20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Decimal Keyword Protocol References<br />

127 CRUDP Combat Radio User Datagram [Sautter]<br />

128 SSCOPMCE [Waber]<br />

129 IPLT [Hollbach]<br />

130 SPS Secure Packet Shield [McIntosh]<br />

131 PIPE Private IP Encapsulation within IP [Petri]<br />

132 SCTP Stream Control Transmission Protocol [Stewart]<br />

133 FC Fibre Channel [Rajagopal]<br />

134 FRSVP-E2E-IGNORE [RFC3175]<br />

136 UDPLite [RFC3828]<br />

137 MPLS-in-IP [RFC-ietf-mpls-in-ip-or-g<br />

re-08.txt]<br />

138 manet MANET Protocols [RFC-ietf-manet-iana-07.t<br />

xt]<br />

139 HIP Host Identity Protocol [RFC-ietf-hip-base-10.txt]<br />

140 Shim6 Shim6 Protocol [RFC5533]<br />

141 WESP Wrapped Encapsulating Security Payload [RFC-ietf-ipsecme-trafficvisibility-12.txt]<br />

142 ROHC Robust Header Compression [RFC-ietf-rohc-ipsec-exte<br />

nsions-hcoipsec-08.txt]<br />

143-252 Unassigned [IANA]<br />

253 Use <strong>for</strong> experimentation and testing [RFC3692]<br />

254 Use <strong>for</strong> experimentation and testing [RFC3692]<br />

255 Reserved [IANA]<br />

Maguire IP “Protocol” field (RFC 1700) 1: 50 of 104<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!