⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2470.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 2 页
字号:
   Token Ring.               0                   1               0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5              +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+              |     Type      |    Length     |              +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+              |                               |              +-         Token Ring          -+              |                               |              +-           Address           -+              |                               |              +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+      Option fields:         Type:     1 for Source Link-layer address.                   2 for Target Link-layer address.         Length:  1 (in units of 8 octets).Crawford, et. al.           Standards Track                     [Page 6]RFC 2470                  IPv6 over Token Ring             December 1998         Token Ring Address: The 48 bit Token Ring IEEE 802            address, in canonical bit order. This is the address the            interface currently responds to, and may be different from            the built-in address used to derive the Interface            Identifier.            When source routing bridges are used, the source route for            the path to a destination can be extracted from the RIF            field of received Neighbor Advertisement messages. Note that            the RIF field of received packets can be reversed into a            source route suitable for transmitting return traffic by            toggling the value of the 'D' bit and insuring that the            Bcast field is set to indicate a Specifically Routed Frame.7.  Address Mapping -- Multicast   All IPv6 packets with multicast destination addresses are transmitted   to Token Ring functional addresses. The following table shows the   specific mapping between the IPv6 addresses and Token Ring functional   addresses (in canonical form). Note that protocols other than IPv6   may use these same functional addresses, so all Token Ring frames   destined to these functional addresses are not guaranteed to be IPv6   datagrams.   MAC Addr (canonical)       IPv6 Multicast Addresses   03-00-80-00-00-00  All-Nodes (FF01::1 and FF02::1) and                      solicited node (FF02:0:0:0:0:1:FFXX:XXXX)                      addresses   03-00-40-00-00-00  All-Routers addresses (FF0X::2)   03-00-00-80-00-00  any other multicast address with three                      least significant bits = 000   03-00-00-40-00-00  any other multicast address with three                      least significant bits = 001   03-00-00-20-00-00  any other multicast address with three                      least significant bits = 010   03-00-00-10-00-00  any other multicast address with three                      least significant bits = 011   03-00-00-08-00-00  any other multicast address with three                       least significant bits = 100Crawford, et. al.           Standards Track                     [Page 7]RFC 2470                  IPv6 over Token Ring             December 1998   03-00-00-04-00-00  any other multicast address with three                       least significant bits = 101   03-00-00-02-00-00  any other multicast address with three                       least significant bits = 110   03-00-00-01-00-00  any other multicast address with three                       least significant bits = 111   In a bridged token ring network, all multicast packets SHOULD be sent   with a RIF header specifying the use of the Spanning Tree Explorer.   Note: it is believed that some (very) old bridge implementations do   not properly support the Spanning Tree Explorer mechanism.  In such   environments, multicast traffic sent through bridges must use a RIF   with the All Routes Explorer. Consequently, an implementation MAY   wish to allow the sending of IP multicast traffic using an All Routes   Explorer. However, such an ability must be configurable by a system   administrator and the default setting of the switch MUST be to use   the Spanning Tree Explorer.8.  Security Considerations   Token Ring, like most broadcast LAN technologies, has inherent   security vulnerabilities. For example, any sender can claim the   identity of another and forge traffic. It is the responsibility of   higher layers to take appropriate steps in those environments where   such vulnerabilities are unacceptable.9.  Acknowledgments   Several members of the IEEE 802.5 Working Group contributed their   knowledge and experience to the drafting of this specification,   including Jim, Andrew Draper, George Lin, John Messenger, Kirk   Preiss, and Trevor Warwick. The author would also like to thank many   members of the IPng working group for their advice and suggestions,   including Ran Atkinson, Scott Bradner, Steve Deering, Francis Dupont,   Robert Elz, and Matt Thomas. A special thanks is due Steve Wise, who   gave the most relevant advice of all by actually trying to implement   this specification while it was in progress.Crawford, et. al.           Standards Track                     [Page 8]RFC 2470                  IPv6 over Token Ring             December 199810.  References   [802.5]   8802-5 : 1995 (ISO/IEC) [ANSI/IEEE 802.5, 1995             Edition] Information technology--Telecommunications and             information exchange between systems--Local and             metropolitan area networks--Specific requirements-- Part 5:             Token ring access method and physical layer specification.   [AARCH]   Hinden, R. and S. Deering, "IP Version 6 Addressing             Architecture", RFC 2373, July 1998.   [ACONF]   Thomson, S. and T. Narten, "IPv6 Stateless Address             Autoconfiguration", RFC 2462, December 1998.   [BRIDGE]  10038: 1993 (ISO/IEC) [ANSI/IEEE Std 802.1D, 1993 Edition]             Information technology--Telecommunications and information             exchange between systems--Local area networks--Media access             control (MAC) bridges.   [CANON]   Narten, T. and C. Burton, "A Caution on Canonical Bit Order             Of Link-Layer Addresses", RFC 2469, December 1998.   [CONF]    Thomson, S. and T. Narten, "IPv6 Stateless Address             Autoconfiguration", RFC 1971, August 1996.   [DISC]    Narten, T., Nordmark, E. and W. Simpson, "Neighbor             Discovery for IP Version 6 (IPv6)", RFC 2461, December             1998.   [EUI64]  "64-Bit Global Identifier Format Tutorial", http:             //standards.ieee.org/db/oui/tutorials/EUI64.html.   [IPV6]    Deering, S. and R. Hinden, "Internet Protocol, Version 6             (IPv6) Specification", RFC 2460, December 1998.   [KWORD]   Bradner, S., "Key words for use in RFCs to Indicate             Requirement Levels," BCP 14, RFC 2119, March 1997.   [LLC]     8802-2 : 1994 (ISO/IEC) [ANSI/IEEE 802.2, 1994 Edition]             Information technology--Telecommunications and information             exchange between systems--Local and Metropolitan area             networks--Specific requirements-- Part 2: Logical link             control.Crawford, et. al.           Standards Track                     [Page 9]RFC 2470                  IPv6 over Token Ring             December 199811.  Authors' Addresses   Matt Crawford   Fermilab MS 368   PO Box 500   Batavia, IL 60510 USA   Phone: +1 630 840 3461   EMail: crawdad@fnal.gov   Thomas Narten   IBM Corporation   P.O. Box 12195   Research Triangle Park, NC 27709-2195 USA   Phone: +1 919 254 7798   EMail: narten@raleigh.ibm.com   Stephen Thomas   TransNexus   430 Tenth Street NW Suite N204   Atlanta, GA 30318 USA   Phone: +1 404 872 4745   EMail: stephen.thomas@transnexus.comCrawford, et. al.           Standards Track                    [Page 10]RFC 2470                  IPv6 over Token Ring             December 1998Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Crawford, et. al.           Standards Track                    [Page 11]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -