IEN 158 Jack Haverty Bolt Beranek and Newman 1 October 1980 XNET Formats for Internet Protocol Version 4 Jack Haverty Bolt Beranek and Newman Inc. October 1,1980 This IEN is intended to capture in print the formats used currently in the version 4 XNET protocol; most of the data is courtesy of Ray Tomlinson. Version 4 XNET is identical with version 2.5 XNET with the exceptions listed below. The version 2.5 format is described in RFC 643. It should be noted that the manner in which the protocol is used by a user program (such as the PDP10 XNET program), and by the various target-machine XNET servers, is not defined herein. In particular there are several problems and heuristics in dealing with the operation of the protocol in the internet environment, where individual packets may be duplicated, lost, and reordered. Changes from the version 2 formats include the following: 1) XNET header and data is embedded in a IN V4 packet instead of a V2.5 packet. 2) Packet format changed to add Port, Sequence number, and Checksum fields. 3) Change in asynchronous reply codes. 4) Addition of ACK bit to opcode field. 5) Positive acknowledgement of all messages.
IEN 158 Jack Haverty Bolt Beranek and Newman 1 October 1980 Packet Format +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! Port ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! LSB Sequence MSB ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! Checksum ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! PID !CNT!ACK! Opcode ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! LSB Argument 1 MSB ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! LSB Argument 2 MSB ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ ! ! ! Data ! ! ! +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ The IN protocol is set to the XNET protocol number (17 octal). Host to target opcodes NOP 0 No operation. DEBUG 1 Start debugging a process or address space. ENDBUG 2 End debugging a process or address space. HALT 3 Halt the process. DPOSIT 4 Deposit in memory. RESUME 5 Resume execution of a process. EXAM 6 Examine memory. DSV 7 Deposit state vector (r0-r5,sp,pc,ps). SETBPT 10 Set breakpoint. REMBPT 11 Remove breakpoint. ONESTP 12 Single step process (using trace trap). PROCD 13 Proceed from breakpoint. CREAP 14 Create a new process (or address space). DSTROY 15 Destroy (delete) a process or address space. XIOREP 16 Reply to XIO output (not used anymore). XINREP 17 Reply to XIO input. DEFALL 20 Define and allocate memory to an address space. SAP 21 Start all processes. SAVDSK 22 Save on disk. GETDSK 23 Get from disk. ENTRST 24 Enter address space into restart table.
IEN 158 Jack Haverty Bolt Beranek and Newman 1 October 1980 Opcodes from target to host machine. HALTED 77 Process halted (FREEP with arguments of 0). TRAPPED 76 Process trapped due to error. TTRAP 75 Trace trap. BPT 74 Breakpoint hit. XIOIN 73 XIO input request. XIOOUT 72 XIO output request. Checksum The checksum is the same as that for the IN header; ones complement of ones complement sum of words in the packet from Port field to last data word inclusive. In case of an odd number of data bytes, an additional byte of zeroes is assumed for checksum purposes. Port number The port number is a unique number relative to the host machine which appears in every packet for a particular debugging session. It is suggested that this number be derived from the time of day so that each session will be unique over a long period of time. Sequence number The first packet of a session (first use of a particular port number) is numbered 0. Subsequent packets increment by 1 modulo 2**16. Packets initiated by the target machine (opcodes
IEN 158 Jack Haverty Bolt Beranek and Newman 1 October 1980 72-77) are also numbered starting from 0. The target machine is allowed to execute packets out of order but must never execute a packet twice unless the effect is harmless. For example, an examine packet should be re-executed so that the data may be returned to the sender. Deposit or resume should not be re- executed. The host machine is responsible for correct ordering of critical functions. For example, it must not send a RESUME command until all prior deposits have been acknowledged. Acknowledgements Each packet must be acknowledged by the receiver. An acknowledgement consists of the original header plus any requested data (e.g. EXAM) with the ACK bit set. Acknowledgements are not cumulative; an acknowledgement acknowledges only the one packet with the matching sequence number. If the target debugger is incapable of performing the requested function, it should set the CNT (can't) bit instead of the ACK bit. Both bits may be set meaning that the function is available but the data required is no longer available. This might be the result of a duplicate packet.