From 4bfd864f10b68b71482b35c818559068ef8d5797 Mon Sep 17 00:00:00 2001 From: Thomas Voss Date: Wed, 27 Nov 2024 20:54:24 +0100 Subject: doc: Add RFC documents --- doc/rfc/rfc2492.txt | 675 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 675 insertions(+) create mode 100644 doc/rfc/rfc2492.txt (limited to 'doc/rfc/rfc2492.txt') diff --git a/doc/rfc/rfc2492.txt b/doc/rfc/rfc2492.txt new file mode 100644 index 0000000..d458396 --- /dev/null +++ b/doc/rfc/rfc2492.txt @@ -0,0 +1,675 @@ + + + + + + +Network Working Group G. Armitage +Request for Comments: 2492 Lucent Technologies +Category: Standards Track P. Schulter + BrightTiger Technologies + M. Jork + Digital Equipment GmbH + January 1999 + + IPv6 over ATM Networks + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (1999). All Rights Reserved. + +Abstract + + This document is a companion to the ION working group's architecture + document, "IPv6 over Non Broadcast Multiple Access (NBMA) networks". + It provides specific details on how to apply the IPv6 over NBMA + architecture to ATM networks. This architecture allows conventional + host-side operation of the IPv6 Neighbor Discovery protocol, while + also supporting the establishment of 'shortcut' ATM forwarding paths + (when using SVCs). Operation over administratively configured Point + to Point PVCs is also supported. + +1. Introduction. + + This document is an ATM-specific companion document to the ION + working group's, "IPv6 over Non Broadcast Multiple Access (NBMA) + networks" specification [1]. Terminology and architectural + descriptions will not be repeated here. + + The use of ATM to provide point to point PVC service, or flexible + point to point and point to multipoint SVC service, is covered by + this document. + + A minimally conforming IPv6/ATM driver SHALL support the PVC mode of + operation. An IPv6/ATM driver that supports the full SVC mode SHALL + also support PVC mode of operation. + + + + +G. Armitage, et. al. Standards Track [Page 1] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +2. Specification Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [16]. + +3. PVC Environments + + When the ATM network is used in PVC mode, each PVC will connect + exactly two nodes and the use of Neighbor Discovery and other IPv6 + features is limited. IPv6/ATM interfaces have only one neighbor on + each Link. The MARS and NHRP protocols are NOT necessary, since + multicast and broadcast operations collapse down to an ATM level + unicast operation. Dynamically discovered shortcuts are not + supported. + + The actual details of encapsulations, MTU, and link token generation + are provided in the following sections. + + This use of PVC links does not mandate, nor does it prohibit the use + of extensions to the Neighbor Discovery protocol which may be + developed for either general use of for use in PVC connections (for + example, Inverse Neighbor Discovery). + + Since ATM PVC links do not use link-layer addresses, the link-layer + address options SHOULD not be included in any ND message [11]. If a + link-layer address option is present in an ND message, then the + option SHOULD be ignored. + + A minimally conforming IPv6/ATM driver SHALL support the PVC mode of + operation. PVC only implementations are not required to support any + SVC mode of operation. + +3.1 Default Packet Encapsulation + + Following the model in RFC 1483 [2], AAL5 SHALL be the default + Adaptation Layer service, and (LLC/SNAP) encapsulation SHALL be + default encapsulation used by unicast and multicast packets across + pt-pt PVC links. As defined in [1], the default IPv6 packet + encapsulation SHALL be: + + [0xAA-AA-03][0x00-00-00][0x86-DD][IPv6 packet] + (LLC) (OUI) (PID) + + + + + + + + +G. Armitage, et. al. Standards Track [Page 2] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +3.2 Optional null encapsulation + + IPv6/ATM drivers MAY also support null encapsulation as a + configurable option. When null encapsulation is enabled, the IPv6 + packet is passed directly to the AAL5 layer. Both ends of the PVC + MUST be configured to use null encapsulation. The PVC will not be + available for use by protocols other than IPv6. + +3.3 PPP encapsulation + + The concatentation of IPv6 over PPP with PPP over AAL5 PVCs is not + covered by this specification. + +3.4 MTU For PVC Environments + + The default IP MTU size for PVC links is 9180 bytes as specified in + [7]. Other IP MTU values MAY be used. + +3.5 Interface Token Formats in PVC Environments + + When the ATM network is used in PVC mode interface tokens SHALL be + generated using one of the methods described in section 5. Interface + tokens need only be unique between the two nodes on the PVC link. + +4 SVC environments + +4.1 SVC Specific Code Points + +4.1.1 ATM Adaptation Layer encapsulation for SVC environments + + Following the model in RFC 1483 [2], AAL5 SHALL be the default + Adaptation Layer service, and (LLC/SNAP) encapsulation SHALL be the + default encapsulation used by unicast and multicast packets across + SVC links. + +4.1.2 Unicast Packet Encapsulation + + As defined in [1], the default IPv6 unicast packet encapsulation + SHALL be: + + [0xAA-AA-03][0x00-00-00][0x86-DD][IPv6 packet] + (LLC) (OUI) (PID) + + + + + + + + + +G. Armitage, et. al. Standards Track [Page 3] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +4.1.3 Multicast packet encapsulation + + As defined in [1], the default IPv6 multicast packet encapsulation + SHALL be: + + [0xAA-AA-03][0x00-00-5E][0x00-01][pkt$cmi][0x86DD][IPv6 + packet] + (LLC) (OUI) (PID) (mars encaps) + + The IPv6/ATM driver's Cluster Member ID SHALL be copied into + the 2 octet pkt$cmi field prior to transmission. + +4.1.4 Optional null encapsulation + + IPv6/ATM drivers MAY also support null encapsulation as a + configurable option. Null encapsulation SHALL only be used for + passing IPv6 packets from one IPv6/ATM driver to another. Null + encapsulation SHALL NOT be used on the pt-pt SVC between the IPv6/ATM + driver and its local MARS. + + If null encapsulation is enabled, the IPv6 packet is passed directly + to the AAL5 layer. Both ends of the SVC MUST agree to use null + encapsulation during the call SETUP phase. The SVC will not be + available for use by protocols other than IPv6. + + If null encapsulation is enabled on data SVCs between routers, + inter-router NHRP traffic SHALL utilize a separate, parallel SVC. + + Use of null encapsulation is not encouraged when IPv6/ATM is used + with MARS/NHRP/ND as described in [1]. + +4.1.5 MARS control messages + + The encapsulation of MARS control messages (between MARS and MARS + Clients) remains the same as shown in RFC 2022 [3]: + + [0xAA-AA-03][0x00-00-5E][0x00-03][MARS control message] + (LLC) (OUI) (PID) + + The key control field values are: + + The mar$afn field remains 0x0F (ATM addresses) + + The mar$pro field SHALL be 0x86DD (IPv6) + + The mar$op.version field remains 0x00 (MARS) + + + + + +G. Armitage, et. al. Standards Track [Page 4] + +RFC 2492 IPv6 over ATM Networks January 1999 + + + The mar$spln and mar$tpln fields (where relevant) are either 0 (for + null or non-existent information) or 16 (for the full IPv6 protocol + address) + + The way in which ATM addresses are stored remains the same as shown + in RFC 2022 [3] + +4.1.6 NHRP control messages + + The encapsulation of NHRP control messages remains the same as shown + in RFC 2332 [4]: + + [0xAA-AA-03][0x00-00-5E][0x00-03][NHRP control message] + (LLC) (OUI) (PID) + + The key control field values are: + + The ar$afn field remains 0x0F (ATM addresses) + + The ar$pro field SHALL be 0x86DD (IPv6) + + The ar$op.version field remains 0x01 (NHRP) + + The ar$spln and ar$tpln fields (where relevant) are either 0 (for + null or non-existent information) or 16 (for the full IPv6 protocol + address) + + The way in which ATM addresses are stored remains the same as shown + in RFC 2022 [3] + +4.1.7 Neigbor Discovery control messages + + Section 5.2 of [1] describes the ND Link-layer address option. For + IPv6/ATM drivers, the subfields SHALL be encoded in the following + manner: + + [NTL] defines the type and length of the ATM number immediately + following the [STL] field. The format is as follows: + + 7 6 5 4 3 2 1 0 + +-+-+-+-+-+-+-+-+ + |0|x| length | + +-+-+-+-+-+-+-+-+ + + + + + + + + +G. Armitage, et. al. Standards Track [Page 5] + +RFC 2492 IPv6 over ATM Networks January 1999 + + + The most significant bit is reserved and MUST be set to zero. The + second most significant bit (x) is a flag indicating whether the + ATM number is in: + + ATM Forum AESA format (x = 0). + Native E.164 format (x = 1). + + The bottom 6 bits represent an unsigned integer value indicating + the length of the associated ATM address field in octets. + + The [STL] format is the same as the [NTL] field. Defines the length + of the subaddress field, if it exists. If it does not exist this + entire octet field MUST be zero. If the subaddress exists it will be + in AESA format, so flag x SHALL be zero. + + [NBMA Number] is a variable length field containing the ATM address + of the Link layer target. It is always present. + + [NBMA Subaddress] is a variable length field containing the ATM + subaddress of the Link layer target. It may or may not be present. + When it is not, the option ends after the [NBMA Number] (or any + additional padding for 8 byte alignment). + + The octet ordering of the [NBMA Number] and [NBMA Subaddress] fields + SHALL be the same as that used in MARS and NHRP control messages. + +4.2 UNI 3.0/3.1 signaling issues (SVC mode). + + When an IPv6 node places a call to another IPv6 node, it SHOULD + follow the procedures in [6] and [7] for signalling UNI 3.0/3.1 SVCs + [9] and negotiating MTU. The default IP MTU size on a LL is 9180 + bytes as specified in [7]. + + Note that while the procedures in [7] still apply to IPv6 over ATM, + IPv6 Path MTU Discovery [8] is used by nodes and routers rather than + IPv4 MTU discovery. Additionally, while IPv6 nodes are not required + to implement Path MTU Discovery, IPv6/ATM nodes SHOULD implement it. + Also, since IPv6 nodes will negotiate an appropriate MTU for each VC, + Path MTU should never be triggered since neither node should ever + receive a Packet Too Big message to trigger Path MTU Discovery. When + nodes are communicating via one or more routers Path MTU Discovery + will be used just as it is for legacy networks. + +5 Interface Tokens + + For both PVC and SVC modes of operation, one of the following methods + SHALL be used to generate Interface Tokens as required by section 5.1 + of [1]. + + + +G. Armitage, et. al. Standards Track [Page 6] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +5.1 Interface Tokens Based on ESI values + + When the underlying ATM interface is identified by an ATM End System + Address (AESA, formerly known as an NSAPA), the interface token MAY + be formed from the ESI and SEL values in the AESA as follows: + + [0x00][ESI][SEL] + + [0x00] is a one octet field which is always set to 0. + Note that the bit corresponding to the EUI-64 Global/Local bit + [5] is always reset indicating that this address is not a + globally unique IPv6 interface token. + + [ESI] is a six octet field. + This field always contains the six octet ESI value for the + AESA used to address the specific instance of the IPv6/ATM + interface. + + [SEL] is a one octet field. + This field always contains the SEL value from the AESA used to + address the specific instance of the IPv6/ATM interface. + +5.2 Interface Tokens Based on 48 Bit MAC Values + + Where the underlying ATM NIC driver has access to a set of one or + more 48 bit MAC values unique to the ATM NIC (e.g. MAC addresses + configured into the NIC's ROM), the IPv6/ATM interface MAY use one of + these values to create a unique interface token as described in [10]. + +5.3 Interface Tokens Based on EUI-64 Values + + Where the underlying ATM NIC driver has access to a set of one or + more 64 bit EUI-64 values unique to the ATM NIC (e.g. EUI-64 + addresses configured into the NIC's ROM), the IPv6/ATM interface + SHOULD use one of these values to create a unique interface token. + after inverting the Global/Local identifier bit [10]. (Any + relationship between these values and the ESI(s) registered with the + local ATM switch by the ATM driver are outside the scope of this + document.) + + When EUI-64 values are used for IPv6 interface tokens the only + modification allowed to the octet string read from the NIC is + inversion of the Global/Local identifier bit. + + + + + + + + +G. Armitage, et. al. Standards Track [Page 7] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +5.4 Interface Tokens Based on Native E.164 Addresses + + When an interface uses Native E.164 addresses then the E.164 values + MAY be used to generate an interface token as follows: + + [D14][D13D12][D11D10][D9D8][D9D6][D5D4][D3D2][D1D0] + + [D14] A single octet containing the semi-octet representing the most + significant E.164 digit shifted left four bits to the most + significant four bits of the octet. The lower four bits MUST be set + to 0. Note that the EUI-64 Global/Local indicator is set to 0 + indicating that this is not a globally unique IPv6 interface token. + + [D13D12] A single octet containing the semi-octet representing the + second most significant E.164 digit [D13] shifted left four places to + the most significant bits of the octet, and the third most + significant semi-octet in the four least significant bits of the + octet. + + [D11D10] - [D1D0] Octets each containing two E.164 digits, one in the + most significant four bits, and one in the least significant four + bits as indicated. + +5.5 Nodes Without Unique Identifiers + + If no MAC, EUI-64, AESA, or E.164 value is available for generating + an interface token, then the interface token SHALL be generated as + described in Appendix A of [10]. + +5.6 Multiple Logical Links on a Single Interface + + A logical ATM interface might be associated with a different SEL + field of a common AESA prefix, or a set of entirely separate ESIs + might have been registered with the local ATM switch to create a + range of unique AESAs. + + The minimum information required to uniquely identify each logical + ATM interface is (within the context of the local switch port) their + ESI+SEL combination. + + For the vhost case described in section 5.1.2 of [1], vhost SHALL + select a different interface token from the range of 64 bit values + available to the ATM NIC (as described in 4.1). Each vhost SHALL + implement IPv6/ATM interfaces in such a way that no two or more + vhosts end up advertising the same interface token onto the same LL. + (Conformance with this requirement may be achieved by choosing + different SEL values, ESI values, or both.) + + + + +G. Armitage, et. al. Standards Track [Page 8] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +6. Conclusion and Open Issues. + + This document is an ATM-specific companion document to the ION + working group's, "IPv6 over Non Broadcast Multiple Access (NBMA) + networks" specification [1]. It specifies codepoints for the + administratively configured PVC, and dynamically established SVC, + modes of operation. + + There are no major open issues. Comments to the ION mailing list are + solicited (ion@nexen.com). + +7. Security Considerations + + While this proposal does not introduce any new security mechanisms + all current IPv6 security mechanisms will work without modification + for ATM. This includes both authentication and encryption for both + Neighbor Discovery protocols as well as the exchange of IPv6 data + packets. + +Acknowledgments + + The original IPv6/ATM work by G. Armitage occurred while employed at + Bellcore. Elements of section 4 were borrowed from Matt Crawford's + memo on IPv6 over Ethernet. + + The authors would like to thank Kazuhiko Yamamoto, Kenjiro Cho, + Yoshinobu Inoue, Hiroshi Esaki, Yoshifumi Atarashi, and Atsushi + Hagiwara for their contributions based on actual PVC implementations. + + + + + + + + + + + + + + + + + + + + + + + +G. Armitage, et. al. Standards Track [Page 9] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +Authors' Addresses + + Grenville Armitage + Bell Laboratories, Lucent Technologies + 101 Crawfords Corner Road + Holmdel, NJ 07733 + USA + + EMail: gja@lucent.com + + + Peter Schulter + BrightTiger Technologies + 125 Nagog Park + Acton, MA 01720 + + EMail: paschulter@acm.org + + + Markus Jork + European Applied Research Center + Digital Equipment GmbH + CEC Karlsruhe + Vincenz-Priessnitz-Str. 1 + D-76131 Karlsruhe + Germany + + EMail: jork@kar.dec.com + + + + + + + + + + + + + + + + + + + + + + + +G. Armitage, et. al. Standards Track [Page 10] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +References + + [1] Armitage, G., Schulter, P., Jork, M. and G. Harter, "IPv6 over + Non-Broadcast Multiple Access (NBMA) networks", RFC 2491, January + 1999. + + [2] Heinanen, J., "Multiprotocol Encapsulation over ATM Adaption + Layer 5", RFC 1483, July 1993. + + [3] Armitage, G., "Support for Multicast over UNI 3.1 based ATM + Networks", RFC 2022, November 1996. + + [4] Luciani, J., Katz, D., Piscitello, D., Cole, B. and N. Doraswamy, + "NBMA Next Hop Resolution Protocol (NHRP)", RFC 2332, April 1998. + + [5] "64-Bit Global Identifier Format Tutorial", + http://standards.ieee.org/db/oui/tutorials/EUI64.html. + + [6] Perez, M., Liaw, F., Mankin, A., Hoffman, E., Grossman, D. and A. + Malis, "ATM Signalling Support for IP over ATM", RFC 1755, + February 1995. + + [7] Atkinson, R., "Default IP MTU for use over ATM AAL5", RFC 1626, + May 1994. + + [8] McCann, J., Deering, S. and J. Mogul, "Path MTU Discovery for IP + version 6", RFC 1981, August 1996. + + [9] ATM Forum, "ATM User Network Interface (UNI) Specification + Version 3.1", ISBN 0-13-393828-X, Prentice Hall, Englewood + Cliffs, NJ, June 1995. + + [10] Hinden, B. and S. Deering, "IP Version 6 Addressing + Architecture", RFC 2373, July 1998. + + [11] Narten, T., Nordmark, E. and W. Simpson, "Neighbor Discovery for + IP Version 6 (IPv6)", RFC 2461, December 1998. + + + + + + + + + + + + + + +G. Armitage, et. al. Standards Track [Page 11] + +RFC 2492 IPv6 over ATM Networks January 1999 + + +Full Copyright Statement + + Copyright (C) The Internet Society (1999). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + + + + + + + + + + + + + + + + + + + + + + + +G. Armitage, et. al. Standards Track [Page 12] + -- cgit v1.2.3