JPRS ID: 9692 USSR REPORT CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP82-00850R000300100055-7
Release Decision:
RIF
Original Classification:
U
Document Page Count:
141
Document Creation Date:
November 1, 2016
Sequence Number:
55
Case Number:
Content Type:
REPORTS
File:
Attachment | Size |
---|---|
CIA-RDP82-00850R000300100055-7.pdf | 7.74 MB |
Body:
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
I
FOR OFFICIAL USE ONLY
JPRS L/9692
- 27 April 1981
U SSR Re ort
p
CYBERNETICS, COMPUTERS AND
AUTOMATION T~CHNOIO~Y
_ (FOUO 12/81~
FBIS FOREIGN B~OADCAST INFORMATION SERVICE
FOR OFFICIAL USE ONLY =
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2047102108: CIA-RDP82-00850R000300100055-7
I
NOTE
JPRS publications contain information primarily from forei~n
newspapers, perio3icals and books, but also from news agency
t:ransmissions and broadcasts. Materials from foreign-language
_ sources are translated; those from Englistc-language sources
are transcribed or reprinted, with the original phrasing and
other characteristics retained.
- Headlines, editorial reports, and material enclosed in brackets
are supplied by JPRS. Processing indicators suc~ as [Text]
ar [ExcerptJ in the first line of each item, or following the
last line of a brief, indicate how the orig~nal information was
processed. Where no processing indicator is given, the infor-
mation was summarized or extracted.
Unfamiliar names rendered phonetically or transliterated are
enclosed in parenthesese Words or names preceded by a ques-
tion mark and enclosed in parentheses were not clear in the
original but have been supplied as appropriate in context.
Other unattributed parenthetical notes within the body of an
item originate with the source. Times within items are as
giver: by source.
= The contents of this publication in no way represent the poli-
- cies, views or at.titudes of the U.S. Government.
COPYRIGHT LAWS AND REGULATIONS GOVERNING OWNERSHIP OF
- MATERIALS REPRODUCED HEREIN REQUIRE THAT DISSEMINATION
OF THIS PUBLICATION BE RESTRICTED FOR OFFICIAL USE ODILY.
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
Fb~t OFFICIAL ~J~~ t~NLY
JPRS L/9692
_ 27 April 1981
USSR REPORT
y CYBERNETICS, COMPUTERS AND AUTOMATION TECHNOLOGY
(FOUO 12/81)
- CON TEN TS
Hax~waxE
Projected Development of Computer Technology 1
Operating System of the 'E1'brus-1' MVK Special Processor.......... 3
- Microprocessor Data Transmission Controller 4
USSR Proposes Technological Cooperatian With Japan's Robot
Manufacturer 5
~ Use of CA~fAC Modules for Distributed Control Systems 7
100-:ribyte Complex Based on Replaceable YeS5066 Magnetic Disc
Storage Devices and YeS5566 Control Devices 11
Cor.trol Screen Displays 13
- A Unit for Interfacing the 15VSM-5 Electronic Keyboard Computer
to Peripherals 14
- A Study of the Operational Capability of Relays With
_ H~rmetically Sealed Contacts 15
Devising Equipment Interchanges for Small-Computer Control
Complexes 16
Four Technologies for Making Small Magnetic Accumulators Compared.. 19
MICROPRUC~SSOR SYSTEMS
New Book Discusses Microprocessox Systems 22
M
Insuring Security of P~icroprocessor Data Processing Systems........ 26
- a- [III - USSR - 21.C S&T FOUO]
FOR OFFICIAL LlSE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL fiJSE ONLY
Operating Capabiliti.es of Basic Unified System Units 40
SOFTWARE
Tools for Programming and Debugging K580 Se�ries MicroprocesGors.... 42
MIKRAS System of Microprogramming for Micr.ocomputers Built With
the S eries K589 Base 44
REZON: A System for the Solution of Planning and Control Problems
Prohl ems. The Underlying Concepts 46
A Method of Optimizing the Parameters of ~,arge Scale Integrated
Circuits 47
The Development of Machine Formats ir~ Data Banks and Centers....... 48
Experience With the Design o.`~ the Automated Information and
Reference System in the Institute of Electronics of the
Uzbek SSR Academy of Sciences 49
Experiment in Transferring Programs in the Assembler Language
- From the BESM-6 to the YeS Computer 50
New Book on Automated Production Control Systems Using Applied
Program Packets 52
Organiz ation of ASU Prog~am Produc.tion and Realization 56
APPLICATIONS
Pattern Recognition Research Organizations 60
Descrip tion of New M-60 Computing System for Industriai Processes.. 62
Questions Relating to Progra~ing Simulation Problems on the
M-10 Synchronous Multiprocessor Computer 66
Automat ed Control Systems: Experience and Prospects 78
On an Analysis of the Data Transmission Modes in the SUMMA
Compu ter System 81
Parallel Data Processing in the Homogeneous SUNA~IA Computer
System 82
Functional Subsystems of the Second Stage of the Energy Sector
_ A~itumated Control System 83
The State of the Art and :'rospects for Automated Control System
Uevelopment in Power Engineering 87
- b -
FOR OFFICiAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
- - _ I
FOR OFF'ICIAL USE ONi.Y
Experience With the Use of the First Stage Data Bank and Set
_ of Programs for the Analysis of Developmental Variants
_ for Integrated Power Systems in the Subsystem for
Future Sector Development 91 -
Dispatching Geophysical Computing Complexes Based on the l
- PS-2000 Multiprocessor Computer 95
- CONFERENCES
- 16th All-Union Conference on Magnetic Elements of Automation and
Computer Technology....e 103
PUBLICATIONS
Table of Contents From the Computer Journal 'CYBERNETICS'.......... 109
- Abstracts From Xhe Journal 'CONTROL SYSTEMS AI~?D MACHINES'.......... 113
Regular Structures for Automaton Control 121
Selection and Application of Systems of Computer Logic Elaments.... 124
Problems of Random Searching: Questions of Structural
Adaptation 127 -
Bidirectional Signal Converters 129 =
Analog-Discrete Conversion of Signals: Conversion of Integral
- Characteristics of Wideband Signals 132
New Book on Data Compression De~~ices 134
- c -
~ FOR OFF[CIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFIC(AL USE ONLY
= HARDWARE
PROJECTED DEVELOPMENT OF COMPUTER TECHNOLOGY
Kiev NAUKOVEDENTYE I INFORMATIKA in Russian No 20, 1979 pp 82-88 manuscript received
19 May 78
[Article by B. Ador'yan, Hungarian People's Republic InsCitute oP Coordina~.ion of
Computer Technology, Budapest]
- [Excerpts] For the future it is possible to predict the formation of three major
, trends: 1) strengthening of the importance of dialog systems, in particular, on
account of package processing systems; 2) an increase in the proportion'of independ-
_ ent "small" systems and "built-in" small compute~s (micrr~processors); 3) an increase _
in decentralization and together with it an increase in the role of systems with
distributed parameters, or, in other words, of multiple systems.
- Part of the principles enumerated will be implemented in the next five to 10 years
with the further development of IBM systems and concomitantly with it of YeS [uni- _
fied series) computers, as well as in designs of so-called small computers.
In the future, in the following 10 to 20 years, simultaneously with an increase in _
the number and requirements of areas of appl.ication, and also depending on the furth-
er development of technology and improvement of the efficiency and reliability in-
dex, it is expected that the beginning of a polarized pracess is probable with con-
siderable improvement of data transmission capabilities, instead of the further de-
velopment of a family of computers in unmodified forms (e.g., the IBM 360, IBM
370, etc., in the West and the "Ryad" and "Ryad-2" YeS computers in the s~cialist
ca.mp), wY?ich play a dominating role at the present time and which constitute the
more important share of the quantity and total cost of computers. For the purpose -
of independent applications small computers and systems are being used, consisting
of basic elements manufactured with a relatively high degree of standardization
and having the capacity of programmability and a diversified structure for certain
special cases of application.
_ Concomitantly with an improvement in communication methods, incluc~ing the improve-
ment of reliability, and with a reduction in their cost in many areas of a~plica- ~
tion, the necessity will be increased for organizing superpower and power-line
systems with a separate computer "services" system. -
~ It follows, of course, from a development of this sort that units and small systems
made for an independent application wi11 be designed beforehand so that from the ~
1
FOR OFFIC[AL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFIC[AL USE ONLY
~ viewpoint of both haxdware and so~tware they ~11 be used as a"bui,].d:~ng element" -
in large systems.
Iiowever, it is necessary to Emphasize that already at the present time reliable data
transmission is causing very serious problem~ and together with the increasing
extension of the application of comnuter technology the amount o~ data to be trans- _
mitted and the demand for higher transmission reliability are increasing; therefore
if present communication does not change solidly for the better from the viewpoint
of technical parameters, reliability and financial outlays, then it can fundamental-
ly prevent the coming of the polarization trend described. (An indication of this -
_ problem is the fact, for example, that the IBM firm in the not too d.istant past
proluced not the previously announced 370/200 series, but the 3300 system.)
~'he satisfaction of security relates also to secrecy, i.e., to data's being ob-
tained only by competent organizations, enterprises and persons. This requirement
has posed a general need worldwide to develop methods of coding for networks, -
like the coding system of the IBM firm published in 1975, which can be easily im-
pl2mented and have high security.
- COPYRIGHT: Iz3atel'stvo "Naukova dumka", 1�79
[85-8831]
8831
CSO: 1863
2
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY ~
- UDC 681.322.066 ~
OPERATING SYSTEM OF THE 'EL'BRUS-~1' MVK SPECIAL PROCESSOR
_ Moxcow IN-T Toch. MEKH. I VYCHISL. TE'~iN. AN SSSR PREPR. in Russian No 15, 1980, �
27 pages
TSANG, F. R. '
_ [From REFERATIVNYY ZHURNAL, AVTOMATIKA, TELEMEICHEINIKA I VYCHISLITEL'NAYA
TEKFINIKA No 9, 1980 Abstract No g B132 summary]
[Text] The purpose of the "E1'brus~l" MVK [minicomputer complex] special pro-
cessor (SP) is to provide compatibility between the MVK and computers of the -
BESM-6 type. Compatibtlity asrumes the ability of the admission to the MVK of
- routines executed on computers of the BESM-6 type in the non-privileged mode.
_ These routines contain non-privileged operation codes and extra codes; the former -
are executed bp the hardware and the Zatter are interpreted by the operating
- system. Since the "E1'brus-1" MVK SP co~and system includes completely the
non-privileged co~an3s of the BESM-6 computer, then the required compatibility
is made possiFile fiy identical interpretafiion of extra codes by the SP's operating
~ system and the basic operating system of the BESM-6, as which Is used the DISPAK
operating system. 6 references.
COPYRIGHT: VINITI, 1980
Is4-ss3i]
~ 3
FOR OFFIC[AL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL USE ONLY
UDC 681.326.34
MICROPROCESSOR DATA TRANSMISSION CONTROLLER
- Riga PROB. SOZDANIYA, PR-VA I PRIMENENIYA SREDSTV VYCHISL. TEKHN. NA OSNOVE MIKRO-
PROTSESSOROV I DR. SOVREM. ELEMENTOV MIKROELEKTRON in Russian 1980 pp 61-63
_ IVANOV-LOSHKANOV, V. S. , SEMEMOV, M. N. . TRAYNIN, S. B. , ~'AZ,~KOVICH, E. I. ,
FOGEL', V. A. and F1tENKEL', A. M.
[From REFERATIVNYY ZHURNAL, AVTOMATIKA, TELEMEKHANIKA I VYCHISLITEL'NAYA
TEKHNIiZA No 9, 1980 Abstract No 9 B575 suffinary] .
[Text] A microprocessor data transmission controller (MKPD) is discus~eed, which
- is designed for connecting ~he "Iskra-126" minicomputer to teleprocessing systems
as a user station, as well as to a computer netarork via an interface terminal
- computer. The controller makes it possible to work through switched or assi.gned
telephone lines in the synchronovs and start-stop modes. The data exchange rates
are 100, 200, 300, 600, 1200 or 2400 bauds. The MKPD makes gossible automati~
conn.ection to a line i~t the presence of a call from the opposite end. The data
transmission method is character bq character. The MKPD is a message buffer.
' Ir~ the presence of errors the MKPD makes possible reinquiry of the incorrectly
received package. The ability to select the data format is provided (o~ld or
_ even parity check, number of bits of data in a character, number of stop bits).
_ The data transmission control program is loaded prior to the communication ses-
- sion af the controller's working storage.
COPYRIGHT: VINITI, 1980
j 84-8831_]
4
FOR OFF'ICIAL USE dNLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
USSR PROPOSES TECHNOLOGtCAL COOPEtZATION WITN JAPAN'S ROBOT MANUFACTURER -
Tokyo NIKKEI SANGYO SHIMBUN in Japanese 9 Mar 1981 p 6
- [Article: "Industrial Robot: USSR Proposed Technological Co~peration With
: Japan's Robot Manufacturer"]
[Text] The Soviet government recently asked the Japan Robot Manufacturing
Company, Inc. (JRM) to participate in cooperative venture in the field of in- -
dustrial robot technology. The head office of JRM is located in Tokyo and is -
headed by Kenro Motoda [transliteration]. It is capitalized at 50 million yen.
The Sov~ets said that they sought Japan's robot technology because they consid-
- ered it urgently necessary to increase their productivity through rationalization
- and ]_abor-saving efforts, and to relteve factory workers from dirty work. The
- Soviet government is currently constructing a large-scale robot manufacturing
factory in the suburbs of Moscow, and is thinking of i~porting Japan's rohot
technology to use in this Moscow factory. The details of the Soviet proposal
to JRM are not clear, however, the Soviets are planning to import Japan's most
advanced plectronic technology in this field, which tncludes visual and tactile
' , robot sensors.
Farlier this year, the Soviets proposed technological cooperation with the
Mitsubishi Heavy Industries, Ltd. in the field of industrial robot technology.
This is ttie first time, however, that the Soviets suggested technological coopera-
tion with a manufacturer that specializes in robots. Based on this, it is consid-
ered that the Soviets have begun vigorous efforts to carry out technological
exchange with Japanese robot manufacturers.
In the JRM venture, the Soviets wish to acquire robots for handling operations.
They are particularly interested in the sensor technology that is essential for
- handling operations. They also intend to import the rnicrocomputer technology
which controls robots hased on information obtained through sensors.
In the llth Five-Year Plan (1981-85) draft, the Soviet government has established
a goal to ra~se productivity through factory automation and to relieve factory
arorkers from dirty work under urfavorable working conditions. To achieve this -
goal, the Soviet government is promoting an effort to supply industrial robots
to factories on a massive scale. The Soviets are building a large robot factory
in the Moscow suburbs and are developing a plan to concentrate all of the world's
most advanced robot tec~?nologies in this factory. ~
- 5
, FOR OFFICIAL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL USE ONLY
JRM was established in fall 1979 as an independent company formed from the robot _
_ department of Motoda Electronics (the main office of Motoda Elcctronics is lo-
cated in Tokyo and headed by Kenro Motoda. It is capitalized at 20 million
yen), and Toyo Terminal. JRM is a medi~un size company in Japan with an annual
sales totaling 2,500 million yen. It has exported its independently developed
handling robots to Sweden's automobile maker Volvo and co the Soviet Union.
JRM is also developing various position sensors and systems which simultaneously
' control multiple robots. JRM considers that the Soviets have appreciated the ~
~ company's achievement. JRM has already started negotiations ca~th the Soviets
and is expeci:ing thaC both parties will further their negotiations.
Last year, the Japanese robot industry manufactured 22,000 robots and sales
totaled 62,000 million yen. It is reported that Japan now has 75,000 operating
rohots, that is, 70% of the total number of robots in the world. Robot produc-
= tion is expected to increase at an annual rate of 40% for a while and is projected
.to reach 300 billion yen in 1985. Because the Soviets are very interested in
Japan's roboc technology, which is the most advanced in the world, there is a
strong possibility that the Soviets will propose cooperative ventures with other
robot manufacturers.
COPYRIGH'T: Nihon Keizai Shimbunsha 1981
[141-P~ .
CSO : 4105
.
6
= FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL USE ONLY
UDC 681.142.353
USE OF CAMAC MUDULES FOR DISTRIBUTED CONTROL SYSTEMS
Moscow PRIBGRY I SISTEMY UPRAVLENIYA in Russian No 12, Dec �~0 pp 16-18
[Article by E. M. Gleybman and V. V. Tarasov, engineers: "Set of Electronic
Modules for Distributed Systems for Ccntrol of Physical ~quipment"]
[Excerpts] One of the widespread standards for electronic apparatus in the
world's physics laboratories is the CAMAC modular system of electronic units
~ [1]. It is used extensively in industry, medicine, and other fields today.
The assortment of modules produced now numbers more than 1,000.
With the appearance of inemory microcircuits and microprocessors it becomes
possible to connect a microproces~sor controller to the set of CAMAC modules.
This controller has a large computing capacity [2]. This, in turn, creates
the prerequisites for distributed control systems [3, 4].
This article describes a set of electronic modules which includes an autono-
- mous MTKAM-2 microprocessor controller, which is a further development of the
MIKAM-1 controller [5J, and memory modules.
The MIKAM-2 autonomous crate controller (see Figures 1[below] and 2) is
- constructed in the form of a triple-width CAMAC module and installed in the
crate in place of the control station and two standard stations. It pro-
vides two-way data exchange between the controller and any CAMAC module;
- processing and control of interrupts; computations during the r_ollection of
data; two-way communication with a teletype and display; communication with
the central computer or other MIKAM-2 controllers.
The controller consists of a microcomputer on one printed plate and a CAMAC
- interface. The microcomputer has a functionally complete Intel 8080 micro-
processor (the domestic analog is the~K580IK80 [6]), a random access semi-
conductor memory with a capacity of 1,000 bytes (K565RU2 circuit), a re-
programmable permanent memory with a capacity of 4,000 bytes (Intel 2708
[7]), interrupt control circuits, circuits to receive digital information
from the front panel of the controller, a real-time clock, and a sequential
interface of the external devices and the commutator.
The RAM-4K random access internal memory unit (see Figure 3[not reproduced])
is designed to work as a supplementary memory module to the MIKAM-2 autonomous
7
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPR~VED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
crate controller. The unit
has a capac~.ty of 4,000
bytes and a read-write time _
cycle ~f 0.6 microseconda. ~
The storage is built with
static Intel 8101 type mem-
- ory elements with an infor-
mation c.apacity of 1, 000
~
bytes per crystal with
256 x 4 positions. It is a
- matrix with four linas of _
eight elements apiece . The
elements of each line are
joined in pairs and selected
- by one CE signal, forming .
a memory element that is
256 x 8. The presence of ~
a three-state huffer at the -
output of the memory micro- _
circuits made it possible -
to organize a two-direc-
tional data line inside the
- Figure 1. M1KAM-2 Self-Contained module. -
Crate Controller
, In design terms the 12AM-4K
module is built in the form =
- of a CAMAC module of ordinary width. Its power supply is +S volts and it
consumes 1.2 amps of current,
Th~e OZU-4K random-access internal memory unit (see Figure 4[not reproduced])
is a supplementary memory module for the autonomous MIKAM-2 crate controller.
T}ie storage capacity is 4,000 bytes and the read-write time cycle is 0.6
::~icroseconds. The storage is constructed of static series K565RU2 memory
elements with an information capacity of 1,000 bits per crystal with N
- 1024 x 1 positions. It is a matrix with four columns of eight elements _
~ apiece. The eight elements of one column, that is 1,000 bytes, are selected
by a CS signal.
The OZU-4K :nodule can be used as a supplementary memory unit of the analyzer.
To do this the module control circuit envisions the possibility of adding a
unit (one) to the memory cell according to the address coming through the
supplementary plug on the back panel. In this mode the OZU-4K module is a
memory unit with a volume of 2,000 x 16 digital words.
The contents of the memory cell at the address coming from the plug on the
back pan~l of the module are read into the data register-counter, increased
by one, and copied into memory at the same address. The OZU-4K module can
work autonomously with an external power source or together with the MIKAM-2
controller. Synchronization of access to storage in the latter case is ac-
- complished by internal control circuits. Up to four modules working with
one external source can be ~oined using a special unit number switch. In
design terms the OZU-4K unit takes the form of a CAMAC module of ordinary -
8 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPR~VED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
width. The supply voltage is +S volts and it conaumes 1.7 amps of -
current.
The OZU-lOK random access internal memory unit (see Figure 5[not reproduced])
. is designed to work as a supplementary memory unit for the MIKAM-2 autono-
mous crate controller. The capacity of the unit is l0,OQ0 by~es. . _
The storage is constructed with series K507RU1 dynamic memory elements with
an information capacity of 1,000 bits per crystal organized in 1024 x 1 _
positions. It is a 10 x 8 matrix.
The PROIti-8K permanent reprog:ammable memory unit (see Figure 6[not repro-
_ duced]) is used as a supplementary permanent memory unit for the MIKAM-2
autonomous controller. The unit stores subroutines, constants, and user
programs. It has a capacity of 8,000 bytes and a data read time of one micro- -
second.
The storage is built on an Intel 8702 type permanent reprogrammable me~rory
unit and has an information capacity of 1l000 bits per crystal organized with
256 x 8 positicns. 'Phis is a matrix of 32 such elements. One of the 32 ele-
ments is selected by a CS sign3l. All the permanent programmable memory
_ matrices are mounted on a panel which permits easy replacement of the memory -
element in use, when necessary. -
In design terms the PROM-8K unit has the form of a CAMAC module of ordinary -
width. The supply voltage is +5, -24 volts and the current consumed is 900 -
and $00 milliamps respectively.
Use of the CAMAC modular system with a microprocessor controller and memory
: modules makea it possible to build inexpensive and flexible distributed con-
trol systems for use in physics experiments, medi~ine, industry, and other
technical fields.
~ BIBLIOGRAPHY
1. "~CAMAC - A Modular Instzumentation System for Data Handling Revised.
Description and Spacification," Commission of the European Communities,
EUR 4100e, 1972. _
2. Barnes, R. C. M., "Microprocessors and CAMAC," CAMAC BULLETIN, 1975,
No 14.
3. Nemesh, T., Rapp, Kh., Rottel'bush, L., and Slepnev, V.M., "MISKA
Microcomputer in the CAMAC Standard, Its Use for Monitoring the Internal
Nuclear Beam of the OIYaA [Joint Nuclear Research Institute] Proton
Synchrotron," OIYaI Report R10-12077, Dubna, 1979.
4.. Glasnek, K.-P, et al, "A Microprocessor System for Calibration and -
- Monitoring of the RISK Experimental Device,1� OIYaI Preprint R10-12555,
- Dubna, 1979.
4. _
FOR OFFICIAL USE ONI.Y
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2047102108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
5. Glasnek, K.-P., and Gleybman, E. M., "The MIKAM-1 Self-Contained Crate
Controller Based on a Microprocessar," OIYaI Preprizt R10-10893,
Dubna, 1977.
6. Prole~ko, V. M., "Microprocessors, Microcomputers, and Their Develop-
ment," ELEKTRONNAYA PROMYSHLENNOST', 1979, No ].1-12.
7. "MCS-80 ~User's Library," Intel Corporation, Santa Clara, California, 1977.
COPYRIGHT: Izdatel'stvo "Mashinostroyeniye", "Pribory i sistemy upravleni}~a",
' 1980
[87-11,176]
11,176
CSO: 1863
10
FOR OFFICIAL USE ONLY ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FOR uFFIC[AL USE ONLY
100-MBYTE COMPLE~ BASED ON REPLF,CEABLE YES5066 MAGNETIC DISC STORArE DEVICFS AND ~
YES5566 CONTROL DEVICEG
Kiev UPRAVLYAYUSHChIYE SISTEMY I MASHINY in Russian No 6, Nov-Dec 80 p 153
[Article] -
[Text] The 100-t~yte complex is a new step in development of the external memory
. of computers. Compared to the extensively used replaceable YeS5050, YeS5052 and
YeS5056 magnetic disc stores (N[~iD), the YeS5066 device has 13-foid grea~er capacity
and high technical and economic indicators. The YeS5066 external storage device
_ together with other computer equipment permits one to organize a virtual memory in
models o~ the second unit of YeS EVM [Unified computers svstem].
The typical component of the YeS5066 NMD is a replaceable disc packet which has a
standarci version and corresponds completely t~ ISO [expansi.on unknoam]
recommendations.
The packet includes 12 discs c:~ which are arranged 19 information surfaces and one
special servo surface for accurate positioning of the heads. Each working surface
has 411 tracks. Ferrovarnish is used as the maqnetic coating of t;ie disc s w:face.
The latest technica.l advances have b~en applied in the YeS5066 storage device:
---a line motor for driving the carriage unit holding the magnetic heads (the
magnetic heads are made of high-quality ferrite and the f.loatinq elements is made
o� hard. ceramic alloy);
--a developec~ diagnostic system has been implemented which, together with the '
built-in test system of the YeS5566 control device, provides rapid detection and
correction of malf~.inctions;
--spPCial error correction codes provide high reliability of information
storage.
Connecting the YeS5066 storage devices to computers is provided bv the YeS5556
control device, which is in turn connected to the computer channel through a stan-
dard interface. Using a two-channel switch: the cantrol device can operate in the
multisystems mode. Data are transmitted between the control device and the channel
- by 8-digit bytes with an additional control digit, while they are transmitted be-
tween the control device and the storage device digit by digit using cyclic
11
_ FOR OFFICIAL USE ONLX
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
} ~
'f;t
; _ ~r. -
4r
~ S T l J�. � S~ ~S'.+~A~.u. T )
. 1 .
~
~ ~ . ~ql i-
. ~ . . ,,,~u , ~ ~ _
, � 1 >dt""'- -
_
r;,:~+.
?;:i~
~1~
~ ~ ~
r'.{.
ki~-',~
_ �~fi`~'~s~:
"+k
. Ji'~~:.k'~ .
.ti ~~~f~'~
_ ;~~~�~~y
A ,
ti _ r : .
monitoring of the data files. Microprogramming is used in the YeS5566 device. The
developed hardware and software system provides checking of data to be processed,
_ checking of the efficiency of starage devices and search for malfunctions.
The Ye55566 control device is based on a typical rack and extensively uses unifica-
tion and standardization of assemblies and blocks.
Specifications _
Capacity of a single disc packet 100 Mbytss
Method of recording Modified phase regulation
- Linear density of recording 159 bits/mm
Information access time 55 ms
Disc rotational =requency 3,600 rpm
Data transmission rate 806 Kbytes/s
" tlumber of storage devices connected to Up to 8
device
Component base Integrated circuits and
digital components
Overall di.mensions:
YeS5066 storage device 630 X 735 X 1,135 mm
Ye55566 control device 1,200 X 860 X 1,600 mm
COPYRIGH~': IZDATEL'STVO "NAUKOVA DUMKA" "UPRAVLYAYUSHCHIYE SISTEMY I t,9ASHINY" 1980
[102-6521]
_ CSO: 1863 12 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
- FOR OFFICIAL USE ONLY
' UDC 681.327.69'22.022
CONTROL SCREEI~ DISPLAYS
_ Serpukhov INSTITUT FIZIKI VYSOKIKH ENERGIT.. SERPUKHOV. PREPRINT ir~ Russian No 88,
1980 pp 1-10
ANIKEYEV, V. B. , DU;~TAYTSEV, A. F. , ZHIGUNOV, V. P. , ZOTOV~ V. A. , KLILIKOV, V. A. ,
UTO CHKIN, S. A. and SHAMSUAROV, A. D. _
(From REFERATIVNYY ZHURNAL: AVTOMATIKA, TELEMEKHANIKA I VYCHISLITEL'NAYA
TEKHNIKA in Russi.an No 12, 1980 Abstract No 12B693]
[Text] A display with a control screen is a convenient means of interacting
wlth a computer. In structural terms, the controlling screen is made in the
form of a transparent mask, superinposed on the screen of the display CRT.
Touching a finger to one of the 8 x 8 zones of the mask gives an indicati.on
for the execution of an action, the designation of which is written on the
screen of the display at the given point. A keyboard answering the needs of
the prohlems being solved can be created by purely programming means on the
screen of tfie display. The engine~ring aspects of the design are treated as
well as the pxinciples of :he software for a control screen. Figures 5;
references 10.
COPYRIGHT : VINITI , 1980
[91-8225.]
- 13
FOR OF~ICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
- UDC 681.327.2
A UNiT FOR INTERFACING THE 15VSM-5 ELECTRONIC KEYBOARD C02~UTER TO PERIPHERALS =
Dimitrovgrad NAUCHNO-ISSLEDOVATEL'SKIY INSTITUT ATOMNYICH REAKTOROV. DIMITROVGRAD.
PREPRINT in Russian No 26/434, 1980 6 pp
GL'JSHAK, N. S., LOGINOV, V. D., KHUDYAKOV, V. A. and SHIPILOV, V. I.
jFrom REFERATIVNYanZNo~~:1980
Abstract NoLl B7K14]I~ I~~ISLITEL'NAYA -
TEKHNIKA in Russi ~
[Text] A unit for interfacing computers of the 15VSM-5 type to peripherals (PU),
incorporated in the multichannel radiometric system for data collection and pro-
cessing, is descrihed. The interface serves for the organization of data exchange
between the 15VSM-5 computer and the peripherals in accordance with the program
specified by the 15VSM-5 computer. The form of data representation in the peri-
pherals is either binary or binary-decimal. The number of data bits is 24 and
there are 6 binary-decimal bits. The number of peripheral addresses in the inter-
face system runs up to 510. The interface generates the number of the requisite
word length.from a series of byte transmissions from the 15bS~e5recePtion~inr he -
mits the number to the peripheral and provides for byte-by- y P
computer of the number of the requisite word length from the peripheral. More-
over, the interface receives from the computer and transmits the address of the
peripheral with which the communications are carried on. The binary data incoming
from a peripheral is also converted in the interface to the hinary-decimal form
needed for its reception in the 15VSM-5 computer. In structural terms, the
coupling interface is designed as a unit of double width to the "Chereshnya"
- standard. All of the assemblies200 tacka es.arFiguresn2a referenceslls 155 IC's
with an overall number ot about p 8
COPYRIGHT: VINITI, 1980
j91,s225~
1.4
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
~ FOR OFFICIAL USE ONLY
_ ~
- UDC 681.584.782
A STUDY OF THE OPERATIONAL CAPABILITY OF REL~.YS WITH HERMETICALLY SEALED (;GNTACTS
Riga RAZVITIYE, VNEDRENIYE I EKSPLUATSTSIYA SREDSTV SVYAZI. VSESOYUZNYY NAUCHNO-
TEKHNICHESK"iY SEMINAR,~RIGA in Russian 1980 pp 65-66
KALININA, K. G., LUKS, A. G., PETERSQN, L. P. and SILIN'SH, Ya. Ya.
jFrom REFERATIVNYY ZHURNAL: AVTOMATIKA, TELEMEKHANIKA I VYCHISLIT~L'NAYA
TEKHNIKA in Russian No 12, 1980 AT~stract 12A29 by A. M. Pshenichnikov]
jText_] The results of a study of type RPS domestically produced hermetically
sealed contact relays and RGK-27 and RGK-36 relays produced by the German Demo-
cratic RepuDlic are presented. During testing of the contacts for the effect
_ of vibration, the noise and pulse resistance as well as the number of open cir-
_ cuits per unit time were determined. The minimum value of the acceleration at
which a sharp increase in the noise resistance was observed at the resonant
frequency was 2.5 m/sec2. The RGK-36 relays proved to have the highe~t quality
based on the test results.
GOPYRIGHT: VINITI, 1980
, j91-8225]
15
FOR OFFIC~AL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONI.Y
UDC 681.323 _
DEVISING EQUIPMENT INTERCHAN~ES FOR SMP.LL-COMPUTER CONTROL COMPLEXES
Moscow PRIB~RY 1 SISTEMY UPRAVLENIYA in Russian No 12, Dec 80 pp 6-8
[Article by S. I. Samarskiy, candidate of technical sciences: "Organization
of Efficient Control Systems Based on SM-3 and SM-4 Control Computing Com-
plexes Using WM M-6000, M-7000, SM-1, and SM-2 Peripheral Equipment"]
[Excerpts] Development of the architecture of the system of small electronic
computers (SM EV) has taken two basic directions. The first models SM-1 and =
SM-2 with system interface 2K [1] were based on the small M-6000 and M-7000
computers. The architecture of the later models SM-3 and SM-4 with the sys- ~
tem interface OSh ("common line") [2] was based on the architecture of small
- M-400 computers. -
The control complexes of the SM-1 and SM-2 have a broad assortment of units
for communication with the object (USO's) because all the peripheral devices
- developed for tl,e M-6000 and M-7000 control computing complexes, in particu-
lar the devices for communication with the object, can also be used generally
in the SM-1 and SM-2 control computing complexes. In addition, a number of
new modules of devices for communication with the objecthave been developed
or are in the development stage for the SM-1 and SM-2 complexes.
Durir.g development of peripheral equipment for the SM-3 and and SM-4 con-
~ trol computing complexes attention was focused on system devices. As a
result a short~~ge of peripheral devices for communication with the object -
occurred.
The Kiev Electronic Computing and Control Machine Plant developed and has
begun producing a general-purpose device to match the OSh and 2K linkages.
This device, the USS OSh/2K, makes it possible to use peripheral equipment
- f.rom the SM-1, SM-2, M-6000, and M-7000 control computing complexes (in-
cluding a broad assortment of modules for communication with the object)
in the SM-3 and SM-4 complexes. This is useful not only because it elimi-
nates the above-mentioned shortage and makes it possible to avoid dupli-
cation in development work, but also because it permits efficient use of
modules for communication with the object in the SM-3 and SM-4 control
computing complexes.
In order to have identical or similar system characteristics for the complex
when it is using both its own and external units of the complex that are
16
FOR OFFICIAL USE ONLY
~ G
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
.
FOR OFFICIAL USE ONLY
- connected to it through the matching unit, this unit must be built so that
the service program of the borrowed external device "does not know" that it
; is connected to the complex through the matching unit. ~n other words, this
program should not contain actions that are dstermined by the presence of
the matchins units.
The system characteristic3 of the SM-3 (SM-4) complex with external devices
of the SM-1 (SM-2, M-60U0, M-7000) control computing complex are determined
_ by how the device for matching the OSh and 2K interfaces (the USS OSh/2K)
is made.
_ The efficiency of the method chosen for matching the OSh and 2K interfaces
depends entirely on taking full advantage of the strengths of these inter-
faces and avoiding their shortcomings. Let us consider the 2K and OSh
system interfaces to evaluate the effectiveness of different ways of
constructing the USS OSh/2K.
Series production of equipment for communication with the object for the
SM-3 and SM-4 control computing complexes (RSS OSh/2K expanders and frames
for units for co~r.munication with the ob~ect) with software was inco~porated
~n 1980.
The USS OSh/2K and RSS OSh/2K devices make it possible to connect a broad
assortment of 2K peripheral equipment to the SM-�3 and SM-4 complexes. Using
modules of devices for communication with the object from the equipment of
" the SM-1 and SM-2 complexes in the SM-3 and SN:-4 complexes makes it possible
to build efficient control systems without developing OSh peripheral equip-
ment.
,
In addition to connecting VU2K and SM-3 and SM-4 complexes the USS OSh/2K
unit may be used to organize multimachine computing complexes with SM-1,
SM-2, SM-3, SM-4, M-6000, and M-7000 control computing complexes. Two
duplex registers connected by cable are used for this purpose to organize
two-way exchauge of data files between the SM-3 (SM-4) and the SM-1 (SM-2,
M-6000, M-7000) control computing complexes. One of them is mounted in the
USS OSh/2K interface module and the other at the appropriate interface
, point in the SM-1 (SM-2, M-6000, M-7000) control co~nputing complex. The
duplex register is a W2K arranged on an interface printed plate and designed
to organize two-way data exchange among the SM-1, SM-2, M-6000, and M-7000
complexes.
ir. is possible in principle to organize analogous multimachine complexes in- -
cluding SM-3 and SM-4 units. To do this two USS OSh/2K's and two duplex
registers are used in each case to organize two~-way exchange among the com-
- plexes.
Figure 2[not reproduced] gives a schematic diagram of the organization of
multimachine control computing complexes containing SM-3 (SM-4) and SM-1
(SM-2, M-6000, M-70C0) units.
17
~ FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY _
1. "OST [All-13nion Standard] 25-721 - 78. The 2-K Interface."
2. "OST 25-795 - 78. The 'Common Line' Ii.iterface."
COPYRIGHT: Izdatel'sc.vo "Mashinostroy~eniye". "Pribory i sistemy
upravleniya", 1980 _
~s~-ii,1~6~
i1,176
C50:1863
18
FOR OFFICIAL USE ONLY
,
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
.
~
UDC 1.327.2:621.318.13 -
FOUR TECHNOLOGIES FOR MAKING SMALL MAGNETIC ACCUMULATORS COMPARED
Moscow PRIBORY I SISTEMY UPRAVLENIYA in Russiar. No 12, Dec 80 pp 34-35
[Article by I. P. Dorofeyeva, T. L. Kiyskyula, and A. A. Khramov, engineers,
and candidate of technical sciences G. D. Timofeyev: "Selecting Technology
for the Manufacture of Small-Capacity Magnetic Internal Memory Units"]
[Text] Iskra-type electronic programmable keyboard control register and
bookkeeping machines are now in series production. They use a magnetic in-
ternal memory unit based on a module with a capacity of 1,000 bytes
- (1,000 x 8 internal memory) organized on a 3 x 4W system with ferrite cores
one millimeter in diameter (see Figure 1[not reproduced]). Because the
volume of production of these machines is running into thousands a year and _
- ahows a tendency to continue increasing, it has become necessary to select
and implement technology for making the basic (in terms of specific cost and
labor-intensiveness) assembly of the memory unit, the magnetic accumulator
(see Figure 2[not reproduced]). The technological process of wiring a
_ amall-capacity (1,000 x 8) magnetic accumulator should provide high-quality
manufacture with minimal labor-intensity and cost.
There are four main ways today of wiring ferrite core accumulators: manual,
manual using masks, ~echanized, and fragmentary using masks. Calculations
of the labor-intensity of wiring magnetic accumulators by these four methods
' are give n in the table below.
Manual wiring of the OZU 1,000 x 8 ma gnetic accumulator is done with a rela-
tively simple apparatus. The ferrite cores are set on the wires of the
coordinates which are then secured in the apparatus for wiring. When wiring
the lines of the second coordinate the wiring worker manually orients the
position of each ferrite core according to the diagram for the magnetic ac-
cumulator. The "Read" and "Inhibit" lines are wired manually in sequence.
~ This method of wiring is simple. It does not require significant expenditures
to manufacture the pieces. Its drawbacks are the high labor-intensity and
. inevitability of errors when the ferrite cores are oriented manually.
For manual wiring using masks the main things needed are the masks themselves
and an apparatus to hol~ them. The mask is a bronze plate with holes ar-
ranged according to the topology of one bit position of the magnetic accumu-
lator. The holes in the mask are filled with ferrite cores on a special -
device. A needle is soldered to the end of the installation wire for con-
venient wiring. All four lines are wired manually.
11
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL USE ONLY
Manual-Using Fragmentary
Manual Masks Mechanized Using Masks
Number of Assemblers 1 1 2 1
A aratus Devices Apparatus Apparatus, Set of devices Set of de-
pp ' Masks vices, masks
Adjustment and Servicing of - - Ad~ustment and Servicing
Apparatus anC Devices
Labar-Intensiveness of Prepar- - 4* 1 4
_ ing.Apparatus and Devices
~ for Wiring, in norm-hours
Labor-Intensiveness of Wiring
in Norm-Hours
First Address Lines 1.5* 1.5* 3 Q�5
- Second Address Lines 28 * 1,5* 0.5 0.5
Read and Inhibit Lines 18 * 18 * 18 * 18 *
Total in Norm-Hours 47.5* 25 * 22.5* 23
Note; The labor-intensity figures marked with the asterisk have been
confirmed directly for the OZU 1,000 x 8 magnetic accumulator by
' experimental data
The labor-intenciveness of wiring is decreased by the use of masks. The n~:ed
for complex equipment is eliminated and there is complete freedom in orient-
ing the ferrite cores. The number of terminals of the magnetic accumulator
is two-fifths of the number with manual wiring. In addition, it is possiblP
to reduce the clearances between the cores significantly, which improves the
quality of the magnetic accumulator because the number of microcracks and
- puncCureg in the ferrite cores occurring during wiring is reduced. The
- spread of this technology is being held back somewhat at present by the rela-
~ively high labor-intensiveness of making the masks.
Mechanized wiring was developed at the computing center of the Siberian
Department of the Academy of Sciences USSR for large-capacity magnetic
accumulators and has been implemented at a number of enterprises with series
p roduction. The propose~ technology makes it possible to put the ferrite
cores on the assembly wire automatically and wire the lines of the second
co~rdinate wirh an assigned orientation of the ferrite cores. The other two
- lines are wired manually. This method of wiring requires complex and expen-
sive equipment, plus two wiring workers working together, and constant
~ qualified adjustment and servicing of the equipment.
A fragmentary technology has now been developed to ~vire magnetic accumulators
using masks. After they are filled on a special device the masks are secured
- to a setting table which then moves in the direction of the assembly wire.
The wire assumes the apprapriate direction and enters the rank of ferrite
cord being wired. The second coordinate is wired in the same way. Five-ten
20
FOR OFFICIt~L USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL USE ONLY
percent of the rank of ferrite cores of the magnetic accumulator are examined
manually. Manual wiring of the last two lines is still used. This device
is expensive to manufacture and needs constant, qualified servicing.
As the table shows, manual wiring requires the greateat labor input. The
_ other three variations differ from one an~ther in labor intensity by less
than 10 percent. However, the last two alternative wiring technologies in-
volve significant initial e~cpenditures to manufacture the equ:t.pment and for
subaequent qualified servicing of each unit. A gain of ~ust 10 percent in
labor-intensiveness does not ~ustify the manufacture and operatian of complex
equipment for mechanized wiring or the fragmeztary technology.
On the basis of this analysis we recommend that small-capacity magnetic ac-
cumulators be wired manually using masks. These recommendations have been
implemented successfully at several enterprises which are producing small-
capacity magnetic internal memory units, above all the OZU 1,000 x 8 module.
COPYRIGHT: Izdatel'stvo "Mashinostroyeniye". "Pribory i sistemy upravleniya",
1980
- Ls~-ii,i~6 )
11,176
CSO:1Fs63
21
. FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FUR OFFICIAL USE ONLY -
MICROPROCESSOR SYSTEMS
- NFW BOOK DISCUSSES MICROPROCESSOR SYSTEMS
Moscow MIKROPROTSESSORNYYE SISTEMY in Russian 1980 (signed to press 26 Jun
80) pp 2, 5, 236-237
- [Annotation, excerpt of~~introduction, and table of contents from book
"Microprocessor Systems , by Iveri Varlamovich Prangishvili and Gennadi.y
Georgiyevich Stetsyura, Izdatel'stvo"Nauka'; 9,750 copies, 240 pages]
[ExcerptsJ Annotation
This book reviews the structures and interaction procedures of micro-
processor modules in data processing systems and the organization of multi-
microprocessor distrib uted and concentrated control systems. It describes
the interaction procedures of processors in data processing systems.
Various methods of switching in systems and control of data exchange are
pr.esented. The authors identify solutions that afford rapid interconnection -
of un:its with simple connecting structure. Decentralization of control of
data exchange is considered. The book offers a number of control structures
and algorithms oriented to d ifferent classes of systems. The inf luence of
the mechanism of interaction on the possibilities of executing computations
in the system is demonstrated. The book includes a survey which allows an
assessment of the possibilities of performing parallel computations in
~ multimicroprocessor systems and reviews the most noteworthy concepts of
multimicroprocessor systems published in recent years. -
The book contains 17 tables, 136 illustrations, and 190 bibliographic
entries. ihe responsible editor of this work is E. A. Trakhtengerts. _
Introduction
This book attempts to evaluate which concepts in computer technology and
associated areas are beginning to influence microprocessor technology and
may be used to organize microprocessor data processing systems.
The book r.eviews the basic features of the structure of microprocessors,
the organization oF concentrated and distributed multimicroprocessor sys- -
tems, and the requirements imposed on them. It describes interaction pro-
cedures for processors in data processing systems and the effect of the
organization of connections among technical devices within the system on ;
th~se procedures. It considers the execution of parallel computations,
22 .
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300104455-7
FOR OFFICIAL USE ONLY
- one of the important spheres of application of microprocessor systems. There
is further consideration of varioua methods of organizing links in the sys- -
tem, methods of switching information sources and receivers, and control of
data exchange. Concepts which afford rapid interconnectia of devices with
a simple counecting structure are singled out. Therefore, attention is given
to systems with standard bus structure, which is widespread both in micro-
- processor systems and in the apparatus with which microprocessor systems
_ must interact. One of the chapters reviews the issues of data protection,
which are particularly interesting for distributed systems. The book pre-
sents the results of work done on decentralization of control of data ex-
change at the Institute of Control Problems of tfie Academy of Sciences USSR.
A number of control structurea and algorithms oriented to different classes -
_ of systems are given. The authors demonstrate that these algorithms can be
applied to the organization of computations in a common channel. Computa-
_ tion in a common channel is proposed as the development of the technology of
associative memory devices for multiprocessor and distributed systems which
in many cases permits replacement of work with memory devices by processing
signals sent by components of the system into the comuon channel. The
final chapter describes the most noteworthy multimicroprocessor systems dis-
cussed in the published literature in recent years.
Because the terminology of microprocessor systems, particularly distributed _
ones, is not firmly established yet, a number of the terms used in the book
_ should be viewed only as tools essential for writing the book.
Table of Contents Page
- Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 1. Microprocessors, Microprocessor Systems . . . . . . . . 6
1.1. Microprocessors . . . . . . . . . . . . . . . . . . . . 6
1.2. Microprocessor Systems with Orte Processor 11
1.3. Concentrated Multimicroprocessor Systems . . . . . . . 15
1.4. Mir.roprocessor Systems with D~stributed Data
Processing . . . . . . . . . . . . . . . . . . . . . . 17
~
Chapter 2. Processors, Interaction of Processors . . . . . , . . . 22
2.1. Processors . . . . . . . . . . . . . . . . . . . . . . 22
2.2. Interaction of Processors . . . . . . . . . . . . . . . 27
Chapter 3. Parallel Data Processing . . . . . . . . . . . . . . . . 35
3.1. Parallelism in Problems and Its Evaluation 35
3.2. Paralleling the Computation of Arithmetic Expressions . 39
3.3. Computation of Recurrent Relationsfiips . . . . . . . . . 40
3.4. Computation of Exponents and Polynomials . . . . . . . . 41 _
3.5. Paralleling Cycles in Programs . . . . . . . . . . . . . 42
3.5. Conflicts in Access to Memory . . . . . . . . . . . . . 43
3.7. Parallel Algorithms . . . . . . . . . . . . . . . . . . 44
23 -
= FOR OFFICIAL U~E ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FUR OFFICIAI, tJSE ON1,Y
Fage
Chapter 4. Structure of Connections. Methods of Switching. 47
Control. . . . . . . . . . . . . . . . . . . . . . _
4.1. Data Transmission Lines . . . . � � � � � � � � ' ' ' ' 4~
' ' 51
4.2. Structure of Connections . . . . . . . . . � � � ~ � � � ~ �
4.3. Switching, Control . . . . . . . . . � ~ � � � � � � ' ' ' '
~ 67
Chapter 5. Exchange Systems with a Standard Bus Structure
Chapter 6. Decentralized Priority Control of Data Exchange. 88
Decentralized Code Control . . . . . . . . � � ~ �
(;hapter 7. The Organization of Decentralized Priority Control 101 -
for Systems with 5imple Subscribers . . . . . . .
110
Chapter 8. Algorithms for Local Control of Data Exchange
. . . . . . 126
Chapter 9. Computations in a Common Channel . . . � � � � ' . , . , 126
9.1. Interaction of Three Subscribers . . . � � � � � � � 128
9,2, Interaction of a Random Number of Subscribers 135
9.3. Technical Support of Semaphores . . . . . � � � � � � � � � ,
9.4. The Use of Associative Memory Devices for Computations 136
- in a Common Chantiel . . . � � � � � � � � � ` ' ' ' ' '
9.5. Selection of Program and Interrupt eo~ands, Expanding 138
the Command Functions of the Computer . . . . . . . . . .
143
Chapter 10. Protection (Security) of Data Processing . � � � � ' ' ~ ~ ~ 144
10.1. The Cryptographic Approach To Data Security
I0.2. Cryptosystems with a Public Key (Public-Key Systems). 147
Methods of Obtaining a Digital Signature 148
10.3. Security of Programs and Data in the Computer
Chapter 11. Multimicroprocessor Locally Distributed and Concentrated
_ Control-Co~nputing System (Txamples of Realization 157
and Application) . . . � � ~ � � � � � � ' ' � ' '
11.1. The Role of Microprocessor Systems in Complex Control- . , 165
Computing Systems . � � � � � � ' ' ' ' '
- 11.2. Decentralized M~t~roprocessor�Control-Computing Systems 167
with Distributed Control and Their Application
11.3. The Architecture (Structural Organization) of Multi- 175
microprocessor Concentrated Computing Systems . � � � �
11.4. Survey of Highly Productive Multimicroprocessor 183
Computing Systems . . . . . . . . . . � � � � � � � � �
11.4.1. The PROPAL-2 Parallel and Associative Multi-
Microprocessor System of the French Compa.ny lg3
Thomson-CSF . . . � � ~ � � � � ' ' ' ' '
11.4.2. The ICL 64 X 64 Distributed Matrix�Processor 197
11.4.3. The Siemens AG SMS 201 Structurized Multi- i99
- microprocessor System . � � � � ' ' ' ' ~ 201
11.4.4. The Wisconsin Parallel Array Computer
11.4.5. A Specialized MulCimicroprocessor System for ~05
Processing Reflected Radar Signals . . . . . . .
24 ~
FOR OFFI~IAL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
Page
11.4.6. The POPSY and HUPERCUBE Systems 206
11.4.7. The Point System AP-120B and Data
General AP-130 Array Processors (United
States) . . . . . . . . . . . . . . . . . 2Q8
11.4.8. Cm* Multimicroprocessor Sqstem . . . . . . . . 215
11.4.9. A Multimicroprocessor Computing System with
Circular Structure . . . . . . . . . . . . . 218
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Glossary of Abbreviations . . . . . . . . . . . . . . . . . . . . . . 235
COPYRIGHT: Izdatel`stvo '~Nauka", 1980 _
[112-11,176]
11,176
CSO: 1863
25
- FOR OFFICIAL U5E ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAI. USE ONLY
INSURING SECURITY OF MICROPROCESSOR DATA PROCESSING SYSTEMS
Moscow MIKROPROTESSORNYYE SISTEMY in Russian 1980 (signed to press 26 Jun
80) pp 143-154, 226, 232-233
[Chapter 10 from book "Micr�oprucessor Systems", by lveri Varlamovich
Prangishvili and Gennadiy Georgiyevich Stetsyura, Izcatel~stvo "Nauka", 9,750
copies, 240 pages] ~
[Excerpts] Chapter 10. Protection (Security) of Data Processing
Data processing security is important tn microprocessor systems chiefly for
distributed systems hecause of the great dispersion of data storage and
_ processing means, the possibility of human intervention at many points in
the system, and the existence of common cornmunications lines. _
Data processing security comprises the security of the information stored
and being processe d in the computer (including programs) and the informa-
tion being transmitted by communications lines tietween data sources,
processing devices, and receivers. The topic also encompasses confirmation
- of the individ~ial subscriber.
We will ciL�e examples of distributed microprocessor systems that need data
processing security.
- 1. The information reference system. The system should provide security
of information against unauthorized reading and alteration. Information
being transmitted to a user terminal should not be acceptable to a third
party.
2. The automated control system. Because perfectly adjusted systeias do not
exist for practical purposes, programs and data must have mutual security
against distortions and provide monitoring of the work of control personnel.
The system should be confident that the control order comes from a person
who has authority to issue it. The system should also display, at any
moment, convincing proof that it has received an order from precisely this
party.
The situations considered in the examples do not necessarily presuppose �
an illicit intention. Unauthorized access may occur because of equipment _
malfunction; a terminal connected to the common line may incorrectly decode .
26
FOR OFFICIAL t1SE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
an address and print out the wrong document. The signature under the docu-
ment is generally a co~only accepted norm. Until recently, however, there
were no means of creating a reliable "eleetronic signature" which could be
transmitted in digital form within the system.
At the same time, as numerous publications show, the illicit intention can-
not be ignored either. Thus, if key-type security that is adequate in -
ordinary conditions is used, it must be rememliered that tfiere may be at- _
tempts to decipher the key. An attempt may be made to forge a signature, -
and a~hird party achieving communication with the computer may attempt to
take information out of the machine, intercepting it for himself.
Below we will briefly describe the principal methods of data security.
= 10.1. The Cryptographic Approach To Data Security
- The cryptographic method of data security described below was developed at
IBM and formed the basis for the standard adopted by the U. S. National
Bureau of Standards [10-1-6J. It was based on C. Sfiannon's work on cryptog-
raphy published in 1949 [10-2]. We will consider two types of convertors. -
In Figure 10.1 below block P performs rearrangements. Each of its inputs
is connected electrically with ~ust one output (Figure 10.1 does not show
all the connections). Block S performs substitutions. The decoder converts
~
a
6~oaP
(c)
~ , ~ ~ , ~ , -
6
Q ~ ru u~ p a m n p f~ X 16 (d~ Key : (a) Rearrangement P;
(b) Substitution S;
p !s (c) Block R;
(d) 4 x 16 Decoder;
U (e) Block S;
(f) 16 x 4 Coder.
6nu~r S
� (e)
, 0 /S
~ u~ p a m o p /6XS~ (f)
~
Figure 10.1. Code Convertars _
27
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
,
H'OR OFFICIAI. USE ONLY ~
the binary code to an output signal at its output. The outputs of the de-
coder (points k) are connected with the inputs of the coder on the basis of
a certain reordering. The coder forms the tiinary code again at the output.
- For example, the code 0011 at input S(Figure 10.1) is converted to code 1111
at the output. ~ao mutually reversible rearrangement connections can be es-
tablished between the decoder and the coder and the binary control signal U
selects one of them. The cryptographic system is structured from absolutely
identical connections between blocks P and S(see Figure 10.2 below). Vec-
tor U is a key which sets one of two connections in each of the modules of
S depending on the corresponding bit position of U. (For the sake of sim-
plicity most of the connections between blocks P and S have been oznitted
from Figure 10.2). The strong relationship between bit positions is a dis-
tinguishing feature of this kind of connection. Figure 10.2 shows signal 1
fed to the only input of the circuit is converted into seven units at the
output. Therefore, a slight error at the input substantially distorts the
~ output. Changing key U completely alters the behavior of the circuit. Tn
principle, block S taken separately is a good cryptographic device if it
is large in size. However, it is practically impossible to nake such a
block.
� P
U S S S S
P
S' S S S
P
S S S S
P
S S .S S _
P
Figure 10.2. Sequential Connection of Blocks P and S
28
FOR OFF1C[AL USE aNLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
FOR OFFICIAL USE ONLY
Indeed, if we take S as having five inputs, the number of points k in it is
25 = 32 and the number of possible interconnections is 32! Tfiis is a fairly
large number. However, such a cipher is easily subjected to frequency
analysis because the five inputs are precisely what is necessary to encode
one letter of the alphabet. Therefore, frequency analysts of the coded
text easily identifies the unknown correspondences of letters at the input
and output of block S. The list of possible input and output characters
here is very small (32) and it can be studied easily.
But if the number of inputs~ is taken to be much larger~ for example 128,
the number of possible "characters" is 2128, whicfi is too large for
_ analysis. But a block S with 128 inputs must have 2128 points k(see
Figure 10.2); that is, it cannot be built. Blocks P are not suitable for
constructing a decoder (although they are simpler to perform for a large
number of inputs); by feeding one unit to the input it is possible to de-
termine i~nediately the output corresponding to it.
With the structure shown in Figure 10.2 it is possible to obtain good se-
curity with relatively low complexity because although the blocks S here -
are small, their outputs go to block P, which performs a rearrangement
. within the limits of a much larger bit format. The result is a structure
whose internal organization is very difficult to decode. If U contains
128 bit positions, it will be necessary to sort through 2128 combinations
_ of states of block S for decoding.
If the working speed is not critical, a m~iltilayered scheme (see Figure
10.2) can be made by int~oducing feedback to one layer. The message can
, be decoded by passing it through a similarly organized circuit in which
- the blocks perform the inverse conversion (see Table 10.3 below).
Hnroy (b)
~ ~6aNeNm �6oHeNms -
_ K~ � iS',q_~ ~aun
Nnroveu~~ ~
( FOa- A'nrov
i C) e Ce ab Cle~ ~ a m~~'
~ F~~ io ~o F�i ~F a e
~y ~a ~5~
y.aa7?i ~~~8,~ ~`~v, k y, ~C6t~i c.z~e qa )
GBNCN!!A
`
~ 1~ /l~,veaQmvu~r ~ 2~/Ipue,y~uK
Table 10.3. .Cryptographic System
Key: (1) Transmitter: (f) Error Correction Coder; -
(2) Receiver; (g) Error Correction Decoder;
(a) Subscriber; (h) Gates;
(b) Subscriber Key; (i) Comparison Circuit;
_ (c) Data; (j) Key File [left hand column -
(d) Clock; "Subscriber"; right hand
(e) Cryptographic System; column "Key"].
29
TOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
FOR OFMICIAL USH: ON[.Y
Let us demonstrate how this procedure can be used to establish the authen-
ticity of a sour ce using the example of the work of the system shown in
Figure 10.3. The connection between the source and the receiver is ac-
complished by the following scheme.
Subscriber A communicates his name to the receiver in open code. Receiver A
finds the decod ing key Ka_1 corresponding to this subscriber and enters it
in its cryptographic system. Subscriber A sets his own key Ka in the trans-
mitter cryptographic system. The receiver and transmitter have muCually
synchronized clo cks. The clock readings must be identical. The encoded
message is very sensitive to interference, so an error correction system
is installed at the output of the transmitter and the input of the receiver.
After. receiving auChorization from the receiver, subscriber A begins trans-
mitting informa ti~n. The information arrives in blocks on the upper half
of the inputs of the cryptographic system. Clock readings arrive in the
lower half. Af ter decoding the message the receiver compares the counter
reading received with its own readings and, if they coincide, accepts the
block ~f data th at has arrived.
In such a system the receiver and transmitter may establish the authen-
ticity of the o ther party because it is difficult to forge the keys.
Moreover, it is impossible to use a correct but improper text to create
interference. For example, it is not possible to make a tape recording of
improper information and use it later to falsely trigger the system. Be-
cause transmiss ion of the recording will be done later than transmission
of the original, the clock readings of t~ie tiransmitter and receiver will -
not coincide and the messane will not be accepted. In this case the clock
reading plays the role of a password. In th~s system, however~ tbe re- _
ceiver can forge transmitter messages. Therefore, such a"document" has
no legal force.
10.2. Cryptosystems with a Public Key (Public-Key Systems). -
Methods of Obtaining a Digital Signature
The method of using a key to protect information requires that the keys be
~ delivered to subscribers by a safe channel (for example by messenger). This
is a slow procedure and not suitable for situations where an unforeseen con-
nection must b e established, because there will be no key for this situa-
tion, The ques tion naturally arises: is it impossible to transmit the
key on an open channel? The classical answer until recently was that it was
not possible. In 1976, however, the opposite answer was given to this
question [10-7-9].
In cryptographic system with a generally accessible key, coding and de- _
coding are con trolled by different keys E and D which are such that it is
practically impossible to compute D on the tiasis of E(for example, it re-
quires performing 10100 operations). The key Ei of subscriber Ai is _
stored in a general-access reference. Practiaally no one except Ai will be
able to decode the encoded message.
To be more pre cise, E and D should have the following propertiest
1) D(~(M)) = M, where M is a random message from the set of permissible
- 30 -
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-44850R000300104455-7
FOR OFF[C1AL USE ONLY
- messages {M}; (2) E(M) and D(M) are easily computable; (3) knowing E
doea not in practice permit computing D; (4) E(D(M)) = M.
The fourth property is necessary only to receive a digital signature
(see below)
To transmit message M to receiver Ai, source A~ takes the coding key Ei
of subscriber Ai from the reference and encodes the message using it:
N-~ Ei(M). Because of property (3) no one except Ai can decode EiM.
. Therefore, Ai performs the operation Di(Ei(M)) = M, that is, decodes the
message (property (1)). Because of property (2) the source and the
receiver must perform fairly simple computations to process the message.
- Finding good keys E and D is a problem [10-9-15].
Now let us turn to the question of the digital signature. This problem
- differs from establishing authenticity where it is sufficient for the
receiver to ascertain that the message to him is, in fact, coming from
the particular source. The signature must have legal force, and it must
be inseparable from the particular document. The procedure for sub-
scriber Aj to receive the signature of subscriber Ai is given below.
1. Ai puts signature S on document M: S= Di(M), where
= Di is conversion of the decoding of subscriber Ai;
2. Ai encodes S with generally accessible key E~ of sub-
scriber A3 and sends E~ (S) to A~;
3. Aj receives S from E~(S), that is, D~(E3(S)) = S;
4. Aj, using generally accessible key Ei, receives M
from S, that is, M= Ei(S) (propexty (4) was used).
Thus, the pair (M, S) is a document with signature and the equality
Ei(S) = M serves as proof of the receipt of M from Ai.
Subscriber A~ cannot forge the document (M } M') because to do so it is
necessary to obtain signature S' = Di(M'), and this is not possible for
A~ .
The digital signal can become very widely used. For example, when
specialized integrated circuits that perform the conversions E and D
quite well are produced it is possible to document telephone orders,
giving each spoken word a signature.
10.3. Security of Programs and Data in the Computer
The methods of coding reviewed in the preceding section insure preserva-
- tion of data during its transmission outside the data processing system.
T.he techniq~res are also an important element of intrasystem security,
but they alone are not adequate because the object stored in the computer
may have fairly complex organization and enter into complex interrelation-
ships. The orgaclization of security ti~at is adequa.te to these structures
31
FOR OFFIC[AL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007/02/48: CIA-RDP82-44850R000300104455-7
H'OR OFFICIAI. USE ONLY
should be worked out accordingly. When it is necessary to gusrd the sys-
tem against accidental malfunctians �airly simple protection circtiits
are usually used. But these circuits cannot prevent the dangerous dissemi-
nation of errors in the system. Moreover, poor protection usually pro-
_ vides little or no record of the events, which makes it more difficult to
detect and eliminate the cauae of Che error. Deliberate interference is
potentially possible in collective-access systems and the lack of protec-
tion against it undermines faith in the system. Below we describe
procedures for protectic~n against random and deliberate interference. The
survey work [10-lOJ contains an extended bibliography on this question.
= It should be noted first that it is practically impossible to add means
- of protection later to systems that do not contain them. Therefore, pro-
tection (if it is considered essential) should be introduced in the early
_ phases of designing the system.
There ~re three types of disruptions that a security (protection) system
should control: unauthorized reading of information; unauthorized modi-
fication of information; unauthorized obstruction of access to informa-
~ tion (in particular, program distortion).
The security mechanism depends significantly on the functional capabilities
of the system. The "all or nothing" principle is often followed. This is
where usera are mutually isolated, but have access to common information.
If a user is authorized to make entries in common information, these
entries become generally accessible. Self-virtualizing machines are a
typica? example (see below).
In a more complex example it may be necessary to protect highly diverse
ob~ects (data and program structures) which are interconnected. The need
for dynamic change in authorizations introduces significant complexities.
In addition to indicating who can do what with tfie object, more subtle
limitations that take into account the properties of the object may be en-
countered. For example, "Access is avthorized only during the working days
of the week from 0930 to 1815."
The following principles are noted in the literature for constructing a
security system.
1. The mechanism of protection must be simple~ c~mpact, and easily sur-
veyed. Otherwise it will be difficult to guarantee its effectiveness.
2. Authorizations should prevail over inhibitions. The normal regime
is lack of access. With this approach it is easier to detect errors than
in systems that are based on inhibitions.
3. Protection should not be constructed on the basis of secrecy of the
protective mechanism; this is difficult to insure. A very small part of
- the information should be secret.
4. A minimum range of authorization necessary to execute its work should
be established for every program. This reduces the damage done by dis-
ruptions and simplifies the search for a disruption.
- 32
. FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
~
FOR OFFICIAL USE ONLY
- 5. Each protection mechanism should depend minimally on the other mechan-
- iam (see also point 1 above).
6. The monitoring of disruptions should be all-encompassing, covering all
parts of the system in any state.
7. It is desirable to have a record of attempted disruptions.
- 8. It is desirable to decentralize protection; centralized storage of Che
information that controls accesa cannot be relied upon.
The simplest form of protection is complete isolation of users. Let us con- _
sider this kind of protection uaing the example of self-virtuali.zing
machines, a variation of virtual machinea [10-11-13, 10-16~. With re-
~ spect to sof tware realization, a self-virtualizing machine requires at
least one additional level of control compared to conventional operating =
systems: a monitor of control of system resources. User ~obs are performed
under the control of the operating systems tfiey aelect, but the systems are
executed in the job regime. When they must organize access to some physi- -
cal resource, they refer to the control of system resources, and only it
in fact distributes the resources. Because in the particular case oper-
ating systems can serve a small nwnber of users, they are relatively simple
and control of system resources also performs limited functions. One of
- the chief purposes of this organization is to work with programs and oper--
ating systems that have not been debugged and to insure reliability,
safety, and security.
The hardware shoul3 have a built-in data security apparatus in order to
design an eff ective self-virtualizing machiiie. Figure 10.4 below shows
one of the possible diagrams. The system has a rela tive base addressing
mechanism. When one process Ai of the set of proces ses performed by oper- -
ating system OSA is generated, OSA (monitored by the system for control of
system resources) identifies the address of the memo ry docnain II Ai and
formulates the state word of this process. This word indicates the de- -
scriptor that contains the base (B) and the maximum shift (MS). The sign
C2 indicates the permissible work regime in the identified memory domains:
write, read, unlimited. We will describe the sign C1 below. For the
work process Ai, its state word (Ai) should be s~t in control register R.
The command which requires reference to memory contains a positiva shift
relative to the base. During the performance of such a command the shift
is added to the value of the base indicated in the state word (Ai). If
the address for access to memory obtained in this case goes outside the
boundaries of the interval [B, MS], hardware control blocks memory access.
_ A single process may require several state words, and it is wise to have a
group of registers { R} and indicate the necessary register in tfie command -
to avoid having to replace the contents of register R frequently. -
' Sign C1 in the state word uf the process is used to describe the type of
data contained in the memory domain corresponding ~o the given state word
[10-14]. Ssppose C1 = a means that the state word of tt~e process is stored
in a particular domain of the memory unit. We will divide the aet of
- commands (of the user and operating systems) into two subsets: M1, which is
33
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000300100055-7
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000300100055-7
ROR OFFICIAL, IItiF. UNLY
~
3y
- .
~