Internet Control Message Protocol

Size: px
Start display at page:

Download "Internet Control Message Protocol"

Transcription

1 Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts. Because IP is connectionless, with no error recovery along the way, serves the important purpose of reporting errors and recommending corrective action to the originating host. These notes will start with a discussion of for IPv4 (v4) and segue into a discussion of for IPv6 (v6). v4 v4 messages travel as the payload of an IPv4 packet and can be identified by the value 0x01 in the IPv4 protocol field. The format of an message is as shown below. type (8) code (8) checksum (16) information field(s) (variable length and structure based on message type) The type field identifies the type of message. The IANA shows about 30 types; we ll be interested in a few of the more commonly used messages. The code field adds further information (or further qualification of the base type, if you want to think of it that way). A destination unreachable message, type 3, makes the most use of this field, with 16 defined code values which give a more specific reason why the destination could not be reached (net unreachable, host unreachable, fragmentation needed, administrative prohibition, etc.). The checksum field is calculated in the same way as the IP checksum a one s complement sum but it covers the entire PDU (header and information portions). The checksum field is set to zero when calculating the checksum. The format of the information portion of the message depends on the message type. 1 June, 2014

2 Let s start with the echo and echo reply messages. These are used by the ping command, one of the basic tools for checking network connectivity. 8 (request) / 0 (reply) 0 checksum identifier sequence number optional data (variable length) For echo, type = 8; for echo reply, type = 0. There are no qualifying codes, so code should be 0. The (optional) identifier and sequence number can be used by the sender in an attempt to match up echo and echo reply messages. The data field is also optional; if present, the data received in an echo message must be returned in the resulting echo reply. The parameter problem message is used to tell the originating host that there was some problem with the IP header or options that was severe enough that the packet was dropped. 12 (parameter problem) varies checksum pointer unused IP header + 8 bytes of IP payload For parameter problem, type = 12. The code field, in combination with the pointer value and the portion of the original datagram included in the message, tell the originating host more about the problem. A code of 0 means that the pointer field is valid and points to the octet of the original datagram which triggered the message. A code of 1 indicates a required option is missing (e.g., lack of some security option in an environment where its use was expected). 2 June, 2014

3 A code of 2 indicates incorrect length (a runt packet, or nonsense values for the header and total length). The optional data includes the IP header (a maximum of 120 bytes) plus the first eight bytes of the IP payload. The reason for including the first eight bytes of the IP payload is that for UDP and TCP (the most common transport protocols) this will include the source and destination port numbers. The source port, in particular, is needed in order for the protocol stack to determine which process should receive the bad news. In general, some information from the header of the PDU carried as payload is required to determine the protocol module that should receive the error message. Currently, the recommended practice is to return as much of the original packet as possible, subject to the limitation that the total length of the message should not exceed 576 bytes (the minimum that any IP implementation should be able to receive). Eight bytes of payload isn t sufificient, for example, for IP-in-IP tunnelling, where one IP packet is carried as payload in another IP packet. The destination unreachable message is sent when a router or host cannot deliver a datagram. The format is very similar to a parameter problem message, with the exception that the code field alone supplies the specific reason for failure. 3 (dest unreachable) varies checksum unused IP header + 8 bytes of IP payload The type code for destination unreachable is 3. There are many codes to provide a more specific indication of why the datagram could not be delivered. Possibilities include an unknown address; loss of connectivity to the network or host due to hardware failure or administrative restriction; unavailability of the required protocol, type of service, source route, or link MTU (fragmentation prohibited); or unavailability of the specified port at the destination host. RFC 1191 modifies behaviour when the error is due to a link MTU which is too small for the IP packet. In this case, the router is required to return the MTU of the next hop in the least significant 16 bits of the unused 3 June, 2014

4 word. This supports path MTU discovery, so that a host can determine the maximum size packet which can be sent to a destination without fragmentation. It happens on occasion that a destination unreachable message will arrive and the header fragment will indicate a system with which you ve never exchanged packets. One possible cause is a DoS (denial of service) attack elsewhere in the Internet using IP packets with spoofed source addresses. Failure to deliver a packet due to a timeout rates its own message, time exceeded. The format is the same as that used for a destination unreachable message. The type code is set to 11. There are two possible causes for a timeout. It may be that the packet has spent too much time travelling (i.e., the IP TTL field has decremented to 0 and the packet is not at the destination). The other possibility is that the packet was fragmented in transit and some fragments were lost. The code is set to 0 or 1, for time-to-live or fragmentation reassembly timeout, respectively. It can happen that a host has an incorrect idea about how to route a packet and sends it to the wrong router. In this case, the router will reply with an redirect message. 5 (redirect) varies checksum first-hop IP address IP header + 8 bytes of IP payload The type for a redirect message is 5. The code field specifies the scope of the redirect for a particular host, or for a combination of type of service and net or host. This is a first-hop correction mechanism. There s no way for one intermediate router/host to use an redirect to correct another intermediate router/host, because the IP packet does not contain the address of the router/host at the other end of the hop, only the address of the originating host. 4 June, 2014

5 There s no point in a distant router attempting to correct the source host, because the fault could just as well lie with intermediate routers/ hosts. Note that routers use routing protocols to instruct one another on the correct route. Hosts do not normally participate in routing protocols, and redirect messages provide a way to correct the host s routing table. There is obvious potential for malicious use of redirect messages, and for this reason they are often disabled or firewalled. There are quite a few additional messages, many now considered obsolete. RFCs 6633 and 6918 formally deprecate a number of older message types. Consult the RFCs if you re interested. 5 June, 2014

6 v6 v6 is defined in RFC The Introduction starts with The Internet Protocol version 6 (IPv6) uses the Internet Control Message Protocol () as defined for IPv4 [RFC-792], with a number of changes. This is pretty accurate. The general format of an v6 message looks exactly like the general format of an v4 message, with an initial word containing type, code, and checksum fields, followed by whatever data is appropriate for the message. Many of the messages are the same. There s one new feature that we will see in other protocols: the checksum incorporates a pseudoheader that affords some protection against changes in IPv6 header fields. The form of the pseudoheader is defined in RFC Source Address Destination Address Upper-Layer Packet Length zero Next Header To calculate the v6 checksum, the pseudoheader is (conceptually) prepended to the v6 message. This provides some protection against corruption of the IPv6 header due to incorrect programming in routers because routers do not modify the contents of the IPv6 message. The pseudoheader is not transmitted from the sender to the receiver, nor is it ever a part of the IPv6 header or v6 message. It is a construct, used only for the purpose of calculating the checksum. All information contained in the pseudoheader is known to both the sender and receiver. The v6 protocol module in the receiver reconstructs the 6 June, 2014

7 pseudoheader when it performs its own calculation of the checksum for comparison with the checksum transmitted in the v6 message. We ve already looked at one of the additional features of v6, Neighbour Discovery (ND), in the context of mapping IP to link addresses. This is a good place to look at another set of extensions, for stateless autoconfiguration, also referred to as stateless address autoconfiguration (SLAAC). IPv6 Autoconfiguration One of the goals for IPv6 was to make it possible to connect a host to a network with no manual configuration at the host. To that end, IPv6 includes procedures for stateless autoconfiguration defined in RFC Hosts (and routers) always generate a link-local address for each interface. In addition, IPv6 routers use v6 Router Advertisement messages to periodically advertise routing prefixes for additional addresses and other information about the link. On receipt of a Router Advertisement, a host generates additional addresses by concatenating the advertised prefix(es) with its interface identifier. A host doesn t need to wait for a periodic advertisement; it can solicit Router Advertisements with a Router Solicitation message 2. Stateless autoconfiguration is compatible with stateful configuration 3 using DHCPv6 and hosts can use both at the same time. When a node is connected to a network, it constructs a link-local address using the link-local prefix fe80::/64 and the interface ID as the final 64 bits. The address is checked for uniqueness using the duplicate address detection exchange defined in the ND protocol. Failure of this check aborts autoconfiguration. This step is performed by routers and hosts; the steps which follow are performed by hosts only. The host now sends out a Router Solicitation message (a simple message, type 133) using its link-local address as the source and the all-routers multicast 1 IPv4 reserves the prefix /16 for autoconfiguration, but autoconfiguration is strictly limited to random address selection on isolated, ad hoc networks. 2 While implemented in v4, router discovery (RFC 1256) was not mandatory for IPv4 hosts. In contrast, router discovery is an integral part of IPv6, essential to the autoconfiguration function. 3 The distinction being made here is that routers do not maintain state about addresses configured by individual hosts in response to Router Advertisements. A DHCP server (DHCPv4 or DHCPv6) does maintain state about the addresses it has allocated. 7 June, 2014

8 address as the destination. For efificiency, the host s link address may be included as an option, thus avoiding a ND exchange when the router responds. Router Advertisements are more complicated than most messages; the format is shown below. 134 (Router Advert) 0 checksum Cur Hop Limit M O Reserved Router Lifetime Reachable Time Retrans Timer Options... Router advertisements use the router s link-local IP address as the source IP address and include a link layer address 4 for the interface as one of the options in the advertisement. Conceptually, the address of the router is entered in the node s Default Router List. Router Advertisements typically provide one or more address prefixes for the link 5. For example, if an organisation has two connections to the Internet through two distinct ISPs, the router advertisement would likely include distinct prefixes for each ISP. A Prefix Information option is added to the Router Advertisement for each such prefix. 4 Remember the distinction! The link layer address is specific to the link technology an Ethernet address, for example. The link-local IP address, as described earlier, is an IP address that s valid only on the link that s directly connected to the interface. 5 This is what you ll see in the VNL. The routers january, february, march, and december are configured to advertise on the net17 and net18 Ethernet segments. 8 June, 2014

9 type length Prefix Length L A Reserved Valid Lifetime Preferred Lifetime Reserved Prefix (up to 128 bits) The first two fields (type and length) are standard for any v6 option. The Prefix Length and Prefix fields specify the prefix. Recall that by default IPv6 addresses are leased for a limited amount of time. The Valid Lifetime and Preferred Lifetime fields specify the length of time that the address can be used. An address can be used freely until the Preferred Lifetime interval expires. After that, the address cannot be used in new communication. The address can be used for communication that is already in progress until the Valid Lifetime interval expires. After that, it cannot be used for any purpose. Since routers send out Router Advertisements at regular intervals, the preferred and valid lifetimes can be extended indefinitely. If a network administrator wishes to stop using an address prefix, or introduce a new address prefix, it s simply a matter of adjusting the times advertised by the router. A router advertises prefixes for two purposes: to inform a host that addresses with given prefix are directly connected to the link ( on-link ); and to inform a host of a prefix that it should use as part of stateless autoconfiguration. The two purposes are logically separate. A Prefix Information option will specify whether the host should assume that addresses with this prefix are connected to the same link as the interface receiving the advertisement by setting the L flag. Conceptually, an on-link prefix will be entered in the node s Prefix List. The Prefix List contains all on-link prefixes. An address that does not match a prefix in the Prefix List is considered to be off-link. A Prefix Information option will specify whether the host should use the prefix for stateless autoconfiguration by setting the A flag. 9 June, 2014

10 A prefix can be flagged as identifying addresses on the same link without being used for autoconfiguration. This allows a router to advertise prefixes that are on-link without triggering automatic generation of addresses (e.g., when addresses with this prefix are obtained by stateful configuration). It s also possible for a prefix to be advertised as suitable for stateless autoconfiguration without advertising it as on-link. This can be useful in a situation where even the trafific between hosts on the same segment should be passed through a router for trafific control purposes. Often, a prefix will be advertised as both on-link and available for autoconfiguration. A prefix that does not identify addresses on the same link and cannot be used for autoconfiguration is useless in a Router Advertisement. Remember that Router Advertisements are not a routing protocol, in the sense that the router advertising a prefix may not be the best router to use as the first hop for packets whose destination IP address matches the prefix. Conceptually, when an IPv6 node wants to send a packet, it uses the information in the Default Router List and Prefix List as follows: If the destination address matches a prefix in the Prefix List, the destination is considered to be on-link. If the node does not already know the link layer address of the destination, it will use Neighbour Discovery to get it. If the destination address does not match a prefix in the Prefix List, the destination is considered to be off-link. The node will select a router from the Default Router List (by some method) and send the packet to the router for forwarding. The node should already know the link-local and link layer addresses of the router from its Router Advertisement. In practice, the information in the Default Router List and Prefix List are combined to produce a forwarding table. This is what you see if you use ip or route to show IPv6 forwarding table entries. To avoid doing the full lookup for a given IP destination each time it s used, a host keeps a Destination Cache with the correct forwarding information for each specific destination. As mentioned above, Router Advertisements are not a routing protocol, and it may happen that when there are multiple routers in the Default Router List, the one selected might not be the best choice for a given prefix. In this case, the host will receive an v6 Redirect message specifying the best router for that destination. The information in the Redirect is used to correct the entry in the Destination Cache. 10 June, 2014

11 In addition to address prefixes, Router Advertisements can specify other information: The Router Lifetime field is used to specify whether, and for how long, the router can act as a default gateway. The Cur Hop Limit field specifies a default value that hosts should use for the IPv6 hop count. The M (managed address configuration) and O (other configuration information) flags indicate whether the host should contact a DHCPv6 server for additional addresses and other configuration information. If no Router Advertisements are received in reply to its Router Solicitation message, the host can conclude that the link it s connected to does not have an IPv6-capable router. It is first required to try for stateful configuration (e.g., DHCPv6). If no server can be located, the host can proceed to communicate with any other IPv6 hosts on the link using the link-local address. If a Router Advertisement is received in reply to a host s Router Solicitation, the host is expected to follow the instructions it contains. In particular, for each address prefix flagged for stateless address configuration, the host should construct an IP address using the prefix and the interface ID and bind it to the interface. Addresses in IPv6 are in general time-limited, and router advertisements will include a lifetime for each prefix. The lifetime can be infinite. As mentioned above, Router Discovery isn t a routing protocol a router advertisement specifies whether a router can be used as a default router but it doesn t contain any information about how to choose the best router for off-link destinations. That function is still handled by redirect messages. A router can use a redirect message to inform a host that some other router is a better choice for the destination, or that the destination is attached to the link and can be reached directly. As with an v4 redirect, the redirect message contains the IP address of a better first hop (another router, or the destination itself ). In addition, the router can also include the link address of the new first hop to avoid the need for a ND exchange. 11 June, 2014

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Operational Security Capabilities for IP Network Infrastructure

Operational Security Capabilities for IP Network Infrastructure Operational Security Capabilities F. Gont for IP Network Infrastructure G. Gont (opsec) UTN/FRH Internet-Draft September 1, 2008 Intended status: Informational Expires: March 5, 2009 Status of this Memo

More information

Network Layer (4): ICMP

Network Layer (4): ICMP 1 Network Layer (4): ICMP Required reading: Kurose 4.4.3, 4.4.4 CSE 4213, Fall 2006 Instructor: N. Vlajic 2 1. Introduction 2. Network Service Models 3. Architecture 4. Network Layer Protocols in the Internet

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Configuring IPv6 for Gigabit Ethernet Interfaces

Configuring IPv6 for Gigabit Ethernet Interfaces CHAPTER 46 IP version 6 (IPv6) provides extended addressing capability beyond those provided in IP version 4 (IPv4) in Cisco MDS SAN-OS. The architecture of IPv6 has been designed to allow existing IPv4

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

TCP/IP Protocol Suite

TCP/IP Protocol Suite TCP/IP Protocol Suite Computer Networks Lecture 5 http://goo.gl/pze5o8 TCP/IP Network protocols used in the Internet also used in today's intranets TCP layer 4 protocol Together with UDP IP - layer 3 protocol

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

(ICMP), RFC

(ICMP), RFC Internet et Control o Message Protocol (ICMP), RFC 792 http://icourse.cuc.edu.cn/networkprogramming/ linwei@cuc.edu.cn Nov. 2009 Overview The IP (Internet Protocol) relies on several other protocols to

More information

Introduction to IPv6 - II

Introduction to IPv6 - II Introduction to IPv6 - II Building your IPv6 network Alvaro Vives 27 June 2017 Workshop on Open Source Solutions for the IoT Contents IPv6 Protocols and Autoconfiguration - ICMPv6 - Path MTU Discovery

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Configuring IPv6 basics

Configuring IPv6 basics Contents Configuring IPv6 basics 1 IPv6 overview 1 IPv6 features 1 IPv6 addresses 2 IPv6 neighbor discovery protocol 5 IPv6 PMTU discovery 8 IPv6 transition technologies 8 Protocols and standards 9 IPv6

More information

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6 Guide to TCP/IP Fourth Edition Chapter 6: Neighbor Discovery in IPv6 Objectives Describe Neighbor Discovery in IPv6 and how it compares to ARP in IPv4 Explain Neighbor Discovery message interaction between

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC

Internet Control Message Protocol (ICMP), RFC 792. Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Internet Control Message Protocol (ICMP), RFC 79 Prof Lin Weiguo Copyleft 009~07, School of Computing, CUC Oct 07 Overview } The IP (Internet Protocol) relies on several other protocols to perform necessary

More information

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage

Lecture 11: Fragmentation & Addressing. CSE 123: Computer Networks Stefan Savage Lecture 11: Fragmentation & Addressing CSE 123: Computer Networks Stefan Savage So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes, how to

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

CSEP 561 Internetworking. David Wetherall

CSEP 561 Internetworking. David Wetherall CSEP 561 Internetworking David Wetherall djw@cs.washington.edu Internetworking t Focus: Joining multiple, different networks into one larger network Forwarding models Application Heterogeneity Transport

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Ch.9 Internet Protocol: Error And Control Messages (ICMP)

Ch.9 Internet Protocol: Error And Control Messages (ICMP) CSC521 Communication Protocols 網路通訊協定 Ch.9 Internet Protocol: Error And Control Messages (ICMP) 吳俊興國立高雄大學資訊工程學系 Internetworking With TCP/IP, Vol I: Sixth Edition, Douglas E. Comer Outline 1 Introduction

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Lecture 11: IP routing, IP protocols

Lecture 11: IP routing, IP protocols Lecture 11: IP routing, IP protocols Contents Routing principles Local datagram delivery ICMP Protocol UDP Protocol TCP/IP Protocol Assuring requirements for streaming TPC Building and terminating TCP

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery IPv6 Neighbor Discovery Last Updated: September 19, 2012 The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Computer Networking. IP Packets, IPv6 & NAT. Some Slides from Internet

Computer Networking. IP Packets, IPv6 & NAT. Some Slides from Internet Computer Networking Packets, v6 & NAT Some Slides from Internet Outline Packet Format v6 NAT 2 Service Model Low-level communication model provided by Internet Datagram Each packet self-contained All information

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol)

CS519: Computer Networks. Lecture 2: Feb 2, 2004 IP (Internet Protocol) : Computer Networks Lecture 2: Feb 2, 2004 IP (Internet Protocol) A hypothetical service You want a mail delivery service You have two choices: Acme Guaranteed Mail Delivery Service We never fail Rocko

More information

ISO 9001:2008. Pankaj Kumar Dir, TEC, DOT

ISO 9001:2008. Pankaj Kumar Dir, TEC, DOT ISO 9001:2008 Pankaj Kumar Dir, TEC, DOT AWARENESS OBJECTIVES IPv6 Address Format & Basic Rules Understanding the IPv6 Address Components Understanding & Identifying Various Types of IPv6 Addresses 3/25/2012

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol

More information

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX HATS Conference (Promotion Conference of Harmonization of Advanced Telecommunication Systems) Multimedia Communication Test Implementation Liaison

More information

Internetworking Part 2

Internetworking Part 2 CMPE 344 Computer Networks Spring 2012 Internetworking Part 2 Reading: Peterson and Davie, 3.2, 4.1 19/04/2012 1 Aim and Problems Aim: Build networks connecting millions of users around the globe spanning

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter 4 in Huitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

IPv6 Protocol Architecture

IPv6 Protocol Architecture IPv6 Protocol Architecture v4/v6 Header Comparison Not kept in IPv6 Renamed in IPv6 Same name and function New in IPv6 2 New Functional Improvement Address Space Increase from 32-bit to 128-bit address

More information

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents Operation Manual IPv6 Table of Contents Table of Contents Chapter 1 IPv6 Basics Configuration... 1-1 1.1 IPv6 Overview... 1-1 1.1.1 IPv6 Features... 1-2 1.1.2 Introduction to IPv6 Address... 1-3 1.1.3

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: The Internet Protocol Literature: Forouzan: ch 4-9 and ch 27 2004 Image Coding Group, Linköpings Universitet Outline About the network layer Tasks Addressing Routing Protocols 2 Tasks of the

More information

Table of Contents 1 IPv6 Basics Configuration 1-1

Table of Contents 1 IPv6 Basics Configuration 1-1 Table of Contents 1 IPv6 Basics Configuration 1-1 IPv6 Overview 1-1 IPv6 Features 1-1 Introduction to IPv6 Address 1-3 Introduction to IPv6 Neighbor Discovery Protocol 1-5 IPv6 PMTU Discovery 1-8 Introduction

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Internet Technology 3/23/2016

Internet Technology 3/23/2016 Internet Technology // Network Layer Transport Layer (Layer ) Application-to-application communication Internet Technology Network Layer (Layer ) Host-to-host communication. Network Layer Route Router

More information

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1

Internet Protocol. Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Outline Introduction to Internet Protocol Header and address formats ICMP Tools CS 640 1 Internet Protocol Runs on all hosts in the Internet and enables packets to be routed between systems

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information

MESSAGES error-reporting messages and query messages. problems processes IP packet specific information ICMP ICMP ICMP is mainly used by operating systems of networked computers to send error messages indicating that a requested service is not available or that host/ router could not be reached. ICMP MESSAGES

More information

Networking Potpourri: Plug-n-Play, Next Gen

Networking Potpourri: Plug-n-Play, Next Gen Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia

More information

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX

G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX G3-PLC L3/L4 Interoperability Test Procedure Manual ANNEX HATS Conference (Promotion Conference of Harmonization of Advanced Telecommunication Systems) Multimedia Communication Test Implementation Liaison

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 7: Introduction to IPv6 Assistant Teacher Samraa Adnan Al-Asadi 1 IPv6 Features The ability to scale networks for future demands requires a limitless supply of

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Introduction to IPv6. IPv6 addresses

Introduction to IPv6. IPv6 addresses Introduction to IPv6 (Chapter4inHuitema) IPv6,Mobility-1 IPv6 addresses 128 bits long Written as eight 16-bit hexadecimal integers separated with colons E.g. 1080:0000:0000:0000:0000:0008:200C:417A = 1080::8:800:200C:417A

More information

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL IPv6 Protocol & Structure npnog3 9-11 Dec, 2017 Chitwan, NEPAL Protocol Header Comparison IPv4 contains 10 basic header fields, while IPv6 has 6 basic header fields IPv6 header size is 40 octets compared

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen Lecture 4 - Network Layer Networks and Security Jacob Aae Mikkelsen IMADA September 23, 2013 September 23, 2013 1 / 67 Transport Layer Goals understand principles behind network layer services: network

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Internet Engineering Task Force. Obsoletes: draft-ietf-dhc-dhcpv6-05.txt 16 August 1996

Internet Engineering Task Force. Obsoletes: draft-ietf-dhc-dhcpv6-05.txt 16 August 1996 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-05.txt J. Bound Digital Equipment Corp. C. Perkins IBM Research 16 August 1996 Dynamic Host Configuration

More information

IPv6 Associated Protocols. Athanassios Liakopoulos 6DEPLOY IPv6 Training, Skopje, June 2011

IPv6 Associated Protocols. Athanassios Liakopoulos 6DEPLOY IPv6 Training, Skopje, June 2011 IPv6 Associated Protocols Athanassios Liakopoulos (aliako@grnet.gr) 6DEPLOY IPv6 Training, Skopje, June 2011 Copy... Rights This slide set is the ownership of the 6DEPLOY project via its partners The Powerpoint

More information

The Netwok Layer IPv4 and IPv6 Part 2

The Netwok Layer IPv4 and IPv6 Part 2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE The Netwok Layer IPv4 and IPv6 Part 2 Jean Yves Le Boudec 2014 1 Contents 6. ARP 7. Host configuration 8. IP packet format Textbook Chapter 5: The Network Layer

More information

IPv6 address configuration and local operation

IPv6 address configuration and local operation IPv6 address configuration and local operation Amsterdam, 16 february 2012 Iljitsch van Beijnum Today's topics IPv6 address configuration stateless autoconfig DHCPv6 DAD, NUD, timers Router solicitations/advertisements

More information

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-15.txt J. Bound Compaq Computer Corp. M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center

More information

Workshop on Scientific Applications for the Internet of Things (IoT) March

Workshop on Scientific Applications for the Internet of Things (IoT) March Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IP Networks: From IPv4 to IPv6 Alvaro Vives - alvaro@nsrc.org Contents 1 Digital Data Transmission 2 Switched Packet

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical

CSE/EE 461 The Network Layer. Application Presentation Session Transport Network Data Link Physical CSE/EE 461 The Network Layer Application Presentation Session Transport Network Data Link Physical This Lecture Focus: What to do when one wire isn t big enough? Point to point link Broadcast link (Ethernet

More information

IP CONSORTIUM TEST SUITE Internet Protocol, Version 6

IP CONSORTIUM TEST SUITE Internet Protocol, Version 6 IP CONSORTIUM TEST SUITE Internet Protocol, Version 6 Technical Document Last Update: January 25, 2002 Internet Protocol Consortium 7 Leavitt Lane, Room 106 Durham, NH 03824-3525 Research Computing Center

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER CHAPTER 3 This chapter describes how to configure Internet Protocol version 6 (IPv6), which includes addressing, Neighbor Discovery Protocol (ND), and Internet Control Message Protocol version 6 (ICMPv6),

More information

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

Recap. Recap. Internetworking. First mile problem. Internet. End Users.   Last mile problem. Direct link networks Packet switching. Recap First mile problem Internet www.yahoo.com Comcast Sprint End Users SBC UUNET www.cnn.com Last mile problem Recap Direct link networks Packet switching Internetworking 1 IP Internet Concatenation

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Internet protocols: ICMP, ARP, DHCP

Internet protocols: ICMP, ARP, DHCP Internet protocols: ICMP, ARP, DHCP Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents

More information

Rocky Mountain IPv6 Summit April 9, 2008

Rocky Mountain IPv6 Summit April 9, 2008 Rocky Mountain IPv6 Summit April 9, 2008 Introduction to the IPv6 Protocol Scott Hogg GTRI - Director of Advanced Technology Services CCIE #5133, CISSP 1 IPv6 Header IPv4 Header 20 bytes IPv6 Header, 40

More information

HY 335 Φροντιστήριο 8 ο

HY 335 Φροντιστήριο 8 ο HY 335 Φροντιστήριο 8 ο Χειμερινό Εξάμηνο 2009-2010 Παπακωνσταντίνου Άρτεμις artpap@csd.uoc.gr 4/12/2009 Roadmap IP: The Internet Protocol IPv4 Addressing Datagram Format Transporting a datagram from source

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough

CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1. Brian Harrington. February 13, University of Toronto Scarborough CSCD58 WINTER 2018 WEEK 6 - NETWORK LAYER PART 1 Brian Harrington University of Toronto Scarborough February 13, 2018 ADMIN Assignments Midterm after reading week (Feb 27) In class Covering everything

More information

9th Slide Set Computer Networks

9th Slide Set Computer Networks Prof. Dr. Christian Baun 9th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/49 9th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

IPv6. Internet Technologies and Applications

IPv6. Internet Technologies and Applications IPv6 Internet Technologies and Applications Contents Summary of IPv6 core features Auto-configuration IPv4-IPv6 transition techniques IPv6 networks today ITS 413 - IPv6 2 Motivation Current version of

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia IP out today. Your job: Find partners and tell us Implement

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information