RFC142 Time-Out Mechanism in the Host-Host Protocol

0142 Time-Out Mechanism in the Host-Host Protocol. C. Kline, J. Wong. May 1971. (Format: TXT=4372 bytes) (Status: UNKNOWN)

日本語訳
RFC一覧

参照

Network Working Group                            Charley Kline
Request for Comments #142                        Johnny Wong
NIC #6727                                        UCLA (NMC)
Categories: C.1, C.2, C.3, C.5                   3 May 71
Updates: none
Obsoletes: none


              Time-out Mechanism in the Host-Host Protocol

On sending a message to a foreign site, the following situations can
occur:

1. Destination IMP down - Type 7 message is returned

2. Destination IMP up but destination IMP-HOST interface is
   down - Type 7 message is returned.

3. Destination IMP and IMP-HOST interface up, but IMP-HOST inter-
   face is not taking messages - Type 9 message is returned after
   IMP time-out (ask BBN for time).

4. Destination IMP and IMP-HOST interface up and IMP-HOST inter-
   face is taking messages - Type 5 (rfnm) message is returned.

A suggestion for handling type 7 and type 9 messages has been made in
NWG/RFC #117.  In this document we would like to discuss in detail the
problem: what should happen to the HOST-HOST protocol on receiving a
rfnm?

When a NCP sends out a STR or RTS control command on a pair of sockets
and gets a rfnm back, this pair of sockets will be in a wait-match
state.  Everything is fine if a matching RTS or STR, or CLS is
returned after a reasonable amount of delay.  Trouble will arise when
nothing is returned after a long time.

This can happen if the NCP is not running at all but its host is
taking in messages (e.g. UCLA's host will receive messages even if the
NCP is not running), or if the NCP is running very slowly.  The same
problem exists on sending out a CLS control command and a matching CLS
is never returned.  The trouble is that resources are tied up, e.g.
sockets, links and table space in the NCP; and one would like to
release these resources.  In our implementation, when a user does a
CLOSE, we can't release the sockets until the matching CLS is
returned.  This protects us from getting confused if a seconds request
is made for the same pair of sockets.  This problem can be solved by
including a time-out mechanism in the Host-Host protocol.  This
operates as follows:



                                                                [Page 1]

ne 5
a.  On sending out a STR or RTS and if you do not get back a match-
    ing RTS or STR, or a CLS in T time units a CLS will be sent.
    After sending the time-out CLS race condition can be avoided
    by ignoring the matching RTS or STR that arrives before the
    matching CLS.

b.  On sending out a CLS (any kind, including the time-out CLS),
    and if you do not get back a matching CLS in T time units, the
    matching CLS is assumed to have returned.  However, if a RTS or
    STR is sent on the same pair of sockets anytime after the time
    out and before a CLS is returned, and then we receive the CLS,
    there is no way to determine whether this returning CLS is for
    matching the previous CLS or for refusing the RTS or STR.  (See
    the figure for detail).  So far we could not solve this race
    condition except by assigning sequence number to connection
    throughout the Network which we don't think is a good solution
    at all.  Hence, we would like to bring the attention of the
    Host-Host Protocol Glitch Cleaning Committe to this problem.
    The time limit T should be a Network Standard and its value should
    be decided also.

       Reason                                Our NCP
       ------                                -------

    1. User requests connection              1. RTS ->

    2. User gets tired requests CLS
       (or NCP timeout)                      2. CLS ->

    3. No matching CLS returned in
       T time units                          3. CLS assumed returned
                                                free socket and other
                                                resources

    4. User requests another connection
       over same socket pair                 4. RTS ->

    5. CLS received                          ?? does it belong to
                                             2 or 4?

                                   Figure

         [ This RFC was put into machine readable form for entry ]
            [ into the online RFC archives by Gert Doering 4/97]






                                                                [Page 2]

一覧

 RFC 1〜100  RFC 1401〜1500  RFC 2801〜2900  RFC 4201〜4300 
 RFC 101〜200  RFC 1501〜1600  RFC 2901〜3000  RFC 4301〜4400 
 RFC 201〜300  RFC 1601〜1700  RFC 3001〜3100  RFC 4401〜4500 
 RFC 301〜400  RFC 1701〜1800  RFC 3101〜3200  RFC 4501〜4600 
 RFC 401〜500  RFC 1801〜1900  RFC 3201〜3300  RFC 4601〜4700 
 RFC 501〜600  RFC 1901〜2000  RFC 3301〜3400  RFC 4701〜4800 
 RFC 601〜700  RFC 2001〜2100  RFC 3401〜3500  RFC 4801〜4900 
 RFC 701〜800  RFC 2101〜2200  RFC 3501〜3600  RFC 4901〜5000 
 RFC 801〜900  RFC 2201〜2300  RFC 3601〜3700  RFC 5001〜5100 
 RFC 901〜1000  RFC 2301〜2400  RFC 3701〜3800  RFC 5101〜5200 
 RFC 1001〜1100  RFC 2401〜2500  RFC 3801〜3900  RFC 5201〜5300 
 RFC 1101〜1200  RFC 2501〜2600  RFC 3901〜4000  RFC 5301〜5400 
 RFC 1201〜1300  RFC 2601〜2700  RFC 4001〜4100  RFC 5401〜5500 
 RFC 1301〜1400  RFC 2701〜2800  RFC 4101〜4200 

スポンサーリンク

@page 特定のデバイスでの表示範囲を指定する

ホームページ製作・web系アプリ系の製作案件募集中です。

上に戻る