diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc950.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc950.txt')
-rw-r--r-- | doc/rfc/rfc950.txt | 1026 |
1 files changed, 1026 insertions, 0 deletions
diff --git a/doc/rfc/rfc950.txt b/doc/rfc/rfc950.txt new file mode 100644 index 0000000..5478f15 --- /dev/null +++ b/doc/rfc/rfc950.txt @@ -0,0 +1,1026 @@ + + +Network Working Group J. Mogul (Stanford) +Request for Comments: 950 J. Postel (ISI) + August 1985 + + Internet Standard Subnetting Procedure + + +Status Of This Memo + + This RFC specifies a protocol for the ARPA-Internet community. If + subnetting is implemented it is strongly recommended that these + procedures be followed. Distribution of this memo is unlimited. + +Overview + + This memo discusses the utility of "subnets" of Internet networks, + which are logically visible sub-sections of a single Internet + network. For administrative or technical reasons, many organizations + have chosen to divide one Internet network into several subnets, + instead of acquiring a set of Internet network numbers. This memo + specifies procedures for the use of subnets. These procedures are + for hosts (e.g., workstations). The procedures used in and between + subnet gateways are not fully described. Important motivation and + background information for a subnetting standard is provided in + RFC-940 [7]. + +Acknowledgment + + This memo is based on RFC-917 [1]. Many people contributed to the + development of the concepts described here. J. Noel Chiappa, Chris + Kent, and Tim Mann, in particular, provided important suggestions. + Additional contributions in shaping this memo were made by Zaw-Sing + Su, Mike Karels, and the Gateway Algorithms and Data Structures Task + Force (GADS). + + + + + + + + + + + + + + + + + + + +Mogul & Postel [Page 1] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + +1. Motivation + + The original view of the Internet universe was a two-level hierarchy: + the top level the Internet as a whole, and the level below it + individual networks, each with its own network number. The Internet + does not have a hierarchical topology, rather the interpretation of + addresses is hierarchical. In this two-level model, each host sees + its network as a single entity; that is, the network may be treated + as a "black box" to which a set of hosts is connected. + + While this view has proved simple and powerful, a number of + organizations have found it inadequate, and have added a third level + to the interpretation of Internet addresses. In this view, a given + Internet network is divided into a collection of subnets. + + The three-level model is useful in networks belonging to moderately + large organizations (e.g., Universities or companies with more than + one building), where it is often necessary to use more than one LAN + cable to cover a "local area". Each LAN may then be treated as a + subnet. + + There are several reasons why an organization might use more than one + cable to cover a campus: + + - Different technologies: Especially in a research environment, + there may be more than one kind of LAN in use; e.g., an + organization may have some equipment that supports Ethernet, and + some that supports a ring network. + + - Limits of technologies: Most LAN technologies impose limits, + based on electrical parameters, on the number of hosts + connected, and on the total length of the cable. It is easy to + exceed these limits, especially those on cable length. + + - Network congestion: It is possible for a small subset of the + hosts on a LAN to monopolize most of the bandwidth. A common + solution to this problem is to divide the hosts into cliques of + high mutual communication, and put these cliques on separate + cables. + + - Point-to-Point links: Sometimes a "local area", such as a + university campus, is split into two locations too far apart to + connect using the preferred LAN technology. In this case, + high-speed point-to-point links might connect several LANs. + + An organization that has been forced to use more than one LAN has + three choices for assigning Internet addresses: + + +Mogul & Postel [Page 2] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + 1. Acquire a distinct Internet network number for each cable; + subnets are not used at all. + + 2. Use a single network number for the entire organization, but + assign host numbers without regard to which LAN a host is on + ("transparent subnets"). + + 3. Use a single network number, and partition the host address + space by assigning subnet numbers to the LANs ("explicit + subnets"). + + Each of these approaches has disadvantages. The first, although not + requiring any new or modified protocols, results in an explosion in + the size of Internet routing tables. Information about the internal + details of local connectivity is propagated everywhere, although it + is of little or no use outside the local organization. Especially as + some current gateway implementations do not have much space for + routing tables, it would be good to avoid this problem. + + The second approach requires some convention or protocol that makes + the collection of LANs appear to be a single Internet network. For + example, this can be done on LANs where each Internet address is + translated to a hardware address using an Address Resolution Protocol + (ARP), by having the bridges between the LANs intercept ARP requests + for non-local targets, see RFC-925 [2]. However, it is not possible + to do this for all LAN technologies, especially those where ARP + protocols are not currently used, or if the LAN does not support + broadcasts. A more fundamental problem is that bridges must discover + which LAN a host is on, perhaps by using a broadcast algorithm. As + the number of LANs grows, the cost of broadcasting grows as well; + also, the size of translation caches required in the bridges grows + with the total number of hosts in the network. + + The third approach is to explicitly support subnets. This does have + a disadvantage, in that it is a modification of the Internet + Protocol, and thus requires changes to IP implementations already in + use (if these implementations are to be used on a subnetted network). + However, these changes are relatively minor, and once made, yield a + simple and efficient solution to the problem. Also, the approach + avoids any changes that would be incompatible with existing hosts on + non-subnetted networks. + + Further, when appropriate design choices are made, it is possible for + hosts which believe they are on a non-subnetted network to be used on + a subnetted one, as explained in RFC-917 [1]. This is useful when it + is not possible to modify some of the hosts to support subnets + explicitly, or when a gradual transition is preferred. + + +Mogul & Postel [Page 3] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + +2. Standards for Subnet Addressing + + This section first describes a proposal for interpretation of + Internet addresses to support subnets. Next it discusses changes to + host software to support subnets. Finally, it presents a procedures + for discovering what address interpretation is in use on a given + network (i.e., what address mask is in use). + + 2.1. Interpretation of Internet Addresses + + Suppose that an organization has been assigned an Internet network + number, has further divided that network into a set of subnets, + and wants to assign host addresses: how should this be done? + Since there are minimal restrictions on the assignment of the + "local address" part of the Internet address, several approaches + have been proposed for representing the subnet number: + + 1. Variable-width field: Any number of the bits of the local + address part are used for the subnet number; the size of + this field, although constant for a given network, varies + from network to network. If the field width is zero, then + subnets are not in use. + + 2. Fixed-width field: A specific number of bits (e.g., eight) + is used for the subnet number, if subnets are in use. + + 3. Self-encoding variable-width field: Just as the width + (i.e., class) of the network number field is encoded by its + high-order bits, the width of the subnet field is similarly + encoded. + + 4. Self-encoding fixed-width field: A specific number of bits + is used for the subnet number. + + 5. Masked bits: Use a bit mask ("address mask") to identify + which bits of the local address field indicate the subnet + number. + + What criteria can be used to choose one of these five schemes? + First, should we use a self-encoding scheme? And, should it be + possible to tell from examining an Internet address if it refers + to a subnetted network, without reference to any other + information? + + An interesting feature of self-encoding is that it allows the + + + + +Mogul & Postel [Page 4] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + address space of a network to be divided into subnets of + different sizes, typically one subnet of half the address space + and a set of small subnets. + + For example, consider a class C network that uses a + self-encoding scheme with one bit to indicate if it is the + large subnet or not and an additional three bits to identify + the small subnet. If the first bit is zero then this is the + large subnet, if the first bit is one then the following + bits (3 in this example) give the subnet number. There is + one subnet with 128 host addresses, and eight subnets with + 16 hosts each. + + To establish a subnetting standard the parameters and + interpretation of the self-encoding scheme must be fixed and + consistent throughout the Internet. + + It could be assumed that all networks are subnetted. This + would allow addresses to be interpreted without reference to + any other information. + + This is a significant advantage, that given the Internet + address no additional information is needed for an + implementation to determine if two addresses are on the same + subnet. However, this can also be viewed as a disadvantage: + it may cause problems for networks which have existing host + numbers that use arbitrary bits in the local address part. + In other words, it is useful to be able to control whether a + network is subnetted independently from the assignment of + host addresses. + + The alternative is to have the fact that a network is subnetted + kept separate from the address. If one finds, somehow, that + the network is subnetted then the standard self-encoded + subnetted network address rules are followed, otherwise the + non-subnetted network addressing rules are followed. + + If a self-encoding scheme is not used, there is no reason to use a + fixed-width field scheme: since there must in any case be some + per-network "flag" to indicate if subnets are in use, the + additional cost of using an integer (a subnet field width or + address mask) instead of a boolean is negligible. The advantage + of using the address mask scheme is that it allows each + organization to choose the best way to allocate relatively scarce + bits of local address to subnet and host numbers. Therefore, we + choose the address-mask scheme: it is the most flexible scheme, + yet costs no more to implement than any other. + + +Mogul & Postel [Page 5] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + For example, the Internet address might be interpreted as: + + <network-number><subnet-number><host-number> + + where the <network-number> field is as defined by IP [3], the + <host-number> field is at least 1-bit wide, and the width of the + <subnet-number> field is constant for a given network. No further + structure is required for the <subnet-number> or <host-number> + fields. If the width of the <subnet-number> field is zero, then + the network is not subnetted (i.e., the interpretation of [3] is + used). + + For example, on a Class B network with a 6-bit wide subnet field, + an address would be broken down like this: + + 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |1 0| NETWORK | SUBNET | Host Number | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + Since the bits that identify the subnet are specified by a + bitmask, they need not be adjacent in the address. However, we + recommend that the subnet bits be contiguous and located as the + most significant bits of the local address. + + Special Addresses: + + From the Assigned Numbers memo [9]: + + "In certain contexts, it is useful to have fixed addresses + with functional significance rather than as identifiers of + specific hosts. When such usage is called for, the address + zero is to be interpreted as meaning "this", as in "this + network". The address of all ones are to be interpreted as + meaning "all", as in "all hosts". For example, the address + 128.9.255.255 could be interpreted as meaning all hosts on + the network 128.9. Or, the address 0.0.0.37 could be + interpreted as meaning host 37 on this network." + + It is useful to preserve and extend the interpretation of these + special addresses in subnetted networks. This means the values + of all zeros and all ones in the subnet field should not be + assigned to actual (physical) subnets. + + In the example above, the 6-bit wide subnet field may have + any value except 0 and 63. + + +Mogul & Postel [Page 6] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + Please note that there is no effect or new restriction on the + addresses of hosts on non-subnetted networks. + + 2.2. Changes to Host Software to Support Subnets + + In most implementations of IP, there is code in the module that + handles outgoing datagrams to decide if a datagram can be sent + directly to the destination on the local network or if it must be + sent to a gateway. + + Generally the code is something like this: + + IF ip_net_number(dg.ip_dest) = ip_net_number(my_ip_addr) + THEN + send_dg_locally(dg, dg.ip_dest) + ELSE + send_dg_locally(dg, + gateway_to(ip_net_number(dg.ip_dest))) + + (If the code supports multiply-connected networks, it will be more + complicated, but this is irrelevant to the current discussion.) + + To support subnets, it is necessary to store one more 32-bit + quantity, called my_ip_mask. This is a bit-mask with bits set in + the fields corresponding to the IP network number, and additional + bits set corresponding to the subnet number field. + + The code then becomes: + + IF bitwise_and(dg.ip_dest, my_ip_mask) + = bitwise_and(my_ip_addr, my_ip_mask) + THEN + send_dg_locally(dg, dg.ip_dest) + ELSE + send_dg_locally(dg, + gateway_to(bitwise_and(dg.ip_dest, my_ip_mask))) + + Of course, part of the expression in the conditional can be + pre-computed. + + It may or may not be necessary to modify the "gateway_to" + function, so that it too takes the subnet field bits into account + when performing comparisons. + + To support multiply-connected hosts, the code can be changed to + + + + +Mogul & Postel [Page 7] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + keep the "my_ip_addr" and "my_ip_mask" quantities on a + per-interface basis; the expression in the conditional must then + be evaluated for each interface. + + 2.3. Finding the Address Mask + + How can a host determine what address mask is in use on a subnet + to which it is connected? The problem is analogous to several + other "bootstrapping" problems for Internet hosts: how a host + determines its own address, and how it locates a gateway on its + local network. In all three cases, there are two basic solutions: + "hardwired" information, and broadcast-based protocols. + + Hardwired information is that available to a host in isolation + from a network. It may be compiled-in, or (preferably) stored in + a disk file. However, for the increasingly common case of a + diskless workstation that is bootloaded over a LAN, neither + hardwired solution is satisfactory. + + Instead, since most LAN technology supports broadcasting, a better + method is for the newly-booted host to broadcast a request for the + necessary information. For example, for the purpose of + determining its Internet address, a host may use the "Reverse + Address Resolution Protocol" (RARP) [4]. + + However, since a newly-booted host usually needs to gather several + facts (e.g., its IP address, the hardware address of a gateway, + the IP address of a domain name server, the subnet address mask), + it would be better to acquire all this information in one request + if possible, rather than doing numerous broadcasts on the network. + The mechanisms designed to boot diskless workstations can also + load per-host specific configuration files that contain the + required information (e.g., see RFC-951 [8]). It is possible, and + desirable, to obtain all the facts necessary to operate a host + from a boot server using only one broadcast message. + + In the case where it is necessary for a host to find the address + mask as a separate operation the following mechanism is provided: + + To provide the address mask information the ICMP protocol [5] + is extended by adding a new pair of ICMP message types, + "Address Mask Request" and "Address Mask Reply", analogous to + the "Information Request" and "Information Reply" ICMP + messages. These are described in detail in Appendix I. + + The intended use of these new ICMP messages is that a host, + when booting, broadcast an "Address Mask Request" message. A + + +Mogul & Postel [Page 8] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + gateway (or a host acting in lieu of a gateway) that receives + this message responds with an "Address Mask Reply". If there + is no indication in the request which host sent it (i.e., the + IP Source Address is zero), the reply is broadcast as well. + The requesting host will hear the response, and from it + determine the address mask. + + Since there is only one possible value that can be sent in an + "Address Mask Reply" on any given LAN, there is no need for the + requesting host to match the responses it hears against the + request it sent; similarly, there is no problem if more than + one gateway responds. We assume that hosts reboot + infrequently, so the broadcast load on a network from use of + this protocol should be small. + + If a host is connected to more than one LAN, it might have to find + the address mask for each. + + One potential problem is what a host should do if it can not find + out the address mask, even after a reasonable number of tries. + Three interpretations can be placed on the situation: + + 1. The local net exists in (permanent) isolation from all other + nets. + + 2. Subnets are not in use, and no host can supply the address + mask. + + 3. All gateways on the local net are (temporarily) down. + + The first and second situations imply that the address mask is + identical with the Internet network number mask. In the third + situation, there is no way to determine what the proper value is; + the safest choice is thus a mask identical with the Internet + network number mask. Although this might later turn out to be + wrong, it will not prevent transmissions that would otherwise + succeed. It is possible for a host to recover from a wrong + choice: when a gateway comes up, it should broadcast an "Address + Mask Reply"; when a host receives such a message that disagrees + with its guess, it should change its mask to conform to the + received value. No host or gateway should send an "Address Mask + Reply" based on a "guessed" value. + + Finally, note that no host is required to use this ICMP protocol + to discover the address mask; it is perfectly reasonable for a + host with non-volatile storage to use stored information + (including a configuration file from a boot server). + + +Mogul & Postel [Page 9] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + +Appendix I. Address Mask ICMP + + Address Mask Request or Address Mask Reply + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Type | Code | Checksum | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Identifier | Sequence Number | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Address Mask | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + IP Fields: + + Addresses + + The address of the source in an address mask request message + will be the destination of the address mask reply message. + To form an address mask reply message, the source address of + the request becomes the destination address of the reply, + the source address of the reply is set to the replier's + address, the type code changed to AM2, the address mask + value inserted into the Address Mask field, and the checksum + recomputed. However, if the source address in the request + message is zero, then the destination address for the reply + message should denote a broadcast. + + ICMP Fields: + + Type + + AM1 for address mask request message + + AM2 for address mask reply message + + Code + + 0 for address mask request message + + 0 for address mask reply message + + Checksum + + The checksum is the 16-bit one's complement of the one's + + + +Mogul & Postel [Page 10] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + complement sum of the ICMP message starting with the ICMP + Type. For computing the checksum, the checksum field should + be zero. This checksum may be replaced in the future. + + Identifier + + An identifier to aid in matching requests and replies, may + be zero. + + Sequence Number + + A sequence number to aid in matching requests and replies, + may be zero. + + Address Mask + + A 32-bit mask. + + Description + + A gateway receiving an address mask request should return it + with the address mask field set to the 32-bit mask of the bits + identifying the subnet and network, for the subnet on which the + request was received. + + If the requesting host does not know its own IP address, it may + leave the source field zero; the reply should then be + broadcast. However, this approach should be avoided if at all + possible, since it increases the superfluous broadcast load on + the network. Even when the replies are broadcast, since there + is only one possible address mask for a subnet, there is no + need to match requests with replies. The "Identifier" and + "Sequence Number" fields can be ignored. + + Type AM1 may be received from a gateway or a host. + + Type AM2 may be received from a gateway, or a host acting in + lieu of a gateway. + + + + + + + + + + + +Mogul & Postel [Page 11] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + +Appendix II. Examples + + These examples show how a host can find out the address mask using + the ICMP Address Mask Request and Address Mask Reply messages. For + the following examples, assume that address 255.255.255.255 denotes + "broadcast to this physical medium" [6]. + + 1. A Class A Network Case + + For this case, assume that the requesting host is on class A + network 36.0.0.0, has address 36.40.0.123, that there is a gateway + at 36.40.0.62, and that a 8-bit wide subnet field is in use, that + is, the address mask is 255.255.0.0. + + The most efficient method, and the one we recommend, is for a host + to first discover its own address (perhaps using "RARP" [4]), and + then to send the ICMP request to 255.255.255.255: + + Source address: 36.40.0.123 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + The gateway can then respond directly to the requesting host. + + Source address: 36.40.0.62 + Destination address: 36.40.0.123 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.0.0 + + Suppose that 36.40.0.123 is a diskless workstation, and does not + know even its own host number. It could send the following + datagram: + + Source address: 0.0.0.0 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + 36.40.0.62 will hear the datagram, and should respond with this + datagram: + + +Mogul & Postel [Page 12] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + Source address: 36.40.0.62 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.0.0 + + Note that the gateway uses the narrowest possible broadcast to + reply. Even so, the over use of broadcasts presents an + unnecessary load to all hosts on the subnet, and so the use of the + "anonymous" (0.0.0.0) source address must be kept to a minimum. + + If broadcasting is not allowed, we assume that hosts have wired-in + information about neighbor gateways; thus, 36.40.0.123 might send + this datagram: + + Source address: 36.40.0.123 + Destination address: 36.40.0.62 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + 36.40.0.62 should respond exactly as in the previous case. + + Source address: 36.40.0.62 + Destination address: 36.40.0.123 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.0.0 + + 2. A Class B Network Case + + For this case, assume that the requesting host is on class B + network 128.99.0.0, has address 128.99.4.123, that there is a + gateway at 128.99.4.62, and that a 6-bit wide subnet field is in + use, that is, the address mask is 255.255.252.0. + + The host sends the ICMP request to 255.255.255.255: + + Source address: 128.99.4.123 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + +Mogul & Postel [Page 13] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + The gateway can then respond directly to the requesting host. + + Source address: 128.99.4.62 + Destination address: 128.99.4.123 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.252.0 + + In the diskless workstation case the host sends: + + Source address: 0.0.0.0 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + 128.99.4.62 will hear the datagram, and should respond with this + datagram: + + Source address: 128.99.4.62 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.252.0 + + If broadcasting is not allowed 128.99.4.123 sends: + + Source address: 128.99.4.123 + Destination address: 128.99.4.62 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + 128.99.4.62 should respond exactly as in the previous case. + + Source address: 128.99.4.62 + Destination address: 128.99.4.123 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.252.0 + + + + +Mogul & Postel [Page 14] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + 3. A Class C Network Case (illustrating non-contiguous subnet bits) + + For this case, assume that the requesting host is on class C + network 192.1.127.0, has address 192.1.127.19, that there is a + gateway at 192.1.127.50, and that on network an 3-bit subnet field + is in use (01011000), that is, the address mask is 255.255.255.88. + + The host sends the ICMP request to 255.255.255.255: + + Source address: 192.1.127.19 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + The gateway can then respond directly to the requesting host. + + Source address: 192.1.127.50 + Destination address: 192.1.127.19 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.255.88. + + In the diskless workstation case the host sends: + + Source address: 0.0.0.0 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + 192.1.127.50 will hear the datagram, and should respond with this + datagram: + + Source address: 192.1.127.50 + Destination address: 255.255.255.255 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.255.88. + + If broadcasting is not allowed 192.1.127.19 sends: + + + + +Mogul & Postel [Page 15] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + Source address: 192.1.127.19 + Destination address: 192.1.127.50 + Protocol: ICMP = 1 + Type: Address Mask Request = AM1 + Code: 0 + Mask: 0 + + 192.1.127.50 should respond exactly as in the previous case. + + Source address: 192.1.127.50 + Destination address: 192.1.127.19 + Protocol: ICMP = 1 + Type: Address Mask Reply = AM2 + Code: 0 + Mask: 255.255.255.88 + +Appendix III. Glossary + + Bridge + + A node connected to two or more administratively indistinguishable + but physically distinct subnets, that automatically forwards + datagrams when necessary, but whose existence is not known to + other hosts. Also called a "software repeater". + + Gateway + + A node connected to two or more administratively distinct networks + and/or subnets, to which hosts send datagrams to be forwarded. + + Host Field + + The bit field in an Internet address used for denoting a specific + host. + + Internet + + The collection of connected networks using the IP protocol. + + Local Address + + The rest field of the Internet address (as defined in [3]). + + Network + + A single Internet network (which may or may not be divided into + subnets). + + +Mogul & Postel [Page 16] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + + Network Number + + The network field of the Internet address. + + Subnet + + One or more physical networks forming a subset of an Internet + network. A subnet is explicitly identified in the Internet + address. + + Subnet Field + + The bit field in an Internet address denoting the subnet number. + The bits making up this field are not necessarily contiguous in + the address. + + Subnet Number + + A number identifying a subnet within a network. + +Appendix IV. Assigned Numbers + + The following assignments are made for protocol parameters used in + the support of subnets. The only assignments needed are for the + Internet Control Message Protocol (ICMP) [5]. + + ICMP Message Types + + AM1 = 17 + + AM2 = 18 + + + + + + + + + + + + + + + + + + +Mogul & Postel [Page 17] + + + +RFC 950 August 1985 +Internet Standard Subnetting Procedure + + +References + + [1] Mogul, J., "Internet Subnets", RFC-917, Stanford University, + October 1984. + + [2] Postel, J., "Multi-LAN Address Resolution", RFC-925, + USC/Information Sciences Institute, October 1984. + + [3] Postel, J., "Internet Protocol", RFC-791, USC/Information + Sciences Institute, September 1981. + + [4] Finlayson, R., T. Mann, J. Mogul, M. Theimer, "A Reverse Address + Resolution Protocol", RFC-903, Stanford University, June 1984. + + [5] Postel, J., "Internet Control Message Protocol", RFC-792, + USC/Information Sciences Institute, September 1981. + + [6] Mogul, J., "Broadcasting Internet Datagrams", RFC-919, Stanford + University, October 1984. + + [7] GADS, "Towards an Internet Standard Scheme for Subnetting", + RFC-940, Network Information Center, SRI International, + April 1985. + + [8] Croft, B., and J. Gilmore, "BOOTP -- UDP Bootstrap Protocol", + RFC-951, Stanford University, August 1985. + + [9] Reynolds, J., and J. Postel, "Assigned Numbers", RFC-943, + USC/Information Sciences Institute, April 1985. + + + + + + + + + + + + + + + + + + + + +Mogul & Postel [Page 18] +
\ No newline at end of file |