Selected Books:


Buy this book!




Buy this book!




Buy this book!




Buy this book!




Buy this book!



German speakers - order books from amazon.de!

Books to UK - order books from amazon.co.uk!

The Online Requests For Comments - RFCs

Home | Books | Bookmark! | Link to Us | Help

RFC 0815 


RFC:  815



                   IP DATAGRAM REASSEMBLY ALGORITHMS

                             David D. Clark
                  MIT Laboratory for Computer Science
               Computer Systems and Communications Group
                               July, 1982






     1.  Introduction


     One of the mechanisms of IP is fragmentation and reassembly.  Under

certain  circumstances,  a  datagram  originally transmitted as a single

unit will arrive at its final destination broken into several fragments.

The IP layer at the receiving host must accumulate these fragments until

enough have arrived to completely reconstitute  the  original  datagram.

The  specification  document  for IP gives a complete description of the

reassembly mechanism, and contains several examples.  It  also  provides

one  possible  algorithm  for  reassembly,  based  on  keeping  track of

arriving fragments in a vector of bits.    This  document  describes  an

alternate approach which should prove more suitable in some machines.


     A  superficial  examination  of  the reassembly process may suggest

that it is rather complicated.  First, it is necessary to keep track  of

all the fragments, which suggests a small bookkeeping job.  Second, when

a  new fragment arrives, it may combine with the existing fragments in a

number of different ways.  It may precisely fill the space  between  two

fragments,  or  it  may  overlap  with existing fragments, or completely

                                   2


duplicate  existing  fragments,  or  partially  fill a space between two

fragments without abutting either of them.  Thus, it might seem that the

reassembly  process  might  involve  designing  a   fairly   complicated

algorithm that tests for a number of different options.


     In  fact,  the  process  of  reassembly  is  extremely simple. This

document describes a way of dealing with reassembly  which  reduces  the

bookkeeping  problem  to  a minimum, which requires for storage only one

buffer equal in size to the final datagram being reassembled, which  can

reassemble a datagram from any number of fragments arriving in any order

with  any  possible  pattern  of  overlap  and duplication, and which is

appropriate for almost any sort of operating system.


     The reader should consult the IP specification document to be  sure

that  he  is completely familiar with the general concept of reassembly,

and the particular header fields and vocabulary  used  to  describe  the

process.


     2.  The Algorithm


     In  order  to  define this reassembly algorithm, it is necessary to

define some terms.  A partially reassembled datagram consists of certain

sequences of octets that have already arrived, and certain  areas  still

to  come.    We will refer to these missing areas as "holes".  Each hole

can be characterized by two numbers, hole.first, the number of the first

octet in the hole, and hole.last, the number of the last  octet  in  the

hole.    This pair of numbers we will call the "hole descriptor", and we

will assume that all of the hole descriptors for a  particular  datagram

are gathered together in the "hole descriptor list".

                                   3


     The  general  form  of  the  algorithm  is  as follows.  When a new

fragment of the datagram arrives, it will possibly fill in one  or  more

of  the existing holes.  We will examine each of the entries in the hole

descriptor list to see whether the hole in  question  is  eliminated  by

this incoming fragment.  If so, we will delete that entry from the list.

Eventually, a fragment will arrive which eliminates every entry from the

list.    At this point, the datagram has been completely reassembled and

can be passed to higher protocol levels for further processing.


     The algorithm will be described in two phases. In the  first  part,

we  will  show  the  sequence  of  steps  which  are executed when a new

fragment arrives, in order to  determine  whether  or  not  any  of  the

existing  holes  are  filled by the new fragment.  In the second part of

this description, we will  show  a  ridiculously  simple  algorithm  for

management of the hole descriptor list.


     3.  Fragment Processing Algorithm


     An arriving fragment can fill any of the existing holes in a number

of ways.  Most simply, it can completely fill a hole.  Alternatively, it

may  leave some remaining space at either the beginning or the end of an

existing hole.  Or finally, it can lie in  the  middle  of  an  existing

hole,  breaking the hole in half and leaving a smaller hole at each end.

Because of these possibilities, it might seem that  a  number  of  tests

must  be  made  when  a  new  fragment  arrives,  leading  to  a  rather

complicated algorithm.  In fact, if properly  expressed,  the  algorithm

can compare each hole to the arriving fragment in only four tests.

                                   4


     We  start  the algorithm when the earliest fragment of the datagram

arrives.  We begin by creating an empty data buffer area and putting one

entry in its  hole  descriptor  list,  the  entry  which  describes  the

datagram  as  being completely missing.  In this case, hole.first equals

zero, and hole.last equals infinity. (Infinity is presumably implemented

by a very large integer, greater than 576, of the implementor's choice.)

The following eight steps are then used to insert each of  the  arriving

fragments  into  the  buffer  area  where the complete datagram is being

built up.  The arriving fragment is  described  by  fragment.first,  the

first  octet  of  the fragment, and fragment.last, the last octet of the

fragment.


   1. Select the next hole  descriptor  from  the  hole  descriptor
      list.  If there are no more entries, go to step eight.

   2. If fragment.first is greater than hole.last, go to step one.

   3. If fragment.last is less than hole.first, go to step one.


         - (If  either  step  two  or  step three is true, then the
           newly arrived fragment does not overlap with the hole in
           any way, so we need pay no  further  attention  to  this
           hole.  We return to the beginning of the algorithm where
           we select the next hole for examination.)


   4. Delete the current entry from the hole descriptor list.


         - (Since  neither  step  two  nor step three was true, the
           newly arrived fragment does interact with this  hole  in
           some  way.    Therefore,  the current descriptor will no
           longer be valid.  We will destroy it, and  in  the  next
           two  steps  we  will  determine  whether  or  not  it is
           necessary to create any new hole descriptors.)


   5. If fragment.first is greater than hole.first, then  create  a
      new  hole  descriptor "new_hole" with new_hole.first equal to
      hole.first, and new_hole.last equal to  fragment.first  minus
      one.

                                   5


         - (If  the  test in step five is true, then the first part
           of the original hole is not filled by this fragment.  We
           create a new descriptor for this smaller hole.)


   6. If fragment.last is less  than  hole.last  and  fragment.more
      fragments   is  true,  then  create  a  new  hole  descriptor
      "new_hole", with new_hole.first equal to  fragment.last  plus
      one and new_hole.last equal to hole.last.


         - (This   test  is  the  mirror  of  step  five  with  one
           additional feature.  Initially, we did not know how long
           the reassembled datagram  would  be,  and  therefore  we
           created   a   hole   reaching  from  zero  to  infinity.
           Eventually, we will receive the  last  fragment  of  the
           datagram.    At  this  point, that hole descriptor which
           reaches from the last octet of the  buffer  to  infinity
           can  be discarded.  The fragment which contains the last
           fragment indicates this fact by a flag in  the  internet
           header called "more fragments".  The test of this bit in
           this  statement  prevents  us from creating a descriptor
           for the unneeded hole which describes the space from the
           end of the datagram to infinity.)


   7. Go to step one.

   8. If the hole descriptor list is now empty, the datagram is now
      complete.  Pass it on to the higher level protocol  processor
      for further handling.  Otherwise, return.


     4.  Part Two:  Managing the Hole Descriptor List


     The  main  complexity  in  the  eight  step  algorithm above is not

performing the arithmetical tests, but in adding  and  deleting  entries

from  the  hole descriptor list.  One could imagine an implementation in

which the storage management package was  many  times  more  complicated

than  the rest of the algorithm, since there is no specified upper limit

on the number of hole descriptors which will exist for a datagram during

reassembly.   There  is  a  very  simple  way  to  deal  with  the  hole

descriptors, however.  Just put each hole descriptor in the first octets

                                   6


of  the  hole  itself.    Note  that by the definition of the reassembly

algorithm, the minimum size of  a  hole  is  eight  octets.    To  store

hole.first  and  hole.last  will presumably require two octets each.  An

additional two octets will be required to thread together the entries on

the hole descriptor list.  This leaves at least two more octets to  deal

with implementation idiosyncrasies.


     There  is  only  one obvious pitfall to this storage strategy.  One

must execute the eight step algorithm above before copying the data from

the fragment into the reassembly buffer.  If one were to copy  the  data

first,  it might smash one or more hole descriptors.  Once the algorithm

above has been run, any hole descriptors which are about to  be  smashed

have already been rendered obsolete.


     5.  Loose Ends


     Scattering  the  hole  descriptors throughout the reassembly buffer

itself requires that they be threaded onto some sort  of  list  so  that

they can be found.  This in turn implies that there must be a pointer to

the head of the list.  In many cases, this pointer can be stored in some

sort  of  descriptor block which the implementation associates with each

reassembly buffer.  If  no  such  storage  is  available,  a  dirty  but

effective  trick  is  to  store  the  head  of the list in a part of the

internet header in the reassembly buffer which is no longer needed.   An

obvious location is the checksum field.


     When  the final fragment of the datagram arrives, the packet length

field in the internet header should be filled in.

                                   7


     6.  Options


     The preceding description made one unacceptable simplification.  It

assumed that there were no internet options associated with the datagram

being  reassembled.    The  difficulty  with  options  is that until one

receives the first fragment of the datagram, one cannot tell how big the

internet header will be.  This is because,  while  certain  options  are

copied  identically  into  every  fragment of a datagram, other options,

such as "record route", are put in the first fragment only.  (The "first

fragment"  is  the  fragment  containing  octet  zero  of  the  original

datagram.)


     Until  one  knows how big the internet header is, one does not know

where to copy the data from each fragment into  the  reassembly  buffer.

If  the  earliest  fragment  to arrive happens to be the first fragment,

then this is no problem.  Otherwise, there are two  solutions.    First,

one  can  leave  space in the reassembly buffer for the maximum possible

internet header.  In fact, the  maximum  size  is  not  very  large,  64

octets.    Alternatively,  one can simply gamble that the first fragment

will contain no options.  If, when the first fragment  finally  arrives,

there  are  options,  one  can  then  shift  the  data  in  the buffer a

sufficient distance for allow for them.  The only peril in  copying  the

data  is  that  one  will  trash  the  pointers  that  thread  the  hole

descriptors together.  It is easy to see how to untrash the pointers.


     The source and record route options have  the  interesting  feature

that,  since  different  fragments  can follow different paths, they may

arrive with different return routes  recorded  in  different  fragments.

                                   8


Normally,  this  is  more information than the receiving Internet module

needs.  The specified procedure is to take the return route recorded  in

the first fragment and ignore the other versions.


     7.  The Complete Algorithm


     In addition to the algorithm described above there are two parts to

the reassembly process.  First, when a fragment arrives, it is necessary

to  find  the  reassembly  buffer  associated  with that fragment.  This

requires some  mechanism  for  searching  all  the  existing  reassembly

buffers.   The correct reassembly buffer is identified by an equality of

the following fields:  the  foreign  and  local  internet  address,  the

protocol ID, and the identification field.


     The  final  part  of  the  algorithm  is  some  sort of timer based

mechanism which decrements the time to  live  field  of  each  partially

reassembled  datagram,  so that incomplete datagrams which have outlived

their usefulness can be detected and deleted.  One can either  create  a

demon  which  comes alive once a second and decrements the field in each

datagram by one, or one can read the  clock  when  each  first  fragment

arrives,  and  queue  some  sort  of  timer  call, using whatever system

mechanism is appropriate, to reap the datagram when its time has come.


     An implementation of the complete algorithm  comprising  all  these

parts  was  constructed  in BCPL as a test.  The complete algorithm took

less than one and one-half pages of listing, and generated approximately

400 nova machine instructions.  That portion of the  algorithm  actually

involved with management of hole descriptors is about 20 lines of code.

                                   9


     The   version  of  the  algorithm  described  here  is  actually  a

simplification of the author's original version, thanks to an insightful

observation by Elizabeth Martin at MIT.






RFC Search. Copyright ©1999 by Dodoland Co.
Web design ©1999 by WebYou.com


Selected Books:


Buy this book!



    
Buy this book!



    
Buy this book!



    
Buy this book!



    
Buy this book!