One document matched: draft-degermark-ipv6-hc-00.txt
Network Working Group M. Degermark
INTERNET-DRAFT B. Nordgren
Expires August 18, 1996 S. Pink
Lulea University
Telia Research AB
Swedish Institute of Computer Science
Sweden
February 1996
Header Compression for IPv6
<draft-degermark-ipv6-hc-00.txt>
Status of this Memo
Publication of this document does not imply acceptance by the IPng
Area of any ideas expressed within. Comments should be submitted to
the mailing list ipng@sunroof.eng.sun.com
Distribution of this memo is unlimited.
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet- Drafts as reference
material or to cite them other than as ``work in progress.''
To learn the current status of any Internet-Draft, please check the
``1id-abstracts.txt'' listing contained in the Internet- Drafts
Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).
Abstract
This document describes how to compress IPv6 headers over point-to-
point links. The method can be applied to IPv6 base and extension
headers, IPv4 headers, TCP and UDP headers, and encapsulated IPv6 and
IPv4 headers.
A typical IPv6 header can be compressed down to 3-5 octets, including
a 2 octet transport layer checksum.
Degermark, Nordgren, Pink [Page 1]
INTERNET-DRAFT Header Compression for IPv6 February 1996
Table of Contents
1. Introduction..............................................3
2. Terminology...............................................5
3. Compression method........................................7
3.1. Lost packets in TCP packet streams.................7
3.2. Lost packets in non-TCP packet streams.............8
3.2.1. Exponential Backoff of Header Refreshes.......9
3.2.2. Periodic Header Refreshes.....................9
3.2.3. Rules for sending Full Headers...............10
3.2.4. Cost of sending Header Refreshes.............11
4. Grouping packets into packet streams.....................13
4.1. Guidelines for grouping packets...................13
5. Size Issues..............................................16
5.1. Compression identifiers...........................16
5.2. Size of compression state.........................17
5.3. Size of full headers..............................18
6. Compressed Header Formats................................19
7. Compression of subheaders................................21
7.1. IPv6 Header.......................................23
7.2. IPv6 Extension Headers............................23
7.3. Options...........................................24
7.4. Hop-by-hop Options Header.........................25
7.5. Routing Header....................................26
7.6. Fragment Header...................................28
7.7. Destination Options Header........................30
7.8. No Next Header....................................30
7.9. Authentication Header.............................31
7.10. Encapsulating Security Payload Header.............32
7.11. UDP Header........................................33
7.12. TCP Header........................................34
7.13. IPv4 Header.......................................35
8. Changing compression identifiers.........................37
9. Rules for dropping or storing packets....................38
10. More aggressive compression..............................39
11. Demultiplexing...........................................40
12. Configuration Parameters.................................41
13. Security Considerations..................................43
14. Author's Addresses.......................................43
15. References...............................................44
Degermark, Nordgren, Pink [Page 2]
INTERNET-DRAFT Header Compression for IPv6 February 1996
1. Introduction
There are several reasons to do header compression on a low-speed
link, header compression can
* Improve interactive response time
For very low-speed links, echoing of characters may take longer
than 100-200 ms because of the time required to transmit large
headers. 100-200 ms is the maximum time people can tolerate
without feeling that the system is sluggish.
* Allow using small packets for bulk data with good line
efficiency
This is important when interactive (for example Telnet) and
bulk traffic (for example FTP) is mixed because the bulk data
should be carried in small packets to decrease the waiting time
when a packet with interactive data is caught behind a bulk
data packet.
* Allow using small packets for delay sensitive low data-rate
traffic
For such applications, for example voice, the time to fill a
packet with data is significant if packets are large. To get
low end-to-end delay small packets are preferred. Without
header compression, the smallest possible IPv6/UDP headers (48
octets) consume 19.2 kbit/s with a packet rate of 50 packets/s.
50 packets/s is equivalent to having 20 ms worth of voice
samples in each packet. Tunneling or routing headers, for
example to support mobility, will increase the bandwidth
consumed by headers by at least 10-20 kbit/s. This should be
compared with the bandwidth required for the actual sound
samples, for example 13 kbit/s with GSM encoding. Header
compression can reduce the bandwidth needed for headers
significantly, in the example to about 2 kbit/s.
The mechanisms described here are intended for a point-to-point link.
However, care has been taken to allow extensions for multi-access
links and multicast.
Headers that can be compressed include TCP, UDP, IPv4, and IPv6 base
and extension headers. For TCP packets, the mechanisms of Van
Jacobson [RFC-1144] are used to recover from loss. For non-TCP
packets, an exponential backoff mechanism allows minimal periods of
packet discard after loss of a header that changes the compression
state.
Degermark, Nordgren, Pink [Page 3]
INTERNET-DRAFT Header Compression for IPv6 February 1996
Header compression relies on many fields being constant or rarely
changing in consecutive packets belonging to the same packet stream.
Fields that do not change between packets need not be transmitted at
all. Fields that change often with small and/or predictable values,
e.g., TCP sequence numbers, can be encoded incrementally so that the
number of bits needed for these fields decrease significantly. Only
fields that change often and randomly, e.g., checksums or
authentication data, need to be transmitted in every header.
The general principle of header compression is to occasionally send a
packet with a full header; subsequent compressed headers contain
changes to the full header.
Degermark, Nordgren, Pink [Page 4]
INTERNET-DRAFT Header Compression for IPv6 February 1996
2. Terminology
This section explains some terms used in this document.
Subheader
An IPv6 base header, an IPv6 extension header, an IPv4 header,
a UDP header, or a TCP header.
Header
A chain of subheaders.
Compress
The act of reducing the size of a header by removing header
fields or reducing the size of header fields. This is done in a
way such that a decompressor can reconstruct the header if its
compression state is identical to the compression state used
when compressing the header.
Decompress
The act of reconstructing a compressed header.
Compression identifier (CID)
A small unique number identifying the compression state that
should be used to decompress a compressed header. Carried in
full headers and compressed headers.
Compression state
The state which the compressor uses to compress a header and
the decompressor uses to decompress a header. The compression
state is the uncompressed version of the last header sent
(compressor) or received (decompressor) over the link, except
for fields in the header which are included "as-is" in
compressed headers or can be inferred from e.g., the size of
the link-level frame.
The compression state for a packet stream is associated with a
compression identifier. The compression state for non-TCP
packet streams is also associated with a generation.
Degermark, Nordgren, Pink [Page 5]
INTERNET-DRAFT Header Compression for IPv6 February 1996
Generation
For non-TCP packet streams, each new version of the compression
state for a given CID is associated with a generation: a small
number that is incremented whenever the compression state
associated with that CID changes. Carried by full and
compressed non-TCP headers.
Packet stream
A sequence of packets whose headers are similar and share
compression state. For example, headers in a TCP packet stream
have the same source and final destination address, and the
same port numbers in the TCP header. Similarly, headers in a
UDP packet stream have the same source and destination address,
and the same port numbers in the UDP header.
Full header (header refresh)
An uncompressed header that updates or refreshes the
compression state for a packet stream. It carries a CID that
will be used to identify the compression state.
Full headers for non-TCP packet streams also carry the
generation of the compression state they update or refresh.
Regular header
A normal, uncompressed, header. Does not carry CID or
generation association.
Incorrect decompression
When a compressed and then decompressed header is different
from the uncompressed header. Usually due to mismatching
compression state between the compressor and decompressor or
bit errors during transmission of the compressed header.
Differential coding
A compression technique where the compressed value of a header
field is the difference between the current value of the field
and the value of the same field in the previous header
belonging to the same packet stream. This technique is used for
TCP streams but not for non-TCP streams.
Degermark, Nordgren, Pink [Page 6]
INTERNET-DRAFT Header Compression for IPv6 February 1996
3. Compression method
Much of the header information stays the same over the life-time of a
packet stream. For non-TCP packet streams almost all fields of the
headers are constant. For TCP many fields are constant and others
change with small and predictable values.
To initiate compression of the headers of a packet stream, a full
header carrying a compression identifier, CID, is transmitted over
the link. The compressor and decompressor store most fields of this
full header as compression state. The compression state consists of
the fields of the header whose values are constant and thus need not
be sent over the link at all, or change little between consecutive
headers so that it uses fewer bits to send the difference from the
previous value compared to sending the absolute value.
Any change in fields that are expected to be constant in a packet
stream will cause the compressor to send a full header again to
update the compression state at the decompressor. As long as the
compression state is the same at compressor and decompressor, headers
can be decompressed to be exactly as they were before compression.
However, if a full header or compressed header is damaged or lost
during transmission, the compression state of the decompressor may
become obsolete as it is not updated properly. Compressed headers
will then be decompressed incorrectly.
So a header compression scheme needs mechanisms to update the
compression state at the decompressor and to detect or avoid
incorrect decompression. Sections 3.1 and 3.2 describe how packet
loss is dealt with for TCP and non-TCP packet streams.
The compression mechanisms in this document assume that packets are
not reordered between the compressor and decompressor. They also
assume that the link-layer implementation can provide the length of
packets.
3.1. Lost packets in TCP packet streams
Since TCP headers are compressed using the difference from the
previous TCP header, loss of a packet with a compressed header or a
full header will cause subsequent compressed headers to be
decompressed incorrectly because the compression state used for
decompression was not incremented properly.
Loss of a compressed TCP header will cause the TCP sequence numbers
of subsequently decompressed TCP headers to be off by k, where k is
the number of payload octets in the lost packet. Such incorrectly
decompressed TCP headers will be discarded by the TCP receiver as the
Degermark, Nordgren, Pink [Page 7]
INTERNET-DRAFT Header Compression for IPv6 February 1996
TCP checksum reliably catches "off-by-k" errors in the sequence
numbers for plausible k.
TCP's repair mechanisms will eventually retransmit the discarded
segment and the compressor peeks into the TCP headers to detect when
TCP retransmits. When this happens, the compressor sends a full
header on the assumption that the retransmission was due to
mismatching compression state at the decompressor. [RFC-1144] has a
good explanation of this mechanism.
3.2. Lost packets in UDP and other non-TCP packet streams
Incorrectly decompressed headers of UDP packets and other non-TCP
packets are not so well-protected by checksums as TCP packets because
differential coding is not used and there are no sequence numbers.
The UDP checksum only covers payload, UDP header, and pseudo header.
The pseudo header includes the source and destination addresses, the
transport protocol type and the length of the transport packet.
Except for those fields, large parts of the IPv6 header are not
covered by the UDP checksum. Moreover, other non-TCP headers lack
checksums altogether, for example fragments.
In order to safely avoid incorrect decompression of non-TCP headers,
each version of the compression state for non-TCP packet streams is
identified by a generation, a small number that is carried by the
full headers that establish and refresh the compression state.
Compressed headers carry the generation value of the compression
state that were used to compress them. When a decompressor sees that
a compressed header carries a generation value other than the
generation of its compression state for that packet stream, the
compression state is not up to date and the packet must be discarded
or stored until a full header establishes correct compression state.
Differential coding is not used for non-TCP streams, so compressed
non-TCP headers do not change the compression state. Thus, loss of a
compressed header does not invalidate subsequent packets with
compressed headers. Moreover, the generation field changes only when
the compression state of a full header is different from the
compression state of the previous full header. This means that losing
a full header will make the compression state of the decompressor
obsolete only when the full header would actually have changed the
compression state.
The generation field is one octet long so the generation value
repeats itself after 256 changes to the compression state. To avoid
incorrect decompression after error bursts or other temporary
disruptions, the compressor must not reuse the same generation value
after a shorter time than MIN_WRAP seconds. A decompressor which has
Degermark, Nordgren, Pink [Page 8]
INTERNET-DRAFT Header Compression for IPv6 February 1996
been disconnected MIN_WRAP seconds or more must wait for the next
full header before decompressing.
Instead of reusing a generation value too soon, a compressor may
switch to another CID or else send regular headers until MIN_WRAP
seconds have passed. The value of MIN_WRAP is found in section 12.
3.2.1. Exponential Backoff of Header Refreshes
To allow the decompressor to recover quickly from loss of a full
header that would have changed the compression state, full headers
are sent periodically with an exponentially increasing period after a
change in the compression state. This technique avoids an exchange of
messages between compressor and decompressor used by other
compression schemes, such as in [RFC-1553]. Such exchanges can be
costly for wireless mobiles as more power is consumed by the
transmitter and delay can be introduced by repeated switching between
sending and receiving. Moreover, techniques that require an exchange
of messages cannot be used over simplex links, such as direct-
broadcast satellite channels or cable TV systems.
|.|..|....|........|................|..............................
^
Change Sent packets: | with full header, . with compressed header
The picture shows how packets are sent after change. The compressor
keeps a variable for each non-TCP packet stream, F_PERIOD, that keeps
track of how many compressed headers may be sent between full
headers. When the headers of a non-TCP packet stream change so that
its compression state changes, a full header is sent and F_PERIOD is
set to one. After sending F_PERIOD compressed headers a full header
is sent, and F_PERIOD is doubled each time a full header is sent.
3.2.2. Periodic Header Refreshes
To avoid losing too many packets if a receiver has lost its
compression state, there is an upper limit, F_MAX_PERIOD, on the
number of non-TCP packets with compressed headers that may be sent
between header refreshes. If a packet is to be sent and F_MAX_PERIOD
compressed headers have been sent since the last full header for this
packet stream was sent, a full header must be sent.
To avoid long periods of disconnection for low data rate packet
streams, there is also an upper bound, F_MAX_TIME, on the time
between full headers in a non-TCP packet stream. If a packet is to be
sent and more than F_MAX_TIME seconds have passed since the last full
header was sent for this packet stream, a full header must be sent.
The values of F_MAX_PERIOD and F_MAX_TIME are found in section 12.
Degermark, Nordgren, Pink [Page 9]
INTERNET-DRAFT Header Compression for IPv6 February 1996
3.2.3. Rules for sending Full Headers
The following pseudo code can be used by the compressor to determine
when to send a full header for a non-TCP packet stream. The code
maintains two variables:
C_NUM a count of the number of compressed headers sent
since the last full header was sent
F_LAST the time of sending the last full header
and uses the functions
current_time() return the current time
min(a,b) return the smallest of a and b
the procedures send_full_header() and send_compressed_header()
do the obvious thing.
if ( <this header changes the compression state> )
C_NUM := 0;
F_LAST := current_time();
F_PERIOD := 1;
send_full_header(); -- generation value incremented
elseif ( C_NUM >= F_PERIOD )
C_NUM := 0;
F_LAST := current_time();
F_PERIOD := min(2 * F_PERIOD, F_MAX_PERIOD);
send_full_header(); -- generation value unchanged
elseif ( current_time() > F_LAST + F_MAX_TIME )
C_NUM := 0;
F_LAST := current_time();
send_full_header(); -- generation value unchanged
else
C_NUM := C_NUM + 1
send_compressed_header(); -- with current generation value
endif
Degermark, Nordgren, Pink [Page 10]
INTERNET-DRAFT Header Compression for IPv6 February 1996
3.2.4. Cost of sending Header Refreshes
If every f'th packet carries a full header, H is the size of a full
header, and C is the size of a compressed header, the average header
size is
(H-C)/f + C
For f > 1, the average header size is (H-C)/f larger than a
compressed header.
In a diagram where the average header size is plotted for various f
values, there is a distinct knee in the curve, i.e., there is a limit
beyond which further increasing f gives diminishing returns.
F_MAX_PERIOD should be chosen to be a frequency well to the right of
the knee of the curve. For typical sizes of H and C, say 48 octets
for the full header (IPv6/UDP) and 4 octets for the compressed
header, setting F_MAX_PERIOD > 44 means that full headers will
contribute less than a byte to the average header size. With a four-
address routing header, F_MAX_PERIOD > 115 will have the same effect.
The default F_MAX_PERIOD value of 256 (section 12) puts the full
header frequency well to the right of the knee and means that full
headers will typically contribute considerably less than a byte to
the average header size. For H = 48 and C = 4, full headers
contribute about 1.4 bits to the average header size after reaching
the steady-state header refresh frequency determined by the default
F_MAX_PERIOD. 1.4 bits is a very small overhead.
After a change in compression state, the exponential backoff scheme
will initially send full headers frequently. The default
F_MAX_PERIOD will be reached after nine full headers and 255
compressed headers have been sent. This is equivalent to a little
over 5 seconds for a typical voice stream with 20 ms worth of voice
samples per packet.
During the whole backoff period, full headers contribute 1.5 octets
to the average header size, when H = 48 and C = 4. For 20 ms voice
samples, it takes less than 1.3 seconds until full headers contribute
less than one octet to the average header size, and during these
initial 1.3 seconds full headers add less than 4 octets to the
average header size. The cost of the exponential backoff is not
great and as the headers of non-TCP packet streams are expected to
change seldomly, it will be amortized over a long time.
Degermark, Nordgren, Pink [Page 11]
INTERNET-DRAFT Header Compression for IPv6 February 1996
The cost of header refreshes in terms of bandwidth are higher than
similar costs for hard state schemes like [RFC-1553] where full
headers must be acknowledged by the decompressor before compressed
headers may be sent. Such schemes typically send one full header plus
a few control messages when the compression state changes. Hard
state schemes require more types of protocol messages and an exchange
of messages is necessary. Hard state schemes also need to deal
explicitly with various error conditions that soft state handles
automatically, for instance the case of one party disappearing
unexpectedly, a common situation on wireless links where mobiles may
go out of range of the base station.
The major advantage of our soft state scheme is that no handshakes
are needed between compressor and decompressor, so the scheme can be
used over simplex links. The costs in terms of bandwidth are higher
than for hard state schemes, but we feel that the simplicity of the
decompressor, the simplicity of the protocol, and the lack of
handshakes between compressor and decompressor justifies this small
cost. Moreover, soft state schemes are more easily extended to
multi-access links and multicast.
Degermark, Nordgren, Pink [Page 12]
INTERNET-DRAFT Header Compression for IPv6 February 1996
4. Grouping packets into packet streams
This section explains how packets may be grouped together into packet
streams for compression.
To achieve the best compression rates, packets should be grouped
together such that packets in the same packet stream have similar
headers. If this grouping fails, thrashing may occur as the
compression algorithm can rarely utilize the existing compression
state for the packet stream and full headers must be sent frequently.
Grouping is done by the compressor. A compressor may use whatever
criterion it finds appropriate to group packets into packet streams.
To determine what packet stream a packet belongs to, a compressor
might
a) examine the compressible chain of subheaders (see section 7),
b) examine the contents of an upper layer protocol header that
follows the compressible chain of subheaders, for example ICMP
headers, DVMRP headers, or tunneled IPX headers,
c) use information obtained from a resource manager, for example if a
resource manager requests compression for a particular packet
stream and provides a way to identify packets belonging to that
packet stream,
d) use any other relevant information, for example recent traffic
patterns.
A compressor is also free not to group packets into packet streams
for compression, letting some packets keep their regular headers and
passing them through unmodified.
As long as the rules for when to send full headers for a packet
stream are followed and the subheaders are compressed as specified in
this document, the decompressor is able to reconstruct a compressed
header correctly regardless of how packets are grouped into packet
streams.
4.1 Guidelines for grouping packets
We offer the following quidelines for how packets may be grouped into
packet streams. Four kinds of packet streams are recognized in these
guidelines, packets that do not match any of them are not compressed.
Degermark, Nordgren, Pink [Page 13]
INTERNET-DRAFT Header Compression for IPv6 February 1996
Flow Label non-zero
When the Flow Label is non-zero, only the Flow Label and Source
Address need to be examined to determine the packet stream of a
packet. However, fragments and unfragmented packets are
separated into different packet streams even in this case.
Transport layer port numbers visible
When the Flow Label is zero, the transport layer's notion of
stream is used. For UDP and TCP packets, source and final
destination addresses plus transport protocol type plus port
numbers are used to identify the packet stream of the packet.
Fragmented packets
For packet fragments port numbers may not be available. They
might be in another packet, and thus the rules that guarantee a
unique Identification field are used to identify the packet
stream of a fragmented packet. Note that the Identification
field itself is not used to identify the packet stream. If it
was, the first fragment of a new packet would cause an
expontential backoff.
Encrypted packets
For encrypted packets, port numbers may not be available, and
even if they are, it is unwise to utilize them to identify
packet streams. If port numbers were used to identify packet
streams, CIDs would disclose traffic patterns and may defeat
the purpose of the encryption. For encrypted packets, defining
fields are the source address, final destination address, and
the Security Payload Identification, SPI, of the ESP Header.
All of these are in clear text.
When IP packets are tunneled they are encapsulated with an additional
IP header at the tunnel entry point and then sent to the tunnel
endpoint. To group such packets into packet streams, the inner
headers should also be examined to determine the packet stream. If
this is not done, full headers will be sent each time the headers of
the inner IP packet changes. So when a packet is tunneled, the
identifying fields of the inner subheaders should be considered in
addition to the identifying fields of the initial IP header.
We stress that these guidlines are only educated guesses, when IPv6
is widely deployed and IPv6 traffic can be analyzed, we might find
that other grouping algorithms perform better.
Degermark, Nordgren, Pink [Page 14]
INTERNET-DRAFT Header Compression for IPv6 February 1996
The above reasoning results in the following header fields that
define packet streams for compression
0. IPv4 addresses
When IPv4 headers are present, their source and destination
addresses are defining fields of the packet stream.
1. IPv6 Flows - the Flow Label field is non-zero.
Defining fields:
Flow Label (non-zero). Source Address. (Fragmented pack-
ets are grouped separately.)
2. IPv6 Non-flows - the Flow Label field is zero.
case a: Transport layer header visible
Defining Fields:
Flow Label (zero). Source Address. final Destination
Address (possibly in Routing Header). Transport Pro-
tocol Type (in the subheader immediately preceding the
Transport header; Next Header field if that is an IPv6
base or extension header, or Protocol field if it is
an IPv4 header). Transport stream identification (TCP
or UDP port numbers).
case b: Fragmented packets
Defining Fields:
Flow Label (zero). Source Address. final Destination
Address (possibly in Routing Header).
case c: Encrypted packets
Defining Fields:
Flow Label (zero). Source Address. final Destination
Address (possibly in Routing Header). Security Pay-
load Identifier, SPI, (in ESP Header).
NOTE: Several IP headers may occur in a chain of subheaders. In this
case the defining fields of all subheaders are considered when iden-
tifying the packet stream.
Detailed grouping hints are also found in section 7.
Degermark, Nordgren, Pink [Page 15]
INTERNET-DRAFT Header Compression for IPv6 February 1996
5. Size Issues
5.1. Compression Identifiers
Compression identifiers can be 4, 8 or 24 bits long. Their size is
not relevant for finding the compression state, a 4-bit CID with
value two, 0010, and an 8-bit CID with value two, 00000010, are
equivalent.
The CID spaces for TCP and non-TCP are separate, so a TCP CID and a
non-TCP CID never identify the same compression state, even if they
have the same value. This doubles the available CID space while
using the same number of bits for CIDs. It is always possible to
tell whether a full or compressed header is for a TCP or non-TCP
packet, so no mixups can occur.
Non-TCP compressed headers encode the size of the CID using two bits
in the first byte of the compressed header. The 4-bit CID allows a
minimum compressed header size of 2 octets for non-TCP packets, the
size bits and the CID fit in the first octet and the generation value
uses the second octet. A compressor should use 4-bit CIDs for packet
streams with the highest packet frequencies to achieve the best
compression rates.
There are no bits available to encode the CID size in the first octet
of the compressed TCP header, so for TCP the only available CID size
is 8 bits. Using a 4-bit CID would not reduce the size of the
compressed TCP header, and 8 bits is probably sufficient as TCP con-
nections are always point-to-point.
The 24 bit CID size is probably not needed for point-to-point links;
it is intended for use on multi-access links where a larger CID space
may be needed for efficient selection of CIDs for multicast packet
streams.
The major difficulty with multicast over multi-access links is that
several compressors share the CID space of a decompressor. CIDs can
no longer be selected independently by the compressor as collisions
may occur. This problem may be resolved by letting the decompressors
have a separate CID space for each compressor. Having separate CID
spaces requires that decompressors can identify which compressor sent
the compressed packet, perhaps by utilizing link-layer information as
to who sent the link layer frame. If such information is not avail-
able, all compressors on the multi-access link may be enumerated,
automatically or otherwise, and supply their number as part of the
CID. This method requires a large CID space.
Degermark, Nordgren, Pink [Page 16]
INTERNET-DRAFT Header Compression for IPv6 February 1996
5.2. Size of Compression State
The size of the compression state should be limited to simplify
implementation of compressor and decompressor, and put a limit on
their memory requirements. However, there is no upper limit on the
size of an IPv6 header as the chain of extension headers can be arbi-
trarily long. This is a problem as the compression state is essen-
tially a stored header.
The configurable parameter MAX_HEADER (see section 12) represents the
maximum size of the compression state, expressed as the maximum sized
header that can be stored as compression state. When an IPv6 header
is larger than MAX_HEADER, only part of it is stored as compression
state. An implementation must not compress more than the initial
MAX_HEADER octets of a header. An implementation must not partially
compress a subheader. Thus, the part of the header that is stored as
compression state and compressed is the longest initial sequence of
entire subheaders that is not larger than MAX_HEADER.
NOTE: We are not totally happy with this solution since most of
the [MAX_HEADER * (size of CID spaces)] sized memory is wasted
if headers are small. We are investigating other solutions to
the problem of specifying tight memory requirements while
allowing correct decompression and a low number of packet dis-
cards.
Degermark, Nordgren, Pink [Page 17]
INTERNET-DRAFT Header Compression for IPv6 February 1996
5.3. Size of full headers
It is desirable to avoid increasing the size of packets with full
headers beyond their original size, as their size may be optimized
for the MTU of the link. Since we assume that the link layer imple-
mentation provides the length of packets, we can use the length
fields in a full header to pass the values of the CID and the genera-
tion to the decompressor.
This requires that the link-layer must not add padding to the pay-
load, at least, not padding that can be delivered to the destination
link user.
The generation requires one octet and the CID may require up to 3
octets. Length fields of 2 octets occur in the IPv6 Base Header, the
IPv4 header, and the UDP header.
A full TCP header will thus have at least 2 octets available in the
IPv6 base header to pass the 8 bit CID, which is sufficient. [RFC-
1144] uses the 8 bit Protocol field of the IPv4 header to pass the
CID. We cannot use the corresponding method for IPv6 as the sequence
of extension headers is not fixed and CID values are not disjoint
from the legal values of Next Header fields.
An IPv6/UDP or IPv4/UDP packet will have 4 octets available to pass
the generation and the CID, so all CID sizes may be used.
Fragmented or encrypted packet streams may have only 2 octets avail-
able to pass the generation and CID, thus 4 bit and 8 bit CIDs may be
the only CID sizes that can be used for those packet streams.
When IPv6/IPv4 or IPv4/IPv6 tunneling is used, there will be at least
4 octets available, and all CID sizes may be used.
The generation value is passed in the higher order octet of the first
length field in the full header. When only one length field is avail-
able, the 4 bit or 8 bit CID is passed in the low order octet. When
two length fields are available, the lowest two octets of the CID are
passed in the second length field and the low order octet of the
first length field carries the highest octet of the CID.
Degermark, Nordgren, Pink [Page 18]
INTERNET-DRAFT Header Compression for IPv6 February 1996
6. Compressed Header Formats
a) Compressed TCP header format (same as [RFC 1144]):
+-+-+-+-+-+-+-+-+- - - - - - - -
| |C I P S A W U| CID |
+-+-+-+-+-+-+-+-+- - - - - - - -
Used in the same way as in [RFC-1144], regardless of whether TCP
segments are carried by IPv6 or IPv4. The compression state asso-
ciated with the CID keeps track of the IP version. Note that the
CID is present only if the C flag is set, if not the previous TCP
CID is used. See section 10.
The I flag is zero unless an encapsulating or encapsulated IPv4
header is present as there is no Identification field in the IPv6
header. The CID size for TCP packet streams is always 8 bits.
The initial flag byte is followed by an 8-bit CID if the C flag is
set, after which the DELTA and RANDOM fields follow in the same
order as they occur in the original uncompressed header. If the I
flag is set, the IPv4 Identifier value is placed at the position
that corresponds to the place of the IPv4 subheader in the
uncompressed header. The TCP Checksum and the optional values
associated with the SAWU flags are placed in the order prescribed
by [RFC-1144] at the position corresponding to the place of the
TCP subheader in the original uncompressed header.
Degermark, Nordgren, Pink [Page 19]
INTERNET-DRAFT Header Compression for IPv6 February 1996
b) Compressed non-TCP header, 4 bit CID:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |0 1| CID | Generation |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
c) Compressed non-TCP header, 8 bit CID:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |1 0| Res | CID | Generation |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
d) Compressed non-TCP header, 24 bit CID:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |1 1| Res | CID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Generation |
+-+-+-+-+-+-+-+-+
The Res field of formats c) and d) is not used and is initialized to
zero by the compressor and ignored by the decompressor.
Compressed non-TCP headers are followed by relevant RANDOM fields
(see section 7) placed in the same order as they occur in the origi-
nal uncompressed header, followed by the payload.
Degermark, Nordgren, Pink [Page 20]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7. Compression of subheaders
This section gives rules for how the compressible chain of subheaders
is compressed. Subheaders that may be compressed include IPv6 base
and extension headers, TCP headers, UDP headers, and IPv4 headers.
The compressible chain of subheaders extends from the beginning of
the header
a) up to but not including the first header that is not an IPv4
header, an IPv6 base or extension header, a TCP header, or a UDP
header, or
b) up to and including the first TCP header, UDP header, Fragment
Header, Encapsulating Security Payload Header, or IPv4 header for
a fragment,
whichever gives the shorter chain. For example, rules a) and b) both
fit a chain of subheaders that contain a Fragment Header and ends at
a tunneled IPX packet. Since rule b) gives a shorter chain, the
compressible chain of subheaders stops at the Fragment Header.
The following subsections are a systematic classification of how all
fields in subheaders are expected to change.
NOCHANGE The field is not expected to change. Any change means
that a full header must be sent to update the compression
state.
DELTA The field may change often but usually the difference
from the field in the previous header is small, so that
it is cheaper to send the change from the previous value
rather than the current value. This type of compression
is not used for non-TCP packet streams.
RANDOM The field should be included "as-is" in compressed
headers, usually because it changes unpredictably.
INFERRED The field contains a value that can be inferred from
other values, for example the size of the frame carrying
the packet, and thus need not be included in the
compressed header.
Degermark, Nordgren, Pink [Page 21]
INTERNET-DRAFT Header Compression for IPv6 February 1996
The classification implies how a compressed header is constructed. No
field that is NOCHANGE or INFERRED is present in a compressed header.
A compressor obtains the values of NOCHANGE fields from the compres-
sion state identified by the compression identifier, and obtains the
values of INFERRED fields from the link-layer implementation, e.g.,
from the size of the link-layer frame, or from other fields, e.g., by
recalculating the IPv4 header checksum. DELTA fields are encoded as
the difference to the value in the previous packet in the same packet
stream, the decompressor adds the value in the compressed header to
the value in its compression state to obtain the proper value. RAN-
DOM fields are sent "as-is" in the compressed header. DELTA and RAN-
DOM fields occur in the same order in the compressed header as they
occur in the full header.
There is currently little experience with actual IPv6 traffic, so
this classification may change as IPv6 traffic can be observed.
Fields that may be used to identify what packet stream a packet
belongs to according to section 4.1 are marked with the word DEF. To
a compressor using the guidelines from section 4.1, any difference in
corresponding DEF fields between two packets implies that the packets
belong to different packet streams. Moreover, if a DEF field is
present in one packet but not in another, the packets belong to dif-
ferent packet streams. The words DEF IFZERO means that the field is
DEF if the closest preceding IP header is an IPv4 header or an IPv6
header with a zero Flow Label.
Degermark, Nordgren, Pink [Page 22]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.1. IPv6 Header [IPv6, section 3]
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Prio. | Flow Label |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Payload Length | Next Header | Hop Limit |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Source Address +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Destination Address +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Version NOCHANGE (DEF)
Prio NOCHANGE
Flow Label NOCHANGE (DEF)
Payload Length INFERRED
Next Header NOCHANGE
Hop Limit NOCHANGE
Source Address NOCHANGE (DEF)
Destination Address NOCHANGE (DEF, if Flow Label is zero
and a corresponding Routing
Header is exhausted)
This classification implies that the whole IPv6 base header can be
compressed away.
7.2. IPv6 Extension Headers [IPv6, section 4]
What extension headers are present and the relative order of them is
not expected to change in a packet stream. Whenever there is a
change, a full packet header must be sent. All Next Header fields in
IPv6 base header and IPv6 extension headers are NOCHANGE.
Degermark, Nordgren, Pink [Page 23]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.3. Options [IPv6, section 4.2]
The contents of Hop-by-hop Options and Destination Options extension
headers are encoded with TLV "options":
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - -
| Option Type | Opt Data Len | Option Data
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - -
Option Type and Opt Data Len fields are assumed to be fixed for a
given packet stream, so they are classified as NOCHANGE. The Option
data is RANDOM unless specified otherwise below.
Padding
Pad1 option
+-+-+-+-+-+-+-+-+
| 0 |
+-+-+-+-+-+-+-+-+
Entire option is NOCHANGE.
PadN option
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - -
| 1 | Opt Data Len | Option Data
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- - - - - - - - -
All fields are NOCHANGE.
Degermark, Nordgren, Pink [Page 24]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.4. Hop-by-Hop Options Header [IPv6, section 4.3]
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| |
. .
. Options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Next Header NOCHANGE
Hdr Ext Len NOCHANGE
Options TLV coded values and padding.
Classified according to 7.3 above, unless
being a Jumbo Payload option (see below).
Jumbo Payload option
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 194 |Opt Data Len=4 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Jumbo Payload Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
First two fields are NOCHANGE and Jumbo Payload Length INFERRED.
(frame length must be supplied by link layer implementation).
NOTE: It is silly to compress the headers of a packet carrying
a Jumbo Payload Option since the relative header overhead is
negligible. Moreover, it is questionable if any packet ever
sent over a low-speed link will carry this option!
Degermark, Nordgren, Pink [Page 25]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.5. Routing Header [IPv6, section 4.4]
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | Routing Type | Segments Left |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. type-specific data .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
If the Routing Type is not recognized, it is impossible to determine
the final Destination Address unless the Segments Left field has the
value zero, in which case the Destination Address is the final Desti-
nation Address. For unknown routing types, all fields of the Routing
Header are NOCHANGE.
If the Flow Label is zero and the Segments Left field is not zero,
the packet stream can be identified only when the Routing Type is 0,
the only Routing Type currently defined.
The fields of the Type 0 Routing Header are classified as follows:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | Routing Type=0| Segments Left |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Strict/Loose Bit Mask |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Address[1] +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Address[2] +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. . .
. . .
. . .
Degermark, Nordgren, Pink [Page 26]
INTERNET-DRAFT Header Compression for IPv6 February 1996
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Address[n] +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Next Header NOCHANGE
Routing Type NOCHANGE
Hdr Ext Len NOCHANGE
Segments Left NOCHANGE
Reserved NOCHANGE
Strict/Loose Bit Mask
NOCHANGE
Address[1..n] NOCHANGE
(Address[n] may be the final Destination
address. It is DEF IFZERO when
Segments Left > 0 )
This classification allows Routing Headers of type 0 to be compressed
away completely. This is a big win as the maximum size of the Routing
Header is 392 octets.
Degermark, Nordgren, Pink [Page 27]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.6. Fragment Header [IPv6, section 4.5]
The first fragment of a packet has Fragment Offset = 0 and the chain
of subheaders extends beyond its Fragment Header. If a fragment is
not the first (Fragment Offset not 0), there are no subsequent sub-
headers (unless the chain of subheaders in the first fragment didn't
fit entirely in the first fragment).
Since packets may be reordered before reaching the compression point,
and some fragments may follow other routes through the network, a
compressor cannot rely on seeing the first fragment before other
fragments. This implies that information in subheaders following the
Fragment Header of the first fragment cannot be examined to determine
the proper packet stream for other fragments.
It is possible to design compression schemes that can compress sub-
headers after the Fragment Header, at least in the first fragment,
but to avoid complicating the rules for sending full headers and the
rules for compression and decompression, the chain of subheaders that
follow a Fragment Header must not be compressed.
The fields of the Fragment Header are classified as follows.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Reserved | Fragment Offset |Res|M|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Identification |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Next Header NOCHANGE
Reserved NOCHANGE
Res RANDOM
M flag RANDOM
Fragment Offset RANDOM
Identification RANDOM (it is never compressed away)
This classification implies that a Fragment Header is compressed down
to 6 octets. The minimum IPv6 MTU is 576 octets so most fragments
will be at least 576 octets. Since the 6 octet overhead of the
compressed fragment header is amortized over a fairly large packet,
the additional complexity of more sophisticated compression schemes
is not justifiable.
NOTE: The Identification field is RANDOM instead of NOCHANGE to
avoid an exponential backoff per packet.
Degermark, Nordgren, Pink [Page 28]
INTERNET-DRAFT Header Compression for IPv6 February 1996
Grouping of fragments according to the guidelines in section 4.1
If the Flow Label of the closest preceding IPv6 base header is
nonzero, the packet stream is defined by the combination of Flow
Label and Source Address. However, fragments and unfragmented
packets should not be grouped together.
Port numbers cannot be used to identify the packet stream when the
Flow Label of the closest preceding IP header is zero, because
port numbers are not present in every fragment. To adhere to the
uniqueness rules for the Identification value, a fragmented packet
stream is identified by the combination of Source Address and
final Destination Address.
NOTE: The Identification value is NOT used to identify the
packet stream. This avoids using a new CID for each packet
and saves the cost of the associated initial exponential
backoff. We hope that the unfragmentable part of the
headers will not change too frequently, if it does thrashing
may occur.
NOTE: These rules imply that a packet stream never contains
both fragmented and unfragmented packets. A good grouping
algorithm should always separate fragmented from unfrag-
mented packets to avoid compression state changes and the
associated exponential backoffs.
Degermark, Nordgren, Pink [Page 29]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.7. Destination Options Header [IPv6, section 4.6]
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| |
. .
. Options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Next Header NOCHANGE
Hdr Ext Len NOCHANGE
Options TLV coded values and padding.
Compressed according to 7.3 above.
The only Destination Options defined in [IPv6] are the padding
options. When further Destination Options are defined, more clever
compression techniques may be defined.
7.8. No Next Header [IPv6, section 4.7]
Covered by rules for IPv6 Header Extensions (7.2).
Degermark, Nordgren, Pink [Page 30]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.9. Authentication Header [RFC-1826, section 3.2]
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
+---------------+---------------+---------------+---------------+
| Next Header | Length | RESERVED |
+---------------+---------------+---------------+---------------+
| Security Parameters Index (SPI) |
+---------------+---------------+---------------+---------------+
| |
+ Authentication Data (variable number of 32-bit words) |
| |
+---------------+---------------+---------------+---------------+
Next Header NOCHANGE
Length NOCHANGE
Reserved NOCHANGE
SPI NOCHANGE (DEF IFZERO)
Authentication Data RANDOM
[RFC-1828] specifies how to do authentication with keyed MD5, the
authentication method all IPv6 implementations must support. For
this method, the Authentication Data is 128 bits. These 128 bits are
sent "as-is" in compressed headers and thus increase the size of the
compressed header by 16 octets.
As this is typically more than a 300% increase in the size of the
compressed header, authentication should be used with care over low-
speed links. It is a bad idea to authenticate all packets if one is
primarily concerned with bandwidth efficiency and/or low delay.
Degermark, Nordgren, Pink [Page 31]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.10. Encapsulating Security Payload Header [RFC-1827, section 3.1]
This header implies that the subsequent parts of the packet are
encrypted. Thus, no further header compression is possible on subse-
quent headers as encryption is typically already performed when the
compressor sees the packet.
However, when the ESP Header is used in tunnel mode an entire IP
packet is encrypted, and the headers of that packet may be compressed
before the packet is encrypted at the entry point of the tunnel.
This means that it must be possible to feed an IP packet and its
length to the decompressor, as if it came from the link-layer. Note
that this type of compression can be done only when it is guaranteed
that packets will not be reordered in the tunnel, as the compression
mechanisms specified in this document assume that the packet order is
preserved between the compressor and decompressor.
+---------------+---------------+---------------+---------------+
| Security Association Identifier (SPI), 32 bits |
+===============+===============+===============+===============+
| Opaque Transform Data, variable length |
+---------------+---------------+---------------+---------------+
SPI NOCHANGE (DEF IFZERO)
Opaque Transform Data RANDOM
Everything after the SPI is encrypted, and is not compressed.
Degermark, Nordgren, Pink [Page 32]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.11. UDP Header
The UDP header is described in [RFC-768].
The Next Header field (IPv6) or Protocol field (IPv4) in the preced-
ing subheader is DEF IFZERO.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Destination Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Length | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Source Port NOCHANGE (DEF IFZERO)
Destination Port NOCHANGE (DEF IFZERO)
Length INFERRED
Checksum RANDOM
The UDP header is compressed down to 2 octets, the UDP checksum.
Degermark, Nordgren, Pink [Page 33]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.12. TCP Header
The TCP header is described in [RFC-793].
The Next Header field (IPv6) or Protocol field (IPv4) in the preced-
ing subheader is DEF IFZERO.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Destination Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Acknowledgment Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Offset| Reserved |U|A|P|R|S|F| Window |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Checksum | Urgent Pointer |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options | Padding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Source Port NOCHANGE (DEF IFZERO)
Destination Port NOCHANGE (DEF IFZERO)
Sequence Number DELTA
Acknowledgment Number DELTA
Offset INFERRED/DELTA
Reserved NOCHANGE
U,A,P,R,S,F see [RFC-1144]
WINDOW see [RFC-1144]
Checksum RANDOM
Urgent Pointer see [RFC-1144]
Options see [RFC-1144]
Padding NOCHANGE
The TCP header is compressed as described by Jacobson in [RFC-1144].
For placement of compressed TCP header fields, see section 6.
Degermark, Nordgren, Pink [Page 34]
INTERNET-DRAFT Header Compression for IPv6 February 1996
7.13. IPv4 header [RFC-791, section 3.1]
As we expect many IPv6 packets to be encapsulated in IPv4 packets,
and many IPv4 packets to be encapsulated in IPv6 packets, it is
important to be able to compress IPv4 headers.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| IHL |Type of Service| Total Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Identification |Flags| Fragment Offset |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Time to Live | Protocol | Header Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options | Padding |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
There are two ways to compress the IPv4 header
a) If the IPv4 header is not for a fragment (MF flag is not set and
Fragment Offset is zero) and there are no options (IHL is 5), it
is classified as follows
Version NOCHANGE (DEF)
IHL NOCHANGE (DEF, must be 5)
Type of Service NOCHANGE
Total Length INFERRED (from link-layer implementation
or encapsulating IP header)
Identification DELTA/ (for TCP)
RANDOM (for non-TCP)
Flags NOCHANGE (MF bit must not be set)
Fragment Offset NOCHANGE (must be zero)
Time to Live NOCHANGE
Protocol NOCHANGE
Header Checksum INFERRED (calculated from other fields)
Source Address NOCHANGE (DEF)
Destination Address NOCHANGE (DEF)
Options, Padding (not present)
Degermark, Nordgren, Pink [Page 35]
INTERNET-DRAFT Header Compression for IPv6 February 1996
b) If the IPv4 header is for a fragment (MF bit set or Fragment
Offset nonzero), or there are options (IHL > 5), all fields are
RANDOM (i.e., they are sent as-is and not compressed). If the
IPv4 header is for a fragment it is the last subheader to be
compressed. If the IPv4 header has options but is not for a frag-
ment it does not end the compressible chain of subheaders, so sub-
sequent subheaders are compressed.
A compressor that follows the guidelines of section 4.1 will in case
a) use the Version, Source Address and Destination Address to define
the packet stream, together with the fact that there are no IPv4
options and that this is not a fragment.
Case b) can define two kinds of packet streams depending on whether
the IPv4 header is for a fragment or not.
If the IPv4 header in case b) is for a fragment, the compressor uses
that fact together with the Version, Source Address, and Destination
Address to determine the packet stream.
If the IPv4 header in case b) is not for a fragment, it must have
options. The compressor uses that fact (but not the size of the
options) together with the Version, Source Address, and Destination
Address to determine the packet stream.
Degermark, Nordgren, Pink [Page 36]
INTERNET-DRAFT Header Compression for IPv6 February 1996
8. Changing compression identifiers
On a point-to-point link, the compressor has total knowledge of what
CIDs are in use at the decompressor and can change what CID a packet
stream uses or reuse CIDs at will. To get the highest possible
compression rate, 4-bit CIDs should be allocated to the non-TCP
packet streams with the highest packet rates. However, changing a
CID to a new packet stream involves paying the cost of at least one
exponential backoff, so it should not be done too frequently.
Each non-TCP CID is associated with a compression state with a gen-
eration value. To avoid too rapid generation wrap-around and poten-
tial incorrect decompression, an implementation must avoid wrap-
around of the generation value in less than MIN_WRAP seconds (see
section 12).
To aid in avoiding wrap-around, the generation value associated with
a non-TCP CID should be maintained when changing a CID to a new
packet stream. A compressor must increment the generation value by
one when switching to a new non-TCP packet stream.
An implementation must not reset the generation value when changing a
CID to a new packet stream.
Degermark, Nordgren, Pink [Page 37]
INTERNET-DRAFT Header Compression for IPv6 February 1996
9. Rules for dropping or storing packets
When a decompressor receives a packet with a compressed TCP header
with CID C, it must be discarded
a) when the compression state for C is not initialized.
When a decompressor receives a packet with a compressed non-TCP
header with CID C and generation G, it must be discarded
b) when the decompressor has been disconnected from the compressor
more than MIN_WRAP seconds (see section 12),
c) when the compression state for C is not initialized,
d) when the generation of the compression state for C is neither G
nor G-1 (modulo 256).
When a decompressor receives a packet with a compressed non-TCP
header with CID C and generation G, and the compression state for C
has generation G-1 (modulo 256),
e) the header must not be decompressed using the current compres-
sion state. The packet can either be
i) discarded immediately, or else
ii) stored temporarily until the compression state is updated
by a packet with a full non-TCP header with CID C and
generation G, after which the header can be decompressed.
Packets stored according to ii) must be discarded when
1) receiving full or compressed non-TCP headers with CID C
and a generation other than G,
2) the decompressor has not received packets with CID C in
the last MIN_WRAP seconds.
When full headers are lost, a decompressor may receive compressed
non-TCP headers with a generation value immediately succeeding the
generation of its compression state. Rule e) ii) allows the
decompressor to store such headers until they can be decompressed
using the correct compression state.
Degermark, Nordgren, Pink [Page 38]
INTERNET-DRAFT Header Compression for IPv6 February 1996
10. More aggressive compression
[RFC-1144] allows the CID to be compressed away for TCP packet
streams under certain circumstances. This typically reduces the size
of the compressed TCP header from 4 to 3 bytes.
In a similar vein, compressed non-TCP headers can be reduced to a
single octet by substituting CID and generation with a single 4-bit
value after an association has formed between a 4-bit identifier
called the CGID, and the CID and generation. The format of such
compressed headers is
+-+-+-+-+-+-+-+-+
| |0 0| CGID |
+-+-+-+-+-+-+-+-+
The association between CGID and CID plus generation is established
by placing the CGID in the Res field in compressed non-TCP headers of
format c) or d). The CGID is subsequently treated as an alias for the
CID and generation in that compressed non-TCP header. The compressor
should send a few compressed headers with format c) or d) before
switching to the one octet format to increase the chance that the
decompressor has established the association. The value zero is used
to signal absence of a GCID in formats c) and d), and neither estab-
lishes nor deletes an association.
To avoid incorrect decompression when the CGID is used, only one CGID
value is valid at any given time. When a new association is desired
the current CGID value is incremented by one (modulo 16), skipping
over zero. The compressor must not wrap-around the CGID value in
less than MIN_WRAP seconds. A CGID association must be refreshed at
least once every MIN_WRAP seconds. These rules allow the decompres-
sor to avoid incorrect decompression by discarding packets with CGIDs
other than the one it believes is current.
It is questionable whether this more aggressive compression technique
is defensible as the risk of incorrect compression and discarded
packets increases. It also increases the complexity of the protocol.
When the link has a low error rate and there are few streams, say a
single voice flow, it may be a win.
Degermark, Nordgren, Pink [Page 39]
INTERNET-DRAFT Header Compression for IPv6 February 1996
11. Demultiplexing
It is necessary to distinguish packets with regular IPv4 headers,
regular IPv6 headers, full IPv6 packets, full IPv4 packets,
compressed TCP packets, and compressed non-TCP packets.
The decision to use a distinct ethertype (or equivalent) for IPv6 has
already been taken, so this takes care of distinguishing packets with
regular IPv4 and IPv6 headers.
Four different packet types remain. Our suggestion is to use one
additional ethertype (or equivalent) for full and compressed headers
and encode the first four bits of the full and compressed headers as
follows
First bits of header Type of header
-------------------- --------------
0100 full IPv4 header (with CID and generation)
0110 full IPv6 header (with CID and generation)
1*** compressed TCP header (format a)
00** compressed non-TCP header (formats b c or d),
or the one byte format from section 10.
If a new ethertype cannot be obtained we suggest that the IPv6 ether-
type is used and the following encoding of the first four bits is
used
First bits of header Type of header
-------------------- --------------
0100 regular IPv4 header (own ethertype)
0110 regular IPv6 header
0111 full IPv4 packet (with CID and generation)
0101 full IPv6 packet (with CID and generation)
1*** compressed TCP header (format a)
00** compressed non-TCP header (formats b c or d)
Here, care has been taken to use the same encoding as suggested by
Jacobson in [RFC-1144] whenever applicable. This latter encoding
could also be used for links where the link-layer does not provide a
way to encode payload type. However, ST-2 already uses 0101 so this
will not work on links where ST-2 traffic is present.
Degermark, Nordgren, Pink [Page 40]
INTERNET-DRAFT Header Compression for IPv6 February 1996
12. Configuration Parameters
The following parameters are fixed for all implementations of this
header compression scheme.
MIN_WRAP - minimum time of generation value wrap around
3 seconds.
The following parameters can be negotiated between the compressor and
decompressor. If not negotiated their values must be as specified by
DEFAULT.
F_MAX_PERIOD - Largest number of compressed headers that may be
sent without a header refresh.
DEFAULT is 256
F_MAX_TIME - Compressed headers may not be sent more than
F_MAX_TIME seconds after sending last full header.
DEFAULT is 5 seconds
NOTE: F_MAX_PERIOD and F_MAX_TIME should be lower when it is
likely that a decompressor loses its state.
MAX_HEADER - The largest header size (in 8-octet units) that may
be compressed.
DEFAULT is 25 (200 octets).
Minimum is 16 (128 octets), which covers
IPv6 Base Header
Routing Header with two addresses
Keyed MD5 Authentication Header
Minimum TCP Header
Degermark, Nordgren, Pink [Page 41]
INTERNET-DRAFT Header Compression for IPv6 February 1996
TCP_SPACE - Size of allowed CID space for TCP streams.
TCP_SPACE is the 2-logarithm of size of TCP CID space.
DEFAULT is 7, giving a maximum TCP CID of 2^7-1 = 127
TCP_SPACE must be at least 2 and at most 8.
NON_TCP_SPACE - Size of allowed CID space for non-TCP streams.
NON_TCP_SPACE is the 2-logarithm of the size of the
non-TCP CID space.
DEFAULT is 7, giving a maximum non-TCP CID of 2^7-1 = 127
NON_TCP_SPACE must be at least 2 and at most 24.
ENABLE_CID_COMPRESSION - may TCP CIDs be compressed away?
DEFAULT no.
ENABLE_ONE_OCTET - may one octet non-TCP format be used?
DEFAULT no.
Degermark, Nordgren, Pink [Page 42]
INTERNET-DRAFT Header Compression for IPv6 February 1996
13. Security Considerations
We advise against identifying packet streams with the aid of informa-
tion that is encrypted even if such information happens to be avail-
able to the compressor. Doing so would expose traffic patterns.
We advise against using authentication on all packets sent over a
low-speed link as doing so will increase the size of the average
compressed header significantly. Almost as good security may be
achievable by carefully selecting what packets to authenticate.
14. Author's Addresses
Mikael Degermark Bjorn Nordgren
CDT/Dept of Computer Science CDT/Telia Research AB
Lulea University Aurorum 6
S-971 87 Lulea, Sweden S-977 75 Lulea, Sweden
Tel: +46 920 91188 Tel: +46 920 75400
Fax: +46 920 72191 Fax: +46 920 75490
EMail: micke@sm.luth.se EMail: bcn@lulea.trab.se
Stephen Pink
CDT/Swedish Institute of Computer Science
PO Box 1263
S-164 28 Kista, Sweden
Tel: +46 8 752 15 59
Fax: +46 8 751 72 30
Mobile: +46 70 532 0007
EMail: steve@sics.se
Degermark, Nordgren, Pink [Page 43]
INTERNET-DRAFT Header Compression for IPv6 February 1996
15. References
[RFC-768] J. Postel, User Datagram Protocol, RFC 761, August 1980.
[RFC-791] J. Postel, Internet Protocol, RFC 791, September 1981.
[RFC-793] J. Postel, Transmission Control Protocol, RFC 793, Sep-
tember 1981.
[RFC-1144] V. Jacobson, Compressing TCP/IP Headers for Low-Speed
Serial Links, RFC 1144, February 1990.
[RFC-1553] A. Mathur, M. Lewis, Compressing IPX Headers Over WAN
Media (CIPX), RFC 1553, December 1993.
[RFC-1700] J. Reynolds and J. Postel, Assigned Numbers, RFC-1700,
October 1994.
[RFC-1826] R. Atkinson, IP Authentication Header, RFC 1826, August
1995.
[RFC-1827] R. Atkinson, IP Encapsulating Security Protocol (ESP),
RFC 1827, August 1995.
[RFC-1828] Metzger, W. Simpson, IP Authentication using Keyed MD5,
RFC 1828, August 1995.
[IPv6] S. Deering, R. Hinden, Internet Protocol, Version 6
(IPv6) Specification, RFC 1883, December 1995.
[ICMPv6] A. Conta, S. Deering, Internet Control Message Protocol
(ICMPv6) for the Internet Protocol Version 6 (IPv6), RFC
1885, December 1995.
This draft expires August 18, 1996
Degermark, Nordgren, Pink [Page 44]
| PAFTECH AB 2003-2026 | 2026-04-23 18:02:13 |