⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2351.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 3 页
字号:
   HDR   This field specifies which part of the airline's specific address is   placed ahead of the message text transmitted over the session.   Possible values are:   00 : used in TYPE A SITA Host to Host Header = H1+H2+Flow ID   01 : used in TYPE A SITA Host to Host Header = Flow ID   10 : No Header (default for IATA host to Host)   11 : Not used   The MPX and HDR must be coherent. When flow are multiplexed, the data   must contain the flow identification. The table below summarizes the   possible combinations:         +---------------------+         |       MPX | 01 | 10 |         +---------------------+         | HDR       |    |    |         | 00        | Y  | Y  |         | 01        | Y  | Y  |         | 10        | N  | Y  |         +---------------------+   H1 H2   These fields can be used to identify the session. When this field is   not used, it must be set to 0. If HDR=00, H1H2 in data packet must   have the same value as set in SO command.   Flow ID   This field is optional and indicates the Flow ID (range 3F - 4F Hex).Robert                       Informational                     [Page 16]RFC 2351                         MATIP                          May 19989.1.2 Open Confirm format (OC)   The OC (Open Confirm) command is a response to an SO (Session Open)   command and is used to either refuse the session or accept it.9.1.2.1 Refuse the connection      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 0 1|0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1|     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |     cause     |     +-+-+-+-+-+-+-+-+   Cause   This field indicates the reason for the MATIP session refusal       0 0 0 0 0 0 0 1 : No Traffic Type matching between Sender &            Recipient       0 0 0 0 0 0 1 0 : Information in SO header incoherent       1 0 0 0 0 1 0 0            up to      : Application dependent       1 1 1 1 1 1 1 1       Other values reserved.9.1.2.2 Accept the connection      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 0 1|0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1|     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0 0 0 0 0 0 0 0|     +-+-+-+-+-+-+-+-+9.1.3 Session Close (SC)   The SC (Session Close) command is used to close an existing MATIP   session.Robert                       Informational                     [Page 17]RFC 2351                         MATIP                          May 1998      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 0 0|0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1|     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     | Close  Cause  |     +-+-+-+-+-+-+-+-+   Close Cause   Indicates the reason for the session closure:       0 0 0 0 0 0 0 0 : Normal Close       1 0 0 0 0 1 0 0            up to      : Application dependent       1 1 1 1 1 1 1 1       Other values reserved9.2 Data Packet Format      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |0|0 0 0 0 0 0 0|          length               |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |                         ID (optional)                         |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |                                                               |     |                         Payload                               |     |                                                               |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   ID   This field is optional and has a different length and format   according to the value of   HDR indicated during the session   establishment.     +-------------------------------+     |HDR |        I.D.              |     +-------------------------------+     |00  |ID = 3 bytes H1-H2 FLOW ID|     +-------------------------------+     |01  |ID = FLOW ID              |     +-------------------------------+     |10  |ID nor present            |     +-------------------------------+Robert                       Informational                     [Page 18]RFC 2351                         MATIP                          May 1998   Payload packet   The payload format is relevant to the MATIP layer. It is formatted   according to the IATA host to host specifications and agreed   bilaterally by the sender and the receiver.10. MATIP FORMAT FOR TYPE B TRAFFIC10.1 Control packet format   There are 3 control packets used to open or close the session at the   MATIP level for exchanging Type B data10.1.1 Session Open format (SO)   Before sending any data packets, it is recommended to let the systems   establishing a session check that they are indeed able to communicate   (i.e., Both systems agree on the characteristics of the traffic that   will cross the connection). For this purpose, a two way handshake,   using the Session commands defined hereafter, is performed   immediately after the establishment of the TCP level connection.   Either side can initiate this procedure. In case of collision, the   open session from the side having the lower IP address is ignored.      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 1 0|            length             |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0 0 0 0 0| C D | PROTEC| BFLAG |          Sender HLD           |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |       Recipient HLD           |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Length   This field indicates the number of bytes of the whole command, header   included. The only possible values are equal to 6 bytes or 10 bytes.   CD   This field specifies the Coding, as defined in section 8.1.1.1.   PROTEC   Identifies the end to end Messaging Responsibility Transfer protocol   used.   0010: BATAP   All other values available.   BFLAG (X means `do not care'Robert                       Informational                     [Page 19]RFC 2351                         MATIP                          May 1998   X X 0 0 means that the fields `Sender HLD, Recipient HLD' do not exist        in this packet. In this case, the exact length of the packet is 6        Bytes.   X X 1 0 means that the `Sender HLD, Recipient HLD' are carried        respectively in bytes 9,10 and 11,12 of this packet. In this        case, the exact length of the packet is 10 Bytes.   0 0 X X means that the connection request has been transmitted from a   host (Mainframe system)   0 1 X X means that the connection request has been transmitted from a   gateway)   Sender HLD   HLD of the Type B System sending the Session Open.   Recipient HLD   HLD of the Type B system to which session opening is destined.10.1.2 Open confirm format (OC)   The OC (Open Confirm) command is a response to an SO (Session Open)   command and is used to either refuse the session or accept it.10.1.2.1 Refuse the connection      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 0 1|0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1|     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|1|   Cause   |     +-+-+-+-+-+-+-+-+   Length of this packet is 5 Bytes.   Cause   Indicates the cause of the rejection       0 0 0 0 0 1 : No Traffic Type matching between Sender & Recipient       0 0 0 0 1 0 : Information in SO header incoherent       0 0 0 0 1 1 : Type of Protection mechanism are different       0 0 0 1 0 0 up to 1 1 1 1 1 1 : R.F.URobert                       Informational                     [Page 20]RFC 2351                         MATIP                          May 199810.1.2.2 Accept the connection      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 0 1|0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1|     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0 0 0 0 0 0 0 0|     +-+-+-+-+-+-+-+-+   Length of this packet is 5 Bytes.10.1.3 Session Close (SC)   The SC (Session Close) command is used to close an existing MATIP   session.      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |1|1 1 1 1 1 0 0|0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1|     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     | Close  Cause  |     +-+-+-+-+-+-+-+-+   Close Cause   Indicates the reason for the session closure:   0 0 0 0 0 0 0 0 : Normal Close   1 0 0 0 0 1 0 0 up to 1 1 1 1 1 1 1 1 : Application dependent   Other values reserved10.2 Data packet format      0                   1                   2                   3      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |0|0|0|0|0| Ver |0|0 0 0 0 0 0 0|            length             |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+     |                                                               |     |                         Payload                               |     |                                                               |     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   Length   This field indicates the number of bytes of the whole packet, header   included.Robert                       Informational                     [Page 21]RFC 2351                         MATIP                          May 1998   Payload   Type B message formatted according to the IATA standard and   conforming to the rules of the accessed TYPE B service11. Security Considerations   The security is a very sensitive point for airline industry. Security   for the MATIP users can take place at different levels:   The ASCU must be defined to enable the session with the host   application. The control can be achieved in two ways: either the ASCU   address (H1 H2 A1 A2) is defined at the application level by the   means of a static configuration, or the ASCU is identified by a User   ID / password. In most cases, the User ID and Password are verified   by a dedicated software running in the central host. But they can   also be checked by the application itself.   The MATIP sessions being transported over TCP/IP, It can go through a   firewall. Depending on the firewall level, the control can be   performed at network (IP addresses) or TCP application layer.   For higher level of security all compliant implementations MAY   implement IPSEC ESP for securing control packets.  Replay protection,   the compulsory cipher suite for IPSEC ESP, and NULL encryption MAY be   implemented. Optionally, IPSEC AH MAY also be supported.  All   compliant implementations MAY also implement IPSEC ESP for protection   of data packets. Replay prevention and integrity protection using   IPSEC ESP mandated cipher suit MAY be implemented.  NULL encryption   also MAY be supported. Other IPSEC ESP required ciphers MAY also be   supported.12. Author's Address   Alain Robert   S.I.T.A.   18, rue Paul Lafargue   92904 PARIS LA DEFENSE 10   FRANCE   Phone: 33 1 46411491   Fax: 33 1 46411277   EMail: arobert@par1.par.sita.intRobert                       Informational                     [Page 22]RFC 2351                         MATIP                          May 199813.  Full Copyright Statement   Copyright (C) The Internet Society (1998).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Robert                       Informational                     [Page 23]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -