intarea-5----Page:9
1  2  3  4  5  6  7  8  9  10 

Problems Remaining To Be Solved
How does the upstream modify a packet to indicate the level of trust that it places in the packets source address
How does the downstream know when the upstream has really done the checking that it claims to have done
PPT Version