home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1993
/
Internet Info CD-ROM (Walnut Creek) (1993).iso
/
inet
/
ien
/
ien-119
< prev
next >
Wrap
Text File
|
1988-12-01
|
96KB
|
2,180 lines
IEN 119
ST - A Proposed Internet Stream Protocol
by
James W. Forgie
M. I. T. Lincoln Laboratory
7 September 1979
IEN 119 ST.DOC 7 September 1979
1.0 INTRODUCTION
The internet stream protocol (ST) described in this
document has been developed to support efficient delivery of
streams of packets to either single or multiple destinations in
applications requiring guaranteed data rates and controlled delay
characteristics. The principal applications with these
requirements are point-to-point speech communication and voice
conferencing. While ST has been developed as a part of the ARPA
Internet Program and has been formulated as an extension to the
presently defined Internet Protocol (IP), it is not likely to
find useful application in the current ARPA internet environment
where the networks and gateways lack the capacity to handle
significant speech communication. Instead, ST is aimed at
application in wideband networks, in particular those intended to
carry a large fraction of packet voice in their traffic mixes.
Work is currently underway on such networks both for local access
and long haul use. These networks will serve as vehicles for
research on techniques for flow and traffic control and as
testbeds for evaluating the potential of packet technology for
providing economical speech communication. The design of the ST
protocol represents a compromise among the sometimes conflicting
requirements of compatibility with the existing IP and the
gateways which handle it, the need for flexibility in supporting
flow and traffic control research, and transmission efficiency.
The concepts in this protocol originated in the
deliberations of a working group consisting of Danny Cohen, Estil
Hoversten, and the author. They have been influenced by
interactions with many other people. In order to examine the
cost and feasibility of the protocol, the author has fleshed out
some aspects of the protocol in detail. The other working group
participants have not had an opportunity to approve or modify
these detailed aspects of the protocol, and consequently all
responsibility for them lies with the author.
The state of the protocol is such that, while there are
still details to be worked out, implementation could begin if the
protocol were acceptable to those interested.
-2-
IEN 119 ST.DOC 7 September 1979
2.0 MOTIVATION AND GENERAL DESCRIPTION
It is reasonable to ask why a new protocol is required to
handle applications such as point-to-point speech and voice
conferencing. This section addresses that question and begins
with a brief statement of the requirements for packet speech
communication. They are:
1. The network must be able to keep up with the data rate
requirements of the speech terminal. Because no bits
need be transmitted during silent intervals, the
average data rate for conversational speech can be
expected to be between 40 and 50% of the peak data rate
for commonly used constant-rate encoding techniques.
Experimental variable-rate encoding techniques have
exhibited higher peak-to-average ratios. The network
must be able to sustain the peak rate for the duration
of talkspurt that can be as long as 20 seconds.
2. The stream of packets containing a talkspurt (a
continuous segment of speech between silent intervals)
must be delivered with a delay dispersion whose spread
does not exceed some value that can be estimated with a
high probability of success prior to the start of the
talkspurt. Since the individual packets of the spurt
will experience different delays as they pass through
the net, delay must be added at the receiver to allow
continuous speech to be played out for the listener.
It is necessary to predict the value of this smoothing
delay before starting to play out the talkspurt.
Packets that are delayed more than the predicted
worst-case value will arrive too late to be used, and
gaps will occur in the output speech.
3. Overall delay should be kept low. If the overall
round-trip delay is less than about l/4 second,
conversations are carried out in a "normal" fashion
with considerable feedback from "listener" to "talker"
taking place. When greater delay is experienced,
people switch to a more formal mode in which feedback
utterances are mostly suppressed, and the listener
generally waits until the talker indicates that he has
finished before saying anything. User satisfaction
declines with increasing delay, but systems remain
usable for delays as long as several seconds.
4. The amount of speech for any one talker contained in a
packet (the basic unit subject to transmission loss)
should be kept small. The loss of small (50 msec or
less) chunks of speech produces a degradation of
quality, but sentence intelligibility tends to be
-3-
IEN 119 ST.DOC 7 September 1979
preserved up to fairly high percentage losses. Larger
chunks of speech represent whole syllables or words,
and their loss can change the meaning of sentences.
5. Listeners will tolerate some packet loss without
downgrading the acceptability of the system, but the
probability of loss due to either failed or late
delivery must be kept in the order of 1% or less to be
considered acceptable for everyday (non-crisis) use.
6. As a network approaches its load limit it should reject
(or hold off) new offered load on a call basis not on
an individual packet basis. Continuing to accept new
calls beyond capacity can result in unsatisfactory
communication for many users.
7. If packet-switched speech transmission is to become
economically competitive with circuit-switched
transmission, a further requirement must be met. The
product of packet efficiency and average link
utilization must equal or exceed the efficiency of
circuit switching. That efficiency is defined as one
minus the fraction of the time that silence occurs in
conversational situations. Estimates of this fraction
for real-world conversations give values for efficiency
between 40 and 50%. We will use 45% as a convenient
figure for comparative purposes. Packet switching can
easily take advantage of the silent intervals in a
conversation by not transmitting packets, but that
advantage may be lost through the combination of
overhead bits in packet headers (packet efficiency) and
the difficulty of operating communication links at high
average utilization while keeping queueing delays
within reasonable bounds.
Conventional datagram networks are unsatisfactory for
speech communication except under conditions of light overall
load or where speech constitutes a small fraction of the overall
load and can be given priority service. The difficulty with
datagram nets comes from their inability to provide the
controlled delay and guaranteed data rate required for speech.
Delay increases with offered load, slowly at light load, but
dramatically as average load approaches capacity. Flow control
strategies tend to be aimed at buffer management and fairness
goals, both of which will operate to restrict the effective data
rate available to an individual user as load increases. Traffic
control strategies are mainly concerned with congestion control
and are primarily defensive, resulting in offered datagrams being
held off or refused when difficulties are detected.
Unfortunately for the speech user, by the time congestion is
detected, it is already too late. For satisfactory speech
-4-
IEN 119 ST.DOC 7 September 1979
service, congestion due to overload must be prevented. Since a
datagram net has no knowledge of the a priori requirements of
users, it cannot develop traffic control strategies to meet these
requirements.
Another disadvantage of datagrams for speech is their
packet efficiency. The speech content of an individual user
packet can be anything from 50 or so bits up to 1200 or 1300 bits
depending upon the speech digitization technique in use. The
need to carry full source and destination addresses as well as
other packet-handling information in each packet penalizes
datagrams relative to other packet and circuit switching
techniques. In the internet case the penalty is worse since two
sets of header information have to be carried.
For example, IP datagrams on SATNET carrying 40-msec
chunks of 16-kbps speech (a reasonaable chunk size and popular
data rate) would have a packet efficiency of about 56% and would
require utilization factors of about 80% to break even with
respect to circuit switching. It is unlikely that delay
characteristics would be satisfactory at this level of load.
The goal of the ST design effort has been to attempt to
overcome both of the difficulties associated with datagrams. ST
uses abbreviated internet headers and also allows speech from
many talkers to be aggregated into single packets for
transmission on wide-band networks where such aggregation is
possible. For the case of ST messages on a wide-band SATNET each
carrying ten 40-msec chunks of 16-kbps speech for ten different
talkers, packet efficiency would be about 86% allowing break-even
link utilization to occur at 52%, a much more comfortable level
for assuring desirable delay characteristics.
Overcoming the inability of datagram nets to maintain
data rates and delay characteristics as offered load increases is
more difficult to achieve than improving packet efficiency.
Circuit switching solves the problem by dedicating communication
capacity to individual streams. The goal of ST is to support
traffic control policies that match stated user requirements to
available resources taking into account the statistical
properties of these requirements rather than the peak
requirements used in circuit switching. ST does not itself
specify the traffic control algorithms to be used. The
development of such algorithms is an area of research that the
protocol is intended to support. Some algorithms may need only
rough statistical knowledge of user requirements and network
behavior. Others may want more detailed knowledge and need to
monitor the behavior of individual streams. The protocol is
intended to be general enough to support both extremes. A
successful traffic control algorithm would retain much of the
statistical multiplexing advantages of datagram nets while at the
-5-
IEN 119 ST.DOC 7 September 1979
same time gaining much of the guaranteed data rate and controlled
delay capabilities of circuit switched nets. A packet net using
ST also has the ability of a circuit switched network to deny
access to, or negotiate lower rates with, users whose demands
would exceed capability.
The ST protocol requires users to state the data rate and
delay requirements for a data stream before accepting any stream
data. These requirements are used by ST agents (host processes
and gateways) to determine whether or not resources are available
in the catenet to support the offered stream load. The
determination is based on knowledge of the stated requirements of
other users, negotiation with networks such as SATNET which have
built-in resource allocation mechanisms, and statistical load
estimates of traffic on networks that lack such mechanisms. In
order to accept the offered stream load, the cooperating agents
must find a route through networks with sufficient uncommitted
capacity to handle the new stream. In the process of routing the
stream, intermediate agents retain information about the stream.
The existence of this information allows the use of abbreviated
headers on stream data packets and the efficient distribution of
the multi-addressed packets required for conferencing.
The process used by ST agents in finding a route with
sufficient capacity between source and destination is assumed to
use a distributed routing algorithm to take advantage of the
robustness and flexibility characteristic of distributed packet
routing techniques. In the simplest case, the result would be a
fixed-path internet route (a fixed set of intermediate agents
(gateways)) for the stream packets. In the event of gateway or
network failure, rerouting would be required. This can be
undertaken automatically, but success is not guaranteed, since
loss of the failed element or elements is likely to result in
inadequate capacity to carry the original load. Fixed-path
routing is not required by the protocol. If desired, dynamic
alternate routing of stream packets can be used at the discretion
of individual agents, but gateway implementation and the routing
process will be more complex if that option is chosen. The
protocol described in this document assumes fixed-path routing.
The goal toward which the cooperating ST agents in a
catenet work is the maintenance of a controlled delay, guaranteed
data rate environment in which packet speech communications can
take place in a satisfactory fashion. Obviously, other non-
cooperating users of the networks involved in the catenet can
make it impossible to achieve that goal. Some independence of
other users can be obtained in some networks such as SATNET by
the use of dedicated resources. Gateways can be programmed to
throttle non-cooperating internet traffic. To some extent,
networks with poor delay characteristics can be avoided in the
routing process. Priority service can be used in some nets to
-6-
IEN 119 ST.DOC 7 September 1979
allow small quantities (proportionately) of ST traffic to be
handled satisfactorily in spite of the activities of other users.
However, the success of ST or any other approach to handling
packet speech will require either the cooperation of all network
users or the involvement of the networks themselves in providing
the required controlled delay, guaranteed data rate services.
3.0 RELATIONSHIP TO IP
ST is intended to operate as an extension of the
presently defined internet protocol (IP). ST provides a
different kind of service than the datagram service offered by
IP. ST must operate on the same level as IP in order to access
local net resources such as SATNET streams and to be able to take
advantage of any available local net multi-address delivery
capabilities to support conferencing applications. If an ST
agent shares a local net port with an IP datagram handler, the
two must cooperate in the use of the port to regulate traffic
flow through the port.
In order to get the advantage of abbreviated headers on
stream packets, ST uses a different header format than that used
for IP datagrams. Packets with this format (see Section 5.0 for
details) are called ST packets in this document. They pass from
one ST agent to another, and the abbreviated header information
changes on a hop-to-hop basis. However, ST packets cannot be
transmitted until a route for the stream has been found and
intermediate agents have built routing tables to translate the
abbreviated headers. Since end-to-end negotiation between ST
users is often desirable before stream routing takes place, for
example to agree on vocoder type and data rate, and it is
convenient for a user to interface to only one protocol handler,
ST provides a second type of service. This service uses IP
datagrams with an "ST" value in the IP Protocol Field. These
packets are called "IP.ST" packets. They pass through datagram
handlers in gateways and reach ST agents only at their
destination hosts.
A third type of packet is allowed by the protocol. This
type is realized by embedding an ST packet in an IP.ST packet.
This method of sending an ST packet allows it to pass through
gateways that do not support the ST protocol but do support IP
datagrams. Of course, the packet efficiency and traffic control
benefits of ST are lost in such a case, but the use of this
artifice could be justified on the grounds that any communication
is better than none.
-7-
IEN 119 ST.DOC 7 September 1979
4.0 CONCEPTS
The key concept in ST is that of a connection.
Connections are supported by entities called agents which are
made aware of the connection during a setup process that precedes
use of the connection for data transfer.
4.1 Agents
There are four types of agents that may be involved in
supporting ST connections. They are:
4.1.1 ST Hosts
The users of connections are processes that run in host
computers and communicate over connections through other
processes or software modules that adhere to the ST protocol.
Hosts having these processes or modules are called "ST hosts" (or
"hosts," when the context permits). ST hosts perform the
functions of gateway halves in interacting with gateways for
internet traffic. ST hosts share the management of local net ST
resources with the other agents on the local net and are capable
of routing connections to other agents as may be required. In
networks with local multi-addressing capability, ST hosts make
use of this capability in routing conference connections. In
networks lacking such capability, ST hosts may need to replicate
messages for conference connections unless a special agent called
a "replicator" is available in the local net. In some local nets
it may be desirable for hosts to forward traffic for conference
connections. The protocol allows but does not require the latter
capability.
4.1.2 ST Gateways
ST gateways perform routing and forwarding functions very
similar to those performed by IP gateways. Unlike IP gateways,
they store information about the connections they support and
share the management of resources in the nets to which they are
connected with the other agents in those nets. Like hosts, ST
gateways may have to replicate packets for conference
connections.
4.1.3 Replicators
In networks that lack multi-addressing or broadcast
capability it may be desirable to provide special server hosts to
handle the replication required for conferences. Replicators are
needed in situations where the load caused by replication would
produce congestion at a gateway port. Use of a replicator adds
delay and is probably not warranted unless the number of copies
needed in a particular net exceeds some threshold that depends
-8-
IEN 119 ST.DOC 7 September 1979
upon network port capacity. In worst-case situations a daisy-
chain type of replication might be required because the peak rate
could not be sustained at any network site. The existence of a
replicator does not eliminate the need for replication in hosts
and gateways. For example, a host in a conference with some
participants on the same net but others on other nets may need to
send packets to one or more gateways for speedy internet delivery
as well as to a replicator for automatic distribution to other
local net participants.
4.1.4 Access Controllers
The management of ST conference connections involves the
services of an access controller. The functions of an access
controller are to control conference participation and provide a
central source for information about the data rate requirements
of a conference connection. Ideally, access control services
would be provided by a set of hosts distributed throughout the
catenet that shared information about the connections being
controlled. The addresses of these public access controllers
would be known to all other agents, and a query to any one
controller would provide information about any connection. In
the absence of public access controllers, the protocol allows any
host to serve as a private access controller. It is proposed to
use a bit in the conference connection name to allow agents to
determine whether a public or private access controller is
responsible for a particular conference. The name identifies the
"owner" of the conference. The owner is also the access
controller in the private case.
4.2 Connections
Most applications for ST connections require full-duplex
(bi-directional) communication between the parties in a point-
to-point connection and omni-directional communication among the
participants in a conference connection. In the design of the
protocol two different approaches to realizing the desired
capability have been considered. The first, called the simplex
approach, uses a combination of simplex (one-way) connections.
For example, in the simplex approach the caller requests a
simplex connection to the called party, who, after accepting the
connection, requests another simplex connection for the return
path to the caller. In the second, called the full-duplex
approach, the caller requests a full-duplex connection at the
outset, and as soon as the called party has accepted the
connection, data can flow in both directions.
For conference connections, the simplex approach requires
each participant to request a simplex connection to all the
others. The full-duplex approach requires that a participant
request connection only to those that have not already requested
-9-
IEN 119 ST.DOC 7 September 1979
connection to him.
Both approaches can provide workable bases for the
required capabilities. The pros and cons for both may be
summarized as follows:
1. Simplex connections can take maximum advantage of
available resources by using different routes for the
forward and return paths. The routing of a full-duplex
connection is more likely to fail since a path with the
desired capacity in both directions must be found.
This advantage for simplex connections is most
pronounced in networks where load is assymetrical, a
situation to be expected in nets carrying relatively
heavy data loads.
2. Full-duplex connections can, except perhaps under
conditions of heavy load, be set up more rapidly and
with less control message traffic. The difference is
most pronounced for conference connections. With
full-duplex components of a conference connection, m-l
connection requests are required for an m-participant
conference, since each new participant must connect to
all those already in the conference. In the case of
simplex components each new participant must also
connect to all those already in the conference; but, in
addition, those already in must connect to each
newcomer. This activity adds sigma (m-l) connection
requests (and responses) to the setup procedure.
3. Simplex connections have an advantage in situations in
which two parties attempt to call each other at the
same time. The two simplex connections can easily be
combined into the required full-duplex connection. If
the two parties start out with full-duplex connections,
one of them must be refused or disconnected, a somewhat
more complex task for the higher level protocol
requesting the connection.
This document proposes a full-duplex basis for ST
connections because the author believes that the advantage of
relative simplicity and efficiency in setting up conference
connections outweighs the advantages of the simplex basis. To
allow connections with assymetrical flow requirements, the
protocol allows users to specify different data rates in the two
directions.
Even though traffic can flow in both directions on an ST
connection, the connection has an orientation, and packets are
said to move in either the "forward" or "backward" direction
depending on whether they are moving away from or toward the
-10-
IEN 119 ST.DOC 7 September 1979
originator of the connection.
ST provides two types of connections: Point-to-Point
(PTP) and Conference (CONF). PTP connections use different
packet header formats and setup procedures to reduce overhead and
allow faster setup for that more frequently used type.
4.2.1 Point-to-Point (PTP) Connections
PTP connections are set up in response to a CONNECT
command from an originating process to an ST agent. The CONNECT
specifies the following:
1. The NAME of the connection. The NAME is obtained by
concatenating the ST address of the originating process
(ORIGIN) with an arbitrary number. The ST address is
the internet host address (ala IP) concatenated with an
"extension" field (32 bits) to specify a process in the
host (a telephone for NVP applications). It is the
responsibility of the originating process to provide
arbitrary numbers that keep the names of all
outstanding connections unique.
2. The internet address of the process to which the
connection is desired. This address is called the
"TARGET." The terms "ORIGIN" and "TARGET" are used
instead of "SOURCE" and "DESTINATION" because the
latter terms will be used to refer to the senders and
receivers of packets travelling on the connection.
Thus the ORIGIN process can be both SOURCE and a
DESTINATION for packets on the full-duplex connection.
3. A flow specification (FLOW-SPEC) that tells ST agents
about the desired characteristics of the connection.
In addition to information about the data rate
requirements for both directions of the full-duplex
connection, the FLOW-SPEC has a PRECEDENCE value that
agents can use as a basis for the preemption of this or
other connections as part of the traffic control
strategy. The FLOW-SPEC is discussed in more detail in
Section 4.5.
4. An arbitrary 16-bit number that the agent is to use to
identify all ST packets that it will send to the
originator on the connection (the backward direction).
This identifier is called the "CID.B." If the
connection request is accepted, the originator will be
given a CID.F to be used to identify all packets it
sends in the forward direction on the connection.
These CID's allow abbreviated headers to be used on ST
-11-
IEN 119 ST.DOC 7 September 1979
packets and provide a means for agents to rapidly
locate the stored forwarding table involved in handling
a received packet. CID's are assigned by the agents
receiving packets and need be only locally unique since
they are reassigned on a hop-by-hop basis. The CID to
be used on the next hop is stored in the agent's
forwarding table.
During the setup procedure the CONNECT command propagates
from agent to agent until it reaches the TARGET process. This
propagation differs from ordinary packet forwarding in that the
intermediate agents inspect the command, take appropriate action,
and retain information about the requested connection. If the
TARGET process agrees to the connection, it sends an ACCEPT
command that is propagated back through the same intermediate
agents that handled the CONNECT. The agents take appropriate
action as they process the ACCEPT. If the TARGET process is not
willing to accept the connection, it issues a REFUSE command
which propagates back in the same fashion as the ACCEPT.
REFUSE's are generated by intermediate agents if they find
themselves unable to support a requested connection. An agent
receiving such a REFUSE tries alternate routes and passes the
REFUSE back another hop only when it has exhausted its routing
alternatives. Appropriate REASON codes are included in the REFUSE
commands.
After a connection has become established (an ACCEPT has
reached the ORIGIN), changes to the FLOW-SPEC can be accomplished
by the ORIGIN issuing a new CONNECT or the TARGET issuing a new
ACCEPT command. (Actually, the TARGET can issue a new ACCEPT at
any time after issuing the first ACCEPT, and it can also at that
time begin sending packets on the connection although there is
some hazard in doing so since they may pass the ACCEPT enroute
and be discarded.) For the case where the FLOW-SPEC calls for a
connection whose rate can be varied at the discretion of the
catenet, intermediate agents issue CONNECT's and ACCEPT's to
inform other agents and the end users about rate changes. These
commands are marked to distinguish them from end user commands.
The ACCEPT command contains the same kinds of information
as the CONNECT except that the backward connection identifier
(CID.B) is replaced by a forward identifier (CID.F). In
addition, the FLOW-SPEC will generally be different and will
indicate the data rates and delay characteristics accepted by the
agents. The CONNECT that arrives at the TARGET will be similarly
modified from the CONNECT that was issued by the ORIGIN and will
match the ACCEPT received by the ORIGIN. See Section 4.5 for a
discussion of the changes that can occur to the FLOW-SPEC.
-12-
IEN 119 ST.DOC 7 September 1979
4.2.2 Conference (CONF) Connections
The type of connection required for voice conferencing is
one in which any participant can send messages to all the others.
Connections of this type have been called "omniplex" connections.
ST realizes a conference connection by means of a superposition
of tree-like components that start from an origin process (the
root) and extend to a set of targets (the leaves). The set of
participants in a conference is represented by a bit map. Each
participant has a location in the conference bit map that is
assigned by the access controller (AC). When a conference
CONNECT command is given, a TARGET-BIT-MAP (TBM) is used to
specify the set of targets to which connection is requested. The
TBM is supplied by the AC when a participant joins a conference.
The tree-like components all have the same NAME, and intermediate
agents combine branches from the components whenever possible to
minimize resources committed to the conference. Because of this
combining, an ORIGIN-BIT-MAP (OBM) is needed to represent the set
of originators that have requested connection to a particular
participant.
The list of participating processes in a CONF connection
is not carried in the CONNECT request but is is maintained by the
AC and provided to agents and participants when needed. Another
function of the AC is to provide the FLOW-SPEC for the connection
to any agent on request. The reason for assigning these tasks to
an access controller is to prevent unauthorized connection to a
conference and to assure that all components of the connection
use the same FLOW-SPEC.
The first step in establishing a conference is to install
a list of participants and a FLOW-SPEC in an AC. The list of
participants may be fixed at the outset or be allowed to grow
during the course of the conference. A participant may depart
from a conference, but his position in the list and the bit maps
is not reused. The method by which the list of participants is
made known to the AC is not of concern to ST itself and is not
specified in this document. Higher level protocols such as a
network voice protocol (NVP) engage in communications between
participant processes and the AC in the process of setting up a
conference. For example, an NVP issues a JOIN command to
request access to a conference. If the NVP process is on the
participant list or is otherwise acceptable, the AC responds with
a WELCOME command that among other things tells the participating
NVP its location in the CONF bit map. The NVP then sends TELL-ME
messages to the AC to obtain the participant list and FLOW-SPEC
for the CONF connection. This information is provided in INFO
messages from the AC. Several of these messages may be required
to transmit all the information about a large conference. The
messages exchanged between participants and the AC are IP.ST
datagrams. They cannot be ST packets because no ST connection
-13-
IEN 119 ST.DOC 7 September 1979
exists between the participants and the AC.
Once a participant has received a WELCOME message from
the AC, it can issue a CONNECT.CONF command to its ST host agent.
It uses a TARGET-BIT-MAP (TBM) that it received as part of the
data in the WELCOME message. This TBM has bits set for all the
previous joiners of the conference. The CONNECT.CONF will thus
attempt to establish a full-duplex path to each of the previous
joiners. These paths will make use of common links where
possible and will result in a connection resembling a tree rooted
at the site of the process originating the connection. When the
CONNECT.CONF is issued by the originator it contains an ORIGIN-
BIT-MAP (OBM) with a single bit set corresponding to the
originating participant. If the CONNECT.CONF is successful
(i.e., some subset of the targets are reached), an ACCEPT.CONF
will be returned with bits set in the TBM indicating the
participants to which connection has been achieved. In a CONF
connection attempt, success may not be achieved with the entire
set of targets specified by TBM. Some may be unreachable for any
of a number of reasons. REFUSE.CONF messages will be returned
for all such failures with bits in the TBM identifying the
unreachable participants. If the failures in a particular
attempt are due to more than one REASON, at least one REFUSE.CONF
will be returned for each reason.
The technique for setting up conference connections
proposed for ST results in each participant actively connecting
to some subset of the others while accepting connections from the
rest. The first participant does not issue a CONNECT and accepts
all the others. The last connects to all the others and accepts
none. Each participant can maintain up-to-date information about
participation in the conference by utilizing the information in
the CONNECT and ACCEPT messages it receives.
The CONNECT.CONF messages received by agents during the
setup procedure do not contain information about the identity of
the participants. In order to route the connection, the agents
must acquire this information, and they do so by sending TELL-ME
messages to the AC and getting INFO messages in response. They
need to retain this information only during the routing phase of
connection setup. Once the connection is established, bit map
information in forwarding tables combined with a FORWARDING-BIT-
MAP (FBM) in the ST packet is sufficient to handle the forwarding
of packets on the connection. The FBM is used to specify the set
of destinations for the packet. Thus a packet can be sent to all
or any subset of the connection participants. The source of the
packet is identified by a number representing the position of the
source participant in the conference bit map.
-14-
IEN 119 ST.DOC 7 September 1979
In the case of a voice conference, no useful purpose is
accomplished when many people speak at the same time. It is
expected that a higher level protocol (part of NVP) would
regulate the activity of the conference and would normally allow
one or perhaps two persons to transmit speech at the same time.
ST is not involved in this aspect of conference control except to
the extent that if there are too many simultaneous talkers, the
traffic-handling capability of the connection could be exceeded,
and ST might discard some of the packets. The higher level
control protocol should set the FLOW-SPEC for the connection to
accommodate the expected traffic flow. Thus, for a simple one-
at-a-time conference, ST would be asked for a data rate
corresponding to a single speech stream.
The above discussion has described a connection
arrangement suitable for supporting voice conferences in which
any participant can transmit and be heard by all others. ST also
provides another kind of multi-address message delivery
capability. If only one participant issues a CONNECT.CONF
command with a TBM specifying connection to all the others, a
tree-like connection will be set up that allows the ORIGIN to
send packets to all the others and receive from any of the
others, but packets sent by the others will be received only by
the ORIGIN.
4.2.3 Taking Connections Down
The process of taking a connection down is initiated
either by an ORIGIN issuing a DISCONNECT message or a TARGET
issuing a REFUSE. These messages propagate from agent to agent
along the connection path so that intermediate agents can take
appropriate action to clean up their stored information about the
connection.
Connections can also be taken down as a result of
intermediate agents detecting a faulty link or gateway or
deciding to preempt the connection. In this case the agent or
agents involved issue a DISCONNECT/ REFUSE pair that propagate in
the appropriate directions. A REASON code in the messages
informs the users as to the cause of the disconnection.
In the case of conference connections, bit maps allow
selective disconnection and refusal.
4.3 Types of Service
ST offers two types of service for packets travelling on
connections. Neither type has any delivery guarantees, i.e.,
there are no acknowledgements or retransmissions on either a
hop-by-hop or an end-to-end basis. Neither type guarantees
packet integrity; i.e., if local nets offer a type of service
-15-
IEN 119 ST.DOC 7 September 1979
that can deliver packets with bits in error, ST may use that type
of service. The headers of ST packets are sum-checked by ST
agents, but the data portions are not.
The two types of service differ in whether or not they
use the channel capacity nominally allocated to the connection
and also in the strategy used by intermediate agents in buffering
them. The two types are:
1. Stream Packets (called ST.ST packets). These packets
use the allocated resources and are buffered for a
short time only, since they are intended for
applications such as speech communication where a late
packet is not worth delivering. They are discarded by
intermediate agents if queue conditions indicate that
they cannot be delivered in a timely fashion.
2. Datagrams (called ST.DG packets). These packets have
the same form as ST.ST packets except for a flag bit in
the header and travel over the same connection path.
They use allocated resources only when spare capacity
exists, e.g., when the ST.ST flow drops below the
allocated value. Otherwise they share local net
resources with other IP datagram traffic. They are
buffered with a queueing strategy appropriate for
datagram traffic and are discarded only when agent
buffer resources approach exhaustion. They are
intended for use by higher level protocols such as NVP
in applications such as dynamic control of the "floor"
in a conference. They are also used by ST itself for
connection management.
4.4 Packet Aggregation
ST allows any ST packets, stream or datagram, to be
aggregated together that have the same next-agent local-net
destination. "Aggregation" is a form of multiplexing, but is
given a different name to distinguish it from the multiplexing
done in the IP Multiplexing protocol that allows multiplexing
only for packets with the same end-to-end source and destination.
The term "envelope" is used to refer to any ST message sent from
one agent to another. An envelope may contain one or more ST
packets and is limited in size by the maximum size of packet that
the local net can carry. The envelope has a short header in
addition to the header of the individual aggregated packets. See
Section 5.0 for a description of header formats.
The ST aggregation technique requires agents to look
inside of received envelopes and handle the packets as individual
entities. This procedure adds to the computing load of gateways,
but can achieve significant communication savings in networks
-16-
IEN 119 ST.DOC 7 September 1979
with high per-packet overhead such as SATNET, particularly when
many short packets must be handled.
4.5 Flow Specifications
The FLOW-SPEC that is carried by CONNECT and ACCEPT
messages contains several fields. Some are specified by the
originator of the CONNECT. Others are produced either during the
process of setting up the connection or changing its allowed flow
characteristics. Some apply in common to both directions of the
full-duplex connection. Others apply individually to allow
different flows in the two directions and appear in pairs in the
control messages.
Data rate, the basic quantity used in traffic control
computations, is specified by means of three parameters; a stream
interval (SI), a packet length (PL), and a duty factor (DF). The
average expected data rate can be computed by taking the product
of PL, DF, and the reciprocol of SI. The FLOW SPEC allows for
one value each for SI and DF for each direction. However, as
many as four values of PL can be provided as options, allowing
the ST agents flexibility in allocating resources for some types
of traffic flow.
The flow type (TYPE) parameter is intended to allow ST to
take into account a variety of different user load
characteristics. The set of possible types can be expected to
grow with experience, but a relatively few types seem to be
adequate to deal with presently contemplated voice encoding
techniques. These are:
1. Fixed Rate. The data rate is held fixed for the life
of the connection. A simple speech encoder that can
run at only one rate would use this type value with all
four PL's set to the same value. A somewhat more
complex encoder that could run at more than one rate
but could not change rates on the fly would use the
fixed-rate type but could offer a choice of up to four
values for PL. A variable-rate vocoder such as the
LPC2 vocoder used in the ARPANET that has a rate that
varies depending on the short time behavior of the
speech signal would also use the fixed-rate type but
would set the duty factor to a lower value than the 0.5
or so used by a simple encoder.
2. Multiple Rate. The data rate allowed can be of any of
the four specified by the four PL's and the agents are
free to change rates at any time to accommodate to
network load changes. Whenever an agent changes the
rate, it sends appropriate CONNECT and ACCEPT messages
to tell other agents and the users about the change.
-17-
IEN 119 ST.DOC 7 September 1979
Since such rate changes require extra communication and
processing in the catenet, agents would have to avoid
frequent changes. This flow type would be used by
enoders that run at a variety of rates and can switch
rates rapidly but need to do so explicitly either
because packet formats must change with rate changes or
because some parameter such as sampling rate must be
changed at sender and receiver. This flow type could
also be useful for sending data rather than voice over
ST connections.
3. Prioritized Variable Rate. This flow type is intended
for use by certain advanced encoders of a kind called
"embedded" where subsets of the coded bit stream can be
stripped en route without loss of intelligibility.
There is, of course, some loss of quality and/or
ability to withstand acoustical background noise when
stripping occurs. For this flow type each of the four
PL's corresponds to one of the four packet priorities
that can be attached to ST.ST packets. The encoder
would place the bits needed for its lowest rate in the
highest priority packet, the next lowest in the second
highest, etc. When pressed for channel capacity,
agents would be free to discard the lower priority
packets for this flow type. The overall precedence of
the connection would also affect the probability of
packet discard. It is not anticipated that agents
would send explicit messages to announce that
discarding was taking place.
Another set of parameters in the FLOW-SPEC is concerned
with transmission delay. ST does not allow the user to specify a
delay requirement, but it does allow some control over the
tradeoff between delay and data rate options during the routing
process. A ROUTING-STRATEGY parameter is provided for this
purpose. Currently, two strategy options for PTP connections are
envisioned, but others could be added if desired. One gives
preference to minimizing delay at the expense of data rate. The
other gives preference to data rate over delay. The ROUTING-
STRATEGY options are meaningful only when data rate options are
available. Otherwise data rate is as absolute requirement in
routing.
While a user cannot specify a delay requirement to ST, ST
does provide the user with an estimate of both minimum delay and
delay dispersion in fields of the FLOW-SPEC. The estimates are
based on a priori statistics relating delays to average network
loads. When an agent propagates a CONNECT packet, it adds values
from tables indexed on the current load estimate to the MIN-DELAY
and DISPERSION fields of the FLOW-SPEC for the forward direction.
It performs the same function for the backward direction as it
-18-
IEN 119 ST.DOC 7 September 1979
propagates the ACCEPT. The MIN-DELAY is the simple sum of the
hop-to-hop contributions, but the DISPERSION is a sum of squares.
The receiver can compute an estimate of overall delay by adding
the MIN-DELAY to the square root of the DISPERSION. The
DISPERSION estimate by itself can be useful in setting the
reconstitution delay value needed to play out satisfactory speech
for listeners. The proper value can vary over a wide range
depending on the path through a catenet of networks with very
different delay characteristics.
Another parameter set by agents during the routing
process is the ACCEPTED-RATE field. This field informs the users
as to which of the four possible data rate options (PL's) have
been accepted for each of the two directions of the connection.
Of course, if none were acceptable, a REFUSE would be returned
with a REASON code indicating unavailability of resources at the
requested precedence level. Another flow-related reason for
refusal could be an inability of the networks to handle a too-
short stream interval.
All FLOW-SPEC parameters except PRECEDENCE and ROUTING-
STRATEGY can be independently specified or are reported
separately for each of the two directions of the full-duplex
connection. The exceptions are required to apply to the entire
connection to simplify the task of gateways in handling
connections.
The ROUTING-STRATEGY field has other control functions in
addition to weighting the tradeoff between data rate and delay.
For CONF connections it indicates whether or not data rate
options must match in both directions (a requirement for voice
conferencing) or can be negotiated independently. If ST agents
support split routing, (a capability to divide the traffic on a
connection among two or more paths) the ROUTING-STRATEGY field
will indicate whether or not this technique is to be applied to
the connection. Split routing also requires additional fields to
indicate the fraction of the nominal traffic that has been
accepted or is requested to be handled. This document does not
propose the implementations of split routing in the first version
of ST.
-19-
IEN 119 ST.DOC 7 September 1979
5.0 PACKET FORMATS
The messages sent between ST agents on connections are
envelopes containing one or more ST packets. The envelope
consists of an envelope header (EH) followed by one or more
packet headers (PH's) followed by the data portions of the
packets in the same order. The envelope thus has the form:
EH, PH1, PH2, . . .PHn, DATA1, DATA2, . . . DATAn
The reason for aggregating the headers separately from the data
is that doing so allows the header region to be checksummed
easily as a unit before attempting to parse the envelope. It is
expected that ST will be used in networks that can deliver
messages with bits in error and that some non-negligible fraction
of the messages will have such errors. To require the entire
envelope to be error-free in order to use any of it would result
in an excessive rate of lost packets.
Since ST operates as an extension of IP, the envelope
arrives at the same network port that IP uses to receive IP
datagrams. It is proposed to use a unique code in the first
field of the message to identify it as an ST envelope. The first
four bits of an IP datagram are defined to be the Version Number
field. It is therefore proposed to use one of the 16 possible IP
versions to distinguish ST envelopes from IP datagrams. With
this convention an envelope header will have the following
format:
-20-
IEN 119 ST.DOC 7 September 1979
ENVELOPE HEADER
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! ST !VERSION! HEADER-LENGTH !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! TOTAL-LENGTH !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! CKSUM !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
ST is the particular IP Version Number assigned to
identify ST envelopes.
VERSION is the ST version number. This document is a
proposal for VERSION 1.
HEADER-LENGTH* is the length in words of the envelope
header (3) plus the sum of the header lengths of the
aggregated packets.
TOTAL-LENGTH is the length of the entire envelope. It
does not include any local net headers or trailers.
CKSUM covers the envelope header and all packet
headers.
++++++++++++++
*All ST communications use the 16-bit word as a basic unit. All
lengths are in word units.
++++++++++++++
-21-
IEN 119 ST.DOC 7 September 1979
The individual packet headers have one of two formats
depending on whether they are for PTP or CONF connections. These
formats are:
PTP PACKET HEADER
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! CID !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
!0! BITS ! DATA-LENGTH !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
CONF PACKET HEADER
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! CID !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
!1! BITS ! DATA-LENGTH !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! Spare ! FBML! ! SID !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! FBM - 1st word !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
.
.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! FBM - nth word !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
CID is an arbitrary identifier assigned by the agent
receiving the packet for the purpose of identifying the
connection on which the packet is travelling. Since
the CID is unique only to the agent that assigned it,
it will generally have a different value on each hop of
the connection path.
BITS are defined as follows:
Bit 1 distinguishes stream packets (ST.ST) from
datagrams (ST.DG) (1 = DG).
Bits 2 and 3 define the packet priority (00 = highest
priority).
Bits 4 and 5 are spares.
Bits 6 and 7 are unused (may be used by higher level
protocols if desired).
-22-
IEN 119 ST.DOC 7 September 1979
DATA-LENGTH is the length of the data field in words.
FBML (3 bits) is one less than the length of the
Forwarding Bit Map (FBM) in words.
SID (7 bits) identifies the source of the packet on a
CONF connection (the source is implicit for a PTP
connection packet). The value of SID corresponds to
the bit position of the source in the conference bit
map. Bit numbers start with zero, and positions start
with the left-most (most significant) bit of the first
word of the bit map.
FBM is the Forwarding Bit Map. It can be at most 128
bits (8 words) long, and thus it limits conferences to
128 participants (a generous number). Ones in the FBM
indicate that the packet is to be delivered to the
corresponding participants. The FBM is allowed to
increase in one word increments to allow new
participants to enter during the course of a
conference, but it does not shrink when participants
leave, and bit positions are not reused.
As pointed out in Section 3.0, ST supports a second type
of communication called IP.ST datagrams. These are ordinary IP
datagrams with an "ST" value in the protocol field. They are
used to allow higher level protocols to communicate prior to the
setting up of an ST connection, and they are also used for
communication between access controllers and other ST agents
during the setup of CONF connections. They are strictly point-
to-point communications since they are IP datagrams. According
to the conventions for IP datagrams, these messages would have
the form:
IP Header, IP.ST Header, Data
-23-
IEN 119 ST.DOC 7 September 1979
The IP.ST Header has the following form:
IP.ST PACKET HEADER
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! IP.ST !VERSION! LENGTH !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! SOURCE- !
+-+-+ +-+-+
! EXTENSION !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! DESTINATION- !
+-+-+ +-+-+
! EXTENSION !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
IP.ST is a value chosen to be different from the "ST"
value used in the first four bits of the ST envelope.
This field allows IP.ST datagrams to be distinguished
from ST envelopes embedded in IP.ST packets, a
technique that can be used to get ST envelopes through
gateways that do not support ST.
VERSION is the ST version number.
LENGTH is the total length of the IP.ST packet
excluding IP and local net headers, etc.
SOURCE- and DESTINATION-EXTENSION's are 32-bit fields
used to identify the source and destination processes.
Like ARPANET NCP process identifiers, they are not
specified by the protocol. The source and destination
host addresses are carried in the IP header.
6.0 CONTROL MESSAGES
With the exception of communications with access
controllers, ST control messages are sent from agent to agent as
ST.DG packets with the CID set to zero. This convention is
similar to the ARPANET NCP use of Link 0 for control.
Communication with AC's uses IP.ST packets. The form is
otherwise the same. The control protocol follows a request-
response model with all requests expecting responses and all
responses expecting acknowledgements. Retransmission after
timeout is used to allow for lost or ignored messages. A packet
may contain more than one control message. Control messages do
not extend across packet boundaries.
-24-
IEN 119 ST.DOC 7 September 1979
Control message headers have the following format:
CONTROL MESSAGE FORMAT
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! OP-CODE ! LENGTH !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! CKSUM !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
! REFERENCE !
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
OP-CODE specifies the request or response.
LENGTH is the length of the control message in words.
CKSUM is the checksum of the control message. Because
the control messages travel in envelopes that may be
delivered with bits in error, each control message must
be checked before it is acted upon.
REFERENCE is an arbitrary reference number used to
associate requests with responses and acknowledgements.
The header is followed by parameters as required for the
particular OP-CODE. Each parameter is identified with a P-CODE
byte that is followed by a P-LENGTH byte indicating the length of
the parameter (including the P-CODE, P-LENGTH word) in words.
Parameters can be sent in any order. The format of individual
parameters is specified in the following sections in connection
with the OP-CODE's with which they are used.
Control messages fall into two categories according to
whether they deal with PTP or CONF connections. There are four
messages that are independent of connection type. These are:
6.0.1 [ACK]
ACK (OP-CODE = 1) has no parameters. The REFERENCE in
the header is the REFERENCE number of the message being
acknowledged. ACK's are used to acknowledge responses to
requests and in some cases constitute responses or partial
responses themselves.
-25-
IEN 119 ST.DOC 7 September 1979
6.0.2 [HELLO]
HELLO (OP-CODE = 2) is used to determine whether or not
another agent is alive and well. It has no parameters and
expects an ACK in response.
6.0.3 [ERROR-IN-REQUEST] <REF> <ERROR-TYPE>
ERROR-IN-REQUEST (OP-CODE = 3) is sent in response to a
request in which an error is detected. An ACK is expected. No
action is taken on the erroneous request.
REF (P-CODE = 7, P-LENGTH = 2) is the REFERENCE number
of the erroneous request.
ERROR-TYPE is not yet specified.
6.0.4 [ERROR-IN-RESPONSE] <REF> <ERROR-TYPE>
This message (OP-CODE = 4) is sent in lieu of an ACK for
a response in which an error is detected. No ACK is expected.
Action taken by the requester and responder will vary with the
nature of the request.
REF identifies the erroneous response.
ERROR-TYPE is not yet specified.
6.1 Control Messages for PTP Connections
PTP connections are set up and taken down with the
following messages:
6.1.1 [CONNECT.PTP] <NAME> <TARGET> <FLOW-SPEC> <CID.B>
CONNECT.PTP (OP-CODE = 5) requests the set up (routing)
of a PTP connection or asks for a change in the flow
specification of a connection already routed. Its parameters
are:
NAME (P-CODE = 1, P-LENGTH = 6) is the ST address of
the process that originated the CONNECT.PTP (the
ORIGIN) concatenated with a 16-bit number chosen to
make the name unique. An ST address is a 32-bit IP
host address concatenated with a 32-bit EXTENSION
identifier chosen to identify a particular process in
the host. The EXTENSION is provided by some higher-
level protocol and is assumed by ST to be unique to the
host. For NVP use the EXTENSION identifies a
particular telephone and is presumably a well-known
-26-
IEN 119 ST.DOC 7 September 1979
quantity.
TARGET (P-CODE = 2, P-LENGTH = 5) is the ST address of
the target process.
FLOW-SPEC (P-CODE = 3, P-LENGTH = 18) is a complex
parameter that both specifies and reports on the flow
requirements and expected delay characteristics of the
full-duplex connection. See Section 4.5 for further
information.
CID.B (P-CODE = 4, P-LENGTH = 2) is the connection
identifier to be used on packets moving in the backward
direction on the connection.
CONNECT.PTP expects a response. There are four response
possibilities: ACCEPT.PTP, REFUSE.PTP, ACK, and ERROR-IN-REQUEST.
Receipt of an ACK means that the agent receiving the request is
working on it, and the requester should wait for a future ACCEPT
or REFUSE. ERROR-IN-REQUEST will be returned only when a format
error is detected in the CONNECT.PTP. Other errors, if detected,
will elicit REFUSE messages.
The processing of CONNECT messages requires care to avoid
routing loops that could result from delays in propagating
routing information among gateways. The example in Section 7.0
describes in some detail the actions of agents in handling
CONNECT requests while routing a connection.
6.1.2 [ACCEPT.PTP] <NAME> <TARGET> <FLOW-SPEC> <CID.F)
ACCEPT.PTP (OP-CODE = 6) is returned to indicate that the
requirements of a CONNECT.PTP have been met or that a change in
flow specifications has occured. Parameters are the same as for
CONNECT.PTP except that a CID.F (P-CODE = 5, P-LENGTH = 2) is
returned for use on packets travelling in the forward direction.
The FLOW-SPEC will be modified to show the accepted rate and
accumulated delay information (See Section 4.5).
ACCEPT messages expect ACK's or ERROR-IN-RESPONSE's.
ERROR-IN-RESPONSE will be returned if an ACCEPT is sent to an
agent that has no knowledge of the connection. This may occur if
an ACCEPT is generated at the same time that a DISCONNECT is
being propagated.
6.1.3 [REFUSE.PTP] <NAME> <REASON>
REFUSE.PTP (OP-CODE = 7) is returned to indicate that agents have
failed to set up a requested connection or that a previously
established connection has been lost. REFUSE's are also returned
to indicate routing failure, and in such a case may not end up
-27-
IEN 119 ST.DOC 7 September 1979
propagating back to the origin. TARGET's also issue REFUSE's to
take down connections intentionally.
REASON (P-CODE = 6, P-LENGTH = 2) indicates the reason for
connection refusal. REASON codes apply also to DISCONNECT
messages and include the following:
CODE EXPLANATION
0 No explanation
1 Target refuses connection
2 Target does not respond
3 Target cannot be reached
4 Connection preempted
5 STREAM INTERVAL too short
6 Requested data rate cannot be handled
7 Connection broken due to network fault
8 Connection broken by ORIGIN
9 Conflicting FLOW-SPECs in CONF connections
REFUSE's are ACK'ed and are propagated by intermediate
agents if meaningful (i.e., the agents had tables for the
connection). The backward propagation of a refuse may be halted
at an intermediate agent if an alternate route exists that has
not been tried, and the REASON indicates that it is reasonable to
try the alternate route. (I.e., it does not indicate that the
target refuses or does not respond).
6.1.4 [DISCONNECT.PTP] <NAME> <REASON>
DISCONNECT.PTP (OP-CODE = 8) is sent to request that a
previously requested connection be taken down. It can be
generated either by the originator of the CONNECT or by an
intermediate agent that executes a preemption or detects a fault.
REASON uses the same codes as REFUSE although not all
codes apply.
DISCONNECT expects an ACK and is propagated in the
forward direction so long as agents are encountered that know
about the connection.
A connection can be taken down either by a REFUSE or a
DISCONNECT (or both) depending upon which end first decides to
initiate the process. If both start within a propagation time of
each other, neither message will reach the opposite end.
-28-
IEN 119 ST.DOC 7 September 1979
6.2 Control Messages for CONF Connections
CONF connections are set up and taken down with CONNECT,
ACCEPT, REFUSE, and DISCONNECT messages, but the CONF versions of
these messages have somewhat different parameters. In addition,
CONF connection setup requires that agents communicate with
access controllers by means of TELL-ME and INFO messages. These
latter messages are sent as IP.ST datagrams. The former are sent
as ST.DG packets with CID = 0.
6.2.1 [CONNECT.CONF] <NAME> <OBM> <TBM> <CID.B>
CONNECT.CONF (OP-CODE = 9) requests the setup (routing)
of a CONF connection or asks for a change in flow specifications
of a connection already routed. The parameters NAME and CID.B
have the same form and interpretation as they do for CONNECT.PTP
except that NAME is the name of the owner of the conference, not
the originator of the CONNECT message. The new parameters OBM
and TBM allow the message to deal with multiple ORIGIN and TARGET
processes. The FLOW-SPEC for the connection is obtained from the
access controller.
OBM (P-CODE = 8, P-LENGTH = 2-9) is the ORIGIN-BIT-MAP.
Bits set in the map identify originating processes. When a
CONNECT.CONF is first issued by a user process only one bit is
set in OBM identifying the issuer. However, as the message
propagates, intermediate agents may find that they have other
CONNECT.CONF messages for the same connection on hand at the same
time. In that case, they can merge the requests so that more
bits become set as the message approaches its targets.
TBM (P-CODE = 9, P-LENGTH = 2-9) is the TARGET-BIT-MAP.
Bits set in the map identify the target processes. In general,
the user process will have set many bits in TBM when it first
issues a CONNECT.CONF. As the message propagates it will split
many times, each split reducing the number of bits left set in
TBM. When the CONNECT.CONF's reach their targets only one bit
will be left set in each.
Since the CONNECT.CONF message does not tell its receiver
anything about the actual identities of the target processes,
intermediate agents must get this information, as well as the
FLOW-SPEC, from the access controller by sending TELL-ME messages
and receiving INFO messages in response. The agents use the NAME
to locate the AC, using a bit in the name to distinguish between
a public or private AC. The NAME is the ST address of a process
concatenated with a 16-bit number to make the NAME unique. It is
proposed that the most significant bit of that 16-bit number be
used to distinguish public from private ACs. A zero in that bit
would indicate a private AC and in that case, agents would send
-29-
IEN 119 ST.DOC 7 September 1979
TELL-ME messages to the process address in the NAME. In the
public case, the agent would communicate with an AC whose address
was known a priori to the agent.
6.2.2 [ACCEPT.CONF] <NAME> <OBM> <TBM> <FLOW-SPEC> <CID.F>
ACCEPT.CONF (OP-CODE = 10) is similar in function to
ACCEPT.PTP. NAME, FLOW-SPEC, and CID.F have the same form and
interpretation. OBM specifies the set of originators to which
the ACCEPT is to be propagated. TBM specifies the set of targets
that have accepted the connection. This set may be a sub-set of
the targets requested in the CONNECT to which an ACCEPT responds.
The FLOW-SPEC is included in the ACCEPT because it reflects the
actual resources granted to the connection.
6.2.3 [REFUSE.CONF] <NAME> <OBM> <TBM> <REASON>
REFUSE.CONF (OP-CODE = 11) is similar in function to
REFUSE.PTP. As for ACCEPT.CONF, OBM specifies the set of
originators to which the REFUSE is to be propagated. TBM
specifies the set of targets that cannot be reached, have
refused, etc. A single REASON applies to all the targets in the
TBM. If more than one REASON applies to a set of targets, as
many REFUSE's as REASON's will be sent.
6.2.4 [DISCONNECT.CONF] <NAME> <OBM> <TBM> <REASON>
DISCONNECT.CONF (OP-CODE = 12) is similar in function to
DISCONNECT.PTP. As for REFUSE.CONF, OBM and TBM specify the sets
of originators and targets to which the DISCONNECT applies.
6.2.5 [TELL-ME] <NAME> <PART-NUM> <FLOW-SPEC-REQ>
TELL-ME (OP-CODE = 13) is sent from an agent or a
participant process to an access controller . The AC is expected
to return an INFO message with the requested information. Either
of the latter two parameters may be omitted.
PART-NUM (P-CODE = 10, P-LENGTH = 2) specifies the number
of the first participant about which information is requested.
The response will be a participant list starting with the
specified participant and continuing until the maximum packet
size is reached or the list is exhausted.
FLOW-SPEC-REQ (P-CODE = 11, P-LENGTH = 2) requests the AC
to send the FLOW-SPEC for the connection.
-30-
IEN 119 ST.DOC 7 September 1979
6.2.6 [INFO] <NAME> <STATUS> <PART-LIST> <FLOW-SPEC>
INFO (OP-CODE = 14) is sent from an AC to an agent or
participant process in response to a TELL-ME. It provides the
requested information. STATUS is always present. PART-LIST and
FLOW-SPEC are present only when requested by the TELL-ME.
STATUS (P-CODE = 12, P-LENGTH = 2) carries 2 bytes of
information. Byte 1 is the CONF-TYPE. Byte 2 gives the length
of the participant list. The following values for CONF-TYPE are
defined:
Type Meaning
0 No conference defined with this NAME
1 Conference with closed participant list
2 Conference with open list and password
3 Conference with completely open list (no
password needed).
PART-LIST (P-CODE = 13, P-LENGTH = (4m + 2)) provides a
section of the participant list starting at the location (PART-
NUM) requested in the TELL-ME and continuing until either the end
of the list or packet capacity is reached. The items in the
PART-LIST are the ST addresses (64 bits) of the participating
processes. The addresses are present whether or not the
participants are active. The addresses are preceded by a word
giving the number of the first participant on the list.
FLOW-SPEC is the nominal FLOW-SPEC for the conference.
7.0 AN EXAMPLE OF CONF CONNECTION SETUP
This section is a rather detailed example of the actions
called for by ST in setting up a connection for a conference with
four participants. In addition to showing the control message
flow, it also indicates the information used and retained by
gateways in supporting the connection. For the sake of
simplicity, it is assumed that the flow requirements are always
met. The ".CONF" suffix is omitted from OP-CODE's, and
parameters such as NAME and FLOW-SPEC that are always the same
are also omitted. In addition, ACK's are not shown but are
assumed to occur where required.
-31-
IEN 119 ST.DOC 7 September 1979
The example uses the following network configuration:
+---+ +---+ +---+
!P3 ! !P2 ! !P1 !
+---+ +---+ +---+
!ST3! !ST2! !ST1!
+---+ +---+ +---+
! ! !
! ! !
+-------+ +------+ +-------+ +------+ +-------+
! Net A !--! G.AB !--! Net B !--! G.BC !--! Net C !
+-------+ +------+ +-------+ +------+ +-------+
! !
! !
+---+ +---+
!ST4! !AC !
+---+ +---+
!P4 !
+---+
Each participant (Pi) communicates through a host agent
called "STi." The communications between the P's and their local
ST's are written out as control messages to show the logical flow
even though in actual implementations they might be handled very
differently.
The actions involving ST start after the participants
have joined the conference by communicating with the access
controller (AC) and have received TARGET-BIT-MAPs (TBMs) telling
each Pi to which other Pi's connections are to be set up. The
notation "{ A, B, C }" is used to indicate a bit map with bits
set for A, B, and C. The participants are assumed to have joined
in the order of their numbers. Thus P1 got an empty TBM ({ }),
and P4 got TBM = { P1, P2, P3 }. According to the rules, P1
issues no CONNECT messages, but waits for the others to connect
to it. The action thus begins with P2 sending:
P2->ST2: [CONNECT] <OBM = { P2 }> <TBM = { P1 }> <CID.B = 3>
ST2->AC: [TELL-ME] <PART-NUM = 1> <FLOW-SPEC-REQ>
AC->ST2: [INFO] <PART-LIST = ADDR.P1, ADDR.P2, ADDR.P3, ADDR.P4>
<FLOW-SPEC> <STATUS>
These last two commands are executed independently by all
agents when they first receive a CONNECT. They will be replaced
by the phrase "X gets info" in the following.
-32-
IEN 119 ST.DOC 7 September 1979
ST2 observes that ADDR.P1 is not in its local net and
lacking routing knowledge decides to try G.AB (the wrong
direction).
ST2->G.AB: [CONNECT] <OBM = { P2 }> <TBM = { P1 }> <CID.B = 17>
G.AB gets info and decides that net C is unreachable
except through net B from whence the CONNECT came.
G.AB->ST2: [REFUSE] <OBM = { P2 }> <TBM = { P1 }>
<REASON = 3 (Target cannot be reached)>
ST2 decides to try another gateway.
ST2->G.BC: [CONNECT] <OBM = { P2 }> <TBM = { P1 }> <CID.B = 17>
G.BC gets info, builds a connection entry, and sends:
G.BC->ST1: [CONNECT] <OBM = { P2 }> <TBM = { P1 }> <CID.B = 100l>
ST1 gets info and sends:
ST1->P1: [CONNECT] <OBM = { P2 }> <TBM = { P1 }> <CID.B = 1>
Since P1 has already joined the conference and recognizes
P2 as another participant, it sends:
P1->ST1: [ACCEPT] <OBM = { P2 }> <TBM = { P1 }> <CID.F = 1>
ST1->G.BC: [ACCEPT] <OBM = { P2 }> <TBM = { P1 }> <CID.F = 32>
At this point G.BC would have the following stored
information (neglecting bookkeeping items such as pointers).
1. A connection block with NAME, FLOW-SPEC, and CID.IN =
1001 (the same CID can be used for all inputs for the
connection). This information is retained for the life
of the connection. The PART-LIST used in processing
may be discarded once an ACCEPT (or REFUSE) has been
received and the forwarding tables have been created.
However, since there are likely to be other CONNECT's
to be processed, it would be efficient to keep the
PART-LIST for a time (say several minutes).
-33-
IEN 119 ST.DOC 7 September 1979
2. Two forwarding tables, one for each packet that might
be sent in response to an input.
ITEMS #1 #2
NET-PORT B C
ADDRESS ST2 ST1
MASK.OBM { P2 } { }
MASK.TBM { } { P1 }
CID.OUT 17 32
The principal function of the masks is to facilitate
packet forwarding. When a packet arrives, the following
computation is made for each forwarding table to compute the
output FORWARDING-BIT-MAP (FBM):
FBM.OUT = FBM.IN & (MASK.OBM U MASK.TBM)
If FBM.OUT has no bits set, it is not necessary to send a packet
to the address in the table. Otherwise a packet is sent using
the NET-PORT, ADDRESS, and CID.OUT from the table.
Having built its tables, G.BC sends:
G.BC->ST2: [ACCEPT] <OBM = { P2 }> <TBM = { P1 }> <CID.F = 1001>
ST2->P2: [ACCEPT] <OBM = { P2 }> <TBM = { P1 }> <CID.F = 10>
At this point P2 and P1 are connected and could begin
talking, if permitted by the higher level protocol.
In connecting P3 and P4 we will assume that both initiate
requests at essentially the same time so that they propagate
concurrently.
P3->ST3: [CONNECT] <OBM = { P3 }> <TBM = { P1, P2 }> <CID.B = 5>
P4->ST4: [CONNECT] <OBM = { P4 }> <TBM = { P1, P2, P3 }>
<CID.B = 1>
ST3 and ST4 get info. ST3 notices that P1, P2 both are
outside the local net, but ST4 notices as well that P3 is on the
same net as P4.
They send:
-34-
IEN 119 ST.DOC 7 September 1979
ST3->G.AB: [CONNECT] <OBM = { P3 }> <TBM = { P1, P2 }>
<CID.B = 135>
ST4->ST3: [CONNECT] <OBM = { P4 }> <TBM = { P3 }> <CID.B = 27>
ST4->G.AB: [CONNECT] <OBM = { P4 }> <TBM = { P1, P2 }>
<CID.B = 27>
ST3 forwards the CONNECT to P3, which accepts, and ST3
responds to ST4 with:
ST3->ST4: [ACCEPT] <OBM = { P4 }> <TBM = { P3 }> <CID.F = 135>
Meanwhile G.AB gets info and notices that it has two
CONNECT's for the same NAME. It decides to merge them and sends:
G.AB->ST2: [CONNECT] <OBM = { P3, P4 }> <TBM = { P2 }>
<CID.B = 2356>
and
G.AB->G.BC: [CONNECT] <OBM = { P3, P4 }> <TBM = { P1 }>
<CID.B = 2356>
ST2 forwards the CONNECT to P2, which accepts, and ST2
sends:
ST2->G.AB: [ACCEPT] <OBM = { P3, P4 }> <TBM = { P2 }>
<CID.F = 17>
Now G.AB will not continue to propagate the ACCEPT
because the CONNECT on which it is working asked for connection
to P1 as well as P2. It will wait for an ACCEPT or REFUSE from
P1.
G.BC already knows about the connection to P1, but it
does not assume that P1 will accept P3 and P4, so it propagates
the CONNECT.
G.BC->ST1: [CONNECT] <OBM = { P3, P4 }> <TBM = { P1 }>
<CID.B = 1001>
ST1 forwards to P1, which accepts, and ST1 responds:
ST1->G.BC: [ACCEPT] <OBM = { P3, P4 }> <TBM = { P1 }> <CID.F =
32>
In the latter exchange G.BC and ST1 used the same CID's
they had used before for this connection. If either had chosen
to use a different CID, the newer value would supercede the
earlier one in the forwarding table.
-35-
IEN 119 ST.DOC 7 September 1979
It should be noted that the protocol could allow G.BC to
accept the connection from P3 and P4 without forwarding the
CONNECT to ST1 because G.BC already knows it has a connection to
P1. This shortcut is not taken because it denies P1 the
information about the connection requests from P3 and P4 and the
opportunity to refuse those connections if desired.
To finish the setup we have:
G.BC->G.AB: [ACCEPT] <OBM = { P3, P4 }> <TBM = { P1 }>
<CID.F = 1001>
G.AB will now accept for P1 and P2.
G.AB->ST3: [ACCEPT] <OBM = { P3 }> <TBM = { P1, P2 }>
<CID.F = 2356>
G.AB->ST4: [ACCEPT] <OBM = { P4 }> <TBM = { P1, P2 }>
<CID.F = 2356>
When ST3 and ST4 propagate the ACCEPT's to P3 and P4 the
conference connection is complete.
At this point the forwarding tables in G.BC are the
following:
ITEM #1 #2 #3
NET-PORT B C B
ADDRESS ST2 ST1 G.AB
MASK.OBM { P2 } { } { P3, P4 }
MASK.TBM { } { P1 } { }
CID.OUT 17 32 2356
If at some later time G.BC should decide to preempt the
connection, it would issue one message for each forwarding table
entry:
G.BC->ST2: [REFUSE] <OBM = { P2 }> <TBM = { P1 }>
<REASON = 4 (Connection preempted)>
G.BC->ST1: [DISCONNECT] <OBM = { P2, P3, P4 }> <TBM = { P1 }>
<REASON = 4 (Connection preempted)>
-36-
IEN 119 ST.DOC 7 September 1979
G.BC->G.AB: [REFUSE] <OBM = { P3, P4 }> <TBM = { P1 }>
<REASON = 4 (Connection preempted)>
Having issued these messages and received ACKs in
response (or timed out in the absence of an ACK), the gateway can
delete the table entries and reclaim the CID for future use. The
REFUSE sent to G.AB would, of course, be propogated to ST3 and
ST4.
8.0 AREAS NEEDING FURTHER WORK
This document does not completely specify the protocol.
Further work is needed to specify error conditions and their
handling. The FLOW-SPEC parameter is not yet laid out in detail.
Rerouting has not been thought through sufficiently. The whole
area of routing strategies and the information to be exchanged
among gateways has not been given much consideration. There is
also a need for agents to exchange information (not yet
specified) about local net resources. For example, if agents are
to make use of local net multi-addressing capability, the
selection of a CID for a connection is no longer at the
discretion of an individual agent. A convention is needed to
avoid conflicting use of CID's as well as requesting duplicate
resources to serve a CONF connection. The CONNECT control
message needs to be extended to allow agents to indicate local
net resources that are already committed to a CONF connection.
-37-