当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《信息网络协议基础》课程教学资源(学习资料)Neighbor Discovery

资源类别:文库,文档格式:PDF,文档页数:48,文件大小:2.67MB,团购合买
■Describe the functions of the Neighbor Discovery(ND)protocol. ■List and describe the function and format of ND options. ■List and describe the function and format of ND messages. ■Describe which ND messages use which ND options. Describe the details of the address resolution,neighbor unreachability detection, duplicate address detection,router discovery,and redirect processes. Describe the host sending algorithm in terms of host data structures and ND messages.
点击下载完整版文档(PDF)

Chapter 6 Neighbor Discovery At the end of this chapter,you should be able to do the following: ■Describe the functions of the Neighbor Discovery(ND)protocol. ■List and describe the function and format of ND options. ■List and describe the function and format of ND messages. ■Describe which ND messages use which ND options. Describe the details of the address resolution,neighbor unreachability detection, duplicate address detection,router discovery,and redirect processes. Describe the host sending algorithm in terms of host data structures and ND messages. Neighbor Discovery Overview Internet Protocol version 6 (IPv6)Neighbor Discovery (ND)is a set of messages and pro- cesses defined in RFC 4861 that determine relationships between neighboring nodes.ND replaces Address Resolution Protocol (ARP),Internet Control Message Protocol (ICMP) router discovery,and the ICMP Redirect message used in IPv4.ND also provides additional functionality. ND is used by nodes to do the following: Resolve the link-layer address of a neighboring node to which an IPv6 packet is being forwarded. ■Determine when the link-layer address of a neighboring node has changed ■Determine whether a neighbor is still reachable. ND is used by hosts to do the following: ■Discover neighboring routers. ■Autoconfigure addresses,address prefixes,routes,and other configuration parameters. ND is used by routers to do the following: ■Advertise their presence,host configuration parameters,routes,and on-link prefixes. Inform hosts of a better next-hop address to forward packets for a specific destination. 123

￾       ! "# $%&'( ) * # *+ , %,+    ! ++ -"./ 0 12345672 892 :;26?97=5 1634=@25A B>1C D5=8=4=EF 0 G638 H1 =D86=1 J233H?23F 0 12345672 K9649 >1 J233H?23 ;32 K9649 >1 =D86=1 J233H?23F   MN OPQRSPRQ TSUQUVUW XRSYZUP [ \OTX[] ^RZ_`aUS bZYVUXRSc \^b] ZY d YRQ Ue fRYYd_RY dPg hSUi VRYYRY gReZPRg ZP jkl mn[o Q`dQ gRQRSfZPR SRWdQZUPY`ZhY aRQpRRP PRZ_`aUSZP_ PUgRYq ^b SRhWdVRY rggSRYY jRYUWsQZUP TSUQUVUW \rjT]t OPQRSPRQ lUPQSUW uRYYd_R TSUQUVUW \OluT] SUsQRS gZYVUXRSct dPg Q`R OluT jRgZSRVQ fRYYd_R sYRg ZP OTXmq ^b dWYU hSUXZgRY dggZQZUPdW esPVQZUPdWZQcq ^b ZY sYRg ac PUgRY QU gU Q`R eUWWUpZP_v 0 jRYUWXR Q`R WZPwiWdcRS dggSRYY Ue d PRZ_`aUSZP_ PUgR QU p`ZV` dP OTX[ hdVwRQ ZY aRZP_eUSpdSgRgq 0 bRQRSfZPR p`RP Q`R WZPwiWdcRS dggSRYY Ue d PRZ_`aUSZP_ PUgR `dY V`dP_Rgq 0 bRQRSfZPR p`RQ`RS d PRZ_`aUS ZY YQZWW SRdV`daWRq ^b ZY sYRg ac `UYQY QU gU Q`R eUWWUpZP_v 0 bZYVUXRS PRZ_`aUSZP_ SUsQRSYq 0 rsQUVUPeZ_sSR dggSRYYRYt dggSRYY hSReZxRYt SUsQRYt dPg UQ`RS VUPeZ_sSdQZUP hdSdfRQRSYq ^b ZY sYRg ac SUsQRSY QU gU Q`R eUWWUpZP_v 0 rgXRSQZYR Q`RZS hSRYRPVRt `UYQ VUPeZ_sSdQZUP hdSdfRQRSYt SUsQRYt dPg UPiWZPw hSReZxRYq 0 OPeUSf `UYQY Ue d aRQQRS PRxQi`Uh dggSRYY QU eUSpdSg hdVwRQY eUS d YhRVZeZV gRYQZPdQZUPq

124 Understanding IPv6,Second Edition IPv6 ND processes include the following: Router discovery During router discovery,a host discovers the local routers on an attached link.This process is equivalent to ICMPv4 router discovery.For more informa- tion,see the "Router Discovery"section in this chapter. Prefix discovery Prefix discovery is the process by which hosts discover the network prefixes for local link destinations.This is similar to the exchange of the ICMPv4 Address Mask Request and Address Mask Reply messages.For more information,see the "Router Discovery"section in this chapter. Parameter discovery The parameter discovery process enables hosts to discover additional operating parameters,including the link maximum transmission unit(MTU) and the default hop limit for outgoing packets.For more information,see the"Router Discovery"section in this chapter. Address autoconfiguration During address autoconfiguration,IP addresses are con- figured for interfaces in either the presence or absence of an address configuration server,such as a Dynamic Host Configuration Protocol for IPv6(DHCPv6)server.For more information,see Chapter 8,"Address Autoconfiguration." Address resolution Address resolution is the process by which nodes resolve a neigh- bor's IPv6 address to its link-layer address.It is equivalent to ARP in IPv4.For more infor- mation,see the "Address Resolution"section in this chapter. Next-hop determination During next-hop determination,a node determines the IPv6 address of the neighbor to which a packet is being forwarded,based on the destination address.The next-hop address is either the destination address or the address of an on- link default router.For more information,see "Host Sending Algorithm"in this chapter. Neighbor unreachability detection The neighbor unreachability detection process is the means by which a node determines that the IPv6 layer of a neighbor is no longer receiving packets or that an IPv6 address has moved to a different physical interface.For more information,see the "Neighbor Unreachability Detection"section in this chapter. Duplicate address detection During duplicate address detection,a node determines that an address considered for use is not already in use by a neighboring node.This pro- cess is equivalent to using gratuitous ARP frames in IPv4.For more information,see the "Duplicate Address Detection"section in this chapter. Redirect function The redirect function is the process of informing a host of a better first-hop IPv6 address to reach a destination.It is equivalent to the use of the ICMPv4 Redirect message.For more information,see the"Redirect Function"section in this chapter

￾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

Chapter 6 Neighbor Discovery 125 Neighbor Discovery Message Format ND messages use the ICMPv6 message structure and ICMPv6 types 133 through 137.ND messages consist of an ND message header,composed of an ICMPv6 header and ND message specific data,and zero or more ND options.Figure 6-1 shows the format of an ND message. IPv6 Header Neighbor Discovery Neighbor Discovery Next Header =58 Message Header Message Options (ICMPv6) -Neighbor Discovery Message Figure 6-1 The format of an ND message There are five different ND messages: Router Solicitation(ICMPv6 type 133) Router Advertisement (ICMPv6 type 134) Neighbor Solicitation (ICMPv6 type 135) Neighbor Advertisement(ICMPv6 type 136) Redirect(ICMPv6 type 137) ND message options provide additional information,indicating MAC addresses,on-link net- work prefixes,on-link MTU information,redirection data,mobility information,and specific routes. To ensure that ND messages that are received have originated from a node on the local link (either a physical link or a tunnel),all ND messages are sent with a hop limit of 255.When an ND message is received,the Hop Limit field in the IPv6 header is checked.If it is not set to 255,the message is silently discarded.Verifying that the ND message has a hop limit of 255 provides protection from ND-based network attacks that are launched from off-link nodes. With a hop limit of 255,a router could not have forwarded the ND message from an off-link node. Neighbor Discovery Options ND options are formatted in type-length-value(TLV)format.Figure 6-2 shows the TLV format Type Length W Vaive w.· Figure 6-2 The TLV format for ND options

￾      !"#$ %&'%( )*+,--./,-0-,12,345678+,--./,-190:109,.;,-?@@129A0/2?@BC)* +,--./,-:A;-D-1AE.;)*+,--./,2,.A-,,:DED:1DA;-CID/09,8G?-2AJ-12,EA9+.1AE.;)*+,--./,C K L MN OPQRSTUVWSRVXYZUQ[[V\Q ]2,9,.9,ED7,,?@@d _ `A01,9e,?@fd _ ),D/2gA9aAbD:D1.1DA;c3456781=>,?@hd _ ),D/2gA9e,?@8d _ `,,?@Bd )*+,--./,A>1DA;->9A7D9,EDj,-FA;GbD;i5]kD;EA9+.1DA;F9,,:DED: 9A01,-C ]A,;-09,12.1)*+,--./,-12.1.9,9,:,D7,2=-D:.bbD;iA9.10;;,bdF.bb)*+,--./,-.9,-,;1JD12.2A>bD+D1AElhhCm2,;.; )*+,--./,D-9,:,D7,oD+D1ED,bbD+D1AElhh >9A7D9A1,:1DA;E9A+)*Gg.-,bD+D1AElhhF.9A01,9:A0b1DA;-.9,EA9+.11,,Gb,;/12G7.b0,c]opdEA9+.1CID/09,8Gl-2AJ-12,]opEA9+.1C K L Mt OPQOuvRSTUVWRSTYZSwWxSX[ yz{|}~€~ ‚ƒ„…†ƒ‡ˆƒ‰Š‹Œ Ž‘’ •~™š›œš{~ž Ÿ~œœ~}~€~ •~™š›œš{~ž Ÿ~œœ~ ¡¢š£œ ‚ƒ¤¥¦§¨‰©¤ª«¨’ƒ‰¬ƒªª‡¥ƒ ­¬®ƒ ¯ƒ°¥…¦ ±‡²³ƒ ´´´

126 Understanding IPv6,Second Edition The 8-bit Type field indicates the type of ND option.Table 6-1 lists the ND option types defined in RFC 4861,RFC 3775,and RFC 4191 Table 6-1 IPv6 ND Option Types Type Option Name Source Document Source Link-Layer Address RFC 4861(Neighbor Discovery for IPv6) Target Link-Layer Address RFC 4861 Prefix Information RFC 4861 Redirected Header RFC 4861 MTU RFC 4861 Advertisement Interval RFC 3775 (Mobile IPv6) Home Agent Information RFC 3775 24 Route Information RFC 4191(Default Router Preferences and More- Specific Routes) The 8-bit Length field indicates the length of the entire option in 8-byte blocks.All ND options must fall on 8-byte boundaries.The variable length Value field contains the data for the option. The Advertisement Interval and Home Agent Information options are described in Appendix F,“Mobile IPv6.” Source and Target Link-Layer Address Options The Source Link-Layer Address option indicates the link-layer address of the ND message sender.The Source Link-Layer Address option is included in the Neighbor Solicitation,Router Solicitation,and Router Advertisement messages.The Source Link-Layer Address option is not included when the source address of the ND message is the unspecified address (:) Figure 6-3 shows the structure of the Source Link-Layer Address option. Type Length Link-Layer Address... Figure 6-3 The structure of the Source Link-Layer Address option The Target Link-Layer Address option indicates the link-layer address of the neighboring node to which IPv6 packets should be directed.The Target Link-Layer Address option is included in the Neighbor Advertisement and Redirect messages. Figure 6-4 shows the structure of the Target Link-Layer Address option

￾       !"#$%$&'( !)"*+)!)%,'#-.#((*+)!)% !( $"%$%/012-.3/0145563'%$/012.7., 8%9"#$%$&'(#%9)"%:)!)%% #)&;(,("'##)% )>%$':(,?':'##%9@'#>"#$&)%'%($''"): )!)%, :&8%;8' ::&8%;8' :$$%*9):Q)#&')%3/)>: Q)#&')%3'%$/)>::&8%;8' :$$R%()>:&'$$:(()"*+=(('9(>%(!&"$'$$:((STTU, 09>:-4()R((:>&>:)"Q)>:&8%;8' :#$$:&$,':98%;8' :$$% *9)::-2()R((:>&>:)"':98%;8' :<$$:(()!)%, I mnLo pqOP IMP IMP OP p r HqHr s b`^]_ZcdefgchiZ]jkk]Z[[ tuvwxysz{Zd|Y}`]~d[_`Z]ia`]€y‚ ƒ Xh]|Z\cdefgchiZ]jkk]Z[[ tuvwxys „ ]Zad…€ea`]†h\d`e tuvwxys w tZkd]Z_\Zk‡ZhkZ] tuvwxys ˆ ‰XŠ tuvwxys ‹ jkZ]\d[Z†Ze\€e\Z]hŒ tuv„‹‹ˆz‰`}dŒZ€y‚ x ‡`†Zj|Ze\€ea`]†h\d`e tuv„‹‹ˆ ƒw t`^\Z€ea`]†h\d`e tuvwssz~Zah^Œ\t`^\Z]]ZaZ]Ze_Z[hek‰`]Zg blZ_dad_t`^\Z[‚ Ž‘ ’‘• ’™’š‘›œ›‘žž Ÿ  ¡¡¡

Chapter 6 Neighbor Discovery 127 Type 三2 Length Link-Layer Address wwww... Figure 6-4 The structure of the Target Link-Layer Address option The Source Link-Layer Address option and the Target Link-Layer Address option have the same format The Type field is set to 1 for a Source Link-Layer Address option and 2 for a Target Link-Layer Address option.The Length field is set to the number of 8-byte blocks in the entire option. The Link-Layer Address field is a variable-length field that contains the link-layer address of the source or target.Each link layer defined for IPv6 must specify the way in which the link- layer address is formatted in the Source and Target Link-Layer Address options. For example,RFC 2464 defines how IPv6 packets are sent over Ethernet networks.It also includes the format of the Source and Target Link-Layer Address ND options.For Ethernet. the link-layer address is 48 bits(6 bytes)in length.Figure 6-5 shows the Target Link-Layer Address option for Ethernet. Type =2 Length m=1 Ethernet MAC Address u Figure 6-5 The Target Link-Layer Address option for Ethernet Network Monitor Capture Here is an example of a Source Link-Layer Address option used in a Neighbor Solicitation message as displayed by Network Monitor 3.1(frame 1 of capture 06_0l in the \Network- MonitorCaptures folder on the companion CD-ROM): Frame: Ethernet:Etype IPv6 Ipv6:Next Protocol ICMPv6,Payload Length 32 Icmpv6:Neighbor Solicitation,Target FE80:0:0:0:260:97FF:FE02:6EA5 MessageType:Neighbor Solicitation,135(0x87) NeighborSolicitation: Code:0 (0x0) Checksum:3893 (0xF35) Reserved:0 (0x0) TargetAddress:FE80:0:0:0:260:97FF:FE02:6EA5 SourceLinkLayerAddress: Type:Source Link-Layer Address,1(0x1) Length:1,in unit of 8 octets Address:00-10-5A-AA-20-A2

￾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`abc ￾ d2629A=:2T=FBI24G=34567289:;26?@@62AA4BC94:5A2@9:=Y29D1L4634I979C=C94: F2AA=D2=A@9ABI=>2@L>Y2CR46;e4:9C46fHJ[G6=F2J4G7=BC562gQhgJ9:C12iY2CR46;< e4:9C46W=BC562AG4I@264:C1274FB=:94:WZ<Vje\k lmnopq  r stupmvptq stwxpyz{|} r zx|}q ~pt {m€t€€‚yzƒ„{|}… {nw‚€n† ‡pvˆtuy‰Š ‹ zox|}q ~pŒˆu€m Ž€‚ŒŒtntŒ€v… nmˆptyls‘q‘q‘q‘qŠ}‘q’llqls‘Šq}s• „pnˆpwxpq ~pŒˆu€m Ž€‚ŒŒtntŒ€v… ‰•‘™ ‹ ~pŒˆu€mŽ€‚ŒŒtntŒ€vq  ƒ€†pq‘‘‘™ ƒupš›oq ‰’‰ ‘l‰•™ œppm|p†q‘‘‘™ nmˆpt††mpq ls‘q‘q‘q‘qŠ}‘q’llqls‘Šq}s• ‹ Ž€›mp‡Œvš‡nwpm††mpq  wxpq Ž€›mp ‡Œvš‹‡nwpm ††mp… ‘™ ‡pvˆtuq … Œv ›vŒt €€tpt ††mpq ‘‘‹‘‹•‹‹Š‘‹Š žŸ ¡ ¢¡£¤¥¦ ¢§£¨©¢ªŸ¡«¬­­«¡®® ¯° ±±± žŸ ¡ ¢¡£¤¥¦ ²¥¦¡«£¡¥³¬´¬­­«¡®® ¯° µ

128 Understanding IPv6,Second Edition Prefix Information Option The Prefix Information option is sent in Router Advertisement messages to indicate both address prefixes and information about address autoconfiguration.There can be multiple Pre- fix Information options included in a Router Advertisement message,indicating multiple address prefixes. Figure 6-6 shows the structure of the Prefix Information option. Type =3 Length =4 Prefix Length On-Link Flag Autonomous Flag Router Address Flag Site Prefix Flag Reserved 1 Valid Lifetime Preferred Lifetime Reserved 2 Site Prefix Length Prefix wwwwwwww wwwwwwww Figure 6-6 The structure of the Prefix Information option The fields in the Prefix Information option are as follows: Type The value of this field is 3. Length The value of this field is 4.(The entire option is 32 bytes in length.) Prefix Length The Prefix Length field indicates the number of leading bits in the Prefix field that make up the address prefix.The size of this field is 8 bits.The Prefix Length field has a value from 0 through 128.Because typical prefixes advertised are for subnet identifiers,the Prefix Length field is usually set to 64. On-Link flag The On-Link flag indicates,when set to 1,that the addresses implied by the included prefix are available on the link on which this Router Advertisement mes- sage was received.When this flag is set to 0,it is not assumed that the addresses that match the prefix are available on-link.The size of this field is I bit. Autonomous flag The Autonomous flag indicates,when set to 1,that the included pre- fix is used to create an autonomous(or stateless)address configuration.When this flag is set to 0,the included prefix is not used to create a stateless address configuration.The size of this field is 1 bit Router Address flag The Router Address flag is defined in RFC3775 for Mobile IPv6. For more information,see Appendix F

￾           !"#$%&"'!()*#'&'+*#'&#,,&*#&-'.*!/01!*#,(&*(,,)2,*'#&0#3)*4'* )00!,,+!"#$,)&0#&"'!()*#'&)4'.*)00!,,).*'3'&"#2.!)*#'&5!3)&4(.6*#+6 !7 "#$%&"'!()*#'&'+*#'&,#&36.00#&)-'.*!/01!*#,(&*(,,)28#&0#3)*#&2(.6*#+6 )00!,,+!"#$,5 9#2.!:7:,';,*,*!.3*.!'"* !"#$%&"'!()*#'&'+*#'&5  ?@ABCDEFCEDAGHC@AIDAHJKLMHGDNOCJGMGPCJGM "#60,#&* !"#$%&"'!()*#'&'+*#'&)!),"'66';,Q R ST 1)6.'"*#,"#60#,U5 R V W 1)6.'"*#,"#60#,X5Y&*#!'+*#'&#,UZ4[*,#&6&2*5\ R  V W  !"#$]&2*"#60#&0#3)*,*&.(4!'"6)0#&24#*,#&* !"#$ "#60*)*()^.+*)00!,,+!"#$5,#_'"*#,"#60#,`4#*,5 !"#$]&2* "#60),)1)6."!'(a*!'.2bZ`5c3).,*[+#3)6+!"#$,)01!*#,0)!"'!,.4&* #0&*#"#!,8* !"#$]&2*"#60#,.,.)66[,**':X5 R >V de f&7]#&^"6)2#&0#3)*,8;&,**'b8*)**)00!,,,#(+6#04[ *#&36.00+!"#$)!)1)#6)46'&*6#&^'&;#3*#,-'.*!/01!*#,(&*(,7 ,)2;),!3#105g&*#,"6)2#,,**'a8#*#,&'*),,.(0*)**)00!,,,*)* ()*3*+!"#$)!)1)#6)46'&76#&^5,#_'"*#,"#60#,b4#*5 R h= = e /.*'&'('.,"6)2#&0#3)*,8;&,**'b8*)**#&36.00+!7 "#$#,.,0*'3!)*)&).*'&'('.,Y'!,*)*6,,\)00!,,3'&"#2.!)*#'&5g&*#,"6)2 #,,**'a8*#&36.00+!"#$#,&'*.,0*'3!)*),*)*6,,)00!,,3'&"#2.!)*#'&5 ,#_'"*#,"#60#,b4#*5 R i= h e -'.*!/00!,,"6)2#,0"#&0#&-9jUkkl"'!m'4#6% 1:5 9'!('!#&"'!()*#'&8,/++&0#$95 nopq rqstuv wx y z{q|}~rqstuv s€r}s‚ƒ„t …†u‡s‡ˆ‡†‰‚ƒ„t Š‡†uq{…‹‹{q‰‰‚ƒ„t Œ}uqz{q|}~‚ƒ„t Šq‰q{q‹Ž „ƒ}‹r}|qu}ˆq z{q|q{{q‹r}|qu}ˆq Šq‰q{q‹ z{q|}~ Œ}uqz{q|}~rqstuv

Chapter 6 Neighbor Discovery 129 Site Prefix flag The Site Prefix flag indicates,when set to 1,that the site prefix defined by the Prefix field and the Site Prefix Length field be used to update the site prefix table. The site prefix table is maintained by the host and is utilized to prefer the use of site-local addresses when a global address matches a site prefix.This flag is described in the Inter- net draft titled "Site Prefixes in Neighbor Discovery.' Reserved1 The Reservedl field is a 4-bit field reserved for future use and set to 0. Valid Lifetime The Valid Lifetime field indicates the number of seconds that an address,based on the included prefix and using stateless address configuration,remains valid.The size of this field is 32 bits.The Valid Lifetime field also indicates the number of seconds that the included prefix is valid for on-link determination.For an infinite valid lifetime,the Valid Lifetime field is set to OxFFFFFFFF. Preferred Lifetime The Preferred Lifetime field indicates the number of seconds that an address,based on the included prefix and using stateless address autoconfiguration, remains in a preferred state.The size of this field is 32 bits.Stateless autoconfiguration addresses that are still valid are either in a preferred or deprecated state.In the preferred state,the address can be used for unrestricted communication.In the deprecated state, the use of the address is not recommended for new communications.However,existing communications using a deprecated address can continue.An address goes from the preferred state to the deprecated state when its preferred lifetime expires.For an infinite preferred lifetime,the Preferred Lifetime field is set to OxFFFFFFFF. Reserved2 The Reserved2 field is a 24-bit field reserved for future use and set to 0. Site Prefix Length The Site Prefix Length field indicates the number of leading bits in the Prefix field that define a site prefix.The length of this field is 8 bits.This field is sig- nificant only if the Site Prefix flag is set to 1.This field is described in the Internet draft titled "Site Prefixes in Neighbor Discovery.' Prefix The Prefix field indicates the prefix for the IPv6 address derived through state- less autoconfiguration.The size of this field is 128 bits.Bits in the Prefix field-up to a count equaling the value of the Prefix Length field-are significant for creating the prefix The combination of the Prefix Length field and the Prefix field unambiguously defines the prefix which,when combined with the interface identifier for the node,creates an IPv6 address.The link-local prefix should not be sent and is ignored by the receiving host. Network Monitor Capture Here is an example of a Prefix Information option used in a Router Advertisement message as displayed by Network Monitor 3.1(capture 06_02 in the \NetworkMonitorCaptures folder on the companion CD-ROM): Frame: Ethernet:Etype-IPv6 Ipv6:Next Protocol ICMPv6,Payload Length 96 Icmpv6:Router Advertisement MessageType:Router Advertisement,134(0x86)

￾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￾[ O$!-(*&(82'0%(#$%!&;*%0$8("!0*02"!0*6-+!*(D06"$P+?$"!-8*"8--()(- +!-2'(4+34="/0$M\0*!"0$K71],(2"6$FT^FL!*"_="/0$M\0*!"0$`(2"6$-%0'+$0* ",082(*!0*`>:Da\bc defghi  j klmhenhli klophqrstu j rptui vhwl sexlxyxzqr{|stu} sfozxf~ hn€lmqu ‚ rygptui ƒx„lhe …~thel†‡hghnl |h‡‡f€hˆophi ƒx„lhe …~thel†‡hghnl} ‰Š‹ŒwŽu

130 Understanding IPv6,Second Edition RouterAdvertisement: SourceLinkLayerAddress: Type:Source Link-Layer Address,1(0x1) Length:1,in unit of 8 octets Address:00-B0-D0-23-47-33 MTU: PrefixInformation: PrefixInformation: Type:Prefix Information,3(0x3) Length:4,in unit of 8 octets PrefixLength:64 (0x40) -F1ags:192(0xC0) L:(1.......)On-Link determination allowed A: (.1......)Autonomous address-configuration R: (..0.....)Not router Address S: (...0....)Not a site prefix P: (....0...)Not a router prefix Rsv:(...000) ValidLifetime:4294967295 (0xFFFFFFFF) PreferredLifetime:4294967295 (OxFFFFFFFF) Reserved:0 (0x0) Prefix:FD43:2DA1:3FE9:2:0:0:0:0 Redirected Header Option The Redirected Header option is sent in Redirect messages to specify the IPv6 packet that caused the router to send a Redirect message.It can contain all or part of the redirected IPv6 packet,depending on the size of the IPv6 packet that was initially sent. Figure 6-7 shows the structure of the Redirected Header option Type =4 Length Reserved Portion of Redirected Packet... Figure 6-7 The structure of the Redirected Header option The following list describes the fields in the Redirected Header option: Type The value of this field is 4. Length The value of this field is the number of 8-byte blocks in the entire option. Reserved The Reserved field is a 48-bit field reserved for future use and set to 0. Portion of redirected packet This field contains either the IPv6 packet or a portion of the IPv6 packet that caused the Redirect message to be sent.The amount of the original packet that is included is the leading portion of the packet so that the entire Redirect message is no more than 1280 bytes in length

￾        !"#$%&  ' ()*"%+*,- ##&  .-/& () *"%+'*,-  ##0 123415 *%67& 10 "% %" 89)#  ##& 33':3';3'?'==  @.A&   B8"4C%8$,"%&  ' B8"4C%8$,"%&  .-/& B8"4 C%8$,"%0 =234=5 *%67& >0 "% %" 89)# B8"4*%67& D> 234>35 ' EF,6#& 1GGD?GD?=&<;1&=EOG&<&3&3&3&3 P  Q RS  TUVWVXYZV[\VX]V^XVZ_`\Y_aYbbVa\YaWVXYZV[\cVbb^dVb\_b`V[Yef\UVghij`^[kV\\U^\ [^lbVX\UVZ_l\VZ\_bVaX^WVXYZV[\cVbb^dVmg\[^a[_a\^Ya^nn_Z`^Z\_e\UVZVXYZV[\VXghij `^[kV\oXV`VaXYad_a\UVbYpV_e\UVghij`^[kV\\U^\q^bYaY\Y^nnfbVa\m rYdlZVjstbU_qb\UVb\Zl[\lZV_e\UVWVXYZV[\VX]V^XVZ_`\Y_am u vwx yz{|}~€}~{‚}z{ƒ{„…~{€}{„†{‡„{~ˆ}…‰ TUVe_nn_qYadnYb\XVb[ZYŠVb\UVeYVnXbYa\UVWVXYZV[\VX]V^XVZ_`\Y_a‹ Œ ŽS TUVi^nlV_e\UYbeYVnXYbm Œ  ‘ TUVi^nlV_e\UYbeYVnXYb\UValcŠVZ_e’sŠf\VŠn_[kbYa\UVVa\YZV_`\Y_am Œ P  TUVWVbVZiVXeYVnXYb^’sŠY\eYVnXZVbVZiVXe_Zel\lZVlbV^aXbV\\_m Œ    S • TUYbeYVnX[_a\^YabVY\UVZ\UVghij`^[kV\_Z^`_Z\Y_a_e \UVghij`^[kV\\U^\[^lbVX\UVWVXYZV[\cVbb^dV\_ŠVbVa\mTUV^c_la\_e\UV_ZYdYa^n `^[kV\\U^\YbYa[nlXVXYb\UVnV^XYad`_Z\Y_a_e\UV`^[kV\b_\U^\\UVVa\YZVWVXYZV[\ cVbb^dVYba_c_ZV\U^a’Šf\VbYanVad\Um ™š› œ›žŸ  ¡›¢›£¤›¥ ¦§£Ÿ¨§§©¡›¥¨£›ªŸ›¥¦«ª¬›Ÿ ­® ¯¯¯

Chapter 6 Neighbor Discovery 131 Network Monitor Capture Here is an example of a Redirected Header option used in a Redirect message as displayed by Network Monitor 3.1(capture 06_03 in the \NetworkMonitorCaptures folder on the companion CD-ROM Frame: Ethernet:Etype IPv6 Ipv6:Next Protocol ICMPv6,Payload Length 128 Icmpv6:Redirect,Target -FE80:0:0:0:2B0:DOFF:FE23:4735 MessageType:Redirect,137(0x89) Redirect: Code:0 (0x0) Checksum:31003 (0x791B) Reserved:0 (0x0) TargetAddress:FE80:0:0:0:2BO:DOFF:FE23:4735 DestAddress:2001:DB8:0:0:0:0:0:1 RedirectedHeader: Type:Redirected Header,4(0x4) Length:11,in unit of 8 octets Reserved:0 (0x0) InvokingPacket:Next Protocol ICMPv6,Payload Length 40 Versions:IPv6,Internet Protocol,DSCP 0 Version: (0110............................)IPv6,Internet Protocol, 6(0x6) DSCP: (....000000......................)Differentiated services codepoint 0 ECT: (..........0.....................)ECN-Capable Transport not set CE: (......0............)ECN-CE not set F1 owLabe:(......00000000000000000000)0 PayloadLength:40 (0x28) NextProtocol:ICMPv6,58(0x3a) HopLimit:128 (0x80) SourceAddress:FE80:0:0:0:260:8FF:FE52:F9D8 DestinationAddress:3000:0:0:0:0:0:0:1 OriginalIPPayload:Binary Large Object (40 Bytes) MTU Option The MTU option is sent in Router Advertisement messages to indicate the IPv6 MTU of the link.This option is typically used when the IPv6 MTU for a link is not well known or needs to be set because of a translational or mixed-media bridging configuration.The MTU option overrides the IPv6 MTU reported by the interface hardware. In bridged or Layer-2 switched environments,it is possible to have different link-layer technol- ogies with different link-layer MTUs on the same link.In this case,differences in IPv6 MTUs between nodes on the same link are not detected through Path MTU Discovery.The MTU option is used to indicate the highest IPv6 MTU supported by all link-layer technologies on the link

￾      ￾  !" #$%&' ()*+) )&$+&!,)! ()*+# - )$% .)/. 0+1&23&!+&4567* $+,89:84!+;?(@3AB CDEFGH  I JKLGDMGKH JKNOGPQRST I QOSTH UGVK RDWKWXWYPQZ[RST\ RENYWE] ^GM_KLP`ab c QXFOSTH dG]eDGXK\ fED_GKPCJbgHgHgHgHahgHigCCHCJajHkljm [GnnE_GfNOGH dG]eDGXK\ `jlogVbpq c dG]eDGXKH  ZW]GHgogVgq ZLGXrnsFH j`ggj ogVlp`hq dGnGDSG]HgogVgq fED_GKt]]DGnnH CJbgHgHgHgHahgHigCCHCJajHkljm iGnKt]]DGnnH agg`HihbHgHgHgHgHgH` c dG]eDGXKG]uGE]GDH  fNOGH dG]eDGXKG] uGE]GD\ kogVkq ^GM_KLH ``\ eM sMeK WvbWXKGKn dGnGDSG]HgogVgq c QMSWreM_REXrGKH UGVK RDWKWXWYPQZ[RST\ RENYWE] ^GM_KLPkg c wGDneWMnH QRST\ QMKGDMGK RDWKWXWY\ ixZR g wGDneWMH og``gyyyyyyyyyyyyyyyyyyyyyyyyyyyyq QRST\ QMKGDMGK RDWKWXWY\ TogVTq ixZRH oyyyyggggggyyyyyyyyyyyyyyyyyyyyyyq ievvGDGMKeEKG] nGDSeXGn XW]GOWeMK g JZfH oyyyyyyyyyygyyyyyyyyyyyyyyyyyyyyyq JZUcZEOEzYG fDEMnOWDK MWK nGK ZJH oyyyyyyyyyyygyyyyyyyyyyyyyyyyyyyyq JZUcZJ MWK nGK CYW{^EzGH oyyyyyyyyyyyyggggggggggggggggggggq g RENYWE]^GM_KLH kg ogVabq UGVKRDWKWXWYH QZ[RST\ mbogVjEq uWO^eFeKH `ab ogVbgq xWsDXGt]]DGnnH CJbgHgHgHgHaTgHbCCHCJmaHCpib iGnKeMEKeWMt]]DGnnH jgggHgHgHgHgHgHgH` |De_eMEYQRRENYWE]H heMEDN ^ED_G |z}GXK okg hNKGnq ~€  ;3‚&$+&!!+!(&,+ƒ)„+#!+# -+&!)* ++;…†„93‚&'+; %!25;&$+&!+.$* %%.,)1;!+;…†„93‚'& %!2!&+1%%2!&1!&!)+& /+/* ,&' + !% +&! %&#")?#) /)-!-*&!'-, +&!5;3‚&$+&! &„)+;…†„93‚$&+)/.+;!+' *; )1 5 …!/)-)&‡ .?ˆ1+*;)!„&!#!+‰+$&/%+&; „)''!+%!2?% .+*;!&%? &-1+;)''!+%!2?% .3‚&!+; #%!25…!+;* ‰)''!*!…†„93‚ /+1!!&)&!+; #%!2 !&+)+*+)+;&,-;† +;3‚>*&„.5;3‚ &$+&!,)+&!)* ++;;-;+…†„93‚,$$&+)/. %%%!2?% .+*;!&%&-&! +;%!25

132 Understanding IPv6,Second Edition Figure 6-8 shows a switched configuration where the MTU option is used to solve a mixed- media problem. Host A Ethernet Switch IPv6 Router FDDI Ethernet Backbone FDDI Rest of IPv6 Network Ethernet Switch Host B Figure 6-8 A mixed-media configuration Two IPv6 hosts,Host A and Host B,are connected to two different Ethernet (Layer 2)switches using Fiber Distributed Data Interface(FDDI)ports.The two switches are connected by an Ethernet backbone.When Host A and Host B negotiate a TCP connection,each reports a TCP maximum segment size of 4312(the FDDI IPv6 MTU of 4352,minus 40 bytes of the IPv6 header).However,when TCP data on the connection begins to flow,the switches silently dis- card IPv6 packets larger than 1500 bytes that are sent between Host A and Host B. With the MTU option,the IPv6 router for the subnet reports an IPv6 MTU of 1500 in the Router Advertisement message for all hosts on the link.When both Host A and Host B adjust their IPv6 MTU from 4352 to 1500,maximum-sized TCP segments sent between them are not discarded by the intermediate switches. Note FDDI is an older technology whose use has been made obsolete by 100-Mbps Ether- net.This configuration is unlikely to be used on modern networks and serves only as an example of a mixed-media subnet. Figure 6-9 shows the structure of the MTU option. Type =5 Length =1 Reserved Mwwww Figure 6-9 The structure of the MTU option The following list describes the fields in the MTU option: Type The value of this field is 5. Length The value of this field is 1.(There are 8 bytes in the entire option.)

￾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`!& &"IJ0+,-*#1Z[]S&#\]^^K1%211!Y(,XJ!1)&!!)&3&$)&"1%)#& (!'%((3R&")&1(%&!$&'"!4 a  bccdefghijklmnlophijiqrspifltflpgfullhvgkliufijlnlurwxxyzu{f|nplmy hln}~pefoiheqtmgneihefthje€ljrniultflkihviklmhhlnsim€fghkflmlfihjrgfgh l‚gv{jligve‚lkyvlkegftuhln} ƒ!"#$!&"!&'&#*&"+,-#.&#)4 5 67„ …†=‡HGFAHFG=BDH†=ˆ…‰BŠH;BC ,"*#//#$)/!&(!'3!&"*/(!)&"+,-#.&#)‹ Œ Ž ,"0%/#*&"!*/(!]4 Œ  ‘ ,"0%/#*&"!*/(!\4P,"% 3R&!)&")&#.&#)4T ’•™š› ¡¢¢£ šœ™’•žš™Ÿ›  ¡¢¢£ ¤™¥š›¦š™§Ÿ¨™©¥ ¤™¥š›¦š™ ª«© ¬¦š ­œ™® ­œ™ª ¤™¥š›¦š™§Ÿ¨™©¥ ¯°±š ²š¦³™¥ šœš›š´ µ¯¶ ·¸ ¹

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共48页,可试读16页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有