⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1661-ppp.txt

📁 串口配置工具 ·作车牌识别的人一定要看
💻 TXT
📖 第 1 页 / 共 5 页
字号:
      Protocol field.      The maximum length for the Information field, including Padding,      but not including the Protocol field, is termed the Maximum      Receive Unit (MRU), which defaults to 1500 octets.  By      negotiation, consenting PPP implementations may use other values      for the MRU.   Padding      On transmission, the Information field MAY be padded with an      arbitrary number of octets up to the MRU.  It is the      responsibility of each protocol to distinguish padding octets from      real information.Simpson                                                         [Page 5]RFC 1661                Point-to-Point Protocol                July 19943.  PPP Link Operation3.1.  Overview   In order to establish communications over a point-to-point link, each   end of the PPP link MUST first send LCP packets to configure and test   the data link.  After the link has been established, the peer MAY be   authenticated.   Then, PPP MUST send NCP packets to choose and configure one or more   network-layer protocols.  Once each of the chosen network-layer   protocols has been configured, datagrams from each network-layer   protocol can be sent over the link.   The link will remain configured for communications until explicit LCP   or NCP packets close the link down, or until some external event   occurs (an inactivity timer expires or network administrator   intervention).3.2.  Phase Diagram   In the process of configuring, maintaining and terminating the   point-to-point link, the PPP link goes through several distinct   phases which are specified in the following simplified state diagram:   +------+        +-----------+           +--------------+   |      | UP     |           | OPENED    |              | SUCCESS/NONE   | Dead |------->| Establish |---------->| Authenticate |--+   |      |        |           |           |              |  |   +------+        +-----------+           +--------------+  |      ^               |                        |             |      |          FAIL |                   FAIL |             |      +<--------------+             +----------+             |      |                             |                        |      |            +-----------+    |           +---------+  |      |       DOWN |           |    |   CLOSING |         |  |      +------------| Terminate |<---+<----------| Network |<-+                   |           |                |         |                   +-----------+                +---------+   Not all transitions are specified in this diagram.  The following   semantics MUST be followed.Simpson                                                         [Page 6]RFC 1661                Point-to-Point Protocol                July 19943.3.  Link Dead (physical-layer not ready)   The link necessarily begins and ends with this phase.  When an   external event (such as carrier detection or network administrator   configuration) indicates that the physical-layer is ready to be used,   PPP will proceed to the Link Establishment phase.   During this phase, the LCP automaton (described later) will be in the   Initial or Starting states.  The transition to the Link Establishment   phase will signal an Up event to the LCP automaton.   Implementation Note:      Typically, a link will return to this phase automatically after      the disconnection of a modem.  In the case of a hard-wired link,      this phase may be extremely short -- merely long enough to detect      the presence of the device.3.4.  Link Establishment Phase   The Link Control Protocol (LCP) is used to establish the connection   through an exchange of Configure packets.  This exchange is complete,   and the LCP Opened state entered, once a Configure-Ack packet   (described later) has been both sent and received.   All Configuration Options are assumed to be at default values unless   altered by the configuration exchange.  See the chapter on LCP   Configuration Options for further discussion.   It is important to note that only Configuration Options which are   independent of particular network-layer protocols are configured by   LCP.  Configuration of individual network-layer protocols is handled   by separate Network Control Protocols (NCPs) during the Network-Layer   Protocol phase.   Any non-LCP packets received during this phase MUST be silently   discarded.   The receipt of the LCP Configure-Request causes a return to the Link   Establishment phase from the Network-Layer Protocol phase or   Authentication phase.Simpson                                                         [Page 7]RFC 1661                Point-to-Point Protocol                July 19943.5.  Authentication Phase   On some links it may be desirable to require a peer to authenticate   itself before allowing network-layer protocol packets to be   exchanged.   By default, authentication is not mandatory.  If an implementation   desires that the peer authenticate with some specific authentication   protocol, then it MUST request the use of that authentication   protocol during Link Establishment phase.   Authentication SHOULD take place as soon as possible after link   establishment.  However, link quality determination MAY occur   concurrently.  An implementation MUST NOT allow the exchange of link   quality determination packets to delay authentication indefinitely.   Advancement from the Authentication phase to the Network-Layer   Protocol phase MUST NOT occur until authentication has completed.  If   authentication fails, the authenticator SHOULD proceed instead to the   Link Termination phase.   Only Link Control Protocol, authentication protocol, and link quality   monitoring packets are allowed during this phase.  All other packets   received during this phase MUST be silently discarded.   Implementation Notes:      An implementation SHOULD NOT fail authentication simply due to      timeout or lack of response.  The authentication SHOULD allow some      method of retransmission, and proceed to the Link Termination      phase only after a number of authentication attempts has been      exceeded.      The implementation responsible for commencing Link Termination      phase is the implementation which has refused authentication to      its peer.3.6.  Network-Layer Protocol Phase   Once PPP has finished the previous phases, each network-layer   protocol (such as IP, IPX, or AppleTalk) MUST be separately   configured by the appropriate Network Control Protocol (NCP).   Each NCP MAY be Opened and Closed at any time.Simpson                                                         [Page 8]RFC 1661                Point-to-Point Protocol                July 1994   Implementation Note:      Because an implementation may initially use a significant amount      of time for link quality determination, implementations SHOULD      avoid fixed timeouts when waiting for their peers to configure a      NCP.   After a NCP has reached the Opened state, PPP will carry the   corresponding network-layer protocol packets.  Any supported   network-layer protocol packets received when the corresponding NCP is   not in the Opened state MUST be silently discarded.   Implementation Note:      While LCP is in the Opened state, any protocol packet which is      unsupported by the implementation MUST be returned in a Protocol-      Reject (described later).  Only protocols which are supported are      silently discarded.   During this phase, link traffic consists of any possible combination   of LCP, NCP, and network-layer protocol packets.3.7.  Link Termination Phase   PPP can terminate the link at any time.  This might happen because of   the loss of carrier, authentication failure, link quality failure,   the expiration of an idle-period timer, or the administrative closing   of the link.   LCP is used to close the link through an exchange of Terminate   packets.  When the link is closing, PPP informs the network-layer   protocols so that they may take appropriate action.   After the exchange of Terminate packets, the implementation SHOULD   signal the physical-layer to disconnect in order to enforce the   termination of the link, particularly in the case of an   authentication failure.  The sender of the Terminate-Request SHOULD   disconnect after receiving a Terminate-Ack, or after the Restart   counter expires.  The receiver of a Terminate-Request SHOULD wait for   the peer to disconnect, and MUST NOT disconnect until at least one   Restart time has passed after sending a Terminate-Ack.  PPP SHOULD   proceed to the Link Dead phase.   Any non-LCP packets received during this phase MUST be silently   discarded.Simpson                                                         [Page 9]RFC 1661                Point-to-Point Protocol                July 1994   Implementation Note:      The closing of the link by LCP is sufficient.  There is no need      for each NCP to send a flurry of Terminate packets.  Conversely,      the fact that one NCP has Closed is not sufficient reason to cause      the termination of the PPP link, even if that NCP was the only NCP      currently in the Opened state.Simpson                                                        [Page 10]RFC 1661                Point-to-Point Protocol                July 19944.  The Option Negotiation Automaton   The finite-state automaton is defined by events, actions and state   transitions.  Events include reception of external commands such as   Open and Close, expiration of the Restart timer, and reception of   packets from a peer.  Actions include the starting of the Restart   timer and transmission of packets to the peer.   Some types of packets -- Configure-Naks and Configure-Rejects, or   Code-Rejects and Protocol-Rejects, or Echo-Requests, Echo-Replies and   Discard-Requests -- are not differentiated in the automaton   descriptions.  As will be described later, these packets do indeed   serve different functions.  However, they always cause the same   transitions.   Events                                   Actions   Up   = lower layer is Up                 tlu = This-Layer-Up   Down = lower layer is Down               tld = This-Layer-Down   Open = administrative Open               tls = This-Layer-Started   Close= administrative Close              tlf = This-Layer-Finished   TO+  = Timeout with counter > 0          irc = Initialize-Restart-Count   TO-  = Timeout with counter expired      zrc = Zero-Restart-Count   RCR+ = Receive-Configure-Request (Good)  scr = Send-Configure-Request   RCR- = Receive-Configure-Request (Bad)   RCA  = Receive-Configure-Ack             sca = Send-Configure-Ack   RCN  = Receive-Configure-Nak/Rej         scn = Send-Configure-Nak/Rej   RTR  = Receive-Terminate-Request         str = Send-Terminate-Request   RTA  = Receive-Terminate-Ack             sta = Send-Terminate-Ack   RUC  = Receive-Unknown-Code              scj = Send-Code-Reject   RXJ+ = Receive-Code-Reject (permitted)       or Receive-Protocol-Reject   RXJ- = Receive-Code-Reject (catastrophic)       or Receive-Protocol-Reject   RXR  = Receive-Echo-Request              ser = Send-Echo-Reply       or Receive-Echo-Reply       or Receive-Discard-RequestSimpson                                                        [Page 11]RFC 1661                Point-to-Point Protocol                July 19944.1.  State Transition Table   The complete state transition table follows.  States are indicated   horizontally, and events are read vertically.  State transitions and   actions are represented in the form action/new-state.  Multiple   actions are separated by commas, and may continue on succeeding lines   as space requires; multiple actions may be implemented in any   convenient order.  The state may be followed by a letter, which   indicates an explanatory footnote.  The dash ('-') indicates an   illegal transition.      | State

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -