home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
- Network Working Group V. Aggarwal
- Request for Comments: 1291 JvNCnet Computer Network
- December 1991
-
-
- Mid-Level Networks
- Potential Technical Services
-
- Status of this Memo
-
- This RFC provides information for the Internet community. It does not
- specify an Internet standard. Distribution of this memo is unlimited.
-
- Abstract
-
- This document proposes a set of technical services that each Internet
- mid-level network can offer within the mid-level network itself and
- and to its peer networks. The term "mid-level" is used as a generic
- term to represent all regional and similar networks, which, due to
- continuous evolutions and transitions, can no longer be termed
- "regional" [MAN]. It discusses the pros and cons of offering these
- services, as well as areas in which mid-level networks can work
- together.
-
- A large portion of the ideas stem from discussions at the IETF
- Operational Statistics (OPstat), User Connectivity Problems (UCP) and
- Network Joint Management (NJM) working groups.
-
- Table of Contents
-
- 1. Introduction.................................................. 2
- 2. The Generic Model............................................. 2
- 3. Technical Services............................................ 3
- 3.1 Domain Name Service......................................... 3
- 3.2 Public Domain Software...................................... 4
- 3.3 Network Time................................................ 5
- 3.4 Network News................................................ 5
- 3.5 Mailing Lists............................................... 6
- 4. Experimental Testbeds......................................... 6
- 5. Network Information Services.................................. 7
- 6. Network Operations............................................ 7
- 7. References.................................................... 8
- 8. Security Considerations....................................... 9
- 9. Author's Address.............................................. 9
- Appendix A Mailing Lists......................................... 10
- Appendix B DNS Architecture Strategy............................. 10
-
-
-
-
-
- Aggarwal [Page 1]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- 1. Introduction
-
- Over the past few years, the Internet has grown to be a very large
- entity and its dependability is critical to its users. Furthermore,
- due to the size and nature of the network, the trend has been to
- decentralize as many network functions (such as domain name-service,
- whois, etc.) as possible. Efforts are being made in resource
- discovery [SHHH90] so that the work of researchers is not lost in the
- volumes of data that is available on the Internet.
-
- A side result of this growth has been the logical structure imposed
- in the Internet of networks classified by function. Tangible examples
- in the present state are the NSFnet national backbone, the mid-
- level/regional networks and campus networks. Each of these can be
- viewed as hierarchies within an organization, each serving a slightly
- different function than the other (campus LANs providing access to
- local resources, mid-level networks providing access to remote
- resources, etc.). The functions of each hierarchy then become the
- "services" offered to the organizational layer below it, who in turn
- depend on these services.
-
- This document proposes a set of basic technical services that could
- be offered by a mid-level network. These services would not only
- increase the robustness of the mid-level network itself, but would
- also serve to structure the distribution of resources and services
- within the Internet. It also proposes a uniform naming convention for
- locating the hosts offering these services.
-
- 2. The Generic Model
-
- The Internet model that is used as the basis for this document is a
- graph of mid-level networks connected to one another, each in turn
- connecting the campus/organization networks and with the end users
- attached to the campus networks. The model assumes that the mid-level
- networks constitute the highest level of functional division within
- the Internet hierarchy described above (this could change in the
- unforeseen future). With this model in perspective, this document
- addresses the objectives of minimizing unnecessary traffic within the
- Internet as well as making the entire structure as robust as
- possible.
-
- The proposed structure is a derived extension of organizational LANs
- where certain services are offered within the organizational LAN
- itself, such as nameservice, mail, shared files, single or
- hierarchical points of contact for problems, etc.
-
- The following are the services that are discussed as possible
- functions of a mid-level network:
-
-
-
- Aggarwal [Page 2]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- o Technical services
-
- o Experimental sites for testing and dissemination of new
- software and technology to end sites on the network
-
- In addition, the following services are mentioned briefly which are
- discussed in detail elsewhere [SSM91, ML91]:
-
- o Network Operation services and the interaction between
- different mid-level networks in this area
-
- o Network Information services
-
- 3. Technical Services
-
- The Internet has grown to be an essential entity because of the
- services that it offers to its end users. The list of services is
- long and growing, but some services are more widely used and deployed
- than others. This section attempts to list and discuss those
- technical services that could help a mid-level network provide robust
- and improved services to its end sites.
-
- 3.1 Domain Name Service
-
- According to the NSFnet traffic statistics collected for May 1991,
- about 7% of the packets on the NSFnet backbone were domain nameserver
- (DNS) packets. This is a significant amount of traffic, and since
- most of the other network applications depend on this service, a
- robust DNS service is critical to any Internet site.
-
- Proper location of secondary nameservers so that they are located on
- different physical networks can increase the reliability of this
- service to a large extent [MOC87a, MOC87b]. However, the nature of
- the service requires that the nameservers for the next highest level
- be available in order to resolve names outline-mode side of one's
- domain. Thus, for "foo.princeton.edu" to resolve "a.mid.net", the
- root nameservers which point to mid.net's nameservers have to be
- reachable.
-
- To make the service more reliable, the mid-level network could have
- at least one nameserver that is able to resolve nameserver queries
- for all domains directly connected to it. Thus, in the event that the
- entire mid-level network becomes isolated from the rest of the
- Internet, applications can still resolve queries for sites directly
- connected to the mid-level network. Without this functionality, there
- is no way of resolving a name if the root (or higher level)
- nameservers become unreachable, even if the query is for a site that
- is directly connected and reachable.
-
-
-
- Aggarwal [Page 3]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- Strategies for implementing this architecture are discussed in
- appendix B.
-
- To locate such a "meta-domain" server within a mid-level network, it
- is proposed that a nameserver entry for "meta-dns" exist within the
- mid-level network's domain.
-
- 3.2 Public Domain Software
-
- File transfer traffic constituted 23% of the NSFnet backbone traffic
- for May 1991. Public shareware is a very valuable resource within the
- Internet and a considerable amount of effort is being put into
- developing applications to track all available resources in the
- public archives [SHHH90].
-
- It would be difficult, if not impossible to create an up-to-date
- repository for every public domain package available on the Internet,
- simply because of the volume of software and the rate at which new
- software is being developed every day. Some hosts have gained
- popularity as good public archives (such as uunet.uu.net, sumex-
- aim.stanford.edu, wuarchive.wustl.edu) and new developers tend to
- distribute the software to these sites as distribution points. The
- economics of maintaining centralized archives is another deterrent to
- centralization (the UUnet archives at uunet.uu.net take up roughly
- 1GB of disk storage).
-
- Recently however, a number of methods for resource discovery have
- been developed and are available on the Internet ("ftp-list" file
- compiled by John Granose - odin@pilot.njin.net, Archie at
- archie.cs.mcgill.ca and Prospero [NEU]).
-
- It is desirable that the mid-level networks be able to provide up-
- to-date pointers to the distribution hosts for available public
- software archives. Coordinating the distribution of a static list is
- difficult (though not impossible) and the use of automated resource
- discovery mechanisms such as Archie and Prospero is recommended.
- Under ideal conditions, any software that is popular and significant
- (e.g., X11, TeX, RFC's) could be archived and distributed within the
- mid-level network, but measuring "popularity" and "significance" are
- debatable and left for further evaluation. Furthermore, a nameserver
- entry for host "swdist" within the domain can provide information on
- the various available alternatives for software distribution and
- discovery (static file location, pointers to Archie servers, etc.) --
- this nameserver entry can be an alias for a CNAME or a TXT entry.
-
-
-
-
-
-
-
- Aggarwal [Page 4]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- 3.3 Network Time
-
- An important feature of any computer network providing distributed
- services is the capability to synchronize the local clocks on the
- various systems in the network. Ideally, the clocks of all the
- reference sources would be synchronized to national standards by wire
- or radio. The importance and immense popularity of this service makes
- Network Time a very useful potential service that can be provided by
- a mid-level network. No specific protocol for maintaining time is
- proposed, and any available protocol that maintains time with
- reasonable accuracy could be used.
-
- Network Time Protocol (NTP) traffic constituted 1% of the NSFnet
- traffic during May 1991. The traffic might seem insignificant, but
- there have been instances where a particular stratum-1 timeserver
- (e.g., one of the stratum-1 servers at University of Delaware) has
- reached a point of overload with too many different sites trying to
- peer with it.
-
- It is proposed that at least one stratum-1 and two stratum-2 servers
- be located within a mid-level network (the selection of three servers
- is based on the NTP standards documentation [MIL89]). Note that the
- servers can be located at any of the directly connected sites in the
- network as long as they are publicly accessible. All sites connected
- to the mid-level network can then coordinate their system times with
- the servers within the mid-level network itself. Besides increasing
- the reliability of the timekeeping network, this approach would also
- limit the load on each timeserver.
-
- For locating the network time servers within a domain, nameserver
- entries for "timekeeper-x" (where x= 1,2,3..) can be made within the
- domain. The servers are numbered in order of preference and accuracy.
- Thus, "timekeeper-1.foo.net" would be the primary timekeeper and
- "timekeeper-2.foo.net" would be additional (possibly secondary)
- timekeepers within domain "foo.net". If such hosts are not available
- within a domain, a TXT entry pointing to other recommended time-
- servers could be provided instead.
-
- 3.4 Network News
-
- Network News (or Usenet News) constituted 14% of the NSFnet traffic
- in May 1991. Netnews is an expensive service, both in terms of disk
- and CPU power, as well as network bandwidth consumed.
-
- The present structure of Network News consists of several hub sites
- which are distributed over the Internet. End sites get news feeds
- from other sites, and an article gets injected into the news stream
- by sending it to the nearest "upstream" site, which then forwards it
-
-
-
- Aggarwal [Page 5]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- to its connected news sites, and so on. There is no preset norm for
- finding a site willing to provide a news feed, and it usually ends up
- being a site with whom the site administrator happens to be
- acquainted. However, this could easily result in some sites not being
- able to get an economical news feed from within the mid-level network
- and actually having to derive the feed from a site located on another
- mid-level network.
-
- A mid-level network could alleviate such occurrences by being able to
- provide a newsfeed to any or all of its directly connected end sites.
- Though an expensive resource, some of the costs can be moderated by
- acting as a transit news feeder so that the news needn't be stored
- for a long time on disk. The software for providing the news feed is
- not specific and depends entirely on the newsfeed provider.
-
- 3.5 Mailing Lists
-
- Internet mailing lists are another popular source of information in
- parallel to Network News. However, like public software, there is no
- central repository of all the possible mailing lists available on the
- Internet, and it would require considerable effort to compile one (at
- the time of writing this document, a fairly comprehensive list is
- available on the Internet and mentioned in appendix A.
-
- At this time, there is no clear strategy for distributing or
- maintaining mailing lists. However, it can be very expensive for a
- site to distribute mail to all individual end users directly, and if
- a clear strategy for maintaining a list of mailing-lists can be
- devised, then mail exploders can be set up at the mid-level networks,
- each of which forwards the mail to exploders at the end sites. This
- mechanism would reduce the load on the originating systems, and
- provides a clean path for tracking down mailer problems. Also, in
- order to prevent bounced mail from propagating back to the originator
- of the message, the mailing lists should be set up in a way so that
- bounced mail goes to the the "owner" of the list and not to the
- originator of the mail message.
-
- A list of major mailing lists for the services discussed in this
- document are listed in appendix A.
-
- 4. Experimental Testbeds
-
- Due to the working relationships that they have with their end sites
- and peer networks, the mid-level networks are very good media for
- distribution of new ideas and technology. Examples of this function
- are the White Pages pilot project [RS90] established by NYSERnet, the
- NSAP routing schema for OSI transitioning [CGC91], etc.
-
-
-
-
- Aggarwal [Page 6]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- The mid-level networks could establish cooperative experimental
- testbeds for testing and deployment of new technologies similar to
- the ones mentioned above. Besides deployment and testing of new
- technology, this could also serve to provide a "help" service to the
- end-sites and to get them started with the new software.
-
- The exact interaction between the mid-level networks in this area is
- not very clear. It is complicated by competition for members between
- the mid-level networks and needs to be discussed further.
-
- 5. Network Information Services
-
- There are a variety of new and useful user services available on the
- Internet that are difficult to document and provide a comprehensive
- list of. Some attempt has been made at documenting such resources
- [NNS] and a mid-level network can be the initial point of contact for
- distribution of such information on a wide basis. The information can
- be disseminated in a more controlled and complete manner using this
- hierarchical approach if each mid-level network maintains up-to-date
- information about its directly connected sites. Network Information
- services (NIC) also make the network easier and more attractive to
- end users. Examples of these services are:
-
- o provide information resources
-
- - security advisory messages
-
- - list of library catalogs [GL91]
-
- - geographical information servers
-
- - password generators
-
- o resolve end user problems (user support)
-
- These services are NIC related and discussed in detail elsewhere
- [SSM91]. For accessibility information, an entry for "nic" could
- exist in the DNS for the domain (this could be a TXT entry listing
- email or phone number information for users or other NIC's).
-
- 6. Network Operations
-
- The Network Operation Center's (NOC's) at the mid-level networks need
- to cooperate with each other to resolve network problems. In the
- event of a network problem between two mid-level networks or if an
- end-site has trouble getting to any host, the mid-level network NOCs
- can serve to be the initial point of contact. The procedures for
- interaction among NOCs and the formats for exchange of trouble-
-
-
-
- Aggarwal [Page 7]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- tickets between the NOCs are described elsewhere [JOH91, ML91].
-
- It is important for cooperating NOCs to have contact information for
- their directly connected campus/organizational sites and also about
- their peer mid-level networks. A distributed mechanism for
- maintaining contact information could be implemented by using a
- nameserver TXT entry for "noc" or by maintaining "finger" information
- for user "noc@domain" or "noc@noc.domain". A NOC "phonebook" listing
- the contact information for the various NOCs can be used as a static
- non-distributed mechanism (it is understood that the phonebook can
- contain outdated information, but the distributed mechanisms can
- provide correct and updated NOC information provided that the hosts
- are reachable at the desired time). If it is undesirable to publish
- the phone number or email address of the NOC for any reason, an entry
- saying "unpublished" (or words to that effect) could exist in the
- nameserver or "finger" entry instead.
-
- 7. References
-
- [BOG] Dunlap, K., and M. Karels, "Nameserver Operations Guide
- for Bind Release 4.8", CSRG, Department of Electrical
- Engineering and Computer Sciences, University of
- California, Berkeley, California.
-
- [CCI88] CCITT Blue Book, "X.500 Series Recommendations", ITU,
- 1989.
-
- [CGC91] Collela, R., Gardner, E., and R. Callon, "Guidelines for
- OSI NSAP Allocation in the Internet'', RFC 1237,
- NIST, Mitre, DEC, July 1991.
-
- [SSM91] Sitzler, D., Smith, P., and A. Marine, "Building a Network
- Information Services Infrastructure", RFC in
- preparation.
-
- [GL91] George, A., and R. Larsen, "Internet Accessible Library
- Catalogs & Databases", Aug 1991.
- Available via anonymous FTP from ariel.unm.edu.
-
- [JOH91] Johnson, D., "NOC TT Requirements", RFC in
- preparation.
-
- [MAN] Mandelbaum, R., and P. Mandelbaum, "The Strategic Future
- of the Mid-Level Networks", University of Rochester,
- NY, 1991.
-
- [MOC87a] Mockapetris, P., "Domain Names - Implementation and
- Specification", RFC 1035, USC Information Sciences
-
-
-
- Aggarwal [Page 8]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- Institute, November 1987.
-
- [MOC87b] Mockapetris, P., "Domain Names - Concepts and
- Facilities", RFC 1034, USC Information Sciences
- Institute, November 1987.
-
- [MIL89] Mills, D., "Network Time Protocol", RFC 1129, UDel,
- October 1989.
-
- [ML91] Mathis, M., and D. Long, "User Connectivity Problems
- Working Group", RFC in preparation.
-
- [NEU] Neuman, B., "The Virtual System Model: A Scalable
- Approach to Organizing Large Systems", Department of
- Computer Science, University of Washington, FR-35,
- Seattle, WA, May 1990.
-
- [NNS] NSF Network Service Center, "Internet Resource Guide",
- Cambridge, MA.
- Available via anonymous FTP from nnsc.nsf.net.
-
- [RS90] Rose, M., and M. Schoffstall, "The NYSERnet White Pages
- Pilot Project", NYSERnet, Inc., Mar 1990.
-
- [SHHH90] Schwartz, M., Hardy, D., Heinzman, W., and G.
- Hirschowitz, "Supporting Resource Discovery Among
- Public Internet Archives", Department of Computer
- Science, University of Colorado, Boulder, CO.,
- September 1990.
-
- 8. Security Considerations
-
- Security issues are not discussed in this memo.
-
- 9. Author's Address
-
- Vikas Aggarwal
- JvNCnet
- 6 von Neumann Hall
- Princeton University
- Princeton, NJ 08544
-
- Phone: +1-609-258-2403
- Email: vikas@jvnc.net
-
-
-
-
-
-
-
- Aggarwal [Page 9]
-
- RFC 1291 Potential Technical Services December 1991
-
-
- Appendix A - Mailing Lists
-
- The following is a list of popular mailing lists for the services
- listed in this document. To subscribe to a particular mailing list,
- send a request to "mailing-list-request" (do not send a request to
- the entire mailing list).
-
- o ietf@isi.edu: The general mailing list for the Internet
- Engineering Task Force. This group is concerned with the evolution
- and development of Internet related protocols and standards. Old
- mail is archived at "venera.isi.edu" in directory ftp/irg/ietf.
-
- o ntp@trantor.umd.edu: For discussions on the Network Time
- Protocol (NTP).
-
- o namedroppers@nic.ddn.mil: Mailing list for discussions on DNS
- topics. Old mail is archived at "nic.ddn.mil".
-
- At the time of writing this document, a list of mailing lists on the
- Internet is available via anonymous FTP from host "ftp.nisc.sri.com"
- in the file "netinfo/interest-groups".
-
- Appendix B - DNS Architecture Strategy
-
- This section discusses practical strategies for implementing a
- nameserver architecture within a mid-level network, so that it can
- resolve nameserver queries for all domains directly attached to it.
-
- In order to resolve queries for all directly connected networks, a
- host that is authoritative for all directly attached domains will
- need to exist within the mid-level network. Nameservers at the end
- sites would then treat this "group-of-domains" nameserver as a
- forwarding server to resolve all non-local queries.
-
- This can be done by adding a line to the named.boot file on the end
- site nameservers such as:
-
- forwarders 128.121.50.7 128.32.0.4
-
- This method has the added advantage that the forwarding server builds
- up a very rich cache of data [BOG] and acts like a metacache that all
- hosts can benefit from. Note that the forwarding server is queried
- only if the end-site server cannot service a query locally -- hence
- the "meta-domain" server is not overloaded with queries for all
- nameserver lookups.
-
-
-
-
-
-
- Aggarwal [Page 10]
-