⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1263.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 4 页
字号:
Network Working Group                                        S. O'MalleyRequest for Comments: 1263                                   L. Peterson                                                   University of Arizona                                                            October 1991                   TCP EXTENSIONS CONSIDERED HARMFULStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard.  Distribution of this document is   unlimited.Abstract   This RFC comments on recent proposals to extend TCP.  It argues that   the backward compatible extensions proposed in RFC's 1072 and 1185   should not be pursued, and proposes an alternative way to evolve the   Internet protocol suite.  Its purpose is to stimulate discussion in   the Internet community.1.  Introduction   The rapid growth of the size, capacity, and complexity of the   Internet has led to the need to change the existing protocol suite.   For example, the maximum TCP window size is no longer sufficient to   efficiently support the high capacity links currently being planned   and constructed. One is then faced with the choice of either leaving   the protocol alone and accepting the fact that TCP will run no faster   on high capacity links than on low capacity links, or changing TCP.   This is not an isolated incident. We have counted at least eight   other proposed changes to TCP (some to be taken more seriously than   others), and the question is not whether to change the protocol   suite, but what is the most cost effective way to change it.   This RFC compares the costs and benefits of three approaches to   making these changes: the creation of new protocols, backward   compatible protocol extensions, and protocol evolution. The next   section introduces these three approaches and enumerates the   strengths and weaknesses of each.  The following section describes   how we believe these three approaches are best applied to the many   proposed changes to TCP. Note that we have not written this RFC as an   academic exercise.  It is our intent to argue against acceptance of   the various TCP extensions, most notably RFC's 1072 and 1185 [4,5],   by describing a more palatable alternative.O'Malley & Peterson                                             [Page 1]RFC 1263           TCP Extensions Considered Harmful        October 19912.  Creation vs. Extension vs. Evolution2.1.  Protocol Creation   Protocol creation involves the design, implementation,   standardization, and distribution of an entirely new protocol. In   this context, there are two basic reasons for creating a new   protocol. The first is to replace an old protocol that is so outdated   that it can no longer be effectively extended to perform its original   function.  The second is to add a new protocol because users are   making demands upon the original protocol that were not envisioned by   the designer and cannot be efficiently handled in terms of the   original protocol.  For example, TCP was designed as a reliable   byte-stream protocol but is commonly used as both a reliable record-   stream protocol and a reliable request-reply protocol due to the lack   of such protocols in the Internet protocol suite.  The performance   demands placed upon a byte-stream protocol in the new Internet   environment makes it difficult to extend TCP to meet these new   application demands.   The advantage of creating a new protocol is the ability to start with   a clean sheet of paper when attempting to solve a complex network   problem.  The designer, free from the constraints of an existing   protocol, can take maximum advantage of modern network research in   the basic algorithms needed to solve the problem. Even more   importantly, the implementor is free to steal from a large number of   existing academic protocols that have been developed over the years.   In some cases, if truly new functionality is desired, creating a new   protocol is the only viable approach.   The most obvious disadvantage of this approach is the high cost of   standardizing and distributing an entirely new protocol.  Second,   there is the issue of making the new protocol reliable. Since new   protocols have not undergone years of network stress testing, they   often contain bugs which require backward compatible fixes, and   hence, the designer is back where he or she started.  A third   disadvantage of introducing new protocols is that they generally have   new interfaces which require significant effort on the part of the   Internet community to use. This alone is often enough to kill a new   protocol.   Finally, there is a subtle problem introduced by the very freedom   provided by this approach. Specifically, being able to introduce a   new protocol often results in protocols that go far beyond the basic   needs of the situation.  New protocols resemble Senate appropriations   bills; they tend to accumulate many amendments that have nothing to   do with the original problem. A good example of this phenomena is the   attempt to standardize VMTP [1] as the Internet RPC protocol. WhileO'Malley & Peterson                                             [Page 2]RFC 1263           TCP Extensions Considered Harmful        October 1991   VMTP was a large protocol to begin with, the closer it got to   standardization the more features were added until it essentially   collapsed under its own weight. As we argue below, new protocols   should initially be minimal, and then evolve as the situation   dictates.2.2.  Backward Compatible Extensions   In a backward compatible extension, the protocol is modified in such   a fashion that the new version of the protocol can transparently   inter-operate with existing versions of the protocol. This generally   implies no changes to the protocol's header. TCP slow start [3] is an   example of such a change. In a slightly more relaxed version of   backward compatibility, no changes are made to the fixed part of a   protocol's header. Instead, either some fields are added to the   variable length options field found at the end of the header, or   existing header fields are overloaded (i.e., used for multiple   purposes). However, we can find no real advantage to this technique   over simply changing the protocol.   Backward compatible extensions are widely used to modify protocols   because there is no need to synchronize the distribution of the new   version of the protocol. The new version is essentially allowed to   diffuse through the Internet at its own pace, and at least in theory,   the Internet will continue to function as before. Thus, the explicit   distribution costs are limited. Backward compatible extensions also   avoid the bureaucratic costs of standardizing a new protocol. TCP is   still TCP and the approval cost of a modification to an existing   protocol is much less than that of a new protocol. Finally, the very   difficulty of making such changes tends to restrict the changes to   the minimal set needed to solve the current problem. Thus, it is rare   to see unneeded changes made when using this technique.   Unfortunately, this approach has several drawbacks. First, the time   to distribute the new version of the protocol to all hosts can be   quite long (forever in fact). This leaves the network in a   heterogeneous state for long periods of time. If there is the   slightest incompatibly between old and new versions, chaos can   result. Thus, the implicit cost of this type of distribution can be   quite high. Second, designing a backward compatible change to a new   protocol is extremely difficult, and the implementations "tend toward   complexity and ugliness" [5]. The need for backward compatibility   ensures that no code can every really be eliminated from the   protocol, and since such vestigial code is rarely executed, it is   often wrong. Finally, most protocols have limits, based upon the   design decisions of it inventors, that simply cannot be side-stepped   in this fashion.O'Malley & Peterson                                             [Page 3]RFC 1263           TCP Extensions Considered Harmful        October 19912.3.  Protocol Evolution   Protocol evolution is an approach to protocol change that attempts to   escape the limits of backward compatibility without incurring all of   the costs of creating new protocols. The basic idea is for the   protocol designer to take an existing protocol that requires   modification and make the desired changes without maintaining   backward compatibility.  This drastically simplifies the job of the   protocol designer. For example, the limited TCP window size could be   fixed by changing the definition of the window size in the header   from 16-bits to 32-bits, and re-compiling the protocol. The effect of   backward compatibility would be ensured by simply keeping both the   new and old version of the protocol running until most machines use   the new version. Since the change is small and invisible to the user   interface, it is a trivial problem to dynamically select the correct   TCP version at runtime. How this is done is discussed in the next   section.   Protocol evolution has several advantages. First, it is by far the   simplest type of modification to make to a protocol, and hence, the   modifications can be made faster and are less likely to contain bugs.   There is no need to worry about the effects of the change on all   previous versions of the protocol. Also, most of the protocol is   carried over into the new version unchanged, thus avoiding the design   and debugging cost of creating an entirely new protocol. Second,   there is no artificial limit to the amount of change that can be made   to a protocol, and as a consequence, its useful lifetime can be   extended indefinitely. In a series of evolutionary steps, it is   possible to make fairly radical changes to a protocol without   upsetting the Internet community greatly. Specifically, it is   possible to both add new features and remove features that are no   longer required for the current environment.  Thus, the protocol is   not condemned to grow without bound. Finally, by keeping the old   version of the protocol around, backward compatibility is guaranteed.   The old code will work as well as it ever did.   Assuming the infrastructure described in the following subsection,   the only real disadvantage of protocol evolution is the amount of   memory required to run several versions of the same protocol.   Fortunately, memory is not the scarcest resource in modern   workstations (it may, however, be at a premium in the BSD kernel and   its derivatives). Since old versions may rarely if ever be executed,   the old versions can be swapped out to disk with little performance   loss. Finally, since this cost is explicit, there is a huge incentive   to eliminate old protocol versions from the network.O'Malley & Peterson                                             [Page 4]RFC 1263           TCP Extensions Considered Harmful        October 19912.4.  Infrastructure Support for Protocol Evolution   The effective use of protocol evolution implies that each protocol is   considered a vector of implementations which share the same top level   interface, and perhaps not much else.  TCP[0] is the current   implementation of TCP and exists to provide backward compatibility   with all existing machines. TCP[1] is a version of TCP that is   optimized for high-speed networks.  TCP[0] is always present; TCP[1]   may or may not be. Treating TCP as a vector of protocols requires   only three changes to the way protocols are designed and implemented.   First, each version of TCP is assigned a unique id, but this id is   not given as an IP protocol number. (This is because IP's protocol   number field is only 8 bits long and could easily be exhausted.)  The   "obvious" solution to this limitation is to increase IP's protocol   number field to 32 bits. In this case, however, the obvious solution   is wrong, not because of the difficultly of changing IP, but simply   because there is a better approach. The best way to deal with this   problem is to increase the IP protocol number field to 32 bits and   move it to the very end of the IP header (i.e., the first four bytes   of the TCP header).  A backward compatible modification would be made   to IP such that for all packets with a special protocol number, say   77, IP would look into the four bytes following its header for its   de-multiplexing information. On systems which do not support a   modified IP, an actual protocol 77 would be used to perform the de-   multiplexing to the correct TCP version.   Second, a version control protocol, called VTCP, is used to select   the appropriate version of TCP for a particular connection. VTCP is   an example of a virtual protocol as introduced in [2]. Application   programs access the various versions of TCP through VTCP. When a TCP   connection is opened to a specific machine, VTCP checks its local   cache to determine the highest common version shared by the two   machines. If the target machine is in the cache, it opens that   version of TCP and returns the connection to the protocol above and   does not effect performance. If the target machine is not found in   the cache, VTCP sends a UDP packet to the other machine asking what

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -