⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc171.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
Network Working Group                                      Abhay BhushanRequest for Comments: 171                                            MITNIC 6793                                                      Bob BradenCategories: D.4, D.5, and D.7                                       UCLAUpdates: 114                                               Will CrowtherObsolete: None                                             Alex McKenzie                                                                     BBN                                                            Eric Harslem                                                            John Heafner                                                                    Rand                                                             John Melvin                                                             Dick Watson                                                                     SRI                                                            Bob Sundberg                                                                 HARVARD                                                               Jim White                                                                    UCSB                                                            23 June 1971                       THE DATA TRANSFER PROTOCOLI. INTRODUCTION   A common protocol is desirable for data transfer in such diverse   applications as remote job entry, file transfer, network mail system,   graphics, remote program execution, and communication with block data   terminals (such as printers, card, paper tape, and magnetic tape   equipment, especially in context of terminal IMPs).  Although it   would be possible to include some or even all of the above   applications in an all-inclusive file transfer protocol, a separation   between data transfer and application functions would provide   flexibility in implementation, and reduce complexity.  Separating the   data transfer function would also reduce proliferation of programs   and protocols.   We have therefore defined a low-level data transfer protocol (DTP) to   be used for transfer of data in file transfer, remote job entry, and   other applications protocols.  This paper concerns itself solely with   the data transfer protocol.  A companion paper (RFC 172) describes   file transfer protocol.II. DISCUSSION   The data transfer protocol (DTP) serves three basic functions.  It   provides for convenient separation of NCP messages into "logical"   blocks (transactions, units, records, groups, and files), it allows   for the separation of data and control information, and it includes   some error control mechanisms.Bhushan, et al.                                                 [Page 1]RFC 171                THE DATA TRANSFER PROTOCOL              June 1971   Three modes of separating messages into transactions [1] are allowed   by DTP.  The first is an indefinite bit stream which terminates only   when the connection is closed (i.e., the bit stream represents a   single transaction for duration of connection).  This mode would be   useful in data transfer between hosts and terminal IMPs (TIPs).   The second mode utilizes a "transparent" block convention, similar to   the ASCII DLE (Data Link Escape).  In "transparent" mode,   transactions (which may be arbitrarily long) end whenever the   character sequence DLE ETX is encountered (DLE and ETX are 8-bit   character codes).  To prevent the possibility of a DLE ETX sequence   occurring within data stream, any occurrence of DLE is replaced by   DLE DLE on transmission.  The extra DLE is stripped on reception.  A   departure from the ASCII convention is that "transparent" block does   not begin with DLE STX, but with a transaction type byte.  This mode   will be useful in data transfer between terminal IMPs.   The third mode utilizes a count mechanism.  Each transaction begins   with a fixed-length descriptor field containing separate binary   counts of information bits and filler bits.  If a transaction has no   filler bits, its filler count is zero.  This mode will be useful in   most host-to-host data transfer applications.   DTP allows for the above modes to be intermixed over the same   connection (i.e., mode is not associated with connection, but only   with transaction).  The above transfer modes can represent transfer   of either data or control information.  The protocol allows for   separating data or control information at a lower level, by providing   different "type" codes (see SPECIFICATIONS) for data and control   transactions.  This provision may simplify some implementations.   The implementation of a workable [2] subset of the above modes is   specifically permitted by DTP.  To provide compatibility between   hosts using different subsets of transfer modes, an initial   "handshake" procedure is required by DTP.  The handshake involves   exchanging information on modes available for transmit and receive.   This will enable host programs to agree on transfer modes acceptable   for a connection.   The manner in which DTP is used would depend largely on the   applications protocol.  It is the applications protocol which defines   the workable subset of transfer modes.  For example, the file   transfer protocol will not work just with the indefinite bit stream   modes.  At least, for control information one of the other two modes   is required.  Again, the use of information separator and abort   functions provided in DTP (see SPECIFICATIONS) is defined by the   applications protocol.  For example, in a remote job entry protocol,   aborts may be used to stop the execution of a job while they may notBhushan, et al.                                                 [Page 2]RFC 171                THE DATA TRANSFER PROTOCOL              June 1971   cause any action in another applications protocol.   It should also be noted that DTP does not define a data transfer   service.  There is no standard server socket, or initial connection   protocol defined for DTP.  What DTP defines is a mechanism for data   transfer which can be used to provide services for block data   transfers, file transfers, remote job entry, network mail and   numerous other applications.   There are to be no restrictions on the manner in which DTP is   implemented at various sites.  For example, DTP may be imbedded in an   applications program such as for file transfer, or it may be a   separate service program or subroutine used by several applications   programs.  Another implementation may employ macros or UUO's (user   unimplemented operations on PDP-10's), to achieve the functions   specified in DTP.  It is also possible that in implementation, the   separation between the DTP and applications protocols be only at a   conceptual level.III. SPECIFICATIONS   1.  Byte Size for Network Connection       The standard byte size for network connections using DTP is 8-       bit.  However, other byte sizes specified by higher-level       applications protocols or applications programs are also allowed       by DTP.  For the purpose of this document bytes are assumed to be       8-bits, unless otherwise stated.2.  Transactions       At DTP level, all information transmitted over connection is a       sequence of transactions.  DTP defines the rules for delimiting       transactions. [3]2A. Types       The first byte of each transaction shall define a transaction       type, as shown below.  (Note that code assignments do not       conflict with assignments in TELNET protocol.)  The transaction       types may be referred by the hexadecimal code assigned to them.       The transactions types are discussed in more detail in section       2B.Bhushan, et al.                                                 [Page 3]RFC 171                THE DATA TRANSFER PROTOCOL              June 1971           Code                 Transaction Type      Hex       Octal      B0         260        Indefinite bit stream -- data.      B1         261        Transparent (DLE) block--data.      B2         262        Descriptor and counts--data.      B3         263        Modes available (handshake).      B4         264        Information separators (endcode).      B5         265        Error codes.      B6         266        Abort.      B7         267        No operation (NoOp).      B8         270        Indefinite bit stream--control.      B9         271        Transparent (DLE) block--control.      BA         272        Descriptor and counts--control.      BB         273        (unassigned but reserved for data transfer)      BC         274                  "         "         "      BD         275                  "         "         "      BE         276                  "         "         "      BF         277                  "         "         "   2B.  Syntax and Semantics   2B.1  Type B0 and B8 (indefinite bitstream modes) transactions         terminate only when the NCP connection is "closed".  There is         no other escape convention defined in DTP at this level.  It         should be noted, that closing connection in bitstream mode         represents an implicit file separator (see section 2B.5).   2B.2  Type B1 and B0 (transparent block modes) transactions terminate         when the byte sequence DLE ETX is encountered.  The sender         shall replace any occurrence of DLE in data stream by the         sequence DLE DLE.  The receiver shall strip the extra DLE.  The         transaction is assumed to by byte-oriented.  The code for DLE         is Hex '90' or Octal '220' (this is different from the ASCII         DLE which is Hex '10' or Octal '020).  ETX is Hex '03' or Octal         '03' (the same as ASCII ETX) [4].   2B.3  Type B2 and BA (descriptor and counts modes) transactions have         three fields, a 9-byte (72-bits) descriptor field [5] and         variable length (including zero) info and filler fields, as         shown below.  The total length of a transaction is         (72+info+filler) bits.Bhushan, et al.                                                 [Page 4]RFC 171                THE DATA TRANSFER PROTOCOL              June 1971|<B2 or BA><Info count><NUL><Seq #><NUL><filler count>|<info><filler> ||  3-bits    24-bits 8-bits 16-bits 8-bits  8-bits    |Variable length||<----- 72-bit descriptor field --------------------->|info and filler|         Info count is a binary count of number of bits in info field,         not including descriptor or filler bits.  Number of info bits         is limited to (2**24 - 1), as there are 24 bits in info count         field.         Sequence # is a sequential count in round-robin manner of B2         and BA type transaction.  The inclusion of sequence numbers         would help in debugging and error control, as sequence numbers         may be used to check for missing transactions, and aid in         locating errors.  Hosts not wishing to implement this mechanism         should have all 1's in the field.  The count shall start from         zero and continue sequentially to all 1's, after which it is         reset to all zeros.  The permitted sequence numbers are one         greater than the previous, and all 1's.         Filler count is a binary count of bits used as fillers (i.e.,         not information) after the end of meaningful data.  Number of         filler bits is limited to 255, as there are 8 bits in filler

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -