分享
 
 
 

RFC1223 - OSI CLNS and LLC1 protocols on Network Systems HYPERchannel

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group J. Halpern

Request for Comments: 1223 NSC

May 1991

OSI CLNS and LLC1 Protocols on Network Systems HYPERchannel

Status of this Memo

The intent of this document is to provide a complete discussion of

the protocols and techniques used to transmit OSI CLNS and LLC1

datagrams (and any associated higher level protocols) on Network

Systems Corporation's HYPERchannel equipment. This document is

intended for network planners and implementers who are already

familiar with the OSI protocol suite and the techniques used to carry

OSI traffic on standard networks sUCh as 802.3.

This memo provides information for the Internet community. It does

not specify an Internet standard. Distribution of this memo is

unlimited.

Table of Contents

Goals of this Document . . . . . . . . . . . . . . . . . . . . . 1

HYPERchannel Network Messages . . . . . . . . . . . . . . . . . . 2

Message Proper Header . . . . . . . . . . . . . . . . . . . . . 3

TO Addresses and Open Driver Architecture . . . . . . . . . . . 8

Broadcasting . . . . . . . . . . . . . . . . . . . . . . . . . . 9

ES-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

IS-IS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

References . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Security Considerations . . . . . . . . . . . . . . . . . . . . 12

Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 12

Goals of this Document

In this document, we have three major technical objectives:

1. To standardize the encapsulation of LLC1 packets over

HYPERchannel. The format will be used for OSI CLNS and for

any other protocols using LLC1 over HYPERchannel. (Note

that if one desires to use the LLC1/SNAP combination for

TCP/IP, this is the format to use. This represents an

alternative to the native mode for TCP/IP over HYPERchannel,

allowing for sharing the medium at the LLC1 layer.)

2. To describe how multicast protocols such as ES-IS and IS-IS shall

operate over HYPERchannel. As a medium, HYPERchannel does not

support either broadcast or multicast. Therefore, special

techniques are needed to handle these protocols. Note that these

techniques do not allow general multicast, although any specific

problem may be solved by a generalization of these methods.

3. To make use of a standardized "message type" field in bytes

8 and 9 of the HYPERchannel network message. To permit better

interoperability, NSC maintains a "network protocol registry"

where any interested party may oBTain a unique value in byte 8

(or bytes 8 and 9) for their own public, private, commercial or

proprietary protocol. Lists of assigned protocol type numbers

and their "owners" would be periodically published by NSC and

are available to interested parties.

HYPERchannel Network Messages

Unlike most datagram delivery systems, the HYPERchannel network

message consists of two parts:

Message Proper

+--------------------+

16-64 bytes

+--------------------+

Associated Data

+----------------------------------------------------+

Unlimited length

+----------------------------------------------------+

The first part is a message header that can be up to 64 bytes in

length. The first 16 bytes contain information required for the

delivery of the entire message, and the remainder can be used by

higher level protocols. The second part of the message, the

"Associated Data," can be optionally included with the message

proper. In most cases (transmission over HYPERchannel-50 trunks) the

length of the associated data is literally unlimited. Others (such

as HYPERchannel-10 or transmission within a local HYPERchannel-50

A400 adapter) limit the size of the Associated Data to 4K bytes. If

the information sent can be contained within the Message Proper, then

the Associated Data need not be sent.

HYPERchannel lower link protocols treat messages with and without

Associated Data quite differently; "Message only" transmissions are

sent using abbreviated protocols and can be queued in the receiving

network adapter, thus minimizing the elapsed time needed to send and

receive the messages. When associated data is provided, the

HYPERchannel-50 adapters free their logical resources towards driving

the host interface and coaxial trunks at maximum speed, so that data

can flow through the transmitting channel, the coaxial cable, and the

receiving channel concurrently. Thus HYPERchannel-50 can approach

the nominal burst speed of the computer host interface when sending

large data blocks over an extended period.

Message Proper Header

The first 16 bytes of the network Message Proper are examined by the

network adapters to control delivery of the network message. The

message format is as follows:

byte Message Proper

+------------------------------------------------------------+

0 Trunks to Try Message Flags

TO trunks FROM trunks A/D

+--------------+---------------+-------------------------+---+

2 TO Domain # TO Network #

+------------------------------+-----------------------------+

4 TO Unit # Logical To

(port number)

+------------------------------+-----------------------------+

6 From Unit # Logical From

(port number)

+------------------------------+-----------------------------+

8 Message type

0x0B01

+------------------------------+-----------------------------+

10 FROM Domain # FROM Network #

+------------------------------+-----------------------------+

12 True Unit age count

+------------------------------+-----------------------------+

14 Header End Offset Next Header Offset

(16) (16)

+------------------------------+-----------------------------+

16 LLC1 destination SAP LLC1 source SAP

(0xFE for CLNP) (0xFE for CLNP)

+------------------------------+-----------------------------+

18 LLC1 function code

(0x03 for normal data) Start of upper layer protocol

+------------------------------+ +

20 from bytes 19-63 of the message proper

and continuing in the associated data

(For OSI this is CLNP, then transport etc.)

+------------------------------+-----------------------------+

Trunks to Try

Consists of two four bit masks indicating which of four possible

HYPERchannel-50 coaxial data trunks are to be used to transmit the

message and to return it. If a bit in the mask is ON, then the

adapter firmware will logically AND it with the mask of installed

trunk interfaces and use the result as a candidate list of

interfaces.

Whenever one of the internal "frames" are sent to communicate with

the destination adapter, the transmission hardware electronically

selects the first non-busy trunk out of the list of candidates. Thus

selection of a data trunk is best performed by the adapter itself

rather than by the host. Dedicating trunks to specific applications

only makes sense in very critical real time applications such as

streaming data directly from high speed overrunable peripherals.

A second Trunk mask is provided for the receiving adapter when it

sends frames back to the transmitter, as it is possible to build

asymmetric configurations of data trunks where trunk 1 on one box is

connected to the trunk 3 interface of a second. Such configurations

are strongly discouraged, but the addressing structure supports it if

needed.

The "trunks to try" field is only used by HYPERchannel-50. To assure

maximum interoperability, a value of 0xFF should be placed in this

field to assure delivery over any technology. The newer DX series

units determine the trunk mask on their own, but this field is

preserved for use with A series equipment.

Message Flags

Contains options in message delivery. There are several bits defined

by the hardware. However, only the A/D bit will be described here.

Other bits are used only for special diagnostic or management

purposes. If there is a need to set them, check the specific Network

Systems manuals on their meanings. In the absence of such need, all

bits other than A/D shall be set to zero on transmission, and not

examined upon receipt of a message.

ASSOCIATED DATA PRESENT (A/D) is ON if an Associated Data block

follows the Message Proper. 0 if only a message proper is present in

the network message. The value of this bit is enforced by the

network adapter firmware.

TO Domain Number

This is the most significant byte of the four byte hyperchannel

address. It selects an NSC addressing domain, among a set of

domains. If this and the network number both refer to the local

domain and network, they may be set to 0.

TO Network Number

This is the destination network number. It identifies the network

within the selected domain, where the destination unit resides. If

the destination is in the local domain and network, both the TO

domain and TO network numbers may be set to zero.

TO Unit

Upon arrival at the destination domain and network, this is the unit

number of the destination HYPERchannel adapter. The combination of

Domain, Network, and Unit uniquely identify a single adapter in a

HYPERchannel network. For compatibility with existing HYPERchannel

equipment, when sending a message to a destination outside the local

domain and network, set this byte to 0, and store the actual

destination unit number in the True Unit field.

Logical To

This field further identifies which process the message is intended

for. With some hardware, the bottom bits select a machine from among

several. When sending a message to an N400, the bottom two bits of

this field select which of four attached hosts the message is

destined for. Within a host, the logical to field selects a

destination process. This is used in conjunction with the Message

Type field to insure that messages are delivered to the correct

place. The Logical TO field identifies a process, which then checks

the Message Type to insure that it understands the message. This

also allows for running two processes, both of which understand the

same protocol.

From Unit

This identifies the Unit number from which this message was sent.

Logical From

This identifies the host and process who originated this message.

Message Type

The following two bytes are reserved for NSC. Users have been

encouraged to put a zero in byte 8 and anything at all in byte 9 so

as to not conflict with internal processing of messages by NSC

firmware. In the past, this field has been loosely defined as

carrying information of interest to NSC equipment carrying the

message and not as a formal protocol type field. For example, an

0xFF00 in bytes 8 and 9 of the message will cause the receiving

adapter to loop back the message without delivering it to the

attached host.

NSC now uses both bytes 8 and 9 as a formal "protocol type"

designator. Major protocols will be assigned a unique value in byte

8 that will (among good citizens) not duplicate a value generated by

a different protocol. Minor protocols will have 16 bit values

assigned to them so that we won't run out when 256 protocols turn up.

Any interested party could obtain a protocol number or numbers by

application to NSC. In this document, protocol types specific to OSI

LLC1 are assigned. Specifically, the sixteen bit value 0x0B01 in

bytes 8 and 9 shall identify LLC1 packets.

True Unit

This field is used to handle addressing outside of the local domain

and network. For compatibility with previous NSC hardware, one may

not put the destination unit number in the TO Unit field if the

destination domain or network are not the local ones. In that case,

one puts zero in the TO Unit field, and puts the destination Unit

number into the TRUE unit field. NSC Link devices will adjust the

message when it arrives at the destination domain and network so that

the destination unit number appears in the TO Unit field.

Age Count

This field serves as a "time to live" in that it prevents datagrams

from endlessly circulating about in an improperly configured network.

Each time a message with this format passes through a bridge, the Age

Count is decremented by one. When the result is zero, the message is

discarded by the bridge. Therefore, this byte should be set to 255

when a message is originated, and ignored when a message is received.

Next Header Offset and Header End Offset

These fields are used by the hardware to determine if any special

addressing is present. No special addressing forms are permitted in

conjunction with LLC1. Therefore, these fields shall always be set

to 16. Receivers may count on the LLC1 information beginning at

offset 16 in the message proper.

LLC1 Data

The LLC1 Information begins at byte 16 of the message, for 3 bytes.

The contains the LLC1 destination and source SAPs, followed by the

LLC1 type identifier (usually 03 for unnumbered information.)

Higher Layer Protocol Data

Higher layer protocol information follows immediately after the LLC1

header in the message proper, and flows into the associated data.

For purposes of this document, this is OSI CLNP, but it may be any

protocol which uses LLC1.

TO Addresses and Open Driver Architecture

Since not all 16 bits of the TO address are used for the physical

delivery of the network message, the remainder are considered

"logical" in that their meaning is physically determined by host

computer software or (in cases such as the FIPS data channel) by

hardware in the host interface.

Since HYPERchannel is and will be used to support a large variety of

general and special purpose protocols, it is desirable that several

independent protocol servers be able to independently share the

HYPERchannel network interface. The implementation of many of NSC's

device drivers as well as those of other parties (such as Cray

Research) support this service. Each protocol server that wishes to

send or receive HYPERchannel network messages logically connects to a

HYPERchannel device driver by specifying the complete 16 bit TO

address it will own in the sense that any network message with that

TO address will be delivered to that protocol server.

The logical TO field serves a function similar to the TYPE byte in

the Ethernet message header, but differs from it in that the width of

the logical TO field varies from host to host, and that no values of

the logical TO address are reserved for particular protocols. On the

other hand, it is possible to have several "identical" protocols

(such as two independent copies of OSI with different HYPERchannel

addresses) sharing the same physical HYPERchannel interface. This

makes NSC's addressing approach identical to the OSI concept that the

protocol server to reach is embedded within the address, rather than

the IP notion of addressing a "host" and identifying a server through

a message type.

Since the HYPERchannel header also has a "message type" field, there

is some ambiguity concerning the respective roles of the message type

and logical TO fields:

o The logical TO field is always used to identify the protocol server

which will receive the message. Once a server has specified the

complete TO address for the messages it wishes to receive, the

message will not be delivered to a different protocol server

regardless of the contents of the message type field.

o Although the type field cannot change the protocol server at the

final destination of the message, the type field can be used by

intermediate processes on the network to process the message

before it reaches the server destination. An obvious example

is the 0xFF00 message loopback type function, where network

processing to loop back the message results in nondelivery to

the TO address. In the future, intermediate nodes may process

in transit messages based on the message type only for purposes

such as security validation, aging of certain datagrams, and

network management.

Broadcasting

NSC message forwarding protocols use low level link protocols to

negotiate transmission of a message to its next destination on the

network. Furthermore, NSC network boxes often fan out so that

several hosts share the same network transmission equipment as in the

A400 adapter. Both these characteristics mean that providing a

genuine broadcast capability is not a trivial task, and in fact no

NSC technology supports a broadcast capability.

However, the OSI ES-IS and IS-IS protocols require a broadcast

capability to operate. Therefore, in order to support these

protocols, some form of broadcast emulation must be used.

ES-IS

The End System to Intermediate System routing protocol is used by end

systems to decide where to send packets. In the specified protocol,

multicast messages are used so that end systems learn about

intermediate systems, and intermediate systems learn about end

systems. End systems normally then transmit any packets, whose

correct mac destination is unknown, to a random intermediate system

which then forwards the packet and tells the originator where to send

future packets.

There are two situations which are distinct but related for support

of this protocol over HYPERchannel. These are distinguished by

whether or not there are any real intermediate systems on the

HYPERchannel network.

ES-IS with Intermediate Systems

If there are one or more intermediate systems on the HYPERchannel,

then the behavior is simply to emulate multicast.

END SYSTEM SUPPORT Each end system is profiled with a list of

intermediate systems on the HYPERchannel. It is desirable but not

necessary that this list be complete, as the future support for

IS-IS will forward the necessary information to all the

intermediate systems. Given the profiled list, whenever the end

system wishes to originate an ESH packet (End System Hello), it

will send individual copies to each intermediate system it knows

about.

On most systems, these individual packets should be spaced out in

time so as not to interfere with the normal transmission of OSI

and other HYPERchannel messages. For end systems, an inter-packet

time of 0.1 seconds is probably appropriate.

Note that if the End System receives ISH packets (Intermediate

System Hello) from an IS on HYPERchannel not in its static list,

it should add that to the list of systems it will send ESH packets

to. The address of the new intermediate system should be

remembered for the holding time in the ISH, just as with the

normal operation of ES-IS.

INTERMEDIATE SYSTEMS Intermediate systems on the HYPERchannel

shall also be profiled with the addresses of all the other

intermediate systems on the HYPERchannel. This list is used here

and in the IS-IS protocol. For the IS-IS protocol operation, it

is important that the list be complete.

The list of intermediate systems is used, with ES-IS, by an

intermediate system only in that it probably is also an end

system. As such, it must send ESH packets to all the other

intermediate systems. (The presumption that an IS is also an ES

is driven by the long term requirements for network management.

If you have an upper layer stack, such as is required for CMIP,

you are an end system.)

Each intermediate system will keep a list of the end systems it

knows about. These are the systems it has received ESH packets

from. Whenever the IS sends ISH packets, it sends them

individually to each ES it has heard from. In addition, it sends

the ISH to any end systems which it believes, on the basis of IS-

IS or other methods, are on the HYPERchannel.

Note that these packets must also be spread out in time to avoid

causing congestion. However, given that the number of these is

much higher than the number generated by End Systems, the time

between transmissions should be selected by the IS developer to

fit the sustainable I/O rates of the system. Make sure you can

get at the very least one, and preferably two or three, useful

packets in between each ISH copy being sent.

ES-IS without an Intermediate System

When there is no intermediate system, one or more systems must

serve as address managers. These are referred to in draft ISO OSI

documents as SNARE, for SubNetwork Address Resolution Entities.

END SYSTEM SUPPORT As in the previous case, each end system must

be profiled with a list of intermediate systems. This list must

contain all of the systems which will be serving as address

managers on this network. The reason for this is that, since the

address managers are not true intermediate systems, they are not

running IS-IS and will not be exchanging lists of end systems they

know about. There may well be several systems for redundancy and

reliability.

SNARE The systems selected as address managers must appear, to the

other end systems, as intermediate systems. This means that each

one must send out ISH packets to all the end systems which it

hears from. Each of these systems must record all the information

from the ESH packets they receive. When a packet for an End

System is received at a SNARE, it must behave as an IS.

Specifically, it must forward the packet to the correct

destination end system, and send a redirect message back to the

originator, informing the originator of the correct SNPA

(HYPERchannel address) for the end system.

Note that these systems are certainly end systems as well, and

must send ESH packets to all the intermediate systems on the IS

list, which must be complete.

ES-IS FORMAT SPECIFICATION

All ES-IS PDUS shall be formatted as specified in ISO 9542. They

are then sent using LLC1 and the encapsulation specified earlier

in this document for transmitting LLC1 over HYPERchannel.

RD PDUS When generating Redirect pdus, which contain HYPERchannel

SNPAs (addresses), the SNPA shall be represented in four bytes.

This shall be used even on a small HYPERchannel network containing

only one domain and one network number.

QC FUNCTION There is no support for the ES-IS query configuration

capability when using HYPERchannel. All systems must have at

least one configured intermediate system, which shall be either a

true IS or a SNARE.

IS-IS

The proposed IS-IS protocol for OSI (DP 10589) when run on a LAN

requires broadcast capability. Because of the nature of the process

for nominating the designated IS on a LAN, and other special features

of this protocol, it is important never to partition the set of

intermediate systems on a HYPERchannel network.

The implementation therefore is very simple. An intermediate system

on HYPERchannel runs the IS-IS protocol directly. However, when it

goes to send a message, it consults the profiled list of all level 1

ISs on the HYPERchannel or of all level 2 ISs on the HYPERchannel,

and then sends individual copies of the message to each destination.

This multiple transmission should be transparent to the IS-IS

protocol itself.

Note that as with ES-IS on an intermediate system, it is important to

space out the individual message transmissions. On most networks,

spacing of 0.1 seconds will work well.

References

+1+ ISO IS 9542 - End system to intermediate system routing

exchange protocol

+2+ ISO DP 10589 - Intermediate system to Intermediate system

Infra-Domain routing exchange protocol

Security Considerations

Security issues are not discussed in this memo.

Author's Address

Joel M. Halpern

Principal Engineer

Network Systems Corporation MS033

7600 Boone Avenue North

Brooklyn Park, AN 55428

Phone: (612) 424-1606

Email: jmh@anubis.network.com

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有