Proposed protocol for connecting host computers to ARPA-like networks via front end processors
RFC 647
This RFC was published on the Legacy stream.
This RFC is not endorsed by the IETF and has no formal standing in the
IETF standards process.
Document | Type | RFC - Unknown (November 1974) | |
---|---|---|---|
Authors | |||
Last updated | 2013-03-02 | ||
RFC stream | Legacy | ||
Formats | |||
IESG | Responsible AD | (None) | |
Send notices to | (None) |
RFC 647
Network Working Group M. A. Padlipsky Request for Comments: 647 MITRE-TIP NIC: 31117 November 1974 A PROPOSED PROTOCOL FOR CONNECTING HOST COMPUTERS TO ARPA-LIKE NETWORK VIA DIRECTLY-CONNECTED FRONT END PROCESSORS by Michael Padlipsky with the advice and general agreement of Jon Postel and Jim White (SRI-ARC), Virginia Strazisar (MITRE) and the general agreement of Tom Boynton (ISI), Frank Brignoli (NSRDC), John Day (CAC), Bob Fink (LBL), Carl Ellison (UTAH), Eric Harslem (RAND), Wayne Hataway (AMES-67), John McConnell (I4-TENEX), Ari Ollikainen (UCLA), Dave Retz (SCRL), Al Rosenfeld (CASE), Stan Taylor (BRL), Doug Wells (MIT-MULTICS). All affiliations are shown only for identifying ARPANET involvement, and do not necessarily denote organizational approval of the positions taken here. No -- repeat NO -- expression of general agreement should be taken to apply to Appendix 2, which is exclusively a personal viewpoint. Padlipsky [Page 1] RFC 647 November 1974 INTRODUCTION As this proposal is written, in the fall of 1974, the ARPA network has achieved sufficient acceptance that a rather large number of organizations are currently planning either to attach their general purpose computer systems directly to the ARPANET or to interconnect their systems employing "ARPANET technology". The authors have been in touch with efforts sponsored by the Air Force systems command, the Naval Ship Research and Development Center, the Defense Communications Agency ("PWIN" -- the Prototype World-Wide Military command and Control system Intercomputer Network), ARPA (The National Software Works), the AEC, and other government agencies. A common characteristic of these networks and the sub-networks is the presence of a number of systems which have no counterparts on the current ARPANET; thus, hardware "special interfaces" (between the host and the network Interface Message Processor) and -- more important -- Network Control Programs cannot simply be copied from working versions. (Systems include CDO 6600's, XDS Sigma 9's, Univac 494's, 1107's, 1108's, 1110's, and IBM 370's running operating systems with no current ARPANET counterparts.) Because it is also widely accepted that the design and implementation of an NCP for a "new" system is a major undertaking, an immediate area of concern for networks which employs as much off-the-shelf hardware and software as is practicable. This paper addresses two such approaches, one which apparently is popularly assumed as of now to be the way to go and another which the authors feel is superior to the more widely known alternative. FRONT-ENDING In what might be thought of as the greater network community, the consensus is so broad that the front-ending is desirable that the topic needs almost no discussion here. Basically, a small machine (a PDP-11 is widely held to be most suitable) is interposed between the IMP and the host in order to shield the host from the complexities of the NCP. The advantages of this fundamental approach are apparent: It is more economic to develop a single NCP. "Outward" (User Telnet) network access is also furnished by the front end acting as a mini- Host. The potentiality exists for file manipulations on the mini- Host. Two operating systems are in advanced stages of development on the ARPANET for PDP-11's which will clearly serve well as bases for network front ends; thus, the hardware and software are copiable. So if we consider a model along the following lines Host *** Front End --- IMP --- Network everything to the right of the asterisks may almost be taken as given. Padlipsky [Page 2] RFC 647 November 1974 (Caveat: Note the "almost" well in last sentence neither ANTS nor ELF -- the two systems alluded to above -- is a completely finished product in the estimation of either their respective developers or of the knowledgeable ARPANET workers who have contributed to this report. Both are capable of being brought to fruition, though, and in a reasonable amount of time. We will assume ELF as the actual front-end system here for two reasons: apparent consensus, and current activity level of the development team. However, we have no reason to believe that readers who prefer ANTS would encounter substantive difficulties in implementing our proposal on it.) (Explanatory notes: ANTS is an acronym for ARPA Network Terminal Support system; it was developed at the Center for Advanced Computation (CAC), University of Illinois. ELF is not an acronym (It is said to be German for "eleven"); it was designed at the Speech Communications Research Lab (SCRL), Santa Barbara, California.) THE RIGID FRONT-END ALTERNATIVE Referring back to the model above, the popular view of the asterisks is to have the front-end system simulate a well known device for each Host (typically a remote job entry station along the lines of the 200UT on the CDC 6600), effectively requiring no software changes on the Host system. We characterize this approach as "rigid" because an immediate implication is that the Host system is constrained to handle data to and from the network only in fashions which its system already provides. (E.g., if you simulate a card reader, your data will necessarily be treated as batch input if a terminal, necessarily as time-sharing input.) Now, it may be argued that Host software changes are only being shunned in order to "get on the air" quickly, and may be introduced at a later date in order to allow unconstrained channelling of network data within the Host; but this reasoning may surely be refuted if it can be shown that an alternative exists which is essentially as quick to implement and does not require the waste motion of constructing known-device simulation hardware and software for each new Host, only to eventually avoid the simulation in the Host. The major advantage which might be claimed for the rigid front-end approach other than quickness to implement would be embarrassing if true. That is, the possibility exists that either the "new" Host's operating systems or system programming staffs are so intractable that avoiding Host software changes is a necessity rather than a desire. We certainly hope neither is the case and have no reason to believe it to be so, but we must acknowledge that such possibilities exist as meta-issues to this report. Padlipsky [Page 3] RFC 647 November 1974 DISAVANTAGES OF THE RIGID FRONT-END ALTERNATIVE The rigidity argument sketched above merits some amplification. The major disadvantage of interfacing with the Host only in fixed ways lies in a loss of functionality. Granted that "Telnet" and "RJE" functions can be performed (though we have deep reservations about file transfer) by simulating a known device there are more things in practice and in theory than just using the Hosts' time-sharing and batch monitors. "Teleconferencing" is an instance which comes immediately to mind. Graphics is another. Neither fits naturally into the setting a typical operating system is likely to assume for a Telnet or RJE connection. Further, the ARPANET is just beginning to evolve a view of "process-to-process" protocols where cooperating programs on dissimilar systems communicate over network sockets in a true use of sockets as interprocess communication media. It is difficult to conceive of viewing a (simulated) line printer as an abstract "port" without considerable contortion of the extant operating system. To attempt to summarize this cluster of objections, a simulation of a known device may be cheaper than a large enough number of phone calls, but it's not networking. For that matter, it is by no means clear that the goal of Host software changes can even met. In the case of one particular system on the ARPANET where a PDP-15 was employed as a front end to a PDP- 10, one of the authors discovered that on attempting to login over the net he was confronted by an interrogation as to the type of terminal he was at -- the front end having been attached at the wrong point in the PDP-10's terminal handling code. (Being a battle- scarred veteran of Telnet protocol development, he gave suitable answers for describing a "Network Virtual Terminal". Unfortunately, however, the NVT apparently had no counterpart in the Hosts' normal complement of local terminals. And when he tried such Telnet control functions as "don't echo, I'm at a physically half-duplex terminal" things really got confused). As it happens, he later found himself in the neighbrohood of the Host in question, and found himself spending an afternoon attempting to explain the philosophy and importance to the Telnet protocol of the NVT. The site personnel were both appreciative and cooperative, and although we have not had occasion to verify it, we assume that the site is probably now usable from the ARPANET. The important point, though, is that operating systems tend to make extensive, very often unconscious, assumptions about their operating environments. This observation is particularly true when it comes to terminal types, and the problem is that there is simply no guarantee that the several systems in question could even "do the right thing" if they were front-ended by simulating a known device -- unless, of course, the simulation of the device in the mini were so painstaking that all we'd get would be an expensive way of adding an RJE station, period. Padlipsky [Page 4] RFC 647 November 1974 Less abstract considerations also apply. For one thing, a mini- computer -- even with "third-generation" software -- is not as free and convenient an environment to program in as a full-scale Host therefore, implementing the several simulations will not be trivial pieces of software engineering. Further, if the simulation software is prepared by front-end experts, they will encounter repeated start-up transients in learning enough about the expectations of the several Host in order to perform their tasks. For that matter, it is clear that if personnel from the several Host are barred from active participation in attaching to the network there will be natural (and understandable) grounds for resentment of the "intrusion" the network will appear to be; systems programmers also have territorial emotions, it may safely be assumed. On a still more practical level, it should be noted that the potential need to simulate more than one known device -- and even the potential complexity of any single device simulation -- may well lead to a requirement for a larger PDP-11 configuration than would otherwise be reasonable. And although there are other reasons for arguing that each front-end processor ought to be as big a configuration as possible, we must acknowledge that dollars do matter. Also on the topic of numbers, it should be further noted that the line speed available for known-device simulations can be quite low. The 200UT, for example, is on a 4800 baud line, which is rather a mismatch with a 50,000 baud communication subnet. (Of course, there's always the 40,800 baud line into the 6600 -- but it is'nt expected to have interactive devices on it, so the extant software won't send the data to the "right place"....) And no experienced ARPANET protocol designer would be willing to overlook the possibility that there will probably have to be a flow control discipline between the Host and the front-end processor anyway, so the no change to Host software goal becomes rather dubious of fulfillment. After all that, it is perhaps gratuitously cruel to point out still another level of difficulty, but we feel quite strongly that it should be addressed. For, it must be admitted, the question must be asked as to who will do the front-end implementations. This sort of thing is scarcely within the purview of CAC of SCRL. But, as will be urged in Appendix 2, it is of the outmost importance that whoever performs the task already have ARPANET expertise, for we know of no case where "outsiders" have successfully come aboard without having become "insiders" in the process, which is neither an easy nor cost effective way to proceed. Padlipsky [Page 5] RFC 647 November 1974 In light of the above, it is at least reasonable to consider an alternative to the rigid front-end approach, for regardless of the weight the reader may attach to any particular cited disadvantage, in total they at least suggest that the known-device simulation tactic is not a panacea. THE FLEXIBLE FRONT-END ALTERNATIVE Our alternative approach is based on a principle which actually has been around since at least a month before the ARPANET began running User and Server Telnets on a regular basis. The principle is that it would be nice to off-load as much as possible of the NCP from the Host, because Hosts are supposed to have better things to do with their cpu cycles than field control messages from other Hosts -- especially when 90% of the control messages are merely ALL(ocate) commands. This insight led to the notion that all a Host "really" has to do is associate sockets with processes (and, of course, pass data along socket connections). And the flexible front-end approach is no more than an updating of these 1971 ideas to the following: Drop the hard and fast goal that there will be NO changes to Host software in favor of the more realistic goal of making MINIMAL changes to the Host attach the front-end processor to any convenient high-speed "channel" ( / "port" / "multiplexer" / "line" / "cable"); let the fro nt-end processor handle the NCP; define an extremely compact protocol for the Host and front-end to follow (the H-FP); and let the Host H-FP module distribute the data appropriately within its operating system, because the H-FP will make it clear where the data should go and if you have to ram the data into the teletype buffers, it's still cleaner than trying to do interprocess communication over a card reader. (The H-FP is detailed in less bald terms in Appendix 1). Now that might sound rather uncompromising -- and almost surely sounds rather cryptic -- but between the advantages it engenders and the more comprehensive description which follows, we feel that it does represent a superior basis for solving the overriding problem of how best to attach "new" Hosts to an ARP-like net. ADVANTAGES OF THE FLEXIBLE FRONT-END ALTERNATIVE The primary advantage of the flexible front-end alternative is precisely its flexibility: Although minimal implementations may be envisioned on given Hosts, the most minimal of the implementations is still as powerful as the rigid front-end approach; and as the need for more functions is perceived, they may be coded for quite easily with our approach. This is so because programs in the Host can "get their hands on" data from the net (and send data to the net) in a natural fashion -- it is not the case that only those things done on a given system with the data from, say, a card reader, can conveniently be done here. Thus, in contrast to the rigid front-end Padlipsky [Page 6] RFC 647 November 1974 approach, the flexible front-end approach "is networking". Indeed, it should be noted that a major "real" ARPANET server site has expressed an interest in implementing the H-FP based on some five minutes' worth of the blackboard explanation with two of the authors. Another advantage of our new approach is that it involves personnel at the various new sites in the process of coming aboard the network. Not only does this involvement have merit psychologically (if known- device simulation were employed, the network could represent an alien intrusion forced upon them, to site systems types), but it is also technically preferable to have per-site coding done by "experts", which would not be the case if the per-site tailoring were done exclusively in the mini. Recall the PDP-15 to PDP-10 attempt discussed earlier. That case may fairly be viewed as one of the front-ending's having been performed in ignorance of the conventions of both the Host's operating system and of the ARPANET? Not only should that sort of thing be avoided by the expedient of involving experts on the target operating systems in the process of attaching to the network but there are practical considerations as well: we estimate that adding a minimal Host-Front End Protocol routine in a given operating system would require no longer than the same few man months to develop than would the adding of a new known-device simulation package to the mini. So that we foresee scheduling advantages in addition to the more abstract ones already asserted. Further, it ought to be a more friendly environment to program in on the Host than in the mini. (This is not to say the ELF does not appear to be good environment to program in; rather, it is to make the "obvious" claim that if the big systems did not furnish convenient programming environments we wouldn't have them.) As touched on earlier, another point which bears further examination is the area of flow control. The known-device simulation approach appears to assume that this too will be handled by the mini, and that the simulation will be aware of whatever flow control discipline the host and the physical device being simulated follow. However, when the one device "everybody knows" will be simulated (CDC 200UT) operates on a 4800 bit-per-second line, and the IMP subnetwork operates on a 50,000 bps lines, some attention must be paid to the mismatch -- especially in view of the fact that only one process in the Host is typically associated with a known device, but the network actually transmits data on behalf of many processes. Our approach, on the other hand, allows for a very direct, simple flow control discipline to be imposed, without getting involved in per-Host idiosyncrasies. (The option to go more elaborate -- potentially more efficient -- flow control disciplines is also provided.) Thus, we can simply pick the beat line speed available on a particular Host, and attach to it. Padlipsky [Page 7] RFC 647 November 1974 Notice one other level of practical advantages: The min's H-FP module can be furnished along with its operating system by the same network "insiders" who are furnishing the operating system itself. Thus, a critical task need not be subjected to the perils of subcontracting. Indeed, this approach lends itself far more readily to subcontracting than other, if subcontracting must be done for the per-cost software for with the PDP-11 being almost always the same, network "insiders" can be used in conjunction with site personnel to build Host H-FP modules either through commercial consulting contracts or even from within the ARPANET community. (The latter possibilities exists because another fact about system programmers is that -- although they resent "invasions" -- they tend to enjoy getting inside new and different systems, if only to feel superior to them in contrast with their own.) The strengths of the flexible front-end approach, then, tend to arise in exactly those areas of weakness of the rigid front-end approach. Perhaps most important of all, though, is the fact that it "makes sense" to almost every single experienced member of the ARPANET community with whom it has been discussed. So, we might reason, if the ARPANET is desirable, it is desirable because efforts of those who made it work and if they have gained insights into networking in general in the process, their opinions deserve particular attention. RECOMMENDATIONS The protocol specified in Appendix 1 is felt to be around 90% complete. We are aware that we have not specified all the codes that will be needed to describe conditions of which the Host and Front-End must apprise each other, for example. But we think that, in general the protocol "Woks". We stand willing to discuss it with cognizant decision makers in the various interested organizations, and, for that matter, to continue to debate it with our technical peers. At this stage, however, the dominant makers avert the apparent stampede to the rigid front-end approach and evaluate the flexible front-end alternative in light of the preceding arguments and the following protocol specification. APPENDIX 1. THE HOST-FRONT END PROTOCOL ASSUMPTIONS The physical connection of the front end (FE) to the Host is assumed to be made over the "best" port (or channel, line, etc.) available on the Host, where "best" covers both line speed and quality of software available to physically manage the line. The choice should be made by site personnel. Hardware interfacing capability is assumed to be straightforward; it is, at least, no more complex for the H-FP than Padlipsky [Page 8] RFC 647 November 1974 for known-device simulation. The connection is assumed to be sufficiently closely coupled that a simple, explicit acknowledgment H-FP command will offer satisfactory flow control. That is, distances are assumed to be short and bit rates high; thus, the same assumptions are made here as are made in the case of Local IMP-Host interfaces: that error checking and flow control are not first-order problems. On the software level, buffering is assumed to be adequate in the Host to accept at least a full (8096 bit) IMP-IMP message-- although the FE could probably get around this constraint if it absolutely had to. Given only a minimal H-FP module in the Host, the FE will allow the same level of Telnet and RJE functioning as would the known- device simulation, as follows: The FE will always shield the Host from the NCP commands and the simplex sockets they deal with, dealing instead with a repertoire of but five H-FP commands and conversing over duplex data streams with the appropriate management of Network sockets left to the FE. (The commands are described below; we continue with the discussion of assumptions here, but some readers may prefer to study the commands before continuing with the balance of this section.) For Telnet, although subsequent analysis may lead to a more sophisticated treatment, the present assumption is that the FE will normally refuse all "negotiated options" and strip all Telnet control codes from the data it passes to the Host (unless the Host orders it to pass an unaltered Telnet stream); on a pre-installation basis, the FE will also map from Telnet ASCII to the Host's desired character set. Telnet "interrupt process" controls are handled by an H-FP command, discussed below. For RJE, because the ARPANET RJE Protocol is only known to have been implemented on one Host in the ARPANET and is generally considered to be too cumbersome, the standard socket for RJE will be reserved for future use, and a special designator will indicate to the Host that input on the given connection is to be treated as data in the format and job control language of its own "batch" system. Again, character set mapping will be available on a per-installation basis. For file transfer, however, a further assumption must be made about Host software. This is because the FE cannot be expected to manipulate the Host's file system; therefore, if the host whishes to participate in file transfer activities its H-FP module must be able to access the Host's file system for both sending and receiving files. Again, the FE will be able to shield the Host from the details of the underlying protocols to a large extent; but the Host must be able to handle FTP "stor" and "retr" commands, which will be passed over the (single) connection opened between the FE and the Host for file transfer. (FTP "user" and "pass" commands might also be desirable. As with Telnet, the FE will manage the Various Network Padlipsky [Page 9] RFC 647 November 1974 sockets involved so as to allow the Host to operate on only the H-FP connection, and will again optionally perform character set mapping. Note that Hosts may refuse to open FTP connections until and unless they choose to, with no impact on the FE. The Host's H-FP module, in short, will interpret the commands of the protocol, distribute Telnet data to and from the appropriate points within its operating system where terminal I/O is expected, distribute RJE data like manner, and when it is able to do so handle FTP as sketched above and amplified on below. It will, also on a when-desired basis, support calls from its system's user processes for unspecified purposes I/O on ARPANET sockets to allow for such functions as teleconferencing and other process exploitations of the Net. Our overriding assumption is that the initial H-FP module for a given Host (which does not require FTP or unspecified socket capability) will not be appreciably harder to implement than a known-device simulation; that it will offer extensibility to more interesting uses of the network than the alternative has been sketched here and will be returned to after the H-FP commands are described. FORMAT OF THE COMMANDS All communication between FE and Host is performed in terms of H-FP commands. The fields of the several commands are one or more "bytes", where a byte is per-installation parameter of 8, 9, 12, 16, 18, 32, 36, 48, 60 or 64 bits width, according to the coding convenience of the given Host's H-FP module implementers? (6 bit bytes are not supported because they do not offer enough room to express all the values anticipated for certain code fields machines with 6 bit internal byte structure can specify 12 bit H-FP bytes and still be able to use their natural byte oriented instructions.) Values for fields will be right-justified within their (potentially several) byte widths. Note that the list of byte sizes is 1) not meant to be exhaustive, and 2) probably unnecessarily extensive -- as 8,9, and 12 are probably the only "reasonable" sizes in actual practice (but if a particular machine is better suited for handling whole words rather than fractions thereof, the FE can certainly make life more convenient for it.) Although the commands are given names for documentation purposes, the value transmitted in the first byte of each command will be the binary representation of the number shown before its name in the next section. (i,e., the command field is one byte wide.) COMMANDS (Note that all commands may be sent by either the FE or the Host.) Padlipsky [Page 10] RFC 647 November 1974 1. BEGIN INDEX HOST SOCKET TRANSLATION-TYPE CONNECTION-TYPE The begin command establishes a "connection" between the Host and the FE. Regardless of internal representation, the duplex data stream the connection represents will be referred to by the value specified in the next (INDEX) field that is, for example, the FE will send input from and receive output for a given Telnet connection "on" a given INDEX, even though it is actually managing two "sockets" for the purpose in its dealings with the Network. a) INDEX is a two-byte field. Both the Host and the FE may choose arbitrary values for it when opening connection with a BEGIN command (H-FP implementations will probably simply increment INDEX by 1 whenever they need a new connection); however, the value of 0 is reserved to apply to the "global" connection between the Host and the FE -- thus, when either machine "come up" the first thing it does is send a BEGIN for INDEX=0. (The END and ACKNOWLEDGE commands also follow this convention; for that matter, there is no reason why the MESSAGE command could not also, should it be desired to extend the FE's functions in the future. At present, however, this is merely a potential extension.) Note that all other fields should be set to 0 for INDEX 0 BEGINS. b) HOST is a two-byte field. It specifies the Host number associated with the socket in the next field. On FE to Host BEGINS this is purely informational. However, on Host to FE BEGINS it is necessary to enable the FE to identify the foreign Host with which to communicate at the NCP level. c) SOCKET is a four-byte field. If SOCKET=1, a Telnet connection is to be established. If SOCKET=3, an FTP connection is to be established. If SOCKET=5, an ARPANET RJE Protocol connection is to be established (no known current utility). If SOCKET=77, a Host- specific connection is to be established for RJE/batch. All other values are for connections for unspecified purposes, to be opened at the NCP level according to the CONNECTION-TYPE field. Note that sockets 1, 3, 5 and 77 are "known about" and special-cased by the FE. d) TRANSLATION-TYPE is a one-byte field. From FE Host, it is informational. From Host to FE, it specifies character set mapping if desired, or characterizes the data to be transmitted over the connection. 0 request / specifies ASCII data 1; binary data (note that this value will not be sent from FE to Host under current assumptions, and that word size is to be a per-installation parameter); 2, mapping of ASCII to/from local character set. Other types will be defined if needs are identified. Padlipsky [Page 11] RFC 647 November 1974 e) CONNECTION-TYPE is a one-byte field. For FE to Host BEGINS it is informational. For Host to FE BEGINS it instructs the FE as to which kind of NCP connection discipline to follow. 1 requests a duplex connection (i.e., that the Initial Connection Protocol of the ARPANET be employed) 2, a simplex connection (i.e., that the appropriate ARPANET "request for connection" Host-Host Protocol commmand be employed for the gender of the socket at hand). Note that this extended use of the H-FP will be of interest when (and if) User-level programs on the Host begin to use the Network. (The FE will open 8- bit connections at the Network level unless otherwise directed.) 2. ACKNOLEDGE INDEX CODE The ACKNOWLDEGE command is multi-purpose. It must be sent in response to all commands from the other machine (other than ACKNOWLEDGES, of course), and is primarily used to indicate the success or failure of the command just received on INDEX. Note that this implies that each MESSAGE on a given INDEX must be ACKNOWLEDGEd before the next can be sent. a) INDEX is as above. b) CODE is a two-byte field. CODE=0 indicates success / acceptance of the command most recently received for INDEX. CODE=1 indicates failure /rejection of the most recent command. (E.g., if a MESSAGE, buffering was unavailable so the other machine must retransmit; if a BEGIN, the indicated protocol / socket cannot be serviced.) CODE=3 indicates an invalid or inactive INDEX has been used. CODE=4 indicates (HOST to FE) that no mapping is to be performed on the connection just opened. Other values (for such meanings as "foreign Host down", "undefined type requested" and the like) will be assigned as identified. 3. MESSAGE INDEX COUNT PAD TEXT The MESSAGE command is employed for the transmission of data. a) INDEX is as above. b) COUNT is a two-byte field which specifies the number of bits of data in the TEXT field. c) PAD is a 1-to-n-byte field. Its width is a per-installation parameter used to enable the TEXT field to start on a word boundary if the local H-FP implementers so desire. (This is not only a kindness, but it's also a placeholder if we decide to go to a flow control mechanism involving sequence numbers.) Padlipsky [Page 12] RFC 647 November 1974 d) TEXT is a field wherein byte structure is coincidental. It consists of COUNT bits of data to be sent to the process implicitly associated with INDEX by a BEGIN command (which has not been ENDed.) 4. INTERRUPT INDEX The INTERRUPT command, when sent from the FE to the Host, indicates that an FCP interrupt command (INS or INR) has been received for the process associated with INDEX; the Host should interrupt the associated process and whatever fashion is "normal" to it. (The most common use of the NCP is in Telnet, where it is defined as being the functional equivalent of having struck a terminal's ATTN, INT, of BREAK key, or input a "control-c" on certain character-at-a-time systems; essentially, it requests a "quit button" push. Note that the FE will take care of the associated Telnet control code in the input stream.) When sent from the Host to the FE (in process to process applications), it will indicate that an appropriate NCP interrupt be sent, according to the gender of the socket associated with INDEX. 5. END INDEX CODE The END command is used to terminate a connection. It may be sent either because one system or the other is about to go down, or because the FE have received an NCP "CLS" command or because the destination system or IMP has gone down, or at the behest of a Host user process. a) INDEX is as above. Note that if INDEX=0 the END refer to the "global" connection between the Host and the FE in such case, the high-order bit of CODE will be set to 1 and the low-order bits will specify the number of the minutes to shutdown if this information is available. (Furnished because the associated IMP often informs the FE of such a condition.) b) CODE is a two-byte field. CODE=1 indicates the general "close" case (either received or ordered) 2, foreign systems has gone down; 3, foreign IMP has gone down; 4, local IMP has gone down. Other values will be assigned as identified. EXTENSIBILITY Simplicity and compactness being major goals of the protocol, the small repertoire of commands just presented represent "all there is". Recall that we are specifically omitting from consideration such issues as error and flow control, which could turn the H-FP into another Host-Host Protocol. (should error and flow control prove Padlipsky [Page 13] RFC 647 November 1974 desirable in practice, we have, of course, thought of some suitable mechanism within the H-FP framework; but they are not considered germane in the present context.) The primary intention here is to specify a protocol, which lends itself to minimal initial implementations in the Hosts, on the same time scale as would have otherwise been required for known-device simulations -- but which offers great flexibility in the use of the network than would be achieved through known-device simulation. The astute reader will have noticed that most of the commands have been specified with an eye toward the future. Because the same protocol, which allows the Host and the FE to communicate can easily allow user processes on the Host to use the Network, we have tried to encourage this desirable end by furnishing all the necessary hoods and handholds for it in the FE's H-FP module through the broad definitions of the commands. A Hosts's H-FP module can furnish a trivial interface for user programs in terms of a very few entry points (open, read, write, and close appear to be the minimal set) and allow the user program considerable flexibility in its use of the net. For example, a "User" FTP program could be straightforwardly created even for a Host, which did not choose to field the BEGINs on socket 3 (necessary for "Server" FTP capability), and files could still be "pulled" to the Host even if they could not be "pushed" to it. (the FE will be required to recognize and special-case BEGINs on socket 3, but that's a small price to pay). So, if the specification of the h-FP command repertoire seems somewhat more complex than it need be, remember that not all of it has to coped with on any given Host -- and that any give host ca take advantage of more functions as it desires. (Although it's not really within the present scope, we stand willing to invent per-Host H-FP to user program interfaces on request.) FTP To amplify a bit on the problem of file transfer, it must be observed that in general only a file system can manage its files. This borders on tautology and is difficult to deny. Therefore, although the FE can shield the Host from a great deal of the mechanism included in the FTP for functions not directly germane to the transferring of files, Host's operating system and place or extract a given file, even though it "has" the file's name available to it. There is no in-principle reason why the H-FP module on the Host can't invoke an appropriate routine when it receives a BEGIN on socket 3, though. (The FE will handle all the type and mode negotiations, pass the "stor" or "retr" line along, and be ready to transmit or receive on the appropriate socket but "somebody" in the Host has to receive or transmit the MESSAGE to or from the right place.) But if that seems hard to do on any particular Host, its H-FP module can merely Padlipsky [Page 14] RFC 647 November 1974 negatively ACKNOWLEDGE any BEGINs for socket 3. The real point to be noted is that the H-FP still allows in principle for User FTP, as explained above, even so -- and that the simulation of known device offers neither (User nor Server FTP) function. (Files could, of course, be transferred into the FE, then somehow gotten into the Host "later" -- perhaps by faxing up a batch job -- but that route requires either an awful lot of buffering in the mini or a very sophisticated file system there, or both. It also requires an awful lot of per-Host information in each FE -- or perhaps human intervention. We're not saying it can't be done... eventually. But it's not going to be clean, or quick, or easy, or cheap.) SUMMATION Several important themes have unavoidably been dealt with piecemeal in the foreign attempt to specify the H-FP in the abstract. To gather the threads together, it might be useful to consider the various ways in which the protocol can be employed, in the context of their ARPANET counterparts. A. "SERVER" FUNCTIONS: There are, in essence, three levels on which a Host can use the H-FP to fulfill ARPANET "Server" functions. 1) For Hosts which choose to take FULL advantage of the flexibility of the H-FP, all "fourth level" (user process to user process) protocols can be managed by the Host. The FE will perform NCP (Host-Host protocol) and IMP-Host protocol functions (the associated IMP will, of course, perform IMP-IMP protocol functions), thus shielding the Host from the necessity of implementing a full-blown NCP with the attendant complexity of being aware of the 11 to 14 "states" of a socket, flow control, retransmission, and the like (as well as shielding it from the IMP- Host protocol, with the attendant complexity of mapping "links" to/from "sockets", dealing with message types forming and parsing "leaders", and the like). This mode of use is effected by giving the "no mapping" code when the Host acknowledge a BEGIN on socket 1 and 3 (and by simply accepting BEGINs on all other sockets). 2) For Hosts which choose to take PARTIAL advantage of the flexibility of the H- FP, many aspects of the fourth level protocols (in particular Telnet and FTP) can be managed by the FE on the Host's behalf, by virtue of making assumptions about which Telnet and/or FTP "commands" are to be permitted and only referring search matter as the association of data which processes and/or file names to the Host. (Note that the CODE field of the ACKNOWLEDGE command furnishes the mechanism for conveying such error information as "file not found" from the Host to the FE, which in turn will send out appropriate FTP error messages.) This mode of use is effected by simply accepting (with code 0) BEGINs on sockets 1 and/or 3 (and doing as one chooses for all other sockets); that is, fourth level shielding is anticipated to be commonplace, and is the FE's default case. 3) For Hosts which choose Padlipsky [Page 15] RFC 647 November 1974 to take NO advantage of the flexibility of the H-FP, the "private" RJE/batch connection type will still provide for the desirable functions of load sharing and transferring files even though other fourth level protocols were to be rejected by a given Host (by refusing BEGINs on all sockets other than 77). Even in this most restricted case, the ability to upgrade to either of the broader base is additively implicit in the H-FP, with no changes required to the FE's own H-FP module -- whereas it would entail considerable alteration of the Host's operating system had the first step been a known-device simulation. B. "USER" FUNCTIONS: 1) On the "User" side, a Host could again elect to handle such fourth level protocols as Telnet and FTP itself. However, particularly in the Telnet case, there is no real need for this, as a User Telnet "comes with" the FE and it is unnecessary to burden the Host with such use unless so many of its local terminals are hardwired that it would be expensive to access the FE directly. (Note that for a User FTP, the Host's H-FP module would, as discussed above, in all likelihood require a user program callable interface.) 2) On a less ambitious level, the FE could be induced to perform the same shielding as it offers the Server FTP (cf. case A2, above), given an "FTP mapping" TRANSLATION- TYPE on the BEGIN command or the previously suggested special casting by the FE on socket 3. 3) Finally, "User" functions could be completely finessed, as per case A3.C. PROCESS TO PROCESS FUNCTIONS: Irrespective of the positions taken in A and B, given only a user program callable interface to the Host's H-FP module, all other fourth level protocols which might evolve -- or, simply, general use of sockets as interprocess communication ports -- can be achieved directly. Again, this would fundamentally be an "add-on" to the system, not an alteration of existing software. APPENDIX 2 - SOME NOTES ON IMPLEMENTERS INTRODUCTORY DISCLAIMER This appendix represents strictly the personal views of one of the authors; I (now that I can admit to being Mike Padlipsky) have not even permitted the other authors to agree with the views expressed here, much less disagree with them, for they are insights which I've gained the hard way during nearly four years of involvement with the ARPANET and I feel they need saying -- regardless of the polite fiction of refraining from finger pointing. Please note at the outset, however, that I am motivated not by a sense of vindictiveness -- nor even of righteous indignation -- but rather by a desire to present some history in the hope that the reader will not be condemned to repeat it. Note also that even though it makes the prose more convoluted than it might otherwise have been, the convention will be observed of "naming no names". I am not, I Padlipsky [Page 16] RFC 647 November 1974 repeat, out to get these guys; merely to get away from them and their like in the future. (The reader can stop here with no loss to the main argument of the paper.) SEVERAL HORROR STORIES FROM THE WONDERFUL WORLD OF NETWORKING Consider first the tale already told of the PDP 15/PDP 10 front ending effort. Having been involved in the writing of both the "old" (1971) and the "new" (1973) Telnet Protocols, I feel a certain sense of shame by the association that they were not so compellingly clear that the power of the Network Virtual Terminal / common intermediate representation approach could not have been missed, ever by system programmers operating in pretty much of a vacuum with respect to contact with knowledgeable ARPANET workers. Having said that -- and meant it -- I still feel we did a good enough job for average-plus system types to cope with. (The fact that numerous Hosts are on the Net is evidence of this.) Unfortunately, however, average-minus system types do exist and must also be contended with. Therefore, if we do not make a concerted effort to "idiot proof" our protocols, we may anticipate further repetitions of the sad state the site under discussion found itself in before it happened upon them. (And, it must regretfully be observed, support of the "real" ARPANET has deteriorated to the point that the massive effort required to over- explain ourselves probably could not be launched in the prevailing climate. More on this point later.) Case in point number two is potentially far graver than a mere "philosophical" muddle over bringing one site aboard. It involves an attempt by one of the Armed Services to network a large number of large machines using the ARPANET as a model. The implementation of the software house with no known ARPANET expertise. The communications subnet and the hardware interfacing to the Hosts was subcontracted to a well-known hardware manufacturer with no known ARPANET expertise. (As an aside, but because it's so startling I can't forbear, the "system architect" for the target network is still another well-known hardware manucfacturer (!), with, of course, no known ARPANET expertise.) To make a long, continuing story short, it is currently the case that the "real" ARPANET system whose hardware corresponds most closely to the machines being netted here (even though it is benchmarked at a rather lower "mips" (million instructions per second) rate than the target net's machines) can transfer files at rates in excess of 28,000 bits per second (following the rather cumbersome full ARPANET FTP) from a small configuration developement machine to a lightly loaded (but still running in excess of 20 users) service machine one Network "hop" away, while the new system achieves rates which I am apparently not permitted to quantify but are very considerably lower even though only one process is being run on each machine -- also one "hop" away Padlipsky [Page 17] RFC 647 November 1974 -- and the protocol for file transfer is nowhere near so general as in the ARPANET. Given a year or two, the situation can presumably be rectified, but at present it is fair -- if somewhat fanciful -- to say that if the Japanese were capable of only like level of technology transfer they'd still be trying to make up their balance of trade with those cute little parasols on matchsticks. Yet what has gone amiss here in Horror Story 2? I submit that the choice of subcontractors was based upon a misapprehension of the level of technological sophistication associated with the ARPANET, and that what was (is?) needed is a subcontract to a knowledgeable ARPANET source (and I don't mean to the usual, profit-marking place -- though I guess I trust them for the subnet), rather than to "outsiders". (I don't even mean to any particular place on the Net; maybe what's needed is to form a meta-place out of the whole Net. More on this, too, later.) The real point is that the model was essentially ignored by the putative model-followers, and -- demonstrably -- it shouldn't have been. Case three should go a long way toward dispelling any impressions that might be building in the reader's mind that I'm some sort of hardcore ARPANET chauvinist. For even "insiders" have blown some. This is actually a dual case, for it involves two unsuccessful attempts to furnish terminal support mini-Hosts for the Net. In one case, the choice of machine was faulty; even with additional core memory field retrofitted, buffers cannot be furnished to support reasonable data rates without imposing considerable unnecessary Host overhead in the processing of too frequent Host-Host Allocation commands. Nor is there enough room to furnish more than a rudimentary command language in the mini. Now these were knowledgeable, reasonably well managed "insiders" -- but they were contractually not in a position to heed the technical intuitions of several of themselves and the technical intuitions of many of their colleagues throughout the Network Working Group that they'd been painted into a corner. In the second sub-case, the hardware and contractual obligations appear to have been right, but ill-considered choice of implementation language and inadequate management have prevented the project's full completion to this time (some two years after its inception). Again, there was forewarnings from the NWG, in that we had tried to alert them quite early about the language issue. (On the management level, we could only sympathize -- and in some cases empathize -- but it is at least a tentacle position to take that the ARPANET as a whole happened despite, not because of, management.) (I guess I am an ace system programmer chauvinist.) The final case to be cited here involves another military effort. Padlipsky [Page 18] RFC 647 November 1974 This one I'm not even sure I'm supposed to know about, much less talk about. But I can say that it involves a subcontractor's attempt to attach several special purpose machines to a major ARPANET server by means of an internally invented set of machines and protocols. My information suggests that when asked why they failed to follow the apparently obvious course of using ARPANET technology (facilities for which do, of course, already exist on the target server), the subcontractors essentially replied that they hadn't felt like it. They also made their approach work yet, and it's been something like a couple of years they've been trying. Then three's the fad to simulate RJE terminals... but to use that as Horror Story 5 would be begging the question -- for now. SOME MORALS Rather than search out any more dirty linen, let's pause and look for the lessons to be learned. In the first place, it borders on the obvious that for any technical project the "right" technicians must be found and empowered to perform it. Despite the generation of over-sell on the "power of computers", they still absolutely require intelligent, competent programming -- which in turn requires intelligent, competent programmers. And, at the risk of gilding the ragweed, not all self-professed programmers are intelligent and/or competent. In the second, and more interesting, place, all unknowing the ARPANET has attracted or engendered an "in-group" of extremely good system types -- who have learned through some sort of natural selection process to work well together despite the immense handicap of the heterogeneity of our various "nome" systems' assumptions. We not only have developed a common tongue, but some of us even like each other. (It should be noted that Appendix 1 was specified on a Wednesday afternoon and a little bit of a Thursday morning. Jon and Jim and I had been there before.) It seems quite clear to me that the organizations for whom this report is intended should avail themselves of the expertise which exists in the NWG; we've got a reasonable track record, after all, especially in comparison to others who have attempting networking. Many of us also feel quite strongly that we didn't get a chance to finish the job on the ARPANET, and would like to be given the chance to "do it right" -- especially in view of the errors which have been committed in our name. (This is particularly important because the old gang is beginning to scatter. For myself, I expect this will be my last RFC. Well, at least I've tried to make the most of it.) The ARPANET is no more a finished product than ANTS or ELF -- but all of them could and should be. Padlipsky [Page 19] RFC 647 November 1974 In the final place now, a rather trite moral must be drawn: Technical competence is extremely difficult to assess a priori. (I'm inordinately fond of saying "Don't ask me what I'm going to say, I haven't said it yet" myself.) But "track records" ARE important, and competence CAN be demonstrated -- to a suitable jury of technical peers. Therefore, beware of plausible sounding subcontractors who tell you "It's easy". In our field, and particularly in getting all those strange machines which were developed by people who by and large didn't talk to each other to "talk" to each other, it's NOT easy. I'm willing to claim that it will be easier letting some NWG types do it with the H-FP approach, but it might never be really easy -- where "never" means for the next 10 years or so, until "real" networking comes off the shelf with the operating system (which itself scarcely comes off the shelf today) -- but don't get me started on The Manufacturers. BEYOND THE PAIN PRINCIPLE So it's not easy. It's also not impossible. Indeed, the time appears to be ripe right now avoiding generating a whole new generation of horror stories, by sensitizing decision makers to technical realities and "doing things right" this time around. Having seized this occasion to say some things to that end which I think are important, I must in good conscience stand ready to defend the assertions I've made of error in some camps and of correctness in what I might loosely call "our" camp. I do so stand, with a right good will. If any reader desires more corroborative detail -- or merely to see if I rant like this in contexts other than RFCs (or even to have a go at my explanation of the common intermediate representation principle), well, I'm still in the ARPANET Directory -- even though the phone number's different (try 703-790-6375). The mailbox remains accurate (even though there is no "ARPANET mail protocol" it's marvelous how stopgaps endure). [This RFC was put into machine readable form for entry] [into the online RFC by Helene Morin, Viagenie,12/1999] Padlipsky [Page 20]