[comp.dcom.lans] OSI-model software

ps@diab.UUCP (06/03/87)

We are looking for a software package that implements the OSI-model
protocol levels 3(internet), 4(transport class 0,2,4), and 5(session)
in whole or parts. The software need not be a commercial product, or
even completely functional. If suitable, it will be a base for further
development. It is a requirement that the software could become the property
of this company (no licensing), on a non-exclusive basis with no restrictions
on it's future use or distribution.

Any hints are appreciated. Thanks in advance.
-- 
Per-Erik Sundberg,  Diab Data AB
SNAIL: Box 2029, S-183 02 Taby, Sweden
ANALOG: +46 8-7680660
UUCP: seismo!mcvax!enea!diab!ps

mac@idacrd.UUCP (06/04/87)

in article <223@diab.UUCP>, ps@diab.UUCP (Per-Erik Sundberg) says:
> Xref: idacrd comp.dcom.lans:459 comp.protocols.misc:22 comp.sources.wanted:1227
> 
> 
> 
> We are looking for a software package that implements the OSI-model
> protocol levels 3(internet), 4(transport class 0,2,4), and 5(session)
> in whole or parts. The software need not be a commercial product, or
> even completely functional. If suitable, it will be a base for further
> development. It is a requirement that the software could become the property
> of this company (no licensing), on a non-exclusive basis with no restrictions
> on it's future use or distribution.
> 
> Any hints are appreciated. Thanks in advance.
>


AHHHAAAA Ahhhaaa hahahahahaha   ahhhhh hahahahahaha ahhh hahahaha

Chuckle chuckle etc.

Bob
 

dpz@aramis.rutgers.edu.UUCP (06/04/87)

>From: mac@idacrd.UUCP (Bob McGwier)

>>We are looking for a software package that implements the OSI-model
>>protocol levels 3(internet), 4(transport class 0,2,4), and 5(session)

> AHHHAAAA Ahhhaaa hahahahahaha   ahhhhh hahahahahaha ahhh hahahaha
> 
> Chuckle chuckle etc.

Pretty friggin obnoxious.  Go play with your toys, unless you have an
intelligent answer for him.

						dpz
-- 
David P. Zimmerman           rutgers!dpz           dpz@rutgers.edu

steckel@alliant.UUCP (06/05/87)

Anyone contemplating using OSI protocols should read Padlipsky's comments
in the tcp-ip mailgroup (comp.dcom.tcp-ip I think).  He exposes far better
than I can the fundamental flaws in network protocols prescribed by PTTs
(national postal/telegraph/telephone monopolies) or other monolithic entities.
He has also published a book on the subject - suitable for making implementors
cry and standards committee members break out in flames.  (Sorry, I can't
remember the title but I could find out if enough interest)

OSI doesn't tell you how to make a network.  It only tells you how to
(supposedly) connect to a (supposedly perfect) network.  All OSI protocols
fall extremely short on error handling.  Even X.25, the closest to usable
of all the OSI protocols, has had several revisions because of this problem
and it's a low level!

Read Padlipsky and weep (or break into hysterical laughter!).
	geoff steckel (steckel@alliant.uucp, gwes@wjh12.uucp)

jmg@cernvax.UUCP (jmg) (06/05/87)

In article <233@idacrd.UUCP> mac@idacrd.UUCP (Bob McGwier) writes:
>in article <223@diab.UUCP>, ps@diab.UUCP (Per-Erik Sundberg) says:
>> We are looking for a software package that implements the OSI-model
>> protocol levels 3(internet), 4(transport class 0,2,4), and 5(session)
etc.
>> Any hints are appreciated. Thanks in advance.
>
>AHHHAAAA Ahhhaaa hahahahahaha   ahhhhh hahahahahaha ahhh hahahaha
>
>Chuckle chuckle etc.
>
>Bob
> 

May I say that this is the sort of inane reply which drives me wild.
It has no information in it, other than an implied snide comment.
Personally, I would prefer that Mr. McGwier thinks for a few microseconds
before issuing such a reply.

As it happens:-

1. I already sent off four names to the original sender, and there are
   certainly more.
2. We are currently running (and interworking with) three different
   ISO TP4 implementations (on Vax, 68000 and IBM PC).
3. The sender is not English mother tongue (although he speaks it
   probably rather better than most readers speak his language), and
   so is possibly upset by the answer.

nrh@chuck.bellcore.com.UUCP (06/06/87)

In article <526@alliant.UUCP> steckel@alliant.UUCP (Geoff Steckel) writes:
>Anyone contemplating using OSI protocols should read Padlipsky's comments
>in the tcp-ip mailgroup (comp.dcom.tcp-ip I think).  He exposes far better
>than I can the fundamental flaws in network protocols prescribed by PTTs
>(national postal/telegraph/telephone monopolies) or other monolithic entities.
>He has also published a book on the subject - suitable for making implementors
>cry and standards committee members break out in flames.  (Sorry, I can't
>remember the title but I could find out if enough interest)
>...
>Read Padlipsky and weep (or break into hysterical laughter!).
>	geoff steckel (steckel@alliant.uucp, gwes@wjh12.uucp)

Padilipsky's book is called "The Elements of Networking Style", and
is published by Prentice-Hall.

fair@ucbarpa.Berkeley.EDU.UUCP (06/07/87)

Followup-To:

I wish to echo the recommendation of Michael Padlipsky's book,
which is

	The Elements of Networking Style

	and other Essays & Animadversions on
	the Art of Intercomputer Networking

	Michael A. Padlipsky
	published by Prentice-Hall, 1985
	ISBN 0-13-268111-0 01

It is most frustrating to only be able to sit idly by while most of the
computer industry gives lip service to ISO vaporware, while a superior,
second generation protocol suite goes mostly ignored (unless the
customers have the sense to ask for it): DoD IP/TCP.

	Erik E. Fair	ucbvax!fair	fair@ucbarpa.berkeley.edu

mel1@houxa.UUCP (06/07/87)

In article <19265@ucbvax.BERKELEY.EDU>, fair@ucbarpa.Berkeley.EDU (Erik E. Fair) writes:
> It is most frustrating to only be able to sit idly by while most of the
> computer industry gives lip service to ISO vaporware, while a superior,
> second generation protocol suite goes mostly ignored (unless the
> customers have the sense to ask for it): DoD IP/TCP.

I am new to the field of networking and am getting very confused.  I
see lots of utility in the TCP/IP offerings and uses.  I was a user
of the ARPANET for many many years (without the slightest knowledge
about what was providing such great services).  I use an Ethernet in
our lab that connects dozens of systems from different venders and
opertaing systems.  Both work very reliably, relatively fast, and
duck simple to use.

What does ISO offer that TCP/IP doesn't?  Is it significantly faster?
I can't think of any other measure that needs improving.

Is there a war going on?  TCP/IP vs ISO?  Who is on which side?  Why?

   Mel Haas  ,  odyssey!mel

dyer@spdcc.COM (Steve Dyer) (06/07/87)

It's unfortunate that Padlipsky, in naming his collection of essays
"The Elements of Networking Style", seems to have eschewed all the
recommendations of its namesake, "The Elements of Style" by Strunk
and White.  Although there is some very good technical content in
the book, it is buried beneath a rambling, self-indulgent conversational
style which is very hard to read and follow.  Padlipsky makes a lot of
his deliberate decision to avoid "seriousness" in a technical book,
but that doesn't mean that it has to represent the worst of an engineer's
first drafts.

I wonder, too, how accessible much of the material is to newcomers--many
of the essays dive immediately into the details of NCP, the protocol suite
used on the ARPAnet before the introduction of TCP/IP.  When I was reading
it, I was glad that I had worked at BBN during the NCP/TCP transition where
I had to support both protocol suites--I had some context to work with.

This isn't to detract from its uniqueness -- it's practically the only 
book of its kind, written from the point of view of one of the original
ARPA designers.  But it helps if you read it as a kind of "oral history"
transcribed verbatim and manage to get past its idiosyncratic style.
-- 
Steve Dyer
dyer@harvard.harvard.edu
dyer@spdcc.COM aka {ihnp4,harvard,linus,ima,bbn,halleys}!spdcc!dyer

sas@pyramid.UUCP (06/07/87)

In article <492@houxa.UUCP> mel1@houxa.UUCP (M.HAAS) writes:
>What does ISO offer that TCP/IP doesn't?  Is it significantly faster?
>I can't think of any other measure that needs improving.

The following is my opinion:

The ISO stack, in its current state, offers significantly less functionality
than TCP/IP.  In particular, the virtual terminal protocol is not yet
completed.  What ISO does propose to offer (when completed) is:

	(1)	More heterogeneity via a more "complete" series of
		options to the basic functions.

	(2)	A solidification of the layering approach to communications
		protocols which would provide more intermingling
		of various services within a class of functionality without
		modification to the higher layers.  E.g., the ability to run
		a lean transport on top of a connection-oriented service
		(X.25) versus a more substantial transport on top of
		connectionless services (802.3).
	
	(3)	A suite of protocols not developed by the "bomb-crazed"
		American military.  Not that I want to bring politics
		into the picture but, like it or not, we're talking
		*international* standards.  The Europeans are very
		sensitive about the protocols which run over the
		PTT networks.  Anyone whose gone through the ordeal of
		an X.25 certification can attest to this.  An international
		standard not controlled by any one country (in fact one in
		which each country can select the options (see (2)) it
		prefers) would seem to be an ideal solution.
>
>Is there a war going on?  TCP/IP vs ISO?  Who is on which side?  Why?

More opinion:

I'm not sure I'd classify what appears to be taking place as a war.  It
seems to be more of a necessary sanity check on what's been produced by
the standards bodies.  I'm all for standards and computers that talk to
each other.  However, I'd like this to happen in a reasonably fast and
(from the host-standpoint) efficient manner.  Beyond the discussion over
incompleteness of the standards, there is a question of performance of
ISO implementations.  One of the more visible groups raising these questions
is the FDDI group.  If you'll recall, FDDI is a 100 Mbit/sec token bus
standard being developed by a subcomittee of ANSI.  An important question
is what happens when I suddenly improbe my bandwidth (in this case, an
order of magnitude) but my software only allows me to use a small portion.

In favor of ISO are the European PTTs and academic networks, the MAP/TOP
group, NBS and Corporation for Open Systems (COS), and the US Government
via the GOSIP spec.  It also appears that the ARPAnet may migrate to
ISO in an undetermined timeframe.

>
>   Mel Haas  ,  odyssey!mel

sas
----
Scott Schoenthal		        Pyramid Technology Corp.
pyramid!sas				Mountain View, California

sas@pyramid.UUCP (06/08/87)

In article <2923@pyramid.UUCP> sas@pyramid.UUCP (Scott Schoenthal) writes:
> [ ... ]  If you'll recall, FDDI is a 100 Mbit/sec token bus
							  ^^^

Ugh!  My mind said "ring" but my fingers typed "bus".  My apologies for
any confusion.

sas

ast@cs.vu.nl (Andy Tanenbaum) (06/09/87)

In article <492@houxa.UUCP> mel1@houxa.UUCP (M.HAAS) writes:
>What does ISO offer that TCP/IP doesn't?  Is it significantly faster?
>I can't think of any other measure that needs improving.
>
>Is there a war going on?  TCP/IP vs ISO?  Who is on which side?  Why?

The ISO OSI model is an attempt to provide a framework for networking from
the physical bit transport to the applications.  The model itself does not
contain protocols at all, although ISO has standardized some protocols and
services for the various layers.

TCP and IP are two specific protocols for layers 4 and 3, respectively, and
as such can be used to fill two of the slots in the OSI reference model.
Other protocols are needed for the other layers.

Virtually everyone now agrees that the OSI model is a good way to look at
networking.  The war is about which protocols which be used in which layer.
TCP is clearly one candidate for the transport protocol, but most
companies in the U.S., and virtually all companies outside the U.S. are
committed to supporting the ISO OSI transport protocol and the ISO protocols
in layers 5 through 7 too.  (1-3 are much fuzzier, what with IEEE 802 etc.)

There has been a lot of generalized disgust with OSI expressed here and
elsewhere.  I would be very interested in hearing specific comments about
  1. What is wrong with the OSI model itself.
  2. What is wrong with the specific protocols ISO has adopted.

Comments like: you can't go out and buy it off the shelf right now don't
count.  If the standards people waited until every company had already
had a running network product, they would all be different and there would
be no standard at all.  The only way to achieve standardization in this area
is to agree on the standards before every company invests a lot of money
doing it some nonstandard way.  Thus it is not surprising that the standards
are here before all the implementations.

Nevertheless, there are certainly plenty of valid criticisms of the model and
the protocols (e.g., the session layer is pointless, the presentation layer
is practically empty, they forgot about encryption altogether etc.).  I would
like to see a discussion of this subject, preferably by people who know what
they are talking about.

Andy Tanenbaum (ast@cs.vu.nl)

lamaster@pioneer.arpa (Hugh LaMaster) (06/09/87)

In article <1204@botter.cs.vu.nl> ast@cs.vu.nl (Andy Tanenbaum) writes:
>In article <492@houxa.UUCP> mel1@houxa.UUCP (M.HAAS) writes:
>>
>>Is there a war going on?  TCP/IP vs ISO?  Who is on which side?  Why?
>

>
>There has been a lot of generalized disgust with OSI expressed here and
>elsewhere.  I would be very interested in hearing specific comments about
>  1. What is wrong with the OSI model itself.
>  2. What is wrong with the specific protocols ISO has adopted.
>
>Andy Tanenbaum (ast@cs.vu.nl)

1) I would like to move this discussion to comp.protocols.iso

2) Unfortunately, the standards making bodies have appeared to those of us on
the outside to be dominated by two groups; the first group are European
telecomm monopolies who are indifferent to or actively hostile to
internetworking (e.g. Arpanet, milnet, nsfnet, many regional networks) between
LANs because it will reduce the tariffs they collect (they are right about
that); and, second, Certain U.S. Vendors who individually and collectively
have a financial interest in pretending to be interoperable while actually
trying to make it difficult for their customers to integrate multiple vendors
into a single network (they like captive customer bases of course, what
monopoly wouldn't?).  

3)  It is not an issue that not everything is implemented yet by all vendors;
it is an issue that absolutely essential protocols are not yet defined.  Until
there is a network virtual terminal specification, for example, the rest of
ISO is of limited utility.  You have to have the minimal set of specs first
before you can reasonably judge the protocols.  How can you be an "ISO
booster" before you have a complete protocol set to boost?  How can you expect
an internet user to accept the ISO protocols before internetwork address
resolution and routing are even defined? (Let alone published where the public
can see them.)

4)  The religious overtones from the ISO camp are also disturbing.  I don't
remember anyone ever laying religious stuff on me for the arpa protocols.
TCP/IP etc. spread from arpanet to the general user community because they
worked, and provided the facilities that people wanted.  It was that simple,
and that hard.  The ISO camp is trying to replace TCP/IP not with an
improvement in performance, reliability, features, or ease of integration.
Instead, some its proponents have resorted to forced baptisms.  Before the
things we are supposed to believe in are even defined.  It worries me.

5)  Because the ISO camp didn't bother to stop and consider the needs of the
LAN and internet communities, they have only recently begun to work on LAN and
internet features.  Real improvements over tcp/ip, such as new features like
multiple gateway dynamic routing and path load balancing, and real (layer by
layer) security, have not been worked on at all.  Is it possible to retrofit
real security into ISO at this point?  If it is, will it be possible to change
iso substantially, or will it be cast into concrete, warts and all?

6)  Therefore, I am afraid there are two warring camps at this point.  The
TCP/IP camp is looking for better service, and the iso camp has its (somewhat
hidden) agenda which is quite different.  This is not to say that anyone
working on defining or implementing iso is a bad person.  Some of the nicest
people are.  The solution, from my perspective, is for the iso camp to mature
sufficiently that technical considerations override the (current) political
considerations.  In the meantime, I hope that some mechanism by which user and
small vendor input into iso can be developed.  Why isn't there anything like
the RFC mechanism for iso?  Perhaps comp.protocols.iso should spin off
rfc.protocols.iso (moderated, of course) and the results forwarded to the
standards bodies.

7)  Finally, this is not a flame on all the hardworking people who have tried
to make the iso protocol suite more suitable for LANs and internets.  I don't
know who most of you are, but I know sitting on standards committees is tough
work. 





  Hugh LaMaster, m/s 233-9,  UUCP {seismo,topaz,lll-crg,ucbvax}!
  NASA Ames Research Center                ames!pioneer!lamaster
  Moffett Field, CA 94035    ARPA lamaster@ames-pioneer.arpa
  Phone:  (415)694-6117      ARPA lamaster@pioneer.arc.nasa.gov

"In order to promise genuine progress, the acronym RISC should stand 
for REGULAR (not reduced) instruction set computer." - Wirth

("Any opinions expressed herein are solely the responsibility of the
author and do not represent the opinions of NASA or the U.S. Government")

kre@munnari.UUCP (06/10/87)

In article <1724@ames.UUCP>, lamaster@pioneer.arpa (Hugh LaMaster) writes:
> 1) I would like to move this discussion to comp.protocols.iso

Be careful here, comp.protocols.iso is an internet group (a cheap
way of transporting the mailing list over the internet), it doesn't
reach out into most of usenet.  It probably should.  Since usenet
is all about networking, and iso is standardising exactly that,
this is one topic that all usenet should be able to see.

> Until there is a network virtual terminal specification, for example,
> the rest of ISO is of limited utility.

You're right, that one is lagging behind (and started late), probably
largely because X.29 (as revolting as it is) was seen as serving
adequately enough (which it doesn't outside the x.25 world).

> The solution, from my perspective, is for the iso camp to mature
> sufficiently that technical considerations override the (current) political
> considerations.

No, this is all backwards, strange as it may seem.  The whole purpose
of standardisation is for political considerations to override the
technical ones.  And no, I'm not being cynical.  The absolute essential
for a standard is for everyone to agree with it, and getting everyone
to agree means lots of compromises.  (Just consider Sun with NeWS and X).

There's absolutely no hope of a technically perfect standard, especially
not in any area where there's any dispute about what is perfect.

This isn't to say that the standards bodies don't aim to formulate a
standard as technically good as they can, but that *must* come second
to getting the necessary agreements, from the whole world.

> Why isn't there anything like the RFC mechanism for iso?

There is: they're the working papers, draft standards, etc.
What they're not is free.  Nor are they even cheap.  However
you can easily obtain copies (contact ANSI in the US).  The
documentation isn't free, as this is how ISO largely finances
its activities .. ie: selling those bits of paper largely
pays for the secretarial work that goes into creating them
(most of the cost of the technical work is contributed by the
members of the working groups, or their employers, but I believe
that some of this comes from ISO funds as well).

Robert Elz

andre@nrc-ut.UUCP (Andre' Hut) (06/11/87)

In article <492@houxa.UUCP> mel1@houxa.UUCP (M.HAAS) writes:
>What does ISO offer that TCP/IP doesn't?  Is it significantly faster?
>I can't think of any other measure that needs improving.
>
>Is there a war going on?  TCP/IP vs ISO?  Who is on which side?  Why?

There is a political issue here too.  TCP/IP was developed by the U.S.
Department of Defense, and well it is viewed by many Europeans as the
American protocol.  ISO is an attempt at an "International" protocol,
universally acceptable...
-- 
-----------------------------------------------------------------------------
                sdcsvax-\         ihnp4-\
                         \               \
Andre' Hut              sdcrdcf!psivax!nrcvax!nrc-ut!andre
                         /              /        /
                hplabs--/ ucbvax!calma-/        /
				utah-gr!uplherc/
Network Research Corporation
923 Executive Park Dr. Suite C
Salt Lake City, Utah 84117
-----------------------------------------------------------------------------

hedrick@topaz.rutgers.edu (Charles Hedrick) (06/11/87)

No, there isn't a war on.  There's no real question about the facts:
1) if you want to build a large-scale network now, use TCP/IP; 2) in a
few years, the ISO protocols will be widely implemented, so you may
want to use them instead.  Given that both the vendors and the U.S.
government are committed to ISO, it is doomed to success.  Cynical
explanations have been considered.  One of the more interesting is
that you can keep your customers locked in for a few more years by
saying that you are working on ISO and that is why you aren't giving
them TCP/IP.  And your ISO will be here Real Soon Now.  However I
think the real answer is that no group of people is ever happy with
what another group of people did.  The people doing ISO are from the
European telephone monopolies, who know only X.25, and from U.S.
vendors, who have spent years doing their own proprietary networks.
In fact the U.S. representatives have done us a great favor, which is
far too little appreciated in the TCP/IP community: they have gotten
ISO to include a protocol family that is very similar in philosophy to
TCP/IP.  Personally I think we'd be a lot better off if they had
actually used TCP/IP.  But as I said, what group, when considering
something another group has done, will ever just accept it?  And the
international politics are such that what we have may be the best we
can hope for in any case.  There are always things you can do better
the second time, or think you can.  So their equivalent of IP is sort
of the same, but the bits are in different places, the documentation
is written in the usual impenetrable ISOese (Reading this stuff makes
me appreciate Postel's real achievements in writing readable
specifications.), and there are a few more features here and there.
Similarly with TP4.  I'm not exactly jumping for joy.  The bureacrats
are convinced that ISO will save them all this money, because they can
get the vendors to support it instead of having to pay all those
university types to implement it the way they have done for TCP/IP.
But of course that won't ever happen.  The government is going to pay
for ISO development too, one way of the other.  No way this conversion
is going to save them money.  Despite the demo implementations that
exist now, it will be a couple of years before it is widely available.
And we'll have to deal with two kinds of networks in parallel for
several years.  I can think of no technical benefit that will come
from the changeover.  But it will happen, and we'll all live.
Processor power and bandwidth is going up fast enough that any extra
overhead involved in the new protocols won't sink us.  In the
meantime, if you don't like excitement, stick with TCP/IP for
production use, but start experimenting with ISO, and make sure all
the vendors you deal with for networking and communications are
working on ISO.

mel1@houxa.UUCP (06/11/87)

Thanks to all who supplied comments to my questions on OSI vs
TCP/IP.  Unfortunately, none supplied answers.

When I refered to OSI vs TCP/IP, I was just using those labels for
the whole class of communications capability, not just the OSI
reference model vs the TCP/IP layers of the DOD network.

Several replys presented the theme that large corporations and
government agencys "supported", "endorsed", or "were committed to"
the OSI/ISO standards.  I don't know what that means.  In most cases
the organizations mentioned market products or install systems that
provide similar functions using quite different protocols.  Am I off
base in believing that those actions represent just the opposite of
support, endorsement, and commitment?

Several replys mentioned a variety of different protocols for some of
the ISO layers.  How does that fit the concept of a "standard"?  Is
this 1984 "double speak"?

I am just a user of already deployed interconnected networks that use
a truly fantastic variety of computer systems, hardware, and
connection media all based on TCP/IP (with rcp, rsh, rlogin, ftp,
telnet at the top for most UNIX users; and goodness knows what on the
bottom to actually connect in).  Isn't this whole stack already a
standard (with an existance proof)?  What is the replacement for all
this?  What does the replacement offer as an inducement to switch?

The TCP/IP people have a very active newsgroup discussing technical
details of the protocol.  I don't understand any of it, but find it
quite amazing that there is still growth, discussion, and willingness
to learn and change so many years into the life of the product.  Or,
is this just an indication that the wonders I see are held together
with bailing wire and string?  Does ISO/OSI have such an activity?

   Mel Haas  ,  odyssey!mel

sas@pyramid.UUCP (Scott Schoenthal) (06/11/87)

In article <1204@botter.cs.vu.nl> ast@cs.vu.nl (Andy Tanenbaum) writes:
>There has been a lot of generalized disgust with OSI expressed here and
>elsewhere.  I would be very interested in hearing specific comments about
>  1. What is wrong with the OSI model itself.
>  2. What is wrong with the specific protocols ISO has adopted.
>
> [ ... ]
>
>Nevertheless, there are certainly plenty of valid criticisms of the model and
>the protocols (e.g., the session layer is pointless, the presentation layer
>is practically empty, they forgot about encryption altogether etc.).  I would
>like to see a discussion of this subject, preferably by people who know what
>they are talking about.
>
>Andy Tanenbaum (ast@cs.vu.nl)

I believe that Andy knows what he is talking about and I would certainly
be interested if he would expand on the criticisms he mentions in his posting.

While I did refer in an earlier posting to the political aspects of adoption
of an international standard (the phrase '"bomb-crazed" American military'
was an impetuous addition which I now regret), I believe that we should
consider here (or hopefully in a comp.protocols.iso) mainly the technical
issues of the ISO/OSI model and protocol definition and implementation.
Hopefully, this could include MAP/TOP specific protocols (e.g., Directory
Services, Network Management) and relevant CCITT protocols (e.g., X.400)
as well.

sas
----
Scott Schoenthal		        Pyramid Technology Corp.
pyramid!sas				Mountain View, California

richards@ditmela.UUCP (06/12/87)

In article <1204@botter.cs.vu.nl> ast@cs.vu.nl (Andy Tanenbaum) writes:
>Virtually everyone now agrees that the OSI model is a good way to look at
>networking.  The war is about which protocols which be used in which layer.
To the entent that everyone agrees that networking should be performed
by layered "entities" communicating with layer protocols and each
layer using the services of *a* layer below it and providing services
to *a* layer above it, then probably everyone (even Mike Padlipsky!)
is in agreement. Of course the OSI Reference Model goes much further
than that, eg. it precludes "layer skipping", ie. a layer using the
services of a layer not directly below it. Furthermore, IS 7498 SAYS
there are SEVEN layers and says roughly what their purposes are. You
will have a lot of difficulty getting some people to agree with that.

>TCP is clearly one candidate for the transport protocol, but most
>companies in the U.S., and virtually all companies outside the U.S. are
>committed to supporting the ISO OSI transport protocol and the ISO protocols
>in layers 5 through 7 too.  (1-3 are much fuzzier, what with IEEE 802 etc.)
First, it goes without saying that the OSI reference model achieves
very little towards interoperability (how many times have you seen
Sales brochures using disgustingly misleading phrases like "our networking
complies with the OSI Model"?) Standards are about interoperability.
ISO standards exist for protocols up to layer 5, Presentation is about
to go to IS status as are a number of Application Layer standards
including FTAM. Down at layers 1-3, the IEEE 802 standards are
becoming IS8803 and the connectionless network protcocol (equivalent
in most senses to IP) is already an international standard.
So make no mistake, the standards ARE here and the
weight of support for their adoption is enormous.
Frankly, the possibility of TCP/IP becoming part of the OSI "suite" is
long since past, and before people criticize that, make sure you have
examined ISO TP-4 in comparison with TCP.

In any case, irrespective of the technical merits of any of the OSI
protocols, acceptance of what is standard rather than what is best is
unfortunately necessary. This was the view expressed in
message <1680@munnari.oz> where kre@munnari.oz (Robert Elz) writes:
>The whole purpose
>of standardisation is for political considerations to override the
>technical ones.  And no, I'm not being cynical.  The absolute essential
>for a standard is for everyone to agree with it, and getting everyone
>to agree means lots of compromises.
>There's absolutely no hope of a technically perfect standard, especially
>not in any area where there's any dispute about what is perfect.
Unfortunate, but so, so true.

In article <1204@botter.cs.vu.nl> ast@cs.vu.nl (Andy Tanenbaum) continues:
>There has been a lot of generalized disgust with OSI expressed here and
>elsewhere.  I would be very interested in hearing specific comments about
>  1. What is wrong with the OSI model itself.
>  2. What is wrong with the specific protocols ISO has adopted.
and also
>I would like to see a discussion of this subject, preferably by people 
>who know what they are talking about.

First, I thoroughly agree with the the last statement. We need more
discussion and we need it from people who know what they are talking
about. Given the FACT that OSI standards will happen, the closer we
can go to getting them right the better! 
Unfortunately there are many contributions on the net and elsewhere
(Padlipsky's book is an example) from people who in my view have seen
some early OSI stuff, have said "It'll never work" or "What's wrong
with Arpanet?" and they haven't even attempted to keep up to date with
the latest development in OSI. So let's have input from people who
know what the latest standards say.

One could write a whole book on the two questions raised above, and
indeed day by day, experts all around the world are contributing
comments to Standards Committees for consideration in the further
development of standards. For the time being, let me summarise what I
see as the biggest single problem with the OSI Model: THE ROLE OF THE
PRESENTATION LAYER.

One problem arises with Message Handling systems (a la X.400 which is
currently being standardized by ISO also, and there is a commitment
for complete alignment of X.400 and the corresponding ISO standards).
X.400 provides for a kind of "sub-layering" in the Application Layer
with the higher layer handling particular message types, eg. Inter
Personal Messaging (Mail) and the lower layer handling Message
Transfer. The reference model says that the encoding ought to be done
by the Presentation Layer so the message passed to the Message
Transfer Sub-Layer must (at least conceptually) be unencoded. X.400
provides for relaying so that the message may be received by a Message
Transfer Agent (MTA) on an intermediate machine (or several) which will
forward it on to another MTA, eventually reaching the right machine 
which where the MTA will pass the message "up" to a User Agent, ie. it
will deliver the mail. 

Now the Presentation Service (quite properly)
provides for different parts of the data to be encoded in different
ways so that for instance, the Message could be encrypted. But how
does the Presentation Layer on the intermediate machine (which we assume 
for security reasons doesn't have the capability to decrypt the 
message) unencode the message so it can pass it up to the MTA? Well of
course it can't, and indeed the situation couldn't have arisen because
the two communicating Presentation Entities would have failed in their
attempts to negotiate a common transfer encoding.

What is the solution? Well, in my view, the Presentation Layer doesn't
belong as a true Layer in the OSI model but should instead be
provided as a so-called Application Service Entity (ASE) that can be
used by other parts of the application layer as and when they see fit.
There is nothing wrong with having another ASE - there are already
quite a few of them (Remote Operations, Reliable Transfer, Commitement
Concurrency and Recovery just to name three). A Presentation ASE could
still negotiate with its peer, but another part of the Application
layer, eg. the MTA described above, could choose if and when it wants to
use it.

This contribution has gone on long enough, but it should  also be
stated that there are other problems with the positioning of the
Presentation Layer that have to do with applications that want to do
checkpointing, but because they are dealing with unencoded data, they
don't have any concept of data size and thus where checkpoints should
be placed. Perhaps we can pursue that problem in another article.

Ian Richards.

karn@faline.UUCP (06/13/87)

In article <1204@botter.cs.vu.nl>, ast@botter.UUCP writes:

> Virtually everyone now agrees that the OSI model is a good way to look at
> networking.  The war is about which protocols which be used in which layer.

About the only thing virtually everybody agrees on is that hierarchical
layering is usually a good idea in a computer communication network. 
The ISO Reference Model (not so fondly called "eyesore-emm" by
Padlipsky) is only one of several possible hierarchical models, and a
rather outdated one at that.

Among the major flaws of the ISO Reference Model are:

1. A fixed number (7) of layers. In a real network there may well be
more or less than 7 layers. The important thing is the relative position
of a protocol in the hierarchy and the function it performs, not the
fixed "level x" designator it might have.  Jon Postel and Danny Cohen
wrote a paper a few years ago in which they examined some real
networking systems and showed that either a) N = N + 1 (for any value
of N), OR b) the notion of "seven and only seven layers" is
fundamentally flawed.

2. It completely ignores internetworking. This is related to point #1,
since in a real internetwork you may very well have two or more network
layers in a "stack", e.g., a subnet layer underneath an internet layer.
(Some people do split ISO Layer 3 into Layer 3A, the Subnet layer, and
Layer 3B, the Internet layer.)  The fact that the model still doesn't
formally recognize the very real existence of and need for internetworking
says something about the motivations of those who influence the ISO.

3. Overly redundant layer functionality. My pet peeve is the use of the
term "reliable" in the link layer description, implying that the primary
burden for reliable delivery of information rests here instead of the
transport layer where it belongs. No other concept has contributed so
much to needless complexity, inflated costs and lousy performance than
the stubborn notion that each and every layer must "guarantee"
reliability, usually through the use of an overhead-laden connection-
oriented protocol.

A decade ago this mentality brought you X.25.  Now it has resurfaced in
an even more astonishingly byzantine creation, "IEEE 802.1 Connection-
Oriented Logical Link Control" (basically X.25 over Ethernet, believe
it or not). For more on the general subject of end-to-end vs low level
reliability mechanisms, see "End-to-end Arguments in System Design" by
Jerome Saltzer of MIT.

4. While important concepts are ignored, another layer exists whose
function is questionable at best: the Session layer. I've yet to figure
out just what it's supposed to do, and why a separate layer is needed to
do it.

5. While not a fault of the ISO RM per se, some of its overly zealous
followers (whom Padlipsky also not-so-fondly refers to as ISORMites,
pronounced "eyesore mites") tout it as *the* way a network *must* be
built. Even the originators of the ISORM never intended it as anything
other than as a general guide to *naming* the pieces of *existing*
networks. For example, I've had people tell me that I can't have a
"network" without a separate Session layer, even though TCP and UDP have
perfectly adequate port numbering and "well known socket" mechanisms.
When I ask why, they say "ISO says so".

In addition to the faults of the underlying reference model, the ISO/OSI
"protocol suite" has a host of faults of its own.  First and foremost
among them is the fetish for connection-oriented protocols. Only
recently did a connectionless transport protocol get added, despite
the widespread use of UDP in the ARPA Internet for things like network
databases and distributed file systems. On the other hand, there are a
FIVE different and mutually incompatible  protocols all providing a
connection-oriented transport service (TP-0 thru TP-4). If the ISO was
*really* serious about "open systems interconnection", they would pick
ONE connection-oriented transport protocol (TP-4, the most general one).
They claim you don't need all that reliability if you're running on a
PTT network, but of course the real reason is that they're scared to
death of internetworking. There's no way a PTT is going to allow it to
happen unimpeded.

Yes, eventually you may be able to pick a "subset" of the ISO stack that
answers the needs of the internetworking world. But if you do, you end up
with something that is similar to, but (deliberately) incompatible with
TCP/IP. So why bother?

In summary, if you think open systems interconnection is a good idea, I
agree. That's why I and so many others use TCP/IP. I have nothing
against migrating to an international standard if it is provably
superior to what we have (e.g., the metric system vs the English system)
but this is *not* the case with OSI in its present form.  I also dislike
the "bomb crazed military", but I also see no reason not to take their
technology and beat it into plowshares.  In fact, it gives me a real
feeling of satisfaction to take military technology and pervert and
subvert it to peaceful uses!

Phil

martillo@bloom-beacon.UUCP (06/15/87)

Personally, I have always found this confusing because I have
read the ISO documents and have never seen anything which implies
there must be only one protocol at every layer.  Further, I thought
swap in and swap out of protocol layers should be possible.

TCP and IP are tailored to each other but I have seen nothing
which implies that TCP could not run over ISO IP or which implies
TP4 could not run over IP.

In fact there might be reason to tailor a transport protocol for
certain classes of protocols.  A remote virtual disk server for a PC
can certainly get quite hosed when the PC is unexpectedly turned off,
why should the host also have to deal with abnormal termination of the 
transport layer.  Perhaps VCs at level 4 are not always a good idea.
Unfortunately TP0-TP4 are all VC oriented (I'm not sure) maybe a UDP
like level 4 should be defined, in fact maybe remote virtual disk
applications are sufficiently unique that a special level 4 should
be defined.

In any case I don't quite understand why IP and ISO IP can't be
coresident in the network.  The communications subnet protocol will
have some way of indentifying the level 3 protocol to the host level 3
layer software (like the type field in ethernet 2.0 or like ssap/dsap
tuples in IEEE 802.2)

IEEE 802.2 and ISO level 2 puzzle me as well.  These are protocols for
the communications subnet and I don't quite understand why IEEE and
ISO are trying to define communications subnet protocols for all time.
Shouldn't communications subnet protocols be medium-dependent?

martillo@bloom-beacon.UUCP (06/15/87)

Just a note on X and NeWS.

NeWS is a postscript based graphics system for high resolution
graphics devices which can be used to provide windows.

X is a window system which has some graphics primitives.  

They are not comparable as alternate standards in view of the underlying
mechanism or design or philosophy.

The question is whether window systems should be implemented on top of
graphics systems or whether graphics systems should be built on
graphics systems.  It maybe partially a religious issue (but I suspect
not because virtualizing a raster device on top of a raster device
makes sense to me while virtualizing a raster device on top of a
graphics system on top of a raster device seems to introduce an
extralevel of complexity) but Adobe has announced that it will
implement postscript on top of X.

chuck@amdahl.UUCP (06/15/87)

In article <920@bloom-beacon.MIT.EDU> martillo@athena.mit.edu (Yakim Martillo) writes:
>IEEE 802.2 and ISO level 2 puzzle me as well.  These are protocols for
>the communications subnet and I don't quite understand why IEEE and
>ISO are trying to define communications subnet protocols for all time.
>Shouldn't communications subnet protocols be medium-dependent?

Actually, if you look closely at 802.2, you'll notice that the IEEE
defines an interface within the datalink layer.  802.2 defines
the logical link control layer, and is, and should be, medium-independent.
Underneath the logical link control layer there exists a medium
access control layer which is, naturally, highly medium-dependent.

The advantage to this approach, of course, is that the MAC layer
is extremely simple, while the LLC layer is relatively complex.
Making the LLC layer hardware independent makes it easier to port
LLC layers from one machine to another.  The MAC layer must be
written anew for each machine and for each type of wire attached
to the machine, but since it is relatively simple, this porting
cost is not great.

-- Chuck

martillo@athena.mit.edu (Yakim Martillo) (06/16/87)

In article <8613@amdahl.amdahl.com> chuck@amdahl.UUCP (Charles Simmons) writes:
>In article <920@bloom-beacon.MIT.EDU> martillo@athena.mit.edu (Yakim Martillo) writes:
>>IEEE 802.2 and ISO level 2 puzzle me as well.  These are protocols for
>>the communications subnet and I don't quite understand why IEEE and
>>ISO are trying to define communications subnet protocols for all time.
>>Shouldn't communications subnet protocols be medium-dependent?

>Actually, if you look closely at 802.2, you'll notice that the IEEE
>defines an interface within the datalink layer.  802.2 defines
>the logical link control layer, and is, and should be, medium-independent.
>Underneath the logical link control layer there exists a medium
>access control layer which is, naturally, highly medium-dependent.

No, this is incorrect because the supposedly medium-independent part
of the level 2 (logical link control) is basically a member of the
X.25 level 2 like family of protocols.  These protocols make or
enforce some very specific assumptions about the medium and how you do
networking.  They assume you really want to establish a perfect
virtual wire at level 2 on a relatively noisy telephone-line-like
medium and that you either never do internetting or will do so at the
cost of some very complicated flow control procedures.  They also
assume you will not have transmit windows at higher protocol layers.

This family of protocols was developed for the PTTs which have a very
specific type of medium and have some very specific constraints on the
type of services they can provide and on the type of services which
they want to provide.  The PTTs consider remote terminal sessions and
file transfer to constitute the full range of data communications for
computers.

While I do not always quite believe theoretical estimates, I have seen
estimates that over FDDI, LLC could provide maximum of 1.7 megabit
transfer rates.  In any case I see no obvious reason to use similar
level 2s on a point-to-point medium like a token ring and on a
broadcast medium like an ethernet.

>The advantage to this approach, of course, is that the MAC layer
>is extremely simple, while the LLC layer is relatively complex.
>Making the LLC layer hardware independent makes it easier to port
>LLC layers from one machine to another.  The MAC layer must be
>written anew for each machine and for each type of wire attached
>to the machine, but since it is relatively simple, this porting
>cost is not great.

This argument I have always found silly.  I do not consider myself a
particularly fast coder but last week I implemented LLC from scratch
for an ethernet in about 3 evenings of work and then 4 evenings of
debugging.  The other level 2s I have implemented have been simpler
and required even less work.  Thus the value of a portable level 2
seems negligible to me especially since level 2s are by there nature
confined to a single communications subnet.  Now if you made the
argument at the transport level I would give it more credence.

By the way I am using LLC for remote terminal sessions with no higher
layers and it really screams but I would think twice about using it in
a situation where I was doing real networking like a network file
system or where I needed security.

howard@COS.COM (Howard C. Berkowitz) (06/16/87)

In article <920@bloom-beacon.MIT.EDU>, martillo@athena.mit.edu (Yakim Martillo) writes:
> Personally, I have always found this confusing because I have
> read the ISO documents and have never seen anything which implies
> there must be only one protocol at every layer.  Further, I thought
> swap in and swap out of protocol layers should be possible.

It is emphatically true that there need not be one protocol per layer;
examples are given below.  The ISO OSI Reference Model is a context
for defining specific layer services and protocols; Implementors'
Agreements and Functional Profiles details the options to be used
if interoperability is the goal.  The Corporation for Open Systems
(COS) currently has a number "protocol stacks" defined for future
conformance certification; these stacks have a fair variation of
lower-layer protocols( i.e., various LAN and WAN technologies)
 supporting upper-layer messaging (MHS/X.400)
and file transfer, access, and management (FTAM).  More stacks
are being defined.
> 
> TCP and IP are tailored to each other but I have seen nothing
> which implies that TCP could not run over ISO IP or which implies
> TP4 could not run over IP.
> 
> In fact there might be reason to tailor a transport protocol for
> certain classes of protocols.
To some extent, this is being done now.  ISO defines five classes
of the transport protocol, Class 0 having minimum functionality
and Class 4 maximum (essentially that of TCP).  COS uses Class 4
for most applications, but allows Class 0 for certain modes of
operation over X.25 networks, which provide lower-layer error
recovery not offered by LANs.
> 
> In any case I don't quite understand why IP and ISO IP can't be
> coresident in the network. 

This should be possible.  Note, however, that their functionality
is quite similar, and DoD has stated a policy of migration to ISO.

>The communications subnet protocol will
> have some way of indentifying the level 3 protocol to the host level 3
> layer software (like the type field in ethernet 2.0 or like ssap/dsap
> tuples in IEEE 802.2)
> 
> IEEE 802.2 and ISO level 2 puzzle me as well.  These are protocols for
> the communications subnet and I don't quite understand why IEEE and
> ISO are trying to define communications subnet protocols for all time.

Realize first that ISO has split Layer 2 into two sublayers:  the
Logical Link Control (LLC) sublayer, where 802.2 lives, and the Media Access
Control (MAC) Layer, which defines the mechanism used to control access
to the shared medium, as opposed to the medium-dependent Layer 1
mechanisms used to transmit over it.

802.2 is medium independent, and basically provides framing and
limited error detection.  It is practically necessary, in an
implementation context, to shield upper layers from some of the
details of interrupt handling, buffer management, etc.  An 802.2
interface can be convenient at the communications chip level,
to give a relatively constant interface to upper layers using
quite different lower layers.

IEEE and ISO definitely are not trying to define communications
subnet protocols for all applications.  Again, this comment seems
to represent the common misconception that the OSI community 
prescribes one protocol per layer; it simply does not.

At the MAC sublayer, there are three especially common protocols
using different media access control approaches:
802.3 (using Carrier Sense Multiple Access/Collision Detection),
802.4 (using Token Passing Bus), and 802.5 (using Token Passing
Ring).  802.3, essentially equivalent to Phase 2 ETHERNET, is 
a robust technology, rather easy to implement.  It does not offer
deterministic delay, which is needed for process control applications
[note:  there is much theological debate about whether it is;
I leave that to the theologians.].  802.4 is the preferred LAN
protocol of the Manufacturing Automation Protocol (MAP) user group.
802.5 offers high reliability and compatibility with certain non-OSI
protocols as seen in SNA architecture.

MAC and LLC protocols can mix and match on top of specific media.
For example, 802.3 protocols have well-defined physical subtypes
appropriate for different environments, identified as 802.3 XYZ,
where X is the data rate in megabits per second, Y is the medium,
and Z is the maximum physical length in hundreds of meters:

       10Base5 is thickwire "ETHERNET" cable -- 10 MBPS for 500 M
        1Base5 is "STARLAN" type twisted pair
       10Broad36 is a broadband implementation...

Similar variants exist for 802.4 and 802.5.  Other LAN protocols
are emerging for specific communities of interest, such as FDDI
very-high-speed optical fiber with kilometer range.

The key point here is not that there is one protocol, but a whole
family of protocols with standardized interfaces between layers.
Internetworking is a Layer 3 problem, not Layer 2, so, for example,
the goal is to have a common Layer 3 for a variety of quite necessary
LANs.

----------------------------------

SEMI-DISCLAIMER

   I am a conformance testing system developer for the Corporation
for Open Systems, and primary instructor for the COS seminar.  Information
in this posting are accurate to the best of my knowledge, as a worker
in the field.  Nevertheless, statements here are not necessarily the
final word of the Corporation for Open Systems, ISO, ANSI, IEEE,
CCITT, the Internal Revenue Service, etc.
> Shouldn't communications subnet protocols be medium-dependent?
MAC and PHY (Layer 1) protocols are, MAC somewhat so and PHY definitely.

ast@botter.UUCP (06/17/87)

In article <3002@pyramid.UUCP> sas@pyramid.UUCP (Scott Schoenthal) writes:
>I believe that Andy knows what he is talking about and I would certainly
>be interested if he would expand on the criticisms he mentions in his posting.

Ok.  For one thing, I think the session layer is ridiculous.  All it really
does is keep track of whose turn it is to talk and do some checkpointing.
I think most applications know whose turn it is to talk.  If I am addressing
an editor on a remote machine, we really don't need a whole layer to keep
track of whether I am allowed to type or it is the editor's turn to say
something.  In the British proposal to ISO years ago, there was no session
layer.  I think they were right.  The session layer was probably included
because IBM had one, and people must have assumed that if IBM did it, it
must be a good idea.  I am not convinced that there are enough applications
that use the session layer to make it worth having.   The ARPANET model
does not have any session layer and I have never heard of anyone saying he
needed it.

The presentation layer.  It is practically empty now.  All that seems to be
left is ASN.1 and ASN.2, which are several hundred pages of mumbo jumbo
for the purpose of telling which order the bytes are in (VAX, Intel = little
endian) vs. (68000, IBM 370 = big endian).  This seems overkill to me.

Encryption.  ISO seems to be totally unable to get its act together.  Other
than unambiguous statements that encryption does not belong in the session
layer or physical layer, it seems that all others are possible, although
lately I have been hearing noises that maybe presentation is "in" again.
I think spreading it out all over the place is a disaster.  Logically I
think it belongs in presentation--it deals with "meaning" in some sense.
In any event, the current situation is a disaster.

Andy Tanenbaum (ast@cs.vu..nl)

lamaster@pioneer.arpa (Hugh LaMaster) (06/17/87)

In article <933@bloom-beacon.MIT.EDU> martillo@athena.mit.edu (Yakim Martillo) writes:

>
>No, this is incorrect because the supposedly medium-independent part
>of the level 2 (logical link control) is basically a member of the
>X.25 level 2 like family of protocols.  These protocols make or
>enforce some very specific assumptions about the medium and how you do
>networking.  They assume you really want to establish a perfect
>virtual wire at level 2 on a relatively noisy telephone-line-like
>medium and that you either never do internetting or will do so at the
>cost of some very complicated flow control procedures.  They also
>assume you will not have transmit windows at higher protocol layers.
>

There are several things I don't understand about this.  First, as I look at
ISO, X.25 is at level 3 with associated link procedures at level 2, and a spec
to connect to physical media at level 1.  What don't I understand about this,
since you are referring to X.25 as a level 2 protocol?  Do you mean the link
level protocol associated with X.25 only?  

Also, as I understand (?!) the E-S to I-S (if I'm not mixing it up) ideas
floating around, there will be a gateway protocol defined using X.25 packet
addressing to handle WAN's.  In a TP4/ISO IP LAN, there will be an X.25
gateway which will repackage the contents of an IP packet as the contents of
an X.25 packet; somehow, there will be some way to tell the X.25 gateway on
the other side what IP address you want there, and then the data goes over
X.25 to the other gateway where it is repackaged again in IP.  Now, I heard
this from two independent sources, but I may be confused.  If this is the way
it will work, it is execrably stupid.  The "correct" way to run over X.25 (I
am NOT saying there is an existence proof which demonstrates that there IS a
correct way to use X.25  :-)   )   is to view it as an overkill layer 2
protocol which links 2 "IMPS" or "gateways" or "IP routers" depending on what
you are doing.  In fact, arpa now supports X.25 as a level 2 host to IMP
protocol, "replacing" 1822.  Some ISORMites may not like the redundancy in
some layer three functions this way, but what is the alternative?  At least
this way you will be able to create an arpa type of internet/network/subnet
uniform addressing, which you won't be able to do the other way.  

I would like to see more postings from some of the ISO gurus who are now
appearing on the net regarding this subject; I appreciate the responses that
have appeared so far, but I am not satisfied with the answers about
"internetworking".


>
>While I do not always quite believe theoretical estimates, I have seen
>estimates that over FDDI, LLC could provide maximum of 1.7 megabit
>transfer rates.  In any case I see no obvious reason to use similar
>level 2s on a point-to-point medium like a token ring and on a
>broadcast medium like an ethernet.
>

What is the estimate for LLC over Ethernet?  Do you mean virtual circuit LLC
or packet LLC?  [I would hate to think that packet LLC can't run at Ethernet
speeds...]  I think that the "motivation" was that token bus, broadcast, and
FDDI were all so "similar" that there was no point in making them different.
I see the real question as: Why is there any connection oriented service at
all in LLC?  But then, I like packet networks, and CCITT and IBM don't, and
IEEE wanted to make both CCITT and IBM happy, right?

-- 


  Hugh LaMaster, m/s 233-9,  UUCP {seismo,topaz,lll-crg,ucbvax}!
  NASA Ames Research Center                ames!pioneer!lamaster
  Moffett Field, CA 94035    ARPA lamaster@ames-pioneer.arpa
  Phone:  (415)694-6117      ARPA lamaster@pioneer.arc.nasa.gov

("Any opinions expressed herein are solely the responsibility of the
author and do not represent the opinions of NASA or the U.S. Government")

martillo@athena.mit.edu (Yakim Martillo) (06/18/87)

I think X.25 level 2 and LAPB are fairly frequently used
interchangeably.  This is slightly erroneous because X.25 level 3 can
run over other link access protocols.  Also I meant the X.25 designers
basically assumed that you would never have a transmit window in a
protocol above level 3.  LAPB has a window basically for
error-handling and X.25 level 3 has a flow control window.  Anyone who
has tried to run kermit over a PSPDN knows how well all the
transmission windows interact.

karn@faline.UUCP (06/18/87)

In article <1214@botter.cs.vu.nl>, ast@botter.UUCP writes:
> Encryption.  ISO seems to be totally unable to get its act together.  Other
> than unambiguous statements that encryption does not belong in the session
> layer or physical layer, it seems that all others are possible, although
> lately I have been hearing noises that maybe presentation is "in" again.
> I think spreading it out all over the place is a disaster.  Logically I
> think it belongs in presentation--it deals with "meaning" in some sense.
> In any event, the current situation is a disaster.

I think there are some good reasons for encrypting at more than one
layer.  End-to-end encryption is the most effective way to keep a
message's contents private, especially if you want to use any available
network (e.g., a PDN), since nothing in the network need be trusted.
There is probably something to be said for encrypting anything that the
network doesn't absolutely have to have to do its job, so you might as
well encrypt the transport header as well.  In other words, encrypt
on an end-to-end basis on the interface between L3 and L4.

However, end-to-end encryption doesn't protect you against traffic
volume analysis by someone outside the network monitoring its links, so
encryption on a per-link layer is still necessary. The only remaining
threat then becomes traffic analysis from within the network itself.
This is virtually impossible to prevent since the network must have
readable addresses in order to do its job; about the only thing you can
do is generate lots of garbage traffic to random destinations to spoil
their statistics -- IF you happen to have money to burn (i.e., work for
NSA).

You could go further and build a hierarchy of networks with encryption
in each.  For example, you could build a TCP/IP Internet where the
gateways use X.25 public networks (possibly having internal encryption)
to pass encrypted IP datagrams which themselves contain end-to-end
encrypted TCP data segments. A dishonest subnet could then only analyze
a fraction of the total Internet traffic, and those observations would
be much less precise because of the (hidden) multiplexing and routing
changes going on at the IP layer. It is entirely possible that one of
the unstated reasons for DoD's insistence on datagrams is to allow
"gratuitous rerouting" (i.e., route changing not necessitated by link
failures or congestion). This would be yet another technique to foil
traffic analysis attempts at the lower layers.

So redundant encryption still makes sense, so that the lower the layer,
the less trusted its components have to be.

Phil

lamaster@pioneer.arpa (Hugh LaMaster) (06/18/87)

In article <1800@ames.UUCP> lamaster@pioneer.UUCP (Hugh LaMaster) writes:

>
>Also, as I understand (?!) the E-S to I-S (if I'm not mixing it up) ideas
>floating around, there will be a gateway protocol defined using X.25 packet
>addressing to handle WAN's.  In a TP4/ISO IP LAN, there will be an X.25
>gateway which will repackage the contents of an IP packet as the contents of
>an X.25 packet; somehow, there will be some way to tell the X.25 gateway on

It seems that I have mixed it up; I have received several replies to that
effect.  My apologies.  X.25 (level 3?) will, it seems, be used as an
alternate "level 2.5" protocol.  Is 802.2 also considered "level 2.5"?
Is there a draft standard on this yet?  What ISO number is it?

  Hugh LaMaster, m/s 233-9,  UUCP {seismo,topaz,lll-crg,ucbvax}!
  NASA Ames Research Center                ames!pioneer!lamaster
  Moffett Field, CA 94035    ARPA lamaster@ames-pioneer.arpa
  Phone:  (415)694-6117      ARPA lamaster@pioneer.arc.nasa.gov

("Any opinions expressed herein are solely the responsibility of the
author and do not represent the opinions of NASA or the U.S. Government")

aweinste@Diamond.BBN.COM (Anders Weinstein) (06/18/87)

I thought that the OSI Session layer was derived from the CCITT Teletex
protocol (S or T.62). I believe most of the OSI Session-layer operations are
just Teletex session functions couched in more abstract terms, ie.
"activities" correspond to Teletex "documents", OSI synch points correspond
to pages, etc.

Not that this makes it a good idea or anything...

howard@cos.UUCP (06/19/87)

In article <1214@botter.cs.vu.nl>, ast@cs.vu.nl (Andy Tanenbaum) writes:
> In article <3002@pyramid.UUCP> sas@pyramid.UUCP (Scott Schoenthal) writes:
> >I believe that Andy knows what he is talking about and I would certainly
> >be interested if he would expand on the criticisms he mentions in his posting.
> Encryption.  ISO seems to be totally unable to get its act together.  Other
> than unambiguous statements that encryption does not belong in the session
> layer or physical layer, it seems that all others are possible, although
> lately I have been hearing noises that maybe presentation is "in" again.
> I think spreading it out all over the place is a disaster.  Logically I
> think it belongs in presentation--it deals with "meaning" in some sense.
> In any event, the current situation is a disaster.
> 

The reason encryption can be defined in multiple layers is that encryption
is used for different purposes in different layers.

The usual view of encryption is that it is intended for protecting
information from viewing by unauthorized readers.  This is not always
true; disclosure of contents in, for example, many financial applications
is no major threat, but real problems could be caused by replaying
legitimate information.  It can be appropriate to encrypt the message
number part of a credit authorization message.

Protection from duplication/replay, sender authentication, avoidance
of repudiation of reception (e.g., registered letters), all are reasons
to encrypt in the application layer.

Transport-layer encryption protects message contents on an end-to-end
basis.  If encryption is done at the transport or presentation layers,
however, message headers must be in clear (or a different cryptosystem)
so that the network and data link layers can extract information
needed to route messages.  In some applications, such as tactical
military systems, it can be important to protect against traffic
analysis:  gaining information by knowing how much traffic, at what times,
are being sent from one endpoint to another.

To protect against traffic analysis, the link level must be encrypted
or physically protected.  Again, this is only needed if traffic analysis
is a concern, or, if for administrative reasons, it's easier to distribute
encryption keys on a link-by-link rather than end-to-end basis.

kre@munnari.oz (Robert Elz) (06/19/87)

In article <943@bloom-beacon.MIT.EDU>, martillo@athena.mit.edu (Yakim Martillo)
writes:
> ... X.25 level 3 has a flow control window.  Anyone who
> has tried to run kermit over a PSPDN knows how well all the
> transmission windows interact.

Huh?  I always thought that the problem with kermit over
x.25 nets is precisely because kermit doesn't have a windowing
flow control scheme (or it has the terminal case, of a window
size of 1).

That is, kermit sends a packet, then waits for an ack.

Packet turnaround in x.25 networks is typically fairly slow,
but this is neither a problem with x.25, nor with the windowing
scheme (which is effectively a no-op when protocols like
traditional kermit are used above it).  Rather, its a problem
with the comparatively low capacity technology used to implement
the networks.

I doubt I'm alone in this belief, as I gather that the kermit
people are defining a new protocol (extended protocol) with
windowing in it, precisely so it will work *better* over x.25
type networks.

kre

howard@COS.COM (Howard C. Berkowitz) (06/19/87)

In article <1818@ames.UUCP>, lamaster@pioneer.arpa (Hugh LaMaster) writes:
> In article <1800@ames.UUCP> lamaster@pioneer.UUCP (Hugh LaMaster) writes:
> 
> It seems that I have mixed it up; I have received several replies to that
> effect.  My apologies.  X.25 (level 3?) will, it seems, be used as an
> alternate "level 2.5" protocol. 

A fine distinction here:  OSI has "layers;" X.25 has "levels."
X.25 Level 3 = OSI Layer "2.5" (more or less).  The 1984 version
of X.25 has several extensions for greater OSI compatibility,
including the ability to extend addresses from the X.121 14-digit
maximum to the 32-digit maximum of the OSI Network Service.

> Is 802.2 also considered "level 2.5"?

802.2 has several classes of operation.  The simplest, Class 1,
is connectionless and offers no error correction.  This class
has been adopted by the NBS Workshop for OSI Implementors:
"Only the connectionless type 1, class 1, IEEE 802 service
will be used."  COS and MAP/TOP also use class 1 only.

802.2 Class 1 has very minimal functionality, and basically
serves the implementation role of insulating Layer 3 from
the timing and buffer issues of the MAC sublayer of Layer 2.
As a minimal protocol, it is much less than X.25, and thus
is considered pure Layer 2 (Logical Link Control -- LLC -- sublayer).

NBS, COS, and MAP/TOP all assume Internet on top of LLC1.

> Is there a draft standard on this yet?  What ISO number is it?

So far, all standards out of the 802 Project have been given
"derivative" international numbers:  802.X = ISO 8802/X.
For example, 802.3 is ISO 8802/3.

nguyen@amd.UUCP (06/20/87)

In article <1214@botter.cs.vu.nl>, ast@cs.vu.nl (Andy Tanenbaum) writes:
> In article <3002@pyramid.UUCP> sas@pyramid.UUCP (Scott Schoenthal) writes:
> >I believe that Andy knows what he is talking about and I would certainly
> >be interested if he would expand on the criticisms he mentions in his posting.
> 
> Ok.  For one thing, I think the session layer is ridiculous.  All
it really ...

	I don't think this comment is neccessarily constructive.  It
is too early to remove the session layer altogether from the ISO's
OSI.  The development for most upper layers protocols has not proved
maturity for everyone to accept as standards and NO ONE really know
what all layers have to be in the future.  There are ton of
different applications which can exist in all kinds of networks. 
Who knows?...
	I would rather have a null layer to by pass so I can
reconfigure the adjacent interfaces when the 'null' is no longer
necessarily empty later.  Some one proved that the session layer is
not null (such as IBM) must have a very good reason for it! As we
all know that most network layer implementation are null!!!. This
doesn't seem to hurt any body.

Quinn Nguyen

blarson@castor.usc.edu (Bob Larson) (06/20/87)

In article <1707@munnari.oz> kre@munnari.oz (Robert Elz) writes:
 >In article <943@bloom-beacon.MIT.EDU>, martillo@athena.mit.edu (Yakim Martillo)
 >writes:
 >> ... X.25 level 3 has a flow control window.  Anyone who
 >> has tried to run kermit over a PSPDN knows how well all the
 >> transmission windows interact.
 >
 >Huh?  I always thought that the problem with kermit over
 >x.25 nets is precisely because kermit doesn't have a windowing
 >flow control scheme (or it has the terminal case, of a window
 >size of 1).
 >
 >That is, kermit sends a packet, then waits for an ack.
 >
 >Packet turnaround in x.25 networks is typically fairly slow,
 >but this is neither a problem with x.25, nor with the windowing
 >scheme (which is effectively a no-op when protocols like
 >traditional kermit are used above it).  Rather, its a problem
 >with the comparatively low capacity technology used to implement
 >the networks.

Some implementations of x.25 do not realize that no further data will be sent,
so have to time out before the packet is sent.  (kermit packets are shorter
than x.25 packets.)  This is an implementation rather than pure standarization
issue, but standards which allow rediculous behavior (waiting for output
from a process that is waiting for input) somewhat deserve the critisism
they get.

 >I doubt I'm alone in this belief, as I gather that the kermit
 >people are defining a new protocol (extended protocol) with
 >windowing in it, precisely so it will work *better* over x.25
 >type networks.

Full duplex windows has been an accepted option to the kermit protocol
since the 6th edition of the protocol manual.  (Published about a year
ago.)  I just wish they were part of c-kermit, the unix kermit
implementation.  (Prime kermit and Procom for the Ibm Pc are two examples
of kermit implementations that do support full duplex windows.)

Full duplex windows are a win in any situation where the communications
speed is limiting the speed of the file transfer.  They just win
bigest when the communications delays are long.
Bob Larson		Arpa: Blarson@Ecla.Usc.Edu
Uucp: {sdcrdcf,seismo!cit-vax}!oberon!castor!blarson
"How well do we use our freedom to choose the illusions we create?" -- Timbuk3

kre@munnari.UUCP (06/20/87)

In article <1818@ames.UUCP>, lamaster@pioneer.arpa (Hugh LaMaster) writes:
> X.25 (level 3?) will, it seems, be used as an
> alternate "level 2.5" protocol.  Is 802.2 also considered "level 2.5"?
> Is there a draft standard on this yet?  What ISO number is it?

Here are a bunch of numbers ..

IS 8348		Network service definition
			(this says what you can expect the network
			layer to do for you, and if you're implementing
			any network protocol, what services you must provide).

IS 8348 AD 1	Network service definition addendum 1,
			Connectionless-mode transmission
				(ie: datagrams)

DP 8880		Specification of protocols to provice and support
			the OSI network service
			part 1: General principles
			part 2: provision and support of the connection-mode
					service
			part 3: provision and support of the connectionless-
					mode service

DIS 8878	Use of X.25 to provide the OSI connection-mode
			network service
				(this is what fills in the last .5 to
				turn the "2.5" layer X.25 into layer 3)

DIS 8208	X.25 packet level protocol for data terminal equipment
				(this is 1984 X.25)

DIS 8473	Protocol for providing the connectionless-mode
			network service  (see also also DAD 1, and PDAD 2).

DIS 8648	Internal organization of the Network Layer


There are other level 3 related protocols (DP 9542, "End system
to intermediate system routing exchange protocol for use in
conjunction with ISO 8473", and DP 9068, "Provision of the
connectionless network service using ISO 8208", are two that
might be relevant)

ISO 8802/2 (IEEE 802.2) is a link level protocol, as it provides only
point to point service (from one host, across a LAN, to another).
Contrary to what some others have implied, or even stated as fact,
ISO layer 3 is an *internetwork* protocol, with exactly the same
function in the overall scheme of things as IP has in the DARPA protocols.

In this are you might want to look at DIS 8881-1 "Use of the X.25
packet level protocol in local area networks, Part 1: use with LLC
Type 1 procedures" and DIS 8881-2 "... Part 2: use with LLC Type 2
pricedures".

While I'm rambling, I should also point out, that most people making
noises about IEEE 802.2 (8802/2) are considering only LLC Type 2,
which is the thing that looks a little like X.25 (or hdlc).  Remeber
that LLC Type 1 exists too, which is a protocol about as complex
as old form xerox/dec ethernet (and might go unnoticed because its
just a couple of pages in the 802.2 book).

Robert Elz			kre@munnari.oz.au

kre@munnari.UUCP (06/20/87)

In article <638@faline.bellcore.com>, karn@faline.UUCP writes:
> Among the major flaws of the ISO Reference Model are:
> 
> 1. A fixed number (7) of layers.

These are just conceptual layers, and they don't (and aren't mean to)
include layers in application processes.

You can recursively redefine any of those layers as much as you like
for whatever purposes are appropriate (eg: level 2 on lans has
llc and mac, but its all still level 2 .. point to point).

> 2. It completely ignores internetworking.

This is rubbish.

> They claim you don't need all that reliability [TP4] if you're running on a
> PTT network, but of course the real reason is that they're scared to
> death of internetworking. There's no way a PTT is going to allow it to
> happen unimpeded.

I think your arguments about PTT fears need a little examination.  Most
of the world's PTT's don't need standards to control the world's networking
(this is outside the US).  In most countries the PTT's have a legal
monopoly, they don't need this kind of extra second hand pseudo-protection.

I have no love for PTT's and their regulations, however before discounting
all their arguments, its worth placing yourself in their position for
a while.  Let's indulge in a little whimsy.

Imagine yourself offered the job of director general (or whatever
its called) of the arpanet (and nsfnet, span, csnet, etc for fun).
You're naturally overjoyed, as quite apart from the 6 (or perhaps 7)
figure salary, you're finally going to be able to stamp out all this OSI
nonsense on the arpanet, and get things finally back on the straight and
narrow of TCP/IP.

So far, so good, everything's running smoothly, until one day there's
a rash of "hacker" breakins at military institutions doing weapons
research, and evidence is that this comes from the educational (research)
side of the net .. the part you are in control of.  Big stink in the
press, congressmen up in arms, the lot.  Of course, no-one suggests
that OSI would have been any better (that's not my point).

But, finally someone raises a question... the US goverment (the taxpayer)
is paying for these hackers to wreak havoc on the US national security, Why?
This must be stopped at once.  In one of those amazing happenings in the
US congress and Senate a bill is passed, and receives Presidential assent,
all within a day.  It denies any goverment funding to the networks.  Not
only direct funding, but indirect funding through research grants, contracts,
etc, and denies tax deductions for gifts to any organizations that use any
of the gift for networking purposes.  Congress is really mad!

Now, you have something of a problem.  Here you are in charge of this
network that has no money, and the bills are starting to come due.
How are you going to solve this problem?  You can try and get people
to donate funds out of the goodness of their hearts, but somehow I
doubt that is going to work.  You're likely to have to reach the position
where you have to actually charge real money to the people who use
your networks.

You're more or less in the position of the PTT's in the rest of
the world, you're running a business, and you have to at least
break even, if not make a profit, or your network collapses.

It might be instructive to explain how, with the current internet
setup, and using the standard IP based protocols (which of course you
have the authority to change if you want) you are going to make
all this work.  Nb: I mean the whole internet here, including all
those sites that have slip, and csnet x.25, links to the lucky few
on net 10.

> I have nothing
> against migrating to an international standard if it is provably
> superior to what we have (e.g., the metric system vs the English system)
> but this is *not* the case with OSI in its present form.

You're right, OSI is not ready for use yet, it needs some more
work (though many of the individual protocols are perfectly ok).
But asking for it to be provably superior is asking too
much.  It might never achieve that in the sense you mean.
What it will be is demonstrably more widely available.

That is, one day you will be able to connect to us (in Australia)
using OSI.  Chances are you never will be using TCP.  Which is strange,
as we run TCP now, so do you.  Neither of us runs OSI...  (But the
US government won't allow us to connect to you using TCP, we would
have to get some special dispensation to allow packets from outside
the US onto the arpanet, and that's simply not worth bothering with).
We could set up some direct TCP link (possibly over an X.25 carrier...,
it would certainly be over some PTT carrier, as that's all that's
available) but then you would have to take special precautions to
make sure none of our packets escape.  What great internetworking!

Remember that continually bemoaning the lack of readiness of the
ISO protocols does nothing to help them get completed.  You'd be
better assisting ISO, I know that you have lots of TCP knowledge,
you must have plenty of experience that would be quite valuable,
and perhaps you could be helping to prevent some of the mistakes
that you see ISO making, instead of just complaining about them.

kre

ps: Phil .. mail to you on the backbone list is being addressed to
bellcore!bellcore.com!karn (or something similar) and is making
bellcore's mailer dump core (SIGSEGV), you might want to look into that.

kre@munnari.UUCP (06/20/87)

In article <2886@oberon.USC.EDU>, blarson@castor.usc.edu (Bob Larson) writes:
> Some implementations of x.25 do not realize that no further data will be sent,
> so have to time out before the packet is sent.

Any X.25 implementation that does that is 100% bogus, and I actually
doubt that there are any such implementations.

However, X.28 does have this "feature".  (This is what you get when
you connect to X.25 via a PAD).  However, it can be controlled in
various ways, most of which, due to completely hopeless PAD
implementations, work against one another to kill performance,
when a little more intelligence (on the part of the implementor)
could make it all work passably well.

However, please don't judge X.25 (which is what would be used for
any ISO networking) by the failings of X.3/X.28/X.29 which are
total trash.

Also, if you claim that any standard that allows this behaviour is
no good, then you have just condemned TCP.  TCP is not bound to
deliver any data unless PUSH is set.  I could easily implement
a TAC (PAD) that never set PUSH (or only set PUSH after a timeout,
just to see if any more data is coming...).

kre

samlb@well.UUCP (Samuel B. Bassett) (06/21/87)

	Harrumpf!

	The process of achieving _reliable_ communication over a network is
difficult enough.  _Secure_ communication is a whole order of magnitude
more work, and should be left to the spooks -- when they _really_ need it,
they will provide it on their own lines, and in their own formats.

	As I understand it, the purpose of the various layers should be to
insure that a proper package is wrapped around the "data" that each layer
receives from the next 'higher' layer, so that the (otherwise unexamined)
contents of the data get where they are expected to go, and can be interpreted
correctly when they get there.  The contents of the data at each stage can
be 'plaintext' or 'cryptext' -- the protocol handler should not care one way
or the other.

	Let's not complexify the situation out beyond the state of the art!
-- 
Sam'l Bassett, Semantic Engineer -- My words & ideas are for sale!
34 Oakland Ave., San Anselmo  CA  94960;  (415) 454-7282
UUCP:  {...known world...}!hplabs OR ptsfa OR lll-crg!well!samlb;
Compuserve:  71735,1776;  WU Easylink ESL 6284-3034;  MCI SBassett

howard@COS.COM (Howard C. Berkowitz) (06/23/87)

In article <933@bloom-beacon.MIT.EDU>, martillo@athena.mit.edu (Yakim Martillo) writes:
> In article <8613@amdahl.amdahl.com> chuck@amdahl.UUCP (Charles Simmons) writes:
> >In article <920@bloom-beacon.MIT.EDU> martillo@athena.mit.edu (Yakim Martillo) writes:
> >>IEEE 802.2 and ISO level 2 puzzle me as well.  These are protocols for
> >>the communications subnet and I don't quite understand why IEEE and
> >>ISO are trying to define communications subnet protocols for all time.
> >>Shouldn't communications subnet protocols be medium-dependent?
> 
> >Actually, if you look closely at 802.2, you'll notice that the IEEE
> >defines an interface within the datalink layer.  802.2 defines
> >the logical link control layer, and is, and should be, medium-independent.
> >Underneath the logical link control layer there exists a medium
> >access control layer which is, naturally, highly medium-dependent.
> 
> No, this is incorrect because the supposedly medium-independent part
> of the level 2 (logical link control) is basically a member of the
> X.25 level 2 like family of protocols.  These protocols make or
> enforce some very specific assumptions about the medium and how you do
> networking.  They assume you really want to establish a perfect
> virtual wire at level 2 on a relatively noisy telephone-line-like
> medium and that you either never do internetting or will do so at the
> cost of some very complicated flow control procedures.  They also
> assume you will not have transmit windows at higher protocol layers.
> 

NO to the No!  There are several classes of Level 2 LLC (Logical
Link Control; IEEE 8802/2).  Type I is connectionless and does not
                                       ^^^^^^^^^^^^^^          ^^^
try to provide a "perfect virtual wire;" it is significantly different
from the LAP-B HDLC-style link protocols used for the X.25 family,

LLC Type I has been adopted as the media-independent part of 
LAN-environment Layer 2 by the NBS OSI Implementors' Workshop
(for 802.3 CSMA/CD and 802.4 Token Bus Media Access Control),
by the MAP/TOP User Group for 802.3 and 802.4, and by the 
Corporation for Open Systems (for 802.3, 802.4, and 802.5 Token 
Ring).  By contrast, COS adopted ISO 7776 as the link control
layer for X.25 WAN applications, another example of how practical OSI
protocol stacks do not require only one protocol at each layer.
> 
> This family of protocols was developed for the PTTs which have a very
> specific type of medium and have some very specific constraints on the
> type of services they can provide and on the type of services which
> they want to provide.  The PTTs consider remote terminal sessions and
> file transfer to constitute the full range of data communications for
> computers.

In the worldwide environment, the view of PTT's cannot be
ignored.  The challenge is interfacing the LAN and WAN
environment in the real world, which has political,
regulatory, and economic constraints as well as technical
ones.

PTT's doing packet work are apt to be more amenable to data
concerns than "old-line" telephone operating companies,
who believe real men do it in 4 kilohertz analog channels
implemented on twisted pair.

There is hope, however.  A few months ago, I presented
COS' current activities to ANSI Committee T1, which is
the main telecommunications standards body for the U.S.
I reminded them that about three years previously, I had
been on the T1 task force concerned with developing the
workplan for performance/quality of service standards.
At that meeting, an old time telephony standards man
took me to task about not really understanding how it
all worked; that I was up in the theoretical stratosphere
of X.25.

At the T1 meeting recently, I found that same old-timer
in the bar, complaining how his customers "didn't 
understand what their software told them; that they
simply didn't understand retransmission algorithms in
X.25."

I pointed out that in three years, our telephony pioneer
had moved from below Layer 0 of the OSI Reference Model
into Layer 2.  I predicted that in 1993, he would be
a UNIX hacker developing OSI applications, and we OSI
people would have moved into another dimension.

(Further discussion on last point to rec.sf-lovers,
please.  Comments that OSI people already are in
another dimension will be routed, using IP if
you like, to /dev/null.).
-- 
-- howard(Howard C. Berkowitz) @cos.com
 {seismo!sundc, hadron, hqda-ai}!cos!howard
(703) 883-2812 [ofc] (703) 998-5017 [home]
DISCLAIMER:  I explicitly identify COS official positions.

jhh@ihlpl.UUCP (06/24/87)

In article <2886@oberon.USC.EDU>, blarson@castor.usc.edu (Bob Larson) writes:
>  >traditional kermit are used above it).  Rather, its a problem
>  >with the comparatively low capacity technology used to implement
>  >the networks.
It's not really the capacity that is the problem, rather it is
the X.25 network delay that causes delay perceived by the user.
Admittedly, delay is usually related to capacity just because
higher capacity implementations have that much less time to
process and delay a packet.  The number of network nodes that
a packet traverses, along with the trunk speed connecting the
nodes has a much greater impact on delay.  If an X.25 network
requires the full packet to be received before it processes it
and sends it to the next node, there is an insertion delay
(number of bits in packet divided by the line speed).  For
example, 60 milliseconds are required to receive a 64 byte message
at 9600 bps.  With a protocol that has a window of 1,
the transmiter must remain idle for at least the number of
intermediate nodes times 60 milliseconds (assuming 9600 bps
internal trunk speeds).  At higher trunk speeds (56Kbps for example),
the internal node processing time becomes a more significant factor.

> Some implementations of x.25 do not realize that no further data will be sent,
> so have to time out before the packet is sent.
This has nothing to do with X.25, but rather the device that is
converting the asynchronous data into X.25.  This is typically
a function on an X.3/X.28/X.29 PAD (Packet Assembler/Disassembler).
In particular, two X.3 parameters that affect when an asynchronous
stream should be forwarded are 3 (selection of data forwarding
characters) and 4 (selection of idle timer delay).

John Haller

ast@cs.vu.nl (Andy Tanenbaum) (06/24/87)

In article <4122@amd.UUCP> nguyen@amd.UUCP (Quinn Nguyen) writes:
>In article <1214@botter.cs.vu.nl>, ast@cs.vu.nl (Andy Tanenbaum) writes:
>> I think the session layer is ridiculous.  
>
> Quinn then goes on to say:
>Some one [who] proved that the session layer is
>not null (such as IBM) must have a very good reason for it! 

This is the kind of thinking that led to OSI in the first place.  The
committee observed.
   1.  IBM has a 7 layer network architecture.
   2.  IBM is big and powerful and successful

Ergo, if we have a 7 layer network architecture we will become big and
powerful and sucessful.  Nonsense.  It is not desirable to create a giant,
ponderous beast that lusts after megabytes the way the cookie monster
goes after cookies.  St. Exupery said: Perfection is not achieved when
there is nothing left to add, but when there is nothing left to take away.

Look at the success of RISC machines.  Computer architects have learned that
what one does NOT need is an unwieldy instruction set that no compiler
can produce code for.  Adding more instructions and modes and stuff on the
off chance that someone will someday need it is foolish.  The idea of
having a session layer for those few applications that can't keep track
of whose turn it is to talk is equally silly.  Let them do it as part of
the application.  I think network architectures (and everything else in
the world) should be made as simple as possible, consistent with their
intended goal.  I think OSI needs to go on a crash diet.  Null session
layers aren't the way to go.  The structural complexity is still there, 
even if it is dormant for the moment.

Andy Tanenbaum