home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Three, Issue Thirty-Four, File #8 of 11
-
- A TCP/IP Tutorial : Behind The Internet
- Part Two of Two
-
- October 4th, 1991
-
- Presented by The Not
-
- 5. Internet Protocol
-
- The IP module is central to internet technology and the essence of IP
- is its route table. IP uses this in-memory table to make all
- decisions about routing an IP packet. The content of the route table
- is defined by the network administrator. Mistakes block
- communication.
-
- To understand how a route table is used is to understand
- internetworking. This understanding is necessary for the successful
- administration and maintenance of an IP network.
-
- The route table is best understood by first having an overview of
- routing, then learing about IP network addresses, and then looking
- at the details.
-
- 5.1 Direct Routing
-
- The figure below is of a tiny internet with 3 computers: A, B, and C.
- Each computer has the same TCP/IP protocol stack as in Figure 1.
- Each computer's Ethernet interface has its own Ethernet address.
- Each computer has an IP address assigned to the IP interface by the
- network manager, who also has assigned an IP network number to the
- Ethernet.
-
- A B C
- | | |
- --o------o------o--
- Ethernet 1
- IP network "development"
-
- Figure 6. One IP Network
-
- When A sends an IP packet to B, the IP header contains A's IP address
- as the source IP address, and the Ethernet header contains A's
- Ethernet address as the source Ethernet address. Also, the IP header
- contains B's IP address as the destination IP address and the
- Ethernet header contains B's Ethernet address as the des
- ----------------------------------------
- |address source destination|
- ----------------------------------------
- |IP header A B |
- |Ethernet header A B |
- ----------------------------------------
- TABLE 5. Addresses in an Ethernet frame for an IP packet
- from A to B
-
- For this simple case, IP is overhead because the IP adds little to
- the service offered by Ethernet. However, IP does add cost: the
- extra CPU processing and network bandwidth to generate, transmit, and
- parse the IP header.
-
- When B's IP module receives the IP packet from A, it checks the
- destination IP address against its own, looking for a match, then it
- passes the datagram to the upper-level protocol.
-
- This communication between A and B uses direct routing.
-
- 5.2 Indirect Routing
-
- The figure below is a more realistic view of an internet. It is
- composed of 3 Ethernets and 3 IP networks connected by an IP-router
- called computer D. Each IP network has 4 computers; each computer
- has its own IP address and Ethernet address.
-
- A B C ----D---- E F G
- | | | | | | | | |
- --o------o------o------o- | -o------o------o------o--
- Ethernet 1 | Ethernet 2
- IP network "development" | IP network "accounting"
- |
- |
- | H I J
- | | | |
- --o-----o------o------o--
- Ethernet 3
- IP network "factory"
-
- Figure 7. Three IP Networks; One internet
-
- Except for computer D, each computer has a TCP/IP protocol stack like
- that in Figure 1. Computer D is the IP-router; it is connected to
- all 3 networks and therefore has 3 IP addresses and 3 Ethernet
- addresses. Computer D has a TCP/IP protocol stack similar to that in
- Figure 3, except that it has 3 ARP modules and 3 Ethernet drivers
- instead of 2. Please note that computer D has only one IP module.
-
- The network manager has assigned a unique number, called an IP
- network number, to each of the Ethernets. The IP network numbers are
- not shown in this diagram, just the network names.
-
- When computer A sends an IP packet to computer B, the process is
- identical to the single network example above. Any communication
- between computers located on a single IP network matches the direct
- routing example discussed previously.
-
- When computer D and A communicate, it is direct communication. When
- computer D and E communicate, it is direct communication. When
- computer D and H communicate, it is direct communication. This is
- because each of these pairs of computers is on the same IP network.
-
- However, when computer A communicates with a computer on the far side
- of the IP-router, communication is no longer direct. A must use D to
- forward the IP packet to the next IP network. This communication is
- called "indirect".
-
- This routing of IP packets is done by IP modules and happens
- transparently to TCP, UDP, and the network applications.
-
- If A sends an IP packet to E, the source IP address and the source
- Ethernet address are A's. The destination IP address is E's, but
- because A's IP module sends the IP packet to D for forwarding, the
- destination Ethernet address is D's.
-
- ----------------------------------------
- |address source destination|
- ----------------------------------------
- |IP header A E |
- |Ethernet header A D |
- ----------------------------------------
- TABLE 6. Addresses in an Ethernet frame for an IP packet
- from A to E (before D)
-
- D's IP module receives the IP packet and upon examining the
- destination IP address, says "This is not my IP address," and sends
- the IP packet directly to E.
-
- ----------------------------------------
- |address source destination|
- ----------------------------------------
- |IP header A E |
- |Ethernet header D E |
- ----------------------------------------
- TABLE 7. Addresses in an Ethernet frame for an IP packet
- from A to E (after D)
-
- In summary, for direct communication, both the source IP address and
- the source Ethernet address is the sender's, and the destination IP
- address and the destination Ethernet addrss is the recipient's. For
- indirect communication, the IP address and Ethernet addresses do not
- pair up in this way.
-
- This example internet is a very simple one. Real networks are often
- complicated by many factors, resulting in multiple IP-routers and
- several types of physical networks. This example internet might have
- come about because the network manager wanted to split a large
- Ethernet in order to localize Ethernet broadcast traffic.
-
- 5.3 IP Module Routing Rules
-
- This overview of routing has shown what happens, but not how it
- happens. Now let's examine the rules, or algorithm, used by the IP
- module.
-
- For an outgoing IP packet, entering IP from an upper layer, IP must
- decide whether to send the IP packet directly or indirectly, and IP
- must choose a lower network interface. These choices are made by
- consulting the route table.
-
- For an incoming IP packet, entering IP from a lower interface, IP
- must decide whether to forward the IP packet or pass it to an upper
- layer. If the IP packet is being forwarded, it is treated as an
- outgoing IP packet.
-
- When an incoming IP packet arrives it is never forwarded back out
- through the same network interface.
-
- These decisions are made before the IP packet is handed to the lower
- interface and before the ARP table is consulted.
-
- 5.4 IP Address
-
- The network manager assigns IP addresses to computers according to
- the IP network to which the computer is attached. One part of a 4-
- byte IP address is the IP network number, the other part is the IP
- computer number (or host number). For the computer in table 1, with
- an IP address of 223.1.2.1, the network number is 223.1.2 and the
- host number is number 1.
-
- The portion of the address that is used for network number and for
- host number is defined by the upper bits in the 4-byte address. All
- example IP addresses in this tutorial are of type class C, meaning
- that the upper 3 bits indicate that 21 bits are the network number
- and 8 bits are the host number. This allows 2,097,152 class C
- networks up to 254 hosts on each network.
-
- The IP address space is administered by the NIC (Network Information
- Center). All internets that are connected to the single world-wide
- Internet must use network numbers assigned by the NIC. If you are
- setting up your own internet and you are not intending to connect it
- to the Internet, you should still obtain your network numbers from
- the NIC. If you pick your own number, you run the risk of confusion
- and chaos in the eventuality that your internet is connected to
- another internet.
-
- 5.5 Names
-
- People refer to computers by names, not numbers. A computer called
- alpha might have the IP address of 223.1.2.1. For small networks,
- this name-to-address translation data is often kept on each computer
- in the "hosts" file. For larger networks, this translation data file
- is stored on a server and accessed across the network when needed. A
- few lines from that file might look like this:
-
- 223.1.2.1 alpha
- 223.1.2.2 beta
- 223.1.2.3 gamma
- 223.1.2.4 delta
- 223.1.3.2 epsilon
- 223.1.4.2 iota
-
- The IP address is the first column and the computer name is the
- second column.
-
- In most cases, you can install identical "hosts" files on all
- computers. You may notice that "delta" has only one entry in this
- file even though it has 3 IP addresses. Delta can be reached with
- any of its IP addresses; it does not matter which one is used. When
- delta receives an IP packet and looks at the destination address, it
- will recognize any of its own IP addresses.
-
- IP networks are also given names. If you have 3 IP networks, your
- "networks" file for documenting these names might look something like
- this:
-
- 223.1.2 development
- 223.1.3 accounting
- 223.1.4 factory
-
- The IP network number is in the first column and its name is in the
- second column.
-
- From this example you can see that alpha is computer number 1 on the
- development network, beta is computer number 2 on the development
- network and so on. You might also say that alpha is development.1,
- Beta is development.2, and so on.
-
- The above hosts file is adequate for the users, but the network
- manager will probably replace the line for delta with:
-
- 223.1.2.4 devnetrouter delta
- 223.1.3.1 facnetrouter
- 223.1.4.1 accnetrouter
-
- These three new lines for the hosts file give each of delta's IP
- addresses a meaningful name. In fact, the first IP address listed
- has 2 names; "delta" and "devnetrouter" are synonyms. In practice
- "delta" is the general-purpose name of the computer and the other 3
- names are only used when administering the IP route table.
-
- These files are used by network administration commands and network
- applications to provide meaningful names. They are not required for
- operation of an internet, but they do make it easier for us.
-
- 5.6 IP Route Table
-
- How does IP know which lower network interface to use when sending
- out a IP packet? IP looks it up in the route table using a search
- key of the IP network number extracted from the IP destination
- address.
-
- The route table contains one row for each route. The primary columns
- in the route table are: IP network number, direct/indirect flag,
- router IP address, and interface number. This table is referred to
- by IP for each outgoing IP packet.
-
- On most computers the route table can be modified with the "route"
- command. The content of the route table is defined by the network
- manager, because the network manager assigns the IP addresses to the
- computers.
-
- 5.7 Direct Routing Details
-
- To explain how it is used, let us visit in detail the routing
- situations we have reviewed previously.
-
- --------- ---------
- | alpha | | beta |
- | 1 | | 1 |
- --------- ---------
- | |
- --------o---------------o-
- Ethernet 1
- IP network "development"
-
- Figure 8. Close-up View of One IP Network
-
- The route table inside alpha looks like this:
-
- --------------------------------------------------------------
- |network direct/indirect flag router interface number|
- --------------------------------------------------------------
- |development direct <blank> 1 |
- --------------------------------------------------------------
- TABLE 8. Example Simple Route Table
-
- This view can be seen on some UNIX systems with the "netstat -r"
- command. With this simple network, all computers have identical
- routing tables.
-
- For discussion, the table is printed again without the network number
- translated to its network name.
-
- --------------------------------------------------------------
- |network direct/indirect flag router interface number|
- --------------------------------------------------------------
- |223.1.2 direct <blank> 1 |
- --------------------------------------------------------------
- TABLE 9. Example Simple Route Table with Numbers
-
- 5.8 Direct Scenario
-
- Alpha is sending an IP packet to beta. The IP packet is in alpha's
- IP module and the destination IP address is beta or 223.1.2.2. IP
- extracts the network portion of this IP address and scans the first
- column of the table looking for a match. With this network a match
- is found on the first entry.
-
- The other information in this entry indicates that computers on this
- network can be reached directly through interface number 1. An ARP
- table translation is done on beta's IP address then the Ethernet
- frame is sent directly to beta via interface number 1.
-
- If an application tries to send data to an IP address that is not on
- the development network, IP will be unable to find a match in the
- route table. IP then discards the IP packet. Some computers provide
- a "Network not reachable" error message.
-
- 5.9 Indirect Routing Details
-
- Now, let's take a closer look at the more complicated routing
- scenario that we examined previously.
-
- --------- --------- ---------
- | alpha | | delta | |epsilon|
- | 1 | |1 2 3| | 1 |
- --------- --------- ---------
- | | | | |
- --------o---------------o- | -o----------------o--------
- Ethernet 1 | Ethernet 2
- IP network "Development" | IP network "accounting"
- |
- | --------
- | | iota |
- | | 1 |
- | --------
- | |
- --o--------o--------
- Ethernet 3
- IP network "factory"
-
- Figure 9. Close-up View of Three IP Networks
-
- The route table inside alpha looks like this:
-
- ---------------------------------------------------------------------
- |network direct/indirect flag router interface number|
- ---------------------------------------------------------------------
- |development direct <blank> 1 |
- |accounting indirect devnetrouter 1 |
- |factory indirect devnetrouter 1 |
- --------------------------------------------------------------------
- TABLE 10. Alpha Route Table
-
- For discussion the table is printed again using numbers instead of
- names.
-
- --------------------------------------------------------------------
- |network direct/indirect flag router interface number|
- --------------------------------------------------------------------
- |223.1.2 direct <blank> 1 |
- |223.1.3 indirect 223.1.2.4 1 |
- |223.1.4 indirect 223.1.2.4 1 |
- --------------------------------------------------------------------
- TABLE 11. Alpha Route Table with Numbers
-
- The router in Alpha's route table is the IP address of delta's
- connection to the development network.
-
- 5.10 Indirect Scenario
-
- Alpha is sending an IP packet to epsilon. The IP packet is in
- alpha's IP module and the destination IP address is epsilon
- (223.1.3.2). IP extracts th network portion of this IP address
- (223.1.3) and scans the first column of the table looking for a
- match. A match is found on the second entry.
-
- This entry indicates that computers on the 223.1.3 network can be
- reached through the IP-router devnetrouter. Alpha's IP module then
- does an ARP table translation for devnetrouter's IP address and sends
- the IP packet directly to devnetrouter through Alpha's interface
- number 1. The IP packet still contains the destination address of
- epsilon.
-
- The IP packet arrives at delta's development network interface and is
- passed up to delta's IP module. The destination IP address is
- examined and because it does not match any of delta's own IP
- addresses, delta decides to forward the IP packet.
-
- Delta's IP module extracts the network portion of the destination IP
- address (223.1.3) and scans its route table for a matching network
- field. Delta's route table looks like this:
-
- ----------------------------------------------------------------------
- |network direct/indirect flag router interface number|
- ----------------------------------------------------------------------
- |development direct <blank> 1 |
- |factory direct <blank> 3 |
- |accounting direct <blank> 2 |
- ----------------------------------------------------------------------
- TABLE 12. Delta's Route Table
-
- Below is delta's table printed again, without the translation to
- names.
-
- ----------------------------------------------------------------------
- |network direct/indirect flag router interface number|
- ----------------------------------------------------------------------
- |223.1.2 direct <blank> 1 |
- |223.1.3 direct <blank> 3 |
- |223.1.4 direct <blank> 2 |
- ----------------------------------------------------------------------
- TABLE 13. Delta's Route Table with Numbers
-
- The match is found on the second entry. IP then sends the IP packet
- directly to epsilon through interface number 3. The IP packet
- contains the IP destination address of epsilon and the Ethernet
- destination address of epsilon.
-
- The IP packet arrives at epsilon and is passed up to epsilon's IP
- module. The destination IP address is examined and found to match
- with epsilon's IP address, so the IP packet is passed to the upper
- protocol layer.
-
- 5.11 Routing Summary
-
- When a IP packet travels through a large internet it may go through
- many IP-routers before it reaches its destination. The path it takes
- is not determined by a central source but is a result of consulting
- each of the routing tables used in the journey. Each computer
- defines only the next hop in the journey and relies on that computer
- to send the IP packet on its way.
-
- 5.12 Managing the Routes
-
- Maintaining correct routing tables on all computers in a large
- internet is a difficult task; network configuration is being modified
- constantly by the network managers to meet changing needs. Mistakes
- in routing tables can block communication in ways that are
- excruciatingly tedious to diagnose.
-
- Keeping a simple network configuration goes a long way towards making
- a reliable internet. For instance, the most straightforward method
- of assigning IP networks to Ethernet is to assign a single IP network
- number to each Ethernet.
-
- Help is also available from certain protocols and network
- applications. ICMP (Internet Control Message Protocol) can report
- some routing problems. For small networks the route table is filled
- manually on each computer by the network administrator. For larger
- networks the network administrator automates this manual operation
- with a routing protocol to distribute routes throughout a network.
-
- When a computer is moved from one IP network to another, its IP
- address must change. When a computer is removed from an IP network
- its old address becomes invalid. These changes require frequent
- updates to the "hosts" file. This flat file can become difficult to
- maintain for even medium-size networks. The Domain Name System helps
- solve these problems.
-
- 6. User Datagram Protocol
-
- UDP is one of the two main protocols to reside on top of IP. It
- offers service to the user's network applications. Example network
- applications that use UDP are: Network File System (NFS) and Simple
- Network Management Protocol (SNMP). The service is little more than
- an interface to IP.
-
- UDP is a connectionless datagram delivery service that does not
- guarantee delivery. UDP does not maintain an end-to-end connection
- with the remote UDP module; it merely pushes the datagram out on the
- net and accepts incoming datagrams off the net.
-
- UDP adds two values to what is provided by IP. One is the
- multiplexing of information between applications based on port
- number. The other is a checksum to check the integrity of the data.
-
- 6.1 Ports
-
- How does a client on one computer reach the server on another?
-
- The path of communication between an application and UDP is through
- UDP ports. These ports are numbered, beginning with zero. An
- application that is offering service (the server) waits for messages
- to come in on a specific port dedicated to that service. The server
- waits patiently for any client to request service.
-
- For instance, the SNMP server, called an SNMP agent, always waits on
- port 161. There can be only one SNMP agent per computer because
- there is only one UDP port number 161. This port number is well
- known; it is a fixed number, an internet assigned number. If an SNMP
- client wants service, it sends its request to port number 161 of UDP
- on the destination computer.
-
- When an application sends data out through UDP it arrives at the far
- end as a single unit. For example, if an application does 5 writes
- to the UDP port, the application at the far end will do 5 reads from
- the UDP port. Also, the size of each write matches the size of each
- read.
-
- UDP preserves the message boundary defined by the application. It
- never joins two application messages together, or divides a single
- application message into parts.
-
- 6.2 Checksum
-
- An incoming IP packet with an IP header type field indicating "UDP"
- is passed up to the UDP module by IP. When the UDP module receives
- the UDP datagram from IP it examines the UDP checksum. If the
- checksum is zero, it means that checksum was not calculated by the
- sender and can be ignored. Thus the sending computer's UDP module
- may or may not generate checksums. If Ethernet is the only network
- between the 2 UDP modules communicating, then you may not need
- checksumming. However, it is recommended that checksum generation
- always be enabled because at some point in the future a route table
- change may send the data across less reliable media.
-
- If the checksum is valid (or zero), the destination port number is
- examined and if an application is bound to that port, an application
- message is queued for the application to read. Otherwise the UDP
- datagram is discarded. If the incoming UDP datagrams arrive faster
- than the application can read them and if the queue fills to a
- maximum value, UDP datagrams are discarded by UDP. UDP will continue
- to discard UDP datagrams until there is space in the queue.
-
- 7. Transmission Control Protocol
-
- TCP provides a different service than UDP. TCP offers a connection-
- oriented byte stream, instead of a connectionless datagram delivery
- service. TCP guarantees delivery, whereas UDP does not.
-
- TCP is used by network applications that require guaranteed delivery
- and cannot be bothered with doing time-outs and retransmissions. The
- two most typical network applications that use TCP are File Transfer
- Protocol (FTP) and the TELNET. Other popular TCP network
- applications include X-Window System, rcp (remote copy), and the r-
- series commands. TCP's greater capability is not without cost: it
- requires more CPU and network bandwidth. The internals of the TCP
- module are much more complicated than those in a UDP module.
-
- Similar to UDP, network applications connect to TCP ports. Well-
- defined port numbers are dedicated to specific applications. For
- instance, the TELNET server uses port number 23. The TELNET client
- can find the server simply by connecting to port 23 of TCP on the
- specified computer.
-
- When the application first starts using TCP, the TCP module on the
- client's computer and the TCP module on the server's computer start
- communicating with each other. These two end-point TCP modules
- contain state information that defines a virtual circuit. This
- virtual circuit consumes resources in both TCP end-points. The
- virtual circuit is full duplex; data can go in both directions
- simultaneously. The application writes data to the TCP port, the
- data traverses the network and is read by the application at the far
- end.
-
- As with all sliding window protocols, the protocol has a window size.
- The window size determines the amount of data that can be transmitted
- before an acknowledgement is required. For TCP, this amount is not a
- number of TCP segments but a number of bytes.
-
- 8. Network Appliations
-
- Why do both TCP and UDP exist, instead of just one or the other?
-
- They supply different services. Most applications are implemented to
- use only one or the other. You, the programmer, choose the protocol
- that best meets your needs. If you need a reliable stream delivery
- service, TCP might be best. If you need a datagram service, UDP
- might be best. If you need efficiency over long-haul circuits, TCP
- might be best. If you need efficiency over fast networks with short
- latency, UDP might be best. If your needs do not fall nicely into
- these categories, then the "best" choice is unclear. However,
- applications can make up for deficiencies in the choice. For
- instance if you choose UDP and you need reliability, then the
- application must provide reliability. If you choose TCP and you need
- a record oriented service, then the application must insert markers
- in the byte stream to delimit records.
-
- What network aplications are available?
-
- There are far too many to list. The number is growing continually.
- Some of the applications have existed since the beginning of internet
- technology: TELNET and FTP. Others are relatively new: X-Windows and
- SNMP. The following is a brief description of the applications
- mentioned in this tutorial.
-
- 8.1 TELNET
-
- TELNET provides a remote login capability on TCP. The operation and
- appearance is similar to keyboard dialing through a telephone switch.
- On the command line the user types "telnet delta" and receives a
- login prompt from the computer called "delta".
-
- TELNET works well; it is an old application and has widespread
- interoperability. Implementations of TELNET usually work between
- different operating systems. For instance, a TELNET client may be on
- VAX/VMS and the server on UNIX System V.
-
- 8.2 FTP
-
- File Transfer Protocol (FTP), as old as TELNET, also uses TCP and has
- widespread interoperability. The operation and appearance is as if
- you TELNETed to the remote computer. But instead of typing your
- usual commands, you have to make do with a short list of commands for
- directory listings and the like. FTP commands allow you to copy
- files between computers.
-
- 8.3 rsh
-
- Remote shell (rsh or remsh) is one of an entire family of remote UNIX
- style commands. The UNIX copy command, cp, becomes rcp. The UNIX
- "who is logged in" command, who, becomes rwho. The list continues
- and is referred to collectively to as the "r" series commands or the
- "r*" (r star) commands.
-
- The r* commands mainly work between UNIX systems and are designed for
- interaction between trusted hosts. Little consideration is given to
- security, but they provide a convenient user environment.
-
- To execute the "cc file.c" command on a remote computer called delta,
- type "rsh delta cc file.c". To copy the "file.c" file to delta, type
- "rcp file.c delta:". To login to delta, type "rlogin delta", and if
- you administered the computers in a certain wa, you will not be
- challenged with a password prompt.
-
- 8.4 NFS
-
- Network File System, first developed by Sun Microsystems Inc, uses
- UDP and is excellent for mounting UNIX file systems on multiple
- computers. A diskless workstation can access its server's hard disk
- as if the disk were local to the workstation. A single disk copy of
- a database on mainframe "alpha" can also be used by mainframe "beta"
- if the database's file system is NFS mounted commands to
- use the NFS mounted disk as if it were local disk.
-
- 8.5 SNMP
-
- Simple Network Management Protocol (SNMP) uses UDP and is designed
- for use by central network management stations. It is a well known
- fact that if given enough data, a network manager can detect and
- diagnose network problems. The central station uses SNMP to collect
- this data from other computers on the network. SNMP defines the
- format for the data; it is left to the central station or network
- manager to interpret the data.
-
- 8.6 X-Window
-
- The X Window System uses the X Window protocol on TCP to draw windows
- on a workstation's bitmap display. X Window is much more than a
- utility for drawing windows; it is entire philosophy for designing a
- user interface.
-
- 9. Other Information
-
- Much information about internet technology was not included in this
- tutorial. This section lists information that is considered the next
- level of detail for the reader who wishes to learn more.
-
- o administration commands: arp, route, and netstat
- o ARP: permanent entry, publish entry, time-out entry, spoofing
- o IP route table: host entry, default gateway, subnets
- o IP: time-to-live counter, fragmentation, ICMP
- o RIP, routing loops
- o Domain Name System
-
- 10. References
-
- [1] Comer, D., "Internetworking with TCP/IP Principles, Protocols,
- and Architecture", Prentice Hall, Englewood Cliffs, New Jersey,
- U.S.A., 1988.
-
- [2] Feinler, E., et al, DDN Protocol Handbook, Volume 2 and 3, DDN
- Network Information Center, SRI International, 333 Ravenswood
- Avenue, Room EJ291, Menlow Park, California, U.S.A., 1985.
-
- [3] Spider Systems, Ltd., "Packets and Protocols", Spider Systems
- Ltd., Stanwell Street, Edinburgh, U.K. EH6 5NG, 1990.
-
- 11. Relation to other RFCs
-
- This RFC is a tutorial and it does not UPDATE or OBSOLETE any other
- RFC.
-
- 12. Security Considerations
-
- There are security considerations within the TCP/IP protocol suite.
- To some people these considerations are serious problems, to others
- they are not; it depends on the user requirements.
- This tutorial does not discuss these issues, but if you want to learn
- more you should start with the topic of ARP-spoofing, then use the
- "Security Considerations" section of RFC 1122 to lead you to more
- information.
-
- 13. Authors' Addresses
-
- Theodore John Socolofsky
- EMail: TEDS@SPIDER.CO.UK
-
- Claudia Jeanne Kale
- EMail: CLAUDIAK@SPIDER.CO.UK
-
- Note: This info taken from RFC-1180.
- _______________________________________________________________________________
-
-
-