home *** CD-ROM | disk | FTP | other *** search
Text File | 1988-12-02 | 103.8 KB | 4,541 lines |
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
-
-
-
-
-
-
-
-
-
- HP3000 TCP DESIGN DOCUMENT
-
- Jack Sax and Winston Edmond
-
- Bolt Beranek and Newman Inc.
-
- July 1980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- Table of Contents
-
-
-
-
- 1 Preface............................................... 3
- 2 Introduction.......................................... 4
- 3 Current HP3000 Structure.............................. 7
- 3.1 Processor Features.................................. 7
- 3.2 Network Interface Hardware.......................... 8
- 3.3 Operating System Software........................... 8
- 3.4 Input/Output....................................... 10
- 3.5 Interprocess Communication......................... 12
- 3.6 Existing INP Software.............................. 14
- 4 Protocol Software Architecture....................... 16
- 5 System Protocol Software............................. 20
- 5.1 Implemented Features............................... 20
- 5.2 Software Architecture Overview..................... 21
- 5.3 Control Structures................................. 23
- 5.3.1 Network Resources Control Block.................. 24
- 5.3.2 Foreign Host Control Blocks...................... 25
- 5.3.3 Connection Control Block......................... 26
- 5.3.4 Network Buffer Resources List Structures......... 26
- 6 User Process/TCP Interface........................... 29
- 6.1 Interface Intrinsics............................... 30
- 6.2 Flow Control Across the Interface.................. 36
- 6.3 Interface Control Structures....................... 36
- 6.4 Interface Control Algorithms....................... 37
- 6.5 Windowing, Acknowledgment, and Retransmission...... 48
- 7 1822 Layer/INP Driver Communication.................. 50
- 8 Protocol Software Buffering Scheme................... 52
- 8.1 Network Buffer Pool................................ 54
- 8.1.1 Packet Compaction................................ 55
- 8.1.2 Buffer Recycling................................. 56
- 8.2 User Process Buffer Pool........................... 58
- 9 Data Flow Through the Protocol Software.............. 60
- 9.1 ARPANET to the User Level Data Flow................ 61
- 9.2 User Level to the ARPANET Data Flow................ 64
-
-
-
-
-
-
-
-
-
-
-
- -2-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 1 Preface
-
-
- This report describes a design implementation of ARPANET
-
- protocols on a Hewlett Packard HP3000 Series III computer system.
-
- Specific protocols to be implemented include a Transmission
-
- Control Protocol (TCP), Internet Protocol (IP), File Transfer
-
- Protocol (FTP), and TELNET Protocols. The reader is assumed to
-
- be familiar with the purpose of these protocols. The protocol
-
- software will run under the HP Multiprocessing Executive (MPE)
-
- operating system.
-
-
- The designs reflect our current understanding of the
-
- environment and the tasks ahead and may be changed as we proceed
-
- with implementation.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -3-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 2 Introduction
-
-
- The overall purpose of this project is to modify the Hewlett
-
- Packard 3000/Series III computer system running the MPE operating
-
- system so that it converses with the ARPANET.
-
-
- A layered protocol approach will be used in our
-
- implementation. Protocol layers one through four represent the
-
- system layers which are responsible for moving a message reliably
-
- from one Host to another. The next protocol layer consists of a
-
- number of applications protocols which determine the content and
-
- meaning of the messages exchanged.
-
-
- Protocol levels one and two are X.25 LAP link access
-
- protocols. These protocols are implemented in microcode on the
-
- Intelligent Network Processor (INP) interface available from
-
- Hewlett Packard. Since the X.25 LAP protocols are different
-
- from the standard 1822 IMP Host protocols, a special X.25 IMP
-
- interface is used to link the HP3000 with the ARPANET. The
-
- interface divides standard 1822 packets into a number of X.25
-
- frames and transfers each frame separately. The diagram in
-
- Appendix A shows the hardware configuration used to link the
-
- HP3000 to the ARPANET.
-
-
- The next two protocol layers consist of the DOD standard
-
- Internet Protocol (IP) and the Transmission Control Protocol
-
-
-
-
- -4-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- (TCP). The Internet protocol provides communication between
-
- Hosts on different networks via gateways between the networks.
-
- The Transmission Control Protocol provides reliable transmission
-
- between Hosts and performs some Host-to-Host flow control.
-
-
- The initial implementation will include three application
-
- layer protocols. One of these is the File Transfer Protocol
-
- (FTP), which allows a user to move files from one computer system
-
- to another. The second and third application layer protocols are
-
- User and Server TELNET. User TELNET gives the user a remote
-
- terminal capability by taking the characters from the local input
-
- device and sending them to the foreign host, and returning
-
- characters from the foreign host to the local output device
-
- (typically a terminal). The foreign host will have a Server
-
- TELNET process which acts as a pseudo-Teletype, with incoming
-
- network messages providing TTY input, and TTY output being sent
-
- to the network. The operating system treats the Server TELNET
-
- pseudo-Teletype like an ordinary terminal.
-
-
- Most of the protocol software is new code, the major
-
- exception being the INP microcode which is supplied by Hewlett
-
- Packard. The programs will be written in HP's Systems
-
- Programming Language (SPL), which resembles PASCAL and allows
-
- intermixing of assembly code and compiled code. In addition to
-
- new code, implementation will require changes to the MPE
-
-
-
-
- -5-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- operating system code, which is also written in SPL.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -6-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 3 Current HP3000 Structure
-
-
- This section describes the HP3000 system with an emphasis on
-
- the features that affect the network software design. The
-
- description includes both the processor hardware and the
-
- operating system. Some of the operating system features
-
- described are not currently released by Hewlett Packard, but are
-
- about to be released or are part of the planned MPE IV release
-
- this fall.
-
-
-
-
- 3.1 Processor Features
-
-
- The HP3000 CPU is a medium speed machine which uses a stack
-
- architecture. It executes uncomplicated instructions in one to
-
- two microseconds. Code and data are separate and thus all code
-
- is re-entrant. There are approximately 38 hardware registers
-
- which make up the state of the processor, most of which are
-
- associated with the stack (data) and the current instruction
-
- address (code).
-
-
- Memory is divided into segments. A segment is a contiguous
-
- block of memory of any desired length up to 32K words.
-
- Individual segments are swapped in and out of memory as needed.
-
- Memory paging, a scheme which uses fixed size memory chunks as
-
- the basis for memory swapping, is not used in the HP3000. A
-
-
-
-
- -7-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- segment may be designated as code or data by the operating
-
- system.
-
-
-
-
- 3.2 Network Interface Hardware
-
-
- The interface unit between the HP3000 computer and the
-
- ARPANET machines will be HP's Intelligent Network Processor
-
- (INP). This device consists of two boards located in the HP3000
-
- main cabinet. It is a microprogrammed interface unit whose
-
- microcode is down-line loaded by HP3000 software. HP will supply
-
- the microcode to make the INP obey the X.25 LAP protocol and will
-
- supply the device driver necessary to access the INP.
-
-
- The INP will be connected to a BBN C/30 (MBB) computer.
-
- This machine will convert the X.25 protocols from the INP into
-
- suitable ARPANET protocols.
-
-
-
-
- 3.3 Operating System Software
-
-
- The operating system for the HP3000 is known as the
-
- Multiprogramming Executive System (MPE). It offers both batch
-
- and interactive job capabilities and allows multiple concurrent
-
- users of either type. It offers a file system which manages
-
- files on disk, magnetic tape and/or punched cards. Some I/O
-
- devices, such as the line printer, have spooler programs built in
-
-
-
- -8-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- to the system.
-
-
- User programs are run as processes within MPE. Each process
-
- has associated with it a code segment and a stack (data) segment.
-
- In privileged mode, it may run in "split-stack mode", where it is
-
- allowed to have two data segments. The most common use of
-
- split-stack mode is to access tables in the operating system
-
- during system calls.
-
-
- The design of MPE is greatly influenced by the HP3000
-
- hardware architecture. MPE's organization relies heavily on
-
- operations which incur little processor overhead while avoiding
-
- operations which incur large amounts of processor overhead. The
-
- most striking example of this is the MPE's dependence on user
-
- processes for a large number of what would ordinarily be
-
- considered system functions. MPE avoids the use of "system"
-
- processes to perform these functions.
-
-
- The design organization is a direct result of the stack
-
- architecture of the HP3000. The large number of status registers
-
- which must be saved when a new process is invoked makes process
-
- switching a very expensive operation. The time needed to perform
-
- a procedure call into a new segment of system code is typically
-
- less than the time to switch context from one process to another.
-
- Writing efficient code for this machine has thus led to
-
- organizing the system as relatively independent "utility"
-
-
-
- -9-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- routines callable by the user rather than as a collection of
-
- separate processes which manage I/O devices and system utilities.
-
- These operating system calls, called Intrinsics, are implemented
-
- as subroutine calls into system code segments. The program
-
- segments which implement the Intrinsics run in a privileged mode
-
- which allows them to directly access system tables and I/O device
-
- tables.
-
-
- One notable side-effect of this design is that system
-
- resources such as I/O devices are assigned to only a single
-
- program and are not normally shared. This approach has allowed
-
- the system programmers to create a complex operating system
-
- without tackling the problems of interprocess communication and
-
- resource sharing. As will be discussed later, it also has a
-
- significant effect on protocol software design.
-
-
-
-
- 3.4 Input/Output
-
-
- Input/Output operations typically consist of two steps. The
-
- first step is initiation of the desired operation. This involves
-
- checking to insure that access to the device is allowed (software
-
- protection), and issuing I/O instructions to the device to
-
- initiate the desired action. This step usually occurs as a
-
- result of an intrinsic call to the device handler code and thus
-
- is executed on the user's stack. The second step is the
-
-
-
- -10-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- operation completion handling. This may occur using either the
-
- Interrupt Control Stack (ICS) or the System Control Stack,
-
- neither of which is the user's stack. The choice of which stack
-
- to use depends on the specific device's function.
-
-
- A consequence of this system design is that "system code"
-
- tends to be executed using the data stack of the first user
-
- process needing the function. If process 1 wants to do an I/O
-
- operation, it invokes a system procedure which knows how to
-
- manage that I/O device. If process 2 now wishes to invoke the
-
- same device, and if the device is capable of supporting more than
-
- one request concurrently, it invokes the same routine. To avoid
-
- multiprocessing hazards in issuing I/O commands, the system
-
- procedure first checks to see if it is the first invocation of
-
- itself -- if not, it queues the request and exits; if it is, it
-
- proceeds to issue the I/O instructions. If the request was
-
- queued, it is assumed that the first process will detect the
-
- newly queued request and process it also. The first process is
-
- thus performing system functions for the second, and all later,
-
- processes, and will be charged run time for doing their work. In
-
- practice, we do not expect this to be significant, but in theory,
-
- the first process could run indefinitely, even if its own request
-
- has long since completed.
-
-
-
-
-
-
-
- -11-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 3.5 Interprocess Communication
-
-
- Interprocess communication under the current version of MPE
-
- is a problem. Only two techniques are currently available and
-
- neither of them is really satisfactory.
-
-
- One technique that may be used is that of the logical
-
- device. It is chiefly used to accomplish multiplexing of
-
- physical devices. This facility is implemented by creating a new
-
- entry in the system's Device Information Table, and by creating a
-
- set of procedures which act as a device handler. The handler
-
- will be run in privileged mode.
-
-
- Like other system device handlers, the procedures to manage
-
- the device are invoked directly by the user process, and the
-
- user's stack is used by the system code. This has the advantage
-
- of speed, since it avoids some process context switching.
-
-
- There are a number of drawbacks to this technique. First,
-
- the Device Information Table entry must be maintained as if it
-
- were a real hardware device. This requires knowledge of all the
-
- MPE internal functions that might access this table.
-
- Furthermore, since these tables are system internal, they are
-
- subject to change with each new release of MPE. Use of the table
-
- requires Privileged Mode. Bugs in the code would have a greater
-
- chance of crashing the system. The greatest drawback is that
-
-
-
-
- -12-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- logical devices are still under development at HP, and are more
-
- than usually likely to change over time.
-
-
- A new operating system feature, not yet released officially,
-
- that has been written for MPE is an interprocess communication
-
- method known at HP as message files. These correspond to Unix
-
- ports, and allow unrelated processes to communicate with one
-
- another. Each message file has one or more "reader" processes
-
- and one or more "writer" processes. During use, these files act
-
- as FIFO queues.
-
-
- Message files are implemented using the file system. Read,
-
- write, and query commands are all patterned after the file system
-
- commands. The message file code is designed so that if readers
-
- and writers stay more or less in synchronization, disk I/O will
-
- not be needed. However, if the writers get far enough ahead of
-
- the readers, the message file will start being spooled out onto
-
- disk.
-
-
- Message files are to be introduced as user level functions
-
- by HP, and, as such, their use will not change with new releases
-
- of the operating system. Code for this feature has already been
-
- implemented at HP and is available with both MPE III and the
-
- future MPE IV. They appear to be relatively easy to use and do
-
- not require knowledge of the internals of the operating system.
-
- Their chief drawbacks are that a process context switch is
-
-
-
- -13-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- required between writer and reader, and that some file system
-
- overhead is incurred.
-
-
- Timeouts, as seen in message files, are another new HP
-
- function that will be available. The older version of timeouts
-
- simply suspended the process for a fixed amount of time, but did
-
- not allow the process to be awakened by the completion of an I/O
-
- event during its sleep. The new version is equivalent to setting
-
- a timer whose alarm may be awaited with the same IOWAIT intrinsic
-
- that awaits I/O completion. It allows a process to wait for
-
- either some I/O device operation completion or the passage of
-
- some maximum amount of time, whichever occurs first.
-
- Alternatively, a timeout could be used to insure that waiting for
-
- a specific event will terminate if the expected event does occur
-
- soon enough. There will be both user level and system internal
-
- ways of accomplishing timeouts.
-
-
-
-
- 3.6 Existing INP Software
-
-
- The code to drive the INP is part of the CS/3000
-
- Communications Software package from HP. It contains code to
-
- send and receive packets via the INP and code to manipulate the
-
- Device Information Tables. The code also allows the user to
-
- down-line load microcode into the INP memory. It contains
-
- intrinsics to open and close the line and to read and write
-
-
-
- -14-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- packets. The microcode allows the INP to support X.25 LAP
-
- protocols and also allows the INP to buffer up to eight 128-byte
-
- packets. These packets are read by CS/3000 as soon as possible
-
- in order to keep the INP from losing packets due to a lack of
-
- buffer space in the INP. This technique allows the INP to
-
- function as a full duplex device, even though the MPE operating
-
- system offers only a half duplex control mechanism in its
-
- software.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -15-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 4 Protocol Software Architecture
-
-
- The protocol software architecture is dictated by a set of
-
- design requirements and MPE operating system constraints. These
-
- requirements and constraints are summarized as follows:
-
-
- - The new network software must be isolated from the
-
- existing operating system as much as possible. The
-
- isolation will allow any site to add or remove the network
-
- software with a minimum of effort. It will also make the
-
- network software less vulnerable to any changes HP makes
-
- to MPE.
-
-
- - Efficient high speed network communications are extremely
-
- important because this TCP version will be used on a
-
- production rather than an experimental basis.
-
-
- -_One of the problems with MPE is that, though the operating
-
- system performs device assignment and access control for
-
- its I/O devices, the user process is responsible for
-
- operating the I/O device. MPE does offer intrinsics to
-
- operate common devices, but these are very low level
-
- operations. This I/O arrangement makes it difficult to
-
- control an asynchronous network interface. The protocol
-
- software architecture will therefore require at least one
-
- process which has exclusive control of the INP interface.
-
-
-
-
- -16-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- - One of the properties of these network protocols is that
-
- the message acknowledgments and retransmissions occur at a
-
- relatively high level -- in the Transmission Control
-
- Protocol in layer four. A moderate amount of time passes
-
- from the time the originating TCP queues the message for
-
- transmission and the receiving TCP gets the message. In
-
- order to prevent acknowledgment delays which in turn cause
-
- the foreign host to retransmit data, the software
-
- architecture should minimize the amount of time it takes
-
- for incoming data to move through the 1822, IP, and TCP
-
- protocols.
-
-
- - With many network users and many connections concurrently
-
- in use, the network software must be able to handle the
-
- problems of multiplexing use of the network interface
-
- hardware. The interface on which the multiplexing takes
-
- place must support a number of simultaneous users in such
-
- a way that the behavior of any individual user does not
-
- affect data throughput of the other users.
-
-
- In order to meet all of the design requirements and
-
- constraints described above, the HP3000 protocol software is
-
- implemented in a set of processes (see diagram in Appendix B).
-
- One process which will be called the system protocol process is
-
- responsible for maintaining the INP interface as well as
-
-
-
-
- -17-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- supporting the 1822, IP and TCP protocols. The rest of the
-
- processes, called applications protocol processes, support the
-
- user interactive network functions including FTP and TELNET.
-
-
- The use of a single system protocol process is a key element
-
- in the protocol design. The system protocol process provides
-
- control over the INP interface by providing buffers and acting as
-
- multiplexer and de-multiplexer of network traffic to and from the
-
- INP. Use of a single process minimizes inter-protocol layer
-
- communication delays which in turn minimize the acknowledgment
-
- delays for incoming data. A single system protocol process makes
-
- it possible to use interprocess communication primitives to
-
- provide a uniform network interface for the applications level
-
- protocol processes.
-
-
- User TELNET and User FTP protocols are to be implemented as
-
- ordinary user programs. They use the same system calls as any
-
- other network accessing program, but are written to provide a
-
- higher level command language for the user. As user programs,
-
- they execute in the user's address space with the privileges
-
- normally available to the user. The User TELNET and User FTP
-
- programs are re-entrant, with as many processes running this code
-
- as users wishing the service.
-
-
- Server TELNET is a single process created as the system
-
- starts up or whenever the first need for it arises. De-
-
-
-
- -18-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- multiplexing of Server TELNET inputs is accomplished via a
-
- pseudo-teletype driver. The driver acts as the interface between
-
- the Server TELNET process and the Teletype handler.
-
-
- The interface between application protocol processes and the
-
- system protocol process is through a set of TCP intrinsics. The
-
- intrinsics are designed to form a uniform interface between the
-
- user and the TCP. Actual data communication between a user
-
- process and the system protocol process is done with a
-
- combination of message files and direct buffer-to-buffer
-
- transfers. Message files are used to pass flow control
-
- information while the actual data transfer is made by copying
-
- data between user buffers and system protocol buffers. The
-
- combination of message files and buffer copy is used to take
-
- advantage of the flexibility of message files and the data rates
-
- achieved by direct data copy.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -19-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 5 System Protocol Software
-
-
- Since this TCP implementation is to be used on a production
-
- rather than an experimental basis, the design effort has
-
- concentrated on the efficiency rather than the sophistication of
-
- the protocol software. This is especially true of the system
-
- protocol software whose initial design includes only those
-
- features needed to support the FTP and TELNET protocols.
-
-
- At the same time, the software design does allow for the
-
- future enhancement of the protocol software. There are no
-
- inherent design limitations which will prevent implementation of
-
- the more sophisticated TCP and Internet features.
-
-
-
-
- 5.1 Implemented Features
-
-
- The specific TCP and Internet features to be implemented
-
- include the following:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -20-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- - multiple connections to multiple hosts,
-
- - flow control at the 1822, Internet, and TCP layers,
-
- - error recovery,
-
- - fair allocation of resources among all connections,
-
- - handling of urgent data,
-
- - surviving incorrect packets,
-
- - datagram reassembly,
-
- - routing,
-
- - source quenching.
-
-
-
-
- 5.2 Software Architecture Overview
-
-
- The system protocol software architecture reflects the need
-
- to avoid packet processing delays rather than a strict hierarchy
-
- between protocol layers. The system protocol software is
-
- implemented as a single process to allow the system protocol
-
- layers to share software resources for greater efficiency. The
-
- shared resources include subroutines which perform functions
-
- required by more than one protocol layer and a common buffer pool
-
- to optimize storage resources and to allow efficient
-
- communication between protocol layers.
-
-
- Network traffic through the system protocol process takes
-
- different forms including 1822 packets, datagrams, and TCP
-
- segments. These various forms are generically referred to as
-
-
-
- -21-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- "packets". Packets are passed into the system protocol process
-
- from either an applications protocol process or the ARPANET
-
- interface. Packets from the ARPANET are passed into the system
-
- protocol process by intrinsic calls to the INP interface. User
-
- generated network packets are passed to the system protocol
-
- process by using a combination of message files and data buffers.
-
- Message files are used to transfer control and status information
-
- while data transfer is done with buffer-to-buffer copies between
-
- the user protocol data segment and the system protocol data
-
- segment.
-
-
- All read and write commands are done without wait to allow
-
- the system protocol process to simultaneously multiplex I/O
-
- channels and process network packets. I/O multiplexing is
-
- implemented through the IOWAIT intrinsic. The system protocol
-
- process issues an IOWAIT intrinsic after it finishes processing a
-
- data packet. The IOWAIT intrinsic returns the file number of the
-
- I/O channel associated with an I/O completion wakeup.
-
-
- When the number of free buffers falls below a prescribed
-
- limit, an attempt is made to free buffers through data
-
- compaction. The attempt begins with a search for datagram
-
- fragments and unacknowledged TCP segments which waste buffer
-
- space by using only a fraction of the available space in each
-
- buffer assigned to them. This lack of efficiency can be
-
-
-
-
- -22-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- particularly damaging because there is no guarantee that the data
-
- contained in the buffers will ever be processed. Wherever
-
- possible, datagram fragments are combined into a single datagram
-
- fragment and TCP segments are combined into a single segment to
-
- more efficiently utilize system buffers. Any buffers freed by
-
- this compaction process are returned to the freelist.
-
-
- Network packets from both the user process and the ARPANET
-
- are processed along one of a number of data paths in the system
-
- protocol process. The actual data path taken depends on the type
-
- of data packet and, in the case of TCP segments, the state of its
-
- associated network connection. Packet processing is performed by
-
- a series of function calls which act as processing steps along
-
- the data path.
-
-
- In order to avoid processing delays which can tie up system
-
- resources, each arriving data packet is processed through as much
-
- of the protocol software as possible. Processing of a packet is
-
- suspended only when the lack of some resource or some external
-
- event prevents further processing.
-
-
-
-
- 5.3 Control Structures
-
-
- All of the status information both for individual network
-
- connections and for the system protocol software as a whole is
-
-
-
-
- -23-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- kept in a set of control blocks as well as in a number of buffer
-
- list structures as shown in Appendix C. The control blocks
-
- include a general network resources control block, a foreign host
-
- control block for each foreign host connected to the local host,
-
- and send and receive control blocks for network connection. The
-
- list structures include a network buffer free list, a TCP buffer
-
- aging list and an Internet buffer aging list.
-
-
-
-
- 5.3.1 Network Resources Control Block
-
-
- The Network Resources Control Block contains the information
-
- needed to maintain the network buffer free lists and aging lists.
-
- This information includes pointers to the network buffer free
-
- lists and aging lists and a count of the buffers in each of the
-
- lists.
-
-
- The information contained in the Network Resources Control
-
- Block is used by the protocol software to control the
-
- distribution of network buffers among the various lists. The
-
- information is scanned at various times to determine the
-
- allocation or disposition of a particular network buffer. The
-
- determinations occur when new buffers are allocated from the free
-
- list and when buffers containing TCP segments are about to be
-
- acknowledged. Decisions are made based on the number of free
-
- buffers available and the priority of the task requiring the
-
-
-
- -24-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- buffers.
-
-
-
-
- 5.3.2 Foreign Host Control Blocks
-
-
- Foreign Host Control Blocks maintain flow control within the
-
- 1822 protocol layer. The block contains a counter for the number
-
- of outstanding 1822 packets sent to a single host. The counter
-
- includes all of the packets sent to the host on all sockets. The
-
- counter is incremented when an 1822 packet is sent and is
-
- decremented when either a RFNM or an Incomplete Transmission is
-
- received from the host.
-
-
- The counter is used to prevent transmission of too many 1822
-
- packets to a single host. All transmission from the host is
-
- blocked when the counter reaches the limit of eight outstanding
-
- 1822 packets for any foreign host.
-
-
- The 1822 level flow control is actually implemented by the
-
- send side of the TCP software. The TCP checks the RFNM count in
-
- the connection control block before it tries to transmit a
-
- segment to the foreign host.
-
-
-
-
-
-
-
-
-
-
-
-
- -25-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 5.3.3 Connection Control Block
-
-
- Each TCP connection has an associated control block. The
-
- control block contains data associated with the Transmission
-
- Control Block (TCB) along with other connection related
-
- information. Specific information included in the control block
-
- is as follows:
-
- - a connection state variable used to maintain the
- connection state,
-
- - the local port number of the connection,
-
- - the TCP interface control block number associated with
- this connection,
-
- - the file number of the private message file associated
- with this connection,
-
- - the TCB data associated with the receive side of this
- connection,
-
- - the TCB data associated with the send side of this
- connection,
-
- - A pointer to any buffers containing unacknowledged data
- received on this connection.
-
-
-
- 5.3.4 Network Buffer Resources List Structures
-
-
- Three list structures are used to maintain the network
-
- buffer resources shared by all of the sockets. These list
-
- structures include the free list and the two buffer aging queues.
-
-
- The network buffer free list contains all of the network
-
- buffers currently available for use by any socket. These buffers
-
-
-
- -26-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- are allocated when new data comes in from either the network or a
-
- user protocol process.
-
-
- The Internet Aging Queue is a list of active buffers
-
- assigned to blocked datagram fragments and complete datagrams.
-
- These buffers are the first to be reclaimed when there are no
-
- free buffers available. The Queue is sorted according to
-
- datagram age. All buffers which belong to the same datagram are
-
- combined into a single list structure. The datagram list
-
- structures are linked into the Internet Aging Queue with the
-
- least recently updated datagram always at the head of the queue.
-
- When a new datagram fragment comes in it is moved to the end of
-
- the queue along with all of the other fragments which belong to
-
- the same datagram.
-
-
- The TCP Aging Queue is a list of buffers which contain at
-
- least parts of unacknowledged TCP segments. These buffers can be
-
- reclaimed when there are no free buffers and no buffers on the
-
- Internet aging list. The Queue is sorted by socket. All buffers
-
- which contain data for the same socket are combined in a buffer
-
- list and each buffer list is linked into the queue. The queue is
-
- sorted by the age of the data associated with each socket. Data
-
- belonging to the socket which has been inactive for the longest
-
- period of time is placed at the head of the queue so it can be
-
- recycled first. When a user process reads data from a
-
-
-
-
- -27-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- connection, all the network buffers still waiting to be read on
-
- that connection are moved to the end of the TCP aging list. This
-
- assures that data associated with an active TCP connection will
-
- not be recycled ahead of data associated with an inactive TCP
-
- connection.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -28-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 6 User Process/TCP Interface
-
-
- The user process/TCP interface is designed to meet two basic
-
- requirements. First, the interface must allow for high speed
-
- data transmission across the interface; this is especially
-
- important since this interface involves interprocess
-
- communication which could be delayed by excessive system overhead
-
- due to context switching and process scheduling. Second, the
-
- interface must isolate the system protocol process from any
-
- buffer overhead burdens caused by processing delays in the user
-
- process. System protocol process buffers are too valuable a
-
- resource to be locked into storing TCP segments which are waiting
-
- for response from a user process.
-
-
- High speed data transmission across tser process/TCP
-
- interface is achieved by copying data directly from buffers in
-
- the user process to buffers in the system protocol process. The
-
- direct transfer is implemented with the move-to-data-segment and
-
- move-from-data-segment instructions provided by the HP3000.
-
-
- The system protocol process is isolated from delays in the
-
- user process by making the user process responsible for buffering
-
- TCP data segments. Acknowledged incoming TCP segments, and TCP
-
- segments waiting to be transmitted over the ARPANET, are stored
-
- in buffers in the user protocol process. This use of user
-
- buffers serves two functions: it frees system protocol buffers
-
-
-
- -29-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- from being locked into storing TCP segments, and also gives the
-
- user process some control of network connection throughput.
-
- Throughput control is accomplished by allowing each user process
-
- to choose the amount of buffer resources it dedicates to each
-
- connection.
-
-
-
-
- 6.1 Interface Intrinsics
-
-
- The TCP/user interface is implemented through a set of TCP
-
- intrinsics. These intrinsics allow the user process to create
-
- and use network connections with other processes on foreign
-
- hosts.
-
-
- Seven intrinsics, TCPWAIT, TCPOPEN, TCPCLOSE, TCPRECEIVE,
-
- TCPSEND, TCPSTAT, and TCPABORT, provide the basic control
-
- functions needed to transfer data through the user process/TCP
-
- interface. Conceptually, the intrinsics allow the user to create
-
- network connections with other processes on foreign hosts. Each
-
- connection consists of a pair of sockets as defined in the TCP
-
- protocol document. Connections are created with a TCPOPEN
-
- intrinsic whose parameters define the sockets which make up the
-
- connection. After a connection is created, the user process uses
-
- the TCPSEND and TCPRECEIVE intrinsics to send or receive data.
-
- The TCPSTAT intrinsic allows the user to check the status of a
-
- connection.
-
-
-
- -30-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- Within the user process, connections are identified through
-
- the combination of a connection file number and a connection
-
- buffer. The connection file number is returned by a successful
-
- TCPOPEN call. The connection buffer is an integer array
-
- allocated by the user process. The buffer is initialized by the
-
- TCPOPEN intrinsic and is then passed as the first parameter to
-
- all of the other TCP intrinsics. It is the responsibility of the
-
- user process to maintain the association between the connection
-
- file number and the connection buffer.
-
-
- The TCP I/O interface is entirely asynchronous so that a
-
- user process can queue any number of read or write requests to a
-
- particular connection. The user process has three limitations in
-
- this regard: first, it must provide the buffers associated with
-
- each TCP intrinsic call; second, the user process must keep track
-
- of which buffers are associated with each I/O call; and third,
-
- the user process cannot dequeue buffers until it has permission
-
- to do so from the system protocol process.
-
-
- The user process uses a combination of the IOWAIT ane
-
- TCPWAIT intrinsic calls to keep track of I/O completion events.
-
- The IOWAIT intrinsic is invoked when the user process has
-
- completed processing all of the current data. When the IOWAIT
-
- intrinsic returns with a file number associated with a TCP
-
- connection, the TCPWAIT intrinsic is called to handle the I/O
-
-
-
-
- -31-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- completion. The TCPWAIT intrinsic uses the connection buffer to
-
- determine the cause of the I/O completion and then performs the
-
- appropriate I/O cleanup task and returns an I/O type code to the
-
- user process.
-
-
- The specific calling sequences of the TCP intrinsics are
-
- given below:
-
-
- TCPOPEN(TCPCBUF,FHIA,FP,A/P,LP[,BADDR]) opens a TCP connection
-
-
- TCPCBUF - TCP Connection Buffer - This is a pointer to an
-
- integer array ten elements long which acts as the
-
- control structure for all network connections. The
-
- array is allocated by the user process before any
-
- TCP intrinsics are called.
-
-
- FHIA - Foreign Host Internet Address - 32 bit address.
-
- This address may be obtained with the HOSTADDR
-
- intrinsic which takes the host name text string as a
-
- parameter and returns the 32 bit internet address.
-
- In the case of a passive open a zero address
-
- indicates a listen for any host.
-
-
- FP - Foreign Port - a 16 bit port address for this
-
- connection at the foreign host. In the case of a
-
- passive open a 0 port indicates a listen from any
-
- port on a foreign host.
-
-
-
- -32-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- A/P - Active/Passive - a boolean flag used to indicate if
-
- this open is for a listen socket (passive) or for an
-
- active connection.
-
-
- LP - Local Port - 16 bit local port id. This parameter
-
- is optional. If it is not specified, the TCP picks
-
- a free local port id from a reserved part of the
-
- name space.
-
-
- BADDR - Buffer Address - an optional buffer used to give the
-
- foreign host a window for transmission. If the
-
- buffer is not provided, the connection is opened
-
- with a zero window size until the user process calls
-
- the TCPRECEIVE intrinsic.
-
-
- returns - local connection name or error code of -1 if the
-
- connection failed. The local connection name is
-
- actually the file number of the private message file
-
- associated with this connection.
-
-
- TCPCLOSE(TCPCBUF) closes a TCP connection
-
-
- TCPCBUF - TCP Connection Buffer - same as in the TCPOPEN
-
- intrinsic.
-
-
- TCPABORT(TCPBUF,BUFPTR) aborts a TCP connection
-
-
- TCPCBUF - TCP Connection Buffer - same as in the TCPOPEN
-
-
-
- -33-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- intrinsic.
-
-
- BUFPTR - Buffer Pointer - pointer to a list of buffers
-
- released by the TCPABORT call. A zero value
-
- indicates that no buffers were released.
-
-
- TCPRECEIVE(TCPCBUF,BADDR,BCNT) reads data from a TCP connection
-
-
- TCPCBUF - TCP Connection Buffer - same as in the TCPOPEN
-
- intrinsic.
-
-
- BADDR - Buffer Address - address of user buffer for receiv-
-
- ing network data.
-
-
- BCNT - Byte Count - number of bytes to be transferred.
-
-
- returns - an error code of -1 if the TCPRECEIVE failed.
-
-
- TCPSEND(TCPCBUF,BADDR,BCNT,EOL) writes data to a TCP connection
-
-
- TCPCBUF - TCP Connection Buffer - same as in the TCPOPEN
-
- intrinsic.
-
-
- BADDR - Buffer Address - address of user buffer for sending
-
- network data.
-
-
- BCNT - Byte Count - number of bytes to be transferred.
-
-
- EOL - End Of Letter - a boolean flag to indicate that this
-
- buffer is an end of letter.
-
-
-
- -34-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- TCPSTAT(TCPCBUF,SBADDR) gives TCP connection status
-
-
- TCPCBUF - TCP Connection Buffer - same as in the TCPOPEN
-
- intrinsic.
-
-
- SBADDR - Status Buffer Address - address of user buffer for
-
- receiving network data.
-
-
- TCPWAIT(TCPCBUF,BUFPTR,DATAPTR) returns the result of a previous
-
- TCP intrinsic call.
-
-
- TCPCBUF - TCP Connection Buffer - Same as in the TCPOPEN
-
- intrinsic.
-
-
- BUFPTR - Buffer Pointer - used to return a pointer to a
-
- buffer list released by an I/O event. A zero
-
- pointer indicates that no buffers were released.
-
-
- DATAPTR - Data Pointer - pointer to the first data element
-
- within a buffer returned by the intrinsic to a
-
- TCPRECEIVE intrinsic.
-
-
- returns - a code indicating the type of I/O completed. A list
-
- of the I/O codes is given in Appendix D.
-
-
-
-
-
-
-
-
-
-
-
- -35-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 6.2 Flow Control Across the Interface
-
-
- Flow control across the user process/TCP interface is
-
- implemented through the use of message files. The message files
-
- act as control channels to transmit flow control and status
-
- messages between the user process and the TCP. Each connection
-
- makes use of two message files. A general input message file is
-
- used to transmit control messages from user processes to the TCP.
-
- All user processes share the same general input message file.
-
- Each connection also uses a private message file to convey
-
- control and status information from the system protocol process
-
- to the user process.
-
-
- The control messages passed between the user process and the
-
- system protocol process are short data buffers. These buffers
-
- contain the message type along with other information associated
-
- with the particular command. The formats for each of the message
-
- types is shown in Appendix D.
-
-
-
-
- 6.3 Interface Control Structures
-
-
- Each network connection has an associated TCP interface
-
- control block. These blocks include a set of pointers and data
-
- segment numbers used to keep track of buffers within both the
-
- user process and the system protocol process. The pointers
-
-
-
-
- -36-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- contain buffer addresses relative to the beginning of the stack
-
- data segment for each process. A diagram of the TCP interface
-
- control block is given in Appendix E.
-
-
- The control blocks are maintained in a separate data segment
-
- shared by both the user and system protocol processes. The data
-
- segment is initialized by the system protocol process when it
-
- starts up. The initialization of the data segment divides it
-
- into a number of control blocks. Individual control blocks are
-
- initialized by the TCPOPEN intrinsic. Responsibility for
-
- releasing the control blocks is shared among the TCPCLOSE,
-
- TCPABORT, and TCPWAIT intrinsics.
-
-
-
-
- 6.4 Interface Control Algorithms
-
-
- The specific functions performed by each of the network I/O
-
- intrinsics are as follows:
-
-
- TCPOPEN
-
-
- 1. The TCPOPEN intrinsic software searches for a free TCP
-
- connection interface control block and initializes it.
-
-
- 2. The TCPOPEN software creates a private message file with
-
- a unique file name. The unique file name is formed out
-
- of the prefix "TCP" and the id number of the TCP
-
-
-
-
- -37-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- interface control block.
-
-
- 3. The TCPOPEN software sends an OPEN CONNECTION command
-
- message to the TCP via the general input message file.
-
- The message includes all of the TCPOPEN parameters and
-
- the id number of the TCP interface control block.
-
-
- 4. The TCPOPEN software makes a read request with timeout
-
- on the private message file. If the read times out, the
-
- TCPOPEN software sends an ABORT CONNECTION command to
-
- the TCP, deletes the TCP interface control block, and
-
- returns an error code to the user process. The
-
- connection buffer provided as a parameter to TCPOPEN is
-
- used as the read buffer.
-
-
- 5. The TCP software reads the open command from the general
-
- input message file and uses the information to create a
-
- connection control block. The TCP software also
-
- initiates the connection protocols specified in the
-
- command message.
-
-
- 6. The TCP software sends an OPEN CONFIRM message back to
-
- the user process via the private message file created by
-
- the TCPOPEN intrinsic software. The OPEN CONFIRM
-
- message will fail if the user process is destroyed by a
-
- user abort. If this occurs, the TCP software takes
-
-
-
-
- -38-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- responsibility for cleaning up the TCP interface control
-
- block as well the connection control blocks.
-
-
- 7. The TCPOPEN software reads the OPEN CONFIRM message from
-
- the private message file. The TCPOPEN software
-
- initiates a read without wait on the private message
-
- file. The connection buffer is again used as the read
-
- buffer.
-
-
- 8. If the user provides a read buffer as the last parameter
-
- to the TCPOPEN intrinsic, a read operation is initiated.
-
- The TCPOPEN software attaches the buffer to the TCP
-
- interface control structure and sends a RECEIVE message
-
- to the TCP via the general input message file. The TCP
-
- uses this message to set the size of the connection
-
- window.
-
-
- 9. The TCPOPEN software returns the file number of the
-
- private message file to the user process.
-
-
- TCPCLOSE
-
-
- 1. The TCPCLOSE software marks the connection closed bit
-
- for the send side in the TCP interface control block.
-
- The TCPCLOSE software checks to see if there are any
-
- data buffers waiting to be read by the TCP. If there
-
- are no data buffers, the TCPCLOSE software sends a CLOSE
-
-
-
- -39-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- CONNECTION command to the TCP. If the receive side is
-
- marked closed and there are no buffers waiting to be
-
- read, the TCPCLOSE intrinsic software deletes the TCP
-
- interface connection control block.
-
-
- 2. The TCPCLOSE software returns to the user process.
-
-
- 3. When the TCP receives a connection close command from
-
- the user process it sends a FIN to the foreign host and
-
- marks the send side of the connection as FINWAIT-1.
-
- When the TCP receives an ACK of the close the foreign
-
- host, it marks the send side of the connection as
-
- FINWAIT-2. If the receive side of the connection is
-
- marked closed, the TCP deletes the connection control
-
- block.
-
-
- 4. If the TCP receives a FIN from the foreign host, it
-
- marks the receive side of its connection as closing.
-
- When all data and the FIN sent by the foreign host are
-
- ACKED, the TCP sends a NETCLOSE command to the user
-
- process and marks the receive side of the connection
-
- closed. If the send side is also marked as closed, the
-
- TCP deletes the connection control block. The close
-
- message sent to the user process is processed by the
-
- TCPWAIT intrinsic.
-
-
-
-
-
- -40-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- TCPABORT
-
-
- 1. The TCPABORT software sends an ABORT CONNECTION command
-
- to the TCP via the general input command file. The
-
- TCPABORT software releases the TCP interface control
-
- block and deletes the connection's private message file.
-
-
- 2. The TCPABORT software returns to the user process. The
-
- return includes a pointer to a list of user buffers
-
- which were assigned to the connection.
-
-
- 3. When the TCP receives an ABORT CONNECTION command from
-
- the user process it sends a reset to the foreign host,
-
- deletes any unacknowledged data it has for this
-
- connection, and deletes the connection control block.
-
-
- 4. If the TCP receives a reset from the foreign host, it
-
- deletes all of the data waiting to be transmitted to the
-
- user process and sends a NETABORT message to the user
-
- process via the private message file. The NETABORT
-
- message is handled by the TCPWAIT intrinsic.
-
-
- TCPRECEIVE
-
-
- 1. The TCPRECEIVE software checks to see if the receive
-
- side connection closed flag is set. If the flag is set,
-
- the TCPRECEIVE software returns a connection closed
-
-
-
-
- -41-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- indication to the user process. It is up to the user
-
- process to close the send side of the connection and
-
- clean up the connection buffer if it has not done so.
-
-
- 2. If the connection is open, the TCPRECEIVE software
-
- attaches its read buffer to the TCP interface control
-
- block and sends a RECEIVE message to the TCP. The
-
- message is used to indicate to the TCP that the user has
-
- made a buffer available to the connection. The
-
- TCPRECEIVE software returns to the user process.
-
-
- 3. When the TCP receives the user's read message, it checks
-
- to see if it has any unacknowledged segments waiting to
-
- be transferred to the user process. If it has no
-
- segments, it uses the RECEIVE message to increase its
-
- receive window size. If the TCP has segments waiting
-
- for transfer, it transfers as much of the data as
-
- possible to the user process. All transferred data is
-
- immediately acknowledged to the foreign host. The TCP
-
- sends a PENDING RECEIVE message to the user process to
-
- advise it of the transfer of data. This message is
-
- processed by the TCPWAIT intrinsic.
-
-
- 4. If the TCP receives data from the foreign host, it
-
- checks to see if the user process has assigned any free
-
- buffers to this connection. If there are free buffers,
-
-
-
- -42-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- the TCP copies as much of the data it receives as
-
- possible into the user buffers and acknowledges the
-
- copied data to the foreign host. Any data which is not
-
- copied is maintained on the TCP aging list where it is
-
- stored until it is transferred to a user process buffer
-
- or discarded. The user process is informed of the data
-
- transfer through a PENDING RECEIVE command message via
-
- the private message file. This message is received by
-
- the TCPWAIT intrinsic.
-
-
- TCPSEND
-
-
- 1. The TCPSEND intrinsic checks to see if the connection is
-
- still open. If the connection is marked closed, the
-
- TCPSEND returns an error code to the user.
-
-
- 2. If the connection is still open, the intrinsic software
-
- attaches the user supplied data buffer to the TCP
-
- interface control block. The TCPSEND software sends a
-
- SEND message to the TCP via the general input message
-
- file. The TCPSEND software now returns to the user
-
- process.
-
-
- 3. The TCP software, on receiving the data SEND message,
-
- checks to see if it can send the data to the foreign
-
- host. The decision on whether to send the data is made
-
-
-
-
- -43-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- by checking the following conditions:
-
-
- - the foreign host has advertised sufficient window
- space,
-
- - the number of outstanding RFNMs for all connections
- to the foreign host is less than eight,
-
- - the amount of data waiting to be sent is sufficient
- to warrant a data packet. This condition prevents
- single byte segments from being sent out over the
- ARPANET. The TCP waits until it has at least 10
- bytes of data before transmitting it out to the
- ARPANET.
-
- - the user has specified an EOL.
-
-
- If the TCP decides to send the data, it prepares a
-
- network packet and copies as much of the user data as it
-
- can transmit into the network packet. The data transfer
-
- is made directly from the list of user buffers queued by
-
- the TCPSEND intrinsic to the message packet buffer. All
-
- buffers filled by the data transfer are marked as filled
-
- and appended to the filled buffer list.
-
-
- 4. After the TCP has transferred all of the data from the
-
- user buffers, it checks the TCP interface control block.
-
- If the send side of the connection is marked closed, the
-
- TCP sends a Fin to the foreign host. If the receive
-
- side is also closed, the TCP sends a NETCLOSED command
-
- to the user process.
-
-
- 5. After the data is transmitted, the TCP sets a
-
-
-
- -44-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- retransmission timer.
-
-
- 6. If the TCP receives an acknowledgment from the foreign
-
- host, it updates the TCP interface control block to
-
- reflect the acknowledgment, turns off the timer, and
-
- sends a DATA SENT message to the user process via a
-
- connection private message file. The message contains
-
- the number of bytes acknowledged. This message is
-
- processed by the TCPWAIT command. If only some of the
-
- data is acknowledged, the TCP resets the timer for the
-
- unacknowledged data.
-
-
- 7. If the TCP does not get an acknowledgment from the
-
- foreign host and the connection times out, it again
-
- reads as much data as it can from the user buffer and
-
- sends it out as a network packet.
-
-
- TCPSTATUS
-
-
- 1. The TCPSTATUS software checks to see if the connection
-
- is still open. If it is closed, it returns a connection
-
- closed code to the user process.
-
-
- 2. The TCPSTATUS command checks to see if there is an out-
-
- standing status request by the user process. If there
-
- is, it returns an error code to the user process.
-
-
-
-
-
- -45-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 3. If there is no pending status request, the TCPSTATUS
-
- software attaches the status request buffer to the TCP
-
- interface control block and sends a STATUS message to
-
- the TCP via the general input message file. The
-
- TCPSTATUS returns to the user process.
-
-
- 4. When the TCP receives the status request message, it
-
- formulates a status message and copies it into the
-
- user's status buffer attached to the connection buffer.
-
- The TCP then sends a status complete message to the user
-
- process via the connection private message file. The
-
- message from the TCP is processed by the TCPWAIT
-
- intrinsic.
-
-
- TCPWAIT
-
-
- 1. The TCPWAIT software checks the message received from
-
- the TCP.
-
-
- 2. If the message is a NETCLOSE command, the TCPWAIT
-
- software checks if the send side of the connection is
-
- closed and there is no data waiting to be sent to the
-
- TCP. If the send side is closed and there is no pending
-
- TCP data, the TCPWAIT software deletes the TCP interface
-
- control block. If there is data waiting to be
-
- transmitted, the TCPWAIT software marks the receive side
-
-
-
-
- -46-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- of the connection closed. In either case, TCPWAIT
-
- returns a connection closed code to the user process.
-
- It is up to the user process to decide when to close the
-
- send side of the connection, if it has not already done
-
- so. If there are any user buffers still assigned to
-
- this connection, they are returned to the user process
-
- at this time.
-
-
- 3. If the message is a NETABORT command the TCPWAIT
-
- software deletes the TCP interface control block and
-
- returns a connection abort code to the user process.
-
- Any buffers associated with connection are also returned
-
- in a list structure through the buffer pointer
-
- parameter.
-
-
- 4. If the message is a PENDING RECEIVE command, the TCPWAIT
-
- returns the pointer to the head of the first data
-
- buffer, the first data byte, and a byte count. Since
-
- the data may be returned in a number of linked buffers,
-
- it is up to the user to follow the buffer links. As the
-
- user process reads the data it should check each
-
- buffer's header. Completely filled buffers marked with
-
- a zero in the in use field can be reclaimed by the user
-
- process.
-
-
- 5. If the message is a DATASENT message, the TCPWAIT
-
-
-
- -47-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- software checks the acknowledgment count and releases as
-
- many buffers as it can from the send buffer list. The
-
- released buffers are linked in a list and the buffer
-
- pointer parameter is set to point to the first buffer in
-
- the list. The TCPWAIT software returns a data
-
- acknowledgment code to the user process.
-
-
- 6. If the message is a STATUS COMPLETE message, the TCPWAIT
-
- software sets the buffer pointer parameter to point to
-
- the status buffer and returns a status complete command
-
- code to the user process.
-
-
-
-
- 6.5 Windowing, Acknowledgment, and Retransmission
-
-
- The receive window size and data segment acknowledgment are
-
- completely dependent on the number of buffers the user process
-
- allocates to a connection. The receive window size of a
-
- connection is always set to the amount of free buffer space the
-
- user process allocates to the receive side of a connection.
-
- Acknowledgments of incoming TCP segments are limited to those
-
- sequence numbers which fit in the receive window.
-
- Acknowledgments are sent as soon as data is copied from the
-
- system protocol buffers to the user protocol buffers.
-
-
-
-
-
-
-
- -48-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- The initial retransmission algorithm is extremely simple.
-
- The first retransmission of unacknowledged data occurs 3 seconds
-
- after the original transmission. The second retransmission
-
- occurs 6 seconds after the first. The third and successive
-
- retransmissions occur 15 seconds after the previous
-
- retransmissions.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -49-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 7 1822 Layer/INP Driver Communication
-
-
- Communication between the system protocol process and the
-
- INP driver is implemented with four intrinsics: IOPEN, ICLOSE,
-
- IREAD, and IWRITE. These intrinsics are modified forms of the
-
- CS/3000 intrinsics. Their function is to open a connection to
-
- the INP network processor and to transmit data buffers to and
-
- from the INP. The IREAD and IWRITE intrinsics are always done
-
- without wait. The IOWAIT intrinsic is used to determine the
-
- completion of an I/O request.
-
-
- Initialization of the INP interface begins with an IOPEN
-
- call which initializes the interface software. This is followed
-
- by four IREAD intrinsic calls to initialize buffers for incoming
-
- network packets. Four pending buffers should allow enough
-
- buffering to catch all of the incoming data without tying up too
-
- many network buffers.
-
-
- The following is a summary of the commands used to
-
- communicate between the protocol process and the INP driver.
-
-
- - IOPEN()
-
-
- returns error code on failure. Possible failure modes
-
- include failure to find the INP microcode file, failure to
-
- load the microcode file in the INP, and a hardware failure
-
- in the INP.
-
-
-
- -50-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- This command initializes the connection between the
-
- protocol process and the INP. The initialization includes
-
- activating the INP and loading its microcode.
-
-
- - ICLOSE()
-
-
- This command closes the connection between the INP and the
-
- protocol process when the network software is brought
-
- down.
-
-
- - IREAD(buffer)
-
-
- This intrinsic passes an empty buffer to the INP driver.
-
- The buffer is queued to a DIT with an ATTACHIO command.
-
- Control then returns to the protocol process.
-
-
- - IWRITE(buffer)
-
-
- This intrinsic passes a full buffer to the INP DIT with
-
- the ATTACHIO command. Control is returned after the
-
- buffer is attached to the DIT. The buffer is released
-
- when the calling process receives an interrupt indicating
-
- I/O completion.
-
-
-
-
-
-
-
-
-
-
-
-
- -51-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 8 Protocol Software Buffering Scheme
-
-
- Data buffer management is the most important component of
-
- the network protocol software. Data buffers perform the key
-
- functions of data storage and data communication within the
-
- protocol software. These functions have complex and conflicting
-
- requirements which must be balanced by the buffer management
-
- scheme. An understanding of the buffer management scheme
-
- therefore begins with an understanding of its requirements.
-
-
- First, data buffers must be considered a scarce resource
-
- shared by a number of competing "interests" within the protocol
-
- software. These "interests" include the various protocol layers
-
- as well as individual network connections within the TCP layer.
-
- The major problem is how to effectively allocate buffer resources
-
- among these interests. This problem becomes particularly
-
- difficult when there is a shortage of buffers.
-
-
- An examination of the buffer requirements shows that they
-
- fall into two categories. The first category includes those
-
- buffers used to support general network functions. This includes
-
- buffers used in the 1822 and Internet protocol layers. These
-
- buffers are assigned to move and store data in these protocol
-
- layers without regard to particular network connections. The
-
- second category includes those buffers used by the TCP protocol
-
- to support specific connections.
-
-
-
- -52-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- The distinction between the two buffer categories is
-
- important because buffer use within each category is controlled
-
- by a different set of events. The use of buffers assigned to the
-
- general network functions can be controlled by the system
-
- protocol software. Buffers are processed through the Internet
-
- and 1822 protocol layers without regard to the behavior of user
-
- processes and their affect on individual connections. Buffers
-
- assigned to the connection specific network functions in the TCP
-
- and higher level protocol layers are greatly affected by events
-
- which occur in user processes. The rate at which data is
-
- accepted from or transmitted to the ARPANET by user processes is
-
- totally unpredictable. This unpredictability makes it difficult
-
- for the system protocol process to effectively assign buffer
-
- resources to individual network connections.
-
-
- Two buffer pools are used to separate those buffering
-
- functions shared by all network connections from the connection
-
- specific buffering functions. A network buffer pool, maintained
-
- by the system protocol process, is used to support the 1822 and
-
- Internet and some TCP buffering functions. A user buffer pool,
-
- maintained by each user protocol process is used to support
-
- connection dependent buffering functions for the TCP and higher
-
- level protocols.
-
-
-
-
-
-
-
- -53-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 8.1 Network Buffer Pool
-
-
- The network buffer pool supports the following specific
-
- functions.
-
-
- - movement of network packets from the INP driver 1822 and
- Internet protocol layers;
-
- - storage of Internet datagram fragments in the Internet
- protocol layer;
-
- - storage of unacknowledged TCP segments which do not fall
- into the current window;
-
- - movement of network packets from the TCP layer through the
- Internet and 1822 layer to the INP driver.
-
-
- The network buffer pool is maintained on the system protocol
-
- process stack where it can be accessed easily by the various
-
- system protocol layers. All of the buffers in the pool are the
-
- same size to minimize the amount of software overhead needed to
-
- maintain the buffers. The buffer size is matched to the maximum
-
- frame size (128 bytes) which may be transmitted over the X.25
-
- link between the INP and the ARPANET IMP.
-
-
- The size choice is the result of two constraints. First,
-
- the buffers used to catch incoming data must be large enough for
-
- the largest incoming network packet. The packets are transferred
-
- directly into memory by the INP hardware making it impossible for
-
- a packet to cross buffer boundaries. Second, the single size
-
- buffer scheme limits the amount of software overhead needed to
-
-
-
-
- -54-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- maintain the buffer pool.
-
-
- The single size buffer scheme does not waste buffer space
-
- because the buffer size is well matched with the data it
-
- processes. The 128 byte buffer size allows room for all of the
-
- protocol headers and a small amount of data. Messages with more
-
- data will use multiple buffers. The buffers are large enough to
-
- hold a significant amount of data yet small enough to limit the
-
- waste caused by partially filled buffers.
-
-
- No attempt is made to assign network buffers to any
-
- particular protocol layer or task. Buffers are allocated either
-
- when data is read from the ARPANET or when the TCP layer sends
-
- data out to the ARPANET.
-
-
-
-
- 8.1.1 Packet Compaction
-
-
- When the total number of network buffers in the free list
-
- falls below a set value, a data compaction algorithm is invoked.
-
- This algorithm searches for partially filled buffers used to
-
- store Internet datagram fragments and unacknowledged TCP segments
-
- waiting to be transferred to a user process. These buffers are
-
- chosen because processing of the data in them is indefinitely
-
- suspended. Compaction of the data in these buffers allows some
-
- of the buffers to be released to the free list.
-
-
-
-
- -55-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 8.1.2 Buffer Recycling
-
-
- A buffer recycling algorithm is invoked when the system
-
- protocol process runs out of free network buffers. The algorithm
-
- allows buffers to be reused even if they currently contain data.
-
- The mechanism works by identifying which data buffers can be
-
- reused without losing irreplaceable information. These buffers
-
- are sorted in a priority scheme wallows the least important
-
- buffers to be recycled first. The buffer recycling scheme
-
- prevents one socket from tying up too much of the network buffer
-
- resources. It also helps assure a supply of network buffers even
-
- under heavy load conditions.
-
-
- The buffer algorithm scheme divides network buffers into
-
- three categories: free buffers, in-use buffers, and aging
-
- buffers. Free buffers are available for immediate use by any
-
- protocol layer and are maintained on a common free list. In-use
-
- buffers are buffers bound to messages currently being processed
-
- and cannot be used for any other purpose. Aging buffers are used
-
- in messages where processing is suspended for any number of
-
- reasons. These buffers are placed in one of two special lists
-
- arranged in order of decreasing age. That is, message buffers
-
- which have been blocked for the longest time are at the front of
-
- the queue, while the message buffers which were most recently
-
- blocked are at the end of the queue.
-
-
-
-
- -56-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- There are two points in the protocol software where messages
-
- may be blocked. The first point is in the Internet Protocol
-
- software. Fragmented datagrams cannot be passed on to the TCP
-
- and can be blocked indefinitely if one or more of the fragments
-
- which make up the datagram is lost. A duplicate datagram may
-
- eventually be transmitted leaving the fragmented datagram in a
-
- suspended state. The second blocking point is in the TCP
-
- software. Unacknowledged segments sent by a foreign host remain
-
- suspended in the TCP until they are transferred to a user process
-
- buffer. Any segments which are not transferred to a user process
-
- will remain blocked indefinitely.
-
-
- Buffer recycling is implemented through buffer aging lists
-
- which are adjuncts to the buffer free list. When an incoming
-
- message is blocked, its buffers are attached to the end of one of
-
- two aging lists. Buffers bound to datagram fragments are
-
- attached to one aging lists while buffers bound to TCP segments
-
- waiting to be read by user processes are attached to the second
-
- aging list.
-
-
- The aging lists are periodically manipulated when a new
-
- datagram fragment comes in or when a user process receives some
-
- data from the TCP. Buffers associated with the particular
-
- datagram fragments or TCP segments are moved to the end of their
-
- respective aging lists. This helps assure that any data which
-
-
-
-
- -57-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- has a chance of being used will not be thrown away.
-
-
- The buffers bound to fragmented datagrams are recycled first
-
- because they are the most expendable. Blocked datagram buffers
-
- may be a part of datagrams which have been retransmitted and
-
- passed on to the TCP. When the blocked datagram buffers are
-
- exhausted the buffers bound to blocked TCP segments are used.
-
- These buffers contain the unacknowledged segments which have not
-
- been claimed by a user process. The assumptions here are that
-
- the user process will never claim these segments and that they
-
- are expendable.
-
-
-
-
- User Process Buffer Pool
-
-
- The user process is responsible for maintaining a set of
-
- fixed length buffers for passing the user data to the TCP. Each
-
- buffer must include a four byte header along with 80 bytes of
-
- data space.
-
-
- The first element of the header is used as either a byte
-
- count or a full buffer marker. The count is used by the TCPSEND
-
- intrinsic to indicate the number of data bytes in the buffer.
-
- The TCPRECEIVE intrinsic uses the buffer full marker to identify
-
- buffers which may be reclaimed by the user process.
-
-
-
-
-
-
- -58-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- The second element in the array header contains a list
-
- pointer. This pointer is maintained by the intrinsic software
-
- and should not be altered by the user process until the buffer is
-
- released.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -59-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 9 Data Flow Through the Protocol Software
-
-
- Data flow through the protocol software is effected through
-
- a series of tests and function calls. The tests check the type
-
- and processing state of each packet while the function calls
-
- perform specific operations on each packet. These operations
-
- include such things as creating or checking headers and queueing
-
- or de-queueing packet buffers.
-
-
- Whenever possible, network packets are processed through all
-
- of the system protocol layers without interruption. This helps
-
- increase throughput by minimizing two important parameters.
-
- First, the amount of buffering required to process data is
-
- decreased because all network buffers associated with a packet
-
- are released when the packet has passed through the protocol
-
- software. Second, the time between the receipt of a packet from
-
- the ARPANET and the transmission of an ACK is reduced.
-
-
- There are a number of instances when the processing of a
-
- packet can be interrupted within the system protocol process.
-
- This can occur when the lack of some resource or event prevents
-
- further processing. Examples of this are as follows:
-
-
- - Internet datagram fragments waiting for reassembly;
-
- - TCP segments from a foreign host waiting to be read by a
- user process;
-
- - TCP segments from a user process waiting for window
-
-
-
- -60-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- allocation before being transmitted to the ARPANET;
-
- - TCP segments from a user process already sent to the
- ARPANET but waiting for an acknowledgment.
-
-
-
-
- 9.1 ARPANET to the User Level Data Flow
-
-
- Data packets come in from the network via a DMA interface to
-
- the INP network processor. Incoming data is first transferred
-
- into the protocol process via network buffers passed to the IREAD
-
- intrinsic which places a read request on the DIT queue of the
-
- INP. An arriving network packet is placed in the network buffer
-
- by the INP driver. The system protocol process is notified of
-
- each I/O completion through the IOWAIT intrinsic.
-
-
- Processing of network packets begins when an IOWAIT call
-
- returns on completion of an IREAD intrinsic. The first
-
- processing step is to link the network buffers which contain the
-
- pieces of an 1822 packet.
-
-
- The next processing steps are performed by the 1822 protocol
-
- software. If this is a normal data packet the 1822 header is
-
- removed and the data packet is passed as a datagram to the
-
- Internet Software. The transfer is done by calling a sequence of
-
- Internet protocol routines with the datagram as a parameter.
-
-
-
-
-
-
-
- -61-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- The Internet software checks the datagram header for
-
- integrity and then tries to find the proper address for this
-
- datagram. If the datagram is not for the local host it is routed
-
- to the proper ARPANET Host and the network buffers are returned
-
- to the free list.
-
-
- If the datagram is a fragment of a larger datagram it is
-
- linked to any existing fragments waiting to be processed. If the
-
- new fragment does not complete the incoming datagram, the
-
- fragment is placed in an aging buffer queue next to the youngest
-
- buffer in the partially complete datagram. At this point all
-
- processing on the incoming datagram is suspended until the rest
-
- of the datagram fragments arrive.
-
-
- A complete datagram is stripped of its Internet header and
-
- sent to the TCP software as a data segment. The TCP performs a
-
- number of functions on incoming segments: first the segment
-
- header is checked to see if it belongs to a known socket -- if it
-
- does, any acknowledgment information from the header is taken to
-
- update the socket status; next, the segment is checked to see if
-
- it falls within a window -- if it is not within the window (or a
-
- reasonable approximation thereof), the segment is discarded and
-
- its buffers are returned to the free list.
-
-
- Accepted TCP segments are transferred into the user buffers.
-
- The transfer is initiated by the user process which provides a
-
-
-
- -62-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- buffer through the TCPOPEN or TCPRECEIVE intrinsic. A command
-
- message sent via the general input message file is used to inform
-
- the system protocol process that a buffer is available. The
-
- system protocol process transfers as much of its segment as
-
- possible to the user buffer. The user process is then notified
-
- of the data transfer via the connection's private message file.
-
- Only the transferred portions of the segments are acknowledged to
-
- the foreign host. Any portions of segments which do not fit in
-
- the receive window are stored in the TCP aging queue.
-
-
- The acknowledgment may be sent in a number of ways. If the
-
- same network connection has an outgoing packet waiting for
-
- transmission, the acknowledgment information is added to the
-
- outgoing packet. If there is no pending outgoing packet, a check
-
- is made to see if there is sufficient unacknowledged data to
-
- warrant an acknowledgment packet. If there is enough
-
- information, a separate acknowledgment packet is generated and
-
- transmitted out to the ARPANET as if it were a normal message.
-
- If the number of unacknowledged segments is insufficient to
-
- justify an acknowledgment packet, the pending acknowledgment bit
-
- in the TCB is set and a timer is started. If the timer runs out,
-
- an acknowledgment packet is sent regardless of the number of
-
- unacknowledged segments.
-
-
-
-
-
-
-
- -63-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- 9.2 User Level to the ARPANET Data Flow
-
-
- Transfer of data from the user process out to the ARPANET
-
- begins with a NETSEND intrinsic call. The intrinsic software
-
- sends a message to the system protocol process to inform it that
-
- it has data to send. The system protocol process tests the state
-
- of the connection to see if data transmission is feasible. The
-
- following are sufficient conditions for data transmission out to
-
- the ARPANET:
-
-
- - enough data has collected to justify transmitting it to
- the foreign host;
-
- - the user process has specified an EOL in the data
- transmission;
-
- - there are fewer than eight outstanding 1822 protocol
- packets waiting for RFNMs to the foreign host;
-
- - the waiting data falls within the foreign host's window.
-
-
- If the state of the connection does not allow a transmission
-
- to occur, a request-to-send data flag is set in the connection
-
- control block. When the connection state changes due to some
-
- external event, a check is made to see if the new state allows
-
- the transmission of waiting data. An example of such an event is
-
- the arrival of a RFNM from a foreign host; in this case all of
-
- the connections to the foreign host are checked for data waiting
-
- for transmission. The connection with data which has been
-
- waiting for the longest time is processed first. An attempt is
-
-
-
-
- -64-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- made to combine as many of the waiting TCP segments as possible
-
- into one data transfer to increase the amount of data
-
- transmitted.
-
-
- If there is nothing blocking transmission of the data, the
-
- TCP software allocates a buffer, creates the necessary TCP,
-
- Internet, and 1822 headers, and copies the data to be transmitted
-
- from the user buffer to the system's buffer. The TCP header will
-
- include any acknowledgment information for data received on the
-
- return socket associated with the connection.
-
-
- In order to assure proper transmission of the TCP segment a
-
- retransmission sequence is started. A retransmission timer is
-
- started to wake up the protocol software when a retransmission is
-
- needed. If a timeout occurs, the segment is retransmitted as
-
- soon as the state of the connection allows it. The necessary
-
- conditions for a retransmission are the same as those for the
-
- original transmission. If the segment is partially acknowledged,
-
- the data left in the retransmission queue is only that data
-
- represented by the unacknowledged sequence numbers.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -65-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- APPENDIX A - HP3000 to ARPANET Link
-
-
-
-
- +----------+ +----------+
- | |---+ +---| |
- | | I | X.25 LAP | | |
- | HP3000 | N |--------------| | C30 IMP |
- | | P | | | |
- | |---+ +---| |
- +----------+ +----------+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -66-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
- APPENDIX B - Protocol Software Organization
-
- +---------+
- | MBB |
- +---+-+---+
- ^ |
- | v
- +---+-+---+
- | INP |
- +---------+
- | Driver |
- +---+-+---+
- ^ |
- | v
- ,----+-+----,
- High Priority / Device /
- User Mode /Information/
- Process / Table /
- '----+-+----'
- ^ |
- ATTACHIO
- | v
- +-----+-+----+
- | 1822 |
- | ------- | ,---------------,
- | Internet |--------->/ Transmission /
- | ------- |<--------/ Control Block /
- | TCP | '---------------'
- +-+--+---+--++
- ^ | | |
- : | | |
- +--------:--+ | +------------+
- | : | |
- | ...:......|...............|....
- | : | : | :
- v : v : v :
- +---+-----+---+ +--+------+-+ +--+---+--+
- |Server Telnet| |User Telnet| |User FTP |
- | Program | | Program | | Program |
- +-----+--+----+ +--+-+-+-+--+ +-+-+-+-+-+
- ^ | | | | | | | | |
- | v | | | | | | | |
- Pseudo-TTY ,-+--+-, USERS USERS
- Logical Devices / PTY /
- (one each user) '-+-+--'
- ^ |
- | v
- HP3000
- Command Interpreter
- ---- Private Message Files
- .... General Input Message File
-
-
- -67-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- APPENDIX C - Control Structures
-
- _______________________________
- |POINTER TO BUFFER FREELIST |
- |-----------------------------|
- |POINTER TO END OF FREELIST |
- |-----------------------------|
- |FREE BUFFER COUNT |
- |-----------------------------|
- |POINTER TO INTERNET AGE LIST |
- |-----------------------------|
- |POINTER TO END OF INTERNET |
- |-----------------------------|
- |INTERNET AGE LIST COUNT |
- |-----------------------------|
- |POINTER TO TCP AGE LIST |
- |-----------------------------|
- |POINTER TO END OF TCP LIST |
- |-----------------------------|
- |TCP AGE LIST BUFFER COUNT |
- |-----------------------------|
-
- NETWORK RESOURCE CONTROL BLOCK
-
-
-
-
-
- _______________________________
- |HOST NUMBER |
- |-----------------------------|
- |NUMBER OF OUTSTANDING 1822 |
- |PACKETS WAITING FOR RFNMS |
- |_____________________________|
-
- FOREIGN HOST CONTROL BLOCK
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -68-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- _____________________
- | CONNECTION STATE |
- |-------------------|
- | LOCAL PORT NUMBER |
- |-------------------|
- | TCP INTERFACE |
- | CONTROL BLOCK NO. |
- |-------------------|
- |CONNECTION PRIVATE |
- |MESSAGE FILE ID |
- --------------------|
-
- GENERAL INFORMATION SECTION
- OF THE CONNECTION CONTROL
- BLOCK
-
-
- _____________________
- |RECEIVE SEQUENCE |
- |-------------------|
- |RECEIVE WINDOW |
- |-------------------|
- |RECEIVE BUFF SIZE |
- |-------------------|
- |RECEIVE URGENT PTR |
- |-------------------|
- |RECEIVE LAST BUFF |
- |-------------------|
- |INITIAL RECEIVE |
- |SEQUENCE NUMBER |
- |-------------------|
- |PTR TO UN-ACKED TCP|
- | SEGMENTS |
- |___________________|
-
- CONNECTION RECEIVE DATA
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -69-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- _____________________
- |SEND UN-ACKED |
- |-------------------|
- |SEND SEQUENCE |
- |-------------------|
- |SEND WINDOW |
- |-------------------|
- |SEND BUFFER SIZE |
- |-------------------|
- |SEND URGENT PTR |
- |-------------------|
- |SEND SEQUENCE FOR |
- |LAST WINDOW UPDATE |
- |-------------------|
- |SEND LAST BUFFER |
- |-------------------|
- |INITIAL SEND |
- |SEQUENCE NUMBER |
- |___________________|
-
- CONNECTION SEND DATA
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -70-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- ________________
- FREEBUFFER QUEUE --->|NEXT BUFFER |____
- |--------------| |
- | | |
- |______________| |
- |
- ______________________|
- |
- | ________________
- -->|NEXT BUFFER |____
- |--------------| |
- | | |
- | | |
- |______________| |
- |
- ______________________|
- |
- | ________________
- -->|NULL |
- |--------------|
- | |
- | |
- |______________|
-
- NETWORK BUFFER FREELIST
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -71-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- OLDEST DATAGRAM SECOND OLDEST
- FRAGMENT DATAGRAM FRAGMENT
- INTERNET ________________ ________________
- AGING --->|NEXT DATAGRAM |-------->|NEXT DATAGRAM |--> PTR TO
- LIST |--------------| |--------------| THIRD
- |NEXT BUFFER |____ |NEXT BUFFER |____ OLDEST
- |--------------| | |--------------| |
- |______________| | |______________| |
- | |
- ______________________| _____________________|
- | |
- | ________________ | _______________
- -->|NEXT BUFFER |____ -->|NEXT BUFFER |____
- |--------------| | |-------------| |
- | | | | | |
- | | | | | |
- |______________| | |_____________| |
- | |
- ______________________| ____________________|
- | |
- | ________________ | _______________
- -->|NULL | -->|NULL |
- |--------------| |-------------|
- | | | |
- | | | |
- |______________| |_____________|
-
- INTERNET AGING LIST
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -72-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- CONNECTION 1 CONNECTION 2
- OLDEST UN-ACKED SECOND OLDEST UN-ACKED
- SEGMENT BUFFERS SEGMENT BUFFERS
- TCP ________________ ________________ PTR TO
- AGING --->|NEXT SEGMENT |-------->|NEXT SEGMENT |--> THIRD
- LIST |--------------| |--------------| OLDEST
- |NEXT BUFFER |____ |NEXT BUFFER |____
- |--------------| | |--------------| |
- |______________| | |______________| |
- | |
- ______________________| _____________________|
- | |
- | ________________ | _______________
- -->|NEXT BUFFER |____ -->|NEXT BUFFER |____
- |--------------| | |-------------| |
- | | | | | |
- | | | | | |
- |______________| | |_____________| |
- | |
- ______________________| ____________________|
- | |
- | ________________ | _______________
- -->|NULL | -->|NULL |
- |--------------| |-------------|
- | | | |
- | | | |
- |______________| |_____________|
-
- TCP AGING LIST
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -73-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- APPENDIX D - Command Message Formats
-
-
- General Message Format
-
- _________________________
- | Command Type (2 bytes)|
- |_______________________|
- | TCP Interface Control |
- | Block No. (2 bytes) |
- |_______________________|
- | Data (10 bytes) |
- |_______________________|
-
-
- OPEN CONNECTION Data Area Format
-
- _________________________
- | Foreign Host Internet |
- | Address (4 bytes) |
- |_______________________|
- | Foreign Port (2 bytes)|
- |_______________________|
- | Local Port (2 bytes) |
- |_______________________|
- | Status Flag bits |
- | (2 bytes) |
- |_______________________|
-
-
- SEND Command Data Area Format
-
- _________________________
- | Send Byte Count |
- | (2 bytes) |
- |_______________________|
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -74-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- Message File Command Codes
-
- ___________________________________________________
- |User To TCP Command | TCP to User Command | Code |
- |____________________|_____________________|______|
- | OPEN CONNECTION | OPENCONFIRM | 0 |
- |____________________|_____________________|______|
- | CLOSE CONNECTION | NETCLOSE | 1 |
- |____________________|_____________________|______|
- | ABORT CONNECTION | NETABORT | 2 |
- |____________________|_____________________|______|
- | SEND | DATASENT | 3 |
- |____________________|_____________________|______|
- | RECEIVE | PENDING RECEIVE | 4 |
- |____________________|_____________________|______|
- | STATUS | STATUS COMPLETE | 5 |
- |____________________|_____________________|______|
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -75-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- APPENDIX E - TCP Interface Control Block
-
-
- GENERAL INFO SECTION OF THE
- TCP INTERFACE CONNECTION BLOCK
- +----------------------------+
- | TCP STATUS BUFFER PTR |
- +----------------------------+
- | USER PROCESS STACK DATA |
- | SEGMENT NUMBER |
- +----------------------------+
- | SEND Side Open/Close flag) |
- +----------------------------+
- |RECEIVE Side Open/Close flag|
- +----------------------------+
-
-
- SEND PORTION OF THE TCP USER BUFFERS USED
- INTERFACE CONNECTION BLOCK TO TRANSMIT DATA
- TO THE TCP
- +----------------------------+ +--------------+
- | Ptr to First Free Buffer |------------->| Data Count |
- | (user buffer whose data | |(no data bytes|
- | has been read by TCP | | in buffer) |
- +----------------------------+ +--------------+
- | Ptr to Next Data Buffer | | Link to next |
- | (user buffer whose data +-----+ +--+ Buffer |
- | not been read by TCP) | | | +--------------+
- +----------------------------+ | | | DATA |
- | Ptr to first UnAcked byte +---+ | | +--------------+
- +----------------------------+ | | |
- | Offset in Next Data Buffer | | | |
- |(offset in next data buffer +-+-+ | |
- | to first unread data byte) | | | | | +--------------+
- +----------------------------+ | | +--->-+->| Data Count |
- | | +--------------+
- | | +--| LINK |
- | | | +--------------+
- | +-------|->| |
- +-------->|->| DATA |
- | +--------------+
- |
- | +--------------+
- +->| Data Count |
- +--------------+
- | LINK |
- +--------------+
- | DATA |
- +--------------+
-
-
- -76-
-
- IEN 167 Sax and Edmond
- Bolt Beranek and Newman Inc.
- July 1980
-
-
-
- RECEIVE PORTION OF THE TCP USER BUFFERS USED
- INTERFACE CONNECTION BLOCK FROM THE TCP
- TO TRANSMIT DATA
- +----------------------------+ +--------------+
- | Ptr to First Filled Buffer |------------->|Full/Filling |
- | (user buffer which has been| |True indicates|
- | filled by TCP) | |buffer is full|
- +----------------------------+ +--------------+
- | Ptr to Next Data byte to be| +--+ Link to next |
- | read by user process +-------+ | | Buffer |
- +----------------------------+ | | +--------------+
- | Ptr to First Partially Full| | | | DATA |
- | Buffer (buffer not yet +-----+ +->-+->| |
- | filled by TCP) | | | +--------------+
- +----------------------------+ | |
- | Offset in Partially Full | | |
- | Buffer (next free byte for +--+ | |
- | TCP) | | | | +--------------+
- +----------------------------+ | +-----+->| Full/Filling |
- | +--------------+
- | +--| LINK |
- | | +--------------+
- +------->+->| DATA |
- | +--------------+
- |
- |
- |
- | +--------------+
- +->| Full/Filling |
- +--------------+
- | LINK |
- +--------------+
- | DATA |
- +--------------+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -77-
-