INDRA Note 753
IEN 99
May 3rd 1979










                     NI FTP: Summary and Assessment

                            P. L. Higginson
                             C. J. Bennett










               ABSTRACT: This note is a brief summary  of
               the  NI FTP, its design aims, and the ways
               in  which  those  aims  are  achieved.   A
               comparison  of  the NI FTP and the DIN FTP
               proposed for AUTODIN II  is  contained  in
               IEN 100.

                                     2



1.  The NI FTP Protocol

     This section is a brief summary of the important features of the NI
FTP protocol.

     The NI FTP  was  written  by  a  committee  of  people  from  eight
different  organisations  in the UK who between them used a wide variety
of computer systems and hardware.  Computers  used  by  the  group  were
manufactured,  among  others,  by  DEC,  IBM,  ICL,  GEC, PRIME and CTL.
Drafts were widely circulated and discussed outside  the  design  group.
While  the  initial aim was to produce a protocol for transferring files
across EPSS, "network independence" became an overriding aim.  This  was
because  it  was  realised  that  EPSS  would  shortly  be replaced by a
different,  X25-based  network,  and   because   most   of   the   eight
organisations  had multiple systems or their own local networks, and the
ability to use the FTP in all these areas was desired.  There are  about
15  implementations in progress, of which 3 have so far exchanged files.
UCL has a TOPS20/TENEX implementation which has transferred files across
the  ARPANET,  and tests have begun on interworking with implementations
in EPSS.

     The NI FTP is a two-party file  transfer  protocol.   The  transfer
occurs  in  two  phases.   In the first, the transfer is defined and the
attributes of the data to be transferred are negotiated.  In the second,
the  data  is  actually  transferred.   Three  levels  of  protocol  are
recognised: level 0, which  covers  the  negotiation  of  file  transfer
parameters;  level  1,  which  handles error and flow control during the
transfer, along with any data or time dependent changes in the file; and
level 2, which is the actual transfer of data.

     The negotiation phase is simply structured to  be  an  exchange  of
file attributes between the two sides.  These attributes define a common
definition of the file and the transfer within a "conceptual  filestore"
supported  by the two sides.  During this phase, agreement is reached on
such things as character code, file size, file name and  access  rights,
all  of  which  are  regarded  as  attributes  of  the  file  within the
conceptual file store.  It is up to the two ends to map these attributes
into  locally  acceptable  forms  for  their  actual filestores; if this
cannot be done, the transfer may be rejected.

     The currently defined attributes cover a basic set of properties of
sequential  files.   This set can be easily extended, and facilities are
provided to enable implementations to  grow  in  an  upwards  compatible
manner.    Every   attribute  has  a  default  value,  which  allows  an
implementor to construct a transfer facility as simple or as complex  as
desired,  in  the  knowledge  that his facility will be able to interact
easily with more complex ones.  This  is  possible  because  quoting  an
unknown  attribute  or  unacceptable  value for an attribute need not of
itself cause a protocol error.  During the negotiation phase,  the  more
complex  implementation  will reduce its attribute set to one acceptable
to the simpler one.

                                     3



     The data transfer phase can treat the data  totally  transparently,
but  does provide a user record structure for text files if desired.  It
allows for data compression as an option, which can significantly reduce
the  amount of data actually transferred.  Even if this is not used, the
protocol overhead can be as low as 1 byte in 64.  For  text  files,  the
existence   of   different   degrees  of  formatting  sophistication  is
recognised by allowing a set of common format effectors to be agreed  in
the negotiation phase.  The data can be in a variety of codes, as agreed
during the negotiation phase, and the particular  code  in  use  can  be
changed  during the transfer phase, thus allowing the protocol to handle
special files such as job output files,  graphics  files  with  embedded
text,  or  symbolic files produced by a compiler for debugging purposes.
Binary files can use byte sizes of  any  arbitrary  size  as  agreed  in
advance.

     Error control is provided by the use of  data  checkpoints.   These
are inserted by the sender at suitable points, and may be matched to the
characteristics of the file source or destination storage devices.   The
acknowledgement  of  a data mark implies that the data has been securely
stored by the receiver.  The use of a data window of unacknowledged data
marks  enables  the sender to detect problems at the receiving end which
will cause it to suspend the flow of  data.   On  recovery  (or  in  any
appropriate circumstance), the receiver can ask the sender to resume the
transfer starting from any mark after the last mark acknowledged.   This
facility  also  protects  the  transfer  against loss of data within the
network, and can even be used to resume an  interrupted  transfer  in  a
separate session.

     Flow control is provided by allowing the receiver  to  request  the
sender to suspend the flow of data, and to tell it when to resume.  This
is primarily intended to  cover  device  interruptions  (eg  mounting  a
magnetic  tape).   The  use  of  these options is again subject to prior
agreement during the initial negotiation phase, as with  all  the  other
attributes.

     The mechanics of  the  data  transfer  is  left  to  the  transport
mechanism.   The  protocol  is defined so as to make minimal assumptions
about the transport service.  These  are:  the  transport  service  will
provide  a synchronised sequential bytestream between the two sides with
an acceptably low rate of error, and that if an unrecoverable error does
occur,  there  exists  some  way for the transport service to notify the
application process.  Recovery  would  then  be  handled  by  the  error
control mechanism described above.



                                     4



2.  Assessment of the NI FTP.

The design of the NI FTP was governed by four basic objectives:

     (i) The protocol should be independent of the communication medium.

     (ii) It should be flexible enough to satisfy a diverse  variety  of
     applications.

     (iii) It should be able to interface easily  to  a  wide  range  of
     operating systems.

     (iv) It should allow "escape routes" such that special features  of
     a particular operating system can be exploited where necessary.

The following features of the  protocol  were  designed  to  meet  these
objectives:

     (i) The minimal requirements necessary  from  a  transport  service
     were  identified  and  adhered  to, along with the recognition that
     unrecoverable errors (at transport level) may occur.

     (ii) The definition of the file is in terms of  a  conceptual  file
     store.   No  restrictions  were  placed on the mapping of this file
     store  to  the  local  file  store,  either   in   the   attributes
     specification or in the definition of the negotiation process.  The
     inclusion of option sets and relational operators in the  attribute
     specification  allows  extensions  to  be  easily incorporated into
     existing implementations and into the protocol itself.  A number of
     parameters  provide  the  required  "escape routes" for areas where
     operating system dependent peculiarities are anticipated.

     (iii) Complete transparency for naming files and for data  transfer
     is possible.

     (iv) The "records" of data transfer used within the protocol enable
     mixing  of  control and data within a single connection.  They need
     have no relation to the record structure (if any) used  within  the
     file, unless the user so desires.  The only restriction is that the
     communication medium should deliver eight  bit  bytes  of  data  in
     sequence.

     (v) The formats of control commands and attributes are standardised
     in  a machine-oriented form.  The action of the protocol is defined
     as a single file transfer transaction.  Hence the dominant need for
     flexible  command  formats occurs in the negotiation phase, and the
     level 0 commands are very loosely structured  to  allow  indefinite
     extension.   Only a very small number of commands must be exchanged
     during the data transfer; for this reason, a more  rigid  structure
     was adopted for level 1 commands to ease processing overhead.

mirror server hosted at Truenetwork, Russian Federation.