RFC INDEX PAGE
Google
 







Network Working Group                                           S. Hares
Request for Comments: 1575                                  Merit/NSFNET
Obsoletes: 1139                                             C. Wittbrodt
Category: Standards Track                    Stanford University/BARRNet
                                                           February 1994


                  An Echo Function for CLNP (ISO 8473)

Status of this Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Abstract

   This memo defines an echo function for the connection-less network
   layer protocol.  The mechanism that is mandated here is in the final
   process of being standardized by ISO as "Amendment X: Addition of an
   Echo function to ISO 8473" an integral part of Version 2 of ISO 8473.

Table of Contents

   Section 1. Conventions .................................    2
   Section 2. Introduction ................................    2
   Section 3. The Generic Echo Function ...................    3
   Section 3.1 The Echo-Request ...........................    3
   Section 3.2 The Echo-Response ..........................    3
   Section 4. The Implementation Mechanism ................    4
   Section 4.1 The Echo-Request ...........................    4
   Section 4.2 The Echo-Response ..........................    4
   Section 5. Implementation Notes ........................    4
   Section 5.1 Discarding Packets .........................    4
   Section 5.2 Error Report Flag ..........................    4
   Section 5.3 Use of the Lifetime Field ..................    5
   Section 5.4 Echo-request function ......................    5
   Section 5.5 Echo-response function .....................    6
   Section 5.6 Use of the Priority Option .................    8
   Section 5.7 Use of the Source Route Option .............    8
   Section 5.8 Transmission of Multiple Echo-Requests .....    9
   Section 6. Security Considerations .....................    9
   Section 7. Authors' Addresses ..........................    9
   Section 8. References ..................................    9





Hares & Wittbrodt                                               [Page 1]

RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 1. Conventions The following language conventions are used in the items of specification in this document: o MUST, SHALL, or MANDATORY -- the item is an absolute requirement of the specification. o SHOULD or RECOMMENDED -- the item should generally be followed for all but exceptional circumstances. o MAY or OPTIONAL -- the item is truly optional and may be followed or ignored according to the needs of the implementor. 2. Introduction The OSI Connection-less network layer protocol (ISO 8473) defines a means for transmitting and relaying data and error protocol data units, (PDUs) or preferably, packets through an OSI internet. Unfortunately, the world that these packets travel through is imperfect. Gateways and links may fail. This memo defines an echo function to be used in the debugging and testing of the OSI network layer. Hosts and routers which support the OSI network layer MUST be able to originate an echo packet as well as respond when an echo is received. Network management protocols can be used to determine the state of a gateway or link. However, since these protocols themselves utilize a protocol that may experience packet loss, it cannot be guaranteed that the network management applications can be utilized. A simple mechanism in the network layer is required so that systems can be probed to determine if the lowest levels of the networking software are operating correctly. This mechanism is not intended to compete with or replace network management; rather it should be viewed as an addition to the facilities offered by network management. The code-path consideration requires that the echo path through a system be identical (or very close) to the path used by normal data. An echo path must succeed and fail in unison with the normal data path or else it will not provide a useful diagnostic tool. Previous drafts describing an echo function for CLNP offered two implementation alternatives (see RFC 1139). Although backward compatibility is an important consideration whenever a change is made to a protocol, it is more important at this point that the echo mechanisms used on the Internet interoperate. For this reason, this memo defines one implementation mechanism (consistent with one of the previous drafts). Hares & Wittbrodt [Page 2]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 3. The Generic Echo Function The following section describes the echo function in a generic fashion. This memo defines an echo-request entity. The function of the echo-request entity is to accept an incoming echo-request packet, perform some processing, and generate an echo-response packet. The echo implementation may be thought of as an entity that coexists with the network layer. Subsequent sections will detail the implementation mechanism. For the purposes of this memo, the term "ping" shall be used to mean the act of transmitting an echo-request packet to a remote system (with the expectation that an echo-response packet will be sent back to the transmitter). 3.1. The Echo-Request When a system decides to ping a remote system, an echo-request is built. All fields of the packet header are assigned normal values (see implementation specific sections for more information). The address of the system to be pinged is inserted as the destination NSAP address. The rules of segmentation defined for a data (DT) packet also apply to the echo-request packet. The echo-request is switched through the network toward its destination. (An echo packet must follow the same path as CLNP data packet with the same options in the CLNP header.) Upon reaching the destination system, the packet is processed according to normal processing rules. At the end of the input processing, the echo- request packet is delivered to the echo-request entity. The echo-request entity will build and dispatch the echo-response packet. This is a new packet. Except as noted below, this second packet is built using the normal construction procedures. The destination address of the echo-response packet is taken from the source address of the echo-request packet. Most options present in the echo-request packet are copied into the echo-response packet (see implementation notes for more information). 3.2. The Echo-Response The entire echo-request packet is included in the data portion of the echo-response packet. This includes the echo-request packet header as well as any data that accompanies the echo-request packet. The entire echo-request packet is included in the echo-response so that fields such as the echo-request lifetime may be examined when the response is received. After the echo-response packet is built, it is transmitted toward the new destination (the original source of the Hares & Wittbrodt [Page 3]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 echo-request). The rules of segmentation defined for a data packet also apply to the echo-response packet. The echo-response packet is relayed through the network toward its destination. (A echo response packet must follow the same path as a CLNP data packet with the same options in the CLNP header.) Upon reaching its destination, it is processed by the packet input function and delivered to the entity that created the echo-request. 4. The Implementation Mechanism The implementation mechanism defines two new 8473 packet types: ERQ (echo-request) and ERP (echo-response). With the exception of a new type code, these packets will be identical to the date packet in every respect. 4.1. The Echo-Request The type code for the echo-request packet is decimal 30. 4.2. The Echo-Response The type code for the echo-response packet is decimal 31. 5. Implementation Notes The following notes are an integral part of memo. It is important that implementors take heed of these points. 5.1. Discarding Packets The rules used for discarding a data packet (ISO 8473, Section 6.9 - Section 6.10) are applied when an echo-request or echo-response is discarded. 5.2. Error Report Flag The error report flag may be set on the echo-request packet, the echo-response packet, or both. If an echo-request is discarded, the associated error-report (ER) packet will be sent to the echo-request source address on the originating machine. If an echo-response is discarded, the associated error-report packet will be sent to the echo-response source address. In general, this will be the destination address of the echo-request entity. It should be noted that the echo-request entity and the originator of the echo-request packet are not required to process error-report packets. Hares & Wittbrodt [Page 4]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 5.3. Use of the Lifetime Field The lifetime field of the echo-request and echo-response packets should be set to the value normally used for a data packet. Note: although this memo does not prohibit the generation of a packet with a smaller-than-normal lifetime field, this memo explicitly does not attempt to define a mechanism for varying the lifetime field set in the echo-response packet. This memo recommends the lifetime value that would under normal circumstances by used when sending a data packet. 5.4. Echo-request function This function is invoked by system management to obtain information about the dynamic state of the Network layer with respect to (a) the reachability of specific network-entities, and (b) the characteristics of the path or paths that can be created between network-entities through the operation of Network layer routing functions. When invoked, the echo-request function causes an echo- request (ERQ) packet to be created. The echo-request packet shall be constructed and processed by ISO 8473 network-entities in end systems and intermediate systems in exactly the same way as the data packet, with the following caveats: a) The information available to the packet composition function (ISO 8473) consists of current state, local information, and information supplied by system management. b) The source and destination address fields of the echo-request packet shall contain, respectively, a Network entity title (NET) of the originating network-entity and a Network entity title of the destination network-entity (which may be in either an end system or an intermediate system). NOTE: A Network entity title is syntactically indistinguishable from an NSAP address. The additional information in an NSAP address, if any, beyond that which is present in a Network entity title, is relevant only to the operation of the packet decomposition function in a destination end system, and therefore is not needed for the processing of an echo-request packet (from which no N-UNITDATA indication is ever produced). The fact that the source and destination address fields of the echo-request packet contain NETs rather than NSAP addresses therefore does not affect the processing of an echo-request packet by any network-entity. c) When an echo-request packet has reached its destination, as determined by the Header processing (call HEADER FORMAT Analysis function in ISO 8473), the echo-response function shall handle this Network Protocol Data Units (NPDU) instead of the packet Hares & Wittbrodt [Page 5]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 decomposition function. In ISO 8473, the packet decomposition function is like a decomposing fish on the sea shore - it takes a packet down to its bare bones and processes it. Also, it is up to each individual system whether or not handling echo-request packets involves system management. One example of involving system management is the reporting reception of the echo packets as some systems do with the ping packet. Some systems find this of value if they are being pinged to death. d) The maximum length of the echo-request packet is equal to the maximum length of the echo-response packet minus the maximum length of the echo-response packet header. This ensures that the entire echo-request packet can be contained within the data field of the echo-response packet (see ISO 8473). e) The data part of the echo-request packet may, as a local matter, contain zero or more octets with any values that fit within the echo-request packet. (see (d) above for maximum length of the echo-request packet). If the first octet of data is binary 1000 0001, then an echo-response header is contained in the echo- request packet. The existence of this header insures that a router can formulate a standard echo-response packet. Normally, the "more segmentation" flag in the encapsulated echo- response packet header shall be zero, and the segmentation portion of the encapsulated packet shall not be included. The segmentation length in the echo-response packet header shall be zero. If the "more segmentation" flag is set in the encapsulated echo- response packet header, then a segmentation length shall be filled in and the segmentation part of the echo-response packet header will be present in the echo-response header. This same segmentation function shall be present in the echo-response sent by the router. NOTE: However, this formulated echo-response is not required between any two systems. With a common format for an echo-request packet used in an environment such as the Internet, the echo-response header may not be needed, and may in fact be unnecessary overhead. 5.5. Echo-response function This function is performed by a network-entity when it has received an echo-request packet that has reached its destination, as determined by the Header format analysis function (ISO 8473 clause 6.3) that is, an echo-request packet which contains, in its destination address field, a Network entity title that identifies the network-entity. When invoked, the echo-response function causes an Hares & Wittbrodt [Page 6]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 echo-response (ERP) packet to be created. The echo-response packet shall be constructed and processed by ISO 8473 network-entities in end systems and intermediate systems in exactly the same way as the data packet, with the following caveats: a) The information available to the packet composition function consists of current state, local information, and information contained in the corresponding echo-request packet. b) The source address field of the echo-response packet shall contain the value of the destination address field of the corresponding echo-request packet. The destination address field of the echo-response packet shall contain the value of the source address field of the corresponding echo-request packet. c) The echo-request packet, in its entirety, shall be placed into the data part of the echo-response packet. The data part of the echo-response packet shall contain only the corresponding echo- request packet. d) If the data part of the echo-request packet contains an echo- response header, the packet composition function may, but is not required to, use some or all of the information contained therein to select values for the fields of the echo-response packet header. In this case, however, the value of the lifetime field contained in the echo-response packet header in the echo-request packet data part must be used as the value of the lifetime field in the echo-response packet. The values of the segment length and checksum fields shall be computed by the network-entity regardless of the contents of those fields in the echo-response packet header in the data part of the echo-request packet. e) The options part of the echo-response packet may contain any (or none) of the options described in ISO 8473 (but see Section 5.7 of this RFC). The values for these options, if present, are determined by the network-entity as a local matter. They may be, but are not required to be, either identical to or derived from the corresponding options in the echo-request packet and/or the echo-response packet header contained in the data part of the echo-request packet (if present). The source routing option in the echo-response packet shall not be identical to (copied from) the source routing option in the echo-request packet header. If the recording of route option in the echo-response packet is identical to (copied from) the recording of route option in the echo-request packet header, the second octet of the parameter value field shall be set to the value 3. Hares & Wittbrodt [Page 7]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 f) It is a local matter whether or not the destination network- entity performs the lifetime control function on an echo-request packet before performing the echo-response function. The destination network-entity shall make the same decision in this regard that it would make, as a local matter, for a data packet in accordance with ISO 8473. 5.6. Use of the Priority Option The 8473 priority function indicates the relative priority of packet. 0 is normal and 14 is the highest. Packets with higher values will be transmitted before lower values. The specific action upon receiving a 8473 packet with the priority field set is a "LOCAL MATTER". These means, any two systems could do it differently. Hopefully, in the future, Internet routers will handle this as a priority queueing function. Some implementors consider the priority queueing function to be a cap. For example, if a router is congested, all those packets with priorities higher than 20, will be allowed through, and those with priority less than 20 will be dropped. In short, the basic function of priority has wide latitude in the ISO specification. This wide latitude of implementation needs to be narrowed for implementations within a common network environment such as the Internet. The 8473 priority function is rarely implemented in today's Internet. The transmission of an echo-request packet with a priority set may provided unexcepted results until a more wide spread deployment of the priority feature in 8473 capable routers and end systems. However, if the priority function must be used it is the safest value may be the value 0 - which indicates Normal priority. It most likely this value will follow the 8473 pathways. In the future, as the implementation of the priority function further Internet documents will need to deal with its expected use. 5.7. Use of the Source Route Option Use of the source route option in ISO 8473 may cause packets to loop until their lifetime expires. For this reason, this memo recommends against the use of the source route option in either an echo-request or echo-response packets. If the source route option is used to specify the route that the echo-request packet takes toward its destination, this memo does not recommend the use of an Hares & Wittbrodt [Page 8]
RFC 1575 An Echo Function for CLNP (ISO 8473) February 1994 automatically generated source route on the echo-response packet. 5.8. Transmission of Multiple Echo-Requests The echo function may be utilized by more than one process on any individual machine. The mechanism by which multiple echo-requests and echo-responses are correlated between multiple processes on a single machine is a local matter and not defined by this memo. 6. Security Considerations Security issues are not discussed in this memo. 7. Authors' Addresses Susan K. Hares MERIT/NSFNET Internet Engineering 1075 Beal Avenue Ann Arbor, MI 48109-2112 Phone: (313) 936-3000 EMail: skh@merit.edu Cathy J. Wittbrodt Stanford University/BARRNet Networking Systems Pine Hall 115 Stanford, CA 94305 Phone: (415) 725-5481 EMail: cjw@magnolia.Stanford.EDU 8. References [1] ISO/IEC. Protocol for Providing the Connectionless-mode Network Service. International Standard 8473, ISO/IEC JTC 1, Switzerland, 1986. [2] Hagens, R., "An Echo Function for ISO 8473", RFC 1139, IETF-OSI Working Group, January 1990. [3] ISO 8473-1993 Protocol for providing the connectionless-mode network service, edition 2 (IS under preparation). Hares & Wittbrodt [Page 9]

The HTML presentation of this document is copyrighted by Grafman Productions.
Copyright © 1997 - Grafman Productions - ALL RIGHTS RESERVED
Grafman Productions