rfc1017.txt
来自「RFC 的详细文档!」· 文本 代码 · 共 1,067 行 · 第 1/4 页
TXT
1,067 行
step to accomplish this is to use IP. The use of IP will allow
individual networks built by differing agencies to combine resources
and minimize cost by avoiding the needless duplication of network
resources and their management. However, use of IP does not provide
end-to-end interoperability. There must also be compatibility of
higher level functions and protocols. At a minimum, while commonly
agreed upon standards (such as the ISO developments) are proceeding,
methods for interoperability between different protocol suites must
be developed. This would provide interoperability of certain
functions, such as file transfer, electronic mail and remote login.
The emphasis, however, should be on developing agreement within the
scientific community on use of a standard set of protocols.
Access Control
The design of the network should include adequate methods for
controlling access to the network by unauthorized personnel. This
especially includes access to network capabilities that are reachable
via the commercial phone network and public data nets. For example,
terminal servers that allow users to dial up via commercial phone
lines should have adequate authentication mechanisms in place to
prevent access by unauthorized individuals. However, it should be
noted that most hosts that are reachable via such networks are also
reachable via other "non-network" means, such as directly dialing
Leiner [Page 10]
RFC 1017 Requirements for Scientific Research August 1987
over commercial phone lines. The purpose of network access control
is not to insure isolation of hosts from unauthorized users, and
hosts should not expect the network itself to protect them from
"hackers".
Privacy
The network should provide protection of data that traverses it in a
way that is commensurate with the sensitivity of that data. It is
judged that the scientific requirements for privacy of data traveling
on networks does not warrant a large expenditure of resources in this
area. However, nothing in the network design should preclude the use
of link level or end-to-end encryption, or other such methods that
can be added at a later time. An example of this kind of capability
would be use of KG-84A link encryptors on MILNET or the Fig Leaf
DES-based end-to-end encryption box developed by DARPA.
Accounting
The network should provide adequate accounting procedures to track
the consumption of network resources. Accounting of network
resources is also important for the management of the network, and
particularly the management of interconnections with other networks.
Proper use of the accounting database should allow network management
personnel to determine the "flows" of data on the network, and the
identification of bottlenecks in network resources. This capability
also has secondary value in tracking down intrusions of the network,
and to provide an audit trail if malicious abuse should occur. In
addition, accounting of higher level network services (such as
terminal serving) should be kept track of for the same reasons.
Type of Service Routing
Type of service routing is necessary since not all elements of
network activity require the same resources, and the opportunities
for minimizing use of costly network resources are large. For
example, interactive traffic such as remote login requires low delay
so the network will not be a bottleneck to the user attempting to do
work. Yet the bandwidth of interactive traffic can be quite small
compared to the requirements for file transfer and mail service which
are not response time critical. Without type of service routing,
network resources must sized according to the largest user, and have
characteristics that are pleasing to the most finicky user. This has
major cost implications for the network design, as high-delay links,
such as satellite links, cannot be used for interactive traffic
despite the significant cost savings they represent over terrestrial
links. With type of service routing in place in the network
gateways, and proper software in the hosts to make use of such
Leiner [Page 11]
RFC 1017 Requirements for Scientific Research August 1987
capabilities, overall network performance can be enhanced, and
sizable cost savings realized. Since the IP protocol already has
provisions for such routing, such changes to existing implementations
does not require a major change in the underlying protocol
implementations.
Administration of Address Space
Local administration of network address space is essential to provide
for prompt addition of hosts to the network, and to minimize the load
on backbone network administrators. Further, a distributed name to
address translation service also has similar advantages. The DARPA
Name Domain system currently in use on the Internet is a suitable
implementation of such a name to address translation system.
Remote Procedure Call Libraries
In order to provide a standard library interface so that distributed
network utilities can easily communicate with each other in a
standard way, a standard Remote Procedure Call (RPC) library must be
deployed. The computer industry has lead the research community in
developing RPC implementations, and current implementations tend to
be compatible within the same type of operating system, but not
across operating systems. Nonetheless, a portable RPC implementation
that can be standardized can provide a substantial boost in present
capability to write operating system independent network utilities.
If a new RPC mechanism is to be designed from scratch, then it must
have enough capabilities to lure implementors away from current
standards. Otherwise, modification of an existing standard that is
close to the mark in capabilities seems to be in order, with the
cooperation of vendors in the field to assure implementations will
exist for all major operating systems in use on the network.
Remote Job Entry (RJE)
The capabilities of standard network RJE implementations are
inadequate, and are implemented prolifically among major operating
systems. While the notion of RJE evokes memories of dated
technologies such as punch cards, the concept is still valid, and is
favored as a means of interaction with supercomputers by science
users. All major supercomputer manufacturers support RJE access in
their operating systems, but many do not generalize well into the
Internet domain. That is, a RJE standard that is designed for 2400
baud modem access from a card reader may not be easily modifiable for
use on the Internet. Nonetheless, the capability for a network user
to submit a job from a host and have its output delivered on a
printer attached to a different host would be welcomed by most
science users. Further, having this capability interoperate with
Leiner [Page 12]
RFC 1017 Requirements for Scientific Research August 1987
existing RJE packages would add a large amount of flexibility to the
whole system.
Multiple Virtual Connections
The capability to have multiple network connections open from a
user's workstation to remote network hosts is an invaluable tool that
greatly increases user productivity. The network design should not
place limits (procedural or otherwise) on this capability.
Network Operation and Management Tools
The present state of internet technology requires the use of
personnel who are, in the vernacular of the trade, called network
"wizards," for the proper operation and management of networks.
These people are a scarce resource to begin with, and squandering
them on day to day operational issues detracts from progress in the
more developmental areas of networking. The cause of this problem is
that a good part of the knowledge for operating and managing a
network has never been written down in any sort of concise fashion,
and the reason for that is because networks of this type in the past
were primarily used as a research tool, not as an operational
resource. While the usage of these networks has changed, the
technology has not adjusted to the new reality that a wizard may not
be nearby when a problem arises. To insure that the network can
flexibly expand in the future, new tools must be developed that allow
non-wizards to monitor network performance, determine trouble spots,
and implement repairs or 'work-arounds'.
Future Goals
The networks of the future must be able to support transparent access
to distributed resources of a variety of different kinds. These
resources will include supercomputer facilities, remote observing
facilities, distributed archives and databases, and other network
services. Access to these resources is to be made widely available
to scientists, other researchers, and support personnel located at
remote sites over a variety of internetted connections. Different
modes of access must be supported that are consonant with the sorts
of resources that are being accessed, the data bandwidths required
and the type of interaction demanded by the application.
Network protocol enhancements will be required to support this
expansion in functionality; mere increases in bandwidth are not
sufficient. The number of end nodes to be connected is in the
hundreds of thousands, driven by increasing use of microprocessors
and workstations throughout the community. Fundamentally different
sorts of services from those now offered are anticipated, and dynamic
Leiner [Page 13]
RFC 1017 Requirements for Scientific Research August 1987
bandwidth selection and allocation will be required to support the
different access modes. Large-scale internet connections among
several agency size internets will require new approaches to routing
and naming paradigms. All of this must be planned so as to
facilitate transition to the ISO/OSI standards as these mature and
robust implementations are placed in service and tuned for
performance.
Several specific areas are identified as being of critical importance
in support of future network requirements, listed in no particular
order:
Standards and Interface Abstractions
As more and different services are made available on these
various networks it will become increasingly important to
identify interface standards and suitable application
abstractions to support remote resource access. These
abstractions may be applicable at several levels in the
protocol hierarchy and can serve to enhance both applications
functionality and portability. Examples are transport or
connection layer abstractions that support applications
independence from lower level network realizations or interface
abstractions that provide a data description language that can
handle a full range of abstract data type definitions.
Applications or connection level abstractions can provide means
of bridging across different protocol suites as well as helping
with protocol transition.
OSI Transition and Enhancements
Further evolution of the OSI network protocols and realization
of large-scale networks so that some of the real protocol and
tuning issues can be dealt with must be anticipated. It is
only when such networks have been created that these issues can
be approached and resolved. Type-of-service and Expressway
routing and related routing issues must be resolved before a
real transition can be contemplated. Using the interface
abstraction approach just described will allow definition now
of applications that can transition as the lower layer networks
are implemented. Applications gateways and relay functions
will be a part of this transition strategy, along with dual
mode gateways and protocol translation layers.
Processor Count Expansion
Increases in the numbers of nodes and host sites and the
expected growth in use of micro-computers, super-micro
Leiner [Page 14]
RFC 1017 Requirements for Scientific Research August 1987
workstations, and other modest cost but high power computing
solutions will drive the development of different network and
interconnect strategies as well as the infrastructure for
managing this increased name space. Hierarchical name
management (as in domain based naming) and suitable transport
layer realizations will be required to build networks that are
robust and functional in the face of the anticipated
expansions.
Dynamic Binding of Names to Addresses
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?