📄 rfc874.txt
字号:
---------
< INC-PROJECT, MAP-CRITIQUE.NLS.10, >, 12-Aug-83 11:46 AMW ;;;;
RFC 874 September 1982
M82-50
A CRITIQUE OF X.25
M.A. PADLIPSKY
THE MITRE CORPORATION
Bedford, Massachusetts
ABSTRACT
The widely touted network interface protocol, "X.25", and
its attendant conceptual framework, the International Standards
Organization's Reference Model for Open System Interconnection
(ISORM), are analyzed and found wanting. The paper is a
companion piece to M82-48, and M82-51.
i
A CRITIQUE OF X.25
M. A. Padlipsky
Introduction
According to some sources, the International Standards
Organization's (ISO) "Open System Interconnection" (OSI) effort
has adopted the International Consultative Committee on Telephony
and Telegraphy (CCITT) developed X.25 protocol(s) as its Levels
1-3. ("Loose constructionists" of the ISORM would hold that X.25
is a mechanization of L1-L3 rather than the mechanization, and at
least one British source holds that "we in the U.K. don't believe
that ISO have adopted X.25.") In the U.S. Government arena,
where the author spends much of his time, the Government
Accounting Office (GAO) has suggested that the Department of
Defense (DoD) ought to consider adopting "X.25 networks,"
apparently in preference to networks based on protocols developed
by the DoD-sponsored intercomputer networking research community.
That intercomputer networking research community in turn has,
with a few recent exceptions, adhered to its commitment to the
Oral Tradition and not taken up the cudgels against X.25 in the
open literature, even though X.25 is an object of considerable
scorn in personal communications.
Although the DoD Protocol Standards Technical Panel has
begun to evolve a "Reference Model" different from ISO's for
reasons which will be touched on below, there seems to be a need
to address the deficiencies of X.25 on their own demerits as soon
as possible. Without pretending to completeness*, this paper will
attempt to do just that.
The overall intent is to deal with X.25 in the abstract;
because of who pays the bills, though, a necessary preliminary is
to at least sketch the broad reasons why the DoD in particular
should not
________________
* Various versions of X.25 and ISO documentation were employed;
one incompleteness of note, however, is that no attempt has
been made to do proper bibliographic citation. Another
incompleteness lies in the area of "tutoriality"; that is,
appropriate prior knowledge is assumed on the part of the
reader. (The author apologizes for the omissions but hasn't
the time or the energy to be overly scholarly. Reference [3]
might be of use to the reader who feels slighted.)
1
RFC 874 September 1982
employ intercomputer networks which base their protocol suites on
the ISO Reference Model (ISORM) with X.25 as Levels 1-3. (Note
that this is a different formulation from "use communications
subnetworks which present an X.25 interface.") Very briefly, the
DoD has concerns with "survivability," reliability, security,
investment in prior art (i.e., its research community has a
working protocol suite in place on many different operating
systems), procurability (i.e., ISORM-related protocol suites do
not as yet fully exist even on paper and the international
standardization process is acknowledged even by its advocates to
require several years to arrive at full suite specification, much
less offer available interoperable implementation), and
interoperability with a much wider range of systems than are ever
likely to receive vendor-supplied implementations of ISORM
protocol suites. Regardless of which particular concerns are
considered to dominate, the DoD cannot be expected to await
events in the ISO arena. (Particularly striking is the fact that
DoD representatives are not even permitted under current doctrine
to present their specific concerns in the area of security in the
sort of unclassified environment the ISO arena constitutes.)
Some zealous ISORM advocates have suggested that the DoD
research community suffers from a "Not Invented Here" syndrome
with respect to ISORM-related protocols, though, so even if the
various reasons just cited were to prevail, there would still be
an open issue at some level. At least one or two zealous members
of the research community have asserted that the problem is not
Not Invented Here, but Not Invented Right, so an assessment of
the apparent keystone of the ISORM suite, X.25, from the
perspective of whether it's "good art" ought to be appropriate.
That's what we're up to here.
2
RFC 874 September 1982
Problems With the Conceptual Model*
There is confusion even amongst its advocates as to the real
conceptual model of X.25-based ISO networking. Some draw their
Reference Model as two "highrises," others draw "parking
garages" beside each highrise. That is, some draw the seven
ISORM layers in large rectangles (representing Hosts) next to one
another, showing each layer in communication with its "peer" in
the other Host/Open System; this implies an "end-to-end" view of
X.25. Others draw smaller rectangles between the larger ones,
with Levels 1-3 having peer relationships from the Host-OS ("Data
Terminal Equipment") to the Comm Subnet Node ("Data Circuit
Terminating Equipment"); this implies a "link-by-link" view of
X.25. This ambiguity does not engender confidence in the
architects, but perhaps the real problem is with the spectators.
Yet it is indisputable that when internetting with X.75, the
model becomes "hop-by-hop" (and it is likely it's meant to be
link-by-link even on a single comm subnet).
A major problem with such a model is that the designers have
chosen to construe it as requiring them to break the "virtual
circuit" it is supposed to be supporting whenever there is
difficulty with any one of the links. Thus, if internetting, and
on some interpretations even on one's proximate net, rerouting of
messages will not occur when needed, and all the upper levels of
protocols will have to expend space-time resources on
reconstituting their own connections with their counterparts.
(Note that the success of the reconstitution under DCE failure
appears to assume a certain flexibility in routing which is not
guaranteed by the Model.) This can scarcely be deemed sound
design practice for an intercomputer networking environment,
although many have conjectured that it probably makes sense to
telephonists.
________________
* Note that we are assuming an ISO-oriented model rather than a
CCITT-oriented one (X.25/X.28/X.29) because the latter appears
to offer only "remote access" functionality whereas the sort
of intercomputer networking we are interested in is concerned
with the full "resource-sharing" functionality the former is
striving for. This might be somewhat unfair to X.25, in that
it is taking the protocol(s) somewhat out of context; however,
it is what ISO has done before us, and if what we're really
accomplishing is a demonstration that ISO has erred in so
doing, so be it. As a matter of fact, it can also be argued
that X.25 is itself somewhat unfair--to its users, who are
expecting real networking and getting only communication; cf.
Padlipsky, M. A., "The Elements of Networking Style", M81-41,
The MITRE Corporation, October 1981, for more on the extremely
important topic of resource sharing vs. remote access.
3
RFC 874 September 1982
Indeed, it appears the virtual circuit metaphor is in some
sense being taken almost literally (with the emphasis on the
"circuit" aspect), in that what should be an environment that
confers the benefits of packet-switching is, at the X.25 level,
reduced to one with the limitations of circuit-switching. On the
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -