⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1220.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
RFC 1220            Bridging Point-to-Point Protocol          April 19916.3.  IEEE 802 Network Control Protocol   The Bridge Network Control Protocol is responsible for configuring,   enabling, and disabling the bridges on both ends of the point-to-   point link.  As with the Link Control Protocol, this is accomplished   through an exchange of packets.  BNCP packets may not be exchanged   until LCP has reached the network-layer Protocol Configuration   Negotiation phase.  Likewise, LAN traffic may not be exchanged until   BNCP has first opened the connection.   The Bridge Network Control Protocol is exactly the same as the Point-   to-Point Link Control Protocol with the following exceptions:   Data Link Layer Protocol Field        Exactly one Bridge Network Control Protocol packet is encapsulated        in the Information field of PPP Data Link Layer frames where the        Protocol field indicates type hex 8031 (BNCP).   Code field        Only Codes 1 through 7 (Configure-Request, Configure-Ack,        Configure-Nak, Configure-Reject, Terminate-Request,        Terminate-Ack and Code-Reject) are used.  Other Codes should        be treated as unrecognized and should result in Code-Rejects.   Timeouts        BNCP packets may not be exchanged until the Link Control        Protocol has reached the network-layer Protocol Configuration        Negotiation phase.  An implementation should be prepared to wait        for Link Quality testing to finish before timing out waiting        for Configure-Ack or other response.   Configuration Option Types        The Bridge Network Control Protocol has a separate set of        Configuration Options.  These permit the negotiation of the        following items:             - MAC Types supported             - Tinygram Compression support             - LAN Identification support             - Ring and Bridge Identification6.4.  IEEE 802.5 Remote Ring Identification Option   Since the Remote Bridges are modeled as normal Bridges with a strange   internal interface, each bridge needs to know the ring/bridge numbers   of the bridges it is adjacent to.  This is the subject of a Link   Negotiation.  The exchange of ring-and-bridge identifiers is done   using this option on the Network Control Protocol.Point-to-Point Protocol Extensions Working Group               [Page 13]RFC 1220            Bridging Point-to-Point Protocol          April 1991   The Token Ring Ring-and-Bridge Identifier, and its use, is specified   by the IEEE 802.5 Addendum on Source Routing.  It identifies the ring   that the interface is attached to by its configured ring number, and   itself by bridge number on the ring.   Figure 5: Remote Ring Identification Option    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     type=1    |length = 4     | ring number           |bridge#|   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Type 1 = IEEE 802.5 Source Routing Ring/Bridge Identifier   Length        4 Octets   Ring Number        A 12 bit number identifying the token ring, as defined in the        IEEE 802.5 Source Routing Specification.   Bridge Number        A 4 bit number identifying the bridge on the token ring, as        defined in the IEEE 802.5 Source Routing Specification.6.5.  IEEE 802.5 Line Identification Option   This option permits the systems to treat the line as a visible "Token   Ring", in accordance with the Source Routing algorithm.  The bridges   exchange ring-and-bridge identifiers using this option on the Network   Control Protocol.  The configured ring numbers must be identical in   normal operation.   The Token Ring Ring-and-Bridge Identifier, and its use, is specified   by the IEEE 802.5 Addendum on Source Routing.  It identifies the ring   that the interface is attached to by its configured ring number, and   itself by bridge number on the ring.   Figure 6: Line Identification Option    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     type=2    |length = 4     | ring number           |bridge#|   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+Point-to-Point Protocol Extensions Working Group               [Page 14]RFC 1220            Bridging Point-to-Point Protocol          April 1991   Type 2 = IEEE 802.5 Line "Ring/Bridge" Identifier   Length        4 Octets   Ring Number        A 12 bit number identifying the line, as defined in the        IEEE 802.5 Source Routing Specification.   Bridge Number        A 4 bit number identifying the bridge on the token ring, as        defined in the IEEE 802.5 Source Routing Specification.6.6.  MAC Type Support Selection   The MAC Type Selection Option is provided to permit nodes to   advertise what sort of traffic they are prepared to convey.  A device   negotiating a 1600 octet MRU, for example, may not be willing to   support 802.5 (although it might, with certain changes necessary in   the RIFs it passes, and given that the hosts it supports implement   the 802.5 Maximum Frame Size correctly), and is definitely not   prepared to support 802.4 or FDDI.   A system which does not announce the MAC Types that it supports may   be assumed to support all MAC Types; it will discard those that it   does not understand.  A system which chooses to announce MAC Types is   advising its neighbor that all unspecified MAC Types will be   discarded.  Announcement of multiple MAC Types is accomplished by   placing multiple options in the Configure Request.   The Rejection of a MAC Type Announcement (in a Configure-Reject) is   essentially a statement that traffic appropriate to the MAC Type, if   encountered, will be forwarded on the link even though the receiving   system has indicated it will discard it.   Figure 7: MAC Type Selection Option    0                   1                   2    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     type=3    |length = 3     | MAC Type      |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Type 3 = MAC Type Selector   Length        3 OctetsPoint-to-Point Protocol Extensions Working Group               [Page 15]RFC 1220            Bridging Point-to-Point Protocol          April 1991   MAC Type Selector        One of the values of the PDU's MAC Type Field that this system is        prepared to receive and service.6.7.  Tinygram Compression   Not all systems are prepared to make modifications to messages in   transit; on high speed lines, it is probably not worth the effort.   This option permits the system to negotiate compression.   Consistent with the behavior of other compression options in the   Internet Point-to-Point set of protocols, no negotiation implies no   compression.  The systems need not agree on the setting of this   parameter; one may be willing to decompress and the other not.  A   system which does not negotiate, or negotiates this option to be   disabled, should never receive a compressed packet, however.   Figure 8: Tinygram Compression Option    0                   1                   2    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     type=4    |length = 3     | Compression   |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Type 4 = Tinygram Compression Support Option   Length        3 Octets   Compression Enable/Disable        If the value is 1, Tinygram Compression is enabled.  If the        value is 2, Tinygram Compression is disabled, and no        decompression will occur.6.8.  LAN Identification Support   Not all systems are prepared to make use of the LAN Identification   field.  This option enables the systems to negotiate its use.   The parameter is advisory; if the value is "enabled", then there may   exist labeled LANs beyond the system, and the system is prepared to   service traffic to it.  if the value is "disabled", then there are no   labeled LANs beyond the system, and all such traffic will by   definition be dropped.  Therefore, a system which is advised that his   peer does not service LAN Identifications need not forward such   traffic on the link.Point-to-Point Protocol Extensions Working Group               [Page 16]RFC 1220            Bridging Point-to-Point Protocol          April 1991   The default value is that LAN Identification disabled.   Figure 9: LAN Identification Option    0                   1                   2    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     type=5    |length = 3     | Identification|   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Type 5 = LAN Identification Support Option   Length        3 Octets   Identification Enable/Disable        If the value is 1, LAN Identification is enabled.  If the value        is 2, LAN Identification is disabled.7.  Acknowledgements   This document is a product of the Point-to-Point Protocol Extensions   Working Group.  Special thanks go to Steve Senum of Network Systems,   Dino Farinacci of 3COM, and Rick Szmauz of Digital Equipment   Corporation.8.  Bibliography   [1] Perkins, D., "The Point-to-Point Protocol for the Transmission of       Multi-Protocol Datagrams Over Point-to-Point Links", RFC 1171,       CMU, July 1990.   [2] Hobby R., and D. Perkins, "The Point-to-Point Protocol (PPP)       Initial Configuration Options", RFC 1172, CMU, UC Davis, July       1990.   [3] IEEE Draft Standard P802.1d/D9 MAC Bridges, Institute of       Electrical and Electronic Engineers.  Also Published as ISO DIS       10038, July 1989.   [4] IEEE Draft Standard P802.5d/D13 Draft Addendum to ANSI/IEEE Std       802.5-1988 Token Ring MAC and PHY Specification Enhancement for       Multiple-Ring Networks, Institute of Electrical and Electronic       Engineers, May 1989.Point-to-Point Protocol Extensions Working Group               [Page 17]RFC 1220            Bridging Point-to-Point Protocol          April 19919.  Security Considerations   Security issues are not discussed in this memo.10.  Author's Address   Fred Baker   Advanced Computer Communications   720 Santa Barbara Street   Santa Barbara, CA 93101   Phone: (805) 963-9431   EMail: fbaker@ACC.COM   Or send comments to: ietf-ppp@ucdavis.eduPoint-to-Point Protocol Extensions Working Group               [Page 18]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -