Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
A"D-R124 874 CONTINUED DEVELOPMENT AND IMPLEMENTATION OF THE 1/3PROTOCOLS FOR THE DIOITAL..CU) AIR FORCE INST OF TECHURIONT-PATTERSOM AFB OH SCHOOL OF ENGI. C H HAZELTON
UNCLASSIFIED DEC 82 AFIT/GE/EE/82D-37 9/2G,9/2
lmhhsohmohmoiIonhhhhhhhonh1honhI
-.~. L3 2
W..
,
16 11.6"
L6I, , ... ,,. , I . .
.
l 2N 5 '25
.- i; MICROCOPY RESOLUTION TEST CHART -.
AI O L -O
S -
S- 111*1
. . .. . . . . . , .. . . . ... . .. . .. .:- - . .
~OF
CONTINUED DEVELOPMENT AND IMPLEMENTATIONOF THE PROTOCOLS FOR THE
DIGITAL ENGINEERING LABORATORY NETWORK
THESIS
AFIT/GE/EE/82D-37 Craig H. HazeltonCapt USAF
DTICELECTE
FEB 2 51983
6 DEPARTMENT OF THE AIR FORCE DAIR UNIVERSITY (ATC)
. AIR FORCE INSTITUTE OF TECHNOLOGY
Wright- Patterson Air Force Base, Ohio
-MM noN SATMEM A I 83 02 024 032Alppved ior public zeleose
ma--tbutio U n e I
AFIT/GE/EE/82D-37
Accession ForNTIS GRA&I
DTIC TABUnannounced [-Justification
H By-
Distribution/ 1 0.Availability Codes .
Avail and/or 0Dist Special
CONTINUED DEVELOPMENT AND IMPLEMENTATIONOF THE PROTOCOLS FOR THE
DIGITAL ENGINEERING LABORATORY NETWORK
THESIS
AFIT/GE/EE/82D-37 Craig H. HazeltonCapt USAF
A-.s
Approved for public release; distribution unlimited.
4. -
AFIT/GE/EE/82D-37
CONTINUED DEVELOPMENT AND IMPLEMENTATION
OF THE PROTOCOLS FOR THE
DIGITAL ENGINEERING LABORATORY NETWORK
THESIS
Presented to the Faculty of the School of Engineering
of the Air Force Institute of Technology
Air University
in Partial Fulfillment of the
Requirements for the Degree of
Master of Science
by
Craig H. Hazelton, B.S.
Capt USAF
Graduate Electrical Enginegring
December 1982
Approved for public release; distribution unlimited.
- - Preface
This report presents further design and implementation
of the Air Force Institute of Technology's Digital
Engineering Laboratory Network (DELNET) operating system
protocols. It is hoped that the protocol designs, of this
thesis effort, will provide a firm base on which future and
continued research can depend.
I would like to take this opportunity to express my
sincere appreciation to Dr. Gary Lamont, my thesis advisor,
for his guidance and patience during this effort. Dr.
Lamont's philosophy of the thesis effort focusing on the
aspects of learning and quality rather than mere quantity
has made this thesis effort a truly rewarding experience. I
q- would also like to thank Capt. Geno Cuomo whose concurrent
thesis efforts provided me with assistance and insight into
the hardware aspects of this project. I would like to thank
the personnel of the DEL, especially Capt. Lee Baker and
Mr. Dan Zambon, for their assistance and enthusiasm in all
matters relating to this project. I would like to extend my
appreciation and best wishes to my fellow students whose
support and humor have made this project an enjoyable
experience.
Foremost, I would like to dedicate this thesis to my
wife, Karen. She has provided me with love and support for
over fourteen years. For this, I will be eternally
- grateful.
Page
Preface . . . . . . . . . . . . . . .. . .. . . . . ii
List of Figures . . . . . . . . . . . ... . v
List of Tables . . . . . . . . . . . . . . . . . . .. vi
Abstract .. . . . . . . . . . . vii
I. Introduction . . . . .1 . .. . . - 1
Historical Perspective .. . . . . . . . . . . 1- 2Background . . . . . . . . . . . . a 0 . . * . 1- 4Problem and Scope . . . . . . . .. . 1- 6Approach/Objectives . ............. 1- 6Overview of the Thesis . . . . .. . . . . . . 1-11
II. Functional Requirements and Standards ...... 2- 1
Introduction ............ ... 2- 1Global Requirements . . . . . . . . . . . . . . 2- 1Fibility .... ee2
Virtual Operation ........... 2- 2Performance Monitoring . . . . . . . . . . . 2- 3
Global Standards . .... . . . . . 2- 3Physical Layer. .. . ..... .... 2- 6Data Link Layer .............. 2- 6Network Layer ............... 2- 6Transport Layer . . . . . . . * . 6 . . * . 2- 6Session Layer . . . . . . . . . . . . . o . 2- 7Presentation Layer ............ . 2-7Application Layer . . . ........ . 2- 7
System Requirements. .......... 2- 7Packet Switching Protocol o . . . . . . . . 2- 8Routing Techniques . . . . o . . . . . . . . 2- 8
System Standards . , *....... , .. ..... ..... 2- 9Detailed Requirements . . . . . . . . . . . * * 2-10
Network Operating System . . . . . o . . . . 2-10Detailed Standards v * .*. . .. . . . . . . . 2-13
Physical Layer . . .... ......... 2-134 Data Link Layer . . .. * e v o * . . 2-15
Network Layer . . ............. 2-15Summary . . . . . . . . . . . . . . . . . . .. 2-18
Nb iii
Page
III. The Physical Layer 3- 1
Introduction .... 3- 1Theoryctn . . . . . . . . . . . . . . . . . 3- 1
Twisted Wire Pair . . . . . . ....... 3- 2Coaxial-Cable ............... 3- 3Fiber Optics . . . . . . . . . . . . . . . . 3- 3
DELNET Implementation . . ........... 3- 5Summary . . . o . . 3- 6
IV. Data Link Layer . . . 4- 1
Introduction ................. 4- 1Design Considerations 9 . .. . . 4- 1DELNET Design and Implementation ....... 4- 4Summary . . . . . . . . . . . . . . . . . . . . 4-16
V. The Network Layer . . . . . .. .. ....... 5- 1
Introduction ............. 5- 1Design Considerations. . . . . ........ 5- 1DELNET Design and Implementation . . . . ... 5- 3Summary . . . . . . . . . . . . . . . . . . 5-13
VI Software Configuration and Validation ...... 6- 1
Introduction .... 6- 1Test Environment and Software Configuration . . 6- 1DELNET Software Configuration . . . . ..... 6- 3Software Test and Validation . . . . . . . . . 6- 9Summary . . . . . . . . . . . * * 6-15
VII. Conclusions and Recommendations . o . . . . . . . 7- 1
Conclusions . . . . . . . . . . . . . . . . . 7- 1Recommendations ................ 7- 4
Bibliography . . . . . Bib- I
Appendix A: Data Dictionary . . . . . . . . . . . . . A- 1
Appendix B: Data Dictionary Cross Reference . . . . . . B- 1
Appendix C: Software Listings . . . . . . . . . . .. C- 1
Section I - Local Operating System ..... C- 2Section II - Network Operating System ..... C-50Section III- Shared Compnents . . . . . . . . C-87
Vita . . . . . . V-i
iv
LFigures
Figure Page
1 Initial DELNET Configuration . . . . . . . . . . . . 1-10
2 ISO Protocol Model with UNID . . . . . . . . . . . . 2- 5
3 Protocol Hierarchy at the Systems Level . . . . . . 2-11
4 Link Access Procedure Frame Format . . . . . . . . . 2-16
5 Hierarchy of DELNET Standards . . . . . . . . . . . 2-17
6 DELNET Frame Format Scheme . . . . . . . . . . . . . 4- 6
7 Main Driver for Network Operating System . . . . . . 4- 9
8 RouteIn Procedure for Network Opertirig System . . . 4-10
9 Routeout Procedure for Network Operating System . . 4-11
10 Subordinate Procedures for Network Operating System. 4-12
11 Network Layer's View of Data Packet . . . . . . . . 5- 5
12 Local and Network Operating Systems' Table Buffers . 5- 6
13 Main Driver for Local Operating System ....... 5- 8
14 RouteIn Procedure for Local Operating System . . . 5- 9
15 Routeout Procedure for Local Operating System . . . 5-10
16 Subordinate Procedures for Local Operating System . 5-11
17 UNID Memory and Processor Configuration . . . . . . 6- 4
U| V
L±LL ps
Table Page
2 Hierarchy of DELNET Requirements . . . . . . . . . . 2-14
1 Software Modules Implementing DELNET Operating System 6- 6
vi
"° Abstract
Development of the Air Force Institute of Technology's
Digital Engineering Laboratory Network (DELNET) was
continued with the design and implementation of the first
three layers of the DELNET's Operating System protocol
structure. This effort centered on the actual software
module development and their relationships to established
standards for local area network protocol structures. The
overall system organization and protocol structure followed
the recommendations of the International Standards
Organization's (ISO) Reference Model for Open Systems
Interconnections. Within these guidelines, the Data Link
Layer was developed utilizing a selected subset of the Link
Access Procedure Protocol (LAP) adapted by the Consultive
Committee for International Telephone and Telegraph
(CCITT). The third protocol layer was developed utilizing
an appropriate subset of the X.25 Packet Switching Protocol
standards which were also adapted by of the CCITT. This
study formulates the specific requirements, designs, and
implementations of these protocol layers and presents
recommendations for future research and development.
vi
6| vii
-.- w - . - . ..
\I INTRODUCTION
The purpose of this thesis investigation is to continue
the design and implementation of the software necessary to
perform intercommunications between host-to-host computer
devices and host-to-node computer devices for the Air Force
Institute of Technology's (AFIT) Digital Engineering
Laboratory Network (DELNET). AFIT's DELNET is a proposed
local computer network (LCN) whidh will interconnect a
series of independent stand alone minicomputers and
microcomputers confined within a local area of the Digital
Engineering Laboratory (DEL). The DELNET in'turn will
eventually connect to the AFIT Local Area Network (ALAN).
Much of the research for this thesis effort is sponsored by
the Rome Air Development Center (RADC) located at Griffis
AFB, NY. under AFIT's post doctorial reseach program.
A tremendous concentration of research has been spawned
by industry to place computers and their peripheral devices
into LCNs (Ref 11) . The driving force for this intense
research is two fold. First is the tremendous power gained
by combining several processors to accomplish a single task
or multiplicity of tasks. And the second is the tremendous
savings involved in sharing both software and hardware
resources by reducing duplication of effort. The initial
dominant influences for network design has evolved from
private vendors whose designs were implemented with vendor
unique hardware and software (Ref 19). Fortunately, much of
the software design occured during the same -time period as
4[' 1-1
the general computer software community was transitioning to
modularized design and top down analysis. For this reason,
throughout industry there has been a general acceptance of
structured design levels or rules called 'protocols'. It is
through this philosophy of strictly detined levels of
protocols that this investigation is based.
Since the advent of modern 'computers in the late
1940's, researchers have continually attempted to reduce the
physical size and increase the speed of computers. As these
goals are achieved, computers generally become more
accessible and flexible in their applications. Several
milestones in recent electronic history have made this goal
a reality. The first was the development of the transistor
and solid state electronics. The second was the development
of integrated circuits and their large scale integration
(Ref 6). Additional developments include the advancements
in transmission line technology using broadband techniques
rather than the more conventional baseband (Ref 12).
Computers have become so diversified and relatively
inexpensive that their availability is well within the reach
of practically all institutions and many individuals.
But even with the greatly improved accessability and
reduced size and cost of computers, many limitations still
exist. For example, large main frame computers are required
for a wide variety of applications. These computers remain
large, expensive, and often out of reach of many potential
1-2
users. Additionally, small minicomputers and microcomputers
have limitations such as relatively small memories and slow
computational speeds. Peripheral equipment such as
secondary storage devices are costly and are only used a
fraction of the time when they are connected to dedicated
small computers. Large data bases are not only costly but
must be shared by many users simultaneously in order to be
effective and cost efficient. These are just a few reasons
why networking has become a necessity. By interconnecting
computers into a network, each computer's capability can be
greatly increased and the costs of both hardware and
software can be significantly reduced by sharing valuable
resources.
Often when new technology is developed, additional
forms of technology must be developed to function as a
technological buffer or bridge before the new technology can
be appli' d. The time span from first conception to actual
application may be several years. Fortunately this is not
the case for the development of LCNs. The phenominal
advances in large scale integration which have made the
advent of minicomputers and microcomputers a reality are
also the vehicle which makes it possible to develop the
interfaces for placing these computers into networks. These
network interface units (NIt]) are normally microprocessor
controlled devices with inputs, outputs, and memory; the
same components which compose the computers themselves. In
fact, the NIUs may be thought of as special purpos.
01 -3
computers which are architecturally designed for interfacing
with other computers for the purpose of routing information
into and out of the network.
It became readily apparent to the military that the
distributed processing and resource sharing of the LCNs were
of great importance from both an economical and operational
viewpoint. In 1977 a technical report was produced by the
1842 Electrical Engineering Group at Scott AFBr Ill (Ref
23). This report stated the necessity fo r
compute r/communi cations networks and presented assessments
on the feasibility and economics concerning such a network.
This report included a scenario for a typical military
lw facility communications network which incorporates a
multi-ring topology. The report specified five distinct
types of NIUs to be used as the distributed communication
concentrators. A 1980 AFIT thesis concluded that these five
NIU types could be combined into a single universal WIU (Ref
3) . Later that same year, another AFIT MS student designed
a prototype Universal Network Interface Device (UNID) as his
AFIT MS thesis (Ref 2). In late 1981, an upgraded prototype
UNID was constructed and partially demonstrated as part of
4 another AFIT MS thesis effort (Ref 17) . Although the UNID
was successfully demonstrated in part, it had several
hardware design problems which required upgrading before its
4 full capabilities could be demonstrated. Concurrent with
this thesis effort, a continuation of the upgrade to the
1-4
UNID is being conducted (Ref 4).
As the UNID development progressed, the AFIT DEL became
interested in using the UNID as the DELNET's interface
medium (Ref 11). With its abundance of minicomputers and
microcomputers, the DEL was an ideal environment to test
both the UNID's suitability as a NIU and the feasibility of
interconnecting the DEL's varied population into a LCN.
There were three basic advantages of- placing the DEL into a
network. The first two of resource sharing and distributed
processing were previously discussed. The third reason is
that the DELNET would provide an ideal vehicle for state of
the art research and study by AFIT students and faculty.
As a result of this interest, AFIT sponsored another
thesis project to identify requirements and specify an
initial design for the DELNET. That thesis included in the
performance capabilities: virtual system transparency,
software tool sharing, peripheral device sharing, file
, transfer, potential for additional network interface, and a
distributed data base applications (Ref 11). The thesis
4 included in its hardware specifications: loop network
topology, a two UNID system connected by a fiber optic link
for the network bus, and three host computers (Ref 11).
4d Another AFIT MS thesis effort continued the design of
the DELNET from a software viewpoint (Ref 9). That
investigation determined the overall structure of the DELNET
protocols and partially implemented and successfully
demonstrated several modules of software from .both the local
1-5
-. . .. . - -. .. . , , . ,
and network side of the UNID.
Problem And Scope
This study focused on the areas necessary that would
make the UNID functional at its minimum level. A minimum of
operations should consist of being able to have one host
computer interject a message packet through its UNID and
onto the network. A second UNID should be able to sieze the
packet and properly route it to its appropriate host.
The purpose of this study was to continue the
development of the host-to-host and host-to-node protocols
required for DELNET implementation. It included
continuation of development and implementation of the UNID
operations, the implementation of a local and network
operating systems for the UNID, and a generalized
methodology for the host computer implementation.
ARoroach/Obiectives
The intial approach in solving the problem of network
design consisted of performing an extensive literature
search to gather as much of the available information as
possible. The enormous volumes of information was
indicative of the attention focused on computer and
communication networks in recent years. In addition to this
information, all previous theses from AFIT that pertained to
the DELNET and UNID were studied.
It is the objective of this investigation to build upon
these previous thesis efforts and continue the protocol
Fi i-6
implementation and software development. As in the previous
I research, the main framework for the protocol structures is
a modularized structure using a top down approach. It is
also important to use established documented standards
within this framework. This effort enables follow on
development to continue with a minimum of rework; it enables
modifications and revisions easily and efficiently; and it
reduces the cost of additions.
The philosophy of top down design is sound and although
it is seldom used, it is the accepted standard throughout
industry (Ref 14). However, for actual implementation it
has several drawbacks. For example, if the design begins at
the highest level and sequences downward to smaller
sub-modules, the proper perspective is maintained but the
overall structure cannot be exercised until the bottom most
module is complete. This is especially true if the top
modules must use the lower modules to perform their tasks.
The development of the DELNET's operating system combines
the hierarchial structure of the protocol and structured
programming which comprise the software for developing this
protocol. This development is analogous to the construction
of a high rise building. The design begins from the
architectural view of the entire building and gradually
becomes more specific and narrow in scope until finally the
intricate details are designed. The actual construction of
the building on the other hand, must begin on the ground
level and slowly move toward the larger final product. The
1-7
protocol hierarchy of the DELNET operating system is similar
to that of a high rise building. Each protocol layer is
like a level of the building of which the lower levels must
be climbed before reaching the top. A similar analogy can
be drawn between the hierarchial structure of the protocol
levels and that of the top down design of structured
programming. This comparison is not subtle, however. It is
through the new Systems Engineering philosophy of structured
analysis that both were derived.
While the overall framework and global design of the
DELNET operting system is based on the top down approach,
the actual implementation will be based on a bottom up
approach. The lower levels of protocol are established,
tested, and built upon. In this manner, the basic network
functions can be used until the higher levels can be
developed. Additionally, the lower levels can be used to
help test and verify the upper levels during
implementation. In using this approach two important points
must be continually addressed. The first is that even
though the levels are being implemented from the bottom,
they must conform to the overall framework established in
the top down design. And secondly, each protocol level in
itself is treated as a complete entity and is designed in
the top down fashion. Keeping these facts foremost, the
design of the network began.
It was not feasable to attempt to incorporate all the
minicomputers and microcomputers in the DEL for current
4€ 1-8
thesis efforts. For this reason a small subset was chosen.
The most logical choice was the Zilog MCZ 1/25 microcomputer
which was used as the software development system for the
DELNET. The most attractive aspect of this system is that
it is dedicated to this thesis effort and was available at
any time. The additional choices for implementation
included the DEC LSI-ll, DEC Vax 11/780, and Data General
Eclipse S/250. These latter choices were made because each
uses the Pascal programming language and support a variety
of highly desirable peripheral equipment. The primary
reasons for selecting Pascal as the programming language
were due to its modularized structured design, and its
availability to APIT students both in hardware and detailed
instruction. The proposed initial DELNET configuration is
shown in Figure 1.
The initial plan was to incorporate the MCZ 1/25 and
LSI-11 microcomputers into the network. The MCZ was chosen
because of its availability and dedication to this project.
The LSI-11 was chosen due to the familiarization to the
personnel involved with this project and its availaility
during the time period of this investigation. As the
software for succesive levels of protocol was developed, it
was to be tested and validated. When the system was able to
properly transmit, route, and receive message packets from
one host to the next, the additional computers were to be
incorporated into the network.
1-9
LSI -,.1 VAX ECLIPSE
11/780 S/250
HOST 2 HOST 3HOST 4
LOCAL BUSSES
NETWOR~K BUS
MCZ 1/25
Figure 1. Initial Delnet Configuration
1-10
Ovgriaw l Thesais
The overall structure of this thesis parallels the
developmental structure of the DELNET protocols. Chapter II
presents the overall network structure which discusses the
functional requirements and standards used in the protocol
development. Subsequent chapters present a single level of
protocol and its design and implementation. Chapter VI
describes the software configuration, testing, and
validation of the DELNET operating system. The final
chapter summarizes the report and makes recommendations for
future research and development. The appendices contain
software and supporting documentation for the main portions
of this thesis effort.
u. tional Reguirements And StandArds
Introduction
This chapter introduces the functional requirements
which are applicable to this project and the standards which
govern it. These requirements and standards result from the
initial design of the UNID and DELNET which were addressed
in Chapter I. This chapter is separated into three sections:
global requirements, system requirements, and detailed
requirements.
The global level requirements are those which apply in
general to all phases of the project. System level
requirements are those which have multiple influences
including the global requirements, technical aspects of the
LCNs, and constraints of initial DELNET configuration. The
detailed level requirements are those network functions
which specifically apply to the operation and application of
the DELNET. The standards which govern these requirements
are presented in each section.
Global Reuirements
Global requirements are basically abstractions and deal
with the characteristics of an idealized system. They were
initially defined by a 1980 AFIT Thesis (Ref 11) as the
wDesign-Oriented Functional Requirements". They include
flexibility, virtual operation, and network performance
monitoring.
Flexibilitf. Flexibility is a term which has become
S2-1
increasingly used in recent years whenever discussing new
technology and designs. Because of growing costs,
specifically in the area of new system design and
development, it has become necessary to build in
'flexibility' so that a product can be used for a variety of
tasks with little or no modifications. This philosophy is
sound and has often been proven to save both time and
money. Care must be taken, however, not to over design a
new system or else it may become too universal in nature
(Ref 8). In doing so, the system may not function optimally
in any application and the cost may exceed the combined cost
of individual nonflexible specific designs.
The design of the DELNET protocols must be such as to
accomplish the specific objectives of the DELNET, but
flexible enough to allow for expansion and reconfiguration.
Just because the UNID is the device for interfacing the
hosts into the DELNET, this does not imply that the
protocols for the DELNET will necessarily function on a
universal basis for all applications where the UNID is
used. The flexibility, as it applies to the DELNET,
specifically addresses the ease in which hardware, software,
topologies, and network concepts can be modified. This is
especially true in relation to the continual changes and
upgrading of minicomputers and microcomputers which are
presently being used in the DEL.
.Virtua1 O.De.ati2n. Virtual operation implies that
within the DELNET, one host can communicate with another
4 2-2
host on the same level of protocol. For example, in
transferring files, the user only generates the proper
command and the transfer takes place. The formatting of the
file into packets, tagging the packet with the headers and
trailers, and routing the the packet are all transparent to
the user. These services take place at various levels
throughout the protocol hierarchy. The user simply
communicates at the user interface level. The transparency
or virtual operation is an essential element of an efficient
and effective network. Tradeoffs may be made to develop
workable systems within the scope of this project.
Performance Mjj.riji g. The ability to monitor the
performance of the DELNET would be of great benefit for a
variety of reasons. First, it would provide a means of
testing and verifying proper system performance during its
development. Secondly, it would provide a means of
collecting data on the system for the purpose of real time
evaluations and fault analysis, or more simply to insure
proper operation once the DELNET becomes operational.
Thirdly, future modifications can use the monitor to insure
proper integration into the DELNET.
~1~kAStandards
Many of the specific protocols for the DELNET are not
directly transferable to other networks which use the UNID.
This is because many of the services that the DELNET
4 -operating system provides pertain only to networks with
similar characteristics such as topology, routing schemes,
42-3
- .. •I--.-..------..---------------------.-
and flow control. The general framework for developing
these protocols, however, can be used to develop or modify
the specific protocols for other applications. There are
many global schemes or standards used by industry for
* developing their protocol frameworks for LCNs. Most of
these standards are derived from the Consultive Committee
for International Telephone and Telegraph (CCITT), the
International Standards Organization (ISO) , the American
National Standards Institute (ANSI), the Electronic
Industries Association (EIA), or a proprietary standard
design from a particular vendor (Ref 7).
At the present, most of these standards do not address
the global aspect of protocol design, but rather concentrate
on specific levels of protocol. The ISO has, however,
developed one of the first complete global models for
general LCN applications. It is called the Reference Model
of Open Systems Interconnection (OSI). The ISO is a seven
layer protocol model. Each layer in turn is governed by
additional more specific standards (Ref 33). Figure 2 shows
a pictorial representation of .the ISO model.
In developing this model the ISO considered several
important points. First, each abstraction of communication
should be placed into its own protocol level. Second, this
communication level should perform a specific function.
Third, these functions should minimize flow across the
protocol layer boundry. Fourth, the protocol layer
boundries should be chosen to minimize data flow across
4. 2-4
-
interfaces. And lastly, each layer should be manageable and
yet be able to support its function (Ref 33).
The following is a global description of the ISO seven
layer protocol model (Ref 22).
The Phy L . This is the lowest and most basic
link in the network. It deals with the physical realities
of the network and is concerned with the transmitting of raw
bits over a channel. It deals with connections, voltage
levels, and transmission rates.
.The Data Link Layer. This level creates, recognizes,
and governs the flow of the logical bits created in the
physical layer. This is generally accomplished by creating
frames or packets of data. The effort placed into this
layer will allow the next level (Network Layer) to
accomplish its task in a more efficient manner.
RIe.tok Laya. This layer is concerned with the
routing and management of the data packets. It largely
determines the host-to-node interface and is subject to
substantial design attention with concerns over the division
of labor between the host and the node.
xaDna.QL~l.. . This layer is concerned with
establishing communication paths between hosts. It is
sometimes referred to as the host-to-host layer. It manages"4buffer space and controls data flow. This is the highest
layer concerned with the transport services and normally
functions with communications taking place from a source
host to a destination host with the NIU being transparent to
2-6
VIRTUALLEVEL 7 APPLICATION LAYER HOST TO HOST
COMMUNICATION
VIRTUALLEVEL 6 PRESENTATION LAYER HOST TO HOST
COMMUNICATION
VIRTUALLEVEL 5 SESSION LAYER HOST TO HOST
COMMUNICATION
VIRTUALLEVEL 4 TRANSPORT LAYER HOST TO HOST
COMMUNICATION
VIRTUALLEVEL 3 NETWORK LAYER NODE TO NODE
COMMUNICATION
VIRTUALLEVEL 2 DATA LINK LAYER NODE TO NODE
COMMUNICATION
I PHYSICALLEVEL 1 PHYSICAL LAYER f--e-NODE TO NODE
COMMUNICATIONa
* Fiue2.IOPrtcl oe
Pr
the service.
Session Lay r. This layer is the user's interface into
the network by establishing a connection or session to
manage the dialoque in an orderly fashion. An example may
be time sharing or the transferring of a file from one host
to another. The service includes setting up the connection,
establishing agreement on the session options (called
binding) , managing the session, and disconnecting the
session upon task completion.
PU esntation Lyaxer. This layer performs library
functions for the network such as the transfer of files,
format configuration, text compression, encryption, etc.
The presentation layer attempts to alleviate inconsistencies
in the network faced by different host users.
AD~icatLiofl aer The content of this layeL is
determined by the users. They are normally application
dependent but many services are common in nature such as
file transfer and remote job execution.
Depending upon the size, complexity, and general
application of the network, the three top levels of protocol
may become blurred as to their specific tasks. In fact, in
small special purpose systems, the three top levels may be
grouped together into a single protocol layer called the
'Applications Layer" (Ref 22).
Syste Requirements
The global requirements specified in the previous
sectiun dealt with the rather abstract qualites of the
2-7
system such as virtual operation, flexibility, and
performance monitoring. At the systems level these
requirements become more specific. At the lower levels of
the ISO seven layer model the system requirementsare quite
explicit. But as the levels increase so does their
complexity. In fact, the complexity evolves into
abstraction as the upper protocol levels are reached. This
is due to the application dependence .of the upper levels and
inability to fix requirements and standards to systems that
are application variant. For this reason, this section
concentrates on the lower levels of protocol where the
system requirements are well defined and yet femain under
the requirements defined at the global level.
Packet i inq Protocol. The global requirement of
flexibility establishes the necessity for a packet switching
data transfer technique rather than that of dedicated
physical connections. Additionally, the transparency
requires all forms of data to be processed similarly.
Efficiency requires the potential for parallel processing
with time division multiplexing of message portions. Again,
packet switching meets these requirements while meeting the
transmission bandwidth (Ref 9). For these reasons the
DELNET will use packet switching, store-and-foward
protocol.
RouDing Tchnigurl. Routing algorithms can greatly
influence the effectiveness of a network. This is
especially true for multipath networks which use dynamic
2-8
routing schemes (Ref 20). One advantage of implementing the
DELNET with a loop or ring topology and store-and-foward
packet switching is that the routing technique is relatively
simple. It simply enables the UNID to interface a data
packet into the normal traffic of the network. The more
important aspect of this issue relates to the flexibility
requirement of the network. The protocols developed for
this investigation should be capable of absorbing additional
nodes and host into the network.
Using the ISO seven layer model as the global framework
for the network standards, many specific standards exist for
implementation of the bottom three levels of the protocol
model (Ref 22). Few specific standards exist, however, for
the top four levels since they are abstract in nature and
tend to pertain to the specfic system and its applications.
For this reason, this section will focus on the system
requirements for the bottom three layers of protocol.
The (CCITT) has developed an international standard
protocol for the bottom three layers of the ISO model. This
standard is known as the X.25 standard (Ref 7)
Investigation of other commercially available protocols
found serious deficiencies including vendor dependent
equipment, lack of technical sophistication, and the
overdependence of specific hardware. The versatility of the
X.25 standard and its endorsement by the CCITT led to its
acceptance as the access protocol for the DELNET (Ref 11).
4 2-9
The X.25 recommendation defines the three layers of
protocol through references to the X.21 standard for the
Physical Layer, Link Access Procedure (LAP) for the Data
Link Layer, and packet control at the Network Layer (Ref
22). Figure 3 shows the protocol structure at the systems
level.
~Detailed Reguirements
At the detailed requirements level, the specific
network functions to be encountered by this project are well
defined. They include the operating system for the network
and the application functions.
02grjatng Syse fr ±he Network. There are two basic
approaches available for implementing an operating system
within the DELNET. The first is to have one host which
functions as a central node and control for the entire
ring. Each host would route its message to this central
host which in turn would perform any necessary conversions
or network control functions and route the packet to the
original destination. The central control node would thus
have the majority of the network operating system contained
within its memory. It would control all access commands and
control the network functions. The second method that could
be employed to implement the operating system for a network
is to have each host within the ring function independently
and on the same level. In this case the network operating
system would be stored within the memory of each system
host. Either method satisfies the requirement of a network
2-10
w -~ w 0
In Ln LA
u.n (41 .4
.I I >1
>I C
01 44 w w04 1 Li0r
0 Li 0 k
41Aj.i 4) 0
0 w
r-4 04 0
0 00 01 Ii L
*41 0i 04 ~a0.u41 4 4ii( mI4
.0 00
0q 01 41 L
gal c M 14H rr_1 04 041 w
I c I1
i>
2-14 >
operating system that would provide certain user services.
These services should include, but should not be limited to,
commands to LOGIN, LOGOUT, and HELP. Following is a brief
discussion of these commands as well as several special
application functions which should be included as services.
When a user wishes to use the network, the LOGIN
command will be used. This command will verify access
authorization, identify the user to the network for data
routing and status, and initializes the host for DELNET
processing.
The LOGOUT command will perform the opposite process.
The user is removed from the network configuration at the
network operating system level, and the host dependent
interface to the network is terminated.
The HELP command is required to provide any user with
convenient information about the network. The information
available must include network overview, current network
status, network map for routing, and command syntax
instructions (Ref 9).
The application functions are a minimum set of
instructions required to perform network operations. They
should include user messages for real time internetwork
communications, file transfer, and remote job execution.eThe message transfer is to allow for direct communication
from host to host (electronic mail). The file transfer
requirement is included to enable data identified as a file
on one host to be transfered to any other network host.
2-12
Finally, the remote job execution will allow command files
on any host to be executed by any other network user (Ref
9).
Table 1 shows the relationships of the global, system,
and detailed levels of requirements and how they apply to
the DELNET.
SDe ailedStnad
As with the system level, specific standards for the
upper levels of protocol do not exist due to their
abstractions. In fact, future research on the DELNET
protocols may elect to combine several of the higher levels
of the ISO Model into a single Applicationns Layer (Ref
22).
Physic J. The standards for this layer at a
detailed level are contained within the standards at the
systems and global level peviously presented. The
justification for these standards can be found in Reference
7. On the local side of the UNID the data link uses the
RS-232C standard for twisted wire pairs and connectors.
Only 9 out of the available 25 pins are used (Ref 17) . The
data transfer from host to UNID is in serial at a maximum
rate of 19.2 kbps. On the network side, the data flow is
again serial using a modified RS-449 standard and a fiber
optic link at a maximum data rate of 2 mbps for the network
bus. Future research may explore various data rates. If
the maximums listed are exceeded, either the standards must
"* be changed or modifications must be made to the established
* 2-13
= a,
4)h 4jL)0)t
41". 9 4 a . r L- o 0 .U E40 w jt
9-4W 0 go rO0' -4 r-4 d to 4 0W 2 0 0 3w 0 04
-r >I 0 4) -r 0 0~ VX9G~ 4J 44'Ac 41
gal .QF4 4)) toa 0~04 Pr40 0.r 0 49 to
949400 4 c to CoE-4>4 41 -P 41t)r
w to c to r. c t
trz 4) 0: w U. W z00 4 &z G O- 4)*-0 4 4 J 0
0 ~ ~ ~ b4 0)oIr .mU: ) rIH 4 ~0 4) 4Jtr m r
E-4 r.r4* -o4 p-H 'j 4) 04) C0WzU w 0 . 00t E4 4) 1
H .e4) 0 -r4-.4aw4)0 0o
ONe .c4 Coa .0 )r40-4 0 A W-r 0 *4Oaa, Z wvo.iW -1
r4 ca "q 0- 1( -H - 414) r-94 r4 to 4) 04 0
fa go r 4) *942C 0= 9w
e4 $4 1 4) 0 J4 a, - wt0060*1 .1. a r-4 E-1 0 Qd1 C
E4)4)- 400l
E-4 0
U) AW' 0 a2 04)4Wa )a
co '
4 2-14
standards. It must be emphasized that standard
modifications should not be taken lightly. A subtle change
at an early stage in development could substantially effect
modifications or interfaces in the future.
Data Link Lar. As specified at the systems level,
the data link access is governed specifically by the CCITT
standard for Link Access Procedures (LAP). This LAP is very
similar to the ISO standard for th.e High Level Data Link
Control (HDLC). This standard specifies the packet frame
format as shown in Figure 4.
ketwoxr Layer. The specific detail of the standards
for this layer are basically the same as for the systems
level. The routing for the DELNET is simple and does not
require a great deal of attention. Frames simply travel
unidirectional within the ring. The source and destination
information is contained in the frame's header information.
As the frame in injected into the ring, it proceeds from
UNID to UNID until the address of the host is recognized by
its connected UNID. At this point the packet is seized and
routed to the proper host on the UNID's local side.
Figure 5 presents a hierarchy of all the DELNET
standards. Figure 5, in conjunction with Table 1, should
present the reader with a graphical representation of the
functional requirements and standards, at each level, which
govern the DELNET.
2-15
'E-4
bJ>4
(124
0C r
ri iR
0 U
IV 1140 :3
'J 044
0 to 0) O'uD4 0
r-4 4)- '-I m a
.-4 :3. -Hr-4 (10
CD c
'4 1-ir-a 0o
00
41>4 - 0 1
4) r 4i rq-4 4 4)
EO 4'd- wClON 0r
'4 >4U0
0 ra..4 .
2-16.
I
PXOTC COL LCCAL N LT'0 Sv TANEARKLLVEL5 SIDE INTERFACE SIDE STANDARDS
Data Packet aStandards for the Application
128 byes Layer are governed by the ISOLE~d ? 18 byes ifo7 layer model.
APPLICATION Initial implementation of DELNETLATER combines layer 5,6, and ? into a
single Applications Layer.
Host The UNID is transparent at this, level.
Data Packet =
LEVEL 6 128 bytes info
PRESENTATION ( Same as Level 7LAYER
Host
Data Packet =
LEVEL 5 128 bytes info
SESSION ( Same as Level 7LAYER
Host
Data Fack.et u Standards for the Transport
LEVEL 4 128 bytes + Layer are governed by the ISO5 bytes for 7 layer model and specific
TRANSPORT 40st-to-Ifost Host-to-Host DaLflLT standardsLAYUR protocol to be determined.
'he UNlID is transparent at thisH' fost Elevel.
Data Frame x Standards for the NetworkLEVEL 3 Data Packet + Layer are governed by the ISOLV 6 bytes for 7 layer model, CCITT StandardsN-TORK LAP protocol for X.25 and LAP, and specific
LAYER UNID DELNET Standards to be determined
Data Frame =
LEVEL 2 total 139bytes
DATA LINK UNID C Same as Level 3LAYER
Host D -"tan'ards for the ihysical
LEVEL 1 Layer are governed by the ISO7 layer model, CCITT Standards
PHYSICAL for X.21, and EIA Standards formUNID RS-232C RS-422, RS-423, andLAYER _ Modem S- 449.
b a a a Loal bus lines use 19.2 kbpa.Hos . otaork bus lines use 2 mbps.
Notes: a. RS-232C Connectors d. 2651 USARTb. RS-232C Data lines O. Z-80 SIO
c. RS-449 Data Line (Fiber Optic)
Figure 5. Hierarchy of DELNET Standards
2-17
Summar
The purpose of this chapter is to identify the functional
requirements and standards for the DELNET from a global,
systems, and detailed viewpoint. The global level focused
on the flexibility, virtual operation, and performance
monitoring. The framework for the global standards is the
ISO seven layer protocol model. At the systems level, the
focus was on the techniques required for packet switching
and routing using the store-and-foward method. The system
level standards are governed by the X.25 standard developed
by the CCITT. The scope of the investigation limits the
detailed requirements to those which pertain to DELNET
operations. These include the network operating system
functions for access control and user help services, and
application functions for message transfer, file transfer,
and remote job execution. Lastly, the standards that govern
the detailed requirements are specific for the bottom two
layers of protocol. The Physical Layer uses RS-232C and
RS-449 standards whereas the Data Link Layer uses LAP. The
third and forth levels at the detailed level are the same as.4
at the systems level. Also at the detailed level, the top
three levels are combined to make a single applications
layer. There have been several minor design considerations
mentioned in this chapter so that the detailed requirements
could be more specifically defined. The folk¢ ing chapters
define the actual designs of the first three protocol levels
and the implementations to support them.
2-18
Phscl ae
Introduction
This chapter presents the rationale used to determine
the specific hardware necessary for designing and
implementing the lowest level of the ISO seven layer model
for protocol development. The chapter begins with a general
theoretical discussion of various Physical Layer
implementaion techniques. It then discusses the specific
designs and implementations of the DELNET and how these
designs relate to previous research for this project. All
the actual implementations for the Physical Layer of the
DELNET are governed by the standards set forth in Chapter II
as shown.
Theo
The initial perception of the Physical Layer is one of
fulfilling a rather simplistic requirement to insure a
complete overview of all areas pertaining to data transfer
within a network. In contrast, however, the actual
theoretical considerations pertaining to this subject can
become quite complex. In fact, a comprehensive analysis
must consider the data bit stream as a periodic waveform and
is therefore subject to the bandwidth limitations determined
through complex Fourier Analysis.: It is imperative that the
bandwidth of the transfer medium be broad enough to support
a sufficient number of harmonics of the basic frequency to
successfully reproduce the square wave type bit stream.
3-1
.- - - - - - - - - -
Chapter 3 of Reference 22 presents a detailed description of
this analysis. The results of this analysis contain several
important points. For example, given a particular type of
transfer medium or channel there exists a maximum data rate
that can be transmitted on that type of medium due to
bandwidth limitations.
The data rate is not the only factor used in
determining the type of channel used for a LCN. Additional
variables include length of channel, topology,
troubleshooting and maintenance, availablity of channel
interface equipment, susceptibility to electromagnetic
interference (EMI), and cost. The types of transfer mediums
most often used for LCNs are twisted-wire pair, coaxial
cable, and fiber-optics. Each has definite limitations and
advantages over the others as described in the following
sections (Ref 13).
Twisted-wire Pair. Twisted-wire pairs are the most
commonly used channel medium between conventional data
communications equipment (DCE) and data termination
equipment (DTE). The primary reasons are low cost and
availability of the wire as well as its connectors. This
type of channel is highly acceptable for normal
communications between DCE and DTE especially for short runs
of the cable (Ref 13). At the present time, 19.2 kbps and
9.6 kbps are the most widely implemented data rates due to
the RS-232C standard. Twisted-wire pairs can even handleI
data rates up to 10 Mbps for short distances of less than
3-2
100 feet. One disadvantage of this type channel is its
susceptibility to EMI and its inadvertant broadcasting of
its own electromagnetic fields (Ref 8).
Within some networks one of the major disadvantages of
twisted-wire pairs is its limitation to function as a
baseband medium. Both fiber-optics and coaxial cable have
the capability to be used as both baseband or broadband
channel mediums. Baseband refers to the method of data
transfer of placing the bit stream directly onto the
channel; whereas, broadband refers to the method of
modulating the data onto an RF carrier frequency. Using
broadband channels, several customers have access to the
same channel simultaneously by modulating their data streams
at different rates (Ref 12 and 13).
Coaxial-cable. In LCNs, coaxial-cable is the most
attractive medium for implementation due to its advantages
over twisted-wire pairs and few real disadvantages. Not
only can it support RF transmission for broadband
capabilities, but it is relatively inexpensive and easily
tapped, thus allowing easy additions to the network. It has
a broad bandwidth and can support data rates of 10 Mbps for
over 1000 feet or up to several miles for lower
frequencies. The only real disadvantages are its small
increase in cost over twisted-wire pairs, slight complexity,
and nonavailability and nonconformaty of connectors for the
DCE/DTE interface (Ref 13).
-iber=otics. The use of fiber-optic channels is
3-3
increasing proportionally as the technology of the subject
increases. At the present time there are several large
drawbacks to using fiber-optics within an LCN. The two
predominant limitations are cost and complexity of
installation. The fiber-optic modem which is used to
interface the NIUs to the network bus, is considerally more
expensive than the simple connectors used for twisted-wire
or coaxial cable. Additionally, any breaks in the
fiber-optic bus for the reasons of maintenance or additional
hookups must be precise and often become very complicated.
Once these obstacles are overcome, the fiber-optic channel
is the 'most efficient' and versatile channel of the three.
The primary benefits to using fiber-optics is that it is
practically impervious to EMI (Ref 13) and it can transfer
data at rates of over several hundred Mbps for distances ten
times greater than coaxial cable (Ref 8).
Many of the larger and newer LCNs are using various
combinations of the channel mediums mentioned. For example,
an inter-office network might be connected by a baseband bus
composed of either twisted-wire pairs or coaxial cable.
These small LCNs might join into a larger network being
supported by a broadband coaxial bus. This secondary
network might interconnect offices over several city blocks
from several different buildings. Finally, these secondary
networks might be connected to other secondary networks on
the other side of a large city via a fiber-optics channel.
It is easy to visualize that the type channel implemented
3-4
depends on a great many variables which are primarily
determined by the use and size of the network (Ref 12).
DELNET Implementation
As stated in Chapter I, the role of the DELNET will
have many purposes. It will greatly aid to increase the
productivity of the DEL as well as providing a highly
pedagogical platform for student and faculty research and
study. For this reason, several decisions for the original
design of the DELNET departed from the typical operational
design considerations (Ref 9).
For example, in one of the original AFIT sponsored
thesis projects, the design specified a fiber-optic link to
be used as the network bus channel between the UNIDs (Ref
3). This design has carried foward and was incorporated as
part of the DELNET. It was determined that the fiber-optic
link would provide a vehicle for students to receive first
hand experience with this system.
Although the DELNET's main network link is implemented
by a fiber-optic bus, the UNID itself does not incorporate a
4fiber-optic modem nor connectors. For this reason, the UNID
connections on the network side begin with an RS-232C
connection and cable and lead into a fiber-optic modem
(Fibronics Model TTK) for network bus interface. By
connecting the network bus in this manner, it provides the
pedagogical requirements or the original design yet
minimized the cost and complexity of the UNID.
Additionally, a very short run of twisted-wire pairs will
3-5
not degrade the network link when working with data ratesbelow 10 Mbps (Ref 13). For this and all preceeding DELNET
research, the network bus has functioned as a baseband
channel. With the fiber-optic cable functioning as its
channel medium, the possibility exits for an upgrade to a
broadband channel. The upgrade to a broadband channel would
allow for a greater number of UNIDS to be connected to the
DELNET without the adverse effects of increased traffic.
Additionally, the DELNET could support analog types of data
such as video and voice.
On the local side of the UNID, the four hosts are
connected to the UNID on standard RS-232C serial links. The
data rate between the hosts and the UNID is 19.2 Kbps.
Reference 17 provides a complete schematic breakdown of
these links, connectors, and pin assignments. There are no
future plans to change the local side bus configuration.
Summar
Within the LCN community, the three basic types of
channel mediums being used for the physical layer of
4protocol are the twisted-wire pairs, coaxial cable, and
fiber-optics. Under the standards set forth in Chapter II,
the DELNET incorporates a combination of twisted-wire pairs
4 for the local side data link at 19.2 Kbps. The network side
uses a fiber-optic link at 2 Mbps. All channels of the
DELNET operate in the baseband configuration but could be
4I expanded to broadband in the future.
d3-6
*v Data Link L ~
Introduction
This chapter presents the design considerations
necessary for implementation of the second level of the ISO
seven layer model for protocol development. The chapter
begins with a discussion of various techniques that may be
employed to design a network's Data Link Layer. It then
discusses the specific design and 'implementation of the
DELNET's data link protocol scheme and how this thesis
effort integrated its findings into the design of the
previous thesis efforts. All the actual implementations for
the Data Link Layer of the DELNET are governed by the
standards set forth in Chapter II as shown.
flaijg Considerations
The role of the Data Link Layer is to perform a variety
of tasks which are totally transparent to the users. The
tasks themselves vary widely in complexity in both concept
as well as in actual implementation. The main task of this
protocol level is to consider a raw transmission medium
between NIUs and transform it into a sophisticated channel
that appears free of errors to the next higher level of
protocol. It normally accomplishes this task by placing the
data packets into frames, transmitting the frames
sequentially, and then processing the acknowledgement frames
sent back from the receiving NIU (Ref 22).
The concept of the Data Link Layer is rather basic;
S4-1
however, depending upon the number of protocol enhancements
provided by a particular network, the design can become
quite complex. These enhancements may include flow control,
error detection, error correction, sequence management, and
automatic reset and restart capabilities. The degree of
effort spent in developing this layer of protocol is
directly reflected in the higher protocol layers. That is,
as many housekeeping tasks as possible should be implemented
within the lower levels of the protocol structure thus
freeing the higher levels to be used in a more efficient
effective manner (Ref 22).
There are as many variations for developing the Data
Link Layer as there are vendors and regulatory agencies
which control standards. Even when two seperate networks
are designed under the same identical standards, slight
variations exist due to the changes in topology and
utilization (Ref 18).
There are several major procedures used in industry for
implementing the Data Link Layer of a LCN. Fortunately,
most of these procedures are all very much alike, LAP (Ref
7) , HDLC (Ref 7) , SDLC (Ref 18). In fact, they are so
common, many hardware devices incorporate modes of operation
specifically designed to automatically accomplish many of
the tasks of this protocol layer. One such device is the
new Intel 8272 Programmable HDLC/SDLC Protocol Controller.
Many other such devices are now in production (Ref 8). In
fact, in the same time period as this thesis report was
4 4-2
being prepared, the Digital Equipment Corporation (DEC)
developed an NIU on a single LSI chip (Ref 8). In the past
and until such hardware devices are commonly used, most of
the tasks performed by the Data Link Layer will be
accomplished through software realization.
The fundamental building block of the Data Link Layer
is the data frame. As a packet of data is processed for
transmission from node A to node B, *a frame is built around
the packet. Figure 3 of Chapter II shows a typical frame.
The flag bits are normally set to 01111110 but may vary if
protocols agree. These flag bits are appended onto the
original data packet as are the address, control, and
checksum fields. The address bits are for routing and flow
control. The control bits provide information as to the
type, purpose, sequence number, and acknowledgement of
frames. The checksum bits are for error detection and in
some cases for error correction. The schemes themselves may
be as simple or complex as the networks which they control.
The Data Link Layer is only concerned with the appending
fields and normally has nothing to do with the data packet
field. Reference 7 presents a detailed description of how
these frame headers are formatted and used.
The overall throughput efficiency of a data frame from
one node to another is proportional to the time spent on the
analysis of the header information (Ref 1). For example,
" consider routing a frame from node A to node B through node
'- C. The designer of the network must decide if there should
4. 4-3
be an acknowledgement between A and C and then C and B or
just between A and B. Additionally, the designer must decide
if error checking should be performed at every intermediate
node or just at the destination node. other decisions that
the designer must make includes the numerical sequencing of
the frames known as the 'modulo number' and the maximum
number of frames that can be transmitted before an
acknowledgement is required (Ref 22) .Also, if an
acknowledgement is not received, the designer must
incorporate the time interval before retransmission occurs.
As with most design problems, there are many
considerations that effect the performance of the network.
These include the topology, the amount of traffic on the
network, and perhaps the most important, the applications of
the network (Ref 22) . It is very possible to incorporate so
many overhead enhancement features into the Data Link Layer
that the throughput is actually reduced (Ref 1) *The
designer of the network protocol scheme must address these
specific performance considerations.
DELLE~ Desaign Aa Implementation
Although there were many design decisions in regard to
the DELNET protocol scheme, there was one consideration that
would not normally affect a typical design environment.
This was the fact that this project would be used in a
continuing academic environment and would be passed from
student to student over several thesis efforts.
Additionallyp in an acedemic environment a primary conc~ern
4-4
is flexibility which fosters continuing research
investigations. Because of this, the overall design
concepts used did not only incorporate the modularized
approach as specified in Chapter I, but they have been kept
as basic as possible while maintaining the ability to
perform all the functions of the original design.
The network topology of a ring structured system
creates an ideal environment for a very simple yet effective
store-and-foward routing philosophy (Ref 22). While still
under the standard of the LAP, this philosophy actually
eliminates much of the data link control overhead and
greatly reduces others. Additionally, the store-and-foward
concept treats all UNIDs equally and independently and
eliminates the master-slave relationships normally designed
into an HDLC/SDLC type protocol scheme such as the LAP (Ref
22). Although the ring topology is not suited for all
applications of networks, it is an ideal first step or
starting point for the DELNET to build upon.
The data frame shown in Figure 4 was modified slightly
for the DELNET scheme development as shown in Figure 6.
There are two types of data frames ustd within the DELNET
design. Both types have a fixed length of 139 bytes. The
first is the information or I-frame and is used for
transfering data between two UNIDs. The second is the
supervisory or S-frame and is used for acknowledging the
receipt of a good I-frame. As the formatting information of
Figure 6 shows, the possibility of expanding the role of
'I 4-5
.,) U) ,-z
I-4 E-4 U
I I 0U) r" . HfI.n 1
00
raE- -i C14 i DE-
H >H
E-4 a)4
E-4 0
4 00 0)
H- .0
%- W
z
0 fn 0
>1r 01
M- E-4s-
E- 4 z
z ira W)
0~ca
* O ,, '-4 '-
E-4-6
* ~D4
4-6
supervisory functions is open for future development. All
the procedures and tasks pertaining to this level of
protocol strictly function on the five appended fields of
the frame. The information contained in the packet field is
of no use at this level of protocol.
The software developed in the previous thesis effort
(Ref 9) defined the basic framework of the procedures
required to support the Data Link Layer under the basic
guidelines of the LAP and X.25 standards. This software
established the buffer tables and pointers to maintain the
various routing of the frames, but made little or no
analysis of the appended header information. The primary
concern of this thesis effort, in relation to the Data Link
Layer, was to incorporate this analysis into the framework
previously designed.
The remainder of this section discusses the sequence of
events for the Data Link Layer scheme. Reference 9 should
be reviewed in order to understand the buffer table
structures previously developed. The algorithms of this
project were developed with the following philosophy of
operation:
- Fixed length frames
- one directional communication on network bus
- Frame sequence numbering is modulo 2 (1 or 0)
- Frames received are physically moved to
- their appropriate tables in shared memory
-No attempt is made at error correction
4-7
- All frames are independent of each other
- The network does not approach saturation
- The percentage of network errors is low
The algorithms used to perform the services of the Data
Link Layer, were developed using a three tier scheme which
consisted of Data Plow Diagrams, Structure Charts, and
Pseudo English. The Data Flow Diagrams provide a means of
identifying the modularity of processing that is required to
transform the input data into the final form of processing.
The Structure Charts transform the Data Flow Diagrams into a
physical structure of procedures which will accomplish the
processing shown in the Data Flow Diagrams. Lastly, the
Pseudo English is used to bridge the gap between the
Structure Charts and actual code by combining understandable
English statements and computer code. If performed
correctly the transition between Pseudo English and actual
code is straight foward.
The Data Flow Diagrams were developed during the
initial phases of the DELNET design and are presented in
* Reference 9. The Structure Charts for the Data Link Layer
are presented in Figure 7 through 10. The following
paragraphs contain the Pseudo English description. In order
to assist in the understanding of both the Structure Charts
and Pseudo English constructs, Appendices A-C provide a
comprehensive description of all descriptors and processing
if pertaining to this software.
4-8
E-
00
4)
>1
-4 s-4 4I-
4)
0
4)
E-4 (a
E-4 04
L) E-4
UzaU
C0)
E--4
In zI
4-9
cIn
IQ N
0
4IJ
H E- 0
144-N r0
E-i A E-4
04 ca J 5W :zto4
r4 a.4k. W M0
L) 0 co
01-4
C4)
01
-E-
a 4-10
(I) 43
P-E-0
M-4 E-
b0
M 54
4J
.0
4)
4-J
Z
0
4-114-
0 u o
0
.. .4)
li Ij-j
f. '-" I .
4, I
6| 4-11
>4
u, 4
a"
6.f.-
E-4. 1 ,0J4-0
ra
0
0
-b $4
too
ra)
E-14
0C) 9 E-.
ca)E W4M
OCl
En cn
,aD.
4- 12
I.
-4
K After completing the initialization of the table
Sbuffers and their pointers, the processing enters an endless
loop of calling procedure ROUTEIN and ROUTEOUT. Note that
actual variable and procedure names are presented in all
capital letters.
Enter Procdure ROUTE_IN
If a frame is present in NT01TB then
Determine its DESTINATION
If DESTINATION = NTNTTB then
MOVE frame to NTNTTB
Update the NTNTTB pointers
End If
If DESTINATION = NTLCTB then
If the frame is an S-frame then
Determine if the S-frame is a positive
ACKNOWLEDGEment of last transmitted I-frame
Else ( must be I-frame
Determine the INPUTSEQBIT
Call BUILD_S_FRAME to transmit ACKNOWLEDGEment
MOVE frame to NTLCTB
Update the NTLCTB pointers
End If
End If
Update the NT01TB pointers
End If
End Procedure ROUTE_IN.I
Enter Procedure ROUTE_OUT
4-13
If a frame is present in NTNTTB then
LIf the DESTINATION address < MAX_UNIDS then
Call TRNMIT
Update the NTNTTB pointers
Else ( address out of limits
Increment status table, STATTB
Update the NTNTTB pointers
End If
If a frame is present in LCNTTB then
If it is an S-frame then
If the DESTINATION address < MAX_UNIDS then
Call TRNMIT
Update the LCNTTB pointers
Else ( address out of limits
Increment status table, STATTB
Update the LCNTTB pointers
End If
Else ( it was an I-frame )
Place proper SEQBIT in control byte of frame
If the DESTINATION address < MAX_UNIDS then
If the TIMEDELAY is COMPLT then
Call TIME_DELAY
End If
If ACKNOWLEDGE = FALSE 'AND' COMPLT - TRUE then
Call TRNMIT
Force ACKNOWLEDGE to FALSE until the reception
of a good S-frame makes it TRUE
4-14
Call TIME_DELAY to start timing sequence
End If
If ACKNOWLEDGE - TRUE then
Update the LCNTTB pointers
Compliment SEQBIT for next usage
End If
Else ( address out of limits.)
Increment status table, STATTB
Update the LCNTTB pointers
End If
End If
End If
End Procedure ROUTEOUT.
The method of positive acknowledgement and
retransmission of I-frames and the discarding of any frame
where an error may have occured has both advantages and
disadvantages. It is relatively easy to implement, has
little overhead, and gets the job done quite well and
efficiently when few errors occur on the network. If the
error rate is high, the throughput of the system will be
reduced considerably (Ref 1). This general philosophy is
often used in even large sophisticated networks although
often network monitoring techniques are employed to guard
against bottlenecks and breakdowns (Ref 18). Appendices A-C
contain documentation of the software used to implement the
Data Link Layer protocol.
The method employed to design and implement the actual
4-15
DELNET services provided by the Data Link Layer can actuallybe described as 'datagram' service. Each frame is
transmitted independently of other frames. It will be the
responsibility of the Transport Layer of protocol to place
the data packets in proper order if required. Reference 22
has a good description of datagram service and how this
relatively simple concept relates to the data link protocol
layer using the store-and-foward concept.
Sumar
The majority of the various protocol schemes present a
framework from which very sophisticated and complex network
services can be provided. Man of these services can be
reduced or eliminated for simpler networks such as the
initial DELNET implementation. In fact, the ring topology
of the DELNET further relaxes the routing portions of the
protocol scheme to an easily designed and implemented
store-and-foward concept. This concept is consistent with
the general philosophy of the DELNET to be a modularized and
maintainable network. The data link protocol layer designed
.for the DELNET incorporates communications between UNIDs
while maintaining the flow control, error detection, and
virtual addressing. This datagram service, as it is
4 sometimes called, is implemented through hardware using the
Z-80 SIO and through software.
-
4-16
Ntke.twrk Layer
Introduction
This chapter presents the design considerations
necessary for implementation of the third level of the ISO
seven layer model for protocol development. The chapter
begins with a discussion of the Network Layer philosophy and
how this layer might be implemented. It then discusses the
specific design and implementation of the DELNET's Network
Layer protocol scheme and how this thesis effort was
integrated into previous designs. All the actual
implementations for the Network Layer of the DELNET are
governed by the standards set forth in Chapter II as shown.
Dlesign Considerations
The role of the Network Protocol Layer is to interface
the Data Link Layer discussed in Chapter IV with the
Transport Layer which has direct virtual communication with
the Transport Layers of additional host computers (Ref 22).
In simple terms, it transforms a frame of data from the
network side of a NIU to a packet of data on the local side
of a NIU. It is also up to the Network Layer to determine
the actual routing of the data packet and pass this
information to the Data Link Layer for transmission.
Additionally, it is the task of the Network Layer to insure
that messages are properly sequenced before delivery and
upon arrival to the Data Link Layer (Ref 5).
* The Network Layer is often called the packet or
5-1
communications subnet layer (Ref 5). In either case, it
refers to the Network Layer and its two subordinate layers
in providing the actual communication transmissions between
the NIUs and their host computers. This communication takes
place by the routing of packets from the network layer to
the subordinate layers and then over the physical channel to
the destination NIU. From there it proceeds up the
hierarchy to the Network Layer of the designated host.
As with the Data Link Layer, the Network Layer may be
quite complex or rather simple depending on the complexity
of the routing and control schemes of the network. In fact,
the X.25 standard has five different packet types defined
for full implementation if all services of this layer are
required. For lesser services, a subset of these types may
be used. This layer not only concerns itself with routing
and sequencing as previously mentioned, but may control such
areas as establishing virtual circuits, controlling
collisions, preventing deadlocks, call confirmations andclears (Ref 22). This is what makes the X.25 standard
universal in concept. It has services to control
practically every situation that might arise.
If the Network Layer supports or does not support
datagram services is perhaps one of the most critical
questions the designer must ask. If no virtual circuit has
to be established prior to transmission, the type of packet
that sets up the virtual call may be disgarded. As in theDData Link Layer, using the loop topology, simplex
* 5-2
communications, and store-and-foward routing philosophy, the
complexity of the Network Layer is reduced considerably.
D LNET Design nd Implementation
In developing the DELNET's layer scheme, the X.25
packet switching guidelines set forth by the CCITT were
adhered to in philosophy, but varied slightly in actual
format implementation. Since the design scheme incorporated
the simple store-and-foward routing algorithm and the
transmit-and-wait positive acknowledgement technique in the
Data Link Layer, it was not necessry for the DELNET to
establish a virtual circuit before transmission. For this
reason, the 'Call Request' and 'Incoming Call' packet types
were not needed. The source and destination DTE address
fields were incorporated into a modified data type packet.
This allowed the DELNET to utilize a single type of packet
(called the data packet) and yet provide all the information
necessary for virtual communications.
In addition to the actual data, this modified data
packet contains five header fields of a single byte each.
Bytes one and two are the destination and source host
addresses respectively. Each contains both the UNID number
and local channel number. Byte three contains the sequence
number of the packet and will be used by a higher layer of
protocol to sort the data. Bytes four and five are left
blank for future development. Future efforts might use
these bytes to incorporate an error checking scheme (CRC) at
the network level or a word count for variable size
o| 5-3
.. kets. A wide variety of choices exit (Ref 22). The
reader should keep in mind that since a hierarchial protocol
scheme is being used, the data field from the Data Link
Layer contains the five header bytes plus the data field of
the Network Layer. Likewise, the data field of the network
layer will contain some header fields from its higher
Transport Layer. Figure 11 shows the complete data frame as
viewed from the Network Layer.
The software development in the previous thesis effort
(Ref 9) prepared the basic framework of most of the
procedures required to support the Network Layer software
for the UNID. This software established the buffer tables
and pointers required to maintain the various UNID internal
routings of the packets, but did not consider the appended
header information. The primary task of this thesis effort
was to implement the previously designed software by
augmenting the header information scheme and processing the
data flow accordingly.
The remainder of this section discusses the sequence of
processing to control the Network Layer. As with the Data
Link Layer, Reference 9, Chapter VII should be consulted to
obtain an understanding of the buffer tables and pointers
and how they are used to enhance the packet flow and4
processing. Figure 12 encapsultes these tables and the
types of data contained in each.
The algorithms used to perform the services of the
Network Layer were developed using the same three tier
4| 5-4
CC
'-44E-
9-44
9-r4E-_ >- 9
'E-4
1-i1E-4 EA
00
0
E-4-G 4.1
LA z
CAE-
'-4 .E-4
14 _ _ _ _ _ _ _ _
m0 E
E-11
1-4 14_ _ _ _ _5-5_
L.cl)~
El/
Cll
U- ) i.1 -,-E-4
E- '4-4
'I-4
0 8-0
I. °I
r~ro
UU)
Ci4
E-. . .
CD4 CD
4w.
to) 0a0c t nt0 o go W4 0 9
5-64
approach used for the Data Link Layer. The Data Flow
*Diagrams are presented in Reference 9. Figures 13 through 16
present the Structure Charts and the following paragraphs
descibe the processing using Pseudo English.
As in the Data Link Layer, the processing begins with
the initialization of the table buffers and pointers and
then enters an endless loop of calling procedures ROUTEIN
and ROUTE_OUT. Note that the actual variable and procedure
names are presented in all capital letters.
Enter Procedure ROUTE_IN
If a packet is present in LCO1TB then
Determine its DESTINATION
If the DESTINATION is a Case of
LCLCTB then
MOVE packet to LCLCTB
Update the LCLCTB pointers
LCNTTB then
Call BUILD_IFRAME
MOVE the new frame to LCNTTB
Update the LCNTTN pointers
Else ( improper DESTINATION address )
Increment status tableSTATTB
End If
Update the LCO1TB pointers
End If
Repeat this sequence for LC02TB through LC04TB
End Procedure ROUTE_IN
5-7
E-4
0
00
41-)
::) >10 U)
E-4-
040E-44
4 0
E-4 >
c.4
E-4 Q)
040
*00 -- i
04 O'
E-
* 5-8
4
94 -0
El >
C.)a
U21
coJJ
w1
0
900
ii
0
0 E-4C/II
so 0
4
E-0
2E-
E-
U 5-9
14
UQ)
al
,j .,
.r1
7W 41IE-4
N 0
E-4 *- 0
PC C-E--0
0
0 0 4-4
W1
. C.)
-1
4
040
E-4 0
.4E-4'4)
4a)
4 EH
E-4-
E- 0
5-rf
-4 41
0
140
N 44
1 P4 V
0
04
C,
0
E*64
040
a-4a
*m 0 rT4
i
Enter Procedure ROUTE-OUT
If a packet is present in LCLCTB then
Determine its DESTINATION
If DESTINATION is a Case of
Channel No. 1 then
Call TRNMITPKT (To send to channel 1)
Update the LCLCTB pointers
Repeat this sequence for all Cases of
Channel No. 2 through Channel No. 4
Else ( Improper channel number )
Increment status table,STATTB
Update the LCLCTB pointers
End If
End If
If a frame is present in the NTLCTB then
Determine its DESTINATION
If the DESTINATION is a Case of
Channel No. 1 then
Call TRNMITPKT (To send to channel 1)
Update the NTLCTB pointers
Repeat this sequence for all Cases of
Channel No. 2 through Channel No. 4"0Else ( Improper channel number )
Increment status table,STATTB
Update the NTLCTB pointers0End If
5-12
End If
End Procedure ROUTE-OUT
The processing for the Network Layer will transmit and
receive packets of data between the UNID and its hosts.
Additional services may be provided when the design of the
Transport Layer is completed and the Network/Transport Layer
interface is completed.
Summarx
The Network Layer of protocol is the interface between
the transport services layer and the basic Data Link Layer.
For a rather complex network, it can use a wide variety of
packet types to accomplish a multitude of tasks. But for a
simple network such as the DELNET, these types can be
combined into a single packet type. Within the scheme of
the DELNET, the Network Layer simply transforms a data link
frame, which is transmitted on the network bus, to a data
packet, which is used for local processing. This
transformation is accomplished by evaluating the packet
headers and moving the packet to the proper location. With
the completion of this layer of protocol, the UNIDs are
capable to transmit and receive data frames from the network
ports, route the frames internally, and receive and transmit
the packets to the appropriate ports of their connected
hosts.
0 5-13
V.Software Configuration AValiato
Introduction
This chapter presents the procedures for configuring
and testing the software developed during this thesis
effort. The chapter begins with a discussion of the MCZ
1/25 software development system and the UNID environments
and concludes with the actual test procedures conducted
utilizing this environment to test the DELNET software.
This chapter presents examples of the actual commands that
were used to process the software under test. A working
understanding of References 26, 29 and 30 would be helpful
to fully comprehend the following text; however, a general
knowledge of minicomputer operating systems will be
sufficient.
SEnvironment Test S Configuration
The Zilog MCZ 1/25 minicomputer, Zilog RIO operating
system, and the PLZ programming language present an 'ideal'
environment for the development and testing of an operating
system such as the one for the DELNET. The PLZ language is
primarily based on the concept of combining structured
modules of software written in either the PLZ higher order
language or Z-80 assembly level language. It is this
diversification of combining and linking these modules
together that create the flexibility desired for new
operating system development. A second and perhaps equally
important feature of this environment is that the modules
6-1
are relocatable and may be placed into specific memory
locations with simple linking commands (Ref 26).
For example, suppose we have two source code modules of
software. The first module, Testl.S, is written in PLZ and
the other, Test_2.S, is written in Z-80 assembly language.
Note that the RIO Operating System rules require the suffix
l.Ss for source code modules. *The Test-l.S module must
first be compiled using the 'PLZSYS' command.
%PLZSYS TEST_1.S
The result of this compilation is a Test_l.L listing file
and a Test-l.Z intermediate code file. The 'Z' code files
are actually executable code which can be run by using the
ZINTERP interpreter (Ref 26). The code is more efficient,
however, if it is assembled by the PLZ Code Generator with
the following command:
%PLZCG TEST_1.Z
The result of this assembly is an object code file,
Testl.OBJ. It is recommended that for the DELNET operating
systems, the latter method of generating an object code file
be used. The execution time of the interpreted 'Z' code is
much slower.
The Test_2.S assembly language module is simply
4 assembled using the command:
%ASM TEST_2.S
The result is an object code file, Test_2.OBJ. Once all the
modules have been assembled and each has an object file
attached, they are linked together and placed into memory
6-2
using the 'PLINK' command:
%PLINK $=5000 TEST_1 $-8000 TEST_2
This command places the TestlI.OBJ code into memory
beginning at location 5000 Hex and the Test_2.OBJ code
beginning at location 8000 Hex. The linking information is
placed directly following the last used memory location. If
only a single address is specified, then each module is
attached in sequential locations. For example:
%PLINK $=5000 TEST_1 TEST_2
After the linking is completed, the executable code is
referenced by the name of the first module in the linking
string. In the above example, Test_l would be the programs
name. To execute this program on the MCZ 1/25, it would be
necessary to simply type 'TESTI'. To obtain a memory map
of the program, a '.MAP' suffix is attached following the
linking process. To print a memory map just type:
%PRINT TEST_1.MAP
DELNET Stwa Configuration
The DELNET software for protocol layers two and three
is located in the UNID's memories. Figure 17 shows the
configuration of these memories and the Z-80 processors
which controll them. Basically, the network operating
system implements the Data Link Layer and the local
operating system implements the Network Layer. The local
processor has access to its 32 K (8000 Hex) of its local
system memory and the 32 K of the shared memory. In the
same manner, the network processor has access to its 32 K of
6-3
UNDER CONTROL UNDER CONTROL
MEMORY OF LOCAL OF NETWORK MEMORY
(HEX) Z-80 PROCESSOR Z-80 PROCESSOR (HEX)
0000 0000
LOCAL NETWORKSYSTEM SYSTEMROM ROM
oFFF 0FFF1000 1000
LOCAL NETWORKSYSTEM SYTEMRAM RAM1FFF IFFF
2000 LOCAL NETWORK 2000
OPERATING OPERATINGSYSTEM AND SYSTEM ANDTABLE TABLE
7FFF BUFFERS BUFFERS 7FFF
8000 8000
SHARED MEMORY
TABLE BUFFERS FOR ACCESS BYBOTH THE LOCAL AND NETWORKZ-80 PROCESSORS
14
FFFF FFFF
Figure 17. UNID Memory and Processor Configuration
6-4
._ _ .. _.:.... , ,. ..=. 2
network system memory and the 32 K of the shared memory (Ref
4). In refering back to Figure 12, the reader can see why
the NTNTTB and NTO1TB are located in the netwcrk system
memory, the LCLCTB and LCOlTB-LC04TB are located in the
local system memory, and the LCNTTB and NTLCTB are located
in the shared memory.
There are a total of eight-software modules presently
being used to implement the DELN4T operating system and
which reside in the UNID memories. They were first
presented in Chapters IV and V, but are condensed in Table
II for continuity and clarity. After studying Table II, it
should become clear to the reader why the relocatable
options of PLZ are ideal for such software development.
In addition to the MCZ 1/25 environment, the UNID
itself has several features which were previously developed
to enhance its capabilities (Ref 2). The UNID incorporates
1 K of ROM and 1 K of RAM in each of the system memories
which are used for the basic bootstrapping operations of the
UNID and serve several monitoring functions as well. This
monitoring program together with a video monitor enable the
loading, filling, displaying, and moving of memory locations
throughout the UNID. Reference 2 contains a complete
desciption of the monitor options and procedures.
Each of the DELNET operating system software modules
are compiled and/or assembled to produce the object codes
for the modules. To place the modules in their correctI
locations in UNID memory, the following linking commands are
6-5
0 1-4
0a w oW tE-4 E-4
M. r14 W W MI 0
r34 9 -4> IXwI
2:0 coo 0 u rzL >1OL) H )43 w t
14Eca CD 9QzW 0 W aI
EC4 >40 4
S 0 E-1 1 o zz 9$Hg V. (AC 0 W 4
E-4 0 E-i0 CaL)M -
0, z tq cat4W 4E4 qC
>~4 H E- 0C1 "4 W-E
E- Z 0- 8 E-4
r,0 H~dH 1- W -4
E-
P.O4 I E4O W, 4M)" W
1-4- w(~U P nA E4 co2
0*e. Pa 0SE 0 Coiz wz~~~). w .4 z0 P -
rOE.3 0W90)inE-4 W. r-)
0
X.
0 W~ WWH x C4(:x 4 X:~ >84 4
E4 00 0~ W ~ Ix 4 wz W 0 4oc A( EE44 E-E0 4 ~E-4 e.E4 0 s - 0 C4 P 448 to z to . c Z 8 tcox u ca E E-t'xx0 0
0.
0 M ~ H0 X~ H NCI Z X
4 6-6
, w - -
envolked on the MCZ:
1). %PLINK $=5000 L.VINT L.TAB L.MAIN $=7000
ZINTERP.DATA $=8000 U.LIB U.SHTAB
2). %PLINK $=5000 N.INSIO N.TAB N.MAIN $=7000
ZINTERP.DATA $=8000 U.LIB U.SHTAB
First, note that ZINTERP.DATA is the linking information and
is placed in each of the system memories. This prevents the
local or network linking information from writing over each
other. If it was left to the operating system, it would
place the linking information at the end of the shared
memory modules each time it loaded a different operating
system, thus writing over each other. Both the local and
network modules must each be linked with the shared memory
wmodules since each must contain unique linking information.
Once all the modules of each operating system are
properly linked together, they are ready to be placed into
the UNID memories. First, the network operating system is
loaded. Since the network monitor cannot interface the MCZ
1/25 directly (network side of UNID), the network operating
system is initially loaded into the local side of the UNID.
This is accomplished with the command on the UNID local
monitor:
0 >L N.INSIO
At this point, the network operating system is loaded into
the UNID's local and shared memory locations according to
the previous linking information. The portion of the
network operating system in local memory is then moved to
6-7
4
shared memory by the following move command:
M A000 5000 2FFF
This command moves to location AOOO Hex from location 5000
Hex a total of 2FFF Hex bytes. Now that the network
operating system is located in shared memory, it is moved
down into the network system memory with the following
command envolked on the network monitor console:
M 5000 A000 2FFF
The local operating system is then simply placed into its
system and shared memory by its load command. Upon the
loading of the local operating system, the shared memory
modules are written over in a one to one correspondence so
both operating systems are linked to it independently. Once
both these operating systems are loaded into their correct
memory partitions, the processing can begin.
First, the memory maps of each operating system are
checked to identify the starting addresses of each system.
The starting address of the local operating system is set
into the program counter (PC) and the stack pointer (SP) is
set to a value away from used memory (3000 Hex). The local
processing is begun with the 'go' command on the local
Smonitor. This process is repeated for the network
processing. Both the network and local processing enters
enless loops of routing in and routing out of frames and
packets of data respectively and uses the shared memory
buffer tables to interchange the data.6
21_ 6- 8
Software Test and Vlidaion
Perhaps the most challenging efforts of this thesis
investigation was to develop and conduct a test plan that
would adequately test and validate proper operation of the
network and local operating systems. Since one of the
constraints of the original software implementation was to
design the software in a structured fashion, there were not
a great many warnings and pr.ohibited constraints
incorporated into the original design. For this reason, the
majority of the testing focused on those aspects of the
DELNET operation that were suppose to occcur rather than on
the endless permutations pertaining to Murphy's Law of 'What
If' anomallies. All the safeguards that were built into the
system were tested, however.
There was one significant obstacle in testing the
DELNET's software. The UNIDs which were being upgraded
during a concurrent thesis effort (Ref 4) were only
completed during the final week of the testing period. For
this reason, much of the software was tested using the MCZ
1/25 computer rather on the Z-80 processors inside the
UNID. Since the MCZ utilizes the same Z-80 processor and
the UNID processor scheme was designed under the framework
of the MCZ, the differences were small. In fact, the RIO
Operating System of the MCZ was much superior to the small
monitor program of the UNID and it actually expedited
development with its robust environment of memory
manipulations and troubleshooting tools. The only real
6-9
drawback was that the MCZ used only a single processor and
*the local and network operating systems had to be tested
independenly without the capability of handshaking.
Additionally, the MCZ could not actually transmit or receive
frames of data on the network side or packets of data on the
local side. The MCZ was used, however, to checkout the
internal processing of each of the operating systems when
certain conditions were intiated thr.ough manual manipulation
of variables, table buffers, and pointers.
The global approach for testing the DELNET software was
analogous to that of structured design. Each module or
service was tested and validated to insure proper operation
at the bottom most level. Next, the higher modules were
tested which used the already validated sub-modules.
Unfortunately, the complete end-to-end test of the DELNET at
the global level could not be performed due to the
previously mentioned problems encountered with the UNID
development. Each internal module was tested; however, and
provided confidence that the overall system would function
-. properly if provided with a fully opertional set of UNIDs.
The following paragraphs describe the tests conducted
* using the MCZ 1/25 to simulate the UNID processing. Each
test describes the setup and results. Appendix A may be
refered to along with the many figures of preceeding
chapters in order to follow the processing flow required and
to obtain the results listed. In order to simplify the
manipulations of the frames and packets for these tests, the
6-10
packets contained a total of 30 bytes and the frames 32
bytes. In both cases the header fields were complete.
Each test performed validates specific servies provided
by the DELNET operating system. Each service is identified
along with the setup and results for the specific test.
.Test 1- Reception of Local-to-Local Packet
a). Place 30 byte packet into LC01TB; all bytes = BB.
b). Set byte 1 to 03 (to UNID No.0, Channel No.3).
c). Set byte 2 to 01 (From UNID No.0, Channel No.1).
4 d). Set LCO1NE to IE Hex (30 bytes in table).
e). Jump around Init_L_Tab and Init_U_Shtab (this would
reinitialize the LCO1NE pointer to zero).
17- f). Set PC and SP
g). Go
The packet was properly routed to the LCLCTB and the
LCLCNE pointer was updated to 1E Hex. All combinations of
the addresses were then placed into the destination address
4 byte 1. The destination address was then changed to an
incorrect channel number. The error was properly noted and
the STATTB was incremented accordingly. In all cases this
software functioned correctly.
Test 2 - Reception of Local-to-Network Packet
a). Place 30 byte packet into LCOlTB; all bytes = BB.
4 6-11
b). Set byte 1 to 13 (to UNID No.1, Channel No.3).
c). Set byte 2 to 01 (From UNID No.0, Channel No.1).
d). Set LCO1NE to 1E Hex (30 bytes in table).
e). Jump around InitLTab and InitUShtab (this would
reinitialize the LCO1NE pointer to zero).
f). Set PC and SP
g). Go
Results f Test.2
The packet was properly routed to the LCNTTB and the
frame headers for the Data Link Layer were added correctly,
thus transforming the packet (30 bytes) to a frame (32
bytes). The new frame header byte 1 was set to 10 and the
byte 2 was set to 00. All pointers were properly changed
after transfer; LCNTNE was changed to 20 Hex and LC03NS was
changed to 1E Hex. All combinations were checked and the
system performed in the correct manner. In all cases this
software functioned correctly.
Test 3 - Reception of Network-to-Network Frame
OG a). Place 32 byte frame into NTOlTB; all bytes = BB.
b). Set byte 1 to 10 (To UNID No.1 From UNID No.0)
c). Set byte 2 to 00 (I-Frame, Sequence No.0)
d). Set NT01NE to 20 Hex (32 bytes in table).
e). Jump around InitL_Tab and Init_U_Shtab (this would
reinitialize the NTO1NE pointer to zero).
_ -f). Set PC and SP
g). Go
[0 6-12
fResults of Test
The frame was routed to the NTNTTB properly. All
pointers were properly updated; the NT01NS was set to 20 Hex
and the NTNTNE was set to 20 Hex. The test was repeated
with the destination address changed to UNID No.3. This
value exceeded the variable MaxUNIDS and the SHATTB was
properly incremented. In all cases the software functioned
correctly.
Test A - Reception of Network-to-Local I-Frame
a). Place 32 byte frame into NTOlTB; all bytes = BB.
b). Set byte 1 to 01 (To UNID No.0 From UNID No.1)
c). Set byte 2 to 00 (I-Frame, Sequence No.0)
d). Set NT01NE to 20 Hex (32 bytes in table).
e). Jump around Init_L_Tab and Init_U_Shtab (this would
reinitialize the LCO1NE pointer to zero).
f). Set PC and SP
g). Go
Results f Test A
The frame was properly placed into the NTLCTB with the
pointers being updated correctly; NTLCNE was set to 20 Hex
and NT01NS was set to 20 Hex. An S-Frame was created andplaced into the LCNTTB. The proper headers were placed on
the S-Frame; byte 1 was set to 10 and byte 2 was set to 00.
The LCNTNE was correctly set to 20 Hex with the addition of
the S-Frame. In all cases the software functioned
correctly.
6-13
s 5- Reception of Network-to-Local S-Frame
a). Place 32 byte frame into NTOlTB; all bytes = BB.
b). Set byte I to 10 (To UNID No.1 From UNID No.0)
c). Set byte 2 to AO (S-Frame, Sequence No.1)
d). Set NT01NE to 20 Hex (32 bytes in table).
e). Jump around Init_L_Tab and Init_U_Shtab (this would
reinitialize the LCO1NE pointer to zero).
f). Set PC and SP
g). Go
~Results of1 Test5
The results were correct. The only action taken was
that the pointer NT01NS was set to 20 Hex. The varialble
'acknowledge' should have been complimented during actual
operation. But since the varialble is not global, its
values could not be confirmed during this test. Both
combinations of sequence numbers were tested. In all cases
the software functioned correctly.
Test - Transmission to Network of I-Frame and S-Frame
a). Place 32 byte frame into LCNTTB; all bytes = BB.
b). Set byte 1 to 10 (To UNID No.1 From UNID No.0)
c). Set byte 2 to 00 (I-Frame, Sequence No.0)
d). Set LCNTNE to 20 Hex (32 bytes in table).
e). Jump around Init_L_Tab and Init_U_Shtab (this would
reinitialize the LCO1NE pointer to zero)
f). Set variable MAXNUM to 100 (allow 2.7 secs. between
6-14
transmissions).
g). Set PC and SP
h). Go
The I-Frame was transmitted to the network once every
2.7 seconds. The painter LCNTNS was never updated because
the varialble 'ackncwledge' could not be complimented by the
arrival of an S-Frame. Between the successive transmissions
of I-Frames, the normal processing of routing in and out
data continued. Byte 2 of the frame in the LCNTTB was
* changed to AO Hex to indicate an S-Frame. The S-Frame was
transmitted once to the network and pointer LCNTNS was set
to 20 Hex correctly. In all cases the software functioned
correctly.
The Zilog MCZ 1/25 microcomputer and its supporting
software were used to develop and support the testing of all
software modules for this thesis effort. This system which
supports the philosophy of structured software modules,
relocatable code, and the combination of higher order and
assembly language programming, provides a robust environment
for the development of operating systems.
* The DELNET operating system is composed of two basic
components. The first is the network operating system which
is controlled by a Z-80 processor within the network side of
_ the UNID. It controls the operations pertaining to the Data
Link protocol layer for frame traffic between UNIDs on the
6-15
network bus. The second is the local operating system which
is also controlled by a Z-80 processor but located on the
local side of the UNID. It controls the local packet
traffic of the Network protocol layer between the hosts and
the UNID.
Both the local and network operating systems have
access to their own memory partitions for unique system
operations as well as to, shared memory for
intercommunications and packet/frame sharing. There are a
total of eight software modules; three for the local side,
three for the network side, and two for shared memory. Each
software module was tested and validated to perform properly
for all operations pertaining too inter-UNID processing and
communication.
6
I
6 6-16
.Ya. Concluions Aad Recommendations
The purpose of this investigation was to continue the
initial design of the DELNET operating system and to
implement it in such a manner as to make the UNID minimally
functional. The majority of the specific objectives were
accomplished. The continuing problems encountered with the
UNID hardware, however, greatly hampered the testing and
overall developmental efforts of this project. This report
provides a firm foundation for continued development for the
DELNET and its operating system.
Although the software is minimal in scope, it is based
on accepted standards and has been developed in such a
manner as to allow for expansion within these standards.
The foremost conclusion of this thesis effort pertains
to the validity of the DELNET operating system which was
initially designed by the previous AFIT MS student (Ref 9).
This study confirms that the software and data structures
initially designed into the operating system are sufficient
to perform the tasks required for DELNET operation.
Although perhaps not optimal in structure, they provide for
4 an easily understandable and maintainable software system
which can be extended.
Within the limitations of the test equipment available,
4the local and network operating system modules functioned
properly. It is regrettable that the hardware limitations
7-1
of the UNID (Ref 6) did not allow a more complete
demonstration of the DELNET with true inter-UNID
communications. Due to the UNID anomalies, the actual
routing of the frames into and out of the UNID was not
accomplished. This was demonstrated, however, during the
previous thesis effort (Ref 9).
The designs and techniques used to implement the
Physical Layer of protocol (layer 1) were demonstrated and
found valid in the previous thesis effort (Ref 9). the
RS-232C and RS-449 standards provide for all the services
necessary for complete communications on the channels for
both local and network traffic within the DELNET.
The designs and techniques used to implement the Data
Link Layer of protocol (layer 2) were much more complicated
than the Physical Layer due to the large variety of options
for available services. Since the standards which govern
this layer are truely universal in scope, great care was
exercised to select a methology which did not violate
standards yet allowed a simplified appraoch. Using a ring
topology and store-and-foward simplex (unidirectional)
routing approach, a protocol subset was chosen. The subset
chosen was complete in that it provided for a minimum of
services that would insure proper data link operation.
These included such services as flow control, error
detection, and virtual addressing. It accomplishes this by
using a modulo 2 sequencing scheme, two types of frames
(information and supervisory), and a 'transmit- wait for
7-2
reply -retransmit if no reply' acknowledgement philosop! y.
- " Much of the difficult flow control and error detection
services were performed by the Z-80 SIO (Ref 16)
The designs and techniques used to implement the
Network Layer of protocol (layer 3) were perhaps the most
ambiguous. Athough Reference 7 contains the standards for'
this layer, the actual implementation is quite complex.
This is because the standards allow for a wide variety of
services, many of which the DELNET does not require. For a
rather uncomplicated network such as the DELNET, a subset of
services was selected.
A single packet type was chosen to incorporate this
protocol level in its present configuration. Once the
Transport Layer protocol services are defined, the
Network/Transport Layer interface will probably require
additional services and therefore the addition of various
other types of packets. The present single packet type
contains specific header fields which are used to insure
correct packet routing and packet sequencing. Additional
fields were left blank so that additional services could be
provided under the existing standards.
When these three layers are combined, they provide for
a minimally operational system. If provided with a set of
fuctional UNIDs they can receive/transmit packets between
the UNID and host computers, transform the packets into
frames, and receive/transmit frames between UNIDs. Thus,
the virtual information transfer for host to host has been
6 7-3
achieved.
Recommendations
Because this thesis effort is a continuation of
previoug' research, the overall recommendation is to continue
with the DELNET development project. The specific
objectives for future efforts fall into three major areas.
The first is to improve upon the initial three levels of
protocol thus far developed. The second is to continue to
develop the successive higher levels of protocol. And the
third is to develop a network monitoring system that can
provide real time network monitoring and evaluation. In
either case, the guidelines of standards set forth in
Chapter II must be carefully followed. In particular, the
future projects must pay close attention to the seven layer
model of the ISO.
There are enough additional services or enhancements
that could be incorporated into either the Data Link Layer
or Network Layer that would require several dedicated thesis
projects. The following recommendations, however, pertain
only to those additional services and tasks that would be of
benefit to the DELNET as it is viewed for use in the
foreseeable future.
*O The first recommendation pertains to the mode of the
communications. Complete LAP and HDLC protocols utilize
full duplex communications rather than the DELNET's present
* ~ simplex method. The DELNET should be upgraded to at least a
half duplex if not full duplex capability. The second
0 7-4
recommendation is to increase the sequence numbering scheme
from the present modulo 2 to either modulo 8 or modulo 128.
This would increase the I-frame traffic and greatly reduce
the overhead of the S-frame traffic. Thirdly, the data link
frames should be made of variable length. Under the present
scheme of fixed buffers and pointers, this would require
substantial rework of the data strctures. Next, the
acknowledgement of I-frames should be made point to point
(UNID to UNID) around the network instead of just from the
destination UNID to the source UNID. Lastly, a new 'Request
To Send' S-frame should be incorporated between adjacent
UNIDs to reduce errors and increase flow control. The
incorporation of each of these recommendations would widen
the subset of services that the AP protocol is suppose to
provide for the Data Link Layer and bring the DELNET closer
to full standard compliance.
The recommendations for the Network Layer of protocol
basically parallels those recommendations fcr the Data Link
Layer. The X.25 standard incorporates numerous packet types
that provide a wide variety of services. The Network Layer
for the DELNET should incorporate a packet numbering scheme
that is similar to that of frames of the Data Link Layer.
Additionally, the size of the packets should be made of
variable length. Thirdly, the X.25 acknowlegement scheme
should be developed between the UNID and its hosts. Next, a
variety of Network Layer supervisory tasks should be
incorporated according to the X.25 standard to allow for
7-5
error detection and flow control.
While improvements to the present DELNET protocol
levels are important, continued development of the higher
levels of protocol is essential in order to obtain a working
DELNET in the foreseeable future. In doing so, the DELNET
will sacrifice some quality but will realize an actual
operational network. If follow-on research focuses on the
continued development of higher protocol levels, it is
essential that the ISO model be maintained as the overall
framework for future development. It is imperative that if
a subset of a higher protocol level is selected for DELNET
operation, it must be implemented in such a manner as to
allow for future enhancements to the full set of allocated
serivces of the particular protocol.
The third major area of recommended future research
deals with the development of a network monitor. The
ability to monitor network operations would provide a means
of testing and validating proper system performance. It
would also provide the DEL with a pedagogical tool for
network research.
Whichever choices are selected for future research, the
central theme of the DELNET operating system development is
'quality'. The undbrlying theme is modularity and
structured programming. This software engineering approach
together with the established standards described in Chapter
II, provide a firm foundation on which the DELNET can be
developed. A fully operational network which implements
7-6
full HDLC and X.25 standards is a tremendously complex
system of enormous proportions. Full in-house development
which attempts to include all the possible services is
- perhaps a unrealistic objective. But a fully operational
network for the DEL is obtainable using carefully selected
subsets of the services from those available.
7
01
I7-7
D-R124 874 CONTINUED DEVEI40PRENT AND IMPLEMENTATION OF THE2/PROTOCOLS FOR THE DIGITAL..(U) RIR FORCE INST OF TECHMRIGHT-PATTERSON AFB OH SCHOOL OF END!. C H HAZELTON
UNCLASSIFIED DEC 82 AFIT/GE/EE/82D-37 F/G 9/2 M
..
L6L
11111 *r1 50
t!
k i++ .... -
11111L2 1 1. lAO 520
, 1' U t!!i:
MICROCOPY RESOLUTION TEST CHART
NATIONAL BUREAU OF STANDARDS 963-A
'4
.4.
Bibliography
1. Abrams,Marshal Dr. and Blanc, Bobert P. and Cotton,Ira W., "Computer Networks: A Tutorial (JH 3100-5C),"
oLQeinU f tI j] , New York, 1978.
2. Baker, Capt Lee R., "Prototype and Software Developmentfor Universal Network Interface Device," Unpublished MSThesis. School of Engineering, Air Force Institute ofTechnology, Wright-Patterson AFB, 1980.
3. Brown, Capt Eric F. "Prototype Universal NetworkInterface Device," Unpublished MS Thesis. School ofEngineering, Air Force Institute of Technology,Wright-Patterson AFB, 1980.
4. Cuomo, Capt Gennaro. "Continuation of UNID HardwareDesign," Unpublished MS Thesis. School of Engineering,Air Force Institute of Technology, Wright-PattersonAFB, 1982.
5. Davies, D.W., and Barber, D.L.A., and Price, W.L., andSolomondies, C.M. .CmrIuter Networks and Their.ooo. Chichester, Great Britain: John Wiley andSons, 1979.
6. de Sousa, Paulo J.T. and Ingle, Ashok D. and Sharma,Roshan Lal. Network Syste . New York, New York: VonNostrand Reinhold Co., 1982.
7. Folts, Harold C. and Harry R. Carp (Editors). DataCommunications S. New York: McGraw-HillPublications Co.,1978.
8. Freeman, Harvey A. "Local Computer Networks," 26thAnnual Symposium of the Central Ohio Chapter of theAssociation for Computing Machines. Columbus, Ohio, 12May 1982.
9. Geist,Capt John W."Development of the Digital. Engineering Laboratory Computer Network: Host-to-Node/
Host-to-Host Protocols," Unpublished MS Thesis. Schoolof Engineering, Air Force Institute of Technology,Wright-Patterson AFB, 1981.
10. Graube, Maris. "Local Area Nets: A pair of Standards,"" ectru , Vol. 19 No.5: 60-64, New York, 1982.
11. Hobart, Capt William C. Jr. "Design of a LocalComputer Network for the Air Force Institute ofTechnology Digital Engineering Laboratory," UnpublishedMS Thesis. School of Engineering, Air Force Instituteof Technology, Wright-Patterson AFB, 1981.
6Q Bib-l
12. Hoskins, Gregory T. and Meisner, Norman B. "ChoosingBetween Broadband and Baseband Local Networks,"Mini-icro S , Vol XV : 265-274, (June 1982).
13. Karp, Peggy M. and Socher, Ivan D. "DesigningLocal-Area Networks," Mini-Miro Sy , Vol XV :219-231, (April 1982).
14. Koffman, Elliot B. P-roblem Solvig and StructuredProgramming in Pascal. Philippines: Addison-WesleyPublishing Co., 1981.
15. Leventhal, Lance A. Z0 As_ l Language P rgrmig.Berkeley, Ca.: Adam Osborne & Associates Inc., 1979.
16. Osborne, Adam et al. An Introduction to MicrocomputersL11=.U, Berkeley Ca.: Osborne & Associates, Inc.,197 9.
17. Papp, Charles E. "Prototype DELNET Using the UniversalNetwork Interface Device," Unpublished MS Thesis.School of Engineering, Air Force Institute ofTechnology, Wright-Patterson AFB, 1981.
18. Randesi, Stephen J. "Interfacing Minis and Micros toIBM networks," Miiir Systems, Vol XV, No 3:159-168, (Mar 1982).
19. Roberts, Michael. "Multiprocessing Networks VersusMain Frames," Mini-Micro S Vol XIII No. 10:121-128, (Oct 1980).
20. Schwartz, Mischa. Computer-Communication NetworkDaegn Ad Analysis. Englewood Cliffs, N.J.:Prentice-Hall, Inc., 1977.
21. Sluzevich, Capt Sam C. "Preliminary Design of aUniversal Network Interface Device," Unpublished MSThesis. School of Engineering, Air Force Institute ofTechnology, Wright-Patterson AFB, 1978.
22. Tanenbaum, Andrew S. Computer Netwrks. EnglewoodCliffs, N.J.: Prentice-Hall Inc., 1981.
23. Weaver, Thomas H. "An Engineering Assessment TowardEconomic, Feasible, and Responsive Base-LevelTelecommunications Through the 1980's", TechnicalReport 1842EEG/EEIC TR 78-5, 1842 Electonic EngineeringGroup, Richards-Gebaur AFB, Mo, 31 Oct 77.
24. Yourdan, Edward and Larry Constantine. Strucuredlesign. New York: Yourdan Press, 1978.
25. Zilog, Inc. MCZ-I/2Q,25 Hardware User's Manual,
I Bib-2
Manufacturer's data. Cupertino, Ca.: Zilog, Inc.,1977.
S26.• Zilog, Inc. Lzu User Guide ( 03-3096-011,
Manufacturer's data. Cupertino, Ca.: Zilog, Inc., July1979.
;27. Zilog, Inc. Z80MC Hardware User's Manual,Manufacturer's data. Cupertino, Ca.: Zilog, Inc.,1977.
28. Zilog, Inc. Z80-_CD Sofki.re. User's Manual(03-3004-01), Manufacturer's data. Cupertino, Ca.:Zilog, Inc., May 1978.
S29. Zilog, Inc. Z80-RIO Qprtn! Syt User's Manga(03-0072-01), Manufacturer's data. Cupertino, Ca.:Zilog, Inc., Sept 1978.
30. Zilog, Inc. Z80-RT eI n Asemb er an d LinkerUser's Manual, Manufacturer's data. Cupertino, Ca.:Zilog, Inc., 1978.
31. Zilog, Inc. Z80-SIB User's Maual (03-0051-00),Manufacturer's data. Cupertino,-Ca.: Zilog, Inc., July197 8.
32. Zilog, Inc. Z80-STO Tecnical Manual (03-3033-01),Manufacturer's data. Cupertino, Ca.: Zilog, Inc., Aug197 8.
33. Zimmermann, Hubert. "OSI Reference Model - The ISOModel of Architecture Open Systems Interconnection,"1= Transactions on Communication, Vol COM 28(4):425-432, (Apr 1980).
Bib-3
Data Dictionary
This appendix contains the data dictionary for theeight modules which compose the DELNET operating system inits present configuration. This data dictionary isorganized by modules which are presented in alphabeticalorder. Each module contains a section for constants,variables, and procedures which are in turn listed inalphabetical order. Appendix B contains a cross referencelist for all constants, variables, and procedures and themodules where they are located.
• Table of Contents
ModulePage
L. MAIN e. . . . ... . . . . . A- 2L.TAB 0A- 4
!LVN *. . . . . . . . . . . A-6
N. INSIO e. . . . . . . . . . . . . . . . . . . . . . A-11U.SHTAB 9ee9*9o**. A-I12
!iUoLIB . . . . . . . .. . . . A-13
A-1
The purpose of this module is to provide the localoperating system with the main line of processing. Thelocal operating system is required to input/output data fromthe four local channels or hand off and receive data fromthe network operating system.
Consants
CONCMD - Command port address for the USART on the localmonitor console.
CONDAT - Data port address for the USART on the localmonitor console.
F_TABLE_SIZE - Number of bytes in a frame table buffer.
FRAME-SIZE - Number of bytes in a frame.
LRIDESTERR - Local route in destination error.
IR..L_RODEST_ERR- Local route out destination error.
P_TABLESIZE - Number of bytes in a packet table buffer.
PACKET_SIZE - Number of bytes in a packet.
PACKETS_ IN_TABLE - Number of packets in a packet tablebuffer.
STAT_NBR - Number of the status entries to be included inthe status table buffer.
********** NOTE **********
The next constant, UNID_NBR, must be unique for eachcopy of the module L.lMain placed within each UNID orincorrect processing will result.
********** NOTE **********
UNIDNBR - Unique UNID number for the UNID performing theevaluation. See above note!
U01DAT - Local channel 1 USART data port address.
U02DAT - Local channel 2 USART data port address.
U03DAT - Local channel 3 USART data port address.
U04DAT - Local channel 4 USART data port address.
A-2
77-7-7-7-
TDAADD - Global, type Pbyte - Starting address of data forto be transmitted out the USARTS.
TPRADD - Global, type byte - Data port address for theUSARTS.
DESTINATION - Internal, type word - The destination addressof a data packet or frame.
STARTUPHDR - Internal, type array - A message to theconsole indicating proper operating system operation.
BUILD_I_FRAME - A procedure which transforms a packet into aframe.
DETDEST - 'Determine Destination' - Determines thedestination of a packet or frame by evaluating itsheaders.
LDTABHSKP - 'Load Table Housekeep' - Housekeeps aspecified table after a new packet or frame has beenloaded.
MAIN - This is the main procedure which drives otherprocedures through their proper sequencing.
ROUTEIN - Routes in packets from their correct input tablebuffers and places them into their correct output tablebuffers for transmit.
ROUTEOUT - Routes out packets from their correct outputtable buffers to their correct output channels.
SRVC_TAB_HSKP - 'Service Table Housekeep' --Housekeeps aspecified table buffer whenever a packet or frame isremoved.
TRNMIT_PKT - 'Transmit a Packet' - Transmits a packet out ofone of the two output table buffers to one of the localchannels.
A
A- 3
ODL.
U The purpose of this module is to provide the localoperating system with the table buffers necessary forstoring the packets of data after reception and before
V" transmission to the local hosts.
F_TABLESIZE - Number of bytes in a frame table buffer.
FRAMESIZE - Number of bytes in a frame.
P_TABLE_SIZE - Number of bytes in a packet table buffer.
PACKET_SIZE - Number of bytes in a packet.
PACKETS_ IN_TABLE - Number of packets in a packet tablebuffer.
.EVaables
LC01TB - Global, type array - Local input table buffer fromthat interfaces with channel number 1.
LC01NE - Global, type integer - Pointer for the nextavailable position within LCOlTB.
LC01NS - Global, type integer - Pointer for the next byte tobe serviced within LCO1TB.
LC01SZ - Global, type integer - Size of the LC01TB tablebuffer.
K LC02TB - Global, type array - Local input table buffer fromthat interfaces with channel number 2.
LC02NE - Global, type integer - Pointer for the nextavailable position within LCO2TB.
LC02NS - Global, type integer - Pointer for the next byte tobe serviced within LC02TB.
LC02SZ - Global, type integer - Size of the LC02TB tablebuffer.
VLC03TB - Global, type array - Local input table buffer from
that interfaces with channel number 3.
LC03NE - Global, type integer - Pointer for the nextavailable position within LC03TB.
A-4
LC03NS - Global, type integer Pointer for the next byte to: :be serviced w thiLC3B
LC03SZ - Global, type integer - Size of the LC03TB tablebuffer.
LC04TB - Global, type array - Local input table buffer fromthat interfaces with channel number 4.
LC04NE - Global, type integer - Pointer for the nextavailable position within LC04TB.
LC04NS - Global, type integer - Pointer for the next byte tobe serviced within LC04TB.
LC04SZ - Global, type integer - Size of the LC04TB tablebuffer.
LCLCTB - Global, type array - Local-to-local table bufferthat receives packets from local hosts that aredestined for other local hosts.
LCLCNE - Global, type integer - Pointer for the nextavailable position within LCLCTB.
LCLCNS - Global, type integer - Pointer for the next byte tobe serviced within LCLCTB.
LCLCSZ - Global, type integer - Size of the LCLCTB tablebuffer.
INIT_L_TAB - 'Initialize Local Table Buffers' - Sets up thelocal table buffers and initializes the pointers tozero.
A
I A-5
t"DIUL L.VINT
The purpose of this module is to support the localoperating system and its processing. L.VINT is anassembly language module and does not have any declaredconstants or varialbes.
INVINT - 'Intialize Vector Interrupt Mode' - The purpose ofthis procedure is to initialize the vector interruptprocess through the use of the Priority InterruptController (PIC).
INIURT - 'Initialize Local Card USARTS' - Initializes the2651 USARTS on the UNID local board.
TRNMIT - 'Transmit' - The purpose of this procedure is toenable a transmit interrupt from a PLZ module.
URTR01 - 'I/O Receive Interrupt Controller' - The purpose ofthis procedure is to service local channel 01interrupts.
URTR02 - 'I/O Receive Interrupt Controller' - The purpose ofthis procedure is to service local channel 02interrupts.
URTR03 - 'I/O Receive Interrupt Controller' - The purpose ofthis procedure is to service local channel 03interrupts.
URTR04 - 'I/O Receive Interrupt Controller' - The purpose ofthis procedure is to service local channel 04interrupts.
URTTRN - 'I/O Transmit Interrupt' - The purpose of thisprocedure is to service the local channel transmitinterrupts.
A-6
• .;MODULE Nl.MAIN
The purpose of this module is to provide thenetwork operating system with the main line ofprocessing. The network operating system is requiredto input/output data from the network channel or handoff and receive data from the local operating system.
Consants
CONCMD - Command port address for the USART on the localmonitor console.
CONDAT - Data port address for the USART on the localmonitor console.
F_TABLESIZE - Number of bytes in a frame table buffer.
FALSE - Boolean word use for high order control.
FRAME_SIZE - Number of bytes in a frame.
FRAMES_IN_TABLE - Number of frames in a frame table buffer.
HDROO - Frame header byte 00, address word.
HDR01 - Frame header byte 01, control word.
NET_RI_DESTERR- Network route in destination error.
NETRODESTERR- Network route out destination error.
PACKETSIZE - Number of bytes in a packet.
PACKETS_ IN_TABLE - Number of packets in a packet tablebuffer.
STAT_NBR - Number of the status entries to be included inthe status table buffer.
********** NOTE **********
The next constant, UNID_NBR, must be unique for eachcopy of the module L.Main placed within each UNID orincorrect processing will result.
********** NOTE **********
UNID_N V U que UNID number for the UNID performing theeva iti4,n. See above note!
Variables
A-7
ACKNOWLEDGE - Internal, type byte - Indicates either true orfalse if a good acknowledgement frame has beenreceived.
COMPLT - Global, type byte - Indicates either true or falseif the TIMEDELAY procedure is complete.
CTCCNT - Global, type byte - Counter for CTC. Incrementedonce each timeout of CTC.
DESTINATION - Internal, type word - Destination of datapacket.
INPUTSEQBIT - Internal, type byte - Sequence bit (modulo2) to be entered into new frame.
********** NOTE **********
The next variable, MAX_UNIDS, must be set to the exactnumber of UNIDs in operation on the DELNET or improperprocessing will result.
********** NOTE **********
MAX_UNIDS - Internal, type byte - The maximum number ofUNIDs connected to the DELNET. The number must bechanged if UNIDs are added or removed or inproperprocessing will result. See note above.
MAXNUM - Global, type byte - The maximum number of times theCTC will cycle through its counting routine.
S_FRAMETB - Internal, type array - Supervisory frame tableused to build up an S-frame.
SEQBIT - Internal, type byte - Sequence bit (modulo 2) ofan active I-frame.
STARTUPHDR - Internal, type array - A message to theconsole indicating proper operating system opertion.
THISSEQBIT - Internal, type byte - Sequence bit that is4d presently under examination.
BUILDS_FRAME - A procedure which builds an S-frame andplaces it into the proper location for networktransmission.
DETDEST - 'Determine Destination' - Determines thedestination of a packet or frame by evaluating its
A- 8
headers.
LDTABHSKP - 'Load Table Housekeep' - Housekeeps aspecified table after a new packet or frame has beenloaded.
MAIN - This is the main procedure which drives otherprocedures through their proper sequencing.
ROUTEIN - Routes in frames from the network bus and placesthem into their correct table buffers for evaluation.
ROUTE_OUT - Routes out frames from their correct output,table buffers to the network bus..
SRVC_TABHSKP - 'Service Table Housekeep' - Housekeeps aspecified table buffer whenever a packet or frame isremoved.
TIMEDELAY - Creates a time delay between succesivetransmissions if I-frames.
A
A- 9
. ::: MODULE .A
The purpose of this module is to provide thenetwork operating system with the table buffersnecessary for storing the frames of data afterreception and before transmission to the network bus.
Constants
F_TABLE_SIZE - Number of bytes in a frame table buffer.
FRAMESIZE - Number of bytes in a frame.
FRAMES_IN_TABLE - Number of Frames in a frame table buffer.
PACKET_SIZE - Number of bytes in a packet.
PACKETS_IN_TABLE - Number of packets in a packet tablebuffer.
VaLriable
NT01TB - Global, type array - Network input table bufferfrom network bus.
NT01NE - Global, type integer - Pointer for the nextavailable position within NTO1TB.
NT01NS - Global, type integer - Pointer for the next byte tobe serviced within NTO1TB.
NT01SZ - Global, type integer - Size of the NTO1TB tablebuffer.
NTNTTB - Global, type array - Network output table bufferfor the network bus.
NTNTNE - Global, type integer - Pointer for the nextavailable position within NTNTTB.
NTNTNS - Global, type integer - Pointer for the next byte tobe serviced within NTNTTB.
NTNTSZ - Global, type integer - Size of the NTNTTB tablebuffer.
INIT_N_TAB - 'Initialize the network table buffers' - Setsup the network table buffers and initializes thepointers to zero.
6e A-10
.'-DU HtoINSIO
The purpose of this module is to support thenetwork operating system and its processing. N.INSIOis an assembly language module and does not have anydeclared constants or variables.
INSIO - 'Initialize SIO' - The purpose of this procedure isto initialize the I/O process for frames transmittedand received on the network bus.
SIOREC - 'SIO Receive Interrupt Cntroller' - This procedureservices the receive interrupt requests for framescoming into the UNID for the network bus.
STCTC3 - 'Start CTC Channel 3' - This procedure sets up theCTC 3 for proper operation.
TRNMIT - 'Transmit' - This procedure transmits a frame outon the network bus.
A-1l
..........
The purpose of this module is to provide both thelocal and network operating system with a sharedinterface for which they can exchange information. Inthe present form this interface is a pair of tablebuffers which will be located in the shared memorypartition of the UNID memory.
F_TABLE_SIZE - Number of bytes in a frame table buffer.
FRAMESIZE - Number of bytes in a frame.
P_TABLE_SIZE - Number of bytes in a packet table buffer.
PACKET_SIZE - Number of bytes in a packet.
PACKETS_ IN_TABLE - Number of packets in a packet tablebuffer.
STATNBR - Number of the status entries to be included inthe status table buffer.
Variables
LCNTTB - Global, type array - Table buffer for transferringpackets from local side to the network bus.
LCNTNE - Global, type integer - Pointer for the nextavailable position within LCNTTB.
LCNTNS - Global, type integer - Pointer for the next byte tobe serviced within LCNTTB.
LCNTSZ - Global, type integer - Size of the LCNTTB tablebuffer.
NTLCTB - Global, type array - Table buffer used for storingframes received from network side and going to localhosts.
4 NTLCNE - Global, type integer - Pointer for the nextavailable position within NTLCTB.
NTLCNS - Global, type integer - Pointer for the next byte tobe serviced within NTLCTB.
NTLCSZ - Global, type integer - Size of the NTLCTB tablebuffer.
A-1 2
ODULE U.LIB
The purpose of this module is to support both thelocal and network operating system with a series ofassembly laguage library routines. Because it is anassembly language routine, it does not have declaredconstants or variables.
MOVSEQ - 'Move Sequence' - This is a procedure to move ablock of data from one area of memory to the next.
RECSEQ - 'Receive Sequence' - This is a procedure to receivea squence of bytes from an identified port.
SNDSEQ - 'Send Sequence' - This is a procedure to send asequence of data out of an identified port.
A-13
Apedi4
Data Dictionary Cross Reference
This appendix contains all the constants, variables,and procedures used in all eight modules of the softwarewhich compose the DELNET operating system. The identifiersare arranged in alphabetical order and list the specificmodules from Appendix A where a full description may befound.
I B-i
Identifietr Modules~
ACKNOW~LEDGE N.*MAINBUILD_I_FRAME L.MAINBUILD_S_FRAME N.MAINCOMPLT N. MAINCONCMD L.MAIN, N.M1A INCONDAT L.MAIN, N.MAINCTCCNT N.MAINDESTINATION L.MAINDET _DEST L.MAINI N.MAINFTABLESIZE L.MAINr L.TAB, N.MAIN, N.TABF U.SHTABFALSE N.MAINFRAMESIZE L.MAIN, L.TAB, N.MAIN, N.TAB, U.SHTABFRAMES_IN_TABLE L.MAIN, L.TAB, N.MAIN, N.TABHDROO N.MAINHDR01 N.MAININITL-TAB L.TABINIT_-N.TAB N.TABINPUT..SEQ_..BIT N.*MAININSIO N. INSIO,INVINT L.VINTLCLCTB L.TABLCLCNE L.TABLCLCNS L.TABLCLCSZ L.TABLCNTTB U.SHTABLCNTNE U.SHTABLCNTNS U.SHTABLCNTSZ U.SHTABLCOMT L.TABLCOINE L.TABLC01NS L.TABLCOISZ L.TABLC02TB L.TABLC02NE L.TABLC02NS L.TABLC02SZ L.TAB
=LC03TB L.TABLC03NE L.TABLC03NS L.TABLC03SZ L.TABLC04TB L.TABLC04NE L.TABLC04NS L.TABLC04SZ L.TABk.RIDESTERR L.MAINL...RODEST_-ERR L.MAINLD_TAB_.HSKP L.MAIN, N.MAINMAIN L. MAIN, N.MAINMAX-UJNIDS N.KAINMAXNUM N.MAINMOVSEQ U.LIBNET...RIDEST _ERR N.MKAIN
o B-2
NET-RODEST-ERR N.KAINNTLCTB U.SHTABNTLCNE U.SHTABNTLCNS U.SHTABkTLCSZ U. SHTAB
*NTNTTB N.TABNTNTNE N.TABNTNTNS N.TABNTNTSZ N.TABNTOITB N.TABNT01NE N.TABNT01NS N.TABNTOISZ N.TABPTABLESIZE L.MAIN, L.TAB, N.MAIN, N.TAB, U.SHTABPACKETSIZE L.MAIN, L.TAB? N.MAIN, N.TAB, U.SHTABPACKETS_INTABLE L.MAIN, L.TAB, N.MAIN, N.TAB, U.SHTABRECSEQ U.LIBROUTEIN L.MAIN, N.MAINROUTEOUT L.MAIN, N.MAINS_-FRAMETB N.MAINSEQ-BIT N.MAINSIOREC N.INSIOSNDSEQ U.LIBSRVCTABRSKP L.t4AIN, N. MA INSTARTUP_-HDR L.MAIN, N.MAINSTAT_-NBR L.MAIN, L.TAB, N.MAIN, N.TAB, U.SHTABSTCTC3 N.INSIOTDAADD L.I4AINTHIS-..SEQBIT N.M1AINTIMEDELAY N.MAINTPRADD L. MAINTRN14IT L.VINT, N.INSIOTRNMITPKT L.MAINTRUE N.MAINUNIDNBR L.MAIN, N.MAINURTR01 L.VINT
*URTRO2 L.VINTURTRO3 L.VINTURTRO4 L.VINTURTTRN L.VINTU01DAT L.MAINU02DAT L.MAINU03DAT L.MAINU04DAT L.MAIN
B-3
Append~ix .
DELNET Operating System Software Components
This appendix contains the actual software listingswhich compose the DELNET operating system. The modules arebroken up into three major sections. Section I containsthose modules which comprise the local operating system.Section II contains those modules which comprise the networkoperting system. Section III contains the modules whichcomprise the shared components of the DELNET operatingsystem.
Section I C- 2L MAIN o 9 * & o a o C- 3L.TAB 0 0 * * * * . . . . . . . . . . C-27L*VINT o o 9 o o 9 o * 9 e * e o 9 e o* @ oC-3 0
Section II . . . . . . . . . . . . . . . . . . C-49NMAIN"000000oo9* C-50
0
.T C-1
Apendix -C $ac i
This section of Appendix C contains the softwarelistings which comprise the local operating sysstem.
.rc-
I.
0 ~C- 2
49 49 49 *49 49 49 *K49 4L 4t .549 49 .5 .5Cl.4 49 '5 .5C)-- - - -
49 49 IM . 5E Z Cl) E-4
49 w5 Q5 w5 ig C4)49 49 05 05C)~e4O
49 41 *n rz 4 E- 1%09 Q
49 2 r54 wr '5 tr- OE. o-E-
E- E- ZE E-i. .*~~- 05 .5 U)I w .5 E-1 E4E4E- E--4
Z E-4 H 0j. 049 .1 1-4 -C ) C) 490 - - -495) U
49 04 .5 E.5: W mM
ca (4 1~j 1 q A4E rz4 C4~ mN oc N11 9E 49-4' P E-'UWU
49 OD. W5 E-4 00 =)ElW E4UL
49C 0 OIWPu
49 49 CA C4 00000 op E40004% % 4 4gu u 6 4 H064c4 N or E- EI LEE ofX
49 9 H 0 rH.z '5 5
41 .4 z +s W
is 41 C )O Cl) 5 obH
.5 . Hr Czo uol I (D b4 *0 mo
'S *. E-4 640 .5 Q5 01.11
.5 '5WW U ) 49 -4 I q Wr. N t5 W U 4 E- IE4E4mL D1 11N5 ' ma m '5 w W 000 I lwwIQ1000
49H E'-0 H ~ '5 . 0 Qi z49 ZUd O m IMIM 4g 4 w8.5
49 0 '5 '5
-9 49 04
W) WU) UE-)
>4
E4>
>4
E-4 H
gE4> co co
*
E--E4E0
E-4E-z go :> W4 w4
Em E-4 -HHHH
IE-4 4 I II
OE--4
o U)) U)U)U) Q~a 4(>4
1-C b-I 04 H
4~~~- E-IE- 000 E- E-4NU)) )UNN p~)
~~~~~~l 0040 0 0 0 0 0 0 0
W 0 aia , a 00 0 0 000 00 0 00
xp l<WW ww xwgAq M) E- - - lE -E, foE)Eo Eo - - r -4 ZzIzz z z z
6 C- 4
W WJ
.4
~ - ~ 4c
a- R O m ) 4'.
04'
-4 N'
~-4E-4 'E-40 Ul M) 4
gu 4 " 0
0 U E ~CO~ 4~C 4 0E-
z 000 Z Wz dP H-4 M '
dP H 4 Wa
H H4- E-- .z *_ 4
E-4'
t4-
i-i W z 1
4 .4'
I e g -1 C -
E-0E4E E-4'4'HE-Z U 5-Il- 0 E-4 - E4 W 444
64~ab 6)4bb~ 64 4 4'4w'- Q
E- E-Z CO E -4 E- 4,
0 -4 H4 44
C- 5
761
E' -4 a I-4
E-4 Z Z W E-
.4'H E Z ZiE
z- E' E-1 WE-4 Z
E-4 E-4 0 0 Wz 04 4' W
I-4 & . O- 4' E-4 P40 4'E- E
.4WW' 4 4> - dP
H1- .4-'0Z H J
U4 W m D49 4 ZE- -4 40 z D
H E,4 H'-Z4w 049 dP
0) ~ 0 .a; DCM)-!2r3 0 r~- a 5i.4
z Qz Q 0 4 -4 .4'
H-. C0 ) LU0 z 0 4'
E-4 Og 4E-4 H ~ )5 M U)>U) E--4 C) l 8) W4 I- z
W a E '-4 C:) r& WWW~~~ ~ ~ 0- uz b mz0L
cnE1 C) W 0Cz3 ra 4c 0~z -
C) -,- no4 w z 043
z 4 HZ~UZ W 40 ~'**~
Eii O5go zz -4C -Cz co- -
W- U) M5 2: 0b- 04 0' E4 m -- 4 CDZ r4E-4~~~~~~U 5.D4E45- r)4 4 )W -
r4 m 04 E4 E- #C 0 wZ >
E- )0 - -4~ En E--WE- E -4a
5-4 Ul z0 > - = r34
0 - r.~- 1%~ IC)a5 ', E-4z0 mE
W5.4- c Z U U)) H4 >4 54 C) I C,4
0- 00) "a ' m d d 6)04l CO C) EO 5-i C.C E-' E-
E-41 Ei za w A HO4 Oc [ EEra- .0 r4 I g44W >i>4 5
H 4i H- Hi 0 1-4 1 - 0
r4 40 CCU) W ra E-4 c6 4E-
- ~ ~ ~ ~ ~ ~ C Ca4--- - . .- ---. - .- - - - - - - - -
0 Ou =0 m 1 o m m 1OU =0 11O 0O IOU -g09
E- E-4 H E-44' E- 00 E- - 0H E4W~ 0 ~ ZOE-4 wO~ MCE1 W W 0 ZE- W-WE4-
W N a rL 0 :) 44m Wr~d :3 EW44 MIX 4 -4Z 0 C OE-4U
~E4 C OEg A-4 Q H04-HWCEE-4- 0~. -O
to o -4Z V. E4 WE- ZOZ WO E-4 ~ MO W -urZWE4n
zd~oww 0 01>d~rn xOQ 0z~pCworn > r.Pow r>4 53 ~0 M-I W- O~m E- W0 ~~E-4Z 4 W E-4~ E Z .1 -4E bCV -4 E
0 0 0AW
CO 4 CI E- _nC C2 CO- M - WE4f
o 0 dp 0P 0 PC
%- - NI. U
u z
C'44
0- aD 0 - CDn 0- i.D
-U E- Z
p.4r- H4 u-I -I u
CO CD CO O C) CD O CD QO
E-4 WE-0 E4 U raE-4 E-4 WCOE-4 E-4 e-.4C14 4
-c -E'r m m ~ Er I I- I I0n C D WOCO0 c CO O WO E-O E-4 iC Z WEHE-4
wO E-1 4H wO 44. e-4 W r.. E- COW ri. E- M M E-4 M M
CO CO CO CO CO3
C-7
o -
E-4
W4. W~V~
0
Irz
o
H WE-- - -
II II WI I I
o° . •. - -.
E-44 41- H H- El E-4 ZE-4 ~E-4
Z E-4 Z H- Z E- H-W 0 0 0 0 0 C
H I H H H H H 00 E-4 2E E-4 2E--2E--
H Z 4 P 4 4
4 r xw E-4i HC
4>
49 4 49-- 44' .4'
4' 4t~
4'.
E-4 E-4 4 .4
K ~0 0 4 '
5.4 -4 4' 4'.4
4' 4.4' .
z 49 4,
4' 4'.44
494
-49 4' 49
$.- 4 4.
UD 49 44H~ +' 4 49
n 00 4' 4'4W -4 4'r 44
E44'
E-4 4'
rn 4' '
Ci2I~4' 4'4
~*l) 1-04' 4 4'4' 49
Cl) "C 4' 4'4
5-454 4'C49
E-4
El 0 -E-4- E
E-4 P E- 4 E- 1
E-4 W 40 0 0
4'w z- P4 c%> w' En' >~ E 4
E-4~E- 4'0 4eE-4
E-4rE-4-0 0 E-CE'
>4 E-1 E-4 -4
'-4 E- 4'z
1' 94) w- 0w
0 04 > 0 I E-1 494 Ca4 E- 04 4 t
WCE- E-4 i) 4t 4 Wui D3 E-4 4'I) 1- -4
0i 04) E-40 En Z~ Cj2 1% OE
Ci E-4 -4 Z r4 r4 M 4t LI I C 4
0) U)L) Z)I 0' bI W a 4 CD
U'~4 In) tz - u C0- 0 HZ W ) 20 rl9 4' - - - N
z 04 Z U) 0 -it PQ ClWi 1-4 a W) 4' )
W 1E-4C E-4 W >4 E- +U0i C4 00=> 14 U -
14) a40 W iU) - W ZO
E) E-4( i Z 2 C&. Ca)M W E-4 W4H ' 0 NI W
LIC' W-C. t-I z 4'I Cdl . CN 0
W D4 04 Cz 9 1 :) DWi = ) D4 H u r
E- 4 E4I L) In 4' -i 4W 4H 9i> 94C W -4 4' a4i) C')Cz)W-C. gCO CW~x V' gI0C Cik
Et4 N) Cd ra . C' 4'*I it .--4 -I
d) 0Cm E-'4 E-4 ~ 0- 4k 04E4.).4 Cx. E'b)
-4 14 :iC)C: iC) 4 4 1% U)U
1-4041E Z" CL I) E-4 *4 U) In Cd
W - 0) E-4 g i W= Wic Z4
D cw wa c a 4'
E-4 Ei 0 -4 E-4 i
0 C- 1
E-4A
E-_o E4 D o E - o E-i E-40o
Ei4 z z-0 0 4 0 -0-'
> 4 4 4 0- >4 0 >-i
i LU L)o E-i[aE-4 0 E-4 ga E-4 0 E-i W E-4 0 E-i 43 E-4
E4 0 E- zX E4 Z E- Z> > W 2 > +w>
1.4- 4 -i
o o o )U E41 Li H I El Ei 41rJ,, W r W,,1 r, ,W, ,
-Li-4ol Zri CD ZI 0
PA A 0 A A iI
z ra Z w z 4 1r
m r 0D e'10 4 0 w z
w 0 cci~ L) W Dcpu4Mu
D4 E-4.~ ~ o-4~- r4 E- 64 H rL E- 4 ri-i
LiL
C-1 1
r - -
49 E -4 E-04
E- 0
E-4E-
E-1 m E-4 E-4 0 E.4-
z E L -4 W 0. E-4 E- 0 4 &
cn W C> 04 z A4~C rz~M UO W4 ~ W E-4 ZX E-
'-4 HO CO w >CO > w
u -1 E -4W. H? 1 C4 m0
O04 E4 E- -1 -4 -Had l E-4E- p CO m CO
b4 u >E- -4 E41-E- E-4~ E-u*Ca~ l rid )a
z >44HO C4 0 1 COO C4EOO-4
1-4 4C. 0I14 E4 b .1 DKWrLam C4 x H W
ra z -nz0 z< CCOw 0.0 0ClKICO ZI
> Wt c cND00 E-4 H ~~CL) - 4+c
E-4E- EAX u Hr r4Cw4 CO I4Ca z CO)EnC
r4 l M'- z nw nZ DL) a H wE Un rCOrI - 4C-
H a 43 ZO Ia a ~Cl
>. U W. 0W
9 z W C wCz-A2
.-- v- E4 -4 - - -
E-4 0 E- W0 u w 0 R0
L) -4 U-.E-l 0 U H- 0E--4 --4 0 1>9 E-4
U U-
o E4 W E 0 L-4 W E4 0 E- w E-f wz w &fE-
ci a (a a ri 1n W Cla [a (aHE4 Z 4 -4Z -iZE-4Z
U ) > aC ) W co > W l) >
E4EE4- - - E-
+U2 +J) -ICl) +)
W Ud
ZU Z U CD UI D * E-4 a
CD(1 64 11)ZN l) 11
0 0'r~ u 'rzu U 11E-
11 Uo Z v c z Cl)0 U Z2.UC25- ZU'4. - Zi Z -W 0.4-4 Z Z
W o4a0 ori w r4 ~ i2 cl U W
ri. u-e~ E-4 Ei.4 -. z~ u. -4 H Zi
0- = aw 'C HU L 4: E44
* C-13
49
E49
o 49
LZ49
49
CaE- C)lE-
z x49 2: X: E-4a
E4C En E- E-4W4n HE4
0 0004 ~ E4z C; .) ECa)~ra 0 COa) En) H '
1- ~ l~ 4 E-4 W Wa) XE-4 Wa > H>5E4 H IxH
04~E Xl) E-4 E-1H a ' -
W4 4' 04E- 4'0 E-
M C E4 4E
U) n 0 Ina0
L) E-4 IZ (nW -
g W Z W> E-t r
-4 Z 8l) cl m mO 4'Cl
E-E-043 4toe4b H 2 M ~ W' E-4 raE- CE10 QH a) inClCl5 E-1 0 4' Na
En Ca 3' W- E-04)a 8 H l0E-114 CaWD g CW I o I
m Ul4054 - ra. m U 0 ME-0E-44 04 H
HE- E- E-4l 04d E-4 ~ .H4aA 0 5. , K, z
W) Cl) 2c E4.) .M r HQ E A
ad ri u a 0 W 0 Hoc r 0 43'd c W oCZ E4 1 o i E4 -4n m xH
H Ix A4K Z 1-
zw RoE. C' -4 ..
'K 'K'K'ft 'K.* 'K.* 'K.'ft 'K.'ft 'K.'ft 'K.'ft 'K.* 'K,'ft 'K.'ft 'K,'ft 'K,'ft 'K.'ft w~'ft 'K,'ft 'K,'ft 'ft'ft'ft 'K.'ft 'K-ft'ft 'K,'ft .ft'ft'K 'K'K'ft 'K.'ft *'K'ft 'ft'K'ft 'K,'ft 'K'ft'ft 'K.'ft 'K'ft'ft 'ft'K'ft 'K.'ft ,'K'ft 'K.'ft ,'K'ft 'K.tsr4. 'ft 'K.'ft 'ft'K'K 'K'K'ft 'K.'ft 'K.'ft 'K.'K 'K'K'K 'K'K'K 'K'K'K 'K'K* 'K'K'K ft'K'K 'K'K'K 'K'K'ft 'K'K'K 'K'K'ft 'K,'ft 'K,'K 'K'K'K 'K'K
ZE-' 'K ''K'K 'K'K
E- 'K 'K'KE4W hC 'K 'K'K
04 'K 'K'K'K 'K'K
i-i E-' 'ft 'K'K1-4 'K 'K'K~ 'K 'K'KZ 'K 'K'K
C) c~ 'ft 'K'K0 E-' 'ft ''K
* 'K,C) 'ft 'K.Z 'K *'Kr~ 'K 'K'K
'K 'K'K* 'K'K'K 'K'K'K 'K'K'K 'K'K'K 'K'K'K 'K'K-. - 'K
C-i)
*Z b4*~ rZ)
W) Ha E-4
M4 U) C):E-4
Za W: 0
W1C) E- 'E-m19ac* U)E-4~a) IX 0 0 E-4~ Z *m )~
E-4 14 C4 0X H- C4 1-4 ZC:g 1.I4 rw0uQa w ra'w U wa U) W a-
0 04 0: 04 A4
14) E-44 0, IX* a 40 0 n4 -U-Ca oC.9 Z E-4 x->-
>0 z 00 04 0a~00~ad .a Nw~ ,) H)a 24 E-4 L)-E-
Ix 9) 4 H H) lE cc cc. Ca) woc HU > lCii HO * 08) H 0aJm4r&
rH W 0 04 H M: I. Cz)1-4E-4 a)p
0 t u2-i H to C:) 2:) ma) Z-. ~Z :4~ wZa. 0 C1 r0o *4U 004 En. W9-40 * Q)
) C40C Cau 4Z9IiWHW
AwMr4r t 4 40 6>44-*E-4 go E-, E-4Ht 94 W- W E.
Ca.~ .Z En ) zEa-4H ac )ir)O4acE- H~a0 Z W- -4a Ma.a 0 W a m* C. I-
E-4b OPZ W0 - -Maa : 0 In.) 0.
0l4 04 Z W Z Q~ 4U H H HE- 4 n>4
W ) 1 H9 " ME4l- W w H)a N 6.4 4 a14FEn 4 U~) ~Z * VII9 RO
00 rE =: ao W oUI233)"Z 40 W- 0 W E-4 E-4
04a 04 C 0 a) >*
04Ca 0zU L) U)4 Z 0W 4rk 4' C4
4 H 04H 24W 94 WaC)~a w~~C.g.cc W ~ 04~EE CON' W> cn 0w0 Ca) P E4 Ca)CaE- CI:Z ~H E-4 IA W~ H HU w -0)U)>-
0a rCa) w*~* E4 < Z 4 E-4U0 ~ 1
w U A44 C ) Ca) *Z Ca4O I 0 4 0 2-'wp 0 -0 E-4 W W nwi- ~ z 0 r* z 443HWwm
04 Cl m4 E- 0 H XE4c
4i A- 16uw W Zt
----- -4- - E-4 - - -- - -4- - 4 '*W r E-4 ' 4 ')W ~ U) C4U mU z ' 44
-- ' CA E4 4r~I2 E-i E-4~Z rn 0' 4 W'4
LI,.lriIU)) U~rz..LIU)U) Z U cn 0 U) ZO U rL Er, C) U)4 44
.4 . '-4 M -4Q H ' 'M -4 E4M4 4 L) E-10V E- E-4 ME U ))O eE4 E- H' 44
H~aI- > W' &4 12 Hr -4 r W E4 r4 H
~E-4 4 0 U) E-4 ' m E-4Z4 H 1.4 H ~ -4 H ~ 14 H ~ 4 4
EO40104E-4 U) Ca 0 04E-4 ra E-.On 0 P4E-4 W U) U) 0 0 4 0 E-4'4
W W 14 0 U0 M2 -2U >4 0: ra W Hz>0 m) w wU>~ - .
E-4'2 WI E4 W E-4bL w H w -4N L 0 w I-4NL 6-U w' E-1
*p OP dP ' 4 '---- - - -- --- --- - --- -- 4'4
4' 4'4
w) w 14 r42E-4 -4~ E-4 ' 44
ri rn r >41 C3 9 >I cn >4 ' 44
U'10 mI 10l LI M L~ 104Q44CO E-4 -I EnE-4 -01 WJE-4 co H)- ' 44
H 4 -4 Wt0 %0 C4- 0' 44
C4 M rII 0=- MI 0-if 44
0 00 ~ 00 *D 00 *. *'4 '4a-I u-I 9~-4 -4' ''IfI f 114I I + 11 11.-+4' ''
*.( *.C3U W. g4~)U W. r4 W 444 4
wa) w) r4 439 w w + 4 '4E- - E4 ZE4 E4E-4 - 4' 44
0>4 4 u >4 > >4 >4LI u 4' *'
3 0 r.. 94'4 0 D
E4E- E-4 C4 Z 0 E- E- E OZ9 E-4 E-4 H Z9 H'4H4E-4 14' 4'4
0 cc) a ZZ mU) 02 '-E-4 4c4* L,.~.1 t'" ~E-" 4 L)4 0 U) p4 4c4
U)E- u) 4A U) i~ ' 44U)W W)U )14' 44
ul LI LI En r..~ 4' 444' 4
W)4 41
*~c- 17
4'z m
4'>4 0E-H
C44 E-4 E-E- 4'U U) 0 o
U) 4' Ho W a HM W' X:-4 E-
R4 rO4' Z E4
Hn CQ 4' HU
8o 4 04 WE P4)CI)H 4 x 0a N ~ ow -
HE4-4
[a HO W z m o 0 09a4 -U)H E-4 :I Z 4 u -41 2
M 0d RCa) 0 C-4 a40 0ca co Ca0r> H H 0) 4
"E-4 CO- C 4 Q a' I E4 oa '-
W D0 W 49 H Ca) ~ 4
4 E-4 E-4 ow ~ ra H go 0E-0 M>0 g! E-4 ~ W4a IM I 0
1a4L 0 4 ~ ) 0 ' ~4W 9a OC 4 Z 994) E4 E-4 E-4D4 00 H H~a WA 0 zC~ Zk 4' U C
0 0 0 a4'0*04 U)n 94 a4 cU...U 0 0 E-4 >I
H H-4 Ca) etH 04 CA za w 'U- E-1CA) Wa E4H w .UlC 9 H u H' An w
E-0 E-4E'14 -4 o) ' z In8) 2.' r.A.3 2) ) E- "ZCl 4 U) 6) E4C'1
0 &~~Z ~~CaE-s 04C) H U 4 U0 0I
E-4 aE-4 W4~I1 ig U) 4'aca z0E - -O Cs H 0 r4
HU) 8~ Ul" 114 W Hg ru Ua UA 0 $4-W CaH ra). En8 4c H z
E-0(a w ) to 64a r ZAa go/ 1A9E4 H )ow rs. H-~ C4 W 04 ~ 4 Z '-I Z -UCa..Ca. 6414a 0~ E-4 .a~ 00 04 E44 C') FZr H
ga OE4 0 04 oC M C4 P40 W 04' =) WI H Ca0 M U 04~d IE-oG~w ui U) 4 E- 0 -
N- N 04 4 4 > > r. ACI) ra Caz D'CCZE lg H M 04 4 > 9 Z H H
0 ~H 41Z 9QMEUWWC 04' wI a49 04 in 194W v 4 ~ 41 C>4 HO
04 W H E4(A 04 Ca *)4 H
Q Zn 04E1 IM' 4 ~ -- 0 H E- E-H E-4
z C-i 8
IZ
0 -4
Hra0 E-4
E4 1:4 U H D~4
U) 0H z E- E-4 E-'(n~ ra 0 Hb HU
04 > 04 04
01 C- m
u zZ r W )wo : 0 0 ~ 14,4
I 044 4 zL~ 04 4
0~C)0 'C 4 + ft I 6.0
-z i.- E-' -
_ NI- 0 Z t- D4 6 QC4 cn -- -0c- E1r 4 n
0 0 X E- 164 I 01r4 PU .b4 E- 3cr- E- E-4 C',E .- 4) E ~ ~
CD 4) U) 04I 'C CciO L)0 b )A4
a O ~E-4
S zaNOl~~~0 EnQHOz OlO
w6aP )0 Wr
m C-4 19z0t - - % 4H0zV q zz4E
H - 9
) Co 0P 4
H) '= H 4 &
o- co 0
P4 z E1 w 4
U 1:4' >Uo ~ Cz0 00
UX 0& 0 Z 0H
+ ~ - +
H -z
Q 40~b ( 0Z ~ Cz
I E- CD UUH oUb ICo- E-' 43 04 0 CA E-
Uo ColEzra DQ
4 W4 E-4- uI 1U4 w - A ra P4 U4
-~ ~~ II 4UImQU~i
Z U 0 -W W 0E- WH4 ZClo1 z- ~U) E- E-1 D
E- L) A 0 4-- =0 m ~ mawU1 4 0 -40 ~ -~ E-CoI 'n -4 H w w
jeI~ U3 W I E4 E-4 Ca) (n z -C U3 E
94(n0 H w:UC D zU E-0 p U
-u E-1P HMHU
rgQ
C-20
I"~
02-0z coz
>4 C 0 E-4rad-4
"- EI " 9
-4 0 ,.
-b,4 .
- E-0E-4 E-~iIZ Z
ra z- E-, E-
,w c WQW -4 > U- 4
^- =- '
ql2-'
M0 r4 0
rk, E-4 Q Z 64
W - 49 *
(ia 64 Z
o 4 E-4 i .E -1>Z
LA 0n CA-~ E- -0 ~ 2'4
P0 E-4 W~ Zr"WE- u 4Z E4DQ 0u o CDz 0u C 4 04Uv Cb
A 000 w00 4(z-Q M: m
(nI b-D z CZ : Q - nr 64H -4 E-04
0~~~~ z W>> 44U~~~~~ A I-=0 0 m o -
0 4 E1MX 44
E-4-29
4E-
E:' z E-40
z C.) 94 - EZ ca 0 r4'
0 Z w E-
tot 0 E-4 H H Wco M HE-4 X E-4L) 8Z W 0 IzraP
ra $4 E- 0Z = >4 W -KbU Z H 9 W E-4 rC) m: r4 Cz.rznI
E-4 04E- a E- C E-4 M UoQ R'<- Em N 440
0n r 0z H 04 u~ 0 ---.-
W n Z H Ilu 0n U 0WW 0 E-4I> r4 0 igH
0H-' 0z~ W D4 Cl)a-4 , Cz El- 0 '4 )
E-4 E-'4 :D 0 M E4E-
>- K- ra :01 8 46' 43 m' 9 - l
-4h 9S I WIWE- r
P4 0
E- 80 4' zlg II
0 raCz . ca 0)4 4 JA 0 4-A4 H -a I o
E- 0 cb-W22. H
-4 H
E-4 E-4 E E4 - 4 c E-1z d z d z . zU zl H~ z
- OH - 03-H - 03-H -0 ZO E-4 H 04 O H
2-i 4 2- '-4 sc H 4 4 w H4 4 4-04 02 XG 0z w oI W2 g H 02
04 E4 - 04 E- H 04 E-4 0 -4 HEE-4 Ei 2-4 9 - / 2.4
E-4 U C E-4 U Ca) E-i U CO E-1 Q 9 -4M U E4EH 0OW H o rX3 H 0 al H 0 wz)0 H 4W 3
S04% N N4rM 04~ 04 W Z 04 2 2 43 ) 04 'I04 C14
bG En W'C)b Ca) 2cn
2-iU +U L) U 2'~ ) 2i~C). ~H EiE
6I- 4- 140 4 ~ M E-Ul rl) U))C4- U -
to) C ) - ncn0.n-)
z 04
E-0 -4 E- E-4 2EA E- .) U34 -Z:u Nz-: 2 ZC4' C2r: L) l E- L)I
.- )o0E- 1%o0 E-)00 A)0 00 a)004?
U) Cl L) (/ (l Cl)
04 ~ ~~~~ &4 Z4 &44s) 2~0
E-'~ E-i 0 W En
EZ a= WCD4H rLa C.
C-23
-4c
-u0 -* u uo *
E-4 E-4 E-4
E-o Ob -4 4 E--I 04 0 zO1
E-0 e E-4 '
1-4 OZ 14 mZ bi 0 ~0 'PnP
u u cc 04 P
- -- 4c *Cl24 E-40U P- 49 4
zC zrU zP9P 'P. i
z 14 z 4 Z 04 m P
E-o E-' E- - -4 E- . 'P P'
-H - -- )
C4 5) W ) CUz13i m 9- E- 'P
E -4 5-4 E-i 5i E-4 Si M5 'P.4 4
u-5 U) r-4- U)4 4-9'U) ) )494c4
'0 U) ) U) P 'P'VaO:
E-1 P 9'-11C
HP*~r 49P P
'P 'P.
~ 'I' '0~~41
'P ~ 'P
CP-24P
4c V
49 '4' U4
49' co
U) 4' 04E- W4
ul C4 M, WH 4'
Z .234 Z' 0 E-0ON OI E-4 2 00) 040'
jOc 3-4 4-(g 0 4' N
R~i4l0 >' 9 > 3-4-4 -4W0- Ix z Z "
0- 4-E' W' W- N- N mN4 E-4 W4E4 M X-: 0 HE-
433- ,.n w1- 4' Z
caNZ 0 u 4 ow E-' E-0- N- 'C E-1 4'z
E-4 U) 4'3-4 (n C4 4'
0- m:)N 0 -4 4Ero 0- E-4U)) 4
Z~ E- -4 H W'
E- N'-4 4 CD 4
0 8n U0 MN 4'c 0
w4 2a E-U) E8 n 3-' Wg H04'H=
m4 ~0 gZ E w, 0E1 -4E
IA -WHO'4 1 = P4 U 'C(a.. z E-4 4 W 04 04N w ' N z z 4- c
U) 4' NW' .
Z " 4 N W
z- W " -4 Z E. 24' E1 -4 E-4fn) 0 E-4 04 * 0..z04U) 2 I U O E- Z Z 4 >
948U a4 1.1 U) 34 9 >E-W me' 0 04
0N 2)0n40 1 NN2 0 ''4 R E: E-4 E-4 &
* C-25
*0' 404c*0
4cE-1.0
1- 4 4'
4' 0
4',4'i 4'
4',o4' 0'
0-44c 4'49 49
4' 4'
4',49 4'
0' 4c4' 0
z4' 4'
4' 4'
* 4'
49 4'* 4'* 4'
E-4'
E40 00i
> H'oc 4'X: 4'
4' 0
42 4'
0' 4t4' 4'
4c 04' 0
El 0 0 C-26
49 49
41 C) E-it 49>
4 9 U) 0E 4 9P-
49 4 E-4-4 ~ 4
CaaU) 49 zr E-) Ca C)49 U 41 2c 0 H H4 H9*4 O L) X IU ) )U)
O949E- AD 4 CQ E-4z * -
49 9 ) > 4g)
is 1 03 P4 w
119 9 En E-4 4 P9 P43~H W-E'- WE4W 4E W
4g ) HI- P >4>* P UEn Z 000 00 0 00W0
49~ *U)0C/49 *PPa A4 E- EQ 0 -
4. 0PP. 4 0dX. CC0
It 49
0 o A 4 ra43W r 439c-27 rH 400 > 00a0 >
.4P 0
49 49I-AIt P91PP P94
PP PE-i WPP
rz9 04r
PP ~z E-
0 9E-4 W. C2 '
4c~ E- 0 W.eWzz W
49 9 6 N QP WePP * aE i 1-4 P z z (a49 4 43 E- XX X
4c ~~ 41Z 4ZE4W I XXX
49P9 -4 WO W-4 Hpx
49~ E4i H w Z
Nc 4P H,. = I Hpit4 Z 0W>4E E4>
H~'- 4cP -
PP4 4 4> ZE4L 0 CO/r41 W 4
PPE-44 >~ ocE-4O wO
o ~ ~ ~ ~ c 9 " P 3 1
1 PP1 49 6 I Cl 0 a 14 IXE-
*. *PC Q E' COO ~ e0 X 0O
E- E-4 1- O P 9
* 49P H 4 4 z i 0 1-4 W W
Im WW k 41* Z 2 w 0 C C- W8
44
4'4' 4'
E-4' 49
49 4' 4
49 4' 4
49 4' 4'
E4E-4 4 '
- 4' 4' 4
o D 40 4 CCN 0 0 4' 4' 4Ca) 0 4' '
0. I-0 4D 4' 4'0O )0 0 04'L UUuuuu u 4' 4
E4E4'4 ' 4'
1-4 1-44' Z ' 4
C-29 4
49 It .9 ... .
415 49 9 449. *5...5.59 .5 5
495.5 ..49. .5 5.*5. *5 4 549. 49 49 .
4t Iv E-1
E-i E-4 zI ~ ~ iz0-0o c 49 D~ Zu E-a4g0 E-
* 0 49 .1- 9 It*.. E55Z-4 0N E- 4 a t I
49 *55- x4 HEb- Z~-a- 09E-'04 C n.5* 46 .*~ R wi A.C p E-. H 11
EA 49 K.~ 00 *rz > u6 to49 * C4 W. RfU- e-0 z it .505 rzd z-EaE zEa. 0 1-0 14
:3r' it ic. E-41~ (a't- - CD ) H00 - t i H55~ A~0 4 *-I V, m
49. H5 0- - E-4 C) 0E49 4 WW is it "5.51-A 0
* * 0 M ca w.5 494~ (z04-i- E-40 MwI* 49 E5 .*-4 EVE"t CCC - 9 4g4 4 I-t H 0 04o2
045. 49J *4. Na V) >5 .. z. E- 1 QZ ZObC IH0 49 *E-4 I-C2z 9'O.. E-a .5 5cjv. 14 it. 0 -'i
4g4 Q5 .5 -i c a * tq uIE4 rz. a H 4 ww*ii 29 mE'u H lz"9 - 9 kHm0(E- 04 E4 aH x C)a. zy . 149 1-4 H E-U wr
H-05 090 CKU .19 - > ::E-a0 Um.H r4wEl 49 49 W5. QWHJ 00O H rZW9" A0 A..* 04WM 4 WaA.O it .* I oM 0I
F44g~~~~ogr OQ N* H w H m o
C)4g4 0 C 01 E- r. E4 .t*5 H. r f 0 W 0 0
04 49EaEa E-4 H.OOw5ow.5E4 4 0 zW U2~ooxo
~ 0 5 ixE40 "69 g* .5 OMZWb4. 0 N. toL W." a 54 c I Z m0J
r" U c- g r 10MO-
114 1
Q o 0M rs ZE-4 W~ 6C U)I-
E- M)- ru Wi~i WiE-'
U)0WUC) Z W 04 HC p
94 M 04 mU ~ 2 z M to4 E-4 :3 04 z
H- 2x 8E-)CiCi E-4P1 O I CO) Z" I ) ~ C) H : 0
L)) W f-P H C13 Ix 8 > p -4~ L ) E-4C) -iE'02-I ~z W E-4P14 ZEP
PC') WU2 WE rH0 QH2 HU)UE-4m~P E-4~ W 0 M- %HIMc-wZI4=
4 p M H 4 CD W E--4t mr i% E4 Z1 -0 H00 ULb 23 Q 0 Ci) P1 P - o MM&
4-P ixpg > -m0 0 'U) 0~.C) CD Ci) ix)P MIE "O n E-4 m1 M0 EA W 4 84 Wz : W i.C u' 4 0C))P
E-4 ZHPH- "H> Q.~z E-4- W' U) E,'. W W 04 0 H P
21:t H- H1 x Ixu )U)0 0 HPH-44n u-. L0C)Q P1 0 'E-C gP - )CzP E-1OI-4E-lCa. E, ZH 4' 0 -C4-0 4 > 00E- H H 2: HC In
U)4i W 9 04 C"~ 4H- 0 H1 m. H~- W'z)- 0- H- w0 Ci gP wP E4 w E- 09C' E--IP HHi)P 840 Wm pE-w M
E - E~ P0 -H 4 U 4 0 02HE40ra H P1 HE WH04 0) W. HC WIPC' ) g> :3 8M
MP)- H H 2 4-. 44UH0UH"J~9 z EIH Cwo 0H (no '8 WE0 E- wH-.i C4 X P1. MW. 4
00 EgHHN4 H4 w~ g- 2--4 W~z. H X 414Ix U HE-P1 ~8 ,M H 9HPU Ca)-i22. M4~H ) 0 0 0
-4~ *- HeI~ E-,- 02EriiUE.CI P0~CI E U"C HP.CZ) >
w'0 E40- E4 sC 9E- ~ CiH ' ,E- 9 H C DH u~E r- E-tW1 2 0>4U)4 OH H > 2 P ZCE- E-40 Ci) 0i m o C OD
4 P4H224 Z. ->C'HE-U u H~ P1 HIP1 0eUz
Z) 1-4 H 9HW ) lM. 0n W- W4W2- 0 n2 =
- H P4 0) WH- DWt NHH W060 Hmw a~ C4 o R, M* p M * " *l 4 E- H 555 *5S*S* ** *5
0 C.4 31 WMH
A4
I.9
49
490
49 E-OU
E-e~~U) pa0 0
E- ZUO4 F- 0 E-4E- E E--' o > o U
'-9 H o H 0zUO *
H 49 ::) M) ~ 0cz W H E-
m U) ON 49 R-"4F wwwwH -*a to M 40 49 000* 4& 44wm
(n 49 04 E-4 E-4 44 4 4HH a Q~~ El-- I
it ~ w c 0Z--4s s 44 -
CE)s E9 *4 00 Cl0 U)WcH* E- E-4 E-4~ E- ~0E4I H-
49 * U * E- 10 oDu c* w 20 )I) ) q -
Oc8 * 0 FC 4C 4 4E40E4 0E4 xi- " E4 * 0 OO WN 0 E-4 V N M 4 0 2 0 H
ad U) 0 w * M: ridooo E- o 0E49w- E-4'I 9 W E-i lE-1E4 E-4E-4 E-4E4 E- U)v01 w0 * 88Z
*H go 4c* M Z*0o w ww o 0 W Z C4E-
4 0 49
U) "
L 4 -4 00 00 006
4~~ 0 L) >E24aE-214wI1-4 ~ 64W*
:3: > .QH
ra H 90-32
-4'
>1
E-4-4'
000 04HI0 0 ° 94 A
rz 4 a
E-. E- E- E-4 0 rn E-4C_.-,_ 0 04' [
0- 0 0E-4 M
E-4 E4 E-4 H4 0 0 4 E-
P2C I 4i oci ~ E E-4 P.. Imr-4 II 1-4 en 4 C)
.i ~,..
0i-4- N4'qwrd
E-4 E-4 E-4 E-4 0 C12 Ix-
CO: CO: ad: CO E- E-4
9-,, , ,= = ,I4
m4'
r..,. 4.' r.,.
00 E 14
U C- 33H0 -f o H o41-4 0 H) 14 4 4c
4 -4A - 40AI-4 Q- Cs. E-4 0'H H H H- Z E-''d 4 JC U3 U
PZZZ z0 z~ wzI r4~z mz r4wH H H H A& 0 toU CA 94 %9 4'
4'
ri~~~~~ E- - - -- D4Qd 0 4'D90C Qr4( 1
E- E-4 E- M- E- 3 >U0 Q '
H %H A4X 0 -~1-4~I-4~H ~ j..4 0 -b)4
0 64 A A -4 46. 19- UH.14 1510 'on4 z"- R E-4 WO
4
C-33
49' 49E-')* ~ ~ n -i 0 H E4XWZ > E44it s D > IA Nt2 U 0 )r)4 go4
'K'K0 W0 1%4~) ZK
'K'E- .'4i) 'K tn HE4 - O4-4N
O'KM 4~~- E- C2. aK En
4c) 4t5- E- 0iOA n cn 1 'KI * Q
'K'KU E- H~C) - 8 * 'K -I #
E-4~ E- -4M)E4W > a00 4 > 0 E- W Z W &4 4 C1
-x' 0 E- wt4 1" pl M Er 4-4HE-4E-* *KK. 1-4 w~C w E-4 E-0 a% U w-IS'V'KW.
N KK 0 Er4 W H-Ei U 2 N CaH) - 'KE4'KK~54 WX~E4 0- -4*5n4z*Ch '
4*9 0 n404U)r4 z) Er4C~ o > 4 0 U r- 9449 H 2' lm) E'2 W z W g i w H c* 4g E) -4 E-4 H 404 C) :2 )* 4 H co0 a UEl- E-4CD 0ca) 0 M ) z 4 0 r*K '1 Z H m) to w Q 5I4u 0) -i) ' w 0 0i~) p- ~0 14* 0 W 0 :E4E- 2w)m 0 2 U)~' 'KC)Q
*KK- E-4 AC. 04 H- Za 049 0H !5 O > u- 00 OO 0 m
rk~~~ U~ g.) rZ U WWJ-4W z 2
fa'l- EA 2C.cU 0))~ 4a 0 04 C4w >,) 'K
49' E-.- H U1-44 H O n lM NHC 00 Z ~ ~ '4%' 49 NI U-z2~ A-U .45-. MH W8I Ow w' W N U
49' it-% Q u~ Z -C)E UL~ PQ- i COI 94 r2 W
0 4K 1 - I-C! P )-I~ W E-45- 0 U~ K W IC.)WE-
'KK5 * 20 E-4 'K w - o c 4 -
49 z 0 H c45- xl~ E-~E40)a0 0)2i N E-i b4~ 'K I49 *KK- H E4z 4 E-4 :EU) E~- 4 z ~U4w)049 49 0 H-I 1-4 H 9 4 0H 0 ''K'K- C44 z E-4 0 C l) 'K
ca' WH 09W L) En)H0U)'wE-K'& 5. Ql =S- Wl E)-0) W 9
'K' ZV~ E-4 00 C4 Z'
41 * 0 U) E-4 Ca.,41K0 5.4 0 U3 *5-4
'K'0 0 0w. . -'KK 49 R 0 E-4E-4E-
it 4 H- 04 0 H- 2 ZK
c-34
'~ E- 4bz
0 O~0 0U1 I
E-4i-4E- XO H -O'
0l 94 E-4Cl
SC)E-4 04 %D ) E-4
-z. c roz.
b-2 U)E Z U
U- w) z) t~ 0) r-4~ 0
o-1- C-l-)€ .U- o,, I O O O O O O 4 0,-0 b
IC4 E-1 M
Cl) Z wr~ <~)
in Ul -P b-4 CH 04r. M 0 E~ -4 Cl
U~~~ 0 U E' 0C) Im 0~ -U
U0 0-3
U3 0 0 0~- P PQ 0 E0 0~)Uo W- 0 co~ 0- H-I M L) l<U u~EII E~- E-4
U)~ 0.I
0 Q- 00- 0 0 - nWU -
z- I-IZlw L U zb- 00 0E-4 U W- U C4E U x-- Q- Q V~o H C4
.- 00 Q 000000 0E-c 00W
00 0 0 000 000z u
0 4 ul 0CH35
49
oo 4'
x E-4 X E-' 1 -4 4'
%D 4 q 4% CD. E- %0- CD 4
ab in)O E- 0n ft4'0 C t rI t mU'0 U 00Q% H- U0 U &.owI- UO o 1. 4'
V to a. U E-4 C/I M '
0 aC4E 0 0E4rE 0
4 W m 04u v H- 04 U) a WU U H- PC U)PQ WU U 44 1J to) s4 .. 1U to 64 64 U) 4
CO W N- .4coU L ) W 4 ,-COU~ C r 4'U-Q U- I-I to~ 4'
w 0 C -4 uH WW U)P -1 iH CU) U)~ 0 C4 El 4uj eiOE- 1 1t-4 En W W4 M W~E E-i W) W I~r M 4O E (n
cn 0106 Hmmmo) 10 z H In M0 1 IZ 4Q r U ZJIwCL) I w C4 r- U Z~l1& w Cr&1 U U
S080 OMQ 00 OE'rI 0Q 0E-4rOH OH-4 4
EAE- -48 :E- E4E-4E-4 E~U -4 E i E-4 < r EE-4 4'
00 zJ CI a u~ u 4'4U)i)UU U C-)OOMM W M E-4 E-4 W < E- 0 0 W W CiEn nEq-4 Co 4E- 0 0U).rU) C (AE-1 E-'4
4'* .s .. to. . *. . * go *s go.go.ca.in co...s 4
0 CD a r CD D C r- Q ( CD r-I 4'0 F- 40 Q 14 C> CD C rq D4CF-I q 4 r4 F- CD -I -I r4 C 4'
00 C 0 Q- 00Q 0 u-I 0 0 0D CD 4Q0.-s :Q :cM 0 D CD- 0c 0, 0- 0: 0 m4 D CD0 -44 0 N 4 u-1r 0 com< ( -I -- o4 0 raCIal C o-1 4'ODeCD 0 CD C -0 0CD 0 CCDD(DD pr 0 CD- 0D 0DC DC C - D 4'
00m 0 0% 00 0 0- 0 0 m 0Dr-C 0 N 4
0000 CD cc00 000000o (D40 0000 a.IO Q4'D ( DCE-4 -1 -4 -4 E4 E H 4 E &4 4 E E4E4 E E- E- Er E-4 E-4E-4E-4 -4 -4 -4 -4 E4 E4 E4 4E
C-36
4.
49)49)
41U)z U) aE-4 ,- >
"C 49 Ld 04s z 2 rz.,
W -U "- U E-049 4' WC 00=E-4 Ow 1- U E-4 =
1-4 49-E6 M -9 ~ Z0 0~~f4 W E-1 >4
*09u9E 'E"U Z~ C4 8 H. K- E-4"I- >
49 49 raZ 049 8- 4)-- Rz. 42 w>:i < - U ~ c
09 *9 5- E-4. W Z"Cul r49 w.P~ E- Ws- M H 4 R.ZW f -4 M E4 E- 4
49 oF 2: E-'c--E-U:~~E-4 r0 0UE4 r-' W4 r4 si C E4UZ r.-
"C 5-' E-1 0 0 4Ulw4W Z04 0U94 W-ZU E.4 rz144r 0E4
0.9 49 4 ~0 U )0 ) E- E- IX Zn D) 0 0CI- 5-4-4z u)4I E-4I-
4 -% HiiE z U) H-4 54 W -4E-4WE
4E- W800 ZO o N-9Z l C z Emn 04 93 E-4 ~ UI- CCi- O H W Z M
Hz ~ 0 HE- -4W-4 P H )w 0U) 2: 9 -4 ~ E-U)-4 WU E-4 ~ 046 W0 UM49 ~ U)0 N r4 W>I U) E404 04 9 - 0 =
Z4 W4ur 4 - nW
49493 H0 MU MM NW mU 5-' IM w.UC)-C~ >
E-4 W W H P W H H Cu -4 HUU -4 ZW0 C4 X H~ EI-4 Z -- UU0~ 0 W-Cz
4949.- U) W - 1% 1 -4 H=)C4 1- H E~ H -* 9 0C ) E4~ U 0 M- 0IE-4 W'=-OZ-0Z E-*4
49 w) w n"4C- a =1 - nC -U) 0- E-4
• 49 H1u
x C9 -37- XHH 9 H 0 Z E4 4 > C
4cl P, - -4 0 0 .2 Hw Hm - -E-4 04HZ m H
H1 W "= Z uc.19 2: Rp 1 W9 W -
491 49c E4 r H4 9 O w m,19 4,M014 0 c9 E4P -* *1 U E M E4
W1 >,1 w0 r4%c
49: 8 0i 04 - rao=
ad E-4 oE-4=00Of %0 .00.0 0 0 , .0. .eft 0% 6oo ..0 % %0
,| C -3?
49 4949449 4'
* 4949 49
a 494944944' 4
*l 49
0 49z .4 a.
49'
"2- 24'-'4> 4' 49
0 4L E4'00 4'HH -
49-4 4 *49 U3 0z
E-49 C *8b- I~ E- U-4
948 0 X 4U 0 4
E-z to4 x -
Ho C42*0E -%E4 &4 H- * E-4 Q E-' 04 4
CO-ZI H' 0 w 4 Wz 0 > 9~4
H E -o l in 8 o -E-4 U'..- C12 0U 4 4'
H Cz 4' 4Z E4 0 4c
2i8 4' 4'
H4t 4
c o H H 9 P 4' x E- 4'
Z 2-C2-4 4 4'1 F4 ER4U'E4 - 444 9 E- 49 x- R: 4' ' z
W 4'
E-44E-44'
-4JE oc M)44' 4t
4' 44' 4
W 4' 4'
E-4 X'- 4 L)
Z 0 4 * w
* C -38
49p
49 0
49 49 4-4 W E-*4E- H. 4c-
* 4 0z - W4 ~E4C U x-4V)1%
04 ~ ~ E-Ga r-4I.-4 H 4 w .H
E-) E4 (1D .U
E-2E4~ 42 W -4(. E-44~ * g~
0~~ ~ ,-4 >4 z E4 -
C9 r Hra0 z u a r 0 4C
49* 8 c w 0 E- - 4 0 04 W.E- Q*
0c& - - 'u0 R
49 4904 E 0W UiCa -E4 u
W) *0.- C4 W EE-49~~~~' .-t 04c - -
* a U)4 E4 Z -~4UP 1-4 ZPI C U1 04 0 U)w
481hEU 41 x 9)-
*a rz2U z~1 0 )HE104 -
4*1 w5 CaO4E & 44CJ 0 (121 C 2 z-
4 4 m 9)4U) 1 c .W r 4 ~ C4(1 0 n0 - E -
M 04 0 zC) W >12 ZHZ- >
m 8 . E1-4 nE4E4 - -
) U)ra(**0 E-C. Z >)09 s 4 n 0
(12 49i~f- ix b4Dwww0 cWr
49 * rCa2 14 t -4z WH1 UE4O E4
4 *E .- 0(2 E- W 0 " H E- X =0wC
4 49 Z -4U~ En * (1
, (M12 t
4 * w m D E4 1 Z1 0 1-4 U)r E1L
4 4> 04 3 - - E HL E*r4 r2U2 >0 H
h-I 9 9HC4 E-E-.c .vC . . - IE-I- W go H C41nc4c 4
41 a 4 HH(
49 *: 40 uc49
0 0 -*NE- r r
4 0 4 9- 4-44u 0 14 tn~
49 *C4X " x3 0
*0'
U *4c
0- U) *0
ca c.. d U)
E--.P43
E-d ow E- z0 U ca (n U)
ra -4 cc. Nz M
R ci4
>4 W 0 Uz H 4 44z E-4
E4 K
E- ZU (A-.'
HH ~1 In0
A.- r -4 Hrl a
.ZAU4; % -~U - 4 'K
xUU to Un U E4 d0 E4'
E-
C40
49 49
4949 4c4t * 4
'014
491 Di 8HU)m 64i U) *8-is. 0. 0' C~E-1 0 1-
49r, > n91 -4 W4 00w :
'01 C) U)) 0049 94 *2-n"-4 4 z HZ) W"iU41)E- 490 )'4) E- USin r4KUH
49K 09 z'E~) H W NE-1 04 9i PQ I49 1 HA X c 0 O 9 0 Ci) 2-I z E-4 0 4 WE-4 k Wz 1 W 0W -4 US- M- 0-) w >
KKC.1~~~ r4 E-4P E44EE -~ 0 04- )Ka1-'01 4 H 94I -C' )z0
4* 0 XHiH) ZE-)U) 'iH~. R~ v E449 . > W~ H' OrA) ~C4) -4i E-1 C -UE'KS E4U) ix E0 n W0 -
49)H 49 (%4 U) 0H 0E4 - -49~~~~z 49 wK En E4H14E4 Hvz 0u 0 n
4g 4t Z 4 44u2'O do WH u.: KO C'KK Wa W Ci0Z ru~H~ HE- 0 49- 0.
0KC CI(: ; 0 ow Wz a 9 0 64U)0D A49 ru 4 to Ua 0 z QO HH U00KO u*1 4g r4 wgO0S-CZ w UNH)zE4 E-i-I-' 64 ( 949 49 WK C42- -4~t ) p -. 4 0U sc c 0 z W
490 4wCi 4 9 OR CH HE-4CIJ HK .)
*K I-I >CZ ZH 0C~ ,zC)~- >i-
4O 4. UA0~ -Wm -i E 2 W~ u)-4 E4 H &4 0 P4 C'449 U)49) U) xA >4cn uk H)- UC-) N co0 t
4g 4t I- HiU) aft) =)) H Q 9 w R -4 K 4 u4' H C 2C'a) gO U)i. C4 -4 -0 0&
49K CCaWEn E- z DwW U~E4H -. E-lE- 8 r0H E-
itK 00 E'U1 CA H -1 u 0 949 ~ ~ a~ Z A P n
49 94l DZ a ca) m' z- Z Ka H 2-4-I
94 1- M u to wU1- 0 ' 'R W % H) w W4Q U )
wi O OH w 0Hw04 cCa) E-CiU W (H.1E 4 8$ E4 -
* * C4I Er . 94C~8 - Q'U 0 xC
49ME4 4- C4 ow P 12-44 0 ~ ' AcK i
04 Wa u *0g z w>
* 9 E=44 H Ad H040 H KM - ,4
* C-4 1
E-4
0>E-
1-4 04
E -4 Z
x .44W 1 0 w ru
z bA E-
E-4'01 rd 0C r2 .49
rEA4 K X:z C, 0
E4>4 Xi: 9A .4E-0~E- 4'Wmd 00 E4C
04 u 0404 4z i 0~ 0z Q. 4404l
(A 4 40
.4'
C4 N 14 E-4 4'
0 4 - > 4 4 mN
% 4.4U 0-6 %Q -4 >4
m .U2 0 CCm - '-P
x a(n c U. E-i4 X 04 N4 E 4
~~t*.~04 Wa.1 ra~N h 04 4
4
.4'
C-42'
4 .9
*5. * E-
* * 0 *
49. Cl) H 04
P Cl) .E-1
41 9 .5 0 0 E4 0
49 490 E4E4qL1W ,U ra(n490
49 9 -1Z H Uu W ra 0 r
494 zVlfR - - U -C4 W5
4c 0 aZcn 9 >4 ZE-4 IZ E-45r
49 49 ..Oek l ra) 0Ca Ca) gOCE-4 um w41. 49 W ca E- 29Q X E-4 -V) 0 .5%
Q e E-a CZ EHH4E H I C WM E-4 U) GQPQ5 E4 H H u4 EE-1 w U 94
0 > aw 6C)4 4) g HE 4 4 E-- . w5 WE-1 bA t ba adc)~ 0 0 r a) ~ a W g
Xca)4 [m)zm H aQ4~ 0 E-a4a)~a W5 >W c w2.-4H E- HaC ~ Z U H U)
H55- wa W aC)C. >'C)C) 0 W5- a-) o k 9E4L
WC)P D~a x bi) H en 09E-4 5 a ZaW>. 0 94* ~ uC' Ud 14* za 1: ZHD 49
.5.5a 9l z E--0 w' m 0~C 4p'E- OHH -I .5-4
415 4t ~ a m a t w ..P H 0 Na W )E-4 CO 49 U
495 49 0 g~0 Rl go cr a9 c 0 Aw
49. O9 W ME- 4 a)OHE H m~I~~ E-4H Z0C Q E-0 9 0E- Cl)40 H.0El)Ca3 U WO COa0 W W0
.5. [a) z 3E- n0 m uI Cl)a.. W5
W5. Hl E- ( a l o /)NE44
.55 P> ca wa) E- - E4mE- 4E-4 W
R5. mw~ 04 m' HE 4m. >M w 19r
w5 5 94 H CJ z w w '9 Z W 0 H E- 5-
.5. 49 E-r' m oLA gc r g n4 ; H 0 X X
.5. E-) cn Ok04 ( 0 U g4
.5.5 49 E-4E U g M g R UE-4H 0 E-'. 0
H [3 .. H. Ns Ns E-4 N .-4 UMP4~ ~ 1 - ca. ~* ~* s ~* ~* ~* s*.* s* 5* s.
Q COC E-4
0-4'
0 4Oc
00
E--4H .49
0 4
0- 0- .49~~E-4
0 W gE-4 0
0 - Z -U'
~a1 r.~ Z H'RJ 0 P 04i Nj .4c
E- rL go
z E4 064 0 W4
W0 o .4LE-4 u :
W ~ d 4.4'r
004 >4r& : D-3 0 4'
m- W.g4'-
A4 E-z1 L E- Z- 0z w o 0~ P4 In i ri p 4
5-i 0 64r Mw P
CD u W .4' Uwe Z UiuO A . .. U (n 4 p W, m H .49
ob ft 0.4 0 .4'44444
x C W i a0 0 z i 0 1 m LJ .4',e
~ zr~ ~ ~ ~ xx~ 1-C-444
-1 94
41 49401" 4
41 4K41 49
49 49 E-4
49. 0
49" 49 E-4i W -b Wr*MN~ 0 4 in2I-. *l "E-4
49 49 0 ~ i r E-4 0~ K
K-" W0 4Cz U 49~
"S"K 49 E- U-~~ rL D HH49 9 z H Cu HaO-e- 94 E.~-4X W ri "Sv* Z -I 0-~4z 'E- AK X n0 D - 4 -
* ~ 49 wz WHra)=Ei M. 0OW 449 9 0 E 2C E-4 H Hi ,. ,4~ ~ Q *
: Cl) .EA 14 E-4 EE0 *SCr)49S 0 E-4I ZH E--0CaZ ' ) E- U
49K ,.)1 >4 i 43)P H ~a 0a 4 -4 Ja) * W49 49 E- z cn o A W * E4494 3 c aR E.4. u.)-E-4E4 uH Z o U~-4 >U cn 4:) r4H
494 Z WZ 3-4 o H 4z) 4 H4C rZ
C,.E-4aCJ) M E-4%34 . K
49 H ~ )1E [aH~1-Q 04 94r4 " nr oz0 H145 41 Ca) uaC)z WC2 a)Z E-4 U- ri 04a)049 89 4 9p- 0 H H H 0 E-
"S"K * g vC)0 W ~ a E-4 Q 0 E-4"W0>4 "KU4 C:0 i>4c *, 0 d --rna EM U4 >4M9 4 D E
g" Hila Wl E-4 M a~a~ ru ~ l W W > 1 W 44"m
0 49~ 0 E- -4 H- E- m u WH 4Cc1
41" WU- H QE-4 WaU2 W Z Ca) WZ H Enrz.E-i
R" wa> vn CMww E4E0 - HA WE-4KW4 w. wi3- En E-4 c
.19K qr i PIH "-~)~I4 CanOQN..H"""0 CD . > C4 CaC.Ca ru~~~I4 a
0 0 a w 04 H-5 E-4 4 4 W Z E-4 9M "K Er 9I4lt E4~ 0l Cap W UU 0K X494 P W iHnw JEe -Z E-4 1- C. P4 "S a
a-) 49o ECad w04-0 0 N K-
41~~~ 49z W- E4M C9 =49" * a 0 v 8 CU ra IZ E~-4~ 4
49"K U E-EL)a H 04 rE-i 4 04 1a-4 IE-4iH U M 0 E-4 4c
4K, M Il En Ca1"K"Kra) E4 Wi :3 4) "ST
0900 E-4 - E-4 9S
4 C- 45
b-4
00
i-H 00"
0 "K
L) 0
Uog 3 b4 "
Z 4"K0
>4E~ ra 0 u'WK1 6m E-' Ub4 04 0 4
z 2-' 21- E-1w- 4 2-) 0 "K
E-4 u. 2: Hi0 1 00 C4r. ~b~
0 ED22 . )u 1 4 Z
M)M 040 24 "0.. 4 U "
z z: 0Z r"z. ZC~C ~ ~ C~M ~ a.14~ - C ~ 0 ~ ~ "
CS w.~ Q- -P C 4
0 bU4 0b b r"
Xcn U) cn uE- U U4 2 &4Kx 0 P z a00 aQzQa oMI xoo W 3
Ad1004 1-4~ C4 6.4 4 H 4O 10 W 9404 04 W3 Q1
4cKc
E-4r-i LKP~"K
C-46
49.
. * E. E -
.4c a Cl) E.1 4c l
49 E.G *a EaU ~ l) Ci-4*c *aL W' E-4 0 Z
S El E-aCz.1 Z .4 9P4Ca w aQ W ~ N. pcn -i
4t * P4 0a 00 Wl)E4H w P E*49w u) CaC P0C 4z4 z E-'
wPCi 4. : H w H E -4 ~ C W CI) E-4 W49 > 0 M P E-4 EG ac -
4g E-4 Cl) 0~- Pl) 8 0H o0 4 44 8 )E-1 5~ CZ4 - L
41i 0A 0' U2 O 2 0L -
Ca' 0 1w-4 ) Eb-' 94*: Cn)I W L48-U W Z
494 C4) 9 l) 2 4 H >4 0 p.~L w ~ a wE.E-&.E-1 E.0'Ix4ca0 Ca04 w.~EG' go ~ H0a)a w' 64 D 44
* H E.4G W E4 p E-4. 0 CMND P0 - 0 0
49 0 N- wCE4E-1 4 >E-oE-i P4 MP? 89HEP 90
4L4 P4 4 Z~a E-4) W.o na~k 0
2c 'l a Z)i) -4 Wa E-1 U))
49' ,9 r"E- 94 cn ca H E4 - E4O E4
49* r w ra 0 E-4 z 0l WaOt 0P.4 9E4 WE- 4 F WCi); zU-~C) PC m 0Cm)4w49 49 4z 0 p g t 4Z Hl 04 H- to) iz)4 P
49 ( 4E4 a P4 04 ~ Iza m~-. ry
El w l E-0 Ra H 4E-40.0PE. 2 ,) Cl K 04oC w - 2 "
WC ) a C mE4 Qm 9 a H 9409 wE.G1 z > E G E. WP.
49~~~~~ 49H lOCgE-ii .b-I 0- 0- 2 "0w 9 ) C c
49 04 H HC-kW
-9 49 w~ E-4 o , .
*0c
49c
E-4 E-4
E-4 E-4 EE-4 E-4 9
Q E-4
E-4'
0 E0 - 0 4
E- E-1 M W
>' > - U) 4
U) 0 )o z W Z C4
2c 0 u 49
z 4 U r4 0- U -0 U 4'E- 4-
-P 4 0
Uc1c
-%1 49 . '
E-1 E - )- -. 2. 4
4C 48
AendiC Section I
This section of Appendix C contains the softwarelistings which comprise the network operating system.
C-49
4 c ' 44' 4'49 49 ' 4 ' 4
49 '~ ' 4 4' 4'
42 4' 0 4' '4' 4
.1 4' r 4 ' 44' '
4' 'b4 4 4' 4'
4' 4' -CZ w ' 4 ' 4
49 4' ' 4 ' 449 4' 'z QI 4) 4'w 4' 4
49 A E- > 410 w 41 04' 14 bt go -V 4' 4' 0)f W . .i- 4'
4' 4' 04 rAi 4 4 ' $4 r .,4.e4 4I '49 4 &14> u 4) 44 *4 0 440 W J CO 4'
4' ::)I ra -4 4 4' Q.j) 4O 3r. (a 0 > O ) (a aZ: 4' 04 ra f 4ci 41 4' 0Jq.t O 0) 4j 4 4
4' 4'co~-a 4c 2r. 4)> iw J~. 4) 4
4' 4'3 *4 * 4) 41 w' a 0)4Jw w)rW.-J 4' 4'M' 0 % 0 W 4 > 4 -C > (1) 0O1 r 4' 4'
4' 4' P4 I Z m' 0 &4 4' =4'(H4'n - U' C0 r0~- 4-)E-4 040 4
ZWE4' 40 Z Ad>14' 4' -0 Z- 4' 4) to 0 a. :: w1 *,- $
4' "' 0~ z~- ft * 4' t W.b 4O 3: 4O*.4 R 4' 4'4' N 0 2C E-4 4'z =' 0 Q 4) > W 4D l4'
4' 4' rz 41P 14 4' r~-. cu- 4' 4'49 -P E-4 -c a u E-a 4' r4' PEz 0.iZ mG) oO.J 4 ' 4'4' ' 0 I ~ I E- 4 '( 4' -m O-i cc44U 4' 44' 4' W C 0 HI4. z 4 1' 4' .- O U W 2: ZEOr *- 4 ' 4'I4' H ' D 4 10 to 4' -e4( cc ( = co ::) Q.,I4 4' 4
4 4' 49 i $ 4)) 1 4' CO 44' 4 '
49 4' 0a4 44 E 4 W C' E-4 M 4JV~- 4' 4* 4' 0CI4 0 0 W j% it 4'.a Hr4) W. w0 ca Qa 4'
4' 4t 1- Z l n D 0C W r" CO 4' .J-0 0 4J 4) t 4 ) 4 4'41 4 c 0 9 - D' 49 w M' tP.d~ 4.i -I ~ El0 4' c4 A
4' 4' to 0l 0l 0 4' 4) it-v ~ >i ' 44' 23 Z P4 ZCn 48, 4' 4'ciq *.- 0) 4 E -a) 4'
4'o 4' L* 0Z 0ZH% Ad 4) Z4)OW ) 44' 4' ~ i -4 04~S? 4' 4 U W , W.0 4a CC4' t
4' 4' W. 0~4 w ~ 4' 4' : 0 c:u 04 m 0 H' M
*9 4' 0 cn 0 000 E-4m 4' t ' J44W H 41-. >4r-4 ZOh w 4'
4' 4 Z0C L-4' 4'Z 0) '4J4 Ow.00>0 - 4 4' 4
H W0 .194 4' : 4Ue- 4.1 OV) 4) 4' (a
*9 4 ~ 0 . CI) * 4 -HU aw4 o4
4' 4' 0 04 4' 4'
49 - 9 H- E-- 0r4 H-4C ~O0 J0
41 4 *44 C- 0 0 j.4-qc 0-- )r 92
F4U)m
-4> P - - Ei,
9 W E C4C/ 4 0 U) U) W 4E-4~E I-I Ura W12 ZU mz U) 00 40 Er >4 H0 ' M(4) ~ ~ ~ ~ ~ U 0 0 w mU -4m4 44 M Z1 -4 0- Z
In N E- IXI 0 d0 * -I * o =) ZHU .
0rz 0 zz w D
0 E- n co 0Z ~ r I CDE-E- % - -
O IX QW Al -4 1.4E-4 0 00>4 z- H) 3) r014 -4~ No EDE4 IE
UA E ErzU~-4 Ck W WD00014 m H 0 0 W
H UME8 )U),U U)U) r) a P UWU) Z" ~ zw g w
-. r =U i E-41-0Oza ;D OHN PW E-4rz H1-4 Z Uc
W -o Z E-4- E- -1-- M- U) L) W XW -4 W Wz H 4
- - - - -- Ewg-W i
U 4ou Ix $2
) U) X) 4
r4 ~~ ~ - 111 : -
W ra
E44>4
Z~ 0 H~~>4E4
0
~ EE>4E-
H ~ ~ 0 a -~Od -1 -
E-4 Q -4E-
1 z P4 1-- 1 H
E- 4 r z
>>4
U)) U)U
~E-4W W j c I IE-
449 cZ4 ckC t94M 0 08 - 4 49 -
044~ W-~- w 4 40 400a 40u0
r~ww g ww g w w g ww
4~ C4 52 g0 E-
II
ru z
00 1-
Ca E-4-
0d EE4 -E-44 X
dpd
ZHo w[ 01 C l ) P d
HOO i.LO WOW'0 0- E4
2: #C -4 H UU Q z -4
Z~~~~2E W -C"1%4raQd>E4 0 W (a o 0 C4) E-4 j) E--
H N'~ Cl)C6) b-IrI
wsa"WW m 1-40 -E-4 C 0 : ) 4 Cl)
r34
0.19
Ca - E-4
9w E-4 4 >4 >rz4 to to
2t ) IE-4iI 4d C)
W4 E E-1 4t
Z goC-534*
44
*9 z z49 0 Wz
'-49
0 49 (no 4ra~~40 04 E--4
z~~~ z zm' 4H ~ ~~~~ m '-4M 4 E4
E-4 0 ~ W 4 H49H Wo04 Z 4 cEE4 0 H- 0 I4g I D4 E1
E-ir z 0~i-i ru z~I
0 pW pl h~-4 H~ ce 49m1-4m b-4 z 0*0~
1-4 V ra0 -I4
> D0 Em 94 H p-4
HE- 0 CD
0 Ei- W Ow0 E1HOE-4 E E-4 Wi
H0ra CA 0C ClE- 0 &41-0 E- E- ra >4d
Arn ra) ) 0) Z-E 4
w 1-1- w~ WE~4 0 Ni~ 0 0 0Wz 4 In~ Z 4 r44
04 z W ~ 64 0go 0D- W2- 8H O c0 zE
N 1 WOa 64 4 u H FZ
,I~ Q ,E4aZ 04g E- c044 U.) Ow) mCl) E1
E- r E 0~4 W14" W E-4 C4C - -1-4 a CS 04 H Hnin4
E- E-. P X: EEaCz -4 w:b i- Q CH Htn Wa W09HO ~ H' CaU E* W U4
EkC~O 04 Z4 ZOd 4z 46 P4 OC/ 041- 4a)0 da*
H 64 2- 0-49
Q4 z- wo0C4 -4 4
H " 0 I u u- 549 0 4
49
49 C) E-4 E
4c E -4 14 0 E- 049 E- w~ eE-
49 o4 E- 01-4E E-4 -'z w E- -
H Q0 41 0 o 0E-0 W4 W4L Q U2 W- - -
V) ' b4 E4Zb -
0 04 E.' -4 E- --9
Wa rGal H (ra 2 i W r 49 1I;a W b e L) ,. L E4 W4 r". C:) C l)
04 to1 z1 sa o
1.2 W- ra W- ca 0c +U0. E-4 14 E-44 > 41 0- + 4
Z 1.4 +41
sA~~E-E' E--kUa 92 -0 l 40 OH0 0I I 4 W6
0-4 HO L1.ll. 954~ 4 . 0.0 ~zU 94. 9 a 04 *9 - E-'4 H 9-
04H o.111 ew1. H M1 W04 zA ~ to E- x oZZ 4
(n 94 M -4w ) "CIra Di
-4 I 2 0 1* r-4z1.2r H C-4 94 a. i ~ 148 L 1 K I~U C40 m . 1.49 ccE4oH =:
04 W E4 H 04 H E- 4 -
E- C- 55 2 o 4 Wr
4.9
0 - E-4 E-
Ii 0E-4 E-4
0
o- 49 49
Ca) E4CAE-1 0 E-1 W E-4 4
E-4 Z4141 ZU > C)U > C)444
o0 414n10'4 H- -' H' E-4
0110
'1 ~ ~ ~ rA I- r - 44
4c 4 4
Nq b 4144+U +U 444
E- 4 44
oW ZE- * *U041CDZ E-4.. r4141
U-I ..zI .444
Z A *J 144
W a Aa 49 4c44 44
z z E4 z -4 0414*41
-I -E-4a E-4 -UAa H ow 41 4c4
ow) A 4 4c4I 494
49 444Z 144
C-56 114
* 2-4 - E-i
4% E-4 U 2E4 4 -449 0 a 0 Zi H'
2-i 04 > 4 C4> WE -4 z 'x0 -4
0 * 04 4 ~ E-0 f4 ig
W '-4 E-
u E -4 raE--WH4E- E-4 z x 64 ra x 6
to4 044 j@ 49 W Q (a W U2U~ ~ N z .i- uI4-044'4 04 E-1 Z H a z - -
04 H- E- P4 H4i. E-
P4 Ez0 r.~-i 0 ra co 43 9 CO Hra W 4 w 0 W * I
0~~~ rd 64Q-b *1L
WJ ~ 04 a 0 E-4W- W4 ac E-4~la E ~ -4 H*
W 0 -2 E- Wr" O
E-4E-i 0H.- aa 2c4 0 owrI
144 E
w~ ai z c F w0 Z E4Ar H wb N zIto m 4 4 - D 1
> 2 0 nuic W- H ca-4C 0
14 nI4 z 04 ra WHN 0C' H -. 0 04 -' H ml o4 M-Z rz. E-
0 4-i 2 U) E-CaW H it CO .JO WCC
0 449 li 01
W H-Ia w- WH 4r3 H 4 nI
E. U. pZ 0a
H4 04 H ul -4
w C-m 57 > -
*9 4. -. P
ra~ z 9 4
0 -4 4' 5
E-' E-' o4 M
E- E-4~ E-4 4%
Nj zz .5 5.E S4 Z5 49 *
0-4 Z449 ..49 49.
U)~~4 * a 5 ..~~ .5 5.
4-4E4.5 .. 5 ao q .5 5
j-L .m -. 5 ..
Cal .5 5.
4 E- 4 .5 P45.5
Ca 4 ~u 4a . .q-w fEE . .5.E-4 ..H
W5 45..5 5.
E- 4g .5.
49 *5 49.
~CalZ 4c5.F~4 U)0
z -zE .J 04 5 .4.
ZZE-4J bC .5.± 5C~49 U) . 9..
~ .5 C5 8
4c.49
r3444 0CJInz4 k b 4H
c n L H ra 0 o IW m 4 aW04'
IH 94 -- E4AX H H~ z
0U, ra Z02 '
c* W4 EU PH~'- 0 I X4
W 0 ~ 0 > E- Wd014 ru HE-
Mh~ E-0 0 990 z W Cz.4 *
~E- W-P PO0 40, ~~~ MCnr 4z* Ini 0 W ~ P E- M00 u z 4
4 E W 09
D A Z~ U, H 4E- 9nj HU~zPU oww H E0U)CawC7 CHHW Z,4~~VP4m 80 Z ram2. g )WdP
H 4~ E- 6.D 49 P1r
tri~ OC InI2R W H *H H H 4'0=M Rg
E-0 0 W4 W~ Z, U, Z HW ~ 0 ~ H >WUU-4 C). p , LA.4 z
Cal Ca4 g .c X 44~~E Hol E-40~42 4,2.~U nj4d M~ ra H 0a. >4 ~ U U, 0 0z4 0. ,
0o HE E-4 Z NM j-4<M W . E4Z 2 1 OU>4 0m W H H 9 rAEj. H I EH ~49 H E-
M)~~~P a n4 41 & * E0 E-4 E -4 2 -it8 04' 4
**P4 P4 H 24'
C-59
I.
- . -- -.- - -- . .-
z z iZ 1--i.4ZPt3 4
0 11 CID I 0 - I. 4
Hru=O r I .,1 lI .*KO ** *. CD 0 -1
.ill .1K41
,--4 E; E- ,0 E- C2 0 wWgo ID 0 0 D 01 > .10 W rE-iC'U - 90 W E-4Z E-4 E-4
14 E~z-4~ Z Z W W -4WZ14 >
0 0rL.b. 0 rXJ 0 0 1 zwo0r~cO0
- -- -. - -. - -. K=I , K, K
40WU 1U rL, w 4 u4
K i
E- itk "1
0 z
CD 44 Goo a n
E-4 00 KP dP
*Z K- 0
0-. K. . L,-..- st 0 W K
-N-- -- K 4 K
E-4 M 00 CD K- W'
J0 24 C0 wE-" rz~W I u < 04
cA) 0 tr 4' W'4I g p4 ) C. ' 44
E- zE E-1 E4~ ' *
0 =0 00 1~E-4U U 4
w- W4 4) E-4 4M) a'4~ a44 >
49
c-60
• -- , - ' 81d rm d 1 d, ellem lu~r I~, d ,, ,l nd " -,., l,.ll d ,,,,,, ,,d ,,K K 4d ,'1 ,
-E- -'
4'0
m E-' E-4 Wz N
E-4 0 w EE-4
~40 0 E-0
W 94) 4' A L 0 %Z TH - U z U)z
0 E-1 sc 94 1 -4 bE-1 H' b-E H-OU4 IzB Z - Oil
M rz b- W Z- W' E-
4I~ > >r 80 zE4Z Z043 4 -- D-
H Hz- aU 4' u4Ww-a E-1U w U 4
tH 2 - zU 0 K--E- E-4 0 4'
0 UH UUM 94' E-
W 4U2 -4 W Z40 DW-ra 4 ze
00 uZU 0E-'U H x4aC) E-4 E-' W' itI
in) U) U) W'
M) ena w 4' Q-~ z
w. 'A Ca) E-4 UE- >U0Ca) In 0 -4 O >-' goU) u) ItC) -E
8 w W W W X -4UO )U 4 CaF'-49 M E-49 MM n -4wU)EIH1U w~a EHU) H 4'0 e nE->K M09 8 W --
H E4 0 H4 E-4C)'-1
CA ~ pq OR E- 13 O 4304 E-619
4t449
S 41 14
0 41 14
4t 414414
41 41449 414it 414
41 44* 41
49 41 4141 414
49 4449 414
* 44
49 4c
49 41 4141 449 41441 4449 41 4149 414
41 41 41*9 414*
it 414*
E-4 41 .04
0 41 49 49
I 49 494
49 414
0 41 C-62
.4c
.49
.E-4.4c
4' CzZ (a
H 4' E-4H
E-4 i0Z 8C P44z 94 9 91Z LUr4 8 'K > r
0:=Z. ru H- E- Z. ~0 9 9 'KWC~- 0Z azE E-0 W4 H r4 P., 4'K
W a~. '-0 UC ) to l WIXE-4 CzTa .4 9 E-4 E-42r" 0 z2 E-e4 H Ca4 Ca~-C/I ad >4 w Ca0
0 4443 oCE-4 WQ 2 >Io I2 z m m 'K )
HHUrk2 n n 0 D4' z
E- 2N Z O )E,1/ 0 W E-4 H 0 CO -4E-
W~~~~ ~ ~ ~ E- 4U 4 u 4WHM 4 r
u r) 0 w - - -p ,2
404 > Ca4 k 0 f Ei-4 iE H4 w (4-4ri2 0- P4..Z0CW.E-4 C w -I-4~ 2(/ 4 'Ki 4
~ aE-4 ad Z wW0o H ~2~ICz2 'K) (/
8 - 01 z~a24: E=-WQ 4 ow 9E E-14EC2 WM2 'KI
E-4 Uc'et 4 00 zk~ Z: 9a E'4 H 0E4 C1 a)4 z M ..L .o 0 E-4U z2'
b4 0 1C2 W zCa WW .CI2 00 CO.W E4EW Z 'KL4 M1
Ha M) N. HCa2 0 gcnz2Il 11. 0 '
U 4' E-40
E-. 8a Ck tDzI I- z 'KWN Wj00. U00 2- EA Ei w 1 ZK -4P4~i2 I0a1 u 49 XO 2zw -
Z% Uz DW.E uz 009 HO En E- z -U)~'- W a H DW 94 Z E4-44I r4cz JW4 pq (1 E-1-4 Dw IM 2 E4- 00 4~ H .on =WWI WrM W44E-4 =) H *a CaC/ U E=-4 PC Lt- P4M2 - 40 ~ -0PQ Z:) bG3 .E-4z.C~ E 4 'K 8 '-0 H 1r -
WCa 0~a P4. 0E-.HCLI 4' E-2JaMc
P. cn 8 E ZH-
0 E- IP. b'H l2 W Ci. E-4 H HD 1-z : w 0 EtH H4 01 0' E- Z E-
H 4E49 M E-4 .~ 8 / % E-4 Z. r4iPEn94~*4 0~ H " U- - E-
W~a. 2 C2 UH4E-4 N "E..ou 'd - 4
~E4 Ca.C. E4Cz..~ a4O-EE4 ~- 0 (/4c 2 C
r4) EA O E- 0 Z ~ .(..1H A0 W 4 C42 >44 HC 8-04 p ~ E4> - Z. 0 4 E- E
Pg Hr2 4 0 H Z ou DH
0 w c 9 9z 44H w -4 c-63-
0 -E-4--- 1 I - 1- E- - -E-4 0
W - r &4 cr -~~')raI rLI wH 4 CD M 44r (D U)~ co
W M.) 0 2n4 - -4 H C) EnojM,, 4 - 0 04 P/-4 M Z W ZE44 1 E- Z -H
ZE W4 -4 64E4 w 2 0~ H H .- H E-1o--S&4E- Ww . u M w co4- 1:4- o o
SH -4 E- uX9 W ~ oZo z :c43H4Z H 0 i: 0 4 C ru HH wm
-4 Ix rL W-- I -4HU -4HDZ E- U0 W3 I W W 0 I C I rzE-
Po oo H E-. = ca m,. 0 .1w wru D HrWW E42:1 W 00 x w 0
0 ZZ 4 1H H dp U sC Z Z E- b U)OP Z H- U)i4
Cal W W z H r4 Z Z,'" ,-3 x H - H 1 4
'"i N E- 00 dp c t C3
-IrZ4 iC'4 : -HW 0 0w 04 w 11 mHH E-4 H 4E-4 W l-HdPG 0 r4 1 P
-col- 0- 0 - - j-~ U) 301- z r
co w 1:4 InriD E-E4
- - H II H 1-4w + 11 -4 W) 112 E4 + W ) azU2 so H( a *goH C.a z
z o i oZ E- W) E-4ri WCCDHH 2i -4JUW E-JU) H H z H Z
Ef+ CDHU . C 1 Q) 1: 4 pq 4 E-42
H Jet) 0 I z i w i or4U) W n W W UUw w1:'U) E-4 n U H U L)I
r- E4 zI H U E-1 OCIE-4 Hc Ell 01ElaE4 d Z 1440WH H ODUW 4 L H E-z z W E- = &~ H = As H E- z~ z
W rid to 1:4- Z -E- H rLdg E- H Ow Z C
z a E4 rjw6. H 4id H0-U W -Z -H W) ri H W~ rid U)*H I) w U)W(
E- 2 > In >
E- w UHU) U
00
*~
I4
49 49
49 * *4c *
E-4* *
0 X*= W*
En*M)*0m 49 4c4U2 * 4 *
49 * *49 *
49*49*
49* *
ra 4949 *
49 **H- 4 **
r - I **
-9 .1 *
* 49
49 *~~49
*~ 5*
F44
ZE-4 Z
z0 -94 W
4 40Mz 4 (1 QE-X Z M E- U) W U)WAH n UH u 0P4H
z 01E-4U ~ 4E Z Ci) 0Z2:0r
HI Q~ H nE40W (n 0r - CD 04-
U)U E- 4 H H t 4 HHE4=Ua 10 0 H rLU ( 0' 4H4Z i M8OC4E
E-4 >4 9 g)))~- 0)i *rC) 0- 64) 0Pz 0
E-4 r) E-', ZN W:C~~HU H h 14 z~) 4 nib.4 > w O- U) ~~4 0 - W M W H U - x4 ~.H W
Pz 0 >Hi z Cm w i) w r-4U >4 >EW H 4 OU E-4 W w 04 W4 o. w E4 WH 3:H
E4 H E4W D 0 .>4C) 43 0 F)00uw E-4 PL
E, 0) 0)LH~ zz ~ %oo:Cn W-
cn 0 9 544' r~x W *2- U08 wz MZ coW)E H -4 D Lj zzu mwi) - *%W E4E1 4)
W w 0 a9 4 g U)H r 0 W4 ~-4 H E4oc H4 E4U HzE-; E~w w E-4U W IM Z E-4
04 In 9Oa "Cm U 00 '-P1 0 1% 9E4 H ) M Q W
Z - ) =UC 4 L :U >4 E4 H rL UUI.4
a:w Z 9m 4 ) W E- I-40P M H >QU0 E-4 WZ=UP ~ HEt- W ~ ) n) x U)- E4 wD
L) Wz 0 W 4 -4COinz
9= - 8 k - a 0 WZ0 - P4i -4>9E4 E4 8HW x ) : W lz CD<w)30
&4 IC oz c rn 2 4 W L r 0 Z)~ r* IM 14 Hj) 0 0
CaW ~ ~~~~~~~~U U)HZE- rF - i 3z 0m X - o0
E-4U E-4 0C ZU E-COHu) lW :2E' 0 04 Z)- >4 wU 04 &C2 Q t
H4E IOWH M W4 U) E4 wQ 0 4w i n))Z I ~ " OHEHC)P PC 1- W ) ' 8 UE4WH-
44' Z PE 4 E- W MEE-1 4 I x z; 0E4 CW- 04 wZ-C rzd U)i) H Z 14H >
"C u 0Ciw p:: w ::* Uf)*E-~~~)~ 8 M-4 0E.E'U WEX) CZ ca XCU E-4U94 4 H I )
E-4~ ~ 0) 0 - w WQ99 K0ow ow ru M 0 8 D4 8 rL - 4C D 04 WP43 U)P4E- -4E-
8 04 E-4 E-4 E-4
a~c- 66
49 -
Z9 wr z C49 W. z E-4 ~ [C~ wZ
49 >40 E4-r 0 u E4 149* D - 0- O4 ru H E-4 E49 U~) C En E-4 ow 9 4 H04*9E4 -ra W 0W 1 44E-4 E- 11
0 E-' 4 E-4I IM)~ 4 ClE.4 cI - U/I w J)
.zri U)44' W 1 -4 2-' w.ci X '-E4b 4
.i-ir 1)aU U)U WU) 1 WUU 4c ca ra oOU HHE-4Z 04 ' CQ X M
w~ -icm a < E&~-0 ,-4cf Ck wW
U) 49-d a O - Z 04 W-m-E 4 -4 ~ 2 4.~-Z l o m:: 0 -4 0 .,Q "
H~~ --.- -90"a "W 9NIOC tW oHu =* W Q - - -4 - m - )i
H cn ZI E- W H 4 E-4 E -1 H- 0 +0N
-U) W r44E4 44zt E-'&)0 +04 11 U) U)~ I -
2-' Dt) Zi CD c 0
0 I9 r-u- 1-4
H.; W42 E-'r H E- )
U) 4tAC2A 4z2 U /PQa 4g 24 I +- 0- UU)=rI
04~~ ~ E- E-iWI-+'V(n - .4C
Ha Cad z 2-1- M:Ca)1
49 ~ ~ ~ z z X u E-
E0 - - - U )Cl-42, z -:u
4* a W9 ;)C - :c
* z 1= C4 19 Ec-67 L,$
44
E-- 0 or --- n .49
0-E-4 W Z---E 44 R40wm w = En w 0
UI)- H Cl4 w W H ) 1-WE-4 ' -4 0Ci E- 'E- H Z9Q~4 0 1:4 04 E-4 E ~ l w 49
Z cn.4I xl nI- 84i)D4 A0 X: -44Cln )
- Ol M4- cn UC) H- Mi Q N E-4E-4 l-4UZ,9r4Ca) rQ4 ) ~ 4 4~ 4'<W
' c -4 Hj)gl) z 0 I E -'- w lL Q4g
E- b-4 0 E4 WiC 14 0non -H'r) IC4 a 4'M -4 E-r 4-4 0- 04)P U)i. >-4 H - -
u-4 Ci rAO rZH PP4 M r Z i 14 .49[a0 0 C 0&Z~)E Hi~ Ci)C/ U 4'
Ci)i) u . 0 1-00-4"C E- E4 C)~ -4----- p - - - - -- -4 -4'
CDe.-.0 0 U4 Cz~r E-4
Z E-44- - -. C) -r4 4o 0 0 - Z wi .- 0 4
('4 0 D 114 U- l 4c
Ci) IIl E4 If E-0 E- - 040 4
w- 4. - Ml IZ e44
Cl (n) '9. 19 ..U>Cf wi m11 49C) zrz.' CE-1 r ~ C0 4 u + 4 *4
L)L 649-X: E-Ci 4 -44
.' - 0 H ~ 01Q r-'I
0 2: '4z z 4I ,HZ- E-4 H Z0 E- '~ -4E4 4E 4 L)4 COr4p 14'4
gmu m r-)C& z4z' l-4'. H E M' 4CE-4 6 a. ~E -4 H r4l4 Hz 44 H L 4 l)) 4'
Ci) 49
.4' vE- 4 .
44'
-4 4
4c 4tZi 4 4,
* 9 4.49 0m '4
0 - 444' C.~ 4t*
C-68
4c
49
*E-4
4c 049 E-4
0 0 E44 WE0
Hl 4'U) Ro 0 Z-0 ~~ ZOQ =
IE- of 0 EiE-I -4 0 w' -
z~ 0I PC Ha r34 z zw0 E-4I H4'
rl> 0 E-IE4 ' EA) E-4
ra H' HH
>)H to 0 U) H z[ a"E 4 *E- E-4 H
0- 9C) 43 .1> '- -4 C0 H 4' Cl) W4 E-4 Enz
0 C4 04 H R cc
Sto 0 -480 PQ H E-4 HE4
cc " U) 4AHu 0a 2-o oc E-
rL Z H Wl 0.i. 49W W W E-1 H U)W 4'
to H l
2-'0 E-40~ ~
HHl)- ~H 4g O lr a
0 WC. H H C) E-4 H8 z 0 0 ) 4 40l E- ~ C 4 4' CL) U CI-
H H ZH C04 U) E- ~ H
m cn 0 Ho~ Ca 04' Ca. Z z 004c I HCI W E4 Z4 * W H H C)
8 D 0 H.Ca 49- H~e E-
~~H 4W I C)U - E4 u 4 0 4Pa) En a . E-1 Ca0U 0 HE. IE~ Cl
0 L E-4 W 0W 0 - M -4 z -'4*
z Hza 8 0
*~c- 69
4ct
4c **0'* '
4*9 49
49'
4%'
'N '* ''N ''N '
Cd 'N t
4c'o- 49 '
o 'N 'N
E-4 '
.4 9''N '
U) 'N '
4s 'C49 'N '
o 'C-70
4.4
49 41 494
494 *0 4949 41 9441 41 14
41 .09 49
41 4% 14
41 49 41 449 4110 E4i
41 41 N " 0 < ZQ agN 41 4141 .41 Go u)lE-4 i x4.< 4
41 41Z - E
494 E- -1Ca1 41 449 P E El P 4 41 41
pp 0C Ow A -4.P 9 -N P 494
49 49~ z D 0 ra 0C4Z E-449 4 ~ CIz I K bE. wa 41 >4 4t r Ca0 H 4 H a g - 41 - 41
41 41 a XU " to 64 to P 41
494 0 8 -LC) H I E494414W W~~wi~-E 49 a
*494C 0 W~Ca C~ 41 CA 494*441 A E- E- v CJp W M1 04. E43*11 * Z M U wCa E-4 4I) E-1' ~ 41
41 41 E Um)n ZE= o" 4c
410 49 00 E0Ht 49 C) u 49
49i 49 0l X pwc 4= )w4
4g ~ ~ ..0 6. c-c Ei0 nr-
41 41 Z m W)U 41 nCD U -rd -490a 41 E4 H E 4 PC I IgII494C 49 4 0w0 . 41 Ix -.C. 1%-P 4 49
44 44 " HP.iI wa. Ca. 41 4E- o >41 41 wa.Ci~ 0 .E1 a tq Z 04 E-4 L.. -'OC i 4 49
w14 IiCE-U H~-E L M1 Ea4 E- E-4 H &)Ca E-4 4
4141 0 .86z.H. 09E4 eq 43 1 cn4 zzz- z z* 9 04H44H Ca >z 0) H1 H I'4'- 1-l14- H H1-41--14 P
.9 IU)U IC) w nE- -pW4492 4WmHE-b410m41 W )S W W p
P4 90HE u 9 ru Ci) E4 0 0 zZr- F4I- E
41 wm1a Z 0 CO W 0 U U44E- 0C DC E41
49 49~ w)1d HP bA Hz 0 E-41zzz z41 w 0 4
* 44 4~4
*~~4 49404 44z1 I4
c-7
". 41 411
*z49 49 H0
4' *1c H.49 49 Wi
49 4' >*4' Mi)E-4
4c 49 E- a4-49 M
',* ,2-. 0i
i'-' W4 r, W 04I-449 r4' WI E4i -4 Z0
I-. OU~i u i
- 0053 E-4 CD 4'4 0
w- 0 .9 :o, ,. .oc Ci) W' CE-4 E-4 ri
9 E-4 E-1 Z x ......
Ca) 0 w) 0 "' Cz) 0
W 4'C -72
o H EW
r4 E-41 a. 4 E4 X XX E-4 E-4
iT 4'~~ E-~ ~ zZ W E-4 W 'H X
49 0-4 = 24 Lz 8)4 -
49E-4 H4 z P4* " U)Un2 1. 44 Z 0 PQ W E-i E-4 oc >4 4
' -4 E-4 ni..) E-i E-4 M 49
.0 EnU)i al4U)4t E- H r E-) ca
>4 4'
04 A4 al H 6H~ * 0 I
49 U)n Im M W bN E- Q H 4'49 WCI M) aH Z~s W' M
Ci)n U3 H H 8 Q2-4
En ~ CarCI LK v4 4' 004 C4I O I 4 w) 04 I 11If11 11 lIi
4~ U)4pq 4C 2: (n 0 .. .. .
'P1W 0E * E2IU) rk E-4 (n
*C 'PH w4a W Z~I CD) Q~ CDP . C . H W ' 0 EP--4E-
r* E-1n H HHIE-4 C
49' W D XC2 -4 C . H H'P1i 44 24 w -4 cn rA z
H~2 E-4Z441w'U 0 r4 M OC) I
49~~ 04'14 z4
C -72
49 49 4949 49 4149 49 449 49 49-.5 .549 .5
49 .5 .59.5 .54 .* .5 .5
49 .5.5 .5 .4c .5.5 .5 .5.5.5 .
4t .59 .5.5 .5 .5.5 .5 .5.5 .5 .5.5 .5 45
.5 .5 .
.5 .5 .
.45 .5
.59 .5* .5 .5
.5 .5 ..5 .54 .146 45 .5
.5 .5 .
.5 .5 ..59 .5
.5 .5 .5
N .5 .5 .E-4 .502 .5 .54.
49 .5 ..5 .5 .5.5 .5 .545.5 .
.5 .5U3I 4g :Em E-0 .5
H 5 .5 .5
.5 4c22 : :49 .5 .
1i2 2 4.5 .4.5 .5
0 49 .5 ..5 .5
.5E-
.5.5 .
-49 43 .- 9
C-7
c-?A
49 49
*' * 014'. 4'4'. 4'
4'. 4'49'
E-1 4
4'. 0 4
4 4'
* 4'
C4'
4 9 E- 1 i- 4 49
4'.4 E-4 M 2: M4
49 4 P-~4 4'
49 .~0 4m'
it. E-4-P Z4'24, * 4 Ez~-4b4'
U). C; E-4
*'. *J- C/I 4'C E4 Ew4'.9 cn0m : 4'
8 4' b-4 4'E- 449 4'0D -
04' 41 *En E4 ow 0
~44H 04Lr ~ ~ 4H 49 4C 0 E-4re 0 4
49 49z 49&4'4* * 1 n
Z 94 -4 40.. z:L 49 0 4t
04' * 49ca'
~4g W4C'r 4 4 U E-4 E-0
49'
49E-E 449 49
4'. 0
* 4'%49
.4C-74
49 . 2-; --
K4
IlK 44449.4d *-C ~t4-
49 490I4CU~
4E9H49 E49~C2 o4cJ9C~oE4
09 1-P E- -4E4c
49Z ' ~ 0 04 E- 0 - ZW0H>E-1 E-4E-s no =- 0 X0 4c
49 49 In $ 4 w M 49 a E-4 H -4 P4 E1 0
E-4 49 Fa co U3 4 E4 0IE4H WO ~ ac 4 E- E4 D
*i~H * Dw u C 0 9O E1 C
49 49 0 E-4 p40 C ICD1,~I OH H p ~0 H'(~'0 W U U Z ) so0
4I H0 COCDN.z 0~ "% P4 H r p tr 9rk w UH(z
4949 E- H wC H H Z W9 - HW -
499 Z 4~ Ui. W 'e Z H4 Hc Qa H - nZ O % r l
49 1-44 E0 W E-4 W C 4- E-4 U) 0E~~~4% C) E4 rw -4 E4 -CD W >4 E--ii(a
49 * w R W E-4E-4i.O> 1 E-4 > I-44 U W - .r4 WQ U4t~~~~~~~~~~ W C ) r. 4 4 9 ) zHL4w -0HE4x
H 9 4 N0 0 4 w 0 0 0 W w Z -4 Z 4 aH A 08EW9 UOHOMPZz H H C w P 6488 Ho wr~ Q%
49 ~ ~ ~ ~ ~ ~ ~ ~ ~ -g p 44M 0 4 Z0H0 E4 a r49a ~ .a *. H ~ W~ >~ M-*. D W. .9 . E-4 Z. W.a ~* ~* 94 E*4 wt *. r% = 9* W M. ** *. s
49 49 -4 Xw9 02C40 C-?5 E1 - E4cj -
.4').'-
4c Z- E-.4' 0
4' 9Z - E-4
0a 0 z' z 0E4 ) 0
UZ ('4 4' 1 0)
za Ci) 0 0 4) 0)H . -4 14C>E
0 H w g 0 w .4' Ucn UD<(
1-> >E4 b.3 x 4 m~. ~ C 0 - r E -0- H 4- m z 04 I-41 E-4 Z -D W4
0 w t-4 Ci) 4 r4)U ) 4' m W) 4 M4-) U 44X)~ Ho 1% -4 w) co -4'--4 0 U)-0
U 949 E-4 M F4 H' w)- Z -<
lp0 H- n -U) .U0 .)E-4 14 Z (n'U 004' 9X E-,D4 -4 W l-4U )~ M H l pr C
H H-C M '-40 c0 4'4 C)149 Q~ W W Z E-
94) Z U) Q i-E- W Z .)H-4Mim 54 4 00 0 W-U Z E--.4Ew -W94 0 U U) W H E- M 4E-4u E-4n)< Pt. U~E ) U E-1-4X
>- on)~ U l 1-4 0 Ci Uz 2: Ci)0 04En0E- Zm45E--4ZU.
Hi) E- 4 z0 Wu C < -CZ) W) C4', Ow 0WM " o*HrR00OOUU
w W 046.4 C404 E4 HH 4 -4-E4u uR nxzU) CI) iaOOi)iW
H U) 0 HO-4 M E- C 4R W 4 0 ~ H
E-4 l-CE): 0 -u'.) 9 4'nE1Z 4L4 9 2 z 0 W~ H -QE-4- 4
H U)0RnZ-4 E .4HE-E-4 4 H -4 E-4 L QU (r a
OW. >48 u' 0~ X)Nc
4 >4 0 U) O m CX9)r4 4c 94 04*-4 Hs %. 2: 0, Pr4=E-4U)w z)w 0 0 *' 9 OD C4 (1
M 44 0 E~ -4 44 Z E-4 '6 WI4 9'4-~ z 4c 0 oooU)U)O W aE-4w Ca 0 0 Wn Z 4
rL b4 1- 0 H -4).z W 0zZ~ za ZUn "-U w % z w 9E-4U m 4
*00 > 0 -4 E4 W W4' 0 ocl U) ca C132.8n w~ g4 xw 404 ~LIo wwwwww
H)z Z WX) 0I co ui.. 4' u a)Ci) 11.4
a-4 w -4ii oU)4 E- E-4D
M* 0 0 >00 U0 H4 Z 0 -4-4 H -4
C-76
"Z -/)
Z40
E:-4
z l< E- E-4S U) U)
i:- -,, U)--
,"i O 0 0
b04 H E01o C O0 > o 0) E-44 0l n
0 )E
H O_ c 0 E-4 0 aE-'
H C) 0 " LE-, 9 - - , 1E - - 4 E-4 UZ w4-q U U)2 U) UU ) ) z UD
0 4 E-4 0 W. H,-H X H0 1 H 0) C-)0 U E ~-4 E- ,nW9 - -4 43 W 90 U)E-4 ~ ~ U 8 Z Z Z>4 Z>4ZZZ -
4 co X > t1-a 00 WE- 9 - E-4 Z rUU U
E-4 L' P-4 P4 H -Z Z - E- H-ZEA4 U E-4H
0 2* N 00 ME4 - C
U Z E-4 9z E -4~ E-4 0 0
e~
4t 0 U) M E-4 W E-4 W-E-14WQE-4 E-
E- P4 W. s H. as 44 w ad w w . w Ws ow 5 W * WQ E-1 E-U)ME- -
*9 C/I 9 z A24 z a
R) 0 u U) E- U UE- Iz4 U) U -4 Z Z'- UD Z. CZ ZE-'ZnM
09E4- O) P' 44 14 ~ 04 4 1-4 0 H i4 0 U414
0-CD H 41E-
E4 UU)E4 -z X ClP ZQ Z -4 a E-4 0 zIn z
0 4
AD-A±24 874 CONTINUED DEVELOPMENT AND IMPLEMENTATION OF THE 23PROTOCOLS FOR THE DIGITAL..(U) AIR FORCE INST OF TECHWRIGHT-PATTERSON AFB OH SCHOOL OF END!. C H WAELTON
UNCLASSIFIED DEC 82 AFIT/GE/EE/82D-37 F/G 9/2 L
mhmhohhohhoiIFE ND
.',J,
,LO
.- _!.- -
.- ... 4 ,
1/4-
I -.:" . .. -
7J
EMN
OlU
n
,
MICRCOP REOLUIOTTCHR
"*, ..:1 i 'IuN..-_"" ".... .. ._.._"'- -"".
0 0 >4
lrz.i
--
E-4 0 E- z-
.' ' ,.1E-4 E -4 1-4U3Z0 '9
1-M >- 14 E-4 gn -4PN0 ) O -
0 0 0 C'C U-f ra C 0W' w 4 U n o
E- 0 P nI E1 D 0r)M Ic
4- 0-4EP- U E-4 U E-' U E- -4 COU z caa
z U~z U~z Uzz W 9 8W90 8" 8"o0 PH >m4 94-4 W~c~ U 00
*~ ~ ~~~ 9 IM E-44 HJ-4 U1-4 0E En3 cn~X Il
E- w X .~ E-4 aZ 1 -4 WW %004 H 4 0faqH 0 z a % a z 4 x w
E-4 U E-1 U 0 E- U E-o W 4 a0 4
P) 1U)U H -4 U PP a-U) P P ~ a E- 4 U)a uz4u U) E-
°."" .- - - - - ".-" -. ,,." . " *s - _ •~ . •~ s . . .. •. .. . . .s .. .. . .~ .. * . * s *
m E-44-4
v
0 E-4
p.. 1-- N-E-4~~~~~U U - - UE - ) - -
8 Z8 MM Z0 00 ZH 0 NOW C-ON 8
El E-1
COE-4 IM E-4C2 ~ E
x xwca rz4 W4 r ru. W U
U)4 ru cu UW b 0 0 646
on- E- 4CI
00 ~')'obs 0~ Z E-1. UE-. EQ M U~ 94UW -
Iuu W W W W 0 4 E 4 1% E-4 1-i u 0E E coC,4V -1 Em Em E-4 Z 9 E CEUC
WOA z4 6.0 Z -Z1- U -
oc c c CO14 C W~C MA WE4Z bU E1' N
E-0 E- 1ri , -4 - UNW x W4C00 M oo1 E-o 0 0
ba 0- 14 4 -0 E44 9 w 4 E440 4i
RR Uor U-[. UU U E4 L U m-uuUr
00 000000 x u9 09Cl) Hp4-r4 E- E4 i -414 0 E. 4 C , CC M0.-4www w owa
CD CzD CDO OO 0 a CD000 CD 0 CDrrzna r-4u~a~a H~ UUO QFOO, 4 -4r--40 0 i4-. 4 O-4 r0-4 M r4
W41 r-4 Q 14 - m D0 r4Q DQQr4rl4 MH CD4'1V a CD QC 4 aF4at4QQ D( -
010) 00U0100 0ZE1br40P4Q110r D jNQ 0C - Dr4C DC -W W W W4 I4I4.iI04UaDC Or. 1-4 0r- M4 CCD- Q oCD
C14 44~JFb Ni N k4 NNU "0 o uA
www c-79w
40t
E-4 .19'- 4 .19
z z .01
Ca 4 9
0COC/ E-4 4
19
Q D -4 Q 49CD H 0 0
a. CD0 Q Q
0~a~ CD4040 4w CD CDCD '4 "01
0 Q 40 CD 4.. *. . *s4t
"01
'0141
aw ruA4 adrk04
01
"01
"C08
49 49*'4'. 49
.4 49
'014' 4'
.4' 4'
414 49
.4 4'
.4 4'
49 E-1014'. 4'0 w 4 - -
'04' 0 4 Ob iE- D U1~ )4 9 - i C C 4 C E -4 Z U'0 4 ~ '
*14' 9) m)1 ca -C 0*4' W) w4 ZiU W >H Di49 4' 1 C = xH gz 0 4 ra( r
49 E4 % E m 4 04 - mE4 P' 9 i9R9 U2
44' rid I-I to 4 e'MCEi)49 0 E4 0 - ; 094E4 W P L
~4 c E- E-i =- 0 W 94 0r'ZE- 4 E- 0*~ I1**. ) . z - u Ow W 4 z
%4' U4 ~
* * H ~E- N E-1O M) 0 40 i 4 -4'4 PR w~ E-&4 0.. M A) E-04 4'0
.4 49 r' H- 800 "M w 4PW 0 gHU2EW -4.4'~~c M E-4 Hr)-.-~z 80C' "C I 0
4. to~ 0 0~4. 0 C cE-HH4 49 F 0 0~ *4 4') ' OQC LJUCEl49' 8 Z 04C'E4 8 o*g -
01' I)4CA o E 0 ra w4 C)C) Rw) 1. 4 4* 4 ' c
014 ~ ~ AM .- ~' ~0 E- 0 w~U 04
4'4'~~~ 14 E-i U0 )C " CE- U2 E-~C 4 H Cl H
49 W H z 0"40 l 4 O*' Cl4 Cl) m-E CC04 0 E 149 0 H w~a 4 4Ee'.' 0
I.!. I! r"C 0% Q N *1449 ~ ~ ~ ~ * 4. 03 to m*.d894c -
0 9 c n 40 E4O
- E-
I
- o0
6-. 0 4,, E-4 0 WCL
C4 U0 0~ s- E QI0~U
1 " " E C E4. E- 0 E-4 >400 w HQ 4 E>4
Wc EnE4 c: >4 >4 "
0 rn u4 9 E-4 w m H E-4
>IE R t 4 0 w 04 U R4 E-) COUW
E-' E-4 0 PC ~z0 E4 4 6 0 E-1C: 01- P 0~ > U
04 W. 0o P4 W P Z E- 00 n E-' 4 oc W-P E-- (n En
cn w. 0l 9a 0 n P 4 0 z) H , 1
o 0
a E-4 -i E-4-4 0 -4 02-4 CD 0 -qE -4 0" 04 r-I" CD( 2' -
0 0E-4 0Q- 0Q- 0-4 CO
X XX 4 tU) HZ.-~) UE-4 E41- E-4 E-4 E-4J rI0 EA 0.' 0
- -~ 4: - 0~ 04 r-Ia -''E. 20 00. 04C)1. 1-2~5 ~S . s% s ~ g.
IE-4
C-82
44
49'
41'49'49'
4 4'49 CO
49 0s 4~.49
0 49 0 E0W4gZ)ca H H Z orn * 4
* 3 n g cncoH ra QrM 4Z
4go.E 0arza z E Aca00.. E- U 0 4 rao '41 z zE-4 %Wa~14- E- cn -4 C4 ~ 4'
4 4' U - w 04z-a O)W E- CO 0 W4>
1949 0 E- rd COn P z 4 HCo ~ .1I-4 z~E-40 1 40
ca X E-i -0 gw 0&E4~ Wa~ E4i '4 4 0 >414ra H 0 D4 ra 0co ~E-4 s - )t4. Ig g4 .~C o 4' M~ Z 14E4 -
4 43 In E-44 H- F-aa0 KL4 * E-4 H W~-40 E- WC. ~4.Ck 0 z 0.44 *1 WZ4 Hri %4 a H r4 49 4 W': ~ > 1-4 w a> 0 X: 1 C4-4 . 0* 94 E1 w >o4 p1-4z 0 W E-4 9
4c W ) W9iZ0 Co4 9 H -1 0-14 Z 9444'U W rai-I 4 0 I4 c0 z 4'
4 4 l 9Q9 4s~~p4 E-'.1405 H '
4c 0 Co XCo "u444'0 alQ0 Wo R-a 480 Co -
4 1E4 '00 z Dwi 14 w
CoE4 494 > 4 A34r3K4 . 0~ rai 0 -4E- Z- W Q H ~ ac M' U -9 -4
CoE4W0 HE- M 0.43- W H o- zoa 0 W
En4 CoC ra.P R CoMC .1 40 to ridZ 4' z49 0 ~ cai w 0 1 a 4-3 8 a0 H
4'4'W 04 ~ W'C W El Q 0.4 E
4'4'04 Ha1 0-~a C4 4- >4 wa Z 9 K
41 4g H- Z H-Co (n M H~ E- ) 0 xK4g tCo H-- A i Co t'o2 1 "4~ z4- 49 W W W
P4' ~1E-4 r4ii~a0 '-' Zoo- 49
4'4 W~xe z104 z 01- 4 4 9
w 0Wra -14Wi>
4 44 Co C4 04 E-4wE-.. )4 4' 14 Co = - Z9M4 M U
49 ~ ~ W4 W - HNE4Q4 H -E-
0141c E-4 1 4 1
4 4904 H04 0 z- H '-
0-83
0
0 'KL) 00.)'
0) 0E-4o E-4 'K
Wz. E-4 M .E-4 Z U .1
ZaE ra. '
mR 0z E-0 04'K
E-4 X- 4c -4'>4 ~~r Ca 0W) aCg'
EW'-4 1- X'CKC>4 >41 w4 m'-4K
N1 E-4 4 u L9~
z Z4
P z 1 C)3UCD C CD w P PD 'Ki
H 40 E-4 W.~ E-4 -Z1 H w'K
Z- CD I -""' b.0 '
-4 -4- % '4 - 'K
i-0 e-1 0 -1 4" H1E-'P1 x E-4 4cP~ Z -
z PZCIM 4 X H
-E-4~' ~ XX HP1 '* P1..~W
~ ~ "Q Z to
C ~C-84
49
4919 r4 w
49 E-1 M
49 raA cro *I49 E-4~i' K r44 nE-1 IcE-
P E--e~ 0 - -4 M4E-4C )~ V4 *Oc "t UE4i
orn 0z IxiIC
6.3 0Ew cc N 8.4 4 z
C4~ E- :)E4 ) E-4 E-149 93 4 cn -zz 0 > 4 l
I 4 CDI A3U Co
E -o W E A~ 0 0 E -1E -
it -v &I z~ > IiU4
ICA -4C. 14
IC9 u n PC -4 m
E-4In( 4 IC (z ~ ~ ~ ~ I Q na- w cEi u M 0 Q H 04 WW E H E 4 -
-. 4 S E- 0 0 - r
N.9
0 4ci
w 0 2: H
Z a H to2 0 4
4940 -iE-1 z z 4
0' 4 D3E..EeEe( W
0 E- r 00H 'K araa U~aE'2'
Z4~a W W E4 CIE4 'K
Ws E- E4 O5 0 @ 05@5 0 5.5
s-I 49
I-I o c E-4 '
fn 24 O44E E"1 i0i~ 0 it
CD u 4
E- Av &.0 X k
- 4U " C E-
oc sc oc Cc- 0 4E-4 E4 ad 4 04 -1 4
OSQ8 ~ ~ @ p 4 N*5
c-8
_ _ _ _ - -f i
A eni CSectionII
This section of Appendix C contains the softwarelistings which comprise the shared components of the DELNEToperating system.
C- 87
4'. 4'
.4 4'
.4 4'* 4'4'. 4'4'. 4'.4 9C 4c
*0 4 C
U29 4949 ra0 4c
to ra. .014'
49 49 %0 0 H '
4 4' CI [C r 49
4 49 .. )E0CH H co W-e Ea041 E-02 E-2'ad1%0 04
co c 4 4'
C49 49c HME- -
4. -90 4 a 444-' 41r'A
wJ wi z 4'
ODD 49 0 P-4 a.04 0WE-I4 A4 E-4D E4 P4E
4 44 E6U&Ea.
w P uE-4 H
M H 41404 r 4'
4'4CJ 0~ 4 ar
m4 0- 'aW0'"H"H
49 4'
4'' 04 4 E-' 0
* a' P- COa) C/)0- 4O- M v w* 4' E- C0)~M ~0 000 0 0 Q 40ear-4 r-4 rI -4 r-4 r-4 -4 -44'
*~~~~ 49 raR)*zz ac0 0Q 4 0
0 ~ ~ - u-I 4' u*0az oc E-
49 Ra)'0izz4E40-'H>O EA W
14 4' H09 4' U)
4. 41'
c-88
44
W Im•
co 14 W w I (n 0>4 z
- E-4 D4 rn I €
ro Z o WiO0
0'4 OZ) E-4 W0
CI) 4' 4' i O -l U
Io4 II ' '• I I := U) 0EE-, In 144 t -4 X ., Hr- E-4 4 H Ei Z Ct OW, H E H
[..- 4.. 4 '4',p rr . ,. -. Id OO)E Ci)
Ii-Z I4 z-U a4D 4) -
4E U ' H z Q o 4 1-r n
+ m m 0 IM r En
[a -8 W W CD Ea
H49 N > 0
E-4 ZI E- 4E I E-4 U -4i c/3E- W' W Cd 0 rz 1-4 w U) W
1i *.~ 4 ). (n.)UHZU)CZ E4Ca) Ca) Ca)Cs)E-4 *'' H-.. -tn)ZU 0 Ciw
0 14 E- E-44 * C~ I-a- : 14 4 " HI- E-4- *- E-4 In9 -4D
E-4 rAW > ) U U)4 > 4 ' 4901.0W)x c
I I H- H'4 HE- HP 6E1 40 -
W g 14E- ZE- * ~I I 4p1-4E-41I E- E-4~ E- E-4 4 W- ZI = CE4a-)
ruU 04c 0 w 4 4 zU )C a) to w E- . a z) V49 91 InUC E-4 4'4' Ca. W E-4I 2: E- Z4c E-4 Ca ~ >4 ' C) Z
0~ ~ E- )Q iE-4 E-O E-4
C- 89
H W'
E-4 00
4' ~ W W [a 4
rw :3l- 4'*u 0. m. 4
M) E-4 0 )49 m > 0 E-4
49 04 44' Ka~m. 434' = z ~ 00449f 0 E-44
0 49
*X 0 ral H' 0
*0 PC
*l WXN to49 "agl- 0 z U 4
E -411 0 Xa E E4'-
H HX X X - H H- 4* xxx z z 4'
.0 4'49 4'4L4
* 4'4' 4c
4' 49
414
1' 1 H Z E-
o' CD: 4lo Cl '4) W' ElC E4x 49
4S Uu E-4 E4 X C0 04'E-- I Z -44
4' Q_- El 4
04' - 111 111 4'Z '~* ** .* .E~4i.C) 4
4' '4:00 C-904
49A
49 * 49
.19 0-4 E- E-
E4 0 6 .09
4c% 94 00 04 '*E-4 0~ W ~ 0
** 1. r0'49 W44U~U
>~CiW Q3E- I
0 9 "E-4 >4 -4 0 0
4%z~J 40 >0M%
0-* CO- W4 0'*43 4c 1 rA3 ra 9
C,,. 4g, 8 *
4 49 0 E-4 0U,.. 494
49 4 0 9 c X: .0
4g CO m E-1'0 z 4949~ 49 4 E-1E- 0 0 '
04 E-40u o
~0'* E-4E-4 I .0'9o- 4
0 0 4. 0
C-9 I
41-0
Ca) 41*49 c)U
49 *a C E)E-U * CaEG
*)~ *5 zaM
W 49 Ez ta Oc SW b >-G40b E . Ca)Ca)149 EGO U)P lb m CE4a W0 : ) ~ E-G )U4c Z )o wa~ E-4 9 H PC 0X 0 E- CD 0 O
* H C E 0 "-G **Ca E- 441 * Z~.b4 HZU4 I w
* 49M a) C4l IX W)Ca).04 m E4 b-GO Ix A mME-eo49 49~~ ~ w x 8 1 C z. aU U U)
4949 Z A E- Cn 1-4 0 M U)aC ~ Za Ix IOIIM
N. U) *a to. (a *OM'E4 xb- Ha 0 )en -4.0) U) 00..Ca W 24 E4 E4Z C~ Ca) 4 Q0 -49 49 Ow E-4 OM= M ~~ UHE E-0H E-4a
49*0u -4 cxZW - - W QE~- .awa.
494 4 a Cal> al 8a 9O > 4 4 20 )4r -49 ~ 0 n 9 w> 0 I 3Q0 )0E4r
490fa E- Ca)a)U. U Z64 4. I*- E~ U=3 -U) 4g >a) HOG OcE aC a q0w4w4 IxAdCa
49a 4E4 0 zCOC4 E-4)~a Q UU) A0W 4>
U)E4 - mwL ) 0 Ca cl z z aw-4 HUV.
d0 bd WW0 r c"L4s O a M 044 9 0 0 Cl E-4 m xE4 4 - UZQE- H 9~U E-449Za)a 41al. 0 x E04 UM M DW 4W - NE4
0 0 O N W d9 4 m 9 -
4. .00 90 %4 " Cr 0 N C>U
* n S * * * * **0* 0S s * S * * E?**s* Ei-4 W P M 0 Uz Wra
-0 4 ca 4WZ HWO W8W H0-92 ~
41 4949 4949449 4949 4949 494' 44' 49
*'*007 E-4 4'
U) 4'E-4 4>4 49
44'
49
c4) 43 E-4
U En 0 0 )4L)'
z z4'CJ9 0 0 4'E-
U) 4 9 Eri H 4'm 4 *> 0 co'4 E-4 pCDQW4 o U) oc x W 4E4 4 : 0 z W z r4 ~ E- I
0C 49ra0
814 U) E- 04 E-4 94 C 0 WzC) C) : I
4 ) ul0 '0 04
W4 4' I
4' 49
0 m 4' .- - I
74' w Ln OD c-4' 4 + + +. +4
P4 C x o b 1-14 IIlI 14
go)U 4' -94k.4 4' 9p.. ~ ~ ~ g.
4' 449 Go
* >'
4 0
4 C-93
4949- E- =4 fE- z1 C)
> E-4 H-z4ZU04 1
* it EA 4 0 ~NZ E4 ~ZM >1 0 W V0 E-4 :)
49 4 o 1 0 H 1- aQ Oc E 0 r 4 'C e49~ ~ ~ * 042i n[ CI c u
E. 49 rL 0 to M WIO E1 14 4 " a41~~~~~~~. 01r-440c 8 ~ K o94 -
494, E-4 0 -4fl 0 W 64 OC Laa ~~-4 W~' E-49 l o X w) 8 64 ~E-4 W Z
z g0 0 D ra~01~49 4 -a -4b 43 ra 4zW O 0U 4 -0 g )
ws w ad p' >w4 P 4 E-40a-400E-4
41 t. K1 01040 "40 8 2 29 H'O'pb1 0 OW b a W wU lM 04a.01 94 W 1141(A4 JE-4 8 C 2cL b4 010Ad
W a ca-4 H~' 0 0.. E- ZlX X x4 t :0r9 caz cn-4~ Ek w z w P4 r&9 c04na E- 0 r12C10
*a01 14 w W140 HwmmzwCzra 04 W4'' H
u 14 ~~E-404 0 I-E-0 ea
49 ~ ~ ~ ~ 011. 49 0001o u H 4 g z0 -
41 14414 UM 0grw z z o mw 0 a184 E- 00 c
49 49r X M 0 1wE u HWE 4 14 04w
(n 0 1- 4 01-44> WO 0 Wu5 94 rk m5 @5 X: ram pkw MM W I A .5 Da *54 ws D5@ 5@ 5@ 5@ 5* 5@ * 5. 5@ S@ 5. 5
49 M Hm Ak~wMND38 wQ 40-949
49
49
* 0
493CZ *49
00 *0 E-1
1-4 U2 4 cu a ow PC pra ~ i ~
goI~' *OZ 0 ~ H >- E-4 0C) VOra~ r t z a - a
W E-4 *ra 5
Z- - * Zc n D E
wC~a oc *9.4wCE-4a) 41 0 ~ E-4H 9.4n 9
*Z 9-0
X 0 nr 4 E-'94 U~a:) *0I go) E-4a Cg WWCE-4aW D
E-1 Hn 4 U 0> mCi)gC4 E4 -4 E-
Wa 9 0i RE- -01 04 ocs
*ZCi w E4.. -4 0 0 4 r4E- 0 PO -IWW W
W")0' 49 04 En &A + +i. H. e9 .z z0 49)X X X X - UXp* W 49H H I4a UH'
* HUO H49
P 'w
8a scHm w 0C L c4%* *CO-6u z 40
09 *U U
43 C-950z0 2
-I9
'p9
494149494949
49p .5.549494949494949
49494949
4949494949494946
49494941494c
0-i .5.
49Z .
49.
0% .
RRR5
494949E-
9449
c-9
.. . .~ .- . . . ..
494
49I 4Iz41 49I
49 49P~49 49C I-
49 494 VC ~Pa~z ~r.l ~ aUC~49 49l a Ee~ ze~4~-EE
49C Wl 4l~ -eg~ZE
49 49 . i~Z 4 (n Z H MI E-)~ 4449490 9 WW4w) 0 E4 ME-
mE-4 H WWW H-%
49~ 4-0 E4 t8 a i o4
*~i -4 CCE4 a D DO Z>4 E-4Hl) E4E-w E4 M 4E H E-4 M z N g 1
0 0 ru ~ E4 P)Cl >40C44M E4 wa O )C~ E-4) omm 809 om El'0 ~C
0 4 E-4 E-4 Cl) 0 e~ Q W~ -
49l 49a.C)l >a~C 4 gc W H MN 0 E--E-.Ec-4 Z:Cl%%4 a 0 E- 0 04C A2 0~ CO4-09i.~~waD0 0f
49 g 0 a4t4 4tZ aOwfCI8
U z
4g Cal o'n'C) H I - I 4W -0)*~a) Ca C) E~-4 H~ 0O~ wCl~ Wa~I M
*~Ca1 14Ca
N 0.. 0 cow O Z00-,W 3c 3
49 r3 00 4 o 4 mtg x t eo w0-97 0
flfl.W . * .
494P
49
49 04t4g
0 0
E4
E- 41 0 0 E-4C/)z E- E4
43 0 L) ZP' C!z 0 WC! 0'P E0 rrd Z E4 1% r24
2-'-4 0 W 4 0 r41
'PC! 0 ru 0o M 4'~~~ZE'4
PF X E-' 2-1 r') E- -4o
W. ca4 E4 x co H E4 C') U-M' M U
C'd 49) ad(AP 0>4
acra 'P49- -
4-4 ~1 4 ' - . ( )9b
co I- 'Pb14 -f
E-4I- E-'P14 0 0
Ca) k4C' 640 4 04
E-4 'P9 i* 0
C-98
9
49
4%449~ 49
499
: Vita
Captain Craig H. Hazelton was born on 10 January, 1949
in New York City. In 1952 he moved to Atlanta, Georgia andlater to Bradenton, Florida where he graduated from high
school in 1967. In 1968 he enlisted in the United States
Air Force and served as a missile electronics technician
until 1978 when he entered the University of Central Florida
under the Air Force's Airman Education and Commissioning
Program. After graduating with a Bachelor of Science degree
in Electrical Engineering, he received his commission and
was assigned to Eglin AFB, Florida where he served as lead
test engineer for the F-15 electronic warfare system. He
entered the Air Force Institute of Technology in June 1981.
Permanent Address: 3316 32nd Street West
Bradenton, Florida 33505
V-i
UNCLASSIFIED
SECURITY CLASSIFICATION OF THIS PAGE (hen Dsta i[nteredj READ INTRUCTIONS
REPORT DOCUMENTATION PAGE BEF-RE MrLoRMBEFORE COMPLETMnG FORM1. RPORT NUMNER 2. GOVT ACCESSION NO a. RECIPIENTs CATALOG NUMSE@R
APIT/GE/EE/82D-37 p ____"/_/______"___"
4. TITLE (and Subtille) S. TYPE OF REPORT & PE000 COVEREDCONTINUED DEVELOPMENT AND IMPLEMENTATION MS Thesis
* OF THE PROTOCOLS FOR THEDIGITAL ENGINEERING LABORATORY NETWORK s. PERFOMING ORG. RXPORT NUMBER
' '7. AUTHOR(@) 8. CONTRACT OR GRqANT NUMSEa(s)
Craig H, Hazelton, Capt, US"F
S. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT, PROJECT. TA"
Air Force Institute of Technology(AFIT/EN) AREA & WORK UNIT NUMiERS
Wright-Patterson APB, OH 45433
II. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE
Air Force Institute of Technology(APIT/EN) December 1982Wright-Patterson APB, OH 45433 IS. NUMBER OF PAGES
r. 21314. MONITORING AGENCY NAME & AOORErSS(l dlibmeto fi Con"utc.I Offiee) IS. SECURITY CLASS (fg dle t)
"S.. OECLASSIFICATION/DOWNGRADING
SCHEOULE
I. DISTRIBUTION STATEMENT (of this Roped)
Approval for public releasel,distribution unlimited
'7. DISTRIBUTION STATEMENT (*I Me sbe.oat entere t1olek 2. it difgea ten Ripeo)
I SUPPLEMENTARY NOTESo ,
'ad I~o b VOW A'. IW D T.pe
Af~~l.t r u oj I LLnn4 qV (AIC.) 0
I. KEY WORDS (Centtum an meveo side It ne..emy mid Id*a.U by &eek nmnber)
Local Computer NetworksLocal Area NetworksComputer Network ProtocolsComputer Interfaces
20. A STRACT (Centiu. an e ere eide iI meoesmy and Identi y by Wloek mundr)
Development of the Air Force Institute of Technology DigitalEngineering Laboratory's local computer network (DEWLET operatingsystem was continued. The DELNET operating system was developedunder the standards of the International Standards Organization's7 layer protocol model. This report contains the design andimplementation of the protocol layers l,2,and 3. This report alsopresents the tests and validations conducted to verify proper-- re development. Conclusions and recommendations are also ps,
DO FOR. 1473 EDITION oF i Nov " IS OBSOLETA CLASSISIFI D
WCUINrY CLASIFIoCATION OF THIS PA" MG 6--r
p. -
I