⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc942.txt

📁 RFC 的详细文档!
💻 TXT
📖 第 1 页 / 共 5 页
字号:

  exact statement of DOD functional needs for a particular protocol and
  form a basis for the functions, features, and services of NBS-proposed
  standards.

  To further the development of commercial products that implement
  standards, the NBS gives priority to the needs of U.S. computer
  manufacturers who wish to market their products nationally and
  internationally, not just to the U.S. government.  The NBS
  participates, therefore, in national and international voluntary
  standards organizations toward the development of an international
  consensus based on United States needs.  Specifications, formal
  description techniques, testing methodologies, and test results
  developed by the NBS are used to further the international
  standardization process.

 Development of Testing Methodologies

  The National Bureau of Standards has laboratory activities where
  prototypes of draft protocol standards are implemented and tested in a
  variety of communications environments supporting different
  applications on different kinds and sizes of computers.
  Communications environments include, for example, global networks,
  local networks, and office system networks.  Applications may, for
  example, include file transfer or message processing.  The primary
  purposes are to advance the state of the art in measurement
  methodologies for advanced computer networking technologies and
  determine protocol implementation correctness and performance.

  The NBS views testing as a cooperative research effort and works with
  other agencies, private-sector companies, and other countries in the
  development of methodologies.  At this time, this cooperation involves
  five network laboratories in other countries and over twenty computer
  manufacturers.

  The testing methodologies developed at the NBS are well documented,
  and the testing tools themselves are developed with the objective of
  portability in mind.  They are made available to many organizations
  engaged in protocol development and implementations.

 Assisting Users and Manufacturers

  The NBS works directly with government agencies to help them use
  evolving network technologies effectively and apply international and
  government networking standards properly.  When large amounts of
  assistance are required, the NBS provides it under contract.

  Assistance to industry is provided through cooperative research
  efforts and by the availability of NBS testing tools, industry wide
  workshops, and cooperative demonstration projects.  At this time, the
  NBS is working directly with over twenty computer manufacturers in the
  implementation of network protocol standards.



National Research Council                                       [Page 4]

RFC 942                                                    February 1985
Report Transport on Protocols

  Consistent with overall goals, NBS standards developments, research in
  testing methodologies, and technical assistance are characterized by
  direct industry and government
  cooperation and mutual support.

DOD OBJECTIVES

 The DOD has unique needs that could be affected by the Transport and
 Internet Protocol layers.  Although all data networks must have some of
 these capabilities, the DOD's needs for operational readiness,
 mobilization, and war-fighting capabilities are extreme.  These needs
 include the following:

  Survivability--Some networks must function, albeit at reduced
  performance, after many nodes and links have been destroyed.

  Security--Traffic patterns and data must be selectively protected
  through encryption, access control, auditing, and routing.

  Precedence--Systems should adjust the quality ot service on the basis
  of priority of use; this includes a capability to preempt services in
  cases of very high priority.

  Robustness--The system must not fail or suffer much loss of capability
  because of unpredicted situations, unexpected loads, or misuse.  An
  international crisis is the strongest test of robustness, since the
  system must operate immediately and with virtually full performance
  when an international situation flares up unexpectedly.

  Availability--Elements of the system needed for operational readiness
  or fighting must be continuously available.

  Interoperability--Different elements of the Department must be able to
  "talk" to one another, often in unpredicted ways between parties that
  had not planned to interoperate.

 These operational needs reflect themselves into five technical or
 managerial needs:

  1.   Functional and operational specifications (that is, will the
       protocol designs meet the operational needs?);

  2.   Maximum interoperability;

  3.   Minimum procurement, development, and support costs;

  4.   Ease of transition to new protocols; and

  5.   Manageability and responsiveness to changing DOD requirements.

 These are the criteria against which DOD options for using the ISO
 transport and internet protocols should be evaluated.


National Research Council                                       [Page 5]

RFC 942                                                    February 1985
Report Transport on Protocols

 Performance and Functionality

  The performance and functionality of the protocols must provide for
  the many unique operational needs of the DOD.  The following
  paragraphs discuss in some detail both these needs and the ways they
  can impact protocol design.

  Survivability includes protecting assets, hiding them, and duplicating
  them for redundancy.  It also includes endurance--the assurance that
  those assets that do survive can continue to perform in a battle
  environment for as long as needed (generally months rather than
  hours); restoral--the ability to restore some of the damaged assets to
  operating status; and reconstitution--the ability to integrate
  fragmented assets into a surviving and enduring network.

  The DOD feels that an important reason for adopting international and
  commercial standards is that under cases of very widespread damage to
  its own communications networks, it would be able to support DOD
  functions by using those civil communications that survive.  This
  would require interoperability up to the network layer, but neither
  TCP nor TP-4 would be needed.  The committee has not considered the
  extent to which such increased interoperability would increase
  survivability through better restoral and reconstitution.

  Availability is an indication of how reliable the system and its
  components are and how quickly they can be repaired after a failure.
  Availability is also a function of how badly the system has been
  damaged. The DDN objective for system availability in peacetime varies
  according to whether subscribers have access to l or 2 nodes of the
  DDN.  For subscribers having access to only one node of the DDN, the
  objective is that the system be available 99.3 percent of the time,
  that is, the system will be unavailable for no more than 60 hours per
  year.  For subscribers having access to 2 nodes, the objective is that
  the system be available 99.99 percent of the time, that is, the system
  will be unavailable for no more than one hour per year.

  Robustness is a measure of how well the system will operate
  successfully in face of the unexpected.  Robustness attempts to avoid
  or minimize system degradation because of user errors, operator
  errors, unusual load patterns, inadequate interface specifications,
  and so forth.  A well designed and tested system will limit the damage
  caused by incorrect or unspecified inputs to affect only the
  performance of the specific function that is requested.  Since
  protocols are very complex and can be in very many "states",
  robustness is an important consideration in evaluating and
  implementing protocols.

  Security attempts to limit the unauthorized user from gaining both the
  information communicated in the system and the patterns of traffic
  throughout the system.  Security also attempts to prevent spoofing of
  the system:  an agent attempting to appear as a legitimate user,
  insert false traffic, or deny services to users by repeatedly seeking
  system services.

National Research Council                                       [Page 6]

RFC 942                                                    February 1985
Report Transport on Protocols

  Finally, Security is also concerned with making sure that electronic
  measures cannot seriously degrade the system, confuse its performance,
  or cause loss of security in other ways.

  Encryption of communication links is a relatively straightforward
  element of security.  It is widely used, fairly well understood,
  constantly undergoing improvement, and becoming less expensive.  On
  the other hand, computer network security is a much newer field and
  considerably more complex.  The ability of computer network protocols
  to provide security is a very critical issue.  In the past decade much
  has been learned about vulnerability of computer operating systems,
  development of trusted systems, different levels of protection, means
  of proving that security has been achieved, and ways to achieve
  multilevel systems or a compartmented mode.  This is a dynamic field,
  however, and new experience and analysis will probably place new
  requirements on network protocols.

  Crisis-performance needs are a form of global robustness.  The nature
  of a national security crisis is that it is fraught with the
  unexpected.  Unusual patterns of communication traffic emerge.
  Previously unstressed capabilities become critical to national
  leaders.  Individuals and organizations that had not been
  communicating must suddenly have close, secure, and reliable
  communications.  Many users need information that they are not sure
  exists, and if it does, they do not know where it is or how to get it.
  The development of widely deployed, interoperable computer networks
  can provide important new capabilities for a crisis, particularly if
  there is some investment in preplanning, including the higher-level
  protocols that facilitate interoperability.  Presidential directives
  call for this. This will become a major factor in DOD's need for
  interoperability with other federal computer networks.  The DOD, as
  one of the most affected parties, has good reason to be concerned that
  its network protocols will stand the tests of a crisis.

  In addition, there are performance and functionality features that are
  measures of the capability of the network when it is not damaged or
  stressed by unexpected situations.  Performance includes quantifiable
  measures such as time delays, transmission integrity, data rates and
  efficiency, throughput, numbers of users, and other features well
  understood in computer networks.  Equally important is the extent of
  functionality: What jobs will the network do for the user?

  The DDN has established some performance objectives such as end-to-end
  delays for high-precedence and routine traffic, the probability of
  undetected errors, and the probability of misdelivered packets.  Such
  objectives are important to engineer a system soundly.  The DOD must
  place greater emphasis on more complex performance issues such as the
  efficiency with which protocols process and communicate data.

  The DOD has stated a need for an effective and robust system for
  precedence and preemption.  Precedence refers to the ability of the
  system to adaptively allocate network resources so that the network
  performance is related to the importance of the function being

National Research Council                                       [Page 7]

RFC 942                                                    February 1985
Report Transport on Protocols

  performed.  Preemption refers to the ability of the system to remove
  users (at least temporarily) until the needs of the high-priority user
  are satisfied.  The ARPANET environment in which the protocols were
  developed did not emphasize these capabilities, and the current MILNET
  does not function as effectively in this regard as DOD voice
  networks.

  The DOD has also stated a need for connectionless communications and a
  broadcast mode.  In the majority of network protocols, when two of
  more parties communicate, virtual circuits are established between the
  communicating parties.  (For reliability, additional virtual circuits
  may be established to provide an in place backup.)  DOD needs a
  connectionless mode where the message can be transmitted to one or
  more parties without the virtual circuit in order to enhance
  survivability; provide a broadcast capability (one sender to many
  receivers); and handle imagery, sensor data, and speech traffic
  quickly and efficiently.

  If intermediate nodes are destroyed or become otherwise unavailable,
  there is still a chance that the data can be sent via alternate paths.
  The broadcast capability is particularly important in tactical
  situations where many parties must be informed almost simultaneously
  and where the available assets may be disappearing and appearing
  dynamically.  The Department of Defense requires an internetting
  capability whereby different autonomous networks of users can
  communicate with each other.

 Interoperability

  Presidential and DOD directives place a high priority on
  interoperability, which is related to the internetworking previously
  discussed.

  Interoperability is primarily important at two levels:  network access
  and applications.  To achieve interoperability at the level of network
  access,users of backbone communications nets must utilize the same
  lower-level protocols that are utilized by the network.  Generally
  these protocols are layers 1, 2, and 3, up to and including part of
  the IP layer.  In other words, interoperability for network access
  does not depend on either implementation of the transport layer (TP-4
  or TCP) or of all of the internet (IP) layer.  The primary advantages
  of network access interoperability are twofold:

   1.   Significant economies of scale are possible since the various
        users can share the resources of the backbone network including
        hardware, software, and development and support costs.

   2.   Network survivability for all users can be increased
        significantly since the network has high redundancy and, as the
        threat increases, the redundancy can also be increased.

  Interoperability at the applications layer allows compatible users at
  different nodes to talk to each other, that is, to share their data,

National Research Council                                       [Page 8]

RFC 942                                                    February 1985
Report Transport on Protocols

  support each other, and thereby coordinate and strengthen the
  management of forces and other assets.  Interoperability at the
  applications layer can be achieved through the use of specialized
  software that performs those functions of higher-layer protocols (such
  as TCP or TP-4, file transfer, and virtual terminal) that are needed
  by the particular application.  If some of the higher-layer transport
  and utility protocols have been developed for particular hosts or work
  stations, their use greatly reduces development, integration, and
  support costs, although with a potential sacrifice of performance.
  Interoperability at the applications level, that is, full functional
  interoperability, is important to specialized communities of users
  such as the logistics, command and control, or research and
  development communities.  As these different communities utilize the
  DDN, they have the advantages of shared network resources. Within each
  community there is full functional interoperability but generally
  there is much less need for one community to have functional
  interoperability with members of another community.

  The implementation of TCP or TP-4 within network users, but without
  the implementation of higher-level protocols and application
  interoperability, is not generally an immediate step in increasing
  interoperability. It does have these immediate advantages:

   It represents an important step in investing in longer-term
   interoperability.

   It generally represents an economical near-term investment on which
   communities of interest can build their own applications.

   It facilitates the development of devices for general network use
   such as Terminal Access Controllers (TACs).

  Interoperability at the applications level will become increasingly
  important among the following communities:  Worldwide Military Command
  and Control Systems, including systems of subordinate commands;
  Department of Defense Intelligence Information Systems; U.S. tactical
  force headquarters (fixed and mobile); NATO force headquarters; other
  U.S. intelligence agencies; the State Department; and the Federal
  Bureau of Investigation and other security agencies.

  Although interoperability of applications within the DOD has the
  highest priority, it is clear that government wide and international
  interoperability wil

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -