Difference between revisions of "RFC1380"

From RFC-Wiki
imported>Admin
(Created page with " Network Working Group P. Gross Request for Comments: 1380 IESG Chair ...")
 
Line 1: Line 1:
 
  
  
Line 10: Line 9:
 
                                                     IESG Internet AD
 
                                                     IESG Internet AD
 
                                                         November 1992
 
                                                         November 1992
 
  
 
           IESG Deliberations on Routing and Addressing
 
           IESG Deliberations on Routing and Addressing
 
 
Status Of This Memo
 
Status Of This Memo
 
 
This memo provides information for the Internet community.  It does
 
This memo provides information for the Internet community.  It does
 
not specify an Internet standard.  Distribution of this memo is
 
not specify an Internet standard.  Distribution of this memo is
 
unlimited.
 
unlimited.
 
 
Abstract
 
Abstract
 
 
This memo summarizes issues surrounding the routing and addressing
 
This memo summarizes issues surrounding the routing and addressing
 
scaling problems in the IP architecture, and it provides a brief
 
scaling problems in the IP architecture, and it provides a brief
 
background of the ROAD group and related activities in the Internet
 
background of the ROAD group and related activities in the Internet
 
Engineering Task Force (IETF).
 
Engineering Task Force (IETF).
 
 
It also provides a preliminary report of the Internet Engineering
 
It also provides a preliminary report of the Internet Engineering
 
Steering Group (IESG) deliberations on how these routing and
 
Steering Group (IESG) deliberations on how these routing and
 
addressing issues should be pursued in the Internet Architecture
 
addressing issues should be pursued in the Internet Architecture
 
Board (IAB)/IETF.
 
Board (IAB)/IETF.
 
 
Acknowledgements
 
Acknowledgements
 
 
This note draws principally from two sources: the output from the
 
This note draws principally from two sources: the output from the
 
ROAD group, as reported at the San Diego IETF meeting, and on
 
ROAD group, as reported at the San Diego IETF meeting, and on
Line 42: Line 33:
 
bibliography, based on previous bibliographies by Lyman Chapin and
 
bibliography, based on previous bibliographies by Lyman Chapin and
 
bibliographies distributed on the Big-Internet mailing list.
 
bibliographies distributed on the Big-Internet mailing list.
 +
Table of Contents
 +
1. INTRODUCTION..................................................  2
 +
2.  ISSUES OF GROWTH AND EVOLUTION IN THE INTERNET...............  3
 +
2.1  The Problems................................................  3
 +
2.2  Possible Solutions..........................................  5
 +
3. PREPARING FOR ACTION..........................................  7
 +
3.1 The IAB Architecture Retreats................................  7
 +
3.2 The Santa Fe IETF............................................  7
 +
3.3 The ROAD Group and beyond....................................  8
  
 +
 +
 +
 +
 +
 +
 +
4. SETTING DIRECTIONS FOR THE IETF............................... 10
 +
4.1 The Need For Interim Solutions............................... 10
 +
4.2 The Proposed Phases.......................................... 10
 +
4.3 A Solution For Routing Table Explosion -- CIDR............... 12
 +
4.4 Regarding "IP Address Exhaustion"............................ 13
 +
4.5 Milestones And Timetable For Making a Recommendation for
 +
    "Bigger Internet Addresses".................................. 14
 +
5. SUMMARY....................................................... 15
 +
Appendix A. FOR MORE INFORMATION................................. 16
 +
Appendix B. INFORMATION AND SELECTION CRITERIA FOR "BIGGER
 +
            INTERNET ADDRESSES".................................. 16
 +
Appendix C. BIBLIOGRAPHY......................................... 20
 +
Security Considerations.......................................... 21
 +
Authors' Addresses............................................... 22
 
== INTRODUCTION ==
 
== INTRODUCTION ==
 
 
It seems unlikely that the designers of IP ever imagined at the time
 
It seems unlikely that the designers of IP ever imagined at the time
 
what phenomenal success the Internet would achieve.  Internet
 
what phenomenal success the Internet would achieve.  Internet
Line 57: Line 76:
 
within a few years may well include network connections in every
 
within a few years may well include network connections in every
 
country.
 
country.
 
 
Over the past couple of years, we have seen increasingly strong
 
Over the past couple of years, we have seen increasingly strong
 
indications that all of this success will stress the limits of IP
 
indications that all of this success will stress the limits of IP
Line 66: Line 84:
 
who have to manage them.  Somewhat longer-term, it is possible that
 
who have to manage them.  Somewhat longer-term, it is possible that
 
we will run out of host addresses or network numbers altogether.
 
we will run out of host addresses or network numbers altogether.
 
 
While these problems could be avoided by attempting to restrict the
 
While these problems could be avoided by attempting to restrict the
 
growth of the Internet, most people would prefer solutions that allow
 
growth of the Internet, most people would prefer solutions that allow
Line 72: Line 89:
 
possible, and that, in fact, our biggest problem is having too many
 
possible, and that, in fact, our biggest problem is having too many
 
possible solutions rather than too few.
 
possible solutions rather than too few.
 
 
This memo provides a preliminary report of IESG deliberations on how
 
This memo provides a preliminary report of IESG deliberations on how
 
routing and addressing issues can be pursued in the IAB/IETF.
 
routing and addressing issues can be pursued in the IAB/IETF.
 +
 +
  
  
Line 87: Line 105:
 
Ultimately, the IESG will issue a recommendation from the IESG/IETF
 
Ultimately, the IESG will issue a recommendation from the IESG/IETF
 
to the IAB.
 
to the IAB.
 
+
== ISSUES OF GROWTH AND EVOLUTION IN THE INTERNET ==
== ISSUES OF GROWTH AND EVOLUTION IN THE INTERNET ==
+
=== The Problems ===
 
 
2.1 The Problems
 
 
 
 
The Internet now faces three growth-related problems:
 
The Internet now faces three growth-related problems:
 
 
   - Class B network number exhaustion - Routing table explosion
 
   - Class B network number exhaustion - Routing table explosion
 
   - IP address space exhaustion
 
   - IP address space exhaustion
 
+
==== Class B Network Number Exhaustion ====
2.1.1 Class B Network Number Exhaustion
 
 
 
 
Over the last several years, the number of network numbers assigned
 
Over the last several years, the number of network numbers assigned
 
and the number of network numbers configured into the Merit NSFnet
 
and the number of network numbers configured into the Merit NSFnet
Line 105: Line 117:
 
of corrective measures, it will take less than 2 years to allocate
 
of corrective measures, it will take less than 2 years to allocate
 
all of the currently unassigned Class B network numbers.
 
all of the currently unassigned Class B network numbers.
 
 
After that, new sites which wished to connect more than the number of
 
After that, new sites which wished to connect more than the number of
 
hosts possible in a single Class C (253 hosts) would need to be
 
hosts possible in a single Class C (253 hosts) would need to be
 
assigned multiple Class C networks.  This will exacerbate the routing
 
assigned multiple Class C networks.  This will exacerbate the routing
 
table explosion problems described next.
 
table explosion problems described next.
 
+
==== Routing Table Explosion ====
==== Routing Table Explosion ====
 
 
 
 
As the number of networks connected to the Internet has grown, the
 
As the number of networks connected to the Internet has grown, the
 
amount of routing information that has to be passed around to keep
 
amount of routing information that has to be passed around to keep
 
track of them all is likewise growing.  This is leading to two types
 
track of them all is likewise growing.  This is leading to two types
 
of problems.
 
of problems.
 
 
Hardware and Protocol Limits
 
Hardware and Protocol Limits
 
 
Routing protocols must pass around this information, and routers must
 
Routing protocols must pass around this information, and routers must
 
store and use it.  This taxes memory limits in the routers, and can
 
store and use it.  This taxes memory limits in the routers, and can
Line 125: Line 132:
 
used, (such as EGP and RIP, which were designed for a much smaller
 
used, (such as EGP and RIP, which were designed for a much smaller
 
number of networks).
 
number of networks).
 
 
The limits on the memory in the routers seem to be the most pressing.
 
The limits on the memory in the routers seem to be the most pressing.
 
It is already the case that the routers used in the MILNET are
 
It is already the case that the routers used in the MILNET are
 
incapable of handling all of the current routes, and most other
 
incapable of handling all of the current routes, and most other
 +
 +
  
  
Line 143: Line 151:
 
O(64000) routes, which should be adequate for an additional two years
 
O(64000) routes, which should be adequate for an additional two years
 
if the above Class B Network Number Exhaustion problem is solved.
 
if the above Class B Network Number Exhaustion problem is solved.
 
 
Human Limits
 
Human Limits
 
 
The number of routes does not merely tax the network's physical
 
The number of routes does not merely tax the network's physical
 
plant.  Network operators have found that the inter-domain routing
 
plant.  Network operators have found that the inter-domain routing
Line 154: Line 160:
 
traffic monitoring to determine whether the configuration has been
 
traffic monitoring to determine whether the configuration has been
 
done correctly) becomes increasingly difficult and time-consuming.
 
done correctly) becomes increasingly difficult and time-consuming.
 
 
Although it is not possible to determine a number of networks (and
 
Although it is not possible to determine a number of networks (and
 
therefore a time frame) where human limits will be exceeded, network
 
therefore a time frame) where human limits will be exceeded, network
 
operators view this as a significant short-term problem.
 
operators view this as a significant short-term problem.
 
+
==== IP Address Exhaustion ====
==== IP Address Exhaustion ====
 
 
 
 
If the current exponential growth rate continues unabated, the number
 
If the current exponential growth rate continues unabated, the number
 
of computers connected to the Internet will eventually exceed the
 
of computers connected to the Internet will eventually exceed the
Line 166: Line 169:
 
into "network" and "host" portions, we may not ever fully run out of
 
into "network" and "host" portions, we may not ever fully run out of
 
IP addresses because we will run out of IP network numbers first.
 
IP addresses because we will run out of IP network numbers first.
 
 
There is considerable uncertainty regarding the timeframe when we
 
There is considerable uncertainty regarding the timeframe when we
 
might exceed the limits of the IP address space.  However, the issue
 
might exceed the limits of the IP address space.  However, the issue
Line 172: Line 174:
 
very important that we develop solutions to this potential problem
 
very important that we develop solutions to this potential problem
 
well before we are in danger of actually running out of addresses.
 
well before we are in danger of actually running out of addresses.
 
+
==== Other Internetwork Layer Issues ====
==== Other Internetwork Layer Issues ====
 
 
 
 
Although the catalog of problems above is pretty complete as far as
 
Although the catalog of problems above is pretty complete as far as
 
the scaling problems of the Internet are concerned, there are other
 
the scaling problems of the Internet are concerned, there are other
Line 180: Line 180:
 
years.  These are issues regarding advanced functionality and service
 
years.  These are issues regarding advanced functionality and service
 
guarantees in the Internet layer.
 
guarantees in the Internet layer.
 +
In any attempt to resolve the Internet scaling problems, it is
 +
  
In any attempt to resolve the Internet scaling problems, it is
 
  
  
Line 189: Line 190:
 
important to consider how these other issues might affect the future
 
important to consider how these other issues might affect the future
 
evolution of Internet layer protocols.  These issues include:
 
evolution of Internet layer protocols.  These issues include:
 
 
     1)  Policy-based routing
 
     1)  Policy-based routing
 
     2)  Flow control
 
     2)  Flow control
Line 195: Line 195:
 
     4)  Service guarantees (strong QOS)
 
     4)  Service guarantees (strong QOS)
 
     5)  Charging
 
     5)  Charging
 
+
=== Possible Solutions ===
2.2 Possible Solutions
+
==== Class B Network Number Exhaustion ====
 
 
==== Class B Network Number Exhaustion ====
 
 
 
 
A number of approaches have been suggested for how we might slow the
 
A number of approaches have been suggested for how we might slow the
 
exhaustion of the Class B IP addresses.  These include:
 
exhaustion of the Class B IP addresses.  These include:
 
 
   1)  Reclaiming those Class B network numbers which have been
 
   1)  Reclaiming those Class B network numbers which have been
 
   assigned but are either unused or used by networks which are not
 
   assigned but are either unused or used by networks which are not
 
   connected to the Internet.
 
   connected to the Internet.
 
 
   2)  Modifying address assignment policies to slow the assignment
 
   2)  Modifying address assignment policies to slow the assignment
 
   of Class B network numbers by assigning multiple Class C network
 
   of Class B network numbers by assigning multiple Class C network
 
   numbers to organizations which are only a little bit to big to be
 
   numbers to organizations which are only a little bit to big to be
 
   accommodated by a Class C network number.
 
   accommodated by a Class C network number.
 
 
       Note: It is already the case that a Class B number is assigned
 
       Note: It is already the case that a Class B number is assigned
 
       only if the applicant would need more than "several" Class C
 
       only if the applicant would need more than "several" Class C
 
       networks.  The value of "several" has increased over time from
 
       networks.  The value of "several" has increased over time from
 
       1 to (currently) 32.
 
       1 to (currently) 32.
 
 
   3)  Use the Class C address space to form aggregations of
 
   3)  Use the Class C address space to form aggregations of
 
   different size than the normal normal Class C addresses.  Such
 
   different size than the normal normal Class C addresses.  Such
 
   schemes include Classless Inter-Domain Routing (CIDR) [Fuller92]
 
   schemes include Classless Inter-Domain Routing (CIDR) [Fuller92]
 
   and the C# scheme [Solen92].
 
   and the C# scheme [Solen92].
 
+
==== Routing Table Explosion ====
==== Routing Table Explosion ====
 
 
 
 
As was described earlier, there are actually two parts to this
 
As was described earlier, there are actually two parts to this
 
problem.  They each have slightly different possible approaches:
 
problem.  They each have slightly different possible approaches:
 
 
Hardware and Protocol Limits
 
Hardware and Protocol Limits
 
 
   1) More thrust.  We could simply recognize the fact that routers
 
   1) More thrust.  We could simply recognize the fact that routers
 
   which need full Internet routing information will require large
 
   which need full Internet routing information will require large
Line 234: Line 223:
 
   short-term approach, and we will always need to face this problem
 
   short-term approach, and we will always need to face this problem
 
   in the long-term.
 
   in the long-term.
 +
 +
  
  
Line 246: Line 237:
 
   would request routes from the server as needed (presumably caching
 
   would request routes from the server as needed (presumably caching
 
   to improve performance).
 
   to improve performance).
 
 
   3) Topology engineering.  Many network providers already try to
 
   3) Topology engineering.  Many network providers already try to
 
   design their networks in such a way that only a few of the routers
 
   design their networks in such a way that only a few of the routers
Line 253: Line 243:
 
   to).  While this is inconvenient for network operators, it is a
 
   to).  While this is inconvenient for network operators, it is a
 
   trend which is likely to continue.
 
   trend which is likely to continue.
 
 
   It is also the case that network providers could further reduce
 
   It is also the case that network providers could further reduce
 
   the number of routers which need full routing information by
 
   the number of routers which need full routing information by
 
   accepting some amount of suboptimal routing or reducing alternate
 
   accepting some amount of suboptimal routing or reducing alternate
 
   paths used for backup.
 
   paths used for backup.
 
 
   4) Charging-based solutions.  By charging for network number
 
   4) Charging-based solutions.  By charging for network number
 
   advertisements, it might be possible to discourage sites from
 
   advertisements, it might be possible to discourage sites from
 
   connecting more networks to the Internet than they get significant
 
   connecting more networks to the Internet than they get significant
 
   value from having connected.
 
   value from having connected.
 
 
   5) Aggregation of routing information.  It is fairly clear that in
 
   5) Aggregation of routing information.  It is fairly clear that in
 
   the long-term it will be necessary for addresses to be more
 
   the long-term it will be necessary for addresses to be more
Line 272: Line 259:
 
   aggregation in the short-term.  All longer-term proposals should
 
   aggregation in the short-term.  All longer-term proposals should
 
   aggregation.
 
   aggregation.
 
 
Human Limits
 
Human Limits
 
 
   1) Additional human resources.  Network providers could devote
 
   1) Additional human resources.  Network providers could devote
 
   additional manpower to routing management, or accept the
 
   additional manpower to routing management, or accept the
Line 280: Line 265:
 
   obviously unattractive as anything other than a very short-term
 
   obviously unattractive as anything other than a very short-term
 
   solution.
 
   solution.
 
 
   2) Better tools.  Network operators and router vendors could work
 
   2) Better tools.  Network operators and router vendors could work
 
   to develop more powerful paradigms and mechanisms for routing
 
   to develop more powerful paradigms and mechanisms for routing
 
   management.
 
   management.
 
 
   The IETF has already undertaken some work in the areas of route
 
   The IETF has already undertaken some work in the areas of route
 
   filtering and route leaking.
 
   filtering and route leaking.
Line 293: Line 276:
  
  
==== IP Address Exhaustion ====
 
  
 +
 +
====  IP Address Exhaustion ====
 
The following general approaches have been suggested for dealing with
 
The following general approaches have been suggested for dealing with
 
the possible exhaustion of the IP address space:
 
the possible exhaustion of the IP address space:
 
 
   1) Protocol modifications to provide a larger address space.  By
 
   1) Protocol modifications to provide a larger address space.  By
 
   enhancing IP or by transitioning to another protocol with a larger
 
   enhancing IP or by transitioning to another protocol with a larger
 
   address space, we could substantially increase the number of
 
   address space, we could substantially increase the number of
 
   available network numbers and addresses.
 
   available network numbers and addresses.
 
 
   2) Addresses which are not globally unique.  Several proposed
 
   2) Addresses which are not globally unique.  Several proposed
 
   schemes have emerged whereby a host's domain name is globally
 
   schemes have emerged whereby a host's domain name is globally
 
   unique, but its IP address would be unique only within it's local
 
   unique, but its IP address would be unique only within it's local
 
   routing domain.  These schemes usually involve address translating
 
   routing domain.  These schemes usually involve address translating
 
 
   3) Partitioned Internet.  The Internet could be partitioned into
 
   3) Partitioned Internet.  The Internet could be partitioned into
 
   areas, such that a host's IP address would be unique only within
 
   areas, such that a host's IP address would be unique only within
Line 313: Line 294:
 
   gateways to interconnect the areas.  This is not unlike the
 
   gateways to interconnect the areas.  This is not unlike the
 
   approach often used to connect differing protocol families.
 
   approach often used to connect differing protocol families.
 
 
   4) Reclaiming network numbers.  Network numbers which are not
 
   4) Reclaiming network numbers.  Network numbers which are not
 
   used, or are used by networks which are not connected to the
 
   used, or are used by networks which are not connected to the
Line 320: Line 300:
 
   interim if for some reason address exhaustion starts to occur
 
   interim if for some reason address exhaustion starts to occur
 
   unexpectedly soon.
 
   unexpectedly soon.
 
 
== PREPARING FOR ACTION ==
 
== PREPARING FOR ACTION ==
 
+
=== The IAB Architecture Retreats ===
3.1 The IAB Architecture Retreats
 
 
 
 
In July 1991, the IAB held a special workshop to consider critical
 
In July 1991, the IAB held a special workshop to consider critical
 
issues in the IP architecture (Clark91).  Of particular concern were
 
issues in the IP architecture (Clark91).  Of particular concern were
Line 334: Line 311:
 
critical issues, and to meet jointly with the then-formed ROAD group
 
critical issues, and to meet jointly with the then-formed ROAD group
 
(see below).
 
(see below).
 
+
=== The Santa Fe IETF ===
3.2 The Santa Fe IETF
 
 
 
 
At the November 1991 Santa Fe IETF meeting, the BGP Working Groups
 
At the November 1991 Santa Fe IETF meeting, the BGP Working Groups
 
independently began a concerted exploration of the issues of routing
 
independently began a concerted exploration of the issues of routing
 
table scaling.  The principal approach was to perform route
 
table scaling.  The principal approach was to perform route
 
aggregation by using address masks in BGP to do "supernetting"
 
aggregation by using address masks in BGP to do "supernetting"
 +
 +
  
  
Line 349: Line 326:
 
into CIDR.  The BGP WG decided to form a separate subgroup, to be led
 
into CIDR.  The BGP WG decided to form a separate subgroup, to be led
 
by Phill Gross (ANS) to pursue this solution.
 
by Phill Gross (ANS) to pursue this solution.
 
+
=== The ROAD Group and Beyond ===
3.3 The ROAD Group and Beyond
 
 
 
 
At the Santa Fe IETF, the initially separate IAB and BGP WG
 
At the Santa Fe IETF, the initially separate IAB and BGP WG
 
activities were combined into a special effort, named the "ROuting
 
activities were combined into a special effort, named the "ROuting
 
and ADdressing (ROAD) Group", to be co-chaired by Ford and Gross.
 
and ADdressing (ROAD) Group", to be co-chaired by Ford and Gross.
 
 
The group was asked to explore possible near-term approaches for the
 
The group was asked to explore possible near-term approaches for the
 
scaling problems described in the last section, namely:
 
scaling problems described in the last section, namely:
 
 
     - Class B address exhaustion
 
     - Class B address exhaustion
 
     - Routing table explosion
 
     - Routing table explosion
 
     - IP address space exhaustion
 
     - IP address space exhaustion
 
 
The ROAD group was asked to report back to the IETF at the San Diego
 
The ROAD group was asked to report back to the IETF at the San Diego
 
IETF (March 1992).  Suggested guidelines included minimizing changes
 
IETF (March 1992).  Suggested guidelines included minimizing changes
 
to hosts, must be incrementally deployable, and must provide support
 
to hosts, must be incrementally deployable, and must provide support
 
for a billion networks.
 
for a billion networks.
 
 
The ROAD group was not a traditional open IETF working group.  It was
 
The ROAD group was not a traditional open IETF working group.  It was
 
always presumed that this was a one-time special group that would
 
always presumed that this was a one-time special group that would
 
lead to the formation of other IETF WGs after its report in San
 
lead to the formation of other IETF WGs after its report in San
 
Diego.
 
Diego.
 
 
The ROAD group held several face-face meetings between the November
 
The ROAD group held several face-face meetings between the November
 
1991 (Santa Fe) and March 1992 (San Diego) IETF meetings.  This
 
1991 (Santa Fe) and March 1992 (San Diego) IETF meetings.  This
Line 379: Line 349:
 
architecture workshop), and January 1992 in Arizona).  There was also
 
architecture workshop), and January 1992 in Arizona).  There was also
 
much discussion by electronic mail.
 
much discussion by electronic mail.
 
 
The group produced numerous documents, which have variously been made
 
The group produced numerous documents, which have variously been made
 
available as Internet-Drafts or RFCs (see Bibliography in Appendix
 
available as Internet-Drafts or RFCs (see Bibliography in Appendix
 
D).
 
D).
 
 
As follow-up, the ROAD co-chairs reported to the IETF plenary in
 
As follow-up, the ROAD co-chairs reported to the IETF plenary in
 
March 1992 in San Diego.  Plus, several specific ROAD-related
 
March 1992 in San Diego.  Plus, several specific ROAD-related
 
activities took place during the IETF meeting that week.
 
activities took place during the IETF meeting that week.
 
 
The Ford/Gross presentation served as a preliminary report from the
 
The Ford/Gross presentation served as a preliminary report from the
 
ROAD group.  The basic thrust was:
 
ROAD group.  The basic thrust was:
 
 
   1.  The Internet community needs a better way to deal with current
 
   1.  The Internet community needs a better way to deal with current
 
   addresses (e.g., hierarchical address assignments for routing
 
   addresses (e.g., hierarchical address assignments for routing
 
   aggregation to help slow Class B exhaustion and routing table
 
   aggregation to help slow Class B exhaustion and routing table
 +
 +
  
  
Line 401: Line 369:
 
   explosion).  Classless Inter-Domain Routing (CIDR; also called
 
   explosion).  Classless Inter-Domain Routing (CIDR; also called
 
   "supernetting") was recommended.  CIDR calls for:
 
   "supernetting") was recommended.  CIDR calls for:
 
 
     - The development of a plan for hierarchical IP address
 
     - The development of a plan for hierarchical IP address
 
       assignment for aggregation in routing,
 
       assignment for aggregation in routing,
 
 
     - Enhanced "classless" Inter-domain protocols (i.e., carry
 
     - Enhanced "classless" Inter-domain protocols (i.e., carry
 
       address masks along with IP addresses),
 
       address masks along with IP addresses),
 
 
     - Inter-Domain routing "Usage documents" for using addressing
 
     - Inter-Domain routing "Usage documents" for using addressing
 
       and routing plan with the enhanced inter-domain protocols,
 
       and routing plan with the enhanced inter-domain protocols,
 
       and for interacting with IGPs.
 
       and for interacting with IGPs.
 
 
   2.  The Internet community needs bigger addresses for the Internet
 
   2.  The Internet community needs bigger addresses for the Internet
 
   to stem IP address exhaustion.  The ROAD group explored several
 
   to stem IP address exhaustion.  The ROAD group explored several
Line 417: Line 381:
 
   at the San Diego IETF.  However, a final recommendation of a
 
   at the San Diego IETF.  However, a final recommendation of a
 
   single approach did not emerge.
 
   single approach did not emerge.
 
 
   3.  The Internet community needs to focus more effort on future
 
   3.  The Internet community needs to focus more effort on future
 
   directions for Internet routing and advanced Internet layer
 
   directions for Internet routing and advanced Internet layer
 
   features.
 
   features.
 
 
Other ROAD-related activities at the San Diego IETF meeting included:
 
Other ROAD-related activities at the San Diego IETF meeting included:
 
 
   - Monday,  8:00 - 9:00 am,  Report from the ROAD group on
 
   - Monday,  8:00 - 9:00 am,  Report from the ROAD group on
 
   "Internet Routing and Addressing Considerations",
 
   "Internet Routing and Addressing Considerations",
 
 
   - Monday,  9:30-12:00pm,  Geographical Addressing and Routing
 
   - Monday,  9:30-12:00pm,  Geographical Addressing and Routing
 
   (during NOOP WG session),
 
   (during NOOP WG session),
 
 
   - Monday,  1:30-3:30pm,  Preliminary discussion of a CIDR routing
 
   - Monday,  1:30-3:30pm,  Preliminary discussion of a CIDR routing
 
   and addressing plan  (during ORAD session),
 
   and addressing plan  (during ORAD session),
 
 
   - Tuesday,  1:30-6:00pm,  Internet Routing and Addressing BOF (to
 
   - Tuesday,  1:30-6:00pm,  Internet Routing and Addressing BOF (to
 
   discuss ROAD results and to explore approaches for bigger Internet
 
   discuss ROAD results and to explore approaches for bigger Internet
 
   address space),
 
   address space),
 
 
   - Wednesday,  1:30-3:30pm,  CIDR Supernetting BOF (joint with BGP
 
   - Wednesday,  1:30-3:30pm,  CIDR Supernetting BOF (joint with BGP
 
   WG),
 
   WG),
 
 
   - Thursday,  4:00-6:00pm,  Summary of ROAD activities in San Diego
 
   - Thursday,  4:00-6:00pm,  Summary of ROAD activities in San Diego
 
   followed by open plenary discussion.
 
   followed by open plenary discussion.
 
 
The slides for the Monday presentation (Ford92), slides for the
 
The slides for the Monday presentation (Ford92), slides for the
 
Thursday summary (and notes in the Chair's message) (Gross92), and
 
Thursday summary (and notes in the Chair's message) (Gross92), and
Line 452: Line 407:
  
  
== SETTING DIRECTIONS FOR THE IETF ==
 
  
4.1 The Need For Interim Solutions
 
  
 +
== SETTING DIRECTIONS FOR THE IETF ==
 +
=== The Need For Interim Solutions ===
 
Solutions to the problems of advanced Internet layer functionality
 
Solutions to the problems of advanced Internet layer functionality
 
are far from being well understood.  While we should certainly
 
are far from being well understood.  While we should certainly
Line 461: Line 416:
 
engineering effort for an Internet layer which would solve not only
 
engineering effort for an Internet layer which would solve not only
 
the scaling problems but also those other issues.
 
the scaling problems but also those other issues.
 
 
Plus, most approaches to the problem of IP address space exhaustion
 
Plus, most approaches to the problem of IP address space exhaustion
 
involve changes to the Internet layer.  Such approaches mean changes
 
involve changes to the Internet layer.  Such approaches mean changes
 
changes to host software that will require us to face the very
 
changes to host software that will require us to face the very
 
difficult transition of a large installed base.
 
difficult transition of a large installed base.
 
 
It is therefore not likely that we can (a) develop a single solution
 
It is therefore not likely that we can (a) develop a single solution
 
for the near-term scaling problems that will (b) also solve the
 
for the near-term scaling problems that will (b) also solve the
Line 473: Line 426:
 
problems of Class B exhaustion or routing table explosion confront
 
problems of Class B exhaustion or routing table explosion confront
 
us.
 
us.
 
 
This line of reasoning leads to the inevitable conclusion that we
 
This line of reasoning leads to the inevitable conclusion that we
 
will need to make major enhancements to IP in (at least) two stages.
 
will need to make major enhancements to IP in (at least) two stages.
 
 
Therefore, we will consider interim measures to deal with Class B
 
Therefore, we will consider interim measures to deal with Class B
 
address exhaustion and routing table explosion (together), and to
 
address exhaustion and routing table explosion (together), and to
 
deal with IP address exhaustion (separately).
 
deal with IP address exhaustion (separately).
 
 
We will also suggest that the possible relation between these nearer-
 
We will also suggest that the possible relation between these nearer-
 
term measures and work toward advanced Internet layer functionality
 
term measures and work toward advanced Internet layer functionality
 
should be made an important consideration.
 
should be made an important consideration.
 
+
=== The Proposed Phases ===
4.2 The Proposed Phases
 
 
 
 
The IESG recommends that we divide the overall course of action into
 
The IESG recommends that we divide the overall course of action into
 
several phases.  For lack of a better vocabulary, we will term these
 
several phases.  For lack of a better vocabulary, we will term these
Line 492: Line 440:
 
as the ROAD group pointed out, we should start all the phases
 
as the ROAD group pointed out, we should start all the phases
 
immediately. We cannot afford to act on these phases consecutively!
 
immediately. We cannot afford to act on these phases consecutively!
 
 
In brief, the phases are:
 
In brief, the phases are:
 
 
  - "Immediate".  These are configuration and engineering actions that
 
  - "Immediate".  These are configuration and engineering actions that
 
can take place immediately without protocol design, development, or
 
can take place immediately without protocol design, development, or
Line 500: Line 446:
 
immediately.  Although none of these will solve any of the problems,
 
immediately.  Although none of these will solve any of the problems,
 
they can help slow the onset of the problems.
 
they can help slow the onset of the problems.
 +
 +
  
  
Line 506: Line 454:
  
 
The IESG specifically endorses:
 
The IESG specifically endorses:
 
 
     1) the need for more conservative address assignment
 
     1) the need for more conservative address assignment
 
       policies,
 
       policies,
Line 515: Line 462:
 
       at key points in the Internet, and
 
       at key points in the Internet, and
 
     5) careful attention to topology engineering.
 
     5) careful attention to topology engineering.
 
 
  - "Short-term".  Actions in this phase are aimed at dealing with
 
  - "Short-term".  Actions in this phase are aimed at dealing with
 
Class B exhaustion and routing table explosion.  These problems are
 
Class B exhaustion and routing table explosion.  These problems are
Line 521: Line 467:
 
address exhaustion problem needs to be or could be solved.  In this
 
address exhaustion problem needs to be or could be solved.  In this
 
timeframe, changes to hosts can *not* be considered.
 
timeframe, changes to hosts can *not* be considered.
 
 
  - "Mid-term".  In the mid-term, the issue of IP address exhaustion
 
  - "Mid-term".  In the mid-term, the issue of IP address exhaustion
 
must be solved.  This is the most fundamental problem facing the IP
 
must be solved.  This is the most fundamental problem facing the IP
Line 529: Line 474:
 
then we will simply be forced to deal with that problem again, but in
 
then we will simply be forced to deal with that problem again, but in
 
a larger address space.
 
a larger address space.
 
 
  - "Long-term".  Taking a broader view, the IESG feels that advanced
 
  - "Long-term".  Taking a broader view, the IESG feels that advanced
 
Internet layer functionality, like QOS support and  resource
 
Internet layer functionality, like QOS support and  resource
 
reservation, will be crucial to the long-term success of the Internet
 
reservation, will be crucial to the long-term success of the Internet
 
architecture.
 
architecture.
 
 
Therefore, planning for advanced Internet layer functionality should
 
Therefore, planning for advanced Internet layer functionality should
 
play a key role in our choice of mid-term solutions.
 
play a key role in our choice of mid-term solutions.
 
 
In particular, we need to keep several things in mind:
 
In particular, we need to keep several things in mind:
 
 
   1) The long-term solution will require replacement and/or
 
   1) The long-term solution will require replacement and/or
 
   extension of the Internet layer.  This will be a significant
 
   extension of the Internet layer.  This will be a significant
Line 547: Line 488:
 
   that the short- and mid-term solutions will provide a smooth
 
   that the short- and mid-term solutions will provide a smooth
 
   transition path for the long-term solutions.
 
   transition path for the long-term solutions.
 
 
   2) The long-term solution will likely require globally unique
 
   2) The long-term solution will likely require globally unique
 
   endpoint identifiers with an hierarchical structure to aid
 
   endpoint identifiers with an hierarchical structure to aid
Line 553: Line 493:
 
   for short- or mid-term solutions would, if done well, probably
 
   for short- or mid-term solutions would, if done well, probably
 
   have long-term usefulness, even if the long-term solution uses
 
   have long-term usefulness, even if the long-term solution uses
 +
 +
  
  
Line 559: Line 501:
  
 
   radically different message formats.
 
   radically different message formats.
 
 
   3) To some extent, development and deployment of the interim
 
   3) To some extent, development and deployment of the interim
 
   measures will divert resources away from other important projects,
 
   measures will divert resources away from other important projects,
Line 565: Line 506:
 
   diversion should be carefully considered when choosing which
 
   diversion should be carefully considered when choosing which
 
   interim measures to pursue.
 
   interim measures to pursue.
 
+
=== A Solution For Routing Table Explosion -- CIDR ===
4.3 A Solution For Routing Table Explosion -- CIDR
 
 
 
 
The IESG accepted ROAD's endorsement of CIDR [Fuller92].  CIDR solves
 
The IESG accepted ROAD's endorsement of CIDR [Fuller92].  CIDR solves
 
the routing table explosion problem (for the current IP addressing
 
the routing table explosion problem (for the current IP addressing
 
scheme), makes the Class B exhaustion problem less important, and
 
scheme), makes the Class B exhaustion problem less important, and
 
buys time for the crucial address exhaustion problem.
 
buys time for the crucial address exhaustion problem.
 
 
The IESG felt that other alternatives (e.g., C#, see Solen92) did not
 
The IESG felt that other alternatives (e.g., C#, see Solen92) did not
 
provide both routing table aggregation and Class B conservation at
 
provide both routing table aggregation and Class B conservation at
 
comparable effort.
 
comparable effort.
 
 
CIDR will require policy changes, protocol specification changes,
 
CIDR will require policy changes, protocol specification changes,
 
implementation, and deployment of new router software, but it does
 
implementation, and deployment of new router software, but it does
 
not call for changes to host software.
 
not call for changes to host software.
 
 
The IESG recommends the following course of action to pursue CIDR in
 
The IESG recommends the following course of action to pursue CIDR in
 
the IETF:
 
the IETF:
 
 
   a. Adopt the CIDR model described in Fuller92.
 
   a. Adopt the CIDR model described in Fuller92.
 
 
   b. Develop a plan for "IP Address Assignment Guidelines".
 
   b. Develop a plan for "IP Address Assignment Guidelines".
 
 
   The IESG considered the creation of an addressing plan to be an
 
   The IESG considered the creation of an addressing plan to be an
 
   operational issue.  Therefore, the IESG asked Bernhard Stockman
 
   operational issue.  Therefore, the IESG asked Bernhard Stockman
Line 595: Line 528:
 
   because he is a key player in RIPE and EBONE and he is a co-chair
 
   because he is a key player in RIPE and EBONE and he is a co-chair
 
   of the Intercontinental Engineering Planning Group (IEPG).
 
   of the Intercontinental Engineering Planning Group (IEPG).
 
 
   A specific proposal [Gerich92] has now emerged.  [Gerich92]
 
   A specific proposal [Gerich92] has now emerged.  [Gerich92]
 
   incorporates the views of the IETF, RIPE, IEPG, and the Federal
 
   incorporates the views of the IETF, RIPE, IEPG, and the Federal
 
   Engineering Planning group (FEPG).
 
   Engineering Planning group (FEPG).
 
 
   c. Pursue CIDR extensions to BGP in the BGP WG.
 
   c. Pursue CIDR extensions to BGP in the BGP WG.
 
 
   This activity stated at the San Diego IETF meeting.  A new BGP
 
   This activity stated at the San Diego IETF meeting.  A new BGP
 
   specification, BGP4, incorporating the CIDR extensions, is now
 
   specification, BGP4, incorporating the CIDR extensions, is now
 
   available for public comment [Rekhter92a].
 
   available for public comment [Rekhter92a].
 +
 +
  
  
Line 613: Line 545:
 
   d. Form a new WG to consider CIDR-related extensions to IDRP
 
   d. Form a new WG to consider CIDR-related extensions to IDRP
 
   (e.g., specify how run IDRP for IP inter-domain routing).
 
   (e.g., specify how run IDRP for IP inter-domain routing).
 
 
   e. Give careful consideration to how CIDR will be deployed in the
 
   e. Give careful consideration to how CIDR will be deployed in the
 
   Internet.
 
   Internet.
 
 
   This includes issues such as how to maintain address aggregation
 
   This includes issues such as how to maintain address aggregation
 
   across non-CIDR domains and how CIDR and various IGPs will need to
 
   across non-CIDR domains and how CIDR and various IGPs will need to
Line 622: Line 552:
 
   activities, the IESG may recommend forming a "CIDR Deployment WG",
 
   activities, the IESG may recommend forming a "CIDR Deployment WG",
 
   along the same lines as the current BGP Deployment WG.
 
   along the same lines as the current BGP Deployment WG.
 
+
=== Regarding "Bigger Internet Addresses" ===
4.4 Regarding "Bigger Internet Addresses"
 
 
 
 
In April-May 1992, the IESG reviewed the various approaches emerging
 
In April-May 1992, the IESG reviewed the various approaches emerging
 
from  the ROAD group activities -- e.g., "Simple CLNP" [Callon92a],
 
from  the ROAD group activities -- e.g., "Simple CLNP" [Callon92a],
 
"IP Encaps"  [Hinden92], "CNAT" [Callon92b], and "Nimrod"
 
"IP Encaps"  [Hinden92], "CNAT" [Callon92b], and "Nimrod"
 
[Chiappa91].
 
[Chiappa91].
 
 
(Note: These were the only proposals under serious consideration in
 
(Note: These were the only proposals under serious consideration in
 
this time period.  Other proposals, namely "The P Internet Protocol
 
this time period.  Other proposals, namely "The P Internet Protocol
Line 637: Line 564:
 
Bigger Addresses (TUBA)", and "IP Encaps" evolved into "IP Address
 
Bigger Addresses (TUBA)", and "IP Encaps" evolved into "IP Address
 
Encapsulation (IPAE)" [Hinden92].)
 
Encapsulation (IPAE)" [Hinden92].)
 
 
The "Simple CLNP" approach perhaps initially enjoyed more support
 
The "Simple CLNP" approach perhaps initially enjoyed more support
 
than other approaches.
 
than other approaches.
 
 
However, the consensus view in the IESG was that the full impact of
 
However, the consensus view in the IESG was that the full impact of
 
transition to "Simple CLNP" (or to any of the proposed approaches)
 
transition to "Simple CLNP" (or to any of the proposed approaches)
 
had not yet been explored in sufficient detail to make a final
 
had not yet been explored in sufficient detail to make a final
 
recommendation possible at this time.
 
recommendation possible at this time.
 
 
The feeling in the IESG was that such important issues as
 
The feeling in the IESG was that such important issues as
 
 
   - impact on operational infrastructure,
 
   - impact on operational infrastructure,
 
   - impact on current protocols (e.g., checksum computation
 
   - impact on current protocols (e.g., checksum computation
Line 659: Line 582:
 
   - effect on network management and security, and
 
   - effect on network management and security, and
 
   - the costs to network operators and network users who must
 
   - the costs to network operators and network users who must
 +
 +
  
  
Line 667: Line 592:
 
     protocols needed to be explored in more depth before a
 
     protocols needed to be explored in more depth before a
 
     decision of this magnitude should be made.
 
     decision of this magnitude should be made.
 
 
At first the question seemed to be one of timing.
 
At first the question seemed to be one of timing.
 
 
At the risk of oversimplifying some very wide ranging discussions,
 
At the risk of oversimplifying some very wide ranging discussions,
 
many in the IESG felt that if a decision had to be made
 
many in the IESG felt that if a decision had to be made
Line 675: Line 598:
 
they would feel much more comfortable if more detailed information
 
they would feel much more comfortable if more detailed information
 
was part of the decision.
 
was part of the decision.
 
 
The IESG felt there needed to be an open and thorough evaluation of
 
The IESG felt there needed to be an open and thorough evaluation of
 
any proposed new routing and addressing architecture.  The Internet
 
any proposed new routing and addressing architecture.  The Internet
Line 683: Line 605:
 
has the most benefits for long-term internet growth and evolution,
 
has the most benefits for long-term internet growth and evolution,
 
and the least impact on the current Internet.
 
and the least impact on the current Internet.
 
 
The IESG considered what additional information and criteria were
 
The IESG considered what additional information and criteria were
 
needed to choose between alternative approaches.  We also considered
 
needed to choose between alternative approaches.  We also considered
Line 691: Line 612:
 
of running out of IP addresses *before* we could deploy a new
 
of running out of IP addresses *before* we could deploy a new
 
architecture?).
 
architecture?).
 
 
This led the IESG to propose a specific set of selection criteria and
 
This led the IESG to propose a specific set of selection criteria and
 
information, and specific milestones and timetable for the decision.
 
information, and specific milestones and timetable for the decision.
 
 
The next section describes the milestones and timetable for choosing
 
The next section describes the milestones and timetable for choosing
 
the approach for bigger Internet addresses.
 
the approach for bigger Internet addresses.
 
 
The selection criteria referenced in the milestones are contained in
 
The selection criteria referenced in the milestones are contained in
 
Appendix B.
 
Appendix B.
 
+
=== Milestones And Timetable For Making a Recommendation for "Bigger ===
4.5 Milestones And Timetable For Making a Recommendation for "Bigger
 
 
  Internet Addresses"
 
  Internet Addresses"
 
 
In June, the IESG recommended that a call for proposals be made, with
 
In June, the IESG recommended that a call for proposals be made, with
 
initial activities to begin at the July IETF in Boston, and with a
 
initial activities to begin at the July IETF in Boston, and with a
 
strict timetable for reaching a recommendation coming out of the
 
strict timetable for reaching a recommendation coming out of the
 
November IETF meeting [Gross92a].
 
November IETF meeting [Gross92a].
 
 
Eventually, the call for proposals was made at the July meeting
 
Eventually, the call for proposals was made at the July meeting
 
itself.
 
itself.
 +
 +
  
  
Line 720: Line 637:
 
charter of each WG will be to explore the criteria described in
 
charter of each WG will be to explore the criteria described in
 
Appendix B and to develop a detailed plan for IESG consideration.
 
Appendix B and to develop a detailed plan for IESG consideration.
 
 
The WGs will be asked to submit an Internet-Draft prior to the
 
The WGs will be asked to submit an Internet-Draft prior to the
 
November 1992 IETF, and to make presentations at the November IETF.
 
November 1992 IETF, and to make presentations at the November IETF.
Line 726: Line 642:
 
the IESG will make a recommendation to the IAB following the November
 
the IESG will make a recommendation to the IAB following the November
 
1992 IETF meeting.
 
1992 IETF meeting.
 
 
Therefore, the milestones and timetable for the IESG to reach a
 
Therefore, the milestones and timetable for the IESG to reach a
 
recommendation on bigger Internet addresses are:
 
recommendation on bigger Internet addresses are:
 
 
   July 1992 -- Issue a call for proposals at the Boston IETF meeting
 
   July 1992 -- Issue a call for proposals at the Boston IETF meeting
 
   to form working groups to explore separate approaches for bigger
 
   to form working groups to explore separate approaches for bigger
 
   Internet addresses.
 
   Internet addresses.
 
 
   August-November 1992 -- Proposed WGs submit charters, create
 
   August-November 1992 -- Proposed WGs submit charters, create
 
   discussion lists, and begin their deliberations by email and/or
 
   discussion lists, and begin their deliberations by email and/or
Line 739: Line 652:
 
   (i.e., this memo).  Public review, discussion, and modification as
 
   (i.e., this memo).  Public review, discussion, and modification as
 
   appropriate of the "selection criteria" in Appendix B.
 
   appropriate of the "selection criteria" in Appendix B.
 
 
   October 1992 -- By the end of October, each WG will be required to
 
   October 1992 -- By the end of October, each WG will be required to
 
   submit a written description of the approach and how the criteria
 
   submit a written description of the approach and how the criteria
Line 745: Line 657:
 
   distributed as Internet-Drafts for public review well before the
 
   distributed as Internet-Drafts for public review well before the
 
   November IETF meeting.
 
   November IETF meeting.
 
 
   November 1992 -- Each WG will be given an opportunity to present
 
   November 1992 -- Each WG will be given an opportunity to present
 
   its findings in detail at the November 1992 IETF meeting.  Based
 
   its findings in detail at the November 1992 IETF meeting.  Based
Line 751: Line 662:
 
   discussions (by email and at the IETF), the IESG will forward a
 
   discussions (by email and at the IETF), the IESG will forward a
 
   recommendation to the IAB after the November IETF meeting.
 
   recommendation to the IAB after the November IETF meeting.
 
 
== SUMMARY ==
 
== SUMMARY ==
 
 
The problems of Internet scaling and address exhaustion are
 
The problems of Internet scaling and address exhaustion are
 
fundamentally important to the continued health of the global
 
fundamentally important to the continued health of the global
Line 761: Line 670:
 
need a deep understanding of the information and criteria described
 
need a deep understanding of the information and criteria described
 
in Appendix B before a decision is made.
 
in Appendix B before a decision is made.
 
 
With this memo, the IESG re-affirms its earlier recommendation to the
 
With this memo, the IESG re-affirms its earlier recommendation to the
 
IAB that (a) we move CIDR forward in the IETF as described in section
 
IAB that (a) we move CIDR forward in the IETF as described in section
 
4.3, and (b) that we encourage the exploration of other proposals for
 
4.3, and (b) that we encourage the exploration of other proposals for
 +
 +
  
  
Line 772: Line 682:
 
a bigger Internet address space according to the timetable in section
 
a bigger Internet address space according to the timetable in section
 
4.5.
 
4.5.
 
 
Appendix A.  FOR MORE INFORMATION
 
Appendix A.  FOR MORE INFORMATION
 
 
To become better acquainted with the issues and/or to follow the
 
To become better acquainted with the issues and/or to follow the
 
progress of these activities:
 
progress of these activities:
 
 
     - Please see the documents in the Bibliography below.
 
     - Please see the documents in the Bibliography below.
 
 
     - Join the Big-Internet mailing list where the general issues
 
     - Join the Big-Internet mailing list where the general issues
 
       are discussed ([email protected]).
 
       are discussed ([email protected]).
 
 
     - Any new WG formed will have an open mailing list.  Please feel
 
     - Any new WG formed will have an open mailing list.  Please feel
 
       free to join each as they are announced on the IETF mailing
 
       free to join each as they are announced on the IETF mailing
 
       list.  The current lists are:
 
       list.  The current lists are:
 
 
       PIP:      [email protected]
 
       PIP:      [email protected]
 
       TUBA:    [email protected]
 
       TUBA:    [email protected]
 
       IPAE:    [email protected]
 
       IPAE:    [email protected]
 
       SIP:      [email protected]
 
       SIP:      [email protected]
 
 
     - Attend the November IETF in Washington D.C. (where the WGs
 
     - Attend the November IETF in Washington D.C. (where the WGs
 
       will report and the IESG recommendation will begin formulating
 
       will report and the IESG recommendation will begin formulating
 
       its recommendation to the IAB).
 
       its recommendation to the IAB).
 
+
Note: In order to receive announcements of:
'''Note:''' In order to receive announcements of:
 
 
 
 
     - future IETF meetings and agenda,
 
     - future IETF meetings and agenda,
 
     - new IETF working groups, and
 
     - new IETF working groups, and
 
     - the posting of Internet-Drafts and RFCs,
 
     - the posting of Internet-Drafts and RFCs,
 
 
please send a request to join the IETF-Announcement mailing list
 
please send a request to join the IETF-Announcement mailing list
  
 
 
Appendix B.  INFORMATION AND SELECTION CRITERIA FOR "BIGGER INTERNET
 
Appendix B.  INFORMATION AND SELECTION CRITERIA FOR "BIGGER INTERNET
 
           ADDRESSES"
 
           ADDRESSES"
 
 
This section describes the information and criteria which the IESG
 
This section describes the information and criteria which the IESG
 
felt that any new routing and addressing proposal should supply.  As
 
felt that any new routing and addressing proposal should supply.  As
Line 814: Line 712:
 
of a new routing and addressing architecture, this section may be
 
of a new routing and addressing architecture, this section may be
 
revised and published in a separate document.
 
revised and published in a separate document.
 
 
It is expected that every proposal submitted for consideration should
 
It is expected that every proposal submitted for consideration should
 
address each item below on an point-by-point basis.
 
address each item below on an point-by-point basis.
 +
 +
  
  
Line 824: Line 723:
  
 
B.1  Description of the Proposed Scheme
 
B.1  Description of the Proposed Scheme
 
 
A complete description of the proposed routing and addressing
 
A complete description of the proposed routing and addressing
 
architecture should be supplied.  This should be at the level of
 
architecture should be supplied.  This should be at the level of
Line 830: Line 728:
 
clearly understood.  It should describe how the proposal solves the
 
clearly understood.  It should describe how the proposal solves the
 
basic problems of IP address exhaustion and router resource overload.
 
basic problems of IP address exhaustion and router resource overload.
 
 
B.2  Changes Required
 
B.2  Changes Required
 
 
All changes to existing protocols should be documented and new
 
All changes to existing protocols should be documented and new
 
protocols which need to be developed and/or deployed should be
 
protocols which need to be developed and/or deployed should be
Line 838: Line 734:
 
are not currently in widespread operational deployment in the
 
are not currently in widespread operational deployment in the
 
Internet.
 
Internet.
 
 
Changes should also be grouped by the devices and/or functions they
 
Changes should also be grouped by the devices and/or functions they
 
affect.  This should include at least the following:
 
affect.  This should include at least the following:
 
 
       - Protocol changes in hosts
 
       - Protocol changes in hosts
 
       - Protocol changes in exterior router
 
       - Protocol changes in exterior router
Line 852: Line 746:
 
       - Changes to operational and administration
 
       - Changes to operational and administration
 
         procedures
 
         procedures
 
 
The changes should also include if hosts and routers have their
 
The changes should also include if hosts and routers have their
 
current IP addresses changed.
 
current IP addresses changed.
 
 
The impact and changes to the existing set of TCP/IP protocols should
 
The impact and changes to the existing set of TCP/IP protocols should
 
be described.  This should include at a minimum:
 
be described.  This should include at a minimum:
 
 
       - IP
 
       - IP
 
       - ICMP
 
       - ICMP
Line 868: Line 759:
 
       - RPC
 
       - RPC
 
       - SNMP
 
       - SNMP
 
 
The impact on protocols which use IP addresses as data should be
 
The impact on protocols which use IP addresses as data should be
 
specifically addressed.
 
specifically addressed.
 +
 +
  
  
Line 877: Line 769:
  
 
B.3  Implementation Experience
 
B.3  Implementation Experience
 
 
A description of implementation experience with the proposal should
 
A description of implementation experience with the proposal should
 
be supplied.  This should include the how much of the proposal was
 
be supplied.  This should include the how much of the proposal was
Line 883: Line 774:
 
modifying existing code, the extent of the modifications should be
 
modifying existing code, the extent of the modifications should be
 
described.
 
described.
 
 
B.4  Large Internet Support
 
B.4  Large Internet Support
 
 
The proposal should describe how it will scale to support a large
 
The proposal should describe how it will scale to support a large
 
internet of a billion networks.  It should describe how the proposed
 
internet of a billion networks.  It should describe how the proposed
Line 894: Line 783:
 
interior and exterior, or L1, L2, L3, etc.), and relationship between
 
interior and exterior, or L1, L2, L3, etc.), and relationship between
 
addressing and routing.
 
addressing and routing.
 
 
The addressing proposed should include a description of how addresses
 
The addressing proposed should include a description of how addresses
 
will be assigned, who owns the addresses (e.g., user or service
 
will be assigned, who owns the addresses (e.g., user or service
 
provider), and whether there are restrictions in address assignment
 
provider), and whether there are restrictions in address assignment
 
or topology.
 
or topology.
 
 
B.5 Syntax and semantics of names, identifiers and addresses
 
B.5 Syntax and semantics of names, identifiers and addresses
 
 
Proposals should address the manner in which data sources and sinks
 
Proposals should address the manner in which data sources and sinks
 
are identified and addressed, describe how current domain names and
 
are identified and addressed, describe how current domain names and
Line 910: Line 796:
 
should address how these new semantics would be introduced and
 
should address how these new semantics would be introduced and
 
backward compatibility maintained.
 
backward compatibility maintained.
 
 
Any overlays in the syntax of these protocol structures should be
 
Any overlays in the syntax of these protocol structures should be
 
clearly identified and conflicts resulting from syntactic overlay of
 
clearly identified and conflicts resulting from syntactic overlay of
 
functionality should be clearly addressed in the discussion of the
 
functionality should be clearly addressed in the discussion of the
 
impact on administrative assignment.
 
impact on administrative assignment.
 
 
B.6  Performance Impact
 
B.6  Performance Impact
 
 
The performance impact of the new routing and addressing architecture
 
The performance impact of the new routing and addressing architecture
 
should be evaluated.  It should be compared against the current state
 
should be evaluated.  It should be compared against the current state
Line 924: Line 807:
 
projections, and bandwidth usage for networks.  Performance should be
 
projections, and bandwidth usage for networks.  Performance should be
 
evaluated for both high speed speed and low speed lines.
 
evaluated for both high speed speed and low speed lines.
 +
 +
  
  
Line 932: Line 817:
 
network bandwidth consumption should be projected based on the
 
network bandwidth consumption should be projected based on the
 
following projected data points:
 
following projected data points:
 
 
   -Domains    10^3  10^4  10^5  10^6  10^7  10^8
 
   -Domains    10^3  10^4  10^5  10^6  10^7  10^8
 
   -Networks  10^4  10^5  10^6  10^7  10^8  10^9
 
   -Networks  10^4  10^5  10^6  10^7  10^8  10^9
 
   -Hosts      10^6  10^7  10^8  10^9  10^10  10^11
 
   -Hosts      10^6  10^7  10^8  10^9  10^10  10^11
 
 
B.7  Support for TCP/IP hosts than do not support the new architecture
 
B.7  Support for TCP/IP hosts than do not support the new architecture
 
 
The proposal should describe how hosts which do not support the new
 
The proposal should describe how hosts which do not support the new
 
architecture will be supported -- whether they receive full services
 
architecture will be supported -- whether they receive full services
Line 945: Line 827:
 
provided between old and new hosts?  If so, where will be this be
 
provided between old and new hosts?  If so, where will be this be
 
done.
 
done.
 
 
B.8  Effect on User Community
 
B.8  Effect on User Community
 
 
The large and growing installed base of IP systems comprises people,
 
The large and growing installed base of IP systems comprises people,
 
as well as software and machines.  The proposal should describe
 
as well as software and machines.  The proposal should describe
Line 953: Line 833:
 
involved in internetworking.  This should include new and/or changes
 
involved in internetworking.  This should include new and/or changes
 
in concepts, terminology, and organization.
 
in concepts, terminology, and organization.
 
 
B.9  Deployment Plan Description
 
B.9  Deployment Plan Description
 
 
The proposal should include a deployment plan.  It should include the
 
The proposal should include a deployment plan.  It should include the
 
steps required to deploy it.  Each step should include the devices
 
steps required to deploy it.  Each step should include the devices
Line 962: Line 840:
 
and routers are required to run the current and proposed internet
 
and routers are required to run the current and proposed internet
 
protocol.
 
protocol.
 
 
A schedule should be included, with justification showing that the
 
A schedule should be included, with justification showing that the
 
schedule is realistic.
 
schedule is realistic.
 
 
B.10  Security Impact
 
B.10  Security Impact
 
 
The impact on current and future security plans should be addressed.
 
The impact on current and future security plans should be addressed.
 
Specifically do current security mechanisms such as address and
 
Specifically do current security mechanisms such as address and
Line 973: Line 848:
 
what is the effect on security and authentication schemes currently
 
what is the effect on security and authentication schemes currently
 
under development.
 
under development.
 +
B.11  Future Evolution
 +
The proposal should describe how it lays a foundation for solving
  
B.11  Future Evolution
 
  
The proposal should describe how it lays a foundation for solving
 
  
  
Line 984: Line 859:
 
emerging internet problems such as security/authentication, mobility,
 
emerging internet problems such as security/authentication, mobility,
 
resource allocation, accounting, high packet rates, etc.
 
resource allocation, accounting, high packet rates, etc.
 
 
Appendix C.  BIBLIOGRAPHY
 
Appendix C.  BIBLIOGRAPHY
 
 
-Documents and Information from IETF/IESG:
 
-Documents and Information from IETF/IESG:
 
 
[Ford92] Ford, P., and P. Gross, "Routing And Addressing
 
[Ford92] Ford, P., and P. Gross, "Routing And Addressing
 
Considerations", Proceedings of the Twenty-Third IETF, March 1992.
 
Considerations", Proceedings of the Twenty-Third IETF, March 1992.
 
 
[Gross92] Gross, P., "Chair's Message and Minutes of the Open IETF
 
[Gross92] Gross, P., "Chair's Message and Minutes of the Open IETF
 
Plenary", Proceedings of the Twenty-Third IETF, March 1992.
 
Plenary", Proceedings of the Twenty-Third IETF, March 1992.
 
 
[Gross92a] Gross, P., "IESG Deliberations on Routing and Addressing",
 
[Gross92a] Gross, P., "IESG Deliberations on Routing and Addressing",
 
Electronic mail message to the Big-Internet mailing list, June 1992.
 
Electronic mail message to the Big-Internet mailing list, June 1992.
 
 
-Documents directly resulting from the ROAD group:
 
-Documents directly resulting from the ROAD group:
 
 
[Fuller92] Fuller, V., Li, T., Yu, J., and K. Varadhan,
 
[Fuller92] Fuller, V., Li, T., Yu, J., and K. Varadhan,
 
"Supernetting:  an Address Assignment and Aggregation Strategy", RFC
 
"Supernetting:  an Address Assignment and Aggregation Strategy", RFC
 
1338, BARRNet, cisco, Merit, OARnet, June 1992.
 
1338, BARRNet, cisco, Merit, OARnet, June 1992.
 
 
[Hinden92] Hinden, B., "New Scheme for Internet Routing and
 
[Hinden92] Hinden, B., "New Scheme for Internet Routing and
 
Addressing (ENCAPS)", Email message to Big-Internet mailing list,
 
Addressing (ENCAPS)", Email message to Big-Internet mailing list,
 
March 16, 1992.
 
March 16, 1992.
 
 
[Callon92a] Callon, R., "TCP and UDP with Bigger Addresses (TUBA), A
 
[Callon92a] Callon, R., "TCP and UDP with Bigger Addresses (TUBA), A
Simple Proposal for Internet Addressing and Routing", [[RFC1347|RFC 1347]], DEC,
+
Simple Proposal for Internet Addressing and Routing", RFC 1347, DEC,
 
June 1992
 
June 1992
 
 
[Deering92] Deering, S., "City Codes:  An Alternative Scheme for OSI
 
[Deering92] Deering, S., "City Codes:  An Alternative Scheme for OSI
 
NSAP Allocation in the Internet", Email message to Big-Internet
 
NSAP Allocation in the Internet", Email message to Big-Internet
 
mailing list, January 7, 1992.
 
mailing list, January 7, 1992.
 
 
[Callon92b] CNAT
 
[Callon92b] CNAT
 
 
-Related Documents:
 
-Related Documents:
 
 
[Hinden92b] Hinden, R., and D. Crocker, "A Proposal for IP Address
 
[Hinden92b] Hinden, R., and D. Crocker, "A Proposal for IP Address
 
Encapsulation (IPAE): A Compatible version of IP with Large
 
Encapsulation (IPAE): A Compatible version of IP with Large
 
Addresses", Work in Progress, June 1992.
 
Addresses", Work in Progress, June 1992.
 
 
[Deering92b] Deering, S., "The Simple Internet Protocol", Big-
 
[Deering92b] Deering, S., "The Simple Internet Protocol", Big-
 
Internet mailing list.
 
Internet mailing list.
 
 
[Stockman92] Karrenberg, D., and B. Stockman, "A Proposal for a
 
[Stockman92] Karrenberg, D., and B. Stockman, "A Proposal for a
 
Global Internet Addressing Scheme", Work in Progress, May 1992.
 
Global Internet Addressing Scheme", Work in Progress, May 1992.
 +
 +
  
  
Line 1,037: Line 899:
 
[Rekhter92] Rekhter, Y., and T. Li, "Guidelines for IP Address
 
[Rekhter92] Rekhter, Y., and T. Li, "Guidelines for IP Address
 
Allocation", Work in Progress, May 1992.
 
Allocation", Work in Progress, May 1992.
 
 
[Rekhter92b] Rekhter, Y., and T. Li, "The Border Gateway Protocol
 
[Rekhter92b] Rekhter, Y., and T. Li, "The Border Gateway Protocol
 
(Version 4)", Work in Progress, September 1992.
 
(Version 4)", Work in Progress, September 1992.
 
 
[Rekhter92c] Rekhter, Y., and P. Gross, "Application of the Border
 
[Rekhter92c] Rekhter, Y., and P. Gross, "Application of the Border
 
Gateway Protocol", Work in Progress, September 1992.
 
Gateway Protocol", Work in Progress, September 1992.
 
 
[Gerich92]  Gerich, E., "Guidelines for Management of IP Address
 
[Gerich92]  Gerich, E., "Guidelines for Management of IP Address
Space", [[RFC1366|RFC 1366]], Merit, October 1992.
+
Space", RFC 1366, Merit, October 1992.
 
 
 
[Solen92]  Solensky, F., and F. Kastenholz, "A Revision to IP Address
 
[Solen92]  Solensky, F., and F. Kastenholz, "A Revision to IP Address
 
Classifications", Work in Progress, March 1992.
 
Classifications", Work in Progress, March 1992.
 
 
[Wang92]  Wany, Z.,  and J. Crowcroft, "A Two-Tier Address Structure
 
[Wang92]  Wany, Z.,  and J. Crowcroft, "A Two-Tier Address Structure
 
for the Internet:  A Solution to the Problem of Address Space
 
for the Internet:  A Solution to the Problem of Address Space
Exhaustion", [[RFC1335|RFC 1335]],  University College London, May 1992.
+
Exhaustion", RFC 1335,  University College London, May 1992.
 
 
 
[Callon91]  Callon, R., Gardner, E., and R. Colella, "Guidelines for
 
[Callon91]  Callon, R., Gardner, E., and R. Colella, "Guidelines for
OSI NSAP Allocation in the Internet", [[RFC1237|RFC 1237]], NIST, Mitre, DEC,
+
OSI NSAP Allocation in the Internet", RFC 1237, NIST, Mitre, DEC,
 
July 1991.
 
July 1991.
 
 
[Tsuchiya92a]  Tsuchiya, P., "The IP Network Address Translator
 
[Tsuchiya92a]  Tsuchiya, P., "The IP Network Address Translator
 
(NAT): Preliminary Design", Work in Progress, April 1991.
 
(NAT): Preliminary Design", Work in Progress, April 1991.
 
 
[Tsuchiya92b]  Tsuchiya, P., "The 'P' Internet Protocol", Work in
 
[Tsuchiya92b]  Tsuchiya, P., "The 'P' Internet Protocol", Work in
 
Progress, May 1992.
 
Progress, May 1992.
 
 
[Chiappa91]  Chiappa, J., "A New IP Routing and Addressing
 
[Chiappa91]  Chiappa, J., "A New IP Routing and Addressing
 
Architecture", Work in Progress, July 1991.
 
Architecture", Work in Progress, July 1991.
 
 
[Clark91]  Clark, D., Chapin, L., Cerf, V., Braden, R., and R. Hobby,
 
[Clark91]  Clark, D., Chapin, L., Cerf, V., Braden, R., and R. Hobby,
"Towards the Future Internet Architecture", [[RFC1287|RFC 1287]], MIT, BBN, CNRI,
+
"Towards the Future Internet Architecture", RFC 1287, MIT, BBN, CNRI,
 
ISI, UCDavis, December 1991.
 
ISI, UCDavis, December 1991.
 +
Security Considerations
 +
Security issues are discussed in sections 4.4, B.2, B.10, and B.11.
  
Security Considerations
 
  
Security issues are discussed in sections 4.4, B.2, B.10, and B.11.
 
  
  
Line 1,089: Line 941:
  
 
Authors' Addresses
 
Authors' Addresses
 
 
Phillip Gross, IESG Chair
 
Phillip Gross, IESG Chair
 
Advanced Network & Services
 
Advanced Network & Services
 
100 Clearbrook Road
 
100 Clearbrook Road
 
Elmsford, NY
 
Elmsford, NY
 
 
Phone: 914-789-5300
 
Phone: 914-789-5300
  
 
  
 
Philip Almquist
 
Philip Almquist
Line 1,104: Line 953:
 
Pine Hall 147
 
Pine Hall 147
 
Stanford, CA 94305
 
Stanford, CA 94305
 
 
Phone: (415) 723-2229
 
Phone: (415) 723-2229
  

Revision as of 07:08, 23 September 2020



Network Working Group P. Gross Request for Comments: 1380 IESG Chair

                                                         P. Almquist
                                                    IESG Internet AD
                                                       November 1992
          IESG Deliberations on Routing and Addressing

Status Of This Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Abstract This memo summarizes issues surrounding the routing and addressing scaling problems in the IP architecture, and it provides a brief background of the ROAD group and related activities in the Internet Engineering Task Force (IETF). It also provides a preliminary report of the Internet Engineering Steering Group (IESG) deliberations on how these routing and addressing issues should be pursued in the Internet Architecture Board (IAB)/IETF. Acknowledgements This note draws principally from two sources: the output from the ROAD group, as reported at the San Diego IETF meeting, and on numerous detailed discussions in the IESG following the San Diego IETF meeting. Zheng Wang, Bob Hinden, Kent England, and Bob Smart provided input for the "Criteria For Bigger Internet Addresses" section below. Greg Vaudreuil prepared the final version of the bibliography, based on previous bibliographies by Lyman Chapin and bibliographies distributed on the Big-Internet mailing list. Table of Contents 1. INTRODUCTION.................................................. 2 2. ISSUES OF GROWTH AND EVOLUTION IN THE INTERNET............... 3 2.1 The Problems................................................ 3 2.2 Possible Solutions.......................................... 5 3. PREPARING FOR ACTION.......................................... 7 3.1 The IAB Architecture Retreats................................ 7 3.2 The Santa Fe IETF............................................ 7 3.3 The ROAD Group and beyond.................................... 8




4. SETTING DIRECTIONS FOR THE IETF............................... 10 4.1 The Need For Interim Solutions............................... 10 4.2 The Proposed Phases.......................................... 10 4.3 A Solution For Routing Table Explosion -- CIDR............... 12 4.4 Regarding "IP Address Exhaustion"............................ 13 4.5 Milestones And Timetable For Making a Recommendation for

   "Bigger Internet Addresses".................................. 14

5. SUMMARY....................................................... 15 Appendix A. FOR MORE INFORMATION................................. 16 Appendix B. INFORMATION AND SELECTION CRITERIA FOR "BIGGER

           INTERNET ADDRESSES".................................. 16

Appendix C. BIBLIOGRAPHY......................................... 20 Security Considerations.......................................... 21 Authors' Addresses............................................... 22

INTRODUCTION

It seems unlikely that the designers of IP ever imagined at the time what phenomenal success the Internet would achieve. Internet connections were initially intended primarily for mainframe computers at sites performing DARPA-sponsored research. Now, of course, the Internet has extended its reach to the desktop and is beginning to extend into the home. No longer the exclusive purview of pure R&D establishments, the Internet has become well entrenched in parts of the corporate world and is beginning to make inroads into secondary and even primary schools. While once it was an almost exclusively U.S. phenomenon, the Internet now extends to every continent and within a few years may well include network connections in every country. Over the past couple of years, we have seen increasingly strong indications that all of this success will stress the limits of IP unless appropriate corrective actions are taken. The supply of unallocated Class B network numbers is rapidly dwindling, and the amount of routing information now carried in the Internet is increasingly taxing the abilities of both the routers and the people who have to manage them. Somewhat longer-term, it is possible that we will run out of host addresses or network numbers altogether. While these problems could be avoided by attempting to restrict the growth of the Internet, most people would prefer solutions that allow growth to continue. Fortunately, it appears that such solutions are possible, and that, in fact, our biggest problem is having too many possible solutions rather than too few. This memo provides a preliminary report of IESG deliberations on how routing and addressing issues can be pursued in the IAB/IETF.





In following sections, we will discuss in more detail the problems confronting us and possible approaches. We will give a brief overview of the ROAD group and related activities in the IETF. We will then discuss possible courses of action in the IETF. Ultimately, the IESG will issue a recommendation from the IESG/IETF to the IAB.

ISSUES OF GROWTH AND EVOLUTION IN THE INTERNET

The Problems

The Internet now faces three growth-related problems:

 - Class B network number exhaustion - Routing table explosion
 - IP address space exhaustion

Class B Network Number Exhaustion

Over the last several years, the number of network numbers assigned and the number of network numbers configured into the Merit NSFnet routing database have roughly doubled every 12 months. This has led to estimates that, at the current allocation rate, and in the absence of corrective measures, it will take less than 2 years to allocate all of the currently unassigned Class B network numbers. After that, new sites which wished to connect more than the number of hosts possible in a single Class C (253 hosts) would need to be assigned multiple Class C networks. This will exacerbate the routing table explosion problems described next.

Routing Table Explosion

As the number of networks connected to the Internet has grown, the amount of routing information that has to be passed around to keep track of them all is likewise growing. This is leading to two types of problems. Hardware and Protocol Limits Routing protocols must pass around this information, and routers must store and use it. This taxes memory limits in the routers, and can also consume significant bandwidth when older routing protocols are used, (such as EGP and RIP, which were designed for a much smaller number of networks). The limits on the memory in the routers seem to be the most pressing. It is already the case that the routers used in the MILNET are incapable of handling all of the current routes, and most other




service providers have found the need to periodically upgrade their routers to accommodate ever larger quantities of routing information. An informal survey of router vendors by the ROAD group estimated that most of the currently deployed generation of high-end routers will support O(16000) routes. This will be probably be adequate for the next 12 to 18 months at the current rate of growth. Most vendors have begun, or will soon begin, to ship routers capable of handling O(64000) routes, which should be adequate for an additional two years if the above Class B Network Number Exhaustion problem is solved. Human Limits The number of routes does not merely tax the network's physical plant. Network operators have found that the inter-domain routing protocol mechanisms often need to be augmented by a considerable amount of configuration to make the paths followed by packets be consistent with the policies and desires of the network operators. As the number of networks increases, the configuration (and the traffic monitoring to determine whether the configuration has been done correctly) becomes increasingly difficult and time-consuming. Although it is not possible to determine a number of networks (and therefore a time frame) where human limits will be exceeded, network operators view this as a significant short-term problem.

IP Address Exhaustion

If the current exponential growth rate continues unabated, the number of computers connected to the Internet will eventually exceed the number of possible IP addresses. Because IP addresses are divided into "network" and "host" portions, we may not ever fully run out of IP addresses because we will run out of IP network numbers first. There is considerable uncertainty regarding the timeframe when we might exceed the limits of the IP address space. However, the issue is serious enough that it deserves our earliest attention. It is very important that we develop solutions to this potential problem well before we are in danger of actually running out of addresses.

Other Internetwork Layer Issues

Although the catalog of problems above is pretty complete as far as the scaling problems of the Internet are concerned, there are other Internet layer issues that will need to be addressed over the coming years. These are issues regarding advanced functionality and service guarantees in the Internet layer. In any attempt to resolve the Internet scaling problems, it is




important to consider how these other issues might affect the future evolution of Internet layer protocols. These issues include:

    1)   Policy-based routing
    2)   Flow control
    3)   Weak Quality-of-Service (QOS)
    4)   Service guarantees (strong QOS)
    5)   Charging

Possible Solutions

Class B Network Number Exhaustion

A number of approaches have been suggested for how we might slow the exhaustion of the Class B IP addresses. These include:

  1)   Reclaiming those Class B network numbers which have been
  assigned but are either unused or used by networks which are not
  connected to the Internet.
  2)   Modifying address assignment policies to slow the assignment
  of Class B network numbers by assigning multiple Class C network
  numbers to organizations which are only a little bit to big to be
  accommodated by a Class C network number.
     Note: It is already the case that a Class B number is assigned
     only if the applicant would need more than "several" Class C
     networks.  The value of "several" has increased over time from
     1 to (currently) 32.
  3)   Use the Class C address space to form aggregations of
  different size than the normal normal Class C addresses.  Such
  schemes include Classless Inter-Domain Routing (CIDR) [Fuller92]
  and the C# scheme [Solen92].

Routing Table Explosion

As was described earlier, there are actually two parts to this problem. They each have slightly different possible approaches: Hardware and Protocol Limits

  1) More thrust.  We could simply recognize the fact that routers
  which need full Internet routing information will require large
  amounts of memory and processing capacity.  This is at best a very
  short-term approach, and we will always need to face this problem
  in the long-term.





  2) Route servers (a variant of the "More Thrust" solution).
  Instead of requiring every router to store complete routing
  information, mechanisms could be developed to allow the tasks of
  computing and storing routes to be offloaded to a server.  Routers
  would request routes from the server as needed (presumably caching
  to improve performance).
  3) Topology engineering.  Many network providers already try to
  design their networks in such a way that only a few of the routers
  need complete routing information (the others rely on default
  routes to reach destinations that they don't have explicit routes
  to).  While this is inconvenient for network operators, it is a
  trend which is likely to continue.
  It is also the case that network providers could further reduce
  the number of routers which need full routing information by
  accepting some amount of suboptimal routing or reducing alternate
  paths used for backup.
  4) Charging-based solutions.  By charging for network number
  advertisements, it might be possible to discourage sites from
  connecting more networks to the Internet than they get significant
  value from having connected.
  5) Aggregation of routing information.  It is fairly clear that in
  the long-term it will be necessary for addresses to be more
  hierarchical.  This will allow routes to many networks to be
  collapsed into a single summary route.  Therefore, an important
  question is whether aggregation can also be part of the short-term
  solution.  Of the proposals to date, only CIDR could provide
  aggregation in the short-term.  All longer-term proposals should
  aggregation.

Human Limits

  1) Additional human resources.  Network providers could devote
  additional manpower to routing management, or accept the
  consequences of a reduced level of routing management.  This is
  obviously unattractive as anything other than a very short-term
  solution.
  2) Better tools.  Network operators and router vendors could work
  to develop more powerful paradigms and mechanisms for routing
  management.
  The IETF has already undertaken some work in the areas of route
  filtering and route leaking.





IP Address Exhaustion

The following general approaches have been suggested for dealing with the possible exhaustion of the IP address space:

  1) Protocol modifications to provide a larger address space.  By
  enhancing IP or by transitioning to another protocol with a larger
  address space, we could substantially increase the number of
  available network numbers and addresses.
  2) Addresses which are not globally unique.  Several proposed
  schemes have emerged whereby a host's domain name is globally
  unique, but its IP address would be unique only within it's local
  routing domain.  These schemes usually involve address translating
  3) Partitioned Internet.  The Internet could be partitioned into
  areas, such that a host's IP address would be unique only within
  its own area.  Such schemes generally postulate application
  gateways to interconnect the areas.  This is not unlike the
  approach often used to connect differing protocol families.
  4) Reclaiming network numbers.  Network numbers which are not
  used, or are used by networks which are not connected to the
  Internet, could conceivably be reclaimed for general Internet use.
  This isn't a long-term solution, but could possibly help in the
  interim if for some reason address exhaustion starts to occur
  unexpectedly soon.

PREPARING FOR ACTION

The IAB Architecture Retreats

In July 1991, the IAB held a special workshop to consider critical issues in the IP architecture (Clark91). Of particular concern were the problems related to Internet growth and scaling. The IAB felt the issues were of sufficient concern to begin organizing a special group to explore the issues and to explore possible solutions. Peter Ford (LANL) was asked to organize this effort. The IAB reconvened the architecture workshop in January 1992 to further examine these critical issues, and to meet jointly with the then-formed ROAD group (see below).

The Santa Fe IETF

At the November 1991 Santa Fe IETF meeting, the BGP Working Groups independently began a concerted exploration of the issues of routing table scaling. The principal approach was to perform route aggregation by using address masks in BGP to do "supernetting"




(rather than "subnetting"). This approach would eventually evolve into CIDR. The BGP WG decided to form a separate subgroup, to be led by Phill Gross (ANS) to pursue this solution.

The ROAD Group and Beyond

At the Santa Fe IETF, the initially separate IAB and BGP WG activities were combined into a special effort, named the "ROuting and ADdressing (ROAD) Group", to be co-chaired by Ford and Gross. The group was asked to explore possible near-term approaches for the scaling problems described in the last section, namely:

   - Class B address exhaustion
   - Routing table explosion
   - IP address space exhaustion

The ROAD group was asked to report back to the IETF at the San Diego IETF (March 1992). Suggested guidelines included minimizing changes to hosts, must be incrementally deployable, and must provide support for a billion networks. The ROAD group was not a traditional open IETF working group. It was always presumed that this was a one-time special group that would lead to the formation of other IETF WGs after its report in San Diego. The ROAD group held several face-face meetings between the November 1991 (Santa Fe) and March 1992 (San Diego) IETF meetings. This included several times at the Santa Fe IETF meeting, December 1991 in Reston VA, January 1992 in Boston (in conjunction with the IAB architecture workshop), and January 1992 in Arizona). There was also much discussion by electronic mail. The group produced numerous documents, which have variously been made available as Internet-Drafts or RFCs (see Bibliography in Appendix D). As follow-up, the ROAD co-chairs reported to the IETF plenary in March 1992 in San Diego. Plus, several specific ROAD-related activities took place during the IETF meeting that week. The Ford/Gross presentation served as a preliminary report from the ROAD group. The basic thrust was:

  1.  The Internet community needs a better way to deal with current
  addresses (e.g., hierarchical address assignments for routing
  aggregation to help slow Class B exhaustion and routing table




  explosion).  Classless Inter-Domain Routing (CIDR; also called
  "supernetting") was recommended.  CIDR calls for:
    - The development of a plan for hierarchical IP address
      assignment for aggregation in routing,
    - Enhanced "classless" Inter-domain protocols (i.e., carry
      address masks along with IP addresses),
    - Inter-Domain routing "Usage documents" for using addressing
      and routing plan with the enhanced inter-domain protocols,
      and for interacting with IGPs.
  2.  The Internet community needs bigger addresses for the Internet
  to stem IP address exhaustion.  The ROAD group explored several
  approaches in some depth.  Some of these approaches were discussed
  at the San Diego IETF.  However, a final recommendation of a
  single approach did not emerge.
  3.  The Internet community needs to focus more effort on future
  directions for Internet routing and advanced Internet layer
  features.

Other ROAD-related activities at the San Diego IETF meeting included:

  - Monday,  8:00 - 9:00 am,  Report from the ROAD group on
  "Internet Routing and Addressing Considerations",
  - Monday,  9:30-12:00pm,  Geographical Addressing and Routing
  (during NOOP WG session),
  - Monday,  1:30-3:30pm,  Preliminary discussion of a CIDR routing
  and addressing plan  (during ORAD session),
  - Tuesday,  1:30-6:00pm,  Internet Routing and Addressing BOF (to
  discuss ROAD results and to explore approaches for bigger Internet
  address space),
  - Wednesday,  1:30-3:30pm,  CIDR Supernetting BOF (joint with BGP
  WG),
  - Thursday,  4:00-6:00pm,  Summary of ROAD activities in San Diego
  followed by open plenary discussion.

The slides for the Monday presentation (Ford92), slides for the Thursday summary (and notes in the Chair's message) (Gross92), and notes for the other sessions are contained in the Proceedings of the Twenty-Third IETF (San Diego).




SETTING DIRECTIONS FOR THE IETF

The Need For Interim Solutions

Solutions to the problems of advanced Internet layer functionality are far from being well understood. While we should certainly encourage research in these areas, it is premature to start an engineering effort for an Internet layer which would solve not only the scaling problems but also those other issues. Plus, most approaches to the problem of IP address space exhaustion involve changes to the Internet layer. Such approaches mean changes changes to host software that will require us to face the very difficult transition of a large installed base. It is therefore not likely that we can (a) develop a single solution for the near-term scaling problems that will (b) also solve the longer-term problems of advanced Internet-layer functionality, that we can (c) choose, implement and deploy before the nearer-term problems of Class B exhaustion or routing table explosion confront us. This line of reasoning leads to the inevitable conclusion that we will need to make major enhancements to IP in (at least) two stages. Therefore, we will consider interim measures to deal with Class B address exhaustion and routing table explosion (together), and to deal with IP address exhaustion (separately). We will also suggest that the possible relation between these nearer- term measures and work toward advanced Internet layer functionality should be made an important consideration.

The Proposed Phases

The IESG recommends that we divide the overall course of action into several phases. For lack of a better vocabulary, we will term these "immediate", "short-term", mid-term", and "long-term" phases. But, as the ROAD group pointed out, we should start all the phases immediately. We cannot afford to act on these phases consecutively! In brief, the phases are:

- "Immediate".  These are configuration and engineering actions that

can take place immediately without protocol design, development, or deployment. There are a number of actions that can begin immediately. Although none of these will solve any of the problems, they can help slow the onset of the problems.




The IESG specifically endorses:

   1) the need for more conservative address assignment
      policies,
   2) alignment of new address assignment policies with any new
      aggregation schemes,
   3) efforts to reclaim unused Class B addresses,
   4) installation of more powerful routers by network operators
      at key points in the Internet, and
   5) careful attention to topology engineering.
- "Short-term".  Actions in this phase are aimed at dealing with

Class B exhaustion and routing table explosion. These problems are deemed to be quite pressing and to need solutions well before the IP address exhaustion problem needs to be or could be solved. In this timeframe, changes to hosts can *not* be considered.

- "Mid-term".  In the mid-term, the issue of IP address exhaustion

must be solved. This is the most fundamental problem facing the IP architecture. Depending on the expected timeframe, changes to host software could be considered. Note: whatever approach is taken, it must also deal with the routing table explosion. If it does not, then we will simply be forced to deal with that problem again, but in a larger address space.

- "Long-term".  Taking a broader view, the IESG feels that advanced

Internet layer functionality, like QOS support and resource reservation, will be crucial to the long-term success of the Internet architecture. Therefore, planning for advanced Internet layer functionality should play a key role in our choice of mid-term solutions. In particular, we need to keep several things in mind:

  1) The long-term solution will require replacement and/or
  extension of the Internet layer.  This will be a significant
  trauma for vendors, operators, and for users.  Therefore, it is
  particularly important that we either minimize the trauma involved
  in deploying the sort-and mid-term solutions, or we need to assure
  that the short- and mid-term solutions will provide a smooth
  transition path for the long-term solutions.
  2) The long-term solution will likely require globally unique
  endpoint identifiers with an hierarchical structure to aid
  routing.  Any effort to define hierarchy and assignment mechanisms
  for short- or mid-term solutions would, if done well, probably
  have long-term usefulness, even if the long-term solution uses




  radically different message formats.
  3) To some extent, development and deployment of the interim
  measures will divert resources away from other important projects,
  including the development of the long-term solution.  This
  diversion should be carefully considered when choosing which
  interim measures to pursue.

A Solution For Routing Table Explosion -- CIDR

The IESG accepted ROAD's endorsement of CIDR [Fuller92]. CIDR solves the routing table explosion problem (for the current IP addressing scheme), makes the Class B exhaustion problem less important, and buys time for the crucial address exhaustion problem. The IESG felt that other alternatives (e.g., C#, see Solen92) did not provide both routing table aggregation and Class B conservation at comparable effort. CIDR will require policy changes, protocol specification changes, implementation, and deployment of new router software, but it does not call for changes to host software. The IESG recommends the following course of action to pursue CIDR in the IETF:

  a. Adopt the CIDR model described in Fuller92.
  b. Develop a plan for "IP Address Assignment Guidelines".
  The IESG considered the creation of an addressing plan to be an
  operational issue.  Therefore, the IESG asked Bernhard Stockman
  (IESG Operational Requirements Area Co-Director) to lead an effort
  to develop such a plan.  Bernhard Stockman is in a position to
  bring important international input (Stockman92) into this effort
  because he is a key player in RIPE and EBONE and he is a co-chair
  of the Intercontinental Engineering Planning Group (IEPG).
  A specific proposal [Gerich92] has now emerged.  [Gerich92]
  incorporates the views of the IETF, RIPE, IEPG, and the Federal
  Engineering Planning group (FEPG).
  c. Pursue CIDR extensions to BGP in the BGP WG.
  This activity stated at the San Diego IETF meeting.  A new BGP
  specification, BGP4, incorporating the CIDR extensions, is now
  available for public comment [Rekhter92a].





  d. Form a new WG to consider CIDR-related extensions to IDRP
  (e.g., specify how run IDRP for IP inter-domain routing).
  e. Give careful consideration to how CIDR will be deployed in the
  Internet.
  This includes issues such as how to maintain address aggregation
  across non-CIDR domains and how CIDR and various IGPs will need to
  interact.  Depending on the status of the combined CIDR
  activities, the IESG may recommend forming a "CIDR Deployment WG",
  along the same lines as the current BGP Deployment WG.

Regarding "Bigger Internet Addresses"

In April-May 1992, the IESG reviewed the various approaches emerging from the ROAD group activities -- e.g., "Simple CLNP" [Callon92a], "IP Encaps" [Hinden92], "CNAT" [Callon92b], and "Nimrod" [Chiappa91]. (Note: These were the only proposals under serious consideration in this time period. Other proposals, namely "The P Internet Protocol (PIP)" [Tsuchiya92b] and "The Simple Internet Protocol (SIP)" [Deering92] have since been proposed. Following the San Diego IETF deliberations in March, "Simple CLNP" evolved into "TCP and UDP with Bigger Addresses (TUBA)", and "IP Encaps" evolved into "IP Address Encapsulation (IPAE)" [Hinden92].) The "Simple CLNP" approach perhaps initially enjoyed more support than other approaches. However, the consensus view in the IESG was that the full impact of transition to "Simple CLNP" (or to any of the proposed approaches) had not yet been explored in sufficient detail to make a final recommendation possible at this time. The feeling in the IESG was that such important issues as

  - impact on operational infrastructure,
  - impact on current protocols (e.g., checksum computation
    in TCP and UDP under any new IP-level protocol),
  - deployment of new routing protocols,
  - assignment of new addresses,
  - impact on performance,
  - ownership of change control
  - effect of supporting new protocols, such as for address
    resolution,
  - effect on network management and security, and
  - the costs to network operators and network users who must




    be trained in the architecture and specifics of any  new
    protocols needed to be explored in more depth before a
    decision of this magnitude should be made.

At first the question seemed to be one of timing. At the risk of oversimplifying some very wide ranging discussions, many in the IESG felt that if a decision had to be made

  • immediately*, then "Simple CLNP" might be their choice. However,

they would feel much more comfortable if more detailed information was part of the decision. The IESG felt there needed to be an open and thorough evaluation of any proposed new routing and addressing architecture. The Internet community must have a thorough understanding of the impact of changing from the current IP architecture to a new one. The community needs to be confident that we all understand which approach has the most benefits for long-term internet growth and evolution, and the least impact on the current Internet. The IESG considered what additional information and criteria were needed to choose between alternative approaches. We also considered the time needed for gathering this additional information and the amount of time remaining before it was absolutely imperative to make this decision (i.e., how much time do we have before we are in danger of running out of IP addresses *before* we could deploy a new architecture?). This led the IESG to propose a specific set of selection criteria and information, and specific milestones and timetable for the decision. The next section describes the milestones and timetable for choosing the approach for bigger Internet addresses. The selection criteria referenced in the milestones are contained in Appendix B.

Milestones And Timetable For Making a Recommendation for "Bigger

Internet Addresses"

In June, the IESG recommended that a call for proposals be made, with initial activities to begin at the July IETF in Boston, and with a strict timetable for reaching a recommendation coming out of the November IETF meeting [Gross92a]. Eventually, the call for proposals was made at the July meeting itself.





A working group will be formed for each proposed approach. The charter of each WG will be to explore the criteria described in Appendix B and to develop a detailed plan for IESG consideration. The WGs will be asked to submit an Internet-Draft prior to the November 1992 IETF, and to make presentations at the November IETF. The IESG and the IETF will review all submitted proposals and then the IESG will make a recommendation to the IAB following the November 1992 IETF meeting. Therefore, the milestones and timetable for the IESG to reach a recommendation on bigger Internet addresses are:

  July 1992 -- Issue a call for proposals at the Boston IETF meeting
  to form working groups to explore separate approaches for bigger
  Internet addresses.
  August-November 1992 -- Proposed WGs submit charters, create
  discussion lists, and begin their deliberations by email and/or
  face- to-face meetings.  Redistribute the IESG recommendation
  (i.e., this memo).  Public review, discussion, and modification as
  appropriate of the "selection criteria" in Appendix B.
  October 1992 -- By the end of October, each WG will be required to
  submit a written description of the approach and how the criteria
  are satisfied.  This is to insure that these documents are
  distributed as Internet-Drafts for public review well before the
  November IETF meeting.
  November 1992 -- Each WG will be given an opportunity to present
  its findings in detail at the November 1992 IETF meeting.  Based
  on the written documents, the presentations, and public
  discussions (by email and at the IETF), the IESG will forward a
  recommendation to the IAB after the November IETF meeting.

SUMMARY

The problems of Internet scaling and address exhaustion are fundamentally important to the continued health of the global Internet, and to the long-term success of such programs as the U.S. NREN and the European EBONE. Finding and embarking on a course of action is critical. However, the problem is so important that we need a deep understanding of the information and criteria described in Appendix B before a decision is made. With this memo, the IESG re-affirms its earlier recommendation to the IAB that (a) we move CIDR forward in the IETF as described in section 4.3, and (b) that we encourage the exploration of other proposals for




a bigger Internet address space according to the timetable in section 4.5. Appendix A. FOR MORE INFORMATION To become better acquainted with the issues and/or to follow the progress of these activities:

   - Please see the documents in the Bibliography below.
   - Join the Big-Internet mailing list where the general issues
     are discussed ([email protected]).
   - Any new WG formed will have an open mailing list.  Please feel
     free to join each as they are announced on the IETF mailing
     list.  The current lists are:
      PIP:      [email protected]
      TUBA:     [email protected]
      IPAE:     [email protected]
      SIP:      [email protected]
   - Attend the November IETF in Washington D.C. (where the WGs
     will report and the IESG recommendation will begin formulating
     its recommendation to the IAB).

Note: In order to receive announcements of:

   - future IETF meetings and agenda,
   - new IETF working groups, and
   - the posting of Internet-Drafts and RFCs,

please send a request to join the IETF-Announcement mailing list ([email protected]). Appendix B. INFORMATION AND SELECTION CRITERIA FOR "BIGGER INTERNET

         ADDRESSES"

This section describes the information and criteria which the IESG felt that any new routing and addressing proposal should supply. As the community has a chance to comment on these criteria, and as the IESG gets a better understanding of the issues relating to selection of a new routing and addressing architecture, this section may be revised and published in a separate document. It is expected that every proposal submitted for consideration should address each item below on an point-by-point basis.





B.1 Description of the Proposed Scheme A complete description of the proposed routing and addressing architecture should be supplied. This should be at the level of detail where the functionality and complexity of the scheme can be clearly understood. It should describe how the proposal solves the basic problems of IP address exhaustion and router resource overload. B.2 Changes Required All changes to existing protocols should be documented and new protocols which need to be developed and/or deployed should be specified and described. This should enumerate all protocols which are not currently in widespread operational deployment in the Internet. Changes should also be grouped by the devices and/or functions they affect. This should include at least the following:

     - Protocol changes in hosts
     - Protocol changes in exterior router
     - Protocol changes in interior router
     - Security and Authentication Changes
     - Domain name system changes
     - Network management changes
     - Changes required to operations tools (e.g., ping, trace-
       route, etc.)
     - Changes to operational and administration
       procedures

The changes should also include if hosts and routers have their current IP addresses changed. The impact and changes to the existing set of TCP/IP protocols should be described. This should include at a minimum:

     - IP
     - ICMP
     - DNS
     - ARP/RARP
     - TCP
     - UDP
     - FTP
     - RPC
     - SNMP

The impact on protocols which use IP addresses as data should be specifically addressed.




B.3 Implementation Experience A description of implementation experience with the proposal should be supplied. This should include the how much of the proposal was implemented and hard it was to implement. If it was implemented by modifying existing code, the extent of the modifications should be described. B.4 Large Internet Support The proposal should describe how it will scale to support a large internet of a billion networks. It should describe how the proposed routing and addressing architecture will work to support an internet of this size. This should include, as appropriate, a description of the routing hierarchy, how the routing and addressing will be organized, how different layers of the routing interact (e.g., interior and exterior, or L1, L2, L3, etc.), and relationship between addressing and routing. The addressing proposed should include a description of how addresses will be assigned, who owns the addresses (e.g., user or service provider), and whether there are restrictions in address assignment or topology. B.5 Syntax and semantics of names, identifiers and addresses Proposals should address the manner in which data sources and sinks are identified and addressed, describe how current domain names and IP addresses would be used/translated/mapped in their scheme, how proposed new identifier and address fields and semantics are used, and should describe the issues involved in administration of these id and address spaces according to their proposal. The deployment plan should address how these new semantics would be introduced and backward compatibility maintained. Any overlays in the syntax of these protocol structures should be clearly identified and conflicts resulting from syntactic overlay of functionality should be clearly addressed in the discussion of the impact on administrative assignment. B.6 Performance Impact The performance impact of the new routing and addressing architecture should be evaluated. It should be compared against the current state of the art with the current IP. The performance evaluation for routers and hosts should include packets-per-second and memory usage projections, and bandwidth usage for networks. Performance should be evaluated for both high speed speed and low speed lines.




Performance for routers (table size and computational load) and network bandwidth consumption should be projected based on the following projected data points:

  -Domains    10^3   10^4   10^5   10^6   10^7   10^8
  -Networks   10^4   10^5   10^6   10^7   10^8   10^9
  -Hosts      10^6   10^7   10^8   10^9   10^10  10^11

B.7 Support for TCP/IP hosts than do not support the new architecture The proposal should describe how hosts which do not support the new architecture will be supported -- whether they receive full services and can communicate with the whole Internet, or if they will receive limited services. Also, describe if a translation service be provided between old and new hosts? If so, where will be this be done. B.8 Effect on User Community The large and growing installed base of IP systems comprises people, as well as software and machines. The proposal should describe changes in understanding and procedures that are used by the people involved in internetworking. This should include new and/or changes in concepts, terminology, and organization. B.9 Deployment Plan Description The proposal should include a deployment plan. It should include the steps required to deploy it. Each step should include the devices and protocols which are required to change and what benefits are derived at each step. This should also include at each step if hosts and routers are required to run the current and proposed internet protocol. A schedule should be included, with justification showing that the schedule is realistic. B.10 Security Impact The impact on current and future security plans should be addressed. Specifically do current security mechanisms such as address and protocol port filtering work in the same manner as they do today, and what is the effect on security and authentication schemes currently under development. B.11 Future Evolution The proposal should describe how it lays a foundation for solving




emerging internet problems such as security/authentication, mobility, resource allocation, accounting, high packet rates, etc. Appendix C. BIBLIOGRAPHY -Documents and Information from IETF/IESG: [Ford92] Ford, P., and P. Gross, "Routing And Addressing Considerations", Proceedings of the Twenty-Third IETF, March 1992. [Gross92] Gross, P., "Chair's Message and Minutes of the Open IETF Plenary", Proceedings of the Twenty-Third IETF, March 1992. [Gross92a] Gross, P., "IESG Deliberations on Routing and Addressing", Electronic mail message to the Big-Internet mailing list, June 1992. -Documents directly resulting from the ROAD group: [Fuller92] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Supernetting: an Address Assignment and Aggregation Strategy", RFC 1338, BARRNet, cisco, Merit, OARnet, June 1992. [Hinden92] Hinden, B., "New Scheme for Internet Routing and Addressing (ENCAPS)", Email message to Big-Internet mailing list, March 16, 1992. [Callon92a] Callon, R., "TCP and UDP with Bigger Addresses (TUBA), A Simple Proposal for Internet Addressing and Routing", RFC 1347, DEC, June 1992 [Deering92] Deering, S., "City Codes: An Alternative Scheme for OSI NSAP Allocation in the Internet", Email message to Big-Internet mailing list, January 7, 1992. [Callon92b] CNAT -Related Documents: [Hinden92b] Hinden, R., and D. Crocker, "A Proposal for IP Address Encapsulation (IPAE): A Compatible version of IP with Large Addresses", Work in Progress, June 1992. [Deering92b] Deering, S., "The Simple Internet Protocol", Big- Internet mailing list. [Stockman92] Karrenberg, D., and B. Stockman, "A Proposal for a Global Internet Addressing Scheme", Work in Progress, May 1992.





[Rekhter92] Rekhter, Y., and T. Li, "Guidelines for IP Address Allocation", Work in Progress, May 1992. [Rekhter92b] Rekhter, Y., and T. Li, "The Border Gateway Protocol (Version 4)", Work in Progress, September 1992. [Rekhter92c] Rekhter, Y., and P. Gross, "Application of the Border Gateway Protocol", Work in Progress, September 1992. [Gerich92] Gerich, E., "Guidelines for Management of IP Address Space", RFC 1366, Merit, October 1992. [Solen92] Solensky, F., and F. Kastenholz, "A Revision to IP Address Classifications", Work in Progress, March 1992. [Wang92] Wany, Z., and J. Crowcroft, "A Two-Tier Address Structure for the Internet: A Solution to the Problem of Address Space Exhaustion", RFC 1335, University College London, May 1992. [Callon91] Callon, R., Gardner, E., and R. Colella, "Guidelines for OSI NSAP Allocation in the Internet", RFC 1237, NIST, Mitre, DEC, July 1991. [Tsuchiya92a] Tsuchiya, P., "The IP Network Address Translator (NAT): Preliminary Design", Work in Progress, April 1991. [Tsuchiya92b] Tsuchiya, P., "The 'P' Internet Protocol", Work in Progress, May 1992. [Chiappa91] Chiappa, J., "A New IP Routing and Addressing Architecture", Work in Progress, July 1991. [Clark91] Clark, D., Chapin, L., Cerf, V., Braden, R., and R. Hobby, "Towards the Future Internet Architecture", RFC 1287, MIT, BBN, CNRI, ISI, UCDavis, December 1991. Security Considerations Security issues are discussed in sections 4.4, B.2, B.10, and B.11.









Authors' Addresses Phillip Gross, IESG Chair Advanced Network & Services 100 Clearbrook Road Elmsford, NY Phone: 914-789-5300 EMail: [email protected]

Philip Almquist Stanford University Networking Systems Pine Hall 147 Stanford, CA 94305 Phone: (415) 723-2229 EMail: [email protected]