📄 rfc1190.txt
字号:
Network Working Group CIP Working GroupRequest for Comments: 1190 C. Topolcic, EditorObsoletes: IEN-119 October 1990 Experimental Internet Stream Protocol, Version 2 (ST-II)Status of this Memo This memo defines a revised version of the Internet Stream Protocol, originally defined in IEN-119 [8], based on results from experiments with the original version, and subsequent requests, discussion, and suggestions for improvements. This is a Limited-Use Experimental Protocol. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited.1. Abstract This memo defines the Internet Stream Protocol, Version 2 (ST-II), an IP-layer protocol that provides end-to-end guaranteed service across an internet. This specification obsoletes IEN 119 "ST - A Proposed Internet Stream Protocol" written by Jim Forgie in 1979, the previous specification of ST. ST-II is not compatible with Version 1 of the protocol, but maintains much of the architecture and philosophy of that version. It is intended to fill in some of the areas left unaddressed, to make it easier to implement, and to support a wider range of applications.CIP Working Group [Page 1]RFC 1190 Internet Stream Protocol October 1990 1.1. Table of Contents Status of this Memo . . . . . . . . . . . . 1 1. Abstract . . . . . . . . . . . . . . . 1 1.1. Table of Contents . . . . . . . . . . . 2 1.2. List of Figures . . . . . . . . . . . . 4 2. Introduction . . . . . . . . . . . . . . 7 2.1. Major Differences Between ST and ST-II . . . . 8 2.2. Concepts and Terminology . . . . . . . . . 9 2.3. Relationship Between Applications and ST . . . . 11 2.4. ST Control Message Protocol . . . . . . . . 12 2.5. Flow Specifications . . . . . . . . . . . 14 3. ST Control Message Protocol Functional Description . 17 3.1. Stream Setup . . . . . . . . . . . . . 18 3.1.1. Initial Setup at the Origin . . . . . . . 18 3.1.2. Invoking the Routing Function . . . . . . 19 3.1.3. Reserving Resources . . . . . . . . . . 19 3.1.4. Sending CONNECT Messages . . . . . . . . 20 3.1.5. CONNECT Processing by an Intermediate Agent . . 22 3.1.6. Setup at the Targets . . . . . . . . . 23 3.1.7. ACCEPT Processing by an Intermediate Agent . . 24 3.1.8. ACCEPT Processing by the Origin . . . . . . 26 3.1.9. Processing a REFUSE Message . . . . . . . 27 3.2. Data Transfer . . . . . . . . . . . . . 30 3.3. Modifying an Existing Stream . . . . . . . . 31 3.3.1. Adding a Target . . . . . . . . . . . 31 3.3.2. The Origin Removing a Target . . . . . . . 33 3.3.3. A Target Deleting Itself . . . . . . . . 35 3.3.4. Changing the FlowSpec . . . . . . . . . 36 3.4. Stream Tear Down . . . . . . . . . . . . 36 3.5. Exceptional Cases . . . . . . . . . . . 37 3.5.1. Setup Failure due to CONNECT Timeout . . . . 37 3.5.2. Problems due to Routing Inconsistency . . . . 38 3.5.3. Setup Failure due to a Routing Failure . . . 39 3.5.4. Problems in Reserving Resources . . . . . . 41 3.5.5. Setup Failure due to ACCEPT Timeout . . . . 41 3.5.6. Problems Caused by CHANGE Messages . . . . . 42 3.5.7. Notification of Changes Forced by Failures . . 42 3.6. Options . . . . . . . . . . . . . . . 44 3.6.1. HID Field Option . . . . . . . . . . . 44 3.6.2. PTP Option . . . . . . . . . . . . . 44 3.6.3. FDx Option . . . . . . . . . . . . . 45 3.6.4. NoRecovery Option . . . . . . . . . . 46 3.6.5. RevChrg Option . . . . . . . . . . . 46 3.6.6. Source Route Option . . . . . . . . . . 46 3.7. Ancillary Functions . . . . . . . . . . . 48 3.7.1. Failure Detection . . . . . . . . . . 48 3.7.1.1. Network Failures . . . . . . . . . . 48 3.7.1.2. Detecting ST Stream Failures . . . . . . 49 3.7.1.3. Subset . . . . . . . . . . . . . 51CIP Working Group [Page 2]RFC 1190 Internet Stream Protocol October 1990 3.7.2. Failure Recovery . . . . . . . . . . . 51 3.7.2.1. Subset . . . . . . . . . . . . . 55 3.7.3. A Group of Streams . . . . . . . . . . 56 3.7.3.1. Group Name Generator . . . . . . . . 57 3.7.3.2. Subset . . . . . . . . . . . . . 57 3.7.4. HID Negotiation . . . . . . . . . . . 58 3.7.4.1. Subset . . . . . . . . . . . . . 64 3.7.5. IP Encapsulation of ST . . . . . . . . . 64 3.7.5.1. IP Multicasting . . . . . . . . . . 65 3.7.6. Retransmission . . . . . . . . . . . 66 3.7.7. Routing . . . . . . . . . . . . . . 67 3.7.8. Security . . . . . . . . . . . . . 67 3.8. ST Service Interfaces . . . . . . . . . . 68 3.8.1. Access to Routing Information . . . . . . 69 3.8.2. Access to Network Layer Resource Reservation . 70 3.8.3. Network Layer Services Utilized . . . . . . 71 3.8.4. IP Services Utilized . . . . . . . . . 71 3.8.5. ST Layer Services Provided . . . . . . . 72 4. ST Protocol Data Unit Descriptions . . . . . . . 75 4.1. Data Packets . . . . . . . . . . . . . 76 4.2. ST Control Message Protocol Descriptions . . . . 77 4.2.1. ST Control Messages . . . . . . . . . . 79 4.2.2. Common SCMP Elements . . . . . . . . . 80 4.2.2.1. DetectorIPAddress . . . . . . . . . 80 4.2.2.2. ErroredPDU . . . . . . . . . . . . 80 4.2.2.3. FlowSpec & RFlowSpec . . . . . . . . 81 4.2.2.4. FreeHIDs . . . . . . . . . . . . 84 4.2.2.5. Group & RGroup . . . . . . . . . . 85 4.2.2.6. HID & RHID . . . . . . . . . . . . 86 4.2.2.7. MulticastAddress . . . . . . . . . . 86 4.2.2.8. Name & RName . . . . . . . . . . . 87 4.2.2.9. NextHopIPAddress . . . . . . . . . . 88 4.2.2.10. Origin . . . . . . . . . . . . . 88 4.2.2.11. OriginTimestamp . . . . . . . . . . 89 4.2.2.12. ReasonCode . . . . . . . . . . . . 89 4.2.2.13. RecordRoute . . . . . . . . . . . 94 4.2.2.14. SrcRoute . . . . . . . . . . . . 95 4.2.2.15. Target and TargetList . . . . . . . . 96 4.2.2.16. UserData . . . . . . . . . . . . 98 4.2.3. ST Control Message PDUs . . . . . . . . 99 4.2.3.1. ACCEPT . . . . . . . . . . . . . 100 4.2.3.2. ACK . . . . . . . . . . . . . . 102 4.2.3.3. CHANGE-REQUEST . . . . . . . . . . 103 4.2.3.4. CHANGE . . . . . . . . . . . . . 104 4.2.3.5. CONNECT . . . . . . . . . . . . . 105 4.2.3.6. DISCONNECT . . . . . . . . . . . . 110 4.2.3.7. ERROR-IN-REQUEST . . . . . . . . . . 111 4.2.3.8. ERROR-IN-RESPONSE . . . . . . . . . 112 4.2.3.9. HELLO . . . . . . . . . . . . . 113 4.2.3.10. HID-APPROVE . . . . . . . . . . . 114 4.2.3.11. HID-CHANGE-REQUEST . . . . . . . . . 115CIP Working Group [Page 3]RFC 1190 Internet Stream Protocol October 1990 4.2.3.12. HID-CHANGE . . . . . . . . . . . . 116 4.2.3.13. HID-REJECT . . . . . . . . . . . . 118 4.2.3.14. NOTIFY . . . . . . . . . . . . . 120 4.2.3.15. REFUSE . . . . . . . . . . . . . 122 4.2.3.16. STATUS . . . . . . . . . . . . . 124 4.2.3.17. STATUS-RESPONSE . . . . . . . . . . 126 4.3. Suggested Protocol Constants . . . . . . . . 127 5. Areas Not Addressed . . . . . . . . . . . . 131 6. Glossary . . . . . . . . . . . . . . . 135 7. References . . . . . . . . . . . . . . . 143 8. Security Considerations. . . . . . . . . . . 144 9. Authors' Addresses . . . . . . . . . . . . 145 Appendix 1. Data Notations . . . . . . . . . . 147 1.2. List of Figures Figure 1. Protocol Relationships . . . . . . . . . 6 Figure 2. Topology Used in Protocol Exchange Diagrams . . 16 Figure 3. Virtual Link Identifiers for SCMP Messages . . 16 Figure 4. HIDs Assigned for ST User Packets . . . . . 18 Figure 5. Origin Sending CONNECT Message . . . . . . 21 Figure 6. CONNECT Processing by an Intermediate Agent . . 22 Figure 7. CONNECT Processing by the Target . . . . . . 24 Figure 8. ACCEPT Processing by an Intermediate Agent . . 25 Figure 9. ACCEPT Processing by the Origin . . . . . . 26 Figure 10. Sending REFUSE Message . . . . . . . . . 28 Figure 11. Routing Around a Failure . . . . . . . . 29 Figure 12. Addition of Another Target . . . . . . . . 32 Figure 13. Origin Removing a Target . . . . . . . . 34 Figure 14. Target Deleting Itself . . . . . . . . . 35 Figure 15. CONNECT Retransmission after a Timeout . . . . 38 Figure 16. Processing NOTIFY Messages . . . . . . . . 43 Figure 17. Source Routing Option . . . . . . . . . 47 Figure 18. Typical HID Negotiation (No Multicasting) . . . 60 Figure 19. Multicast HID Negotiation . . . . . . . . 61 Figure 20. Multicast HID Re-Negotiation . . . . 62 Figure 21. ST Header . . . . . . . . . . . . . 75 Figure 22. ST Control Message Format . . . . . . . . 77 Figure 23. ErroredPDU . . . . . . . . . . . . . 80 Figure 24. FlowSpec & RFlowSpec . . . . . . . . . . 81 Figure 25. FreeHIDs . . . . . . . . . . . . . . 85 Figure 26. Group & RGroup . . . . . . . . . . . . 85 Figure 27. HID & RHID . . . . . . . . . . . . . 86 Figure 28. MulticastAddress . . . . . . . . . . . 86 Figure 29. Name & RName . . . . . . . . . . . . 87 Figure 30. NextHopIPAddress . . . . . . . . . . . 88CIP Working Group [Page 4]RFC 1190 Internet Stream Protocol October 1990 Figure 31. Origin . . . . . . . . . . . . . . 88 Figure 32. OriginTimestamp . . . . . . . . . . . 89 Figure 33. ReasonCode . . . . . . . . . . . . . 89 Figure 34. RecordRoute . . . . . . . . . . . . . 94 Figure 35. SrcRoute . . . . . . . . . . . . . . 95 Figure 36. Target . . . . . . . . . . . . . . 97 Figure 37. TargetList . . . . . . . . . . . . . 97 Figure 38. UserData . . . . . . . . . . . . . . 98 Figure 39. ACCEPT Control Message . . . . . . . . . 101 Figure 40. ACK Control Message . . . . . . . . . . 102 Figure 41. CHANGE-REQUEST Control Message . . . . . . 103 Figure 42. CHANGE Control Message . . . . . . . . . 105 Figure 43. CONNECT Control Message . . . . . . . . . 109 Figure 44. DISCONNECT Control Message . . . . . . . . 110 Figure 45. ERROR-IN-REQUEST Control Message . . . . . . 111 Figure 46. ERROR-IN-RESPONSE Control Message . . . . . 112 Figure 47. HELLO Control Message . . . . . . . . . 113 Figure 48. HID-APPROVE Control Message . . . . . . . 114 Figure 49. HID-CHANGE-REQUEST Control Message . . . . . 115 Figure 50. HID-CHANGE Control Message . . . . . . . . 117 Figure 51. HID-REJECT Control Message . . . . . . . . 119 Figure 52. NOTIFY Control Message . . . . . . . . . 121 Figure 53. REFUSE Control Message . . . . . . . . . 123 Figure 54. STATUS Control Message . . . . . . . . . 125 Figure 55. STATUS-RESPONSE Control Message . . . . . . 126 Figure 56. Transmission Order of Bytes . . . . . . . 147 Figure 57. Significance of Bits . . . . . . . . . . 147
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -