⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc887.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 3 页
字号:
                 +--------+--------+--------+---\\---+                 -                                   +                 -           Resource-List           |                 -                                   |                 +--------+--------+--------+---\\---+where<Type>    is a single octet which identifies the message type.  The currently    defined types are:    0     <Who-Provides?>    1     <Do-You-Provide?>    2     <Who-Anywhere-Provides?>    3     <Does-Anyone-Provide?>    4     <I-Provide>    5     <They-Provide>    6-255 Reserved.Accetta                                                         [Page 6]RFC 887                                                    December 1983Resource Location Protocol<Flags>    is a single octet specifying possible modifications to the standard    interpretation of <Type>.  Bits in this field are numbered from left    to right (from most significant to least significant) beginning with    bit 1.  The currently defined flag bits are:    Bit 1    <Local-Only>.  Requires that any reply message generated in             response to a request message with this flag bit set may             only name IP addresses which are on the same IP network as             the sender of the request message.  This flag also requires             that multi-homed hosts answering broadcast <Who-Provides?>             requests use the appropriate local network IP source             address in the returned reply.  This bit must be zero in             reply messages.    Bits 2-8 Reserved.  Must be zero.<Message-ID>    is a two octet (16-bit) value which identifies the request message.    It is used simply to aid in matching requests with replies.  The    sending host should initialize this field to some convenient value    when constructing a request message.  The receiving host must return    this same value in the <Message-ID> field of any reply message    generated in response to that request.<Resource-List>    is the list of resources being queried or for which location    information is being supplied.  This list is a sequence of octets    beginning at the octet following the <Message-ID> and extending    through the end of the UDP packet.  The format of this field is    explained more fully in the following section.  The size of this    list is implicitly specified by the length of the encapsulating UDP    datagram.4.1. Resource ListsA <Resource-List> consists of zero or more resource specifiers.  Eachresource specifier is simply a sequence of octets.  All resourcespecifiers have a common resource name initial format                 +--------+--------+--------+---\\---+                 |        |        |                 |                 |Protocol|IDLength|   Resource-ID   |                 |        |        |                 |                 +--------+--------+--------+---\\---+whereAccetta                                                         [Page 7]RFC 887                                                    December 1983Resource Location Protocol<Protocol>    is the protocol number assigned to the lowest level Internet    protocol utilized for accessing the resource.<IDLength>    is the length of the resource identifier associated with this    <Protocol>.  This length may be a fixed or variable value depending    on the particular resource.  It is included so that specifiers which    refer to resources which a host may not provide can be skipped over    without needing to know the specific structure of the particular    resource identifier.  If the <Protocol> has no associated natural    identifier, this length is 0.<Resource-ID>    is the qualifying identifier used to further refine the resource    being queried.  If the <IDLength> field was 0, then this field is    empty and occupies no space in the resource specifier.In addition, resource specifiers in all <Who-Anywhere-Provides?>,<Does-Anyone-Provide?> and <They-Provide> messages also contain anadditional qualifier following the <Protocol-ID>.  This qualifier hasthe format             +--------+--------+--------+--------+---//---+             |        |                                   |             |IPLength|          IP-Address-List          |             |        |                                   |             +--------+--------+--------+--------+---//---+whereAccetta                                                         [Page 8]RFC 887                                                    December 1983Resource Location Protocol<IPLength>    is the number of IP addresses containing in the following    <IP-Address-List> (the <IP-Address-List> field thus occupies the    last 4*<IPLength> octets in its resource specifier).  In request    messages, this is the maximum number of qualifying addresses which    may be included in the corresponding reply resource specifier.    Although not particularly useful, it may be 0 and in that case    provides no space for qualifying the resource name with IP addresses    in the returned specifier.  In reply messages, this is the number of    qualifying addresses known to provide the resource.  It may not    exceed the number specified in the corresponding request specifier.    This field may not be 0 in a reply message unless it was supplied as    0 in the request message and the confirming host would have returned    one or more IP addresses had any space been provided.<IP-Address-List>    is a list of four-octet IP addresses used to qualify the resource    specifier with respect to those particular addresses.  In reply    messages, these are the IP addresses of the confirming host (when    appropriate) and the addresses of any other hosts known to provide    that resource (subject to the list length limitations).  In request    messages, these are the IP addresses of hosts for which resource    information may not be returned.  In such messages, these addresses    should normally be initialized to some "harmless" value (such as the    address of the querying host) unless it is intended to specifically    exclude the supplied addresses from consideration in any reply    messages.The receiving host determines if it provides any of the resources namedin the request list by successively decomposing each resource name.  Thefirst level of decomposition is the Internet protocol number which canpresumably be looked up in a table to determine if that protocol issupported on the host.  Subsequent decompositions are based on previouscomponents until one of three events occur:   1. the current component identifies some aspect of the previous      components which the host does not support,   2. the resource name from the request list is exhausted, or   3. the resource name from the request list is not exhausted but      the host does not expect any further components in the name      given the previous componentsIn case 1, the receiving host has determined that it does not providethe named resource.  The resource specifier may not be included in anyreply message returned.In case 2, the receiving host has determined that it does indeed providethe named resource (note: this may occur even if the receiving hostAccetta                                                         [Page 9]RFC 887                                                    December 1983Resource Location Protocolwould have expected the resource name to contain more components thanwere actually present).  The resource specifier must be included (moduloIP address prohibitions) in any reply message returned.In case 3, the receiving host has determined that it does not completelyprovide the named resource since name components remain which it doesnot understand (this might occur with specializations of or extensionsto a known protocol which are not universally recognized).  The resourcespecifier may not be included in any reply message returned.5. Sample UsageThe following scenarios illustrate some typical uses of RLP.  In allcases the indicated messages are encapsulated in a UDP datagram with theappropriate source and destination port numbers, message length, andchecksum.  This datagram is further encapsulated in an IP datagram withthe appropriate source address of the sending host and destinationaddress (either broadcast or individual) for the receiving host.All numeric protocol examples are as specified in the appropriateprotocol description documents listed in the references. 1. Suppose a freshly rebooted host H wishes to find some gateway    on its directly connected network to which it can send its    first external packet.  It then broadcasts the request        <Who-Provides?> <Flags>=<Local-Only> <Message-ID>=12345                    <Resource-List>={[GGP], [EGP]}    encoded as the 8 octet message           +-----+-----+-----+-----+-----+-----+-----+-----+           |  0  | 128 |   12345   |  3  |  0  |  8  |  0  |           +-----+-----+-----+-----+-----+-----+-----+-----+    on its local network.     - Gateway G1 (which understands EGP) receives the request and       returns the reply               <I-Provide> <Flags>=none <Message-ID>=12345                         <Resource-List>={[EGP]}       encoded as the 6 octet message                  +-----+-----+-----+-----+-----+-----+                  |  4  |  0  |   12345   |  8  |  0  |                  +-----+-----+-----+-----+-----+-----+       to host H which then remembers that gateway G1 may be usedAccetta                                                        [Page 10]RFC 887                                                    December 1983Resource Location Protocol       to route traffic to the rest of the Internet.     -  At the same time, gateway G2 (which understands both GGP       and EGP) might also receive the request and return the reply               <I-Provide> <Flags>=none <Message-ID>=12345                      <Resource-List>={[GGP], [EGP]}       encoded as the 8 octet message            +-----+-----+-----+-----+-----+-----+-----+-----+            |  4  |  0  |   12345   |  3  |  0  |  8  |  0  |            +-----+-----+-----+-----+-----+-----+-----+-----+       to host H which might then also add gateway G2 to its list       if it chooses. 2. Assume instead that host H is a stand-alone system which has    just encountered some fatal software error and wishes to locate    a crash dump server to save its state before reloading.    Suppose that the crash dump protocol on the host's local    network is implemented using the Trivial File Transfer Protocol    (TFTP) [8].  Furthermore, suppose that the special file name    "CRASH-DUMP" is used to indicate crash dump processing (e.g.    the server might locally generate a unique file name to hold    each dump that it receives from a host).  Then host H might    broadcast the request            <Who-Provides?> <Flags>=none <Message-ID>=54321           <Resource-List>={[UDP, TFTP, WRQ, "CRASH-DUMP"]}    encoded as the 21 octet message           +-----+-----+-----+-----+-----+-----+-----+-----+           |  0  |  0  |   54321   |  17 |  15 |     69    |           +-----+-----+-----+-----+-----+-----+-----+-----+

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -