scispace - formally typeset
Search or ask a question

Showing papers on "Internetwork protocol published in 1989"


Journal ArticleDOI
TL;DR: A detailed study was made of the Transmission Control Protocol (TCP), the transport protocol from the Internet protocol suite, and it was concluded that TCP is in fact not the source of the overhead often observed in packet processing, and that it could support very high speeds if properly implemented.
Abstract: The transport layer of the protocol suite, especially in connectionless protocols, has considerable functionality and is typically executed in software by the host processor at the end points of the network. It is thus considered a likely source of processing overhead. However, a preliminary examination has suggested to the authors that other aspects of networking may be a more serious source of overhead. To test this proposition, a detailed study was made of the Transmission Control Protocol (TCP), the transport protocol from the Internet protocol suite. In this set of protocols, the functions of detecting and recovering lost or corrupted packets, flow control, and multiplexing are performed at the transport level. The results of that study are presented. It is concluded that TCP is in fact not the source of the overhead often observed in packet processing, and that it could support very high speeds if properly implemented. >

663 citations


01 Mar 1989
TL;DR: This RFC describes a protocol that Sun Microsystems, Inc., and others are using and a new version of the protocol is under development, but others may benefit from the descriptions of the current protocol, and discussion of some of the design issues.
Abstract: This RFC describes a protocol that Sun Microsystems, Inc., and others are using. A new version of the protocol is under development, but others may benefit from the descriptions of the current protocol, and discussion of some of the design issues.

427 citations


Proceedings ArticleDOI
01 Aug 1989
TL;DR: Sirpent™ (Source Internetwork Routing Protocol with Extended Network Transfer) is described, a new approach to an internetwork architecture that makes source routing the basis for interconnection, rather than an option as in IP.
Abstract: A clear target for computer communication technology is to support a high-performance global internetwork. Current internetworking approaches use either concatenated virtual circuits, as in X.75, or a “universal” internetwork datagram, as in the DoD Internet IP protocol and the ISO connectionless network protocol (CLNP). Both approaches have significant disadvantages.This paper describes Sirpent™ (Source Internetwork Routing Protocol with Extended Network Transfer)1, a new approach to an internetwork architecture that makes source routing the basis for interconnection, rather than an option as in IP. Its benefits include simple switching with low per-packet processing and delay, support for accounting and congestion control, and scalability to a global internetwork. It also supports flexible, user-controlled routing such as required for security, policy-based routing and realtime applications. We also propose a specific internetwork protocol, called VIPER™2, as a realization of the Sirpent approach.

85 citations


Journal ArticleDOI
TL;DR: Several protocol controllers for the IEEE 802 local area networks are surveyed and some characteristics for classifying them are given and two new developments-the protocol engine and the programmable protocol engine-are described.
Abstract: Several protocol controllers for the IEEE 802 local area networks are surveyed and some characteristics for classifying them are given. Some case studies from these controllers are given as illustrations. Two new developments-the protocol engine and the programmable protocol engine-are also described. The protocol engine, currently under development, implements a new protocol called XTP which performs the functions of both the network and transport layers. The programmable protocol engine can implement several connection-oriented protocols by changing contents of a programmable random access memory. >

40 citations


Proceedings ArticleDOI
Yehuda Afek1, Geoffrey Brown
10 Oct 1989
TL;DR: The authors present a self-stabilizing version of the alternating-bit protocol, i.e. the system converges to a state that guarantees reliable data transmission regardless of its initial state.
Abstract: The alternating-bit protocol is a fundamental protocol for transmitting data across an unreliable transmission medium. The reliability of the protocol depends on its initial state. The authors present a self-stabilizing version of the alternating-bit protocol, i.e. the system converges to a state that guarantees reliable data transmission regardless of its initial state. Applications of the protocol and possible extensions are discussed. >

29 citations


Proceedings ArticleDOI
L. Li1
23 Apr 1989
TL;DR: A formal method for communication protocol specification is presented in which the best features of approaches using finite-state machines, communication sequential processes, and abstracting data types are combined.
Abstract: A formal method for communication protocol specification is presented in which the best features of approaches using finite-state machines, communication sequential processes, and abstracting data types are combined. First, the formal techniques of the communication protocol are briefly described. Then, the hybrid method of protocol specification is presented. Finally, an example, i.e IEEE 802.3 MAC protocol for a LAN described by the proposed formal method is given. >

14 citations


Book ChapterDOI
29 May 1989
TL;DR: A heuristic to derive specifications of distributed systems by stepwise refinement is presented, based upon a conditional refinement relation between specifications, to construct four sliding window protocols that provide reliable data transfer over unreliable communication channels.
Abstract: We present a heuristic to derive specifications of distributed systems by stepwise refinement. The heuristic is based upon a conditional refinement relation between specifications. It is applied to construct four sliding window protocols that provide reliable data transfer over unreliable communication channels. The protocols use modulo-N sequence numbers. They are less restrictive and easier to implement than sliding window protocols previously studied in the protocol verification literature.

11 citations


Proceedings ArticleDOI
04 Dec 1989
TL;DR: Extensions of the basic protocol allow SP3 to be used at intermediate systems and allow SP4 to provide a more connection-oriented service.
Abstract: Both network-layer and transport-layer encryption are permitted by the OSI Security Addendum. The advantages of network-layer encryption are discussed. Secure data network system (SDNS) protocols are described. In the SDNS, SP is a single, simple encryption protocol between end-systems. This protocol has two descriptions, SP3 (network layer) and SP4 (transport layer). Both definitions are OSI compliant. Extensions of the basic protocol allow SP3 to be used at intermediate systems and allow SP4 to provide a more connection-oriented service. >

5 citations


Book
01 Jan 1989
TL;DR: High-Speed Protocols Based on a Multiprocessor-Architecture, Applications, Requirements, and Implementation.
Abstract: Architecture, Experience. The Delta-t Transport Protocol: Features and Experience (R.W. Watson). The Universal Receiver Protocol (A.G. Fraser). XTP/PE Design Considerations (G. Chesson). XTP for the NASA Space Station (A.C. Weaver). Experiences from VMTP: How to Achieve Low Response Time (E. Nordmark, D.R. Cheriton). Performance Issues. Towards Protocol Benchmarks (P. Sjodin et al.). Performance Analysis of CCSDS Path Service (M.J. Johnson). Performance Issues in LTPB (P. Minet, P. Bardier). Internetworking. Communication across High Speed Wide Area Backbone Networks (R.F. Hille). Ideas, Concepts. MIRAGE: A Model for Ultra-High-Speed Protocol Analysis and Design (J.D. Touch, D.J. Farber). On High Speed Transport Protocols (W.S. Dabbous). Layered Multiplexing Considered Harmful (D.L. Tennenhouse). Implementation. High-Speed Protocols Based on a Multiprocessor-Architecture (M. Zitterbart). High-Speed Parallel Protocol Implementation (D. Giarrizzo et al.). PSi: A Silicon Compiler for Very Fast Protocol Processing (H. Abu-Amara et al.). On the Design of Generic High-Speed Physical and Media Access Protocol Processors (L. Nedergard et al.). Fiber Optics, Access. End-to-End Protocols for WDM Star Networks (A. Ganz). An Efficient High-Speed Access Protocol for Broadcast Networks (P. Jacquet, P. Muhlethaler). Higher Layers, Applications, Requirements. Cambridge HSLAN Protocol Review (D.J. Greaves, I.D. Wilson). Distributed Query Algorithms for High-Speed Networks (R. Cohen, A. Segall). A High Speed Approach for the OSI Presentation Protocol (C. Huitema, A. Doghri). A Flexible Transport Service in the BERKOM Broadband Environment (B. Butscher). High Speed Transport Systems for Multi-Media Applications (D.B. Hehmann, M.G. Salmony, H.J. Stuttgen).

5 citations


Proceedings ArticleDOI
10 Oct 1989
TL;DR: A study of the performance of a communication protocol for transmitting time-constrained messages in a time-division multiple-access local area network, which exploits the bandwidth of the medium efficiently by explicitly passing the 'mastership' between stations.
Abstract: Presents a study, including experiments and analysis, of the performance of a communication protocol for transmitting time-constrained messages in a time-division multiple-access local area network. The measurements of the performance of the communication protocol are made as a function of message length and workload, using different configurations in a well-controlled environment. The measurements are carried out in real time in a 2.5 Mb/s LAN. The contributions of the protocol to the performance of the network could be separately extracted, thus allowing for a detailed analysis of the protocol efficiency. The communication protocol exploits the bandwidth of the medium efficiently by explicitly passing the 'mastership' between stations. >

4 citations


Proceedings ArticleDOI
27 Nov 1989
TL;DR: The authors outline B-ISDN (broadband integrated services digital network) protocol requirements and clarify necessary signaling protocol functionalities for each service phase and propose mechanisms to control multipoint communication.
Abstract: The authors outline B-ISDN (broadband integrated services digital network) protocol requirements and clarify necessary signaling protocol functionalities for each service phase. For broadband-specific services they propose mechanisms to control multipoint communication. Discussed is the integration of user-network and interoffice interface signaling, particularly the replacement of SS7 by DSS1. A new protocol structure for various multipoint services is described. A call control architecture with modularized protocol structure which includes basic and enhanced control modules is proposed. >

Proceedings ArticleDOI
27 Nov 1989
TL;DR: The author compares the performances of the three LLC protocols in terms of throughput and average response time, and examines how buffer capacity and network load affect the performance, and which of theThree protocols is the best protocol for any given system environment.
Abstract: The author studies connection-oriented (CO) and connectionless (CL) logical link control (LLC) protocols in a satellite packet communication network using time division multiple access (TDMA). Two types of CO-LLC protocols (types A and B) and one type of CL-LLC protocol are considered. The type B CO-LLC protocol is analyzed by means of equilibrium point analysis (EPA). Numerical results are given for comparison purposes. The author compares the performances of the three LLC protocols in terms of throughput and average response time. In the comparison, he focuses on the overhead due to connection establishment/termination in the CO-LLC protocols and buffer overflow in the CL-LLC protocol. He examines how buffer capacity and network load affect the performance, and which of the three protocols is the best protocol for any given system environment. >

Patent
14 Jul 1989
TL;DR: In this article, the authors propose a protocol pattern table to discriminate the protocol of received data from a line n 1, a line control part 10 sends the receiving line number, synchronous system information, and received data to a protocol analyzing part 20.
Abstract: PURPOSE: To support many protocols by providing many protocols in an external auxiliary storage means and discriminating protocols at the time of setting a link and loading a required protocol to an incorporated storage means. CONSTITUTION: At the time of receiving synchronous system data from a line n 1 , a line control part 10 sends the receiving line number, synchronous system information, and received data to a protocol analyzing part 20. When referring to a link set table to find that the link is set, the protocol analyzing part 20 transfers the protocol in the protocol set area of a storage part 40. When the link is not set, a protocol pattern table is used to discriminate the protocol of received data. If the pertinent protocol does not exist in the protocol set area, a protocol setting part 30 sets the pertinent protocol from a magnetic disk 60 to the protocol set area of the storage part 40. COPYRIGHT: (C)1991,JPO&Japio

Proceedings ArticleDOI
11 Jun 1989
TL;DR: An access protocol for local-area computer networks based on the token-passing bus protocol (IEEE 802.4) is presented, which combines the data with the token to achieve improved efficiency and robustness.
Abstract: An access protocol for local-area computer networks based on the token-passing bus protocol (IEEE 802.4) is presented. The scheme provides a simple and robust operational procedure in addition to throughput-delay improvement. The protocol combines the data with the token to achieve improved efficiency. Operational robustness is provided via a set of well-defined rules for network formation, repair, and reconfiguration. In addition, the frequency of polling a node is configurable. >

31 Oct 1989
TL;DR: The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed and a MFA protocol simulator and a CSMA/CD math model are developed.
Abstract: The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

Proceedings ArticleDOI
22 Mar 1989
TL;DR: A protocol architecture is described that is suitable for communication between devices or resources attached to Ethernet networks using Xerox Network Systems, TCP/IP and X.25 protocols.
Abstract: A protocol architecture is described that is suitable for communication between devices or resources attached to Ethernet networks using Xerox Network Systems (XNS), TCP/IP and X.25 protocols. The functional hardware configuration is presented. The protocol architecture is described in terms of the International Standards Organization Open Systems Interconnection (ISO/OSI) reference model. >

Proceedings Article
01 Jan 1989

01 May 1989
TL;DR: How security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) model according to the criteria in the security architecture and to the taste of the authors is described.
Abstract: SPION: Secure Protocols in OSI Networks This report describes how security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) reference model for communication. The report starts with defining security requirements for a "typical" local area network in a company, university or similar organization. It is assumed that the organization does not use the network for transfer of extremely sensitive information, such as military secrets. A set of security services, as specified in the OSI security architecture, are selected in order to satisfy the requirements. The selected services are then placed in suitable layers of the OSI model according to the criteria in the security architecture, and to the taste of the authors. The report concentrates on the transport layer. An extension of the OSI transport protocol, class 4, including security services is described in detail. The protocol is a fully compatible extension of the standard transport protocol. Key management is another topic which is included in the report. A key management system for handling public keys and digital signatures based on an article by Dorothy E. Denning is described. The system includes functions for distributing and validating public keys, and registering and later verifying digital signatures. A key management protocol supporting these functions is defined for communication between ordinary open systems and special key server systems.

Proceedings ArticleDOI
23 Jun 1989
TL;DR: The authors detail the protocol considerations relating to the implementation of meteor-burst-based data communications networks and indicates a throughput improvement on the order of 20% for the use of a selective reject protocol as opposed to the current go-back-N.
Abstract: The authors detail the protocol considerations relating to the implementation of meteor-burst-based data communications networks. In the design of the meteor-burst protocol, the open systems interconnection (OSI) model for data communication was followed as closely as possible, given the limitation imposed on the protocol by the channel. Due to the particular characteristics of the channel, the data-link as well as the network and transport layers require special tailoring to the purposes of the system. The existing system is essentially a partially interconnected mesh consisting of up to 16 master stations for the upper layer of the network with each master having a star of dedicated remote stations (the lower network). Field trials have been conducted between Johannesburg and Pietermaritzburg (a distance of 480 km) for the past 12 months. Preliminary analysis indicates a throughput improvement on the order of 20% for the use of a selective reject protocol as opposed to the current go-back-N. Limited networking tests have been performed with a three-way network, and the protocol has been verified as robust for both meteor-burst and line-of-sight physical layers. >

Journal ArticleDOI
Layuan Li1
TL;DR: The results of studies show that this hybrid formal method for protocol specification is a correct, unambiguous and complete approach.
Abstract: A new formal method for communication protocol specification is presented. FSM, CSP and ADT are mixed and the best features of these approaches can be offered in the fomal method. First, we briefly describe the formal techniques of communication protocol. We then put forward the hybrid method of protocol specification. Finally, an example, i. e., IEEE 802.3 MAC protocol for LAN described by the proposed formal method, is given. The results of studies show that this hybrid formal method for protocol specification is a correct, unambiguous and complete approach.

Book ChapterDOI
18 Oct 1989
TL;DR: Protype, a prototyping tool for communication protocol specifications based on extended finite state machine augmented with context variables and procedural information, helps a protocol designer in developing error free protocols.
Abstract: This paper describes Protype, a prototyping tool for communication protocol specifications. The tool is based on extended finite state machine augmented with context variables and procedural information. The tool helps a protocol designer in developing error free protocols. It also helps protocol implementors in verifying protocols.