In computer networking, IP over Avian Carriers (IPoAC) is an ostensibly functional proposal to carry Internet Protocol (IP) traffic by birds such as homing pigeons. IP over Avian Carriers was initially described in RFC 1149 issued by the Internet Engineering Task Force, written by David Waitzman, and released on April 1, 1990. It is one of several April Fools' Day Request for Comments.
Waitzman described an improvement of his protocol in RFC 2549, IP over Avian Carriers with Quality of Service (1 April 1999). Later, in RFC 6214—released on 1 April 2011, and 13 years after the introduction of IPv6—Brian Carpenter and Robert Hinden published Adaptation of RFC 1149 for IPv6. [1]
IPoAC has been successfully implemented, but for only nine packets of data, with a packet loss ratio of 55% (due to operator error), [2] and a response time ranging from 3,000 seconds (50 min) to over 6,000 seconds (100 min). Thus, this technology suffers from extremely high latency. [3]
On 28 April 2001, IPoAC was implemented by the Bergen Linux user group, under the name CPIP (for Carrier Pigeon Internet Protocol). [4] They sent nine packets over a distance of approximately 5 km (3 mi), each carried by an individual pigeon and containing one ping (ICMP echo request), and received four responses.
Script started on Sat Apr 28 11:24:09 2001 $ /sbin/ifconfig tun0 tun0 Link encap:Point-to-Point Protocol inet addr:10.0.3.2 P-t-P:10.0.3.1 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:150 Metric:1 RX packets:1 errors:0 dropped:0 overruns:0 frame:0 TX packets:2 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 RX bytes:88 (88.0 b) TX bytes:168 (168.0 b) $ ping -c 9 -i 900 10.0.3.1 PING 10.0.3.1 (10.0.3.1): 56 data bytes 64 bytes from 10.0.3.1: icmp_seq=0 ttl=255 time=6165731.1 ms 64 bytes from 10.0.3.1: icmp_seq=4 ttl=255 time=3211900.8 ms 64 bytes from 10.0.3.1: icmp_seq=2 ttl=255 time=5124922.8 ms 64 bytes from 10.0.3.1: icmp_seq=1 ttl=255 time=6388671.9 ms --- 10.0.3.1 ping statistics --- 9 packets transmitted, 4 packets received, 55% packet loss round-trip min/avg/max = 3211900.8/5222806.6/6388671.9 ms Script done on Sat Apr 28 14:14:28 2001
This real life implementation was mentioned by the French member of parliament Martine Billard in the French National Assembly, [5] during debates about HADOPI.
In December 2005, a Gartner report on bird flu that concluded "A pandemic wouldn't affect IT systems directly" was humorously criticized for neglecting to consider RFC 1149 and RFC 2549 in its analysis. [6]
Known risks to the protocol include:
Rafting photographers already use pigeons as a sneakernet to transport digital photos on flash media from the camera to the tour operator. [7] Over a 30-mile (48 km) distance, a single pigeon may be able to carry tens of gigabytes of data in around an hour, which on an average bandwidth basis compared very favorably to early ADSL standards, even when accounting for lost drives. [8]
On March 12, 2004, Yossi Vardi, Ami Ben-Bassat, and Guy Vardi sent three homing pigeons a distance of 100 kilometres (62 mi), "each carrying 20–22 tiny memory cards containing 1.3 GB, amounting in total of 4 GB of data." An effective throughput of 2.27 Mbit/s was achieved. The purpose of the test was to measure and confirm an improvement over RFC 2549. [8] Since the developers used flash memory instead of paper notes as specified by RFC 2549, the experiment was widely criticized as an example in which an optimized implementation breaks an official standard.[ citation needed ]
Inspired by RFC 2549, on 9 September 2009, the marketing team of The Unlimited, a regional company in South Africa, decided to host a tongue-in-cheek pigeon race between their pet pigeon Winston and local telecom company Telkom SA. The race was to send 4 gigabytes of data from Howick to Hillcrest, approximately 60 kilometres (37 mi) apart. The pigeon carried a microSD card and competed against a Telkom ADSL line. [9] Winston beat the data transfer over Telkom's ADSL line, with a total time of two hours, six minutes and 57 seconds from uploading data on the microSD card to completion of download from the card. At the time of Winston's victory, the ADSL transfer was just under 4% complete. [10] [11] [12]
In November 2009, the Australian comedy/current-affairs television program Hungry Beast repeated this experiment. The Hungry Beast team took up the challenge after a fiery parliament session wherein the government of the time blasted the opposition for not supporting telecommunications investments, saying that if the opposition had their way, Australians would be doing data transfer over carrier pigeons. The Hungry Beast team had read about the South African experiment and assumed that, as a developed Western country, Australia would have higher speeds. The experiment had the team transfer a 700 MB file via three delivery methods to determine which was the fastest: a carrier pigeon with a microSD card, a car carrying a USB stick, and a Telstra (Australia's largest telecom provider) ADSL line. The data was to be transferred from Tarana in rural New South Wales to the western-Sydney suburb of Prospect, New South Wales, a distance of 132 kilometres (82 mi) by road. Approximately halfway through the race, the internet connection unexpectedly dropped and the transfer had to be restarted. The pigeon won the race with a time of approximately 1 hour 5 minutes, the car came in second at 2 hours 10 minutes, while the internet transfer did not finish, having dropped out a second time and not come back. The estimated time to upload completion at one point was as high as 9 hours, and at no point did the estimated upload time fall below 4 hours. [13]
A similar pigeon race was conducted in September 2010 by tech blogger (trefor.net) and ISP Timico CTO Trefor Davies with farmer Michelle Brumfield in rural Yorkshire, England: delivering a five-minute video to a BBC correspondent 75 miles away in Skegness. The pigeon (carrying a memory card with a 300 MB HD video of Davies having a haircut) was pitted against an upload to YouTube via British Telecom broadband; the pigeon was released at 11:05 am and arrived in the loft one hour and fifteen minutes later while the upload was still incomplete, having failed once in the interim. [14] [15] [16]
The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address. For example, an error is indicated when a requested service is not available or that a host or router could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications.
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983. It is still used to route most Internet traffic today, even with the ongoing deployment of Internet Protocol version 6 (IPv6), its successor.
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP). Early versions of this networking model were known as the Department of Defense (DoD) model because the research and development were funded by the United States Department of Defense through DARPA.
In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction. The MTU relates to, but is not identical to the maximum frame size that can be transported on the data link layer, e.g., Ethernet frame.
ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available in a wide range of operating systems – including most embedded network administration software.
In computing, traceroute
and tracert
are diagnostic command-line interface commands for displaying possible routes (paths) and transit delays of packets across an Internet Protocol (IP) network.
Time to live (TTL) or hop limit is a mechanism which limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded or revalidated. In computer networking, TTL prevents a data packet from circulating indefinitely. In computing applications, TTL is commonly used to improve the performance and manage the caching of data.
The homing pigeon is a variety of domestic pigeon, selectively bred for its ability to find its way home over extremely long distances. Because of this skill, homing pigeons were used to carry messages, a practice referred to as "pigeon post". Until the introduction of telephones, they were used commercially to deliver communication; when used during wars, they were called "war pigeons".
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. It appeared in 1999, in the context of the boom of DSL as the solution for tunneling packets over the DSL connection to the ISP's IP network, and from there to the rest of the Internet. A 2005 networking book noted that "Most DSL providers use PPPoE, which provides authentication, encryption, and compression." Typical use of PPPoE involves leveraging the PPP facilities for authenticating the user with a username and password, via the PAP protocol or via CHAP. PAP was dominant in 2007 but service providers have been transitioning to the more secure CHAP, because PAP is a plain-text protocol. Around 2000, PPPoE was also starting to become a replacement method for talking to a modem connected to a computer or router over an Ethernet LAN displacing the older method, which had been USB. This use-case, connecting routers to modems over Ethernet is still extremely common today.
In computer networking, the Point-to-Point Protocol over ATM (PPPoA) is a layer 2 data-link protocol typically used to connect domestic broadband modems to ISPs via phone lines. It is used mainly with DOCSIS and DSL carriers, by encapsulating PPP frames in ATM AAL5. Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) is specified by The Internet Engineering Task Force (IETF) in RFC 2364.
IP fragmentation is an Internet Protocol (IP) process that breaks packets into smaller pieces (fragments), so that the resulting pieces can pass through a link with a smaller maximum transmission unit (MTU) than the original packet size. The fragments are reassembled by the receiving host.
Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rather than transmitting it over a computer network. Sneakernets enable data transfer through physical means and offer a solution in the presence of network connections that lack reliability; however, a consequence of this physical transfer is high latency. The term, a tongue-in-cheek play on net(work) as in Internet or Ethernet, refers to walking in sneakers as the transport mechanism.
A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer. In this attack, a host sends hundreds of ping requests with a packet size that is large or illegal to another host to try to take it offline or to keep it preoccupied responding with ICMP Echo replies.
Internet Control Message Protocol version 6 (ICMPv6) is the implementation of the Internet Control Message Protocol (ICMP) for Internet Protocol version 6 (IPv6). ICMPv6 is an integral part of IPv6 and performs error reporting and diagnostic functions.
An idle scan is a TCP port scan method for determining what services are open on a target computer without leaving traces pointing back at oneself. This is accomplished by using packet spoofing to impersonate another computer so that the target believes it's being accessed by the zombie. The target will respond in different ways depending on whether the port is open, which can in turn be detected by querying the zombie.
IP fragmentation attacks are a kind of computer security attack based on how the Internet Protocol (IP) requires data to be transmitted and processed. Specifically, it invokes IP fragmentation, a process used to partition messages from one layer of a network into multiple smaller payloads that can fit within the lower layer's protocol data unit (PDU). Every network link has a maximum size of messages that may be transmitted, called the maximum transmission unit (MTU). If the SDU plus metadata added at the link layer exceeds the MTU, the SDU must be fragmented. IP fragmentation attacks exploit this process as an attack vector.
The Internet checksum, also called the IPv4 header checksum is a checksum used in version 4 of the Internet Protocol (IPv4) to detect corruption in the header of IPv4 packets. It is carried in the IPv4 packet header, and represents the 16-bit result of the summation of the header words.
IP in IP is an IP tunneling protocol that encapsulates one IP packet in another IP packet. To encapsulate an IP packet in another IP packet, an outer header is added with Source IP
, the entry point of the tunnel, and Destination IP
, the exit point of the tunnel. While doing this, the inner packet is unmodified. The Don't Fragment
and the Type Of Service
fields should be copied to the outer packet. If the packet size, including the outer header, is greater than the Path MTU
, the encapsulator fragments the packet. The decapsulator will reassemble the packet.
A Request for Comments (RFC), in the context of Internet governance, is a type of publication from the Internet Engineering Task Force (IETF) and the Internet Society (ISOC), usually describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.
The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol in the transport layer of the Internet protocol suite. Originally intended for Signaling System 7 (SS7) message transport in telecommunication, the protocol provides the message-oriented feature of the User Datagram Protocol (UDP), while ensuring reliable, in-sequence transport of messages with congestion control like the Transmission Control Protocol (TCP). Unlike UDP and TCP, the protocol supports multihoming and redundant paths to increase resilience and reliability.
J'avais été choquée, monsieur le ministre, de vous entendre parler de pigeons voyageurs, mais, finalement, vous aviez peut-être raison. Il existe en effet une norme, la norme RFC 1149, qui date du 1er avril 1990 bien que ce n'est pas un poisson d'avril (Sourires), qui décrit comment on peut faire une transmission internet par pigeon voyageur. Neuf paquets de données ont été envoyés.