分享
 
 
 

RFC2470 - Transmission of IPv6 Packets over Token Ring Networks

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group M. Crawford

Request for Comments: 2470 Fermilab

Category: Standards Track T. Narten

IBM

S. Thomas

TransNexus

December 1998

Transmission of IPv6 Packets over Token Ring Networks

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1998). All Rights Reserved.

1. IntrodUCtion

This memo specifies the MTU and frame format for transmission of IPv6

packets on Token Ring networks. It also specifies the method of

forming IPv6 link-local addresses on Token Ring networks and the

content of the Source/Target Link-layer Address option used the

Router Solicitation, Router Advertisement, Redirect, Neighbor

Solicitation and Neighbor Advertisement messages when those messages

are transmitted on a Token Ring network.

Implementors should be careful to note that Token Ring adaptors

assume addresses are in non-canonical rather than canonical format,

requiring that special care be taken to insure that addresses are

processed correctly. See [CANON] for more details.

The key Words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",

"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this

document are to be interpreted as described in [KWORD].

2. Maximum Transmission Unit

IEEE 802.5 networks have a maximum frame size based on the maximum

time a node may hold the token. This time depends on many factors

including the data signaling rate and the number of nodes on the

ring. Because the maximum frame size varies, implementations must

rely on manual configuration or router advertisements [DISC] to

determine actual MTU sizes. Common default values include

approximately 2000, 4000, and 8000 octets.

In the absence of any other information, an implementation should use

a default MTU of 1500 octets. This size offers compatibility with all

common 802.5 defaults, as well as with Ethernet LANs in an

environment using transparent bridging.

In an environment using source route bridging, the process of

discovering the MAC-level path to a neighbor can yield the MTU for

the path to that neighbor. The information is contained in the

largest frame (LF) subfield of the routing information field. This

field limits the size of the information field of frames to that

destination, and that information field includes both the LLC [LLC]

header and the IPv6 datagram. Since, for IPv6, the LLC header is

always 8 octets in length, the IPv6 MTU can be found by suBTracting 8

from the maximum frame size defined by the LF subfield. If an

implementation uses this information to determine MTU sizes, it must

maintain separate MTU values for each neighbor.

A detailed list of the LF values and the resulting maximum frame size

can be found in [BRIDGE]. To illustrate the calculation of IPv6 MTU,

the following table lists several common values. Note that some of

the 802.1D LF values would result in an IP MTU less than 1280 bytes.

This size is less than the IPv6 minimum, and communication across

paths with those MTUs is generally not possible using IPv6.

LF (base) LF (extension) MAC MTU IP MTU

001 000 1470 1462

010 000 2052 2044

011 000 4399 4391

100 000 8130 8122

101 000 11407 11399

110 000 17749 17741

111 000 41600 41592

When presented with conflicting MTU values from several sources, an

implementation should choose from those sources according to the

following priorities:

1. Largest Frame values from source route bridging

(only for specific, unicast destinations), but only if not

greater than value from any router advertisements

2. Router advertisements, but only if not greater than any manual

configuration (including DHCP)

3. Manual configuration (including DHCP)

4. Default of 1500

3. Frame Format

IPv6 packets are transmitted in LLC/SNAP frames. The data field

contains the IPv6 header and payload. The following figure shows a

complete 802.5 frame containing an IPv6 datagram.

+-------+-------+-------+-------+

SD AC FC

+-----------------------+

Destination Address

+-----------------------+

Source

+-------+ Address +-------+

DSAP

+-------+-------+-------+-------+

SSAP CTL OUI

+-------+-------+-------+-------+

OUI EtherType

+-------+---------------+

~ IPv6 header and payload... ~

+-------------------------------+

FCS

+-------+-------+---------------+

ED FS

+-------+-------+

Token Ring Header Fields

SD: Starting Delimiter

AC: Access Control

FC: Frame Control

Destination Address: 48-bit IEEE address of destination

station

Source Address: 48-bit IEEE address of source station

DSAP: Destination Service Access Point (for LLC/SNAP

format, shall always contain the value 0xAA)

SSAP: Source Service Access Point (for LLC/SNAP format,

shall always contain the value 0xAA)

CTL: Control Field (for Unnumbered Information, shall

always contain the value 0x03)

OUI: Organizationally Unique Identifier (for EtherType

encoding, shall always contain the value 0x000000)

EtherType: Protocol type of encapsulated payload (for

IPv6, shall always contain the value 0x86DD)

FCS: Frame Check Sequence

ED: Ending Delimiter

FS: Frame Status

In the presence of source route bridges, a routing information field

(RIF) may appear immediately after the source address. A RIF is

present in frames when the most significant bit of the source address

is set to one. (This is the bit whose position corresponds to that of

the Individual/Group bit in the Destination Address.)

The RIF is a variable-length field that (when present) contains a

two-octet Routing Control (RC) header, followed by zero or more two-

octet Route Designator fields:

0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Routing Control: Bcast Length D LF rsvd

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Route Designator 1: Segment 1 Bridge1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

~ ... ~

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Route Designator N: Segment N BridgeN

(0 <= N <= 7) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Route Designator Fields:

Bcast: Broadcast Indicator, Defined values:

10x: All Routes EXPlorer

11x: Spanning Tree Explorer

0xx: Specifically Routed Frame

Length: Total length of RIF field in octets

D: Direction of source route. A value of 0 means that

the left-to-right sequence of Route Designators

provides the path from the sender to recipient. A

value of 0 indicates the sequence goes from

recipient to sender.

LF: Largest Frame

rsvd: Reserved

On transmission, the Route Designator fields give the sequence of

(bridge, LAN segment) numbers the packet is to traverse. It is the

responsibility of the sender to provide this sequence for

Specifically Routed Frames, i.e., unicast IP datagrams.

4. Stateless Autoconfiguration

The Interface Identifier [AARCH] for a Token Ring interface is based

on the EUI-64 identifier [EUI64] derived from the interface's built-

in 48-bit IEEE 802 address. The OUI of the Token Ring address (the

first three octets) becomes the company_id of the EUI-64 (the first

three octets). The fourth and fifth octets of the EUI are set to the

fixed value FFFE hexadecimal. The last three octets of the Token Ring

address become the last three octets of the EUI-64.

The Interface Identifier is then formed from the EUI-64 by

complementing the "Universal/Local" (U/L) bit, which is the next-to-

lowest order bit of the first octet of the EUI-64. Complementing

this bit will generally change a 0 value to a 1, since an interface's

built-in address is expected to be from a universally administered

address space and hence have a globally unique value. A universally

administered IEEE 802 address or an EUI-64 is signified by a 0 in the

U/L bit position, while a globally unique IPv6 Interface Identifier

is signified by a 1 in the corresponding position. For further

discussion on this point, see [AARCH].

For example, the Interface Identifier for a Token Ring interface

whose built-in address is, in hexadecimal and in canonical bit order,

34-56-78-9A-BC-DE

would be

36-56-78-FF-FE-9A-BC-DE.

A different MAC address set manually or by software should not be

used to derive the Interface Identifier. If such a MAC address must

be used, its global uniqueness property should be reflected in the

value of the U/L bit.

An IPv6 address prefix used for stateless autoconfiguration of a

Token Ring interface must have a length of 64 bits.

5. Link-Local Address

The IPv6 link-local address [AARCH] for a Token Ring interface is

formed by appending the Interface Identifer, as defined above, to the

prefix FE80::/64.

10 bits 54 bits 64 bits

+----------+-----------------------+----------------------------+

1111111010 (zeros) Interface Identifier

+----------+-----------------------+----------------------------+

6. Address Mapping -- Unicast

The procedure for mapping unicast IPv6 addresses into Token Ring

link-layer addresses is described in [DISC]. The Source/Target Link-

layer Address option has the following form when the link layer is

Token Ring.

0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Type Length

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+- Token Ring -+

+- Address -+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Option fields:

Type: 1 for Source Link-layer address.

2 for Target Link-layer address.

Length: 1 (in units of 8 octets).

Token Ring Address: The 48 bit Token Ring IEEE 802

address, in canonical bit order. This is the address the

interface currently responds to, and may be different from

the built-in address used to derive the Interface

Identifier.

When source routing bridges are used, the source route for

the path to a destination can be extracted from the RIF

field of received Neighbor Advertisement messages. Note that

the RIF field of received packets can be reversed into a

source route suitable for transmitting return traffic by

toggling the value of the 'D' bit and insuring that the

Bcast field is set to indicate a Specifically Routed Frame.

7. Address Mapping -- Multicast

All IPv6 packets with multicast destination addresses are transmitted

to Token Ring functional addresses. The following table shows the

specific mapping between the IPv6 addresses and Token Ring functional

addresses (in canonical form). Note that protocols other than IPv6

may use these same functional addresses, so all Token Ring frames

destined to these functional addresses are not guaranteed to be IPv6

datagrams.

MAC Addr (canonical) IPv6 Multicast Addresses

03-00-80-00-00-00 All-Nodes (FF01::1 and FF02::1) and

solicited node (FF02:0:0:0:0:1:FFXX:XXXX)

addresses

03-00-40-00-00-00 All-Routers addresses (FF0X::2)

03-00-00-80-00-00 any other multicast address with three

least significant bits = 000

03-00-00-40-00-00 any other multicast address with three

least significant bits = 001

03-00-00-20-00-00 any other multicast address with three

least significant bits = 010

03-00-00-10-00-00 any other multicast address with three

least significant bits = 011

03-00-00-08-00-00 any other multicast address with three

least significant bits = 100

03-00-00-04-00-00 any other multicast address with three

least significant bits = 101

03-00-00-02-00-00 any other multicast address with three

least significant bits = 110

03-00-00-01-00-00 any other multicast address with three

least significant bits = 111

In a bridged token ring network, all multicast packets SHOULD be sent

with a RIF header specifying the use of the Spanning Tree Explorer.

Note: it is believed that some (very) old bridge implementations do

not properly support the Spanning Tree Explorer mechanism. In such

environments, multicast traffic sent through bridges must use a RIF

with the All Routes Explorer. Consequently, an implementation MAY

wish to allow the sending of IP multicast traffic using an All Routes

Explorer. However, such an ability must be configurable by a system

administrator and the default setting of the switch MUST be to use

the Spanning Tree Explorer.

8. Security Considerations

Token Ring, like most broadcast LAN technologies, has inherent

security vulnerabilities. For example, any sender can claim the

identity of another and forge traffic. It is the responsibility of

higher layers to take appropriate steps in those environments where

such vulnerabilities are unacceptable.

9. Acknowledgments

Several members of the IEEE 802.5 Working Group contributed their

knowledge and experience to the drafting of this specification,

including Jim, Andrew Draper, George Lin, John Messenger, Kirk

Preiss, and Trevor Warwick. The author would also like to thank many

members of the IPng working group for their advice and suggestions,

including Ran Atkinson, Scott Bradner, Steve Deering, Francis Dupont,

Robert Elz, and Matt Thomas. A special thanks is due Steve Wise, who

gave the most relevant advice of all by actually trying to implement

this specification while it was in progress.

10. References

[802.5] 8802-5 : 1995 (ISO/IEC) [ANSI/IEEE 802.5, 1995

Edition] Information technology--Telecommunications and

information exchange between systems--Local and

metropolitan area networks--Specific requirements-- Part 5:

Token ring access method and physical layer specification.

[AARCH] Hinden, R. and S. Deering, "IP Version 6 Addressing

Architecture", RFC2373, July 1998.

[ACONF] Thomson, S. and T. Narten, "IPv6 Stateless Address

Autoconfiguration", RFC2462, December 1998.

[BRIDGE] 10038: 1993 (ISO/IEC) [ANSI/IEEE Std 802.1D, 1993 Edition]

Information technology--Telecommunications and information

exchange between systems--Local area networks--Media access

control (MAC) bridges.

[CANON] Narten, T. and C. Burton, "A Caution on Canonical Bit Order

Of Link-Layer Addresses", RFC2469, December 1998.

[CONF] Thomson, S. and T. Narten, "IPv6 Stateless Address

Autoconfiguration", RFC1971, August 1996.

[DISC] Narten, T., Nordmark, E. and W. Simpson, "Neighbor

Discovery for IP Version 6 (IPv6)", RFC2461, December

1998.

[EUI64] "64-Bit Global Identifier Format Tutorial", http:

//standards.ieee.org/db/oui/tutorials/EUI64.Html.

[IPV6] Deering, S. and R. Hinden, "Internet Protocol, Version 6

(IPv6) Specification", RFC2460, December 1998.

[KWORD] Bradner, S., "Key words for use in RFCs to Indicate

Requirement Levels," BCP 14, RFC2119, March 1997.

[LLC] 8802-2 : 1994 (ISO/IEC) [ANSI/IEEE 802.2, 1994 Edition]

Information technology--Telecommunications and information

exchange between systems--Local and Metropolitan area

networks--Specific requirements-- Part 2: Logical link

control.

11. Authors' Addresses

Matt Crawford

Fermilab MS 368

PO Box 500

Batavia, IL 60510 USA

Phone: +1 630 840 3461

EMail: crawdad@fnal.gov

Thomas Narten

IBM Corporation

P.O. Box 12195

Research Triangle Park, NC 27709-2195 USA

Phone: +1 919 254 7798

EMail: narten@raleigh.ibm.com

Stephen Thomas

TransNexus

430 Tenth Street NW Suite N204

Atlanta, GA 30318 USA

Phone: +1 404 872 4745

EMail: stephen.thomas@transnexus.com

Full Copyright Statement

Copyright (C) The Internet Society (1998). All Rights Reserved.

This document and translations of it may be copied and furnished to

others, and derivative works that comment on or otherwise explain it

or assist in its implementation may be prepared, copied, published

and distributed, in whole or in part, without restriction of any

kind, provided that the above copyright notice and this paragraph are

included on all such copies and derivative works. However, this

document itself may not be modified in any way, such as by removing

the copyright notice or references to the Internet Society or other

Internet organizations, except as needed for the purpose of

developing Internet standards in which case the procedures for

copyrights defined in the Internet Standards process must be

followed, or as required to translate it into languages other than

English.

The limited permissions granted above are perpetual and will not be

revoked by the Internet Society or its successors or assigns.

This document and the information contained herein is provided on an

"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING

TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING

BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION

HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有