Preview

The Evolution of Xtp

Powerful Essays
Open Document
Open Document
5335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Evolution of Xtp
--

--

-

The Evolution of XTP†
Greg Chesson Silicon Graphics Computer Systems Mountain View, Ca 94039-7311 greg@sgi.com

Abstract
The design of XTP has been a 3 year process so far with roots traceable to work in the 1970’s and 80’s. There have been roughly ten distinct revisions of the protocol. Since Revision 3.4 in June 1989 there has been an effort to stabilize the design. This has been accomplished. The most recent versions - Revision 3.4 and 3.5 - were about 14 months apart whereas earlier versions were 3 to 6 months apart. Fortunately the net effect of the change from Revision 3.4 to 3.5 was to remove mechanism from the design. There have been at least nine distinct software implementations of the protocol. Experience with these implementations has been fed back into the protocol specification. We believe that the functionality in the present design, Revision 3.5 plus Addendum 1a, is strengthened by the number of alternative mechanisms that have been tried and rejected. XTP history and evolution will be reviewed in this paper with a focus on some of the protocol mechanisms that have changed over time.

Introduction
The quantity of network and protocol research can be measured by observing the number of publications in the area. In the 1960’s and early 1970’s most of the papers published in the biennial ACM SIGOPS Proceedings were devoted to operating system topics like paging, process control, and file management. By the 1980’s the balance changed so that most of the papers presented some aspect of networking in the context of operating systems. The papers presented in the first workshop in a series dedicated to protocol research [9] reference much of the work of the 1980’s and suggest that the 1990’s may be a time of significant progress in this area. Contemporary protocol research is influenced by developments in other technical fields. For example VLSI techniques are commonly incorporated into the design of protocols, systems, and media -



References: Ministre de la Defense, Republique Francaise, "Military Real Time Local Area Network", GAM-T-103, February 9, 1987 [2] Protocol Engine and XTP are registered trademarks of Protocol Engines, Incorporated. [3] G. Chesson, "Protocol Engine Design", in Usenix Conference Proceedings June 1987, p. 209, also "The Protocol Engine Project" in Unix Review, September, 1987, also P-Engine Protocol Definition, September 1987, Protocol Engines Inc., 1900 State Street, Santa Barbara, Ca 93101. [4] "XTP Definition, Revision 3.5 plus Addendum 1a", September 10, 1990, Protocol Engines Inc., 1900 State Street, Santa Barbara, Ca 93101. [5] William D. Schwaderer, "XTP in VLSI − Protocol Decomposition for ASIC", Proceedings of the 15th IEEE COnference on Local Computer Networks, Minneapolis, Minnesota, September, 1990. [6] W. Doeringer, et. al., "A Survey of Lightweight Transport Protocols", IBM Research Report, RZ 1980 (number 70152), May 17, 1990. [7] James Moulton, Final Report for Project 753, ANSI document X3S3.3/90-201R, results of the study on Very High Speed Network Protocols, December 11, 1990. [8] Ian Wakeman, "Emerging High Speed Transfer Protocols", IEE Telecom Conference Proceedings, March 1991. [9] Harry Rudin and Robin Williamson, editors, Protocols for High-Speed Networks, North-Holland, 1989. [10] G. Chesson, XTP/PE Design Considerations, in Protocols for High-Speed Networks, [9]. [11] Robert Sanders, XTP Tutorial, University of Virginia Computer Science Department. [12] Gerard J. Holzmann, Design and Validation of Computer Protocols, Prentice Hall, Englewood Cliffs, NJ 07632. [1]

You May Also Find These Documents Helpful

  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    General assessment of the selected routing protocol identify its functionality and how an algorithm should be developed to the specific routing protocol.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    ____ is an open-source protocol framework for security development within the TCP/IP family of protocol standards.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Hsc300 Week 2 Assignment

    • 866 Words
    • 4 Pages

    This week we covered some additional information in regards to the data layer, more specifically the MAC layer, and went into the network layer of the OSI model. As part of that we discussed different routing protocols and systems.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IST 220

    • 369 Words
    • 2 Pages

    6: Describe the RTS/CTS protocol and when does it make sense to use? (7 pts)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    Within a network consists of a model that interlinks computers with one another by its methods and protocols, this model is known as the “Open Systems Interconnection (OSI) model”, (2010. PP.28). It is a framework that defines and dissects its methods protocols into another model consisting of seven different layers. Each different layer increases from one layer to the next, all in which rely on the services the lower level provides to the next until data becomes present upon viewing a computer screen. Seven layers defining the “seven-layer model”, (2010. PP.28), are: physical, data-link, network, transport, session, presentation, and application. Each consists of different functions and purposes.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Project Plan

    • 2003 Words
    • 7 Pages

    James F. Kurose and Keith W. Ross: Computer Networking: A Top-down Approach (4th ed.), Addison-Wesley, 2008.…

    • 2003 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    INTERNET TUTORIAL (The TCP/IP and ISO Reference Models). (n.d.). Retrieved December 3, 2014, from http://papa.det.uvigo.es/~theiere/cursos/Curso_Internet/ISO.html…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Complete Case Projects 3-1, 3-2 and 3-3 of Guide to Networking Essentials. Substantively justify your choice in determining if client-based or client/server model will be used (Syllabus, IT240 Version 4, Intro to LAN Technologies, 2012).…

    • 874 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    631 research paper

    • 1926 Words
    • 7 Pages

    How does it comfort remote users to achieve their goal? Focuses on history of PPTP and how Microsoft implemented the protocol in Windows NT 4.0 Structure and message format of PPTP is detailed like PPTP as an extension of PPP is not similar to it. PPTP is the layer2 of OSI model. PPTP secures PPP through encryption and enclosing. PPTP server interfaces on internet and intranet. How PPTP is used as a protection device for data and is safe to transmit sensitive data in an encrypted format (Yates, 1997). Message format and types of messages. All the services which PPTP provides and its working style. Types of deployment in PPTP are discussed. PPTP supports client server model. Technical specification of PPTP is detailed in RFC 2637.…

    • 1926 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models.…

    • 9655 Words
    • 37 Pages
    Good Essays
  • Satisfactory Essays

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2224 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    This memorandum will attempt to explain the Open Systems Interconnection Model, known more simply as the OSI Model. The OSI Model has seven levels, and these levels will be discussed in detail. Particular mention will be made to which level TCP/IP functions with the OSI Model.…

    • 672 Words
    • 3 Pages
    Good Essays