Google
 

Trailing-Edge - PDP-10 Archives - BB-H240E-BM_1985 - documentation/decnet.bwr
There are 17 other files named decnet.bwr in the archive. Click here to see a list.



             Beware File for DECnet-20 V4.0, TOPS-20 V6.1









                      DECnet-20 V4.0 Beware File
                             TOPS-20 V6.1


                              24 Sep 85


              DECnet-20 V4.0, TOPS-20 Version 6.1(7030)



                              Revision 4



COPYRIGHT (C) DIGITAL EQUIPMENT CORPORATION 1976,  1985.   ALL  RIGHTS
RESERVED.

THIS SOFTWARE IS FURNISHED UNDER A LICENSE AND MAY BE USED AND  COPIED
ONLY  IN  ACCORDANCE  WITH  THE  TERMS  OF  SUCH  LICENSE AND WITH THE
INCLUSION OF THE ABOVE COPYRIGHT NOTICE.  THIS SOFTWARE OR  ANY  OTHER
COPIES  THEREOF MAY NOT BE PROVIDED OR OTHERWISE MADE AVAILABLE TO ANY
OTHER PERSON.  NO TITLE TO AND OWNERSHIP OF  THE  SOFTWARE  IS  HEREBY
TRANSFERRED.

THE INFORMATION IN THIS SOFTWARE IS SUBJECT TO CHANGE  WITHOUT  NOTICE
AND  SHOULD  NOT  BE  CONSTRUED  AS  A COMMITMENT BY DIGITAL EQUIPMENT
CORPORATION.

DIGITAL ASSUMES NO RESPONSIBLITY FOR THE USE  OR  RELIABILITY  OF  ITS
SOFTWARE ON EQUIPMENT WHICH IS NOT SUPPLIED BY DIGITAL.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 2
                                                             24 Sep 85


                               CONTENTS
                                of the
           DECnet-20 V4.0 Beware File,  TOPS-20 V6.1(7030)



        1.0     NFT and FAL  . . . . . . . . . . . . . . . . . . . . 4
        2.0     DECnet Features and Restrictions . . . . . . . . . . 4
        2.1       Phase II Communication . . . . . . . . . . . . . . 4
        2.2       No Flow Control  . . . . . . . . . . . . . . . . . 4
        2.3       MCB supports DECnet Phase III  . . . . . . . . . . 4
        2.4       Versions of Associated Products  . . . . . . . . . 5
        2.5       Privileged Object Types  . . . . . . . . . . . . . 5
        2.6       Restriction on Task Names  . . . . . . . . . . . . 5
        2.7       Network Topology Software Interrupt  . . . . . . . 5
        2.8       Elective Ethernet End Node . . . . . . . . . . . . 5
        2.9       Network Management Articles  . . . . . . . . . . . 6
        2.9.1       Unrecognized Frame Destination counter . . . . . 6
        2.9.2       LOOP CIRCUIT NI-0-0 Warning  . . . . . . . . . . 6
        2.9.3       Ethernet LOAD NODE Warning . . . . . . . . . . . 6
        2.9.4       Downline Load of DECnet Nodes  . . . . . . . . . 7
        2.9.5       Terminal Server Diagnostic Loads . . . . . . . . 7
        2.9.6       DECnet Network Management Event Logger . . . . . 8
        2.9.7       DTESUI, DN20ST and DTETPR BUGINFs  . . . . . . . 8
        2.9.8       MCB DECnet Events  . . . . . . . . . . . . . . . 8
        2.9.9       VMS DECnet Events  . . . . . . . . . . . . . . . 9
        3.0     Information on the DECnet Package  . . . . . . . .  11
        3.1       The <DN20> Directory on the DECnet Distribution 
                  Tape . . . . . . . . . . . . . . . . . . . . . .  11
        3.2       DECnet Source Tapes  . . . . . . . . . . . . . .  11
        4.0     Beware Entries for Remote Terminals  . . . . . . .  11
        4.1       SET HOST Command . . . . . . . . . . . . . . . .  11
        4.2       Making HOST connections to VMS . . . . . . . . .  11
        4.3       NRT connections from non-TOPS-20 systems . . . .  12
        4.3.1       Segment size increased . . . . . . . . . . . .  12
        4.3.2       Parity removed on remote terminal links  . . .  12
        4.4       TOPS-20's CTERM-SERVER . . . . . . . . . . . . .  12
        4.5       VMS V4.0 . . . . . . . . . . . . . . . . . . . .  12
        4.6       RSX-11M+ . . . . . . . . . . . . . . . . . . . .  13
        5.0     Warning for 36-bit Mode DECnet Links . . . . . . .  13
        5.1       TOPS-20 V5.1 . . . . . . . . . . . . . . . . . .  13
        5.2       TOPS-20 V6.0 . . . . . . . . . . . . . . . . . .  14


APPENDIX A      NETWORK MANAGEMENT EVENT LOGGER

        A.1     The DECNET event logger  . . . . . . . . . . . . . A-1
        A.2     The three logging sinks  . . . . . . . . . . . . . A-3
        A.2.1     The LOGGING CONSOLE  . . . . . . . . . . . . . . A-4
        A.2.2     The LOGGING FILE . . . . . . . . . . . . . . . . A-4
        A.2.3     The LOGGING MONITOR  . . . . . . . . . . . . . . A-5
        A.3     Selecting what events to report  . . . . . . . . . A-5
        A.4     The SHOW LOGGING command . . . . . . . . . . . . . A-6
        A.5     Event logger and system startup  . . . . . . . . . A-7
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 3
                                                             24 Sep 85


        A.6     Using the event logger . . . . . . . . . . . . . . A-7
        A.7     Event records lost . . . . . . . . . . . . . . . . A-7
        A.8     Implementation details . . . . . . . . . . . . . . A-8
        A.9     MCB events . . . . . . . . . . . . . . . . . . . . A-8
        A.10    Logging to remote nodes  . . . . . . . . . . . . . A-9
        A.11    Filtering on entity ID's . . . . . . . . . . . .  A-10


APPENDIX B      EVENT MESSAGE FORMAT
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 4
NFT and FAL                                                  24 Sep 85


1.0  NFT and FAL

Updated versions of NFT and FAL are included on the DECnet tape.



2.0  DECnet Features and Restrictions

2.1  Phase II Communication

TOPS-20 V6.1 supports DECnet Phase IV and thus  does  not  communicate
with DECnet Phase II nodes.


                                 NOTE

               TOPS-20  DECSYSTEM-2020s  are  Phase  II
               DECnet   nodes   and   thus   will   not
               communicate with TOPS-20 V6.1.





2.2  No Flow Control

TOPS-20 V6.1 DECnet uses "No Flow Control" by default.  This  normally
gives  better  performance  than  "Segment Flow Control", the previous
default.  Since most DECnet releases have until recently used  Segment
or  Message  Flow  Control,  it  is  possible  that  the user may find
problems  when  using  V6.1   to   communicate   with   older   DECnet
implementations.  To use segment flow control, enter the command

                 DECNET DEFAULT-FLOW-CONTROL SEGMENT

into the 6-1-CONFIG.CMD startup configuration file.



2.3  MCB supports DECnet Phase III

The MCB software in the DN20 supports Phase III DECnet.   This  should
present  no  problem in a single-area network of fewer than 256 nodes.
In a multi-area Phase IV network, TOPS-20 V6.1 will only  be  able  to
access  the entire Phase IV network through the NIA20 or the CI20, not
through the DN20.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 5
DECnet Features and Restrictions                             24 Sep 85


2.4  Versions of Associated Products

Please note that versions of  the  MCB  (DECnet  code  for  the  DN20)
shipped  with  TOPS-20  versions  5.1  and  6.0  will still work under
TOPS-20 V6.1, but that previous versions of NMLT20 and NCPTAB.MAC will
not work under TOPS-20 V6.1.  Please note also that there are required
changes to the NCP command files which start DECnet in the host and in
the DN20.



2.5  Privileged Object Types

TOPS-20  V6.1  implements  the  Digital  Network  Architecture   (DNA)
restriction  that  only privileged users can open passive (SRV:) links
with object numbers from 1 to 127.  This may force some user  programs
to choose new object numbers.



2.6  Restriction on Task Names

In previous releases, a user program was allowed  to  specify  both  a
non-zero  object  type and a task name in a network logical link name.
For example, DCN:NODE-63.DTR was allowed, but is no longer.

This change was made  in  order  to  be  compatible  with  the  DECnet
architecture and other DECnet implementations.

We suggest  that  programs  now  use  DCN:NODE-TASK-63DTR  instead  of
DCN:NODE-63.DTR.



2.7  Network Topology Software Interrupt

Under Phase IV TOPS-20 DECnet, the Network Topology Software Interrupt
will  only be given on non-endnode systems for topology changes within
the local routing area.  This could cause some programs to miss DECnet
opportunities.

A system which does  not  elect  Ethernet  Endnode  status  and  which
participates  in a single-area network should see no difference in the
NTC PSI.



2.8  Elective Ethernet End Node

TOPS-20  V6.1  defaults  to  being  a  routing   DECnet   node.    For
non-Ethernet  circuits  this  default  imposes  little overhead on the
system.  DECnet routing on Ethernet circuits imposes  little  overhead
if there are few routing nodes on the Ethernet.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 6
DECnet Features and Restrictions                             24 Sep 85


The overhead imposed by DECnet routing on Ethernet circuits grows more
than  linearly  with  the  number  of  DECnet routers on the Ethernet.
Thus, it is wise to configure as few routing nodes on an  Ethernet  as
is  practical.   If  the  NIA20  is to be the only DECnet circuit, the
system manager should use the SETSPD command DECNET ROUTER-ENDNODE  to
reduce routing overhead on the Ethernet and on the 20.

A rule of thumb is that there should be no more than 10 routing  nodes
on a single Ethernet.



2.9  Network Management Articles

2.9.1  Unrecognized Frame Destination counter

The NCP  command  SHOW  CIRCUIT  NI-0-0  COUNTERS  returns  a  counter
entitled   Unrecognized  Frame  Destination.   Please  disregard  this
counter as presently implemented.

The NIA20 microcode counts an "Unrecognized Frame  Destination"  every
time a received message passes the hardware address filter but not the
microcode filter.  This happens when  someone  sends  to  a  multicast
address  for which we are not enabled.  The hardware filter passes all
multicast messages;  the NIA20 microcode filters  multicast  messages.
This  is  not  an  error  and  the  counter  should  have no effect on
performance.



2.9.2  LOOP CIRCUIT NI-0-0 Warning

The NCP command LOOP CIRCUIT NI-0-0 may produce  LLMILF  BUGINFs  when
looping  to a DEUNA.  The DEUNA is the unibus to Ethernet adapter used
on VAXs and PDP-11s.  The BUGINFs are caused by a DEUNA responding  to
the  loop  request  with  a  message that contains an invalid function
code.  This is a known problem with the DEUNAs and does  not  indicate
an error in the network.



2.9.3  Ethernet LOAD NODE Warning

The LOAD NODE command  should  not  be  used  for  nodes  on  Ethernet
circuits.  This command will result in an NML request that monopolizes
NMLT20 until it times out.  Instead, the  TRIGGER  command  should  be
used  where  applicable  or the remote console facility can be used to
initialize a load operation.  For the Ethernet  Terminal  Server,  use
the  TRIGGER  command;   for the DECserver-100, use the remote console
facility and the DECserver-100 command INIT.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 7
DECnet Features and Restrictions                             24 Sep 85


2.9.4  Downline Load of DECnet Nodes

When a DECnet node initializes an Ethernet  circuit,  it  changes  its
Ethernet  address  from  the  factory-installed  address to an address
whose low-order 16 bits are the same as its DECnet node number.   Thus
the  DECnet  node  has  one  address when first powered up and another
after DECnet has started.

If this node is a dependent  node  to  be  downline  loaded  over  the
Ethernet,  for  example an RSX11S system, its first load requests will
have the factory-installed address in the boot requests  but  it  will
have  the  DECnet  address  in  any  reboot  requests after DECnet has
started.

A succesful workaround is to use NCP to set the  hardware  address  of
the  dependent DECnet node to its factory-installed address when first
booting the dependent node, then to use NCP  to  change  the  hardware
address   to  the  DECnet  address  after  the  dependent  system  has
initialized DECnet.  The following shows  how  to  create  the  DECnet
Ethernet address from the DECnet area and node number:

     1.  Convert the DECnet area.node number to a 16  bit  value  with
         the  area  number in the high order (leftmost) 6 bits and the
         node number in  the  low  order  (rightmost)  10  bits.   For
         example,  node 7.107 would convert to the 16 bit binary value
         of 000 111 000 001 101 001 (octal:  070153).   Remember  that
         the area and node numbers are decimal.

     2.  Group the sixteen bit value as 4 hexidecimal  digits  in  two
         pairs.  The above value would become 1C 6B.

     3.  Invert the two hexidecimal numbers and  append  them  to  the
         hexidecimal  value  AA000400.   This  will produce the DECnet
         Ethernet address.  In the example, the address 7.107 would be
         AA0004006B1C.


A future version of NMLT20 will try to match both the hardware address
and the DECnet address for any boot requests.



2.9.5  Terminal Server Diagnostic Loads

After Ethernet Terminal Server diagnostics have completed, TOPS-20  is
documented   to   load   the   normal  system  image  into  the  DECSA
automatically.  In this release, however, the operator  must  use  the
NCP  TRIGGER  command  to  trigger  a  normal  system  load  once  the
diagnostics have stopped running.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 8
DECnet Features and Restrictions                             24 Sep 85


2.9.6  DECnet Network Management Event Logger

TOPS-20 now supports the  full  implementation  of  the  DECnet  Event
Logger.   DECnet  events  can be filtered and distributed to the SPEAR
file, to operators running OPR,  and  to  application  programs.   The
default  is to log all known events in the SPEAR file only.  If you do
not wish any or certain events to go to the SPEAR file,  you  need  to
add  commands in your network startup files to modify the behaviour of
the event logger.  The NCP commands to control the  event  logger  are
defined in the DECnet-20 System Managers Guide.  We recommend that you
study  the  documentation,  since  event  processing   can   be   very
CPU-consuming in a large dynamic network.

An appendix to this beware file describes the  event  logger  in  more
detail.



2.9.7  DTESUI, DN20ST and DTETPR BUGINFs

When TOPS-20 and the MCB reinitialize protocol across the DTE, TOPS-20
outputs  one or both of the following BUGINFs:  DTESUI, DN20ST.  These
BUGINFs only indicate that the  protocol  has  been  interrupted,  not
necessarily  that  the MCB has stopped running.  DTETPR indicates that
the DN20 is being reloaded.

In order to suppress DTESUI, DN20ST and DTETPR BUGINFs, set  the  cell
DTBUGX in STG to zero, either in STG.MAC or with DDT.  It is defaulted
to 1 in the monitor we ship to be compatible with  previous  monitors.
DTBUGX has no effect on BUGINFs due to code other than the MCB running
in the DN20 front end (eg, DN6x IBMCOMM).



2.9.8  MCB DECnet Events

You only need to read this section if you are  interested  in  sending
the  DECnet  events  generated  by  an MCB to something other than its
TOPS20 host.

There is a problem in the V5.1 MCB with regard to DECnet events.   The
events generated by the MCB use an improper size of 2 bytes for one of
the fields when the corporate architecture prescribes a  single  byte.
This did not cause a problem with the V5.1 NMLT20 since it was written
to expect the 2 byte field.

We have decided not to correct this in V6.1, since that will  simplify
backwards  compatibility  with  V5.1  and  V6.0.  We may fix this at a
later time when V5.1 is no longer supported and has been  replaced  by
V6.1.   This  means  that  you will have a problem if you want to send
your MCB events to something other than a TOPS-10 or TOPS-20 host.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                    Page 9
DECnet Features and Restrictions                             24 Sep 85


If you plan to send MCB events to other hosts, you  need  to  apply  a
patch.   Below  you will find a patch for both the V5.1 and V6.1 MCBs.
You do not need to apply any patches to the V6.1 NMLT20, since it  has
been  changed  to understand both sizes of the field.  However, if you
do apply the MCB patch and then revert to TOPS20  V5.1,  you  need  to
'unpatch' the MCB since the V5.1 NMLT20 requires the old wrong format.

;This patch is for the 6.1 MCB



 TOPS-20 Command processor 6.1(7)
@ena
$ddt11
DDT11 7E(120)

Input: system:d2102a.sys/mcbsys
[56p core]
[60p core]
[61p core]
[203p core]
 highest location is 637003

;This patch will turn the 2 byte field into a single byte one
160500/   MOVB 1(R1),(R5)+   nop
160502/   HALT    nop
;(Patch at 160502 and 160504 in the 5.1 MCB)

;This patch will send the event to all sinks (console,file,monitor)
160162/   RTI    =2   7
;(Patch at 160164 in the 5.1 MCB)

$p
FILE: d2102a.sys/mcbsys
File DSK:D2102A.SYS[4,130]  written

^C


If you plan to change the host for an MCB, you  need  also  to  change
your  MCB  startup commands to set the host to the desired other node.
After a reload, the MCB will use the new host.



2.9.9  VMS DECnet Events

You may find many event records of the following form:
Event type 3.0  Invalid message
From node <nodenumber>. (<nodename>), occurred <date> <time>

  Message = 48 / nnn / nnn / 00 00
  Parameter #2 = nnnn
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                   Page 10
DECnet Features and Restrictions                             24 Sep 85


These records indicate that TOPS-20 has  detected  an  illegal  DECnet
Disconnect  Confirm  message, usually from a VMS V4.0 system.  The VMS
engineering group intends to fix this in a  future  release.   In  the
meantime,  you  may  want to filter these events.  The errors cause no
harm to either the system or to the user's logical link.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                   Page 11
Information on the DECnet Package                            24 Sep 85


3.0  Information on the DECnet Package

3.1  The <DN20> Directory on the DECnet Distribution Tape

The DN20 directory is used in building the MCB for the Front End.  The
contents  matches  the versions of the software available in Autopatch
Tape 10.  This supercedes the version of the MCB that was used in  the
DECnet V4.0 field test.  The only difference is that the field test of
DECnet V4.0 used an older version of the XPE.TSK file.   This  version
has  been  renamed  OLD-XPE.*.   It is on the tape only to provide the
possibility of rebuilding the field tested MCB.



3.2  DECnet Source Tapes

The TOPS-20 part of DECnet is on the TOPS-20 monitor source tape.  The
Sources  for NMLT20 are on one of the two DECnet Source tapes.  NMLT20
requires BLISS-36 in order to be built from these  sources.   The  MCB
related  directories  (MCB.*)  on  the  source  tapes  contain  source
information for the MCB and the utilities required to build  the  MCB.
It  should  be  noted  that  this  is  for "information only" and that
Digital does not warrent that the MCB executable image  can  be  built
using these source files.



4.0  Beware Entries for Remote Terminals

4.1  SET HOST Command

The System Manager should set the system-wide logical  name  NRT:  for
the   SET   HOST  command.   The  SET  HOST  command  first  runs  the
CTERM-SERVER which attempts to connect to a CTERM HOST on  the  target
system.  If this fails, the EXEC will run the program indicated by the
logical name NRT:.  This program is normally SYS:SETHOST.EXE (talks to
20s)  or  the unsupported SYS:HOST.EXE (talks to pre-CTERM VMS and RSX
systems as well as 20s).



4.2  Making HOST connections to VMS

The  unsupported  HOST  program  has  been   changed   to   initialize
connections  to  VMS  more  completely.   HOST  now sets many terminal
characteristics just after making  a  connection,  so  the  connection
appears  to  take  noticeably  longer  than in the past.  The terminal
characteristics handling, however, will be improved.
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                   Page 12
Beware Entries for Remote Terminals                          24 Sep 85


4.3  NRT connections from non-TOPS-20 systems

4.3.1  Segment size increased

User applications which  make  virtual  terminal  connections  to  the
TOPS-20 NRT object type from non-TOPS-20 systems may have trouble with
TOPS-20  V6.1.   NRT  is  only  supported  in   TOPS-20   to   TOPS-20
connections.   There  should  be  no  problem between TOPS-20 systems,
version 5.1 or later.

Previous versions of TOPS-20 sent a maximum of 64 bytes  in  a  single
NRT  output  message.   V6.1  will  send a maximum of 500 bytes or the
segment size, whichever is smaller, to  improve  performance.   If  an
application requires the old 64 byte maximum, patch the cell NRTMAX to
64.



4.3.2  Parity removed on remote terminal links

Previous releases of TOPS-20 sent 7-bit ASCII  with  parity  over  NRT
links.   In  order  to  avoid confusing 8-bit ASCII terminals, TOPS-20
V6.1 does not set parity on NRT, CTERM or LAT links.



4.4  TOPS-20's CTERM-SERVER

The source file for CTERM-SERVER is called  SERVER.MAC.   The  shorter
name helps compiling and linking.

This is the list of known CTERM-SERVER bugs:

     1.  The CTERM server program will not currently pass Null  or  ^V
         (quote) characters to the remote host.

     2.  Terminal  pause  on  character  SPACE  (TERMINAL   PAUSE   on
         END-OF-PAGE  MODE) does not currently work on the remote host
         with CTERM-SERVER.

     3.  The VMS V4.0 command-line editor will not work on a  terminal
         connected via CTERM-SERVER.




4.5  VMS V4.0

There are some known bugs in RTPAD (SET  HOST)  under  VMS  V4.0  when
setting  host  to  a  TOPS-20  system.   These bugs are expected to be
addressed in the next point releases of  VMS.   These  are  the  known
bugs:
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                   Page 13
Beware Entries for Remote Terminals                          24 Sep 85


     1.  Setting TERMINAL PAUSE on END-OF-PAGE on TOPS-20  will  force
         an image error exit under VMS.

     2.  The character escape ESC is echoed as "$" when  connected  to
         TOPS-20 under CTERM.

     3.  Terminal recognition via TTYINI  will  not  work  unless  the
         TERMINAL NO RAISE command is issued first.

     4.  Normal exit from SET HOST  may  leave  the  VMS  terminal  in
         NOSYNC,  NOlowercase mode;  doing a SET TERMINAL /INQUIRE may
         be necessary to reestablish terminal settings.

     5.  VMS conventions apply to  many  TOPS-20  control  characters;
         e.g.  EXIT may be printed after ^Z;  ^X will be turned into a
         ^U and will clear the typeahead buffer.




4.6  RSX-11M+

The user may find a very similar set of bugs in RSX-11M+ when  setting
host to a TOPS-20 system.



5.0  Warning for 36-bit Mode DECnet Links

You only need to read this section if you have  an  application  which
uses  36-bit  byte mode task-to-task DECnet transfers.  NFT and FAL do
not use this mode, even for 36-bit byte files.

DECnet-20 in monitors before V6.1 could transfer files in 36-bit  byte
mode to other TOPS-20 systems of the same version, but they have a bug
which is only seen when the remote system has  a  larger  buffer  size
than  the  V5.1  system.   TOPS-20  V6.1  uses  larger buffer sizes by
default, so the following patch may be needed at your site.



5.1  TOPS-20 V5.1

Any site wishing to send files in 36-bit  byte  mode  between  systems
running TOPS-20 V5.1 and TOPS-20 V6.1 must install the following patch
in the 5.1 system.

(In place of the character $ below, type the <ESC> character.)

@ena
$get system:monitr.exe
$ddt
nspsrv$:
dosrv1/  DPB T2,NSPFRK+46     trn
Beware File for DECnet-20 V4.0, TOPS-20 V6.1                   Page 14
Warning for 36-bit Mode DECnet Links                         24 Sep 85


dosrv1+4/ MOVE CX,T2(T1)    $<dpb t2,nspfrk+46$1>
^Z
$Save system:monitr.exe


                                 NOTE

               If  the   effective   address   of   the
               instruction  at DOSRV1 is not NSPFRK+46,
               substitute the  value  in  your  monitor
               into the patch line at DOSRV1+4.

               If you do not understand how to  install
               this patch, you may wish to contact your
               local software specialist.





5.2  TOPS-20 V6.0

Any site wishing to send files in 36 bit  byte  mode  between  systems
running TOPS-20 V6.0 and TOPS-20 V6.1 must install the following patch
in the TOPS-20 V6.0 system.

(In place of the character $ below, type the <ESC> character.)

@enable
$get system:monitr.exe
$ddt
nspsrv$:
dosrv1/  DPB T2,NSPFRK+32     trn
dosrv1+4/ MOVSI CX,STS      $<dpb t2,nspfrk+32$1>
^z
$save system:monitr.exe
$


                                 NOTE

               If  the   effective   address   of   the
               instruction  at  DOSRV1 is not NSPFRK+32
               substitute the  value  in  your  monitor
               into the patch line at DOSRV1+4.

               If you do not understand how to  install
               this patch, you may wish to contact your
               local software specialist.











                              APPENDIX A

                   NETWORK MANAGEMENT EVENT LOGGER



A.1  The DECNET event logger

DECnet generates an event message when an error or  something  unusual
occurs  during  operation.   The  event  message  contains the type of
event, where it occurred and the time of the event.  Example:

22:46:30          -- Message from DECnet event logger --

DECNET Event type 4.15, Adjacency up
Event came from node 7.142 (GIDNEY), occurred 8-JAN-1985 22:46:28

  Circuit DTE-0-1

  Node = 7.143 (GIDDN) 


Each event has an identification of the form 4.15.  The  first  number
(4)  is  called  the event class and defines which part of DECnet that
generated the event.  In particular, 4 stands for the  routing  layer.
The  second  number  (15)  is called the event type and identifies the
particular event.  Together 4.15 means "Adjacency up, reported by  the
routing layer".

Associated with most events is a DECnet entity.  A DECnet  entity  may
be  a node, a circuit or a line.  In this particular event, the entity
is the DTE-0-1 circuit.  It means that the "adjacency up" was detected
on the DTE circuit.

In addition, there may be one or more lines of additional  data.   For
this  event,  the  additional  data  informs  us  that  node GIDDN was
detected at the other end of the DTE circuit.

Here is the full list of all events.  The ones TOPS-20  will  generate
are flagged with a *.  TOPS-20 can however receive and log all defined
events.  (We will see in a moment that events can be sent  to  (logged
at) other nodes.)
NETWORK MANAGEMENT EVENT LOGGER                               Page A-2
The DECNET event logger                                      24 Sep 85



List of all events defined in DEcnet phase IV network management
================================================================

Event   Tops-20 Entity          Name
-----   ------  ------          ----

  Network management layer
0.0     *       -               Event records lost
0.1             Node            Automatic node counters
0.2             Line            Automatic line counters
0.3     *       Circuit         Automatic service
0.4             Line            Line counters zeroed
0.5             Node            Node counters zeroed
0.6             Circuit         Passive loopback
0.7     *       Circuit         Aborted service request
0.8     *       Any             Automatic counters
0.9     *       Any             Counters zeroed

  Session control layer
2.0             -               Local node state change
2.1             -               Access control reject

  End to end communications layer (NSP)
3.0     *       -               Invalid message
3.1     *       -               Invalid flow control
3.2     *       Node            Data base reused

  Routing layer
4.0     *       -               Aged packet loss
4.1     *       Circuit         Node unreachable packet loss
4.2     *       Circuit         Node out-of-range packet loss
4.3             Circuit         Oversized packet loss
4.4     *       Circuit         Packet format error
4.5     *       Circuit         Partial routing update loss
4.6     *       Circuit         Verification reject
4.7     *       Circuit         Circuit down, circuit fault
4.8     *       Circuit         Circuit down
4.9     *       Circuit         Circuit down, operator initiated
4.10    *       Circuit         Circuit up
4.11    *       Circuit         Initialization failure, line fault
4.12    *       Circuit         Initialization failure, software fault
4.13    *       Circuit         Initialization failure, operator fault
4.14    *       Node            Node reachability change
4.15    *       Circuit         Adjacency up
4.16    *       Circuit         Adjacency rejected
4.17            Area            Area reachability change
4.18    *       Circuit         Adjacency down
4.19    *       Circuit         Adjacency down, operator initiated

  Data link layer
5.0     *       Circuit         Locally initiated state change
5.1     *       Circuit         Remotely initiated state change
5.2             Circuit         Protocol restart received in maintenance mode
NETWORK MANAGEMENT EVENT LOGGER                               Page A-3
The DECNET event logger                                      24 Sep 85


5.3     *       Circuit         Send error threshold
5.4     *       Circuit         Receive error threshold
5.5     *       Circuit         Select error threshold
5.6     *       Circuit         Block header format error
5.7             Circuit         Selection address error
5.8             Circuit         Streaming tributary
5.9             Circuit         Local buffer too small
5.10            Module          Restart (X.25 protocol)
5.11            Module          State change (X.25 protocol)
5.12            Module          Retransmit maximum exceeded
5.13            Line            Initialization failure
5.14            Line            Send failed
5.15            Line            Receive failed
5.16            Line            Collision detect check failed
5.17            Module          DTE up (X.25)
5.18            Module          DTE down (X.25)

  Physical link layer
6.0             Line            Data set ready transition
6.1             Line            Ring indicator transition
6.2             Line            Unexpected carrier transition
6.3             Line            Memory access error
6.4             Line            Communications interface error
6.5             Line            Performance error



                                 NOTE

               All events are listed and  explained  in
               the DECnet-20 System Managers Guide.





A.2  The three logging sinks

An event can be reported (logged) in three different  ways.   We  call
each "a logging sink".  The three logging sinks are:

      o  LOGGING CONSOLE

      o  LOGGING FILE

      o  LOGGING MONITOR


The system manager controls the event logger with  network  management
through  NCP.   He/she  can  decide  what  sinks that are active, i.e.
turned on.  If so desired, a single event can be  logged  at  multiple
sinks.  The three sinks are addressed in NCP as:

        NCP> SET LOGGING CONSOLE  ...
NETWORK MANAGEMENT EVENT LOGGER                               Page A-4
The three logging sinks                                      24 Sep 85


        NCP> SET LOGGING FILE ...
        NCP> SET LOGGING MONITOR ...

or if the same operation is desired on all sinks

        NCP> SET KNOWN LOGGING ...


Whether a sink is enabled or not is determined by the STATE parameter.
Example:  to enable the logging console do

        NCP> SET LOGGING CONSOLE STATE ON

or to disable all logging sinks do

        NCP> SET KNOWN LOGGING STATE OFF




A.2.1  The LOGGING CONSOLE

The logging console is really  the  OPR  program.   If  this  sink  is
active,  then  the events are formatted and sent to all running OPR's.
A sample of the output can be seen at the top of this document.

Note that if the logging console is enabled, then ALL OPR's receive  a
copy  of  the  event  message.  If you wish to disable the output at a
certain terminal, you can

        OPR> DISABLE OUTPUT-DISPLAY (OF) DECNET-EVENT-MESSAGES


There is also a corresponding ENABLE command.



A.2.2  The LOGGING FILE

The  logging  file   is   always   the   system   error   file,   i.e.
SERR:ERROR.SYS.  If this sink is enabled, then a binary version of the
event message is put into the error file.

The  logged  events  can  then  be  retrieved  with  SPEAR.    Example
retrieving network errors:

509. 10:45:23  DECNET Event type 3.2  Data base reused
                    From node 7275. (RONCO)
                    occurred 4-APR-1985 10:41:47.877
516. 11:25:18  DECNET Event type 3.0  Invalid message
                    From node 7275. (RONCO)
                    occurred 4-APR-1985 10:53:46.549
517. 11:25:18  DECNET Event type 0.0  Event records lost
                    From node 7275. (RONCO)
NETWORK MANAGEMENT EVENT LOGGER                               Page A-5
The three logging sinks                                      24 Sep 85


                    occurred 4-APR-1985 11:03:53.738
535. 12:06:43  DECNET Event type 0.3  Automatic line service
                    From node 7275. (RONCO)
                    occurred 24-JAN-1985 17:06:26




A.2.3  The LOGGING MONITOR

The logging monitor provides a way to either send  events  to  a  user
program,  or  to  write  them  to  a file the user specifies.  In both
cases, the binary version of the event message is used.  The format of
the event message (the same for all DECnet implementations) is defined
in appendix A.

The destination of the logging monitor events is  set  with  the  NAME
parameter.  Example:

        NCP> SET LOGGING MONITOR NAME DCN:GIDNEY-TASK-LOGMON

to send the events to a user program using DECnet or

        NCP> SET LOGGING MONITOR NAME PS:<OPERATOR>LOGGING-MONITOR.BIN

to write the event messages to a file.



                                 NOTE

               You cannot redirect the console or  file
               by setting NAME.





A.3  Selecting what events to report

The system manager may choose what events  to  log  for  each  logging
sink.  Here are a few examples:

To log all events known to TOPS-20 to the logging file:

        NCP> SET LOGGING FILE KNOWN EVENTS

To log all routing layer events to the console:

        NCP> SET LOGGING CONSOLE EVENT 4.*

To log network management events 0,1,2,3,5,7,8,9 to all sinks:

        NCP> SET KNOWN LOGGING EVENT 0.0-3,5,7-9
NETWORK MANAGEMENT EVENT LOGGER                               Page A-6
Selecting what events to report                              24 Sep 85



The latter could also have been accomplished with the sequence:

        NCP> SET KNOWN LOGGING EVENT 0.0-9
        NCP> CLEAR KNOWN LOGGING EVENT 0.4,6


Note that you can only specify one event class in each event  command.
I.e.  the following command is illegal:

        NCP> SET LOGGING MONITOR EVENT 4.15 , 5.13


If an event is not enabled at any logging sink, it is  filtered  (i.e.
thrown away) by the event logger.



A.4  The SHOW LOGGING command

To inspect the current status of the logging sinks, you  can  use  the
SHOW LOGGING command.  Example:

To show all information stored for the logging console:
        NCP> SHOW LOGGING CONSOLE SUMMARY

and to do the same for all sinks:
        NCP> SHOW KNOWN LOGGING SUMMARY

Here is a sample output of the first command:

NCP>SHOW LOGGING CONSOLE SUMMARY
NCP>
11:26:53        NCP
                Request # 148; Show Logging Summary Completed
                
                Logging = Console
                
                  State = On
                
                  Sink Node = 7.142 (GIDNEY)
                  Events = (Source = any) 0.0-9 
                  Events = (Source = any) 3.0-2 
                  Events = (Source = any) 4.0-4 6-14 16-19 
                  Events = (Source = any) 5.0-31 
                  Events = (Source = any) 6.0-5 
NETWORK MANAGEMENT EVENT LOGGER                               Page A-7
Event logger and system startup                              24 Sep 85


A.5  Event logger and system startup

You now know all the basic commands of the  event  logger.   For  each
logging  sink,  you  can  SET  or  CLEAR  the  STATE,  NAME  and EVENT
parameters.  The event logger initializes itself  with  the  following
commands at startup:

        NCP> SET LOGGING FILE KNOWN EVENT
        NCP> SET LOGGING FILE STATE ON


That is, all events will be logged to the logging file.  If  you  wish
to  change  this  at  system  startup,  you  will  have to add LOGGING
commands to your network startup file.

No events will be logged unless both the STATE is ON, and  some  EVENT
is enabled for the sink.



A.6  Using the event logger

If you have a fairly small and stable network, you may wish to  enable
all events for logging to file and/or console.

If you have a large and dynamic network, you may find that you want to
filter  certain  events.   For  instance,  the  routing  layer, when a
level-1 router, will generate an "adjacency up" event  for  each  node
that  comes  online  on the Ethernet.  If you have many systems on the
Ethernet, and the Ethernet goes offline/online, you will get  a  large
number  of  "adjacency  up"  events that may hide the more interesting
4.7-10 events (Circuit down/up).

Along the same  lines,  you  may  wish  to  filter  event  4.14  (Node
reachability change) if you have a large and dynamic network.

If your system does have a NIA20, we recommend  that  you  enable  all
data  link  layer  events  (5.*).  When they occur, they are typically
caused by a NIA20 hardware anomaly.



A.7  Event records lost

Event messages may be temporarily stored both in the  monitor  and  in
the  NMLT20  program  before being reported.  If there are many events
occurring  at  the  same  time,  the  queues  may  overflow  and   the
consequence  will  be a "lost event".  The "lost event" (0.0) does not
contain any information about what event was lost since more than  one
may  have  been  discarded.  It only tells you that at least one event
was  thrown  away  becuase  of  buffering  problems.    If   you   are
troubleshooting a problem with the help of the event logger, it may be
important to know that some information was  lost  in  a  sequence  of
events.
NETWORK MANAGEMENT EVENT LOGGER                               Page A-8
Event records lost                                           24 Sep 85


If you experience many "lost events" you should examine  your  reports
to find out what event that may be happening frequently.



A.8  Implementation details

The event logger, in particular the logging  console,  is  fairly  CPU
intensive.  You can lower the overhead by filtering more events.

We would also like to draw your attention to an implementation detail.
Assume  that  you  want to disable all events for the logging monitor.
You could accomplish this in two different ways:

        NCP> SET LOGGING CONSOLE STATE OFF
or
        NCP> CLEAR LOGGING CONSOLE KNOWN EVENT


We recommend that you use  the  CLEAR  command.   It  will  lower  the
overhead  more  than  the SET STATE OFF command because of the way the
event logger is implemented.



A.9  MCB events

The MCB will also generate events, but since  it  does  not  have  any
logging sinks of its own, it will send its events to its KL host.  The
MCB does not have  any  event  database,  so  you  cannot  dynamically
disable  or  enable individual events.  However, since the events will
pass through the event filters  on  the  KL  host,  you  can  actually
control the MCB events in the KL instead.

The MCB does not have a clock, and can therefore not include the  time
of  day  in  the  event message.  It will include the uptime which may
help you in determining exactly when a MCB event was generated.

We would like to  point  to  a  potential  problem.   If  the  MCB  is
connected  to  a  VMS system, the VMS system may send routing messages
that are too large for the MCB to process.  The MCB  will  generate  a
4.5 ("Partial routing update loss") event and send it to the KL.  This
may happen very frequently and will cause overhead even if  you  throw
away the 4.5 events as they arrive to the KL.

If this happens, we suggest that you rebuild your MCB and  change  the
static  event  database.   If we assume that you want to disable event
4.5, issue the following command when running  NETGEN  generating  the
MCB:

        NETGEN> PURGE LOGGING FILE EVENT 4.5
        NETGEN> LIST LOGGING FILE EVENT
NETWORK MANAGEMENT EVENT LOGGER                               Page A-9
Logging to remote nodes                                      24 Sep 85


A.10  Logging to remote nodes

In addition to the logging sinks on your node, you can send events  to
other  remote  DECnet  nodes.   For instance, you may want to send all
events from all systems to one  single  node  that  collects  all  the
events in the network.  If we assume that you want to send all network
management events to the logging console on node RONCO:, here  is  the
command to do it:

        NCP> SET LOGGING CONSOLE EVENT 0.* SINK NODE RONCO::


and the result will be that all 0.* events will be sent to the console
on RONCO:  as well as to all other sinks that are enabled.

Here is a sample typeout where both a local logging monitor,  and  two
remote logging monitors are enabled:

NCP>SHOW LOGGING MONITOR SUMMARY KNOWN SINKS
NCP>
11:34:10        NCP
                Request # 156; Show Logging Summary Completed
                
                Logging = Monitor
                
                  State = On
                  Name = GIDNEY:<OPERATOR>LOGGING-MONITOR.BIN
                
                  Sink Node = 7.142 (GIDNEY)
                  Events = (Source = any) 0.0-9 
                  Events = (Source = any) 3.0-2 
                  Events = (Source = any) 4.0-19 
                  Events = (Source = any) 5.0-9 13-16 
                  Events = (Source = any) 6.0-5 
                
                  Sink Node = 7.107 (RONCO)
                  Events = (Source = any) 5.0-31 
                
                  Sink Node = 7.52 (LATOUR)
                  Events = (Source = any) 4.1 
                  Events = (Source = any) 5.0-31 


Note that you have to add 'KNOWN SINKS' to the SHOW command to see all
remote sinks.
NETWORK MANAGEMENT EVENT LOGGER                              Page A-10
Filtering on entity ID's                                     24 Sep 85


A.11  Filtering on entity ID's

Associated with most events is an entity type (see  table  in  section
1).   You  can  enable or disable events depending on what entity type
they are associated with.  For example, if you want to log  event  4.7
only on the Ethernet circuit, do:

        NCP> CLEAR LOGGING CONSOLE EVENT 4.7
        NCP> SET LOGGING CONSOLE EVENT 4.7 CIRCUIT NI-0-0


Event 4.7 (Circuit down) will be logged only if  it  is  the  Ethernet
circuit that went down.

Events that are sent to remote sinks may be qualified in the same way.
The  following  NCP  sequence  illustrates  all  flavors  of the event
logger:

NCP>SET LOGGING CONSOLE STATE ON
NCP>SET LOGGING CONSOLE EVENT 3.0,2
NCP>SET LOGGING CONSOLE EVENT 4.7-10 CIRCUIT NI-0-0
NCP>SET LOGGING CONSOLE EVENT 5.* SINK NODE RONCO::
NCP>SET LOGGING CONSOLE EVENT 4.14 NODE ETHER:: SINK NODE LATOUR::
NCP>SET LOGGING CONSOLE EVENT 4.14 NODE KL2102:: SINK NODE LATOUR::
NCP>SHOW LOGGING CONSOLE SUMMARY KNOWN SINKS
NCP>
11:44:09        NCP
                Request # 167; Show Logging Summary Completed
                
                Logging = Console
                
                  State = On
                
                  Sink Node = 7.142 (GIDNEY)
                  Events = (Source = any) 3.0 2 
                  Events = (Source Circuit = NI-0-0) 4.7-10 
                
                  Sink Node = 7.107 (RONCO)
                  Events = (Source = any) 5.0-31 
                
                  Sink Node = 7.52 (LATOUR)
                  Events = (Source Node = 7.124 (ETHER)) 4.14 
                  Events = (Source Node = 7.120 (KL2102)) 4.14 











                              APPENDIX B

                         EVENT MESSAGE FORMAT



The format of the event message is defined in  the  corporate  network
management specification.  Here is a copy of the definition:

   FUNCTION    SINK     EVENT    EVENT    SOURCE    EVENT     EVENT
     CODE      FLAGS    CODE     TIME      NODE     ENTITY    DATA

   where:

   FUNCTION CODE (1) : B = 1, meaning event log

   SINK FLAGS (1) :  BM  Are flags indicating which sinks are to  receive
                         a copy of this event, one bit per sink.  The bit
                         assignments are:

                         Bit      Sink

                          0     Console
                          1     File
                          2     Monitor

   EVENT CODE (2) : BM Identifies the specific event as follows:

                         Bits        Meaning

                         0-4     Event type
                         6-14    Event class

   EVENT TIME            Is the  source  node  date  and  time  of  event
                         processing.  Consists of:

                         JULIAN   SECOND   MILLISECOND
                         HALF DAY

                         where:

                         JULIAN HALF DAY (2) :  B = Number of  half  days
                                                    since  1 Jan 1977 and
                                                    before  9  Nov   2021
                                                    (0-32767).        For
                                                    example, the  morning
EVENT MESSAGE FORMAT                                          Page B-2
                                                             24 Sep 85


                                                    of Jan 1, 1977 is 0.

                         SECOND (2) :  B =          Second within current
                                                    half day (0-43199).

                         MILLISECOND (2) : B =      Millisecond    within
                                                    current        second
                                                    (0-999).    If    not
                                                    supported, high order
                                                    bit is  set,  remain-
                                                    der  are  clear,  and
                                                    field is not  printed
                                                    when   formatted  for
                                                    output.

   SOURCE NODE           Identifies the source node.  It consists of:

                         NODE     NODE
                         ADDRESS  NAME

                         where:

   NODE ADDRESS (2) :  B = Node address

   NODE NAME (I-6) :  A = Node name, 0 length, if none.

   EVENT ENTITY          Identifies the entity involved in the event, as
                         applicable.  Consists of:

                         ENTITY ENTITY
                          TYPE    ID

                         where:

                         ENTITY TYPE (2) :  B   Represents  the  type  of
                                                entity.    A   -1   value
                                                indicates no  entity.   A
                                                value  >= 0 is the entity
                                                type and is  followed  by
                                                the   entity  id  in  its
                                                usual format.

   EVENT DATA (*) :  B Is event specific data, zero or more data  entries
                       as  defined  for NICE data blocks, parameter types
                       according to event class.