Skip to main content

Version 2 of the Reliable Data Protocol (RDP)
RFC 1151

Document Type RFC - Experimental (April 1990)
Updates RFC 908
Authors Bob Hinden , Dr. Craig Partridge
Last updated 2013-03-02
RFC stream Legacy
Formats
IESG Responsible AD (None)
Send notices to (None)
RFC 1151
Network Working Group                                      C. Partridge
Request for Comments: 1151                 BBN Systems and Technologies
Updates: RFC 908                                              R. Hinden
                                               BBN Communications Corp.
                                                             April 1990

             Version 2 of the Reliable Data Protocol (RDP)

Status of this Memo

   This RFC suggests several updates to the specification of the
   Reliable Data Protocol (RDP) in RFC-908 based on experience with the
   protocol.  This revised version of the protocol is experimental.

   Distribution of this memo is unlimited.

Introduction

   Experiments in 1986 and 1987 turned up some ambiguities and problems
   with the RDP specification.  At the time, it was hoped that the
   authors might find the time to revise the entire RDP specification to
   fix these problems, however given the limited demand for RDP
   implementations, the authors were never able to justify the time
   involved in revising the spec.  This document lists the changes that
   we believe are appropriate to make to RDP version 1.

   Readers are expected to be familiar with RFC-908.

Changes To The Protocol Header

   There are three changes to the protocol header: the checksum
   algorithm has been changed, the port size increased, and the version
   number incremented.  The new header format is shown in Figure 1.

   The major discovery during the testing of the protocol is that cost
   of computing the the RDP checksum proved surprisingly variable; its
   performance was more heavily affected by the host's data
   representation than anticipated.  Optimized checksum implementations
   on two comparable hardware bases gave performance that differed by a
   factor of five.  Since the speed of the checksum is a key factor in
   the performance of the protocol itself, this variation caused a
   noticeable difference in throughput.

   The wide variation in performance on comparable machines was felt to
   be undesirable, so the checksum has been changed.  RDP now uses the
   16-bit TCP checksum, which is specified on page 16 of RFC-793.

Partridge & Hinden                                              [Page 1]
RFC 1151                    RDP - Version 2                   April 1990

   The 8-bit port size is probably too small to support a large range of
   applications.  Accordingly, the port size is now 16-bits.  Port
   numbers less than 1024 are reserved for well-defined applications.
   Allocable ports begin at port number 1024.

   Finally, because the checksum and port size have been changed, the
   version number has been increased to 2.

                   0             0 0   1         1
                   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
                  +-+-+-+-+-+-+---+---------------+
                  |S|A|E|R|N| |Ver|    Header     |
                0 |Y|C|A|S|U|0|No.|    Length     |
                  |N|K|K|T|L| |   |               |
                  +-+-+-+-+-+-+---+---------------+
                1 |         Source Port           |
                  +---------------+---------------+
                2 |       Destination Port        |
                  +---------------+---------------+
                3 |          Data  Length         |
                  +---------------+---------------+
                4 |                               |
                  +---    Sequence Number      ---+
                5 |                               |
                  +---------------+---------------+
                6 |                               |
                  +--- Acknowledgement Number  ---+
                7 |                               |
                  +---------------+---------------+
                8 |           Checksum            |
                  +---------------+---------------+
                9 |     Variable Header Area      |
                  .                               .
                  .                               .
                  |                               |
                  +---------------+---------------+

                         RDP Header Format
                             Figure 1

Minor Errors and Ambiguities

   Some ambiguities and minor errors have been found in RFC-908.  They
   are corrected in this section.

   The value of the state variable, SND.UNA is treated inconsistently in
   the pseudo-code on pages 21-29.  On page 12, SND.UNA is defined as

Partridge & Hinden                                              [Page 2]
RFC 1151                    RDP - Version 2                   April 1990

   "the sequence number of the oldest unacknowledged segment", and on
   page 21 it is appropriately set to the initial sequence number when
   the connection is opened.  But on page 28, when an acknowledgement is
   received, SND.UNA is set to SEG.ACK, the sequence number being
   acknowledged, instead of SEG.ACK+1.  A similar inconsistency occurs
   on page 26.  The proper fix is to always set SND.UNA to SEG.ACK+1.

   The pseudo-code on page 25 for the SYN-SENT state is incorrect.  The
   first few lines cause all packets with the ACK bit set to be
   discarded, but later lines test the ACK bit.  The test for the ACK
   bit should be placed after all the other tests.  Also note that if
   the ACK bit is set, a RST segment is sent to reset the remote peer,
   but the local peer is left half-open.  There is a similar problem in
   the SYN-RCVD state.  The local peer should deallocate the connection
   record and close.

   On page 24, the pseudo-code indicates that if non-data packets are
   received in the CLOSED state, a RST segment with SEG.ACK set to
   RCV.CUR should be sent.  RCV.CUR is not defined in the CLOSED state.
   SEG.ACK should be set to SEG.SEG.

   There is some inconsistency about how to handle a RST packet in the
   CLOSE-WAIT state.  On page 24, the pseudo-code shows that a RST
   should cause the connection state to become CLOSED.  Text on page 13
   and the state diagram on page 10 suggest the connection state should
   stay in CLOSE-WAIT.  The implementation should stay in CLOSE-WAIT.

   On page 29, the pseudo-code for the OPEN state suggests that if a
   data packet is received in sequence, the acknowledgement packet
   should not contain EACKs.  This is misleading.  Implementations may
   include EACKs in the acknowledgement.

   On page 18, it is possible to interpret the right edge as being
   either inside or outside the window.  This results in a one segment
   difference in the window size.  The proper interpretation is that the
   right edge is outside the window.  In other words, the right edge is
   the first sequence number that cannot be sent or received and the
   total window size is 2*X, where X is the maximum number of
   outstanding segments.

   One final problem is that RDP's flow control scheme does not allow
   the receiver to close the sender's window.  As a result, if the
   receiver acknowledges segments when they are received the sender can
   easily send more data than the receiver is prepared to buffer.  A
   solution to this problem (suggested by members of the End-2-End
   Research Group) is to only acknowledge a segment after it has been
   delivered to the application.  This scheme, however, has not be
   tested.

Partridge & Hinden                                              [Page 3]
RFC 1151                    RDP - Version 2                   April 1990

Security Considerations

   Security issues are not addressed in this memo.

Authors' Addresses

   Craig Partridge
   Bolt Beranek and Newman Inc.
   50 Moulton Street
   Cambridge, MA 02138

   Phone: (617) 873-2459

   EMail: craig@BBN.COM

   Robert Hinden
   Bolt Beranek and Newman Inc.
   50 Moulton Street
   Cambridge, MA 02238

   Phone: (617) 873-3757

   Email: HINDEN@BBN.COM

Partridge & Hinden                                              [Page 4]