DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T s

⟦52c982495⟧ TextFile

    Length: 20494 (0x500e)
    Types: TextFile
    Names: »section3.tex«

Derivation

└─⟦3d0c2be1b⟧ Bits:30001254 ISODE-5.0 Tape
    └─⟦eba4602b1⟧ »./isode-5.0.tar.Z« 
        └─⟦d3ac74d73⟧ 
            └─⟦this⟧ »isode-5.0/doc/cn-isdn/section3.tex« 
└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0
    └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« 
        └─⟦de7628f85⟧ 
            └─⟦this⟧ »isode-6.0/doc/cn-isdn/section3.tex« 

TextFile

% run this through LaTeX with the appropriate wrapper

\f

\section	{The Approach}
From the viewpoint of OSI-applications development,
we should note that the best of all solutions to the problem sketched earlier
requires a complementary co-existence:
\begin{itemize}
\item	we want to utilize mature TCP/IP functionality and stability which is
	not currently present in the immature OSI protocol suite;

\item	we want to utilize new OSI functionality as it becomes available;
	and,

\item	we want to develop OSI-based applications now in an {\em evolutionary},
	not {\em revolutionary} fashion.
\end{itemize}
These criteria suggest motivations for a migration strategy.
In migrating from the DDN protocol suite to the OSI protocol suite,
there are several strategic choices to be made.

For the lack of a better term,
we will call the object which joins the two protocol suites a {\em magic box}.
We favor the use of this term instead of {\em gateway},
since the former term invokes less inference on the part of the reader.
To choose where the magic box should ``live'',
we make three observations:
\begin{enumerate}
\item	Joining at the session layer (or above) introduces too much
dependency on the ARPAnet client/server model, as discussed in the
introduction.
This argues for the magic box to live no higher than the transport
level.

\item	Joining at the network layer (or below) foregoes use of the TCP and
requires complete implementation of the TP on top of the \dod/ IP.
It also prevents the use of the efficient board-level products which
implement the TCP.
This argues for the magic box to live no lower than the service
access points at the top of the transport layer.

\item	In general,
the construction of magic boxes at any location other than the transport
layer is problematic at best;
this will be illustrated later on
(in Section~\ref{comparison} on page~\pageref{comparison}).
\end{enumerate}
Given these arguments,
the OSI Transport Service Access Point (TSAP) is the ideal place for the magic
box to be constructed:
it allows us to take advantages of the main strengths of the DDN protocol
suite while providing OSI defined services at the layers above.
Figure~\ref{tsap.model} outlines the relationships we propose.
\tagfigure{3-1}{OSI Transport Services on top of the TCP}{tsap.model}

Our approach is to utilize exactly one TCP port (number~102) with
TS-peers running on this port to interpret the protocol data units (PDUs)
on the connection and dispatch them accordingly.
This is not nearly as difficult as it sounds,
since the TCP performs all the multiplexing,
and provides each client/server pair with exactly one connection to manage.
As a result, the dispatch function is trivial (i.e., null).
Currently,
we use a very simple mapping between TSAP IDs and services
(a shortcoming described later).

\subsection	{Summary of the Protocol}\label{protocol}
The external behavior of our magic box is to use the services offered by the
TCP
and co-operate with other magic boxes,
to provide the services defined for the TP.
For our purposes,
we define the {\em services offered\/} by a protocol
as its service primitives.
The services offered by the TCP and the TP are summarized in
Tables~\ref{tcp.services} and~\ref{tp.services} respectively
(readers should consult the authoritative works \cite{TCP} and
\cite{ISO.TP.Service} for more detailed information).
For purposes of exposition,
we use the term {\em TS-user\/} to denote an entity utilizing the transport
services,
and {\em TS-provider\/} to denote an entity providing those services.
\tagtable{3-1}{TCP Service Primitives Offered}{tcp.services}
\tagtable{3-2}{TP Service Primitives Offered}{tp.services}

Since both the TCP and the TP primarily offer a virtual-circuit service,
it is not surprising that
all the ``hard parts'' of the TP are also done by the TCP
(e.g., three-way handshake, choice of initial sequence number, windowing,
multiplexing, and so on).
This leaves us with the task of devising a protocol,
running above the TCP,
which performs whatever tasks are necessary to map one flavor of service
primitives into the other.

Despite the symmetry of the TP,
it is useful to consider the magic-box protocol with the perspective of a
client/server model.
We view two entities, denoted {\em TS-peers}, as implementing this protocol.
One of these TS-peers,
the TSAP server, begins by LISTENing on TCP port~102.
When the other peer, the TSAP client, successfully connects to this port,
the protocol begins.

A client TS-peer decides to connect to the TCP port on the service host
when the client's TS-user issues the {\sf T-CONNECT.REQUEST\/} action.
One of the parameters to this action specifies the TSAP ID (identifier) of
the remote TS-user.
The client uses the TSAP ID to ascertain the IP address of the server,
and attempts to open a connection to TCP port~102 at that IP address.
If not successful,
the client fires the {\sf T-DISCONNECT.INDICATION\/} event for the TS-user.

Although the TCP offers a byte-stream,
the magic-box protocol packetizes the bytes into units which have the
identical syntax (format) as data units in the TP (TPDUs).
These packets are termed TPKTs to avoid any confusion with the term TPDU.
When the connection is opened,
the client fills in a request-connection TPKT, sends it to the server, and
awaits a response.

The server, upon receipt of the TPKT,
validates the contents of the TPKT
(checking the version number, verifying the type code, and so on).
If the packet is invalid,
the server sends a request-disconnection TPKT,
closes the connection, and goes back to the listen state.
Otherwise,
the server examines the TSAP ID of the TS-user with which the remote TS-user
wants to communicate.
If the specified TS-user can be located and started,
the server starts this TS-user by firing the {\sf T-CONNECT.INDICATION\/}
event.
Otherwise a request-disconnection TPKT is sent
(and the server closes the connection and goes back to the LISTEN state).

The TS-user receiving the event will now respond with one of two actions,
either {\sf T-CONNECT.RESPONSE\/} or {\sf T-DISCONNECT.REQUEST}.
Depending on the response,
the server sends either a request-disconnection or a confirm-connection
TPKT back to the client.
The server then enters the SYMMETRIC PEER state.

When the client receives the reply TPKT from the server,
it performs the usual validation.
If the packet received was a request-disconnection TPKT,
the client fires the {\sf T-DISCONNECT.INDICATION\/} event,
and closes the connection.
Otherwise,
it fires the {\sf T-CONNECT.CONFIRMATION\/} event
and enters the SYMMETRIC PEER state.

Once both sides have reached the SYMMETRIC PEER state,
the protocol is completely symmetric and the notion of whether the TS-peer
started as a client or server is lost.
Both TS-peers act in the following fashion:
if the TCP indicates that data can be read,
the TS-peer reads the TPKT, and validates the contents.
\begin{itemize}
\item	A request-disconnection TPKT results in the
{\sf T-DISCONNECT.INDICATION\/} event being fired, and the TCP connection
being closed.

\item	A data TPKT or expedited data TPKT results in {\sf T-DATA.INDICATION\/}
or {\sf T-EXPEDITED DATA.INDICATION\/} event (respectively) being fired.

\item	Invalid TPKTs result in the {\sf T-DISCONNECT.INDICATION\/} event
being fired for the TS-user,
a request-disconnection TPKT being sent,
and the connection being gracefully closed.

\item	An error on the TCP connection also results in the
{\sf T-DISCONNECT.INDICATION\/} event being fired.
\end{itemize}
As expected,
the {\sf T-DATA.REQUEST}, the {\sf T-EXPEDITED DATA.REQUEST},
and the {\sf T-DISCONNECT.REQUEST\/} actions on the part of the TS-user
result in the appropriate TPKT being sent to the remote TS-peer.

In the interests of brevity,
many parts of the protocol were simplified or omitted from the discussion
above.
For example,
when a request-disconnect TPKT is sent,
it contains a code indicating why the disconnect was initiated.
The precise protocol (including state machines) is presented in
\cite{TSAP.on.TCP.old}.

\subsection	{Design Decisions}
The previous section discussed the protocol in simplistic detail.
We should now consider certain nuances in the protocol's design and behavior.

\subsubsection	{Packet Format}
The choice of packet format for the magic box protocol was made rather arbitrarily:
the TP format for TPDUs was chosen as it was suitable for our needs.
Although a few fields are ignored,
this introduces a very small amount of additional overhead.
For example,
on a request-connection TPKT (the worse case),
there are 6 octets of ``zero on output, ignore on input'' fields.
Considering that the packet overhead is fixed,
requiring that implementations allocate an additional 6 octets is not
unreasonable.
As experience is gained,
some of these fields (e.g., the class field) may be used in future versions
of the protocol.

\subsubsection	{Quality of Service}
In our proposal, this is left ``for further study''.
We expect a future version of the protocol to attempt to map the TP QOS
parameters into the DDN IP precedence and security parameters.

\subsubsection	{Administration of Address Space}
It is tempting to define a straight-forward mapping between the OSI and
TCP/IP addressing domains.
For example,
the OSI network service access point identifier (NSAP ID) could be mapped
into a DDN IP address,
and a combination of the service access point selectors of the higher layers
could be mapped into a TCP port number.
Unfortunately there is no straight-forward mapping for
the OSI session and presentation service access point selectors,
as each application in the DDN protocol suite has its own implicit session
and presentation mechanism.
One solution is to view the mappings as:
\[\begin{tabular}{rlc}
	$<$NSAP ID$>$&
			$\longleftrightarrow$&	$<$IP address$>$\\
	$<$TSAP  selector, SSAP selector, PSAP selector$>$&
			$\longleftrightarrow$&	$<$TCP port$>$
\end{tabular}\]
This approach is particularly interesting because it suggests that the
TP can be run directly above the DDN IP protocol.
However, this suggestion is not necessarily a benefit
(again see Section~\ref{comparison}).

However,
the TCP port space cannot accommodate the space of OSI higher layer selectors.
The TCP supports a port space denoted by small integers,
represented as unsigned 16--bit quantities.
Further, any port larger than~1023 is reserved for the use of clients,
and ports larger than ~511 are reserved for the use of local servers.
This leaves about 510~ports for well-known (pre-assigned) services,
most of which are already in use by existing services.

\subsubsection	{Expedited Data}
The largest difference between the services offered by the TCP and the TP is
the expedited data service offered by the TP.
We initially experimented with three approaches which could be used in
implementing expedited data with the TCP:
\begin{itemize}
\item	Use a single connection without the TCP URGENT\\[0.1in]
All data TPKTs and expedited data TPKTs are placed on the same TCP connection.
As a result,
there is no actual ``priority'' associated with the
{\sf EXPEDITED DATA.REQUEST\/} action other than it
eventually resulting in the {\sf EXPEDITED DATA.INDICATION} event occuring in
the future.
Furthermore,
we are guaranteed that once any expedited data is sent,
it will arrive before any data sent in the future arrives.
This is true to the letter, though perhaps not to the spirit of the TP.

\item	Use a single connection with the TCP URGENT\\[0.1in]
All data TPKTs and expedited data TPKTs are placed on the same TCP connection.
However,
expedited data TPKTs are sent with the URGENT bit set.
The receiving TCP could signal the TS-provider that URGENT information was
available on the connection.
The TS-provider could then buffer all further TPKTs until the TPKT
containing the URGENT pointer was received.
After this TPKT had been handled,
the buffered (non-expedited) data could be acted upon.
Although this is more true to the spirit of the TP,
it requires some complex buffer management and may not be implementable on
single-thread implementations of the TCP
(e.g., some implementations for \msdos/ on the PC).

\item	Use two connections\\[0.1in]
A third approach is to open two connections.
During connection establishment,
after making a TCP connection to the server,
the client starts a PASSIVE, non-blocking TCP open.
The address of a TCP port associated with the open is then passed
in the TSAP ID of the request-connection TPKT.
Immediately before the server sends the confirm-connection TPKT,
it connects to the indicated port.
Upon success,
it passes in the confirm-connection TPKT the TCP port it used to make
the second connection (thus introducing a secondary correctness check).
This requires no buffer management on the part of the TS-provider,
and can be implemented even in single-thread implementations of the TCP.
The disadvantage of our approach is that it may violate the letter of the TP!
Since two connections are used,
the paths in the subnet taken by the packets may differ,
and it is possible that non-expedited data sent after expedited data may
actually arrive earlier.
\end{itemize}
Version~1 of the protocol used the third approach to implement the expedited
data service.
However, in order to guarantee the semantics of the service,
it became apparent that a complicated buffering scheme was required.
Rather than introduce additional complexity,
in version~2 of the protocol we opted for the first approach.
This requires no buffering and implements the semantics correctly,
albeit at the boundaries of the service specification.

\subsection	{Work To Date}
Work to date has reached two milestones:

\subsubsection	{RFC983}
In April of {\oldstyle 1986},
the DDN Network Information Center issued RFC983,
entitled {\it ISO Transport Services on top of the TCP\/}\cite{TSAP.on.TCP.old}.%
\footnote{\cite{TSAP.on.TCP.old} specifies version~1 of the protocol.
Based on our experiences,
we are currently running version~2,
which consists of four minor changes to the original protocol.
A new RFC, describing these changes, is undergoing review.
Appendix~\ref{changes} summarizes these changes.}
This document presents our model of operation and gives a formal description
of the protocol described in the Section~\ref{protocol}.

It is important to understand exactly what RFC983 intends.
RFC983 does not specify how one constructs an interface to the OSI TSAP.
It indicates how one might build such an interface on top of the TCP.
That is,
given the abstract service definitions for the TP,
instructions are given as to how those can be mapped on to the services
provided by the TCP.
From our perspective, a proper implementation of RFC983 exhibits the
following properties:  
\begin{enumerate}
\item	it has the TSAP interface that you want on your host;
	and,
\item	it uses the protocol defined in RFC983.
\end{enumerate}
RFC983 has no intention of specifying an ``OSI protocol''.
Rather it specifies a DDN-style protocol which provides OSI services.
It is the intent of RFC983 to permit standard OSI protocols to run on top of
the TCP.
It is not the intent to build OSI-like protocols for the DDN.  

From our experience, we agree with John Leong of CMU that:
\begin{quote}\em
``In general,
it is important for one to produce good generic protocol interface design so
that a particular protocol implementation or even the protocol itself can
easily be replaced without affecting the code in the upper or lower layer.''
\end{quote}
It is the intent of RFC983 to be true to this tenet.

\subsubsection	{Prototype Implementation}
To test our ideas,
we constructed a prototype implementation of RFC983 under Berkeley \unix/.
The implementation supports both OSI-style asynchronous {\sf INDICATION}
events,
and also DDN-style synchronous events.
We intend this software to play a key role in the migration strategy which is
discussed in the next section.

\subsection	{Comparison to Other Approaches}\label{comparison}
\cite{Protocol.Conversion} makes a thorough investigation of the many
issues involved in protocol conversion and complementing,
and it is unnecessary for us to summarize those findings here.
Instead, let us concentrate on previous work devoted to implementing the magic
boxes between two different protocol suites,
and in particular between the DDN and OSI protocols.
Further,
it has been our claim throughout this paper that building a magic box at any
location other than the transport layer is not particularly useful.
In this section,
we will consider this argument.

In \cite{TCP.convert.ISO}
it is proposed that conversion between the DDN and OSI protocol suites
occur inside the transport layer instead of at the transport service access
point.
After an analysis of the state machines associated with the TCP and the TP,
and the identification of a common subset of services,
a state machine for a gateway between the two is derived.
The resulting gateway algorithm is no more complicated than the most
complicated of the two original machines.
It is then suggested that this approach is practical as a short-term solution
to the TCP/IP and OSI interoperability problem.

\subsubsection	{Our Analysis of this Work}
Unfortunately,
in our opinion,
the existence of such a gateway is of limited {\em practical\/} value.
Although the gateway does achieve an end-to-end transport capability,
with one TS-user utilizing a TP interface and the other TS-user utilizing a
TCP interface,
there is no common session, presentation, and application layer.
That is,
although entities above the transport layer can have the potential to
communicate between the two suites,
no useful work can occur
until the DDN ``world'' implements the higher-layer OSI protocols,
or the OSI ``world'' implements the higher-layer DDN protocols,
or both.
\cite{TCP.convert.ISO} suggests that the DDN domain immediately implement
the FTAM on top of the TCP, and so on.
In the authors opinion,
this is not a practical short-term solution.
Furthermore,
it appears to violate the widely-held notion of separation of knowledge
between layers.

It does however illustrate a recurring theme in work wherein conversion
between different protocol suites is reported
(e.g., \cite{SNA.convert.XNS},
which discusses the interconnection of SNA and XNS networks).
The theme, of course, is that general utility requires that
protocol conversion occur at every layer in which the two suites can be
connected.
For example,
when considering the application of electronic mail,
building a TCP/TP gateway is not useful unless there is either:
\begin{itemize}
\item	an SMTP implementation running in both the TCP and TP domains;
	or,
\item	an X.400 implementation running in both the TCP and TP domains;
	or,
\item	an SMTP/X.400 (or more precisely SMTP/P1\cite{MHS.P1}) gateway
	running in the TCP/TP gateway.
\end{itemize}
Each of these three alternatives is expensive to implement,
and in addition, the first two are politically unacceptable to the parties doing
the implementing.
All three require that everything above the transport layer,
except for the application itself (i.e., session and presentation),
be implemented as well.

In comparing our approach with previous work,
we see that ultimately both approaches have the same end-result:
the same transport service is offered.
However,
our approach is significantly easier to implement.
Neither approach makes the problem of achieving interoperability between
applications in the two protocol suites any easier:
the only way to achieve interoperability is to implement special-purpose
gateways for each pair of related applications.
However,
the approach we suggest has two important advantages over the protocol
translation approach, once we are willing to acknowledge that we intend to
migrate to one of the protocol suites (i.e., from the DDN to the OSI protocol
suite):
first, we can develop and gain experience with OSI applications now;
and, second,
any new applications we develop can run in either environment.
This has the important implication that from this point on,
that any future applications we develop will be guaranteed to run in the
protocol suites available to us
(that is, no new work will have to be done when we migrate from one protocol
suite to the other).

In the next section,
we will consider the value of our approach in the medium-term,
when we want to transition from the DDN protocol suite to the OSI protocol
suite.