summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc700.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc700.txt')
-rw-r--r--doc/rfc/rfc700.txt332
1 files changed, 332 insertions, 0 deletions
diff --git a/doc/rfc/rfc700.txt b/doc/rfc/rfc700.txt
new file mode 100644
index 0000000..3323548
--- /dev/null
+++ b/doc/rfc/rfc700.txt
@@ -0,0 +1,332 @@
+
+NWG/RFC 700 August 1974
+NIC 31020
+INWG Experiments Note 1
+
+ A Protocol Experiment
+
+
+ Eric R. Mader
+ William W. Plummer
+ Raymond S. Tomlinson
+
+
+
+I. Introduction
+
+In early February, 1974 the main line printer on BBN's TENEX system
+failed and it was decided to use the PDP-11 line printer via the ARPANET
+both for the direct purpose of obtaining listings and also the indirect
+purpose of studying network protocols.
+
+
+
+II. The Basic Protocol
+
+The design was based on the protocol described by Cerf and Kahn in INWG
+Note #39. Familiarity with that document is assumed. The following is
+a brief sketch of the protocol. Not all features described in this
+section have been implemented. See Section VI.
+
+At any instant, the sender has two pointers into the stream of bytes to
+be sent. Bytes to the left of the LEFT pointer have already been sent
+and acknowledged. Bytes in the "window" between the LEFT and RIGHT
+pointers have been sent (zero or more times), but no indication of
+successful transmission has been received. Bytes to the right of RIGHT
+remain to be considered at some time in the future.
+
+In operation the sender is constantly sending bytes from the input data
+stream resulting in the RIGHT pointer advancing. Positive
+acknowledgements produced by the receiver cause the LEFT edge of the
+window to move towards the RIGHT edge.
+
+LEFT and RIGHT are actually numerical byte positions within the data
+stream. The low order 16 bits of RIGHT are sent with each message as a
+sequence number so that the receiver can identify which part of the data
+stream it is receiving in case messages are not received in the same
+order they were transmitted. The receiver has a finite amount of buffer
+space available in which it can reassemble an image of the data in the
+transmitter's window. The receiver discards any messages which have
+sequence numbers outside of its buffer area. However, messages to the
+left of LEFT must be acknowledged even though they are discarded.
+Otherwise, a lost ACK would cause the sender to retransmit (and the
+receiver ingore) the message indefinitely. Messages received with bad
+checksums are also discarded.
+
+As "good" messages are received, the holes are filled in the receiver's
+buffer and continuous segments at the left edge are passed to the
+physical line printer (in our case). The receiver informs the sender of
+
+ Page 2
+
+
+
+this action by sending an ACK (acknowledgement) message. This message
+specifies the sequence number of the byte it would like to receive next
+(the new value of LEFT in the sender) and the current amount of buffer
+space it has available (new maximum window width in the sender). The
+sender ignores ACK's to the left of LEFT and to the right of RIGHT.
+Thus, both the sender and receiver are prepared to handle multiple
+copies of messages.
+
+Failures such as messages with bad checksums, messages lost during
+transmission (data and ACK's), and messages discarded due to sequences
+numbers which were apparently out of range, all manifest themselves to
+the sender as a dropped ACK. A dropped ACK will cause the sender's LEFT
+edge to stop advancing, leaving the unacknowledged message at the left
+of the sender's window, and possibly a corresponding hole at the left of
+the receiver's image of the window. Eventually, transmission will cease
+and a (10 second) timeout will trigger in the sender, causing
+retransmission of all data within the window. Note that at the instant
+of a timeout, there is no guarantee that the un-ACK'd message will be
+exactly at the left edge of the window or that it is the only
+unacknowledged message in the window. Retransmissions are likely to
+cause the receiver to see data that it has seen before, but duplicate
+messages will be discarded due to sequence number considerations.
+
+
+
+III. "Say Again"
+
+An extension to the INWN #39 protocol which was implemented was the
+ability to let the receiver force retransmission of the entire window by
+turning on a flag in any message back to the sender. This is useful in
+cases where the receiver believes that a data message has been dropped
+and it wants to force retransmission rather than wait for a timeout in
+the sender. Clearly, this relies on the network to preserve ordering of
+the messages. Also, it is not useful if the error rate is high because
+the whole window is retransmitted in order to get retransmission of a
+single message or two.
+
+
+
+IV. Establishing an Association
+
+In the experiment two flags were used to establish an association. FRST
+(FiRST flag) was the equivalent of SYN described in INWG Note #39 and
+served to identify the first message of an association. This instructed
+the receiver to accept the sequence number in the message as a
+definition of the starting point of sequence numbers for the
+association.
+
+The second flag is a receiver-to-sender flag called HUH which is a
+request by the receiver for a definition of the sequence numbers. Upon
+receipt of a message containing an HUH, the sender responds by turning
+on FRST in the next data message. Normally, HUH is sent only if the
+receiver had been restarted, or if it is replying to messages on a port
+
+ Page 3
+
+
+
+that it knows is not part of an association.
+
+
+
+V. A Problem
+
+A severe problem uncovered with the protocol was concerned with
+establishing an association. If the PDP-11 (receiver) was reloaded
+while the spooler (sender) was running, the first few pages of the data
+stream were printed about six times before normal operation was
+established. The cause was traced to the following sequence of actions:
+
+
+ 1. The sender would be in a loop, timing out and
+ retransmitting because the receiver had not responded.
+
+ 2. Upon being restarted, the receiver would see a whole
+ window's worth of messages, and respond to each with an HUH.
+
+ 3. For each HUH the sender would reset the window and include
+ a FRST flag with the first message in each of the (six)
+ retransmissions.
+
+ 4. The receiver would see the first message of the first
+ retransmission containing a FRST, accept the sequence number,
+ and print the data from that and the following messages.
+ Then, another message containing the FRST flag would appear
+ and the cycle would repeat (five more times). Note that the
+ ACK's generated in the repetitions were ignored by the sender
+ because they were to the left of the window.
+
+
+As a "cure" for the above the receiver program was modified so that
+after sending an HUH, messages are ignored until one with a FRST flag
+appears. This solution is unacceptable in general because it leaves the
+receiver port useless if either the message containing the HUH or the
+response gets lost in transmission. Although a timeout was used to
+guard against this, the timeout cannot be trusted because it might cause
+two messages with FRST flags to be received -- just the problem which is
+being avoided!
+
+An alternate cure which does not depend on the network to be lossless
+would be to modify the sender to respond to a HUH by ignoring all
+messages for at least a round trip delay time before sending its
+response containing the FRST flag. This results in having to define
+what this time is. In general this cannot be done when messages can
+become trapped for indefinite amounts of time in network partitions.
+This will be discussed more fully in a subsequent document.
+
+ Page 4
+
+
+
+VI. Features not Investigated
+
+None of the programs to date have supported any of the following
+features:
+
+
+ 1. Window size control. The window size was a constant (2048
+ bytes). In a future experiment the window size will be varied
+ not only by indications of buffer space in the receiver, but
+ also as a function of estimated transit time. (see below).
+
+ 2. Reassembly. Since reassembly is conceptually easy, it is
+ likely to be one of the first extensions. A message corrupter
+ will be included in the receiver to test the functioning of
+ the reassembly mechanism.
+
+ 3. Expanded Internetwork Addresses
+
+ 4. Multiple Associations
+
+ 5. Reliable Making and Breaking of Associations
+
+
+
+VII. Implementations Notes
+
+The sender involves approximately ten pages of assembly code for the
+network message interface. Two processes are involved: one which fills
+a buffer by reading the input data stream, and a second process which
+sends network messages from the buffer and processes replies from the
+receiver. The two processes are joined by a coroutine mechanism, but in
+the future will be two parallel TENEX processes.
+
+The receiver program consists of approximately four pages of BCPL code
+in addition to IO device drivers and routines which implement queueing
+primitives.
+
+Each message contained between zero and 255 bytes of data arranged (as a
+coding convenience) in a way which is directly compatible with the BCPL
+string handling routines. Messages contained a single byte of checksum
+which was the low eight bits of the twos complement negation of the twos
+complement sum of all other bytes in the message. We recommend that
+some more reliable checksum function be employed in the future; even
+using eight-bit ones complement arithmetic would be better.
+
+Source files for the various programs are available from the authors at
+Bolt Beranek and Newman, 50 Moulton Street, Cambridge Mass., 02138.
+
+ Page 5
+
+
+
+VIII. Simple Rate Calculations
+
+If we assume that an active association has reached steady state, that
+processing delays are lumped into the transit time T, and that there are
+no errors, then the maximum data rate may be calculated as follows.
+
+Assume the sequence numbers being passed by the RIGHT pointer are some
+function of time, R(t). Messages received by the receiver will be the
+same function of time but delayed T (a transit time) seconds. Since
+processing time is zero, the acknowledgments will bear this same
+function, R(t-T). Acknowlegements received by the sender will have
+sequence numbers R(t-2T).
+
+Acknowledgements at the sender determine the LEFT pointer, L(t). Also,
+it is known that R(t) is ahead of L(t) by the width of the window which
+is a constant in steady state. Thus, we have the two relations:
+
+ L(t) = R(t-2T)
+ L(t) = R(t) - W
+
+Now, let R(t) = Bt, i.e., sequence numbers are increasing linearly with
+time. (Microscopically, short bursts will alternate with longer periods
+of inactivity, but the average bandwidth will be B.) The result under
+the assumptions is that the bandwidth is:
+
+ B = W/2T .
+
+That is, the bandwidth in bytes per second is just the steady state
+window width divided by the round trip delay time. Conversely, the aboe
+relation can be determine the buffer sized needed: in oreder for thee
+receiver to guarantee to accept information that was transmitted, it
+must supply buffering equal to (or greater than) the window size. The
+window size must be equal to or greater than the desired bandwidth times
+the round-trip delay time, i.e. equal to the number of messages in a
+round-trip "pipeline".
+
+The bandwidth in the presence of a relatively low error rate may be
+calculated. Assume that B and W are expressed in terms of (full)
+messages rather than byte numbers. Each error has two effects: a time
+out delay of D seconds and retransmission of W messages. So, the time
+Q(M,N) required to transmit M messages burdened by N errors is the sum
+of the time to transmit the data once, N*D seconds of time out delay,
+and the time to transmit the window N more times.
+
+ Q(M,N) = (2T/W)*M + N*D + N*2T
+
+Dividing by M to get time per message and multiplying the last term by
+(W/W):
+
+ Q(M,N)/M = (2T/W) + (N/M)*D + (2T/W)*(N/M)*W .
+
+But (M/N) is just the fraction of messages in error. Call this E.
+
+ Page 6
+
+
+
+ Q(E) = (2T/W)*(1 + EW) + ED
+
+ B(E) = 1/[(2T/W)(1+EW) + ED]
+
+The advantage to using the "say again" mechanism (Section III.) can now
+be seen: it forces D to be zero, allowing a reasonable average data rate
+in the presence of errors. Note the effect of a 10 second time out on a
+network with an E of 0.01, assuming W to be 20 messages and T of 0.5
+second. B(D=10) is 6.7, but with forced retransmission, B(D=0) is 20.
+
+
+
+IX. A Sequence Number Consideration
+
+In order to reject duplicate messages, sequence numbers must contain a
+sufficient number of bits such that it is impossible to cycle through
+more than half the sequence number space in a message lifetime at
+maximum transmission rate. Assuming a 1 MegaByte per second network and
+a maximum lifetime of 500 seconds, the sequence number field of each
+message must be capable of holding the number 2*500*10**6 which is 10**9
+or about 2**30. Thus, a 32-bit (4-byte) sequence number field is
+recommended.
+
+
+
+X. Additional Control Functions
+
+In response to an attempt to establish an association (SYN) it is felt
+that the receiver should be able to deny the attempt (RELease) in one of
+the following three ways:
+
+ REJECT. (I'm busy. Try again later.)
+ ABORT. (I don't understand what you are sending.
+ (Bad port, etc.))
+ ABNORMAL (SYN arrived on a established connection.)
+ (Receiver breaks connection and issues this REL.)
+
+During an established association, the sender should be able to RELease
+the association in either of these ways:
+
+ DONE. (I'm done sending to you.)
+ GAG. (Stop. You are sending garbage (ACK's).)
+
+These may be coded as combinations of bits in the FLAGS which are
+convenient for programming.
+
+
+
+ \ No newline at end of file