top - download
⟦bf4430f60⟧ Wang Wps File
Length: 28950 (0x7116)
Types: Wang Wps File
Notes: Spelunked
Names: »~ORPHAN69.08«
Derivation
└─⟦91ced00d4⟧ Bits:30006032 8" Wang WCS floppy, CR 0384A
└─ ⟦this⟧ »~ORPHAN69.08«
WangText
…00……00……00……00…E…0a……00……00…E…0b…E…06…D…00…C…09…C
B…0d…B…07…A…0b…A
A…05…@…08…@…09…@…00…@…07…?…08…?…0e…?…06…>…0d…>…00…>…06…>…07…=…09…=…0b…=…0d…=…0f…=…02…<…08…<…09…<…0f…<…01…<
< <…05…<…06…<…07…;…08…;…0a…;…0b…;…0d…;…0e…;…0f…;…06…:…0c…: 9…0c…9…01……86…1 …02… …02… …02… …02…
LKSAA - VOLUME II SYS/83-11-03
Part 1
TECHNICAL PROPOSAL Page
2 COMPUTER SYSTEM ..................................
2.1 HARDWARE ....................................
2.1.1 Introduction .............................
2.1.2 X-NET, Local Area Network ................
2.1.2.1 General Description ..................
2.1.2.2 Basic Implementation ................
2.1.2.3 Extension Capabilities ...............
2.1.3 Central Communication System .............
2.1.3.1 General Description ..................
2.1.3.1.1 The Processor Units (PU) .........
2.13.1.2 The Channel Units (CU) ...........
2.1.3.1.3 Bus Structure ....................
2.1.3.1.4 Watchdog System ..................
2.1.3.2 LKSAA Processor and Channel Units
(Basic Implementation) .............
2.1.3.2.1 Rack Layout ......................
2.1.3.3 Extension Capabilities ...............
2.1.4 Equipment Matrix for the Computing
System ..................................
2.1.5 Sstem Capacity and Connectivity
of Computer System ......................
2.1.5.1 Local Area Network ..................
2.1.5.2 Central Communication System ........
2.1.5.2.1 Process Capacity ...............
2.1.5.2.2 Random Access Memory ............
2.1.5.2.3 Peripheral Disk Memory ..........
2.1.5.2.4 Terminal Equipment ..............
2.1.5.2.5 Off-Line Cryptographic Equipment
2.1.5.2.6External Lines Via On-Line
Cryptographic Equipment .........
2.2 SOFTWARE .....................................
2.2.1 System Software .........................
2.2.1.1 Standard Operating System ..........
2.2.1.1.1 Overview of DAMOS Operational
Software ........................
2.2.1.1.2 Kernel ..........................
2.2.1.1.2.1 Resource Management .........
2.2.1.1.2.2 Process Managemnt ..........
2.2.1.1.2.3 Process Hierarchy ...........
2.2.1.1.2.4 Memory Management ...........
2.2.1.1.2.5 Process Communication .......
2.2.1.1.2.6 CPU Management ..............
2.2.1..2.7 Processing Unit Management ..
2.2.1.1.2.8 Transport Mechanisms ........
2.2.1.1.2.8.1 Basic Transport Service
.
2.2.1.1.3 DAMOS Input/Output ..............
2.2.1.1.4 File and Message Management
System ..........................
2.2.1.1.4.1 Device
and
Volume
Handling
..
2.2.1.1.4.2 Directories .................
2.2.1.1.4.3 Files .......................
2.2.1.1.4.3.1 File Types ..............
2.2.1.1.4.3.2 File Command ...........
2.2.1.1.4.4 User Handling ...............
2.2.1.1.4.5 Disk Integrity ..............
2.2.1.1.4.5.1 Security ................
2.2.1.1.4.5.2 Redundant Disks .........
2.2.1.14.5.3 Bad Sectors .............
2.2.1.1.4.6 Access Methods ..............
2.2.1.1.4.6.1 Unstructured Access .....
2.2.1.1.4.6.2 Indexed Sequential Access
2.2.1.1.4.7 Message Management System ...
2.2.1.1.5 Terminal Management System ......
2.2.1.1.5.1 Transfer of I/O Data ........
2.2.1.1.5.2 User Handling ...............
2.2.1.1.5.3 Security ....................
2.2.1.1.5.4 Hardwar Categories .........
2.2.1.1.5.4.1 Terminal Controllers ....
2.2.1.1.5.4.2 Lines ...................
2.2.1.1.5.4.3 Units ...................
2.2.1.1.6 System Initialization ...........
.2.1.1.7 System Status and Control .......
2.2.1.1.7.1 Main Functions ..............
2.2.1.1.7.1.1 On-Line Diagnostics .....
2.2.1.1.7.1.2 Line Monitoring and
Control .................
2.2.1.1.7.1.3 Handling of Technical
Errorreports ............
2.2.1.1.7.1.4 Operator Commands to an
On-Line PU ..............
2.2.1.1.7.1.5 Off-Line PU Operation ...
2.2.1.1.8 ZVA Sstem Functions ............
2.2.1.2 General Maintenance Software ........
2.2.1.2.1 Highlevel Operating System (HIOS)
2.2.1.2.2 System Generation Software ......
2.2.1.2.3 Diagnostic Programs ............
2.2.1.2.3.1 Off-Line Diagnostic Programs
2.2.1.2.3.2 On-Line Diagnostic Programs
.
2.2.2 General Development and Maintenance
Software .................................
2.2.2.1 Programming Languages ...............
2.2.2.2 Utility Software .....................
2.2.2.3 Binder ...............................
2.2.2.4 Test Tools ...........................
2.2.3 Highlevel Operating System (HIOS) ........
2.2.4 Securiy System .........................
2.2.4.1 Access Control .......................
2.2.4.2 Eror Processing ......................
2.2.4.2.1&2 User Errors and System Errors ..
2.2.4.2.3 Post-Mortem-Protocol ............
2.2.4.2.4 Restart ..........................
2.2.4.3 Checkpoint, Recovery and Restart .....
2.2.4.3.1 Integrity ........................
2.2.4.3.2 Central Recovery Functions .......
2.2.4.33 Checkpoints ......................
2.2.4.3.4 Recovery .........................
2.2.4.3.4.1 Failure Types ................
2.2.4.3.4.2 Recovery Actions .............
2.2.4.3.4.3 Recovery Level ..............
2.2.4.3.4.4 Applications Recovery
Actions ......................
2.2.5 Application Software .....................
2.2.5.1 Message Correction Programs ..........
2.2.5.2 Message Processing ..................
2.2.5.1 Message Processing Programs ........
2.2.5.2.2 Storage ..........................
2.2.5.2.3 Transformation and
Transmission .....................
2.2.5.3 Network Management ..................
2.2.5.3.1 Configuration Management .........
2.2.5.3.2 Changes ..........................
2.2.5.4 Log ..................................
2.2.5.5 Statistics ...........................
2.2.6 Diagnostic Programs ......................
2.2.6.1 Off-Line Diagnostic Program ..........
2.2.6.2 On-Line Diagnostic Programs ..........
2.3 AVAILABILITY REQUIREMENTS ....................
2.3.1 General Considerations ...................
2.3.2 Recovery Procedures .....................
2.3.3 Fallback Procedures ......................
2.3.4 Recovery Times ...........................
2.3.5 Overall System Availability ..............
2.3.6 Mean-Time-Between-Failure (MTBF) .........
2.3.7 Mean-Time-To-Repair (MTTR) ...............
2.4 INSTALLATION .................................
2.4.1 FMZ Installations ........................
2.4.2 AE - Installations .......................
2.4.3 TypicalLayout ...........................
2.5 DOCUMENTATION ................................
2.5.1 Documentation Requirement Analysis .......
2.5.1.1 General Requirements .................
2.5.1.2 Program Documentation Reuirements ...
2.5.1.3 Work Procedures Requirements .........
2.5.1.4 Operational Procedures Requirements
2.5.2 Documentation Proposal ...................
2.6 METHODS AND TOOLS ............................
2.6.1 System Design and Hardware Configuration .
2.6.2 Software Design, Development
and Integration ..........................
2.6.2.1 Development Method ...................
2.6.2.1.1 System Development
Baelines ........................
2.6.2.1.2 System Requirement Baseline ......
2.6.2.1.3 System Design Baseline ...........
2.6.2.1.4 Preliminary Design Baseline ......
2.6.2.1.5 Detailed Design Baseline ........
2.6.2.1.6 Implementation Baselines .........
2.6.2.1.6.1 Code and Unit Test
Baseline .....................
2.6.2.1.6.2 Subsystem Integration and
Test Baseline ................
2..2.1.7 System Verification Baseline .....
2.6.2.1.8 System Acceptance Baselines ......
2.6.2.1.9 Implementation Strategy ..........
2.6.2.2 Software Package Design ..............
2.6.2.3 Software Modularity .................
2.6.2.4 Structure of the PDS .................
2.6.3 Configuration Control ....................
2.6.4 Project Management .......................
2.7 SECURITY ...................................
2.7.1 Security Assurance Via Hardware ..........
2.7.1.1 Principal Hardware Arhitecture ......
2.7.1.2 Memory Mapping .......................
2.7.1.3 CPU States ...........................
2.7.1.3.1 Instruction Execution ............
2.7.1.4 Monitor Instruction ..................
2.7.1.5 Interrupts ...........................
2.7.1.5.1 External Interrupts ..............
2.7.1.5.2 Internal Interrupts ..............
2.7.1.5.3 Interrupt Handling ..............
2.7.1.6 Integrity Checks ....................
2.7.1.6.1 Passive Checks ...................
2.7.1.6.2 Active Checks ....................
2.7.1.7 Configuration Control ................
2.7.2 Security Assurance via Software ..........
2.7.2.1 Summary ..............................
2.7.2.2 Terminal Security ....................
2.7.2.2.1 Objectives .......................
2.7.2.2.2 Man Machine Interface ............
2.7.2.2.2.1 Securty Attributes ..........
2.7.2.2.2.2 Initiation and Termination....
2.7.2.2.2.3 Security Attributes of
Users and Terminals ..........
2.7.2.2.3 Authentication ...................
2.7.2.2.4 Sin On ..........................
2.7.2.2.5 Sign Off .........................
2.7.2.2.5.1 Sign Off Command .............
2.7.2.2.5.2 Automatic Sign Off ...........
2.7.2.2.5.3 Terminal Blocking ...........
2.7.2.2.6 Security Split ...................
2.7.2.2.6.1 Security Attributes Line .....
2.7.2.2.6.2 Security Command/Response.....
2.7.2.2.7 Change of Password .............
2.7.2.2.8 Relation t Security Model .....
2.7.2.3 Security Audit .......................
2.7.2.3.1 Objectives .......................
2.7.2.3.2 Auditing Events ..................
2.7.2.3.2.1 Terminal Activities ............
2.7.2.3.2.2 Communication Lines ..........
2.7.2.3.2.3 Local Devices ................
2.7.2.3.3 Protection of Auditing Data ......
2.7.2.3.4 Audit Trail Analysis .............
2.7.2.4 Security Administration..............
2.7.2.4.1 Security Data ....................
2.7.2.4.1.1 Security Tables...............
2.7.2.4.2 Protection of Security Data.......
2.7.2.4.3 Manipulation of Security Data.....
2.7.24.4 Security Transactions.............
2.7.3 Security Assurance of the
Integrated System ........................
2.7.3.1 Summary ..............................
2.7.3.2 Systems Architecture .................
2.7.3.2.1 Summary ..........................
2.7.3.2.2 DAMOS Operating System ...........
2.7.3.2.2.1 DAMOS Functions ..............
2.7.3.2.2.1.1 Kernel Functions .........
2.7.3.2.2.1.2 General FileManagement
…02… System ...................
2.7.3.2.2.1.3 System Status and
Control...................
2.7.3.2.2.2 Process Concept ..............
2.7.3.2.2.3 Object Concept ...............
2.7.3.2.2.3.1 Access to Objects ........
2.7.3.2.2.3.2 Object Types .............
2.7.3.2.2.3.3 Logical Object Level .....
2.7.3.2.2.4 Memory Protection ...........
2.7.3.2.2.4.1 Views ...................
2.7.3.2.2.4.2 Process Layout ...........
2.7.3.2.2.4.3 System Mode and System
and Levels................
2.7.3.2.3 Trusted Computer Base Software....
2.7.3.2.3.1 Security Kenel ..............
2.7.3.2.3.2 Trusted System Processes .....
2.7.3.2.3.3 Trusted Utilities ............
2.7.3.2.3.4 Trusted Application
Processes ................ ..
2.7.3.2.4 Protection andEncapsulation
of Trusted Computer Base .........
2.7.3.2.4.1 Protection of TCB against
Nontrusted Software ............
2.7.3.3.2 Internal Separation of TCB
Modules ..........................
2.7.3.2.5 Security Model ...................
2.7.3.2.5.1 Object .......................
2.7.3.2.5.2 Security Attributes .4̲2̲4̲8̲A̲…00…LKSAA
Part 1 …00…vhn
…00…FE
…00…2 . 2.2 …00…0̲1̲…00…1̲1̲…00…8̲3̲…00…1̲6̲…00…0̲4̲…00…
̲ ̲ ̲ ̲…00…2̲2̲…00… ̲ ̲2̲3̲8̲7̲…00…03…00…03…00…84…00…20…00…11…00… …00…46…00…
954…00…0̲3̲…00…0̲3̲…00…8̲4̲…00…2̲0̲…00…5̲7̲…00…05…00…03…00…84…00…13…00…11…00…0384A…00…114…00…
̲ ̲ ̲4…00…21…00… 1788…00… ̲1̲3542…00…
…00….…00……01…p…00……00……00……01……10…E'…10……11… `*̲J̲…15……05……00……00……00……00……00……00……01…8
$…02……00……00……00……00……00…A…0a……00……00…A…0c…@…08…@…01…?…0a…?…05…=…07…<…00…< ;…0c…;…0e…;
; :…0b…:…0e…:…05…:…06…9…0c…9 8…0b…8…02…7…08…7…09…7…0b…7…0d…7…0f…7…01…7 6…0a…6…0b…6…01…6
6…06…5…08…5…09…5…0a…5…0b…5…0c…5…0d…5…0f…5…00…5…02…5
5 5…05…4…0c…4…02…3…0a…3…02…3…07……86…1 …02… …02… …02… …02…
Issue 1.1
LKSAA - VOLUME II
SYS/84-03-01
Part 1
TECHNICAL PROPOSAL
Page
2 COMPUTER SYSTEM ..................................
24
2.1 HARDWARE ....................................
26
2.1.1 Introduction .............................
26
2.1.2 X-Local Area Network (optional) ..........
28a
2.1.2.1 General Description of X-Net ........
28a
2.1.2.2 Basic Implementation of the ptional
Local Area Network ...................
31
2.1.2.3 Extension Capabilities of the Option
for Local Area Network ...............
32
2.1.2.4 Utilization of another Local Area
Network .............................
34
2.1.3 Central Communication System .............
35
2.1.3.1 General Description ..................
35
2.1.3.1.1 The Processor Units (PU) .........
39
2.1.3.1.2 The Channel Units (CU) ...........
40
2.1.3.14̲2̲4̲8̲A̲…00…LKSAA Part 1 …00…vhn
…00…FE …00…2 . 2.2
…00…0̲1̲…00…1̲1̲…00…8̲3̲…00…1̲6̲…00…0̲4̲…00… ̲ ̲ ̲ ̲…00…2̲2̲…00… ̲ ̲2̲3̲8̲7̲…00…29…00…03…00…84…00…21…00…05…00…
…00…02…00… 46…00…2̲9̲…00…0̲3̲…00…8̲4̲…00…2̲1̲…00…0̲7̲…00…29…00…03…00…84…00…21…00…08…00…0384A…00…114…00… ̲ ̲ ̲4̲…00…49…00…
1748…00… ̲1̲5̲2̲86…00……1d……00……02…0 C…00……00……00……01……10…E'…10……11……02…`*̲J̲…15……05……00……00……00……00……00……00……01…8
)…02……00……00……00……00……00…A…02……00……00…A @…00…?…09…?…02…>…0d…=…07…<…00…< ;…0c…;…0e…;
; :…0b…:…0e…:…05…:…06…9…0c…9 8…0b…8…02…7…08…7…09…7…0b…7…0d…7…0f…7…01…7 6…0a…6…0b…6…01…6
6…06…5…08…5…09…5…0a…5…0b…5…0c…5…0d…5…0f…5…00…5…02…5
5 5…05…4…0c…4…02…3…0a…3…02…3…07……86…1 …02… …02… …02… …02…
Issue 1.3
LKSAA - VOLUME II
SYS/84-03-29
Part 1
TECHNICAL PROPOSAL
Page
2 COMPUTER SYSTEM ..................................
24
2.1 HARDWARE ....................................
26
2.1.1 Introduction .............................
26
2.1.2 X-Local Area Network (optional) ..........
28a
2.1.2.1 General Description of X-Net ........
28a
2.1.2.2 Basic Implementation of the ptional
Local Area Network ...................
31
2.1.2.3 Extension Capabilities of the Option
for Local Area Network ...............
32
2.1.2.4 Utilization of another Local Area
Network .............................
34
2.1.3 Central Communication System .............
35
2.1.3.1 General Description ..................
35
2.1.3.1.1 The Processor Units (PU) .........
39
2.1.3.1.2 The Channel Units (CU) ...........
40
2.1.3.13 Bus Structure ....................
42
2.1.3.1.4 Watchdog System ..................
45
2.1.3.2 LKSAA Processor and Channel Units
(Basic Implementation) ..............
46
2.1.3.2.1 Rack Layout .....................
52
2.1.3.3 Extension Capabilities ...............
54
2.1.4 Equipment Matrix for the Computing
System ..................................
56
2.1.5 System Capacity and Connectivity
of Compuer System ......................
58
2.1.5.1 Local Area Network (Option) .........
58
2.1.5.2 Central Communication System ........
58
2.1.5.2.1 Process Capacity ................
58
2.1.5.2.2 Random Access Memory ...........
61
2.1.5.2.3 Peripheral Disk Memory ..........
63a
2.1.5.2.4 Terminal Equipment ..............
64a
2.1.5.2.5 Off-Line Cryptographic Equipment
64a
2.1.5.2.6 External Lines Via On-Line
Crypographic Equipment .........
64a
2.1.5.2.7 High Speed Optical Data Link .....
65b
2.2 SOFTWARE .....................................
66
2.2.1 System Software .........................
66
2.2.1.1 Standard Operating System ..........
66
2.2.1.1.1 Overview of DAMOS Operational
Software ........................
70
2.2.1.1.2 Kernel ..........................
71
2.2.1.1.2.1 Resource Management .........
73
2.2.1.1.2.2 Process Manaement ..........
74
2.2.1.1.2.3 Process Hierarchy ...........
77
2.2.1.1.2.4 Memory Management ...........
79
2.2.1.1.2.5 Process Communication .......
80
2.2.1.1.2.6 CPU Management ..............
80
2.21.1.2.7 Processing Unit Management ..
80
2.2.1.1.2.8 Transport Mechanisms ........
81
2.2.1.1.2.8.1 Basic Transport Service
. 81 …86…1 …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02…
2.2.1.1.3 DAMOS Input/Output ..............
82
2.2.1.1.4 File and Message Management
System ..........................
84 2.2.1.1.4.1 Device
and
Volume
Handling
..
84
2.2.1.1.4.2 Directories .................
85
2.2.1.1.4.3 Files .......................
85
2.2.1.1.4.3.1 File Types ..............
85
2.2.1.1.4.3.2 File Command ...........
85
2.2.1.1.4.4 User Handling ...............
86
2.2.1.1.4.5 Disk Integrity ..............
86
2.2.1.1.4.5.1 Security ................
86
2.2.1.1.4.5.2 Redundant Disks .........
86
2.2.1.14.5.3 Bad Sectors .............
87
2.2.1.1.4.6 Access Methods ..............
87
2.2.1.1.4.6.1 Unstructured Access .....
87
2.2.1.1.4.6.2 Indexed Sequential Access
88
2.2.1.1.4.7 Message Management System ...
89
2.2.1.1.5 Terminal Management System ......
89
2.2.1.1.5.1 Transfer of I/O Data ........
90
2.2.1.1.5.2 User Handling ...............
90
2.2.1.1.5.3 Security ....................
90
2.2.1.1.5.4 Hardwar Categories .........
91
2.2.1.1.5.4.1 Terminal Controllers ....
91
2.2.1.1.5.4.2 Lines ...................
92
2.2.1.1.5.4.3 Units ...................
92
2.2.1.1.6 System Initialization ...........
93
.2.1.1.7 System Status and Control .......
93
2.2.1.1.7.1 Main Functions ..............
94
2.2.1.1.7.1.1 On-Line Diagnostics .....
95
2.2.1.1.7.1.2 Line Monitoring and
Control .................
95
2.2.1.1.7.1.3 Handling of Technical
Errorreports ............
98
2.2.1.1.7.1.4 Operator Commands to an
On-Line PU ..............
98
2.2.1.1.7.1.5 Off-Line PU Operation ...
99
2.2.1.1.8 ZVA Sstem Functions ............
100
2.2.1.2 General Maintenance Software ........
100
2.2.2 General Development and Maintenance
Software .................................
101
2.2.2.1 Programming Languages ...............
101
2.2.2.2 Utility Software .....................
101
2.2.2.3 Binder ...............................
102
2.2.2.4 Test Tools ...........................
102
2.2.3 Highlevel Operating System (HIOS) ........
103
2.2.4 Securiy System .........................
105
2.2.4.1 Access Control .......................
105
2.2.4.2 Eror Processing ......................
105
2.2.4.2.1&2 User Errors and System Errors ..
105
2.2.4.2.3 Post-Mortem-Protocol ............
105
2.2.4.2.4 Restart ..........................
106
2.2.4.3 Checkpoint, Recovery and Restart .....
107
2.2.4.3.1 Integrity ........................
107
2.2.4.3.2 Central Recovery Functions .......
107
2.2.4.33 Checkpoints ......................
109
2.2.4.3.4 Recovery .........................
113
2.2.4.3.4.1 Failure Types ................
113
2.2.4.3.4.2 Recovery Actions .............
114
2.2.4.3.4.3 Recovery Level ..............
115
2.2.4.3.4.4 Applications Recovery
Actions ......................
116
2.2.5 Application Software .....................
117
2.2.5.1 Message Correction Programs ..........
123
2.2.5.2 Message Processing ..................
123
2.2.5.1 Message Processing Programs ........
123
2.2.5.2.2 Storage ..........................
123
2.2.5.2.3 Transformation and
Transmission .....................
123
2.2.5.3 Network Management ..................
124
2.2.5.3.1 Configuration Management .........
124
2.2.5.3.2 Changes ..........................
124
2.2.5.4 Log ..................................
124
2.2.5.5 Statistics ...........................
124
2.2.6 Diagnostic Programs ......................
125
2.2.6.1 Off-Line Diagnostic Program ..........
125
2.2.6.2 On-Line Diagnostic Programs ..........
125
2.3 AVAILABILITY REQUIREMENTS ....................
126
2.3.1 General Considerations ...................
126
2.3.2 Recovery Procedures .....................
128
2.3.3 Fallback Procedures ......................
129
2.3.4 Recovery Times ...........................
130
2.3.5 Overall System Availability ..............
130
2.3.6 Mean-Time-Between-Failure (MTBF) .........
13
2.3.7 Mean-Time-To-Repair (MTTR) ...............
136
2.4 INSTALLATION .................................
140
2.4.1 FMZ Installations ........................
140
2.4.2 AE - Installations .......................
141
2.4.3 TypicalLayout ...........................
141
2.5 DOCUMENTATION ................................
155
2.5.1 Documentation Requirement Analysis .......
155
2.5.1.1 General Requirements .................
155
2.5.1.2 Program Documentation Reuirements ...
155
2.5.1.3 Work Procedures Requirements .........
156
2.5.1.4 Operational Procedures Requirements
157
2.5.2 Documentation Proposal ...................
157
2.6 METHODS AND TOOLS ............................
159
2.6.1 System Design and Hardware Configuration .
159
2.6.2 Software Design, Development
and Integration ..........................
159
2.6.2.1 Development Method ...................
159
2.6.2.1.1 System Development
4̲2̲4̲8̲A̲…00…LKSAA Part 1 …00…vhn
…00…FE
…00…2 . 2.2 …00…0̲1̲…00…1̲1̲…00…8̲3̲…00…1̲6̲…00…0̲4̲…00…
̲ ̲ ̲ ̲…00…2̲2̲…00… ̲ ̲2̲3̲8̲7̲…00…30…00…04…00…84…00…13…00…02…00… …00…01…00… 36…00…3̲0̲…00…0̲4̲…00…8̲4̲…00…1̲3̲…00…0̲3̲…00…02…00…05…00…84…00…09…00…12…00…0384A…00…
99…00… ̲ ̲1̲0̲…00…06…00… 1652…00… ̲3̲6̲2̲49…00……1e……00……01…@…07…t…00……00……00……01……10…E'…10……11… `*̲J̲…15……05……00……00……00……00……00……00……01…8
q̲…01…$…00……00……00……00…>…0a……00……00…>…0c…=…07…<…0a…<
;…0c…;…07…:…01…9…0a…9…0e…9…06…8…08…8…0d…8…0e…8…05…7…08…7…0f…7…00…7…06…6…0f…6…06…5…0d…5
5 5…06…4…08…4…0a…4…0c…4…0f…3…08…3…02…2…08…2…09…2…0f…2…01…2 2…06…2…07…1…08…1…09…1…0a…1…0b…1…86…1 …02… …02… …02… …02…
Issue 1.4
LKSAA - VOLUME II
SYS/84-04-24
Part 1
TECHNICAL PROPOSAL
Page
2 COMPUTER SYSTEM ..................................
24
2.1 HARDWARE ....................................
26
2.1.1 Introduction .............................
26
2.1.2 X-Local Area Network (optional) ..........
28a
2.1.2.1 General Description of X-Net ........
28a
2.1.2.2 Basic Implementation of the ptional
Local Area Network ...................
31
2.1.2.3 Extension Capabilities of the Option
for Local Area Network ...............
32
2.1.2.4 Utilization of another Local Area
Network .............................
34
2.1.3 Central Communication System .............
35
2.1.3.1 General Description ..................
35
2.1.3.1.1 The Processor Units (PU) .........
39
2.1.3.1.2 The Channel Units (CU) ...........
40
2.1.3.13 Bus Structure ....................
42
2.1.3.1.4 Watchdog System ..................
45
2.1.3.2 LKSAA Processor and Channel Units
(Basic Implementation) ..............
46
2.1.3.2.1 Rack Layout ......................
5
2.1.3.3 Extension Capabilities ...............
54
2.1.3.4 Dualization of External Communication
Lines ................................
54
2.1.4 Equipment Matrix for the Computing
System .................................
56
2.1.5 System Capacity and Connectivity
of Computer System ......................
58
2.1.5.1 Local Area Network (Option) .........
58
2.1.5.2 Central Communication System ........
58
2.1.5.21 Process Capacity ................
58
2.1.5.2.2 Random Access Memory ............
61
2.1.5.2.3 Peripheral Disk Memory ..........
63a
2.1.5.2.4 Terminal Equipment ..............
64a
2.1.5.2.5 Off-Line Cryptographic Equpment
64a
2.1.5.2.6 External Lines Via On-Line
Cryptographic Equipment .........
64a
2.1.5.2.7 External Lines Bypassing the
On-Line Cryptographic equipment ..
65c
2.1.5.2.8 Public Telephone Net ............
65d
2.1.5.2.9 High Speed Optical Data Link .....
65e
2.2 SOFTWARE .....................................
66
2.2.1 System Software .........................
66
2.2.1.1 Standard Operating System ...........
66
2.2.1.1.1Overview of DAMOS Operational
Software ........................
70 …86…1 …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02… …02…
2.2.1.1.2 Kernel ..........................
71
2.2.1.1.2.1 Resource Management .........
73
2.2.1.1.2.2 Process Management