IP over Avian Carriers

Last updated

Under RFC 1149, a homing pigeon (exemplar in Schesslitz) can carry Internet Protocol traffic. Taube vor Schesslitz (cropped).JPG
Under RFC 1149, a homing pigeon (exemplar in Scheßlitz) can carry Internet Protocol traffic.

In computer networking, IP over Avian Carriers (IPoAC) is a joke proposal to carry Internet Protocol (IP) traffic by birds such as homing pigeons. IP over Avian Carriers was initially described in RFC   1149 issued by the Internet Engineering Task Force, written by David Waitzman, and released on April 1, 1990. It is one of several April Fools' Day Request for Comments.

Contents

Waitzman described an improvement of his protocol in RFC  2549, IP over Avian Carriers with Quality of Service (1 April 1999). Later, in RFC  6214—released on 1 April 2011, and 13 years after the introduction of IPv6Brian Carpenter and Robert Hinden published Adaptation of RFC 1149 for IPv6. [1]

IPoAC has been successfully implemented, but for only nine packets of data, with a packet loss ratio of 55% (due to operator error), [2] and a response time ranging from 3,000 seconds (50 min) to over 6,000 seconds (100 min). Thus, this technology suffers from high latency. [3]

Real-life implementation

On 28 April 2001, IPoAC was implemented by the Bergen Linux user group, under the name CPIP (for Carrier Pigeon Internet Protocol). [4] They sent nine packets over a distance of approximately 5 km (3 mi), each carried by an individual pigeon and containing one ping (ICMP echo request), and received four responses.

Script started on Sat Apr 28 11:24:09 2001 $ /sbin/ifconfig tun0 tun0      Link encap:Point-to-Point Protocol           inet addr:10.0.3.2  P-t-P:10.0.3.1  Mask:255.255.255.255           UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:150  Metric:1           RX packets:1 errors:0 dropped:0 overruns:0 frame:0           TX packets:2 errors:0 dropped:0 overruns:0 carrier:0           collisions:0           RX bytes:88 (88.0 b)  TX bytes:168 (168.0 b)  $ ping -c 9 -i 900 10.0.3.1 PING 10.0.3.1 (10.0.3.1): 56 data bytes 64 bytes from 10.0.3.1: icmp_seq=0 ttl=255 time=6165731.1 ms 64 bytes from 10.0.3.1: icmp_seq=4 ttl=255 time=3211900.8 ms 64 bytes from 10.0.3.1: icmp_seq=2 ttl=255 time=5124922.8 ms 64 bytes from 10.0.3.1: icmp_seq=1 ttl=255 time=6388671.9 ms  --- 10.0.3.1 ping statistics --- 9 packets transmitted, 4 packets received, 55% packet loss round-trip min/avg/max = 3211900.8/5222806.6/6388671.9 ms   Script done on Sat Apr 28 14:14:28 2001 

This real life implementation was mentioned by the French member of parliament Martine Billard in the French National Assembly, [5] during debates about HADOPI.

Risks

In December 2005, a Gartner report on bird flu that concluded "A pandemic wouldn't affect IT systems directly" was humorously criticized for neglecting to consider RFC 1149 and RFC 2549 in its analysis. [6]

Known risks to the protocol include:

Other avian data transfer methods

Rafting photographers already use pigeons as a sneakernet to transport digital photos on flash media from the camera to the tour operator. [7] Over a 30-mile (48 km) distance, a single pigeon may be able to carry tens of gigabytes of data in around an hour, which on an average bandwidth basis compares very favorably to current ADSL standards, even when accounting for lost drives. [8]

On March 12, 2004, Yossi Vardi, Ami Ben-Bassat, and Guy Vardi sent three homing pigeons a distance of 100 kilometres (62 mi), "each carrying 20–22 tiny memory cards containing 1.3 GB, amounting in total of 4 GB of data." An effective throughput of 2.27 Mbps was achieved. The purpose of the test was to measure and confirm an improvement over RFC 2549. [8] Since the developers used flash memory instead of paper notes as specified by RFC 2549, the experiment was widely criticized as an example in which an optimized implementation breaks an official standard.[ citation needed ]

Inspired by RFC 2549, on 9 September 2009, the marketing team of The Unlimited, a regional company in South Africa, decided to host a tongue-in-cheek pigeon race between their pet pigeon Winston and local telecom company Telkom SA. The race was to send 4 gigabytes of data from Howick to Hillcrest, approximately 60 kilometres (37 mi) apart. The pigeon carried a microSD card and competed against a Telkom ADSL line. [9] Winston beat the data transfer over Telkom's ADSL line, with a total time of two hours, six minutes and 57 seconds from uploading data on the microSD card to completion of download from the card. At the time of Winston's victory, the ADSL transfer was just under 4% complete. [10] [11] [12]

In November 2009, the Australian comedy/current-affairs television program Hungry Beast repeated this experiment. The Hungry Beast team took up the challenge after a fiery parliament session wherein the government of the time blasted the opposition for not supporting telecommunications investments, saying that if the opposition had their way, Australians would be doing data transfer over carrier pigeons. The Hungry Beast team had read about the South African experiment and assumed that, as a developed western country, Australia would have higher speeds. The experiment had the team transfer a 700 MB file via three delivery methods to determine which was the fastest: a carrier pigeon with a microSD card, a car carrying a USB stick, and a Telstra (Australia's largest telecom provider) ADSL line. The data was to be transferred from Tarana in rural New South Wales to the western-Sydney suburb of Prospect, New South Wales, a distance of 132 kilometres (82 mi) by road. Approximately halfway through the race, the internet connection unexpectedly dropped and the transfer had to be restarted. The pigeon won the race with a time of approximately 1 hour 5 minutes, the car came in second at 2 hours 10 minutes, while the internet transfer did not finish, having dropped out a second time and not coming back. The estimated time to upload completion at one point was as high as 9 hours, and at no point did the estimated upload time fall below 4 hours. [13]

A similar pigeon race was conducted in September 2010 by tech blogger (trefor.net) and ISP Timico CTO Trefor Davies with farmer Michelle Brumfield in rural Yorkshire, England: delivering a five-minute video to a BBC correspondent 75 miles away in Skegness. The pigeon (carrying a memory card with a 300 MB HD video of Davies having a haircut) was pitted against an upload to YouTube via British Telecom broadband; the pigeon was released at 11:05 am and arrived in the loft one hour and fifteen minutes later while the upload was still incomplete, having failed once in the interim. [14] [15] [16]

See also

Related Research Articles

The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications.

<span class="mw-page-title-main">Internet Protocol version 4</span> Fourth version of the Internet Protocol

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983. It is still used to route most Internet traffic today, even with the ongoing deployment of Internet Protocol version 6 (IPv6), its successor.

The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are the Transmission Control Protocol (TCP), the User Datagram Protocol (UDP), and the Internet Protocol (IP). Early versions of this networking model were known as the Department of Defense (DoD) model because the research and development were funded by the United States Department of Defense through DARPA.

In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction. The MTU relates to, but is not identical to the maximum frame size that can be transported on the data link layer, e.g., Ethernet frame.

ping (networking utility) Network utility used to test the reachability of a host

ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software.

The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications including WebRTC, television services and web-based push-to-talk features.

In computing, traceroute and tracert are computer network diagnostic commands for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host in the route (path); the sum of the mean times in each hop is a measure of the total time spent to establish the connection. Traceroute proceeds unless all sent packets are lost more than twice; then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.

Time to live (TTL) or hop limit is a mechanism which limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded or revalidated. In computer networking, TTL prevents a data packet from circulating indefinitely. In computing applications, TTL is commonly used to improve the performance and manage the caching of data.

In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths.

<span class="mw-page-title-main">Homing pigeon</span> Pigeons bred to find their way home

The homing pigeon, also called the mail pigeon or messenger pigeon, is a variety of domestic pigeons derived from the wild rock dove, selectively bred for its ability to find its way home over extremely long distances. The rock dove has an innate homing ability, meaning that it will generally return to its nest using magnetoreception. Flights as long as 1,800 km have been recorded by birds in competitive pigeon racing. Their average flying speed over moderate 965 km distances is around 97 km/h and speeds of up to 160 km/h have been observed in top racers for short distances.

The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. It appeared in 1999, in the context of the boom of DSL as the solution for tunneling packets over the DSL connection to the ISP's IP network, and from there to the rest of the Internet. A 2005 networking book noted that "Most DSL providers use PPPoE, which provides authentication, encryption, and compression." Typical use of PPPoE involves leveraging the PPP facilities for authenticating the user with a username and password, predominately via the PAP protocol and less often via CHAP. Around 2000, PPPoE was also starting to become a replacement method for talking to a modem connected to a computer or router over an Ethernet LAN displacing the older method, which had been USB. This use-case, connecting routers to modems over Ethernet is still extremely common today.

In computer networking, the Point-to-Point Protocol over ATM (PPPoA) is a layer 2 data-link protocol typically used to connect domestic broadband modems to ISPs via phone lines. It is used mainly with DOCSIS and DSL carriers, by encapsulating PPP frames in ATM AAL5. Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) is specified by The Internet Engineering Task Force (IETF) in RFC 2364.

<span class="mw-page-title-main">IP fragmentation</span> Process that breaks IP packets into smaller pieces

IP fragmentation is an Internet Protocol (IP) process that breaks packets into smaller pieces (fragments), so that the resulting pieces can pass through a link with a smaller maximum transmission unit (MTU) than the original packet size. The fragments are reassembled by the receiving host.

A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer. In this attack, a host sends hundreds of ping requests with a packet size that is large or illegal to another host to try to take it offline or to keep it preoccupied responding with ICMP Echo replies.

Internet Control Message Protocol version 6 (ICMPv6) is the implementation of the Internet Control Message Protocol (ICMP) for Internet Protocol version 6 (IPv6). ICMPv6 is an integral part of IPv6 and performs error reporting and diagnostic functions.

Path MTU Discovery (PMTUD) is a standardized technique in computer networking for determining the maximum transmission unit (MTU) size on the network path between two Internet Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in Internet Protocol Version 4 (IPv4). However, all modern operating systems use it on endpoints. In IPv6, this function has been explicitly delegated to the end points of a communications session. As an extension to the standard path MTU discovery, a technique called Packetization Layer Path MTU Discovery works without support from ICMP.

<span class="mw-page-title-main">Idle scan</span>

An idle scan is a TCP port scan method for determining what services are open on a target computer without leaving traces pointing back at oneself. This is accomplished by using packet spoofing to impersonate another computer so that the target believes it's being accessed by the zombie. The target will respond in different ways depending on whether the port is open, which can in turn be detected by querying the zombie.

IP fragmentation attacks are a kind of computer security attack based on how the Internet Protocol (IP) requires data to be transmitted and processed. Specifically, it invokes IP fragmentation, a process used to partition messages from one layer of a network into multiple smaller payloads that can fit within the lower layer's protocol data unit (PDU). Every network link has a maximum size of messages that may be transmitted, called the maximum transmission unit (MTU). If the SDU plus metadata added at the link layer exceeds the MTU, the SDU must be fragmented. IP fragmentation attacks exploit this process as an attack vector.

The Internet checksum, also called the IPv4 header checksum is a checksum used in version 4 of the Internet Protocol (IPv4) to detect corruption in the header of IPv4 packets. It is carried in the IP packet header, and represents the 16-bit result of summation of the header words.

A Request for Comments (RFC), in the context of Internet governance, is a type of publication from the Internet Engineering Task Force (IETF) and the Internet Society (ISOC), usually describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.

References

  1. B. Carpenter; R. Hinden (1 April 2011). Adaptation of RFC 1149 for IPv6. Internet Engineering Task Force. doi: 10.17487/RFC6214 . ISSN   2070-1721. RFC 6214.Informational. This is an April Fools' Day Request for Comments.
  2. "The informal report from the RFC 1149 event". BLUG. 28 April 2001. Archived from the original on 2014-11-03. Retrieved 2014-09-24.
  3. Momot, Chris (2008-07-28). "IP over Avian Carriers high latency". Calgary Herald. p. 15. Retrieved 2022-03-31 via Newspapers.com.
  4. "RFC-1149 - The highly unofficial CPIP WG". BLUG. Archived from the original on 2014-02-15. Retrieved 2002-04-01.
  5. "Assemblée nationale ~ Troisième séance du mercredi 22 juillet 2009". Archived from the original on 2013-03-07. Retrieved 2013-02-11. J'avais été choquée, monsieur le ministre, de vous entendre parler de pigeons voyageurs, mais, finalement, vous aviez peut-être raison. Il existe en effet une norme, la norme RFC 1149, qui date du 1er avril 1990 bien que ce n'est pas un poisson d'avril (Sourires), qui décrit comment on peut faire une transmission internet par pigeon voyageur. Neuf paquets de données ont été envoyés.
  6. "Virus Risks of RFC1149 and RFC2549". Yui Kee Computing Articles. Archived from the original on 2013-04-09. Retrieved 2013-01-08.
  7. Human, Katy (22 June 2007). "Homing pigeons get down to business, ferrying rafting company photos". Denver Post. Archived from the original on 8 November 2017. Retrieved 7 November 2017.
  8. 1 2 "A New Israeli test confirms: PEI (Pigeon Enabled Internet) is FASTER than ADSL". קצה - RIM - Ami Ben-Bassat's Blog. Archived from the original on 13 July 2008.
  9. "The Famous Bird vs Internet Contest of 2009". Pigeon Race 2009. Archived from the original on 2016-03-03. Retrieved 2009-09-08.
  10. Govender, Peroshni (9 September 2009). "Pigeon transfers data faster than South Africa's Telkom". Reuters. Archived from the original on 13 May 2021. Retrieved 5 July 2021.
  11. "SA pigeon 'faster than broadband'". BBC News. 10 September 2009. Archived from the original on 14 April 2011. Retrieved 4 April 2011.
  12. "Winston the homing pigeon draws tweets of support", The Mail & Guardian, September 10, 2009, by Niren Tolsi
  13. Real Human Stories (10 November 2009). "Pigeons vs. Australian Internet (Hungry Beast)". YouTube. Archived from the original on 5 August 2014. Retrieved 3 June 2014.
  14. "BT feathers ruffled over pigeon-based file transfer caper". The Register. 17 September 2010. Archived from the original on 10 August 2017. Retrieved 10 August 2017.
  15. UK Business ISP Timico Challenges Pigeon to Beat Rural Broadband, ISPreview.com, 2010-09-16, archived from the original on 2010-09-19, retrieved 2010-09-18
  16. Pigeon flies past broadband in data speed race, BBC News Technology, 2010-09-16, archived from the original on 2018-10-02, retrieved 2018-09-18