Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-m8s7h Total loading time: 0 Render date: 2024-07-16T21:16:54.767Z Has data issue: false hasContentIssue false

5 - Protocols for Automotive Ethernet

Published online by Cambridge University Press:  29 June 2017

Kirsten Matheus
Affiliation:
BMW Munich
Thomas Königseder
Affiliation:
BMW Munich
Get access
Type
Chapter
Information
Automotive Ethernet , pp. 189 - 240
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Völker, L., “One for All: Interoperability from AUTOSAR to GENIVI,” in 1st Ethernet&IP@Automotive Technology Day, Munich, 2011.Google Scholar
ITWissen, “QoS (Quality of Service),” continuously updated. [Online]. Available: www.itwissen.info/definition/lexikon/quality-of-service-QoS-Dienstguete.html. [Accessed 15 August 2016].Google Scholar
ITU, “Definitions of Terms Related to Quality of Service,” ITU, Geneva, 2008.Google Scholar
ITU-T, “Network Performance Objectives for IP-Based Services,” ITU, Geneva, 2011.Google Scholar
IEEE 802.3, “Residential Ethernet, IEEE 802.3 Call for Interest,” July 2004. [Online]. Available: http://grouper.ieee.org/groups/802/3/re_study/public/200407/cfi_0704_1.pdf. [Accessed 12 October 2013].Google Scholar
Kim, Y., E-mail correspondence, 2013.Google Scholar
Lamont, T., “Napster: The Day the Music Was Set Free,” 24 February 2013. [Online]. Available: www.theguardian.com/music/2013/feb/24/napster-music-free-file-sharing. [Accessed 30 October 2013].Google Scholar
Gartner, , “Gartner Says Declining Worldwide PC Shipments in Fourth Quarter of 2012 Signal Structural Shift of PC Market,” 14 January 2013. [Online]. Available: www.gartner.com/newsroom/id/2301715. [Accessed 9 September 2013].Google Scholar
Johas Teener, M., “No-excuses Audio/Video Networking: the Technology Behind AVnu,” 24 August 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/No-excuses-Audio-Video-Networking-v2.pdf. [Accessed 20 August 2016].Google Scholar
IEEE 802.3, “Website for IEEE 802.3 Residential Ethernet Study Group,” 21 November 2005. [Online]. Available: http://grouper.ieee.org/groups/802/3/re_study/. [Accessed 11 October 2013].Google Scholar
Kreifeld, R., E-mail correspondence, 2013.Google Scholar
Wire, Business, “AVnu Alliance Launches to Advance Quality of Experience for Networked Audio and Video,” 25 August 2009. [Online]. Available: www.businesswire.com/news/google/20090825005929/en. [Accessed 8 October 2013].Google Scholar
Marvell, “Marvell Announces Industry-First Audio Video Bridging Family of SoCs with Integrated Switching, CPU and Endpoint Functionality,” 8 May 2012. [Online]. Available: www.marvell.com/company/news/pressDetail.do?releaseID=2296. [Accessed 16 August 2016].Google Scholar
Urban, J., “Debunking Some Myths about AVB,” 17 May 2013. [Online]. Available: http://blog.biamp.com/debunking-some-myths-about-avb/. [Accessed 20 August 2016].Google Scholar
IEEE 802.1, “802.1 Plenary – 11/2012 San Antonio Closing Slides,” November 2012. [Online]. Available: www.ieee802.org/1/files/public/minutes/2012–11-closing-plenary-slides.pdf. [Accessed 30 October 2013].Google Scholar
Hellerud, E., “Transmission of High Quality Audio over IP Networks,” April 2009. [Online]. Available: www.diva-portal.org/smash/get/diva2:277816/FULLTEXT02. [Accessed 1 November 2013].Google Scholar
Kreifeld, R., “AVB for Professional A/V Use,” 30 July 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/AVnu-Pro__White-Paper.pdf. [Accessed 20 October 2013].Google Scholar
Kaltheuner, H., “Das Universalnetz, Ethernet AVB: Echtzeitfähig und Streaming-tauglich,” c't, no. 13, pp. 176–81, June 2013.Google Scholar
Johas Teener, M., “Residential Ethernet Objectives, Requirements and Possible Solutions,” 9 May 2009. [Online]. Available: www.ieee802.org/1/files/public/docs2005/liaison-mikejt-rese-objectives-requirements-0505.pdf. [Accessed 17 October 2013].Google Scholar
Steinmetz, R., “Human Perception of Jitter and Media Synchronization,” IEEE Journal on Selected Areas in Communication, vol. 14, no. 1, pp. 6172, January 1996.Google Scholar
Stanton, K., “AVB for Home/Consumer Electronics Use,” 11 August 2009. [Online]. Available: http://avnu.org/wp-content/uploads/2014/05/AVB-for-Home-Consumer-Electronics-Use__White-Paper.pdf. [Accessed 24 October 2013].Google Scholar
Held, F., “Digitale Audio-, Video- & Licht-Kommunikationsprotokolle in der Veranstaltungstechnik,” 12 October 2012. [Online]. Available: https://entropia.de/wiki/images/b/b8/Avb_vortrag_felix.pdf. [Accessed 24 October 2013].Google Scholar
Johas Teener, M., E-mail correspondence, 2013.Google Scholar
Boatright, R., “Understanding New Audio Video Bridging Standards,” 10 May 2009. [Online]. Available: www.embedded.com/design/connectivity/4027005/Understanding-IEEE-s-new-audio-video-bridging-standards-item-1. [Accessed 24 October 2013].Google Scholar
Schettke, M., “AVB Audionetzwerke in der Praxis: Betriebssicherheit und deren automatisierte Überprüfung,” 10 June 2014. [Online]. Available: http://schettke.com/files/Diplomarbeit_AVB-Praxis_Schettke_2014.pdf. [Accessed 10 August 2016].Google Scholar
Kreifeld, R., “AVB for Automotive Use,” 20 July 2009. [Online]. Available: only updated version available http://avnu.org/wp-content/uploads/2014/05/2014–11–20_AVnu-Automotive-White-Paper_Final_Approved.pdf. [Accessed 20 October 2013].Google Scholar
Kicherer, M. and Königseder, T., “BMW Proposal for an AVB Gen 2 Automotive Profile,” BMW White Paper, München, 2013.Google Scholar
Matheus, K., Kicherer, M., and Königseder, T., “Audio/Video Transmission in Cars using Ethernet,” BMW White Paper, Munich, 2010.Google Scholar
Hogenmüller, T. et al., “Use Cases & Requirements for IEEE 802.3 RTPGE Ethernet,” May 2012. [Online]. Available: http://grouper.ieee.org/groups/802/3/RTPGE/public/may12/hogenmuller_01_0512.pdf. [Accessed 30 May 2012].Google Scholar
Matheus, K. et al., “1 Pair or 2 Pairs for RTPGE: Impact on System Other Than the PHY Part 1: Weight & Space,” January 2013. [Online]. Available: www.ieee802.org/3/bp/public/jan13/matheus_3bp_01_0113.pdf. [Accessed 18 January 2013].Google Scholar
IEEE Computer Society, “IEEE 1722–2016: Transport Protocol for Time-Sensitive Applications in Bridged Local Area Networks,” IEEE, New York, 2016.Google Scholar
Schulzrinne, H., Casner, S., Frederick, R., and Jacobson, V., “RTP: A Transport Protocol for Real-Time Applications,” July 2003. [Online]. Available: http://tools.ietf.org/html/rfc3550. [Accessed 15 November 2013].Google Scholar
IEEE Computer Society, “IEEE 802.1AS-2011: Timing and Synchronization for Time-Sensitive Applications in Bridged Local Area Networks,” IEEE, New York, 2011.Google Scholar
IEEE Computer Society, “IEEE 1588–2008: Precision Clock Synchronization Protocol for Networked Measurement and Control Systems,” IEEE, New York, 2008.Google Scholar
Hirschmann, , “Precision Clock Synchronization, the Standard IEEE 1588,” 2008. [Online]. Available: www.belden.com/docs/upload/precision_clock_synchronization_wp.pdf. [Accessed 28 October 2013].Google Scholar
EndRun Technologies, “Precision Time Protocol (PTP/IEEE-1588),” 2013. [Online]. Available: www.endruntechnologies.com/pdf/PTP-1588.pdf. [Accessed 8 November 2013].Google Scholar
IEEE Computer Society, “IEEE 802.1Q-2011: Media Access Control (MAC) Bridges and Virtual Bridge Local Area Networks,” IEEE, New York, 2011.Google Scholar
Bechtel, G., Ben Gale, M. K., and Olsen, D., “Automotive Ethernet AVB Functional and Interoperability Specification, Revision 1.4,” AVnu, Beaverton, 2015.Google Scholar
IEEE Computer Society, “IEEE 802.1Qav:2009 Amendment 12: Forwarding and Queuing Enhancements for Time-Sensitive Streams,” IEEE, New York, 2009.Google Scholar
Stein, S. and Racu, R., “Ethernet Quality of Service @ Volkswagen,” in 2nd Ethernet&IP@Automotive Technology Day, Regensburg, 2012.Google Scholar
Diemer, J., Thiele, D., and Ernst, R., “Formal Worst-Case Timing Analysis of Ethernet Topologies with Strict-Priority and AVB Switching,” in 7th IEEE International Symposium on Industrial Embedded Systems (SIES12), Karlsruhe, 2012.Google Scholar
IEEE Computer Society, “IEEE 1733–2011: Layer 3 Transport Protocol for Time-Sensitive Applications in Local Area Networks,” IEEE, New York, 2011.Google Scholar
Damori, J., “Are Layer 2 or Layer 3 Protocols Better? Yes,” 31 May 2013. [Online]. Available: http://blog.biamp.com/are-layer-2-or-layer-3-protocols-better-yes/. [Accessed 20 October 2013].Google Scholar
IEEE Computer Society, “IEEE 802.1BA-2011: Audio Video Bridging (AVB) Systems,” IEEE, New York, 2011.Google Scholar
IEEE Computer Society, “IEEE 1722.1–2013: Device Discovery, Connection Management, and Control Protocol for IEEE 1722 Based Devices,” IEEE, New York, 2013.Google Scholar
Lane, J., “Digital Audio Listening In Car Is Increasing,” 11 October 2010. [Online]. Available: http://audio4cast.com/2010/10/11/digital-audio-listening-in-car-is-increasing/. [Accessed 12 November 2013].Google Scholar
Jochim, M. and Osella, M., “The Need for IEEE Standardized Ethernet Mechanisms for Active Safety Applications,” in 3rd Ethernet&IP@Automotive Technology Day, Leinfelden-Echterdingen, 2013.Google Scholar
Zebralla, D., “Requirements on Future in-Vehicle Architectures for Automotive Ethernet,” in Automotive Ethernet Congress, München, 2016.Google Scholar
Johas Teener, M., “IEEE 802 Time-Sensitive Networking: Extending Beyond AVB,” in 3rd Ethernet & IP @ Automotive Technology Day, Leinfelden-Echterdingen, 2013.Google Scholar
Pannell, D., “IEEE TSN Standards Overview & Update,” in 5th Ethernet&IP@Automotive Technology Day, Yokohama, 2015.Google Scholar
IEEE-SA, “IEEE 802.3br-2016 Amendment: Specification and Management Parameters for Interspersing Express Traffic,” IEEE, New York, 2016.Google Scholar
IEEE Computer Society, “IEEE 802.1Qbu: Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks – Amendment: Frame Preemption,” IEEE, New York, 2016.Google Scholar
Wikipedia, “TTEthernet,” 31 March 2016. [Online]. Available: http://en.wikipedia.org/wiki/TTEthernet. [Accessed 20 August 2016].Google Scholar
IEEE Computer Society, “IEEE 802.1Qbv: Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks Amendment: Enhancements for Scheduled Traffic,” IEEE, New York, 2016.Google Scholar
IEEE 802.1, “Website for .1Qch – Cyclic Queuing and Forwarding,” continuously updated. [Online]. Available: www.ieee802.org/1/pages/802.1ch.html. [Accessed 20 August 2016].Google Scholar
Jochim, M., “Ingress Policing,” 10–14 November 2013. [Online]. Available: www.ieee802.org/1/files/public/docs2013/tsn-jochim-ingress-policing-1113-v2.pdf. [Accessed 20 August 2016].Google Scholar
IEEE 802.1, “Website for: 802.1Qci – Per-Stream Filtering and Policing,” continuously updated. [Online]. Available: www.ieee802.org/1/pages/802.1ci.html. [Accessed 3 September 2016].Google Scholar
IEEE Computer Society, “IEEE 802.1Qca: Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks Amendment: Path Control and Reservation,” IEEE, New York, 2016.Google Scholar
IEEE 802.1, “Website for 802.1CB – Frame Replication and Elimination for Reliability,” continuously updated. [Online]. Available: www.ieee802.org/1/pages/802.1cb.html. [Accessed 20 August 2016].Google Scholar
IEEE 802.1, “Website for 802.1AS-Rev – Timing and Synchronization for Time-Sensitive Applications,” continuously updated. [Online]. Available: www.ieee802.org/1/pages/802.1AS-rev.html. [Accessed 20 August 2016].Google Scholar
IEEE 802.1, “Website for 802.1Qcc – Stream Reservation Protocol (SRP) Enhancements and Performance Improvements,” continuously updated. [Online]. Available: www.ieee802.org/1/pages/802.1cc.html. [Accessed 20 August 2016].Google Scholar
Moussalli, R., “Dealing with security threats in the digital age: Part 1,” 19 August 2015. [Online]. Available: http://tatacommunications-newworld.com/2015/08/dealing-with-security-threats-in-the-digital-age-part-1/. [Accessed 29 August 2016].Google Scholar
Miller, C. and Valasek, C., “Remote Exploitation of an Unaltered Passenger Vehicle,” 10 August 2015. [Online]. Available: http://illmatics.com/Remote%20Car%20Hacking.pdf. [Accessed 5 October 2016].Google Scholar
Greenberg, A., “Remote Exploitation of an Unaltered Passenger Vehicle,” 21 July 2015. [Online]. Available: www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. [Accessed 5 October 2016].Google Scholar
SANS Institute, “The Best Security Books to have in your library,” SANS Institute, 2014. [Online]. Available: www.sans.edu/research/book-reviews/article/security-books-best. [Accessed 2 February 2014].Google Scholar
Singer, S., “IP based Communication in Vehicles – learnings from the IT Industry,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
AUTOSAR, “Specification of Module Secure Onboard Communication, Release 4.2.2,” undated. [Online]. Available: www.autosar.org/fileadmin/files/releases/4-2/software-architecture/safety-and-security/standard/AUTOSAR_SWS_SecureOnboardCommunication.pdf. [Accessed 29 August 2016].Google Scholar
Pallierer, R. and Ziehensack, M., “Secure Ethernet for Autonomous Driving,” in Automotive Ethernet Congress, München, 2016.Google Scholar
Wikipedia, “Transport Layer Security,” 29 August 2016. [Online]. Available: https://en.wikipedia.org/wiki/Transport_Layer_Security. [Accessed 30 August 2016].Google Scholar
Dierks, T. and Rescorla, E., “The Transport Layer Security (TLS) Protocol Version 1.2,” August 2008. [Online]. Available: https://tools.ietf.org/html/rfc5246. [Accessed 30 August 2016].Google Scholar
Lindner, M., “Security Architecture for IPsec,” 2007. [Online]. Available: www.ict.tuwien.ac.at/lva/384.081/infobase/L97-IPsec_v4-7.pdf. [Accessed 2 February 2014].Google Scholar
Wikipedia, “IPsec,” 20 July 2016. [Online]. Available: http://en.wikipedia.org/wiki/Ipsec. [Accessed 20 August 2016].Google Scholar
IEEE Computer Society, “IEEE 802.1AEbw-2013: Media Access Control (MAC) Security Amendment 2: Extended Packet Numbering,” IEEE, New York, 2013.Google Scholar
Kim, Y., “Ethernet Security,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
Wikipedia, “Books on Cryptography,” 18 August 2016. [Online]. Available: https://en.wikipedia.org/wiki/Books_on_cryptography. [Accessed 31 August 2016].Google Scholar
Apvrille, L., El Khayari, R., Henniger, O., Roudier, Y., Schweppe, H., Seudié, H., Weyl, B., and Wolf, M., “Secure Automotive on-Board Electronics Network Architecture,” 30 May 2010. [Online]. Available: www.evita-project.org/Publications/AEHR10.pdf. [Accessed 8 October 2016].Google Scholar
Molter, H. G., “Introduction to Security,” in Automotive Ethernet Congress, Munich, 2016.Google Scholar
SAE, “Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, J3061,” continuously updated. [Online]. Available: http://standards.sae.org/wip/j3061/. [Accessed 2 September 2016].Google Scholar
ISO, “ISO/AWI 21434 Road Vehicles – Automotive Security Engineering,” 2016. [Online]. Available: www.iso.org/iso/catalogue_detail.htm?csnumber=70918&utm_source=ISO&utm_medium=RSS&utm_campaign=Catalogue. [Accessed 18 November 2016].Google Scholar
Goto, H., “In-Vehicle Ethernet Technology Promoted by JASPAR and Industry Trends,” in 4th Nikkei Electronics/Automotive Seminar, Tokyo, 2016.Google Scholar
Gale, B., “Ethernet Security in the Car,” in IEEE-SA (4th) Ethernet&IP@Automotive Technology Day, Detroit, 2014.Google Scholar
Kleidermacher, D. and Kleidermacher, M., Embedded Systems Security – Practical Methods for Safe and Secure Software and Systems Development, Oxford: Newnes, 2012.Google Scholar
Stevens, W. R., TCP/IP Illustrated, vol. 1, The Protocols, Reading, MA: Addison Wesley Longman, 1994.Google Scholar
Wikipedia, “Internet Protocol Suite,” 19 August 2016. [Online]. Available: http://en.wikipedia.org/wiki/Internet_protocol_suite. [Accessed 20 August 2016].Google Scholar
Information Sciences Institute University of Southern California, “Transmission Control Protocol,” September 1981. [Online]. Available: http://tools.ietf.org/html/rfc793. [Accessed 4 August 2013].Google Scholar
Information Sciences Institute University of Southern California, “Internet Protocol,” September 1981. [Online]. Available: http://tools.ietf.org/html/rfc791. [Accessed 4 August 2013].Google Scholar
Postel, J., “User Datagram Protocol,” 29 August 1980. [Online]. Available: http://tools.ietf.org/html/rfc768. [Accessed 4 August 2013].Google Scholar
Kessler, M., “Ethernet in Small ECUs, Challenges and Chances,” in 3rd Ethernet&IP@Automotive Technology Day, Leinfelden-Echterdingen, 2013.Google Scholar
3Com, “Understanding IP Addressing, Everything You Ever Wanted to Know,” 2001. [Online]. Available: http://pages.di.unipi.it/ricci/501302.pdf. [Accessed 20 August 2016].Google Scholar
Number Resource Organization, “Free Pool of IPv4 Address Space Depleted,” 3 February 2011. [Online]. Available: www.nro.net/news/ipv4-free-pool-depleted. [Accessed 23 November 2013].Google Scholar
Deering, S. and Hinden, R., “Internet Protocol, Version 6 (IPv6),” December 1995. [Online]. Available: http://tools.ietf.org/html/rfc1883. [Accessed 23 November 2013].Google Scholar
Bao, C., Huitema, C., Bagnulo, M., Boucadair, M., and Li, X., “IPv6 Addressing of IPv4/IPv6 Translators,” October 2010. [Online]. Available: http://tools.ietf.org/html/rfc6052. [Accessed 18 February 2014].Google Scholar
Busnelli, A., “Car Software: 100M Lines of Code and Counting,” 26 June 2014. [Online]. Available: www.linkedin.com/pulse/20140626152045–3625632-car-software-100m-lines-of-code-and-counting. [Accessed 18 August 2016].Google Scholar
The Apache Software Foundation, “Apache Etch,” 2013. [Online]. Available: http://etch.apache.org/. [Accessed 19 February 2014].Google Scholar
Bouard, A., Schanda, J., Herrscher, D., and Eckert, C., “Automotive Proxy-Based Security Architecture for CE Device Integration,” in Mobile Wireless Middleware, Operating Systems, and Applications, Heidelberg: Springer, 2013, pp. 6276.Google Scholar
Weckemann, K., Satzger, F., Stolz, L., Herrscher, D., and Linnhoff-Popien, C., “Lessons from a Minimal Middleware for IP-Based in-Car Communication,” in Proceedings of the IEEE Intelligent Vehicles Symposium, Alcala de Henares, 2012.Google Scholar
Google Developers, “Protocol Buffers,” 2 April 2012. [Online]. Available: https://developers.google.com/protocol-buffers/. [Accessed 30 January 2014].Google Scholar
Apple, “Bonjour for Developers,” 2014. [Online]. Available: https://developer.apple.com/bonjour/. [Accessed 30 January 2014].Google Scholar
Völker, L., “Scalable service-Oriented Middleware over IP (SOME/IP),” 2013. [Online]. Available: http://some-ip.com. [Accessed 30 January 2014].Google Scholar
Napster, “Company Info,” continuously updated. [Online]. Available: http://us.napster.com//about?from=rhapsody. [Accessed 15 August 2016].Google Scholar
Hümmler, T., “Router, Switches, Hub und Co. Ratgeber: Was ist im Netzwerk?,” 26 October 2013. [Online]. Available: www.tecchannel.de/netzwerk/lan/2038788/router_repeater_switch_hub_bridge_was_ist_was_im_netzwerk/. [Accessed 18 October 2013].Google Scholar
Popper, B., “Rhapsody Rebrands Itself as Napster because ¯\_()_/¯,” The Verge, 14 June 2016. [Online]. Available: www.theverge.com/2016/6/14/11936974/rhapsody-rebrands-as-napster. [Accessed 15 August 2016].Google Scholar
ISO/IEC, “ISO/IEC 29341- (1–13)-1:2008: Information Technology – UPnP Device Architecture,” ISO, Geneva, 2008.Google Scholar
Open Connectivity Forum (OCF), “About UPnP,” 1 January 2016. [Online]. Available: https://openconnectivity.org/upnp. [Accessed 23 August 2016].Google Scholar
DLNA, “About DLNA,” 2013. [Online]. Available: www.dlna.org/dlna-for-industry/about-dlna. [Accessed 1 November 2013].Google Scholar
Klein, P., “Support for Coordinated Shared Network in 802.1AVB,” January 2008. [Online]. Available: www.ieee802.org/1/files/public/docs2008/av-phkl-csn-0108-v1.pdf. [Accessed 1 November 2013].Google Scholar
Musical Instrument Digital Interface Manufacturers Association (MIDI), “IEEE Ethernet AVB, AVB and MIDI,” 2013. [Online]. Available: www.midi.org/techspecs/avbtp.php. [Accessed 2 November 2013, no longer available].Google Scholar
Felser, M. and Sauter, T., “Standardization of Industrial Ethernet – the Next Battlefield?,” in Proceedings of the IEEE 5th International Workshop on Factory Communication Systems, Vienna 22 September 2004.Google Scholar
Wikipedia, “Jumbo frame,” 16 September 2016. [Online]. Available: https://en.wikipedia.org/wiki/Jumbo_frame. [Accessed 5 October 2016].Google Scholar
Plummer, D. C., “An Ethernet Address Resolution Protocol,” November 1982. [Online]. Available: http://tools.ietf.org/html/rfc826. [Accessed 21 November 2013].Google Scholar
Postel, J., “Internet Control Message Protocol,” September 1981. [Online]. Available: http://tools.ietf.org/html/rfc792. [Accessed 21 November 2013].Google Scholar
Cain, B., Deering, S., Kouvelas, I., Fenner, B., and Thyagarajan, A., “Internet Group Management Protocol, Version 3,” October 2002. [Online]. Available: http://tools.ietf.org/html/rfc3376. [Accessed 21 November 2013].Google Scholar
Mogul, J. and Postel, J., “Internet Standard Subnetting Procedure,” August 1985. [Online]. Available: www.ietf.org/rfc/rfc950.txt. [Accessed 23 November 2013].Google Scholar
Braden, R. and Postel, J., “Requirements for Internet Gateways,” June 1987. [Online]. Available: www.ietf.org/rfc/rfc1009.txt. [Accessed 23 November 2013].Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×