File: rfc1220.txt

package info (click to toggle)
doc-rfc 20170121-1
  • links: PTS, VCS
  • area: non-free
  • in suites: stretch
  • size: 541,932 kB
  • ctags: 32
  • sloc: xml: 267,963; sh: 101; python: 90; perl: 42; makefile: 13
file content (1011 lines) | stat: -rw-r--r-- 37,155 bytes parent folder | download | duplicates (9)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011






Network Working Group                                   F. Baker, Editor
Request for Comments: 1220                                           ACC
                                                              April 1991


            Point-to-Point Protocol Extensions for Bridging

1.  Status of this Memo

   This document defines an extension of the Internet Point-to-Point
   Protocol (PPP) described in RFC 1171, targeting the use of Point-to-
   Point lines for Remote Bridging.  It is a product of the Point-to-
   Point Protocol Extensions Working Group of the Internet Engineering
   Task Force (IETF).

   This RFC specifies an IAB standards track protocol for the Internet
   community, and requests discussion and suggestions for improvements.
   Please refer to the current edition of the "IAB Official Protocol
   Standards" for the standardization state and status of this protocol.
   Distribution of this memo is unlimited.

2.  Historical Perspective

   Two basic algorithms are ambient in the industry for Bridging of
   Local Area Networks.  The more common algorithm is called
   "Transparent Bridging" and has been standardized for Extended LAN
   configurations by IEEE 802.1.  IEEE 802.5 has proposed an alternative
   approach, called "Source Routing", and is in the process of
   standardizing that approach for IEEE 802.5 extended networks.

   Although there is a subcommittee of IEEE 802.1 addressing remote
   bridging, neither standard directly defines Remote Bridging per se,
   as that would technically be beyond the IEEE 802 committee's charter.
   Both allow for it, however, modeling the line as an unspecified
   interface between half-bridges.

   This document assumes that the devices at either end of a serial link

      - have agreed to utilize the RFC 1171 line discipline in some form.

      - may have agreed, by some other means, to exchange other
        protocols on the line interspersed with each other and with any
        bridged PDUs.

      - may be willing to use the link as a vehicle for Remote Bridging.

      - may have multiple point-to-point links that are configured in
        parallel to simulate a single line of higher speed or



Point-to-Point Protocol Extensions Working Group                [Page 1]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


        reliability, but message sequence issues are solved by the
        transmitting end.

3.  General Considerations

3.1.  Link Quality Monitoring

   It is strongly recommended that Point-to-Point Bridge Protocol
   implementations utilize Magic Number Loopback Detection and Link-
   Quality-Monitoring.  This is because the 802.1 Spanning Tree
   protocol, which is integral to both Transparent Bridging and Source
   Routing (as standardized), is unidirectional during normal operation,
   with HELLO PDUs emanating from the Root System in the general
   direction of the leaves, without any reverse traffic except in
   response to network events.

3.2.  Message Sequence

   The multiple link case requires consideration of message
   sequentiality.  The transmitting station must determine either that
   the protocol being bridged requires transmissions to arrive in the
   order of their original transmission, and enqueue all transmissions
   on a given conversation onto the same link to force order
   preservation, or that the protocol does NOT require transmissions to
   arrive in the order of their original transmission, and use that
   knowledge to optimize the utilization of the several links, enqueuing
   traffic to links to minimize delay.

   In the absence of such a determination, the transmitting station must
   act as though all protocols require order preservation; many
   protocols designed primarily for use on a single LAN in fact do.  A
   protocol could be described to maintain message sequentiality across
   multiple links, either by sequence numbering or by fragmentation and
   re-assembly, but this is neither elegant nor absolutely necessary.

3.3.  Maximum Receive Unit Considerations

   Please note that the negotiated MRU must be large enough to support
   the MAC Types that are negotiated for support, there being no
   fragmentation and re-assembly.  Even Ethernet frames are larger than
   the default MRU of 1500 octets.

3.4.  Separation of Spanning Tree Domains

   It is conceivable that a network manager might wish to inhibit the
   exchange of BPDUs on a link in order to logically divide two regions
   into separate Spanning Trees with different Roots (and potentially
   different Spanning Tree implementations or algorithms).  In order to



Point-to-Point Protocol Extensions Working Group                [Page 2]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   do that, he must configure both ends to not exchange BPDUs on a link.
   For the sake of robustness, a bridge which is so configured must
   silently discard the BPDU of its neighbor, should it receive one.

4.  IEEE 802.1 Transparent Bridging

4.1.  Overview of IEEE 802.1 Transparent Bridging

   As a favor to the uninitiated, let us first describe Transparent
   Bridging.  Essentially, the bridges in a network operate as isolated
   entities, largely unaware of each others' presence.  A Transparent
   Bridge maintains a Forwarding Database consisting of

            {address, interface}

   records by saving the Source Address of each LAN transmission that it
   receives along with the interface identifier for the interface it was
   received on.  It goes on to check whether the Destination Address is
   in the database, and if so, either discards the message (if the
   destination and source are located at the same interface) or forwards
   the message to the indicated interface.  A message whose Destination
   Address is not found in the table is forwarded to all interfaces
   except the one it was received on; this describes Broadcast/Multicast
   behavior as well.

   The obvious fly in the ointment is that redundant paths in the
   network cause indeterminate (nay, all too determinate) forwarding
   behavior to occur.  To prevent this, a protocol called the IEEE
   802.1(d) Spanning Tree Protocol is executed between the bridges to
   detect and logically remove redundant paths from the network.

   One system is elected as the "Root", which periodically emits a
   message called a Bridge Hello Protocol Data Unit, or BPDU, heard by
   all of its neighboring bridges.  Each of these modifies and passes
   the BPDU on to its neighbors, and they to theirs, until it arrives at
   the leaf LAN segments in the network (where it dies, having no
   further neighbors to pass it along) or until the message is stopped
   by a bridge which has a superior path to the "Root".  In this latter
   case, the interface the BPDU was received on is ignored (i.e., it is
   placed in a Hot Standby status, no traffic is emitted onto it except
   the BPDU, and all traffic received from it is discarded) until a
   topology change forces a recalculation of the network.

4.2.  IEEE 802.1 Remote Bridging Activity

   There exist two basic sorts of bridges - ones that interconnect LANs
   directly, called Local Bridges, and ones that interconnect LANs via
   an intermediate medium such as a leased line, called Remote Bridges.



Point-to-Point Protocol Extensions Working Group                [Page 3]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   The Point-to-Point Protocol might be used by a Remote Bridge.

   There is more than one proposal within the IEEE 802.1 Interworking
   Committee for modeling the Remote Bridge.  In one model, the
   interconnecting serial link(s) are treated in the same way that a LAN
   is, having a standard IEEE 802.1 Link State; in another, the serial
   links operate in a mode quite different from the LANs that they
   interconnect.  For the sake of simplicity of specification, the first
   model is adopted, although some of the good ideas from proponents of
   the second model are included or allowed for.

   Therefore, given that transparent bridging is configured on a line or
   set of lines, the specifics of the link state with respect to the
   bridge is defined by IEEE 802.1(d).  The Bridge Protocol Data Unit,
   or BPDU, is defined there, as well as the algorithms for its use.

   It is assumed that, if a Point-to-Point Link neighbor receives IEEE
   802.1 BPDUs without rejecting them with the RFC 1171 Protocol-Reject
   LCP PDU, Transparent Bridging is permitted on the link.

4.3.  IEEE 802.5 Source Routing

   The IEEE 802.5 Committee has defined a different approach to bridging
   for use on the Token Ring, called Source Routing.  In this approach,
   the originating system has the responsibility of indicating what path
   that the message should follow.  It does this, if the message is
   directed off the local ring, by including a variable length MAC
   header extension called the Routing Information Field, or RIF.  The
   RIF consists of one 16 bit word of flags and parameters followed by
   zero or more ring-and-bridge identifiers.  Each bridge en route
   determines from this "source route list" whether it should receive
   the message and how to forward it.

   The algorithm for Source Routing requires the bridge to be able to
   identify any interface by its ring-and-bridge identifier, and to be
   able to identify any of its OTHER interfaces likewise.  When a packet
   is received which has the Routing Information Field (RIF) present, a
   boolean in the RIF is inspected to determine whether the ring-and-
   bridge identifiers are to be inspected in "forward" or "reverse"
   sense.  In a "forward" search, the bridge looks for the ring-and-
   bridge identifier of the interface the packet was received on, and
   forwards the packet toward the ring identified in the ring-and-bridge
   identifier that follows it.  In a "reverse" search, the bridge looks
   for the ring-and-bridge identifier of the OTHER INTERFACE, and
   delivers the packet to the indicated interface if such is found.

   The algorithms for handling multicasts ("Functional Addresses" and
   "Group Addresses") have been the subject of much discussion in 802.5,



Point-to-Point Protocol Extensions Working Group                [Page 4]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   and are likely to be the most troublesome for bridge implementations.
   Fortunately, they are beyond the scope of this document.

4.4.  IEEE 802.5 Remote Bridging Activity

   There is no Remote Bridge proposal in IEEE 802.5 at this time,
   although IBM ships a remote Source Routing Bridge.  Simplicity would
   dictate that we choose the same model for IEEE 802.5 Source Routing
   that was selected for IEEE 802.1, but necessity requires a ring
   number for the line in some cases.  We allow for both models.

   Given that source routing is configured on a line or set of lines,
   the specifics of the link state with respect to the bridge is defined
   by the IEEE 802.5 Addendum on Source Routing.  The requisite PDUs for
   calculating the spanning tree (used for assuring that each ring will
   receive at most one copy of a multicast) are defined there, as well
   as the algorithms for their use.  MAC PDUs (Beacon, Ring Management,
   etc) are specific to the MAU technology and are not exchanged on the
   line.

4.5.  Source Routing to Transparent Bridge Translation

   IEEE 802 also has a subcommittee looking at the interoperation of
   Transparent Bridging and Source Routing.  For the purposes of this
   standard, such a device is both a transparent and a source routing
   bridge, and will act on the line in both ways, just as it does on the
   LAN.

5.  Traffic Services

   Several services are provided for the benefit of different system
   types and user configurations.  These include LAN Frame Checksum
   Preservation, LAN Frame Checksum Generation, Tinygram Compression,
   and the identification of closed sets of LANs.

5.1.  LAN Frame Checksum Preservation

   IEEE 802.1 stipulates that the Extended LAN must enjoy the same
   probability of undetected error that an individual LAN enjoys.
   Although there has been considerable debate concerning the algorithm,
   no other algorithm has been proposed than having the LAN Frame
   Checksum received by the ultimate receiver be the same value
   calculated by the original transmitter.  Achieving this requires, of
   course, that the line protocols preserve the LAN Frame Checksum from
   end to end.  The protocol is optimized towards this approach.






Point-to-Point Protocol Extensions Working Group                [Page 5]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


5.2.  Traffic having no LAN Frame Checksum

   The fact that the protocol is optimized towards LAN Frame Checksum
   preservation raises twin questions: "What is the approach to be used
   by systems which, for whatever reason, cannot easily support Frame
   Checksum preservation?" and "What is the approach to be used when the
   system originates a message, which therefore has no Frame Checksum
   precalculated?".

   Surely, one approach would be to require stations to calculate the
   Frame Checksum in software if hardware support were unavailable; this
   would meet with profound dismay, and would raise serious questions of
   interpretation in a Bridge/Router.

   However, stations which implement LAN Frame Checksum preservation
   must already solve this problem, as they do originate traffic.
   Therefore, the solution adopted is that messages which have no Frame
   Checksum are tagged and carried across the line.

   When a system which does not implement LAN Frame Checksum
   preservation receives a frame having an embedded FCS, it converts it
   for its own use by removing the trailing four octets.  When any
   system forwards a frame which contains no embedded FCS to a LAN, it
   forwards it in a way which causes the FCS to be calculated.

5.3.  Tinygram Compression

   An issue in remote Ethernet bridging is that the protocols that are
   most attractive to bridge are prone to problems on low speed (64 KBPS
   and below) lines.  This can be partially alleviated by observing that
   the vendors defining these protocols often fill the PDU with octets
   of ZERO.  Thus, an Ethernet or IEEE 802.3 PDU received from a line
   that is (1) smaller than the minimum PDU size, and (2) has a LAN
   Frame Checksum present, must be padded by inserting zeroes between
   the last four octets and the rest of the PDU before transmitting it
   on a LAN.  These protocols are frequently used for interactive
   sessions, and therefore are frequently this small.

   To prevent ambiguity, PDUs requiring padding are explicitly tagged.
   Compression is at the option of the transmitting station, and is
   probably performed only on low speed lines, perhaps under
   configuration control.

   The pseudo-code in Figure 1 describes the algorithms.







Point-to-Point Protocol Extensions Working Group                [Page 6]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


5.4.  LAN Identification

   In some applications, it is useful to tag traffic by the user
   community it is a part of, and guarantee that it will be only emitted
   onto a LAN which is of the same community.  The user community is
   defined by a LAN ID.  Systems which choose to not implement this
   feature must assume that any frame received having a LAN ID is from a
   different community than theirs, and discard it.











































Point-to-Point Protocol Extensions Working Group                [Page 7]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


Figure 1: Tinygram Compression Pseudo-Code

PPP Transmitter:

if (ZeroPadCompressionEnabled &&
    BridgedProtocolHeaderFormat == IEEE8023 &&
    PacketLength == Minimum8023PacketLength) {
 /*
  * Remove any continuous run of zero octets preceding,
  * but not including, the LAN FCS, but not extending
  * into the MAC header.
  */
    Set (ZeroCompressionFlag);            /* Signal receiver */
    if (is_Set (LAN_FCS_Present)) {
        FCS = TrailingOctets (PDU, 4);    /* Store FCS */
        RemoveTrailingOctets (PDU, 4);    /* Remove FCS */
        while (PacketLength > 14 &&       /* Stop at MAC header */
               TrailingOctet (PDU) == 0)  /*  or last non-zero octet */
            RemoveTrailingOctets (PDU, 1);/* Remove zero octet */
        Appendbuf (PDU, 4, FCS);          /* Restore FCS */
    }
    else {
        while (PacketLength > 14 &&       /* Stop at MAC header */
               TrailingOctet (PDU) == 0)  /*  or last zero octet */
            RemoveTrailingOctets (PDU, 1);/* Remove zero octet */
    }
}

PPP Receiver:

if (ZeroCompressionFlag) {                /* Flag set in header? */
 /* Restoring packet to minimum 802.3 length */
    Clear (ZeroCompressionFlag);
    if (is_Set (LAN_FCS_Present)) {
        FCS = TrailingOctets (PDU, 4);   /* Store FCS */
        RemoveTrailingOctets (PDU, 4);   /* Remove FCS */
        Appendbuf (PDU, 60 - PacketLength, zeroes);/* Add zeroes */
        Appendbuf (PDU, 4, FCS);         /* Restore FCS */
    }
    else {
        Appendbuf (PDU, 60 - PacketLength, zeroes);/* Add zeroes */
    }
}








Point-to-Point Protocol Extensions Working Group                [Page 8]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


6.  Protocol Data Unit Formats

6.1.  Common LAN Traffic

   Figure 2: 802.3 Frame format

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+
   |   HDLC FLAG   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      0xFF     |      0x03     |      0x00     |      0x31     +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |F|I|Z|0| Count |    MAC Type   |  LAN ID high word (optional)  +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   LAN ID low word (optional)  |      Destination MAC Address  +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Destination MAC Address                 +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Source MAC Address                      +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Source MAC Address        |      Length/Type              +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |               LLC data                                        +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                              ...                              +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                   LAN FCS (optional)                          +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                potential line protocol pad                    +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           HDLC CRC            |   HDLC FLAG   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   For Bridging LAN traffic, the format of the frame on the line is as
   shown in Figures 2 or 3.  This conforms to RFC 1171 section 3.1
   "Frame Format".  It also allows for RFC 1172 [2] negotiation of
   Protocol Field Compression and Address and Control Field Compression.
   It is recommended that devices which use controllers that require
   even memory addresses negotiate to NOT USE Protocol Field Compression
   on other than low speed links.










Point-to-Point Protocol Extensions Working Group                [Page 9]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   Figure 3: 802.4/802.5/FDDI Frame format

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+
   |   HDLC FLAG   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      0xFF     |      0x03     |      0x00     |      0x31     +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |F|I|Z|0| Count |    MAC Type   |  LAN ID high word (optional)  +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   LAN ID low word (optional)  |   Pad Byte    | Frame Control +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Destination MAC Address                 +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Destination MAC Address   |  Source MAC Address           +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Source MAC Address                      +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |               LLC data                                        +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                              ...                              +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       FCS (optional)                          +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              optional Data Link Layer padding                 +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           HDLC CRC            |   HDLC FLAG   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


The fields of this message are as follows:

Address Field and Control Field:
     As defined by RFC 1171

Protocol Field:
     0x0031

Flags:
     bits 0-3: length of the line protocol pad field.
     bit 4:  Reserved, Set to Zero
     bit 5:  Set if IEEE 802.3 Pad must be zero filled to minimum size
     bit 6:  Set if the LAN ID Field is present
     bit 7:  Set if the LAN FCS Field is present

     The "number of trailing "pad" octets is a deference to the fact
     that any point-to-point frame may have padding at the end.  This



Point-to-Point Protocol Extensions Working Group               [Page 10]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


     number tells the receiving system how many octets to strip off the
     end.

MAC Type:
     0: Reserved
     1: IEEE 802.3/Ethernet
     2: IEEE 802.4
     3: IEEE 802.5
     4: FDDI
     other:  Assigned by the Internet Assigned Numbers Authority

LAN ID:
     This optional 32 bit field identifies the Community of LANs which
     may be interested to receive this frame, as described in section
     5.4.  If the LAN ID flag is not set, then this field is not
     present, and the PDU is four octets shorter.

Frame Control:
     On 802.4, 802.5, and FDDI LANs, there are a few octets preceding
     the Destination MAC Address, one of which is protected by the FCS.
     Since the MAC Type field defines the bit ordering, these are sent
     in MAC order.  A pad octet is present to avoid odd machine address
     boundary problems.

Destination MAC Address:
     As defined by the IEEE.  Since the MAC Type field defines the bit
     ordering, this is sent in MAC order.

Source MAC Address:
     As defined by the IEEE.  Since the MAC Type field defines the bit
     ordering, this is sent in MAC order.

LLC data:
     This is the remainder of the MAC frame.  This is that portion of
     the frame which is (or would be were it present) protected by the
     LAN FCS; for example, the 802.5 Access Control field, and Status
     Trailer are not meaningful to transmit to another ring, and are
     omitted.

LAN Frame Checksum:
     If present, this is the LAN FCS which was calculated by (or which
     appears to have been calculated by) the originating station.  If
     the FCS Present flag is not set, then this field is not present,
     and the PDU is four octets shorter.

Optional Data Link Layer Padding
     RFC 1171 specifies that an arbitrary pad can be added after the
     data intended for transmission.  The "Count" portion of the flag



Point-to-Point Protocol Extensions Working Group               [Page 11]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


     field contains the length of this pad, which may not exceed 15
     octets.

CRC-CCITT
     Mentioned primarily for clarity.  The CRC used on the PPP link is
     separate from and unrelated to the LAN FCS.

6.2.  IEEE 802.1 Bridge

   This is the BPDU as defined by IEEE 802.1(d), without any MAC or
   802.2 LLC header (these being functionally equivalent to the Address,
   Control, and Protocol Fields).  The LAN Pad and Frame Checksum fields
   are likewise superfluous and absent. The Address and Control Fields
   are optional, subject to the Address and Control Field Compression
   negotiation.

   Figure 4: Bridge "Hello" PDU

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+
   |   HDLC FLAG   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      0xFF     |      0x03     |      0x02     |      0x01     +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |              BPDU data                                        +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                              ...                              +
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |           HDLC CRC            |   HDLC FLAG   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   The fields of this message are as follows:

   Address Field and Control Field:
        As defined by RFC 1171

   Protocol Field:
        0x0201

   MAC Frame:
        802.1(d) BPDU








Point-to-Point Protocol Extensions Working Group               [Page 12]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


6.3.  IEEE 802 Network Control Protocol

   The Bridge Network Control Protocol is responsible for configuring,
   enabling, and disabling the bridges on both ends of the point-to-
   point link.  As with the Link Control Protocol, this is accomplished
   through an exchange of packets.  BNCP packets may not be exchanged
   until LCP has reached the network-layer Protocol Configuration
   Negotiation phase.  Likewise, LAN traffic may not be exchanged until
   BNCP has first opened the connection.

   The Bridge Network Control Protocol is exactly the same as the Point-
   to-Point Link Control Protocol with the following exceptions:

   Data Link Layer Protocol Field
        Exactly one Bridge Network Control Protocol packet is encapsulated
        in the Information field of PPP Data Link Layer frames where the
        Protocol field indicates type hex 8031 (BNCP).

   Code field
        Only Codes 1 through 7 (Configure-Request, Configure-Ack,
        Configure-Nak, Configure-Reject, Terminate-Request,
        Terminate-Ack and Code-Reject) are used.  Other Codes should
        be treated as unrecognized and should result in Code-Rejects.

   Timeouts
        BNCP packets may not be exchanged until the Link Control
        Protocol has reached the network-layer Protocol Configuration
        Negotiation phase.  An implementation should be prepared to wait
        for Link Quality testing to finish before timing out waiting
        for Configure-Ack or other response.

   Configuration Option Types
        The Bridge Network Control Protocol has a separate set of
        Configuration Options.  These permit the negotiation of the
        following items:

             - MAC Types supported
             - Tinygram Compression support
             - LAN Identification support
             - Ring and Bridge Identification

6.4.  IEEE 802.5 Remote Ring Identification Option

   Since the Remote Bridges are modeled as normal Bridges with a strange
   internal interface, each bridge needs to know the ring/bridge numbers
   of the bridges it is adjacent to.  This is the subject of a Link
   Negotiation.  The exchange of ring-and-bridge identifiers is done
   using this option on the Network Control Protocol.



Point-to-Point Protocol Extensions Working Group               [Page 13]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   The Token Ring Ring-and-Bridge Identifier, and its use, is specified
   by the IEEE 802.5 Addendum on Source Routing.  It identifies the ring
   that the interface is attached to by its configured ring number, and
   itself by bridge number on the ring.

   Figure 5: Remote Ring Identification Option

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     type=1    |length = 4     | ring number           |bridge#|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   Type 1 = IEEE 802.5 Source Routing Ring/Bridge Identifier

   Length
        4 Octets

   Ring Number
        A 12 bit number identifying the token ring, as defined in the
        IEEE 802.5 Source Routing Specification.

   Bridge Number
        A 4 bit number identifying the bridge on the token ring, as
        defined in the IEEE 802.5 Source Routing Specification.

6.5.  IEEE 802.5 Line Identification Option

   This option permits the systems to treat the line as a visible "Token
   Ring", in accordance with the Source Routing algorithm.  The bridges
   exchange ring-and-bridge identifiers using this option on the Network
   Control Protocol.  The configured ring numbers must be identical in
   normal operation.

   The Token Ring Ring-and-Bridge Identifier, and its use, is specified
   by the IEEE 802.5 Addendum on Source Routing.  It identifies the ring
   that the interface is attached to by its configured ring number, and
   itself by bridge number on the ring.

   Figure 6: Line Identification Option

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     type=2    |length = 4     | ring number           |bridge#|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+




Point-to-Point Protocol Extensions Working Group               [Page 14]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   Type 2 = IEEE 802.5 Line "Ring/Bridge" Identifier

   Length
        4 Octets

   Ring Number
        A 12 bit number identifying the line, as defined in the
        IEEE 802.5 Source Routing Specification.

   Bridge Number
        A 4 bit number identifying the bridge on the token ring, as
        defined in the IEEE 802.5 Source Routing Specification.

6.6.  MAC Type Support Selection

   The MAC Type Selection Option is provided to permit nodes to
   advertise what sort of traffic they are prepared to convey.  A device
   negotiating a 1600 octet MRU, for example, may not be willing to
   support 802.5 (although it might, with certain changes necessary in
   the RIFs it passes, and given that the hosts it supports implement
   the 802.5 Maximum Frame Size correctly), and is definitely not
   prepared to support 802.4 or FDDI.

   A system which does not announce the MAC Types that it supports may
   be assumed to support all MAC Types; it will discard those that it
   does not understand.  A system which chooses to announce MAC Types is
   advising its neighbor that all unspecified MAC Types will be
   discarded.  Announcement of multiple MAC Types is accomplished by
   placing multiple options in the Configure Request.

   The Rejection of a MAC Type Announcement (in a Configure-Reject) is
   essentially a statement that traffic appropriate to the MAC Type, if
   encountered, will be forwarded on the link even though the receiving
   system has indicated it will discard it.

   Figure 7: MAC Type Selection Option

    0                   1                   2
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     type=3    |length = 3     | MAC Type      |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   Type 3 = MAC Type Selector

   Length
        3 Octets



Point-to-Point Protocol Extensions Working Group               [Page 15]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   MAC Type Selector
        One of the values of the PDU's MAC Type Field that this system is
        prepared to receive and service.

6.7.  Tinygram Compression

   Not all systems are prepared to make modifications to messages in
   transit; on high speed lines, it is probably not worth the effort.
   This option permits the system to negotiate compression.

   Consistent with the behavior of other compression options in the
   Internet Point-to-Point set of protocols, no negotiation implies no
   compression.  The systems need not agree on the setting of this
   parameter; one may be willing to decompress and the other not.  A
   system which does not negotiate, or negotiates this option to be
   disabled, should never receive a compressed packet, however.

   Figure 8: Tinygram Compression Option

    0                   1                   2
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     type=4    |length = 3     | Compression   |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   Type 4 = Tinygram Compression Support Option

   Length
        3 Octets

   Compression Enable/Disable
        If the value is 1, Tinygram Compression is enabled.  If the
        value is 2, Tinygram Compression is disabled, and no
        decompression will occur.

6.8.  LAN Identification Support

   Not all systems are prepared to make use of the LAN Identification
   field.  This option enables the systems to negotiate its use.

   The parameter is advisory; if the value is "enabled", then there may
   exist labeled LANs beyond the system, and the system is prepared to
   service traffic to it.  if the value is "disabled", then there are no
   labeled LANs beyond the system, and all such traffic will by
   definition be dropped.  Therefore, a system which is advised that his
   peer does not service LAN Identifications need not forward such
   traffic on the link.



Point-to-Point Protocol Extensions Working Group               [Page 16]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


   The default value is that LAN Identification disabled.

   Figure 9: LAN Identification Option

    0                   1                   2
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     type=5    |length = 3     | Identification|
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   Type 5 = LAN Identification Support Option

   Length
        3 Octets

   Identification Enable/Disable
        If the value is 1, LAN Identification is enabled.  If the value
        is 2, LAN Identification is disabled.

7.  Acknowledgements

   This document is a product of the Point-to-Point Protocol Extensions
   Working Group.  Special thanks go to Steve Senum of Network Systems,
   Dino Farinacci of 3COM, and Rick Szmauz of Digital Equipment
   Corporation.

8.  Bibliography

   [1] Perkins, D., "The Point-to-Point Protocol for the Transmission of
       Multi-Protocol Datagrams Over Point-to-Point Links", RFC 1171,
       CMU, July 1990.

   [2] Hobby R., and D. Perkins, "The Point-to-Point Protocol (PPP)
       Initial Configuration Options", RFC 1172, CMU, UC Davis, July
       1990.

   [3] IEEE Draft Standard P802.1d/D9 MAC Bridges, Institute of
       Electrical and Electronic Engineers.  Also Published as ISO DIS
       10038, July 1989.

   [4] IEEE Draft Standard P802.5d/D13 Draft Addendum to ANSI/IEEE Std
       802.5-1988 Token Ring MAC and PHY Specification Enhancement for
       Multiple-Ring Networks, Institute of Electrical and Electronic
       Engineers, May 1989.






Point-to-Point Protocol Extensions Working Group               [Page 17]

RFC 1220            Bridging Point-to-Point Protocol          April 1991


9.  Security Considerations

   Security issues are not discussed in this memo.

10.  Author's Address

   Fred Baker
   Advanced Computer Communications
   720 Santa Barbara Street
   Santa Barbara, CA 93101

   Phone: (805) 963-9431

   EMail: fbaker@ACC.COM
   Or send comments to: ietf-ppp@ucdavis.edu




































Point-to-Point Protocol Extensions Working Group               [Page 18]