JPRS ID: 9773 USSR REPORT CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP82-00850R000400020012-2
Release Decision: 
RIF
Original Classification: 
U
Document Page Count: 
136
Document Creation Date: 
November 1, 2016
Sequence Number: 
12
Case Number: 
Content Type: 
REPORTS
File: 
AttachmentSize
PDF icon CIA-RDP82-00850R000400020012-2.pdf8.34 MB
Body: 
APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIbL USE ONLY JPRS L/9773 5 June 1981 U~SR R~ ort ~ _ CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY CFOt~O 15/81) FBIS FOREIGN BROADCAST IP~FORMATION SERVICE FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 NOTE JPRS publications contain information primarily from foreign - newspapers, periodicals and books, but also from news agency transmissions and broadcasts. Materials from foreign-language sources are translated; th.ose from English-language sources are transcribed or reprinted, with the original phrasing and other characteristics retained. ' Headlines, editorial reports, and material enclosed in brackets are supplied by JPRS. Processing indicai:ars such as [TextJ - or [Excerpt] in the first line of each item, or following the last line of a brief, indicate how the original information was processed. W'here no processing indicator is given, the infor- mation was summarized or extracted. Unfamiliar names rendered phonetically transliterated are enclosed in parentheses. Words or names preceded by a ques- tion mark and enclosed in parentheses were not clear in the original but have been supplied as appropriate in context. ~ Other unattributed parenthetical notes within the body of an _ item origina~e with the source. Times within items are as given by source. The contents of this publication in no way represent the poli- - cies, views or at.titudes of the U.S. Government. COPYRIGHT LAWS AND REGULATIONS GOVERNING OWNERSHIP OF - MATERIALS REPRODUCED HEREIN REQUIRE THAT DISSEMINATION _ OF THIS PUBLICATION BE RESTRICTED FOR OFFICIAL USE ODTL,Y. = r ~ APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFF:CIAI. USE ONLY JPRS L/9773 ~ 5 June 1981 USSR REPORT CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY cFOUO is/8i) _ CONTENTS xaxn~~rax~ Hybrid LSI Manufacturing Technology 1 Characteristics of Manufacturing Printsd-Cir.r,uit Cards Usi:~g SPF-2 Dry Film Photoresist 3 ~ Multimachine and Multiprocessor Systems.......~ 9 Basic Characteristics of Some Domestic LSI Microprocessor Complexes 11 P320 Programmable Calibrator 12 _ ilew Computer Hardware............................................. 14 S OFTtidARE System for Complex Debugging of Elektronika S5-12 Microcomputer Based on Functional MicroprocesQor Modules 18 Main Trends in Form~tion of an Algorithm and Program Fund for OASU 22 Comparative Course of the PL/1 Language (on the Basis of ~ ALGOL-60) 24 Using Data Bases in the ASU TP of Large-Capacity Units............ 27 MUI,TIPROCESSOR SYSTEMS - State Commission Accepts Institute of Cybernetics Design for ~ Multiprocessor Supercomputer 33 Construction of Algorithmic Language Families for Programming and Designing Multiprocessor Comput~r Systems 34 _ ~ a- [III - USSR - 21.C S&T FOUO] r. nut nr, r,Kr+r . t r ror, nwrY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY VOICE RECOGNITION/SYNTHESIS Mini-Computer Voice C~unication System 45 ~ NETWORKS Concept of 3 Modern Computing Network 50 ~ Data Transmission System (SPD) of the 'E1'brus-1' T~ultiprocessor Computing Complex (MVK) 67 New Book Discusses Control Systems for Communications Networks.... 88 Hybrid Switching Syste~s 90 - A Methodology for the Simulation Modeling of the ~ollective-Use Computer Center of the Siberian Deparrment of the USSR Academy of Sciences 94 Traffic Distribution Algorithm for Automafied Planning System...... 109 PUBLICATIONS Abstracts From the Journal 'AUTOMATION AND COMPUTER TEC~~IOLOGY'... 110 Table of Contents From ~he Journal 'CYBERNETICS' 114 Cybernetics and Computer Engineering: Digital Control Systems.... 116 Tabl.e of Contents From the Journal 'AUTOMATION AND COMPUTER TECHNOLOGY' 123 - `INFORMATION SELECTION AND TRANSMISSION' No 61 125 'INFORMATION SELECTION AND TRANSMISSION' No 62 127 New Book on Computer Modeling of Filtration in Water Engineering Works 129 ERRATUM: In JPRS L/9766, 1 June 1981 (FOUO 14/81) of this series, _ please change "mobile robot" to "undeYwater robot" in the following placess page 77, next to last line; page 79, caption for fig. 1.7; page 80, eighth line from bottom; page 81, caption for fig. 2.4. - b - FOR OFF~CIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY ' HARDWARE I~YBRID LSI MANUFACi'URING TECI~TOLOGY - Moscow PRIBORY I SISTEMY UPRAVLIIJIYA in Russian No 1~ Jan 81 p 40 [Articl.e by engineers A.I. Yakubinskaya~ A.A. Kisilev and I.N. Pervunitskiy: "Technelogi.cal Features of Manufacturing BGIS (Hybrid Large-Scale Integrated Circuits) Designed for Special Applications"] ~ [Text] The manufacture of hybrid special application LSI with high levels of integration is dictated by their use in digital-analog circuits. The design and technology of manuf~cturing LSI provides for the insta7lation on plates of type K10-17 mounted capacitors~ powerflzl transistors, and no-rack semiconductor circua.ts with flexi.ble and ball-type leads. A complex intracircuit commutation is required here, which is executed in two layers~ separated by an insul.ating layer of orgariic clielectric. Exi.sting manufacturing methods for multilayer separation o~ thin-f`ilm circuits in- volve positioning the f`irst electrical conducting layer on the insulating base~ then a second insulating layer and a second conducting 1~}rer. In opder to achieve electrical contact be~ween the layers~ a selective etching of the dielectric is accomplished using a protective maslz~ a proceas which sometimea causes shorta to occur through the punctures in the protective film~ reaulting in a subsequent reduction in reliability. ~ feature of the proposed technology is the absence of etc,hi.ng the dielectric film, a conti.nuoua layer 15-20 micrometers in thickness~ a�eature which insures reli- ~.bility in thP entire circuit. ilectrical contact between the metel plated layera is achieved by the uae of inter- layer contacts--~rolume copper specialized leads~ obtained by galuanic buildup on first layer conductors through a positive photoret~a.st mask. Copper with a sub-layer of vanadium is employed for the first l~yer conductors. Current aupply is provided through jumpers~ which are then removed. A feature of ',ne plating process is that to obtain equal rate of coating or precipitation upon tti~ entire surface, the base is suspendedin the galvanic bath at an angle of 80 to ~5 degrees to the anode. This process is intensified through the use of variable polarity current. The approaches outlined provi.de for the formation of copper columns (leads) 15-20 micrometers in height~ with a height variance on the entire surface of not more than 2 micrometers~ with smooth surface~ fine-crystalline 1 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 I~OR OFFI~C'lAL L)SF, ONLY structure~ an3 strong adhesion to the sprayed copper. The material used for the interlayer in~ulation is PAK-1~ a poly~.mide electrical insulating lacquer~ which is advantageoua for its high mechanical and electrical inaulating properties over a broad temperature range (from minus 200 to plus 400 degrees C)~ properties 1.ack- _ in~ in o~;her dielectrics. The insulating layer is a continuous film of lacquer i5 . to 20 micormeters thick~ consisting of four layers~ providing high electrophysical parazneters for crossovers, and minimal porosity. The lacquer is poured onto t,he - base surface and is subsequently equally distributed over the entire aurface of the base by centrifuging. To achieve electrical contact of the conductors of the second 1~,}rer with the interlayer jwzctions~ the la~qusr layer located at the tops of the interlayer junctions is removed until th~ tops of the 3unetions are uncovered. For thia~ burnishing or undercutting of the uppper insulating layer m~y be employed. The selection of one method or other is determined by the relief of the film surface . obt~u.ned, which is dependent upon the initial viscosity of the lacquer. With high initiAl vi scosity of the lacquer (approadmately 1500 aec according to the VZ-1~ viscosimeter)~ a layer of polyimide film of vlrtually the same thiclrness as the insulation layer forms on the 3.nterlayer junctions over the entire surface of the base. The f`ilm so formed is suitable for burnishing re~uirementa~ but is not suitable for undercutting. IIse of a lacquer r~rlth initial vlscoaity of 300-l+00 sec produces a film ~,rlth indiatinctly expressed relief~ which ia more suitable for etcPiing. Al1 operations of the technological cycle were performed on series produced equip- raent utilizing existing procedures and operational modes. Thus the ~;echnological process for the manufacturing of DGIS for apecial applica- tions includes aequentiaLly executed operations of vacuum dusting metal plating of the first layer with f~rther formation of the drawing using the method of photo- lithography, formation of the interlayer junctions on conductora of the f5.rst layer through a mask of positive photore~sist uaing jumpers~ removal of the jumpers~ formation of the insulating layer~ uncovering the interlayer junctions~ and the formation of the second layer conductors. Tes~:s of 500 plates manufactured according to the technoloey outlined demonstrated excellent electrophysical paremeters for interlayer insulation: sh rta were lacking for pratical purposes~ and specific capacity was rated at 2-3 pF/mm~. - COP�RIGHT: Izdatel~ stvo ~'Maahinoatroyeniye~~. ~'Pribory i aistemy upravleniya"~ 1981 885t CS 0: 1863 /142 ~ 2 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 ~ FOR OFF'ICIAL USE ONLY UDC 621.38:776.002.5 - CHARACTERISTICS OF P4ANUFACTURING PRINTED-CIRCUIT CARDS USING SPF-2 DRY FILM PHOTORESIST Moscow PRIBORY I SISTEMY UPRAVLENIYA in Russian No 3, May 81 pp 41-42 [Article by engineers M. G. Miko and T. M. Marenkova and Candidate of T~chnical Sciences B. S. Irugov) [TextJ Intensive development of modern computer equipment and instrument building requires solution of a number of complex production problems and primarily develop- ment and serial assimilation of technological processes in producing precision and large printed-circuit cards. Specifically, cards with dimensions of more than 200 mm in which printed-circuit conductors and gaps 150-200 microns wide must be reli- ably formed are used in minicomputers of the SM EVM [International small computer system] and ASVT PS [expansion unkx~ownJ. Many years of experimental investigations conducted at the Institute of Control - Problems (Moscow) and at a nwmber of other Qrganizations show that one of the most effective methods of solving this problem is to use SPF-2 dry film photoresist of type 2-40 or 2-60 and the corresponding highly productive production equipment. Main Properties of SPF-2 Photoresist c Dry film photoresist (SPF) was especially developed to produce printed-circuit cards. It makes it possible to produce conductors with clear edges 150 microns wide and with the same gaps between them, whereas the minimum width of conductors and the gaps between them now prQduced comprises 250-380 microns for liquid photo- resists. Investigations are now being carried out to improve the composition of the photopolymerized composition for SPF-2 photoresist, which will provide a fur- ~ ther increase of its resolution. Since SPF is much thicker than layers of liquid photoresist, electrochemical pre- cipitation of the metal occurs inside the formed channel. For this reason there is no lateral fungus-like growth of tha metal above the edges of the photoresist and consequently one can manufacture cards with more rigid tolerances on the width of conductors and gaps. By using SPF-2 photoresist, one can produce high-quality two-sided printed-circuit cards by the positive image method with pre-drilling of holes with conductor width of 200 microns and gaps between them of 150 microns. The use af SPF also permits 3 _ FOR OFF[CIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 FOR OFFICIAL USE ONLY extensive introduction of the "screen" production process when the conductors and the copper in the holes are protected by photoresist during etching. However, this process is applicable only when the contact areas on the phototemplates are not cut. _ The use of SPF-2 photoresist simplifies the production process (drying, tanning and retouching operations are eliminated), complete automation of the process becomes possible, it becomes more productive and permits a sharp increase of card quality and the percentage of yield of acceptable cards. Due to the high chemical stability of SPF-2 photoresis~ in acid and alkaline solu- tions, there are no restrictions on the use of different galvanic baths and etch- - ing agents. Thus, the use of the same alkaline etching solution based on copper chlorate is possible for etching on SPF-2 photoresist (the "screen" method) and on m~tallic resist (tin-lead alloy) . It is important that the protective SPF now being widely developed to produce ther- moresistant electric insulating coatings of printed-circuit cards are also develop- ed in methylchloroform [12]. However, it should be noted that, as shown by operat- ing experience, failure to observe the necessary requirements when ~ising SPF significantly reduces it~ advantages over liquid photoresists. Requirements on Production Buildings , Since SPF is protected by a lavsan film prior to developing, it is less sensitive to dust than liquid photoresists. However, to completely el iminate retouching, the entire process using SPF must be cazried out under "clean r~om" conditions: the incoming air should be filtered and excess pressure should be maintained in . the room. The temperature should be in the range of 20-25�C and relativ~ humidity should com- prise 50 + 10 percent in the section where operations o+ Lamination and exposure of the photoresist are being carried out. Lamination, exp:~ure and development should be carried out in yellow light to prevent prelint~~ar~� polymerization. ~ Requirements on Phototemplates The large thickness of the photopolymerized compasite i.~ t'~~e ~resence of a lavsan film during exposure place more rigid requirements on ~''~ototemplates. The optical density of the opaque sections of the image should not e be low three units of density (otherwise partial polymerization on the prot~ ~~~d sections occurs while that on the transparent sections should not be mor~ ~.r.~.r. 0.1 units of density (other~vise insufficient polymerization of the exg :tions is observed) . A clear, contrast image on the phototemplates is ~a~;c.~i;xed and a corona and washout of lines are not permitted. ' The s lides should have a dark mask around t�z p~~=:;1?" ^4~. Y' of the phototemplate (the minimum distance from the circuit pattern t~~ ~:ac~ ina.y:r, is not less than 10 mm) , - which creates the best conditions during de .�.c~~~ar~t and contributes to more uni- form galvanic buildup of the metal. 4 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFtCIAL USE ONLY ' Centering points in the middle of the contact surfaces are not permitted in the phototemplates. The diameters of the contact surfaces should be 1.5-fold larger than the hole diameter to protect the metallized holes during the "screen" method. Surface Preparation Blanks with pre-drilled holes and which have undergone chemical metallization of the holes with galvanic prolongation by copper to a thickness of 5 microns prior to lamination should be dried in a drying cabinet with air recirculation for 20-30 minutes at t= SO-100�C to remove moisture from the holes. The blanks with the . qalvanic coating are subjected to additional mechanical cleaning. It is necessary that the blanks have an even surface without deep scratches and _ pits, that the edges be even without outgrowths and that no drilling burrs be in - the holes (drilling is accomplished without counterboring). After cleaning, the copper surface should be slightly mat. The best adhesion of ~ the SPF to it is provided by mechanical cleaning, but the prepared surface should not be polished. It is required that a thoroughly cleaned blank hold a water film in the vertical position for approximately 15-20 seconds over the entire surface. Since the cleaned surface is easily oxidized, lamination is accomplished no later than 1 hour after surface preparation. Lamination The SPF-2 photoresist is laminated on an installation for application of dry film photoresist to both sides of a clean dry blank with the rollers being strictly para~'.lel and at a pressure of 0.5 kgf/cm. The temperature of the heating shoes should be maintained in the range of 115 + 5�C over the entire length of the shoes and should be monitored constantly to avoid polymerization of the SPF-2 in case of _ overheating. Poor adhesion of the SPF to the blank is observed if the temperature decreases to a value below that indicated. Nevertheless the nega.tive effect of temperature deviation from the given range can sometimes be compensated for by changing the rate of lamination. The latter is selected experimentally for each lot of SPF and is in the range of 0.7-1 m/min. The heating shoes and the laminating rollers should be completely clean, without photoresist residues on them, which are removed by methylchloroform. Methylene _ ~hloride must not be used for this since not or.ly the methylene chloride vapors affect the SPF-2 photoresist, but they also ~reak down the roller material. The shoes and rollers may not be cleaned mechanically since low-quality laminata.on which leads to retouching or rejection during subsequent processing is observed if they are damaged. Lamination is usually carried out on cold blanks. However, if the SPF-2 photore- sist is used for a"screen" or if it becomes subject to the effect of high temper- atures during subsequent production operations, lamination must be carried out on hot blanks (SO-100�C). To increase the adhesion ~f the photoresist to the blank, - 5 . FOR OFF[CIAL USE ONLY _ APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE OtdLY the latter is aged for not less than 30 minutes after lamination prior to the next operation. SPF-2 photoresist of type 2-60 or 2-40, laminated two times, is used to produce a photopolymer layer of great thickness while providing the "screen" process on blanks 1.5 mm thick with metallized hole diameter of 0.8-1.2 mm. The blank is aged for 30 minutes prior to the second lamination. The lavsan film which provides me~ - chanical protection and serves as a barrier against the effect of atmospheric oxy- gen on the photopolymer layer, is removed immediately prior to developing or during ' the second lamination. Exposure SPF-2 dry film photoresist is a negative material: it is polymerized on theexposed - section and it becomes insolubl2 in metal chloroform. SPF-2 photoresist has a thick photopolymer layer and is exposed through the protec- - tive lavsan film. Exposure is carried out in an exposure installation with colli- mated movable light source--flash lamps. Air-evacuating gaskets are used inside the vacuum frame for rapid removal of air and to provide good contact of a photo- template and the SPF. Heating in the vacuum frame is not permitted since it in- creases the rate of polymerization of the photoresist and leads to variation of the optimum exposure time, which is selected experimentally and is periodically checked: after replacement of the lamps, prior to the use of a new lot of SPF and after reglacement of the film in the vacuum frame. Determination of the aptimum exposure time is also important because the electrolytes of the galvanic bath are rapidly contaminated by organic impurities with short exposure and accordingly with insufficient polymerization of the exposed SPF. n A test-card phototemplate on which the width of the conductars is measured at var- ^ious points on its entire surface is used to determine the optimum exposure time. The blanks with the applied SPF-2 photoresist are exposed thorugh a test-plate negative with different speed of the flash lamp carriage. A blank with brilliant hard layer uf photoresist and with even unwashed edges of the conductors is selected after development. The measurements are made at the same points as on the template on these blanks by using a microscope. The exposure time at which conductors with clear edges and minimum deviation of their dimensions toward the positive side are produced is optimum. The time during which the conductor cross-sections on polished sections have plumb edges after exposure, development and galvanic buildup of inetal will be aptimum for the positive image method of printed-circuit card manufacture. Development Development of SPF-2 photoresist is based on dissolution and washout of the photo- resist layer not polymerized during exposure in methylchloroform. The developing installation provides rapid and complete removal of this layer under a stream of _ sprayed solvent. The developing time depends on the thickness of the light-sensi- tive layer, on the temperature of the developer which should be monitored and 6 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY should be in the range of 15-20�C and on the pressure at which the solvent is fed to the blank. The optimum developing time is selected experimentally and is taken as 1.5 times greater than the time required to remove tlie unexposed layer of photoresist. Z'he optimum developing time comprises ~0 seconds for SPF-2 photoresist of type 2-40 at pressure of approximately 2�105 Pa at the nozzles and at solvent temperature of 16-18�C. The photoresist is washed out during development of the positive image from deep channels; therefore, the developing time is increased by 5-15 ~econds depending on the density of the circuit pattern and the width of the conductors. The developing time, temperature of the developing solvent, the purity of the de- veloper and final flushing with cold water affect the quality of the developed image. Complete washing of the unexposed photoresist is nec:essary since even traces of it during subsequent operations lead to rejection. The contaminated solvent is partially broken down during purification (distilla- - tion) while the impurities and products of inethylchloroform decomposition affect the exposed photoresist and cause a reduction of the range of developing time. Therefore, no more than two parts of the distilled solvent and one part of puri- fied solvent must be used in the developing chamber, while only pure solvent must be used in the washing chamber. The solvent is contaminated not only by the diss~lved photoresist and impurities but also by water whose presence threatens low-quality developing. Rapid careful washing of the pattern by a stream of cold water under pressure~ is required after developing to remove residues of solvent before the developer be- gins to evaporate, after which the blank with developed image is protected by fine polishing powder with subsequent flushing with water. Becoming greasy--the unwet- tability of the copper surface on blank sections--occurs with low-quality develop- ing. A well-developed image should support a continuous film of water for 20-30 seconds. Introduction of regulators to the photopolymerizing composite which fa- cilitate the developing process is possible with further improvement of SPF-2 photoresist. Not only the chemical action of the solvent but also mechanical action, which is pr~vided by spraying methylene chloride under pressure at no less than 3�105 Pa in installations to remove the SPF are required for complete removal of the photo- resist from the exposed sections. But since methylene chloride has a negative effect on the dielectric properties of the base after etching the copper from the blank spaces of the card, the removal time should be minimum. Thus, the removal time for SPF-2 photoresist of type 2-40 at temperature of the removing solution of 16�C and at pressure of 3�105 Pa com- _ prises 25-30 seconds. The pattern is carefully flushed with water after removal of the photoresist with subsequent cleaning of the surface with polishing powder and flushing. The use of dry photoresists as a base to produce saturated conducting patterns on large printed-circuit cards makes it possible to solve the most i.mportant 7 FOR OFF[CIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ON~,Y production problems in manufacture of modern microelectronic apparatus and computer equipment. Tt-lis conclusion has also been confirmed by the experience of leading foreign and domestic firms. Extensive development of these materials is a necessary condition to convert to - more pro:nising positive-image and combination methods of manufacturing two-sided and specifically of multi-layer printed-circuit cards. Dry photoresists find wide ' applic,~tion not only for subtractive but also for additive (semiadditive) - techniques. Preliminaiy investigations also show that the production processes using dry photo- resists a::e more easily subject to automation and find broad application in modern ASU TP [Automated production process control system] of printed-circuit cards. BIBLIOGRPAHY 1. Fedilova, A. A., Ye. P. Kotov and E. R. Yarvich, "Mnogosloynyye pechatnyye platy" [Multilayer printed-circuit cards], Moscow., Sovetskoye radio, 1977. 2. Kuznetsov, V. N., V. A. Pogost et al, "Some Chara~teristics of Usi;ig Dry Film Photoresists Developed by Organic Solvents and By '~Vater-Alkaline Solutions," VOPROSY RADIOELEKTRONIKI. TEKHNOIAGIYA PROIZVODSTVA 2 OBORUDOVANIYE, No 3, - 1978. - 3. Information Manual. Riston Photopolymer Resist, DuPont, 1972. COPYRIGHT: Izdatel'stvo "Mashinostroyeniye". "Pribory i s~stemy upravleniya", 19~31 G521. CS 0: 1863/155 8 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR l~Ft~i~^IAL USE: UNLY - MULTIMACHINE ANA MULTIPROCESSOR SYSTEMS Moscow NOVOYE V ZHIZNI, NAUKEy TF.RHNIKE: SERIYA "RADIOELEK~RONIKA I SVYAZ"': EVOLYUTSIYA VYCHISLITEL'NYKH SISTEM in Russian No 3, Mar 81 (signed to press 12 Feb 81) pp 44-45, 62 [Excerpts from chapter 6, "Multimachine and multiprocessor systems," and conclusion from the monthly "Radioelectronics and Communications" serial, "What's New in Life, Science and Technology": "Evolution of Computer Systems", by Yevgeniy Pavlovich Balashov, doctor of engineering science, professor, author of 12 books and 96 inven- tions, who specializes in computer technology; and Arkadiy Petrovich Chastikov, can- didate of engineering science, docent, author of over 40 scientific articles and many inventions, Izdatel'stvo "Znaniye", 38,260 copies, 64 pages] [Excerpts] Multimachine and Multiprocessor Systems In 1976, associates at the Institute of Mathematics, Siberian.Branch of the USSR Academy of Sciences together with the Severodonetsk Impul's Scientific Production - Association engineered the MINIMAKS project, a minimachine program-switched system. riINTMAKS is a homogeneous system with program-switched channels for communication - between the elementary machines (EM). Each elementary machine consists of a compu- ter complex (M-6000 or M-7000) to process data and a systems device for communica- tion between the elementary machines. It is interesting to note that the ratio of cost of the systems device and the cost of the MINIMAKS processor does not exceed 0.5, while this ratio for multiprocessor systems with a common bus with the RDR-11 computer processor is 1.2. The MINIMAKS system may function autonomously, as part of high-capacity concentrated computer complexes or as part of distributed computer networks. In the process, it may be successfully used both to solve scientific and economic prohlems, and to control grocesses. Among subsequent developments of homogeneous computer systems, we m~st mention the minimachine system (SUMMA) developed in 1977 ~nd based on the Elektronika 100 and Elektronika 100I domestic minicomputers, a system oriented to operation as part of automated systems for control of industrial processes. The Institute of Mathematics, Siberian Branch of the USSR Academy of Sciences, and the NITsEVT [Scientific Re- search Center for Electronic Computer Equipment) have now engineered a project for a general-purpose homogeneous computer system based on the YeS-1060 computer. Its overall speed is determined by the number of YeS-2060 processors and by ratings may be from 2 to 20 million operations per sec~:nd. 9 FOR OFFiCIAi. iJSF (1NT,Y APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFI~IAL USE ONLY The development and production in our country of homogeneous computer systems is a significant achievement in the field of building multimachine computer facilities with a programmable structure. Conclusion In the development of domestic computer technology, a great contribution was made by academicians S. A. Lehedev, V. M. Glushkov, A. A. Dorodnitsya, G. I. Marchuk, I. V. Prangishvili, V. S. Semenikhin, corresponding members of the USSR Academy of Sciences I. S. Bruk, V. S. Burtsev, Yu. A. Bazilevskiy, G. P. Lopato, A. A. Lyapunov, - A. P. Yershov, N. Ya. Matyukhin, B. N. Naumov, doctors of engineering science E. V. Yevreinov, M. A. Kartsev, A. M. Larionov, V. K. Levin, B. N. Malinovskiy, V. V. Przhiyalkovskiy, B. I. Rameyev, M. R. Shura-Bura and other researchers, designers and developpr.s of data processing facilities. _ Developers are now faced with a number of problems, among which the following may be mentioned: formation of new computer series, rational combination of hardware and software in computer systems, formation of advanced structures based on large-scale integrated circuits, further improvement of the design and technology base, etc. It should be noted that the socialist countries have found a successful path in the _ field of developing computer technology, development of a second series of YeS - ~unified system) computers with a throughput of millions of operations per second is nearing completion successfully, and the high-throughput computer systems E1'brus-1 - and E1'brus-2, M-10, YeS-1035 and Yes-1045 with matrix processors have been developed. COPYRIGHT: Izdatel'stvo "Znaniye", 1981 8545 CSO: 1863/162 10 FOR OFFICIAL USE Ot'dLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 1~1)R (N~I~I(7AL 11~N: ONI.Y BASIC C'riARACTERISTICS OF SOME DOMESTIC LSI MICROPROCESSOR COMPLEXES - - Moscow NOVOYE V ZHIZNT, NAUKE, TEKHNIKE: SERIYA "RADIOELEKTRONIKA I SVYAZ'": EVOLYUTSIYA VYCHISLITEL'NYKH SISTEM in Russian No 3, Mar 81 (signed to press 12 Feb 81) p 55 , [Tab]_e from chapter 7, "Evolution of Microprocessor Technology," from the monthly "Radioelectronics and Communications" serial, "What's New in Life, Science and Technology": "Evolution of Computer Systems", by Yevgeniy Pavlovich Balashov, doctor of engineering science, professor, author of 12 books and 96 inventions, who specializes in computer technology; and Arkadiy Petrovich Chastikov, candidate of engineering science, docent, author of over 40 scientific articles and many inven- tions, Izdatel'stvo "Znaniye", 38,260 copies, 64 pages) [Excerpt] Basic Characteristics of Some Domestic LSI Microprocessor Complexes Circuit T~pe Function Technology Word Speed, Number of Supply ~ize, t,~i s_ Instructions Voltage, V _ Bits (Micro- Instructions) K-536 (14 LSI) Various PMOS 8 10.0 149 -24; +1.5 K580IK80 Microprocessor NMOS 8 2.0 78 +S; +12; -5 K581IK1 Register ALU NMOS 16 1.6 +S; +12; -5 K581RU1 Microprogram ~OS 12 512 +5; +12; -5 Storage _ K582IK1 Processor I2L 4 1.5 1.2 Element K-583 (13 LSI) Various I2L 8 1.0 K5841K1 Microprocessor I2L 4 1.5 512 1.2 _ K-586 (3 LSI) Various NMOS 16 0.5 K587IK2 ALU CMOS 4 2.0 168 9 K587RP1 Control Memory CMOS 1.5 9 K587IK1 Data Exchange CMOS 8 1.5 60 9 K587IK3 Arithmetic ~OS 8 2.0 64 9 , Expander 564RU2A 256-bit Main QqOS 1 2.5 3-15 Memory 564RU2B 256-bit Main ~OS 1 3.5 3-15 Memory K530AP2 Bidirectional TTLDSh 4 0.03 Amplifier-Driver COPYRIGHT: Izdatel'stvo "Znaniye", 1981 8545 CSO: 1863/162 11 FnR OFFICiAI. I fSF. (1Ni.Y APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 hOR OFHICIAL USE ONLY P320 PROGRAMMABLE CALIBRATOR Moscow PF~LBORY I SISTEMY UPRAVLENIYA in Russian No 3, Mar 81 p 37 [Text] The P320 calibrator k~th manual and program control is designed for use in automated checking installations and also as an independent device for checking analog and digital devices operating on direct current. The device is a d~sk type, � portable and made from the designs of the ASET [expansion unknown]. - The calibrator provides for transmission of calibrated voltages and currents in the range from 1�10'S to 1.1�103 volts and from 10-9 to 1.1�10'1 A, respectively, and remote (program) control, including setting the maximum and the level of the output ~ parameter. The level of the output parameter is controlled in binary-digital codes 8- 4- 2-1. Maximtun Errors of Relative Value of Maximum Calibrated Voltaqes (Currents) Calibrated Voltages (Currents) 0.1 V 5�10'S Uk + 10 ukV 1 V 2�10-5 Uk + 10 ukV 10 V . 1� 10-5 Uk + 40 ~tkV 100 V 3�10-5 Uk + 500 ukV Up to 600 V 4�10-5 Uk + 5 mV 1,000 V ,~ove 600 V 5�10-5 Uk + 5 mV 1 ~ 2�10'S I~ + 0.01 ukA 10 mA 5�10'S Ik + 0.1 ukA 100 mA 5�10'5 Ik + 1 ukA Note. Uk and Ik are the established value of calibrated voltage and current. The maximum permissible main error of the relative value of calibrated voltages and - currents does not exceed the values indicated in the table. The main error is numbered for the temperature range of tn + 2�C, where tn is the temperature at which calibration was made. The output impedance of the calibrator is in the range of 10 V< 0.001 ohms. Th~ level of the variable coznponents in the 12 F4R OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-44850R000400024412-2 . FOR OFFICiAL USE ONLY grequency band up to 100 kHz (a mean square value) at the calibrator output < 300 ~ (for range of 0.1-100 V) and < 1,000 uV (in the range of 1,000 V). The calibrator has an overload protection device and limiter of the input valtage (current) level. The power consumed by the device at nominal mains voltage < 150 V�A. The mains voltage is 220 + 22 V(at frequency of 50 + 0.5 Hz). The overall dimensions and mass are 488 X 535 X 250 mm and 26 kg. The device is operated at 10-35�C and at relative humidity up to 80 percent. - Calibrators are delivered by order to Soyuzglavpribor (117219, Moscow, V-219, ul. Krzhizhanovskiy, 16). . The incorrectness of the data prese.rited in the article of V. V. Korchin and V. T. Kuz'min NTTM-80, published in issu~ No 10 of our journal for 1980, is the operating reason for publication of the givea remarks. COPYRIGHT: Izdatel'stvo "Mashinostroyeniye". "Pribory i sistemy upravleniya", - 198.. - 6521 CSO: 1863/155 13 FOR OFF[CIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 FOR OFFI~'IAL USE ONLY Jj NL4J COMPUTER HARD4lARE Moscow PRZBORY I SISTEMY UPRAVLENIYA in Russian No 1~ Ja~n 81 pp /~/-/+5 [Article by S.B. Abramov~ candidate of economic sciences: "New Hardware"] [Text] The USSR VDNKh (USSR Economic Achievementa Expoaition) Pavilion~ ~~Computer Equipment~~~ featuring theme expoaitions "Advanced Know~ow of the Kazan Computer � Plant in Perfecting Series Production of Computer Hardware~~ and ~~Mechanization and Automation of Computer Operationa" demonstrated new c~mputer hardware manufactured by enterprises of the Miniatry of Instrument Building~ Automation Fquipment~ and Control Systems. The article provides a brief description of the more interesting exhibits~ noted for the novel design-engineering solutions inc~rporated~ and the high level of technico-operational parameters displayed. - _ A desk-top terminal featuring aimplest information processing~ the ~~Iskra-900~~ is designed for the arithmetic processing of da.ta~ timekeeping~ automatic te~ephone s~,rltching-connecting~ simultaneous conversation among three members-au~scribera - of the telephone system~ and exchange of digi.tal information with the computer. Including the indicated f~Znctions i.n the terminal procludes the need for a group of single-function instruments~ (keyboard computexy cl.ock-calendar~ auto-dial telephone~ teletype)~ and reduces the number of operations involved in data - preparation for input into the computer. The terminal can be employed by upper and middle~-management links i.n institutions and enterprises from vaxious areas of the national economy~ and by operators in- volved in data preparation at remote peripheral points of the ASU and directly by production personnel. It ia uaed independently and in conjunetion with the M-6000 and SM computers. From a design standpoint~ the ~~Iskra-900~~ consists of a control console and inte~ face unit. The control console providea for executi.ng the f~Znctions of t~he EKVM (keyboard computer)~ the clock-calendar~ auto-dial telephone~ and also, in conjunc- tion with the interface unit~ four terminal operational modes (EKVM~ auto-dial telephone~ clock-calendar~ terminal). Specifically, in the ~~EKVM~~ mode~ the terminal performs arithmetic operations~ chain-catenary operations~ and operations with conatants with allowance for the result c,haracter of the executed operation and overflo~r of the mach~.ne binary word format. - 14 FOR O~'FICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY _ In the ~~Terminal" mode~ the machine prov.Ldes for the trr~namiasion to the computer of data output from the keyboard~ selected from the operational memory~ EKVM computation results~ current time~ and also t~he receipt of data from the computer. Transmitted and ~eceived data are indicated on che terminal~s indicatos~ display. The electronic ticket counter outlet (EBKM)~ ~flskra-307"~ ~s designed for mechaniza- tion a.nd accounting of ticket-outlet operationa for passenger traffic on rail.road ~ tranaportation facilities. - Incorporati.ng integrated circuits (IS) with low level integration of the Ifl.55 _ series, the machine consista of a calculator~ tape perforation unit~ and a printer. Input of data is accomplished via an alphanumeric keyboard on the calculator and minicassettes~ with output to the II,T screen (during the procesa of ticket registra- tion)~ printer (travel document~ control tape)~ and tape perforator. - The "I skra-307~~ performs the following operations: accounting of monetary receipts in a overall summation register, and cashier tot~.l. receipts per shift~ an accounting _ of the number of travel documenta issued by category; an accounting of the cost and number of voided tickets; and the automatic price determination for vasious - types of travel ticketa. The machine "Iskra-3~7"~ in comparison ~ri.th earlier used machines of the same class of electromechanical machines has expanded :f~znctional capabilities: recording a large volume of data on a machine medium~ with ;ntbsequent compute~~ data processing~ lesaer dimensional size~ and lower weight. Tectuzica.l Characteristica of the "Iskra-307" Comput,erized Ticket Outlet (EBKM) " Number of counters: SUIIIIIl&T,}/ ~IDOI78ti8Ty~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~� 6 operational~~~~~~~~~~.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~� 1. Volume of counters in decimal places monetary~~~~~.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~� 6 - operational~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~� Volumes (capacities): OZU, bi~s .........................................o....l~K X 8 D10ZU~ bits ..............................................102/~ PZU, bits ..............................................8K X 16 r T, symbols .......................................e....256 - WLTAGE~ volts..... .......................................220 (50 Hz) The electronic control-registration macha.ne (EKRM) nlskra-300~~ performs cash accounting operations in trade and public cater:i.ng enterprise9. The machine incorporates laxge scale IS and a microprocessor. Data input is from an alphanumeric keyboard' output to a seven-digit built-in indicator and to a printing device (control check~ tape~ detachable check~ accounting register). Two documents axe simultaneously printed ou~--the check or statement~ and the control tape~ The ~~1 skra-300~~ performs the following operations: accounting~ individual total~ - 15 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY _ cnange~ multiplication, addition~ eubtraction~ repeat, and void. Use of the machine increases the productivity of accounting purchases with con- sumers~ as the cost of purchases is calculated by price~ weight~ or number. Technical Gharacteristics of the ~~Iskra-300~~ EKRM Informat,3.on volume~ OZU in bits .................................256 X 4 Printir~g speed~ lines per second ...................................2.5 CiOTlti1'OI. registers~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~e~~~~~} d1,~1.~'i Number of character positions pe.r line..............,~~~,~,~,~~~~~~16 Power requi.red~ lri jl8,tt8~ ri0't IDOr@ '~',~1gI1� . . . . . . . � � . . . � � � � � ..2~~ 1?imensions~ 1T1 1IlIll~~~~~~~~~~~~~~~~~~~s~~~~~~~~~~~~~~~~~~~~~~486X/.05X/.,.00 4leight~ in kilograms~ not more than ..............~.~~~~~~~~~,~~~~~~/~p Centralized control machine (MTsK)~ Series M-40-43~ is deaigned to solve control and management prot~lems for technologi.cal processes in various i.nduatrial sectors and constitutea the latest development of Series M-~.0 machines~ which are based upon microprogrammed control. The Series M-/~0-1~3 machine is employed in enterpriaes ~rith continuous end diacrete type production (enterprises with ASU controlled lifting-transporti.ng machinery~ control of inetal quality for hot and cold rolling~ control and mar~agement of individual functional groups of power units~ small and medium substations~ and others). The machine is prcduced in four versions (see table). The first two versions axe u sed by enterprises with continuous and discrete production~ the latter two are used only by enterprisea with distinct type production. The basic set of machines includes a central control unit (WTs)~ also an input- output unit~ technological data print unit~ input-output of diacrete data unit~ telemechani cal communications (UTS)~ external memory (UVP-43)~ alphanumerical terminal, and an indication conaole. riodification Number of Maximum number of Capacity of high level module pointa of external ZU. Kbits signals discrete i_ nput out~ut M-4~-43/2 12g 352/z2 160/16 16 r~1-4o-43/z1 M-4~-43 3 102 64 320 32 16 i~~-4~-43/31 _ By design veraion~ the MTsK of the N~40-l+3 series belongs to the ASUT-M syatem. Communication With external devices ia accomplished by a 2K communication rank. 16 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-00850R000400024412-2 FUR OFF[CIAL USE ONLY Tec,hnical Characteristics of the MTsK M-40-43 Maximum number of external units (peripherals) connected to: WTs............... ...........................................up to 16 WTs via TJTS ..................................................up to 28 Maximum number: - High level analog input signals ...............................up to 512 Discrete input data points....���.� ...........................up to 1/+00 ~9aximum s~eed for execution of microcommands in thousands of operations per second...........o ................................5G0 Capacity in bitea ~8T1C~OD1 acceas file ~U~ .~i.3/~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Z.bK N:emory uni.t: Glxrrent ..........................................................2K Permanent~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~s~~~~~~~$K Voltage~ volts.................. ................................320/220 (50 Hz) Required power~ in V.A.(voltr-amperes) ...............................3500 I1a11 operating time in hours~ TlOt'i 1.88$ ti~l&21~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Dimensions in mm ...........................................650X6787Q 600 Weight~ kilograms ...................................................2000 The SPK-80 aperture punchcard search selector is designed for the rapid aearch of data input in the form of perforations on atandard 80-column punchcards~ and ia employed in searches for patents and inventors~ certificates~ information in technical. information officea~ and for design analogs for the use of reac~y solutions or the study of e~dsting teclmical levels of tasks solved~ i.n personnel departments and other institutions. The card feed and photoelectric method of reading of data provides for a signifi- cant reduction in the wear of punchcards~ an extension of their service life~ and the single-ghase feeding net~ low weight~ and sma71 dimensions and low noise level permit the use of the selector in any organic equipment complex~ tiri.th ASU or autonomously in any sub-element where it is necessary to aelect from a deck of cards with the required data. The selector selects punchcards with total coincidence of information on the selected punchcard w,~~h information input to memory~ the coincidence of iriforma- tion of one of the zones of the deaignated punc,hcard with i.nformation of the zone input to memory~ and ~:~e coincidence of information from a given column of the selected punchcard ~:ven if only one of the characters input to memory for that seme Golumn. Technical Characteristics of the SPK-SO Tec,hnical speed 121 CSTC~S/II11T1~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~j.~0 Capacity of magazines in cards: receiving~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~W~ feeding .........................................................~.OQ Number of simultaneously read positiona ................~,.,,~~~,~~~~12 Voltage~ i.n volts ..................................................220 (50 Hz) Required power~ in V.A .............................................500 Dimensions 121 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~7v0X5W~j,W Weight in kg .......................................................100 COPYRIGHT: Izda,tel'stvo ~~Mashinostroyeniye". "Priboi-y i sistemy upravleniya"~ 1981 8851 CSO: 1863/142 17 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAG USE ONLY SOFTWARE UDC 681.328 SYSTEM FOR COMPLEX DEBUGGING OF ELEKTRONIKA 55-12 MICROCOMPUTER AASED ON FUNCTIONAL MICROPRUCESSOR MODULES Moscow PRIBORY I SISTEMY UPRAVLENIYA in Russian No 3, Mar 81 pp 36-37 [Article by Candidate of Technical Sciences V. V. Sumin and engineers V. N. Syrtsev, A. F3. Vasil'yev and N. M. Kalinin] [Text] Single-board microcomputers of the Elektronika S5 family are now a promis- ing technical base for construction of various automated systems. It is very im- portant in this case for the user to have the capability of cor.:plex debugging of the equipment and which is more timely the program parts of the system under development. One of the variants of constructing a debugging system for the Elektronika S5-12 microcomputer on the basis of functional microprocessor modules serially produced by our industry is described in the article. The complex debugging system is de- signed for preparation, editing and debugging of programs for systems constructed on the basis of the Elektronika S5-12 microcomputer. The system permits entry of information from a type FS 1501 photoreading device, program editing by means of keyboard and console machine of the Consul-260 type, derivation of information to the PL-20 printer and light diode displays and listing o� the programs being de- bugged can be achieved if necessary. The debugging system is capable of successfully replacing the industrial prototype system constructed, for example, on the basis of the multiboard Elektronika SS-02 microcomputer (for a specific class of problems). A block diagram of the debugging system OS is presented in Figure 1. The system includes a microcomputer of the Elektronika SS-12 type, functional microprocessor modules OZU [Internal storage] Elektronika 55-125 with capacity of 2,048 X 16 bits and TsW [Digital input-output] Elektronika 55-122 (it has four each digital in- - puts and outputs), read-only memory PZU with capacity of 256 X 16 bits, matching devices SU, light-emitting diode displays SID, peripheral devices (electronic con- sole machine EPM of the Consul-260 type, perforator P of the PL-20 type and photo- reading device FU of the FS 1501 type) and a keyboard K1. Without describing in detail the organization and information exchange in the sys- tem, let us note only some of its features. Thus, the use of the Elektronika 55-122 TsW for exchange of the debugging system with the periphery permits 18 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-00850R000400024412-2 FOR OFFICIAL USE ONLY ~ l I ~ I ~y ' I _ I ~ ' ~ I ~1~ 1. ~ ~y ~ MuRpr o ~ - ~ p3y -3BM ~ I I ~ ~ ~ ~ . I I I ~y I I I ~ ' ues ~ i ~ i ~ C9 nepurpepuu~2~ ~ I I L-- - - - - 1 3lIM 11 ~SI Ifn CHQ Figure 1. Block Diagram of Debugging System: ShA, ShI and Upr-- address, information and control buses Key: 1. Microcomputer 2. Peripheral switching devices preservation of the digital inputs-outputs by the microcomputer itself for working with the automation facility. The use of the Elektronika 55-125 OZU module with capacity of 2K (or 4K) permits storage of user working programs and the program for exchange with the console machine. The read-only memory PZU with capacity of 256 words is realized on a micro-OZU of type 561RU2 with buffer power supply. It con- sumes less than 20 ~.~A in the storage mode; the information is retained for 5,000 hours after cutoff of the power supply. The booster storage battery is precharged automatically when the system power supply is switched on. A dispatcher program - which services the work of the system with keyboard K1, SID display block, perfor- ator P and FS 1501 transmitter is written into the PZU device. The keyboard of the - debu~3ging system consists of keys of the operating code ("Writing of initial ad- dress," "Writing by address," "Reading by address" and "Function") and of a key- board of a 16-digit symbol field. The "Function" operation is introduced to expand the capabilities of the system without additional apparatus expenditures. Check addition, file shift, initial start of program from given address, entry from the - photoreading device, printout of information on punch tape and conversion to pro- gram of working with Consul-250 machine can be accnmplished by using this opera- tion. 5pecific functions are introduced by means of the keys of the 16-digit key- board field. When realizing the complex debugging system, the greatest difficulties may be en- countered in organizing the integration of the Elektronika 55-122 TsW module with the peripheral devices. One of the versions of this organization is presented in Figures 2. The Elektronika SS-12 microcomputer continuously interrogates the keyboard of the complex (two keyboard racks are related to a 16-digit code and one is related to 19 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-00850R000400024412-2 FOR OFFICIAL USE ONLY r ~ ~ z t ~ 2.ao e . ,9 J 4~� ~ ' ' � 9.~nbA 8 d ' d � .f ,~ynKyue~2~ 1)H r~ N ~ ~1 11 Ij N e' ~ g , ~ C RC 2 � y~ 3 O ~ CYI ~Cun 1-d p ~p, N 4 ' CYB unm E�u pq~p K f5 lsol e 3 � vc tu i. uM ~ ~ Cmon' S Z,CmaOm� ~C R r ~na m _ ~ ~n00~~P1 +Unun ~ /!CT o un � M p nq R! p u~: d-& o.t ' M�20 4 P2 ~Z 3/!M t~ _ ; i ~ ~ l� pa~p ( 6 ) ' ~ ~ i ~ ~ P9 ~ i ~ 7 ~ +u I(9 ~a 3pM ynpal,l ` tf, C num �u pa~p a~exmpowaa- ~ a 3nN ryumqM4 37?M ~ pa~p ~ i ~ ~ 3/IM unp /6~dpoJp ii JI7Nun~l�dpa7p ~8~ ~ ~n �u r Nnq~opNauu~ ~ ~ JqN un~ om J/7M - Figure 2. Diagram of Integration of TsW Module and Periphery: Tsvykhl- Tsvykh4--digital outputs 1-4 of TsW module; Tsvkhl-Tsvkh3-- digital inputs 1-3 of TsW module; ZP, Cht, ZpBA and Function-- operating codes "Writing by address," "Reading by address," "Writing of initial address" and "Function": a, b, g-- light-emitting diode display buses; SU1-SU8--matching devices in photoreader circuit; R1-R9--encapsulated solid-state switches of control of perfora~or and selection of decoder column of EPM machine; K1-K9--encapsulated solid-state switch contacts; K11- K116--case for selecting the decoder column of EPM machine; RG--recorder-distributor; T--f lip-flop for control of FS 1501 - transmitter operation; EPM inf lr-EPM inf 7r--information from EPM encoder; FS--photoreading device; P--perforator Key: 1. Elektronika SS-122 5. Strobe 2. Function 6. Digit 3. Start 7. Control of EPM electromagnets 4. Stop 8. Information from EPM the operating code) through the diqital output Tsvykhl of the Elektronika S5-122 module. If not a single key is pressed at a given moment, the microcomputer accom- plishes dynamic display of the contents of the display buffer in 16-digit code through digital output Tsvykh2. Digital output Tsvykh3 of the TsVV module is used to connect the perforator to the debugging system. The form of retrieving the information is determined by the sub- program for working with the perforator. 20 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY Information from the FS1501 transmitter through the matching devices is entered through digital input Tsvkh2 of the module in parallel code; tr.e form of the enter- ed inforutation is determined by the subprogram. Th2 status of the console machine is interrogated through digital input Tsvkh3. The code for control of the corresponding electromagnets of the printing mechanism = is transmitted through diqital outputs Tsvykh3 and Tsvykh4 of the module as a function of the type of control code. If a code comes in that corresponds to a 16-digit symbol, the microcomputer prints this symbol and enters it in the infor- mation buffer after conversion. The described debugging system permits one to realize two important debugging func- tions in development of automated systems based on single-board microcomputers of the Elektronika S5 family which are determined by the location of the microcomputer. If the latter is located in the system to be debugged (a microcomputer is then un- necessary in the debugging complex), the periphery of the debugging complex works with the user program and permits complete debugging. If trie microcomputer is contained in the debugging complex (the system to be debugged may then have no microcomputer), the periphery of the complex is connected by the microcomputer to the facility equipment and permits debugging of the relationship of the facility and microcomputer. _ Finally, let us note two additional circumstances related to the described system. First, the use of serially produced Elektronika 55-122 and Elektronika S5-125 func- tional microprocessor modules, hardware- and software-compatible with the Elek- tronika 55-12 microcomputer, permits significant facilitation in realization of the debugging system and completion of it without some significant circuit developments. Second, although the described system assumes the presence of a rather developed _ periphery, debugging can also be carried out in minimum peripheral configuration, for example, by using only a keyboard and light-emitting diode displays. The described system replaces the scarce prototype systems based on multiboard models of Elektronika 55-02 type for most practical purposes. COPYRIGHT: Izdatel'stvo "Mashinostroyeniye". "Pribory i sistemy upravleniya", 1981 6521 _ CS 0: 1863/155 21 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 ! FOR OFFICIAL USE ONLY - UDC 658.012.011.56:002.53.001.12 MAIN TRENDS IN FORMATION OF AN ALGORITI~M AND PROGRAM FUND FOR OASU Moscow PRIBORY I SISTEMY UPRAVLENIYA in Russian No 3, Mar 81 p 5 [Article by engineer S. M. Khovanskaya] _ [Text] An increase of the efficiency of introduced OASU [Automated sector control system] and their effect on the improvement of the technical and economic operating indicators of ministry and agency subdivis ions can be achieved by standardizaticn of OASU components and automation of its design. The problem of standardization includes formation of a system which satisfies the specifics of a given facility from standard components. The use of inethods of standardization in design of OASU permits a reduction in the cost of developments, a reduction of the periods of systems development and a reduction in the number of OASU developers. Standardization of the control system components in our country is being developed in three directions: development of standard ASU [Automated control system], uni- fication and standardization of individual parts of functional and support subsys- tems and construction of ASU by use of applied program packs (PPP). Practice shows that development of standard ASU creates large complexities and is economically unfeasible since there are no completely identical ministries in na- ture. Consequently, two methods remain: unification and standardization of the individual parts of an OASU and design of OASU usinq PPP. This problem can be solved through extensive use of a centralized algorithm and program fund (TsFAP). - The PPP now available in TsFAP and oriented toward use in OASU can be divided into four groups by designation. 1. Means of organization and management of the information base of the OASU. 2. Functional subsystems. 3. Means of programming automation, 4. Means of organizing the calculating process. The "Glossary organization and managment" PPP, the "Driada" data bank, the "Ac- _ counting" PPP and the "Data" PPP belong to the first group. - 22 FOR OFFICIAL iJSE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 - FOR OFE'iCIAL USE ONLY OASU subsystems developed within the ASU-pribor system are related to functional subsystems. These subsystems can be utilized to the maximum in design of OASU of machine building. Analysis of the possibility of using subsystems in other sector _ groups (the light, local and mining industries) showed that it is impossible to in~roduce programs availabie in the fund without modifications. The circ.umstanoA that conversion to the two- and three-section structure of management has still not been completed in the ministries until now also creates great difficulty in use of the programs . The "Compiler" PPP and the "Monitor" PPP ar.e included in the group of PPP that automate the process of program development and debugging. An importan~ problem is development of an effective technology of design with ex- tensive use of the algorithm and program fund. One of the forms of automation of OASU design may be development of a so-called systems fund by groups of sectors which, unlike existing funds, should be a unified organizational system. The following facilities may be included in the systems fund: general-purpose PPP to which PPP that realize development and management of glossaries and files of ~ normative and reference information are related, development and management of data bases of current and archival information and printout of output forms and display of information; functional PPP that include those which enter and monitor account- ing information as it comes in with regard to functional features and calculation of the output indicators of PPP for orqanization and management of the c alculating - process; and a system for teaching how to work with PPP. - The developers of OASU using the systems fund will be able to realize specific management functions. In this case the degree of encompassing OASU prob lem~s with facilities of the systems fund may be close to 100 percent. Therefore, formation of an algorithm and program fund for OASU should be planned _ and purposeful. There should be no PPP in the fund that dc~ not have a high degree of universality with respect to specific functional solutions and that do not have means of adaptation to a specific medium of use by adjustment for given parameters. The need to meet the named requirements generates yet another problem: development of specific tests that check not only the functional but also the operational capa- bilities of PPP. Investigations are now being conducted by a number of scientific research insti- tutes (VNIPI [All-Union Scientific Research and Planning Institute] of OASU, Moscow, VNIIugol' [All-Union Scientific Research Institute of Coal] , Moscow, NPO [Scientific Production Association] Pishchepromavtomatika, Odessa, and so on) to develop standard software for OASU for its own sector groups,.which will undoubted- ly serve as the basis for organization of systems funds of OASU. COPYRIGHT: Izdatel'stvo "Mashinos~royeniye". "Pribory i sistemy upravleniya", 1981 6521 CSO: 1863/155 23 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY - unc ~19.6 COMPARATIVE COURSE OF THE PL~1 I,ANGUAGE (ON THE BASIS OF ALGOL-60~ Moscow SRAVNITEL'NYY KURS YAZYKA PI,~1 (NA OSNOVE AI~OLA-60) in Russian 1980 (signed to press 17 Apr 80~ pp 6-8 [Foreword from book "Comparative Course of the PL~1 Langua,ge (On the Basls of ALGOL-60)" by Yuriy Mikha.ylovich Bezborodov, in the series "Bibliotechka Program- mista", Main Editorial Boa.rd of Physical and Ma,thema,tica,l Literature ~ Izdatel' - stvo "Nauka", 65,000 copies, 192 pa,~es] [Text] In the last 15 years the ma,in, and at the begiruzing even the only algorithmic language in the Soviet Union was ALGOL-60, used both for teaching the principles of programming and for solving computational problems on computers. In recent years, however~ after the appearance of YeS computers, PL~1 (Programming Language) , which also is an algorithiai.c language, has become more and more widely distributed. In contrast with AIGOL-60, which is intended for the solution of problems of numerical analysis, PL~1 is a universa,l langua,ge which permits, in ad- dition, formulating solutions of commercial problems, problems in processing sym- bolic and binary information and ASU problems. It can be carisidered, in particu- lar, tha.t PL~1 combines the possibilities of such widespread la.nguages as ALGOL, FORTRAN and COBOL. On YeS ma,chines, PL~1 replaces ALG(7L in pra,ctica.l work, dis- placing it, which can be explaine~ not only by thie universality of PL~1 and its other merits, but also by major inad.equacies of the translator from ALGOL-60 in the YeS computer (ineffectiveness of the `transla,tor, inconveniences of the input language and especially of the input~output operators~ the impossibility of cauplin~ with other a].gorithmic languages and the absence of packages of applied programs). The present course of the PL~1 langua,ge is intended to ease for programmers the transition in their work from other computers to YeS computers and is prima.rily designed for programmers who ha,ve experience in programming in ALGOL-60 and want to become acqua.inted in a short time with the ma.in possibilities of PL~1 and to learn to program in tha,t language for YeS computer operating systems. In the course an attempt ha,s been made in teaching programming in PL~1 to use in a very essential manner the skill and experience in programming in AIGOL which the read- ers alrea,d.y have. True, besides practica,l experience, acquaintance with the terminology and syntax of ALGOL-60 also are required of the reader in tha,t ca,se [1, 2]. In Chapter 1 of the course the concepts of ALGOI,-60 and PL~1 are compared in such a way as to give the reader a conception about the creation axzd differences in the 24 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY designs of ALGOL-60 (in the standaxd versi.on) and PL~1 (for YeS computer operating systems) which have the same ~znctional possibilities. The used method of compar- isan wiil ena,ble the reader to ra,pidly sta,rt compiling programs in PL~1 within the _ range of its linguistic possibilities, whicY, intersects' the possibilities of AIGOL~ At the end of Cha,pter 1 information is presented which will help the reader prepare his own program for translation and rea.doff on the ma,chine. In Cha,pter 2 the PL~1 concepts introduced in Cha,pter 1 axe refined and, in a,ddi- tion, new concepts are introduced which are as it were a logica,l development of the ~ concepts of AI~OI,. Acquaintance with this cha,pter will enable the rea.der to use PL~1 means similar to ALGOL means in programming and will also help him to apply in complex ca.ses concepts of PL~l introduced in Cha.pter 1. In Cha,pter 3 PL~l concepts are stated which have no direct analogues with ALGOL concepts. Without them the picture of the main PL~1 resources would be incomplete and it would not be possible to compile effective programs in a broad enough area of application. At the end of the chapter those PL~l possibil~ties are listed which have not been dealt with in this course and with which the reader ca.n become acquainted from the available literature [3~4,5,10] or for very complex concepts, - from documentation for YeS computer operating systems ~6,7~8,9]� In Cha,pter 4~, a reference cha,pter, a summary is iven of built-in PL~1 functions and conversions, tables of PL~1 syntactic forms ~one of them in comparison with ALGOL)~ a list of symbols used and also other reference ma,terials. All the chapters (except the last) are accompanied by exercises, the answers to which are presented at the end of the book (sometimes one of the possible answers is given). The solutions of exercises and analysis of the examples given in the presentation of the ma.in ma.terials play a very important role in the study of the resources of the langua.ge and the acquisition of skills in compiling programs in PL~1. - Along with examples and exercises~ another means of checking the correctness and completeness of understanding of the studied concepts of the language ca,n be reducible syntactic forms, which express some properties of those concepts more clearly and graphica.lly tha.n when verbal descriptions axe used. Ana,lysis of, and, later, reference to those forms ought to prevent the appearance of syntactic errors in programs. Let us note once more that the course is oriented mainly toward practical program- mers who need not so much to become acquainted with peculiarities of the language or to study all its concepts~ as to acquire fairly ra.pidly the ability to compile real programs in it. Taking into consideration also that it is assumed tha.t the reader ha.s some experience in programming in ALGOZ, a language in a certain respect very similar to PL~l, the author thinks that a certain brevity in the account (com- pensa,ted by examples, forms and exercises~ will be desirable~for such readers. In the present course the PL~l langua,ge is described on the level of a specific representation as the input language of a version F translator for YeS computer operating systems. 25 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY The author is obliged to all who contributed to some degree to the writing and publication of th3.s book, The author especially thanks N. P. Trifonov for detailed and constructive criticism of the manuscript, and also T. N. Moshonkiva and A. K h.-M, Aldakov for numerous useflzl discussions and constant help in the work. COPYRIGHT: Izdatel'stvo "Nauka". Glavnaya red.aktsiya fiziko-matema,ticheskoy literatury, 1980 2174 cso: 1863/156 26 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY UDC 681.3.06s678 USING DATA BASES IN THE ASU TP OF LARGE-CAPACITY UNITS Moscow PRIBORY I SISTEMY UPRAVLENIYA in Russian No 3, Mar 81 pp 1-3 [Article by engineer s V. K, Sheremet'yev and A. I. Vikhter, USSR, and H. Berger, GDR] . ~ ~ [TextJ Separation of Proqrams and Data as a Basis for Standardization The applied program packsof ASU TP [Automated Production Process Control System] are rather stable in functional composition. Thus, for example, the interrogation, processing and information display modules are a realization of the simplest in- formation processing formulas and are practically identical by content in many systems. Nevertheless a la.rge number of diverse systems are being developed that perform similar functions determined to a significant degree by the different struc- ture of the information tiles. In most cases data organization is natural and is the result of pro grammers' use of individual program-writing procedures. Only the data to be processed change when a specific class of ASU TP is introduced at domestic facilities. Therefore, allocation of the variable part to a special domain, standardization of the data structure and development of facilities for formation of the data base (BD) for each specific facility should be the tasks of the systems programmer responsible for the overall ideology of software (PO) construction. Conversion of a sys tem to a domestic facility should not require significant ~ changes of software. Determination of the processes for development of programs from formation of the data base results in development of the mechanism for combin- ing the programs and datain real time (RMV). To do this, methods of constructing the data structures, organization of access to data at logic and physical levels used in general-purpose information systems, the basis of which is the concept of the data bank [1, 2], can be used in development of ASU TP software. Specifically, the language of processing control to be considered is close to the languages of data description, while the language of operator-data base communication is similar to the languages of data manipulation utilized in data banks. _ Specialists of the USSR and the GDR developed a system using a data base on the basis of the M-6000 computer complex within the framework of the intergovernmental agreement between these cowntries to develop installations of the Polimir type [3, 4J. ~ 27 - FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY The characteristics of using a data base on the example of the ASU TP of the Polimir installation for polyethylene production are considered in the article. � Special attention is devoted to design of the data base structure, organization of _ access to it at logic and physical levels and formation of the data base using special language facilities. ~tructure of the Data Base The structure of the data base and organization of access to it are shown in the . figure. The data base consists of a core, tables for describing its structure that provide access to the core at the logic level and access lists SP1-SPn to the core at the physical level. .-~l~ ~(2) ' Qocmyn Ho ~otuvrt,roN y~o6Ht E PB Aalmyn Nc muiuvecraM ~pOJHI OntPO/llop ~3~ r-_-------~ ~ nD, - - ~ np ~ __J ~J rr-== ----P~ _ �P_e--- .~voAeildl (4) ~ i rann ~ Pr r~~ c~� ~ ~pynnoQei~ ~1 --------L- ~ .~o~poKmtputmdA'u I ~ ~ r- - ~ doarlyno,rl~Q TafO ~ i ~5~ I 1 ~y ~ ~ ~ Po~nvd 2~ ~ I TaTp ~ ~ ik,o ns�~n`d ~ uNduSudyo~e~IiJ[, ~ 6ror .rapa,rmeputmu,rQ s.o.:~~ i nopaMtmpo6 ~ I da~myno I 01 16~0"~ I I ~ I HO,IOIUVICKONI I nm i I ~ ~ ll~osyt ~81~ ~ Adpo 6Q 9 I I . I ~ 9voQeNe J~ 1 Q) I HOK I ~ ~OynnoBeie xadd,~. I . ~ I mrpucmurd u~'pd L-------- JJ~O/A,rUnopOMfmp00' Structure of Data Base and Organization of Access to It: RG--generation mode; RRV--real-time mode Key: _ 1, Real-t+*�Q ~^^n~~ at logic level 2. Access at physical level 3. Operator 4. Level 1: group characteristics of access to data base 5. Certificate heading 6. Block 7. Level 2: individual characteristics of parameters 8. Tables of access at logic level 9. Data base core 10. Level 3: group characteristics of parameter processing The data base core is a combination of the certificates of the technological param- eters and the common constant files. The certificate of the technological param- eter contains all data or references to the data which are needed to process the parameter. The common constant file (MOK) combines the constants repeated for in- dividual certificates. The tables for describing the core structure identify the individual structural components of the data base. 28 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY The information in the data base is distributed in three levels (see the figure). The table of the parameter lists (TaPP) and lists SP1-SPn form the lists of iden- tifiers and the relative addresses of the certificates of the technological param- eters and are the group characteristics of user access to the data base. The set of certificates P1-Pm of the technological parameters in the data base core and the tables of access to individual elements of the certificate characterize the individual features of processing indivudal parameters. All the repeated charac- teristics for groups of parameters are allocated to the lower level in the MOK. Organization of the data base permits collective access of user programs PR1-PRn and of the operator to the i.nformation concentrated in the data base core. Structure of the Certificate Each certificate consists of a title and several units, the number of which is equal to the number of types of processing required for a given parameter. The title of the certificate serves as the external interface required to organize ac- cess of information users to the data base. It also contains information on the state of the measuring circuits of sensors of the corresponding parameters. Each _ block contained in the corresponding certificate is the internal interface with respect to the standard primary or secondary processing operator. The certificate " block actually comprises part of the standard operator and contains coefticients and placings and also the results of the work of a standard operator. These data also provide external access for making changes and to print out the results. Moreover, the block title contains features for control of the standard operator work. On the whole, the certificate is a set of external and internal program in- terfaces which link the operation of the software system. The modular principle of constructing the certificate provides independence of separate standard processing operators from the overall data structure and the specific use of the sys~em. The structure of the data base core guarantees siznple access to the information and correction of it. The information available in the certificate can arbitrarily be s~parated into control and that to be processed. Control information is used to organize preliminary processing of the information, while information to be proc- essed contains the input data and the results of processing. Moreover, one can distinguish permanent, conditional-permanent and variable information components. Permanent and conditional-permanent parts are formed during initial generation of the data base. Conditional-permanent information can be changed in the RMV by using the access equipment. Variable information reflects the status of processing the information coming from the sensors. Access to the Data Base A description of the core structure is stored in the data base to provide independ- ence of user programs from its structure and for convenience of access to the data base. The data in the base core have structures of several types: information component, certificate block consisting of the components and the certificate which includes the title and a number of blocks. 29 FOR OFFICIAL USE ONLY _ APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY Description of the core structure (tables of access at the logic level) is a com- plex of retrieval tables (TaPP, TaTO and TaTD) to which the data required to re- trieve in~ormation in the data base core are reduced. The table of the lists of parameters contains identifiers of the technological parameters and data for retrieval of the certificates corresponding to them, the table of the types of operators (TaTO) contai.ns identifiers of the ty,pes of stan- dard processing operators and the corresponding certificate blocks and the table of types of data (TaTD) contains identifiers of the types of data that are the ele- mentary units of information from which the sub-blocks and titles of the certif- icates are formed. Each of the tables describes the types of str.uctures of a specific level and consists of blocks of identical structure fixed in value and _ which form in combination the table characterizing the entire set of types. Access to the data base core is organized in a different manner as a function of the information user. To increase speed, the access of user programs to the data _ base is gained at the physical level using lists SP1-SPn of the relative addresses of the required cells. Thus, retrieval of information in real time is essentially excluded. Lists of relative addresses are formed by the generation system using the tables which describe the structure of the data base core. When service personnel responsible for modification of the data processing system with regard to changing a production situation gain access tr~ the data base, data retrieval occurs in real time according to the tables for description of structure. This permits one to use parameter identifiers. The rate of access should have no special significance since this access does not have high priority. Thus, the rate of access to the data is provided in the first case and convenience of access is provided in the second case, although the process of linking programs to data itself is identical. The difference is only in the fact that information retrieval is related to the generation process in the first case. The distinguishing feature of the data base for an ASU TP is joining of the refer- ence function and the information restoration function. To economize on machine resources, the information coming from the sensors is restored directly prior to being given to the user. Thus, interrogation and preliminary processing of in- formation are aooomplished only if there is a corresponding request. Processing Assignment Language A special language similar in form to forms of the "fill in the blank" type, is used to enter input data and to assign processa.ng of it. But unlike forms with fixed positions and riqid format of macroinstructions, it is similar to free for- - mat languages. The immediate significance of the data follows immediately after the identifier which determines the type of input data. A restriction is observ- ance of the required sequence of identifiers. Precise observance of the format aiid the number of spaces between positions is not obligatory. The processing assignment for each production parameter is described alternately in this language. The data required to generate the tables of access to the data base and the titles of the certificates are described in the first part of the 30 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFYCIAL USE ONLY assignment and then the data required to realize individual types of process- ing (correction of flow rates, scal,ing and so on) are described in specific se- quence. Up to 25 types of processing of parameters is provided. Each parameter utilizes its own set of types of processing. Thus, the sequence of the types of processing determines the assignment for processing each parameter. Data Base Generation Information entered by means of the processing assignment language is converted during generation and the data base core and some tables of access to it are formed. Thus static adjustment of the system for specific parameters of the facility is accomplished. The generation system has a modular structure and consists of a core and set of generators, each of which generates blocks of specific types. The set of generated blocks can be changed by replacing the generators. Generation of an entire system is accomplished in five steps. The first two steps are used to convert the expressions of the input language to some intermediate language in which the specific structure of the data base is not yet reflected. Conversion from the intermediate language to the internal structure of the data base is completed only in the fourth step of generation. Z'herefore, utilizing dif- ferent modifications of fourth-step programs, one can create different versions of data base structure. The software system is qenerated by using both the pack and dialogue modes. The latter is used to control the generation modes and operational corrections upon detection of errors. The system can be generated directly at the computer complex installed at a facil- ity to permit one to make chanqes directly during introduction ~f the system at the production facility. - Language of Maintenance Personnel Requests A special language is used to correct the data base and to organize access of main- tenance personnel to it. The language facilities permit callup onto the display screen and to print information from the data base that characterizes the status of individual units and of the installation as a whole in digital and graphical form, to call up complete information from the data base about a single production param- eter, including the preliminary processing constants, results of processing and so on, check and modification of individual components of the data base, inclusion and - exclusion of any production parameter to and from processing, for example, with regard to repair of a sensor, receipt of a list of the measurement points related to a single cycle and transfer of a measuring point from one interrogation cycle to another, elimination or inclusion of individual functions of the system, pro- � grams for display o utput or for printing individual forms of information display, printout of information about malfunctioning sensors upon callup and entry and changing of the time parameters of the system (entry of systems time, changing the time of information restoration on the display and so on). ~ _ The language is open for increasing the number of requests. The main components of the language are the type of request, the identifiers of the certificates of 31 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY production parameters, the blocks of the certificate and the components of the blocks. When individual components of the data base are summoned and corrected, tables of access at the logic level are used (see figure). Z'hus, for example, - the identifier T 6036 GA GI is used to retrieve the upper temperature setting with number 6036. The certificate is retrieved by using the TaPP according to the designation of production parameter T 6036, the required block is retrieved using the TaTO and the name of the GA block (the block of exceeding emergency boundaries) and the component inside the block is retrieved by using the TaTD and the name of component GI (the upper emergency boundary). In thvse cases when high speed is required, for example, when restoring information on the screen, access is gained at the physical level. Conclusions A system in which a data base was used as the basis was checked in the confection- ery shop of the Production Association Polimir imeni 50-letiya Belorusskoy SSR - (Novopolotsk). The following functions were realized in the system: interrogation of the low- and medium-level sensors, preliminary processing of analog information, diagnosis of the operation of the inteirogation and preliminary processing subsys- tem, recording of malfunctions in the circuit of the monitoring and measuring de- vices, signalling of deviations from the norm, writing a report of the course of the F,.^oduction process, presenting information to the operator on displays and calculation of secondary indicators. The use of a data base provided convenience of static and dynamic adjustment of _ ~he system, opera~ional rearrangement of the latter as changes were made in the instrument ancl ~r;~duction equipment and a considerable saving of inemory. Static adjustment of ~i~kze data base for processing specific production parameters and for realization ~f a~iven set of functions for each parameter are accomplished by using a generation ~~.~stem. Dynamic rearrangement of the operation of the system in real - time is acc~::1_.~.~.ished by entry of tasks through the display. Tests confirmed the correctness of the adopted engineering solutions. The system - as a whole showed good adaptability to the conditions of the specific object due to the use of a centralized data base and i.s now being developed further on the basis of using a unit system of software ~nd hardware of the SM EVM [International Small Computer] series. Bibliography BIBLIOGRAPHY 1. "Informatsionnyye sistemy obshchego naznacheniya" [General Purpose Information 5ystems], Moscow, Statistika, 1975. 2. Martin, J., "Organizatsiya baz dannykh v vychislitel'nykh sistemakh" [Organiza- tion o:: Data Bases in Computer SystemsJ, Moscow, Mir, 1978. 3. Vol'ter, B. V., V. K. Sheremet'yev, and A. D. Lesovik, "Standardi~stior, of Communications in the Software Structure of the ASU TP Monitoring System," PRIBORY I SISTEMY UPRAVLENIYA, No 1, 1975. ~ , 4. Sheremet'yev,~~�K. and H. Berger, "'Phe Structural Approach to Construction of " Software of Info_:nativ:~ Functions of the ASU of a Large-Capacity Installation," VCPROSY PROMYSHLENNOY KIBERNETIKI, No 48, 1976. COPYRIGHT: :zd~itel'stv~ "Mashinostroyeniye". "Pribory i sistemy upravleniya", 1981 6521 CS 0: 1863~155 32 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY i~IULTIPROCESSOR SYSTEMS STATE COMMISSION ACCEPTS INSTITUTE OF CYBERNETICS DESIGN b'OR MULTIPROCESSOR SUPERCOMPUTER Moscow SOTSIALISTICHESKAYA INDUSTRIYA in Russian 19 Feb 81 p 2 [Article by correspondent Zh. Tkachenko: "Computers and Systems"] [Text] A State Commission has accepted the design of a new, high-performance, multiprocessor computer. The computer is unlike any other in the world. T. Mar'yanovich, Party committee secretary at the Institute of Cybernetics of the Ukrainian Academy of Sciences, relates: "At the institute we have also created the latest automated systems for various levels." This concerns systems to control separate technological processes, enterprises, large territorial associations and sector complexes. During the past f ive years the introduction of developments made by this advanced group of workers has produced an economic effect of 195 million rubles. CSO: 1863/23-P 33 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR UFFICIAL USE ONLY UDC 518.74:007:57 CONSTRUCTION OF ALGORITHMIC LANGUAGE FAMILIES FOR PROGRAMMING AND DESIGNING MULTIPROCESSOR COMPUTER SYSTEMS Kiev KIBERNETIKA in Russian No 1, Jan-Feb 81 (signed to press 13 Feb 81) pp 1-7 [Article by Viktor rlikhaylovich Glushkov, academician and director of the UkSSR Academy of Sciences' Institute of Cybernetics, Kiev, Yuliya Vladimirovna Kapitonova, doctor of physical and mathematical science, laboratory director, Institute of Cybernetics of the UkSSR Academy of Sciences, Kiev, and Aleksandr Adol'fovich Letichevskiy, doctor of physical and mathematical science, section chief, Institute of Cybernetics of the UkSSR Academy of Sciences, Kiev. Received by the editors on 16 Nov 1980] [TextJ In articles [1] and [2], a method of formalized technical tasks for design of discrete systems was proposed. Use of this method for design of this particular class of systems requires development of mathematical models of this class of sys- tems, methods and facilities for solving the basic problems of design of analysis, synthesis and optimization, as well as language facilities for representation of the systems being designed at the various stages. A review of mathematical models and some methods for solving the basic problems of design of multiprocessor systems was made in article [3]. Here we shall consider the language aspects of design of multiprocessor system circuitry and software by the method of formalized technical tasks. The diversity of inethods and means used in the various stages of design leads to the need of organizing language facilities into a family of coordinated languages that have a varied functional purpose. Independent development of various types of language facilities (problem orienta- tion, functional and procedural languages, machine-independent and machine-oriented languages, etc.) prevails to a great extent in today's practice of programming. - Attempts to unify the diverse facilities and construct "large" languages such as PL/1, ALGOL-68, ADA and others, even though they achieve conveniences in some cases, have at the same time considerable shortcomings, not the least among which ar e the difficulties of efficient realization. Use of different algorithmic languages requires a coordination of them that would provide the capability of transfer from one language to another at different levels of realization, as well as the capability of using the programs written in the dif- ferent languages within one system. Coordination of languages of a family is pro- _ vided by the common character of the mathematical models behind their semantics, and the couunon requirements that express the relationship between the user, the - language and the system in which the language is realized and used. 34 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-44850R000400024412-2 FOR OFFICiAi. USE ONI,Y This article is a generalization of the experience of the development and use of language facilities in the activities on computer software by the UkSSR Academy of Sciences' Institute of Cybernetics. It also contains the methodological principles . for developing algorithmic languages for new computer systems under development with the participation of the Institute of Cybernetics of the UkSSR Academy o� Sciences. Formation of the point of view presented in this article was influenced by the ideas of today's technology of programming clearly expressed in the "Works of the Working Conference of the IFIP [International Federation of Information Processing]" [4]. The PASCAL language was selected as the basis for traditional language constructions [5]. � Let us note that the idea of creating a family of coordinated languages for parallel programming is also discussed in article [13], although from somewhat different starting positions. This work may also be labeled a sufficiently complete review of today's facilities for parallel programming. Classification of Languages of a Family - Languages of a family are classified by several features. _ The first feature corresponds to program concept levels. The following four basic concept levels are distinguished: --problem; --functional; --sequential-algorithmic; and --parallel-algorithmic. The problem level is used to define the classes of objects ~zith which the program - operates and their properties and the formulation of the problem that the program solves. A problem program expresses a requirement of constructing objects meeting particular properties and in particular relations with source data. The functional level is used to define the functions computed by a program. At this level, recur- sive functional definitions are widely used. A functional program requires compu- tation of values of particular functions for particular values of arguments. The sequential-algorithmic concept level defines a program as a means of generating sequential processes of computations ~ith the information medium in which the program operates. The parallel-algorithmic level defines the aggregate of sequential programs or de- vices (modules) functioning synchronously or asynchronously, interacting among them- selves by exchange of data and control information (messages). - Facilities of different levels may be used in one and the same program. Therefore, the referral of a language to a particular level is not stringent and means that the facilities of a given level are most developed in the language in question and comprise its methodological basis. From the point of view of compatibility, it is convenient to consider any program as a program of the parallel-algorithmic level, isolating the other levels as special cases. A sequential program may be considered as a parallel program consisting of one module, and a functional or problem--as a . sequential program defining the single step process of computations (nondetermined, generally speaking, in the problem case). - 35 FnR OFFI('iAT. ?f,4F. (1Ni.Y APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-00850R000400024412-2 - FOR OFF(C.I~~L USE ONI.Y The second feature for classification of language families involves the orientation to methods of realization. Let us distinguish the following basic methods of realizaCion: interpretation; translation; complexing of off- the-shelf modules; and hardware circuit implementation. Languages may be classified by orientation to problem classes. This classification may be rough (numerical programs, string processing, data base management, etc.) or more refined (problems ~f linear algebra, optimal control, translation, designing of specific classes of objects, etc.). Finally, an important feature of classification is the orientation to the user, for example: the applications programmer; the systems programmer; and the hardware developer. _ Data Types Scalar types are defined just as in the PASCAL language. They include logic (bit) values, number and symbol sets and finite sets of objects that are specif ied by a listing of the designations of the elements of these sets. Additional scalar types may be included in system programming languages to dPSignate parts of machine words (byte, halfword, etc.), addresses, names, etc. Structural types, in the final analysis, are made up of scalar and are divided into types of strings and f iles and the language and theoretical-set types of the compo- nent objects. Structural types are also divided into static and dynamic. All static type objects have identical dimensions and the value of each variab le of the static type may be stored in some previously assigned, connected region of storage. The dimensions of this region are defined at the time of the program call and may depend on the values of the actual parameters of this program. On the other hand, dynamic type obj ects have no fixed dimensions, and the memory for storage of values of a dynamic variable must be assigned in the process of program operation. In addition to these types, there are special structural types in a language for input- output operat~ons: input and output files. Strings are sequences of s}rmbols or bit strings with a fixed dimension. Static type strings have a f ixed length. The length of dynamic type strings may vary. Basic operations on static type strings allow only symbol-by-symbol processing, while complicated operations such as paCtern recognition and substitution may be made on dynamic strings. Arrays. The concept of an array as used here gener3lizes the tr3ditional concept of a rectangular array with integral subscripts. An array is a mapping of a set C, called the domain of arrangment, into the domain of data D of a particular type. _ The range of definition of an array A~C ~ D (the sign of inclusion indicates - that A is a partial mapping from C into D) is always assumed as finite. The array - type is defined by the D type of the values of its elements, the domain of arrange- ment of C and the set C~ ~ C, which limits the range of definition of this array. 36 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 . i FOR OFF[CI~L USE ONLY The domain of arrangement is usually a Cartesian product C= C1 X...X Cm scalar types or types of strings, and C~ = Ci~~ X...X Cmo~ is the Cartesian product of ty-pes contained in C1, C~. The number m is the dimension of the array. A conventional rectangular array is obtained if C1 = C~ = Z is a set of integers, and C~~~, C~~) are f init e intervals. The finite set CQ is neces- sarily indicated for static arrays. Fo r dynamic arrays, Cp = C. The dynamic array concept is usually applied f or representation of large volumes of data that may be arranged in external storage (on disks) . Access to array elements is determined, as usual, using variables with subscripts. However, in additic~n to operations on e lements of arrays, operations on arrays may be performed. Taken as the basis is tl~e set of operations defined in [6] and which includes elminations, overlay, shifts and element-by-element operations. - - Component objects are used to represen t heterogeneous data. The static component corresponds to the c4ncept of notation in the PASCAL language. Dynamic components are def ined in articles [7] and [8]. The concept of a dynamic component has a number of advani:ages ~ver the corresponding facilities in the ALGOL-68, PASCAL and PL/1 languages. First, it makes it possible to operate with components con- sidered as a single whole, and not only with elements of the components. Second, the concept of a component is independ ent of representation and may be considered an abstract type. Let us consider the definition of a component object. Let SZ be some set of elements called marks. (Arnost`)--a nonnegative integer--is specified for some marks. I~a.rks of (arnost') 0 are used to desion ate primary components and may, generally - s~eaking, include any scalar types of d ata. A component ob~ect is an oriented - multigraph with an isolated initial ve r tex, in the set of vertices of which Q has been assigned the function of marks cc, which maps the set Q into SZ. If the mark a(q) of the vertex q has a positive (arnost') m, then m arrows come out from this vertex and they are all numbered with d~.fferent natural numbers from 1 to m. If the (arnost' ) of the mark is not specif ied, then the number of arrows may be arbi- trary. All vertices of the component must be accessible from the initial. Also - discussed in [8] are (klubki) of component ob~ects. A set of components is called a(klubok) if together with each objec t it contains all its subobjects, and if the initial vertices of two components coin cide, then these componenf:s also coincide. ~iarks of components are consisered ope r ations for forming complex objects. The algebra of components, which is obtain e d with a consideration of these operations, _ forma the basis for defining computatio ns wi.th components. It is also used to define the external language represent a tion of component objects. Language ObjectG. =,:,r external representation of data, first of all component objects anc~ :;~rings, data language is u sed. It is not fixed and various programs may be P~~usted to various data languag es through the use of special facilities Fo:. describing the syntax. Objects tha t allow description in data language are called language objects. Strings and c omponent objects are used for their internal - representation. Elements of algoritiimic languages of a family may be i.mbedded in the data language. This makes it poss ible to use languages of a family as lang~-ages ror de~ioning algorithms. 37 FOR OFFICI.~L USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850ROOQ4QOQ2Q012-2 FOR OFFICIAL USE ONLY Theoretical set structures are used, first of all, in the initial stages of development of algorithms, in particular, at the problem and functional levels. They include sets, relations and functi~ns constructed with the operations per- mitted in the language. Set elements may be any data structures already defined in the language. Theoretical set types of data are considered abstract types of ~ a special form. In the final analysis, theoretical set objects are realized that can be used in algorithms may be indicated at the intermediate level of development. The general methodology for introduction and use of theoretical set data structures is described in [9]. Information iied~um and Structure of the Program It is assumed that languages of a family are realized in a system that uses a specific organization of orograms and data. A prototyne of this organization is the organization of the PROYeKT system [lOJ and its realization the PROYeKT-YeS which was i.mplemented in recent years on machines in the Ye5 [unified system] series. Each object that is input into the system, be it a ~rogram or data struc- - ture, is input into the information medium of the system and changes its status, ~ahich is defined by the aggregate of the objects put into the system earlier and the links between these objects and the adjustable mechanisms f or processing and using them. isan and sy~tem interact with high-level languages which include: directive languages; data languages; and ~ algorithmic languages. ~11 objects of the information medium are divided into information libraries. Each inf ormation library contains the programs and data used in solving some problem or class of problems. In particular, an information library may correspond to a pack- age of application programs that use a certain form of organization or a system of programs for some applied field. Each information library may be adjusted to its own languages (directive, data and program). In addition, an infonnation library is adj usted to the particular types of obj ects that caay be in it . An information library is divided into sections, each of which uses its own system _ for na~ing ob~ects and the link between them. A section of an inf orm2ticn library consists of modules which are divided into basic and subordinate. Basic module nanes are called global. These names may be used directly by all modules of the section. Each basic section may have modules subordinate to it. These modules are given local names which are collected into the local nomenclatures of the basic module. Tr~TO basic modules may use comnon local nomenclatures if this is indicated when they are put into the system. Local nomenclatures may be divided by types of named ob~ects. External representations of names in these no~nenclatures may coincide. They are distinguished in texts by the use of names of types. Values of local names are directly accessible from a basic module and ~.oaules subordinate to it. Linkage between the various information libraries and sections can organized by - the use of complex names (name of tt!e inforrsation library, name of the sc:.~ ~cn, name of the basic module, type and local name). In the process, it must be kepc: ~.~t mind that calls to other basic modules, sections or information libraries are more costly than calls within one basic module. In addition, such calls must ~eet cer- tain limitations imposed by the diversity of languages and nomenclatures used. ~Sodules are divided into program and data modules. The external representation of a program module consists of a title, descriptions and a statement. Indicated in - the title are the formal parameters used in calling a given module from others, and information on subor3ination. Some descriptions of a basic module are common to 38 FOR OF'FIC[AL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850ROOQ4QOQ2Q012-2 FOR OFFICIAL USE ONLl' all modules subordinate to it (exactly what kind is determined by the programming languages uged). Problem Level Descriptions at the problem level have the nature of mathematical def initions. Defined are the necessary types of data, among which the basic role is played by abstract and theoretical set types, objects, variables, functions and subroutines. Descriptions at this level may be incomplete; for a function, for example, perhaps only its designation, type of arguments and type of value are indicated. To con- - struct objects and formulate conditions, theoretical set constructions, quantifiers, - recursive definitions and other facilities of the language of mathematics are used extensively. As the basis for formalization of these facilities, the facilities of = the language of the theory of a system for processing mathematical texts may be used [11] and [12]. A reasonably restricted language of the pro~rlem level may be realized directly through translation, interpre~ation or complexj.ng of programs from off-the-shelf modules. The capabilities of parallel data processing in a _ multiprocessor system are derived in the process directly from the definiCion of the conditions which the obj ects being designed must meet. In particular, parallel _ computations permit theoretical set operations, checking of conditions that contain quantifiers, etc. Richer languages are used to formulate the initial technical tasks which in turn are used as data for design programs. These programs make it possiUle to effect suc- cessive ref inement of the algorithm being designed through construction of inter- mediate realizations of types of data, statements, functions and subroutines, to perform optimizing transformations, and check the dynamic and static properties of the program being designed. Functional Level _ The basic facilities of this level are recursive functional definitions which may be represented by systems of equations of the form: fi(xl, Xn) = Fi~fl~ fm, xl, Xn)~ i= 1, m, where fl, f~ are unknown (determinable) functions, and Fi are expressions constructed from sycr.bols of the unknawn functions, arguments xl, xn and constants. The smallest fixed point is considered the solution. To calculate t~e value of f i(al, an), each equation is developed into an infinite tree and analysis of computations occurs si.multaneously along all branches with the specified set of values of the arguments. If the width of the tree is sufficiently large, ~ then parallel computations may be organized. Especially important is the case when the unknown functions fl, fm are arrays, and the sets of values of the argu- ments (xl, xn) traverse some subset E[ C of ~he domain of arrangement of C. For example, let there be a need t~ compute the value of the arrays fl, f~ at all points of the domain E. The possibility of parallel computations is now deter- mined by the width of the front of the wave F.k ~ E, which consists of those sets (xl, xn) ~ E, for which the value of all functions fl, fm in the k step can be simultaneously computed. If the front of the wave is sufficiently large, then parallel computations can again be organ3zed. As applied to the arrays, the system of functional equations may be brought to the structural form: 39 FOR i: FFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY fi = Fi (fl, fm)~ i= 1, m, where Fi are expressions in the algebra of the arrays [6]. T~he functional level also includes facilities for transfo.rnation of component objects and strings using systems of relations. Called a relation is the equality of the foYm F(xl, xn) = G(xl, xn), where F and G are expressions in the algebra of the component objects, and xl, xn are parameters. This�relati~n is said to apply to the component object S, if there exist obj ects al, an such that S= F(al, an), and the object G(al, a~) is called ir. the process the result of the application of this relation to S. The equality of the components in the process may indicate either their isomorphism or equivalence. In the ge~reral case, the relation may,be supplied with the condition P(xl, xn), which the sought objects al, an must meet. If it is necessary to apply a system of re- ' lations to all subobjects of some component, then parallelism may be used botYi to check applicability and to apply the relations simulataneously to several subob- - jects. The technique of applying relations was developed in the ANALITIK language (14] and the programming languages of the PROYeKT system [10]. Problems of parallel realization of relations were studied in article [15]. The facilities of the functional level may be used in combination with the facili- - ties of both the problem and the sequential-algorithmic levels. In the latter case, ad3itional possibilities of parallel processing emerge through use of the overlap technique [3] for the sequentially executed parallel statements. ~ Sequential- and Parallel-Algorithmic Level The basic facilities of the sequential-algorithmic level do not differ fundamentally from the standard facilities of traditional programming languages, except that use of certain types of parallel statements (parallel or group assignsnent, for example) is permitted. Let us examine the parallel-algorithmic facilities. A mathematical model of a parallel program is a multilevel network of algorithmic modules with a variable structure [3]. The concept of an algorirhmic module is derived through combination of two concepts: of a program that describes the functioning of a module, and of a - component [komponenta]--of a location where the given program is executed. In the same component, different programs may be executed at different times. Descriptions of the components and the programs executed in them are placed among the descrip- tions of the parallel program which itself represents control of this network and is called a control program. Programs situated within the control are called sub- ordinate with respect to their own control program. Since multilevel control is permitted, subordinate programs may be controlling with respect to programs at a Iower level. A program is combined with a component by a control program by using the initializa- � tion statement VYPOLNIT' PROGRAMMU A(xl, x~) V KOMPONENTE K.[execute program A(x~, in component K]. If component K is free at the given time, then - 40 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFI~'IAI. USE ONLY the program A is put into this component (or initialized in it) with the actual parameters x1, m. If another pragram is being executed in K, then the state- ment A(xl, xm) goes to the queue and will be executed in K after completion of the program already in it and all the programs that are already in the queue. If only one program is always executed in some component, then the description of this component and the program may be combined in one description. Such a compo- nent begins operating automatically simultaneously with the call of the control program. Interaction of Components. To describe interaction of components in the process of their parallel operation, two basic mechanisms are used: direct exchange of infor- mation and us e of common memory. Direct exchange of information occurs with the use of static and dynamic links between the components.~ Static li.nks are described just as in the ALGORITM language [10]--through indication of identification between input and output vari~b les 1 (channels of the components). Descrj.ptions of these variables are included in the descriptions of the components. An input (output) variable of a component must be ~ assigned tihe,:,s~ec~.fic type of data that is transmitted through the corresponding channel. Iri`~'addition, these variables are assigned specific properties that describe the data transmission method (control variables, informational, with buf- fering, queues, etc.). Descriptions of input and output variables, j ust as the other descriptions placed in the description of the component, may be used in the programs executed in the given component. To facilitate automatic inclus ion of these descriptions in a program, components having an identical description, are assigned a type. This type may be described separately, and its name may be used to simplify descriptions of components and corresponding programs. If the type of program does not correspond to the type of component in which it must be executed (for example, the program has its own input and output variables), then the corres- pondence between them is established by including additional information in the initialization statement. Dynamic links are not explicitly described, but are formed during execution of ex- change statements. Two types of exchange are differentiated: transmission of messages and exchange of data. Messages are transmitted using the statement: PEREDAT' SOOBSHCHENIYE X PROGRAMMEE A(K) [send message X to program A(K)], where - A is the program name and K is the component name. During execution of this state- ment, a dynamic link is established between the given component and component K, and message X is sent through the corresponding channel and written in the message buf- fer for component K. Access to messages received for the given program A is possi- ble only during operation of this program and is realized by using the statement: ~ OBRABOTAT' SOOBSHCHENIYE [process message]. ~ ' The structure of inessages which components exchange betw~er~ themselves is described in the control program and is common to all components and programs subord inate to it both directly and at lower levels of control. Data is exchanged by using two statements: PEREDAT' DANNYYE X PROGRANIME A(K) [send data X to program A(K)] and PRINYAT' DANNYYE Y IZ PROGRAMMY B(M) [receive data Y from program B(M)]. These two statements correspond to each other. Estab- ' lishment of a link and transmission of data X from component K t~ component M wi1l . 41 FnR nF~rrr,?~ rrc~ nu~ v APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY occur at the moment when simultaneously, program B executes the corresponding data transmission statement in component M and program A executes the receive statement in component K. Data X is written in area Y. Before this moment, execution of each of these statements is in the wait state. To reduce the waiting period, the apparatus of inessage transmission with interrupts may be used. The corresponding statement has the form: PEREDAT' SOOBSHCHENIYE X PROGRAA'Il~4E A(K) S PRERYVANIYEM ~ [send message X to program A(K) with interrupt]. Execution of it halts the opera- tion of component K and initiates execution of the interrupt program, which in this case must be described in program A. If the gap between execution of the exchange statements is expected ~o be long, then the components may be synchronized between themselves, exchanging messages on readiness to send and receive data. - - Facilities for interaction of parallel processes are easily expressed in terms of the dynamic interaction of components in such models as, for example, Hansen's model [16], which we believe c~osest to o,ur considerations. Let us note that interaction with the use of dynamic links corresponds more to program realization, while static links are used more extensively in designing hardware. The combined use of both facilities is the basis for joint design of computer circuitry and software. Common memory for components of one level is def ined by descriptions of those - variables that have the special OBSHCHAYA [common] feature. In addition, data from an information library is accessible to a11 programs. A call to common memory occurs during execution of a statement of assignment, checking conditions in condi- ~ional statements, etc. Conflict calls are queued. In addition, the OTKRYT' [open] and ZAKRYVAT' [close] statements make it possible for some program to seize certain sections of common memory for a time. Partial se.zure is also possible, for exam- ple, ZAKRYT' DLYA ZAPISI (CHTENIYA) [close for writing (reading)]. Control. Description of a large number of homogeneous components may be facilita- _ ted by use of arrays of components, the dimensions of which may depend on the _ actual param~ters of the control program. Fully decentralized~ functioning of com- ponents corresponds to the dummy statement part of the control program. In this - case, each component must be described along with its program and all components begin operating simultaneously at the time of the call of the control program. A program ends its operation at the time when all components end operation. In the case of the nontrivial statement part, a control program may execute initi- alizaCion of operation of components, interrupt their operation, track the end of ~ operation of components, check cunditions of their operation, etc. In addition, a control program may change the structure of links between components, and eliminate and introduce new components from a previously described reserve. St:.].1. another facility for dynamic change of structure involves the dynamic call of programs. Any program maq call any other program described at the same or higher level of the hierarchy. In some cases, a call is permitted with lower levels too. Dynamic calls may occur recursively. With a call of a parallel program from con- tro1, a change in the structure of the components occurs through addition of new components which are eliminated when the called program ends operation. Use of the apparatus of checkpoints makes it possible to organize interaction of coprograms. 42 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFI~.IAL USE ON1.Y Conclusion This article presents approaches to constructing a family of coordinated algorith- miC languages for design of multiprocessor systema circuitry and software, which are - under development at the Institute of Cybernetics of the UkSSR Academy of Sciences. Several representatives of this family have now been developed. They include: the ALGORITM-80 language oriented to joint design of hardware and software, the MMrP multimodular programming language that belongs to the parallel-algorithmic level, and the AMK arithmetic macroconveyor language pertaining to the problem-functional level and oriented to the problems of computer mathematics. The latter two languages are intended for programming recursive computers [17]. References 1. Glushkov, V. M.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Theoretical Principles for Design of Discrete Systems," KIBERNETIKA, No 6, 1977, pp 5-20. 2. Glushkov, V. M.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Use of Methods of Formalized Technical Tasks for Design of Programs for Processing Data Structures," PROGR~fIROVANIYE, No 6, 197$, pp 31-43. 3. Glush~o~;"'V. M.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Theory of Design of Circuitry and Software for Multiprocessor Computers," KIBEitNETIKA, No 6, 1978, pp 1-15. - 4. "Design of Reliable Software," in "Trudy rabochey konferentsii IFIP" [Works of the Working Conference of the International Federation of Information Process- ing], Novosibirsk, VTs SO AN SSSR [Computing Center of the Siberian Branch of the USSR Academy of SciencesJ, 1977. 5. Wir*h, N. "Sistematicheskoye programmirovaniye. Vvedeniye" [Systematic Program- mii.ig: An Introduction], Moscow, Mir, 1976, 183 pages. 6. Glushkov, V. M.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Data Structure Theory and Synchronous Parallel Computations," KIBERNETIKA, No 6, 1976, pp 2-15. 7. Gorokhovskiy, S. S.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Programming Facilities and Solving Logic Problems in Software Systems, Basic Concepts of the [word illegible] Language," KIBERNETIKA, No 3, 1974, pp 27-47. 8. Glushkov, V. M. and others, "Basic Instrumental Language of Programming," (Preprint of Institute of Cybernetics of the UkSSR Academy of Sciences, No 79-22), Kiev, 1979. "Programming in the L2B Language," (Preprint of the Institute of Cybernetics of the UkSSR Academy of Sciences, No 79-23), Kiev, 1979. 9. Glushkov, V. M.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Instrumental Facilities for Design of Programs for Processing of Mathematical Texts," KIBERNETIKA, No 2, 1979, pp 37-42. 10. Glushkov, V. M.; Kapitonova, Yu. V.; and Letichevskiy, A. A., "Avtomatizatsiya proyektirovaniya vychislitel'nykh mashin" [Automation of Design of Computers], Kiev, Naukova dumka, 1975, 232 pages. 11. Glushkov, V. M.; Kapitonova, Yu. V.; Letichevskiy, A. A.; Vershinin, K. P.; and Malevanyy, N. L., "Constructing a Practical Formal Language for Writing Mathematical Theories," KIBERNETIKA, No 5, 1972, pp 19-28. 43 FnR (1FFTrt e r r rcF nNt v APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR ()FFICIAL USE ONLY 12. Glushkov, V. M. "System for Automation of Proofs (SAD)," in the book "Avtomatizatsiya obrabotki matematicheskikh tekstov" [Automation of Processing of Mathematical Texts], Kiev, Institute of Cybernetics of the UkSSR Academy of Sciences, 1980, pp 3-30. 13. Kotov, V. "parallel Programming Laaguages," Part 1, KIBERNETIKA, No 3, pp 1-12; Part 2, KIBERNETIKA, No 4, 1980, pp 1-10. 14. Glushkov, p, M.; Bodnarchuk, V. G.; Grinchenko, T. A. and others, "ANALITIK (Algorithmic Language for Description of Computer Processes with the Use of Analytic Transformations)," KIBERNETIKA, No 3, 1971, pp 102-134. 15. Shevchenko, V, p, "Parallel Computations in the Algebra of Component Objects," "Automated Extracts of Dissertations of Candidates of Physicomathematical Science," Kiev, KGU [Kiev State Universi~y imeni T. G. Shevchenko, Order of Lenin], 198Q, 20 pages. 16. Hansen, p, g.~ ~~Distributed Processes: A Concurrent Programming Concept," CACM [Communications of the Association for Computing Machinery], Vol 21, No 11, 1978~ pp 934-941. 17. Glushkov, V. M. and others, "Recursive Machines and Computing Technology," IF~P Congress-74," Stockholm, 1974, pp 65-70. CQPYRIGHT: IZDATEL'ST~JO "NAUKOVA DUMKA", "KIBERNETIKA", 1981 8545 CSO: 1863/149 - 44 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-00850R000400024412-2 FOR OFFICIAL USE ONLY VOICE RECOGNITION/SYNTHESIS MIr1I-COMPUTER VOI CE COMMUNI CATION SYST~I Moscow PRIBORY I SISTLMY UPRAVLIIVIYA in Russian No 1~ Jan 81 pp 13-11~ [Article by engineers V.K. Kucherenko and I.1t. Kucherenko: ~~Mini-computer Speech Communication System"] " [Text] This article examines an experimental system of voice communication ~rith mini-computer~ consisti.ng of aubaystems for segmented recognition of speech forms and the segmented synthesis of speech transmisaions. The speech communi.cation system is SM-1 mini-computer based and operates real time. A feature of the system described is the uae of interval durations between nulls in the speech signa].~ and also between adjacent points of local extremes of the speech signal. _ l~le ~11 review several general questions arising in the development of the computer based speech communication systems~ specifically a number of limitations which are being de-bugged for subsystems(routines) involving apeech form recognition and also synthesis of speech communications~ ereated for pratical application. The most substantial limitation is associated with the recognition time for speech form and synthesis time for speech communications~ both of which must be rather low i.n order to realize one of the basic advantages of speech communication: convenience and speed of data transmission from the user to the computer and conversely. Another limitation for t,he speech form recognition routine results from require- ments imposed on pror.unciation conditions for voice communications and speakers [1]. Necessary requirements for the practical appZication of speech communication with computers in several small systems include also low cost of the speech communication _ system and small size. Idaturally~ a sufficiently flexi.ble and powerful computer system with the use of speech communications must permit simultaneous interface with several independent users working at their own terminal s. One of the ways to effectively solve this problem linked with the continual drop in the cost o~ mini-computers i~ to supply each terminal with a micro-computer~ whose functions include analysis and synthesis of the voice signal. 45 ~ FOR OFI~~iCIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY t4oreover, in small local systems not linked to powerf`tz7. computers~ the use of speech communications systems is possible with micro or mini computers. However~ _ use of the latter in developing efficient speech communications aystems with computers is difficult~ a situation explained by the relatively low rate of operations in the inexpensive micro oomputers and their low-volume current memories~ which result in a cor.siderable limitation of the reco~nition algorithm~s computing efficiency and of the entire set of speech communications programs. Thus, posing the task of developing speech communicai:ions systems w~.th computers for practical application leads specifically to the problem of bui.lding these micro and mini computer based systems. One of the important features of the speech communication system also is the capability for the current variation and expansion of the differentiated and synthesized speech communications compositions. - The article further examines the e~erimental speech communications systems with the mini computer developed by the authors~ easily incorporating various types of mini and micro computers and operating real time with a high speed capacity of 150-200~000 operations per second for the processor, The system described utilizes a SM-1 mini computer and an "Yelektroni_ka-60~~ micro computer. In utlizing the miero computer~ all archive a.~d program sets forming the mininal configuration speech communication syatem are situated in the micro computer's current storage. Minimum memory capacity necessary for speech form recognition routines is 4K 16-bit words~ which permite the recognition of several dozen commands. The minimum memory volume required for the apeech communications synthesis routine is dependent upon the vocabulary and prnnunciation quality of ~ speech and amounts to ~---21.K. In developing the micro ~?Yelektronika-60~~ computer based communication system~ a series of problems had to be resolved which were associated ~th regeneration of the c~ymamic semi-eonductor memory~ which influences the quality of synthesized speech sounds. Common to the speech communication recognition and synthesia routines axe the nardware options developed by the authors for the input of the speech signal to the computer and output from the computer. After input to the computer memory, the speech signal undergoes a preliminary processing stage~ which includes a logical averaging and a hysterisis filter:ing. [2]. Primary speech signal parameters in recognition of speech forms are form characteristics of histograms for i.nterval duration distribution between null intersections and adj acent exteme periods o� the speech signal i.n the analysis segment. To reduce the dimensions of the span for information c,haracters and further segmentation, a claster analysis is employed [31 and the evaluationa obtained by t~e authors relating to exactness of approximations of apeech signal structure frequency. Tile speech form recognition routine operates in .dialogue mode in real time during instruction as well as in recognition and prov~.des for verification of speakers and to differentiate with a high degree of reliability such similar sounding words as "sinus",,"minus"~ "Minkus"~ etc.~ where instruction in majority of instances is satisfied by a single realization of the speech form. iti'e will axami.ne the speech communication synthesis, which provi.des for realizing any phonetic aystem in the Russian language. The speech communications aegmented synthesis routine includes~ in addition hardware and software for input-output of 46 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-00850R000400024412-2 FOR OFFIC[AL USE ONLY of the speech signal,a selection of programa for automated segmentation of the voice signal With the capability for subseqent control oi' segmentation results and a set of programs providing for the creation and editing of the segment dictionary~ and also aearch~ selection~ concatenation~ and the raproduction of dictionaxy elements in the required sequence. Ir. formulating the elements of the segment dictionary9 the voice material used to obtai.n the segment dictionaxy is subjected to automated segmentation with the claster analysis employed. The limita of the segments obtained during automatic segmentation are verified, if necessary~ based upon graphic and tabular data on spectral and time characteristics of the speech signal. The control of the _ natural aural quality of the isolated segments and their intelligibility is achieved by monitoring the segments via a loudspeaker. The voice segments thus obtained axe then used in constituting the segment dictionary. Formation of the segment di ctionaxy and synthesis of voice communications is effected uri.th the use of control programs~ the flow-chart for which is depicted in illustration 1. The control program organizes the dialogue between the user and the voice communica~,;ion synthesis routi.ne. During the dialogue process~ the control program provides t.he user with the capability to create or edit the the segment dictionary, and to organize the input of written communication, its automatic analysis and tran slation into the aural communication. The control program realizes its functions through the "Synthesis" routine and the "Archive~~ routi.ne~ the flow-chart for which are depicted for one version of realizing the speech synthesis routines in illustrations 2 and 3 respectively. Navono ~1~ . enc ~2 Havano ' aync (3 rrccr 3~ en,~yx~e" (5) . /+em ~5) nct Aa ~PC� ' em 1 � ecc,r(6) ~ ~ g ~ A9!IC C6C (C~ ~ CPC? Qo B~�CuNme~~ . I lo IIFC , IeoHeq Hem (9, ~ 11'~ a~_, ~ Qa H 3 a~ (1 5) - Hpm~~3~ 6~ er~6 KoNeu (14) ~ ~ ' Illustration 1. I'low-chart for speech communications synthesis: 1. Begin 2. New segment dictionaxy: dump of Main routine ~'Archive~~ axid "Synthesis" respectively 3. Yes ;~tain routine ~'~A.r~}~iue" ::5. no 6. .input of the segment clictionary archive and its catalogue; 7. Synthesis of speech communication; 3. yes ~9. no �10.. ~Main routine ~~Synthesis~' 11. diction~uy editing 12. yes 13. no 14. end 47 ~ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL L1SE ONLY Illustra~tion ti: "Synthesis" Routine Flow-chaxt l. Begin 2. Input of written communication 3. isolation of the sequential segment of t~ie written communication 4. end of written commuriication~ 5. yea 6. reproduction of the synthesized speech communication 7. no 8. analysis of the current segment of the written communication and determination of the beginning of the next 9. collection of statistics on the segment dictionary 10. search for the required voice segment in the segment catalogue 11. end 12. segment located 13. no 14. diagnostic communication 15. yes 16. aegment selection and output btiffer loading Havano /1 ~ ~ ~ 21 HCf? em ,qo6C ~ em ftm ~ P m o ~ Q� C, Q n a em HR BNC DCN ~HC l)K? a RCR m _ �H? EN? �N? em CIf7 ~ EC K ' 1' em Qa ,qa m ~ BC CHN CC R Neu ' OX ON OK QC ~ Illus~tration 3: "Archive'~ Routine ~'~'low-chart l. Begin 2. new segment dictionary 3. no 4. yes 5. addition of segment o. segment re-designation 7. segment removal 8. segment re-distribution in the archive 9. segment re-distribution based upon statietics on the segment dictionary 10. intiali:ze segment dictionary catalogue 11. input of segment name 1.2. input of old segment name 13. input of segment name 1/~. catalogue print l~. print of catalogue contents 16. is there such a name in the catalogue? 17. dictionary and catalogue output lg. input of aegment dictionary archive and its cata.logue 19. segment input 20. input of new segment name 21. deletion of segment and compression of segment archive(file) 22. end 23. catalogue update 24. diagnostic communication Ttie "Synthesis~~ routine is caxried out by the input of the written communication~ its analysis~ search, selection of the appropriate speech segments~ their con- catenation, and also the loading of the output buffer with subsequent reproduction of its content vla the speaker. If the r.equired speech segment for the routine~ 11syntr.es~s~~ is not located, the diagnostic ~ommunication is output with th.e ~,i,:~sing segment indicated. In this case~ the user may add the necessary speech segment to the ~e~ment dictionary. At the end of its o~eration~ the ~~Synthesis~' routine assembles statistics of the freqency of the segment dictionary u sage frequency. The utility of such information lies in that the segment di ctionaxy is organized as a linear listing i,ri.th c~jmamic distribution in memory~ and there- fore may shorten the time for selecting elements of the dictionary, optimizing trieir relative locations. 48 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY 2'he "Archive" routine provides for the creation of a segment dictionary~ nnd also edits it through i.nput~ redesignation~ or elemination of segment dictionary elements. The capability for the output of current information on the segment dictionary catalogue~ and also of diagnostic communicationa in the event of error location prov.i.dea certain conveniencea in operations with the speech synthesis routine. _ The modular principle of construction for softwaxe on the routines for speech form recognition and speech communication synthesis permits creation of an easily modified and expanded aystem equipped ~rith mini or mi.cro computers for speech communication synthesis~ dependi.ng upon the needs of ;.he specific application. 41e urlll cover certain possible areas of use far the speech communications systems described above. Primasily~ this automated data-S.nformation system and control s.ystems of varying types are clistingui.shed by both the number of recognized and synthe~sized~ speech comr~unications and by demanda or reqtti.rements for computer equipped speech communication systemse The employmerit of speech communications makes possible the communication or interface wi.th the ASU or the data-information aystem and providi.ng in~ormation to a broad conti.ngent of individuala unfamiliar with computers. Here the speech communication may also serve to verify authorized access to information. 'Phe sinplest in terms of speech communication with computers are the systems in which the voice material consists of a limited number of discrete communications. Speech communication with computers ma,y be employed also in ASU TP~ for AI~M servicing~ etc. Undoubtedly~ speech communication with computer is an effective approach in the construction of eronomically optimum man-machine systems. Literature l. Martin~ T. Practical Application of Speech Input To Computers. TIIER~ April, 1976, v. 64, rro 4. 2. Tu. Dzh., Gonsales R. Principles in Form Recognition~ M.: Mir~ 1978. - 3. Kucherenko, V.K.~ Kucherenko I.K. Acoustical Isolation of Homogeneous Segments in Speech Signals.--From the book: Problema in Build.ing S~eech Comprehension Systems. M.: 1980. COPYRI.GHT: Izdatel~ stvo ~~Mashi.nostroyeniye". "Pribory i sistemy _ upravl eniya" ~ 1981 g~51 cso: 1s63/14z 49 - FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 rux vrri~iAL U~~ UNLY NETWORKS UDC 681.324 - CONCEPT OF A MODERN COMPUTING NETWO}ZK Riga AVTOMATIKA I VYCHISLITEL'NAXA TEHI~NIKA in Russian No 2, Mar-Apr 3I (manuscript r.eceived S Dec 80) pp 3-14 [Article by ~.A. Yakubaytis] [Text] Computing networks are the highly efficient base of the moderu data pro- cessing industry. The first stage of their development was the creation of centralized tree networks in which n user stations were connected to a single computer via communications channels. At the second stage the ability to join a - small number of trees together was evidenced. And, finally, at the third, modern, stage distributed computing networks are baing created whose topology is determined by the efficiency of the performance of all data processing processes. ~ The first large computing network in which the concept of distributed computing and data processing resources was well develo~?ed was the ARPA network [1J. A further d evelopment of this concept was reflecte~? in the CYCLADES and CNET networks [1]. And, finally, appeared the DATAPAC, TELENET and TRANSPAC networks [1] in which the parameters and procedures for the excha.nge of information between computing com- plexes were standardized for the first time on the international level. In the - Soviet Union distributed networks werF. created in Moscow [2J, Novosibirsk [3], Riga [4] and a number of other scier_ce centers. An analysis of these generally different developments has demonstrated that they have a common basis which defines the concept ~f a modern distributed computing network. This article is devoted - to a discussion of this concept. l. Model ~ J The fundamental logical concept of a model of a computing network is the system-- a hierarchical group of functions im~;lemented in one or more computers, designed for solving specif ic network problems. Systes~s are linked to one another by means of conditiona,l lines, called physical connections, forming the logical structure of the computing network. Eack? system is open~ended, i.e., satisfies the general requirements [5) of the interaction architecture o~ open-ended systems of the International Organization for Standardization (MOS [TSO]). All systems are divided (cf. fig 1) into a number of layers, cal.led levels. Each - level performs in the computing networ.k a specific functional task and provides service for the 1eve1 above it. The digest of rules for the interaction of 50 FOR OFFICIA~. USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY entities o� like (identical) levels of various syste~s is called the protocol. _ The rules for the~ interaction o~ en~ities of ad,jacent leye~.s o~ on~ and the same system are cal7,ed the interlevel inter~ace. fucmer.+a A Cucma7+a B Cucmrna W ooou 1~ o000 00 _ ..i_.1_. .~.t. t. 7 - +-~t~ ~r~T~ ._._2)._._. ~ ' ~ _ I ~ Nrl ypoBeHe ~T~ ~ t. . .r.~... N . .Benr, 'T'~. .1..~ ._.yv~ .L. . ~ ~ ~ N-f oBeNb ~ T ..r.+. . .L..~. ._yP . L.a. . _ ..~.T. , I L--- L-----------~ J ~ 3?----------------- ~~u+,~cKUe c{~arna?a coeJeNei:uo ~r�~m~x cucm~+ _ Figure 1. Interrelationship of Applied Programs in a Computing Network Conventional symbols: _ 0 Applied program Applied program line of interaction Key: - 1. System A 3. Physical facilities �or connecting 2. Level open-ended systems ~ In the model ~f a computing network discussed by ISO (cf. fig 2) there are seven functional (logical) levels. The tasks per~ormed by these levels are described in table 1. The top two levels of the system define the processes (the processes of representing data and of controlling applied processes and admintstrative control). The bottom ~ive levels form the network method of access to these processes. The linking points between the network method of access and processes we will call ports. Table 1. Functions Pezkoxmed by System I,eve7.s No of Name o~ level k'unctions implez~ented by leVel level 7 Applied ~xecution of appl,ied programs o.f users, control of terminals and operator stations, adm:Cnistrative con- trol o~ network. [Continued on ~ollowing page] 51 FOR OFFICIA~, USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 ~ rux urt+~t,~A.L U5~ ONLY 6 Representation Representation (tnxezpretaxi.on) o~ ~he p~eaning . (vaJ,ue) .o~ informatfqn txans~ti~ted be.tweer~ a~plied programs, including eonveraion o~ ~n ..,uc~ions and data. 5 Contact Organization and pex~oxmance o~ co~uunications contact between applied programs. 4 Transport Trans~er between processes of data ~i1es coded in any manner. 3 Network Routing and addressing ox in~ormation; contzol of data array flows. . 2 Channel Establishing, maintaining and breaking a connection. 1 Physical Physical, mechanical and functional characteristics of connection. 'r'y//.1'((UONQAyI/~e ypoBNU: 7 /Ipw,bdiiae~ ~ - , 710) G /~xdcmQBumene++eiti Q` ~ _ _ - /In~m~ S CeoNta9u~i ~ 11) 4 Tponrnoo~,,,,xi F~i 3 3 Ceme6wi � ~o ~ ~ ~ ? KnMZneNaiu ~ 12 ~ ` ~ _ " u 1 4~u)uvPCK~[~ a 9 ) ~ ~ < 9~u~uveeKOC 1 3 ~ ~ I coeduNetive _ Figure 2. Hierarchy o~ System I,evels Key: 1. Physical 8. ~'unctional levels 2. Channel 9. Logic channel,s 3. Network 10. ~roceases - 4. Transport 11. 7?oxts 5. Contact 12. Network method of access 6. Representation 13. Physical connection 7. Applied 52 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OF'FIC[AL USE ONLY The solution of diverse netwoxk probJ.ems is made possible by rqean~ o~ the special- ization o~ systems, i1,].ustrated in table 2. Working, tex~ina~, and administrative " systems are ca~led user systems. A11 systems have a 7-1~eve1 stxucture. However, in administrative and communication systems ievele 4 to 7 axe uaed on7,y ~or ad- ministrative contxol. zn the remaining systema these leve~,s pxov~.de both f or basic (involving the interaction a~ users' pro~rams) and administratiye contxol. Table 2. Computing Network Systems No Name o� system Tasks performed by system ~ 1 Working Assignment of network resources: storage o~ data arrays, data search, execution o.f computing o~exations, simula- tion o~ processes, phenomena and entities, and develop- ment o~ so�tware. 2 Terminal Use of network resources: contrql o,f the operation of terminals, preparation o~ assignments, and interfacing with technological processes ~or the purpose of ineasuring and controlling them. 3 Con~munication Routing of flows of arrays of information transmitted between working or terminal systems. 4 Administrative Administrative control of computing network (gathering of statistics, operation records, issuing reports, diag- nosis o~ failures, information regarding operation of network, etc.). With the introduction of the specialization of systems it is not di~ficult to produce the logical structure shown in fig 3. Its nucleus is the logical szructure - of the data transmission network, consisting of communication systems l~.nked with one another by means of physical connections. After fulfillment of the require- ments for a standard interface, user (working, terminal and administrative) systems are connected to the data transmission network, as the result of which (cf. fig 3) the logical structure of the computing network is formed. User systems satiskying the standards for intex~acing with a data tza,nstAission network are connected directly to co~nunication systetns. .z~ a usex system does not conform to these standards, then it is connected to the couupunication system _ via a logic element o~ the neCwork called an inter,face modu~,e. When communications contact is perf oxmed, the ports o~ processes located in various systems are con- nected by means o~ conditional lines ca~led (c~. ~ig 2) logic channel.s. The trans- ~er o~ data from one process to another takes place through them, Data input/ou~put (W) logic modules l,inked with individua7, tezminal systems com- plete (c~. ~ig 3) the synthesis o~ the l.ogica~. structure o~ a compuzing network. - Computing networks are not always, as in fig 3, single-level. ~'hey can ~orm (c~, f ig 4) hierarchies in which any pai.rs o~ user systems interact regaxdless of on which level og the hierarchy they are. ~ 53 FOR OFFICIA~. USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 ruK ua~r�~ac:lAL USE ONLY 2 ) Qhrn~r~um;arr~ cemb ~-i~ ~ ~ ~ ~ - ~ ~ Ccm~, 3BM / e ~~~3T~~ . / / \ \ ~ ~ ~ ~ ~'!/716 L~QN!! [~QHHb/Y ~ ` . ~ ~ \\1 4" i - I 7 ~ I I / ~ ~ ~ ~ ~ ~ ~ 1 \ ~ ~ ~ BA / 1 \ 1 ~ / ~ \ \ ~ _ \ \ l-JJ ~ ~ / \ \ ~ ~ ~ - i \ ~ i \ ` ?\B ~i \ ~,g ~ / Figure 3. Logical Structure of Computing Network Conventional symbols: User system ~ Communication system -Q?- Interface module Input/output module ~ Physical connection and point of standard interface Key: l. I/0 unit 3. Computer network 2. Computing network 4. Data transmission network Inter.face points at which communication systems are connected with user systems or interf~ce modules must satis~y an international standard called Recomttlendation X.25. It was introduced [6) by the Consultative Committee on ~ntexnational Tele- graphy and Telephony (CCITT) and has become widespread in many countries of the world. For example, in table 3 are given [7J some data on Stafie data transmission networks created or to be created in Europe. Recommendation X.25 ca11s for the collective use o~ data transmission channels by the creation o~ vixtual (logic) channels and by the transmission o~ standard ~ackets thxough the~. 54 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY 1) !l~n,~~ ucpnpxu~ 66N/uCAwnP~ibh6/X 3 ceme~ ~ ~ ;~a; - - _ . 1 1 , - - p ~ . ~ . - ~ _ ~ Figure 4. Hierarchy of Computing Networks Key: ~ - l. Levels of hierarchy of computing networks Table 3. European Networks for Transmission of X.25 Packets No Country Year of Number Nutabez of terminal Numbex o~ chaxacter-user entry o~ net- systetns in 7.980 stations in 1.980 , in to wo rk service centers ~ 1 England J.979 3 1.00 1.057 2 Belgium ~ 1980 3 250 7.50 3 Holland 1979 3 1400 0 4 Denmark 1981 1 , - [Continued on following pageJ 55 _ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 ruK urr~c:~~L USE ONLY 5 Spain 1979 S 250 90Q0 . 6 Italy 1981 3 - ~ 7 Norway 1981 1 - ~ - 8 Finland 1982 1 - ~ 9 France 1.978 25 3000 3000 _ 10 FRG 1979 7 >500 >1500 11 Sweden 1981 1 - A 7-level hierarchy of computing network protocols has been introduced in con~ormity witti system levels (c�. :~ig 2). These pzotocols (c,f. fig 5) haYe the same names as the levels do. Generally several different protocols can be at the same level. ~ The protocols oE di.fferent levels are quasi-independent of one another. Therefore, the replacement of a protocol at one level should not require the modification of protocols of other levels. Tn addition, the protocol o~f any one level is trars- parent to the protocols of higher 1evels, i.e., does not intxoduce distortions into their work. '1'he protocols of higher levels (4 to 7) characterize the procedures ~ox direct (through ttie data transmission network) interaction of user systems with one an- other. Therefore, they are often called through ("end/end") protocols. Protocols of lower levels (1 to 3) describe the interaction of neighboring systems of any type. They, in addition, determine the standards for access to the data transmis- sion network. _ At the present time users widely employ programs of YeS [Unified Series] computers (SRV, OKA, KAMA, KROS, POISK, etc.). Therefore, at the first stage of development _ in computing networks it is advisable to.use at higher levels the standards and _ pr.ocedures of YeS computer tree-type teleprocessing. At later stages, of course, special virtual protocols, for terminals, filea, assignments, etc., wi11 appear in networks. The protocols of the physical, channel and network levels are described by CCITT Recommendation X.25. In keeping with it a data transmission network makes possible thc transmission of packets, and user systems and interface modules, before trans- mission, the breakdown of inessages i.nto packets and, a�ter transmission, t~e assem- bly of paclcets into messages. 2. Physical Structure Each system considered in table 2 is implemented in a complex consisting o~ one or more computers (large, medium, sma11 or micro), and each physical connection is accomplished by means of a data transmission channel. The ,functions of the inter- face module are per~ormed by an inter~ace converter which is constructed on the basi_s o� one or more mini- or microcomputers. The input/output module is imple- ment~d by means o~ a terminal. As a result, khe logical structure is converted into the physical s~ructure of the computing network, an example o~ which is illustrated in fig 6. Since r~ot only one but several syseems can be implemented in a complex, the number of types of com- plexes is considerably greater than the numbex o~ kinds o~ systems. Therefure, 56 FOR OFFdCIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFiCIAL USE ONLY ~ in a computin~ netw~~rk are used not on7.y' wQxking, texmina~,, comtpunication, and administrative, but al.so terminal-woxking, woXki.ng--coupvunication, co~qnaunication- user, etc., co~qplexes. Com~unication compiexas (together with the inter~ace con- verters of any of them) ~orm packet switching centers. ~ ~ 6 A6oti:~e~ntx~p ~ - _ _ 5 tucmr~� ~ ~ _ 2_~ 1 - --7~ - ~ I X. ~S V,\ ~ _ j` ~ 3) a4) ~ 5)` , ~ - ~Yonn~HUKauuoN~na 3} 6 7 6~ cutme~n ~ 1) i , r a~ 4 ~ bM ~y 2 ~ ~ ~ p ~ b ~ - - ~ '~.1, ~ F b.. - - - - c~ ~q~ ~ - - - 1-- ' eR 3 I 67 RCMN~NUA"Q([UGHNQp I _ _ _ _Ct;C/1'~[NQ ' - ~ ~ ' a - -xzs ; ~ ~ ~ v.. g ~ ~ , ? ~ - - - - * il6oHeNmarnv - - - - - - - 6 CuCmer+4 7 Figure 5. Hierarchy o~ Protocols for Basic Conrrol o~ a Computing Network - Key: 1. protocols: applied (7); representation (6); network (5); transport (4) [Key continued or. following page] - 57 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY 2. User system 5~ Netwprk (3) 3. Physical (1) 6. Commun3cation sYstem 4. Channe~ (2) d~rruuumuw~uo cemb 1~ ~ Ctme 3BM 2, i ~ . ~ ~ ~ Q~ ~ ~ (eme nepccb~ ab~ar S~ ~ 3~ - / ~ ~ ~ 'c� I - . ~ ~ ~ % . I~ ~ ~ / i i 6 / / ~ ~ ' / `y~~ 1 ~ / ~ 4~ . , - ' ` _ _ _ - % ~ A6oNC,amcMUU nyN,rm Figure 6. Physical Structure of a Computing Network (For designations of 1 to 7 c~. text.) - Conventional symbols: ~ Working complex consisting o~ several computers ~.7 Single-computer working complex Q~+- Working complex with interface converter - ~ Terminal complex with terminals ~ Administrative complex ~ gacket-switching center (without inter,face converter and with interface converter) ~j Terminal complex with terminals and interface con- ~ verter - Data transmission channel with standard inte~c~ace ~ point Terminal [Key on following page) 58 - FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY Key: Computing network 3.~ Aata transmission ne~work = 2. Computer network 4. User station 2.1. DaCa Txans~qission Networks Each data transmission network consists (cf. ~ig 6) o~ packet-sw3,tching centers and data transmission channels connecting these centers with one anothex as we11 as with user complexes or inter~ace converters. Large data transmission networks (cf. fig 7) can be mulfiilevel. In these networks the higher the level, the larger the capacity of the packet-switching cenrer and the higher the speed o~ data transmission channnels. The number of~levels o~ a data transtaission neework and its number o~ centers and channels are determined by economics� the topology and reliability o~ the network and by its speed characteristics. Points of the interface of packet-switching centers with user complexes and inter- face converters form the points of entry into the data transmission network. At these points are received or transmitted packets to be transmitted throughout the ~entire network without disassembly (or assembly). Packets are governed,by CCITT - Recommendation X.25. The entire data transmission network must be tran~sparent, i.e., must transmit packets the data in which can be coded by any method. _ ~ ~--~y~ , ~ i, . / - ~ ~ ~ Figure 7. Two-Level Data Transmiss:ion Network _ I [Continued on following page] 59 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 ruK ur'r'tLIAL USE ONLY Conventional syiqbols: . I,ax~e~capacity trunk line packet- switchiAg center ~ Zone packet-switching center A packet-switching center ~or making,possible high data processfng speeds is con- structed on the basis of mini- and microcotaputer~ and is a multi,processor center. Only for very small data tran~mission networks or for the lower levels o~ large hierarchical networks in which this is permitted by stipulations for reliability can a packet-switching center be a single-processor one. The entire processing of data in a packet-switching center is accomplished by means �of a working storage alone. The external storage (magnetic disks) is used only for loading the software and for gathering statistical data. In addition to packet switching, a switching center can provide for the performance of interface functions relating to the connection of non-atandard user complexes or terminals. For this purpose interface converters constructed on the bssis of mini- or microcomputers are included in the center. A data transmission network, representing a packet-switching network, can also provide for message switching (for compu~ers and teLegraph equipment). For this purpose, in the inputs and outputs of the network (centers b and d in fig 6) are added interface subsystems which perform the disassembly and assembly of messages. The assembly/disassembly of inessages is not carried ~ut at intermediate centers (a and c in fig b). 2.2. Working Complexes Working complexes make it possible to offer the most varied cnmputing and data processing resources to a wide range of users. Computers which have been created - specially for the network are used most effectively in them. The Ye5 and SM com- puters already produced were not designed for networks. However, by taking special measures the successful implementation of working systems can be provided for in these computers. Three methods exist for putting together a working complex constructed with one or more YeS or SM computers. The first af these consists in the fact that user com- plex 4(cf. fig 6) is connected via a standard MPD [data transmission multiplexer] or PTD [remote processing station] to the inter,face converter o~ comanunication com- plex b. This converter, implementtng the tnter~ace module, is in the guise of a standard user station f or the i~PD (PxD), and o~ a standard (,for the network) user , complex for communication complex b. The second u~ethod is J.ogical~,y equivalent to the ~irst. However, hexe the interface module is imp].emented not in the equipment linked with the communication complex, - but in the PTD, mini- or microcoipputer directly l~nked with user complex 2(cf. fig 6). 60 - FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 ~ FOR OFF1CiAL USE ONLY The third method o~ interfacing the working co~plex consiszs ~,n the ~act that special progxams making possi.ble the creation o~ the network method of access (cf. fig 2) are written ~or the xeS or SM computer~ Then, having added to network complex 1(cf. fig 6) a network adapter whtch responds to sta~daxd X~25, it is possible to connect the working complex direct~.y to communication complex a. _ In the computing network is also possible the combined utilization o~ a YeS computer - working with ordinary user stations and interacting with the network. This has been necessary primarily 3,n those situations when the XeS computer complex already had ordinary teleprocessing be~ore connection to the network. 2.3. Terminal Complexes - Termina.l complexes are created on the basis of YeS or SM computers or microcomputers. For cor,.nection to the network each computer must have a network adapter and hard- ware satisfying the protocols of the computing network. Network software is based on the utilization of standard operating systems and algorithmic languages of complexes. The chief software problem consists in organ- izing remote interaction between terminals used in the network with the resources of all working complexes present in the computer network. Three groups of terminal co:aplexes should be singled out: multiconsole, single- console and YeS computer user stations. Multiconsole terminal complexes are the most effective means of simultaneous con- tact between teams of users and the resources of a computing network (e.g., complex 3 in fig 6). The largest of them are constructed on the basis of YeS comput~rs. SM computers are used for creating the orhers. Single-console complexes are created on the basis of SM computers or microcomputers. - Each of them is designed for the work of a single user at a time. The YeS computer user station is a terminal complex (complex 6 in fig 6) including one or more terminals. It interfaces with the data transmission network via an interface converter created on the basis of a mini- or microcomputer. This type of terminal complex is the least effective, but it makes it possible to use YeS - computer character-user stations which the user already has. 2.4. Administrative Complexes _ An administrative complex implements an administrative sysCem forming the basis of the network contrql center. Each complex is coz~structed on the basis of one or - more mini- or microcomputers and it interacts with a11 or a group set aside for it _ of user complexes, communication com~lexes or inter~ace converters. If a single administrative complex is used in a computing network, then a11 the equipment in it is duplicated. for the purpose o~ ensuring high reliability. If there are severai administrative complexes in a network, then one of them is the - main one. When it goes out o~ order the functions o~ the main one are trans~erred to another administrative complex. 61 FOR OFF'ICIAL USE ONLY � : APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 h'UK UN'h'IC:IAL USE ONLY - 3. Topology of the Netwprk Let us discuss the principles o~ the creation o# a distributed comput~,ng network _ by using the example illustrated in ~ig 8. There are ~ive entities (eaterprises, institutions, management and plann~.ng organizati~ons) in which in~oxmation is developed or is used. Furthermore, the storage, processing and output of multi- purpose information, regardless o~ ita nature, must be accompl3,shed by m> 1 complexes. ~ s O~eewm 6 Afec.rm A . _ _ 2' . . ~ - 1~ g ~ 9 . I 4 \ ~ \ I ['ems w d~h Q3eam B ' ~ 6) - \ i ~ I . ~ 4) ' ~ ,e~ r f0 5 7 ~ ~ A?eam A ~ Figure 8. Topology of a Computing Network (cf. text for designations of _ 1 to lU) Conventional symbols: ~ User complex ~ Communication complex Key: 1. Entity A 4. Entity D 2. Entity B 5. ~ntity E 3. Entity C 6. Data txansmission network Depending on the 7.ocation of the points o~ the development and use of information, the information is divided (c~. ~ig.9) into l.oca7, and global.. I,ocal in~ormation is information which is developed and used at one and the same entity. But i~ in- formation is deve~oped in one and is used at least in one other entity, then it is global. In turn, two groups must also be distinguished among local information. Information which can load one ox more computers every day to a su~ficient 62 FOR OFFICIA~. USE ONLY i APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL U~E ONLY (economically petmissible) extent we wi11 ca11 steady. ~he xest o~ local in~orma- tion we wi11 place undex ~he head~ng o� peak. I Nxc~opMatiNa I , I. I . ~ ~ I - I JIoKaneHaa 2) I I3) I'no6anbt~as I ~ I - I Pae?~oMepxaa4)I I 'S)17NKOeaA I Figure 9. Classification of Information . Key: _ _ 1. Informa.tion 4. Steady 2. I.ocal 5. Peak - 3. Global - Steady local information must be processed (cf. fig 8) by computing complexes - - 1 to 7, installed at those entities where it is developed and used. Large, small or microcomputers can be installed here depending on the amount of this information. ~ As far as peak local and global. information is concerned, it must be processed in - computing complexes 8 to 10, the size, number and locations of which are determined _ by a feasibility study, taking into account the cost of equipment and communications channels, maintenance costs, reliability and efficiency requirements, etc. As a result a set of user complexes, 1 to 10, originates, located at the necessary _ geographic points and interacting with one another (cf. fig 8) via a.data trans- mission network. 4. Local Networks _ - Local computing networks, which can opexate both independently and can represer~t users of large networks, have taken on ever greater importance. Here preferred development has been given to netwox'ks in which (cf. fig 10) a single packet- switching center is executed in the ~'orm o~ a monochannel to which network interface modu],es are connected. In turn, each ~qodule is connected to one or more user com- plexes. We will ca11 a network o~ this sort a monochannel network. Depending on zhe topology oX the computing network, the requixed data transmission - speed and the tra~fic, the monochannel is a twisted pair o~ telephone wires, a _ line, a coaxial cable, a light conductor, or the ether (radio). The length of a monochannel in small. networks uniting a group a~ instruments or microcomputers 63 FOR OFF[CIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 r~x ~rriuAL U~~; UNLY is not greater than one meter. ~n large 1oca1 networks containin$ dozens and ~ sometimes hundreds o~ computers the length of a monochanne~ can xeach several kilometers. 1) Mn - B iacyc~pcmDcHi~yw, - pcruo.+v.~eNya ~ubv 2~ ~av.wNya ctm~ Figure 10. Monochannel Computing Network Conventional symbols: ~ Working complex ~ Termina~ complex with terminals ~ Terminal complex with measuring or control equipment ~ Network inter~ace unit Y Internetwoxk converter Key: , . l. MP [internetwork convertez] 2. T~ State, regional or local network The network interface module is mast often created on the basis of a microcomputer ` and has the buf~ers required .for transmitting and receiving packet sequences. This makes it possible to accomplish the transmission o~ information through a monochannel at a rate di~ferent ~rom the data input/output rate in user complexes. 64 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2047/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY The method o~ accese to the monochannel is o~ great importance in an indepetident computing network. With a small nuu~ber o~' user comp].exes the netWOrk can haye - a supervisor untt which according to a selected cyc~e assigns comp7.exes the right to occupy the monochannel., However, with a considexab~~ number o.~ usez complexes this method becomes extremely ine~~icient. Thexe~ore, other ~ethods are employed i:t modern monochannel net~works. The most simpl2 method o~ access to a monochannel, called in [8] the "classical," is governed by the fo].lowing rules: 1) the.ne~work inter~ace unit enters in each packet a control sum making it possible to check the contents o~ this packet; 2) the packet is transmitted through the monochannel to the network interface unit addressed as soon as the neec~ for this arises; 3) the network inter~ace unit ad- dressed checks the packet re c~:ived and informs the transmitting unit i~ thexe are - errors in this packet; 4) with the existence of errors the packet is transmitted - again upon the expiration of a randomly selected time interval. Errors can appear in a packet because of the malfunctioning of equipment, noise, or, chiefly, the transmission into the monochannel of packets by several network - interface units at once. The repeate~ transmission af packets over various time ? intervals makes it possible tfl eliminate conflicts which arise. Losses of time for the repea~ed transmission of packets with heavy traffic can be rather great. There.fore, a number of inethods of improving the "classical" method exist. Considerable savings are produced by using the "slot" method, wttereby a packet can be transmitted into the monochannEl only upon the appearance of synchronization pulses from a central clock. The number of conflicts between transmitting units is reduced drastically if they also fulf ill the rule: "listen to the monochannel all the time and do not transmit if it is occupied." _ Experience has demonstrated that the creation of monochannel computing networks makes it possible to ensure the efficient processing of information ac an enterprise, in an institution, at a scientific institute and in an industrial association. Conclusion Thus, a computing network is a distributed multicomputer association designed for gathering, storing, transmitting, processing and outputting any kind of information relating to the control and functioning of various sectors of the na.tional economy. A network can involve the processing of a wide range o~ data or can be a special- purpose one d2signed ~or solv ing a narrow range o~ problems. The size of a co~puting network is determined by th~ probl,ems entzusted to it. Th~refore, on one hand, it can inc~.ude hundreds and even thousands of computers distributed ovex a large territory~embracing seyeral countries and, on the other, i t can be loca7. and have a to tal of a�ew s~qall, computers . The main tasks pex~ormed in a computing network are as .~oll,ows: the storage o~ _ data and the per~ormance o� data search operations; the mathema.tical modeling o,f 65 FOR OFFICIAL US~ ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY processes, machines, e~uipment, natura.7, pliez~p~ena and other entities; planning and the manageria,7, control o� variou~ e~emenxs .o~ the na~iona~, econo~qy; controll-~ ing production fiechnological processes; tha pex~orn4ance o~ booklteepi,ng a,nd statis- t~cal reporting ~or the ~unctioning o;C production unitsi cont~ol o~ scienti~ic research and technical, progress; the per`o:~~nce of computing (calculation) work; _ the distribution of stock; caxryin~ out e~ectronic librarp exchange work; contxoll- - ing the operation o~ savings banks; cpntrolling ciy~1 a~yiation; ticket sales and - reservations ~ox various kinds of transportation; controll.ing a network o.f trade = centers; contxo~l,ing energy resouxces; etc. The users o~ a computing network, depending on the nature o~ the in~Eormation in it, are production workers, management apparatus coworkers, sc~enti~ic associates, and broad elements o~ the population. A11 the necessary methods o~ interaction be tween users and computing co~pl~xes are provided �or in a compu~ing network. Bibliography 1. Packet Switching Report. I~ogica Ltd, Sep tember 1978. 340 p. 2. Drozhzhinov, V.I., Ilyushin, A.I., Myamlin, A.N. and Shtarkman, V.S. "Principles of the Design of the SYeKOP Experimental Multiple-User Coniputer Network" in "Vopr0.sy kibernetiki. Problemy infvrmatsionnogo obmena v vychis- litel'nykh setyakh" [Problems in Cybernetics; Problems of Information Exchange - in Computing Networks], Moscow, 1979, pp 18-33. 3. riarchuk, G.I., Kuznetsov, Ye.P., Moskalev, O.V., Metlyayev, Yu.V. and Efros, L.B. "0 programme rabot po sozdaniyu vychislitel'nogo kompleksa (Tsentra) kollektivnogo pol'zovaniya v Novosibirskom nauchnom tsentre SO AN SSSR" - [Program of Work on Creation of a Multiple-User Computing.Complex (Center) at the USSR Academy of Sciences Siberian Division Novosibirsk Science Center], ~ Preprint No 130, Novosibirsk, 1978, pp 1-34. 4. Yakubaytis, E.A. "Arkhitektura vychislitel'nykh setey" [Architecture of Computing Networks), Moscow, Statistika, 1980, 278 pages. 5. Referencei4odel of Open Systems Interconnection ISO/T5, 97/SC, 16, N 227. . August 1979. 181 p. 6. CCITT Sixth Plenary Assembly. GeneVa, 1976. Orange Book. yol. 8. 2. Public Data Networks. Geneva, 1977. 2? 7 p. 7. P ublic Data Networks. Eurodata k'oundation. Lutyens House. k'insbury Circus, London, EC 2N( 71.Y. ].979. 233 p. 8. Cotton, I. Technol,ogies ~or local area cou{putex networks. - Computer Networks, 1980, N 4, p. 197-208. COPYRIGHT: zzdatel'stvo "Zinatne", ~~AVtp~atika i vychi;slitel'naya tekhnika", 1981 883I CSO : 1863/161 ~ 66 - FOR OFFICIAd. USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFiCIAL USE ONLY - ~ - UDC 681.324 DATA TRANSMISS~ON SYSTEM (SPD) OF THE 'EL'BRUS-1` MULTIPROCESSOR COMPUTING COMPLEX (r1VK) Riga AVTOMA,TIKA T VYCHTSLZTEL'NAYA TEKfIl~TIKA in Russian No 2, Mar-Apr 81 (manuscr~pt received 25 Apr 80) pp 15-30 [Article by V.S. Burtsev and V.I. Perekatov] [Text] It is obvious that the intense development of teleprocessing is now at the stage when the term "fourth-generation teleprocessing system" must come in use as applied to large-capacity computing conplexes and large comFuters. Experience gained in creating the fundamentals of the "E1'brss-1" MVK teleprocessing system and acquired as of the present time as the result of its development makes it possibl.e for us to formulate certain traits which distinguish the fourth-genera- tion system. 1. A teleprocessing system must represent a combination of general-purpose soft- ware and hardware making it possible to create practically any teleprocessing subsystem, including one whose key features were actually not drafted at the moment of the creation of these facilities. 2. The existence in the complex's structure of a problem-oriented program-con- trolled processor which solves a considerable portion of teleprocessing problems. - 3. The modular structure of the special-purpose processor. Modularity is under- ~ stood in the broader sense than simply the division of the processor into program- mable and nonprogrammable facilities. It is possible to speak of "vertical" and "horizontal" modularity. The former assumes the er.istence of a certain set of functional modules making it possible to develop a processor for solving one more class of probletus, e.g., a terminal module, a data transmission line ~odule, a transport level l:~ne module, a rapid-channel module, a module ~or controlling peri- pherals and the like. Horizontal modularity assumes the use in the structuxe of the processor o.f a variable number of modules of a single type (including modules o� othe.r types). Usually this number is determined by the number of communications linQs serviced and by the rate of the information flow. ~ 67 FOR OFFICIAd. USE ~ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 N'UR OFFICIAL USE ONLY - 4. Teleprocessing so~twaxe, including the so#twaxe o~ the speci,a].^purpose pro~ - cessor, is designed on the basis o~ ~zob~em-ox~,ented high-~.eyel la~guages, The distinctive #eatuxes cited do not pretend to co~pleteness~ They have been formulated chiezly in order to detqonstrate khat te].eprocessing systems have entered a qualitatively new stage of development and new trends require their own generalization. Teleprocessing systems characterized by the properties indicated above have opened up great possibilities. In particular, the question of the ability to use an MVK in a specific network architecture--clo~ed- or open-ended--has been eliminated. By using universal hardware and software which are inv~riant with respect to the principle of organization of the network, system personnel can adapt an MVK to a network of any type. The problems which arise with this are of an ordinary tech- nological nature and are to a great extent administrative. The domestic system characterized by the fundamentally new features of fourth- generation teleprocessing is the "E1'brus" MVK data transmission system. Able to serve as an example of a foreign fourth-generatian system is the DATACOM system implemented in the B6700-7700 series o~ the Burroughs firm. Fundamental Concepts As the res~ilt of an analysis o� the functions and operating features o~ an MVK SPD, two concepts have arisen which have been responsible for the beginning of a funda- mentally new development. The tirst of these--the concept of continuous adaptation--is based on the iollowing _ considerations. The list of remote users of such a large computing facility as the "E1'brus-1" '.rIVK includes equipment of the most varied classes--from teleprinters operating in terminal syster.ls to computing complexes interacting in computer net- works. A cnaracteristic feature of large teleprocessing systems is their practical- ly contintious development--the elimination of obsolete components and the addition of new ones, the modificat~on of technical and logical attributes, the modification of interaction algorithms, and the like. In connection with this, the adaptation of. an MVK to remote users is regarded not as a one-time event, but as the way of life of the complex--a steady step-by-step process. The second r_oncept is the concept of primary processing. The fact is that in a number of applications an MVK is ~t~ the guis~ o~ a large in-line center for the processing of information arriving from communications lines. Fairly often the operations which thereby are performed on each received bit o� information (e.g., a character) are independent, i.e., do not require the use o~ data received earlier. A typical example is the screening of data, which is carried out according to some simp7.e criterion. In other cases processing is possible only with the presence of an ent:i.re group of received data (e. g. , ca~,cu],ation o� an arithmetic mean) , but it can be per~ormed gradually as each successive bit is received (the summing of data) and can be concl.uded immediately after reception of the last bit. Therefore, if the information load is considerable and the data r.ransmission rate is relatively s1ow, it is p~ssible to improve the eff iciency of an MVK by adding to its structure 68 FOR OFFICIAL USE UNLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL t?SE ONLY uncomplicated special,-purpose equipment (a eommunications processor) which pro- cesses the next bit o,~ in~ormation received regardJ,ess o~ whethex zhe ~o~lowing bit is received.* Zn certain cases zhis equipment can, as reception t~kes place, "without hurxying" per~or~ the ent-ire cq~puting task entrusted to the ~VK as applied to these data. In other words, primary processing ~hould ~ree the complicated equipment of the complex's central processor~ from the constant execution o� simple operations on small-format operands; this work con~idexably reduces the equipment utilization factor. On the basis o� these concepts decisive practical decisions were made and imple- mented: 1) to develop a programming language oriented toward the teleprocessing base level and universal within the framework of the problems o~ this level; and 2) to add to the MV'K's structure, as the equipYnent ex~cuting the base level's routine, a special-purpose data transmis~ion processor (PPD). The language has been given the name SFTRAN (for "setevoy translyator" [network translator]). It makes it possible for a system programmer or user to specify the entire network of remote MVK users, as well as the data and routines required for implementing interaction with them, e.g., the line discipline, the algorithms for exchange with a terminal, the variant of the LAR-2 procedure, a specific primary processing process, etc. To data t~ansmission processors (specifically to their adapters) are connected communications lines which connect the complex with remote users. Thus, the net- work is, as it were, broken down into several fragments, each o~ which is served by its own PPD (cf. fig 1). The SETRAN translator routine is executed in the complex's central system. The program describing the entire network is converted by the translator routine into several code files, each of which represents the operating system (OS) of one of the PPD's. A specific OS is designed to serve the network fragment of its "own" processor. Upon initiation it is loaded into _ the local working storage of the PPD and the processor becomes adapted to the fragment. Thus, for the personnel responsible for the creation of a specific teleprocessing subsystem for the "E1'brus" MVK the problem is reduced basically to an adequate J description of the network and of the basic teleprocessing processes in the SETRAN language. This made necessary the very care�ul coordination of the three key components: the language, the operating system procedures of the data trans- mission processor, and the PPD equipment. Actually, development took p.lace in integrated fashion, which made it possible to optimize a11 three components. *This processing px'inciple has been given the name "conveyer " processing. With regard to transmission the conveyez principle can be formulated in the ~ollowing manner: Each processed, i.e., prepared for transmission, bit o~ information is sent into the communications line regard~,ess of whether the ~oll.owing bit has been processed. - 69 FOR OFFICIA~, USE 4NLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 FOR OFFICIAL USE ONLY 2 ~ L(~Nmpanewo cucmerr MBK � .~Pyr - ~tir~om~op tempai,rs 3 ) 4) oc nnQO oc nnA~ a~ nRqN ceiryoNa nna o5) n~,q ~ . . . ,v _ 6) ~~'soy~- . noa noo'herm ~ 4 e~ ynb~eiweix 46owP.vrnoa MB/f a~ Figure 1. Principle of Adaptation of the "E1'brus" MVK to a Network oi: _ Remote Users Key : - 1. SETRAN program 5. PPDO 2. Central system of "E1'brus" 6. Switchable subnetwork MVK 7. Network of remote users 3. SETRAN translator routine 8. MVK - G. OS PPDO [operating system of data transmission processor No O] SETR~`.N: Concept of the Programming Language The SETRAN program consists of three sections which are described in succession: - the global description section, the network section and the algorithm section. It is best to begin a first acquaintance with the language with the network section. Network Section In this section is described the combi:nation o~ data processing modules participa- ti.ng in the MVK's operation through communicat~ons lines. A so~tware-controlled remote unit intexacting with the MyK through a communica.tions line (in particular, a terminal) is an "external unit." ~ The second type o,� unit is the "line." We know, ~ox example, that in working with terminals connected to a mu7,tipoint line it is necessary to perform operations for 70 - FOR OFFICIAd, USE UNLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY - the line as a whole; an exautpl.e o~ these operations is poJ,lin$. Zn this sense a line can be singled out as a distinctive data processing unit coup~ed in a definite mannex with external units-~terminals. - 5ystem numbers o~ adapters, i.e., points .~or t,he connection of couunur?ications lines performing the role o.~ contacts between the network and the complex, are assigned �or units ox the "line" t}rpe. In the particu lar case of a single-point line the concept o~ an external unit and line unit often merge. Here the line unit can be used ~or so~tware control of the cluster formed by the remote unit and the communications line connecting it with the complex, Problems in basic teleprocessing sometimes reveal the need to control lines. ~or example, the in~ornation ,~lows of two counnunications lines duplicate one another for th e purpose o.f reliabiltty; therefore, only one of them, to be selected accord- - ing to a specif ic algorithm, must be admitted to the central system. A third type of unit--"internal units"--is added for problems of this kind. These can be re- garded as virtual data processing modules located in the MVK itsel~. Modules assigned in the network sectioii form structures called "trees In the structure of a tree one unit can be "nested" in another and, on the other hand, include severa 1 nested modules in itsel~. The implementation o~ SETRAN in the - "E1'brus" MVK permits six nesting Ievels. _ - As an example it is possible to take the section of a network illustrated in �ig 2a. It includes four communications lines connected with the adapters of a single PPD having the system numbers 0:1, 0:7, 1:4 and 1:7. Through the first line the = MVK in teracts with a remote unit, TERM. To the second line are connected three terminals, POLTERM. The third and fourth lines are connected with in~ormation sources which duplicate one another. Therefore, the necessity arises of adding to th e software a module which functions as a flow selector. In the network section this section can be represented by three trees whose struc- ture is shown in fig 2b. The first of these, a confl~ent tree, includes a single unit. The corresponding entry in the program has the following form: MODULE 4~ 0:1 TERM % Line mQdule OVER * MODULE 3~~ 0:2 TREKHTLINIYA Line unit. A~ter the procedure word [THREE-POINT LINE] MODULE is entered the number of nested modules--3. � . MODULE POL7,'ERMl . % E~ternal modu7.e OVER MODULE POLTERM2 - OVER � . [Continued on following page] 71 FOR OFFICIA~. USE ONY,Y APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 H'UK UhN'ICIAL USF. ONLY ~ " MODULE POLTE~3 flV~R _ OVER *MODULE 2 SELEKTOR [SELECTOR] % znternal module . . MODULE. 1:4 ISTOCHNIKI [SOURCEI] OVER ' r10DULE 1: 7 ZSTOCHNIK2 [ SOURCE2 ] OVER OVER 1> KKINTp[!.1/.N'J(~ Cu['T!n[ 2~ ~o4tccop ~rpv~lv~i c~Nma !"-~~~,..m~ 3 ) i . i'~r.mt ni (~7 o~t ~ o: ~ 4~ ~j r r.�r~ I ~ 6 ) ~ 5~'�'" Cl ~O~m~/uy2 ~~nov.vur f Ntmo~.vur Y ~ /Ax~mtpn 3 a) 9 ~ Btiympe.wu! ~ . C~~~rmop y~ea ~ 10) 1~ n ~~e~m~uNUn y~,,,,,- ,,,,,uu - ---0-------- MCmovwu~ ! Ifrmovwu~ ? . /Ja.mtan 3 ` BN~u~rre ~�a�e~"'7 11~ y~..a AWmepn f � b) Figure 2. ~'rinciple of Representation o~ a Network of Remote Users in the SETR~IN k~rogram: a~-real netwcrk; b--structure of m~dules in network section [Key on following pageJ 72 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 ~ FOR OFFI~CIAL USE ONLY Key: 1. To central system 7. ISTOCtLi.iKl [SOU~iCE].] 2. Data transmission processor 8~ TREKIiTI~zNIX~, [THR~E^PQINT LINE] 3. Selector 9. Znternal modu].es 4. Adapters 10. I~~,ne modules 5. TERM 11. External modules 6. POLTERMI Here the dotted line replaces "contents of mvdule.�' The ~act is that each module is assigned specific progra~n components. ~or examp~.e, for the TREKHTLINIYA module they could have the form: * MODULE 3 4~ 0:7 TREKHTLINIYA MEMORY PArII~IN [MEMORY LINE] (POVTORY [REPEATS] : = 5) REGISTERS R$G QUEUE OCHLTN [QUEUE LINE] PROGRAM DISPETCHER [SUPERVISOR] [OCHLTN, 1&&255]; OPROS [POLLING]; VYBORKA [ACCESS] MODULE POLTERMI MEMQRY PAMTERM [MEMORY TERMINAL] MESSAGE ZAG [HEADING] (SB) QUEUE OCHTERM [QUEUE TERMINAL) PROGRAM WOD [INPUT]; VYVOD [OUTPUT] OVER MODULE POLTERM2 KOP [COPY] POLTERMI OVER MODULE FOLTERM3 KOP [COPY] POLTERMI OVER OVER This entry indicates that to the TREKHTLINIYA module are assigned the following: 1) its own memory, formed according to the PAMLIN mask determined in the global description section; 2) its own registers, formed according to the REG mask, also determined in the global description section; 3) the OCHLIN queue; 4) DISPETCHER, OPROS and VYBORKA routines whose texts are assigned in the algorithm section. These routines, of course, can be assigned to other modules; nevertheless, for the TREKHTLINIYA module they will be executed only in its context, i.e., will use variables Prom its own memory (registers) or its own queue; they are capable of activating another routine assigned by name only within the liznits of their own module. The context o~ any ~OLTERM module is broadex--in addition to the contents of its _ own module it includes the contents of the TREKHTLIN~YA module; generally the con- text includes the contents of a11 modules placed higher with regard to a branch of the tree. The contents o.~ POLTERM modules include also a message (SB) with a heading which is ~ormed according to the ZAG mask assigned in the global descrip- tion section. 73 - F~R OFFICIA~, USE UNLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 hUK Uh'h7~;lAL USE ONLY In the description o~ the POLTEiZM2 and POLTERM3 taodu7,es it is indicated that their contents are copied ~rom the POI,TER~l1 module. Thi,s abbreyiate~ the entxy. In the example given the contents o~ a module inc~.ude one queue and one meseage, but SETRAN in principle makes it poseible to asstgn to a module several queues or messages. Tt is possible to employ~unidimensional arrays of queues and messages; these are especially convenient in organizing buf~er networks. Unneeded components in the contents of a modu7,e can be absent. For example, it is possible to assign an internal module containing only a memory, or only queues, or a memory and queues. It wi11 represent a conrmon memory and common queues for the routines of nested line modules. Queues and routines (~or the purpose of activation) localized in nested modules also have access to routines executed in the context of a specific module, but for this purpose special facilities of the algorithm section are employed. It should be mentioned that routines run in the context of a line module and of any nested external module can be executed by receiving and transmission operators in conformity with the adapter assigned in the line module. Several adapters may be assigned in this module; accordingly, these routines can work with several communi- cations lines. _ Let the DISPETCHER [SUPERVISORY] program perform the decision functions in controll- ing a three-point line. This program must be activated if the central system orders some kind of operation (input or output) for one or more POLTERM terminals. These orders in the f orm of inessage units are attached to OCHTERM queues belonging to external modules. In addition, a message unit oriented directly to the line can arrive, such as for establishing a connection, or for disconnection or ~or performing a test. Messages o� this kind are included in the OCHLIN queue. A11 conditions for activation relative to the state of queues are assigned for the DISPETCHER program in square brackets. They can be understood as follows: If a module's routine is not executed and a message is referred to a vacant OCHLIN queue or to any vacant queue of any module located on the first nesting level, then the execution of this routine must begin.* - - The language provides for various methods o~ assigning individual activating queues and groups o.f them. The second method of activation assumes unconditional ~unning of the module's routine immediately af ter initialization o~ the PPD. By means of the third method one routine is started by a statement which is executed by another. For example, the WOD [INPUT] routine can be started from *In the 1&&255 construction the 1 digit indicates "first nesting ].evel" and the 255 digit, "any queue o~ the module." 74 FOR OFFICIAL USE UNLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFF~~^[AL USH: ONLY the OPROS [POLLZNG] routine, and the y'YvOD [OU'~~U~] routine �zom the ~Y~BORKA [ACCESS] routine. Thus, a structure corresponding to a multipoint line is assigned in the netwo rk section. With the presence o~ a task oxie~ted whplly to the 1.ine, a routine is started in the module which in the programmer~~ concept is associated with the co~?unications line. Having established logical connection with a specific termi-� nal, this routine starts the required routine in the module wnich is associated with the terminal, and the latter routine pex�oxms dtrect exchange. Everything said above must be regarded only as an illustration of several concepts and possibilities o~ the language. F~r exau~ple, the presence o~ a memory in POLTERM modules is ~usti~ied only in those cases when in a given exchange session the results of a preceding session are utilized in some way. I� this is not so, then the routines of each external module can operate with the data of a single common memory made available to the terminals by turns. This is the memory of the TREKHTLINIYA module. Similarly, a message in which cl-iaracters received from each terminal are sto red _ can be described in the TREKHTLINIYA module. And, of course, it is possible to describe the entire structure in the form of a single line module, whereby switching between terminals is accomplished by indexing structures be~.onging to this module. It is necessary to pay attention to one important factor. Having assigned the tree of the TREKHTLINIYA module in the network section and considering specif ic routines of the algorithm section in the context of modules of this tree, the programmer can completely separate himself from his surroundings (in this ca se the TERM and SELEKTOR modules) and assume that the entire task for the TREKHTLINIYA tr~e is performed by a certain virtual processor which operates with components which are described in the contents of modules. It attends only to communications lines connected to line module adapters. This principle, certainly convenient in solving problems at the basic teleprocessing level, was used for the firs t time in the NDL B6700 language. The description of the network in SETRAN also provides for the possibility of dynamic reconfiguration--the working replacement of the contents of modules and the switching o~ some fragment of the network for servicing by a standby PPD. Global Descriptioii Section "Masks" are de~ined in the global description section. A memory mask is ass igned in the form of a sequence of descriptions of simple memory variables and of uni- dimensional arrays o~ memory variables. On the basis o~ this description the language's trans],ator routine creates a cextain representation (mask) of the region of th~ meu~ory in which zepresentations o~ the variables to be describ ed have been packaged. Character locations of the mask are initialized in keeping with the descrintion of variables. ~f, then, in the network section the programmer assigns a memory mask identifier to certain modules, then the translatox routine wi11 actually isolate for each of them the physical region of the local working 75 FOR OFFICIA~, USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 N'UN UN'N'I~IAL USE ONI.Y storage of the P~D foz'nled accoxdin~ to the ass~,gned Iqask. A11 ~ axiab~,es whose representations aze local.ized in ~hi,s reg~oTt wi1,1 a~pea~ ~,n the modul,e's context. The programmer can in~luence packaging hy ~ssi.gn~ng the pxecise ~ocation o~ a simple variable in the ~ask. Dixe~t addxess~;np ~s necessaxy ~ox the data trans- - mission processox operating s}rstem's intex~~ce and ~or routines of the central system. With specific principles floX the equipment~s structure, it makes it pos- sible to increase the ef~tc~ency of the data transmission processor on account of the simultaneous retrieval of several operands ~rom the memory. Relative addressing is a.1so poss~,ble, when the repxesentations o~ other variables are localized within the limits of a memory location storing a xepresentation of an encompassing variable. In fig 3, for example, is illustrated how the translator routine performs packaging on the basis of the descrip tion given. The programmer uses variables with the identifiers INFORMATSI'iA [INFORMATTON], TIPTNFORMATSII [TXPE OF INFORMATION], NOMABONENTA [NUMBER OF USER] and NOMPEREDACHI [NUMBER OF TRe1NSMISSION) in forming a heading, but when the need arises of traz?smitting into the cotmnunications line - a structure already ~ormed, he operates with the encompassing variable ZAGOLOVOK [HEADING]. �...~OIMOCOM ~B~Q~i MMIpOP`ip{(1/O w~~J ~ JOtM040R ~JJ~ 1 munu.~c{o~uu W~Q1 / wso~oAcur /61~ ~MV6o.w~ainv Q11,Q3/~otoeoBorl~J: ) ..o.,.,eP~"~ 9~ Q2 / ~oro.aea /11, . . . 3o~e.oeo. 2) ~ � 7 6 3 a 3 ? f p 3~� ~ ~ Nornrp[~abuu _ Ho~,v6o~rwmc (F~ ~~�~~~oP,.o~~u 5 ) N.~rOpMpuun ~ 6) - Figure 3. Principle o~ Combining Representations of Variables Key: 1. ...ZAGOLOVOK F8 D1; 3. NQM~k~~p~CHZ INk'ORMATSIYA F1 D1 / 4~ NQM~BQNEN~A ZAGOLOVOK [ 7 J; TIPIN�~ORMA- 5. ~IPTNk'OR~IATSzI TS I I F'1 D2 / ZAGOLOVOK [ 6]; 6. IN~'ORMATSIYA NOMABONENTA F1 D3 / ZAGOLQVOK [4); NUMPEREDACHZ k'1 A2 / ZAC~LOyOK [ 1 ] ; . . . 2. ZAGOI,OvOK The description can also no t include addressing o~ a variable; in this case the location of the repxesentation of the variable in the memory is determined by the translator routine. 76 FOR OFF[CIAd. USE UNLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY - A special type of simple u~emoxy ~rar~able is the sem~phoxe. Zt is highly pzobable that a variable o~ one and the same mask m~st be ~nitia~.~,zed di~~e~ently in the context of vax~ous modules. Let, for exa~rip~e, the u~axi~qum pe~cpqissib~e number of repetitions wi~th the unsuccessful transtuisSi,on o~ a po~~ing (or accessing) sequence be assigned by a variable with a Ppv~ORY [R~~F,A~S] ~,ndentifier from the ~AMLIN mask. Tn view o~ the vaxying quality o~ com~nunfcati,ons lines, the number o~ re- peats must be selected tndividually ~or each o~ them. This "tuning" o~ one or more variables of a mask as applfed to a module can be carxied out in the netwozk sec- tion. Above in describing the TREKIiTL~NTX'A tuodule we wrote - . . . MEMORY PAML TN (PQVTORY` : = 5 ) . . . This can be understood as ~ollows: the isolation for the module of a memory formed according to the ~AMI,IN mask, but with this the variable with the PpVTORY indenti- fier must be initf.alized not by the value assigned for it in describing the mask, but by the value 5. A second type of mask is "message masks." A message is a region of the memory - which is used fo r setting up interaction between routines run in modules of a single tree, as well as for interaction between any of them and routines of the central system. Having formed a message, one of the interacting routines transmits it to _ another; as a rule, this is done through a queue playing the role af a buf�er be- tween asynchronous processes. A message usually includes a heading and a text section. In the typical case of - a message unit for readout (from the central system) the text portion contains the text to be transmitted an3 the heading, certain parameters of the transmission pro- cedure; in the case of a message-result concering read-in (to the central system) the text portion contains the text received from the line and tt-~e heading represents the hard-copy log of the communications section. Messages containing only a heading are often used. _ For the SETRAN programmer the "message" is the message's identif ier. Actually, the message identifier equals the message descriptor--a location of the local working storage with a fixed address, which contains a reference to the message itself and - some information regarding it. Thus, under the same name the programmer can process an entire flow of inessages keyed to the descriptor at various times. In base level problems, as a rule, it is necessary to form or analyze a message heading. The programmer does this by using "message variables," whose representa- tions are localized in the heading of the message keyed to the descriptor at a - given moment. The SETRAN program can process messages with various heading struc- tures; the only limitation consists in the fact that messages with an identical - structure are to "pass" through a given descriptor. The message mask, which includes descriptions o~ message vaxiables, assigns the structure of the heading. In the network section each message identifier is assi~gned a message mask identifier (e.g., above ~or the POLTER~l module we wrote ...MESSAGE ZAG (SB)... , whez�e ZAG is the mask identi~ier and SB is the message identifier) . - 77 FOR OFFICIAd, USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 - - FOR OFFIC[AL USE ONLY Thus , the translator raut3,ne "knows" how to gafn acc~S~s to the head~ng (yia the descriptor) and how the xegion o~ the ~qe~ory~ ~ccup~ed by~ ~he heading is structured (from the description o~ the ~es.sage mask); th~,s ~ake~ ~C poss~b~e to pexkorm operations with components o~ the heading descxibed a~ tqessage Yax~ables, In communications processors is ordinari.ly used nonprogra~nable line equipment which links the computer with communfcatfons lines.* zt is at the lowest ~unction- al 1eve1 of data transm~ssfon: ~t ~,nteracts dixect7,y w3,th cowqunications terminal equipment (in particular, with utodetqs), ffi enab7.es the requixed duration of unit intervals, it gath~rs bits into characters in reception, and, on the other hand, breaks up characters in tran~mission, it eliminates (adds) start and stop pulses, and the like. Usually its mode of operation with a given communications line (adap ter) is determined by the sta~e of several registers accessible to a pro- grammable com~uter. The software facilities of these registers are assigned in a"register mask" in the f orm of a sequence of descriptions of "register variables." The r.egister mask identifier is indicated in the contents of the lin2 modulP after the procedural word REGISTRY [REGISTERS]. By operating with register variables, any routine of the line's tree can control the state of line equipment as applied to "its own" adapter. ~ In the register mask are also assigned virtual registers which lack a hardware _ equivalent; their functions are implemented by the computer through interpretation. - ' In other words, r~gister variables are used in individual cases as a means of "soldering" in~o the software those functions which were not added to the line equipment because of a l~.ck of opportunity or simply on account of shortsighted- - ness. It must be mentioned that in addition to memory, message and register variables a"special variable" has been defined in the language. It is designated by the procedural word SIMVOL [CHARACTER] and represents the sof~ware ~acility for the location through which exchange between th~e computer and line equipment talces place . = Each adapter is assigned its own special variable, to which is imp.licity assigned - the representation of characters received through the adapter in execution (as _ applied to the adapter) of the reception sfiatement; thus they become program ` acc~ssible. In execution o~ the transmission statement the program-prepared re- presentation of the special variable is implicity sent through the adapter as the - - ne~t character to be transmitted; this operation can be performed more than once in a single statement. The constant mask contains descx~,ptions o~ simpl.e constants and o~ un~.ditqensional J arrays of constants. Zn the network section each ~~D ~s assigned an identi~ier *This equipment is present also in the "~1,'bru~-1" I~IyK ~PD. It ~.s called a ~ group interface unit (GUS). 78 - FOR OFFdCIAL USE 4NLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY of a certain constant mask. As the result o~ the const~nt o~ zhis ~sk, ar,y routine of the module run in a giYen ~PA can be used~ The "mask" concept as applied to cor~stants is rather arbitraxy, ~ox variants are , possible in which a eonstant mask cannot be ~.denti~ied wi.th the st~ucture of a - ~ memory region or o~' registers. Fnr example, ia the ~irst. implementation of SETRAN - the representations of simple constants whose word length is not gxeater than four bytes remain in the translator routine's tables and during g~neration are repre- - sented directly in the instruction code. Howe~rer, Tn the typical case the constant _ mask includes descriptions of arrays an.d o~ long constants. Thei~ representations are packaged in the 1oca1 working storage; there~ore, the translator routine, in - passing a description o~ the constant mask, creates a characte~ pattern of the region of the memory occupied by constants. The regfon of the memory structured _ according to this mask is actually isolated in the data transmission processor in translation of the network section. ~ _ In data transmission problems simple constants are especially important for ~ _ designating long strings and characters ~ahich do not have proper graphics. - Constant arrays can be described in one of two forms tn SETRAN. According to the ~ first form all elements of the array are described in the form of a list. Thus it is convenient to adc~ to the program code translation tables whereby the translation , itself Grill be perfurmed by an ordinary assignment statement, e.g.: CHARACTER: = K.DKOI7[SIMVOL]; here K.DKOI7 is the constant array with the identifier DKOI7 from constant mask K. The array represents a table of translation fr.om DKOI to KOI7. In the case of the second form, instead of a lit~ral indication of elements of the array is written the equation by which they are computed. It obligatorily contains a variable "ir,put element" (VKh) for which a iange of variation is assigned. Ele- ments of the array are generared by the translator routine, substitutitig in the equation the next value of the input element lying within the limits of the range. - Thus, the program in a number of cases does without routine work relating to the computation of factors to be assigned analytically. For example, let it be required to f ind the remainder from d~=viding (modulo-two) by a genera*ing F~lyr.omial a certain eight-bit code linked on the right with 16 zeros. With the step-by-step method of cyclic anti-interference coding this must be done after the reception o~ each charactex with a newly xormed eight-bit code. But it is possible, having sacri~ied the memory, to form a table of remainders ,~or all pcssible eight-bit combinations. T~ the genezating polynomial is given in the - same mask in the form o~ a simple constant with an identi~ier o~ X16X12X5X0, then for the purpose o~ generating the table it is su~~icient to describe the ~ollowing array: 79 _ FOR OFFICIAd, USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 ' rv~c urritr~wL UJ~ UIVLY ~ . . . [k'ROM 0 'PQ 255~ OSTATKT [RFaMAINDERS~ ~'8D2 ~ yKh&4~40000~>i`~OpMOA ~1,6X12XSX0;..~ ~ The last component of the global d.escriptf,on section is descxiptf.ons o~ ltne eve~its. A"line event" is the software form o~ an interrupt tx'ansmitted by the - line equipment computer. ~t can correspond to an actually generafied interrupt or to some virtual interrupt created by interpretation bp a"soldexed in" module - of the operating system. ?.lgorithm Section - The texts o~ module routines are described in the algorithm section. The addition to the language of subroutines .and functions has been workQd out and this has not - caused fundamental difficult~es. However, in the first edition of the translator routine sl~br.outines and functi~ns were not implemented because of the great overall amount o~ work, i~ Included among the n~umber of a.lgorithm section facilities which can be utilized in writing module program are primarily universal constructions such as structures and situations, conditional and selection (CASE) statements, synchronization state- ments and somewhat developed Dyks~ra primitives. ~ Ope:rations of 10 priorities have been defined for expressions. In addition to whole-number arithmetic operations, a number of logic operations have been added, as w~ll as specific operations which are especially useful in data transmission - p roblems, such as a shift (in particular., a cyclic), inversion, linking, embedding, d ivision and modulo-two addition and fon.~ation of a parity-check sequence. I n computing expressions is employed the b~.sic statement of the language according - to ~hich each construction used as a primary simultaneously has a"representation" and a"valtie." The representation of a construction is the continuous set of b inary digits assigned to it: 0 and 1. The value of a construction is tne value of the number assigned to it. By a number is nleant a positive whole number or zero. This 3ualism, making it possible to apply any opei:ation (in particular, arithmetic and logical) to any construction, is quite fruitful in base level teleprocessing p roblems. It is possible to cite many examples. L,~t us choose the most simple. Let the charac ter received be stored in a memory location "belonging" to the ~ ingle-byte va riable P.SIMV~L (i.e., to a variable wiCh the identi~ier STMVOL [CHARACTERJ ~rom mask The character enters the cot~unications line in KOI7 c ode. It is required to check whether it is the control character ICB (KONETS BLOKA [END O.r BLOCK]), whose code is assigned by the single-byte simp7.e constan~ K.KB. z~ it is, then certain operations are to be per.~ormed. Otherwise, the c haracter is t o be translated into DKOZ code and other opt~rations sre to be per- f ormed. It wi11 look like this: 80 FOR OFFICIA~. USE ~ONLY ~ APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USF. ONLY IF S IM~10L EKV [ EQU I~E1Lk~ ] R. KB ~ THEN . . . . . . . . _ OR ELSE ~.SzMVOL:= K.KOI7D[~.STMVpI,] . . . . . . . . . . . . . . . . . . . . . . . . OVER; ~ In the condi.tion is employed the 1og~cal operation "equi~valence" which checks the identity uf the codes o~ both o~erands. Tt works with the repxesentation of the P.SIM~'OL variable. In the OR ELSE alternative the translation of codes takes place. The translation table is the K.KOI7D constant array. In indexing the ~.SINfVOL variable array we use its value. It makPS it possible to select the element of the axray corres- ponding to the same character in DKOT code. Another example. Let there be crganized on the basis of the byte variab7le P.SCHETCHIK [COIINTER] a modulo-16 counter which registers the number of the informa- tion block to be transmitted. This number must be transmitted to the user before the block in DKOI code. In computing the current value of the counter an arithmetic addition operation is _ performed, utilizing the value ~f the variable P.SCHETCHIK:=*+l; but conversion - into DKOI code is performed by means of logical addition of the variable with a string having the code 11110000:P.SCHETCHIK:=*OR �11110000� . Here the re- presentation of the variable if utilized. A number of operators and standard functions make it possible to arrange for working with queues and messages: to attach and detach a message, to transf er all messages from one queue to another, to obtain informat3.on on a message and queue, to move the indicator of the current byte in a message, to store the next received - character in a message byte or to select the next message byte for transmission, to interrogate a region of the memory for a message (descriptor), and to transmit a message to routines of the central system or to the frAe memory region bank. This software is not fundamentally new--it is included in one form or another in DC-ALGOL B6700, for example. In SETRAN some of 3.t has been considerably developed or modified; that which did not require modification was taken without changes. The language necessitated the addition of several specific statements and standard. functions. Included in their number can be standard functions making it possible to work with queues and routines of nesred.modules,.~r the standard function - making it possible to convert a DKOZ string into a binary number and vice-versa. - - SETRAN is oriented towazd the conveyex method o~ data processing, Therefore, ; a special position among speci~ic ~acilities o,~ the algorithm section is occupied ~ by the reception operator and transmission operator, By util~.aing them the programmer organizes work with cominunications lines, which is in the final account _ the key function o~ the SETRAN program and og the dsta transmission processor. l-_ Tr 1~1 81 : = FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY Rereption and transmission operators a.re fairl,y c,oulp~.ic~ted; there~oze, within the scope of this article it is begt to demonst~ate,~'their function in a brief example. . TO NETZAGOLOVKA [NO HEADING], PER~~OL~NENI7(~ [OV~Rk'LOW], OSHCHETNOSTI [PARITX ERROR], OSHKSB [BLOCK CONTR4L CHARAC~~R ERROR], A'~DNE'VNORM$ [DATA T'RANSMISSTON EQUIPMENT NOT UP TO STANDARD] %*The reception and transmission operators are combined. I;. is possible to build structures on their basis. Here is given is description of situa- tions % RECEIVE [1] MESSAGE SB [FROM P.NACHSEGMENTA [BEGINNING OF SEGMENT] TO P.KONSEGMENTA [END OF SEGMENT]] %*Reception is carried out from the adapter having a xelatiye number of 1 in the list of all line module adapters. Then within the ,franiework of the same operator characters received will be stored in the message segment whose boundaries are assigned by the value of the variables P.NACHSEGMENTA and P.KONSEGMENTA. Thus, it is possible to apply simultan- eously to a singls message several reception operators f illing various segments % - (SBOYAPD [DATA PROCESSING EQUIPMENT MALFUNCTION], KTOTAM [WHO THERE], DETEKTOR- KACHFSTVA [QLTALITY DETECTOR], CHETNOST' [PARITY]) %*These are "foreseen line elements," i.e., interrupts which can arrive from the line equipment instead of the next received character. Entered receiving medium. % * * FOR P.E'iALONZAGOLOVKA [STANDARD HEADING] CYCLE � � � � - � � � % *The dotted line indicates omitted constructions. % * - . ...NETZAGOLOVKA! [NO HEADING] REPEAT; %*Operator for start-stop cycle with a heading. Its function is to compare the sequence of characters (headings) received from the communications line with a certain standard, which in our case is assigned by the repre- sentation of the P.ETALONZAGOLOVKA variable. Each step of the start-stop cycle begins with the reception of the next character. At the end of the cycle's medium the character rece~.ved (possibly transformed in the cycle's medium) is compared with the corresponding byte o~ the variable. ~ With a lack o.f agreement the sequence o~ operators speci~ied after the colon is executed; in our case the operator �or a structural change with the NETZAGOLOVKA situation completes the execution o~ the entire reception operator. I� the entire heading is received success~ully, then the start- stop cycle operator is ended naturally TO VES'BLOK [ENTIRE BLOCK] , * CYCLE 82 FOR OFFICIA~, USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY %*The simple start-stop cy~cle operatox which will receive ~he information bl.ock is begun. ~he structure is cTeated on ~ts basis; the VES~BI,QK situation is described % - . . . . . . . . . . . . . . . . . . . IF SIMVOL [CHARACTER] EKy [EQUIVALENT]~K.KB THEN VES'BLOK! [ENTIRE BLOCK] OVER; _ %*In case of the reception of a character equivalent to the constant K.KB, we leave the cycle according to the ~TES'BLOK situation . . . . . . . . . . . . . . . . STORE IPEREPOLNENIYE! [OVERk'LOW] %*The character received is stored (possibly processed in the medium of the . start-stop cycle) in the "current byte" of the SB segment. If the segment - is already filled, then a structural change is perf ormed im~ accordance with the PEREPOLNENIYE situation and the reception operator is concluded - REPEAT; DELAY; %*Start-stop delay operator. The routine stops before reception of the next character % IF CHARACTER P.KSB THEN OSHKSB! [BLOCK CONTROL CHAR~ICTER ERROR] OVER %*The character received is a block control character (KSB). It is compared with the P.KSB variable "in which" the KSB of the block received is generated. With lack of agreement a structural change in accordance with _ the OSHKSB situation takes place and execution of the reception operator is concluded; ~therwise, the reception operator is concluded naturally.% (SBOYAPD : APDNEVNORME!,[(DATA TRANSMISSION EQUIPMENT MALFUNCTION : DATA TRANSMIS- - SION EQUIPMENT NOT UP TO STANDARD!,] - %*The "reaction to line events" entry begins. With the origin of a SBOYAPD line event a structural change is performed according to the APDNEVNORME situation and the reception operator is concluded DETEKTORKACHESTVA [QUALITY DETECTOR]: . . . . . . . . . . , %*With the origin of a DETEKTORKACHESTVA line event a certain sequence of operators is executed and the program returns to the same point ~f the reception medium where it was before the origin of the line event, i.e., awaits the next character % CHETNOST' [PARITX]:� � � OSHCHETNOSTI! [PARITX ERRORI %*In case of an error in parity of the character zeceived a certain sequence - of operators is Pxecuted and xeception is concluded as the result of a structural change in keeping with the OSHCHETNOSTI situation VSEPM [RECEFTION OVER] % The reception medium and the entire reception o~erator are completed. _ 83 FOR OFF[CIAL USE ONLY A APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 r~K ~rr~~tAL US~: UNLY � - WITH NETZAGOLOVKEI: [NO HE~zNG] . . . ~ . . . . , % *,P~ttachment o~ operation PER~POLN~NIXE: [OV~RFLOW~. � . . . . . , in keeping with situations OSHCHETNOSTI; [~A1ZIT'Y ERRQRI � , � � . . . , conc7.uding execution of OSHKSB: [BLOCK CQNTROL CHARACTER ~RROR]. th~e reception operator - APDNEVNORME [DATA PROCESSZNG ~QUTPMENT NOT UP TO STANDAIZD] : . . . . . . . . . . . . - VSESIT [.�i.TrUATIONS OVER] The transnt'.ssion operator is practically symmetric; by employing the start-stop cycle and start-stop delay operators and other ~acilities o~ the algorithm section in its medium it is possible to describe the transmission o~ a complicated informa- tion structure. Data Transmission Processor In lceeping with the general principle of modularity maintained in the "E1'brus" _ MVK, each specif ic complex, depending on the number of communications lines served _ and the rate of the information flow, can contain up to 16 PPD's [data transmission processors]. The data transmission processors interact with the central system of the MVK on the basis of a common working storage. The PPD gains access to the ' central working storage through an input/output processor (PW) which controls all external inf ormation flows of the MVK. Up to four PPD's are connected to a single PW (cf. fig 4). 1) nne ~ nee ~ . , , nea ~ 0 11 7 3 I~S 6 7 I? A H IS _ i 3~ ---4~-- nn4 i2~ r-- ~~-i i I ~ U^Kmpo~eNnKt hk~cmNao ~ ~ ~ ~ En~urnumree or~rpaiuO~vv i... ~ uB ~'10/J ~ ~ (l(B) ~unume i o r~...~s ~roon) I I�~ 5~ u 6 I O ? ~/yC ~ !f'C ' O~ ~ ~ ~ I ~ Acbrmipe~ ~ ~ I LO _IS _ _ ` I ~ ~ _ --...J L_--------~ Figure 4. Structure o~ "E1'bxus" MVK Data Transmiasion Processor ~ Key: 1 � PW 5 . TsV 2. PPD 6. M0~ 3. Central computer (TsV) 7. GUS [group interface unit] 4. Local working storage (MOP) 8. Adapters 84 FOR OFFICIAd. USE ~ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-00850R040440020012-2 FOR OFFICIAL USE ONLY , The data transmission processor can be connected direct7,y to two ~W~s. At a given moment it works on1.y with one o~ them, but when a~vV g0es out of order the in�ormation flow o~ the data transmission processor can be switched immediately to a s tandby PW . The data transmission processor has a modular structure. It consists of a central computer (TsV) , a locai working storage (I~Q~') and group inter~ace units (GUS's) whose number is determined by the number o~ coaununicat ions lines served. Group Interface Units The key funcCions of a GUS are as follows: to r~ceive data and convert it into character form for subsequent processing by the SETRAN program being run in the central computer; in transmission its function is the opposite--to convert charac- ters prepared by the program to a form in which they are to be transmitted through the communications line and then tc ensure their entry into the line. The transmission of data is usually performed in a serial bit-by-bit manner; there- fore, the function of a GUS can be defined more concis ely: the assembly of charac- ters in reception and their disassembly in transmission. Assembly-disassembly algorithms are determinate; only parameters can be changed--the type of data trans- mission (synchronous/asynchronous), the rate (bits/s) a.nd the character format. Accordingly, a GUS is designed as a nonprogrammable un it in which the parameters of the "soldered in" algorithms are assigned by the central computer, i.e., by the SETRAN program working with register variables. The structure of a GUS includes 16 adapter positions. An adapter of any type can be installed at any of them. Designwise an adapter rep resents a single standard element of the "El'brus" MVK. At the present time adapte~,:s o,f three types are used: 1) a telegraph, for direct interfacing~with the lin~~ (an Sl-TG interface); 2) the S2-100 ~V24 series 100) interface adapter; and 3) a parallel interface adapter (S3 and S2-200). All of these perform only the functions of an electrical , interface with the line or communications terminal equipment. The Kh-25 adapter, in which some logic is provided, is under development. An adapter position is tuned to a specific mode by ins talling the appropriate _ adapter and by means of software tuning of control fie lds which assign exchange parameters. The serial synchronous mode makes possible operation wi th speeds up to 9600 bits/s. An increase in speed is possible, but the maximum permissible number o� adapter positions in a GUS is thereby reduced. Two character formats--a main and addi- tional--are worked with direct].y. 7.'he additional format is used for the remainder of a coded program in cases when its total length is no t a multiple of tfie word length o.f the r.~ai.n format. One of the variants of the synchronous mode is designed especially for the cycle phasing procedure. With a steady reception mode there is a variant with the automatic exclusion o~ synchronization characters and with the transmission mode a variant with the automatic generation of these cha,rac ters. The code of a 85 FOR OFFICIA~, USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY _ synchronization charac~ez can be any oneR~it is a.ssigned bY the $ET~AN pro- ~ gram. The serial asynchronous mode is implemented ~or the range o~ standaxd speeds from 50 bits/s to 4800 bits/s and for a11 start~stop ~or~ts used in practice. Itg distinctive feature is the automati.c (without the participat~on o~ the central computer) readout of reception and trans~ission time-outs between characters. The length of a time-out is assigned by~ the progra~. The generation of an OTBOY (BREAK) pulse represents a separate mode. Its duration is software controlled. Possible emergency and nonemergency situations which arise in reception and trans- mission result in the generation of special interrupts transmitted to the central computer. They are processed as line events in the program. To GUS's have been added special gear making it possible to implement a program- controlled interface with communications terminal equipment (e.g., a modem). By their means the control of interface circuits has been brought up to the level of the SETRAN program, in which the appropriate procedure, in particular, the establishment of a connection, is described. A single group interface unit can be connected directly to two central computers. In case one central computer goes out of order the information flow of the GUS can be switched to a standby by means of special reconfiguration routines. Central Computer The central computer is a special-purpose processor designed basically to process information flows according to the conveyer method, A main feature of this equipment is the fact that it was developed under the great influence of the conceptually combined software, i.e., was designed for its imple- mentation from the beginning. Here special attention was paid to character-by- character processing--the execution of standard operations which {~,evitably or often correspond to the processing of each received or transmitted character. The hardware-controlled change of context must be singled out here. The fact is ~ that operation according to the conveyer method implicit~~ assumes ~he recurrence of routines carrying out character.-by-cKaracter processing. It is made possible by the fact that ,for each communications line (adaptez) is created a data module making it possible to organize execution o~ the routine in the context of precisely this line. Let us call it a"line context module" (BHI,). A standard component of a BKL is the address of the instruction ~rou4 which it is necessary to begin exe- cution of the routine Frith the arrival o~ the next ~haracter. Ordinarily a11 BKL's are stored in a local working storage in the form o~ a regular , structure. The ef~iciency o~ the processor is impxoved markedly i;~ the BKL ~or the line served is trans.ferred to registers with a short access time during the processing o� a character. Accordingiy, after the completion of proc~ssing the _ BKL must be returned to the MOP from the rapid register zone. Tn implementations 86 FOR OFFICIA~. US~ ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02109: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY of the conveyer method known to the authoxs (e.g., in the AC~ B6700-7700) the transfer o~ BKL~s is performed by the opexatin~ sys~em, i.e.t is Sq~twaxe con- trolled. This takes a considerable amount of time and inevitab~,e oyerhead costs originate. - In the "E1'brus" MVK PPD a change of line context is made posaible by the hardware: The process of requesting and returning the BKL is per~ormed automatically and - coincides with processing o~ the next character. Thus, the central computer begins the operations with the next character without preparatory operations, immediately after completing processing of tt~e preceding. Sof tware requirements have, of course, been reflected in the instruction set. The four-byte instructions o� the central computer are oriented toward the execution of SETRAN operations on byte operands and operands representing a group of bytes. They make it possible to speed up access to program constructions localized in _ the local working storage and the storage o� the central system and, :tn particular, to organize working with queues and messages. By means of specific instructions a very simple mechanism for requesting procedures has been implemented, making it possible to structure not too badly the object code of the SETRAN program. Conditional transfer instructions are oriented toward the most typical software situations--the arrival from GUS's of interrupts of a specific type and code, a change in the state of f lags and the like. Advanced hardware control has been added to the data transmission processor, which practically eliminates the pos~ibility of malfunctioning or failure without their instantaneous indication. As the result of an emergency situation the hardware automatically causes special reaction routines representing part of the operating system of the PPB. The program reaction to malfunctions makes it possible in prin- ciple to maintain the survivability of the PPD right up to extreme emergency situ- ations. Conclusion _ Results achieved in the creation of the data transmission system representing the basis of the entire "El'brus" MVK teleprocess~:ng system have been described in fairly c~mplete form in this study. It, of course, will be subjected to changes in the process of gaining experience in using it. However, if allowance is made for the fact that the "E1'brus" MVK SPD [data transmission s~~stem] is in the overall course of the development o~ fourth-generation teleprocessing systems, it can be considered a fundamental basis ~or the creation of further studies in this area. - COPYRIGHT: Izdatel'stvo "Zinatne", "L~vtomatika i vychislitel'naya tekhnika", 1981 8831 CSO: 1863/161 87 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02149: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY ~ UDC 621.391:621.395:681.142 NEW BOOK DISCUSSES CONTROL SYSTEMS FOR COMMUNICATIONS NETWORKS Moscow SISTEMY UPRAVLENIYA SETYAMI in Russian 1980 (signed to press 21 Jun 80) p 138 [Table of contents of book "Control Systems for Networks", edited by Pro- fessor V. G. Lazarev, doctor of technical sciences, and N. Ya. Parsfienov, candidate of tecl`~nical sciences, USSR Academy of Sciences, Izdatel'stvo "Nauka", 1,650 copies, 140 Pages] [Text] Table of Contents pagP Parshenkov, N. Ya., "The Probablistic Game Method of Dynamic Conrol of Flows in Channel Switching Networks" 3 Umrikhin, Yu. D., "Some Theoretical and Applied Aspects of the Systems Approach to Synthesizing Adaptive Control of a Data Transmission and Distribution Network" 9 Tavuzhnyanskiy, G. D., "Control of Information Flows at Intersections of the Network with Packet Switching" 36 Kotov, A. V., "The Question of t+~~ Systems and Comprehensive Approaches in Telephony" . . . . . . . . . . . . . . . . . . . . 41 Koshelev, V. N., "Hybrid Switching Systems" . . . . . . . . . . . . 52 D'yachenko, V. F., and Chernyayev, V. G., "Constructing - a Message Queue at a Switching Center Using Uneven Sets" 62 Solov'yev, A. V., "One Way of Evaluating the Time Required to Service Calls in the Electranic Control Machine" i0 Gol'dshteyn, B. S., "Optimal Priority Service in the Software of the Electronic Automatic Telephone Exchange" . . . . . . . . . 73 Doniants, V. N., and Piyl', Ye. I., "Synthesis of Boolean Functions in Modified Matrix-Type Homogeneous Media with Repetition of Variables" . . . . . . . . . . . . . . . . . . 79 88 FOR OFFICIAL U5E ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY Page Yanshina, L. K., "Selecting the Number of Coding Variables in a Nonautonomous Microprogram Automatic Device" . . . . . . . . . 90 Melikyan, E. R., "Constructing and Selecting the Heirarchical ~ Structure of a Control System with a Minimum Number of Control or Information Links for a Given Productivity" 94 Turuta, Ye. N., "Analysis of the Reliability of the Conveyor- Type Multimicroprocessor Control System" . . . . . . . . . . . . . . 111 Yershov, V. A., "Average Accessibility and and Recurrent k Calculation of Losses in Switching Systems" . . . . . . . . . . . . 121 _ Kuusk, E. E., "Using the Computer To Determine the Intensity of Telephone Load and Losses" . . . . . . . . . . . . . . . . . . . 128 Kholin, A. V., "Physical Modeling of Communications Networks" 133 COPYRIGHT: Izd~.el'stvo "Nauka", 1980 11176 CSO: 1863/137 _ 89 FOR OFFICIA~. USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFI~CIAL USE ONLY UDC 621.391 HYBRID SWITCHING SYSTEMS Moscow SISTEMY UPRAVLENIYA SETYAMI in Russian 1980 (signed to press 21 Jun 80) pp 52-62 [Chapter by V. N. Koshelev of book "Control Systems for Networks", ~dited ~ by Professor V. G. Lazarev, doctor of technical sciences, and N. Ya. Parshenkov, candidate of technical sciences, USSR Academy of Sciences, Izdatel'stvo "Nauka", 1,650 copies, 140 pages] _ [Excerpts] Work began in the late 1960's and early 1970's to build hybrid switching systems. The need to build integrated communications networks and hybrid switching systems arises, first, from the fact that the develop- ment of technology and data processing shows a growing need for information - exchange among different kinds of users. In the second place, as studies [6, 9, and 10] show, integrated communications networks are more economical than other types. This economy is achieved by fuller use of expensive main channels. In conformity with the recommendations of the International Telegraph and Telephone Consultative Committee, data transmission equipment is classified by transmission speed into the following groupa: low-speed - 50, 100, and 200 bauds; medium-speed - 600 and 1,200 bauds (speeds of 1,800, 2,400, 3,600, and 4,d00 bauds are also permitted); high-speed - 19,600 and 48,000 bauds and higher. Information in a communic3tion network may also have different character- istics. There are short messagea transmitted in a mode close to real time, long messages in real time, and large arrays of data. Information trans- mission ma.y be Performed ~.th improved reliability or without, with . due regard for the priority of the user and information or without. The different characteristics of user terminals and information being trans- mitted require that communications networks have different characteristics and that the r~witching center have different functional features. Thus, the future communications network should be suitable for serving different groups of users, which will require that the network have spe- cific characteristics that differ from exiating networks. These include a broad range of data transmission speeds, the possibility of transmitting communications in a wide range of lengths, and flexible protocol that makes 90 ~ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY it p~ssible to work in real time or relative time scales among different types of users. Integrated communications networks are designed and built on the basis of already-existing networks. Combinations of switching procedures in inte- grated communicationa networks are e~ployed with due regard for ma.xim~.cm integration of functions and joint use of the resources of switching pro- cedures. The problem of constructing a general-use integ~ated communications network - covers a number of questions: the architecture of the network, linking the network and the user, network control, consolidating connecti.ng lines, and constructing switching centers. The main question in constructing an integrated communications network, which in large part determines the solution to the other questions, is de- fining the degree of integration of the communications netk*orks. Figure 1 below shows different degrees of integration for channel and packet switch- ing networks. Q~~.~, nuydu id~v~u ~t'~t' ~ uHih tpane~eit J ~ ~ru,rau cs.rru. nub`u > Ca.~u ,C/! I ~t'/I K/I _ - (3 ~ nuyuL2~d.rr~ ~t'~C ~ ~K ~ ~ KK nuyau cssru i - K~ ~ n~~~~ ~e...,~~~ Figure 1. Key: (1) Switching Channel (KK); (2) Communications i.ines of Switching Channel; (3) Packet Switching (K1i) ; (4) Packet Switching Communications Lines; (5) Integrated Communications Lines; (6) Communications Lines. Figure la shows the divided structure of communications networks that exists at the pr~sent time. Each network here has its own set of users and com- munications lines. The co~unications networks do not have common equip- ment. The first degree of integration (Figure lb) offe;.s users the possibility of employing all the resources of the communications networks tfiat~ma~Ce up the integrated system. In this case the switching equipment at the switching 91 FOR OFFIC~AL USE O~1L: ~ APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 FOR OFFIiCIAL USE ONLY center and the communications lines renain separated for all switching methods. Users are connected to the co~unications network through one of the switching systems. In this case it is the channel switching system. The second degree of integration (Figure lc) has maximal merging of the func- tions and resources of the switching systems being combined. It is based on one system and minimizes the individual equipment of the other. For example, - if the integrated communications network is constructed of channel switching and packet switching systems based on the channel switching system, the indi- vidual equipment of the packet switching system is minimized. With this - de~ree of integration the connecting lines are shared, while the switching and control systems remain separate. Finally, the third degree of integration offers the possibility of access to the equipment of the communications network for users in all cate- gories (see Figure ld) with shared use of communications lines and merging the switching and control functions for all the switching systems being consolidated. This permits shared use of the entire memo.ry volume of the memory unit, the power of center processors, and the software system of the switching center. . Development of the switching center is a key question in building an inte- grated communications network. When selecting the structure of the switch- ing center it is necessary to consider the similarity and differences of the processes of establishing connections for different switching proce- dures. The similarity consists in the existence of three phases of processing a demand to establish a connection and transmit information: ~ the phase of establishing the connection; the information transmission phase; the signoff phase. The procedure for initiating the communications channel is also the same for all methods of switching. The difference is that with some switching methods (channel switching, and sometimes also packet switching) a real communications channel is established, while in _ other cases (packet switching and communications channels) the channel is virtual. This leads to a difference in the organization~of hardware and so�tware. The software includes additional procedures to or~anize the distribution of inemory to store packets and messages, as well as the pro- grams needed to process them. The hardware includes the additional ~ memory volume of the center memory units and the additional power output of the center processor. The additional power expenditure of the center processor is reduced by cons~ructing and separating the modules for processing and storing packets and messages from the center processor. This greatly increases the tlexibility of the hybrid switching system. Furthermore, the additional power expenditure of the center processor is reduced by constructing a multiprocessor str+~cture in the switching center [4J. The next important question of constructing the integrated communications system, which determines the choice of the switching center structure, is selecting the method of hybridization. Several techniques are known: separate receipt and processing of information transmitted by different switching techniques; joining the information of the data transmission - network and telephone network users into "envelopes" which are transmitted 92 _ ~ FOR OFFICIAL USE ONLY - APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007102/09: CIA-RDP82-00850R000400020012-2 I FOR OFFICIAL USE ONLY on the main line, and transmitting information with communications channels - and switching channels with transduction in the hyhrid switcfiing center (but for communications channels complete messages are transduced, whereas with switching channels it is particularly meaningful segments). At the present time hybrid switching sys tems for integrated communications networks are being developed and introduc ed intensively. Some of the most recently developed systems are the EDS and FDX systems which are being introduced in the national netwo:k for t ransmission of discrete informa- tion of West Germany (4, 11, 12]; the APB-20 and T-200 in Switzerland [8, 16]; the Unif ied Switching Center and DS-714 in England [7, 14]; the DDX-2 in Japan [13]; and, the M-3200 in the United States [5, 15]. Let us consider a few of them. Conclusion Our analysis of the experience of many large companies in the areas of - designing, developing, and introducing hybrid switching networks enables us to formulate the following basic requirements, whicfi must Fie the basis _ for construction of such networks: 1. Optimization of the process es of controlling blocks _ of rransmitted information; 2. The existence of general netraork protocol that defines the principles of control of the network and interaction between network centers and users; 3. Selection of optimal switching procedures depending on ~ the characteristics of the information, users, and con- dition of the network; 4. Insuring a high degree of re liability in switching centers; _ 5. Insuring the possibility of expanding the capacity of switching centers; 6. Ability to operate in hoth real and relative time - scales; 7. Developing software and a system of commands that maximally simplify programming and the entire cycle of software work in the process of information ex- change. COPYRIGHT: Izdatel'stvo "Nauka", 1980 11176 CSO: 1863/137 - 93 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPROVED FOR RELEASE: 2007/02/49: CIA-RDP82-44850R000400024412-2 FOR OFFICIAL USE ONLY UDC 681,32:681.3.06.001.57 A METHODOLOGY FOR THE SIMULATION MODELING OF THE COLLECTIVE-USE COMPUTER CENTER OF THE SIBERIAN DEPARTMENT OF THE USSR ACADEMY OF SCIENCES Riga AVTOMATIKA I VYCHISLITEL'NAYA TEKHNIKA in Russian No 1, Jan-Feb 81 pp 3-14 manuscript received 25 Dec 79 [Paper by Yu . I. Mitrof anov] [Text] A number of systems analysis problems came up during the design of the collective-use computer center of the Siberian Department of the USSR Academy of Sciences (VTsKP) [CUCC] being created in the Novosibirsk Scientific Center, the solution of which proved to be possible only by means of simulation modeling. In terms of algorithm structure and functioning, the CUCC is a typical network of computer complexes [1] and belongs to the class of large complex systems characterized by stochastic functioning. After studying the possible languaga tools for the simulation modeling of the CUCC, ALGOL-60 was chosen with the procedural expansion up to the level of a timewise modeling language for discrete systems (the set of simulation modeling procedures f or discrete systems - the KIMDS) [2, 3]. The reasons for such a selection are treated in section 1. The methodology for the simulation modeling' of discrete systems using the tools of the complex, its composition and structure whicti was realized in the set of simulation modeling procedures for discrete systems are treated in section 2. The organizational principles based on the set of simulation modeling procedure~ for discrete systems for the CUCC simula- tion models are treated in section 3. The composition and structure of two simulation models of the CUCC are discussed in section 4 as well as some results of studying it. 1. Language tooZs for simuZation modeZing. Simulation modeling as a technique for studying real and conceptual systems provides the possibility of constructing models which a theore~ical description of the systems being modeled with an level of detailing. It is specifically this fundamental property that in many cases determines simuiation modeling as the only possible study technique (especially for complex systems), despite its well kr~own drawbacks: the labor intensity of the development of simulation models, the complexity of debugging 94 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY them and the large amount of computer time required to perform experiments with models on a computer. The development of the means of automating simulation modeling an3 computer hardware is constantly reducing the relative weight of ttle deficiencies of this method as compared to its advantages, thereby providing for a constant expansion of the practical utilization of simulation modeling. The labor intensity of the development of simulation models and their debugging depends substantially on the programming languages used for the models, in particular, on. the existence of convenient and economical tools in these languages for representing the systems being modeled in models of the structural and functional properties. When deve'loping the m~ans of automation for simula- tion modeling, as a rule, the f act that the potential users of these tools are usually specialists in the systems being studied is taken into account, where these specialists do not have professional training in the general case either in programming or in the methodology of simulation modeling. For this reason, the modeling tools should basically allow for the reduction of the task of developing a simulation model to the convenient and natural depiction of objects and relationships in the system being modeled by the appropriate objects and relationships in the modeling system being employed, In this case, the method- ological principles for the construction of models are governed by the systems being used for the automation of the modeling. For example, discrete system modeling languages are being used at the present time which are oriented towards the depiction of events, processes, operations, etc. [4~. Universal algorithmic programming languages (AYaP) by virtue of their primary function neither contain the specific tools necessary for the represenCation of time relationships in the models, where such time relationships occur in the systems being modeled, nor embody a methodology for the construction of simulation models. At the same time, the broad capabilities of these languages as regards the representation of functioning algorithms for the elements of the systems being modeled have made it possible to use them as basic languages in the development of a number of specialized modeling languages (SYaM) (for example, SIM[TLA and SIMPL/1). At the present time, both universal algc~rithmic programming languages and special- ized programming languages are used in s~mulation modeling practice for discrete - systems (the advantages and drawbacks of their use for these purposes were treated in [4]). The reasons f or the use of an algorithmic programming language in simulation modeling are actually deeper than those usually cited (the lack of translators from the modeling languages to those accessible to a computer user, difficulties in operating modeling systems, the lack of high quality documenta- tion for users of modeling systems). In comparing algorithmic programming languages and specialized modeling languages from the viewpoint of their usage in simulation modeling, the followi~ig must be taken into account: 1) The ideas and content of the basic concepts of simulation modeling are rather simple, and understanding them does not as a rule cause any difficulties; 2) The existing modeling systems are oriented to one degree or another towards definite classes of modeled ssytems, something which generates differences of a methodological nature in the depiction of the modeled systems in the models; for this reason, in particular, recommendations for users regarding the choice of specific modeling systems prove to be useful [8]; 3) The striving of designers of 95 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFF(C1AL USE ONLY modeling languages to make them universal, on one hand makes it difficult to study these languages and their practical applications by users, who are not programming specialists, and on the other hand, reduces the efficiency of the , simulation models as programs; 4) In the development of simulation models for camplex s~stems, along with the complexity of the functioning algorithms for the _ system components, the weight of the tools made available by the modeling language ~ for the description of the algorithms increases with respect to the tools for the systemic organization of the models. Thus, the utilization of universal algorithmic programming languages (as a rule, with the creation of the requisite tools within the framework of these languages) in the case of simulation modeling of complicated discrete systems is natural at the present stage of development of specialized modeliug Ianguages, which is on the whole still not satisfactory. 2. The KIMDS 5imuZation ModeZing CompZex. In structural terms, the ser of simu- lation rr.odeling procedures for discrete systems is a camplex of procedures for ` various purposes [3]. An independent component of the complex is the master program, which organizes the operation of the simulation models as a whole. All _ of the procedures of the complex can be broken down into several sets: synchron- ization and control procedures; statistical data retrieval and processing pro- cedures during modeling; random quantity generation procedures; procedures for working with data f iles; and service procedures. More than 60 procedures for different f unctions are incorporated in the complex at the present time. The structure of the complex makes it possible, on one hand, to expand the composition of the camplex through the inclusion of the requisite _ procedures, and on the other hand, to utilize only the requis:ite procedures of the complex in the development of specif ic simulation models. Ttie States of Processes and the Control of Their Development. We shall consider the basic principles for the organization of simulation models of discrete systems using the example of a simulation model I for a system S. We call a structural unit of the simulation model a program process. Corresponding to each element Ei, i= 1, 2, n, of the system in the simulation model is _ a program process Pi, which is a description of the given element jn the ALGOL-60 programming ~anguage and formatted as a procedure. Consequently, n program processes Pi, which are descriptions of the elements Ei, are incorporated in the model I. Messages are represented in simulation models by requirements of various classes, while the message sections are represented by requirement sections. The require- ments in the models are represented by their numbers, and for this reason, the motion of requirements in the models is essentially the motion of the numbers representing them among the various units of the models. Setting the requirements in a section and selecting them from the sections in the models is accomplished by accessing the put and get procedures. We shall assume that all of the processes in the model are numbered, and the number of the process Pi is designated as vi. 9~ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFF[C1AL USE ONLY ~ ` We shall draw a distinction between the main and auxiliary possible states of the program process Pi and designate them as p~f~, s= 1 2, 10. The main states are the active and the passive states (p~l) and pt2~ respectively). The remaining states are auxiliary ones. When running a simulation model on a computer, each program process realizes a certain sequence of discrete events on the model time axis, which represents the corresponding element3ry process. The realization of the events is accomplished by program processes only at the - point in time where are present in the active state. If some condition must be met to realize the next event, then the process is in the passive state until this condition is met. We shall term the state p~3~ the stop state. It is a special case of the passive state, when the condition for the activation of the process is the direct action of another process which is in the active state. The introduction of the state p~~), 4, S, 10, was needed for auxiliary purposes related the operational algorithms of the modeling system as a whole, and in parcicular, to make an analysis to see that the events ~eing realized in the simulation models are noncontradictory. Synchronizati.on and control procedures, as well as operators f or accessing them . are used in the bodies of the processes to assure the representation of the _ parallel development of elementary processes in a model and provide for the synchronization of the development of the program processes as well as control their development. We shall define the content of the synchronization and control procedures, presupposing for the sake of definiteness that the operators f or accessing them ~ are used in the body of the process Pi: delay (p, ~y, w) delays the development - of the process Pi (shifts to the passive state) for � units of model time or until the condition p is met; hold w) delays the development of the process Pi for � units of model time; wait (p, w) delays the development of the process Pi until the condition p is met; halt (v w) stops the process at the number v(shifts to the stop state); leav(w) stops the process Pi; start(v, w) activates the process at the number v(shifts to the active state), which is in the stop state. The realization of the a,lgorithm of the process with the number v will be started with the first segment of the process algorithm; push(v, w) activates the process with the number v, which is in the stop state (the realization of the algorithm for the process with the number v will be started with the segment of the algorithm, aheald of which it was stopped); finish shuts down the modeling process, i.e., terminates the execution of the simulation model on tiie computer. Service Tables and the Master Program. The operation of the set of simu- lation modeling procedures for discrete systems anci the simulation model as a whole is ~ontrolled by the master program, which, just as the procedures for syn- chronization and control, uses information on the processes during operation which is contained ii: tables of process states, time markers, ~eturn poiiits, prototypes and copies. In these tables, the numbers of the elements which contain the infor- mation pertaining the processes correspand to the numbers vi of the processes Pi. The codes of the process states p~s), s= 1, 2, , 10, are the values of the ~ elements of the table of process states. 97 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY We shall use A to designate the current value of the model time, and T for the _ point in the model time at which the next event should be realized in the process P(we shall call this mament the time marker of the procesa P). We shall use the character to designate a positi~~~ real number which is the representation of ~ in the digital computer, on which the modeling ie gerformed ($n experiment with ' a simulation mo%el). For processes which are in an active state, T~ 9; in a passive state r> A(in particular, we can have T m[~?, and in the stop state, t= The process P can shift from the active state to the passive one only as - as a result of the execution of the operator of one of the synchronization proce- dures: delay, hold or wait. With the execution of the f irst two operators, the point in time T for the process P is camputed from the formula T= A+~; with the execution of the operator for the wait procedure, T takes on the value of The transition of a process P with a number v to the stop state can occur either from the active state in accordance with the operator for the leav procedure, or from the active and passive states with the operator for the halt procedure, carried out by another process. With the transition of the process P to the stop state, T assumes the value of The values of the elements ~f the time marker table are the points in time T for all of the simulation model processes; these values fall in a range of [6, It stands to reason that the values of T for each process change in the course of running the routines for the simulation model on _ the computer. During the execution of the operators of the synchronization and control procedures, used in the body of the process P, the control is transf erred to the master program. To provide for the return of the control to the process P, the master program should have data on the "point of return to the process" or the number of the algorithm segment which should be executed as the next one and which directly follows the operator. The point of return to the process is governed by the parameter w in the synchronization and control operators. The value of this parameter is entered by the synchronization and control procedures in the table of return points, i.e., the value w is ass~gned to the table element corresponding to the process P. ~ We shall call two process Pi and P~, i. 3= 1, 2, , n, i~ j, equivalent if they differ only in the values of the internal parameters. We shall designate the number af equivalent processes of the k-th type as ek, k= 1, 2, , m, where m is the number of types of equivalent processes, while we designate the set of k type equivalent processes as Fk ={Ps~k}, where s {1, 2, , n}, It is sometimes expedient to have only a single program f or process representation for equivalent processes of a set Fk in a simulation model, where we shall call th is representation the prototype of the k-type processes. We shall call the k-type processes themselves the copies of the prototype in this case. With such an ap- proach to the organization of simulation models, it is sufficient to have m pruto- types in a model, something which tn many cases makes it possible to substantially curtail the volume of a simulation model and a program. Tables of prototypes and copies are used to ref er to a specific process. The num- bers of the prototypes or the types of processes are the values of the table of _ prototypes. The numbers of the copies of the prototypes or the internal numbers of the processes which form the set Fk are the values of the elements of the table of copies. For example, if the process Pi with a number v3 belongs to Fk, then the 98 FOR OFFTCIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY vi-th element of the table of prototypes is equal to k, while the vi-th elemelt of the table of copies is equal to j {1, 2, , e} k The sequence of actions performed by the modeling complex is governed by the organi- zation and functional content of the master program and is conditionally broken down into six steps. In each step, the master program executes the corresponding actions, the major ones of which are: the tranafer of control to the active pracess, the processing of the auxiliary markers, the control of the realization of the coupling of the processes, checking that the conditions for process activatio~ are - met, calculating the time markers, checking for the presence of active processes, searching for the process with the minimal time marker T~in, searching for processes for which the time markers are T= Tmin and correcting the model time. Statistical Data Retrieval and Processing During Modeling. For the sake of brevity, we shall call the set of procedures for sratistical data retrieval and processing during simulation modeling of discrete systems, together with the information base, the system S. This system provides for the retrieval and - processing of data def ined by the user prior to starting the simulation model (prior to the performance of an experiment with the model on a computer). In this case, the user has the capability of controlling the data retrieval and processing process by means of specifying the appr~priate control data: for example, specifying the point in model time, beginning at which the data retrieval and processing will _ be carried out. This capability has been realized for the purpose of providing for data retrieval only after the completion of the transient operational mode of the model, i.e., when the model enters the steady-state mode. Based on the values of the conf idence level and conf idence interval specified by the user, the system S can terminate (at the request of the user) the retrieval of certain data, if an ~ estimate with the requisite precision is obtained. In the case of a limited volume of immediate access memory of t~e computer, in which the experiment is performed, - the user can organize the retr.ieval of the requisite data in a sequential mode. In this case, the retrieval and processing of certain data will be accomplished after the completion, processing and outgut of other data. The system S, in accordance with the information specified by the user, can calculate estimates of the mean values and dispersions of the random lengths of the indicated sections and ttie random lengths of the model time intervals, the bounda~ies of which are determined by the user in the specif ied initial data. The indicated system can also generate histograms of the random interval length and random section length distributions, as well as provide for the capability of routing a requirement with an arbitrary indicated number. In the routing mode, during the modeling process the numbers of the sec~:ions and points in model time of the setting of the indi- cated requirement in a section and its selection from the section are printed out. This makes it possible to trace the motion of a requirement in the model during the modeling process, something which substantially f acilitates the debugging of the models. - The camposition structure and some of the algorithms of the system S have been treated in the literature [6, 7]. 3. The organizat ;onaZ princip Zes of simu Zation mode Zs for CUCC's. Th e M o d e 1 of a CUC C. The computer resources of a CUCC are the computer complexes (VK), 99 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 I FOR OFFICIAL USE ONLY _ tied together by a data transmission network (SPD), formed by data transmission centers and channels. Computer complexes are broken down into mainframe (BVK) an~ peripheral (PVK) complexes. The network centers are designed around com- munication processors, and each computer complex is directly coupled to one of the centers. We sha11 assume that a center, the compuCer complex directly ' coupled to it and the computer complex terminals tied to this form a link. We call all of the elements of a certain link and the users employing the terminals , of this link local with respect to each other, while the elements and users of another link are termed remote,with respect to the given link. A user can interact with the networ'.: in two ways: one-time and an interactive mode, according to the operational mode of the specific computer complex )batch processing or time sharing). In this casn, a user feeds out a message from a terminal, where the addressee is indicatecl in the message. The addressees can be either local or remote computer complexes and users. The message sources can be only the users. Three kinds of inessages come in to each computer complex: internal, external and remote. Internal and external messages come fram local users and are distinguished by the fact that the former are completely processed by the given computer complexes, while the latter are transmitted for processing by remote computer complexes. We shall call external messages addressed to RVK's [mainframe computer camplexes]~the base messages, while those addressed to users are callled communications messages. Remote messages come in from ren:ote users. A computer complex upon receiving a message addressed to it or to = its local user, generates a notification which is roured to the address of the source of the given message. The results of the message processing in the network by one of the computer complexes (local or remote) are routed to the message source in the form of a notice. When switching the packets in a data transmission network, all of the messages and notices incoming to it are formatted as packets of a fixed size. Only the immedi- ate access memory of the co~unications processors is used as the buffer memory at the junction centers. The model of the environment of the CUCC. The environment of a CUCC is created by its users, for whom the category, type and form of the user are defined as the characteristics, where these determine the basic user characteristic: the ranking of the user. Two categories of users are introduced in the models corresponding to a definite external priority level of fihe administrative network, a priority which is assigned to messages of the given users for transmission and processing in the CUCC. There can be two types of CUCC users: one-time and interactive users, corresponding to their modes of interaction with the network, as well as two kinds, determined by - the kind of dominant network resource used during the processing of the user mes- sages. Network resources are broken down into camputational and informational (communications resources are also included in the latter). We then associate . users with the first and second kinds, during the processing of the messages of which, primarily computational and informational network resources resepctively _ are employed, It follows fram the classif ication given here that network users can belong to one of eight ranks. 100 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY Requirements and their attributes. Four classes of requirements are repre- sented in the CUCC models: messages, notices, packats and notifications. They all have a main attribute, the marker, and a supplemental attribute, the complement. The requirements in the models are represented by their numbers, which are generated and erased by the model processes. The number is a unique characteristic, which identifies the requirement in the model. The class of a requirement can change in the process of processing and moving it in the model, but the number of a require- ment always remains constant. The movement of requirements in the model is de~picted ~ by the movement of their numbers. The attributes contain the basic characteristics of a requirement which are repre- sented by indicators. The marker has a composite structure and consists of five indicators, which define the code of the requirement cTass, the number of the prior- ity level (during requirem ent processing and transmission), the number of the user rank to which the given requirement "belongs", the number of the message based on which the requirement was "generated" and the address of the requirement source. The complement consists of five indicators, which define the address of the require- ment addressee, the code for the addressee criterio:~ (this indicator defines and is the addressee of the requirement of the computer complex or user), the number of packets (in the message or notice), the packet number and the packet criterion code (this indicator determines the association of a packet with a message or notice). The markers and complements of requirements are contained in tables of markers and complements. The marker and complement codes are the values of the'elements of the - corresponding tables; the numbers of the elements are equal to the numbers of the - _ requirements. The marker and complement codes are used by and can be corrected by the model processes during requirement processing and transmission in the network ~odel. The structure of the models. The simulation models of CUCC's include four types of program processes which depict de�inite CUCC components: ns depicts the set of users (the environment)of a computer complex, including the users of various categories, types and kinds (the process generates a message flow which depicts the overall message incoming to the computer complex from the users of the given set); ~r~ depicts the computer complex of a CUCC (the process simulates the execution of the main functions of the computer complex of analyzing, proce~sing and transmit- ting the messages, notices and notifications incoming to the computer complex); ~rn depicts a junction center (communications processor) of the data transmission network (the process simulates the execution of the main functions of a data trans- mission network junction center of analyzing, processing, preparing for transmission and transmitting the messages, notices, packets and notifications incoming to the junction); nZ depicts a simplex data transmission channel of the data transmission network (the process simulates the transmission of inessages, notices, notif ications and packets via the channel). The trajectories of movement of the various classes of requirements between the model processes during their functioning depict the trajectories of requirement movement among the components of the CUCC which are depicted by the corresponding processes. The queues which are realized in the models based on the principle of processing the requirements located in them are broken down into dynamic and static types 101 FOR OF~ICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY (queue listings). Dynamic queues are the input queues to~~the~processes, while static queues are the internal queues of the processes. The requirements from a dynam3c queue are procesyed as processes without interruptions, i.e., until all of the re- quirement found within the queue are processed. The processing of requirements from a static queue can be interrupted, specifically: upon completing the processing of the next regular requirement, a process can terminate the processing of the require- ments from a given queue and changQOVer to the performance of other functions, in particular, begin the processing of requirements from other queues. Setting and selecting the requirementsfrom the queues is accomplished in accordance with the "First come - first served" principle, with relative priority, i.e., without inter- rupting the procPSSing of a lower priority requirement upon the arrival of a higher priority requirement. The queues in the model are realized in the form of coupled listings. 4. SimuZa tion modeZing of a CUCC. Some results of a study using simulation modeling of one of the organizational variants of a CUCC, which we shall call the VTsKP-G [CUCC-G = Collective-Use Computer Center - G] are treated in this section [8, 9]. The CUCC-G includes 13 computer complex- es: 10 peripheral and 3 mainframe com- z~ Z,~ Z17 Z~~ z~o plexes. All of the peripheral c~mputer complexes are based on the M-7000 com- puter, while the base mainframe computer Zr Z9 complexes, the BVKYe, BVKB and BVKE, are based on the Unified Systezn of Electronic Computers, the BESM-6 comput~r and the - z3 z+ Zs Z6 zi zs "E1~~~::~" muTtiprocessor computer. All of the computer complexes are tied to- gether by the data transmission network. Figure 1. The topology of the data The functions of the data transmission trunsm ission network of the CUCC-G network junctions in the CtJCC-G are partially realized b,. the M-7000 com- puters incorporated in the computer complex, and partially by r,.~ ro~~mputers. The topology of the data transmission network is shown in Figure 1; -~he~e Zi, i= 1, 2, 13, dcsignates the links of the CUCC-G, while the lines cc~~espond to duplex data transmission channels, each of which is designed in the fc~~ uf two simplex daCa transtaission channels (KPD) , one of which is the input cha �.ie1 �relative to a specif ic junction, while the other is the output. The carrying capacities of all data transmission channels are : b Kbit/sec. The iinks Zi, 1, 2, 10, correspond to the peripheral compute c,~mplexes, while Z11~ 'l.~2 and Z13 are the BVKYe, BVKB and BVKE respectively (therE ~rF no users having direct access to the BVK [base mainframe computer complex, ~-~:~sr:, .,ers in the links corresponding to the BVK's). The major algorithms and sa.:. >f. che parameters of the CUCC-G and its environment were treated in [10]. The CUCC-G was studied through experiments with simulr.'', k~:r mc~..`als: the IM-2 and IM-3. The IM-2 model depicts the CUCC-G as a whol, ,~~ni~.z p.:~� IM-3 model depicts the CUCC-G data transmission network. Various modiflca~ic:r~', rf the processes ns, nc= nn and nZ are used in these models. The proces,~.:. is1 ~ea~,~~. models are combined into blocks. The block Bi, i= 1, 2, 13, dep:cCs -:hc ;ink Zi of the CUCC-G 102 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFF[CIAL USE ONL'~ m �M o ~ . ~t,i ,-I a ' ~ N ,,G 'a `a ' ~`o u 'v u~ N ~ 1 ~ o o ro .~c ~ o ~ ~ � ~ ~ ~ . .'~I,i ~ ~ ~ ~ ~ ^ N ~ ' ~ l ~ ~.C ~ ~C,i y~i ~ ~ ~ r,~~~ ~c y r,r o ~ ~ o . ~ ~;t . Figure 2. The configuration of the Figure 3. The configuration of the block Bi of the IM-2 model block Bi of the IM-3 model. with the output data transmission channels. The blocks Bi in the IM-2 and YM-3 models differ in terms of the composition and content of the processes included in - them. One each of the type ~rS, ~r~ and ~rn processes is incorporated in th~ Bi of the IM-2, as well as ri type ~rZ processes, where ri > 1. Incorporated in the Bi of the IM-3 are the same types of processes, with the exception of ~r~, the basic characteristics of which are depicted in modifications of the ~rs and nn processes. The structural configurations of the Bi blocks in the IM-2 and IM-3 models are shown in F igur es 2 and 3. One of the systems analysis problems solved by means of simulation modeling was the study of the impact of various methods of organizing data transmission via the data _ t~ansmission link on the quality of CUCC-G functioning: message switching and packet switching. The results of the relevant experiments with the models are treated be- low. An algorithm was realized ir the models for routing the messages and packets, which provided for their transmission between the links of the CUCC-G (between the centers) via minimal routes (with the least number of interm.~diate ~unctions). If several minimal routes exist for the transmission of inessages and packets from Zi to Z~, j~ i, i,j = l, 2, 13, then they are transmitted with equal probability via one of them. The addressing of external messages to various CUCC-G computer com- plexes was specified in the modeling by the distribution of the probabilities d= _(d0, dl, d2, d3), where dp, dl, d2 and d3 are probabilities of the addressing of external messages to the following respectively: the peripherll computer complexes ~ (users), th e BVKYe, BVKB and BVKE. A distribution of d=(0.03, 0.93, 0.02 and U.02) was specif ied in the experiments with the models and the existence of two categories of inessages was depicted in the CUCC-G (two categories of users) corresponding to the level of their external priority (20 percent of the messages were of the fi.rst = category, and 80 percent were of the second). It was presupposed in the switching of the packets (the packet size was fixed) that in the case of incomplete f illing of a packet with data, it ~oas filled completely with "zeros", the transmission of which produces an additional load on the data transmission channel. This way of depicting the transmission of incomplete packets was used to partially take into account the additional loading of the data trans- mission channel produced by the repeated transmission of packets in which errors were detected which were caused by interference in the channels, since the actual 103 _ FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFIC[AL USE ONLY mechanism for detecting errors in packets and providing for repeated transmission of packets received with errors which is present in the CUCC-G was not reflected in the models for the sake of simplicity. Considering the fact that dl � dZ,d3, the volumes of the base messages in the BVKB and BVKE in the experiment with the IM-2, the sizes of the base messages ad- dressed to these BVK's and the sizes of the notices generated by these complexes were all specified as equal to the f irst moments of the corresponding distribution _ functions. For the purpose of reducing the time required to lock the model into ' the steady-state mode when generating the initial state of the model (during each experiment), the initial setting~of the messages was accamplish ed in the queue of messages awaiting processing in the BVK, where the number of inessages was equal to the average number of inessages in these queues, determined by means of analytical modeling [11]. The fact that the average length of time the messages were present in the base computer complex of the CUCC-G amounts to about 52 seconds was taken into account - in the experiments with the I~I-3 when specifying the initial data for the modeling. This value was obtained by means of analytical modeling of the CUCC-G and was con- _ firmed in simulation modeling using the IM-2. The average response times of the CUCC-G for external messages and the load factors of the devices were taken as the basic parameters of the CUCC-G, which characterize its operational quality. In particular, the average response times for base mes- sages, especially messages addressed to BVKYe's, were of the greatest interest, _ since the utilization of the problem oriented program systems of an information and reference nature which were realized in the BVKYe and which are under development at the present time, was depicted in the modeling. A study of the response times for base messages was made by means of the IM-2. Also taking into account the f act that the switching method basically influen.ces the time characteristics of data transmission through a data transmission channel, it was important to determine the extent of this influence. For this reason, the average transmission through a data transmission system, which is the sum of the average duratic+n of time that a mes- sage and the notice corresponding to it are present in the data transmission system was studied as a f unction of the switching method and packet size (in the case of - packet switching) in the experiments w~ith the IM-3. We shall introduce symbols for the estimates of the average response times of - the CUCC-G and the load coeff icients of the data transmission channel, in which 4 S= Ye~ B and E is the indicator of the BVR, k= 1, 2 is ~b~ indicator of the categ:~ry (t:he external priority level) of the messages: p~ is the estimate of the ~b~i,~^~ response time of the CUCC-G for base messages, addressed to the BVKS; pk~s is the estimate of the average reaponse time of the CUCC-G for k-th category base messages, addressed to the BVKS; p is the estimate of the average transmission time through the data transmission system; pk is the estimate of the average transmission time through the data transmission system for k-th = category messages and notices; ~(i~j) is the estimate of the average load coefficient of a data transmission channel, which is the output channel for the i-th junction center and the input one for the j-th junction. 104 FOR OFFICIAL USE ONLY APPROVED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 APPR~VED FOR RELEASE: 2007/02/09: CIA-RDP82-00850R000400020012-2 FOR OFFICIAL USE ONLY The results of twq2~eri ~~of ~periments are considered below, th~ first of. which (the experiment J~ , J~ , J~ 3,was p~rformed using the IM-2 model (see Table 1), while the second (experiment ~~3 was performed with the IM-3 model (see Table 2). In eperiments ~i~3 and , a message switching method was TABLE 1 Ta6nNUa 1 BVKYe 6BKE gp~ ssxs I SBK3 $~Jj~ I 3i is~ I ~ cs> I 3~ t2~ I 3i ctl . 3~ . 3, 3i . 3: . 3, . p~cb~ (c) I 35 I 41 I~l3 I 900 I 400 p~.