diff options
Diffstat (limited to 'doc/rfc/rfc1932.txt')
-rw-r--r-- | doc/rfc/rfc1932.txt | 1739 |
1 files changed, 1739 insertions, 0 deletions
diff --git a/doc/rfc/rfc1932.txt b/doc/rfc/rfc1932.txt new file mode 100644 index 0000000..9b15ee6 --- /dev/null +++ b/doc/rfc/rfc1932.txt @@ -0,0 +1,1739 @@ + + + + + + +Network Working Group R. Cole +Request for Comments: 1932 D. Shur +Category: Informational AT&T Bell Laboratories + C. Villamizar + ANS + April 1996 + + + IP over ATM: A Framework Document + +Status of this Memo + + This memo provides information for the Internet community. This memo + does not specify an Internet standard of any kind. Distribution of + this memo is unlimited. + + Abstract + + The discussions of the IP over ATM working group over the last + several years have produced a diverse set of proposals, some of which + are no longer under active consideration. A categorization is + provided for the purpose of focusing discussion on the various + proposals for IP over ATM deemed of primary interest by the IP over + ATM working group. The intent of this framework is to help clarify + the differences between proposals and identify common features in + order to promote convergence to a smaller and more mutually + compatible set of standards. In summary, it is hoped that this + document, in classifying ATM approaches and issues will help to focus + the IP over ATM working group's direction. + +1. Introduction + + The IP over ATM Working Group of the Internet Engineering Task Force + (IETF) is chartered to develop standards for routing and forwarding + IP packets over ATM sub-networks. This document provides a + classification/taxonomy of IP over ATM options and issues and then + describes various proposals in these terms. + + The remainder of this memorandum is organized as follows: + + o Section 2 defines several terms relating to networking and + internetworking. + + o Section 3 discusses the parameters for a taxonomy of the + different ATM models under discussion. + + o Section 4 discusses the options for low level encapsulation. + + + + +Cole, Shur & Villamizar Informational [Page 1] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + o Section 5 discusses tradeoffs between connection oriented and + connectionless approaches. + + o Section 6 discusses the various means of providing direct + connections across IP subnet boundaries. + + o Section 7 discusses the proposal to extend IP routing to better + accommodate direct connections across IP subnet boundaries. + + o Section 8 identifies several prominent IP over ATM proposals that + have been discussed within the IP over ATM Working Group and + their relationship to the framework described in this document. + + o Section 9 addresses the relationship between the documents + developed in the IP over ATM and related working groups and the + various models discussed. + +2. Definitions and Terminology + + We define several terms: + + A Host or End System: A host delivers/receives IP packets to/from + other systems, but does not relay IP packets. + + A Router or Intermediate System: A router delivers/receives IP + packets to/from other systems, and relays IP packets among + systems. + + IP Subnet: In an IP subnet, all members of the subnet are able to + transmit packets to all other members of the subnet directly, + without forwarding by intermediate entities. No two subnet + members are considered closer in the IP topology than any other. + From an IP routing and IP forwarding standpoint a subnet is + atomic, though there may be repeaters, hubs, bridges, or switches + between the physical interfaces of subnet members. + + Bridged IP Subnet: A bridged IP subnet is one in which two or + more physically disjoint media are made to appear as a single IP + subnet. There are two basic types of bridging, media access + control (MAC) level, and proxy ARP (see section 6). + + A Broadcast Subnet: A broadcast network supports an arbitrary + number of hosts and routers and additionally is capable of + transmitting a single IP packet to all of these systems. + + A Multicast Capable Subnet: A multicast capable subnet supports + a facility to send a packet which reaches a subset of the + destinations on the subnet. Multicast setup may be sender + + + +Cole, Shur & Villamizar Informational [Page 2] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + initiated, or leaf initiated. ATM UNI 3.0 [4] and UNI 3.1 + support only sender initiated while IP supports leaf initiated + join. UNI 4.0 will support leaf initiated join. + + A Non-Broadcast Multiple Access (NBMA) Subnet: An NBMA supports + an arbitrary number of hosts and routers but does not + natively support a convenient multi-destination connectionless + transmission facility, as does a broadcast or multicast capable + subnetwork. + + An End-to-End path: An end-to-end path consists of two hosts which + can communicate with one another over an arbitrary number of + routers and subnets. + + An internetwork: An internetwork (small "i") is the concatenation + of networks, often of various different media and lower level + encapsulations, to form an integrated larger network supporting + communication between any of the hosts on any of the component + networks. The Internet (big "I") is a specific well known + global concatenation of (over 40,000 at the time of writing) + component networks. + + IP forwarding: IP forwarding is the process of receiving a packet + and using a very low overhead decision process determining how + to handle the packet. The packet may be delivered locally + (for example, management traffic) or forwarded externally. For + traffic that is forwarded externally, the IP forwarding process + also determines which interface the packet should be sent out on, + and if necessary, either removes one media layer encapsulation + and replaces it with another, or modifies certain fields in the + media layer encapsulation. + + IP routing: IP routing is the exchange of information that takes + place in order to have available the information necessary to + make a correct IP forwarding decision. + + IP address resolution: A quasi-static mapping exists between IP + address on the local IP subnet and media address on the local + subnet. This mapping is known as IP address resolution. + An address resolution protocol (ARP) is a protocol supporting + address resolution. + + In order to support end-to-end connectivity, two techniques are used. + One involves allowing direct connectivity across classic IP subnet + boundaries supported by certain NBMA media, which includes ATM. The + other involves IP routing and IP forwarding. In essence, the former + technique is extending IP address resolution beyond the boundaries of + the IP subnet, while the latter is interconnecting IP subnets. + + + +Cole, Shur & Villamizar Informational [Page 3] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + Large internetworks, and in particular the Internet, are unlikely to + be composed of a single media, or a star topology, with a single + media at the center. Within a large network supporting a common + media, typically any large NBMA such as ATM, IP routing and IP + forwarding must always be accommodated if the internetwork is larger + than the NBMA, particularly if there are multiple points of + interconnection with the NBMA and/or redundant, diverse + interconnections. + + Routing information exchange in a very large internetwork can be + quite dynamic due to the high probability that some network elements + are changing state. The address resolution space consumption and + resource consumption due to state change, or maintenance of state + information is rarely a problem in classic IP subnets. It can become + a problem in large bridged networks or in proposals that attempt to + extend address resolution beyond the IP subnet. Scaling properties + of address resolution and routing proposals, with respect to state + information and state change, must be considered. + +3. Parameters Common to IP Over ATM Proposals + + In some discussion of IP over ATM distinctions have made between + local area networks (LANs), and wide area networks (WANs) that do not + necessarily hold. The distinction between a LAN, MAN and WAN is a + matter of geographic dispersion. Geographic dispersion affects + performance due to increased propagation delay. + + LANs are used for network interconnections at the the major Internet + traffic interconnect sites. Such LANs have multiple administrative + authorities, currently exclusively support routers providing transit + to multihomed internets, currently rely on PVCs and static address + resolution, and rely heavily on IP routing. Such a configuration + differs from the typical LANs used to interconnect computers in + corporate or campus environments, and emphasizes the point that prior + characterization of LANs do not necessarily hold. Similarly, WANs + such as those under consideration by numerous large IP providers, do + not conform to prior characterizations of ATM WANs in that they have + a single administrative authority and a small number of nodes + aggregating large flows of traffic onto single PVCs and rely on IP + routers to avoid forming congestion bottlenecks within ATM. + + The following characteristics of the IP over ATM internetwork may be + independent of geographic dispersion (LAN, MAN, or WAN). + + o The size of the IP over ATM internetwork (number of nodes). + + o The size of ATM IP subnets (LIS) in the ATM Internetwork. + + + + +Cole, Shur & Villamizar Informational [Page 4] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + o Single IP subnet vs multiple IP subnet ATM internetworks. + + o Single or multiple administrative authority. + + o Presence of routers providing transit to multihomed internets. + + o The presence or absence of dynamic address resolution. + + o The presence or absence of an IP routing protocol. + +IP over ATM should therefore be characterized by: + + o Encapsulations below the IP level. + + o Degree to which a connection oriented lower level is available + and utilized. + + o Type of address resolution at the IP subnet level (static or + dynamic). + + o Degree to which address resolution is extended beyond the IP + subnet boundary. + + o The type of routing (if any) supported above the IP level. + +ATM-specific attributes of particular importance include: + + o The different types of services provided by the ATM Adaptation + Layers (AAL). These specify the Quality-of-Service, the + connection-mode, etc. The models discussed within this document + assume an underlying connection-oriented service. + + o The type of virtual circuits used, i.e., PVCs versus SVCs. The + PVC environment requires the use of either static tables for + ATM-to-IP address mapping or the use of inverse ARP, while the + SVC environment requires ARP functionality to be provided. + + o The type of support for multicast services. If point-to-point + services only are available, then a server for IP multicast is + required. If point-to-multipoint services are available, then + IP multicast can be supported via meshes of point-to-multipoint + connections (although use of a server may be necessary due to + limits on the number of multipoint VCs able to be supported or to + maintain the leaf initiated join semantics). + + o The presence of logical link identifiers (VPI/VCIs) and the + various information element (IE) encodings within the ATM SVC + signaling specification, i.e., the ATM Forum UNI version 3.1. + + + +Cole, Shur & Villamizar Informational [Page 5] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + This allows a VC originator to specify a range of "layer" + entities as the destination "AAL User". The AAL specifications + do not prohibit any particular "layer X" from attaching + directly to a local AAL service. Taken together these points + imply a range of methods for encapsulation of upper layer + protocols over ATM. For example, while LLC/SNAP encapsulation is + one approach (the default), it is also possible to bind virtual + circuits to higher level entities in the TCP/IP protocol stack. + Some examples of the latter are single VC per protocol binding, + TULIP, and TUNIC, discussed further in Section 4. + + o The number and type of ATM administrative domains/networks, and + type of addressing used within an administrative domain/network. + In particular, in the single domain/network case, all attached + systems may be safely assumed to be using a single common + addressing format, while in the multiple domain case, attached + stations may not all be using the same common format, + with corresponding implications on address resolution. (See + Appendix A for a discussion of some of the issues that arise + when multiple ATM address formats are used in the same logical + IP subnet (LIS).) Also security/authentication is much more of a + concern in the multiple domain case. + + IP over ATM proposals do not universally accept that IP routing over + an ATM network is required. Certain proposals rely on the following + assumptions: + + o The widespread deployment of ATM within premises-based networks, + private wide-area networks and public networks, and + + o The definition of interfaces, signaling and routing protocols + among private ATM networks. + + The above assumptions amount to ubiquitous deployment of a seamless + ATM fabric which serves as the hub of a star topology around which + all other media is attached. There has been a great deal of + discussion over when, if ever, this will be a realistic assumption + for very large internetworks, such as the Internet. Advocates of + such approaches point out that even if these are not relevant to very + large internetworks such as the Internet, there may be a place for + such models in smaller internetworks, such as corporate networks. + + The NHRP protocol (Section 8.2), not necessarily specific to ATM, + would be particularly appropriate for the case of ubiquitous ATM + deployment. NHRP supports the establishment of direct connections + across IP subnets in the ATM domain. The use of NHRP does not + require ubiquitous ATM deployment, but currently imposes topology + constraints to avoid routing loops (see Section 7). Section 8.2 + + + +Cole, Shur & Villamizar Informational [Page 6] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + describes NHRP in greater detail. + + The Peer Model assumes that internetwork layer addresses can be + mapped onto ATM addresses and vice versa, and that reachability + information between ATM routing and internetwork layer routing can be + exchanged. This approach has limited applicability unless ubiquitous + deployment of ATM holds. The peer model is described in Section 8.4. + + The Integrated Model proposes a routing solution supporting an + exchange of routing information between ATM routing and higher level + routing. This provides timely external routing information within + the ATM routing and provides transit of external routing information + through the ATM routing between external routing domains. Such + proposals may better support a possibly lengthy transition during + which assumptions of ubiquitous ATM access do not hold. The + Integrated Model is described in Section 8.5. + + The Multiprotocol over ATM (MPOA) Sub-Working Group was formed by the + ATM Forum to provide multiprotocol support over ATM. The MPOA effort + is at an early stage at the time of this writing. An MPOA baseline + document has been drafted, which provides terminology for further + discussion of the architecture. This document is available from the + FTP server ftp.atmforum.com in pub/contributions as the file atm95- + 0824.ps or atm95-0824.txt. + +4. Encapsulations and Lower Layer Identification + + Data encapsulation, and the identification of VC endpoints, + constitute two important issues that are somewhat orthogonal to the + issues of network topology and routing. The relationship between + these two issues is also a potential sources of confusion. In + conventional LAN technologies the 'encapsulation' wrapped around a + packet of data typically defines the (de)multiplexing path within + source and destination nodes (e.g. the Ethertype field of an + Ethernet packet). Choice of the protocol endpoint within the + packet's destination node is essentially carried 'in-band'. + + As the multiplexing is pushed towards ATM and away from LLC/SNAP + mechanism, a greater burden will be placed upon the call setup and + teardown capacity of the ATM network. This may result in some + questions being raised regarding the scalability of these lower level + multiplexing options. + + With the ATM Forum UNI version 3.1 service the choice of endpoint + within a destination node is made 'out of band' - during the Call + Setup phase. This is quite independent of any in-band encapsulation + mechanisms that may be in use. The B-LLI Information Element allows + Layer 2 or Layer 3 entities to be specified as a VC's endpoint. When + + + +Cole, Shur & Villamizar Informational [Page 7] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + faced with an incoming SETUP message the Called Party will search + locally for an AAL User that claims to provide the service of the + layer specified in the B-LLI. If one is found then the VC will be + accepted (assuming other conditions such as QoS requirements are also + met). + + An obvious approach for IP environments is to simply specify the + Internet Protocol layer as the VCs endpoint, and place IP packets + into AAL--SDUs for transmission. This is termed 'VC multiplexing' or + 'Null Encapsulation', because it involves terminating a VC (through + an AAL instance) directly on a layer 3 endpoint. However, this + approach has limitations in environments that need to support + multiple layer 3 protocols between the same two ATM level endpoints. + Each pair of layer 3 protocol entities that wish to exchange packets + require their own VC. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 8] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + RFC-1483 [6] notes that VC multiplexing is possible, but focuses on + describing an alternative termed 'LLC/SNAP Encapsulation'. This + allows any set of protocols that may be uniquely identified by an + LLC/SNAP header to be multiplexed onto a single VC. Figure 1 shows + how this works for IP packets - the first 3 bytes indicate that the + payload is a Routed Non-ISO PDU, and the Organizationally Unique + Identifier (OUI) of 0x00-00-00 indicates that the Protocol Identifier + (PID) is derived from the EtherType associated with IP packets + (0x800). ARP packets are multiplexed onto a VC by using a PID of + 0x806 instead of 0x800. + .---------------. + : : + : IP Packet : + : : + --------------- + : : + : : + 8 byte header V V + .-------------.-------------.------------.---------------. + : : : : : + : : : : Encapsulated : + : 0xAA-AA-03 : 0x00-00-00 : 0x08-00 : Payload : + : : : : : + -------------^-------------^------------^--------------- + : : : : + : (LLC) (OUI) (PID) : : : + V V V V + .----------------------------------------------------------. + : : + : AAL SDU : + : : + ---------------------------------------------------------- + Figure 1: IP packet encapsulated in an AAL5 SDU + + + + + + + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 9] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + .----------. .----------. .---------. .----------. + : : : : : : : : + : IP : : ARP : :AppleTalk: : etc... : + : : : : : : : : + ---------- ---------- --------- ---------- + ^ : ^ : ^ : ^ : + : : : : : : : : + : V : V : V : V + .-----------------------------------------------------------. + : : + : 0x800 0x806 0x809 other : + : : + : Instance of layer using LLC/SNAP header to : + : perform multiplexing/demultiplexing : + : : + ----------------------------------------------------------- + ^ : + : : + : V + .------------------. + : : + : Instance of AAL5 : + : terminating : + : one VCC : + : : + ------------------ + + Figure 2: LLC/SNAP encapsulation allows more than just + IP or ARP per VC. + + Whatever layer terminates a VC carrying LLC/SNAP encapsulated traffic + must know how to parse the AAL--SDUs in order to retrieve the + packets. The recently approved signalling standards for IP over ATM + are more explicit, noting that the default SETUP message used to + establish IP over ATM VCs must carry a B-LLI specifying an ISO 8802/2 + Layer 2 (LLC) entity as each VCs endpoint. More significantly, there + is no information carried within the SETUP message about the identity + of the layer 3 protocol that originated the request - until the + packets begin arriving the terminating LLC entity cannot know which + one or more higher layers are packet destinations. + + Taken together, this means that hosts require a protocol entity to + register with the host's local UNI 3.1 management layer as being an + LLC entity, and this same entity must know how to handle and generate + LLC/SNAP encapsulated packets. The LLC entity will also require + mechanisms for attaching to higher layer protocols such as IP and + ARP. Figure 2 attempts to show this, and also highlights the fact + that such an LLC entity might support many more than just IP and ARP. + + + +Cole, Shur & Villamizar Informational [Page 10] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + In fact the combination of RFC 1483 LLC/SNAP encapsulation, LLC + entities terminating VCs, and suitable choice of LLC/SNAP values, can + go a long way towards providing an integrated approach to building + multiprotocol networks over ATM. + + The processes of actually establishing AAL Users, and identifying + them to the local UNI 3.1 management layers, are still undefined and + are likely to be very dependent on operating system environments. + + Two encapsulations have been discussed within the IP over ATM working + group which differ from those given in RFC-1483 [6]. These have the + characteristic of largely or totally eliminating IP header overhead. + These models were discussed in the July 1993 IETF meeting in + Amsterdam, but have not been fully defined by the working group. + + TULIP and TUNIC assume single hop reachability between IP entities. + Following name resolution, address resolution, and SVC signaling, an + implicit binding is established between entities in the two hosts. + In this case full IP headers (and in particular source and + destination addresses) are not required in each data packet. + + o The first model is "TCP and UDP over Lightweight IP" (TULIP) + in which only the IP protocol field is carried in each packet, + everything else being bound at call set-up time. In this + case the implicit binding is between the IP entities in each + host. Since there is no further routing problem once the binding + is established, since AAL5 can indicate packet size, since + fragmentation cannot occur, and since ATM signaling will handle + exception conditions, the absence of all other IP header fields + and of ICMP should not be an issue. Entry to TULIP mode would + occur as the last stage in SVC signaling, by a simple extension + to the encapsulation negotiation described in RFC-1755 [10]. + + TULIP changes nothing in the abstract architecture of the IP + model, since each host or router still has an IP address which is + resolved to an ATM address. It simply uses the point-to-point + property of VCs to allow the elimination of some per-packet + overhead. The use of TULIP could in principle be negotiated on a + per-SVC basis or configured on a per-PVC basis. + + o The second model is "TCP and UDP over a Nonexistent IP + Connection" (TUNIC). In this case no network-layer information + is carried in each packet, everything being bound at virtual + circuit set-up time. The implicit binding is between two + applications using either TCP or UDP directly over AAL5 on a + dedicated VC. If this can be achieved, the IP protocol field has + no useful dynamic function. However, in order to achieve binding + between two applications, the use of a well-known port number + + + +Cole, Shur & Villamizar Informational [Page 11] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + in classical IP or in TULIP mode may be necessary during call + set-up. This is a subject for further study and would require + significant extensions to the use of SVC signaling described in + RFC-1755 [10]. + + Encapsulation In setup message Demultiplexing + -------------+--------------------------+------------------------ + SNAP/LLC _ nothing _ source and destination + _ _ address, protocol + _ _ family, protocol, ports + _ _ + NULL encaps _ protocol family _ source and destination + _ _ address, protocol, ports + _ _ + TULIP _ source and destination _ protocol, ports + _ address, protocol family _ + _ _ + TUNIC - A _ source and destination _ ports + _ address, protocol family _ + _ protocol _ + _ _ + TUNIC - B _ source and destination _ nothing + _ address, protocol family _ + _ protocol, ports _ + + + Table 1: Summary of Encapsulation Types + +TULIP/TUNIC can be presented as being on one end of a continuum opposite +the SNAP/LLC encapsulation, with various forms of null encapsulation +somewhere in the middle. The continuum is simply a matter of how much +is moved from in-stream demultiplexing to call setup demultiplexing. +The various encapsulation types are presented in Table 1. + +Encapsulations such as TULIP and TUNIC make assumptions with regard to +the desirability to support connection oriented flow. The tradeoffs +between connection oriented and connectionless are discussed in Section +5. + + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 12] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + +5. Connection Oriented and Connectionless Tradeoffs + +The connection oriented and connectionless approaches each offer +advantages and disadvantages. In the past, strong advocates of pure +connection oriented and pure connectionless architectures have argued +intensely. IP over ATM does not need to be purely connectionless or +purely connection oriented. + + APPLICATION Pure Connection Oriented Approach + ----------------+------------------------------------------------- + General _ Always set up a VC + _ + Short Duration _ Set up a VC. Either hold the packet during VC + UDP (DNS) _ setup or drop it and await a retransmission. + _ Teardown on a timer basis. + _ + Short Duration _ Set up a VC. Either hold packet(s) during VC + TCP (SMTP) _ setup or drop them and await retransmission. + _ Teardown on detection of FIN-ACK or on a timer + _ basis. + _ + Elastic (TCP) _ Set up a VC same as above. No clear method to + Bulk Transfer _ set QoS parameters has emerged. + _ + Real Time _ Set up a VC. QoS parameters are assumed to + (audio, video) _ precede traffic in RSVP or be carried in some + _ form within the traffic itself. + + + Table 2: Connection Oriented vs. Connectionless - a) a pure + connection oriented approach + +ATM with basic AAL 5 service is connection oriented. The IP layer +above ATM is connectionless. On top of IP much of the traffic is +supported by TCP, a reliable end-to-end connection oriented protocol. +A fundamental question is to what degree is it beneficial to map +different flows above IP into separate connections below IP. There is +a broad spectrum of opinion on this. + +As stated in section 4, at one end of the spectrum, IP would remain +highly connectionless and set up single VCs between routers which are +adjacent on an IP subnet and for which there was active traffic flow. +All traffic between the such routers would be multiplexed on a single +ATM VC. At the other end of the spectrum, a separate ATM VC would be +created for each identifiable flow. For every unique TCP or UDP +address and port pair encountered a new VC would be required. Part of +the intensity of early arguments has been over failure to recognize +that there is a middle ground. + + + +Cole, Shur & Villamizar Informational [Page 13] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + +ATM offers QoS and traffic management capabilities that are well +suited for certain types of services. It may be advantageous to use +separate ATM VC for such services. Other IP services such as DNS, are +ill suited for connection oriented delivery, due to their normal very +short duration (typically one packet in each direction). Short +duration transactions, even many using TCP, may also be poorly suited +for a connection oriented model due to setup and state overhead. ATM +QoS and traffic management capabilities may be poorly suited for +elastic traffic. + + APPLICATION Middle Ground + ----------------+------------------------------------------------- + General _ Use RSVP or other indication which clearly + _ indicate a VC is needed and what QoS parameters + _ are appropriate. + _ + Short Duration _ Forward hop by hop. RSVP is unlikely to precede + UDP (DNS) _ this type of traffic. + _ + Short Duration _ Forward hop by hop unless RSVP indicates + TCP (SMTP) _ otherwise. RSVP is unlikely to precede this + _ type of traffic. + _ + Elastic (TCP) _ By default hop by hop forwarding is used. + Bulk Transfer _ However, RSVP information, local configuration + _ about TCP port number usage, or a locally + _ implemented method for passing QoS information + _ from the application to the IP/ATM driver may + _ allow/suggest the establishment of direct VCs. + _ + Real Time _ Forward hop by hop unless RSVP indicates + (audio, video) _ otherwise. RSVP will indicate QoS requirements. + _ It is assumed RSVP will generally be used for + _ this case. A local decision can be made as to + _ whether the QoS is better served by a separate + _ VC. + + Table 3: Connection Oriented vs. Connectionless - b) a middle ground + approach + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 14] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + APPLICATION Pure Connectionless Approach + ----------------+------------------------------------------------- + General _ Always forward hop by hop. Use queueing + _ algorithms implemented at the IP layer to + _ support reservations such as those specified by + _ RSVP. + _ + Short Duration _ Forward hop by hop. + UDP (DNS) _ + _ + Short Duration _ Forward hop by hop. + TCP (SMTP) _ + _ + Elastic (TCP) _ Forward hop by hop. Assume ability of TCP to + Bulk Transfer _ share bandwidth (within a VBR VC) works as well + _ or better than ATM traffic management. + _ + Real Time _ Forward hop by hop. Assume that queueing + (audio, video) _ algorithms at the IP level can be designed to + _ work with sufficiently good performance + _ (e.g., due to support for predictive + _ reservation). + + + Table 4: Connection Oriented vs. Connectionless - c) a pure + connectionless approach + + Work in progress is addressing how QoS requirements might be + expressed and how the local decisions might be made as to whether + those requirements are best and/or most cost effectively accomplished + using ATM or IP capabilities. Table 2, Table 3, and Table 4 describe + typical treatment of various types of traffic using a pure connection + oriented approach, middle ground approach, and pure connectionless + approach. + + The above qualitative description of connection oriented vs + connectionless service serve only as examples to illustrate differing + approaches. Work in the area of an integrated service model, QoS and + resource reservation are related to but outside the scope of the IP + over ATM Work Group. This work falls under the Integrated Services + Work Group (int-serv) and Reservation Protocol Work Group (rsvp), and + will ultimately determine when direct connections will be + established. The IP over ATM Work Group can make more rapid progress + if concentrating solely on how direct connections are established. + + + + + + + +Cole, Shur & Villamizar Informational [Page 15] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + +6. Crossing IP Subnet Boundaries + + A single IP subnet will not scale well to a large size. Techniques + which extend the size of an IP subnet in other media include MAC + layer bridging, and proxy ARP bridging. + + MAC layer bridging alone does not scale well. Protocols such as ARP + rely on the media broadcast to exchange address resolution + information. Most bridges improve scaling characteristics by + capturing ARP packets and retaining the content, and distributing the + information among bridging peers. The ARP information gathered from + ARP replies is broadcast only where explicit ARP requests are made. + This technique is known as proxy ARP. + + Proxy ARP bridging improves scaling by reducing broadcast traffic, + but still suffers scaling problems. If the bridged IP subnet is part + of a larger internetwork, a routing protocol is required to indicate + what destinations are beyond the IP subnet unless a statically + configured default route is used. A default route is only applicable + to a very simple topology with respect to the larger internet and + creates a single point of failure. Because internets of enormous + size create scaling problems for routing protocols, the component + networks of such large internets are often partitioned into areas, + autonomous systems or routing domains, and routing confederacies. + + The scaling limits of the simple IP subnet require a large network to + be partitioned into smaller IP subnets. For NBMA media like ATM, + there are advantages to creating direct connections across the entire + underlying NBMA network. This leads to the need to create direct + connections across IP subnet boundaries. + + + + + + + + + + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 16] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + .----------. + ---------< Non-ATM : + .-------. / /-< Subnet >-\ + :Sub-ES >--/ : ---------- : + ------- : : + : : + .--^---. .--^---. + :Router: :Router: + -v-v-- -v-v-- + : : : : + .--------. : : .--------. : : .--------. + .-------. : >-/ \-< >-/ \-< : .-------. + :Sub-ES :---: Subnet :-----: Subnet :-----: Subnet :---:Sub-ES : + ------- : : : : : : ------- + -------- ---v---- -------- + : + .--^----. + :Sub-ES : + ------- + + Figure 3: A configuration with both ATM-based and non-ATM based + subnets. + + For example, figure 3 shows an end-to-end configuration consisting of + four components, three of which are ATM technology based, while the + fourth is a standard IP subnet based on non-ATM technology. End- + systems (either hosts or routers) attached to the ATM-based networks + may communicate either using the Classical IP model or directly via + ATM (subject to policy constraints). Such nodes may communicate + directly at the IP level without necessarily needing an intermediate + router, even if end-systems do not share a common IP-level network + prefix. Communication with end-systems on the non-ATM-based + Classical IP subnet takes place via a router, following the Classical + IP model (see Section 8.1 below). + + Many of the problems and issues associated with creating such direct + connections across subnet boundaries were originally being addressed + in the IETF's IPLPDN working group and the IP over ATM working group. + This area is now being addressed in the Routing over Large Clouds + working group. Examples of work performed in the IPLPDN working + group include short-cut routing (proposed by P. Tsuchiya) and + directed ARP RFC-1433 [5] over SMDS networks. The ROLC working group + has produced the distributed ARP server architectures and the NBMA + Address Resolution Protocol (NARP) [7]. The Next Hop Resolution + Protocol (NHRP) is still work in progress, though the ROLC WG is + considering advancing the current document. Questions/issues + specifically related to defining a capability to cross IP subnet + boundaries include: + + + +Cole, Shur & Villamizar Informational [Page 17] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + o How can routing be optimized across multiple logical IP subnets + over both a common ATM based and a non-ATM based infrastructure. + For example, in Figure 3, there are two gateways/routers between + the non-ATM subnet and the ATM subnets. The optimal path + from end-systems on any ATM-based subnet to the non ATM-based + subnet is a function of the routing state information of the two + routers. + + o How to incorporate policy routing constraints. + + o What is the proper coupling between routing and address + resolution particularly with respect to off-subnet communication. + + o What are the local procedures to be followed by hosts and + routers. + + o Routing between hosts not sharing a common IP-level (or L3) + network prefix, but able to be directly connected at the NBMA + media level. + + o Defining the details for an efficient address resolution + architecture including defining the procedures to be followed by + clients and servers (see RFC-1433 [5], RFC-1735 [7] and NHRP). + + o How to identify the need for and accommodate special purpose SVCs + for control or routing and high bandwidth data transfers. + + For ATM (unlike other NBMA media), an additional complexity in + supporting IP routing over these ATM internets lies in the + multiplicity of address formats in UNI 3.0 [4]. NSAP modeled address + formats only are supported on "private ATM" networks, while either 1) + E.164 only, 2) NSAP modeled formats only, or 3) both are supported on + "public ATM" networks. Further, while both the E.164 and NSAP + modeled address formats are to be considered as network points of + attachment, it seems that E.164 only networks are to be considered as + subordinate to "private networks", in some sense. This leads to some + confusion in defining an ARP mechanism in supporting all combinations + of end-to-end scenarios (refer to the discussion in Appendix A on the + possible scenarios to be supported by ARP). + +7. Extensions to IP Routing + + RFC-1620 [3] describes the problems and issues associated with direct + connections across IP subnet boundaries in greater detail, as well as + possible solution approaches. The ROLC WG has identified persistent + routing loop problems that can occur if protocols which lose + information critical to path vector routing protocol loop suppression + are used to accomplish direct connections across IP subnet + + + +Cole, Shur & Villamizar Informational [Page 18] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + boundaries. + + The problems may arise when a destination network which is not on the + NBMA network is reachable via different routers attached to the NBMA + network. This problem occurs with proposals that attempt to carry + reachability information, but do not carry full path attributes (for + path vector routing) needed for inter-AS path suppression, or full + metrics (for distance vector or link state routing even if path + vector routing is not used) for intra-AS routing. + + For example, the NHRP protocol may be used to support the + establishment of direct connections across subnetwork boundaries. + NHRP assumes that routers do run routing protocols (intra and/or + inter domain) and/or static routing. NHRP further assumes that + forwarding tables constructed by these protocols result in a steady + state loop-free forwarding. Note that these two assumptions do not + impose any additional requirements on routers, beyond what is + required in the absence of NHRP. + + NHRP runs in addition to routing protocols, and provides the + information that allows the elimination of multiple IP hops (the + multiple IP hops result from the forwarding tables constructed by the + routing protocols) when traversing an NBMA network. The IPATM and + ROLC WGs have both expended considerable effort in discussing and + coming to understand these limitations. + + It is well-known that truncating path information in Path Vector + protocols (e.g., BGP) or losing metric information in Distance Vector + protocols (e.g., RIP) could result in persistent forwarding loops. + These loops could occur without ATM and without NHRP. + + The combination of NHRP and static routing alone cannot be used in + some topologies where some of the destinations are served by multiple + routers on the NBMA. The combination of NHRP and an intra-AS routing + protocol that does not carry inter-AS routing path attributes alone + cannot be used in some topologies in which the NBMA will provide + inter-AS transit connectivity to destinations from other AS served by + multiple routers on the NBMA. + + Figure 4 provides an example of the routing loops that may be formed + in these circumstances. The example illustrates how the use of NHRP + in the environment where forwarding loops could exist even without + NHRP (due to either truncated path information or loss of metric + information) would still produce forwarding loops. + + There are many potential scenarios for routing loops. An example is + given in Figure 4. It is possible to produce a simpler example where + a loop can form. The example in Figure 4 illustrates a loop which + + + +Cole, Shur & Villamizar Informational [Page 19] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + will persist even if the protocol on the NBMA supports redirects or + can invalidate any route which changes in any way, but does not + support the communication of full metrics or path attributes. + + .----. .----. + : H1 >----< S1 : Notes: + ---- vvvv H#n == host #n + / : \ R#n == router #n + / : \ S#n == subnet #n + /------/ : \ + : : \ S2 to R3 breaks + .--^---. .----. .-^--. + : : : R4 : : R6 : + : NBMA : --v- --v- See the text for + : : : : details of the + -v--v- = = looping conditions + : \ = SLOW = and mechanisms + : .-^--. = LINK = + : : R2 : = = + : --v- : : + : : .--^-. .--^-. + .-^--. : : R5 : : R7 : + : R8 : : --v- --v- + --v- \ : : + : \ / : + \ .-^^-. .--^-. + \ : S2 : : S4 : + \ --v- --v- + \ \ / + \ \ / + \ .^--^. + \ : R3 : path before the break is + \ -v-- H1->S1->R1->NBMA->R2->S2->R3->H2 + \ / + .----. .-^^-. path after the break is + : H2 >---< S3 : H1->S1->R1->NBMA->R2->S2->R5->R4->S1 + ---- ---- \------<--the-loop--<-------/ + + Figure 4: A Routing Loop Due to Lost PV Routing Attributes. + + In the example in Figure 4, Host 1 is sending traffic toward Host 2. + In practice, host routes would not be used, so the destination for + the purpose of routing would be Subnet 3. The traffic travels by way + of Router 1 which establishes a "cut-through" SVC to the NBMA next- + hop, shown here as Router 2. Router 2 forwards traffic destined for + Subnet 3 through Subnet 2 to Router 3. Traffic from Host 1 would + then reach Host 2. + + + + +Cole, Shur & Villamizar Informational [Page 20] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + Router 1's cut-through routing implementation caches an association + between Host 2's IP address (or more likely all of Subnet 3) and + Router 2's NBMA address. While the cut-through SVC is still up, Link + 1 fails. Router 5 loses it's preferred route through Router 3 and + must direct traffic in the other direction. Router 2 loses a route + through Router 3, but picks up an alternate route through Router 5. + Router 1 is still directing traffic toward Router 2 and advertising a + means of reaching Subnet 3 to Subnet 1. Router 5 and Router 2 will + see a route, creating a loop. + + This loop would not form if path information normally carried by + interdomain routing protocols such as BGP and IDRP were retained + across the NBMA. Router 2 would reject the initial route from Router + 5 due to the path information. When Router 2 declares the route to + Subnet 3 unreachable, Router 1 withdraws the route from routing at + Subnet 1, leaving the route through Router 4, which would then reach + Router 5, and would reach Router 2 through both Router 1 and Router + 5. Similarly, a link state protocol would not form such a loop. + + Two proposals for breaking this form of routing loop have been + discussed. Redirect in this example would have no effect, since + Router 2 still has a route, just has different path attributes. A + second proposal is that is that when a route changes in any way, the + advertising NBMA cut-through router invalidates the advertisement for + some time period. This is similar to the notion of Poison Reverse in + distance vector routing protocols. In this example, Router 2 would + eventually readvertise a route since a route through Router 6 exists. + When Router 1 discovers this route, it will advertise it to Subnet 1 + and form the loop. Without path information, Router 1 cannot + distinguish between a loop and restoration of normal service through + the link L1. + + The loop in Figure 4 can be prevented by configuring Router 4 or + Router 5 to refuse to use the reverse path. This would break backup + connectivity through Router 8 if L1 and L3 failed. The loop can also + be broken by configuring Router 2 to refuse to use the path through + Router 5 unless it could not reach the NBMA. Special configuration of + Router 2 would work as long as Router 2 was not distanced from Router + 3 and Router 5 by additional subnets such that it could not determine + which path was in use. If Subnet 1 is in a different AS or RD than + Subnet 2 or Subnet 4, then the decision at Router 2 could be based on + path information. + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 21] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + .--------. .--------. + : Router : : Router : + --v-v--- ---v-v-- + : : : : + .--------. .--------. : : .--------. : : .--------. .--------. + : Sub-ES :---: Subnet :-/ \-: Subnet :-/ \-: Subnet :---: Sub-ES : + -------- -------- -------- -------- -------- + + Figure 5: The Classical IP model as a concatenation of three separate + ATM IP subnets. + + In order for loops to be prevented by special configuration at the + NBMA border router, that router would need to know all paths that + could lead back to the NBMA. The same argument that special + configuration could overcome loss of path information was posed in + favor of retaining the use of the EGP protocol defined in the now + historic RFC-904 [11]. This turned out to be unmanageable, with + routing problems occurring when topology was changed elsewhere. + +8. IP Over ATM Proposals + +8.1 The Classical IP Model + + The Classical IP Model was suggested at the Spring 1993 IETF meeting + [8] and retains the classical IP subnet architecture. This model + simply consists of cascading instances of IP subnets with IP-level + (or L3) routers at IP subnet borders. An example realization of this + model consists of a concatenation of three IP subnets. This is shown + in Figure 5. Forwarding IP packets over this Classical IP model is + straight forward using already well established routing techniques + and protocols. + + SVC-based ATM IP subnets are simplified in that they: + + o limit the number of hosts which must be directly connected at any + given time to those that may actually exchange traffic. + + o The ATM network is capable of setting up connections between + any pair of hosts. Consistent with the standard IP routing + algorithm [2] connectivity to the "outside" world is achieved + only through a router, which may provide firewall functionality + if so desired. + + o The IP subnet supports an efficient mechanism for address + resolution. + + Issues addressed by the IP Over ATM Working Group, and some of the + resolutions, for this model are: + + + +Cole, Shur & Villamizar Informational [Page 22] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + o Methods of encapsulation and multiplexing. This issue is + addressed in RFC-1483 [6], in which two methods of encapsulation + are defined, an LLC/SNAP and a per-VC multiplexing option. + + o The definition of an address resolution server (defined in + RFC-1577). + + o Defining the default MTU size. This issue is addressed in + RFC-1626 [1] which proposes the use of the MTU discovery + protocol (RFC-1191 [9]). + + o Support for IP multicasting. In the summer of 1994, work began + on the issue of supporting IP multicasting over the SVC LATM + model. The proposal for IP multicasting is currently defined by + a set of IP over ATM WG Works in Progress, referred to collectively + as the IPMC documents. In order to support IP multicasting the + ATM subnet must either support point-to- multipoint SVCs, or + multicast servers, or both. + + o Defining interim SVC parameters, such as QoS parameters and + time-out values. + + o Signaling and negotiations of parameters such as MTU size + and method of encapsulation. RFC-1755 [10] describes an + implementation agreement for routers signaling the ATM network + to establish SVCs initially based upon the ATM Forum's UNI + version 3.0 specification [4], and eventually to be based + upon the ATM Forum's UNI version 3.1 and later specifications. + Topics addressed in RFC-1755 include (but are not limited to) + VC management procedures, e.g., when to time-out SVCs, QOS + parameters, service classes, explicit setup message formats for + various encapsulation methods, node (host or router) to node + negotiations, etc. + + RFC-1577 is also applicable to PVC-based subnets. Full mesh PVC + connectivity is required. + + For more information see RFC-1577 [8]. + +8.2 The ROLC NHRP Model + + The Next Hop Resolution Protocol (NHRP), currently a work in progress + defined by the Routing Over Large Clouds Working Group (ROLC), + performs address resolution to accomplish direct connections across + IP subnet boundaries. NHRP can supplement RFC-1577 ARP. There has + been recent discussion of replacing RFC-1577 ARP with NHRP. NHRP can + also perform a proxy address resolution to provide the address of the + border router serving a destination off of the NBMA which is only + + + +Cole, Shur & Villamizar Informational [Page 23] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + served by a single router on the NBMA. NHRP as currently defined + cannot be used in this way to support addresses learned from routers + for which the same destinations may be heard at other routers, + without the risk of creating persistent routing loops. + +8.3 "Conventional" Model + + The "Conventional Model" assumes that a router can relay IP packets + cell by cell, with the VPI/VCI identifying a flow between adjacent + routers rather than a flow between a pair of nodes. A latency + advantage can be provided if cell interleaving from multiple IP + packets is allowed. Interleaving frames within the same VCI requires + an ATM AAL such as AAL3/4 rather than AAL5. Cell forwarding is + accomplished through a higher level mapping, above the ATM VCI layer. + + The conventional model is not under consideration by the IP/ATM WG. + The COLIP WG has been formed to develop protocols based on the + conventional model. + +8.4 The Peer Model + + The Peer Model places IP routers/gateways on an addressing peer basis + with corresponding entities in an ATM cloud (where the ATM cloud may + consist of a set of ATM networks, inter-connected via UNI or P-NNI + interfaces). ATM network entities and the attached IP hosts or + routers exchange call routing information on a peer basis by + algorithmically mapping IP addressing into the NSAP space. Within + the ATM cloud, ATM network level addressing (NSAP-style), call + routing and packet formats are used. + + In the Peer Model no provision is made for selection of primary path + and use of alternate paths in the event of primary path failure in + reaching multihomed non-ATM destinations. This will limit the + topologies for which the peer model alone is applicable to only those + topologies in which non-ATM networks are singly homed, or where loss + of backup connectivity is not an issue. The Peer Model may be used + to avoid the need for an address resolution protocol and in a proxy- + ARP mode for stub networks, in conjunction with other mechanisms + suitable to handle multihomed destinations. + + During the discussions of the IP over ATM working group, it was felt + that the problems with the end-to-end peer model were much harder + than any other model, and had more unresolved technical issues. + While encouraging interested individuals/companies to research this + area, it was not an initial priority of the working group to address + these issues. The ATM Forum Network Layer Multiprotocol Working + Group has reached a similar conclusion. + + + + +Cole, Shur & Villamizar Informational [Page 24] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + +8.5 The PNNI and the Integrated Models + + The Integrated model (proposed and under study within the + Multiprotocol group of ATM Forum) considers a single routing protocol + to be used for both IP and for ATM. A single routing information + exchange is used to distribute topological information. The routing + computation used to calculate routes for IP will take into account + the topology, including link and node characteristics, of both the IP + and ATM networks and calculates an optimal route for IP packets over + the combined topology. + + The PNNI is a hierarchical link state routing protocol with multiple + link metrics providing various available QoS parameters given current + loading. Call route selection takes into account QoS requirements. + Hysteresis is built into link metric readvertisements in order to + avoid computational overload and topological hierarchy serves to + subdivide and summarize complex topologies, helping to bound + computational requirements. + + Integrated Routing is a proposal to use PNNI routing as an IP routing + protocol. There are several sets of technical issues that need to be + addressed, including the interaction of multiple routing protocols, + adaptation of PNNI to broadcast media, support for NHRP, and others. + These are being investigated. However, the ATM Forum MPOA group is + not currently performing this investigation. Concerned individuals + are, with an expectation of bringing the work to the ATM Forum and + the IETF. + + PNNI has provisions for carrying uninterpreted information. While + not yet defined, a compatible extension of the base PNNI could be + used to carry external routing attributes and avoid the routing loop + problems described in Section 7. + + + + + + + + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 25] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + ++++++++++++++++++++++++++++++++++++++++++ + + .------------. .------------. + + .---------. + .-: :-. .-: :-. + + : Host or >-+-< : Single ATM : >--< : Single ATM : >-+-----\ + : Router : + : : Domain : : : : Domain : : + : + --------- + -: :- -: :- + .---^----. + + ------------ ------------ + : Router : + + .------------. + ---v---- + .---------. + .-: :-. + : + : Host or >-+- ... ... --< : Single ATM : >-+-----/ + : Router : + : : Domain : : + + --------- + ATM Cloud -: :- + + + ------------ + + ++++++++++++++++++++++++++++++++++++++++++ + + Note: IS within ATM cloud are ATM IS + + Figure 6: The ATM transition model assuming the presence of gateways + or routers between the ATM networks and the ATM peer networks. + +8.6 Transition Models + + Finally, it is useful to consider transition models, lying somewhere + between the Classical IP Models and the Peer and Integrated Models. + Some possible architectures for transition models have been suggested + by Fong Liaw. Others are possible, for example Figure 6 showing a + Classical IP transition model which assumes the presence of gateways + between ATM networks and ATM Peer networks. + + Some of the models described in the prior sections, most notably the + Integrated Model, anticipate the need for mixed environment with + complex routing topologies. These inherently support transition + (possibly with an indefinite transition period). Models which + provide no transition support are primarily of interest to new + deployments which make exclusive, or near exclusive use of ATM or + deployments capable of wholesale replacement of existing networks or + willing to retain only non-ATM stub networks. + + For some models, most notably the Peer Model, the ability to attach + to a large non-ATM or mixed internetwork is infeasible without + routing support at a higher level, or at best may pose + interconnection topology constraints (for example: single point of + attachment and a static default route). If a particular model + requires routing support at a higher level a large deployment will + need to be subdivided to provide scalability at the higher level, + which for some models degenerates back to the Classical model. + + + + + +Cole, Shur & Villamizar Informational [Page 26] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + +9. Application of the Working Group's and Related Documents + + The IP Over ATM Working Group has generated several Works in Progress + and RFCs. This section identifies the relationship of these and + other related documents to the various IP Over ATM Models identified + in this document. The documents and RFCs produced to date are the + following references, RFC-1483 [6], RFC-1577 [8], RFC-1626 [1], RFC- + 1755 [10] and the IPMC documents. The ROLC WG has produced the NHRP + document. Table 5 gives a summary of these documents and their + relationship to the various IP Over ATM Models. + +Acknowledgments + + This memo is the direct result of the numerous discussions of the IP + over ATM Working Group of the Internet Engineering Task Force. The + authors also had the benefit of several private discussions with H. + Nguyen of AT&T Bell Laboratories. Brian Carpenter of CERN was kind + enough to contribute the TULIP and TUNIC sections to this memo. + Grenville Armitage of Bellcore was kind enough to contribute the + sections on VC binding, encapsulations and the use of B-LLI + information elements to signal such bindings. The text of Appendix A + was pirated liberally from Anthony Alles' of Cisco posting on the IP + over ATM discussion list (and modified at the authors' discretion). + M. Ohta provided a description of the Conventional Model (again which + the authors modified at their discretion). This memo also has + benefitted from numerous suggestions from John T. Amenyo of ANS, Joel + Halpern of Newbridge, and Andy Malis of Ascom-Timplex. Yakov Rekhter + of Cisco provided valuable comments leading to the clarification of + normal loop free NHRP operation and the potential for routing loop + problems only with the improper use of NHRP. + + Documents Summary + ----------------+------------------------------------------------- + RFC-1483 _ How to identify/label multiple + _ packet/frame-based protocols multiplexed over + _ ATM AAL5. Applies to any model dealing with IP + _ over ATM AAL5. + _ + RFC-1577 _ Model for transporting IP and ARP over ATM AAL5 + _ in an IP subnet where all nodes share a common + _ IP network prefix. Includes ARP server/Inv-ARP + _ packet formats and procedures for SVC/PVC + _ subnets. + _ + RFC-1626 _ Specifies default IP MTU size to be used with + _ ATM AAL5. Requires use of PATH MTU discovery. + _ Applies to any model dealing with IP over ATM + _ AAL5 + + + +Cole, Shur & Villamizar Informational [Page 27] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + _ + RFC-1755 _ Defines how implementations of IP over ATM + _ should use ATM call control signaling + _ procedures, and recommends values of mandatory + _ and optional IEs focusing particularly on the + _ Classical IP model. + _ + IPMC _ Defines how to support IP multicast in Classical + _ IP model using either (or both) meshes of + _ point-to-multipoint ATM VCs, or multicast + _ server(s). IPMC is work in progress. + _ + NHRP _ Describes a protocol that can be used by hosts + _ and routers to determine the NBMA next hop + _ address of a destination in "NBMA + _ connectivity" + _ of the sending node. If the destination is not + _ connected to the NBMA fabric, the IP and NBMA + _ addresses of preferred egress points are + _ returned. NHRP is work in progress (ROLC WG). + + + Table 5: Summary of WG Documents + +References + + [1] Atkinson, R., "Default IP MTU for use over ATM AAL5", RFC 1626, + Naval Research Laboratory, May 1994. + + [2] Braden, R., and J. Postel, "Requirements for Internet Gateways", + STD 4, RFC 1009, USC/Information Sciences Institute, June 1987. + + [3] Braden, R., Postel, J., and Y. Rekhter, "Internet Architecture + Extensions for Shared Media", RFC 1620, USC/Information Sciences + Institute, IBM Research, May 1994. + + [4] ATM Forum, "ATM User-Network Interface Specification", Prentice + Hall, September 1993. + + [5] Garrett, J., Hagan, J., and J. Wong, "Directed ARP", RFC 1433, + AT&T Bell Labs, University of Pennsylvania, March 1993. + + [6] Heinanen, J., "Multiprotocol Encapsulation over ATM Adaptation + Layer 5", RFC 1483, Telecom Finland, July 1993. + + [7] Heinanen, J., and R. Govindan, "NBMA Address Resolution Protocol + (NARP)", RFC 1735, Telecom Finland, USC/Information Sciences + Institute, December 1994. + + + +Cole, Shur & Villamizar Informational [Page 28] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + [8] Laubach, M., "Classical IP and ARP over ATM", RFC 1577, + Hewlett-Packard Laboratories, January 1994. + + [9] Mogul, J., and S. Deering, "Path MTU Discovery", RFC 1191, + DECWRL, Stanford University, November 1990. + + [10] Perez, M., Liaw, F., Grossman, D., Mankin, A., and A. Hoffman, + "ATM signalling support for IP over ATM", RFC 1755, + USC/Information Sciences Institute, FORE Systems, Inc., Motorola + Codex, Ascom Timeplex, Inc., January 1995. + + [11] Mills, D., "Exterior Gateway Protocol Formal Specification", + STD 18, RFC 904, BBN, April 1984. + +A Potential Interworking Scenarios to be Supported by ARP + + The architectural model of the VC routing protocol, being defined by + the Private Network-to-Network Interface (P-NNI) working group of the + ATM Forum, categorizes ATM networks into two types: + + o Those that participate in the VC routing protocols and use NSAP + modeled addresses UNI 3.0 [4] (referred to as private networks, + for short), and + + o Those that do not participate in the VC routing protocol. + Typically, but possibly not in all cases, public ATM networks + that use native mode E.164 addresses UNI 3.0 [4] will fall into + this later category. + + The issue for ARP, then is to know what information must be returned + to allow such connectivity. Consider the following scenarios: + + o Private host to Private Host, no intervening public transit + network(s): Clearly requires that ARP return only the NSAP + modeled address format of the end host. + + o Private host to Private host, through intervening public + networks: In this case, the connection setup from host A to host + B must transit the public network(s). This requires that at + each ingress point to the public network that a routing decision + be made as to which is the correct egress point from that public + network to the next hop private ATM switch, and that the native + E.164 address of that egress point be found (finding this is a VC + routing problem, probably requiring configuration of the public + network links and connectivity information). ARP should return, + at least, the NSAP address of the endpoint in which case the + mapping of the NSAP addresses to the E.164 address, as specified + in [4], is the responsibility of ingress switch to the public + + + +Cole, Shur & Villamizar Informational [Page 29] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + network. + + o Private Network Host to Public Network Host: To get connectivity + between the public node and the private nodes requires the + same kind of routing information discussed above - namely, the + directly attached public network needs to know the (NSAP format) + ATM address of the private station, and the native E.164 address + of the egress point from the public network to that private + network (or to that of an intervening transit private network + etc.). There is some argument, that the ARP mechanism could + return this egress point native E.164 address, but this may + be considered inconsistent for ARP to return what to some is + clearly routing information, and to others is required signaling + information. + + In the opposite direction, the private network node can use, and + should only get, the E.164 address of the directly attached public + node. What format should this information be carried in? This + question is clearly answered, by Note 9 of Annex A of UNI 3.0 [4], + vis: + + "A call originated on a Private UNI destined for an host which + only has a native (non-NSAP) E.164 address (i.e. a system + directly attached to a public network supporting the native E.164 + format) will code the Called Party number information element in + the (NSAP) E.164 private ATM Address Format, with the RD, AREA, + and ESI fields set to zero. The Called Party Subaddress + information element is not used." + + Hence, in this case, ARP should return the E.164 address of the + public ATM station in NSAP format. This is essentially implying an + algorithmic resolution between the native E.164 and NSAP addresses of + directly attached public stations. + + o Public network host to Public network host, no intervening + private network: In this case, clearly the Q.2931 requests would + use native E.164 address formats. + + o Public network host to Public network host, intervening private + network: same as the case immediately above, since getting + to and through the private network is a VC routing, not an + addressing issue. + + So several issues arise for ARP in supporting arbitrary connections + between hosts on private and public network. One is how to + distinguish between E.164 address and E.164 encoded NSAP modeled + address. Another is what is the information to be supplied by ARP, + e.g., in the public to private scenario should ARP return only the + + + +Cole, Shur & Villamizar Informational [Page 30] + +RFC 1932 IP over ATM: A Framework Document April 1996 + + + private NSAP modeled address or both an E.164 address, for a point of + attachment between the public and private networks, along with the + private NSAP modeled address. + +Authors' Addresses + + Robert G. Cole + AT&T Bell Laboratories + 101 Crawfords Corner Road, Rm. 3L-533 + Holmdel, NJ 07733 + + Phone: (908) 949-1950 + Fax: (908) 949-8887 + EMail: rgc@qsun.att.com + + + David H. Shur + AT&T Bell Laboratories + 101 Crawfords Corner Road, Rm. 1F-338 + Holmdel, NJ 07733 + + Phone: (908) 949-6719 + Fax: (908) 949-5775 + EMail: d.shur@att.com + + + Curtis Villamizar + ANS + 100 Clearbrook Road + Elmsford, NY 10523 + + EMail: curtis@ans.net + + + + + + + + + + + + + + + + + + + +Cole, Shur & Villamizar Informational [Page 31] + |