DataMuseum.dk

Presents historical artifacts from the history of:

CR80 Wang WCS documentation floppies

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CR80 Wang WCS documentation floppies

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download

⟦bf4430f60⟧ Wang Wps File

    Length: 28950 (0x7116)
    Types: Wang Wps File
    Notes: Spelunked
    Names: »~ORPHAN69.08«

Derivation

└─⟦91ced00d4⟧ Bits:30006032 8" Wang WCS floppy, CR 0384A
    └─ ⟦this⟧ »~ORPHAN69.08« 

WangText

 …00……00……00……00…E…0a……00……00…E…0b…E…06…D…00…C…09…C
B…0d…B…07…A…0b…A
A…05…@…08…@…09…@…00…@…07…?…08…?…0e…?…06…>…0d…>…00…>…06…>…07…=…09…=…0b…=…0d…=…0f…=…02…<…08…<…09…<…0f…<…01…<
< <…05…<…06…<…07…;…08…;…0a…;…0b…;…0d…;…0e…;…0f…;…06…:…0c…: 9…0c…9…01……86…1         …02…   …02…   …02…   …02…                                           




LKSAA - VOLUME II                                      SYS/83-11-03
Part 1
TECHNICAL PROPOSAL                                     Page   






   2 COMPUTER SYSTEM ..................................
         

     2.1 HARDWARE ....................................
             
       2.1.1 Introduction .............................
                 
       2.1.2 X-NET, Local Area Network ................
                 
         2.1.2.1 General Description ..................
                     
         2.1.2.2 Basic Implementation ................
                     
         2.1.2.3 Extension Capabilities ...............
                     

       2.1.3 Central Communication System .............
                 
         2.1.3.1 General Description ..................
                     
           2.1.3.1.1 The Processor Units (PU) .........
                         
           2.13.1.2  The Channel Units (CU) ...........
                         
           2.1.3.1.3 Bus Structure ....................
                         
           2.1.3.1.4 Watchdog System ..................
                         

         2.1.3.2 LKSAA Processor and Channel Units   
                       
                 (Basic Implementation)  .............
                     
           2.1.3.2.1 Rack Layout ......................
                         

         2.1.3.3 Extension Capabilities ...............
             

       2.1.4 Equipment Matrix for the Computing      
                 
             System  ..................................
                 
       2.1.5 Sstem Capacity and Connectivity         
                
             of Computer System  ......................
                 
         2.1.5.1 Local Area Network  ..................
                     
         2.1.5.2 Central Communication System  ........
                     
           2.1.5.2.1 Process Capacity  ...............
                         
           2.1.5.2.2 Random Access Memory  ............
                         
           2.1.5.2.3 Peripheral Disk Memory  ..........
                         
           2.1.5.2.4 Terminal Equipment  ..............
                         
           2.1.5.2.5 Off-Line Cryptographic Equipment
                         
           2.1.5.2.6External Lines Via On-Line       
              
                     Cryptographic Equipment  .........
                         

     2.2 SOFTWARE .....................................
             
       2.2.1 System Software  .........................
                 
         2.2.1.1 Standard Operating System  ..........
                     
           2.2.1.1.1 Overview of DAMOS Operational
                     Software  ........................
                         
           2.2.1.1.2 Kernel  ..........................
                         
             2.2.1.1.2.1 Resource Management  .........
                             
             2.2.1.1.2.2 Process Managemnt  ..........
                             
             2.2.1.1.2.3 Process Hierarchy  ...........
                             
             2.2.1.1.2.4 Memory Management  ...........
                             
             2.2.1.1.2.5 Process Communication  .......
                             
             2.2.1.1.2.6 CPU Management  ..............
                             
             2.2.1..2.7  Processing Unit Management  ..
                             
             2.2.1.1.2.8 Transport Mechanisms  ........
                             
               2.2.1.1.2.8.1 Basic Transport Service 
                             .     


           2.2.1.1.3 DAMOS Input/Output  ..............
                         
           2.2.1.1.4 File and Message Management 
                     System  ..........................
                                                                                                    2.2.1.1.4.1 Device
                                                                                                                and
                                                                                                                Volume
                                                                                                                Handling
                                                                                                                
                                                                                                                ..
                                                                                                                
                                                                                                                
                                                                                                                
                                                                                                                
                                                                                                                
             2.2.1.1.4.2 Directories  .................
                             
             2.2.1.1.4.3 Files  .......................
                             
               2.2.1.1.4.3.1 File Types  ..............
                                 
               2.2.1.1.4.3.2 File Command  ...........
                                 

             2.2.1.1.4.4 User Handling  ...............
                             
             2.2.1.1.4.5 Disk Integrity  ..............
                             
               2.2.1.1.4.5.1 Security  ................
                                 
               2.2.1.1.4.5.2 Redundant Disks  .........
                                 
               2.2.1.14.5.3  Bad Sectors  .............
                                 

             2.2.1.1.4.6 Access Methods  ..............
                             
               2.2.1.1.4.6.1 Unstructured Access  .....
                                 
               2.2.1.1.4.6.2 Indexed Sequential Access
                                  

             2.2.1.1.4.7 Message Management System  ...
                            

           2.2.1.1.5 Terminal Management System  ......
                         
             2.2.1.1.5.1 Transfer of I/O Data  ........
                             
             2.2.1.1.5.2 User Handling  ...............
                             
             2.2.1.1.5.3 Security  ....................
                             
             2.2.1.1.5.4 Hardwar Categories  .........
                             
               2.2.1.1.5.4.1 Terminal Controllers  ....
                                 
               2.2.1.1.5.4.2 Lines  ...................
                                 
               2.2.1.1.5.4.3 Units  ...................
                                 

           2.2.1.1.6 System Initialization  ...........
                         
           .2.1.1.7  System Status and Control  .......
                         
             2.2.1.1.7.1 Main Functions  ..............
                             
               2.2.1.1.7.1.1 On-Line Diagnostics  .....
                                 
               2.2.1.1.7.1.2 Line Monitoring and
                             Control  .................
                                 
             2.2.1.1.7.1.3 Handling of Technical
                             Errorreports  ............
                                 
               2.2.1.1.7.1.4 Operator Commands to an
                             On-Line PU  ..............
                                 
               2.2.1.1.7.1.5 Off-Line PU Operation  ...
                                 

           2.2.1.1.8 ZVA Sstem Functions  ............
                         

         2.2.1.2 General Maintenance Software  ........
                     
           2.2.1.2.1 Highlevel Operating System (HIOS)
                          
           2.2.1.2.2 System Generation Software  ......
                         
           2.2.1.2.3 Diagnostic Programs  ............
                         
             2.2.1.2.3.1 Off-Line Diagnostic Programs
                               
             2.2.1.2.3.2 On-Line Diagnostic Programs 
                         .     


       2.2.2 General Development and Maintenance 
             Software .................................
                 
         2.2.2.1 Programming Languages ...............
                     
         2.2.2.2 Utility Software .....................
                     
         2.2.2.3 Binder ...............................
                     
         2.2.2.4 Test Tools ...........................
                     

       2.2.3 Highlevel Operating System (HIOS) ........
                 
       2.2.4 Securiy System  .........................
                 
         2.2.4.1 Access Control .......................
                     
         2.2.4.2 Eror Processing ......................
                     
           2.2.4.2.1&2 User Errors and System Errors ..
               
           2.2.4.2.3 Post-Mortem-Protocol ............
                         
           2.2.4.2.4 Restart ..........................
                         

         2.2.4.3 Checkpoint, Recovery and Restart .....
                     
           2.2.4.3.1 Integrity ........................
                         
           2.2.4.3.2 Central Recovery Functions .......
                         
           2.2.4.33  Checkpoints ......................
                         
           2.2.4.3.4 Recovery .........................
                         
             2.2.4.3.4.1 Failure Types ................
                             
             2.2.4.3.4.2 Recovery Actions .............
                             
             2.2.4.3.4.3 Recovery Level ..............
                             
             2.2.4.3.4.4 Applications Recovery
                         Actions ......................
                             

       2.2.5 Application Software .....................
                 
         2.2.5.1 Message Correction Programs ..........
                     
         2.2.5.2 Message Processing ..................
                     
           2.2.5.1 Message Processing Programs ........
                       
           2.2.5.2.2 Storage ..........................
                         
           2.2.5.2.3 Transformation and 
                     Transmission .....................
                         

         2.2.5.3 Network Management ..................
                     
           2.2.5.3.1 Configuration Management .........
                         
           2.2.5.3.2 Changes ..........................
                         

         2.2.5.4 Log ..................................
                     
         2.2.5.5 Statistics ...........................
                     

     2.2.6 Diagnostic Programs ......................
               
         2.2.6.1 Off-Line Diagnostic Program ..........
             
         2.2.6.2 On-Line Diagnostic Programs ..........
             


     2.3 AVAILABILITY REQUIREMENTS ....................
             
       2.3.1 General Considerations ...................
                 
       2.3.2 Recovery Procedures .....................
                 
       2.3.3 Fallback Procedures ......................
                 
       2.3.4 Recovery Times ...........................
                 
       2.3.5 Overall System Availability ..............
                 
       2.3.6 Mean-Time-Between-Failure (MTBF) .........
                
       2.3.7 Mean-Time-To-Repair (MTTR) ...............
                 

     2.4 INSTALLATION .................................
             
       2.4.1 FMZ Installations ........................
                 
       2.4.2 AE - Installations .......................
                 
       2.4.3 TypicalLayout ...........................
                 

     2.5 DOCUMENTATION ................................
             
       2.5.1 Documentation Requirement Analysis .......
                 
         2.5.1.1 General Requirements .................
                     
         2.5.1.2 Program Documentation Reuirements ...
                     
         2.5.1.3 Work Procedures Requirements .........
                     
         2.5.1.4 Operational Procedures Requirements 
                     

       2.5.2 Documentation Proposal ...................
                 

     2.6 METHODS AND TOOLS ............................
             
     2.6.1 System Design and Hardware Configuration .
               
       2.6.2 Software Design, Development
             and Integration ..........................
                 
         2.6.2.1 Development Method ...................
                     
           2.6.2.1.1 System Development
                     Baelines ........................
                         
           2.6.2.1.2 System Requirement Baseline ......
                         
           2.6.2.1.3 System Design Baseline ...........
                         
           2.6.2.1.4 Preliminary Design Baseline ......
                         
           2.6.2.1.5 Detailed Design Baseline ........
                         
           2.6.2.1.6 Implementation Baselines .........
                         
             2.6.2.1.6.1 Code and Unit Test
                         Baseline .....................
                             
             2.6.2.1.6.2 Subsystem Integration and
                         Test Baseline ................
                             

           2..2.1.7  System Verification Baseline .....
                         
           2.6.2.1.8 System Acceptance Baselines ......
                         
           2.6.2.1.9 Implementation Strategy ..........
                         

         2.6.2.2 Software Package Design ..............
                     
         2.6.2.3 Software Modularity .................
                     
         2.6.2.4 Structure of the PDS .................
                     

       2.6.3 Configuration Control ....................
                 
       2.6.4 Project Management .......................
                 


     2.7   SECURITY ...................................
               
       2.7.1 Security Assurance Via Hardware ..........
                 
         2.7.1.1 Principal Hardware Arhitecture ......
                     
         2.7.1.2 Memory Mapping .......................
                     
         2.7.1.3 CPU States ...........................
                     
           2.7.1.3.1 Instruction Execution ............
                         

         2.7.1.4 Monitor Instruction ..................
                     
       2.7.1.5 Interrupts ...........................
                   
           2.7.1.5.1 External Interrupts ..............
                         
           2.7.1.5.2 Internal Interrupts ..............
                         
           2.7.1.5.3 Interrupt Handling  ..............
                         

         2.7.1.6 Integrity Checks ....................
                     
           2.7.1.6.1 Passive Checks ...................
                         
           2.7.1.6.2 Active Checks ....................
                         

         2.7.1.7 Configuration Control ................
                     

       2.7.2 Security Assurance via Software ..........
                
         2.7.2.1 Summary ..............................
                     
         2.7.2.2 Terminal Security ....................
                     
           2.7.2.2.1 Objectives .......................
                         
           2.7.2.2.2 Man Machine Interface ............
                         
             2.7.2.2.2.1 Securty Attributes ..........
                 
             2.7.2.2.2.2 Initiation and Termination....
                 
             2.7.2.2.2.3 Security Attributes of 
                         Users and Terminals ..........
                             

           2.7.2.2.3 Authentication ...................
                         

           2.7.2.2.4 Sin On ..........................
                         

           2.7.2.2.5 Sign Off .........................
                         
             2.7.2.2.5.1 Sign Off Command .............
                 
             2.7.2.2.5.2 Automatic Sign Off ...........
                 
             2.7.2.2.5.3 Terminal Blocking ...........
                 
           2.7.2.2.6 Security Split ...................
                         
             2.7.2.2.6.1 Security Attributes Line .....
                 
             2.7.2.2.6.2 Security Command/Response.....
                 

           2.7.2.2.7 Change of Password .............
                        

           2.7.2.2.8 Relation t Security Model ..... 
                       

         2.7.2.3 Security Audit .......................
                     
           2.7.2.3.1 Objectives .......................
                         
           2.7.2.3.2 Auditing Events ..................
                         
           2.7.2.3.2.1 Terminal Activities ............
                           
           2.7.2.3.2.2 Communication Lines ..........
                           
             2.7.2.3.2.3 Local Devices ................
                             


           2.7.2.3.3 Protection of Auditing Data ......
                         

           2.7.2.3.4 Audit Trail Analysis .............
                         

         2.7.2.4 Security Administration..............
                     
           2.7.2.4.1 Security Data ....................
                         
             2.7.2.4.1.1 Security Tables...............
                             
           2.7.2.4.2 Protection of Security Data.......
                         
           2.7.2.4.3 Manipulation of Security Data.....
                         
           2.7.24.4  Security Transactions.............
                         

       2.7.3 Security Assurance of the 
             Integrated System ........................
                 
         2.7.3.1 Summary ..............................
                     
         2.7.3.2 Systems Architecture .................
                     
         2.7.3.2.1 Summary ..........................
                       
           2.7.3.2.2 DAMOS Operating System ...........
                         
             2.7.3.2.2.1 DAMOS Functions ..............
                             
               2.7.3.2.2.1.1 Kernel Functions .........
                                 
               2.7.3.2.2.1.2 General FileManagement
           …02…                System ...................
                               
               2.7.3.2.2.1.3 System Status and
                             Control...................
                                 

             2.7.3.2.2.2 Process Concept ..............
                             
             2.7.3.2.2.3 Object Concept ...............
                            
               2.7.3.2.2.3.1 Access to Objects ........
                   
               2.7.3.2.2.3.2 Object Types .............
                   
               2.7.3.2.2.3.3 Logical Object Level .....
                   

             2.7.3.2.2.4  Memory Protection ...........
                 
               2.7.3.2.2.4.1 Views ...................
                                 
               2.7.3.2.2.4.2 Process Layout ...........
                                 
               2.7.3.2.2.4.3 System Mode and System
                             and Levels................
                                 

           2.7.3.2.3 Trusted Computer Base Software....
                         
             2.7.3.2.3.1 Security Kenel ..............
                             
             2.7.3.2.3.2 Trusted System Processes .....
                             
             2.7.3.2.3.3 Trusted Utilities ............
                             
             2.7.3.2.3.4 Trusted Application
                          Processes ................ ..
                             

           2.7.3.2.4 Protection andEncapsulation 
                     of Trusted Computer Base .........
                         
             2.7.3.2.4.1 Protection of TCB against 
                       Nontrusted Software ............
                           
           2.7.3.3.2 Internal Separation of TCB 
                     Modules ..........................
                        


           2.7.3.2.5 Security Model ...................
                         
             2.7.3.2.5.1 Object .......................
                             
             2.7.3.2.5.2 Security Attributes .4̲2̲4̲8̲A̲…00…LKSAA
                         Part 1             …00…vhn      
                                   …00…FE                
                          …00…2 . 2.2             …00…0̲1̲…00…1̲1̲…00…8̲3̲…00…1̲6̲…00…0̲4̲…00…
                         ̲ ̲ ̲ ̲…00…2̲2̲…00… ̲ ̲2̲3̲8̲7̲…00…03…00…03…00…84…00…20…00…11…00…    …00…46…00… 
                          954…00…0̲3̲…00…0̲3̲…00…8̲4̲…00…2̲0̲…00…5̲7̲…00…05…00…03…00…84…00…13…00…11…00…0384A…00…114…00…
                         ̲ ̲ ̲4…00…21…00… 1788…00… ̲1̲3542…00…
…00….…00……01…p…00……00……00……01……10…E'…10……11… `*̲J̲…15……05……00……00……00……00……00……00……01…8
$…02……00……00……00……00……00…A…0a……00……00…A…0c…@…08…@…01…?…0a…?…05…=…07…<…00…< ;…0c…;…0e…;
;  :…0b…:…0e…:…05…:…06…9…0c…9  8…0b…8…02…7…08…7…09…7…0b…7…0d…7…0f…7…01…7 6…0a…6…0b…6…01…6
6…06…5…08…5…09…5…0a…5…0b…5…0c…5…0d…5…0f…5…00…5…02…5
5  5…05…4…0c…4…02…3…0a…3…02…3…07……86…1         …02…   …02…   …02…   …02…                         
                    



                                                     
  Issue 1.1
LKSAA - VOLUME II                                    
  SYS/84-03-01
Part 1
TECHNICAL PROPOSAL                                   
 Page   





   2 COMPUTER SYSTEM ..................................
      24 

     2.1 HARDWARE ....................................
          26 
       2.1.1 Introduction .............................
              26 
       2.1.2 X-Local Area Network (optional) ..........
              28a
         2.1.2.1 General Description  of X-Net ........
                  28a
         2.1.2.2 Basic Implementation of the ptional 
                 Local Area Network ...................
                  31 
         2.1.2.3 Extension Capabilities of the Option
                 for Local Area Network ...............
                  32 
         2.1.2.4 Utilization of another Local Area 
                 Network .............................
                  34 

       2.1.3 Central Communication System .............
              35 
         2.1.3.1 General Description ..................
                  35 
           2.1.3.1.1 The Processor Units (PU) .........
                      39 
           2.1.3.1.2 The Channel Units (CU) ...........
                      40 
           2.1.3.14̲2̲4̲8̲A̲…00…LKSAA Part 1             …00…vhn  
                         …00…FE                  …00…2 . 2.2 
                      …00…0̲1̲…00…1̲1̲…00…8̲3̲…00…1̲6̲…00…0̲4̲…00… ̲ ̲ ̲ ̲…00…2̲2̲…00… ̲ ̲2̲3̲8̲7̲…00…29…00…03…00…84…00…21…00…05…00…
              …00…02…00…    46…00…2̲9̲…00…0̲3̲…00…8̲4̲…00…2̲1̲…00…0̲7̲…00…29…00…03…00…84…00…21…00…08…00…0384A…00…114…00… ̲ ̲ ̲4̲…00…49…00…
           1748…00… ̲1̲5̲2̲86…00……1d……00……02…0 C…00……00……00……01……10…E'…10……11……02…`*̲J̲…15……05……00……00……00……00……00……00……01…8
)…02……00……00……00……00……00…A…02……00……00…A  @…00…?…09…?…02…>…0d…=…07…<…00…< ;…0c…;…0e…;
;  :…0b…:…0e…:…05…:…06…9…0c…9  8…0b…8…02…7…08…7…09…7…0b…7…0d…7…0f…7…01…7 6…0a…6…0b…6…01…6
6…06…5…08…5…09…5…0a…5…0b…5…0c…5…0d…5…0f…5…00…5…02…5
5  5…05…4…0c…4…02…3…0a…3…02…3…07……86…1         …02…   …02…   …02…   …02…                         
                    



                                                     
  Issue 1.3
LKSAA - VOLUME II                                    
  SYS/84-03-29
Part 1
TECHNICAL PROPOSAL                                   
 Page   





   2 COMPUTER SYSTEM ..................................
      24 

     2.1 HARDWARE ....................................
          26 
       2.1.1 Introduction .............................
              26 
       2.1.2 X-Local Area Network (optional) ..........
              28a
         2.1.2.1 General Description  of X-Net ........
                  28a
         2.1.2.2 Basic Implementation of the ptional 
                 Local Area Network ...................
                  31 
         2.1.2.3 Extension Capabilities of the Option
                 for Local Area Network ...............
                  32 
         2.1.2.4 Utilization of another Local Area 
                 Network .............................
                  34 

       2.1.3 Central Communication System .............
              35 
         2.1.3.1 General Description ..................
                  35 
           2.1.3.1.1 The Processor Units (PU) .........
                      39 
           2.1.3.1.2 The Channel Units (CU) ...........
                      40 
           2.1.3.13  Bus Structure ....................
                      42 
           2.1.3.1.4 Watchdog System ..................
                      45 

         2.1.3.2 LKSAA Processor and Channel Units   
                       
                 (Basic Implementation)  ..............
                  46 
           2.1.3.2.1 Rack Layout .....................
                      52 

         2.1.3.3 Extension Capabilities ...............
          54 

       2.1.4 Equipment Matrix for the Computing      
                 
             System  ..................................
              56 
       2.1.5 System Capacity and Connectivity        
                 
             of Compuer System  ......................
              58 
         2.1.5.1 Local Area Network (Option)  .........
                  58 
         2.1.5.2 Central Communication System  ........
                  58 
           2.1.5.2.1 Process Capacity  ................
                      58 
           2.1.5.2.2 Random Access Memory  ...........
                      61 
           2.1.5.2.3 Peripheral Disk Memory  ..........
                      63a
           2.1.5.2.4 Terminal Equipment  ..............
                      64a
           2.1.5.2.5 Off-Line Cryptographic Equipment
                        64a 
           2.1.5.2.6 External Lines Via On-Line      
                            
                     Crypographic Equipment  .........
                      64a
           2.1.5.2.7 High Speed Optical Data Link .....
                      65b 

     2.2 SOFTWARE .....................................
          66 
       2.2.1 System Software  .........................
              66 
         2.2.1.1 Standard Operating System  ..........
                  66 
           2.2.1.1.1 Overview of DAMOS Operational
                     Software  ........................
                      70 
           2.2.1.1.2 Kernel  ..........................
                      71 
             2.2.1.1.2.1 Resource Management  .........
                          73 
             2.2.1.1.2.2 Process Manaement  ..........
                          74 
             2.2.1.1.2.3 Process Hierarchy  ...........
                          77 
             2.2.1.1.2.4 Memory Management  ...........
                          79 
             2.2.1.1.2.5 Process Communication  .......
                          80 
             2.2.1.1.2.6 CPU Management  ..............
                          80 
             2.21.1.2.7  Processing Unit Management  ..
                          80 
             2.2.1.1.2.8 Transport Mechanisms  ........
                          81 
               2.2.1.1.2.8.1 Basic Transport Service 
                             .  81 …86…1   …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… 
                                                     
                                                     
                                            
           2.2.1.1.3 DAMOS Input/Output  ..............
                      82 
           2.2.1.1.4 File and Message Management 
                     System  ..........................
                      84                                                                            2.2.1.1.4.1 Device
                                                                                                                and
                                                                                                                Volume
                                                                                                                Handling
                                                                                                                
                                                                                                                ..
                                                                                                                
                                                                                                                84
                                                                                                                
             2.2.1.1.4.2 Directories  .................
                          85 
             2.2.1.1.4.3 Files  .......................
                          85 
               2.2.1.1.4.3.1 File Types  ..............
                              85 
               2.2.1.1.4.3.2 File Command  ...........
                              85 

             2.2.1.1.4.4 User Handling  ...............
                          86 
             2.2.1.1.4.5 Disk Integrity  ..............
                          86 
               2.2.1.1.4.5.1 Security  ................
                              86 
               2.2.1.1.4.5.2 Redundant Disks  .........
                              86 
               2.2.1.14.5.3  Bad Sectors  .............
                              87 

             2.2.1.1.4.6 Access Methods  ..............
                          87 
               2.2.1.1.4.6.1 Unstructured Access  .....
                              87 
               2.2.1.1.4.6.2 Indexed Sequential Access
                               88 

             2.2.1.1.4.7 Message Management System  ...
                         89 

           2.2.1.1.5 Terminal Management System  ......
                      89 
             2.2.1.1.5.1 Transfer of I/O Data  ........
                          90 
             2.2.1.1.5.2 User Handling  ...............
                          90 
             2.2.1.1.5.3 Security  ....................
                          90 
             2.2.1.1.5.4 Hardwar Categories  .........
                          91 
               2.2.1.1.5.4.1 Terminal Controllers  ....
                              91 
               2.2.1.1.5.4.2 Lines  ...................
                              92 
               2.2.1.1.5.4.3 Units  ...................
                              92 

           2.2.1.1.6 System Initialization  ...........
                      93 
           .2.1.1.7  System Status and Control  .......
                      93 
             2.2.1.1.7.1 Main Functions  ..............
                          94 
               2.2.1.1.7.1.1 On-Line Diagnostics  .....
                              95 
               2.2.1.1.7.1.2 Line Monitoring and
                             Control  .................
                              95 
             2.2.1.1.7.1.3 Handling of Technical
                             Errorreports  ............
                              98 
               2.2.1.1.7.1.4 Operator Commands to an
                             On-Line PU  ..............
                              98 
               2.2.1.1.7.1.5 Off-Line PU Operation  ...
                              99 

           2.2.1.1.8 ZVA Sstem Functions  ............
                     100 

         2.2.1.2 General Maintenance Software  ........
                 100 


       2.2.2 General Development and Maintenance 
             Software .................................
             101 
         2.2.2.1 Programming Languages ...............
                 101 
         2.2.2.2 Utility Software .....................
                 101 
         2.2.2.3 Binder ...............................
                 102 
         2.2.2.4 Test Tools ...........................
                 102 

       2.2.3 Highlevel Operating System (HIOS) ........
             103 
       2.2.4 Securiy System  .........................
             105 
         2.2.4.1 Access Control .......................
                 105 
         2.2.4.2 Eror Processing ......................
                 105 
           2.2.4.2.1&2 User Errors and System Errors ..
           105 
           2.2.4.2.3 Post-Mortem-Protocol ............
                     105 
           2.2.4.2.4 Restart ..........................
                     106 

         2.2.4.3 Checkpoint, Recovery and Restart .....
                 107 
           2.2.4.3.1 Integrity ........................
                     107 
           2.2.4.3.2 Central Recovery Functions .......
                     107 
           2.2.4.33  Checkpoints ......................
                     109 
           2.2.4.3.4 Recovery .........................
                     113 
             2.2.4.3.4.1 Failure Types ................
                         113 
             2.2.4.3.4.2 Recovery Actions .............
                         114 
             2.2.4.3.4.3 Recovery Level ..............
                         115 
             2.2.4.3.4.4 Applications Recovery
                         Actions ......................
                         116 

       2.2.5 Application Software .....................
             117 
         2.2.5.1 Message Correction Programs ..........
                 123 
         2.2.5.2 Message Processing ..................
                 123 
           2.2.5.1 Message Processing Programs ........
                   123 
           2.2.5.2.2 Storage ..........................
                     123 
           2.2.5.2.3 Transformation and 
                     Transmission .....................
                     123 

         2.2.5.3 Network Management ..................
                 124 
           2.2.5.3.1 Configuration Management .........
                     124 
           2.2.5.3.2 Changes ..........................
                     124 

         2.2.5.4 Log ..................................
                 124 
         2.2.5.5 Statistics ...........................
                 124 

     2.2.6 Diagnostic Programs ......................
           125 
         2.2.6.1 Off-Line Diagnostic Program ..........
         125 
         2.2.6.2 On-Line Diagnostic Programs ..........
         125 


     2.3 AVAILABILITY REQUIREMENTS ....................
         126 
       2.3.1 General Considerations ...................
             126 
       2.3.2 Recovery Procedures .....................
             128 
       2.3.3 Fallback Procedures ......................
             129 
       2.3.4 Recovery Times ...........................
             130 
       2.3.5 Overall System Availability ..............
             130 
       2.3.6 Mean-Time-Between-Failure (MTBF) .........
             13 
       2.3.7 Mean-Time-To-Repair (MTTR) ...............
             136 

     2.4 INSTALLATION .................................
         140 
       2.4.1 FMZ Installations ........................
             140 
       2.4.2 AE - Installations .......................
             141 
       2.4.3 TypicalLayout ...........................
             141 

     2.5 DOCUMENTATION ................................
         155 
       2.5.1 Documentation Requirement Analysis .......
             155 
         2.5.1.1 General Requirements .................
                 155 
         2.5.1.2 Program Documentation Reuirements ...
                 155 
         2.5.1.3 Work Procedures Requirements .........
                 156 
         2.5.1.4 Operational Procedures Requirements 
                   157 

       2.5.2 Documentation Proposal ...................
             157 

     2.6 METHODS AND TOOLS ............................
         159 
     2.6.1 System Design and Hardware Configuration .
           159 
       2.6.2 Software Design, Development
             and Integration ..........................
             159 
         2.6.2.1 Development Method ...................
                 159 
           2.6.2.1.1 System Development
                     4̲2̲4̲8̲A̲…00…LKSAA Part 1             …00…vhn
                                     …00…FE              
                        …00…2 . 2.2             …00…0̲1̲…00…1̲1̲…00…8̲3̲…00…1̲6̲…00…0̲4̲…00…
                     ̲ ̲ ̲ ̲…00…2̲2̲…00… ̲ ̲2̲3̲8̲7̲…00…30…00…04…00…84…00…13…00…02…00…    …00…01…00…    36…00…3̲0̲…00…0̲4̲…00…8̲4̲…00…1̲3̲…00…0̲3̲…00…02…00…05…00…84…00…09…00…12…00…0384A…00…
                     99…00… ̲ ̲1̲0̲…00…06…00… 1652…00… ̲3̲6̲2̲49…00……1e……00……01…@…07…t…00……00……00……01……10…E'…10……11…                                                     `*̲J̲…15……05……00……00……00……00……00……00……01…8
q̲…01…$…00……00……00……00…>…0a……00……00…>…0c…=…07…<…0a…<
;…0c…;…07…:…01…9…0a…9…0e…9…06…8…08…8…0d…8…0e…8…05…7…08…7…0f…7…00…7…06…6…0f…6…06…5…0d…5
5  5…06…4…08…4…0a…4…0c…4…0f…3…08…3…02…2…08…2…09…2…0f…2…01…2  2…06…2…07…1…08…1…09…1…0a…1…0b…1…86…1         …02…   …02…   …02…   …02…          
                                                 



                                                     
  Issue 1.4
LKSAA - VOLUME II                                    
  SYS/84-04-24
Part 1
TECHNICAL PROPOSAL                                   
 Page   





   2 COMPUTER SYSTEM ..................................
      24 

     2.1 HARDWARE ....................................
          26 
       2.1.1 Introduction .............................
              26 
       2.1.2 X-Local Area Network (optional) ..........
              28a
         2.1.2.1 General Description  of X-Net ........
                  28a
         2.1.2.2 Basic Implementation of the ptional 
                 Local Area Network ...................
                  31 
         2.1.2.3 Extension Capabilities of the Option
                 for Local Area Network ...............
                  32 
         2.1.2.4 Utilization of another Local Area 
                 Network .............................
                  34 

       2.1.3 Central Communication System .............
              35 
         2.1.3.1 General Description ..................
                  35 
           2.1.3.1.1 The Processor Units (PU) .........
                      39 
           2.1.3.1.2 The Channel Units (CU) ...........
                      40 
           2.1.3.13  Bus Structure ....................
                      42 
           2.1.3.1.4 Watchdog System ..................
                      45 

         2.1.3.2 LKSAA Processor and Channel Units
                 (Basic Implementation)  ..............
                  46 
           2.1.3.2.1 Rack Layout ......................
                      5 

         2.1.3.3 Extension Capabilities ...............
          54 
         2.1.3.4 Dualization of External Communication
                 Lines ................................
                  54 

       2.1.4 Equipment Matrix for the Computing    
             System  .................................
              56 
       2.1.5 System Capacity and Connectivity        
                 
             of Computer System  ......................
              58 
         2.1.5.1 Local Area Network (Option)  .........
                  58 
         2.1.5.2 Central Communication System  ........
                  58 
           2.1.5.21  Process Capacity  ................
                      58 
           2.1.5.2.2 Random Access Memory  ............
                      61 
           2.1.5.2.3 Peripheral Disk Memory  ..........
                      63a
           2.1.5.2.4 Terminal Equipment  ..............
                      64a
           2.1.5.2.5 Off-Line Cryptographic Equpment 
                       64a 
           2.1.5.2.6 External Lines Via On-Line
                     Cryptographic Equipment  .........
                      64a
           2.1.5.2.7 External Lines Bypassing the 
                     On-Line Cryptographic equipment ..
                              65c
           2.1.5.2.8 Public Telephone Net ............
                      65d
           2.1.5.2.9 High Speed Optical Data Link .....
                      65e

     2.2 SOFTWARE .....................................
          66 
       2.2.1 System Software  .........................
              66 
         2.2.1.1 Standard Operating System  ...........
                  66 
           2.2.1.1.1Overview of DAMOS Operational
                     Software  ........................
                      70 …86…1   …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02…           
                                                     
                                           

           2.2.1.1.2 Kernel  ..........................
                      71 
             2.2.1.1.2.1 Resource Management  .........
                          73 
             2.2.1.1.2.2 Process Management