 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki