One document matched: draft-acharya-ipsw-fast-cell-00.txt
Internet-Draft Arup Acharya, C&C Research Labs, NEC USA
Expiration Date: Rajiv Dighe, C&C Research Labs, NEC USA
January 1998 Furquan Ansari, C&C Research Labs, NEC USA
July 1997
IPSOFACTO: IP Switching Over Fast ATM Cell Transport
<draft-acharya-ipsw-fast-cell-00.txt>
Status of This Memo
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
To learn the current status of any Internet-Draft, please check the
"1id-abstracts.txt" listing contained in the Internet-Drafts Shadow
Directories on ftp.is.co.za (Africa), ftp.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).
Abstract
This document describes a method for mapping IP flows to ATM
switches. No signaling is necessary to setup a path through ATM
switches. Switch controllers run a IP routing protocol and execute IP
forwarding. The Ipsofacto component is responsible for mapping a IP flow
to a switched path. The focus of this document is primarily on switching
IP multicast. Mechanisms for switching unicast flows are also described.
Table of Contents
1. Introduction
2. Basic operation
3. Related Schemes
4. Switch configuration
5. Protocol Independent Multicast-Dense Mode
6. Protocol Independent Multicast-Sparse Mode
7. Switching Unicast flows
7.1 TCP Optimizations
7.2 Fixed Length IP routing tag
7.3 Optimizing Mobile-IP flows
7.4 Aggregation through IP-in-IP encapsulation
7.5 Merging aggregated flows through a
multipoint-to-point tunnel
7.6 Handling Route Changes
Acharya, Dighe, Ansari Expires: January 1998 [Page 1]
8. Conclusions
9. Security Considerations
10. Intellectual Property Considerations
11. Acknowledgments
12. References
13. Authors' Addresses
1. Introduction
IPSOFACTO is a methodology for executing the IP protocol stack
directly on ATM switches. The ATM signaling stack is not used. This
draft describes how IP multicast and unicast may be mapped directly to
ATM switches.
The target scenario consists of (a) a cloud of ATM switches running
the IP protocol stack and optionally, (b) hosts that are directly
connected to this cloud. Each switch in this cloud runs the IP
protocol stack along with an Ipsofacto component for mapping IP flows
to switched paths. The description in this draft assumes
configuration (a).
2. Basic Operation
The basic premise of operation for Ipsofacto is that all unused VCs on a
input port of a switch are mapped to the switch control processor
(Fig. 1).
---------------------
| IP | IPSOFACTO |
---------------------
| Switch Controller |
---------------------
|
| \
/|\ \
/ | \ \_______unused VC=1
Port1 --/-----\--- Port3
----------- | /Switch \ |------------
-/---------\-
__________/ | \
unused VC=1 | |
Port2 | unused VC=1
FIGURE 1
A cell-level switched path for data forwarding is established in the
following way. A sender selects an unused VC on an outgoing link to
forward the first packet of a new flow. This is received by the switch
processor at the downstream end of the link, which then selects
Acharya, Dighe, Ansari Expires: January 1998 [Page 2]
outgoing links based on its IP routing tables, and an unused VC for
each selected link. This first packet is then forwarded by the
processor on the selected outgoing links by picking an unused VC on
each link (Fig. 2).
---------------------
| IP | IPSOFACTO |
---------------------
| Switch Controller |
---------------------
========> (IP forwarding)
Pkt1 | Pkt1
/ | \
/ | \.............unused VC=1
Port1 ---/-------- Port3
-----------| / SWITCH |------------
------ -/---------
| Pkt1.........../ |
----- unused VC=1 |
Port2|
FIGURE 2
Subsequently, the switch processor adds an entry in the VC tables,
<{input port, input VC}, {output port, output VC}>. Following packets
are then switched at the cell level, eliminating the need for
packet-level forwarding at the control processor.
---------------------
| IP | IPSOFACTO |
--------- ||---------
| Switch Controller |
--------- || --------
| ||
| || ADD switched path
| || (port1, VC=1 --> port2, VC=1)
| ||
|----- ||----|
| __\/__|________
-----------| / SWITCH |------------
Port1 |--/---------| Port3
___________________/ |
|
Port2|
FIGURE 3
In contrast to data packets, which are forwarded through a switched
path (following the first packet), a switched path is never created
Acharya, Dighe, Ansari Expires: January 1998 [Page 3]
for IP "control" messages: typically, IP "control" messages will be
sent and received on a predefined "control VC", and will therefore, be
forwarded through the switch processor. As a result of processing
these control messages, a per-flow forwarding state may be established
on the switch processor. Changes in the forwarding state,e.g. pruning
an outgoing interface, is then used to modify the switched path
(e.g. deleting an <outgoing port, VC> from the VC tables). When the
forwarding state is removed from the control processor, the
corresponding switched data path is released, by marking the input and
output VCs as unused. For PIM, the "control" packets are distinguished
from data packets, based on protocol number in the IP header. For TCP,
the "control" packets may be decided based on flags in the TCP header
(SYN/FIN). ICMP packets are always forwarded through the control
processor.
When an outgoing VC, that is currently in use, is reclaimed back,
i.e. marked as 'unused', this action is preceded by marking the VC to
be in 'transient' state, sending a RECLAIM message from the upstream
to the downstream node, and waiting for a RECLAIM-ACK in reply. When
the downstream node receives a RECLAIM message, it marks the
corresponding incoming VC as 'unused', responds with a RECLAIM-ACK,
followed by sending RECLAIM messages further downstream. The RECLAIM
message may need to be re-sent if a RECLAIM-ACK is not received within
a specified interval. Once the RECLAIM-ACK is received, the VC is
marked as 'unused' at the upstream node. Note that it may not be
necessary to send a per-VC RECLAIM and RECLAIM-ACK, and instead, a
single RECLAIM and RECLAIM-ACK message may contain multiple VC
numbers; this cuts down the inter-switch control traffic at the
expense of delayed reclamation.
A RECLAIM message is triggered as a result of some protocol action at
the controller, e.g. an outgoing branch of a switched path may be
removed because a PIM "Prune" message was received.
It is not necessary that the RECLAIM is only sent from the upstream to
the downstream node; the downstream node may initiate the RECLAIM as
well.
In this draft, the terms 'marking a VC unused' or 'reclaiming a VC'
implicitly imply that RECLAIM and RECLAIM-ACK message exchange has
been completed.
3. Related Schemes
Unlike MPOA [MPOA], Ipsofacto does not use ATM signaling to setup
switched paths for IP flows. Ipsofacto is similar in spirit to Ipsilon's
IP switching [Ipsilon] [IFMP] and Toshiba's CSR [CSR]. Ipsilon selects
the VC for switching a flow from the downstream node, while CSR
selects the VC at the upstream node. Both use a notification protocol
(IFMP for Ipsilon, FANP [FANP] for CSR) to inform the upstream/
downstream neighbour of the selected VC. Ipsofacto informs the
downstream node of the selected VC implicitly through usage. Other
related proposals include Tag-switching [TAG] and ARIS [ARIS]: both
pre-establish switched paths based on routing information.
Acharya, Dighe, Ansari Expires: January 1998 [Page 4]
4. Switch configuration
Each port of a switch is assigned to be an IP interface. Incoming
cells on all unused VCs are directed to the control processor. When a
packet is received on a unused VC, the incoming VC and port number
information associated with the packet is made available to the
Ipsofacto layer. Ipsofacto layer keeps track of all unused VCs on each
port, and maintains a flow-table which maps a flow to a switched path.
e.g. <source IP address, destination IP address, TTL>
---> <{input port, input VC}, list of {output port, out VC} pairs>
The flow-id is constructed from the source/destination IP addresses
and port numbers along with the incoming TTL value on the packet.
Although not strictly necessary, we will assume that there is a
dedicated control VC between neighbouring switches. Typically, the
control VC will be used to forward IP multicast "control" messages
(i.e. PIM packets with protocol number 103) between adjacent switches.
In effect, each switch together with its IP/Ipsofacto layers appears
as a network router to its adjacent switches/hosts.
5. Protocol Operation: Mapping PIM Dense Mode [PIM-DM] flows in Ipsofacto
When there exists no forwarding cache entry at a switch controller for
a multicast flow, the first data packet for that flow will install a
forwarding cache for the flow at the controller, as specified by the
protocol operation for Protocol-Independent-Multicast(Dense Mode).
The VC# and the port number (selected by the upstream switch
controller) on which the data packet is received, is available to
Ipsofacto. Additionally, for each outgoing interface in the newly
created multicast forward cache, Ipsofacto selects an unused VC to
forward the packet to the downstream switch controller. At this time,
it adds an entry in the flow-table, mapping the flow-id <source IP
address, destination IP address, TTL> to a switched path {<input port,
input VC>, list of <output port, output VC>}, and adds entries in the
hardware VC routing tables corresponding to {<input port, input VC>,
list of <output port, output VC>}. Subsequent packets in the flow are
not processed by the controller, and are switched at the cell level
making use of the hardware multicast capability of the ATM switching
fabric.
In essence, the IP multicast routing protocol is used to establish the
multicast forwarding state at the switch controller,while Ipsofacto
maps this state to a point-to-multipoint VC within the switching
fabric.
In PIM-DM, the forwarding state for a flow is associated with an
expiration timer. This timer is restarted whenever a data packet is
being forwarded. However, in Ipsofacto, packets subsequent to the
first are not forwarded through the switch controller. Therefore, the
rule for handling a timer expiration is as follows: when the timer
expires, the controller checks the corresponding switched path for any
cell forwarding activity since the last expiration. If cells have been
Acharya, Dighe, Ansari Expires: January 1998 [Page 5]
forwarded in the interim period, the timer is restarted. Else, both
the forwarding state and the switched path are deleted.
The list of outgoing interfaces associated with a forwarding cache
entry, may be modified by arrival of Prune and Graft messages. The
corresponding switched path is modified as follows: for a Prune
message, the <output port, output VC> for the interface on which the
Prune is received, is deleted from the VC tables, i.e. the
corresponding branch of the point-to-multipoint VC is deleted. If
after deletion of the branch, no more outgoing branches remain
(i.e. the forwarding state is now a negative cache entry), then the
switched path is deleted, and the the incoming VC is marked as unused,
i.e. it points to the switch controller. When a Graft message for a
group G is received, PIM-DM will add the received interface to the
outgoing interface list for all (S,G) forwarding entries. Ipsofacto
complements this action, by picking an unused VC and adding a branch
<output port, output VC> to the corresponding switched path, for each
of the (S,G) entries modified by the Graft message. If the (S,G)
entry is a negative cache entry, then no switched path will exists for
the (S,G) entry and Ipsofacto will not take any action; a new switched
path will be created when with the arrival of the first packet.
Note that Ipsofacto does not change PIM protocol actions associated
with PIM control messages; Ipsofacto only determines how the resulting
multicast forwarding state needs to be mapped to a switched path.
Ipsofacto supports Distance-vector multicast routing protocol (DVMRP)
[DVMRP] in a similar fashion.
6. Mapping PIM Sparse Mode [PIM-SM] operation under Ipsofacto
PIM-SM creates a shared forwarding tree rooted at a Rendezvous Point
(RP) with receivers at the leaves. It allows for individual receivers
to bypass the shared tree and instead receive data packets on a
source-specific tree. Unlike PIM-DM, forwarding entries at
intermediate routers are created by sending explicit Join messages
towards the RP (shared tree) or the source (source specific tree),
from last-hop routers.
Ipsofacto maps the shared forwarding entry on the RP-tree to
per-source switched paths at intermediate switches. This is a slight
departure from traditional packet-level routers which maintain a
common (*,G) packet-level multicast forwarding state: under Ipsofacto,
the forwarding state at the switch processor is shared by all (*,G)
flows, but cell-level switched paths are kept separate for each (S,G)
flow. The reason for separating the switched paths is that PIM-SM uses
the shared tree to reach all receivers by default, while
simultaneously using part of the shared tree to reach a subset of the
receivers for specific senders. Therefore, an intermediate node on the
tree may contain forwarding entries of the form (S,G) (with RPT-bit
set) and (*,G) : though the incoming interface for both entries may be
the same, their outgoing interfaces will differ. The decision whether
Acharya, Dighe, Ansari Expires: January 1998 [Page 6]
to use a (S,G) entry or (*,G) entry is taken on a per-packet basis,
using the source address of the packet. But, such a decision cannot be
made when forwarding data (cells) in a switched path, since the data
packet is not forwarded through the switch processor . Hence, under
Ipsofacto, instead of using a common point-to-multipoint switched
path, a separate switched path is used for each multicast flow.
Under Ipsofacto, the first data packet for a multicast flow is handled
similarly for both PIM-DM and PIM-SM. The outgoing interfaces, on
which to forward the packet further, is selected from the multicast
forwarding entry, and a switched path is added to the VC tables. A
corresponding entry (<input port, input VC>, list of <output port,
output VC> ) is added to the flow-table. Unlike PIM-DM, where each
multicast forwarding entry corresponds to a single entry in the flow
table, each multicast forwarding entry (e.g. (*,G)) in PIM-SM may be
associated with multiple flows (switched paths) and therefore,
multiple entries in the flow-table. This one-to-many association
between multicast forwarding entries and switched paths is explicitly
recorded in the flow-table. When a Prune or a Join message affects a
multicast forwarding entry, the associated entries in the flow-table
will be modified accordingly, e.g. if an outgoing interface is pruned,
then for each switched path associated with that forwarding entry, the
corresponding <outgoing port, VC> will be deleted from the switched
path. Analogously, for a Join, an unused VC will be selected on the
outgoing port (interface) and added to the switched paths associated
with the affected forwarding entry.
There are two special interactions that need to be considered for
PIM-SM. The first occurs when an intermediate router is in the midst
of switching from the shared tree to a source specific tree for a
particular (S,G) flow. When the first data packet arrives on the
source-specific tree, PIM-SM triggers a Prune message to be sent on
the shared tree. Under Ipsofacto, this implies that the existing
flow-specific switched path associated with the shared tree will no
longer be used: the switched path (and the flow table entry) may
directly be reclaimed when the Prune message is sent, or allowed to
time out. Note that the arrival of the data packet on the
source-specific tree will lead to a new switched path being setup.
The second interaction occurs at the Rendezvous Point (RP). The RP may
receive data packets from a sender either encapsulated as unicast
(Register) packets or as native multicast (which typically happens
when the RP has joined the source-specific tree). In the former case,
the RP cannot created switched paths for specific flows: it must
decapsulate the packet first. Further, the flow table entry will now
contain a list of <outgoing port, VC> pairs; there is no incoming
port,VC. For packets belonging to the same flow, the RP must use the
same VC on a outgoing port for successive packets. This VC is recorded
in the flow table. In the latter case, i.e. when the RP receives a
native multicast packets, it creates a switched path as mentioned
earlier.
Acharya, Dighe, Ansari Expires: January 1998 [Page 7]
7. Switching unicast flows
Mapping the first data packet of a unicast flow to a switched path is
similar to that for a multicast flow. IP routing determines the
outgoing port, Ipsofacto selects an unused VC on that port and adds a
switched path {<input port, input VC>, <output port, output VC>}.
Unlike the case for multicast, where PIM control messages are
implicitly used to refresh the switched path, switched paths for
unicast flows require a separate refresh protocol.
The downstream endpoint of a switched path, periodically monitors
traffic on the <input port, VC>, checks if the received packet header
matches the expected header, and if so, sends a REFRESH message to the
upstream node. Intermediate nodes need only forward the REFRESH
message upstream; it is not necessary to locally monitor traffic
activity. When the downstream endpoint of a switched path decides not
to send a REFRESH message upstream, it may optionally send a RECLAIM
instead to speed up the process of path teardown.
Other alternatives to refresh the switched paths are also possible,
such as using IFMP or FANP for refreshing the switched unicast paths.
7.1 Optimizations for TCP flows
For TCP flows, data transfer is preceded by a three-way handshake.
Under Ipsofacto, the switched path is setup when the first packet
(SYN) is forwarded; thus, an end-to-end switched path is available
prior to data transfer. The teardown of the switched path (i.e marking
the switched path VC as unused at each hop) can be hastened by sending
the FIN and the ack to the FIN packets through the switch controller
instead of the switched path, i.e these packets are treated as
"control" packets. The switched path can be reclaimed at a node after
the FIN from each endpoint, and the corresponding acks have been
forwarded through the controller. This optimization works only at
nodes where the forwarding path for the TCP flow is symmetric,
i.e. the incoming port for one direction of the flow is same as the
outgoing port for the reverse direction, and vice-versa.
7.2 FLIRT (Fixed Length Ip Routing Tag)
The first packet of a flow requires an IP routing table lookup at each
hop within the Ipsofacto cloud. This longest-prefix match can be
replaced by an exact match on fixed number of bits by attaching a
fixed-length tag with each packet. The tag-switching architecture
[TAG] uses a tag distribution protocol [TDP] to distribute a
consistent set of tags. However, when using ATM switches as
Tag-switch-routers (TSR), the tag also defines the VC on which the
packet is forwarded under the Tag Switching architecture.
Under Ipsofacto, the VC selected for forwarding a packet is decoupled
from the tag: the VC selection is implicitly by usage, as explained
earlier. Regardless of the VC selected on the outgoing link, the
upstream switch may optionally insert a FLIRT before the IP packet
Acharya, Dighe, Ansari Expires: January 1998 [Page 8]
within a AAL5 frame. (Absence of FLIRT is represented by zero-ing out
the bits of the fixed length field). The FLIRT on an incoming packet
is then used to decide the outgoing FLIRT and the outgoing port
without doing a IP table lookup. Before forwarding the packet, the
FLIRT is replaced with the new value.
If the FLIRT is absent (as may be the case when the first packet is
lost), normal IP route lookup is performed.
In future, the FLIRT may be extended to hold additional fields,
e.g. id of the ingress point to the Ipsofacto cloud, flow type (host
pair, port pair, IP-in-IP), QoS parameters.
7.3 Optimizing Mobile-IP flows
In scenarios where a switch processor acts as the home agent for a
mobile host[Mobile-IP], it may optionally speed up the process of
tearing down a switched path (leading to the previous location of the
mobile host). For flows initiated from a correspondent host, the
packet is addressed to the mobile host's home address, which is then
intercepted by the home agent when the mobile host is not at home.
The home agent then forwards the packet after encapsulating with the
mobile host's current foreign address. Under Ipsofacto, this leads to
two switched paths, one from the correspondent host to the home agent
and the second, from the home agent to the mobile's current location.
The second switched path is setup by using the outer
source/destination address of the encapsulated packet as the flow-id
(i.e there are no transport port numbers), and in effect, aggregates
all flows to the mobile into a single switched path.
When the mobile host changes its foreign address, it must send a
Registration Notification to its home agent; the home agent replies
with Registration Reply to the mobile host's foreign address. If the
registration is accepted, then the switched path leading to the mobile
host's previous foreign address is no longer useful. In this
situation, Ipsofacto may optionally send RECLAIM messages to the
downstream nodes of the existing switched paths leading to the mobile
host's previous location. The new switched path is automatically setup
when the first packet addressed to the mobile host's new foreign
address is forwarded.
For each incoming flow, in general, it is not possible to bridge to
the incoming switched paths and outgoing (aggregated) switched path,
since the home agent must encapsulate each packet with the mobile's
foreign address. Specific optimizations are presently under study.
7.4 Aggregating multiple unicast flows into a single switched path
As the previous section points out, it is possible to use IP-in-IP
mechanism to aggregate multiple flows with a common pair of entry and
exit points into the Ipsofacto cloud. This requires support from the
routing protocol operating in the Ipsofacto cloud, for the entry point
Acharya, Dighe, Ansari Expires: January 1998 [Page 9]
to learn the exit point for a given flow; all flows with a common exit
point can then be aggregated using IP-in-IP encapsulation.
It is also possible to use VP switching within the Ipsofacto cloud,
instead of using IP-in-IP encapsulation. In this case, the entry
router would assign a different VC# for a new flow, but assign a VP#
already in-use for flows that share a common exit point. The VPI field
is used to switch flows with a common entry and exit routers, within
the cloud, while the VCI field is used to locally demultiplex
individual flows at the exit router. This would require the exit
router to "learn" and cache the flow-to-VC mapping: when a new flow is
received at the exit router for which it has no flow-to-VC binding, it
installs such a binding from the IP header and the incoming VC. For
each VC that is bound to a flow, it must then periodically reassemble
cells from that VC to a packet and refresh/replace the corresponding
flow-to-VC binding. Alternatively, a specific VC may be reserved
within each VP for the entry point to periodically update/refresh the
exit point of current flow-to-VC bindings.
7.5 Merging encapsulated flows: multipoint-to-point aggregation
The previous sub-section briefly outlined how multiple flows with
common entry and exit points may be aggregated to a single flow using
IP-in-IP encapsulation. Multiple such flows, each from a different
entry point, but with a common exit point out of the Ipsofacto cloud,
may also be merged in the following way: at a switch N, which has an
existing switched path for an IP-in-IP flow F to exit point B, may
select the same outgoing VC as F for a new flow F1 to the same exit
point B. First, this requires VC-merge capability at intermediate
switches to avoid cell-interleaving. Second, when the REFRESH message
from B is forwarded on the reverse path (as that of the switched
path), a hop-count needs to be included in the message, which is
incremented after each hop. This enables B to decide if the remaining
TTL value on the new incoming flow is no less than the hop-count on
the REFRESH message. If so, the incoming flow may be merged into the
existing flow. Third, at each merge point, such as N, traffic activity
on each incoming branch needs to be monitored periodically. When a
REFRESH message is received from the downstream node, N forwards it
along each incoming branch after incrementing the hop count if there
was traffic activity on that branch within the last k periods.
7.6 Routing table changes/ Loop detection and/or avoidance
Solutions for efficiently handling changes in IP routing tables
require further study. One approach is to leave an existing switched
path untouched in spite of a change in the corresponding IP route, if
intermediate switch controllers on the path continue to receive
REFRESH messages from downstream. Alternatively, when a routing table
entry is updated, all affected switched paths may be forced to go
through IP forwarding by marking the incoming and outgoing VC(s) of
the path as unused.
Acharya, Dighe, Ansari Expires: January 1998 [Page 10]
8. Conclusion
This draft presented a scheme for mapping IP flows to ATM switches,
with special emphasis on IP multicast. Mechanisms for mapping unicast
flows, refreshing unicast switched paths, handling flows leading to
mobile hosts and fixed length tags to speed up routing were outlined.
9. Security Considerations
Security considerations are not addressed in this document.
10. Intellectual Property Considerations
NEC may seek patent or other intellectual property protection for some
aspects discussed in this document.
11. Acknowledgments
The authors would like to acknowledge the following people for
discussions on the contents and/or inputs to this draft: Dipankar
Raychaudhuri, Kojiro Watanabe, Bala Rajagopalan, Kazuhiko Isoyama,
Toshiya Aramaki, Ajay Bakre, Atsushi Iwata and Hiroshi Suzuki. The
authors thank Hideyuki Sakaguchi, Joe Darabpour, Bun Mizuhara, and
Youichi Ohteru for supplying us with switch software for prototyping
Ipsofacto.
12. References
[DVMRP] T. Pusateri, "Distance Vector Multicast Routing Protocol",
Internet Draft <draft-ietf-idmr-dvmrp-v3-04>, Juniper Networks,
February 1997
[TAG] Y. Rekhter, B. Davie, D. Katz, E.Rosen, G. Swallow, "Cisco
Systems' Tag Swicthing Architecture Overview", RFC 2105, Cisco
Systems, Inc., February 1997
[TDP] P. Doolan, B. Davie, D. Katz, Y. Rekhter, E. Rosen, "Tag
Distribution Protocol", <draft-doolan-tdp-spec-01.txt>, Cisco
Systems,Inc., May 1997
[FANP] K. Nagami, Y. Katsube, Y. Shobatake, A. Mogi, S. Matsuzawa,
T. Jinmei, H. Esaki, "Toshiba's Flow Attribute Notification Protocol
(FANP) Specification", RFC 2129, Toshiba R&D Center, April 1997
[CSR] Y. Katsube, K. Nagami, H. Esaki, "Toshiba's Router Architecture
Extensions for ATM : Overview" , RFC 2098, Toshiba R&D Center,
February 1997
[ARIS] Arun Viswanathan, Nancy Feldman, Rick Boivie, Rich Woundy,
"ARIS: Aggregate Route-Based IP Switching", Internet-Draft,
<draft-viswanathan-aris-overview-00.txt>, IBM Corp., March 1997
Acharya, Dighe, Ansari Expires: January 1998 [Page 11]
[IFMP] P. Newman, B. Edwards, R. Hinden, E. Hoffman, F. Ching Liaw,
T. Lyon, G. Minshall, "Ipsilon Flow Management Protocol Specification
of IPv4 Version 1.0", RFC 1953, Ipsilon,Sprint, May 1996
[Ipsilon] P.Newman, G. Minshall and T. Lyon, "IP switching: ATM Under
IP", Submitted to IEEE/ACM Transactions on Networking
[PIM-SM] D.Estrin et al. "Protocol Independent Multicast-Sparse Mode
(PIM-SM): Protocol Specification", RFC 2117
[PIM-DM] Steven Deering et. al. "Protocol Independent Multicast
version2, Dense Mode Specification", <draft-ietf-idmr-pim-dm-05.txt>,
IETF Draft, May 1997
[MPOA] ATM Forum, "Multiprotocol Over ATM version 1.0 (Baseline Text
Version 16)", Andre N. Fredette, Editor.
[IPIP] C. Perkins, "IP Encapsulation within IP", RFC 2003, October
1996
[Mobile-IP] C. Perkins, Editor, "IP Mobility Support", RFC 2002,
October 1996
13. Authors' Addresses
Arup Acharya
C&C Research Labs, NEC USA
4 Independence Way, Princeton
NJ 08540, USA
Phone: +1 609 951 2992
Email: arup@ccrl.nj.nec.com
Rajiv Dighe
C&C Research Labs, NEC USA
4 Independence Way, Princeton
NJ 08540, USA
Phone: +1 609 951 2982
Email: rsd@ccrl.nj.nec.com
Furquan Ansari
C&C Research Labs, NEC USA
4 Independence Way, Princeton
NJ 08540, USA
Phone: +1 609 951 2965
Email: furquan@ccrl.nj.nec.com
| PAFTECH AB 2003-2026 | 2026-04-23 01:08:02 |