CONTENTS Title Page Copyright Page Preface Introduction to DECnet-VAX and VAX P.S.I. 1 Overview of DECnet-VAX and VAX P.S.I. 1.1 General Description of a DECnet Network 1.2 DECnet-VAX and VAX P.S.I. 1.2.1 DECnet Interface with the VMS Operating System 1.2.2 VAX Packetnet System Interface 1.2.3 DECnet Functions 1.3 DECnet-VAX Configurations 1.3.1 DECnet-VAX Ethernet Local Area Network Configuration 1.3.1.1 Ethernet Datagrams 1.3.1.2 Transmission and Reception of Ethernet Packets 1.3.1.3 Ethernet Routers and End Nodes 1.3.2 DDCMP Network Configurations 1.3.2.1 DDCMP Point-to-Point and Multipoint Connections 1.3.2.2 Synchronous DDCMP Connections 1.3.2.3 Asynchronous DDCMP Connections 1.3.2.4 Static Asynchronous Connections 1.3.2.5 Dynamic Asynchronous Connections 1.3.3 DECnet-VAX Configurations for VAXclusters 1.3.4 X.25 Network Configurations 1.3.4.1 X.25 and X.29 Recommendations 1.3.4.2 X.25 Connections 1.4 Managing the Network 1.4.1 Network Control Program 1.4.2 Network Management Responsibilities 1.4.3 DECnet-VAX Licenses and Keys 1.4.4 DECnet-VAX and VAX P.S.I. Network Management Software 1.4.5 Configuring a Network 1.4.5.1 Configuring a DECnet-VAX Node 1.4.5.2 Configuring VAX P.S.I. DTEs 1.4.5.3 A Network Topology 1.5 User Interface to the Network 1.5.1 Performing Network Operations 1.5.1.1 Designing User Applications for Network Operations 1.5.1.2 Choosing a Language for a Specific Network Application 1.5.2 Accessing the Network 1.5.2.1 Using File and Task Specifications in Network Applications 1.5.2.2 Using Access Control for Network Applications 1.5.2.3 Using Logical Names in Network Applications 2 DECnet-VAX Components and Concepts 2.1 Nodes and DTEs 2.1.1 Nodes 2.1.1.1 Node Address and Name 2.1.1.2 Node Characteristics 2.1.1.3 Identifying a VAXcluster as a Single Node 2.1.2 DTEs 2.1.2.1 X.25 Protocol Module 2.1.2.2 X.25 Connector and Host Nodes 2.2 Circuits 2.2.1 Classes of DECnet-VAX Circuits 2.2.2 DDCMP Circuit Devices 2.2.3 CI Circuit Devices 2.2.4 Ethernet Circuit Device 2.2.5 Ethernet Configurator Module 2.2.6 X.25 Circuit Devices 2.2.7 X.25 DLM Circuits 2.3 Lines 2.3.1 Classes of DECnet-VAX Lines 2.3.2 DDCMP Lines 2.3.2.1 DDCMP Line Devices 2.3.2.2 Static Asynchronous Lines 2.3.2.3 Dynamic Asynchronous Lines 2.3.3 CI Line Device 2.3.4 Ethernet Line Devices 2.3.5 X.25 Line Devices 2.4 Routing 2.4.1 Routing and Nonrouting Nodes 2.4.1.1 Types of DECnet Nodes 2.4.1.2 DECnet-VAX Phase IV Nodes 2.4.1.3 Routing Features of DECnet-VAX License Options 2.4.2 Area Routing 2.4.3 Level 1 and Level 2 Routers 2.4.4 Ethernet Routers and End Nodes 2.4.4.1 Ethernet Designated Routers 2.4.4.2 Ethernet End Node Caching 2.4.4.3 Area Routing on an Ethernet 2.4.5 Routers and End Nodes on CI Data Links 2.4.5.1 CI End Nodes 2.4.5.2 CI Routers 2.4.6 Routing Concepts and Terms 2.4.7 Routing Messages 2.4.7.1 Segmented Routing Messages 2.4.7.2 Timing of Routing Message Transmissions 2.5 Logical Links 2.6 Objects 2.6.1 DECnet-VAX Objects 2.6.2 Objects Using the Cluster Alias Node Identifier 2.6.3 Creating DECnet-VAX Network Server Processes 2.6.4 Potential Causes of Network Process Failures 2.6.5 VAX P.S.I. Objects 2.7 X.25 and X.29 Server Modules 2.7.1 Destination of Calls from a Remote DTE 2.7.2 Handling Incoming Calls at the Local DTE 2.8 X.25 Access Module 2.9 Logging 2.10 Network Access Control 2.10.1 Routing Initialization Passwords 2.10.2 System-Level Access Control 2.10.2.1 Setting Access Control Information for Outbound Connects 2.10.2.2 Sources of Access Control Information for Logical Link Connections 2.10.2.3 Network Security and Passwords 2.10.2.4 Inbound Default Access Control for Objects 2.10.3 Access Control for Remote Command Execution 2.10.4 Node-Level Access Control 2.10.5 Proxy Login Access Control 2.10.5.1 Proxy Accounts 2.10.5.2 Controlling Proxy Login Access for Individual Accounts 2.10.5.3 Controlling Proxy Login Access for Objects 2.10.6 Security for DDCMP Point-to-Point Connections Network System Management 3 Managing and Monitoring the Network 3.1 The DECnet-VAX Configuration Database 3.1.1 The Volatile Database 3.1.2 The Permanent Database 3.1.3 VAX P.S.I. Configuration Database 3.2 The Network Control Program 3.3 Node Commands 3.3.1 Executor Node Commands 3.3.1.1 SET EXECUTOR NODE Command 3.3.1.2 TELL Prefix 3.3.2 Node Identification 3.3.2.1 MAXIMUM ADDRESS Parameter 3.3.2.2 Local Node Identification Parameter 3.3.2.3 Using and Removing Node Names and Addresses 3.3.3 Identifying Cluster Nodes 3.3.3.1 Setting an Alias Node Identifier for the Executor 3.3.3.2 Enabling Aliases for Nodes in a Cluster 3.3.4 Ethernet Addresses of Nodes 3.3.4.1 Format of Ethernet Addresses 3.3.4.2 Determining the Ethernet Physical Address of a Node 3.3.4.3 Ethernet Physical and Multicast Addresses 3.3.4.4 Values of Digital Ethernet Physical and Multicast Addresses 3.3.5 Node Parameters 3.3.5.1 Data Link Control 3.3.5.2 Operational State of the Local Node 3.3.6 Copying Node Databases 3.3.6.1 COPY Command Parameters and Qualifiers 3.3.6.2 Clearing and Purging the Local Node Database 3.3.6.3 Copying the Node Database from a Remote Node 3.3.6.4 Example of Copying Remote Node Data 3.3.6.5 Copying the Permanent Node Database Using DCL COPY 3.3.7 Node Counters 3.4 X.25 Protocol Module Commands 3.4.1 Network Identification 3.4.2 Local DTE Identification 3.4.2.1 Operational State of DTE 3.4.2.2 Line Identification 3.4.2.3 Channel Identification 3.4.2.4 MAXIMUM CIRCUITS Parameter 3.4.2.5 INTERFACE Parameter 3.4.3 Data Packet Control 3.4.3.1 Packet Size 3.4.3.2 Window Size 3.4.4 Call Request Packet Control 3.4.5 Clear Request Packet Control 3.4.6 Reset Control 3.4.7 Restart Control 3.4.8 ISO Networks 3.4.9 Group Identification 3.4.9.1 Local DTE Identification 3.4.9.2 Group Number 3.4.9.3 Group Type 3.4.10 X.25 Protocol Module Counters 3.5 Circuit Commands 3.5.1 Circuit Identification 3.5.1.1 DDCMP Circuit Identification 3.5.1.2 CI Circuit Identification 3.5.1.3 Ethernet Circuit Identification 3.5.1.4 X.25 Circuit Identification 3.5.2 Circuit Parameters 3.5.2.1 Operational State of the Circuit 3.5.2.2 Circuit Timers 3.5.3 DDCMP Circuit Parameters 3.5.3.1 DDCMP Circuit Level Verification 3.5.3.2 DDCMP Tributary Control 3.5.4 Ethernet Circuit Parameters 3.5.5 Ethernet Configurator Module Commands 3.5.5.1 Enabling Surveillance by the Ethernet Configurator 3.5.5.2 Obtaining a List of Systems on Ethernet Circuits 3.5.5.3 Disabling Surveillance by the Ethernet Configurator 3.5.6 X.25 PVC Parameters 3.5.6.1 Parameters Common to X.25 Circuits 3.5.6.2 Permanent Virtual Circuit Parameters 3.5.6.3 Data Packet Control 3.5.7 DLM Circuit Parameters 3.5.7.1 DLM Circuit Owner 3.5.7.2 Remote DTE Addresses 3.5.7.3 Recalls for DLM Circuits 3.5.7.4 DLM Circuit Usage 3.5.7.5 Executor Node Subaddresses 3.5.7.6 Setting Up a DLM Circuit 3.5.8 Circuit Counters 3.6 Line Commands 3.6.1 Line Identification 3.6.1.1 Line Protocols 3.6.2 Line Parameters 3.6.2.1 Operational State of Lines 3.6.2.2 Buffer Size 3.6.3 DDCMP Line Parameters 3.6.3.1 Line Buffers 3.6.3.2 Duplex Mode 3.6.3.3 Line Timers 3.6.3.4 Satellite Transmission Control 3.6.3.5 Asynchronous DDCMP Line Parameters 3.6.4 Ethernet Line Parameters 3.6.5 X.25 Line Parameters 3.6.5.1 Frame Control for X.25 Lines 3.6.5.2 Receive Buffers for X.25 Lines 3.6.5.3 Interface of X.25 Lines 3.6.5.4 Network for X.25 Lines 3.6.6 Line Counters 3.7 Routing Commands 3.7.1 Specifying the Node Type 3.7.2 Specifying the Area Number in a Node Address 3.7.3 Setting Routing Configuration Limits 3.7.3.1 Maximum Number of Ethernet Routers and End Nodes Allowed 3.7.3.2 Maximum Number of Areas Allowed 3.7.4 Routing Control Parameters 3.7.4.1 Circuit Cost Control Parameter 3.7.4.2 Maximum Path Control Parameters 3.7.4.3 Route-Through Control Parameter 3.7.4.4 Equal Cost Path Parameters 3.7.4.5 Area Path Control Parameters 3.7.5 Routing Message Timers 3.7.6 CI End Node Circuit Failover 3.8 Logical Link Commands 3.8.1 Maximum Number of Links 3.8.2 Disconnecting Logical Links 3.8.3 Logical Link Protocol Parameters 3.8.3.1 Incoming and Outgoing Timers 3.8.3.2 Inactivity Timer 3.8.3.3 NSP Message Retransmission 3.8.3.4 Pipeline Quota 3.9 Object Commands 3.9.1 DECnet-VAX Objects 3.9.1.1 DECnet-VAX Object Identification 3.9.1.2 Using the Cluster Alias Node Identifier for the Object 3.9.1.3 Example of Using the Cluster Alias Node Identifier 3.9.1.4 DECnet-VAX Command Procedure Identification 3.9.1.5 Setting Privileges for Outgoing Connections to Objects 3.9.2 VAX P.S.I. Objects 3.9.2.1 VAX P.S.I. Object Identification 3.9.2.2 VAX P.S.I. Command Procedure Identification 3.9.2.3 VAX P.S.I. Object Account Information 3.10 X.25/X.29 Server Module Commands 3.10.1 X25-SERVER and X29-SERVER Module Identification 3.10.2 Destination Identification 3.10.2.1 DTE Subaddress Range 3.10.2.2 Group Identification 3.10.2.3 Remote DTE Identification 3.10.2.4 User Data Field 3.10.2.5 Address Extension 3.10.2.6 Call Redirection 3.10.2.7 Receiving DTE 3.10.2.8 Priority 3.10.2.9 Object Identification 3.10.2.10 Host Node Identification 3.10.3 Maximum Circuits 3.10.4 Operational State of Server 3.11 X.25 Access Module Commands 3.11.1 Network Identification in an X.25 Access Module 3.11.2 X.25 Connector Node Identification 3.11.3 Access Control Parameters in an X.25 Access Module 3.12 Logging Commands 3.12.1 Event Identification 3.12.2 Identifying the Source for Events 3.12.3 Identifying the Location for Logging Events 3.12.4 Controlling the Operational State of Logging 3.12.5 Event Logging Example 3.12.6 Using a Logging Monitor Program 3.13 Network Access Control Commands 3.13.1 Specifying Passwords for Routing Initialization 3.13.2 System-Level Access Control Commands 3.13.2.1 Establishing Default Privileged and Nonprivileged Accounts 3.13.2.2 Specifying Privileges for Objects 3.13.2.3 Setting Default Inbound Access Control Information 3.13.2.4 Indicating Access Controls for Remote Command Execution 3.13.3 Node-Level Access Control Commands 3.13.4 Proxy Login Access Control Commands 3.14 Monitoring the Network 4 DECnet-VAX Host Services 4.1 Loading Unattended Systems Downline 4.1.1 Downline System Load Operation 4.1.1.1 Target-Initiated Downline Load 4.1.1.2 Operator-Initiated Downline Load 4.1.1.3 Load Requirements 4.1.2 Downline Load Parameters 4.1.2.1 TRIGGER Command 4.1.2.2 LOAD Command 4.1.2.3 Host Identification 4.1.2.4 Load File Identification 4.1.2.5 Management File Identification 4.1.2.6 Software Type 4.1.2.7 Load Assist Agent Identification 4.1.2.8 Load Assist Parameter Identification 4.1.2.9 CPU and Software Identification 4.1.2.10 Service Device Identification 4.1.2.11 Service Circuit Identification 4.1.2.12 Service Passwords 4.1.2.13 Diagnostic File 4.2 Dumping Memory Upline from an Unattended System 4.2.1 Upline Dump Procedures 4.2.2 Upline Dump Requirements 4.3 Loading RSX-11S Tasks Downline 4.3.1 Setting Up the Satellite System 4.3.2 Host Loader Mapping Table 4.3.3 HLD Operation and Error Reporting 4.3.3.1 HLD Error Messages 4.3.4 Checkpointing RSX-11S Tasks 4.3.5 Overlaying RSX-11S Tasks 4.4 Connection to Remote Console Network Configuration, Installation, and Testing 5 Configuration of a Network 5.1 Prerequisites for Establishing a Network 5.1.1 User Accounts and Directories 5.1.2 Required Privileges 5.2 Configuration Procedures 5.2.1 Using NETCONFIG.COM 5.2.1.1 Default Access Options 5.2.1.2 Security Benefits of DECnet Object Accounts 5.2.1.3 Default Access Questions Posed by NETCONFIG.COM 5.2.1.4 NETCONFIG_UPDATE.COM for Existing Networks 5.2.1.5 When to Use NETCONFIG.COM 5.2.1.6 Executing NETCONFIG.COM 5.2.1.7 NETCONFIG.COM Example 5.2.2 Creating a Default Account for DECdqs 5.2.3 Tailoring the Configuration Database 5.2.3.1 Running DECnet over the CI 5.2.3.2 Running DECnet over Terminal Lines 5.2.3.3 Installing Static Asynchronous Lines 5.2.3.4 Installing Dynamic Asynchronous Lines 5.3 Network Configuration Examples 5.3.1 Synchronous DDCMP Point-to-Point Network Example 5.3.2 DDCMP Multipoint Network Example 5.3.3 Static Asynchronous DDCMP Network Example 5.3.4 Dynamic Asynchronous DDCMP Network Example 5.3.5 Ethernet Network Example 5.3.6 X.25 Data Link Mapping Example 5.3.7 X.25 Native Mode Network Example 5.3.8 X.25 Multihost Mode Network Example 5.3.8.1 Building the Ethernet Network 5.3.8.2 Configuring the X.25 Connector Node 5.3.8.3 Configuring the Host Nodes 5.3.9 X.25 Multinetwork Example 5.4 System Configuration Guidelines 5.4.1 Normal Memory Requirements 5.4.1.1 NPAGEDYN Parameter 5.4.1.2 IRPCOUNT Parameter 5.4.1.3 LRPCOUNT and LRPSIZE Parameters 5.4.2 Critical Routing Node Requirements 5.4.3 CPU Time Requirements 5.4.4 UNIBUS Adapter Map Register Considerations 5.4.5 Permanent Database Considerations in VAXclusters 6 Installation of a Network 6.1 Installing a DECnet-VAX Key 6.2 Bringing Up Your Network Node Using STARTNET.COM 6.3 Bringing Up Your VAX P.S.I. DTE 6.4 Testing the Installation with UETP Test Procedure 6.5 Shutting Down Your DECnet-VAX Node 7 Testing the Network 7.1 Node-Level Tests 7.1.1 Remote Loopback Test 7.1.2 Local and Remote Loopback Tests Using a Loop Node Name 7.1.2.1 Local-to-Remote Testing 7.1.2.2 Local-to-Local Testing 7.1.3 Local Loopback Test 7.2 Circuit-Level Tests 7.2.1 Software Loopback Test 7.2.2 Controller Loopback Test 7.2.3 Circuit-Level Loopback Testing 7.2.3.1 Testing with the PHYSICAL ADDRESS and NODE Parameters 7.2.3.2 Loopback Assistance 7.3 X.25 Line-Level Loopback Tests 7.4 Dumping KMS11 and KMV11 Microcode Network User Operations 8 Performing Network User Operations 8.1 Retrieving Network Status Information 8.2 Establishing Communication with a Remote Node 8.3 Accessing Files on Remote Nodes 8.3.1 Using DCL Commands and Command Procedures 8.3.2 Using Higher-Level Language Programs 8.3.3 Using RMS Services from MACRO Programs 8.4 Performing Task-to-Task Operations 8.4.1 Transparent and Nontransparent Task-to-Task Communication 8.4.1.1 Transparent Communication 8.4.1.2 Nontransparent Communication 8.4.2 Task Specification Strings in Task-to-Task Applications 8.4.3 Functions Required for Performing Task-to-Task Operations 8.4.3.1 Initiating a Logical Link Connection 8.4.3.2 Completing the Logical Link Connection 8.4.3.3 Exchanging Messages 8.4.3.4 Terminating a Logical Link Connection 8.5 Performing Transparent Task-to-Task Operations 8.5.1 Using DCL Commands and Command Procedures 8.5.2 Using Higher-Level Language Programs 8.5.3 Using RMS Service Calls in MACRO Programs 8.5.4 Using System Service Calls in MACRO Programs 8.5.4.1 Requesting a Logical Link 8.5.4.2 Completing the Logical Link Connection 8.5.4.3 Exchanging Messages 8.5.4.4 Terminating the Logical Link 8.5.4.5 Status and Error Reporting 8.5.5 Summary of System Service Calls for Transparent Operations 8.5.5.1 $ASSIGN 8.5.5.2 $QIO (Sending a Message to a Target Task) 8.5.5.3 $QIO (Receiving a Message from a Target Task) 8.5.5.4 $DASSGN (Disconnecting a Logical Link) 8.6 Performing Nontransparent Task-to-Task Operations 8.6.1 Using System Services for Nontransparent Operations 8.6.1.1 Assigning a Channel to _NET: and Creating a Mailbox 8.6.1.2 Mailbox Message Format 8.6.1.3 Requesting a Logical Link Connection 8.6.1.4 Using the Network Connect Block 8.6.1.5 Completing the Establishment of a Logical Link 8.6.1.6 Disconnecting or Aborting the Logical Link 8.6.1.7 Terminating the Logical Link 8.6.2 System Service Calls for Nontransparent Operations 8.6.2.1 $ASSIGN (I/O Channel Assignment) 8.6.2.2 $QIO (Requesting a Logical Link Connection) 8.6.2.3 $QIO (Accepting Logical Link Connection Request) 8.6.2.4 $QIO (Rejecting a Logical Link Connection Request) 8.6.2.5 $QIO (Sending a Message to a Target Task) 8.6.2.6 $QIO (Receiving a Message from a Target Task) 8.6.2.7 $QIO (Sending an Interrupt Message to a Target Task) 8.6.2.8 $QIO (Synchronously Disconnecting a Logical Link) 8.6.2.9 $QIO (Aborting a Logical Link) 8.6.2.10 $QIO (Declaring a Network Name or Object Number) 8.6.2.11 $DASSGN (Terminating a Logical Link) 8.7 Designing Tasks 8.7.1 DCL Command Procedure for Task-to-Task Communication 8.7.2 FORTRAN Program for Task-to-Task Communication 8.7.3 MACRO Program for Transparent Task-to-Task Communication 8.7.4 MACRO Program for Nontransparent Task-to-Task Communication 9 File Operations in a Heterogeneous Network Environment 9.1 General DECnet-VAX Restrictions 9.2 VMS to IAS Network Operation 9.2.1 File Formats and Access Modes 9.2.2 VMS RMS Interface 9.2.3 File Specifications 9.2.4 DCL Considerations 9.2.4.1 APPEND 9.2.4.2 COPY 9.3 VMS to P/OS Network Operation 9.3.1 File Formats and Access Modes 9.3.2 VMS RMS Interface 9.3.3 File Specifications 9.3.4 DCL Considerations 9.4 VMS to RSTS/E Network Operation 9.4.1 File Formats and Access Modes 9.4.2 VMS RMS Interface 9.4.3 File Specifications 9.4.4 DCL Considerations 9.4.4.1 APPEND 9.4.4.2 COPY 9.4.4.3 DELETE 9.4.4.4 DIRECTORY 9.4.4.5 DUMP/RECORDS and TYPE Commands 9.5 VMS to RSX Network Operation Using RMS-Based FAL 9.5.1 File Formats and Access Modes 9.5.2 VMS RMS Interface 9.5.3 File Specifications 9.5.4 DCL Considerations 9.5.4.1 COPY 9.6 VMS to RSX Network Operation Using FCS-Based FAL 9.6.1 File Formats and Access Modes 9.6.2 VMS RMS Interface 9.6.3 File Specifications 9.6.4 DCL Considerations 9.6.4.1 APPEND 9.6.4.2 COPY 9.7 VMS to RT-11 Network Operations 9.7.1 File System Constraints 9.7.1.1 File Formats and Access Modes 9.7.1.2 VMS RMS Interface 9.7.2 File Specifications 9.7.3 DCL Considerations 9.7.3.1 COPY 9.7.3.2 DELETE 9.8 VMS to TOPS-10 Network Operations 9.8.1 File System Constraints 9.8.1.1 File Formats and Access Modes 9.8.1.2 VMS RMS Interface 9.8.1.3 File Specifications 9.8.2 DCL Considerations 9.8.2.1 COPY 9.8.2.2 DIRECTORY 9.9 VMS to TOPS-20 Network Operations 9.9.1 File System Constraints 9.9.1.1 File Formats and Access Modes 9.9.1.2 VMS RMS Interface 9.9.1.3 File Specifications 9.9.2 DCL Considerations 9.9.2.1 COPY 9.9.2.2 DIRECTORY 9.10 VMS to MS-DOS Network Operations 9.10.1 File System Constraints 9.10.1.1 File Formats and Access Modes 9.10.1.2 VMS RMS Interface 9.10.1.3 File Specifications 9.10.2 DCL Considerations 9.10.2.1 COPY 9.10.2.2 DIRECTORY 9.11 VMS to ULTRIX Network Operations 9.11.1 File System Constraints 9.11.1.1 File Formats and Access Modes 9.11.1.2 VMS RMS Interface 9.11.1.3 File Specifications 9.11.2 DCL Considerations 9.11.2.1 COPY 9.11.2.2 DIRECTORY 9.12 VMS to MVS Network Operations 9.12.1 File System Constraints 9.12.1.1 File Formats and Access Modes 9.12.1.2 VMS RMS Interface 9.12.1.3 File Specifications 9.12.2 DCL Considerations 9.13 VMS to VMS Network Operations (Version 5.4 to Pre-Version 5.0) A Area Routing Configuration A.1 Area Routing Configuration Guidelines A.2 Designing a Multiple-Area Network A.3 Sample Multiple-Area Network Configuration A.4 Converting an Existing Network to a Multiple-Area Network A.5 Problems in Configuring a Multiple-Area Network A.5.1 Partitioned Area Problem A.5.2 Problems in Mixed Phase III/Phase IV Networks A.5.2.1 Problem of a Phase III Node in a Phase IV Path A.5.2.2 Area Leakage Problem A.6 Area Routing on an Ethernet Glossary EXAMPLES 3-1 Using the SET OBJECT OUTGOING CONNECT PRIVILEGES Command 5-1 Sample NETCONFIG.COM Dialogue 8-1 Network Connect Block Format 8-2 FORTRAN Task-to-Task Communication 8-3 Transparent Communication Using System Services 8-4 Nontransparent Communication Using System Services FIGURES 1-1 DECnet Functions and Related DNA Layers and Protocols 1-2 Sample DECnet-VAX Phase IV Configuration 1-3 Typical DDCMP Point-to-Point and Multipoint Connections 1-4 Typical VAXcluster Configuration Using CI as a Data Link 1-5 X.25 Connections in a DECnet Network Configuration 1-6 DECnet-VAX and VAX P.S.I. Software 1-7 Topology of a Single-Area DECnet Network 1-8 Topology of a Multiple-Area DECnet Network 1-9 Network Access Levels and DECnet-VAX User Interface 1-10 Remote File Access Using Access Control String Information 1-11 Remote File Access Using Default Access Control Information 2-1 Multipoint Circuits and Associated Lines 2-2 Multipoint Lines 2-3 Dynamic Switching of Asynchronous DDCMP Lines 2-4 Routing Initialization Passwords 2-5 Access Control for Inbound Connections 3-1 Remote Command Execution 3-2 Network Circuit Costs 4-1 Target-Initiated Downline Load 4-2 Operator-Initiated Downline Load 4-3 Operator-Initiated Downline Load over DDCMP Circuit (TRIGGER Command) 4-4 Operator-Initiated Downline Load over Ethernet Circuit (TRIGGER Command) 4-5 Operator-Initiated Downline Load over Ethernet Circuit (LOAD Command) 4-6 Operator-Initiated Downline Load over DDCMP Circuit (LOAD Command) 4-7 Upline Dumping of RSX-11S Memory 4-8 Downline Task Loading 5-1 A Synchronous DDCMP Point-to-Point Network Configuration 5-2 A DDCMP Multipoint Network Configuration 5-3 A Static Asynchronous DDCMP Network Configuration 5-4 A Dynamic Asynchronous DDCMP Network Configuration 5-5 An Ethernet Network Configuration 5-6 An X.25 Data Link Mapping Network Configuration 5-7 An X.25 Native-Mode Network Configuration 5-8 An X.25 Multihost Mode Network Configuration 5-9 A Multinetwork Configuration 7-1 Remote Loopback Test 7-2 Local-to-Remote Loopback Test Using a Loop Node Name 7-3 Local-to-Local Loopback Test Using a Loop Node Name 7-4 Local Loopback Test 7-5 Software Loopback Test 7-6 Controller Loopback Testing 8-1 Mailbox Messages 8-2 Mailbox Message Format A-1 Level 2 Router Subnetwork of a Multiple-Area Network A-2 Example of Multiple-Area Network Design A-3 Area 7 of a Multiple-Area Network A-4 Partitioned Area Problem A-5 Problem of Phase III Node In Phase IV Path A-6 Area Leakage Problem A-7 Area Routing on an Ethernet TABLES 1-1 Network Access Levels 3-1 Node Parameters and Their Functions 3-2 Types of Circuit and Applicable Circuit Parameters 3-3 Circuit Parameters and Their Functions 3-4 Types of Line and Applicable Line Parameters 3-5 Line Parameters and Their Functions 3-6 Object Parameters and Their Functions 3-7 Logging Parameters and Their Function 4-1 Default Loader Files by Target Device Type 5-1 Required DECnet-VAX Privileges 5-2 Required VAX P.S.I. Privileges 5-3 Driver Sizes 5-4 Permanent Configuration Database Files 6-1 Local Node States and Network Operations 8-1 System Service Calls for Transparent Communication 8-2 System Service Calls for Nontransparent Communication 8-3 System Mailbox Messages