home *** CD-ROM | disk | FTP | other *** search
Text File | 1991-04-21 | 58.4 KB | 2,673 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
- RFC 802: The ARPANET 1822L Host Access Protocol
-
-
-
-
-
-
-
-
- Andrew G. Malis
- Netmail: malis@bbn-unix
-
-
-
-
-
-
-
-
- Bolt Beranek and Newman Inc.
-
-
-
-
-
-
-
-
- November 1981
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Table of Contents
-
-
-
-
- 1 INTRODUCTION.......................................... 1
- 2 THE ARPANET 1822L HOST ACCESS PROTOCOL................ 4
- 2.1 Addresses and Names................................. 6
- 2.2 Name Authorization and Effectiveness................ 8
- 2.3 Uncontrolled Messages.............................. 14
- 2.4 The Short-Blocking Feature......................... 15
- 2.4.1 Host Blocking.................................... 16
- 2.4.2 Reasons for Host Blockage........................ 19
- 2.5 Establishing Host-IMP Communications............... 22
- 3 1822L LEADER FORMATS................................. 25
- 3.1 Host-to-IMP 1822L Leader Format.................... 26
- 3.2 IMP-to-Host 1822L Leader Format.................... 34
- 4 REFERENCES........................................... 42
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - i -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- FIGURES
-
-
-
-
- 1822 Address Format....................................... 6
- 1822L Name Format......................................... 7
- 1822L Address Format...................................... 7
- Communications between different host types.............. 13
- Host-to-IMP 1822L Leader Format.......................... 27
- NDM Message Format....................................... 30
- IMP-to-Host 1822L Leader Format.......................... 35
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - ii -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 1 INTRODUCTION
-
-
- This document proposes two major changes to the current ARPANET
-
- host access protocol. The first change will allow hosts to use
-
- logical addressing (i.e., host addresses that are independent of
-
- their physical location on the ARPANET) to communicate with each
-
- other, and the second will allow a host to shorten the amount of
-
- time that it may be blocked by its IMP after it presents a
-
- message to the network (currently, the IMP can block further
-
- input from a host for up to 15 seconds).
-
-
- The new host access protocol is known as the ARPANET 1822L (for
-
- Logical) Host Access Protocol, and it represents an addition to
-
- the current ARPANET 1822 Host Access Protocol, which is described
-
- in sections 3.3 and 3.4 of BBN Report 1822 [1]. Although the
-
- 1822L protocol uses different Host-IMP leaders than the 1822
-
- protocol, hosts using either protocol can readily communicate
-
- with each other (the IMPs handle the translation automatically).
-
-
- The new option for shortening the host blocking timeout is called
-
- the short-blocking feature, and it replaces the non-blocking host
-
- interface described in section 3.7 of Report 1822. This feature
-
- will be available to all hosts on C/30 IMPs (see the next
-
- paragraph), regardless of whether they use the 1822 or 1822L
-
- protocol.
-
-
-
- - 1 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- There is one major restriction to the new capabilities being
-
- described. Both the 1822L protocol and the short-blocking
-
- feature will be implemented on C/30 IMPs only, and will therefore
-
- only be useable by hosts connected to C/30 IMPs, as the Honeywell
-
- and Pluribus IMPs do not have sufficient memory to hold the new
-
- programs and tables. This restriction also means that logical
-
- addressing cannot be used to address a host on a non-C/30 IMP.
-
- However, the ARPANET will shortly be completely converted to C/30
-
- IMPs, and at that time this restriction will no longer be a
-
- problem.
-
-
- I will try to keep my terminology consistent with that used in
-
- Report 1822, and will define new terms when they are first used.
-
- Of course, familiarity with Report 1822 (section 3 in particular)
-
- is assumed.
-
-
- This document makes many references to Report 1822. As a
-
- convenient abbreviation, I will use "see 1822(x)" instead of
-
- "please refer to Report 1822, section x, for further details".
-
-
- This document is a proposal, not a description of an implemented
-
- system. Thus, described features are subject to change based
-
- upon responses to this document and restrictions that become
-
- evident during implementation. However, any such changes are
-
- expected to be minor. A new RFC will be made available once the
-
-
-
- - 2 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- implementation is complete containing the actual as-implemented
-
- description.
-
-
- Finally, I would like to thank Dr. Eric C. Rosen, who wrote most
-
- of section 2.4, and James G. Herman, Dr. Paul J. Santos Jr., John
-
- F. Haverty, and Robert M. Hinden, all of BBN, who contributed
-
- many of the ideas found herein.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 3 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 2 THE ARPANET 1822L HOST ACCESS PROTOCOL
-
-
- The ARPANET 1822L Host Access Protocol, which replaces the
-
- ARPANET 1822 Host Access Protocol described in Report 1822,
-
- sections 3.3 and 3.4, allows a host to use logical addressing to
-
- communicate with other hosts on the ARPANET. Basically, logical
-
- addressing allows hosts to refer to each other using an 1822L
-
- name (see section 2.1) which is independent of a host's physical
-
- location in the network. IEN 183 (also published as BBN Report
-
- 4473) [2] gives the use of logical addressing considerable
-
- justification. Among the advantages it cites are:
-
-
- o The ability to refer to each host on the network by a name
-
- independent of its location on the network.
-
-
- o Allowing different hosts to share the same host port on a
-
- time-division basis.
-
-
- o Allowing a host to use multi-homing (where a single host uses
-
- more than one port to communicate with the network).
-
-
- o And allowing several hosts that provide the same service to
-
- share the same name.
-
-
- The main differences between the 1822 and 1822L protocols are the
-
- format of the leaders that are used to introduce messages between
-
-
-
-
- - 4 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- a host and an IMP, and the specification in those leaders of the
-
- source and/or destination host(s). Hosts have the choice of
-
- using the 1822 or the 1822L protocol. When a host comes up on an
-
- IMP, it declares itself to be an 1822 host or an 1822L host host
-
- by the type of NOP message (see section 3.1) it uses. Once up,
-
- hosts can switch from one protocol to the other by issuing an
-
- appropriate NOP. Hosts that do not use the 1822L protocol will
-
- still be addressable by and can communicate with hosts that do,
-
- and vice-versa.
-
-
- Another difference between the two protocols is that the 1822
-
- leaders are symmetric, while the 1822L leaders are not. The term
-
- symmetric means that in the 1822 protocol, the exact same leader
-
- format is used for messages in both directions between the hosts
-
- and IMPs. For example, a leader sent from a host over a cable
-
- that was looped back onto itself (via a looping plug or faulty
-
- hardware) would arrive back at the host and appear to be a legal
-
- message from a real host (the destination host of the original
-
- message). In contrast, the 1822L headers are not symmetric, and
-
- a host can detect if the connection to its IMP is looped by
-
- receiving a message with the wrong leader format. This allows
-
- the host to take appropriate action upon detection of the loop.
-
-
-
-
-
-
-
- - 5 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 2.1 Addresses and Names
-
-
- The 1822 protocol defines one form of host specification, and the
-
- 1822L protocol defines two additional ways to identify network
-
- hosts. These three forms are 1822 addresses, 1822L names, and
-
- 1822L addresses.
-
-
- 1822 addresses are the 24-bit host addresses found in 1822
-
- leaders. They have the following format:
-
-
-
- 1 8 9 24
- +----------------+---------------------------------+
- | | |
- | Host number | IMP number |
- | | |
- +----------------+---------------------------------+
-
- Figure 1. 1822 Address Format
-
-
-
- These fields are quite large, and the ARPANET will never use more
-
- than a fraction of the available address space. 1822 addresses
-
- are used in 1822 leaders only.
-
-
- 1822L names are 16-bit unsigned numbers that serve as a logical
-
- identifier for one or more hosts. 1822L names have a much
-
- simpler format:
-
-
-
-
-
-
-
-
- - 6 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
-
-
-
- 1 16
- +--------------------------------+
- | |
- | 1822L name |
- | |
- +--------------------------------+
-
- Figure 2. 1822L Name Format
-
-
-
- The 1822L names are just 16-bit unsigned numbers, except that
-
- bits 1 and 2 are not both zeros (see below). This allows over
-
- 49,000 hosts to be specified.
-
-
- 1822 addresses cannot be used in 1822L leaders, but there may be
-
- a requirement for an 1822L host to be able to address a specific
-
- physical host port or IMP fake host. 1822L addresses are used
-
- for this function. 1822L addresses form a subset of the 1822L
-
- name space, and have both bits 1 and 2 off.
-
-
-
- 1 2 3 8 9 16
- +---+---+------------+----------------+
- | | | | |
- | 0 | 0 | host # | IMP number |
- | | | | |
- +---+---+------------+----------------+
-
- Figure 3. 1822L Address Format
-
-
-
-
-
-
-
-
- - 7 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- This format gives 1822L hosts the ability to directly address
-
- hosts 0-59 at IMPs 1-255 (IMP 0 does not exist). Host numbers
-
- 60-63 are reserved for addressing the four fake hosts at each
-
- IMP.
-
-
-
-
- 2.2 Name Authorization and Effectiveness
-
-
- Every host on a C/30 IMP, regardless of whether it is using the
-
- 1822 or 1822L protocol to access the network, will be assigned at
-
- least one 1822L name (logical address). Other 1822L hosts will
-
- use this name to address the host, wherever it may be physically
-
- located. Because of the implementation constraints mentioned in
-
- the introduction, hosts on non-C/30 IMPs cannot be assigned 1822L
-
- names. To circumvent this restriction, however, 1822L hosts can
-
- use 1822L addresses to access all other hosts on the network, no
-
- matter where they reside.
-
-
- At this point, several questions arise: How are these names
-
- assigned, how do they become known to the IMPs (so that
-
- translations to physical addresses can be made), and how do the
-
- IMPs know which host is currently using a shared port? To answer
-
- each question in order:
-
-
-
-
-
-
-
- - 8 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Names are assigned by a central network administrator. When each
-
- name is created, it is assigned to a host (or a group of hosts)
-
- at one or more specific host ports. The host(s) are allowed to
-
- reside at those specific host ports, and nowhere else. If a host
-
- moves, it will keep the same name, but the administrator has to
-
- update the central database to reflect the new host port.
-
- Changes to this database are distributed to the IMPs by the
-
- Network Operations Center (NOC) at BBN. For a while, the host
-
- may be allowed to reside at either of (or both) the new and old
-
- ports. Once the correspondence between a name and one or more
-
- hosts ports where it may be used has been made official by the
-
- administrator, that name is said to be authorized. 1822L
-
- addresses, which actually refer to physical host ports, are
-
- always authorized in this sense.
-
-
- Once a host has been assigned one or more names, it has to let
-
- the IMPs know where it is and what name(s) it is using. There
-
- are two cases to consider, one for 1822L hosts and another for
-
- 1822 hosts. The following discussion only pertains to hosts on
-
- C/30 IMPs.
-
-
- When an IMP sees an 1822L host come up on a host port, the IMP
-
- has no way of knowing which host has just come up (several hosts
-
- may share the same port, or one host may prefer to be known by
-
-
-
-
- - 9 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- different names at different times). This requires the host to
-
- let the IMP know what is happening before it can actually send
-
- and receive messages. This function is performed by a new host-
-
- to-IMP message, the Name Declaration Message (NDM), which lists
-
- the names that the host would like to be known by. The IMP
-
- checks its tables to see if each of the names is authorized, and
-
- sends an NDM Reply to the host saying which names in the list can
-
- be used for sending and receiving messages (i.e., which names are
-
- effective). A host can also use an NDM message to change its list
-
- of effective addresses (it can add to and delete from the list)
-
- at any time. The only constraint on the host is that any names
-
- it wishes to use can become effective only if they are
-
- authorized.
-
-
- In the second case, if a host comes up on a C/30 IMP using the
-
- 1822 protocol, the IMP automatically makes the first name the IMP
-
- finds in its tables for that host become effective. Thus, even
-
- though the host is using the 1822 protocol, it can still receive
-
- messages from 1822L hosts via its 1822L name. Of course, it can
-
- also receive messages from an 1822L host via its 1822L address as
-
- well. (Remember, the distinction between 1822L names and
-
- addresses is that the addresses correspond to physical locations
-
- on the network, while the names are strictly logical
-
- identifiers). The IMPs translate between the different leaders
-
-
-
- - 10 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- and send the proper leader in each case (more on this below).
-
-
- The third question above has by now already been answered. When
-
- an 1822L host comes up, it uses the NDM message to tell the IMP
-
- which host it is (which names it is known by). Even if this is a
-
- shared port, the IMP knows which host is currently connected.
-
-
- Whenever a host goes down, its names automatically become non-
-
- effective. When it comes back up, it has to make them effective
-
- again.
-
-
- Several hosts can share the same 1822L name. If more than one of
-
- these hosts is up at the same time, any messages sent to that
-
- 1822L name will be delivered to just one of the hosts sharing
-
- that name, and a RFNM will be returned as usual. However, the
-
- sending host will not receive any indication of which host
-
- received the message, and subsequent messages to that name are
-
- not guaranteed to be sent to the same host. Typically, hosts
-
- providing exactly the same service could share the same 1822L
-
- name in this manner.
-
-
- Similarly, when a host is multi-homed, the same 1822L name may
-
- refer to more than one host port (all connected to the same
-
- host). If the host is up on only one of those ports, that port
-
- will be used for all messages addressed to it. However, if the
-
-
-
-
- - 11 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- host were up on more than one port, the message would be
-
- delivered over just one of those ports, and the subnet would
-
- choose which port to use. This port selection could change from
-
- message to message. If a host wanted to insure that certain
-
- messages were delivered to it on specific ports, these messages
-
- could use either the port's 1822L address or a specific 1822L
-
- name that referred to that port alone.
-
-
- Some further details are required on communications between 1822
-
- and 1822L hosts. Obviously, when 1822 hosts converse, or when
-
- 1822L hosts converse, no conversions between leaders and address
-
- formats are required. However, this becomes more complicated
-
- when 1822 and 1822L hosts converse with each other.
-
-
- The following figure illustrates how these addressing
-
- combinations are handled, showing how each type of host can
-
- access every other type of host. There are three types of hosts:
-
- "1822 on C/30" signifies an 1822 host that is on a C/30 IMP,
-
- "1822L" signifies an 1822L host (on a C/30 IMP), and "1822 on
-
- non-C/30" signifies a host on an non-C/30 IMP (which cannot
-
- support the 1822L protocol). The table entry shows the protocol
-
- and host address format(s) that the source host can use to reach
-
- the destination host.
-
-
-
-
-
-
- - 12 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
-
-
-
- Destination Host
- Source
- Host | 1822 on C/30 | 1822L | 1822 on non-C/30
- --------+----------------+----------------+-----------------
- | | |
- 1822 on | 1822 | 1822 | 1822
- C/30 | | (note 1) |
- | | |
- --------+----------------+----------------+-----------------
- | | |
- | 1822L, using | 1822L, using | 1822L, using
- 1822L | 1822L name or | 1822L name or | 1822L address
- |address (note 2)| address | only (note 2)
- | | |
- --------+----------------+----------------+-----------------
- | | |
- 1822 on | 1822 | 1822 | 1822
- non-C/30| | (note 1) |
- | | |
- --------+----------------+----------------+-----------------
-
- Note 1: The message is presented to the destination host
- with an 1822L leader containing the 1822L addresses
- of the source and destination hosts. If either
- address cannot be encoded as an 1822L address, then
- the message is not delivered and and error message
- is sent to the source host.
-
- Note 2: The message is presented to the destination host
- with an 1822 leader containing the 1822 address of
- the source host.
-
-
- Figure 4. Communications between different host types
-
-
-
-
-
-
-
-
-
-
-
-
- - 13 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 2.3 Uncontrolled Messages
-
-
- Uncontrolled messages (see 1822(3.6)) present a unique problem
-
- for the 1822L protocol. Uncontrolled messages use none of the
-
- normal ordering and error-control mechanisms in the IMP, and do
-
- not use the normal subnetwork connection facilities. As a
-
- result, uncontrolled messages need to carry all of their overhead
-
- with them, including source and destination addresses. If 1822L
-
- addresses are used when sending an uncontrolled message,
-
- additional information is now required by the subnetwork when the
-
- message is transferred to the destination IMP. This means that
-
- less host-to-host data can be contained in the message than is
-
- possible between 1822 hosts.
-
-
- Uncontrolled messages that are sent between 1822 hosts may
-
- contain not more than 991 bits of data. Uncontrolled messages
-
- that are sent to and/or from 1822L hosts are limited to 32 bits
-
- less, or not more than 959 bits. Messages that exceed this
-
- length will result in an error indication to the host, and the
-
- message will not be sent. This error indication represents an
-
- enhancement to the previous level of service provided by the IMP,
-
- which would simply discard an overly long uncontrolled message
-
- without notification.
-
-
-
-
-
-
- - 14 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Other enhancements that are provided for uncontrolled message
-
- service are a notification to the host of any message-related
-
- errors that are detected by the host's IMP when it receives the
-
- message. A host will be notified if an uncontrolled message
-
- contains an error in the 1822L name specification, such as the
-
- name not being authorized or effective, or if the remote host is
-
- unreachable (which is indicated by none of its names being
-
- effective), or if network congestion control throttled the
-
- message before it left the source IMP. The host will not be
-
- notified if the uncontrolled message was lost for some reason
-
- once it was transmitted by the source IMP.
-
-
-
-
- 2.4 The Short-Blocking Feature
-
-
- The short-blocking feature of the 1822 and 1822L protocols is
-
- designed to allow a host to present messages to the IMP without
-
- causing the IMP to not accept further messages from the host for
-
- long amounts of time (up to 15 seconds). It is a replacement for
-
- the non-blocking host interface described in 1822(3.7), and that
-
- description should be ignored.
-
-
-
-
-
-
-
-
-
-
- - 15 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 2.4.1 Host Blocking
-
-
- Most commonly, when a source host submits a message to an IMP,
-
- the IMP immediately processes that message and sends it on its
-
- way to its destination host. Sometimes, however, the IMP is not
-
- able to process the message immediately. Processing a message
-
- requires a significant number of resources, and when the network
-
- is heavily loaded, there can sometimes be a long delay before the
-
- necessary resources become available. In such cases, the IMP
-
- must make a decision as to what to do while it is attempting to
-
- gather the resources.
-
-
- One possibility is for the IMP to stop accepting messages from
-
- the source host until it has gathered the resources needed to
-
- process the message just submitted. This strategy is known as
-
- blocking the host, and is basically the strategy that has been
-
- used in the ARPANET up to the present. When a host submits a
-
- message to an IMP, all further transmissions from that host to
-
- that IMP are blocked until the message can be processed.
-
-
- It is important to note, however, that not all messages require
-
- the same set of resources in order to be processed by the IMP.
-
- The particular set of resources needed will depend on the message
-
- type, the message length, and the destination host of the message
-
- (see below). Therefore, although it might take a long time to
-
-
-
- - 16 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- gather the resources needed to process some particular message,
-
- it might take only a short time to gather the resources needed to
-
- process some other message. This fact exposes a significant
-
- disadvantage in the strategy of blocking the host. A host which
-
- is blocked may have many other messages to submit which, if only
-
- they could be submitted, could be processed immediately. It is
-
- "unfair" for the IMP to refuse to accept these message until it
-
- has gathered the resources for some other, unrelated message.
-
- Why should messages for which the IMP has plenty of resources be
-
- delayed for an arbitrarily long amount of time just because the
-
- IMP lacks the resources needed for some other message?
-
-
- A simple way to alleviate the problem would be to place a limit
-
- on the amount of time during which a host can be blocked. This
-
- amount of time should be long enough so that, in most
-
- circumstances, the IMP will be able to gather the resources
-
- needed to process the message within the given time period. If,
-
- however, the resources cannot be gathered in this period of time,
-
- the IMP will flush the message, sending a reply to the source
-
- host indicating that the message was not processed, and
-
- specifying the reason that it could not be processed. However,
-
- the resource gathering process would continue. The intention is
-
- that the host resubmit the message in a short time, when,
-
- hopefully, the resource gathering process has concluded
-
-
-
- - 17 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- successfully. In the meantime, the host can submit other
-
- messages, which may be processed sooner. This strategy does not
-
- eliminate the phenomenon of host blocking, but only limits the
-
- time during which a host is blocked. This shorter time limit
-
- will generally fall somewhere in the range of 100 milliseconds to
-
- 2 seconds, with its value possibly depending on the reason for
-
- the blocking.
-
-
- Note, however, that there is a disadvantage to having short
-
- blocking times. Let us say that the IMP accepts a message if it
-
- has all the resources needed to process it. The ARPANET provides
-
- a sequential delivery service, whereby messages with the same
-
- priority, source host, and destination host are delivered to the
-
- destination host in the same order as they are accepted from the
-
- source host. With short blocking times, however, the order in
-
- which the IMP accepts messages from the source host need not be
-
- the same as the order in which the source host originally
-
- submitted the messages. Since the two data streams (one in each
-
- direction) between the host and the IMP are not synchronized, the
-
- host may not receive the reply to a rejected message before it
-
- submits subsequent messages of the same priority for the same
-
- destination host. If a subsequent message is accepted, the order
-
- of acceptance differs from the order of original submission, and
-
- the ARPANET will not provide the same type of sequential delivery
-
-
-
- - 18 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- that it has in the past.
-
-
- Up to now, type 0 (regular) messages have only had sub-types
-
- available to request the standard blocking timeout. The short-
-
- blocking feature makes available new sub-types that allow the
-
- host to request messages to be short-blocking, i.e. only cause
-
- the host to be blocked for a short amount of time if the message
-
- cannot be immediately processed. See section 3.1 for a complete
-
- list of the available sub-types.
-
-
- If sequential delivery by the subnet is a strict requirement, as
-
- would be the case for messages produced by NCP, the short-
-
- blocking feature cannot be used. For messages produced by TCP,
-
- however, the use of the short-blocking feature is allowed and
-
- recommended.
-
-
-
-
- 2.4.2 Reasons for Host Blockage
-
-
- There are a number of reasons why a message could cause a long
-
- blockage in the IMP, which would result in the rejection of a
-
- short-blocking message. The IMP signals this rejection of a
-
- short-blocking message by using the Incomplete Transmission (Type
-
- 9) message, using the sub-type field to indicate which of the
-
- above reasons caused the rejection of the message. See section
-
-
-
-
- - 19 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 3.2 for a summary of the Incomplete Transmission message and a
-
- complete list of its sub-types. The sub-types that apply to the
-
- short-blocking feature are:
-
-
- 6. Connection setup-delay: Although the IMP presents a simple
-
- message-at-a-time interface to the host, it provides an
-
- internal connection-oriented (virtual circuit) service,
-
- except in the case of uncontrolled messages (see section
-
- 2.3). Two messages are considered to be on the same
-
- connection if they have the same source host (i.e., they are
-
- submitted to the same IMP over the same host interface), the
-
- same priority, and the same destination host name or address.
-
- The subnet maintains internal connection set-up and tear-down
-
- procedures. Connections are set up as needed, and are torn
-
- down only after a period of inactivity. Occasionally,
-
- network congestion or resource shortage will cause a lengthy
-
- delay in connection set-up. During this period, no messages
-
- for that connection can be accepted, but other messages can
-
- be accepted.
-
-
- 7. End-to-end flow control: For every message that a host
-
- submits to an IMP (except uncontrolled messages) the IMP
-
- eventually returns a reply to the host indicating the
-
- disposition of the message. Between the time that the
-
-
-
-
- - 20 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- message is submitted and the time the host receives the
-
- reply, the message is said to be outstanding. The ARPANET
-
- allows only eight outstanding messages on any given
-
- connection. If there are eight outstanding messages on a
-
- given connection, and a ninth is submitted, it cannot the
-
- accepted. If a message is refused because its connection is
-
- blocked due to flow control, messages on other connections
-
- can still be accepted.
-
-
- End-to-end flow control is the most common cause of host
-
- blocking in the ARPANET at present.
-
-
- 8. Destination IMP buffer space shortage: If the host submits a
-
- message of more than 1008 bits (exclusive of the 96-bit
-
- leader), buffer space at the destination IMP must be reserved
-
- before the message can be accepted. Buffer space at the
-
- destination IMP is always reserved on a per-connection basis.
-
- If the destination IMP is heavily loaded, there may be a
-
- lengthy wait for the buffer space; this is another common
-
- cause of blocking in the present ARPANET. Messages are
-
- rejected for this reason based on their length and
-
- connection; messages of 1008 or fewer bits or messages for
-
- other connections may still be acceptable.
-
-
-
-
-
-
- - 21 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 9. Congestion control: A message may be refused for reasons of
-
- congestion control if the path via the intermediate IMPs and
-
- lines to the destination IMP is too heavily loaded to handle
-
- additional traffic. Messages to other destinations may be
-
- acceptable, however.
-
-
- 10. Local resource shortage: Sometimes the source IMP itself is
-
- short of buffer space, table entries, or some other resource
-
- that it needs to accept a message. Unlike the other reasons
-
- for message rejection, this resource shortage will affect all
-
- messages equally, except for uncontrolled messages. The
-
- message's size or connection is not relevant.
-
-
- The short-blocking feature is available to all hosts on C/30
-
- IMPs, whether they are using the 1822 or 1822L protocol, through
-
- the use of Type 0, sub-type 1 and 2 messages. A host using these
-
- sub-types should be prepared to correctly handle Incomplete
-
- Transmission messages from the IMP.
-
-
-
-
- 2.5 Establishing Host-IMP Communications
-
-
- When a host comes up on an IMP, or after there has been a break
-
- in the communications between the host and its IMP (see
-
- 1822(3.2)), the orderly flow of messages between the host and the
-
-
-
-
- - 22 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- IMP needs to be properly (re)established. This allows the IMP
-
- and host to recover from most any failure in the other or in
-
- their communications path, including a break in mid-message.
-
-
- The first messages that a host should send to its IMP are three
-
- NOP messages. Three messages are required to insure that at
-
- least one message will be properly read by the IMP (the first NOP
-
- could be concatenated to a previous message if communications had
-
- been broken in mid-stream, and the third provides redundancy for
-
- the second). These NOPs serve several functions: they
-
- synchronize the IMP with the host, they tell the IMP how much
-
- padding the host requires between the message leader and its
-
- body, and they also tell the IMP whether the host will be using
-
- 1822 or 1822L leaders.
-
-
- Similarly, the IMP will send three NOPs to the host when it
-
- detects that the host has come up. Actually, the IMP will send
-
- six NOPs, alternating three 1822 NOPs with three 1822L NOPs.
-
- Thus, the host will see three NOPs no matter which protocol it is
-
- using. The NOPs will be followed by two Interface Reset
-
- messages, one of each style. If the IMP receives a NOP from the
-
- host while the above sequence is occurring, the IMP will only
-
- send the remainder of the NOPs and the Interface Reset in the
-
- proper style. The 1822 NOPs will contain the 1822 address of the
-
-
-
-
- - 23 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- host interface, and the 1822L NOPs will contain the corresponding
-
- 1822L address.
-
-
- Once the IMP and the host have sent each other the above
-
- messages, regular communications can commence. See 1822(3.2) for
-
- further details concerning the ready line, host tardiness, and
-
- other issues.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 24 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 3 1822L LEADER FORMATS
-
-
- The following sections describe the formats of the leaders that
-
- precede messages between an 1822L host and its IMP. They were
-
- designed to be as compatible with the 1822 leaders as possible.
-
- The second, fifth, and sixth words are identical in the two
-
- leaders, and all of the existing functionality of the 1822
-
- leaders has been retained. The first difference one will note is
-
- in the first word. The 1822 New Format Flag is now also used to
-
- identify the two types of 1822L leaders, and the Handling Type
-
- has been moved to the second byte. The third and fourth words
-
- contain the Source and Destination 1822L Name, respectively.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 25 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 3.1 Host-to-IMP 1822L Leader Format
-
-
-
-
-
- 1 4 5 8 9 16
- +--------+--------+----------------+
- | | 1822L | |
- | Unused | H2I | Handling Type |
- | | Flag | |
- +--------+--------+----------------+
- 17 20 21 22 24 25 32
- +--------+-+------+----------------+
- | |T|Leader| |
- | Unused |R|Flags | Message Type |
- | |C| | |
- +--------+-+------+----------------+
- 33 48
- +----------------------------------+
- | |
- | Source Host |
- | |
- +----------------------------------+
- 49 64
- +----------------------------------+
- | |
- | Destination Host |
- | |
- +----------------------------------+
- 65 76 77 80
- +-------------------------+--------+
- | | |
- | Message ID |Sub-type|
- | | |
- +-------------------------+--------+
- 81 96
- +----------------------------------+
- | |
- | Unused |
- | |
- +----------------------------------+
-
- Figure 5. Host-to-IMP 1822L Leader Format
-
-
-
-
-
- - 26 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Bits 1-4: Unused, must be set to zero.
-
-
- Bits 5-8: 1822L Host-to-IMP Flag:
-
- This field is set to decimal 13 (1101 in binary).
-
-
- Bits 9-16: Handling Type:
-
- This field is bit-coded to indicate the transmission
-
- characteristics of the connection desired by the host. See
-
- 1822(3.3).
-
- Bit 9: Priority Bit:
-
- Messages with this bit on will be treated as priority
-
- messages.
-
- Bits 10-16: Unused, must be zero.
-
-
- Bits 17-20: Unused, must be zero.
-
-
- Bit 21: Trace Bit:
-
- If equal to one, this message is designated for tracing as
-
- it proceeds through the network. See 1822(5.5).
-
-
- Bits 22-24: Leader Flags:
-
- Bit 22: A flag available for use by the destination host.
-
- See 1822(3.3) for a description of its use by the IMP's
-
- TTY fake host.
-
- Bits 23-24: Reserved for future use, must be zero.
-
-
-
-
-
- - 27 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Bits 25-32: Message Type:
-
- Type 0: Regular Message - All host-to-host communication
-
- occurs via regular messages, which have several sub-
-
- types, found in bits 77-80. These sub-types are:
-
- 0: Standard - The IMP uses its full message and error
-
- control facilities, and host blocking (see section
-
- 2.4) may occur.
-
- 1: Standard, short-blocking - See section 2.4.
-
- 2: Uncontrolled, short-blocking - See section 2.4.
-
- 3: Uncontrolled - The IMP will perform no message-
-
- control functions for this type of message, and
-
- network flow and congestion control (see section
-
- 2.4) may cause loss of the message. Also see
-
- 1822(3.6) and section 2.3.
-
- 4-15: Unassigned.
-
- Type 1: Error Without Message ID - See 1822(3.3).
-
- Type 2: Host Going Down - see 1822(3.3).
-
- Type 3: Name Declaration Message (NDM) - This message is
-
- used by the host to declare which of its 1822L names is
-
- or is not effective (see section 2.2), or to make all
-
- of its names non-effective. The first 16 bits of the
-
- data portion of the NDM message, following the leader
-
- and any padding, contains the number of 1822L name
-
-
-
-
- - 28 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- entries contained in the message. This is followed by
-
- the 1822L name entries, each 32 bits long, of which the
-
- first 16 bits is a 1822L name and the second 16 bits
-
- contains either of the integers zero or one. Zero
-
- indicates that the name should not be effective, and
-
- one indicates that the name should be effective. The
-
- IMP will reply with a NDM Reply message (see section
-
- 3.2) indicating which of the names are now effective
-
- and which are not. Pictorially, a NDM message has the
-
- following format (including the leader, which is
-
- printed in hexadecimal):
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 29 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
-
-
-
- 1 16 17 32 33 48
- +----------------+----------------+----------------+
- | | | |
- | 0D00 | 0003 | 0000 |
- | | | |
- +----------------+----------------+----------------+
- 49 64 65 80 81 96
- +----------------+----------------+----------------+
- | | | |
- | 0000 | 0000 | 0000 |
- | | | |
- +----------------+----------------+----------------+
- 97 112 113 128 129 144
- +----------------+----------------+----------------+
- | | | |
- | # of entries | 1822L name #1 | 0 or 1 |
- | | | |
- +----------------+----------------+----------------+
- 145 160 161 176
- +----------------+----------------+
- | | |
- | 1822L name #2 | 0 or 1 | etc.
- | | |
- +----------------+----------------+
-
- Figure 6. NDM Message Format
-
-
-
- An NDM with zero entries will cause all current
-
- effective names for the host to become non-effective.
-
- Type 4: NOP - This allows the IMP to know which style of
-
- leader the host wishes to use. A 1822L NOP signifies
-
- that the host wishes to use 1822L leaders, and an 1822
-
- NOP signifies that the host wishes to use 1822 leaders.
-
- All of the other remarks concerning the NOP message in
-
-
-
-
- - 30 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 1822(3.3) still hold. The host should always issue
-
- NOPs in groups of three to insure proper reception by
-
- the IMP. Also see section 2.5 for a further discussion
-
- on the use of the NOP message.
-
- Type 8: Error with Message ID - see 1822(3.3).
-
- Types 5-7,9-255: Unassigned.
-
-
- Bits 33-48: Source Host:
-
- This field contains one of the source host's 1822L names
-
- (or, alternatively, the 1822L address of the host port the
-
- message is being sent over). This field is not
-
- automatically filled in by the IMP, as in the 1822 protocol,
-
- because the host may be known by several names and may wish
-
- to use a particular name as the source of this message. All
-
- messages from the same host need not use the same name in
-
- this field. Each source name, when used, is checked for
-
- authorization, effectiveness, and actually belonging to this
-
- host. Messages using names that do not satisfy all of these
-
- requirements will not be delivered, and will instead result
-
- in an error message being sent back into the source host.
-
- If the host places its 1822L Address in this field, the
-
- address is checked to insure that it actually represents the
-
- host port where the message originated. If the message is
-
- destined for an 1822 host on a non-C/30 IMP, this field MUST
-
-
-
- - 31 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- contain the source host's 1822L address (see Figure 4 in
-
- section 2.2).
-
-
- Bits 49-64: Destination Host:
-
- This field contains the 1822L name or address of the
-
- destination host. If it contains a name, the name will be
-
- checked for effectiveness, with an error message returned to
-
- the source host if the name is not effective. If the
-
- message is destined for an 1822 host on a non-C/30 IMP, this
-
- field MUST contain the destination host's 1822L address (see
-
- Figure 4 in section 2.2).
-
-
- Bits 65-76: Message ID:
-
- This is a host-specified identification used in all type 0
-
- and type 8 messages, and is also used in type 2 messages.
-
- When used in type 0 messages, bits 65-72 are also known as
-
- the Link Field, and should contain values specified in
-
- Assigned Numbers [3] appropriate for the host-to-host
-
- protocol being used.
-
-
- Bits 77-80: Sub-type:
-
- This field is used as a modifier by message types 0, 2, 4,
-
- and 8.
-
-
-
-
-
-
-
- - 32 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Bits 81-96: Unused, must be zero.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 33 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 3.2 IMP-to-Host 1822L Leader Format
-
-
-
-
-
- 1 4 5 8 9 16
- +--------+--------+----------------+
- | | 1822L | |
- | Unused | I2H | Handling Type |
- | | Flag | |
- +--------+--------+----------------+
- 17 20 21 22 24 25 32
- +--------+-+------+----------------+
- | |T|Leader| |
- | Unused |R|Flags | Message Type |
- | |C| | |
- +--------+-+------+----------------+
- 33 48
- +----------------------------------+
- | |
- | Source Host |
- | |
- +----------------------------------+
- 49 64
- +----------------------------------+
- | |
- | Destination Host |
- | |
- +----------------------------------+
- 65 76 77 80
- +-------------------------+--------+
- | | |
- | Message ID |Sub-type|
- | | |
- +-------------------------+--------+
- 81 96
- +----------------------------------+
- | |
- | Message Length |
- | |
- +----------------------------------+
-
- Figure 7. IMP-to-Host 1822L Leader Format
-
-
-
-
-
- - 34 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Bits 1-4: Unused and set to zero.
-
-
- Bits 5-8: 1822L IMP-to-Host Flag:
-
- This field is set to decimal 14 (1110 in binary).
-
-
- Bits 9-16: Handling Type:
-
- This has the value assigned by the source host (see section
-
- 3.1). This field is only used in message types 0, 5-9, 11
-
- and 15.
-
-
- Bits 17-20: Unused and set to zero.
-
-
- Bit 21: Trace Bit:
-
- If equal to one, the source host designated this message for
-
- tracing as it proceeds through the network. See 1822(5.5).
-
-
- Bits 22-24: Leader Flags:
-
- Bit 22: Available as a destination host flag.
-
- Bits 23-24: Reserved for future use, set to zero.
-
-
- Bits 25-32: Message Type:
-
- Type 0: Regular Message - All host-to-host communication
-
- occurs via regular messages, which have several sub-
-
- types. The sub-type field (bits 77-80) is the same as
-
- sent in the host-to-IMP leader (see section 3.1).
-
- Type 1: Error in Leader - See 1822(3.4).
-
-
-
-
- - 35 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Type 2: IMP Going Down - See 1822(3.4).
-
- Type 3: NDM Reply - This is a reply to the NDM host-to-IMP
-
- message (see section 3.1). It will have the same
-
- number of entries as the NDM message that is being
-
- replying to, and each listed 1822L name will be
-
- accompanied by a zero or a one. A zero signifies that
-
- the name is not effective, and a one means that the
-
- name is now effective.
-
- Type 4: NOP - The host should discard this message. It is
-
- used during initialization of the IMP/host
-
- communication. The Destination Host field will contain
-
- the 1822L Address of the host port over which the NOP
-
- is being sent. All other fields are unused.
-
- Type 5: Ready for Next Message (RFNM) - See 1822(3.4).
-
- Type 6: Dead Host Status - See 1822(3.4).
-
- Type 7: Destination Host or IMP Dead (or unknown) - This
-
- message is sent in response to a message for a
-
- destination which the IMP cannot reach. The message to
-
- the "dead" destination is discarded. See 1822(3.4) for
-
- a complete list of the applicable sub-types. If this
-
- message is in response to a standard (type 0, sub-type
-
- 0 or 1) message, it will be followed by a Dead Host
-
- Status message, which gives further information about
-
-
-
-
- - 36 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- the status of the dead host. If this message is in
-
- response to an uncontrolled (type 0, sub-type 2 or 3)
-
- message, only sub-type 1 (The destination host is not
-
- up) will be used, and it will not be followed by a Dead
-
- Host Status message.
-
- Type 8: Error in Data - See 1822(3.4).
-
- Type 9: Incomplete Transmission - The transmission of the
-
- named message was incomplete for some reason. An
-
- incomplete transmission message is similar to a RFNM,
-
- but is a failure indication rather than a success
-
- indication. This message is also used by the short-
-
- blocking feature to indicate that the named message was
-
- rejected because it would have caused to IMP to block
-
- the host for a long amount of time. See section 2.4
-
- for more details concerning the short-blocking feature.
-
- The message's sub-types are:
-
- 0: The destination host did not accept the message
-
- quickly enough.
-
- 1: The message was too long.
-
- 2: The host took more than 15 seconds to transmit the
-
- message to the IMP. This time is measured from
-
- the last bit of the leader through the last bit of
-
- the message.
-
-
-
-
- - 37 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 3: The message was lost in the network due to IMP or
-
- circuit failures.
-
- 4: The IMP could not accept the entire message within
-
- 15 seconds because of unavailable resources. This
-
- sub-type is only used in response to non-short-
-
- blocking messages. If a short-blocking message
-
- timed out, it will be responded to with one of the
-
- sub-types 6-10.
-
- 5: Source IMP I/O failure occurred during receipt of
-
- this message.
-
- Sub-types 6-10 are all issued in response to a short-
-
- blocking message that timed out (would have caused the
-
- host to become blocked for a long amount of time). The
-
- sub-types are designed to give the host some indication
-
- of why it timed out and what other messages would also
-
- time out. See section 2.4.2 for further details
-
- concerning each of these sub-types.
-
- 6: The message timed out because of connection set-up
-
- delay. Further messages to the same host (if on
-
- the same connection) may also be affected.
-
- 7: The message timed out because of end-to-end flow
-
- control. Further messages to the same host on the
-
- same connection will also be affected.
-
-
-
-
- - 38 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 8: Destination IMP buffer shortage caused the message
-
- to time out. This affects multi-packet standard
-
- messages to the specified host, but shorter
-
- messages or messages to hosts on other IMPs may
-
- not be affected.
-
- 9: Network congestion control caused the message to be
-
- rejected. Messages to hosts on other IMPs may not
-
- be affected, however.
-
- 10: Local resource shortage kept the IMP from being
-
- able to accept the message within the short-
-
- blocking timeout period.
-
- 11-15: Unassigned.
-
- Type 10: Interface Reset - See 1822(3.4).
-
- Type 15: 1822L Name or Address Error - This message is sent
-
- in response to a type 0 message from a host that
-
- contained an erroneous Source Host or Destination Host
-
- field. Its sub-types are:
-
- 0: The Source Host 1822L name is not authorized or not
-
- effective.
-
- 1: The Source Host 1822L address does not match the
-
- host port used to send the message.
-
- 2: The Destination Host 1822L name is not authorized.
-
- 3: The Destination Host 1822L name is authorized but
-
-
-
-
- - 39 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- not effective, even though the named host is up.
-
- If the host were actually down, a type 7 message
-
- would be returned, not a type 15.
-
- 4: The Source or Destination Host field contains a
-
- 1822L name, but the host being addressed is on a
-
- non-C/30 IMP (see Figure 4 in section 2.2).
-
- 5-15: Unassigned.
-
- Types 11-14,16-255: Unassigned.
-
-
- Bits 33-48: Source Host:
-
- For type 0 messages, this field contains the 1822L name or
-
- address of the host that originated the message. All
-
- replies to the message should be sent to the host specified
-
- herein. For message types 5-9, 11 and 15, this field
-
- contains the source host field used in a previous type 0
-
- message sent by this host.
-
-
- Bits 49-64: Destination Host:
-
- For type 0 messages, this field contains the 1822L name or
-
- address that the message was sent to. This allows the
-
- destination host to detect how it was specified by the
-
- source host. For message types 5-9, 11 and 15, this field
-
- contains the destination host field used in a previous type
-
- 0 message sent by this host.
-
-
-
-
- - 40 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- Bits 65-76: Message ID:
-
- For message types 0, 5, 7-9, 11 and 15, this is the value
-
- assigned by the source host to identify the message (see
-
- section 3.1). This field is also used by message types 2
-
- and 6.
-
-
- Bits 77-80: Sub-type:
-
- This field is used as a modifier by message types 0-2, 4-7,
-
- 9, 11 and 15.
-
-
- Bits 81-96: Message Length:
-
- This field is contained in type 0 and type 3 messages only,
-
- and is the actual length in bits of the message (exclusive
-
- of leader, leader padding, and hardware padding) as computed
-
- by the IMP.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 41 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- 4 REFERENCES
-
-
- [1] Specifications for the Interconnection of a Host and an IMP,
-
- BBN Report 1822, May 1978 Revision.
-
-
- [2] E. C. Rosen et. al., ARPANET Routing Algorithm Improvements,
-
- IEN 183 (also published as BBN Report 4473, Vol. 1), August
-
- 1980, pp. 55-107.
-
-
- [3] J. Postel, Assigned Numbers, RFC 790, September 1981, p. 10.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- - 42 -
-
-
-
-
- RFC 802 Andrew G. Malis
-
-
-
- INDEX
-
-
-
-
- 1822...................................................... 4
- 1822 address.............................................. 6
- 1822 host................................................. 5
- 1822L..................................................... 4
- 1822L address............................................. 7
- 1822L host................................................ 5
- 1822L name................................................ 6
- authorized................................................ 9
- blocking................................................. 16
- congestion control................................... 22, 39
- connection........................................... 20, 38
- destination host..................................... 32, 40
- effective................................................ 10
- flow control......................................... 20, 38
- handing type......................................... 27, 35
- incomplete transmission message...................... 19, 37
- leader flags......................................... 27, 35
- link field............................................... 32
- logical addressing........................................ 4
- message ID........................................... 32, 41
- message length........................................... 41
- message type......................................... 28, 35
- multi-homing.............................................. 4
- NDM.................................................. 10, 28
- NDM reply............................................ 10, 36
- NOC....................................................... 9
- NOP........................................... 5, 22, 30, 36
- outstanding.............................................. 21
- priority bit............................................. 27
- regular message...................................... 28, 35
- RFNM..................................................... 36
- short-blocking feature................................... 15
- short-blocking message............................... 19, 28
- source host.......................................... 31, 40
- standard message......................................... 28
- sub-type............................................. 32, 41
- symmetric................................................. 5
- trace bit............................................ 27, 35
- uncontrolled message................................. 14, 28
-
-
-
-
-
- - 43 -
-
-
-
-
-
-
-
-