BCP, PPP Bridging Control Protocol |
Description | Glossary | RFCs | Publications | Obsolete RFCs |
Protocol suite: | PPP. |
Protocol type: | PPP network control protocol. |
PPP Protocol: | 0x8031. |
SNMP MIBs: | |
Working groups: | pppext, Point-to-Point Protocol Extensions. |
Links: | PPP Assigned numbers. |
The BCP protocol is used for establishing and configuring Remote Bridging over PPP links.
BCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. An implementation SHOULD be prepared to wait for Authentication and Link Quality Determination to finish before timing out waiting for a Configure-Ack or other response. It is suggested that an implementation give up only after user intervention or a configurable amount of time.
RFC 1638 pages 1, 2, 9 and 10:
Two basic algorithms are ambient in the industry for Bridging of Local Area Networks. The more common algorithm is called "Transparent Bridging", and has been standardized for Extended LAN configurations by IEEE 802.1. The other is called "Source Route Bridging", and is prevalent on IEEE 802.5 Token Ring LANs.
The IEEE has combined these two methods into a device called a Source Routing Transparent (SRT) bridge, which concurrently provides both Source Route and Transparent bridging.
The Bridging Control Protocol (BCP) is responsible for configuring, enabling and disabling the bridge protocol modules on both ends of the point-to-point link. BCP uses the same packet exchange mechanism as the Link Control Protocol. BCP packets may not be exchanged until PPP has reached the Network-Layer Protocol phase. BCP packets received before this phase is reached SHOULD be silently discarded.
Before any Bridged LAN Traffic or BPDUs may be communicated, PPP MUST reach the Network-Layer Protocol phase, and the Bridging Control Protocol MUST reach the Opened state.
PPP header | BCP header | Data ::: |
BCP header:
00 | 01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Code | Identifier | Length | |||||||||||||||||||||||||||||
Data ::: |
Code.
8 bits.
Specifies the function to be performed.
All other Codes SHOULD be treated as unrecognized and SHOULD result in Code-Rejects.
Code | Description | References |
---|---|---|
0 | Vendor Specific. | RFC 2153 |
1 | Configure-Request. | |
2 | Configure-Ack. | |
3 | Configure-Nak. | |
4 | Configure-Reject. | |
5 | Terminate-Request. | |
6 | Terminate-Ack. | |
7 | Code-Reject. |
Identifier.
8 bits.
Used to match requests and replies.
Length.
16 bits.
Size of the packet including the header.
Data.
Variable length.
Zero or more bytes of data as indicated by the Length field.
This field may contain one or more Options.
BCP Configuration Options:
00 | 01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 14 | 15 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Option | Length | ||||||||||||||
Data ::: |
Option. 8 bits.
Option | Length | Description | References |
---|---|---|---|
1 | 4 | Bridge-Identification. | RFC 3518 |
2 | 4 | Line-Identification. | RFC 3518 |
3 | 3 | MAC-Support. | RFC 3518 |
4 | 3 | Tinygram-Compression. | RFC 3518 |
5 | 3 | LAN-Identification (obsoleted). | RFC 3518 |
6 | 8 | MAC-Address. | RFC 3518 |
7 | 2+ | Spanning-Tree-Protocol (old formatted). | RFC 3518 |
8 | 3 | IEEE 802 Tagged Frame. | RFC 3518 |
9 | 2 | Management Inline. | RFC 3518 |
10 | 2 | Bridge Control Packet Indicator. | RFC 3518 |
Length. 8 bits.
Data. Variable length.
Bridge.
A hardware device that connects two LANs together.
Remote Bridge.
(RFC 1638)
Interconnected LANs via an intermediate medium such as a leased line.
Source Routing.
(RFC 1638)
The originating system has the responsibility of indicating the path that the message should follow.
Each bridge en route determines from this source route list whether it should accept the message and how to forward it.
Spanning Tree Protocol.
(RFC 1638)
This protocol is executed between the bridges to detect and logically remove redundant paths from the network.
Transparent Bridge.
(RFC 1638)
Essentially, the bridges in a network operate as isolated entities, largely unaware of each others' presence.
RFCs:
[RFC 3518] Point-to-Point Protocol (PPP) Bridging Control Protocol (BCP).
[RFC 1638] PPP Bridging Control Protocol (BCP).
[RFC 2878] PPP Bridging Control Protocol (BCP).
Description | Glossary | RFCs | Publications | Obsolete RFCs |