RFC787

From RFC-Wiki

Request For Comments: 787 A. Lyman Chapin

                                                         July 1981







Subject: Connectionless Data Transmission Survey/Tutorial

From: A. Lyman Chapin




The attached paper on connectionless data transmission is being distributed to the members of a number of US organizations that are involved or interested in the development of international data communication standards. Following a review period ending Septem- ber 1, 1981, a revised version of the paper - incorporating com- ments and suggestions received from reviewers - will be considered by the American National Standards Institute (ANSI) committee responsible for Open Systems Interconnection (OSI) Reference Model issues (ANSC X3T5). If approved, it will then be presented to the relevant International Organization for Standardization (ISO) groups as the foundation of a US position recommending the incor- poration of connectionless data transmission by the Reference Model and related OSI service and protocol standards.

Your comments on the paper, as well as an indication of the extent to which the concepts and services of connectionless data transmis- sion are important to you and/or your organization, will help to ensure that the final version reflects a true US position. They should be directed to the author at the following address:



A. Lyman Chapin Data General Corporation MS E111 4400 Computer Drive Westborough, MA 01580

(617) 366-8911 x3056 Connectionless Data Transmission, Rev. 1.00


                            ,---------------------------------,

X3S33/X3T56/81-85 | WORKING PAPER | X3T5/81-171 | This document has not been re- | X3T51/81-44 | viewed or approved by the appro-| X3S37/81-71R | priate Technical Committee and |

                            | does not at this time represent |
                            | a USA consensus.                |
                            '---------------------------------'









              Connectionless Data Transmission


                      A. Lyman Chapin


               22 May 1981     Revision  1.00

Connectionless Data Transmission, Rev. 1.00









                  ABSTRACT
The increasingly  familiar  and  ubiquitous  Re-
ference Model of Open  Systems  Interconnection,
currently being considered by the  International
Organization  for  Standardization   (ISO)   for
promotion to the status of a Draft International
Standard, is based on  the  explicit  assumption
that a "connection" - an association between two
or  more  communicating   entities,   possessing
certain characteristics  over  and  above  those
possessed  by  the  entities  themselves  -   is
required for the transfer of  data  in  an  Open
Systems   Interconnection   (OSI)   environment.
Although  the   connection-oriented   model   of
communications behavior  has  proven  to  be  an
extremely powerful concept, and has been applied
successfully to the design and implementation of
protocols and systems covering a wide  range  of
applications, a growing  body  of  research  and
experience suggests that a complementary concept
-  connectionless  data  transmission  -  is  an
essential part of the Open Systems  Interconnec-
tion architecture, and  should  be  embraced  as
such by the OSI  Reference  Model.   This  paper
explores  the  concept  of  connectionless  data
transmission and its relationship  to  the  more
familiar concepts  of  connection-oriented  data
transfer, developing a rationale for the  inclu-
sion  of  the  connectionless  concept  in   the
Reference Model  as  an  integral  part  of  the
standard description of the OSI architecture.

Connectionless Data Transmission, Rev. 1.00



1 Introduction


Over the past three years, a number  of  national  and  interna-
tional  standards  organizations  have  expended  the  time  and
efforts of a great many people to achieve a  description  of  an
architectural  Reference  Model  for  interconnecting   computer
systems considered to be "open" by virtue of their mutual use of
standard  communication  protocols  and  formats.   The  current
description, the Reference Model of Open Systems Interconnection
(RM/OSI)[1], is generally accepted by the International  Organi-
zation for Standardization (ISO),  the  International  Telephone
and Telegraph Consultatitive  Committee  (CCITT),  the  European
Computer Manufacturer's Association (ECMA),  and  many  national
standards bodies,  including  the  American  National  Standards
Institute (ANSI), and has progressed to the status  of  a  Draft
Proposed Standard (DP7498) within ISO.  It  describes  the  con-
cepts and principles of a communications architecture  organized
hierarchically, by function, into  seven  discrete  layers,  and
prescribes the services that each  layer  must  provide  to  the
layer immediately above it (the  uppermost  layer  provides  its
services to  user  applications,  which  are  considered  to  be
outside  of  the  Open  Systems  Interconnection   environment).
Building on the services available to  it  from  the  next-lower
layer, each layer makes use  of  standard  OSI  protocols  which
enable it to cooperate with other instances of  the  same  layer
(its "peers") in other systems (see Figure 1).   This  technique
of grouping related functions  into  distinct  layers,  each  of
which implements a set of well-defined services that are used by
the layer above, partitions a very complex, abstract  problem  -
"how can the components of a distributed application,  operating
in potentially  dissimilar  environments,  cooperate  with  each
other?" - into a number of more manageable problems that enjoy a
logical relationship to each other and can individually be  more
readily understood.
The Reference Model was developed to serve as  a  framework  for
the coordination of existing and future  standards  designed  to
facilitate the interconnection of data processing systems.   The
purpose of OSI is to enable  an  end-user  application  activity
(called an "application  process")  located  in  a  system  that
employs OSI procedures  and  protocols  (an  "open"  system)  to
communicate with any other appication  process  located  in  any
other open system.  It is not  the  intent  of  OSI  to  specify
either the functions or the implementation  details  of  systems
that provide the OSI capabilities.  Communication is achieved by
mutual adherence  to  agreed-upon  (standardized)  services  and
protocols; the only thing that an OSI entity in a given layer in
one system needs to know about an OSI entity in the  same  layer

User of (N)-services User of (N)-services

[an (N+1)-entity]                           [an (N+1)-entity]
    \                                           /
     \                                         /
      \ /-----(N)-service-access-points-----\ /     (N+1)

o-------------------------------------o------------

        \                                   /        (N)
         \<-----services provided to------>/
          \          (N+1)-layer          /
           \                             /
    ,------------,                 ,------------,
    |            |                 |            |
    | (N)-entity |<----"Peers"---->| (N)-entity |    (N)-LAYER
    |            |                 |            |
    '------------'                 '------------'
           \                             /
            \<----services required---->/
             \     from (N-1)-layer    /
              \                       /              (N)

o---------------------o--------------------

                \                   /               (N-1)
                 \                 /
                  \               /
                   \             /
         ,--------------------------------,
         |                                |
         |                                |
         |           (N-1)-LAYER          |
         |                                |
         |                                |
         '--------------------------------'


     FIGURE 1 -  General Model of an OSI Layer


A Note on OSI Terminology


The construction of a formal system, such as the architecture of Open Systems Interconnection, necessarily involves the introduc- tion of unambiguous terminology (which also tends to be somewhat impenetrable at first glance). The terms found here and in the text are all defined in an Appendix. The "(N)-" notation is used to emphasize that the term refers to an OSI characteristic that applies to each layer individually. The "(N)-" prefix stands in generically for the name of a layer; thus, "(N)-address", for example, refers abstractly to the concept of an address associa- ted with a specific layer, while "transport-address" refers to the same concept applied to the transport layer. Connectionless Data Transmission, Rev. 1.00


of another system is how the other entity behaves, not how it is
implemented.  In particular, OSI is not concerned with  how  the
interfaces between adjacent layers are implemented  in  an  open
system; any interface mechanism is acceptable,  as  long  as  it
supports access to the appropriate standard OSI services.
A major goal of the OSI standardization  effort  is  generality.
Ideally, the Reference Model should serve as the  common  archi-
tectural framework  for  many  different  types  of  distributed
systems   employing   a   wide   range   of    telecommunication
technologies, and certainly an important measure of the  success
of OSI will be its ability to apply  the  standard  architecture
across a broad spectrum of user applications.  The way in  which
the Reference Model has  developed  over  the  past  four  years
reflects an awareness of this goal (among others):  the  process
began with the identification of the  essential  concepts  of  a
layered  architecture,  including  the   general   architectural
elements of protocols, and proceeded carefully from these  basic
principles to a detailed description of each layer.  The organi-
zation of the current Reference Model document [1] exhibits  the
same top-down progression.  At the highest level, three elements
are identified as basic to the architecture[1]:
  a) the application processes which exist  within  the  Open
     Systems Interconnection environment;
  b) the connections which join the application processes and
     permit them to exchange information; and
  c) systems.
The assumption that a connection is a  fundamental  prerequisite
for communication in the OSI environment permeates the Reference
Model, and is in fact one  of  the  most  useful  and  important
unifying concepts of the  architecture.   A  growing  number  of
experts in the field, however, believe that  this  deeply-rooted
connection orientation seriously and  unnecessarily  limits  the
power and scope of the Reference  Model,  since  it  excludes  a
large class of applications and implementation technologies that
have an inherently connectionless nature.  They argue  that  the
architectural objectives of the Reference Model do not depend on
the  exclusive  use  of  connections  to  characterize  all  OSI
interactions, and recommend that the two alternatives -  connec-
tion oriented data transfer, and connectionless  data  transmis-
sion - be  treated  as  complementary  concepts,  which  can  be
applied in parallel to the different applications for which each
is suited.
At the November, 1980 meeting of the ISO subcommittee  responsi-
ble for OSI (TC97/SC16), a working party laid a solid foundation
for this argument in two documents: Report of the Ad  Hoc  Group

Connectionless Data Transmission, Rev. 1.00


on Connectionless Data Transmission[3], and Recommended  Changes
to Section 3 of [the Reference Model] to Include  Connectionless
Data Transmission[2];  and  the  importance  of  the  issue  was
recognized by the full subcommittee in a resolution[25]  calling
for comments on the two documents from all member organizations.
The question of how the connectionless data transmission concept
should be reflected in the OSI architecture - and in particular,
whether or not it should become an  integral  part  of  the  Re-
ference Model - will be debated  again  this  summer,  when  the
current Draft Proposed Standard Reference Model becomes a  Draft
International Standard.  The  remainder  of  this  article  will
explore the issues that surround this question.


2  What Is Connectionless Data Transmission?


Connectionless data transmission (CDT), despite  the  unfamiliar
name, is by no means a new concept.  In one form or another,  it
has played an important role in the  specification  of  services
and protocols for over a decade.  The terms "message  mode"[  ],
"datagram"[35],      "transaction      mode"[22,23,24],      and
"connection-free"[37,47] have been used  in  the  literature  to
describe variations on the same basic theme: the transmission of
a  data  unit  in  a  single  self-contained  operation  without
establishing, maintaining, and terminating a connection.
Since connectionless data transmission  and  connection-oriented
data transfer are complementary concepts, they are  best  under-
stood in juxtaposition, particularly since  CDT  is  most  often
defined by its relationship to the more familiar  concept  of  a
connection.


2.1  Connection-Oriented Data Transfer


A connection (or "(N)-connection", in the formal terminology  of
OSI) is an association established between two or more  entities
("(N+1)-entities")          for          conveying          data
("(N)-service-data-units").    The    ability    to    establish
(N)-connections, and to convey data units over them, is provided
to (N+1)-entities by the (N)-layer as a set of services,  called
connection-oriented (N)-services.  Connection-oriented  interac-
tions proceed through three distinct sequential phases:  connec-
tion  establishment;  data  transfer;  and  connection  release.
Figure 2 illustrates schematically the  sequence  of  operations
associated with connection-oriented interactions.   In  addition
to this explicitly distinguishable duration,  or  "lifetime",  a
connection exhibits the following fundamental characteristics:
                 Connection Establishment
                 ------------------------
   - Successful -                        - Unsuccessful -


 (N)-  |          |                     (N)-  |          |

connect | |(N)-connect connect | | (N)-


>| |indication ------->| | connect

request | | request | |indication

    |          |------->                   |          |------->
    |(N)-LAYER |                           |(N)-LAYER |
 (N)-  |          |<-------            (N)-   |          |<-------

connect | | disconnect | | (N)- <-------| |(N)-connect <-------| |disconnect confirm | | response indication | | request

    |          |                           |          |


                      Data Transfer
                      -------------
 (N)-  |          |                     (N)-  |          |
 data  |          | (N)-data            data  |          |

>| |indication ------->| | (N)-

request | | request | | data

    |          |------->                   |          |indication
    |(N)-LAYER |                           |(N)-LAYER |------->
    |          |                     (N)-  |          |
    |          |                     data  |          |
    |          |                   <-------|          |
    |          |                   confirm |          |
    |          |                           |          |


                    Connection Release
                    ------------------
 - User Initiated -                   - Provider Initiated -


(N)-dis | | | | connect | | (N)- | | (N)-


>|(N)-LAYER |(N)-disconnect disconnect|(N)-LAYER |disconnect

request | |indication <-------| |------->

    |          |------->         indication|          |indication
    |          |                           |          |



        FIGURE 2 - Connection Oriented Interaction

Connectionless Data Transmission, Rev. 1.00



     [Note: Much of the material in this  section  is
     derived from reference 3]


1.  Prior negotiation.
In a connection-oriented interaction,  no  connection  is  esta-
blished - and no data are transferred - until all parties  agree
on the set of parameters and options that will govern  the  data
transfer.  An incoming connection establishment request  can  be
rejected if it asserts parameter  values  or  options  that  are
unacceptable to the receiver, and the receiver may in many cases
suggest alternative parameter values and options along with  his
rejection.
The reason for negotiation during  connection  establishment  is
the assumption that each party  must  reserve  or  allocate  the
resources (such as buffers and channels) that will  be  required
to carry out data transfer operations  on  the  new  connection.
Negotiation provides an opportunity to scuttle the establishment
of a connection when the resources that  would  be  required  to
support it cannot be dedicated, or to propose alternatives  that
could be supported by the available resources.
2.  Three-party Agreement.
The fundamental nature of a connection involves establishing and
dynamically maintaining a three-party agreement  concerning  the
transfer of data.  The three parties -  the  two  (N+1)-entities
that wish to communicate, and the (N)-service that provides them
with a connection - must first agree on their mutual willingness
to participate  in  the  transfer  (see  above).   This  initial
agreement establishes a connection.  Thereafter, for as long  as
the connection persists, they must  continue  to  agree  on  the
acceptance of each data unit transferred  over  the  connection.
"With a connection, there is no  possibility  of  data  transfer
through an unwilling service to an  unwilling  partner,  because
the mutual willingness  must  be  established  before  the  data
transfer can take place,  and  data  must  be  accepted  by  the
destination partner; otherwise, no  data  [are]  transferred  on
that connection."[3]
3.  Connection Identifiers.
At   connection   establishment   time,    each    participating
(N+1)-entity is identified to the (N)-service by an (N)-address;
the (N)-service uses these addresses to  set  up  the  requested
connection.  Subsequent  requests  to  transfer  data  over  the
connection (or to release it) refer not to  the  (N)-address(es)
of the intended recipient(s), but  to  a  connection  identifier

Connectionless Data Transmission, Rev. 1.00


supplied   by   the   (N)-service   (in   OSI    parlance,    an
"(N)-connection-endpoint-identifier").       This      is      a
locally-significant "shorthand" reference that uniquely  identi-
fies an established connection during its lifetime.   Similarly,
the protocol units that carry  data  between  systems  typically
include a mutually-understood logical identifier rather than the
actual addresses of the correspondents.  This technique elimina-
tes the overhead that would otherwise  be  associated  with  the
resolution and transmission of addresses on every data transfer.
In some  cases,  however  -  particularly  when  non-homogeneous
networks are interconnected, and very location-sensitive addres-
sing schemes are used - it can  make  dynamic  routing  of  data
units extremely difficult, if not impossible.
4.  Data Unit Relationship.
Once a connection has  been  established,  it  may  be  used  to
transfer one data unit after another, until  the  connection  is
released by one of the three  parties.   These  data  units  are
logically related to  each  other  simply  by  virtue  of  being
transferred on  the  same  connection.   Since  data  units  are
transferred over a connection  in  sequence,  they  are  related
ordinally as well.  These data unit relationships are an  impor-
tant characteristic of connections, since they create a  context
for the interpretation of arriving data units that  is  indepen-
dent of the data themselves.  Because a connection maintains the
sequence  of  messages  associated  with  it,   out-of-sequence,
missing, and duplicated messages  can  easily  be  detected  and
recovered, and flow control techniques can be invoked to  ensure
that the message transfer rate does not exceed  that  which  the
correspondents are capable of handling.


These  characteristics  make  connection-based   data   transfer
attractive in applications that call for relatively  long-lived,
stream-oriented interactions in stable configurations,  such  as
direct terminal use of a remote  computer,  file  transfer,  and
long-term attachments of remote job  entry  stations.   In  such
applications, the interaction between communicating entities  is
modelled very well  by  the  connection  concept:  the  entities
initially discuss their requirements and agree to the  terms  of
their interaction, reserving whatever resources they will  need;
transfer a series of related  data  units  to  accomplish  their
mutual objective; and explicitly end their interaction,  releas-
ing the previously reserved resources.


2.2  Connectionless Data Transmission


In many other applications,  however,  the  interaction  between

Connectionless Data Transmission, Rev. 1.00


entities is more naturally modelled by the  connectionless  data
transmission concept,  which  involves  the  transmission  of  a
single self-contained data  unit  from  one  entity  to  another
without prior negotiation or  agreement,  and  without  the  as-
surance of delivery normally  associated  with  connection-based
transfers.  The users of a connectionless  (N)-service  may,  of
course, use their (N+1)-protocol to make any  prior  or  dynamic
arrangements they wish concerning their  interpretation  of  the
data transmitted and received; the (N)-service itself,  however,
attaches no significance to individual data units, and does  not
attempt to relate them in any way.  Two (N+1)-entities  communi-
cating by means  of  a  connectionless  (N)-service  could,  for
example, apply whatever techniques they  might  consider  appro-
priate  in  the  execution  of  their  own   protocol   (timers,
retransmission, positive or negative acknowledgements,  sequence
numbers, etc.) to achieve the level of  error  detection  and/or
recovery they desired.  Users of a connectionless, as opposed to
connection-oriented, (N)-service are not restricted or inhibited
in the performance of their (N+1)-protocol;  obviously,  though,
the assumption is that CDT  will  be  used  in  situations  that
either do not require the characteristics of  a  connection,  or
actively benefit from the alternative characteristics of connec-
tionless transmission.
Figure 3 illustrates schematically the single operation  whereby
a connectionless service may be employed to  transmit  a  single
data unit.   Figure  4  shows  a  widely-implemented  variation,
sometimes called  "reliable  datagram"  service,  in  which  the
service  provider  undertakes  to  confirm   the   delivery   or
non-delivery of each data unit.  It must be emphasized that this
is not a true connectionless service, but is  in  some  sense  a
hybrid, combining the delivery assurance of  connection-oriented
service with the single-operation interface event of connection-
less service.


Many of those involved in OSI  standardization  activities  have
agreed  on  a  pair  of  definitions  for  connectionless   data
transmission, one for architectural and conceptual purposes, and
one  for  service-definition  purposes[4].   The   architectural
definition, which has been proposed for  inclusion  in  the  Re-
ference Model, is:
"Connectionless  Data  Transmission  is  the  transmission  (not
transfer)   of   an   (N)-service-data-unit   from   a    source
(N)-service-access-point   to   one    or    more    destination
(N)-service-access-points without establishing an (N)-connection
for the transmission."
The service definition, which is intended to provide a  workable
basis  for  incorporating  a  connectionless  service  into  the



            |                       |
  (N)-data  |                       |
   request  |                       |
  --------->|                       |
            |       (N)-LAYER       |
            |                       |--------->
            |                       |  (N)-data
            |                       | indication
            |                       |



   FIGURE 3 - Connectionless Data Transmission






  (N)-data  |                       |
   request  |                       |
  --------->|                       |
            |                       |  (N)-data
            |       (N)-LAYER       |--------->
            |                       | indication
  <---------|                       |
  (N)-data  |                       |
   confirm  |                       |



    FIGURE 4 - "Reliable Datagram" Service

Connectionless Data Transmission, Rev. 1.00


service descriptions for  individual  layers  of  the  Reference
Model, is:
"A Connectionless  (N)-Service  is  one  that  accomplishes  the
transmission of a  single  self-contained  (N)-service-data-unit
between  (N+1)-entities  upon  the  performance  of   a   single
(N)-service access."


Both of these definitions  depend  heavily  on  the  distinction
between the terms "transmit", "transfer", and "exchange":
Transmit: "to cause to pass or be conveyed through  space  or  a
medium."  This term refers to the act of conveying only, without
implying anything about reception.
Transfer: "to convey  from  one  place,  person,  or  thing,  to
another."  A one-way peer-to-peer connotation restricts the  use
of this term to cases in which the receiving peer  is  party  to
and accepts the data transferred.
Exchange: "to give and receive, or lose and take,  reciprocally,
as things of the same kind."  A two-way peer-to-peer connotation
restricts the use of this term to cases in which both  give  and
receive directions are clearly evident.


These  definitions  are  clearly  of   limited   usefulness   by
themselves.  They do, however, provide a framework within  which
to explore the following characteristics of CDT:
1.  "One-shot" Operation.
The most  user-visible  characteristic  of  connectionless  data
transmission is the single service access required  to  initiate
the transmission of a data unit.  All  of  the  information  re-
quired to deliver the data unit - destination  address,  quality
of service selection,  options,  etc.  -  is  presented  to  the
connectionless (N)-service provider, along with the data,  in  a
single logical service-access operation that is  not  considered
by the (N)-service to be related in  any  way  to  other  access
operations, prior or subsequent (note, however, that  since  OSI
is not  concerned  with  implementation  details,  the  specific
interface mechanism employed by a particular  implementation  of
connectionless service might involve  more  than  one  interface
exchange to accomplish what is, from  a  logical  standpoint,  a
single operation).  Once the service  provider  has  accepted  a
data unit for connectionless transmission, no further communica-
tion occurs between the provider and the  user  of  the  service
concerning the fate or disposition of the data.

Connectionless Data Transmission, Rev. 1.00


2.  Two-party Agreement.
Connection-oriented data transfer requires the establishment  of
a three-party agreement between the participating (N+1)-entities
and the (N)-service.  A connectionless service, however,  invol-
ves only two-party agreements: there may be an agreement between
the corresponding (N+1)-entities, unknown  to  the  (N)-service,
and there may be local agreements between each (N+1)-entity  and
its local (N)-service provider, but no (N)-protocol  information
is ever exchanged between  (N)-entities  concerning  the  mutual
willingness of the (N+1)-entities to engage in a  connectionless
transmission or to accept a particular data unit.
In practice, some sort of a priori agreement (usually  a  system
engineering design decision) is assumed  to  exist  between  the
(N+1)-entities and the (N)-service concerning those  parameters,
formats, and options that affect all three parties  as  a  unit.
However, considerable freedom of choice is preserved by allowing
the user of a connectionless service to specify  most  parameter
values and options - such as  transfer  rate,  acceptable  error
rate, etc. - at the time the service is  invoked.   In  a  given
implementation, if the  local  (N)-service  provider  determines
immediately (from information available to it locally) that  the
requested operation cannot be  performed  under  the  conditions
specified, it may abort  the  service  primitive,  returning  an
implementation-specific error message across  the  interface  to
the user.  If the same determination is made later on, after the
service-primitive interface event has completed,  the  transmis-
sion is  simply  abandoned,  since  users  of  a  connectionless
service can be expected to recover lost data if it is  important
for them to do so.
3.  Self-contained Data Units.
Data units transmitted via a connectionless service, since  they
bear no relationship either to other data units or to a  "higher
abstraction"   (such   as   a    connection),    are    entirely
self-contained.  All of the  addressing  and  other  information
needed by the service provider to deliver a  data  unit  to  its
destination must be included in each transmission.  On  the  one
hand, this represents a greater overhead than is incurred during
the data transfer phase of a connection-oriented interaction; on
the other, it greatly simplifies routing, since each  data  unit
carries a complete destination address and can be routed without
reference to connection-related information that  may  not,  for
example, be readily available at intermediate nodes.
4.  Data Unit Independence.
The connectionless transmission of data creates no relationship,
express or implied, between data units.  Each  invocation  of  a

Connectionless Data Transmission, Rev. 1.00


connectionless service begins the transmission of a single  data
unit.  Nothing about the service invocation, the transmission of
the data by the connectionless service, or the data unit  itself
affects or is affected by any other  past,  present,  or  future
operation, whether  connection-oriented  or  connectionless.   A
series of data units handed one after the other to a connection-
less service for delivery  to  the  same  destination  will  not
necessarily be delivered to the destination in the  same  order;
and the connectionless service will make no attempt to report or
recover instances of non-delivery.
Note:   A number of popular variations  on  CDT  include
     features that run  counter  to  those  described
     above.  These variations deserve to be discussed
     on their own merits, but should not be  confused
     with the architectural concept of connectionless
     data transmission.



These characteristics make CDT attractive in  applications  that
involve short-term request-response interactions, exhibit a high
level of redundancy, must be flexibly reconfigurable, or  derive
no benefit from guaranteed in-sequence delivery of data.


3  The Rationale for Connectionless Data Transmission


Because CDT is not as widely understood  as  connection-oriented
data transfer, it has often been  difficult  in  the  course  of
developing service and protocol definitions to adduce a  ration-
ale for incorporating CDT, and even more difficult to  determine
appropriate locations  for  connectionless  service  within  the
layered hierarchy of OSI.   This  section  addresses  the  first
concern; the next section will deal with the second.
The most natural way to discover the power and  utility  of  the
CDT  concept  is  to  examine  applications  and  implementation
technologies that depend on it.  The following observations  are
distilled from the specifications  and  descriptions  of  actual
protocols and systems (many of which have been implemented), and
from the work of individuals and organizations  engaged  in  the
OSI standardization effort (quoted material is from reference 3,
except where otherwise noted).   They  are  divided  into  seven
(occassionally  overlapping)  categories  which   classify   the
applications for which CDT is well suited.
Inward data collection involves the periodic active  or  passive
sampling of a large  number  of  data  sources.   A  sensor  net

Connectionless Data Transmission, Rev. 1.00


gathering data from dedicated measurement  stations;  a  network
status monitor constantly refreshing its knowledge of a  network
environment; and an automatic alarm or security system in  which
each component regularly self-tests and reports the result,  are
all engaged in this type  of  interaction,  in  which  a  "large
number of sources may be reporting periodically  and  asynchron-
ously to a single reporting point.   In  a  realtime  monitoring
situation, these readings could normally be  lost  on  occassion
without causing distress,  because  the  next  update  would  be
arriving shortly.  Only  if  more  than  one  successive  update
failed to arrive within a specified time limit would an alarm be
warranted.   If,  say,  a  fast   connect/disconnect   three-way
handshake cost twice as much as a one-way [connectionless]  data
transmission which had  been  system  engineered  to  achieve  a
certain acceptable statistical reliability figure, the  cost  of
connection-oriented inward data collection for a  large  distri-
buted  application  could  be  substantially  greater  than  for
[connectionless collection], without a  correspondingly  greater
benefit to the user."[3]
Outward data dissemination is in a  sense  the  inverse  of  the
first category; it concerns the distribution of  a  single  data
unit to a large  number  of  destinations.   This  situation  is
found,  for  example,  when  a  node  joins  a  network,  or   a
commonly-accessible server  changes  its  location,  and  a  new
address is sent to other nodes on the network; when a synchroni-
zing message such as a real-time clock value must be sent to all
participants in some distributed activity; and when an  operator
broadcasts a nonspecific message (e.g., "Network coming down  in
five minutes").  In such cases, the distribution cost (including
time) may far exceed the cost of generating the  data;  control-
ling the overall cost depends on keeping the cost of  dissemina-
tion as low as possible.
Request-response applications are those in which  a  service  is
provided by a commonly accessible  server  process  to  a  large
number of distributed request sources.  The typical  interaction
consists of a single request followed by a single response,  and
usually only the highest-level acknowledgement  -  the  response
itself - is either necessary  or  meaningful.   Many  commercial
applications (point of sale terminals, credit checking, reserva-
tion systems, inventory control, and automated banking  systems)
and some types of industrial process control, as  well  as  more
general information retrieval systems (such as  videotex),  fall
into this category.  In each case, the knowledge and expectation
of each application component as to the nature of  the  interac-
tion is represented in an application-process design and  imple-
mentation that is known in advance, outside of OSI; lower  level
negotiations,  acknowledgements,  and  other  connection-related
functions are often unnecessary and cumbersome.

Connectionless Data Transmission, Rev. 1.00


An example of an application that combines  the  characteristics
of inward  data  collection,  outward  data  dissemination,  and
request-response interaction is described by the  Working  Group
on Power System Control Centers of the  IEEE  Power  Engineering
Society in a recent letter to the  chairman  of  ANSI  committee
X3T51 concerning  the  use  of  data  communication  in  utility
control centers[17].  They note that "a utility  control  center
receives information from  remote  terminal  units  (located  at
substations  and  generating  plants)  and  from  other  control
centers, performs a variety of monitoring and control functions,
and transmits commands to the remote terminals and  coordinating
information to other control centers."   During  the  course  of
these operations, the following conditions occur:
  1) Some measurements  are  transmitted  or  requested  from
     remote terminals or control centers every  few  seconds.
     No attempt is necessarily made to recover data lost  due
     to transmission error; the application programs  include
     provisions for  proper  operation  when  input  data  is
     occassionally missing.  [Inward data collection]
  2) Some data items are transferred from  commonly  accessed
     remote sites or multi-utility pool coordination  centers
     on   a   request-response   basis.     [Request-response
     interaction]
  3) In some cases, an application program may  require  that
     some measurements be  made  simultaneously  in  a  large
     number of locations.  In these cases, the control center
     will  broadcast  a   command   to   make   th   affected
     measurements.  [Outward data dissemination]
In closing, they note that "utility control centers  around  the
world use data communications in ways similar to  those  in  the
United States."


Broadcast and multicast (group  addressed)  communication  using
connection-oriented services is awkward at best  and  impossible
at   worst,   notwithstanding   the   occassional   mention   of
"multi-endpoint  connections"  in  the  Reference  Model.   Some
characteristics  of  connection-based  data  transfer,  such  as
sequencing and error recovery, are very difficult to provide  in
a  broadcast/multicast  environment,  and  may   not   even   be
desirable; and it is not at  all  easy  to  formulate  a  useful
definition of broadcast/multicast acknowledgement  that  can  be
supported by a low-level protocol.  Where group addressing is an
important application consideration, connectionless data  trans-
mission is usually the only choice.
Certain special applications,  such  as  digitized  voice,  data

Connectionless Data Transmission, Rev. 1.00


telemetry, and remote command  and  control,  involving  a  high
level  of  data   redundancy   and/or   real-time   transmission
requirements, may profit from the fact that CDT makes no  effort
to detect or recover lost or corrupted data.  If the  time  span
during which an individual datum  is  meaningful  is  relatively
short, since it is quickly superceded by the next - or if, as in
digitized voice transmission, the loss or corruption of  one  or
even several data units is insignificant - the application might
suffer far more from the delay that would  be  introduced  as  a
connection-oriented service dealt with a lost or out-of-sequence
data unit (even if retransmission or other  recovery  procedures
were not invoked) than it would from the unreported  loss  of  a
few data units in  the  course  of  a  connectionless  exchange.
Other special considerations - such as the  undesirability,  for
security reasons, of  maintaining  connection-state  information
between data transfers in a military command and control  system
- add force to the argument that CDT should be available  as  an
alternative to connection-oriented data transfer.
Local area networks (LANs) are probably the most fertile  ground
for connectionless services, which find  useful  application  at
several layers.  LANs  employ  intrinsically  reliable  physical
transmission  media  and  techniques  (baseband  and   broadband
coaxial  cable,  fiber  optics,  etc.)  in  a  restricted  range
(generally no greater than 1 or 2 kilometers), and are typically
able to achieve extremely low bit error rates.  In addition, the
media-access contention  mechanisms  favored  by  LAN  designers
handle transmission errors as a matter  of  course.   The  usual
approach to physical interconnection ties all nodes together  on
a common medium, creating an inherently broadcast environment in
which every transmission  can  be  received  by  every  station.
Taking advantage of these characteristics  virtually  demands  a
connectionless data link service, and in fact most  current  and
proposed LANs - the Xerox Ethernet[43], the  proposed  IEEE  802
LAN standard[14,46], and many others - depend on such a service.
As a bonus,  because  connectionless  services  are  simpler  to
implement - requiring only two or  three  service  primitives  -
inexpensive VLSI implementations are often possible.
In addition, the applications for which LANs are often installed
tend to be precisely those best handled by CDT.   Consider  this
list of eight application classes identified  by  the  IEEE  802
Interface Subcommittee as targets for the 802 LAN standard[46]:
1.   Periodic   status   reporting   -   telemetry   data   from
instrumentation, monitoring devices associated  with  static  or
dynamic physical environments;
2.  Special event reporting - fire alarms, overload or stressing
conditions;

Connectionless Data Transmission, Rev. 1.00


3.  Security control - security door opening and closing, system
recovery or initialization, access control;
4.  File transfer;
5.  Interactive transactions - reservation  systems,  electronic
messaging and conferencing;
6.  Interactive information exchange -  communicating  text  and
word processors, electronic mail, remote job entry;
7. Office information exchange - store and forward of  digitized
voice messages, digitized graphic/image handling;
8.  Real-time stimulus and response  -  universal  product  code
checkout readers, distributed  point  of  sale  cash  registers,
military  command  and  control,  and  other   closed-loop   and
real-time applications.


Of these, almost all have already  been  identified  as  classic
examples of applications that have an essentially connectionless
nature.  Consider this more detailed example  of  (8):  a  local
area network with a large number of nodes and a large number  of
services  (e.g.,  file  management,  printing,   plotting,   job
execution,  etc.)  provided  at  various  nodes.   In   such   a
configuration, it is impractical to maintain  a  table  at  each
node giving the address of every  service,  since  changing  the
location of a single service would require updating the  address
table at every node.  An alternative is  to  maintain  a  single
independent "server lookup" service, which performs the function
of mapping the name of a given  service  to  the  address  of  a
server providing that service.   The  server-lookup  server  re-
ceives requests such as, "where is service X?", and returns  the
address at which an instance of service X is currently  located.
Communication  with  the  server-lookup  server  is   inherently
self-contained,  consisting   of   a   single   request/response
exchange.  Only the highest-level acknowledgement - the response
from the lookup service giving the requested address - is at all
significant.  The native reliability of the local  area  network
ensures a low error rate; if a message should be lost,  no  harm
is done, since the request will simply be re-sent  if  a  timely
response does not arrive.  Such an interaction is poorly  model-
led by the connection-oriented paradigm of opening a connection,
transferring a stream of data, and closing the  connection.   It
is perfectly suited to connectionless transmission techniques.


Network interconnection (internetworking) can be  facilitated  -
especially when networks of different types are involved, as  is
often the case - if the internetwork service is  connectionless;

Connectionless Data Transmission, Rev. 1.00


and a number of related activities, such  as  gateway-to-gateway
communication,  exhibit  the   request-response,   inward   data
collection, and outward data dissemination characteristics  that
are well supported by CDT.   One  of  the  best  examples  of  a
connectionless internetwork service is described in  a  document
published by the  National  Bureau  of  Standards  (Features  of
Internetwork  Protocol[29],  which  includes  a  straightforward
discussion of the merits of the connectionless approach:
     "The  greatest   advantage   of   connectionless
     service at the  internet  level  is  simplicity,
     particularly in  the  gateways.   Simplicity  is
     manifested in terms of smaller and less  compli-
     cated computer code and smaller computer storage
     requirements.  The gateways and  hosts  are  not
     required  to  maintain  state  information,  nor
     interpret call request and call clear  commands.
     Each     data-unit      can      be      treated
     independently...Connectionless service assumes a
     minim[al]   service    from    the    underlying
     subnetworks.   This  is  advantageous   if   the
     networks are diverse.  Existing internet  proto-
     cols which are intended for interconnection of a
     diverse variety  of  networks  are  based  on  a
     connectionless  service  [for  example  the  PUP
     Internetwork  protocol[44],  the  Department  of
     Defence Standard Internet Protocol[31], and  the
     Delta-t protocol developed at Lawrence Livermore
     Laboratory[45]]."
The principle motivating the development of internetwork  servi-
ces and protocols that make few assumptions about the nature  of
the individual network services (the "lowest common denominator"
approach) was formulated by Carl  Sunshine  as  the  "local  net
independence principle"[39]: "Each local net  shall  retain  its
individual address space, routing  algorithms,  packet  formats,
protocols, traffic controls, fees, and other network  character-
istics to the greatest extent  possible."   The  simplicity  and
robustness of connectionless internetworking  systems  guarantee
their widespread use as the number of different network types  -
X.25 networks, LANs,  packet  radio  networks,  other  broadcast
networks, and satellite networks - increases and  the  pressures
to interconnect them grow.


4  CDT and the OSI Reference Model


As a concept, connectionless data transmission  complements  the
concept of connection-oriented data transfer throughout the  OSI

Connectionless Data Transmission, Rev. 1.00


architecture.  As a basis for deriving standard OSI services and
protocols, however, it has a greater impact on  some  layers  of
the Reference Model than on others.   Careful  analysis  of  the
relative  merits  of  connectionless   and   connection-oriented
operation at each layer is necessary to control  the  prolifera-
tion of incompatible or useless options and preserve  a  balance
between the power of the complementary concepts and the stabili-
zing objective of the OSI standardization effort.
Figure 5 illustrates the layered OSI hierarchy  as  it  is  most
commonly represented (it shows two instances of  the  hierarchy,
representing the relationship between  two  OSI  systems).   The
following sections discuss the CDT concept  in  the  context  of
each of the seven layers.


4.1  Physical Layer


The duality of connections and connectionless service is  diffi-
cult  to  demonstrate  satisfactorily  at  the  physical  layer,
largely because the concept of a physical "connection"  is  both
intuitive and colloquial.  The physical layer is responsible for
generating and interpreting signals represented for the  purpose
of transmission  by  some  form  of  physical  encoding  (be  it
electrical, optical, acoustic, etc.), and a physical connection,
in the most general sense (and restricting our consideration, as
does the Reference Model itself, to  telecommunications  media),
is a signal pathway through a medium or a combination of  media.
Is  a  packet   radio   broadcast   network,   then,   using   a
"connectionless" physical service?  No explicit  signal  pathway
through a  medium  or  media  is  established  before  data  are
transmitted.  On the other hand, it can easily be argued that  a
physical connection is established with the introduction of  two
antennae into the "ether"; and if the antennae are aimed at each
other and designed to handle microwave transmission, the impres-
sion that a physical connection exists is strengthened.  Whether
or not one recognizes the possibility of connectionless physical
services - other than purely  whimsical  ones  -  will  probably
continue to depend on one's point of  view,  and  will  have  no
effect on the development of actual telecommunication systems.


4.2  Data Link Layer


Many data link technologies -  particularly  those  coming  into
popular use with the growth of local area networking -  are  far
easier  to  understand  and  work  with  when  the   traditional
connection-oriented concepts  (embodied,  for  example,  in  the
widely-used HDLC, SDLC, and ADCCP standards) are replaced by the






     ,---------------------,            ,---------------------,
     |                     |            |                     |

Level 7 | Application Layer |<---------->| Application Layer |

     |                     |            |                     |
     |----------|----------|            |----------|----------|
     |                     |            |                     |

Level 6 | Presentation Layer |<---------->| Presentation Layer |

     |                     |            |                     |
     |----------|----------|            |----------|----------|
     |                     |            |                     |

Level 5 | Session Layer |<---------->| Session Layer |

     |                     |            |                     |
     |----------|----------|            |----------|----------|
     |                     |            |                     |

Level 4 | Transport Layer |<---------->| Transport Layer |

     |                     |            |                     |
     |----------|----------|            |----------|----------|
     |                     |            |                     |

Level 3 | Network Layer |<---------->| Network Layer |

     |                     |            |                     |
     |----------|----------|            |----------|----------|
     |                     |            |                     |

Level 2 | Data Link Layer |<---------->| Data Link Layer |

     |                     |            |                     |
     |----------|----------|            |----------|----------|
     |                     |            |                     |

Level 1 | Physical Layer |<---------->| Physical Layer |

     |                     |            |                     |
     '---------------------'            '---------------------'



 FIGURE 5 - Layered Hierarchy of Open Systems Interconnection

Connectionless Data Transmission, Rev. 1.00


concept  of  connectionless  data  transmission.   The  previous
discussion of local area networking has already made  the  point
that the high-speed, short-range, intrinsically reliable  broad-
cast transmission media used to interconnect stations  in  local
area networks are complemented  both  functionally  and  concep-
tually by connectionless data link techniques.
One of the  organizations  currently  developing  a  local  area
network data link layer standard  -  the  Data  Link  and  Media
Access (DLMAC) subcommittee of IEEE 802 -  has  recognized  both
the need to retain compatibility with existing long-haul techni-
ques and the unique advantages of CDT for local area networks by
proposing that two data link procedures be defined for the  IEEE
802 standard.
In one procedure, information frames are unnumbered and  may  be
sent at any time by any station  without  first  establishing  a
connection.  The intended receiver  may  accept  the  frame  and
interpret it, but is under no  obligation  to  do  so,  and  may
instead discard the frame with no notice to the sender.  Neither
is the sender notified if  no  station  recognizes  the  address
coded  into  the  frame,  and  there  is  no   receiver.    This
"connectionless" procedure, of course,  assumes  the  "friendly"
environment and higher-layer acceptance of  responsibility  that
are   usually   characteristic    of    local    area    network
implementations.
The other procedure provides all of  the  sequencing,  recovery,
and    other     guarantees     normally     associated     with
connection-oriented link procedures.  It is in fact very similar
to the ISO standard HDLC balanced asynchronous mode procedure.
Data  link  procedures  designed  for  transmission  media  that
(unlike those used in local area networks)  suffer  unacceptable
error rates are almost universally connection-based, since it is
generally  more  efficient   to   recover   the   point-to-point
bit-stream errors detectable by  connection-oriented  data  link
procedures at the data link layer (with its comparatively  short
timeout intervals) than at a higher layer.


4.3  Network Layer


Connectionless network service is useful for many  of  the  same
reasons that were  identified  in  the  previous  discussion  of
network interconnection: it greatly simplifies  the  design  and
implementation of systems; makes few assumptions about  underly-
ing services; and is more efficient than  a  connection-oriented
service when higher layers  perform  whatever  sequencing,  flow
control, and error recovery is required by user applications (in

Connectionless Data Transmission, Rev. 1.00


fact, internetwork services are provided by the Network  Layer).
CDT  also   facilitates   dynamic   routing   in   packet-   and
message-switched networks,  since  each  data  unit  (packet  or
message) can be directed along the most appropriate  "next  hop"
unencumbered   by   connection-mandated   node   configurations.
Examples of more or less connectionless  network  layer  designs
and implementations abound: Zilog's  Z-net  (which  offers  both
"reliable"   and   "unreliable"   service   options);   DECNET's
"transport layer" (which corresponds to the OSI Network  layer);
Livermore Lab's Delta-t protocol (although it  provides  only  a
reliable   service,   performing   error   checking,   duplicate
detection, and acknowledgement); the User Datagram protocol[48];
and the  Cyclades  network  protocol[38].   In  fact,  even  the
staunchly  connection-oriented   X.25   public   data   networks
(Canada's Datapac is the  best  example)  generally  emply  what
amounts to  a  connectionless  network-layer  service  in  their
internal packet switches, which enables them to perform flexible
dynamic routing on a packet-by-packet basis.


4.4  Transport Layer


The connectionless transport service is important  primarily  in
systems that distinguish  the  Transport  layer  and  everything
below it as providing something generically named the "Transport
Service", and abandon or severely compromise  adherence  to  the
OSI architecture above the Transport layer.  In such  systems  a
connectionless transport service may  be  needed  for  the  same
reasons that other (more OSI-respecting) systems need a  connec-
tionless application service.  Otherwise, the purpose of  defin-
ing a connectionless transport service is to enable a  uniformly
connectionless service to  be  passed  efficiently  through  the
Transport layer to higher layers.


4.5  Session Layer


The whole notion of a session which binds  presentation-entities
into a relationship of  some  temporal  duration  is  inherently
connection-oriented.  The purpose of defining  a  connectionless
session service, therefore, is to enable a uniformly connection-
less service to be passed efficiently through the session  layer
to higher layers.  In this  sense,  the  connectionless  session
service stands in precisely the same relationship to the connec-
tionless transport service as a session-connection stands  to  a
transport-connection.

Connectionless Data Transmission, Rev. 1.00


4.6  Presentation Layer


Very much the same  considerations  apply  to  the  Presentation
layer as apply to the Session layer.


4.7  Application Layer


The most obvious reason to define a  connectionless  application
service - to give  user  application  processes  access  to  the
connectionless services of the architecture - is  not  the  only
one.  The application layer performs functions  that  help  user
application processes to converse regarding the meaning  of  the
information they exchange, and is also responsible  for  dealing
with the overall system management aspects of the OSI operation.
Over  and  above  the  many  user-application  requirements  for
connectionless service, it may be profitably employed by  system
management functions that monitor and report on  the  status  of
resources in the local open system; by application layer manage-
ment functions that need to interact in a request-response  mode
with similar functions in  other  systems  to  perform  security
access control; and by user application process  functions  that
monitor the status of activities in progress.


The potential availability of two complementary services at each
layer of the architecture raises an obvious question  -  how  to
choose between them?  It should be  clear  at  this  point  that
unilateral exclusion of  one  or  the  other,  although  it  may
simplify the situation for some applications, is not  a  general
solution to the problem.  There are actually two  parts  to  the
question: how  to  select  an  appropriate  set  of  cooperative
services for all seven layers during the design of a  particular
open system; and, if one or more layers of the system will offer
both connection-oriented and  connectionless  services,  how  to
provide for the dynamic selection of one or the other in a given
circumstance.
The second part is easiest to dispose of, since actual systems -
as opposed to the more abstract set of  services  and  protocols
collected under the banner of  OSI  -  will  generally  be  con-
structed in such a way as  to  combine  services  cooperatively,
with some attention paid to the way in which they will  interact
to meet specific goals.  Although two services may  be  provided
at a given layer, logical combinations of services for different
applications will generally be assembled according to relatively
simple rules established during the design of the system.
Evaluating the requirements of the applications  a  system  must

Connectionless Data Transmission, Rev. 1.00


support and the characteristics of the preferred  implementation
technologies will also answer  the  first  question.   A  system
designed primarily to transport large  files  over  a  long-haul
network would probably use  only  connection-oriented  services.
One designed to collect data from widely scattered  sensors  for
processing at a central  site  might  provide  a  connectionless
application  service  but  use  a  connection-oriented   network
service to achieve compatibility with  a  public  data  network.
Another system, built around a local area network bus  or  ring,
might use a connectionless data link service regardless  of  the
applications   supported;   if   several   LANs   sere   to   be
interconnected, perhaps with other network types, it might  also
employ a connectionless internetwork service.
The definition of OSI standard services and protocols,  however,
must consider the general case, so as to accomodate a wide range
of  actual-system  configurations.   The  motivating   principle
should be to achieve a balance between the two  goals  of  power
and simplicity.  The service  definition  for  each  layer  must
include both connection-oriented  and  connectionless  services;
otherwise, the utility of  a  service  at  one  layer  could  be
negated by the unavailability of a corresponding  service  else-
where in the  hierarchy.   However,  the  role  played  by  each
service may be radically different from one layer to  the  next.
The Presentation, Session, and Transport layers,  for  instance,
need to support their respective  connectionless  services  only
because the Application layer, which must provide a  connection-
less service to user applications, cannot do so  effectively  if
they do not.  Recognizing these role  variations  opens  up  the
possibility of restoring a measure of the simplicity lost in the
introduction of choice  at  each  layer  by  limiting,  not  the
choices, but the places in the hierarchy where  conversion  from
one choice to the other - connection to connectionless, or  vice
versa - is allowed (see figure 6).  At this stage in the  devel-
opment of the CDT concept, it appears that there are  exscellent
reasons for allowing such a conversion  to  take  place  in  the
Application, Transport, and Network layers (and in the Data Link
layer, if some physical interconnection strategies are deemed to
be connectionless).  In the other layers, the provision  of  one
kind of service to the next-higher layer must always  be  accom-
plished by using the same kind of service  from  the  next-lower
layer (see figure 7).  (This principle of  like-to-like  mapping
is not related to  multiplexing;  it  refers  to  service  types
(connection-oriented  and   connectionless),   not   to   actual
services.) Adopting such a restriction would contribute  to  the
achievement of the balance mentioned  above,  without  excluding
those combinations of  services  that  have  demonstrated  their
usefulness.


            ^                              ^   (N+1)-LAYER
            |                              |
            |                              |

o------------------------------o----------------

            |                              |

,-------------------------, ,-------------------------, | Offers a connectionless | | Offers a connection- | | (N)-service | | oriented (N)-service | | | | | | | | (N)-LAYER | OR | (N)-LAYER | | | | | | | | Uses a connection- | | Uses a connectionless | | oriented (N-1)-service | | (N-1)-service | '-------------------------' '-------------------------'

            |                              |

o------------------------------o----------------

            |                              |
            |                              |
            v                              v   (N-1)-LAYER


           FIGURE 6 - Service Type Conversion




            ^                              ^   (N+1)-LAYER
            |                              |
            |                              |

o------------------------------o----------------

            |                              |

,-------------------------, ,-------------------------, | Offers a connectionless | | Offers a connection- | | (N)-service | | oriented (N)-service | | | | | | | | (N)-LAYER | OR | (N)-LAYER | | | | | | | | Uses a connectionless | | Uses a connection- | | (N-1)-service | | oriented (N-1)-service | '-------------------------' '-------------------------'

            |                              |

o------------------------------o----------------

            |                              |
            |                              |
            v                              v   (N-1)-LAYER


             FIGURE 7 - Same-Service Mapping

Connectionless Data Transmission, Rev. 1.00


5  Summary


Support for incorporating connectionless data transmission as  a
basic architectural element of the Reference Model has grown  as
understanding of the concept has become  more  widespread.   The
protocol development sponsored by various agencies of  the  U.S.
Department of Defense, for example, have long recognized connec-
tions and connectionless transmission as complementary concepts,
and have employed both.  Similar work being  carried  out  by  a
division of the Institute for Computer Science and Technology at
the National Bureau of Standards, the result of which will be  a
series of  Federal  Information  Processing  Standards,  depends
heavily  on  connectionless  as  well   as   connection-oriented
concepts.  The importance of CDT to some of these U.S.   efforts
is reflected in comments received by ANSI committee X3T5  during
the recent Reference Model ballot period, one  of  which  states
that "Publication of this material [DP7498]  without  incorpora-
tion  of  the  concerns  associated  with  Connectionless   Data
Trans[mission] makes a mockery of U.S. interests."[18]  A  some-
what less emotional expression of the same sentiment is embodied
in  the  official   U.S.   Position   on   Connectionless   Data
Transmission[9],   in   which   X3T5,   the   responsible   U.S.
organization,  "endorses  SC16/N555  [Recommended   Changes   to
Section 3 of [the  Reference  Model]  to  Include  CDT]  without
exception and announces its intention to pursue  vigorously  the
incorporation of CDT as the first major extension to  the  Basic
Reference Model of OSI."  In the same document, X3T5 notes  that
it "intends to issue and maintain a  version  of  DP7498  to  be
referred to as DP7498-prime, incorporating the CDT  extensions."
That there is also significant international support for the CDT
concept is clear,  however,  from  the  membership  of  the  ISO
SC16/WG1 Ad Hoc Group on Connectionless Data Transmission, which
produced the N555 document last November; it includes  represen-
tatives from France, Japan, Germany, and the United  Kingdom  as
well as from the U.S.  Those who believe that the CDT concept is
an essential part of the OSI architecture hope  that  eventually
the DP7498-prime document, or its successor,  will  replace  the
exclusively  connection-oriented  Reference  Model  before   the
latter becomes an International Standard.


6  Acknowledgements


                 [to be supplied]

Connectionless Data Transmission, Rev. 1.00 Appendix A: Vocabulary





                  APPENDIX A - Vocabulary




OSI Terminology
The following terms are  defined  in  either  the  text  or  the
vocabulary annex (or both) of the Draft Proposed Reference Model
of OSI (ISO/DP7498).  Some terms are given more than one defini-
tion in different sections of the  Reference  Model;  these  are
marked with an asterisk (*), to indicate that selection  of  the
accompanying   definition   involved   the   author's   personal
judgement.
                 [to be supplied]



(N)-connection
(N)-service-access-point
(N)-service-access-point-address
(N)-layer
system
(N)-entity
(N)-connection-endpoint-identifier


CDT Terminology
The  following  terms,  not  yet  part  of  the   standard   OSI
vocabulary,  relate  to  the  concept  of  connectionless   data
transmission.
"Connectionless  Data  Transmission  is  the  transmission  (not
transfer)   of   an   (N)-service-data-unit   from   a    source
(N)-service-access-point   to   one    or    more    destination
(N)-service-access-points without establishing an (N)-connection
for the transmission."
"A Connectionless  (N)-Service  is  one  that  accomplishes  the

Connectionless Data Transmission, Rev. 1.00 Appendix A: Vocabulary


transmission of a  single  self-contained  (N)-service-data-unit
between  (N+1)-entities  upon  the  performance  of   a   single
(N)-service access."
Transmit: "to cause to pass or be conveyed through  space  or  a
medium."  This term refers to the act of conveying only, without
implying anything about reception.
Transfer: "to convey  from  one  place,  person,  or  thing,  to
another."  A one-way peer-to-peer connotation restricts the  use
of this term to cases in which the receiving peer  is  party  to
and accepts the data transferred.
Exchange: "to give and receive, or lose and take,  reciprocally,
as things of the same kind."  A two-way peer-to-peer connotation
restricts the use of this term to cases in which both  give  and
receive directions are clearly evident.
datagram
unit-data transfer/transmission
transaction (from SC1/N688)
data transmission (from DIS 2382 Section 9)


               [End of Appendix A]

Connectionless Data Transmission, Rev. 1.00 Appendix B: References





                  APPENDIX B - References


1.  Data Processing - Open  Systems  Interconnection  -  Basic
             Reference Model.
     Source:         ISO/TC97/SC16
     Reference:      ISO/DP7498
                     X3T51/80-67
                     X3S33/X3T56/80-121
                     X3S37/80-115
     Date:           12/80


2.  Recommended Changes to Section  3  of  97/16  N537,  Basic
             Specifications of the Reference Model of  OSI,
             to Include Connectionless Data Transmission.
     Source:         ISO/TC97/SC16/WG1  Ad  Hoc  Group   on
                             Connectionless Data  Transmis-
                             sion
     Reference:      ISO/TC97/SC16/N555
                     X3S37/81-9
                     X3T51/80-68
                     X3S33/X3T56/80-122
     Date:           11/80


3.   Report  of  the  Ad  Hoc  Group  on  Connectionless  Data
             Transmission.
     Source:         ISO/TC97/SC16/WG1  Ad  Hoc  Group   on
                             Connectionless Data  Transmis-
                             sion
     Reference:      ISO/TC97/SC16/N566
                     X3T51/80-69
                     X3S33/X3T56/81-13
                     X3S37/81-35
     Date:           11/80


4.  Definitions of the Term "Connectionless Data Transmission"
             (a letter to the chairman of ANSC  X3T51  from
             the acting chairman of ANSC X3T56).
     Source:         ANSC X3S33/X3T56
     Reference:      X3S33/X3T56/81-22
                     X3T51/81-2
                     X3S37/81-6
     Date:           1/81



5.  Connectionless Provisions for OSI Reference Model.
     Source:         ANSC X3S37
     Reference:      ISO/TC97/SC6/WG2/W12
                     X3S37/81-16R
     Date:           2/81


6.  Comments on Recommended Changes  to  Section  3  of  97/16
             N537, Basic  Specification  of  the  Reference
             Model of OSI, to include  Connectionless  Data
             Transmission, SC16/N555.
     Source:         DIN (FRG)
     Reference:      ISO/TC97/SC6/WG2/W10
     Date:           2/81


7.  Connectionless Data Transmission.
     Source:         X3S33/X3T56 Ad Hoc  Group  on  Connec-
                             tionless Data Transmission
     Reference:      X3S33/X3T56/81-26
     Date:           1/81


8.  Contribution to Document ISO/TC97/SC16 N555 Concerning the
             Extension of General Concepts from  the  Basic
             Reference Model to Connectionless Data  Trans-
             fer Mode.
     Source:         ISO/TC97/SC16/WG1 Ad Hoc Model  Exten-
                             sion Group B
     Reference:
     Date:           3/81


9.  US Position on Connectionless Data Transmission.
     Source:         ANSC X3T5
     Reference:      ISO/TC97/SC16/N605
                     X3T51/81-26
     Date:           3/81



10. Revision  of  SC16/N551  to  Include  Connectionless  Data
             Transmission.
     Source:         ANSC X3S33/X3T56
     Reference:      ISO/TC97/SC16/N602
                     X3S33/X3T56/81-67
                     X3T51/81-20
                     X3S37/81-17
     Date:           3/81


11. Report of USA Vote and Comments on ISO DP7498.
     Source:         ANSC X3T5
     Reference:      ISO/TC97/SC16/N590
                     X3T51/81-29
     Date:           3/81


12. USA Proposed  Revision  to  Draft  Basic  Session  Service
             Specification,
             ISO TC97/SC16 N553.
     Source:         ANSC X3S33/X3T56
     Reference:      ISO/TC97/SC16/N597
                     X3S33/X3T56/81-39R
                     X3T51/81-28
     Date:           3/81


13.  USA  Proposed  Revision  to   Draft   Transport   Service
             Specification,
             ISO TC97/SC16 N563.
     Source:         ANSC X3S33/X3T56
     Reference:      ISO/TC97/SC16/N601
                     X3S33/X3T56/81-33R
                     X3T51/81-17
     Date:           3/81



14. Comments on Connectionless Data Transmission.
     Source:         Robert F. Stover, Honeywell Inc.
     Reference:      Private communication
     Date:           4/81


15. Proposed Changes to the OSI Transport Layer.
     Source:         Gregory Ennis, Sytek Inc.
     Reference:      X3T51 Reference  Model  Editing  Group
                     V3.B
     Date:           3/81


16. Review of the ISO Draft Proposal (DP  7498),  Open  System
             Interconnection   Reference   Model   (Project
             IPSC-0168).
     Source:         National  Security   Agency,   Central
                             Security  Service,  Department
                             of Defense
     Reference:      NSA/CSS Serial T095/008/81
                     X3T51 Reference  Model  Editing  Group
                     V3.F
     Date:           3/81


17. Comments on Draft Proposal ISO/DP7498.
     Source:         Working Group on Power System  Control
                             Centers, IEEE Power  Engineer-
                             ing Society
     Reference:      X3T51 Reference  Model  Editing  Group
                     V3.I, V4.4
     Date:           3/81


18.  Review  of  ISO  Draft  Proposal   7498   (Open   Systems
             Interconnection).
     Source:         Department of the Air Force
     Reference:      X3T51 Reference  Model  Editing  Group
                     V3.J, V4.5, V1.15, V2.H
     Date:           3/81



19. Proposed Improvements to Section 6 of DP7498.
     Source:         A. Lyman Chapin, Data General Corpora-
                             tion
     Reference:      X3T51 Reference  Model  Editing  Group
                     V3.M
     Date:           3/81


20. Comments on Section 7.4 of DP7498.
     Source:         ANSC X3S33/X3T56
     Reference:      X3S33/X3T56/81-30
                     X3T51 Reference  Model  Editing  Group
                     V3.H
     Date:           3/81


21. Comments on DP7498.
     Source:         ANSC X3S33/X3T56
     Reference:      X3S33/X3T56/81-60
                     X3T51 Reference  Model  Editing  Group
                     V3.N
     Date:           3/81


22. USA Position Concerning Progression of the Reference Model
             of Open Systems Interconnection (Parts  I  and
             II of USA Comments on N309).
     Source:         ANSC X3T5
     Reference:      ISO/TC97/SC16/N405
                     X3T5/80-120
                     X3T51/80-43
     Date:           9/80


23. Addenda to the USA Position Concerning Progression of  OSI
             Reference Model (Parts I and II).
     Source:         ANSC X3T5
     Reference:      X3T5/80-143
                     X3T51/80-63
     Date:           9/80



24. US Position on the  WG1  Rapporteur's  Report  of  October
             1980.
     Source:         ANSC X3T5
     Reference:      X3T5/80-142
                     X3T51/80-62
     Date:           10/80


25. Resolutions: ISO/TC97/SC16 - Open Systems Interconnection:
             Berlin - November 12 - 14, 1980.
     Source:         ISO/TC97/SC16
     Reference:      ISO/TC97/SC16/N570
                     X3S33/X3T56/80-11
     Date:           11/80


26. NBS  Analysis  of  Major  US  Government  Requirements  of
             Transport Protocol Services.
     Source:         National  Bureau  of   Standards,   US
                             Department of Commerce
     Reference:      ISO/TC97/SC16/N404
                     X3T51/80-32
                     X3S33/X3T56/80-82
     Date:           9/80


27. Features of the Transport and Session Protocols.
     Source:         National  Bureau  of   Standards,   US
                             Department of Commerce
     Reference:      X3S33/X3T56/80-30
     Date:           3/80


28. Specification of the Transport Protocol.
     Source:         National  Bureau  of   Standards,   US
                             Department of Commerce
     Reference:      X3S33/X3T56/81-59
     Date:           2/81



29. Features of Internetwork Protocol.
     Source:         National  Bureau  of   Standards,   US
                             Department of Commerce
     Reference:      X3T51/81-23
                     X3S33/X3T56/80-96
                     X3S37/81-31
     Date:           7/80


30. Service Specification of an Internetwork Protocol.
     Source:         National  Bureau  of   Standards,   US
                             Department of Commerce
     Reference:      X3T51/81-24
                     X3S33/X3T56/81-18
                     X3S37/81-32
     Date:           9/80


31. DoD Standard Internet Protocol.
     Source:         US  Department  of  Defense   Advanced
                             Research Projects Agency
     Reference:      X3S33/X3T56/80-17
                     X3S37/80-17
     Date:           1/80


32. Connectionless Data Transfer (letter from the chairman  of
             X3T51 to X3T55, X3T56, and X3S3).
     Source:         John Day, Digital Technology, Inc.
     Reference:      X3T51/80-76
     Date:           12/80


33. Local Area Networks and the OSI Reference Model.
     Source:         Robert  R.  Shatzer,   Hewlett-Packard
                             Corp.
     Reference:      X3T51/80-38
     Date:           8/80



34. An Introduction to Local Area Networks.
     Source:         David D. Clark, et. al.
     Reference:      IEEE Proceedings 66:11
     Date:           11/78


35. Issues in Packet-Network Interconnection.
     Source:         V.G. Cerf and P.T. Kirstein
     Reference:      IEEE Proceedings 66:11
     Date:           11/78


36. Connectionless Data Transfer.
     Source:         John Neumann, Microdata Corp.
     Reference:      X3S33/X3T56/80-120
     Date:           12/80


37. A Protocol for Packet Network Interconnection.
     Source:         V.G. Cerf and R.E. Kahn
     Reference:      IEEE  Transactions  on   Communication
                     COM-22 No. 5
     Date:           5/74


38. The CYCLADES End-to-End Protocol.
     Source:         H. Zimmermann
     Reference:      Proceedings of the IEEE Vol. 66 No. 11
     Date:           11/78


39.  Interprocess   Communication   Protocols   for   Computer
             Networks.
     Source:         Carl Sunshine, USC/ISI
     Reference:      Stanford  Digital  Systems  Laboratory
                     TR105
     Date:           12/75



40. CCITT Recommendation X.25 - Interface  Between  Data  Ter-
             minal     Equipment     (DTE)     and     Data
             Circuit-Terminating   Equipment   (DCE)    for
             Terminals Operating  in  the  Packet  Mode  on
             Public Data Networks.
     Source:         CCITT Study Group VII
     Reference:      COM VII/489
     Date:           11/80


41. An Analysis of ARPAnet Protocols.
     Source:
     Reference:
     Date:


42. ISO High-Level Data Link Control - Elements of Procedure.
     Source:         ISO
     Reference:      ISO/IS4335
     Date:           1977


43. ETHERNET Specification (Version 1.0)
     Source:         Xerox Corporation
     Reference:      X3T51/80-50
     Date:           9/80


44. PUP: An Internetwork Architecture.
     Source:         D.R. Boggs,  J.F.  Shoch,  E.A.  Taft,
                             R.M. Metcalfe
     Reference:      IEEE  Transactions  on  Communications
                     COM-28 No. 4
     Date:           4/80



45. Delta-t Protocol Preliminary Specification.
     Source:         R.W. Watson
     Reference:      Lawrence Livermore Laboratories
     Date:           11/79


46. The Evolving IEEE 802 (Local Network) Standard.
     Source:         Bryan   R.   Hoover,   Hewlett-Packard
                             Corporation
     Reference:
     Date:


47. A System for  Interprocess  Communication  in  a  Resource
             Sharing Computer Network.
     Source:         D. Walden
     Reference:      Communications of the ACM Vol. 15
     Date:           4/72