⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2460.txt

📁 IPv6协议中flow_label的相关RFC
💻 TXT
📖 第 1 页 / 共 5 页
字号:
                        transmission; ignored on reception.   M flag               1 = more fragments; 0 = last fragment.   Identification       32 bits.  See description below.   In order to send a packet that is too large to fit in the MTU of the   path to its destination, a source node may divide the packet into   fragments and send each fragment as a separate packet, to be   reassembled at the receiver.   For every packet that is to be fragmented, the source node generates   an Identification value. The Identification must be different than   that of any other fragmented packet sent recently* with the same   Source Address and Destination Address.  If a Routing header is   present, the Destination Address of concern is that of the final   destination.Deering & Hinden            Standards Track                    [Page 18]RFC 2460                   IPv6 Specification              December 1998      * "recently" means within the maximum likely lifetime of a packet,        including transit time from source to destination and time spent        awaiting reassembly with other fragments of the same packet.        However, it is not required that a source node know the maximum        packet lifetime.  Rather, it is assumed that the requirement can        be met by maintaining the Identification value as a simple, 32-        bit, "wrap-around" counter, incremented each time a packet must        be fragmented.  It is an implementation choice whether to        maintain a single counter for the node or multiple counters,        e.g., one for each of the node's possible source addresses, or        one for each active (source address, destination address)        combination.   The initial, large, unfragmented packet is referred to as the   "original packet", and it is considered to consist of two parts, as   illustrated:   original packet:   +------------------+----------------------//-----------------------+   |  Unfragmentable  |                 Fragmentable                  |   |       Part       |                     Part                      |   +------------------+----------------------//-----------------------+      The Unfragmentable Part consists of the IPv6 header plus any      extension headers that must be processed by nodes en route to the      destination, that is, all headers up to and including the Routing      header if present, else the Hop-by-Hop Options header if present,      else no extension headers.      The Fragmentable Part consists of the rest of the packet, that is,      any extension headers that need be processed only by the final      destination node(s), plus the upper-layer header and data.   The Fragmentable Part of the original packet is divided into   fragments, each, except possibly the last ("rightmost") one, being an   integer multiple of 8 octets long.  The fragments are transmitted in   separate "fragment packets" as illustrated:   original packet:   +------------------+--------------+--------------+--//--+----------+   |  Unfragmentable  |    first     |    second    |      |   last   |   |       Part       |   fragment   |   fragment   | .... | fragment |   +------------------+--------------+--------------+--//--+----------+Deering & Hinden            Standards Track                    [Page 19]RFC 2460                   IPv6 Specification              December 1998   fragment packets:   +------------------+--------+--------------+   |  Unfragmentable  |Fragment|    first     |   |       Part       | Header |   fragment   |   +------------------+--------+--------------+   +------------------+--------+--------------+   |  Unfragmentable  |Fragment|    second    |   |       Part       | Header |   fragment   |   +------------------+--------+--------------+                         o                         o                         o   +------------------+--------+----------+   |  Unfragmentable  |Fragment|   last   |   |       Part       | Header | fragment |   +------------------+--------+----------+   Each fragment packet is composed of:      (1) The Unfragmentable Part of the original packet, with the          Payload Length of the original IPv6 header changed to contain          the length of this fragment packet only (excluding the length          of the IPv6 header itself), and the Next Header field of the          last header of the Unfragmentable Part changed to 44.      (2) A Fragment header containing:               The Next Header value that identifies the first header of               the Fragmentable Part of the original packet.               A Fragment Offset containing the offset of the fragment,               in 8-octet units, relative to the start of the               Fragmentable Part of the original packet.  The Fragment               Offset of the first ("leftmost") fragment is 0.               An M flag value of 0 if the fragment is the last               ("rightmost") one, else an M flag value of 1.               The Identification value generated for the original               packet.      (3) The fragment itself.   The lengths of the fragments must be chosen such that the resulting   fragment packets fit within the MTU of the path to the packets'   destination(s).Deering & Hinden            Standards Track                    [Page 20]RFC 2460                   IPv6 Specification              December 1998   At the destination, fragment packets are reassembled into their   original, unfragmented form, as illustrated:   reassembled original packet:   +------------------+----------------------//------------------------+   |  Unfragmentable  |                 Fragmentable                   |   |       Part       |                     Part                       |   +------------------+----------------------//------------------------+   The following rules govern reassembly:      An original packet is reassembled only from fragment packets that      have the same Source Address, Destination Address, and Fragment      Identification.      The Unfragmentable Part of the reassembled packet consists of all      headers up to, but not including, the Fragment header of the first      fragment packet (that is, the packet whose Fragment Offset is      zero), with the following two changes:         The Next Header field of the last header of the Unfragmentable         Part is obtained from the Next Header field of the first         fragment's Fragment header.         The Payload Length of the reassembled packet is computed from         the length of the Unfragmentable Part and the length and offset         of the last fragment.  For example, a formula for computing the         Payload Length of the reassembled original packet is:           PL.orig = PL.first - FL.first - 8 + (8 * FO.last) + FL.last           where           PL.orig  = Payload Length field of reassembled packet.           PL.first = Payload Length field of first fragment packet.           FL.first = length of fragment following Fragment header of                      first fragment packet.           FO.last  = Fragment Offset field of Fragment header of                      last fragment packet.           FL.last  = length of fragment following Fragment header of                      last fragment packet.      The Fragmentable Part of the reassembled packet is constructed      from the fragments following the Fragment headers in each of the      fragment packets.  The length of each fragment is computed by      subtracting from the packet's Payload Length the length of theDeering & Hinden            Standards Track                    [Page 21]RFC 2460                   IPv6 Specification              December 1998      headers between the IPv6 header and fragment itself; its relative      position in Fragmentable Part is computed from its Fragment Offset      value.      The Fragment header is not present in the final, reassembled      packet.   The following error conditions may arise when reassembling fragmented   packets:      If insufficient fragments are received to complete reassembly of a      packet within 60 seconds of the reception of the first-arriving      fragment of that packet, reassembly of that packet must be      abandoned and all the fragments that have been received for that      packet must be discarded.  If the first fragment (i.e., the one      with a Fragment Offset of zero) has been received, an ICMP Time      Exceeded -- Fragment Reassembly Time Exceeded message should be      sent to the source of that fragment.      If the length of a fragment, as derived from the fragment packet's      Payload Length field, is not a multiple of 8 octets and the M flag      of that fragment is 1, then that fragment must be discarded and an      ICMP Parameter Problem, Code 0, message should be sent to the      source of the fragment, pointing to the Payload Length field of      the fragment packet.      If the length and offset of a fragment are such that the Payload      Length of the packet reassembled from that fragment would exceed      65,535 octets, then that fragment must be discarded and an ICMP      Parameter Problem, Code 0, message should be sent to the source of      the fragment, pointing to the Fragment Offset field of the      fragment packet.   The following conditions are not expected to occur, but are not   considered errors if they do:      The number and content of the headers preceding the Fragment      header of different fragments of the same original packet may      differ.  Whatever headers are present, preceding the Fragment      header in each fragment packet, are processed when the packets      arrive, prior to queueing the fragments for reassembly.  Only      those headers in the Offset zero fragment packet are retained in      the reassembled packet.      The Next Header values in the Fragment headers of different      fragments of the same original packet may differ.  Only the value      from the Offset zero fragment packet is used for reassembly.Deering & Hinden            Standards Track                    [Page 22]RFC 2460                   IPv6 Specification              December 19984.6  Destination Options Header   The Destination Options header is used to carry optional information   that need be examined only by a packet's destination node(s).  The   Destination Options header is identified by a Next Header value of 60   in the immediately preceding header, and has the following format:    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+    |  Next Header  |  Hdr Ext Len  |                               |    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +    |                                                               |    .                                                               .    .                            Options                            .    .                                                               .    |                                                               |    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Next Header          8-bit selector.  Identifies the type of header                        immediately following the Destination Options                        header.  Uses the same values as the IPv4                        Protocol field [RFC-1700 et seq.].   Hdr Ext Len          8-bit unsigned integer.  Length of the                        Destination Options header in 8-octet units, not                        including the first 8 octets.   Options              Variable-length field, of length such that the                        complete Destination Options header is an                        integer multiple of 8 octets long.  Contains one                        or  more TLV-encoded options, as described in                        section 4.2.   The only destination options defined in this document are the Pad1   and PadN options specified in section 4.2.   Note that there are two possible ways to encode optional destination   information in an IPv6 packet: either as an option in the Destination   Options header, or as a separate extension header.  The Fragment   header and the Authentication header are examples of the latter   approach.  Which approach can be used depends on what action is   desired of a destination node that does not understand the optional   information:      o  If the desired action is for the destination node to discard         the packet and, only if the packet's Destination Address is not         a multicast address, send an ICMP Unrecognized Type message to         the packet's Source Address, then the information may be         encoded either as a separate header or as an option in theDeering & Hinden            Standards Track                    [Page 23]RFC 2460                   IPv6 Specification              December 1998         Destination Options header whose Option Type has the value 11         in its highest-order two bits.  The choice may depend on such         factors as which takes fewer octets, or which yields better         alignment or more efficient parsing.      o  If any other action is desired, the information must be encoded         as an option in the Destination Options header whose Option         Type has the value 00, 01, or 10 in its highest-order two bits,         specifying the desired action (see section 4.2).4.7 No Next Header   The value 59 in the Next Header field of an IPv6 header or any   extension header indicates that there is nothing following that   header.  If the Payload Length field of the IPv6 header indicates the   presence of octets past the end of a header whose Next Header field   contains 59, those octets must be ignored, and passed on unchanged if   the packet is forwarded.5. Packet Size Issues   IPv6 requires that every link in the internet have an MTU of 1280

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -