GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


rfc:rfc815

RFC: 815

                 IP DATAGRAM REASSEMBLY ALGORITHMS
                           David D. Clark
                MIT Laboratory for Computer Science
             Computer Systems and Communications Group
                             July, 1982
   1.  Introduction
   One of the mechanisms of IP is fragmentation and reassembly.  Under

certain circumstances, a datagram originally transmitted as a single

unit will arrive at its final destination broken into several fragments.

The IP layer at the receiving host must accumulate these fragments until

enough have arrived to completely reconstitute the original datagram.

The specification document for IP gives a complete description of the

reassembly mechanism, and contains several examples. It also provides

one possible algorithm for reassembly, based on keeping track of

arriving fragments in a vector of bits. This document describes an

alternate approach which should prove more suitable in some machines.

   A  superficial  examination  of  the reassembly process may suggest

that it is rather complicated. First, it is necessary to keep track of

all the fragments, which suggests a small bookkeeping job. Second, when

a new fragment arrives, it may combine with the existing fragments in a

number of different ways. It may precisely fill the space between two

fragments, or it may overlap with existing fragments, or completely

                                 2

duplicate existing fragments, or partially fill a space between two

fragments without abutting either of them. Thus, it might seem that the

reassembly process might involve designing a fairly complicated

algorithm that tests for a number of different options.

   In  fact,  the  process  of  reassembly  is  extremely simple. This

document describes a way of dealing with reassembly which reduces the

bookkeeping problem to a minimum, which requires for storage only one

buffer equal in size to the final datagram being reassembled, which can

reassemble a datagram from any number of fragments arriving in any order

with any possible pattern of overlap and duplication, and which is

appropriate for almost any sort of operating system.

   The reader should consult the IP specification document to be  sure

that he is completely familiar with the general concept of reassembly,

and the particular header fields and vocabulary used to describe the

process.

   2.  The Algorithm
   In  order  to  define this reassembly algorithm, it is necessary to

define some terms. A partially reassembled datagram consists of certain

sequences of octets that have already arrived, and certain areas still

to come. We will refer to these missing areas as "holes". Each hole

can be characterized by two numbers, hole.first, the number of the first

octet in the hole, and hole.last, the number of the last octet in the

hole. This pair of numbers we will call the "hole descriptor", and we

will assume that all of the hole descriptors for a particular datagram

are gathered together in the "hole descriptor list".

                                 3
   The  general  form  of  the  algorithm  is  as follows.  When a new

fragment of the datagram arrives, it will possibly fill in one or more

of the existing holes. We will examine each of the entries in the hole

descriptor list to see whether the hole in question is eliminated by

this incoming fragment. If so, we will delete that entry from the list.

Eventually, a fragment will arrive which eliminates every entry from the

list. At this point, the datagram has been completely reassembled and

can be passed to higher protocol levels for further processing.

   The algorithm will be described in two phases. In the  first  part,

we will show the sequence of steps which are executed when a new

fragment arrives, in order to determine whether or not any of the

existing holes are filled by the new fragment. In the second part of

this description, we will show a ridiculously simple algorithm for

management of the hole descriptor list.

   3.  Fragment Processing Algorithm
   An arriving fragment can fill any of the existing holes in a number

of ways. Most simply, it can completely fill a hole. Alternatively, it

may leave some remaining space at either the beginning or the end of an

existing hole. Or finally, it can lie in the middle of an existing

hole, breaking the hole in half and leaving a smaller hole at each end.

Because of these possibilities, it might seem that a number of tests

must be made when a new fragment arrives, leading to a rather

complicated algorithm. In fact, if properly expressed, the algorithm

can compare each hole to the arriving fragment in only four tests.

                                 4
   We  start  the algorithm when the earliest fragment of the datagram

arrives. We begin by creating an empty data buffer area and putting one

entry in its hole descriptor list, the entry which describes the

datagram as being completely missing. In this case, hole.first equals

zero, and hole.last equals infinity. (Infinity is presumably implemented

by a very large integer, greater than 576, of the implementor's choice.)

The following eight steps are then used to insert each of the arriving

fragments into the buffer area where the complete datagram is being

built up. The arriving fragment is described by fragment.first, the

first octet of the fragment, and fragment.last, the last octet of the

fragment.

 1. Select the next hole  descriptor  from  the  hole  descriptor
    list.  If there are no more entries, go to step eight.
 2. If fragment.first is greater than hole.last, go to step one.
 3. If fragment.last is less than hole.first, go to step one.
  1. (If either step two or step three is true, then the

newly arrived fragment does not overlap with the hole in

         any way, so we need pay no  further  attention  to  this
         hole.  We return to the beginning of the algorithm where
         we select the next hole for examination.)
 4. Delete the current entry from the hole descriptor list.
  1. (Since neither step two nor step three was true, the

newly arrived fragment does interact with this hole in

         some  way.    Therefore,  the current descriptor will no
         longer be valid.  We will destroy it, and  in  the  next
         two  steps  we  will  determine  whether  or  not  it is
         necessary to create any new hole descriptors.)
 5. If fragment.first is greater than hole.first, then  create  a
    new  hole  descriptor "new_hole" with new_hole.first equal to
    hole.first, and new_hole.last equal to  fragment.first  minus
    one.
                                 5
  1. (If the test in step five is true, then the first part

of the original hole is not filled by this fragment. We

         create a new descriptor for this smaller hole.)
 6. If fragment.last is less  than  hole.last  and  fragment.more
    fragments   is  true,  then  create  a  new  hole  descriptor
    "new_hole", with new_hole.first equal to  fragment.last  plus
    one and new_hole.last equal to hole.last.
  1. (This test is the mirror of step five with one

additional feature. Initially, we did not know how long

         the reassembled datagram  would  be,  and  therefore  we
         created   a   hole   reaching  from  zero  to  infinity.
         Eventually, we will receive the  last  fragment  of  the
         datagram.    At  this  point, that hole descriptor which
         reaches from the last octet of the  buffer  to  infinity
         can  be discarded.  The fragment which contains the last
         fragment indicates this fact by a flag in  the  internet
         header called "more fragments".  The test of this bit in
         this  statement  prevents  us from creating a descriptor
         for the unneeded hole which describes the space from the
         end of the datagram to infinity.)
 7. Go to step one.
 8. If the hole descriptor list is now empty, the datagram is now
    complete.  Pass it on to the higher level protocol  processor
    for further handling.  Otherwise, return.
   4.  Part Two:  Managing the Hole Descriptor List
   The  main  complexity  in  the  eight  step  algorithm above is not

performing the arithmetical tests, but in adding and deleting entries

from the hole descriptor list. One could imagine an implementation in

which the storage management package was many times more complicated

than the rest of the algorithm, since there is no specified upper limit

on the number of hole descriptors which will exist for a datagram during

reassembly. There is a very simple way to deal with the hole

descriptors, however. Just put each hole descriptor in the first octets

                                 6

of the hole itself. Note that by the definition of the reassembly

algorithm, the minimum size of a hole is eight octets. To store

hole.first and hole.last will presumably require two octets each. An

additional two octets will be required to thread together the entries on

the hole descriptor list. This leaves at least two more octets to deal

with implementation idiosyncrasies.

   There  is  only  one obvious pitfall to this storage strategy.  One

must execute the eight step algorithm above before copying the data from

the fragment into the reassembly buffer. If one were to copy the data

first, it might smash one or more hole descriptors. Once the algorithm

above has been run, any hole descriptors which are about to be smashed

have already been rendered obsolete.

   5.  Loose Ends
   Scattering  the  hole  descriptors throughout the reassembly buffer

itself requires that they be threaded onto some sort of list so that

they can be found. This in turn implies that there must be a pointer to

the head of the list. In many cases, this pointer can be stored in some

sort of descriptor block which the implementation associates with each

reassembly buffer. If no such storage is available, a dirty but

effective trick is to store the head of the list in a part of the

internet header in the reassembly buffer which is no longer needed. An

obvious location is the checksum field.

   When  the final fragment of the datagram arrives, the packet length

field in the internet header should be filled in.

                                 7
   6.  Options
   The preceding description made one unacceptable simplification.  It

assumed that there were no internet options associated with the datagram

being reassembled. The difficulty with options is that until one

receives the first fragment of the datagram, one cannot tell how big the

internet header will be. This is because, while certain options are

copied identically into every fragment of a datagram, other options,

such as "record route", are put in the first fragment only. (The "first

fragment" is the fragment containing octet zero of the original

datagram.)

   Until  one  knows how big the internet header is, one does not know

where to copy the data from each fragment into the reassembly buffer.

If the earliest fragment to arrive happens to be the first fragment,

then this is no problem. Otherwise, there are two solutions. First,

one can leave space in the reassembly buffer for the maximum possible

internet header. In fact, the maximum size is not very large, 64

octets. Alternatively, one can simply gamble that the first fragment

will contain no options. If, when the first fragment finally arrives,

there are options, one can then shift the data in the buffer a

sufficient distance for allow for them. The only peril in copying the

data is that one will trash the pointers that thread the hole

descriptors together. It is easy to see how to untrash the pointers.

   The source and record route options have  the  interesting  feature

that, since different fragments can follow different paths, they may

arrive with different return routes recorded in different fragments.

                                 8

Normally, this is more information than the receiving Internet module

needs. The specified procedure is to take the return route recorded in

the first fragment and ignore the other versions.

   7.  The Complete Algorithm
   In addition to the algorithm described above there are two parts to

the reassembly process. First, when a fragment arrives, it is necessary

to find the reassembly buffer associated with that fragment. This

requires some mechanism for searching all the existing reassembly

buffers. The correct reassembly buffer is identified by an equality of

the following fields: the foreign and local internet address, the

protocol ID, and the identification field.

   The  final  part  of  the  algorithm  is  some  sort of timer based

mechanism which decrements the time to live field of each partially

reassembled datagram, so that incomplete datagrams which have outlived

their usefulness can be detected and deleted. One can either create a

demon which comes alive once a second and decrements the field in each

datagram by one, or one can read the clock when each first fragment

arrives, and queue some sort of timer call, using whatever system

mechanism is appropriate, to reap the datagram when its time has come.

   An implementation of the complete algorithm  comprising  all  these

parts was constructed in BCPL as a test. The complete algorithm took

less than one and one-half pages of listing, and generated approximately

400 nova machine instructions. That portion of the algorithm actually

involved with management of hole descriptors is about 20 lines of code.

                                 9
   The   version  of  the  algorithm  described  here  is  actually  a

simplification of the author's original version, thanks to an insightful

observation by Elizabeth Martin at MIT.

/data/webs/external/dokuwiki/data/pages/rfc/rfc815.txt · Last modified: 1992/09/23 20:11 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki