RFC 1954 (rfc1954) - Page 1 of 8


Transmission of Flow Labelled IPv4 on ATM Data Links Ipsilon Version 1



Alternative Format: Original Text Document



Network Working Group                                 P. Newman, Ipsilon
Request for Comments: 1954                         W. L. Edwards, Sprint
Category: Informational                               R. Hinden, Ipsilon
                                                     E. Hoffman, Ipsilon
                                                  F. Ching Liaw, Ipsilon
                                                        T. Lyon, Ipsilon
                                                    G. Minshall, Ipsilon
                                                                May 1996


          Transmission of Flow Labelled IPv4 on ATM Data Links
                          Ipsilon Version 1.0

Status of this Memo

   This document provides information for the Internet community.  This
   memo does not specify an Internet standard of any kind.  Distribution
   of this memo is unlimited.

IESG Note:

   This note documents a private protocol for IPv4-based flows.  This
   protocol is NOT the product of an IETF working group nor is it a
   standards track document. It has not necessarily benefited from the
   widespread and in depth community review that standards track
   documents receive.

Abstract

   This document specifies the manner for transmitting IPv4 datagrams
   over an ATM data link, both in a default manner and in the presence
   of flow labelling via Ipsilon Flow Management Protocol [IFMP].

Table of Contents

   Introduction....................................................2
   1. Labels.......................................................2
   2. Default Encapsulation........................................2
   3. Flow Type 0 Encapsulation....................................3
   4. Flow Type 1 Encapsulation....................................4
   5. Flow Type 2 Encapsulation....................................5
   References......................................................7
   Security Considerations.........................................7
   Authors' Addresses..............................................7







Newman, et. al.              Informational