1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
|
Network Working Group M. Foschiano
Request for Comments: 5171 Cisco Systems
Category: Informational April 2008
Cisco Systems UniDirectional Link Detection (UDLD) Protocol
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
IESG Note
This RFC is not a candidate for any level of Internet Standard. The
IETF disclaims any knowledge of the fitness of this RFC for any
purpose and in particular notes that the decision to publish is not
based on IETF review for such things as security, congestion control,
or inappropriate interaction with deployed protocols. The RFC Editor
has chosen to publish this document at its discretion. Readers of
this document should exercise caution in evaluating its value for
implementation and deployment. See RFC 3932 for more information.
Abstract
This document describes a Cisco Systems protocol that can be used to
detect and disable unidirectional Ethernet fiber or copper links
caused, for instance, by mis-wiring of fiber strands, interface
malfunctions, media converters' faults, etc. It operates at Layer 2
in conjunction with IEEE 802.3's existing Layer 1 fault detection
mechanisms.
This document explains the protocol objectives and applications,
illustrates the specific premises the protocol was based upon, and
describes the protocol architecture and related deployment issues to
serve as a possible base for future standardization.
Foschiano Informational [Page 1]
^L
RFC 5171 UDLD April 2008
Table of Contents
1. Introduction ....................................................2
2. Protocol Objectives and Applications ............................3
3. Protocol Design Premises ........................................4
4. Protocol Background .............................................4
5. Protocol Architecture ...........................................5
5.1. The Basics .................................................5
5.2. Neighbor Database Maintenance ..............................5
5.3. Event-driven Detection and Echoing .........................6
5.4. Event-based versus Event-less Detection ....................6
6. Packet Format ...................................................7
6.1. TLV Description ............................................9
7. Protocol Logic .................................................10
7.1. Protocol Timers ...........................................10
8. Comparison with Bidirectional Forwarding Detection .............11
9. Security Considerations ........................................11
10. Deployment Considerations .....................................11
11. Normative References ..........................................12
12. Informative Reference .........................................12
1. Introduction
Today's Ethernet-based switched networks often rely on the Spanning
Tree Protocol (STP) defined in the IEEE 802.1D standard [1] to create
a loop-free topology that is used to forward the traffic from a
source to a destination based on the Layer 2 packet information
learned by the switches and on the knowledge of the status of the
physical links along the path.
Issues arise when, due to mis-wirings or to hardware faults, the
communication path behaves abnormally and generates forwarding
anomalies. The simplest example of such anomalies is the case of a
bidirectional link that stops passing traffic in one direction and
therefore breaks one of the most basic assumptions that high-level
protocols typically depend upon: reliable two-way communication
between peers.
The purpose of the UDLD protocol is to detect the presence of
anomalous conditions in the Layer 2 communication channel, while
relying on the mechanisms defined by the IEEE in the 802.3 standard
[2] to properly handle conditions inherent to the physical layer.
Foschiano Informational [Page 2]
^L
RFC 5171 UDLD April 2008
2. Protocol Objectives and Applications
The UniDirectional Link Detection protocol (often referred to in
short as "UDLD") is a lightweight protocol that can be used to detect
and disable one-way connections before they create dangerous
situations such as Spanning Tree loops or other protocol
malfunctions.
The protocol's main goal is to advertise the identities of all the
capable devices attached to the same LAN segment and to collect the
information received on the ports of each device to determine if the
Layer 2 communication is happening in the appropriate fashion.
In a network that has an extensive fiber cabling plant, problems may
arise when incorrect patching causes a switch port to have its RX
fiber strand connected to one neighbor port and its TX fiber strand
connected to another. In these cases, a port may be deemed active if
it is receiving an optical signal on its RX strand. However, the
problem is that this link does not provide a valid communication path
at Layer 2 (and above).
If this scenario of wrongly connected fiber strands is applied to
multiple ports to create a fiber loop, each device in the loop could
directly send packets to a neighbor but would not be able to receive
from that neighbor.
Albeit the above scenario is rather extreme, it exemplifies how the
lack of mutual identification of the neighbors can bring protocols to
the wrong assumption that during a transmission the sender and the
receiver are always properly matched. Another equally dangerous
incorrect assumption is that the lack of reception of protocol
messages on a port unmistakably indicates the absence of transmitting
protocol entities at the other end of the link.
The UDLD protocol was implemented to help correct certain assumptions
made by other protocols, and in particular to help the Spanning Tree
Protocol to function properly so as to avoid the creation of
dangerous Layer 2 loops. It has been available on most Cisco Systems
switches for several years and is now part of numerous network design
best practices.
Foschiano Informational [Page 3]
^L
RFC 5171 UDLD April 2008
3. Protocol Design Premises
The current implementation of UDLD is based on the following
considerations/presuppositions:
o The protocol would have to be run in the control plane of a
network device to be flexible enough to support upgrades and
bug fixes. The control plane speed would ultimately be the
limiting factor to the capability of fast fault detection of
the protocol (CPU speed, task switching speed, event processing
speed, etc.). The transmission medium's propagation delay at
10 Mbps speed (or higher) would instead be considered a
negligible factor.
o Network events typically do not happen with optimal timing, but
rather at the speed determined by the software/firmware
infrastructure that controls them. (For psychological and
practical reasons, developers tend to choose round timer values
rather than determine the optimal value for the specific
software architecture in use. Also, software bugs, coding
oversights, slow process switching, implementation overhead can
all affect the control plane responsiveness and event timings.)
Hence it was deemed necessary to adopt a conservative protocol
design to minimize false positives during the detection
process.
o If a fault were discovered, it was assumed that the user would
want to keep the faulty port down for a predetermined amount of
time to avoid unnecessary port state flapping. For that
reason, a time-based fault recovery mechanism was provided
(although alternative recovery mechanisms are not implicitly
precluded by the protocol itself).
4. Protocol Background
UDLD is meant to be a Layer 2 detection protocol that works on top of
the existing Layer 1 detection mechanisms defined by the IEEE
standards. For example, the Far End Fault Indication (FEFI) function
for 100BaseFX interfaces and the Auto-Negotiation function for
100BaseTX/1000BaseX interfaces represent standard physical-layer
mechanisms to determine if the transmission media is bidirectional.
(Please see sections 24.3.2.1 and 28.2.3.5 of [2] for more details.)
The typical case of a Layer 1 "fault" indication is the "loss of
light" indication.
UDLD differs from the above-mentioned mechanisms insofar as it
performs mutual neighbor identification; in addition, it performs
neighbor acknowledgement on top of the Logical Link Control (LLC)
Foschiano Informational [Page 4]
^L
RFC 5171 UDLD April 2008
layer and thus is able to discover logical one-way miscommunication
between neighbors even when either one of the said PHY layer
mechanisms has deemed the transmission medium bidirectional.
5. Protocol Architecture
5.1. The Basics
UDLD uses two basic mechanisms:
a. It advertises a port's identity and learns about its neighbors
on a specific LAN segment; it keeps the acquired information on
the neighbors in a cache table.
b. It sends a train of echo messages in certain circumstances that
require fast notifications or fast resynchronization of the
cached information.
Because of the above, the algorithm run by UDLD requires that all the
devices connected to the same LAN segment be running the protocol in
order for a potential misconfiguration to be detected and for a
prompt corrective action to be taken.
5.2. Neighbor Database Maintenance
UDLD sends periodical "hello" packets (also called "advertisements"
or "probes") on every active interface to keep each device informed
about its neighbors. When a hello message is received, it is cached
and kept in memory at most for a defined time interval, called
"holdtime" or "time-to-live", after which the cache entry is
considered stale and is aged out.
If a new hello message is received when a correspondent old cache
entry has not been aged out yet, then the old entry is dropped and is
replaced by the new one with a reset time-to-live timer. Whenever an
interface gets disabled and UDLD is running, or whenever UDLD is
disabled on an interface, or whenever the device is reset, all
existing cache entries for the interfaces affected by the
configuration change are cleared, and UDLD sends at least one message
to inform the neighbors to flush the part of their caches also
affected by the status change. This mechanism is meant to keep the
caches coherent on all the connected devices.
Foschiano Informational [Page 5]
^L
RFC 5171 UDLD April 2008
5.3. Event-driven Detection and Echoing
The echoing mechanism is the base of UDLD's detection algorithm:
whenever a UDLD device learns about a new neighbor or receives a
resynchronization request from an out-of-synch neighbor, it
(re)starts the detection process on its side of the connection and
sends N echo messages in reply. (This mechanism implicitly assumes
that N packets are sufficient to get through a link and reach the
other end, even though some of them might get dropped during the
transmission.)
Since this behavior must be the same on all the neighbors, the sender
of the echoes expects to receive (after some time) an echo in reply.
If the detection process ends without the proper echo information
being received, and under specific conditions, the link is considered
to be unidirectional.
5.4. Event-based versus Event-less Detection
UDLD can function in two modes: normal mode and aggressive mode.
In normal mode, a protocol determination at the end of the detection
process is always based on information received in UDLD messages:
whether it's the information about the exchange of proper neighbor
identifications or the information about the absence of such proper
identifications. Hence, albeit bound by a timer, normal mode
determinations are always based on gleaned information, and as such
are "event-based". If no such information can be obtained (e.g.,
because of a bidirectional loss of connectivity), UDLD follows a
conservative approach based on the considerations in Section 3 and
deems a port to be in "undetermined" state. In other words, normal
mode will shut down a port only if it can explicitly determine that
the associated link is faulty for an extended period of time.
In contrast, in aggressive mode, UDLD will also shut down a port if
it loses bidirectional connectivity with the neighbor for the same
extended period of time mentioned above and subsequently fails
repeated last-resort attempts to re-establish communication with the
other end of the link. This mode of operation assumes that loss of
communication with the neighbor is a meaningful network event in
itself and is a symptom of a serious connectivity problem. Because
this type of detection can be event-less, and lack of information
cannot always be associated to an actual malfunction of the link,
this mode is optional and is recommended only in certain scenarios
(typically only on point-to-point links where no communication
failure between two neighbors is admissible).
Foschiano Informational [Page 6]
^L
RFC 5171 UDLD April 2008
6. Packet Format
The UDLD protocol runs on top of the LLC sub-layer of the data link
layer of the OSI model. It uses a specially assigned multicast
destination MAC address and encapsulates its messages using the
standard Subnetwork Access Protocol (SNAP) format as described in the
following:
Destination MAC address 01-00-0C-CC-CC-CC
UDLD SNAP format:
LLC value 0xAAAA03
Org Id 0x00000C
HDLC protocol type 0x0111
UDLD's Protocol Data Unit (PDU) format is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Ver | Opcode | Flags | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| List of TLVs (variable length list) |
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The TLV format is the basic one described below:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TYPE | LENGTH |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| VALUE |
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type (16 bits): If an implementation does not understand a Type
value, it should skip over it using the length field.
Length (16 bits): Length in bytes of the Type, Length, and Value
fields. In order for this field value to be valid, it should
be greater than or equal to the minimum allowed length, 4
bytes. If the value is less than the minimum, the whole packet
is to be considered corrupted and therefore it must be
discarded right away during the parsing process. TLVs should
not be split across packet boundaries.
Foschiano Informational [Page 7]
^L
RFC 5171 UDLD April 2008
Value (variable length): Object contained in the TLV.
The protocol header fields are defined as follows:
Ver (3 bits):
0x01: UDLD PDU version number
Opcode (5 bits):
0x00: Reserved
0x01: Probe message
0x02: Echo message
0x03: Flush message
0x04-0x1F: Reserved for future use
Flags (8 bits):
bit 0: Recommended timeout flag (RT)
bit 1: ReSynch flag (RSY)
bit 2-7: Reserved for future use
PDU Checksum (16 bits):
IP-like checksum. Take the one's complement of the one's
complement sum (with the modification that the odd byte at the
end of an odd length message is used as the low 8 bits of an
extra word, rather than as the high 8 bits.) NB: All UDLD
implementations must comply with this specification.
The list of currently defined TLVs comprises:
Name Type Value format
Device-ID TLV 0x0001 ASCII character string
Port-ID TLV 0x0002 ASCII character string
Echo TLV 0x0003 List of ID pairs
Message Interval TLV 0x0004 8-bit unsigned integer
Timeout Interval TLV 0x0005 8-bit unsigned integer
Device Name TLV 0x0006 ASCII character string
Sequence Number TLV 0x0007 32-bit unsigned integer
Reserved TLVs > 0x0007 Format unknown.
To be skipped by parsing routine.
Foschiano Informational [Page 8]
^L
RFC 5171 UDLD April 2008
6.1. TLV Description
Device-ID TLV:
This TLV uniquely identifies the device that is sending the UDLD
packet. The TLV length field determines the length of the carried
identifier and must be greater than zero. In version 1 of the
protocol, the lack of this ID is considered a symptom of packet
corruption that implies that the message is invalid and must be
discarded.
Port-ID TLV:
This TLV uniquely identifies the physical port the UDLD packet is
sent on. The TLV length field determines the length of the
carried identifier and must be greater than zero. In version 1 of
the protocol, the lack of this ID is considered a symptom of
packet corruption that implies that the message is invalid and
must be discarded.
Echo TLV:
This TLV contains the list of valid DeviceID/PortID pairs received
by a port from all its neighbors. If either one of the
identifiers in a pair is corrupted, the message will be ignored.
This list includes only DeviceIDs and PortIDs extracted from UDLD
messages received and cached on the same interface on which this
TLV is sent. If no UDLD messages are received, then this TLV is
sent containing zero pairs. Despite its name, this TLV must be
present in both probe and echo messages, whereas in flush messages
it's not required.
Message Interval TLV:
This required TLV contains the 8-bit time interval value used by a
neighbor to send UDLD probes after the linkup or detection phases.
Its time unit is 1 second. The holdtime of a cache item for a
received message is calculated as (advertised-message-interval x
R), where R is a constant called "TTL to message interval ratio".
Timeout Interval TLV:
This optional TLV contains the 8-bit timeout interval value (T)
used by UDLD to decide the basic length of the detection phase.
Its time unit is 1 second. If it's not present in an
advertisement, T is assumed to be a hard-coded constant.
Foschiano Informational [Page 9]
^L
RFC 5171 UDLD April 2008
Device Name TLV:
This required TLV is meant to be used by the CLI or SNMP and
typically contains the user-readable device name string.
Sequence Number TLV:
The purpose of this optional TLV is to inform the neighbors of the
sequence number of the current message being transmitted. A
counter from 1 to 2^32-1 is supposed to keep track of the sequence
number; it is reset whenever a transition of phase occurs so that
it will restart counting from one, for instance, whenever an echo
message sequence is initiated, or whenever a linkup message train
is triggered.
No wraparound of the counter is supposed to happen.
The zero value is reserved and can be used as a representation of
a missing or invalid sequence number by the user interface.
Therefore, the TLV should never contain zero. (NB: The use of
this TLV is currently limited only to informational purposes.)
7. Protocol Logic
UDLD's protocol logic relies on specific internal timers and is
sensitive to certain network events.
The type of messages that UDLD transmits and the timing intervals
that it uses are dependent upon the internal state of the protocol,
which changes based on network events such as:
o Link up
o Link down
o Protocol enabled
o Protocol disabled
o New neighbor discovery
o Neighbor state change
o Neighbor resynchronization requests
7.1. Protocol Timers
UDLD timer values could vary within certain "safety" ranges based on
the considerations in Section 3. However, in practice, in the
current implementation, timers use only certain values verified
during testing. Their time unit is one second.
During the detection phase, messages are exchanged at the maximum
possible rate of one per second. After that, if the protocol reaches
Foschiano Informational [Page 10]
^L
RFC 5171 UDLD April 2008
a stable state and can make a certain determination on the
"bidirectionality" of the link, the message interval is increased to
a configurable value based on a curve known as M1(t), a time-based
function.
In case the link is deemed anything other than bidirectional at the
end of the detection, this curve is a flat line with a fixed value of
Mfast (7 seconds in the current implementation).
In case the link is instead deemed bidirectional, the curve will use
Mfast for the first 4 subsequent message transmissions and then will
transition to an Mslow value for all other steady-state
transmissions. Mslow can be either a fixed value (60 seconds in some
obsolete implementations) or a user-configurable value (between Mfast
and 90 seconds with a default of 15 seconds in the current
implementations).
8. Comparison with Bidirectional Forwarding Detection
Similarly to UDLD, the Bidirectional Forwarding Detection (BFD) [3]
protocol is intended to detect faults in the path between two network
nodes. However, BFD is supposed to operate independently of media,
data protocols, and routing protocols. There is no address discovery
mechanism in BFD, which is left to the application to determine.
On the other hand, UDLD works exclusively on top of a L2 transport
supporting the SNAP encapsulation and operates independently of the
other bridge protocols (UDLD's main "applications"), with which it
has limited interaction. It also performs full neighbor discovery on
point-to-point and point-to-multipoint media.
9. Security Considerations
In a heterogeneous Layer 2 network that is built with different
models of network devices or with devices running different software
images, the UDLD protocol should be supported and configured on all
ports interconnecting said devices in order to achieve a complete
coverage of its detection process. Note that UDLD is not supposed to
be used on ports connected to untrusted devices or incapable devices;
hence, it should be disabled on such ports.
10. Deployment Considerations
Cisco Systems has supported the UDLD protocol in its Catalyst family
of switches since 1999.
Foschiano Informational [Page 11]
^L
RFC 5171 UDLD April 2008
11. Normative References
[1] IEEE 802.1D-2004 Standard -- Media access control (MAC) Bridges
[2] IEEE 802.3-2002 IEEE Standard -- Local and metropolitan area
networks Specific requirements--Part 3: Carrier Sense Multiple
Access with Collision Detection (CSMA/CD) Access Method and
Physical Layer Specifications
12. Informative Reference
[3] Katz, D., and D. Ward, "Bidirectional Forwarding Detection",
Work in Progress, March 2008.
Author's Address
Marco Foschiano
Cisco Systems, Inc.
Via Torri Bianche 7,
20059 Vimercate (Mi)
Italy
EMail: foschia@cisco.com
Foschiano Informational [Page 12]
^L
RFC 5171 UDLD April 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78 and at http://www.rfc-editor.org/copyright.html,
and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Foschiano Informational [Page 13]
^L
|