diff options
Diffstat (limited to 'doc/rfc/rfc1220.txt')
-rw-r--r-- | doc/rfc/rfc1220.txt | 1011 |
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc1220.txt b/doc/rfc/rfc1220.txt new file mode 100644 index 0000000..d7bbce4 --- /dev/null +++ b/doc/rfc/rfc1220.txt @@ -0,0 +1,1011 @@ + + + + + + +Network Working Group F. Baker, Editor +Request for Comments: 1220 ACC + April 1991 + + + Point-to-Point Protocol Extensions for Bridging + +1. Status of this Memo + + This document defines an extension of the Internet Point-to-Point + Protocol (PPP) described in RFC 1171, targeting the use of Point-to- + Point lines for Remote Bridging. It is a product of the Point-to- + Point Protocol Extensions Working Group of the Internet Engineering + Task Force (IETF). + + This RFC specifies an IAB standards track protocol for the Internet + community, and requests discussion and suggestions for improvements. + Please refer to the current edition of the "IAB Official Protocol + Standards" for the standardization state and status of this protocol. + Distribution of this memo is unlimited. + +2. Historical Perspective + + Two basic algorithms are ambient in the industry for Bridging of + Local Area Networks. The more common algorithm is called + "Transparent Bridging" and has been standardized for Extended LAN + configurations by IEEE 802.1. IEEE 802.5 has proposed an alternative + approach, called "Source Routing", and is in the process of + standardizing that approach for IEEE 802.5 extended networks. + + Although there is a subcommittee of IEEE 802.1 addressing remote + bridging, neither standard directly defines Remote Bridging per se, + as that would technically be beyond the IEEE 802 committee's charter. + Both allow for it, however, modeling the line as an unspecified + interface between half-bridges. + + This document assumes that the devices at either end of a serial link + + - have agreed to utilize the RFC 1171 line discipline in some form. + + - may have agreed, by some other means, to exchange other + protocols on the line interspersed with each other and with any + bridged PDUs. + + - may be willing to use the link as a vehicle for Remote Bridging. + + - may have multiple point-to-point links that are configured in + parallel to simulate a single line of higher speed or + + + +Point-to-Point Protocol Extensions Working Group [Page 1] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + reliability, but message sequence issues are solved by the + transmitting end. + +3. General Considerations + +3.1. Link Quality Monitoring + + It is strongly recommended that Point-to-Point Bridge Protocol + implementations utilize Magic Number Loopback Detection and Link- + Quality-Monitoring. This is because the 802.1 Spanning Tree + protocol, which is integral to both Transparent Bridging and Source + Routing (as standardized), is unidirectional during normal operation, + with HELLO PDUs emanating from the Root System in the general + direction of the leaves, without any reverse traffic except in + response to network events. + +3.2. Message Sequence + + The multiple link case requires consideration of message + sequentiality. The transmitting station must determine either that + the protocol being bridged requires transmissions to arrive in the + order of their original transmission, and enqueue all transmissions + on a given conversation onto the same link to force order + preservation, or that the protocol does NOT require transmissions to + arrive in the order of their original transmission, and use that + knowledge to optimize the utilization of the several links, enqueuing + traffic to links to minimize delay. + + In the absence of such a determination, the transmitting station must + act as though all protocols require order preservation; many + protocols designed primarily for use on a single LAN in fact do. A + protocol could be described to maintain message sequentiality across + multiple links, either by sequence numbering or by fragmentation and + re-assembly, but this is neither elegant nor absolutely necessary. + +3.3. Maximum Receive Unit Considerations + + Please note that the negotiated MRU must be large enough to support + the MAC Types that are negotiated for support, there being no + fragmentation and re-assembly. Even Ethernet frames are larger than + the default MRU of 1500 octets. + +3.4. Separation of Spanning Tree Domains + + It is conceivable that a network manager might wish to inhibit the + exchange of BPDUs on a link in order to logically divide two regions + into separate Spanning Trees with different Roots (and potentially + different Spanning Tree implementations or algorithms). In order to + + + +Point-to-Point Protocol Extensions Working Group [Page 2] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + do that, he must configure both ends to not exchange BPDUs on a link. + For the sake of robustness, a bridge which is so configured must + silently discard the BPDU of its neighbor, should it receive one. + +4. IEEE 802.1 Transparent Bridging + +4.1. Overview of IEEE 802.1 Transparent Bridging + + As a favor to the uninitiated, let us first describe Transparent + Bridging. Essentially, the bridges in a network operate as isolated + entities, largely unaware of each others' presence. A Transparent + Bridge maintains a Forwarding Database consisting of + + {address, interface} + + records by saving the Source Address of each LAN transmission that it + receives along with the interface identifier for the interface it was + received on. It goes on to check whether the Destination Address is + in the database, and if so, either discards the message (if the + destination and source are located at the same interface) or forwards + the message to the indicated interface. A message whose Destination + Address is not found in the table is forwarded to all interfaces + except the one it was received on; this describes Broadcast/Multicast + behavior as well. + + The obvious fly in the ointment is that redundant paths in the + network cause indeterminate (nay, all too determinate) forwarding + behavior to occur. To prevent this, a protocol called the IEEE + 802.1(d) Spanning Tree Protocol is executed between the bridges to + detect and logically remove redundant paths from the network. + + One system is elected as the "Root", which periodically emits a + message called a Bridge Hello Protocol Data Unit, or BPDU, heard by + all of its neighboring bridges. Each of these modifies and passes + the BPDU on to its neighbors, and they to theirs, until it arrives at + the leaf LAN segments in the network (where it dies, having no + further neighbors to pass it along) or until the message is stopped + by a bridge which has a superior path to the "Root". In this latter + case, the interface the BPDU was received on is ignored (i.e., it is + placed in a Hot Standby status, no traffic is emitted onto it except + the BPDU, and all traffic received from it is discarded) until a + topology change forces a recalculation of the network. + +4.2. IEEE 802.1 Remote Bridging Activity + + There exist two basic sorts of bridges - ones that interconnect LANs + directly, called Local Bridges, and ones that interconnect LANs via + an intermediate medium such as a leased line, called Remote Bridges. + + + +Point-to-Point Protocol Extensions Working Group [Page 3] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + The Point-to-Point Protocol might be used by a Remote Bridge. + + There is more than one proposal within the IEEE 802.1 Interworking + Committee for modeling the Remote Bridge. In one model, the + interconnecting serial link(s) are treated in the same way that a LAN + is, having a standard IEEE 802.1 Link State; in another, the serial + links operate in a mode quite different from the LANs that they + interconnect. For the sake of simplicity of specification, the first + model is adopted, although some of the good ideas from proponents of + the second model are included or allowed for. + + Therefore, given that transparent bridging is configured on a line or + set of lines, the specifics of the link state with respect to the + bridge is defined by IEEE 802.1(d). The Bridge Protocol Data Unit, + or BPDU, is defined there, as well as the algorithms for its use. + + It is assumed that, if a Point-to-Point Link neighbor receives IEEE + 802.1 BPDUs without rejecting them with the RFC 1171 Protocol-Reject + LCP PDU, Transparent Bridging is permitted on the link. + +4.3. IEEE 802.5 Source Routing + + The IEEE 802.5 Committee has defined a different approach to bridging + for use on the Token Ring, called Source Routing. In this approach, + the originating system has the responsibility of indicating what path + that the message should follow. It does this, if the message is + directed off the local ring, by including a variable length MAC + header extension called the Routing Information Field, or RIF. The + RIF consists of one 16 bit word of flags and parameters followed by + zero or more ring-and-bridge identifiers. Each bridge en route + determines from this "source route list" whether it should receive + the message and how to forward it. + + The algorithm for Source Routing requires the bridge to be able to + identify any interface by its ring-and-bridge identifier, and to be + able to identify any of its OTHER interfaces likewise. When a packet + is received which has the Routing Information Field (RIF) present, a + boolean in the RIF is inspected to determine whether the ring-and- + bridge identifiers are to be inspected in "forward" or "reverse" + sense. In a "forward" search, the bridge looks for the ring-and- + bridge identifier of the interface the packet was received on, and + forwards the packet toward the ring identified in the ring-and-bridge + identifier that follows it. In a "reverse" search, the bridge looks + for the ring-and-bridge identifier of the OTHER INTERFACE, and + delivers the packet to the indicated interface if such is found. + + The algorithms for handling multicasts ("Functional Addresses" and + "Group Addresses") have been the subject of much discussion in 802.5, + + + +Point-to-Point Protocol Extensions Working Group [Page 4] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + and are likely to be the most troublesome for bridge implementations. + Fortunately, they are beyond the scope of this document. + +4.4. IEEE 802.5 Remote Bridging Activity + + There is no Remote Bridge proposal in IEEE 802.5 at this time, + although IBM ships a remote Source Routing Bridge. Simplicity would + dictate that we choose the same model for IEEE 802.5 Source Routing + that was selected for IEEE 802.1, but necessity requires a ring + number for the line in some cases. We allow for both models. + + Given that source routing is configured on a line or set of lines, + the specifics of the link state with respect to the bridge is defined + by the IEEE 802.5 Addendum on Source Routing. The requisite PDUs for + calculating the spanning tree (used for assuring that each ring will + receive at most one copy of a multicast) are defined there, as well + as the algorithms for their use. MAC PDUs (Beacon, Ring Management, + etc) are specific to the MAU technology and are not exchanged on the + line. + +4.5. Source Routing to Transparent Bridge Translation + + IEEE 802 also has a subcommittee looking at the interoperation of + Transparent Bridging and Source Routing. For the purposes of this + standard, such a device is both a transparent and a source routing + bridge, and will act on the line in both ways, just as it does on the + LAN. + +5. Traffic Services + + Several services are provided for the benefit of different system + types and user configurations. These include LAN Frame Checksum + Preservation, LAN Frame Checksum Generation, Tinygram Compression, + and the identification of closed sets of LANs. + +5.1. LAN Frame Checksum Preservation + + IEEE 802.1 stipulates that the Extended LAN must enjoy the same + probability of undetected error that an individual LAN enjoys. + Although there has been considerable debate concerning the algorithm, + no other algorithm has been proposed than having the LAN Frame + Checksum received by the ultimate receiver be the same value + calculated by the original transmitter. Achieving this requires, of + course, that the line protocols preserve the LAN Frame Checksum from + end to end. The protocol is optimized towards this approach. + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 5] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + +5.2. Traffic having no LAN Frame Checksum + + The fact that the protocol is optimized towards LAN Frame Checksum + preservation raises twin questions: "What is the approach to be used + by systems which, for whatever reason, cannot easily support Frame + Checksum preservation?" and "What is the approach to be used when the + system originates a message, which therefore has no Frame Checksum + precalculated?". + + Surely, one approach would be to require stations to calculate the + Frame Checksum in software if hardware support were unavailable; this + would meet with profound dismay, and would raise serious questions of + interpretation in a Bridge/Router. + + However, stations which implement LAN Frame Checksum preservation + must already solve this problem, as they do originate traffic. + Therefore, the solution adopted is that messages which have no Frame + Checksum are tagged and carried across the line. + + When a system which does not implement LAN Frame Checksum + preservation receives a frame having an embedded FCS, it converts it + for its own use by removing the trailing four octets. When any + system forwards a frame which contains no embedded FCS to a LAN, it + forwards it in a way which causes the FCS to be calculated. + +5.3. Tinygram Compression + + An issue in remote Ethernet bridging is that the protocols that are + most attractive to bridge are prone to problems on low speed (64 KBPS + and below) lines. This can be partially alleviated by observing that + the vendors defining these protocols often fill the PDU with octets + of ZERO. Thus, an Ethernet or IEEE 802.3 PDU received from a line + that is (1) smaller than the minimum PDU size, and (2) has a LAN + Frame Checksum present, must be padded by inserting zeroes between + the last four octets and the rest of the PDU before transmitting it + on a LAN. These protocols are frequently used for interactive + sessions, and therefore are frequently this small. + + To prevent ambiguity, PDUs requiring padding are explicitly tagged. + Compression is at the option of the transmitting station, and is + probably performed only on low speed lines, perhaps under + configuration control. + + The pseudo-code in Figure 1 describes the algorithms. + + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 6] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + +5.4. LAN Identification + + In some applications, it is useful to tag traffic by the user + community it is a part of, and guarantee that it will be only emitted + onto a LAN which is of the same community. The user community is + defined by a LAN ID. Systems which choose to not implement this + feature must assume that any frame received having a LAN ID is from a + different community than theirs, and discard it. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 7] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + +Figure 1: Tinygram Compression Pseudo-Code + +PPP Transmitter: + +if (ZeroPadCompressionEnabled && + BridgedProtocolHeaderFormat == IEEE8023 && + PacketLength == Minimum8023PacketLength) { + /* + * Remove any continuous run of zero octets preceding, + * but not including, the LAN FCS, but not extending + * into the MAC header. + */ + Set (ZeroCompressionFlag); /* Signal receiver */ + if (is_Set (LAN_FCS_Present)) { + FCS = TrailingOctets (PDU, 4); /* Store FCS */ + RemoveTrailingOctets (PDU, 4); /* Remove FCS */ + while (PacketLength > 14 && /* Stop at MAC header */ + TrailingOctet (PDU) == 0) /* or last non-zero octet */ + RemoveTrailingOctets (PDU, 1);/* Remove zero octet */ + Appendbuf (PDU, 4, FCS); /* Restore FCS */ + } + else { + while (PacketLength > 14 && /* Stop at MAC header */ + TrailingOctet (PDU) == 0) /* or last zero octet */ + RemoveTrailingOctets (PDU, 1);/* Remove zero octet */ + } +} + +PPP Receiver: + +if (ZeroCompressionFlag) { /* Flag set in header? */ + /* Restoring packet to minimum 802.3 length */ + Clear (ZeroCompressionFlag); + if (is_Set (LAN_FCS_Present)) { + FCS = TrailingOctets (PDU, 4); /* Store FCS */ + RemoveTrailingOctets (PDU, 4); /* Remove FCS */ + Appendbuf (PDU, 60 - PacketLength, zeroes);/* Add zeroes */ + Appendbuf (PDU, 4, FCS); /* Restore FCS */ + } + else { + Appendbuf (PDU, 60 - PacketLength, zeroes);/* Add zeroes */ + } +} + + + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 8] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + +6. Protocol Data Unit Formats + +6.1. Common LAN Traffic + + Figure 2: 802.3 Frame format + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+ + | HDLC FLAG | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 0xFF | 0x03 | 0x00 | 0x31 + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |F|I|Z|0| Count | MAC Type | LAN ID high word (optional) + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | LAN ID low word (optional) | Destination MAC Address + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Destination MAC Address + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Source MAC Address + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Source MAC Address | Length/Type + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | LLC data + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | ... + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | LAN FCS (optional) + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | potential line protocol pad + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | HDLC CRC | HDLC FLAG | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + For Bridging LAN traffic, the format of the frame on the line is as + shown in Figures 2 or 3. This conforms to RFC 1171 section 3.1 + "Frame Format". It also allows for RFC 1172 [2] negotiation of + Protocol Field Compression and Address and Control Field Compression. + It is recommended that devices which use controllers that require + even memory addresses negotiate to NOT USE Protocol Field Compression + on other than low speed links. + + + + + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 9] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + Figure 3: 802.4/802.5/FDDI Frame format + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+ + | HDLC FLAG | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 0xFF | 0x03 | 0x00 | 0x31 + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + |F|I|Z|0| Count | MAC Type | LAN ID high word (optional) + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | LAN ID low word (optional) | Pad Byte | Frame Control + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Destination MAC Address + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Destination MAC Address | Source MAC Address + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | Source MAC Address + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | LLC data + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | ... + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | FCS (optional) + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | optional Data Link Layer padding + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | HDLC CRC | HDLC FLAG | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + +The fields of this message are as follows: + +Address Field and Control Field: + As defined by RFC 1171 + +Protocol Field: + 0x0031 + +Flags: + bits 0-3: length of the line protocol pad field. + bit 4: Reserved, Set to Zero + bit 5: Set if IEEE 802.3 Pad must be zero filled to minimum size + bit 6: Set if the LAN ID Field is present + bit 7: Set if the LAN FCS Field is present + + The "number of trailing "pad" octets is a deference to the fact + that any point-to-point frame may have padding at the end. This + + + +Point-to-Point Protocol Extensions Working Group [Page 10] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + number tells the receiving system how many octets to strip off the + end. + +MAC Type: + 0: Reserved + 1: IEEE 802.3/Ethernet + 2: IEEE 802.4 + 3: IEEE 802.5 + 4: FDDI + other: Assigned by the Internet Assigned Numbers Authority + +LAN ID: + This optional 32 bit field identifies the Community of LANs which + may be interested to receive this frame, as described in section + 5.4. If the LAN ID flag is not set, then this field is not + present, and the PDU is four octets shorter. + +Frame Control: + On 802.4, 802.5, and FDDI LANs, there are a few octets preceding + the Destination MAC Address, one of which is protected by the FCS. + Since the MAC Type field defines the bit ordering, these are sent + in MAC order. A pad octet is present to avoid odd machine address + boundary problems. + +Destination MAC Address: + As defined by the IEEE. Since the MAC Type field defines the bit + ordering, this is sent in MAC order. + +Source MAC Address: + As defined by the IEEE. Since the MAC Type field defines the bit + ordering, this is sent in MAC order. + +LLC data: + This is the remainder of the MAC frame. This is that portion of + the frame which is (or would be were it present) protected by the + LAN FCS; for example, the 802.5 Access Control field, and Status + Trailer are not meaningful to transmit to another ring, and are + omitted. + +LAN Frame Checksum: + If present, this is the LAN FCS which was calculated by (or which + appears to have been calculated by) the originating station. If + the FCS Present flag is not set, then this field is not present, + and the PDU is four octets shorter. + +Optional Data Link Layer Padding + RFC 1171 specifies that an arbitrary pad can be added after the + data intended for transmission. The "Count" portion of the flag + + + +Point-to-Point Protocol Extensions Working Group [Page 11] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + field contains the length of this pad, which may not exceed 15 + octets. + +CRC-CCITT + Mentioned primarily for clarity. The CRC used on the PPP link is + separate from and unrelated to the LAN FCS. + +6.2. IEEE 802.1 Bridge + + This is the BPDU as defined by IEEE 802.1(d), without any MAC or + 802.2 LLC header (these being functionally equivalent to the Address, + Control, and Protocol Fields). The LAN Pad and Frame Checksum fields + are likewise superfluous and absent. The Address and Control Fields + are optional, subject to the Address and Control Field Compression + negotiation. + + Figure 4: Bridge "Hello" PDU + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+ + | HDLC FLAG | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | 0xFF | 0x03 | 0x02 | 0x01 + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | BPDU data + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | ... + + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | HDLC CRC | HDLC FLAG | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + The fields of this message are as follows: + + Address Field and Control Field: + As defined by RFC 1171 + + Protocol Field: + 0x0201 + + MAC Frame: + 802.1(d) BPDU + + + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 12] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + +6.3. IEEE 802 Network Control Protocol + + The Bridge Network Control Protocol is responsible for configuring, + enabling, and disabling the bridges on both ends of the point-to- + point link. As with the Link Control Protocol, this is accomplished + through an exchange of packets. BNCP packets may not be exchanged + until LCP has reached the network-layer Protocol Configuration + Negotiation phase. Likewise, LAN traffic may not be exchanged until + BNCP has first opened the connection. + + The Bridge Network Control Protocol is exactly the same as the Point- + to-Point Link Control Protocol with the following exceptions: + + Data Link Layer Protocol Field + Exactly one Bridge Network Control Protocol packet is encapsulated + in the Information field of PPP Data Link Layer frames where the + Protocol field indicates type hex 8031 (BNCP). + + Code field + Only Codes 1 through 7 (Configure-Request, Configure-Ack, + Configure-Nak, Configure-Reject, Terminate-Request, + Terminate-Ack and Code-Reject) are used. Other Codes should + be treated as unrecognized and should result in Code-Rejects. + + Timeouts + BNCP packets may not be exchanged until the Link Control + Protocol has reached the network-layer Protocol Configuration + Negotiation phase. An implementation should be prepared to wait + for Link Quality testing to finish before timing out waiting + for Configure-Ack or other response. + + Configuration Option Types + The Bridge Network Control Protocol has a separate set of + Configuration Options. These permit the negotiation of the + following items: + + - MAC Types supported + - Tinygram Compression support + - LAN Identification support + - Ring and Bridge Identification + +6.4. IEEE 802.5 Remote Ring Identification Option + + Since the Remote Bridges are modeled as normal Bridges with a strange + internal interface, each bridge needs to know the ring/bridge numbers + of the bridges it is adjacent to. This is the subject of a Link + Negotiation. The exchange of ring-and-bridge identifiers is done + using this option on the Network Control Protocol. + + + +Point-to-Point Protocol Extensions Working Group [Page 13] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + The Token Ring Ring-and-Bridge Identifier, and its use, is specified + by the IEEE 802.5 Addendum on Source Routing. It identifies the ring + that the interface is attached to by its configured ring number, and + itself by bridge number on the ring. + + Figure 5: Remote Ring Identification Option + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | type=1 |length = 4 | ring number |bridge#| + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + Type 1 = IEEE 802.5 Source Routing Ring/Bridge Identifier + + Length + 4 Octets + + Ring Number + A 12 bit number identifying the token ring, as defined in the + IEEE 802.5 Source Routing Specification. + + Bridge Number + A 4 bit number identifying the bridge on the token ring, as + defined in the IEEE 802.5 Source Routing Specification. + +6.5. IEEE 802.5 Line Identification Option + + This option permits the systems to treat the line as a visible "Token + Ring", in accordance with the Source Routing algorithm. The bridges + exchange ring-and-bridge identifiers using this option on the Network + Control Protocol. The configured ring numbers must be identical in + normal operation. + + The Token Ring Ring-and-Bridge Identifier, and its use, is specified + by the IEEE 802.5 Addendum on Source Routing. It identifies the ring + that the interface is attached to by its configured ring number, and + itself by bridge number on the ring. + + Figure 6: Line Identification Option + + 0 1 2 3 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | type=2 |length = 4 | ring number |bridge#| + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + + +Point-to-Point Protocol Extensions Working Group [Page 14] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + Type 2 = IEEE 802.5 Line "Ring/Bridge" Identifier + + Length + 4 Octets + + Ring Number + A 12 bit number identifying the line, as defined in the + IEEE 802.5 Source Routing Specification. + + Bridge Number + A 4 bit number identifying the bridge on the token ring, as + defined in the IEEE 802.5 Source Routing Specification. + +6.6. MAC Type Support Selection + + The MAC Type Selection Option is provided to permit nodes to + advertise what sort of traffic they are prepared to convey. A device + negotiating a 1600 octet MRU, for example, may not be willing to + support 802.5 (although it might, with certain changes necessary in + the RIFs it passes, and given that the hosts it supports implement + the 802.5 Maximum Frame Size correctly), and is definitely not + prepared to support 802.4 or FDDI. + + A system which does not announce the MAC Types that it supports may + be assumed to support all MAC Types; it will discard those that it + does not understand. A system which chooses to announce MAC Types is + advising its neighbor that all unspecified MAC Types will be + discarded. Announcement of multiple MAC Types is accomplished by + placing multiple options in the Configure Request. + + The Rejection of a MAC Type Announcement (in a Configure-Reject) is + essentially a statement that traffic appropriate to the MAC Type, if + encountered, will be forwarded on the link even though the receiving + system has indicated it will discard it. + + Figure 7: MAC Type Selection Option + + 0 1 2 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | type=3 |length = 3 | MAC Type | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + Type 3 = MAC Type Selector + + Length + 3 Octets + + + +Point-to-Point Protocol Extensions Working Group [Page 15] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + MAC Type Selector + One of the values of the PDU's MAC Type Field that this system is + prepared to receive and service. + +6.7. Tinygram Compression + + Not all systems are prepared to make modifications to messages in + transit; on high speed lines, it is probably not worth the effort. + This option permits the system to negotiate compression. + + Consistent with the behavior of other compression options in the + Internet Point-to-Point set of protocols, no negotiation implies no + compression. The systems need not agree on the setting of this + parameter; one may be willing to decompress and the other not. A + system which does not negotiate, or negotiates this option to be + disabled, should never receive a compressed packet, however. + + Figure 8: Tinygram Compression Option + + 0 1 2 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | type=4 |length = 3 | Compression | + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + Type 4 = Tinygram Compression Support Option + + Length + 3 Octets + + Compression Enable/Disable + If the value is 1, Tinygram Compression is enabled. If the + value is 2, Tinygram Compression is disabled, and no + decompression will occur. + +6.8. LAN Identification Support + + Not all systems are prepared to make use of the LAN Identification + field. This option enables the systems to negotiate its use. + + The parameter is advisory; if the value is "enabled", then there may + exist labeled LANs beyond the system, and the system is prepared to + service traffic to it. if the value is "disabled", then there are no + labeled LANs beyond the system, and all such traffic will by + definition be dropped. Therefore, a system which is advised that his + peer does not service LAN Identifications need not forward such + traffic on the link. + + + +Point-to-Point Protocol Extensions Working Group [Page 16] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + + The default value is that LAN Identification disabled. + + Figure 9: LAN Identification Option + + 0 1 2 + 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + | type=5 |length = 3 | Identification| + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + + + Type 5 = LAN Identification Support Option + + Length + 3 Octets + + Identification Enable/Disable + If the value is 1, LAN Identification is enabled. If the value + is 2, LAN Identification is disabled. + +7. Acknowledgements + + This document is a product of the Point-to-Point Protocol Extensions + Working Group. Special thanks go to Steve Senum of Network Systems, + Dino Farinacci of 3COM, and Rick Szmauz of Digital Equipment + Corporation. + +8. Bibliography + + [1] Perkins, D., "The Point-to-Point Protocol for the Transmission of + Multi-Protocol Datagrams Over Point-to-Point Links", RFC 1171, + CMU, July 1990. + + [2] Hobby R., and D. Perkins, "The Point-to-Point Protocol (PPP) + Initial Configuration Options", RFC 1172, CMU, UC Davis, July + 1990. + + [3] IEEE Draft Standard P802.1d/D9 MAC Bridges, Institute of + Electrical and Electronic Engineers. Also Published as ISO DIS + 10038, July 1989. + + [4] IEEE Draft Standard P802.5d/D13 Draft Addendum to ANSI/IEEE Std + 802.5-1988 Token Ring MAC and PHY Specification Enhancement for + Multiple-Ring Networks, Institute of Electrical and Electronic + Engineers, May 1989. + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 17] + +RFC 1220 Bridging Point-to-Point Protocol April 1991 + + +9. Security Considerations + + Security issues are not discussed in this memo. + +10. Author's Address + + Fred Baker + Advanced Computer Communications + 720 Santa Barbara Street + Santa Barbara, CA 93101 + + Phone: (805) 963-9431 + + EMail: fbaker@ACC.COM + Or send comments to: ietf-ppp@ucdavis.edu + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Point-to-Point Protocol Extensions Working Group [Page 18] +
\ No newline at end of file |