⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1661.html

📁 ppp协议英文文档.介绍ppp的和ldc等相关协议 好东西啊
💻 HTML
📖 第 1 页 / 共 5 页
字号:
   Receive-Terminate-Ack (RTA)      This event occurs when a Terminate-Ack packet is received from the      peer.  The Terminate-Ack packet is usually a response to a      Terminate-Request packet.  The Terminate-Ack packet may also      indicate that the peer is in Closed or Stopped states, and serves      to re-synchronize the link configuration.   Receive-Unknown-Code (RUC)      This event occurs when an un-interpretable packet is received from      the peer.  A Code-Reject packet is sent in response.   Receive-Code-Reject, Receive-Protocol-Reject (RXJ+,RXJ-)      This event occurs when a Code-Reject or a Protocol-Reject packet      is received from the peer.      The RXJ+ event arises when the rejected value is acceptable, such      as a Code-Reject of an extended code, or a Protocol-Reject of a      NCP.  These are within the scope of normal operation.  The      implementation MUST stop sending the offending packet type.      The RXJ- event arises when the rejected value is catastrophic,      such as a Code-Reject of Configure-Request, or a Protocol-Reject      of LCP!  This event communicates an unrecoverable error that      terminates the connection.   Receive-Echo-Request, Receive-Echo-Reply, Receive-Discard-Request   (RXR)      This event occurs when an Echo-Request, Echo-Reply or Discard-      Request packet is received from the peer.  The Echo-Reply packet      is a response to an Echo-Request packet.  There is no reply to an      Echo-Reply or Discard-Request packet.4.4.  Actions   Actions in the automaton are caused by events and typically indicate   the transmission of packets and/or the starting or stopping of the   Restart timer.   Illegal-Event (-)      This indicates an event that cannot occur in a properly      implemented automaton.  The implementation has an internal error,      which should be reported and logged.  No transition is taken, and      the implementation SHOULD NOT reset or freeze.   This-Layer-Up (tlu)      This action indicates to the upper layers that the automaton is      entering the Opened state.      Typically, this action is used by the LCP to signal the Up event      to a NCP, Authentication Protocol, or Link Quality Protocol, or      MAY be used by a NCP to indicate that the link is available for      its network layer traffic.   This-Layer-Down (tld)      This action indicates to the upper layers that the automaton is      leaving the Opened state.      Typically, this action is used by the LCP to signal the Down event      to a NCP, Authentication Protocol, or Link Quality Protocol, or      MAY be used by a NCP to indicate that the link is no longer      available for its network layer traffic.   This-Layer-Started (tls)      This action indicates to the lower layers that the automaton is      entering the Starting state, and the lower layer is needed for the      link.  The lower layer SHOULD respond with an Up event when the      lower layer is available.      This results of this action are highly implementation dependent.   This-Layer-Finished (tlf)      This action indicates to the lower layers that the automaton is      entering the Initial, Closed or Stopped states, and the lower      layer is no longer needed for the link.  The lower layer SHOULD      respond with a Down event when the lower layer has terminated.      Typically, this action MAY be used by the LCP to advance to the      Link Dead phase, or MAY be used by a NCP to indicate to the LCP      that the link may terminate when there are no other NCPs open.      This results of this action are highly implementation dependent.   Initialize-Restart-Count (irc)      This action sets the Restart counter to the appropriate value      (Max-Terminate or Max-Configure).  The counter is decremented for      each transmission, including the first.      Implementation Note:         In addition to setting the Restart counter, the implementation         MUST set the timeout period to the initial value when Restart         timer backoff is used.   Zero-Restart-Count (zrc)      This action sets the Restart counter to zero.      Implementation Note:         This action enables the FSA to pause before proceeding to the         desired final state, allowing traffic to be processed by the         peer.  In addition to zeroing the Restart counter, the         implementation MUST set the timeout period to an appropriate         value.   Send-Configure-Request (scr)      A Configure-Request packet is transmitted.  This indicates the      desire to open a connection with a specified set of Configuration      Options.  The Restart timer is started when the Configure-Request      packet is transmitted, to guard against packet loss.  The Restart      counter is decremented each time a Configure-Request is sent.   Send-Configure-Ack (sca)      A Configure-Ack packet is transmitted.  This acknowledges the      reception of a Configure-Request packet with an acceptable set of      Configuration Options.   Send-Configure-Nak (scn)      A Configure-Nak or Configure-Reject packet is transmitted, as      appropriate.  This negative response reports the reception of a      Configure-Request packet with an unacceptable set of Configuration      Options.      Configure-Nak packets are used to refuse a Configuration Option      value, and to suggest a new, acceptable value.  Configure-Reject      packets are used to refuse all negotiation about a Configuration      Option, typically because it is not recognized or implemented.      The use of Configure-Nak versus Configure-Reject is more fully      described in the chapter on LCP Packet Formats.   Send-Terminate-Request (str)      A Terminate-Request packet is transmitted.  This indicates the      desire to close a connection.  The Restart timer is started when      the Terminate-Request packet is transmitted, to guard against      packet loss.  The Restart counter is decremented each time a      Terminate-Request is sent.   Send-Terminate-Ack (sta)      A Terminate-Ack packet is transmitted.  This acknowledges the      reception of a Terminate-Request packet or otherwise serves to      synchronize the automatons.   Send-Code-Reject (scj)      A Code-Reject packet is transmitted.  This indicates the reception      of an unknown type of packet.   Send-Echo-Reply (ser)      An Echo-Reply packet is transmitted.  This acknowledges the      reception of an Echo-Request packet.4.5.  Loop Avoidance   The protocol makes a reasonable attempt at avoiding Configuration   Option negotiation loops.  However, the protocol does NOT guarantee   that loops will not happen.  As with any negotiation, it is possible   to configure two PPP implementations with conflicting policies that   will never converge.  It is also possible to configure policies which   do converge, but which take significant time to do so.  Implementors   should keep this in mind and SHOULD implement loop detection   mechanisms or higher level timeouts.4.6.  Counters and Timers   Restart Timer      There is one special timer used by the automaton.  The Restart      timer is used to time transmissions of Configure-Request and      Terminate-Request packets.  Expiration of the Restart timer causes      a Timeout event, and retransmission of the corresponding      Configure-Request or Terminate-Request packet.  The Restart timer      MUST be configurable, but SHOULD default to three (3) seconds.      Implementation Note:         The Restart timer SHOULD be based on the speed of the link.         The default value is designed for low speed (2,400 to 9,600         bps), high switching latency links (typical telephone lines).         Higher speed links, or links with low switching latency, SHOULD         have correspondingly faster retransmission times.         Instead of a constant value, the Restart timer MAY begin at an         initial small value and increase to the configured final value.         Each successive value less than the final value SHOULD be at         least twice the previous value.  The initial value SHOULD be         large enough to account for the size of the packets, twice the         round trip time for transmission at the link speed, and at         least an additional 100 milliseconds to allow the peer to         process the packets before responding.  Some circuits add         another 200 milliseconds of satellite delay.  Round trip times         for modems operating at 14,400 bps have been measured in the         range of 160 to more than 600 milliseconds.   Max-Terminate      There is one required restart counter for Terminate-Requests.      Max-Terminate indicates the number of Terminate-Request packets      sent without receiving a Terminate-Ack before assuming that the      peer is unable to respond.  Max-Terminate MUST be configurable,      but SHOULD default to two (2) transmissions.   Max-Configure      A similar counter is recommended for Configure-Requests.  Max-      Configure indicates the number of Configure-Request packets sent      without receiving a valid Configure-Ack, Configure-Nak or      Configure-Reject before assuming that the peer is unable to      respond.  Max-Configure MUST be configurable, but SHOULD default      to ten (10) transmissions.   Max-Failure      A related counter is recommended for Configure-Nak.  Max-Failure      indicates the number of Configure-Nak packets sent without sending      a Configure-Ack before assuming that configuration is not      converging.  Any further Configure-Nak packets for peer requested      options are converted to Configure-Reject packets, and locally      desired options are no longer appended.  Max-Failure MUST be      configurable, but SHOULD default to five (5) transmissions.5.  LCP Packet Formats   There are three classes of LCP packets:      1. Link Configuration packets used to establish and configure a         link (Configure-Request, Configure-Ack, Configure-Nak and         Configure-Reject).      2. Link Termination packets used to terminate a link (Terminate-         Request and Terminate-Ack).      3. Link Maintenance packets used to manage and debug a link         (Code-Reject, Protocol-Reject, Echo-Request, Echo-Reply, and         Discard-Request).   In the interest of simplicity, there is no version field in the LCP   packet.  A correctly functioning LCP implementation will always   respond to unknown Protocols and Codes with an easily recognizable   LCP packet, thus providing a deterministic fallback mechanism for   implementations of other versions.   Regardless of which Configuration Options are enabled, all LCP Link   Configuration, Link Termination, and Code-Reject packets (codes 1   through 7) are always sent as if no Configuration Options were   negotiated.  In particular, each Configuration Option specifies a   default value.  This ensures that such LCP packets are always   recognizable, even when one end of the link mistakenly believes the   link to be open.   Exactly one LCP packet is encapsulated in the PPP Information field,   where the PPP Protocol field indicates type hex c021 (Link Control   Protocol).   A summary of the Link Control Protocol packet format is shown below.   The fields are transmitted from left to right.    0                   1                   2                   3    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |     Code      |  Identifier   |            Length             |   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   |    Data ...   +-+-+-+-+   Code      The Code field is one octet, and identifies the kind of LCP      packet.  When a packet is received with an unknown Code field, a      Code-Reject packet is transmitted.      Up-to-date values of the LCP Code field are specified in the most      recent "Assigned Numbers" RFC [2].  This document concerns the      following values:         1       Configure-Request         2       Configure-Ack         3       Configure-Nak         4       Configure-Reject         5       Terminate-Request         6       Terminate-Ack         7       Code-Reject         8       Protocol-Reject         9       Echo-Request         10      Echo-Reply         11      Discard-Request   Identifier      The Identifier field is one octet, and aids in matching requests      and replies.  When a packet is received with an invalid Identifier      field, the packet is silently discarded without affecting the

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -