<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-iannone-ip-addressing-considerations-01" category="info" submissionType="IETF" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IP Addressing Considerations">IP Addressing Considerations</title>

    <author initials="L." surname="Iannone" fullname="Luigi Iannone" role="editor">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>

    <date />

    <area>Internet</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 328?>

<t>The Internet Protocol (IP) has been the major technological success in information technology of the last half century. As the Internet becomes pervasive, IP has been replacing communication technology for many domain-specific solutions, but it also has been extended to better fit the specificities of the different use cases.
For Internet addressing in particular, as it is defined in RFC 791 for IPv4 and RFC 8200 for IPv6, respectively, there exist many extensions. Those extensions have been developed to evolve the addressing capabilities beyond the basic properties of Internet addressing. This discusses the properties the IP addressing model, showcasing the continuing need to extend it and the methods used for doing so.</t>

<t>The most important aspect of the analysis and discussion in this document is that it represents a snapshot of the discussion that took place in the IETF (on various mailing lists and several meetings) in the early 2020s. While the community did not converge on specific actions to be taken, the content of this document may nonetheless be of use at some point in the future should the community decide so.</t>



    </abstract>



  </front>

  <middle>


<?line 337?>

<section anchor="SEC:why"><name>Rationale</name>

<t>The Internet Protocol (IP), positioned as the unified protocol at the (Internet) network layer, is seen by many as key to the innovation stemming from Internet-based applications and services.  Even more so, with the success of the TCP/IP protocol stack, IP has been gradually replacing existing domain-specific protocols, evolving into the core protocol of the ever-growing communication eco-system.</t>

<t>At its inception, roughly 40 years ago <xref target="RFC0791"/>, the Internet addressing system, represented in the form of the IP address and its locator-base (topological) semantics, has brought about the notion of a 'common namespace for all communications'.  Compared to proprietary technology-specific solutions, such 'common namespace for all communications' ensures end-to-end communication from any device connected to the Internet to another.</t>

<t>However, use cases, associated services, node behaviors, and requirements on packet delivery have since been significantly extended, with suitable Internet technology being developed to accommodate them in the framework of addressing that stood at the aforementioned beginning of the Internet's development.  This continuing evolution includes addressing and, therefore, the address structure, as well as the semantic that is being used for packet forwarding (e.g., service identification, content location, device type). In this, the topological location centrality of IP is fundamental when reconciling the often-differing semantics for 'addressing' that can be found new use cases. Due to this centrality, use cases often have to adopt specific solutions, e.g., translating/mapping/converting concepts, semantics, and ultimately, solution-specific addressing, and integrate them into the common IP addressing model.</t>

<t>The IETF community has, at various times, discussed the IP addressing model and its possible evolution, while keeping its structure unchanged, so to accommodate future use cases and existing deployments.  This document does (or at least tries to) capture the discussion that the IETF community held about IP addressing model in the early 2020s.  The discussion originated from two memos proposing an analysis of the extensions developed to better adapt the IP addressing model to specific use cases <xref target="I-D.iannone-internet-addressing-considerations"/> and a (shorter) companion memo trying to formalize a related problem statement <xref target="I-D.iannone-scenarios-problems-addressing"/>. Further, an informal side meeting was organized during IETF 112 <xref target="SIDE112"/> with a panel of experts, which had a lively discussion.  That discussion continued, with a very large volume of messages, on the INTArea mailing list and other mailing lists, like architectural discuss, honing into the related question on what desired features a network should provide in the first place (see <xref target="SEC:A:features"/> for a summary of the feature listed in that discussion). The IAB also touched briefly the topic in one of their retreats. The momentum and the amplitude of the discussion did raise the question whether or not to go for a formal Working Group, although the community failed to converge on a specific direction that could eventually lead to an evolution of the IP addressing model and at the same time the steam diminished.</t>

<t>The latest revision of the aforementioned individual submissions captured the discussion of the wider community, summarizing mail exchange and including contributions from a large set of co-authors. This separate memo includes a large portion of those documents, in addition to follow-up discussions since, with the purpose to document the inputs, thoughts, and opinions of a part of the IETF community.</t>

</section>
<section anchor="SEC:intro"><name>Introduction</name>

<t>As the Internet Protocol adoption has grown towards the global communication system we know today, its characteristics have evolved subtly, with <xref target="RFC6250"/> documenting various aspects of the IP service model and its frequent misconceptions, including Internet addressing.
The very origin of the discussion resulting in this document was the observation that in various use-cases, addressing has evolved and is somehow adapted or extended.</t>

<t>These desired features have implications that go beyond addressing and need to be tackled from a larger architectural point of view. Nevertheless, the discussion that took place only focused on the addressing viewpoint, identifying shortcomings perceived from this perspective, in particular with respect to IP addressing properties. 
The key properties of Internet addressing, outlined in <xref target="SEC:properties"/>, are (i) the fixed length of the IP addresses, (ii) the ambiguity of IP addresses semantic, while still (iii) providing limited IP address semantic support. Those properties are derived directly as a consequence of the respective standards that provide the basis for Internet addressing, most notably <xref target="RFC0791"/> for IPv4 and <xref target="RFC8200"/> for IPv6, respectively.
The limitations of the IP addressing properties are discussed in <xref target="SEC:problem"/>, including the various use cases and scenarios where such limitations actually show up.</t>

<t>What is interesting to note is that different use-cases may actually been handled with the same type of extension. This shows that,  based on an architectural approach, evolving the properties discussed in <xref target="SEC:properties"/> is possible and even desirable since it has the advantage to be designed in a coherent fashion, avoiding point-solutions which may create contention when deployed. To this end, <xref target="SEC:ExtProp"/> discusses Internet addressing properties extensions, associating the different use-cases that take advantage of the property's extensions.</t>

<t>While the various extensions proposed through the years certainly did a fine job in solving the problem at hand, this "patching" approach raises also concerns.  <xref target="SEC:concerns"/> outlines considerations and concerns that arise with such extension-driven approach, arguing that any requirements for solutions that would revise the basic Internet addressing would require to address those concerns.</t>

</section>
<section anchor="SEC:properties"><name>Current Properties of Internet Protocol Addressing</name>

<t>In this section, the three most acknowledged properties related to <em>Internet addressing</em> are detailed. Those are (i) fixed IP address length, (ii) ambiguous IP address semantic, and (iii) limited IP address semantic support.</t>

<section anchor="SEC:properties:1"><name>Property 1: Fixed Address Length</name>

<t>The fixed IP address length is specified as a key property of the design of Internet addressing, with 32 bits for IPv4 (<xref target="RFC0791"/>), and 128 bits for IPv6 (<xref target="RFC8200"/>), respectively. Given the capability of the hardware at the time of IPv4 design, a fixed length address was considered as a more appropriate choice for efficient packet forwarding. Although the address length was once considered to be variable during the design of Internet Protocol Next Generation ("IPng", cf., <xref target="RFC1752"/>) in the 1990s, it finally inherited the design of IPv4 and adopted a fixed length address towards the current IPv6. As a consequence, the 128-bit fixed address length of IPv6 is regarded as a balance between fast forwarding (i.e., fixed length) and practically boundless cyberspace (i.e., enabled by using 128-bit addresses).</t>

</section>
<section anchor="SEC:properties:2"><name>Property 2: Ambiguous Address Semantic</name>

<t>Initially, the meaning of an IP address has been to identify an interface on a network device, although, when <xref target="RFC0791"/> was written, there were no explicit definitions of the IP address semantic.</t>

<t>With the global expansion of the Internet protocol, the semantic of the IP address is commonly believed to contain at least two notions, i.e., the explicit 'locator', and the implicit 'identifier'. Because of the increasing use of IP addresses to both identify a node and to indicate the physical (or virtual) location of the node, the intertwined address semantics of identifier and locator was then gradually observed and first documented in <xref target="RFC2101"/> as 'locator/identifier overload' property. With this, the IP address is used as an identification for host and server, very often directly used, e.g., for remote access or maintenance.</t>

</section>
<section anchor="SEC:properties:3"><name>Property 3: Limited Address Semantic Support</name>

<t>Although IPv4 <xref target="RFC0791"/> did not add any semantic to IP addresses beyond interface identification (and location), time has proven that additional semantics are desirable (c.f., the history of 127/8 <xref target="HISTORY127"/> or the introduction of private addresses <xref target="RFC1918"/>). Later on, IPv6 <xref target="RFC4291"/> introduced some form of additional semantics based on specific prefix values, for instance link-local addresses or a more structured multicast addressing. Nevertheless, systematic support for rich address semantics remains limited and basically prefix-based.</t>

</section>
</section>
<section anchor="SEC:problem"><name>Perceived IP Addressing Shortcomings</name>


<t>What follows is the list identified during the various exchange, which is however not to be considered exhaustive.</t>

<t><list style="numbers">
  <t>Limiting Alternative Address Semantics: Several communication scenarios pursue the use of alternative semantics (e.g., for privacy, for service identification, or for content identification) preserving what constitute an 'address' of a packet traversing the Internet, which may fall foul of the defined network interface semantic of IP addresses.</t>
  <t>Hampering Security: Aligning with the semantic and length limitations of IP addressing may hamper the security objectives of any new semantic, possibly leading to detrimental effects and possible other workarounds (at the risk of introducing fragility rather than security).</t>
  <t>Hampering Privacy: The simple use of IP addresses as global stable interface identifiers raises clear privacy concerns. It goes beyond profiling the traffic of end users, since it can even be easily used to obtain the real identity of individuals.</t>
  <t>Complicating Traffic Engineering: Utilizing a plethora of non-address inputs (e.g., port numbers, segments ID, payload) into the traffic steering decision in real networks may complicate traffic engineering in that it makes the development of suitable policies more complex, while also leading to possible contention between methods being used.</t>
  <t>Hampering Efficiency: Extending IP addressing through point-wise solutions also hampers efficiency, e.g., through needed re-encapsulation (therefore increasing the header processing overhead as well as header-to-payload ratio), through introducing path stretch, or through requiring compression techniques to reduce the header proportion of large addresses when operating in constrained environments.</t>
  <t>Fragility: The introduction of point solutions, each of which comes with possibly own usages of address or packet fields, together with extension-specific operations, increases the overall fragility of the resulting system, caused, for instance, through contention between feature extensions that were neither foreseen in the design nor tested during the implementation phase.</t>
  <t>Extensibility: Accommodating new requirements through ever new extensions as an extensibility approach to addressing compounds aspects discussed before, i.e., fragility, efficiency etc. It complicates engineering due to the clearly missing boundaries against which contentions with other extensions could be managed. It complicates standardization since extension-based extensibility requires independent, and often lengthy, standardization processes. And ultimately, deployments are complicated due to backward compatibility testing required for any new extension being integrated into the deployed system.</t>
</list></t>

<t>The above shortcomings are not apparent in every possible use case, rather they appear, in a more or less severe form, in specific use cases. 
Hereafter, a set of such kind of use cases, for which extensions to the IP addressing model have been already proposed on a case-by-case basis, is listed. An extensive discussion about these use cases and related extensions can be found in <xref target="SEC:B:extensions"/>. Here, for each use case, a very short description is provided, while <xref target="TAB:mapping"/> shows how the previously identified issues do arise somehow in these use cases.</t>

<t><list style="symbols">
  <t>Communication in Constrained Environments: Resource constrained networks like Internet of Things (IoT), Industrial IoT, avionics.</t>
  <t>Communication within Dynamically Changing Topologies: Networks that exhibit dynamically changing, e.g. satellite networks, vehicular networks, Flying Ad-hoc NETworks (FANETs).</t>
  <t>Communication among Moving Endpoints: The huge progress in wireless communications (WiFi, 3G/4G/5G, etc) have enable ubiquitous endpoint mobility.</t>
  <t>Communication Across Services: Communication among services and resources from various aspects such as remote collaboration, shopping, content production, delivery, education, etc.</t>
  <t>Communication Traffic Steering: The ability to control where the traffic goes through (beyond the simple best-effort shortest-path).</t>
  <t>Communication with built-in security: AAA (Authentication, Authorization, Accountability), end-to-end encryption.</t>
  <t>Communication protecting user privacy: Private communication and fingerprinting avoidance.</t>
  <t>Communication in Alternative Forwarding Architectures: Non-Internet Protocol based networks.</t>
</list></t>

<texttable title="Issues Involved in Challenging Scenarios." anchor="TAB:mapping">
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='center'>Issue 1</ttcol>
      <ttcol align='center'>Issue 2</ttcol>
      <ttcol align='center'>Issue 3</ttcol>
      <ttcol align='center'>Issue 4</ttcol>
      <ttcol align='center'>Issue 5</ttcol>
      <ttcol align='center'>Issue 6</ttcol>
      <c>Constrained Environments</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Dynamically Changing Topologies</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Moving Endpoints</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Across Services</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Traffic Steering</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Built-in Security</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Alternative Forwarding Architectures</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
</texttable>

</section>
<section anchor="SEC:ExtProp"><name>Existing IP Addressing Extensions</name>

<t>As already stated, during the years various technologies have been developed that circumvent some IP addressing shortcomings, basically extending the properties defined in <xref target="SEC:properties"/>. Hereafter, an overview of such  existing extensions is provided, grouped by property. 
For each group, a general description and the methodology used by the various extensions is provided. Details about the cited technologies relates to properties extension can be found in <xref target="SEC:C:propext"/>.</t>

<section anchor="length-extensions"><name>Length Extensions</name>

<t>Extensions in this subsection aim at extending the property described in <xref target="SEC:properties:1"/>, i.e., the fixed IP address length.</t>

<t>When IPv6 was designed, the main objective was to create an address space that would not lead to the same situation as IPv4, namely to address exhaustion. To this end, while keeping the same addressing model like IPv4, IPv6 adopted a 128-bit address length with the aim of providing a sufficient and future-proof address space. The choice was also founded on the assumption that advances in hardware and Moore's law would still allow to make routing and forwarding faster, and the IPv6 routing table manageable.</t>

<t>We observe, however, that the rise of new use cases but also the number of new devices, e.g., industrial/home or small footprint devices, was possibly unforeseen. Sensor networks and more generally the Internet of Things (IoT) emerged after the core body of work on IPv6, thus different from IPv6 assumptions, 128-bit addresses were costly in certain scenarios. On the other hand, given the huge investments that IPv6 deployment involved, certain solutions are expected to increase the addressing space of IPv4 in a compatible way, and thus extend the lifespan of the sunk investment on IPv4.</t>

<t>At the same time, it may also be possible to use variable and longer address lengths to address current networking demands. For example, in content delivery networks, longer addresses such as URLs are required to fetch content, an approach that Information-Centric Networking (ICN) applied for any data packet sent in the network, using information-based addressing at the network layer. Furthermore, as an approach to address the routing challenges faced in the Internet, structured addresses may be used in order to avoid the need for routing protocols. Using variable length addresses allow as well to have shorter addresses. So, for requirements for smaller network layer headers, shorter addresses could be used, maybe alleviating the need to compress other fields of the header. Furthermore, transport layer port numbers can be considered short addresses, where the high order bits of the extended address are the public IP of a NAT. Hence, in IoT deployments, the addresses of the  devices can be really small and based on the port number, but they all share the global address of the gateway to make each one having a globally unique address.</t>

<section anchor="shorter-address-length"><name>Shorter Address Length</name>

<section anchor="description"><name>Description</name>

<t>In the context of IoT <xref target="RFC7228"/>, where bandwidth and energy are very scarce resources, the static length of 128-bit for an IP address is more a hindrance than a benefit since 128-bit for an IP address may occupy a lot of space, even to the point of being the dominant part of a packet. In order to use bandwidth more efficiently and use less energy in end-to-end communication, solutions have been proposed that allow for very small network layer headers instead.</t>

</section>
<section anchor="methodology"><name>Methodology</name>

<dl>
  <dt>Header Compression/Translation:</dt>
  <dd>
    <t>One of the main approaches to reduce header size in the IoT context is by compressing it. Such technique is based on a stateful approach, utilizing what is usually called a 'context' on the IoT sensor and the gateway for communications between an IoT device and a server placed somewhere in the Internet - from the edge to the cloud.</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>The role of the 'context' is to provide a way to 'compress' the original IP header into a smaller one, using shorter address information and/or dropping some field(s); the context here serves as a kind of dictionary.</t>
</li></ul>

<dl>
  <dt>Separate device from locator identifier:</dt>
  <dd>
    <t>Approaches that can offer customized address length that is adequate for use in such constrained domains are preferred. Using different namespaces for the 'device identifier' and the 'routing' or 'locator identifier' is one such approach.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="SEC:longer-addr"><name>Longer Address Length</name>

<section anchor="description-1"><name>Description</name>

<t>Historically, obtaining adequate address space is considered as the primary and raw motivation to invent IPv6. Longer address (more than 32-bit of IPv4 address), which can accommodate almost inexhaustible devices, used to be considered as the surest direction in 1990s. Nevertheless, to protect the sunk cost of IPv4 deployment, certain efforts focus on IPv4 address space depletion question but engineer IPv4 address length in a more practical way. Such effort, i.e., NAT (Network Address Translation), unexpectedly and significantly slows IPv6 deployment because of its high cost-effectiveness in practice.</t>

<t>Another crucial need for longer address lengths comes from "semantic extensions" to IP addresses, where the extensions themselves do not fit within the length limitation of the IP address. This sub-section focuses on address length extensions that aim at reducing the IPv4 addresses depletion, while <xref target="SEC:semantic_extensions"/>, i.e., address sematic extensions, may still refer to extensions when longer address length are suitable to accommodate different address semantic.</t>

</section>
<section anchor="methodology-1"><name>Methodology</name>

<dl>
  <dt>Split address zone by network realm:</dt>
  <dd>
    <t>This methodology first split the network realm into two types: one public realm (i.e., the Internet), and innumerable private realms (i.e., local networks, which may be embedded and/or having different scope). Then, it splits the IP address space into two type of zones: global address zone (i.e., public address) and local address zone (e.g., private address, reserved address). Based on this, it is assumed that in public realm, all devices attached to it should be assigned an address that belongs to the global address zone. While for devices attached to private realms, only addresses belonging to the local address zone will be assigned. Local realms may have different scope or even be embedded one in another, like for instance, light switches local network being part of the building local network, which in turn connects to the Internet. 
In the local realms, addresses may have a pure identification purpose. For instance, in the last example, addresses of the light switches identify the switches themselves, while the building local network is used to locate them.</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>Given that the local address zone is not globally unique, certain mechanisms are designed to express the relationship between the global address zone (in public realm) and the local address zone (in any private realm). In this case, global addresses are used for forwarding when a packet is in the public realm, and local addresses are used for forwarding when a packet is in a private realm.</t>
</li></ul>

</section>
</section>
<section anchor="examples"><name>Examples</name>

<t><xref target="TAB:length"/> summarizes methodologies and lists examples of IP address length extensions.</t>

<texttable title="Summary Length Extensions" anchor="TAB:length">
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='left'>Methodology</ttcol>
      <ttcol align='left'>Examples</ttcol>
      <c>Shorter Address Length</c>
      <c>Header compression/translation</c>
      <c>6LoWPAN, ROHC, SCHC</c>
      <c>&#160;</c>
      <c>Separate device from locator identifier</c>
      <c>EIBP, LISP, ILNP, HIP</c>
      <c>Longer Address Length</c>
      <c>Split address zone by network realm</c>
      <c>NAT, EzIP</c>
</texttable>

</section>
</section>
<section anchor="identity-extensions"><name>Identity Extensions</name>

<t>Extensions in this subsection attempt extending the property described in <xref target="SEC:properties:2"/>, i.e., 'locator/identifier overload' of the ambiguous address semantic.</t>

<t>From the perspective of Internet users, on the one hand, the implicit identifier semantic results in a privacy concern due to network behavior tracking and association. Despite that IP address assignments may be dynamic, they are nowadays considered as 'personal data' and as such undergoes privacy protection regulations like General Data Protection Regulation ("GDPR" <xref target="VOIGT17"/>). Hence, additional mechanisms are necessary in order to protect end user privacy.</t>

<t>For network regulation of sensitive information, on the other hand, dynamically allocated IP addresses are not sufficient to guarantee device or user identification. As such, different address allocation systems, with stronger identification properties are necessary where security and authentication are at highest priority. Hence, in order to protect information security within a network, additional mechanisms are necessary to identify the users or the devices attached to the network.</t>

<section anchor="anonymous-address-identity"><name>Anonymous Address Identity</name>

<section anchor="description-2"><name>Description</name>

<t>As discussed in <xref target="SEC:properties:2"/>, IP addresses reveal both 'network locations' as well as implicit 'identifier' information to both traversed network elements and destination nodes alike. This enables recording, correlation, and profiling of user behaviors and historical network traces, possibly down to individual real user identity. The IETF, e.g., in <xref target="RFC7258"/>, has taken a clear stand on preventing any such pervasive monitoring means by classifying them as an attack on end users' right to be left alone (i.e., privacy). Regulations such as the EU's General Data Protection Regulation (GDPR) classifies, for instance, the 'online identifier' as personal data which must be carefully protected; this includes end users' IP addresses <xref target="VOIGT17"/>.</t>

<t>Even before pervasive monitoring <xref target="RFC7258"/>, IP addresses have been seen as something that some organizational owners of networked system may not want to reveal at the individual level towards any non-member of the same organization. Beyond that, if forwarding is based on semantic extensions, like other fields of the header, extension headers, or any other possible extension, if not adequately protected it may introduce privacy leakage and/or new attack vectors.</t>

</section>
<section anchor="methodology-2"><name>Methodology</name>

<dl>
  <dt>Traffic Proxy:</dt>
  <dd>
    <t>Detouring the traffic to a trusted proxy is a heuristic solution. Since nodes between trusted proxy and destination (including the destination per se) can only observe the source address of the proxy, the 'identification' of the origin source can thereby be hidden. To obfuscate the nodes between origin and the proxy, the traffic on such route would be encrypted via a key negotiated either in-band or off-band. Considering that all applications' traffic in such route can be seen as a unique flow directed to the same 'unknown' node, i.e., the trusted proxy, eavesdroppers in such route have to make more efforts to correlate user behavior through statistical analysis even if they are capable of identifying the users via their source addresses. The protection lays in the inability to isolate single application specific flows. According to the methodology, such approach is IP version independent and works for both IPv4 and IPv6.</t>
  </dd>
  <dt>Source Address Rollover:</dt>
  <dd>
    <t>Privacy concerns related to address 'identifier' semantic can be mitigated through regular change (beyond the typical 24 hours lease of DHCP).
Due to the semantics of 'identifier' that an IP address carries, such approach promotes to change the source IP address at a certain frequency. Under such methodology, the refresh cycling window may reach to a balance between privacy protection and address update cost. Due to the limited space that IPv4 contains, such approach usually works for IPv6 only.</t>
  </dd>
  <dt>Private Address Spaces:</dt>
  <dd>
    <t>Their introduction in <xref target="RFC1918"/> foresaw private addresses (assigned to specific address spaces by the IANA) as a means to communicate purely locally, e.g., within an enterprise, by separating private from public IP addresses. Considering that private addresses are never directly reachable from the Internet, hosts adopting private addresses are invisible and thus 'anonymous' for the Internet. Besides, hosts for purely local communication used the latter while hosts requiring public Internet service access would still use public IP addresses.</t>
  </dd>
  <dt>Address Translation:</dt>
  <dd>
    <t>The aforementioned original intention for using private IP addresses, namely for purely local communication, resulted in a lack of flexibility in changing from local to public Internet access on the basis of what application would require which type of service.</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>If eventually every end-system in an organization would require some form of public Internet access in addition to local one, an adequate number of public Internet addresses would be required for providing to all end systems. Instead, address translation enables to utilize many private IP addresses within an organization, while only relying on one (or few) public IP addresses for the overall organization.</t>
</li></ul>

<ul empty="true"><li>
  <t>In principle, address translation can be applied recursively. This can be seen in modern broadband access where Internet providers may rely on carrier-grade address translation for all their broadband customers, who in turn employ address translation of their internal home or office addresses to those (private again) IP addresses assigned to them by their network provider.</t>
</li></ul>

<ul empty="true"><li>
  <t>Two benefits arise from the use of (private to public IP) address translation, namely (i) the hiding of local end systems at the level of the (address) assigned organization, and (ii) the reduction of public IP addresses necessary for communication across the Internet. While the latter has been seen for long as a driver for address translation, in this section, we focus on the first one, also since we see such privacy benefit as well as objective as still being valid in addressing systems like IPv6 where address scarcity is all but gone <xref target="GNATCATCHER"/>.</t>
</li></ul>

<dl>
  <dt>Separate device from locator identifier:</dt>
  <dd>
    <t>Solutions that make a clear separation between the routing locator and the identifier, can allow for a device ID of any size, which in turn can be encrypted by a network element deployed at the border of routing domain (e.g.,  access/edge router). Both source and end-domain addresses can be encrypted and transported, as in the routing domain, only the routing locator is used.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="authenticated-address-identity"><name>Authenticated Address Identity</name>

<section anchor="description-3"><name>Description</name>

<t>In some scenarios (e.g., corporate networks) it is desirable to being able authenticate IP addresses in order to prevent malicious attackers spoofing IP addresses. This is usually achieved by using a mechanism that allows to prove ownership of the IP address. Another growing use case where identity verification is necessary for security and safety reasons is in the aeronautical context, for both manned and unmanned aerial vehicles (<xref target="RFC9153"/>, <xref target="I-D.haindl-lisp-gb-atn"/>).</t>

</section>
<section anchor="methodology-3"><name>Methodology</name>

<dl>
  <dt>Self-certified addresses:</dt>
  <dd>
    <t>This method is usually based on the use of nodes' public/private keys. A node creates its own interface ID (IID) by using a cryptographic hash of its public key (with some additional parameters). Messages are then signed using the nodes' private key. The destination of the message will verify the signature through the information in the IP address. Self-certification has the advantage that no third party or additional security infrastructure is needed. Any node can generate its own address locally and then only the address and the public key are needed to verify the binding between the public key and the address.</t>
  </dd>
  <dt>Collision-resistant addresses:</dt>
  <dd>
    <t>When self-certification cannot be used, an alternative approach is to generate addresses in a way that is statistically unique (collision-resistant). Authentication of the address then occurs in an out-of-band protocol, where the unique identifier is resolved to authenticating information.</t>
  </dd>
  <dt>Third party granted addresses:</dt>
  <dd>
    <t>DHCP (Dynamic Host Configuration Protocol) is widely used to provide IP addresses, however, in its basic form, it does not perform any check and even an unauthorized user without the right to use the network can obtain an IP address. To solve this problem, a trusted third party has to grant access to the network before generating an address (via DHCP or other) that identifies the user. User authentication done securely either based on physical parameters like MAC addresses or based on an explicit login/password mechanism.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="examples-1"><name>Examples</name>

<t><xref target="TAB:identity"/>, summarize the methodologies and lists examples of identity extensions.</t>

<texttable title="Summary Identity Extensions" anchor="TAB:identity">
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='left'>Methodology</ttcol>
      <ttcol align='left'>Examples</ttcol>
      <c>Anonymous Address Identity</c>
      <c>Traffic Proxy</c>
      <c>VPN, TOR, ODoH</c>
      <c>&#160;</c>
      <c>Source Address Rollover</c>
      <c>SLAAC</c>
      <c>&#160;</c>
      <c>Private Address Spaces</c>
      <c>ULA</c>
      <c>&#160;</c>
      <c>Address Translation</c>
      <c>NAT</c>
      <c>&#160;</c>
      <c>Separate device from locator identifier</c>
      <c>EIBP, LISP</c>
      <c>Authenticated Address Identity</c>
      <c>Self-certified Addresses</c>
      <c>CGA</c>
      <c>&#160;</c>
      <c>Third party granted addresses</c>
      <c>DHCP-Option</c>
</texttable>

</section>
</section>
<section anchor="SEC:semantic_extensions"><name>Semantic Extensions</name>

<t>Extensions in this subsection try extending the property described in <xref target="SEC:properties:3"/>, i.e., limited address semantic support.</t>

<t>As explained in <xref target="SEC:properties:2"/>, IP addresses carry both locator and identification semantic. Some efforts exist that try to separate these semantics either in different address spaces or through different address formats. Beyond just identification, location, and the fixed address size, other efforts extended the semantic through existing or additional header fields (or header options) outside the Internet address.</t>

<t>How much unique and globally routable an address should be? With the effect of centralization, edges communicate with (rather) local DCs, hence a unique address globally routable is not a requirement anymore. There is no need to use globally unique addresses all the time for communication, however, there is the need of having a unique address as a general way to communicate to any connected entity without caring what transmission networks the packets traverse.</t>

<section anchor="extended-address-semantics"><name>Extended Address Semantics</name>

<section anchor="description-4"><name>Description</name>

<t>Several extensions have been developed to extend beyond the limited IPv6 semantics. Those approaches may include to apply structure to the address, utilize specific prefixes, or entirely utilize the IPv6 address for different semantics, while re-encapsulating the original packet to restore the semantics in another part of the network. For instance, structured addresses have the capability to introduce delimiters to identify semantic information in the header, therefore not constraining any semantic by size limitations of the address fields.</t>

<t>We note here that extensions often start out as being proposed as an extended header semantic, while standardization may drive the solution to adopt an approach to accommodate their semantic within the limitations of an IP address. This section does include examples of this kind.</t>

</section>
<section anchor="methodology-4"><name>Methodology</name>

<dl>
  <dt>Semantic prefixes:</dt>
  <dd>
    <t>Semantic prefixes are used to separate the IPv6 address space. Through this, new address families, such as for information-centric networking <xref target="CAROFIGLIO19"/>, service routing or other semantically rich addressing, can be defined, albeit limited by the prefix length and structure as well as the overall length limitation of the IPv6 address.</t>
  </dd>
  <dt>Separate device/resource from locator identifier:</dt>
  <dd>
    <t>The option to use separate namespaces for the device address would  offer more freedom for the use of different semantics. For instance, the static binding of IP addresses to servers creates a strong binding between IP addresses and service/resources, which may be a limitation for large Content Distribution networks (CDNs) <xref target="FAYED21"/>.</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>As an extreme form of separating resource from locator identifier, recent engineering approaches, described in <xref target="FAYED21"/>, decouple web service (semantics) from the routing address assignments by using virtual hosting capabilities, thereby effectively mapping possibly millions of services onto a single IP address.</t>
</li></ul>

<dl>
  <dt>Structured addressing:</dt>
  <dd>
    <t>One approach to address the routing challenges faced in the Internet is the use of structured addresses, e.g., to void the need for routing protocols. Benefits of this approach can be significant, with the structured addresses capturing the relative physical or virtual position of routers in the network as well as being variable in length. Key to the approach, however, is that the structured addresses capturing the relative physical or virtual position of routers in the network, or networks in an internetwork may not fit within the fixed and limited IP address length (cf., <xref target="SEC:longer-addr"/>). Other structured approaches may be the use of application-specific structured binary components for identification, generalizing URL schema used for HTTP-level communication but utilized at the network level for traffic steering decisions.</t>
  </dd>
  <dt>Localized forwarding semantics:</dt>
  <dd>
    <t>Layer 2 hardware, such as SDN switches, are limited to the use of specific header fields for forwarding decisions. Hence, devising new localized forwarding mechanisms may be based on re-using differently existing header fields, such as the IPv6 source/destination fields, to achieve the desired forwarding behavior, while encapsulating the original packets in order to be restored at the local forwarding network boundary. Networks in those solutions are limited by the size of the utilized address field, e.g., 256 bits for IPv6, thereby limiting the way such techniques could be used.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="existing-or-extended-header-semantics"><name>Existing or Extended Header Semantics</name>

<section anchor="description-5"><name>Description</name>

<t>While the former sub-section explored extended address semantic, thereby limiting any such extended semantic with that of the existing IPv6 semantic and length, additional semantics may also be placed into the header of the packet or the packet itself, utilized for the forwarding decision to the appropriate endpoint according to the extended semantic.</t>

<t>Reasons for embedding such new semantics may be related to traffic engineering since it has long been shown that the IP address itself is not enough to steer traffic properly since the IP address itself is not semantically rich enough to adequately describe the forwarding decision to be taken in the network, not only impacting <em>where</em> the packet will need to go, but also <em>how</em> it will need to be sent.</t>

</section>
<section anchor="methodology-5"><name>Methodology</name>

<dl>
  <dt>In-Header extensions:</dt>
  <dd>
    <t>One way to add additional semantics besides the address fields is to use other fields already present in the header.</t>
  </dd>
  <dt>Headers option extensions:</dt>
  <dd>
    <t>Another mechanism to add additional semantics is to actually add additional fields, e.g., through Header Options in IPv4 or through Extension Headers in IPv6.</t>
  </dd>
  <dt>Re-encapsulation extension:</dt>
  <dd>
    <t>A more radical approach for additional semantics is the use of a completely new header that is designed so to carry the desired semantics in an efficient manner (often as a shim header).</t>
  </dd>
  <dt>Structured addressing:</dt>
  <dd>
    <t>Similar to the methodology that structures addresses within the limitations of the IPv6 address length, outlined in the previous sub-sections, structured addressing can also be applied within existing or extended header semantics, e.g., utilizing a dedicated (extension) header to carry the structured address information.</t>
  </dd>
  <dt>Localized forwarding semantics:</dt>
  <dd>
    <t>This set of solutions applies capabilities of newer (programmable) forwarding technology, such as <xref target="BOSSHART14"/>, to utilize any header information for a localized forwarding decision. This removes any limitation to use existing header or address information for embedding a new address semantic into the transferred packet.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="examples-2"><name>Examples</name>

<t><xref target="TAB:semantic"/>, summarize the methodologies and lists examples of semantic extensions.</t>

<texttable title="Summary Semantic Extensions" anchor="TAB:semantic">
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='left'>Methodology</ttcol>
      <ttcol align='left'>Examples</ttcol>
      <c>Utilizing Extended Address Semantics</c>
      <c>Semantic prefixes</c>
      <c>HICN</c>
      <c>&#160;</c>
      <c>Separate device from locator identifier</c>
      <c>EIBP, ILNP, LISP, HIP</c>
      <c>&#160;</c>
      <c>Structured addressing</c>
      <c>EIBP, ILNP</c>
      <c>&#160;</c>
      <c>Localized forwarding semantics</c>
      <c>REED</c>
      <c>Utilizing Existing or Extended Header Semantics</c>
      <c>In-Header extensions</c>
      <c>DetNet</c>
      <c>&#160;</c>
      <c>Headers option extensions</c>
      <c>SHIM6, SRv6, HIP</c>
      <c>&#160;</c>
      <c>Re-encapsulation extension</c>
      <c>VxLAN, ICNIP</c>
      <c>&#160;</c>
      <c>Structured addressing</c>
      <c>EIBP</c>
      <c>&#160;</c>
      <c>Localized forwarding semantics</c>
      <c>REED</c>
</texttable>

</section>
</section>
<section anchor="SEC:overall"><name>IP Addressing Extensions Overall Summary</name>

<t>The following <xref target="TAB:extension"/> describes the objectives of the extensions discussed in this memo with respect to the properties of Internet addressing (<xref target="SEC:properties"/>). As summarized, extensions may aim to extend one property of the Internet addressing, or extend other properties at the same time.</t>

<texttable title="Relationship between Extensions and Internet Addressing" anchor="TAB:extension">
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='center'>Length Extension</ttcol>
      <ttcol align='center'>Identity Extension</ttcol>
      <ttcol align='center'>Semantic Extension</ttcol>
      <c>6LoWPAN (<xref target="RFC6282"/>, <xref target="RFC7400"/>, <xref target="BADENHOP15"/>, <xref target="RFC8376"/>, <xref target="RFC8724"/>)</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>ROHC <xref target="RFC5795"/></c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>EzIP <xref target="EZIP"/></c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>TOR <xref target="TOR"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>ODoH <xref target="RFC9230"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>SLAAC <xref target="RFC8981"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>CGA <xref target="RFC3972"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>NAT <xref target="RFC3083"/></c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>HICN  <xref target="CAROFIGLIO19"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>ICNIP <xref target="ICNIP"/></c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>CCNx names</c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>EIBP <xref target="SHENOY21"/></c>
      <c>x</c>
      <c>x</c>
      <c>x</c>
      <c>Geo addressing</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>REED <xref target="REED16"/></c>
      <c>x (with P4 <xref target="BOSSHART14"/>)</c>
      <c>&#160;</c>
      <c>x</c>
      <c>DetNet <xref target="DETNETWG"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>Mobile IP <xref target="RFC6275"/></c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SHIM6 <xref target="RFC5533"/></c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SRv6 <xref target="RFC8402"/></c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>HIP <xref target="RFC7401"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>VxLAN <xref target="RFC7348"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>LISP (<xref target="RFC9300"/>, <xref target="RFC8060"/>)</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>SFC <xref target="RFC7665"/></c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
</texttable>

</section>
</section>
<section anchor="SEC:concerns"><name>Concerns Raised by IP Addressing Extensions</name>

<t>While the extensions to the original Internet properties, discussed in <xref target="SEC:ExtProp"/>, demonstrate the need of more flexibility in addressing, they also raise a number of concerns, which are discussed in the following sub-sections. To this end, the problems hereafter outlined link to the approaches to extensions summarized in <xref target="SEC:overall"/>.
These considerations may not be present all the time and everywhere, since extensions are developed and deployed in different part of the Internet, which may worsen things.</t>

<section anchor="SEC:concerns:semantic_limitation"><name>Limiting Address Semantics</name>

<t>Many approaches changing the semantics of communication, e.g., through separating host identification from network node identification <xref target="RFC7401"/>, separating the device identifier from the routing locator (<xref target="SHENOY21"/>, <xref target="RFC9299"/>), or through identifying content and services directly <xref target="CAROFIGLIO19"/>, are limited by the existing packet size and semantic constraints of IPv6, e.g., in the form of its source and destination network addresses.</t>

<t>While approaches such as ICNIP <xref target="I-D.trossen-icnrg-internet-icn-5glan"/> may override the addressing semantics, e.g., by replacing IPv6 source and destination information with path identification, a possible unawareness of endpoints still requires the carrying of other address information as part of the payload.</t>

<t>Also, the expressible service or content semantic may be limited, as in <xref target="CAROFIGLIO19"/> or the size of supported networks <xref target="REED16"/> due to relying on the limited bit positions usable in IPv6 addresses.</t>

</section>
<section anchor="SEC:concerns:efficiency"><name>Complexity and Efficiency</name>

<t>Realizing the additional addressing semantics may introduce additional complexity. This is particularly a concern since those additional semantics can be observed particularly at the edge of the Internet, utilizing the existing addressing semantic of the Internet to interconnect the domains that require those additional semantics.</t>

<t>Furthermore, any additional complexity often comes with an efficiency and cost penalty, particularly at the edge of the network, where resource constraints may play a significant role. Compression processes, taking <xref target="FITZEK05"/> as an example, require additional resources both for the sender generating the compressed header but also the gateway linking to the general Internet by re-establishing the full IP header.</t>

<t>Conversely, the performance requirements of core networks, in terms of packet processing speed, makes the accommodation of extensions to addressing often prohibitive. This is not only due to the necessary extra processing that is specific to the extension, but also due to the complexity that will need to be managed in doing so at significantly higher speeds than at the edge of the network. The observations on the dropping of packets with IPv6 extension headers in the real world is (partially) due to such an implementation complexity <xref target="RFC7872"/>.</t>

<t>Another example for lowering the efficiency of packet forwarding is the routing in systems like Tor <xref target="TOR"/>. As detailed before, traffic in Tor, for anonymity purposes, should be handed over by at least three intermediates before reaching the destination. Frequent relaying enhances the privacy, however, because such kind of solutions are implemented at application level, they come at the cost of lower communication efficiency. May be a different privacy enhanced address semantic would enable efficient implementation of Tor-like solutions at network layer.</t>

<dl>
  <dt>Repetitive Encapsulation:</dt>
  <dd>
    <t>Repetitive encapsulation is a concern since it bloats the packets size due to additional encapsulation headers. Addressing proposals such as those in <xref target="I-D.trossen-icnrg-internet-icn-5glan"/> utilize path identification within an alternative forwarding architecture that acts upon the provided path identification. However, due to the limitation of existing flow-based architectures with respect to the supported header structures (in the form of IPv4 or IPv6 headers), the new routing semantics are being inserted into the existing header structure, while repeating the original, sender-generated header structure, in the payload of the packet as it traverses the local domain, effectively doubling the per-packet header overhead.</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>The problem is also present in a number of solutions tackling different use-cases, e.g., mobility <xref target="I-D.ietf-lisp-mn"/>, data center networking (<xref target="RFC8926"/>, <xref target="RFC7348"/>, <xref target="I-D.ietf-intarea-gue"/>), traffic engineering <xref target="RFC8986"/>, and privacy (<xref target="TOR"/>, <xref target="DANEZIS09"/>). Certainly, these solutions are able to avoid issues like path lengthening or privacy concerns, as described before, but they come at the price of multiple encapsulations that reduce the effective payload. This, not only hampers efficiency in terms of header-to-payload ratio, but also introduces 'encapsulation points', which in turn add complexity to the (often edge) network as well as fragility due to the addition of possible failure points; this aspect is discussed in further details in <xref target="SEC:concerns:fragility"/>.</t>
</li></ul>

<dl>
  <dt>Compounding Concerns with Header Compression:</dt>
  <dd>
    <t>IP header overhead requires header compression in constrained environments, such as wireless sensor networks and IoT in general. Together with fragmentation, both tasks constitute significant energy consumption, as shown in <xref target="MESRINEJAD11"/>, negatively impacting resource limited devices that often rely on battery for operation. Further, the reliance on the compression/decompression points creates a dependence on such gateways, which may be a problem for intermittent scenarios.</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>According to the implementation of <em>contiki-ng</em> <xref target="CONTIKI"/>, an example of operating system for IoT devices, the source codes for 6LowPan requires at least 600Kb to include a header compression process. In certain use cases, such requirement can be an obstacle for extremely constrained devices, especially for the RAM and energy consumption.</t>
</li></ul>

<dl>
  <dt>Introducing Path Stretch:</dt>
  <dd>
    <t>Mobile IP <xref target="RFC6275"/>, which was designed for connection continuity in the face of moving endpoints, is a typical case for path stretch. Since traffic must follow a triangular route before arriving at the destination, such detour routing inevitably impacts transmission efficiency as well as latency.</t>
  </dd>
  <dt>Complicating Traffic Engineering:</dt>
  <dd>
    <t>While many extensions to the original IP address semantic target to enrich the decisions that can be taken to steer traffic, according to requirements like QoS, mobility, chaining, compute/network metrics, flow treatment, path usage, etc., the realization of the mechanisms as individual solutions likely complicates the original goal of traffic engineering when individual solutions are being used in combination. Ultimately, this may even prevent the combined use of more than one mechanism and/or policy with a need to identify and prevent incompatibilities of mechanisms. Key here is not the concerns arising from using conflicting traffic engineering policies, rather conflicting realizations of policies that may well generally work well alongside (<xref target="CANINI15"/>, <xref target="CURIC18"/>).</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>This not only increases fragility, as discussed separately in <xref target="SEC:concerns:fragility"/>, but also requires careful planning of which mechanisms to use and in which combination, likely needing human-in-the-loop approaches alongside possible automation approaches for the individual solutions.</t>
</li></ul>

</section>
<section anchor="SEC:concerns:security"><name>Security</name>

<t>The properties described in <xref target="SEC:ExtProp"/> have, obviously, also consequences in terms of security and privacy related concerns, as already mentioned in other parts of this document.</t>

<t>For instance, in the effort of being somehow backward compatible, HIP <xref target="RFC7401"/> uses a 128-bit Host Identity, which may be not sufficiently  cryptographically strong in the future, because of the limited size (future computational power may erode 128-bit security). Similarly, CGA <xref target="RFC3972"/> also aligns to the 128-bit limit, but may use only 59 bits of them, hence, the packet signature may not be sufficiently robust to attacks <xref target="I-D.rafiee-6man-cga-attack"/>.</t>

<t>IP addresses, even temporary ones meant to protect privacy, have been long recognized as a 'Personal Identification Information' that allows even to geolocate the communicating endpoints <xref target="RFC8280"/>. The use of temporary addresses provides sufficient privacy protection only if the renewal rate is high <xref target="I-D.gont-v6ops-ipv6-addressing-considerations"/>. However, this may raise some issues, like the large overhead due to the Duplicate Address Detection, the impact on the Neighbor Discovery mechanism, in particular the cache, which can even lead to communication disruption. With such drawbacks, the extensions may even lead to defeat the target, actually lowering security rather than increasing it.</t>

<t>The introduction of alternative addressing semantics has also been used to help in (D)DoS attacks mitigation. This leverages on changing the service identification model so to avoid topological information exposure, making the potential disruptions likely remain limited <xref target="HAO21"/>. However, this increased robustness to DDoS comes at the price of important communication setup latency and fragility, as discussed next.</t>

</section>
<section anchor="SEC:concerns:fragility"><name>Fragility</name>

<t>From the extensions discussed in <xref target="SEC:ExtProp"/>, it is evident that having alternative or additional address semantic and formats available for making routing as well as forwarding decisions dependent on these, is common place in the Internet. This, however, adds many extension-specific translation/adaptation points, mapping the semantic and format in one context into what is meaningful in another context, but also, more importantly, creating a dependency towards an additional component, often without explicit exposure to the endpoints that originally intended to communicate.</t>

<t>For instance, the re-writing of IP addresses to facilitate the use of private address spaces throughout the public Internet, realized through network address translators (NATs), conflicts with the end-to-end nature of communication between two endpoints. Additional (flow) state is required at the NAT middle-box to smoothly allow communication, which in turn creates a dependency between the NAT and the end-to-end communication between those endpoints, thus increasing the fragility of the communication relation.</t>

<t>A similar situation arises when supporting constrained environments through a header compression mechanism, adding the need for, e.g., a ROHC <xref target="RFC5795"/> element in the communication path, with communication-related compression state being held outside the communicating endpoints. Failure will introduce some inefficiencies due to context regeneration, which  may affect the communicating endpoints, increasing fragility of the system overall.</t>

<t>Such translation/adaptation between semantic extensions to the original 'semantic' of an IP address is generally not avoidable when accommodating more than a single universal semantic. However, the solution-specific nature of every single extension is likely to noticeably increase the fragility of the overall system, since individual extensions will need to interact with other extensions that may be deployed in parallel, but were not designed taking into account such deployment scenario (cf., <xref target="I-D.ietf-intarea-tunnels"/>). Considering that extensions to traditional per-hop-behavior (based on IP addresses) can essentially be realized over almost 'any' packet field, the possible number of conflicting behaviors or diverging interpretation of the semantic and/or content of such fields, among different extensions, may soon become an issue, requiring careful testing and delineation at the boundaries of the network within which the specific extension has been realized.</t>

</section>
<section anchor="SEC:concerns_summary"><name>Summary of Concerns</name>

<t><xref target="TAB:concerns"/>, derived from the previous sections, summarizes the concerns discussed in this section related to each extension listed in <xref target="SEC:overall"/>. While each extension involves at least one concern, some others, like ICNIP <xref target="I-D.trossen-icnrg-internet-icn-5glan"/>, may create several at the same time.</t>

<texttable title="Concerns in Extensions to Internet Addressing" anchor="TAB:concerns">
      <ttcol align='left'>&#160;</ttcol>
      <ttcol align='center'>Limiting Address Semantics</ttcol>
      <ttcol align='center'>Complexity and Efficiency</ttcol>
      <ttcol align='center'>Security</ttcol>
      <ttcol align='center'>Fragility</ttcol>
      <c>6LoWPAN</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>ROHC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>EzIP</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>TOR</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>ODoH</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>SLAAC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>CGA</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>NAT</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>HICN</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>ICNIP</c>
      <c>x</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>CCNx name</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>EIBP</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>Geo addressing</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>REED</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>DetNet</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>Mobile IP</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SHIM6</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SRv6</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>HIP</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>x</c>
      <c>x</c>
      <c>VxLAN</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>&#160;</c>
      <c>LISP</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
      <c>SFC</c>
      <c>&#160;</c>
      <c>x</c>
      <c>&#160;</c>
      <c>x</c>
</texttable>

</section>
</section>
<section anchor="discussion"><name>Discussion</name>

<t>The examples of extensions discussed in <xref target="SEC:ExtProp"/> to the original Internet addressing scheme show that extensibility beyond the original model (and its underlying per-hop behavior) is a desired capability for networking technologies and has been so for a long time. Generally, we can observe that those extensions are driven by the requirements of stakeholders, derived from the aforementioned problems and communication scenarios, thus, expecting a desirable extended functionality from the introduction of the specific extension. If interoperability is required, those extensions require standardization of possibly new fields, new semantics as well as (network and/or end system) operations alike.</t>

<t>This points to the conclusion that the existence of the many extensions to the original Internet addressing is clear evidence for wanting to develop evolution paths over time by the wider Internet community, each of which come with a raft of issues that we need to deal with daily. This makes it desirable to develop an architectural and, more importantly, a sustainable approach to make Internet addressing extensible in order to capture the many new use cases that will still be identified for the Internet to come.</t>

<t>This is not to 'second guess' the market and its possible evolution, but to outline clear features from which to derive clear principles for a design. Any such design must not skew the technical capabilities of addressing to the current economic situation of the Internet and its technical realization, e.g., being a mere ephemeral token for accessing PoP-based services (as indicated in related arch-d mailing list discussions), since this bears the danger of locking down innovation capabilities as an outcome of those technical limitations introduced. Instead, addressing must be aligned with enabling the model of permissionless innovation that the IETF has been promoting, ultimately enabling the serendipity of new applications that has led to many of those applications we can see in the Internet today.</t>

<t>Having a more systematic approach, rather than point extensions, would allow the Internet community to identify an overall evolutionary path able to accommodate existing and future use cases, without disruptive solutions  breaking existing deployments, rather with a well-thought out set of incremental steps.</t>

<t>An architectural evolution of the IP addressing model may bring clear benefits in various scenarios. Examples of such benefits are provided hereafter, for a short sample of use cases. An extensive discussion about these use cases can be found in <xref target="SEC:B:extensions"/>.</t>

<t><list style="symbols">
  <t>Communication in Constrained Environments Potential Benefits: Avoid complex and energy hungry operations, like header compression and fragmentation, necessary to translate protocol headers from one limited domain to another, while enabling semantics different from locator-based addressing may better support the communication that occurs in those environments.</t>
  <t>Communication within Dynamically Changing Topologies Potential Benefits: Allow for accommodating such geographic address semantics into the overall Internet addressing, while also enabling name/content-based addressing, utilizing the redundancy of many network locations providing the possible data.</t>
  <t>Communication among Moving Endpoints Potential Benefits: Enable better mobility, e.g., through an augmented semantic that may fulfil the mobility requirements <xref target="RFC7429"/> in a more efficient way or through moving from a locator- to a content or service-centric semantic for addressing.</t>
  <t>Communication Across Services Potential Benefits: Allow for incorporating different information, e.g., service as well as chaining semantics, into the overall Internet addressing.</t>
  <t>Communication Traffic Steering Potential Benefits: More semantic rich encoding schemes may help in steering traffic at hardware level and speed, without complex mechanisms usually resulting in handling packets in the slow path of routers.</t>
  <t>Communication with built-in security Potential Benefits: Security-related key, certificate, or identifier could be included in a suitable address structure without any information loss, which may weaken security and trust.</t>
  <t>Communication protecting user privacy Potential Benefits: Enable easy mechanism to obfuscate IP addresses to entities not involved in the communication.</t>
  <t>Communication in Alternative Forwarding Architectures Potential Benefits: Reduce the wastage by accommodating Internet addressing in the light of alternative forwarding architectures, instead enabling the direct use of the alternative forwarding information.</t>
</list></t>

<t>Finally, it is important to remark that any change in the addressing, hence at the data plane level, leads to changes and challenges at the control plane level, i.e., routing. The latter is an even harder problem than just addressing and might need more research efforts that are beyond what is discussed in this document, which focuses solely on the data plane.</t>

</section>
<section anchor="SEC:LF"><name>Looking Forward</name>

<t>At this stage, this document does not provide a definite answer nor does it propose or promote specific solutions to the issues it portrays. Instead, this document captures the discussion on the perceived needs for addressing, with the possibility to fundamentally re-think the addressing in the Internet beyond the objectives of IPv6, in order to provide the flexibility to suitably support the many new forms of communication that will emerge.</t>

<t>It has been observed during the interactions of this wider exercise within the IETF that the considerations documented in this memo, with the various extension-specific solutions, have the merit to capture the views and opinions  of a large part of the IETF community at the time of writing this document.</t>

<t>Although some of the discussions hinted at "something should be done", those same discussions never converged to answer the "what should be done" aspect.  However, we assert from experiences in the past that the community may at some point in the future re-open discussions surrounding the IP addressing model and its possible evolution.</t>

<t>For the reason to possibly provide a useful starting point, thus to help jump start any initial future discussion, this document provides an archive of those specific discussions in the early 2020s as a recollection of discussions held at that point in time.</t>

<t>We hope that any such future discussions and the possible input from the recollections in this document, may bring the IETF community to converge on concrete actions to be done.</t>

</section>
<section anchor="SEC:sec"><name>Security Considerations</name>

<t>The present memo does not introduce any new technology and/or mechanism and as such does not introduce any new security threat to the TCP/IP protocol suite.</t>

<t>As an additional note, and as discussed in this document, security and privacy aspects were not considered as part of the key properties for Internet addressing, which led to the introduction of a number of extensions intending to fix those gaps. The analysis presented in this memo (non-exhaustively) shows those concerns are either solved in an ad-hoc manner at application level, or at transport layer, while at network level only few extensions tackling specific aspects exist, albeit often with limitations due to the adherence to the Internet addressing model and its properties.</t>

</section>
<section anchor="SEC:iana"><name>IANA Considerations</name>

<t>This document does not include any IANA request.</t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>Thanks to all the people that shared insightful comments both privately to the authors as well as on various mailing list, especially on the INTArea Mailing List. Thanks as well, for the interesting discussions, to Carsten Borman, Brian E. Carpenter, and Eric Vyncke.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>



<reference anchor="CHRIKI19">
  <front>
    <title>FANET: Communication, mobility models and security issues</title>
    <author fullname="Amira Chriki" initials="A." surname="Chriki">
      <organization/>
    </author>
    <author fullname="Haifa Touati" initials="H." surname="Touati">
      <organization/>
    </author>
    <author fullname="Hichem Snoussi" initials="H." surname="Snoussi">
      <organization/>
    </author>
    <author fullname="Farouk Kamoun" initials="F." surname="Kamoun">
      <organization/>
    </author>
    <date month="November" year="2019"/>
  </front>
  <seriesInfo name="Computer Networks" value="vol. 163, pp. 106877"/>
  <seriesInfo name="DOI" value="10.1016/j.comnet.2019.106877"/>
</reference>

<reference anchor="WANG19">
  <front>
    <title>Convergence of Satellite and Terrestrial Networks: A Comprehensive Survey</title>
    <author fullname="Peng Wang" initials="P." surname="Wang">
      <organization/>
    </author>
    <author fullname="Jiaxin Zhang" initials="J." surname="Zhang">
      <organization/>
    </author>
    <author fullname="Xing Zhang" initials="X." surname="Zhang">
      <organization/>
    </author>
    <author fullname="Zhi Yan" initials="Z." surname="Yan">
      <organization/>
    </author>
    <author fullname="Barry G. Evans" initials="B." surname="Evans">
      <organization/>
    </author>
    <author fullname="Wenbo Wang" initials="W." surname="Wang">
      <organization/>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="IEEE Access" value="vol. 8, pp. 5550-5588"/>
  <seriesInfo name="DOI" value="10.1109/access.2019.2963223"/>
</reference>

<reference anchor="ABDALLAH16">
  <front>
    <title>Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network</title>
    <author fullname="Alaa E. Abdallah" initials="A." surname="Abdallah">
      <organization>Faculty of Information Technology, The Hashemite University, Zarqa, Jordan</organization>
    </author>
    <author fullname="Emad E. Abdallah" initials="E." surname="Abdallah">
      <organization>Faculty of Information Technology, The Hashemite University, Zarqa, Jordan</organization>
    </author>
    <author fullname="Mohammad Bsoul" initials="M." surname="Bsoul">
      <organization>Faculty of Information Technology, The Hashemite University, Zarqa, Jordan</organization>
    </author>
    <author fullname="Ahmed Fawzi Otoom" initials="A." surname="Otoom">
      <organization>Faculty of Information Technology, The Hashemite University, Zarqa, Jordan</organization>
    </author>
    <date month="October" year="2016"/>
  </front>
  <seriesInfo name="International Journal of Distributed Sensor Networks" value="vol. 12, no. 10, pp. 155014771667125"/>
  <seriesInfo name="DOI" value="10.1177/1550147716671255"/>
</reference>

<reference anchor="HANDLEY18">
  <front>
    <title>Delay is Not an Option: Low Latency Routing in Space</title>
    <author fullname="Mark Handley" initials="M." surname="Handley">
      <organization>University College London</organization>
    </author>
    <date month="November" year="2018"/>
  </front>
  <seriesInfo name="Proceedings of the 17th ACM Workshop on Hot Topics in" value="Networks"/>
  <seriesInfo name="DOI" value="10.1145/3286062.3286075"/>
</reference>

<reference anchor="HUGHES03">
  <front>
    <title>Cartesian Ad Hoc Routing Protocols</title>
    <author fullname="Larry Hughes" initials="L." surname="Hughes">
      <organization/>
    </author>
    <author fullname="Kafil Shumon" initials="K." surname="Shumon">
      <organization/>
    </author>
    <author fullname="Ying Zhang" initials="Y." surname="Zhang">
      <organization/>
    </author>
    <date year="2003"/>
  </front>
  <seriesInfo name="Ad-Hoc, Mobile, and Wireless Networks" value="pp. 287-292"/>
  <seriesInfo name="DOI" value="10.1007/978-3-540-39611-6_27"/>
</reference>

<reference anchor="CHEN21">
  <front>
    <title>GAMS: An IP Address Management Mechanism in Satellite Mega-constellation Networks</title>
    <author fullname="Yazheng Chen" initials="Y." surname="Chen">
      <organization/>
    </author>
    <author fullname="Hewu Li" initials="H." surname="Li">
      <organization/>
    </author>
    <author fullname="Jun Liu" initials="J." surname="Liu">
      <organization/>
    </author>
    <author fullname="Qian Wu" initials="Q." surname="Wu">
      <organization/>
    </author>
    <author fullname="Zeqi Lai" initials="Z." surname="Lai">
      <organization/>
    </author>
    <date month="June" year="2021"/>
  </front>
  <seriesInfo name="2021 International Wireless Communications and Mobile Computing" value="(IWCMC)"/>
  <seriesInfo name="DOI" value="10.1109/iwcmc51323.2021.9498722"/>
</reference>

<reference anchor="KRAHENBUHL21">
  <front>
    <title>Pervasive Internet-Wide Low-Latency Authentication</title>
    <author fullname="Cyrill Krahenbuhl" initials="C." surname="Krahenbuhl">
      <organization/>
    </author>
    <author fullname="Markus Legner" initials="M." surname="Legner">
      <organization/>
    </author>
    <author fullname="Silvan Bitterli" initials="S." surname="Bitterli">
      <organization/>
    </author>
    <author fullname="Adrian Perrig" initials="A." surname="Perrig">
      <organization/>
    </author>
    <date month="July" year="2021"/>
  </front>
  <seriesInfo name="2021 International Conference on Computer Communications and Networks" value="(ICCCN)"/>
  <seriesInfo name="DOI" value="10.1109/icccn52240.2021.9522235"/>
</reference>

<reference anchor="TROSSEN10">
  <front>
    <title>Arguments for an information-centric internetworking architecture</title>
    <author fullname="Dirk Trossen" initials="D." surname="Trossen">
      <organization>non-affiliated, Colchester, United Kingdom</organization>
    </author>
    <author fullname="Mikko Sarela" initials="M." surname="Sarela">
      <organization>Ericsson, Helsinki, Finland</organization>
    </author>
    <author fullname="Karen Sollins" initials="K." surname="Sollins">
      <organization>MIT, Cambridge, MA, USA</organization>
    </author>
    <date month="April" year="2010"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 40, no. 2, pp. 26-33"/>
  <seriesInfo name="DOI" value="10.1145/1764873.1764878"/>
</reference>

<reference anchor="WION19">
  <front>
    <title>Distributed Function Chaining with Anycast Routing</title>
    <author fullname="Adrien Wion" initials="A." surname="Wion">
      <organization>Thales/Telecom ParisTech</organization>
    </author>
    <author fullname="Mathieu Bouet" initials="M." surname="Bouet">
      <organization>Thales</organization>
    </author>
    <author fullname="Luigi Iannone" initials="L." surname="Iannone">
      <organization>Telecom Paris Tech</organization>
    </author>
    <author fullname="Vania Conan" initials="V." surname="Conan">
      <organization>Thales</organization>
    </author>
    <date month="April" year="2019"/>
  </front>
  <seriesInfo name="Proceedings of the 2019 ACM Symposium on SDN" value="Research"/>
  <seriesInfo name="DOI" value="10.1145/3314148.3314355"/>
</reference>

<reference anchor="JACOBSON09">
  <front>
    <title>Networking named content</title>
    <author fullname="Van Jacobson" initials="V." surname="Jacobson">
      <organization>Palo Alto Research Center, Palo Alto, USA</organization>
    </author>
    <author fullname="Diana K. Smetters" initials="D." surname="Smetters">
      <organization>Palo Alto Research Center, Palo Alto, USA</organization>
    </author>
    <author fullname="James D. Thornton" initials="J." surname="Thornton">
      <organization>Palo Alto Reseach Center, Palo Alto, USA</organization>
    </author>
    <author fullname="Michael F. Plass" initials="M." surname="Plass">
      <organization>Palo Alto Research Center, Palo Alto, USA</organization>
    </author>
    <author fullname="Nicholas H. Briggs" initials="N." surname="Briggs">
      <organization>Palo Alto Research Center, Palo Alto, USA</organization>
    </author>
    <author fullname="Rebecca L. Braynard" initials="R." surname="Braynard">
      <organization>Palo Alto Research Center, Palo Alto, USA</organization>
    </author>
    <date month="December" year="2009"/>
  </front>
  <seriesInfo name="Proceedings of the 5th international conference on Emerging networking experiments and" value="technologies"/>
  <seriesInfo name="DOI" value="10.1145/1658939.1658941"/>
</reference>

<reference anchor="ALMADANI20">
  <front>
    <title>DDS-Based Containment Control of Multiple UAV Systems</title>
    <author fullname="Basem AL-Madani" initials="B." surname="AL-Madani">
      <organization/>
    </author>
    <author fullname="Siddig M. Elkhider" initials="S." surname="Elkhider">
      <organization/>
    </author>
    <author fullname="Sami El-Ferik" initials="S." surname="El-Ferik">
      <organization/>
    </author>
    <date month="July" year="2020"/>
  </front>
  <seriesInfo name="Applied Sciences" value="vol. 10, no. 13, pp. 4572"/>
  <seriesInfo name="DOI" value="10.3390/app10134572"/>
</reference>

<reference anchor="MAROJEVIC20">
  <front>
    <title>Advanced Wireless for Unmanned Aerial Systems: 5G Standardization, Research Challenges, and AERPAW Architecture</title>
    <author fullname="Vuk Marojevic" initials="V." surname="Marojevic">
      <organization/>
    </author>
    <author fullname="Ismail Guvenc" initials="I." surname="Guvenc">
      <organization/>
    </author>
    <author fullname="Rudra Dutta" initials="R." surname="Dutta">
      <organization/>
    </author>
    <author fullname="Mihail L. Sichitiu" initials="M." surname="Sichitiu">
      <organization/>
    </author>
    <author fullname="Brian A. Floyd" initials="B." surname="Floyd">
      <organization/>
    </author>
    <date month="June" year="2020"/>
  </front>
  <seriesInfo name="IEEE Vehicular Technology Magazine" value="vol. 15, no. 2, pp. 22-30"/>
  <seriesInfo name="DOI" value="10.1109/mvt.2020.2979494"/>
</reference>

<reference anchor="FINKHAUSER21">
  <front>
    <title>Reliable Command, Control and Communication Links for Unmanned Aircraft Systems: Towards compliance of commercial drones</title>
    <author fullname="Jens Finkhäuser" initials="J." surname="Finkhäuser">
      <organization>AnyWi Technologies B.V., Netherlands</organization>
    </author>
    <author fullname="Morten Larsen" initials="M." surname="Larsen">
      <organization>AnyWi Technologies B.V., Netherlands</organization>
    </author>
    <date month="January" year="2021"/>
  </front>
  <seriesInfo name="Proceedings of the 2021 Drone Systems Engineering and Rapid Simulation and Performance Evaluation: Methods and Tools" value="Proceedings"/>
  <seriesInfo name="DOI" value="10.1145/3444950.3444954"/>
</reference>

<reference anchor="KUO95">
  <front>
    <title>The ALOHA System</title>
    <author fullname="F. F. Kuo" initials="F." surname="Kuo">
      <organization>University of Hawaii</organization>
    </author>
    <date month="January" year="1995"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 25, no. 1, pp. 41-44"/>
  <seriesInfo name="DOI" value="10.1145/205447.205451"/>
</reference>

<reference anchor="BADENHOP15">
  <front>
    <title>Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets</title>
    <author fullname="Christopher Badenhop" initials="C." surname="Badenhop">
      <organization/>
    </author>
    <author fullname="Jonathan Fuller" initials="J." surname="Fuller">
      <organization/>
    </author>
    <author fullname="Joseph Hall" initials="J." surname="Hall">
      <organization/>
    </author>
    <author fullname="Benjamin Ramsey" initials="B." surname="Ramsey">
      <organization/>
    </author>
    <author fullname="Mason Rice" initials="M." surname="Rice">
      <organization/>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="IFIP Advances in Information and Communication Technology" value="pp. 209-227"/>
  <seriesInfo name="DOI" value="10.1007/978-3-319-26567-4_13"/>
</reference>

<reference anchor="VOIGT17">
  <front>
    <title>The EU General Data Protection Regulation (GDPR)</title>
    <author fullname="Paul Voigt" initials="P." surname="Voigt">
      <organization/>
    </author>
    <author fullname="Axel von dem Bussche" initials="A." surname="von dem Bussche">
      <organization/>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Springer International Publishing" value="book"/>
  <seriesInfo name="DOI" value="10.1007/978-3-319-57959-7"/>
</reference>

<reference anchor="GOLDSCHLAG99">
  <front>
    <title>Onion routing</title>
    <author fullname="David Goldschlag" initials="D." surname="Goldschlag">
      <organization/>
    </author>
    <author fullname="Michael Reed" initials="M." surname="Reed">
      <organization/>
    </author>
    <author fullname="Paul Syverson" initials="P." surname="Syverson">
      <organization/>
    </author>
    <date month="February" year="1999"/>
  </front>
  <seriesInfo name="Communications of the ACM" value="vol. 42, no. 2, pp. 39-41"/>
  <seriesInfo name="DOI" value="10.1145/293411.293443"/>
</reference>

<reference anchor="DONENFELD17">
  <front>
    <title>WireGuard: Next Generation Kernel Network Tunnel</title>
    <author fullname="Jason A. Donenfeld" initials="J." surname="Donenfeld">
      <organization/>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proceedings 2017 Network and Distributed System Security" value="Symposium"/>
  <seriesInfo name="DOI" value="10.14722/ndss.2017.23160"/>
</reference>

<reference anchor="KHANVILKAR04">
  <front>
    <title>Virtual private networks: an overview with performance evaluation</title>
    <author fullname="S. Khanvilkar" initials="S." surname="Khanvilkar">
      <organization/>
    </author>
    <author fullname="A. Khokhar" initials="A." surname="Khokhar">
      <organization/>
    </author>
    <date month="October" year="2004"/>
  </front>
  <seriesInfo name="IEEE Communications Magazine" value="vol. 42, no. 10, pp. 146-154"/>
  <seriesInfo name="DOI" value="10.1109/mcom.2004.1341273"/>
</reference>

<reference anchor="KOMORI02">
  <front>
    <title>The secure DHCP system with user authentication</title>
    <author fullname="T. Komori" initials="T." surname="Komori">
      <organization/>
    </author>
    <author fullname="T. Saito" initials="T." surname="Saito">
      <organization/>
    </author>
    <date month="August" year="2003"/>
  </front>
  <seriesInfo name="27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN" value="2002."/>
  <seriesInfo name="DOI" value="10.1109/lcn.2002.1181774"/>
</reference>

<reference anchor="FAYED21">
  <front>
    <title>The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale</title>
    <author fullname="Marwan Fayed" initials="M." surname="Fayed">
      <organization>Cloudflare Inc., and Univ of St Andrews</organization>
    </author>
    <author fullname="Lorenz Bauer" initials="L." surname="Bauer">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Vasileios Giotsas" initials="V." surname="Giotsas">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Sami Kerola" initials="S." surname="Kerola">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Marek Majkowski" initials="M." surname="Majkowski">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Pavel Odintsov" initials="P." surname="Odintsov">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Jakub Sitnicki" initials="J." surname="Sitnicki">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Taejoong Chung" initials="T." surname="Chung">
      <organization>Virginia Tech</organization>
    </author>
    <author fullname="Dave Levin" initials="D." surname="Levin">
      <organization>University of Maryland</organization>
    </author>
    <author fullname="Alan Mislove" initials="A." surname="Mislove">
      <organization>Northeastern University</organization>
    </author>
    <author fullname="Christopher A. Wood" initials="C." surname="Wood">
      <organization>Cloudflare Inc.</organization>
    </author>
    <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
      <organization>Cloudflare Inc.</organization>
    </author>
    <date month="August" year="2021"/>
  </front>
  <seriesInfo name="Proceedings of the 2021 ACM SIGCOMM 2021" value="Conference"/>
  <seriesInfo name="DOI" value="10.1145/3452296.3472922"/>
</reference>

<reference anchor="REED16">
  <front>
    <title>Stateless multicast switching in software defined networks</title>
    <author fullname="Martin J. Reed" initials="M." surname="Reed">
      <organization/>
    </author>
    <author fullname="Mays Al-Naday" initials="M." surname="Al-Naday">
      <organization/>
    </author>
    <author fullname="Nikolaos Thomos" initials="N." surname="Thomos">
      <organization/>
    </author>
    <author fullname="Dirk Trossen" initials="D." surname="Trossen">
      <organization/>
    </author>
    <author fullname="George Petropoulos" initials="G." surname="Petropoulos">
      <organization/>
    </author>
    <author fullname="Spiros Spirou" initials="S." surname="Spirou">
      <organization/>
    </author>
    <date month="May" year="2016"/>
  </front>
  <seriesInfo name="2016 IEEE International Conference on Communications" value="(ICC)"/>
  <seriesInfo name="DOI" value="10.1109/icc.2016.7511036"/>
</reference>

<reference anchor="BOSSHART14">
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author fullname="Pat Bosshart" initials="P." surname="Bosshart">
      <organization>Barefoot Networks, Palo Alto, CA, USA</organization>
    </author>
    <author fullname="Dan Daly" initials="D." surname="Daly">
      <organization>Intel, Ann Arbor, MI, USA</organization>
    </author>
    <author fullname="Glen Gibb" initials="G." surname="Gibb">
      <organization>Barefoot Networks, Palo Alto, CA, USA</organization>
    </author>
    <author fullname="Martin Izzard" initials="M." surname="Izzard">
      <organization>Barefoot Networks, Palo Alto, CA, USA</organization>
    </author>
    <author fullname="Nick McKeown" initials="N." surname="McKeown">
      <organization>Stanford University, Stanford, CA, USA</organization>
    </author>
    <author fullname="Jennifer Rexford" initials="J." surname="Rexford">
      <organization>Princeton University, Princeton, NJ, USA</organization>
    </author>
    <author fullname="Cole Schlesinger" initials="C." surname="Schlesinger">
      <organization>Princeton University, Princeton, NJ, USA</organization>
    </author>
    <author fullname="Dan Talayco" initials="D." surname="Talayco">
      <organization>Barefoot Networks, Palo Alto, CA, USA</organization>
    </author>
    <author fullname="Amin Vahdat" initials="A." surname="Vahdat">
      <organization>Google, Mountain View, CA, USA</organization>
    </author>
    <author fullname="George Varghese" initials="G." surname="Varghese">
      <organization>Microsoft Research, Mountain View, CA, USA</organization>
    </author>
    <author fullname="David Walker" initials="D." surname="Walker">
      <organization>Princeton University, Princeton, NJ, USA</organization>
    </author>
    <date month="July" year="2014"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="vol. 44, no. 3, pp. 87-95"/>
  <seriesInfo name="DOI" value="10.1145/2656877.2656890"/>
</reference>

<reference anchor="HAO21">
  <front>
    <title>Addressless: A new internet server model to prevent network scanning</title>
    <author fullname="Shanshan Hao" initials="S." surname="Hao">
      <organization/>
    </author>
    <author fullname="Renjie Liu" initials="R." surname="Liu">
      <organization/>
    </author>
    <author fullname="Zhe Weng" initials="Z." surname="Weng">
      <organization/>
    </author>
    <author fullname="Deliang Chang" initials="D." surname="Chang">
      <organization/>
    </author>
    <author fullname="Congxiao Bao" initials="C." surname="Bao">
      <organization/>
    </author>
    <author fullname="Xing Li" initials="X." surname="Li">
      <organization/>
    </author>
    <date month="February" year="2021"/>
  </front>
  <seriesInfo name="PLOS ONE" value="vol. 16, no. 2, pp. e0246293"/>
  <seriesInfo name="DOI" value="10.1371/journal.pone.0246293"/>
</reference>

<reference anchor="CANINI15">
  <front>
    <title>A distributed and robust SDN control plane for transactional network updates</title>
    <author fullname="Marco Canini" initials="M." surname="Canini">
      <organization/>
    </author>
    <author fullname="Petr Kuznetsov" initials="P." surname="Kuznetsov">
      <organization/>
    </author>
    <author fullname="Dan Levin" initials="D." surname="Levin">
      <organization/>
    </author>
    <author fullname="Stefan Schmid" initials="S." surname="Schmid">
      <organization/>
    </author>
    <date month="April" year="2015"/>
  </front>
  <seriesInfo name="2015 IEEE Conference on Computer Communications" value="(INFOCOM)"/>
  <seriesInfo name="DOI" value="10.1109/infocom.2015.7218382"/>
</reference>

<reference anchor="CURIC18">
  <front>
    <title>Transactional Network Updates in SDN</title>
    <author fullname="Maja Curic" initials="M." surname="Curic">
      <organization/>
    </author>
    <author fullname="Zoran Despotovic" initials="Z." surname="Despotovic">
      <organization/>
    </author>
    <author fullname="Artur Hecker" initials="A." surname="Hecker">
      <organization/>
    </author>
    <author fullname="Georg Carle" initials="G." surname="Carle">
      <organization/>
    </author>
    <date month="June" year="2018"/>
  </front>
  <seriesInfo name="2018 European Conference on Networks and Communications" value="(EuCNC)"/>
  <seriesInfo name="DOI" value="10.1109/eucnc.2018.8442793"/>
</reference>

<reference anchor="MESRINEJAD11">
  <front>
    <title>The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN)</title>
    <author fullname="Farhad Mesrinejad" initials="F." surname="Mesrinejad">
      <organization/>
    </author>
    <author fullname="Fazirulhisyam Hashim" initials="F." surname="Hashim">
      <organization/>
    </author>
    <author fullname="N. K. Noordin" initials="N." surname="Noordin">
      <organization/>
    </author>
    <author fullname="M. F. A. Rasid" initials="M." surname="Rasid">
      <organization/>
    </author>
    <author fullname="R. S. A. Raja Abdullah" initials="R." surname="Abdullah">
      <organization/>
    </author>
    <date month="October" year="2011"/>
  </front>
  <seriesInfo name="The 17th Asia Pacific Conference on" value="Communications"/>
  <seriesInfo name="DOI" value="10.1109/apcc.2011.6152926"/>
</reference>

<reference anchor="DANEZIS09">
  <front>
    <title>Sphinx: A Compact and Provably Secure Mix Format</title>
    <author fullname="George Danezis" initials="G." surname="Danezis">
      <organization/>
    </author>
    <author fullname="Ian Goldberg" initials="I." surname="Goldberg">
      <organization/>
    </author>
    <date month="May" year="2009"/>
  </front>
  <seriesInfo name="2009 30th IEEE Symposium on Security and" value="Privacy"/>
  <seriesInfo name="DOI" value="10.1109/sp.2009.15"/>
</reference>

<reference anchor="FITZEK05">
  <front>
    <title>RObust Header Compression (ROHC) Performance for Multimedia Transmission over 3G/4G Wireless Networks</title>
    <author fullname="Frank H. P. Fitzek" initials="F." surname="Fitzek">
      <organization/>
    </author>
    <author fullname="Stephan Rein" initials="S." surname="Rein">
      <organization/>
    </author>
    <author fullname="Patrick Seeling" initials="P." surname="Seeling">
      <organization/>
    </author>
    <author fullname="Martin Reisslein" initials="M." surname="Reisslein">
      <organization/>
    </author>
    <date month="January" year="2005"/>
  </front>
  <seriesInfo name="Wireless Personal Communications" value="vol. 32, no. 1, pp. 23-41"/>
  <seriesInfo name="DOI" value="10.1007/s11277-005-7733-2"/>
</reference>

<reference anchor="BUJLOW17">
  <front>
    <title>A Survey on Web Tracking: Mechanisms, Implications, and Defenses</title>
    <author fullname="Tomasz Bujlow" initials="T." surname="Bujlow">
      <organization/>
    </author>
    <author fullname="Valentin Carela-Espanol" initials="V." surname="Carela-Espanol">
      <organization/>
    </author>
    <author fullname="Beom-Ryeol Lee" initials="B." surname="Lee">
      <organization/>
    </author>
    <author fullname="Pere Barlet-Ros" initials="P." surname="Barlet-Ros">
      <organization/>
    </author>
    <date month="August" year="2017"/>
  </front>
  <seriesInfo name="Proceedings of the IEEE" value="vol. 105, no. 8, pp. 1476-1510"/>
  <seriesInfo name="DOI" value="10.1109/jproc.2016.2637878"/>
</reference>

<reference anchor="MISHRA20">
  <front>
    <title>Don’t Count Me Out: On the Relevance of IP Address in the Tracking Ecosystem</title>
    <author fullname="Vikas Mishra" initials="V." surname="Mishra">
      <organization>Inria / Univ. Lille</organization>
    </author>
    <author fullname="Pierre Laperdrix" initials="P." surname="Laperdrix">
      <organization>CNRS / Univ. Lille / Inria</organization>
    </author>
    <author fullname="Antoine Vastel" initials="A." surname="Vastel">
      <organization>Univ. Lille / Inria</organization>
    </author>
    <author fullname="Walter Rudametkin" initials="W." surname="Rudametkin">
      <organization>Univ. Lille / Inria</organization>
    </author>
    <author fullname="Romain Rouvoy" initials="R." surname="Rouvoy">
      <organization>Univ. Lille / Inria / IUF</organization>
    </author>
    <author fullname="Martin Lopatka" initials="M." surname="Lopatka">
      <organization>Mozilla</organization>
    </author>
    <date month="April" year="2020"/>
  </front>
  <seriesInfo name="Proceedings of The Web Conference" value="2020"/>
  <seriesInfo name="DOI" value="10.1145/3366423.3380161"/>
</reference>

<reference anchor="SHENOY21">
  <front>
    <title>A Structured Approach to Routing in the Internet</title>
    <author fullname="Nirmala Shenoy" initials="N." surname="Shenoy">
      <organization/>
    </author>
    <author fullname="Shreyas Madapura Chandraiah" initials="S." surname="Chandraiah">
      <organization/>
    </author>
    <author fullname="Peter Willis" initials="P." surname="Willis">
      <organization/>
    </author>
    <date month="June" year="2021"/>
  </front>
  <seriesInfo name="2021 IEEE 22nd International Conference on High Performance Switching and Routing" value="(HPSR)"/>
  <seriesInfo name="DOI" value="10.1109/hpsr52026.2021.9481818"/>
</reference>

<reference anchor="IEEE-802.15.4-LR">
  <front>
    <title>IEEE Standard for Low-Rate Wireless Networks</title>
    <author>
      <organization/>
    </author>
    <date month="July" year="2020"/>
  </front>
  <seriesInfo name="IEEE" value="standard"/>
  <seriesInfo name="DOI" value="10.1109/ieeestd.2020.9144691"/>
</reference>

<reference anchor="IEEE-1901.1">
  <front>
    <title>IEEE Standard Test Procedures for IEEE Std 1901.1(TM) for Medium Frequency (less than 15 MHz) Power Line Communications for Smart Grid Applications</title>
    <author>
      <organization/>
    </author>
    <date month="March" year="2021"/>
  </front>
  <seriesInfo name="IEEE" value="standard"/>
  <seriesInfo name="DOI" value="10.1109/ieeestd.2021.9381775"/>
</reference>

<reference anchor="CAROFIGLIO19">
  <front>
    <title>Enabling ICN in the Internet Protocol: Analysis and Evaluation of the Hybrid-ICN Architecture</title>
    <author fullname="Giovanna Carofiglio" initials="G." surname="Carofiglio">
      <organization>Cisco Systems Inc.</organization>
    </author>
    <author fullname="Luca Muscariello" initials="L." surname="Muscariello">
      <organization>Cisco Systems Inc.</organization>
    </author>
    <author fullname="Jordan Augé" initials="J." surname="Augé">
      <organization>Cisco Systems Inc.</organization>
    </author>
    <author fullname="Michele Papalini" initials="M." surname="Papalini">
      <organization>Cisco Systems Inc.</organization>
    </author>
    <author fullname="Mauro Sardara" initials="M." surname="Sardara">
      <organization>Cisco Systems Inc.</organization>
    </author>
    <author fullname="Alberto Compagno" initials="A." surname="Compagno">
      <organization>Cisco Systems Inc.</organization>
    </author>
    <date month="September" year="2019"/>
  </front>
  <seriesInfo name="Proceedings of the 6th ACM Conference on Information-Centric" value="Networking"/>
  <seriesInfo name="DOI" value="10.1145/3357150.3357394"/>
</reference>


<reference anchor="SIDE112" target="https://trac.ietf.org/trac/ietf/meeting/wiki/112sidemeetings">
  <front>
    <title>Internet Addressing: problems and gap analysis</title>
    <author initials="" surname="IETF 112 Side Meetings">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="HISTORY127" target="https://elists.isoc.org/pipermail/internet-history/2021-January/006920.html">
  <front>
    <title>History of 127/8 as localhost/loopback addresses</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DINRG" target="https://datatracker.ietf.org/rg/dinrg/about/">
  <front>
    <title>Decentralized Internet Infrastructure - DINRG</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PEARG" target="https://irtf.org/pearg">
  <front>
    <title>Privacy Enhancements and Assessments Research Group - PEARG</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PANRG" target="https://datatracker.ietf.org/rg/panrg/about/">
  <front>
    <title>Path Aware Networking Research Group - PANRG</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DETNETWG" target="https://datatracker.ietf.org/wg/detnet/about/">
  <front>
    <title>Deterministic Networking (DetNet) Working Group</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IPv4pool" target="https://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtml">
  <front>
    <title>IANA IPv4 Address Space Registry</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TOR" target="https://www.torproject.org/">
  <front>
    <title>The Tor Project</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="OCADO" target="https://techmonitor.ai/tech-leaders/ocado-technology-robot-hive-innovation">
  <front>
    <title>Ocado Technology's robot warehouse a Hive of IoT innovation</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="BLE" target="https://www.bluetooth.com/specifications">
  <front>
    <title>Bluetooth Specification</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="Bluetooth" value="SIG Working Groups"/>
</reference>
<reference anchor="ECMA-340" >
  <front>
    <title>Near Field Communication - Interface and Protocol (NFCIP-1) 3rd Ed.</title>
    <author >
      <organization>EECMA-340</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="DECT-ULE" target="https://www.etsi.org/deliver/etsi_en/300100_300199/30017501/02.06.01_60/en_30017501v020601p.pdf">
  <front>
    <title>Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview</title>
    <author >
      <organization></organization>
    </author>
    <date year="2009" month="May"/>
  </front>
  <seriesInfo name="ETSI" value="European Standard, EN 300 175-1, V2.6.1"/>
</reference>
<reference anchor="BACnet" target="https://www.techstreet.com/ashrae/standards/ashrae-135-2016?product_id=1918140">
  <front>
    <title>BACnet-A Data Communication Protocol for Building Automation and Control Networks</title>
    <author >
      <organization></organization>
    </author>
    <date year="2016" month="January"/>
  </front>
  <seriesInfo name="ANSI/ASHRAE" value="Standard 135-2016"/>
</reference>
<reference anchor="CCSDS-702.1-B-1" target="https://public.ccsds.org/Pubs/702x1b1c1.pdf">
  <front>
    <title>IP over CCSDS Space Links</title>
    <author >
      <organization>CCSDS - Consultative Committee for Space Data Systems</organization>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="SIS" value="Space Internetworking Services Area"/>
</reference>
<reference anchor="ETSI-NIN" target="https://www.etsi.org/technologies/non-ip-networking">
  <front>
    <title>Non-IP Networking - NIN</title>
    <author >
      <organization>ETSI - European Telecommunication Standards Institute</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TERASTREAM" target="https://www.telekom.com/en/media/media-information/archive/deutsche-telekom-tests-terastream-the-network-of-the-future-in-croatia-358444">
  <front>
    <title>Deutsche Telekom tests TeraStream, the network of the future, in Croatia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="COMP4DRONES" target="https://www.kdt-ju.europa.eu/projects/comp4drones">
  <front>
    <title>COMP4DRONES</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ADACORSA" target="https://www.kdt-ju.europa.eu/projects/adacorsa">
  <front>
    <title>Airborne data collection on resilient system architectures</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="GNATCATCHER" target="https://github.com/bslassey/ip-blindness">
  <front>
    <title>Global Network Address Translation Combined with Audited and Trusted CDN or HTTP-Proxy Eliminating Reidentification</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="CONTIKI" target="https://github.com/contiki-ng/contiki-ng">
  <front>
    <title>Contiki-NG: The OS for Next Generation IoT Devices</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor="EZIP">
   <front>
      <title>Adaptive IPv4 Address Space</title>
      <author fullname="Abraham Chen" initials="A." surname="Chen">
         <organization>Avinta Communications</organization>
      </author>
      <author fullname="Ramamurthy R. Ati" initials="R. R." surname="Ati">
         <organization>Avinta Communications</organization>
      </author>
      <author fullname="Abhay Karandikar" initials="A." surname="Karandikar">
         <organization>India Institute of Technology</organization>
      </author>
      <author fullname="David Crowe" initials="D." surname="Crowe">
         <organization>Wireless Telcom Consultant</organization>
      </author>
      <date day="13" month="June" year="2023"/>
      <abstract>
	 <t>   This document describes a solution to the Internet address depletion
   issue through the use of an existing Option mechanism that is part of
   the original IPv4 protocol. This proposal, named EzIP (phonetic for
   Easy IPv4), outlines the IPv4 public address pool expansion and the
   Internet system architecture enhancement considerations. EzIP may
   expand an IPv4 address by a factor of 256M without affecting the
   existing IPv4 based Internet, or the current private networks. It is
   in full conformance with the IPv4 protocol, and supports not only
   both direct and private network connectivity, but also their
   interoperability. EzIP deployments may coexist with existing Internet
   traffic and IoTs (Internet of Things) operations without perturbing
   their setups, while offering end-users the freedom to indepdently
   choose which service. EzIP may be implemented as a software or
   firmware enhancement to Internet edge routers or private network
   routing gateways, wherever needed, or simply installed as an inline
   adjunct hardware module between the two, enabling a seamless
   introduction. The 256M case detailed here establishes a complete
   spherical layer of an overlay of routers for interfacing between the
   Internet fabic (core plus edge routers) and the end user premises or
   IoTs. Incorporating caching proxy technology in the gateway, a fairly
   large geographical region may enjoy address expansion based on as few
   as one ordinary IPv4 public address utilizing IP packets with
   degenerated EzIP header. If IPv4 public pool allocations were
   reorganized, the assignable pool could be multiplied 512M fold or
   even more. Enabling hierarchical address architecture which
   facilitates both hierarchical and mesh routing, EzIP can provide
   nearly the same order of magnitude of address pool resources as IPv6
   while streamlining the administrative aspects of it. The basic EzIP
   will immediately resolve the local IPv4 address shortage, while being
   transparent to the rest of the Internet as a new parallel facility.
   Under the Dual-Stack environment, these proposed interim facilities
   will relieve the IPv4 address shortage issue, while affording IPv6
   more time to reach maturity for providing the availability levels
   required for delivering a long-term general service. The basic EzIP
   may be deployed in two distinctive phases. First, the CG-NAT
   operation may be enhanced by enabling the use of 240/4 netblock in
   addition to the current 100.64/10 netblock of RFC6598. This makes
   end-to-end connectivity feasible within the service area of each
   240/4 netblock. Second, this capability may extend to global coverage
   with the use of the Option Word mechanism in the IP header.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chen-ati-adaptive-ipv4-address-space-13"/>
   
</reference>


<reference anchor="ICNIP">
   <front>
      <title>Internet Services over ICN in 5G LAN Environments</title>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Sebastian Robitzsch" initials="S." surname="Robitzsch">
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname="University Essex" initials="U." surname="Essex">
         <organization>Essex University</organization>
      </author>
      <author fullname="Mays AL-Naday" initials="M." surname="AL-Naday">
         <organization>Essex University</organization>
      </author>
      <author fullname="Janne Riihijarvi" initials="J." surname="Riihijarvi">
         <organization>RWTH Aachen</organization>
      </author>
      <date day="1" month="October" year="2020"/>
      <abstract>
	 <t>   In this draft, we provide architecture and operations for enabling
   Internet services over ICN over (5G-enabled) LAN environments.
   Operations include ICN API to upper layers, HTTP over ICN, Service
   Proxy Operations, ICN Flow Management, Name Resolution, Mobility
   Handling, and Dual Stack Device Support.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-trossen-icnrg-internet-icn-5glan-04"/>
   
</reference>



<reference anchor="RFC0791">
<front>
<title>Internet Protocol</title>
<author fullname="J. Postel" initials="J." surname="Postel"><organization/></author>
<date month="September" year="1981"/>
</front>
<seriesInfo name="STD" value="5"/>
<seriesInfo name="RFC" value="791"/>
<seriesInfo name="DOI" value="10.17487/RFC0791"/>
</reference>


<reference anchor="I-D.iannone-internet-addressing-considerations">
   <front>
      <title>Internet Addressing Considerations</title>
      <author fullname="Luigi Iannone" initials="L." surname="Iannone">
         <organization>Huawei</organization>
      </author>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei</organization>
      </author>
      <author fullname="Paulo Mendes" initials="P." surname="Mendes">
         <organization>Airbus</organization>
      </author>
      <author fullname="Nirmala Shenoy" initials="N." surname="Shenoy">
         <organization>R.I.T.</organization>
      </author>
      <author fullname="Laurent Toutain" initials="L." surname="Toutain">
         <organization>IMT-Atlantique</organization>
      </author>
      <author fullname="Abraham Chen" initials="A." surname="Chen">
         <organization>Avinta</organization>
      </author>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <author fullname="Jens Finkhäuser" initials="J." surname="Finkhäuser">
         <organization>AnyWi</organization>
      </author>
      <author fullname="Yihao Jia" initials="Y." surname="Jia">
         </author>
      <date day="5" month="September" year="2022"/>
      <abstract>
	 <t>   There exist many extensions to Internet addressing, as it is defined
   in RFC 791 for IPv4 and RFC 8200 for IPv6, respectively.  Those
   extensions have been developed to evolve the addressing capabilities
   beyond the basic properties of Internet addressing.  This document
   outlines those properties as a baseline against which the extensions
   are categorized in terms of methodology used to extend the addressing
   model, together with examples of solutions doing so.

   While introducing such extensions, we outline the shortcomings we see
   with those extensions.  This ultimately leads to consider whether or
   not a more consistent approach to tackling the identified use cases,
   beyond point-wise extensions as done so far, would be beneficial.
   The benefits are the ones detailed in the companion document
   [I-D.iannone-scenarios-problems-addressing], where, leveraging on the
   shortcomings identified in this memo and scenarios provided in
   [I-D.iannone-scenarios-problems-addressing], a clear problem
   statement is provided.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-iannone-internet-addressing-considerations-01"/>
   
</reference>


<reference anchor="I-D.iannone-scenarios-problems-addressing">
   <front>
      <title>Challenging Scenarios and Problems in Internet Addressing</title>
      <author fullname="Luigi Iannone" initials="L." surname="Iannone">
         <organization>Huawei</organization>
      </author>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei</organization>
      </author>
      <author fullname="Nirmala Shenoy" initials="N." surname="Shenoy">
         <organization>R.I.T.</organization>
      </author>
      <author fullname="Paulo Mendes" initials="P." surname="Mendes">
         <organization>Airbus</organization>
      </author>
      <author fullname="Donald E. Eastlake 3rd" initials="D. E." surname="Eastlake">
         <organization>Futurewei</organization>
      </author>
      <author fullname="Peng Liu" initials="P." surname="Liu">
         <organization>China Mobile</organization>
      </author>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <author fullname="Jens Finkhäuser" initials="J." surname="Finkhäuser">
         <organization>AnyWi</organization>
      </author>
      <author fullname="Yihao Jia" initials="Y." surname="Jia">
         </author>
      <date day="5" month="September" year="2022"/>
      <abstract>
	 <t>   The Internet Protocol (IP) has been the major technological success
   in information technology of the last half century.  As the Internet
   becomes pervasive, IP has been replacing communication technology for
   many domain-specific solutions.  However, domains with specific
   requirements as well as communication behaviors and semantics still
   exist and represent what [RFC8799] recognizes as &quot;limited domains&quot;.

   This document describes well-recognized scenarios that showcase
   possibly different addressing requirements, which are challenging to
   be accommodated in the IP addressing model.  These scenarios
   highlight issues related to the Internet addressing model and call
   for starting a discussion on a way to re-think/evolve the addressing
   model so to better accommodate different domain-specific
   requirements.

   The limitations identified in this document are complemented and
   deepened by a detailed analysis in a separate companion document
   [I-D.iannone-internet-addressing-considerations].

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-iannone-scenarios-problems-addressing-00"/>
   
</reference>



<reference anchor="RFC6250">
<front>
<title>Evolution of the IP Model</title>
<author fullname="D. Thaler" initials="D." surname="Thaler"><organization/></author>
<date month="May" year="2011"/>
<abstract><t>This RFC attempts to document various aspects of the IP service model and how it has evolved over time.  In particular, it attempts to document the properties of the IP layer as they are seen by upper- layer protocols and applications, especially properties that were (and, at times, still are) incorrectly perceived to exist as well as properties that would cause problems if changed.  The discussion of these properties is organized around evaluating a set of claims, or misconceptions.  Finally, this document provides some guidance to protocol designers and implementers.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name="RFC" value="6250"/>
<seriesInfo name="DOI" value="10.17487/RFC6250"/>
</reference>



<reference anchor="RFC8200">
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author fullname="S. Deering" initials="S." surname="Deering"><organization/></author>
<author fullname="R. Hinden" initials="R." surname="Hinden"><organization/></author>
<date month="July" year="2017"/>
<abstract><t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t></abstract>
</front>
<seriesInfo name="STD" value="86"/>
<seriesInfo name="RFC" value="8200"/>
<seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>



<reference anchor="RFC1752">
<front>
<title>The Recommendation for the IP Next Generation Protocol</title>
<author fullname="S. Bradner" initials="S." surname="Bradner"><organization/></author>
<author fullname="A. Mankin" initials="A." surname="Mankin"><organization/></author>
<date month="January" year="1995"/>
<abstract><t>This document presents the recommendation of the IPng Area Directors on what should be used to replace the current version of the Internet Protocol. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="1752"/>
<seriesInfo name="DOI" value="10.17487/RFC1752"/>
</reference>



<reference anchor="RFC2101">
<front>
<title>IPv4 Address Behaviour Today</title>
<author fullname="B. Carpenter" initials="B." surname="Carpenter"><organization/></author>
<author fullname="J. Crowcroft" initials="J." surname="Crowcroft"><organization/></author>
<author fullname="Y. Rekhter" initials="Y." surname="Rekhter"><organization/></author>
<date month="February" year="1997"/>
<abstract><t>The main purpose of this note is to clarify the current interpretation of the 32-bit IP version 4 address space, whose significance has changed substantially since it was originally defined.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name="RFC" value="2101"/>
<seriesInfo name="DOI" value="10.17487/RFC2101"/>
</reference>



<reference anchor="RFC1918">
<front>
<title>Address Allocation for Private Internets</title>
<author fullname="Y. Rekhter" initials="Y." surname="Rekhter"><organization/></author>
<author fullname="B. Moskowitz" initials="B." surname="Moskowitz"><organization/></author>
<author fullname="D. Karrenberg" initials="D." surname="Karrenberg"><organization/></author>
<author fullname="G. J. de Groot" initials="G. J." surname="de Groot"><organization/></author>
<author fullname="E. Lear" initials="E." surname="Lear"><organization/></author>
<date month="February" year="1996"/>
<abstract><t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name="BCP" value="5"/>
<seriesInfo name="RFC" value="1918"/>
<seriesInfo name="DOI" value="10.17487/RFC1918"/>
</reference>



<reference anchor="RFC4291">
<front>
<title>IP Version 6 Addressing Architecture</title>
<author fullname="R. Hinden" initials="R." surname="Hinden"><organization/></author>
<author fullname="S. Deering" initials="S." surname="Deering"><organization/></author>
<date month="February" year="2006"/>
<abstract><t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t><t>This document obsoletes RFC 3513, &quot;IP Version 6 Addressing Architecture&quot;.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4291"/>
<seriesInfo name="DOI" value="10.17487/RFC4291"/>
</reference>



<reference anchor="RFC7228">
<front>
<title>Terminology for Constrained-Node Networks</title>
<author fullname="C. Bormann" initials="C." surname="Bormann"><organization/></author>
<author fullname="M. Ersue" initials="M." surname="Ersue"><organization/></author>
<author fullname="A. Keranen" initials="A." surname="Keranen"><organization/></author>
<date month="May" year="2014"/>
<abstract><t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t></abstract>
</front>
<seriesInfo name="RFC" value="7228"/>
<seriesInfo name="DOI" value="10.17487/RFC7228"/>
</reference>



<reference anchor="RFC7258">
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author fullname="S. Farrell" initials="S." surname="Farrell"><organization/></author>
<author fullname="H. Tschofenig" initials="H." surname="Tschofenig"><organization/></author>
<date month="May" year="2014"/>
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name="BCP" value="188"/>
<seriesInfo name="RFC" value="7258"/>
<seriesInfo name="DOI" value="10.17487/RFC7258"/>
</reference>



<reference anchor="RFC9153">
<front>
<title>Drone Remote Identification Protocol (DRIP) Requirements and Terminology</title>
<author fullname="S. Card" initials="S." role="editor" surname="Card"><organization/></author>
<author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"><organization/></author>
<author fullname="R. Moskowitz" initials="R." surname="Moskowitz"><organization/></author>
<author fullname="A. Gurtov" initials="A." surname="Gurtov"><organization/></author>
<date month="February" year="2022"/>
<abstract><t>This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) Working Group. These solutions will support Unmanned Aircraft System Remote Identification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existing Internet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.</t></abstract>
</front>
<seriesInfo name="RFC" value="9153"/>
<seriesInfo name="DOI" value="10.17487/RFC9153"/>
</reference>


<reference anchor="I-D.haindl-lisp-gb-atn">
   <front>
      <title>Ground-Based LISP for the Aeronautical Telecommunications Network</title>
      <author fullname="Bernhard Haindl" initials="B." surname="Haindl">
         <organization>Frequentis</organization>
      </author>
      <author fullname="Manfred Lindner" initials="M." surname="Lindner">
         <organization>Frequentis</organization>
      </author>
      <author fullname="Victor Moreno" initials="V." surname="Moreno">
         <organization>Google</organization>
      </author>
      <author fullname="Marc Portoles-Comeras" initials="M." surname="Portoles-Comeras">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Fabio Maino" initials="F." surname="Maino">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Balaji Venkatachalapathy" initials="B." surname="Venkatachalapathy">
         <organization>Cisco Systems</organization>
      </author>
      <date day="27" month="March" year="2023"/>
      <abstract>
	 <t>   This document describes the use of the LISP architecture and
   protocols to address the requirements of the worldwide Aeronautical
   Telecommunications Network with Internet Protocol Services, as
   articulated by the International Civil Aviation Organization.

   The ground-based LISP overlay provides mobility and multi-homing
   services to the IPv6 networks hosted on commercial aircrafts, to
   support Air Traffic Management communications with Air Traffic
   Controllers and Air Operation Controllers.  The proposed architecture
   doesn&#x27;t require support for LISP protocol in the airborne routers,
   and can be easily deployed over existing ground infrastructures.


	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-haindl-lisp-gb-atn-09"/>
   
</reference>



<reference anchor="RFC6282">
<front>
<title>Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks</title>
<author fullname="J. Hui" initials="J." role="editor" surname="Hui"><organization/></author>
<author fullname="P. Thubert" initials="P." surname="Thubert"><organization/></author>
<date month="September" year="2011"/>
<abstract><t>This document updates RFC 4944, &quot;Transmission of IPv6 Packets over IEEE 802.15.4 Networks&quot;.  This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs).  The compression format relies on shared context to allow compression of arbitrary prefixes.  How the information is maintained in that shared context is out of scope. This document specifies compression of multicast addresses and a framework for compressing next headers.  UDP header compression is specified within this framework.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="6282"/>
<seriesInfo name="DOI" value="10.17487/RFC6282"/>
</reference>



<reference anchor="RFC7400">
<front>
<title>6LoWPAN-GHC: Generic Header Compression for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
<author fullname="C. Bormann" initials="C." surname="Bormann"><organization/></author>
<date month="November" year="2014"/>
<abstract><t>RFC 6282 defines header compression in 6LoWPAN packets (where &quot;6LoWPAN&quot; refers to &quot;IPv6 over Low-Power Wireless Personal Area Network&quot;).  The present document specifies a simple addition that enables the compression of generic headers and header-like payloads, without a need to define a new header compression scheme for each such new header or header-like payload.</t></abstract>
</front>
<seriesInfo name="RFC" value="7400"/>
<seriesInfo name="DOI" value="10.17487/RFC7400"/>
</reference>



<reference anchor="RFC8376">
<front>
<title>Low-Power Wide Area Network (LPWAN) Overview</title>
<author fullname="S. Farrell" initials="S." role="editor" surname="Farrell"><organization/></author>
<date month="May" year="2018"/>
<abstract><t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t></abstract>
</front>
<seriesInfo name="RFC" value="8376"/>
<seriesInfo name="DOI" value="10.17487/RFC8376"/>
</reference>



<reference anchor="RFC8724">
<front>
<title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
<author fullname="A. Minaburo" initials="A." surname="Minaburo"><organization/></author>
<author fullname="L. Toutain" initials="L." surname="Toutain"><organization/></author>
<author fullname="C. Gomez" initials="C." surname="Gomez"><organization/></author>
<author fullname="D. Barthel" initials="D." surname="Barthel"><organization/></author>
<author fullname="JC. Zuniga" initials="JC." surname="Zuniga"><organization/></author>
<date month="April" year="2020"/>
<abstract><t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t><t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t><t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t><t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t></abstract>
</front>
<seriesInfo name="RFC" value="8724"/>
<seriesInfo name="DOI" value="10.17487/RFC8724"/>
</reference>



<reference anchor="RFC5795">
<front>
<title>The RObust Header Compression (ROHC) Framework</title>
<author fullname="K. Sandlund" initials="K." surname="Sandlund"><organization/></author>
<author fullname="G. Pelletier" initials="G." surname="Pelletier"><organization/></author>
<author fullname="L-E. Jonsson" initials="L-E." surname="Jonsson"><organization/></author>
<date month="March" year="2010"/>
<abstract><t>The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future-proof header compression concept.  It is designed to operate efficiently and robustly over various link technologies with different characteristics.</t><t>The ROHC framework, along with a set of compression profiles, was initially defined in RFC 3095.  To improve and simplify the ROHC specifications, this document explicitly defines the ROHC framework and the profile for uncompressed separately.  More specifically, the definition of the framework does not modify or update the definition of the framework specified by RFC 3095.</t><t>This specification obsoletes RFC 4995.  It fixes one interoperability issue that was erroneously introduced in RFC 4995, and adds some minor clarifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5795"/>
<seriesInfo name="DOI" value="10.17487/RFC5795"/>
</reference>



<reference anchor="RFC9230">
<front>
<title>Oblivious DNS over HTTPS</title>
<author fullname="E. Kinnear" initials="E." surname="Kinnear"><organization/></author>
<author fullname="P. McManus" initials="P." surname="McManus"><organization/></author>
<author fullname="T. Pauly" initials="T." surname="Pauly"><organization/></author>
<author fullname="T. Verma" initials="T." surname="Verma"><organization/></author>
<author fullname="C.A. Wood" initials="C.A." surname="Wood"><organization/></author>
<date month="June" year="2022"/>
<abstract><t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t><t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t></abstract>
</front>
<seriesInfo name="RFC" value="9230"/>
<seriesInfo name="DOI" value="10.17487/RFC9230"/>
</reference>



<reference anchor="RFC8981">
<front>
<title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
<author fullname="F. Gont" initials="F." surname="Gont"><organization/></author>
<author fullname="S. Krishnan" initials="S." surname="Krishnan"><organization/></author>
<author fullname="T. Narten" initials="T." surname="Narten"><organization/></author>
<author fullname="R. Draves" initials="R." surname="Draves"><organization/></author>
<date month="February" year="2021"/>
<abstract><t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t></abstract>
</front>
<seriesInfo name="RFC" value="8981"/>
<seriesInfo name="DOI" value="10.17487/RFC8981"/>
</reference>



<reference anchor="RFC3972">
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author fullname="T. Aura" initials="T." surname="Aura"><organization/></author>
<date month="March" year="2005"/>
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3972"/>
<seriesInfo name="DOI" value="10.17487/RFC3972"/>
</reference>



<reference anchor="RFC3083">
<front>
<title>Baseline Privacy Interface Management Information Base for DOCSIS Compliant Cable Modems and Cable Modem Termination Systems</title>
<author fullname="R. Woundy" initials="R." surname="Woundy"><organization/></author>
<date month="March" year="2001"/>
<abstract><t>This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community.  In particular, it defines a basic set of managed objects for SNMP-based (Simple Network Management Protocol) management of the Baseline Privacy Interface (BPI), which provides data privacy for DOCSIS 1.0 (Data-Over- Cable Service Interface Specifications) compliant Cable Modems and Cable Modem Termination Systems.  This MIB is defined as an extension to the DOCSIS Radio Frequency Interface MIB, RFC 2670.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="3083"/>
<seriesInfo name="DOI" value="10.17487/RFC3083"/>
</reference>



<reference anchor="RFC6275">
<front>
<title>Mobility Support in IPv6</title>
<author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"><organization/></author>
<author fullname="D. Johnson" initials="D." surname="Johnson"><organization/></author>
<author fullname="J. Arkko" initials="J." surname="Arkko"><organization/></author>
<date month="July" year="2011"/>
<abstract><t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="6275"/>
<seriesInfo name="DOI" value="10.17487/RFC6275"/>
</reference>



<reference anchor="RFC5533">
<front>
<title>Shim6: Level 3 Multihoming Shim Protocol for IPv6</title>
<author fullname="E. Nordmark" initials="E." surname="Nordmark"><organization/></author>
<author fullname="M. Bagnulo" initials="M." surname="Bagnulo"><organization/></author>
<date month="June" year="2009"/>
<abstract><t>This document defines the Shim6 protocol, a layer 3 shim for providing locator agility below the transport protocols, so that multihoming can be provided for IPv6 with failover and load-sharing properties, without assuming that a multihomed site will have a provider-independent IPv6 address prefix announced in the global IPv6 routing table.  The hosts in a site that has multiple provider- allocated IPv6 address prefixes will use the Shim6 protocol specified in this document to set up state with peer hosts so that the state can later be used to failover to a different locator pair, should the original one stop working.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5533"/>
<seriesInfo name="DOI" value="10.17487/RFC5533"/>
</reference>



<reference anchor="RFC8402">
<front>
<title>Segment Routing Architecture</title>
<author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"><organization/></author>
<author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"><organization/></author>
<author fullname="L. Ginsberg" initials="L." surname="Ginsberg"><organization/></author>
<author fullname="B. Decraene" initials="B." surname="Decraene"><organization/></author>
<author fullname="S. Litkowski" initials="S." surname="Litkowski"><organization/></author>
<author fullname="R. Shakir" initials="R." surname="Shakir"><organization/></author>
<date month="July" year="2018"/>
<abstract><t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called &quot;segments&quot;.  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t><t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t><t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t></abstract>
</front>
<seriesInfo name="RFC" value="8402"/>
<seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>



<reference anchor="RFC7401">
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz"><organization/></author>
<author fullname="T. Heer" initials="T." surname="Heer"><organization/></author>
<author fullname="P. Jokela" initials="P." surname="Jokela"><organization/></author>
<author fullname="T. Henderson" initials="T." surname="Henderson"><organization/></author>
<date month="April" year="2015"/>
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name="RFC" value="7401"/>
<seriesInfo name="DOI" value="10.17487/RFC7401"/>
</reference>



<reference anchor="RFC7348">
<front>
<title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
<author fullname="M. Mahalingam" initials="M." surname="Mahalingam"><organization/></author>
<author fullname="D. Dutt" initials="D." surname="Dutt"><organization/></author>
<author fullname="K. Duda" initials="K." surname="Duda"><organization/></author>
<author fullname="P. Agarwal" initials="P." surname="Agarwal"><organization/></author>
<author fullname="L. Kreeger" initials="L." surname="Kreeger"><organization/></author>
<author fullname="T. Sridhar" initials="T." surname="Sridhar"><organization/></author>
<author fullname="M. Bursell" initials="M." surname="Bursell"><organization/></author>
<author fullname="C. Wright" initials="C." surname="Wright"><organization/></author>
<date month="August" year="2014"/>
<abstract><t>This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.  The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers.  This memo documents the deployed VXLAN protocol for the benefit of the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="7348"/>
<seriesInfo name="DOI" value="10.17487/RFC7348"/>
</reference>



<reference anchor="RFC9300">
<front>
<title>The Locator/ID Separation Protocol (LISP)</title>
<author fullname="D. Farinacci" initials="D." surname="Farinacci"><organization/></author>
<author fullname="V. Fuller" initials="V." surname="Fuller"><organization/></author>
<author fullname="D. Meyer" initials="D." surname="Meyer"><organization/></author>
<author fullname="D. Lewis" initials="D." surname="Lewis"><organization/></author>
<author fullname="A. Cabellos" initials="A." role="editor" surname="Cabellos"><organization/></author>
<date month="October" year="2022"/>
<abstract><t>This document describes the data plane protocol for the Locator/ID Separation Protocol (LISP). LISP defines two namespaces: Endpoint Identifiers (EIDs), which identify end hosts; and Routing Locators (RLOCs), which identify network attachment points. With this, LISP effectively separates control from data and allows routers to create overlay networks. LISP-capable routers exchange encapsulated packets according to EID-to-RLOC mappings stored in a local Map-Cache.</t><t>LISP requires no change to either host protocol stacks or underlay routers and offers Traffic Engineering (TE), multihoming, and mobility, among other features.</t><t>This document obsoletes RFC 6830.</t></abstract>
</front>
<seriesInfo name="RFC" value="9300"/>
<seriesInfo name="DOI" value="10.17487/RFC9300"/>
</reference>



<reference anchor="RFC8060">
<front>
<title>LISP Canonical Address Format (LCAF)</title>
<author fullname="D. Farinacci" initials="D." surname="Farinacci"><organization/></author>
<author fullname="D. Meyer" initials="D." surname="Meyer"><organization/></author>
<author fullname="J. Snijders" initials="J." surname="Snijders"><organization/></author>
<date month="February" year="2017"/>
<abstract><t>This document defines a canonical address format encoding used in Locator/ID Separation Protocol (LISP) control messages and in the encoding of lookup keys for the LISP Mapping Database System.</t></abstract>
</front>
<seriesInfo name="RFC" value="8060"/>
<seriesInfo name="DOI" value="10.17487/RFC8060"/>
</reference>



<reference anchor="RFC7665">
<front>
<title>Service Function Chaining (SFC) Architecture</title>
<author fullname="J. Halpern" initials="J." role="editor" surname="Halpern"><organization/></author>
<author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro"><organization/></author>
<date month="October" year="2015"/>
<abstract><t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t></abstract>
</front>
<seriesInfo name="RFC" value="7665"/>
<seriesInfo name="DOI" value="10.17487/RFC7665"/>
</reference>



<reference anchor="RFC9299">
<front>
<title>An Architectural Introduction to the Locator/ID Separation Protocol (LISP)</title>
<author fullname="A. Cabellos" initials="A." surname="Cabellos"><organization/></author>
<author fullname="D. Saucez" initials="D." role="editor" surname="Saucez"><organization/></author>
<date month="October" year="2022"/>
<abstract><t>This document describes the architecture of the Locator/ID Separation Protocol (LISP), making it easier to read the rest of the LISP specifications and providing a basis for discussion about the details of the LISP protocols. This document is used for introductory purposes; more details can be found in the protocol specifications, RFCs 9300 and 9301.</t></abstract>
</front>
<seriesInfo name="RFC" value="9299"/>
<seriesInfo name="DOI" value="10.17487/RFC9299"/>
</reference>


<reference anchor="I-D.trossen-icnrg-internet-icn-5glan">
   <front>
      <title>Internet Services over ICN in 5G LAN Environments</title>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Sebastian Robitzsch" initials="S." surname="Robitzsch">
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname="University Essex" initials="U." surname="Essex">
         <organization>Essex University</organization>
      </author>
      <author fullname="Mays AL-Naday" initials="M." surname="AL-Naday">
         <organization>Essex University</organization>
      </author>
      <author fullname="Janne Riihijarvi" initials="J." surname="Riihijarvi">
         <organization>RWTH Aachen</organization>
      </author>
      <date day="1" month="October" year="2020"/>
      <abstract>
	 <t>   In this draft, we provide architecture and operations for enabling
   Internet services over ICN over (5G-enabled) LAN environments.
   Operations include ICN API to upper layers, HTTP over ICN, Service
   Proxy Operations, ICN Flow Management, Name Resolution, Mobility
   Handling, and Dual Stack Device Support.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-trossen-icnrg-internet-icn-5glan-04"/>
   
</reference>



<reference anchor="RFC7872">
<front>
<title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
<author fullname="F. Gont" initials="F." surname="Gont"><organization/></author>
<author fullname="J. Linkova" initials="J." surname="Linkova"><organization/></author>
<author fullname="T. Chown" initials="T." surname="Chown"><organization/></author>
<author fullname="W. Liu" initials="W." surname="Liu"><organization/></author>
<date month="June" year="2016"/>
<abstract><t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t></abstract>
</front>
<seriesInfo name="RFC" value="7872"/>
<seriesInfo name="DOI" value="10.17487/RFC7872"/>
</reference>



<reference anchor="RFC8926">
<front>
<title>Geneve: Generic Network Virtualization Encapsulation</title>
<author fullname="J. Gross" initials="J." role="editor" surname="Gross"><organization/></author>
<author fullname="I. Ganga" initials="I." role="editor" surname="Ganga"><organization/></author>
<author fullname="T. Sridhar" initials="T." role="editor" surname="Sridhar"><organization/></author>
<date month="November" year="2020"/>
<abstract><t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters.  As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components.  Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t></abstract>
</front>
<seriesInfo name="RFC" value="8926"/>
<seriesInfo name="DOI" value="10.17487/RFC8926"/>
</reference>



<reference anchor="RFC8986">
<front>
<title>Segment Routing over IPv6 (SRv6) Network Programming</title>
<author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"><organization/></author>
<author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"><organization/></author>
<author fullname="J. Leddy" initials="J." surname="Leddy"><organization/></author>
<author fullname="D. Voyer" initials="D." surname="Voyer"><organization/></author>
<author fullname="S. Matsushima" initials="S." surname="Matsushima"><organization/></author>
<author fullname="Z. Li" initials="Z." surname="Li"><organization/></author>
<date month="February" year="2021"/>
<abstract><t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t><t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t><t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t></abstract>
</front>
<seriesInfo name="RFC" value="8986"/>
<seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>


<reference anchor="I-D.rafiee-6man-cga-attack">
   <front>
      <title>Possible Attack on Cryptographically Generated Addresses (CGA)</title>
      <author fullname="Hosnieh Rafiee" initials="" surname="Rafiee">
         </author>
      <author fullname="Christoph Meinel" initials="C." surname="Meinel">
         <organization>Hasso Plattner Institute</organization>
      </author>
      <date day="8" month="May" year="2015"/>
      <abstract>
	 <t>   This document describes the possible attacks with the use of
   Cryptographically Generated Addresses.





	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-rafiee-6man-cga-attack-03"/>
   
</reference>



<reference anchor="RFC8280">
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author fullname="N. ten Oever" initials="N." surname="ten Oever"><organization/></author>
<author fullname="C. Cath" initials="C." surname="Cath"><organization/></author>
<date month="October" year="2017"/>
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name="RFC" value="8280"/>
<seriesInfo name="DOI" value="10.17487/RFC8280"/>
</reference>


<reference anchor="I-D.gont-v6ops-ipv6-addressing-considerations">
   <front>
      <title>IPv6 Addressing Considerations</title>
      <author fullname="Fernando Gont" initials="F." surname="Gont">
         <organization>SI6 Networks</organization>
      </author>
      <author fullname="Guillermo Gont" initials="G." surname="Gont">
         <organization>SI6 Networks</organization>
      </author>
      <date day="1" month="June" year="2022"/>
      <abstract>
	 <t>   IPv6 addresses can differ in a number of properties, such as scope,
   stability, and intended usage type.  This document analyzes the
   impact of these properties on aspects such as security, privacy,
   interoperability, and network operations, with the goal of providing
   guidance about IPv6 address usage.  Additionally, it identifies
   challenges and gaps that currently prevent systems and applications
   from leveraging the increased flexibility and availability of IPv6
   addresses.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-gont-v6ops-ipv6-addressing-considerations-02"/>
   
</reference>


<reference anchor="I-D.ietf-intarea-tunnels">
   <front>
      <title>IP Tunnels in the Internet Architecture</title>
      <author fullname="Dr. Joseph D. Touch" initials="J. D." surname="Touch">
         <organization>Independent Consultant</organization>
      </author>
      <author fullname="Mark Townsley" initials="M." surname="Townsley">
         <organization>Cisco</organization>
      </author>
      <date day="26" month="March" year="2023"/>
      <abstract>
	 <t>   This document discusses the role of IP tunnels in the Internet
   architecture. An IP tunnel transits IP datagrams as payloads in non-
   link layer protocols. This document explains the relationship of IP
   tunnels to existing protocol layers and the challenges in supporting
   IP tunneling, based on the equivalence of tunnels to links. The
   implications of this document updates RFC 4459 and its MTU and
   fragmentation recommendations for IP tunnels.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-tunnels-13"/>
   
</reference>



<reference anchor="RFC7429">
<front>
<title>Distributed Mobility Management: Current Practices and Gap Analysis</title>
<author fullname="D. Liu" initials="D." role="editor" surname="Liu"><organization/></author>
<author fullname="JC. Zuniga" initials="JC." role="editor" surname="Zuniga"><organization/></author>
<author fullname="P. Seite" initials="P." surname="Seite"><organization/></author>
<author fullname="H. Chan" initials="H." surname="Chan"><organization/></author>
<author fullname="CJ. Bernardos" initials="CJ." surname="Bernardos"><organization/></author>
<date month="January" year="2015"/>
<abstract><t>This document analyzes deployment practices of existing IP mobility protocols in a distributed mobility management environment.  It then identifies existing limitations when compared to the requirements defined for a distributed mobility management solution.</t></abstract>
</front>
<seriesInfo name="RFC" value="7429"/>
<seriesInfo name="DOI" value="10.17487/RFC7429"/>
</reference>



<reference anchor="RFC5944">
<front>
<title>IP Mobility Support for IPv4, Revised</title>
<author fullname="C. Perkins" initials="C." role="editor" surname="Perkins"><organization/></author>
<date month="November" year="2010"/>
<abstract><t>This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet.  The protocol provides for registering the care-of address with a home agent.  The home agent sends datagrams destined for the mobile node through a tunnel to the care-of address.  After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5944"/>
<seriesInfo name="DOI" value="10.17487/RFC5944"/>
</reference>


<reference anchor="I-D.trossen-rtgwg-impact-of-dlts">
   <front>
      <title>Impact of DLTs on Provider Networks</title>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="David Guzman" initials="D." surname="Guzman">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Mike McBride" initials="M." surname="McBride">
         <organization>FutureWei</organization>
      </author>
      <author fullname="Xinxin Fan" initials="X." surname="Fan">
         <organization>IoTeX</organization>
      </author>
      <date day="30" month="August" year="2022"/>
      <abstract>
	 <t>   This document discusses the impact of distributed ledger technologies
   being realized over IP-based provider networks.  The focus here lies
   on the impact that the DLT communication patterns have on efficiency
   of resource usage in the underlying networks.  We provide initial
   insights into experimental results to quantify this impact in terms
   of inefficient and wasted communication, aligned along challenges
   that the DLT realization over IP networks faces.

   This document intends to outline this impact but also opportunities
   for network innovations to improve on the identified impact as well
   as the overall service quality.  While this document does not promote
   specific solutions that capture those opportunities, it invites the
   wider community working on DLT and network solutions alike to
   contribute to the insights in this document to aid future research
   and development into possible solution concepts and technologies.

   The findings presented here have first been reported within the
   similarly titled whitepaper released by the Industry IoT Consortium
   (IIC) [IIC_whitepaper].

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-trossen-rtgwg-impact-of-dlts-02"/>
   
</reference>



<reference anchor="RFC9268">
<front>
<title>IPv6 Minimum Path MTU Hop-by-Hop Option</title>
<author fullname="R. Hinden" initials="R." surname="Hinden"><organization/></author>
<author fullname="G. Fairhurst" initials="G." surname="Fairhurst"><organization/></author>
<date month="August" year="2022"/>
<abstract><t>This document specifies a new IPv6 Hop-by-Hop Option that is used to record the Minimum Path MTU (PMTU) along the forward path between a source host to a destination host. The recorded value can then be communicated back to the source using the return Path MTU field in the Option.</t></abstract>
</front>
<seriesInfo name="RFC" value="9268"/>
<seriesInfo name="DOI" value="10.17487/RFC9268"/>
</reference>


<reference anchor="I-D.templin-6man-aero">
   <front>
      <title>Automatic Extended Route Optimization (AERO)</title>
      <author fullname="Fred Templin" initials="F." surname="Templin">
         <organization>Boeing Research &amp; Technology</organization>
      </author>
      <date day="12" month="October" year="2022"/>
      <abstract>
	 <t>   This document specifies an Automatic Extended Route Optimization
   (AERO) service for IP internetworking over Overlay Multilink Network
   (OMNI) interfaces.  AERO/OMNI use an IPv6 unique-local address format
   for IPv6 Neighbor Discovery (IPv6 ND) messaging over the OMNI virtual
   link.  Router discovery and neighbor coordination are employed for
   network admission and to manage the OMNI link forwarding and routing
   systems.  Secure multilink operation, mobility management, multicast,
   traffic path selection and route optimization are naturally supported
   through dynamic neighbor cache updates.  AERO is a widely-applicable
   mobile internetworking service especially well-suited to aviation,
   intelligent transportation systems, mobile end user devices and many
   other applications.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-templin-6man-aero-63"/>
   
</reference>



<reference anchor="RFC2775">
<front>
<title>Internet Transparency</title>
<author fullname="B. Carpenter" initials="B." surname="Carpenter"><organization/></author>
<date month="February" year="2000"/>
<abstract><t>This document describes the current state of the Internet from the architectural viewpoint, concentrating on issues of end-to-end connectivity and transparency.</t></abstract>
</front>
<seriesInfo name="RFC" value="2775"/>
<seriesInfo name="DOI" value="10.17487/RFC2775"/>
</reference>



<reference anchor="RFC4919">
<front>
<title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
<author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar"><organization/></author>
<author fullname="G. Montenegro" initials="G." surname="Montenegro"><organization/></author>
<author fullname="C. Schumacher" initials="C." surname="Schumacher"><organization/></author>
<date month="August" year="2007"/>
<abstract><t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks.  The set of goals enumerated in this document form an initial set only.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="4919"/>
<seriesInfo name="DOI" value="10.17487/RFC4919"/>
</reference>


<reference anchor="I-D.ietf-lisp-nexagon">
   <front>
      <title>Network-Hexagons:Geolocation Mobility Network Based On H3 and LISP</title>
      <author fullname="Sharon Barkai" initials="S." surname="Barkai">
         <organization>Nexar Inc.</organization>
      </author>
      <author fullname="Bruno Fernandez-Ruiz" initials="B." surname="Fernandez-Ruiz">
         <organization>Nexar Inc.</organization>
      </author>
      <author fullname="Rotem Tamir" initials="R." surname="Tamir">
         <organization>Nexar Inc.</organization>
      </author>
      <author fullname="Alberto Rodriguez-Natal" initials="A." surname="Rodriguez-Natal">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Fabio Maino" initials="F." surname="Maino">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Albert Cabellos-Aparicio" initials="A." surname="Cabellos-Aparicio">
         <organization>Universitat Politecnica de Catalunya</organization>
      </author>
      <author fullname="Jordi Paillisse" initials="J." surname="Paillisse">
         <organization>Universitat Politecnica de Catalunya</organization>
      </author>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <date day="9" month="April" year="2023"/>
      <abstract>
	 <t>This specification describes the use of the Locator/ID Separation
Protocol (LISP) for network virtualization overlays (NVO) that support
mobility geolocation network functions. Distributed network functions
are anchored by logically addressable geolocation agents, which are
distributed between the automotive-edge and vehicular far-edge agents.
Geolocation agents&#x27; endpoint identifiers (EID) are determined by the
H3 hexagonal grid jurisdiction and the functions they anchor.
Geolocation agents consolidate, delegate, federate, and propagate
information and logic to and from in-vehicle agents. In-vehicle
agents&#x27; EIDs are ephemeral to protect the vehicle owner&#x27;s geo-privacy
while interacting with geolocation agents. In-vehicle agents&#x27; EIDs are
obtained and renewed through an authorization, authentication, and
accounting procedure (AAA). Geolocation functions include mapping,
training, and notification prompts using an H3-based key-value
language and messages. Primary functions are invoked while vehicles
are driving, and secondary distributed functions while vehicles are
parked use the same LISP network overlay and EID addressing scheme.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-nexagon-50"/>
   
</reference>



<reference anchor="RFC5061">
<front>
<title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
<author fullname="R. Stewart" initials="R." surname="Stewart"><organization/></author>
<author fullname="Q. Xie" initials="Q." surname="Xie"><organization/></author>
<author fullname="M. Tuexen" initials="M." surname="Tuexen"><organization/></author>
<author fullname="S. Maruyama" initials="S." surname="Maruyama"><organization/></author>
<author fullname="M. Kozuka" initials="M." surname="Kozuka"><organization/></author>
<date month="September" year="2007"/>
<abstract><t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5061"/>
<seriesInfo name="DOI" value="10.17487/RFC5061"/>
</reference>



<reference anchor="RFC6182">
<front>
<title>Architectural Guidelines for Multipath TCP Development</title>
<author fullname="A. Ford" initials="A." surname="Ford"><organization/></author>
<author fullname="C. Raiciu" initials="C." surname="Raiciu"><organization/></author>
<author fullname="M. Handley" initials="M." surname="Handley"><organization/></author>
<author fullname="S. Barre" initials="S." surname="Barre"><organization/></author>
<author fullname="J. Iyengar" initials="J." surname="Iyengar"><organization/></author>
<date month="March" year="2011"/>
<abstract><t>Hosts are often connected by multiple paths, but TCP restricts communications to a single path per transport connection.  Resource usage within the network would be more efficient were these multiple paths able to be used concurrently.  This should enhance user experience through improved resilience to network failure and higher throughput.</t><t>This document outlines architectural guidelines for the development of a Multipath Transport Protocol, with references to how these architectural components come together in the development of a Multipath TCP (MPTCP).  This document lists certain high-level design decisions that provide foundations for the design of the MPTCP protocol, based upon these architectural requirements.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name="RFC" value="6182"/>
<seriesInfo name="DOI" value="10.17487/RFC6182"/>
</reference>



<reference anchor="RFC9000">
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
<author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"><organization/></author>
<author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"><organization/></author>
<date month="May" year="2021"/>
<abstract><t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t></abstract>
</front>
<seriesInfo name="RFC" value="9000"/>
<seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>



<reference anchor="RFC5177">
<front>
<title>Network Mobility (NEMO) Extensions for Mobile IPv4</title>
<author fullname="K. Leung" initials="K." surname="Leung"><organization/></author>
<author fullname="G. Dommety" initials="G." surname="Dommety"><organization/></author>
<author fullname="V. Narayanan" initials="V." surname="Narayanan"><organization/></author>
<author fullname="A. Petrescu" initials="A." surname="Petrescu"><organization/></author>
<date month="April" year="2008"/>
<abstract><t>This document describes a protocol for supporting Mobile Networks between a Mobile Router and a Home Agent by extending the Mobile IPv4 protocol.  A Mobile Router is responsible for the mobility of one or more network segments or subnets moving together.  The Mobile Router hides its mobility from the nodes on the Mobile Network.  The nodes on the Mobile Network may be fixed in relationship to the Mobile Router and may not have any mobility function.</t><t>Extensions to Mobile IPv4 are introduced to support Mobile Networks. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5177"/>
<seriesInfo name="DOI" value="10.17487/RFC5177"/>
</reference>



<reference anchor="RFC6626">
<front>
<title>Dynamic Prefix Allocation for Network Mobility for Mobile IPv4 (NEMOv4)</title>
<author fullname="G. Tsirtsis" initials="G." surname="Tsirtsis"><organization/></author>
<author fullname="V. Park" initials="V." surname="Park"><organization/></author>
<author fullname="V. Narayanan" initials="V." surname="Narayanan"><organization/></author>
<author fullname="K. Leung" initials="K." surname="Leung"><organization/></author>
<date month="May" year="2012"/>
<abstract><t>The base Network Mobility for Mobile IPv4 (NEMOv4) specification defines extensions to Mobile IPv4 for mobile networks.  This specification defines a dynamic prefix allocation mechanism for NEMOv4.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="6626"/>
<seriesInfo name="DOI" value="10.17487/RFC6626"/>
</reference>



<reference anchor="RFC5275">
<front>
<title>CMS Symmetric Key Management and Distribution</title>
<author fullname="S. Turner" initials="S." surname="Turner"><organization/></author>
<date month="June" year="2008"/>
<abstract><t>This document describes a mechanism to manage (i.e., set up, distribute, and rekey) keys used with symmetric cryptographic algorithms.  Also defined herein is a mechanism to organize users into groups to support distribution of encrypted content using symmetric cryptographic algorithms.  The mechanism uses the Cryptographic Message Syntax (CMS) protocol and Certificate Management over CMS (CMC) protocol to manage the symmetric keys.  Any member of the group can then later use this distributed shared key to decrypt other CMS encrypted objects with the symmetric key.  This mechanism has been developed to support Secure/Multipurpose Internet Mail Extensions (S/MIME) Mail List Agents  (MLAs).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="5275"/>
<seriesInfo name="DOI" value="10.17487/RFC5275"/>
</reference>


<reference anchor="I-D.ietf-lisp-mn">
   <front>
      <title>LISP Mobile Node</title>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <author fullname="Darrel Lewis" initials="D." surname="Lewis">
         <organization>cisco Systems</organization>
      </author>
      <author fullname="David Meyer" initials="D." surname="Meyer">
         <organization>1-4-5.net</organization>
      </author>
      <author fullname="Chris White" initials="C." surname="White">
         <organization>Logical Elegance, LLC.</organization>
      </author>
      <date day="16" month="January" year="2023"/>
      <abstract>
	 <t>   This document describes how a lightweight version of LISP&#x27;s ITR/ETR
   functionality can be used to provide seamless mobility to a mobile
   node.  The LISP Mobile Node design described in this document uses
   standard LISP functionality to provide scalable mobility for LISP
   mobile nodes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-mn-13"/>
   
</reference>



<reference anchor="RFC9301">
<front>
<title>Locator/ID Separation Protocol (LISP) Control Plane</title>
<author fullname="D. Farinacci" initials="D." surname="Farinacci"><organization/></author>
<author fullname="F. Maino" initials="F." surname="Maino"><organization/></author>
<author fullname="V. Fuller" initials="V." surname="Fuller"><organization/></author>
<author fullname="A. Cabellos" initials="A." role="editor" surname="Cabellos"><organization/></author>
<date month="October" year="2022"/>
<abstract><t>This document describes the control plane and Mapping Service for the Locator/ID Separation Protocol (LISP), implemented by two types of LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server -- that provide a simplified &quot;front end&quot; for one or more Endpoint IDs (EIDs) to Routing Locator mapping databases.</t><t>By using this control plane service interface and communicating with Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs) are not dependent on the details of mapping database systems; this behavior facilitates modularity with different database designs.  Since these devices implement the &quot;edge&quot; of the LISP control plane infrastructure, connecting EID addressable nodes of a LISP site, the implementation and operational complexity of the overall cost and effort of deploying LISP is reduced.</t><t>This document obsoletes RFCs 6830 and 6833.</t></abstract>
</front>
<seriesInfo name="RFC" value="9301"/>
<seriesInfo name="DOI" value="10.17487/RFC9301"/>
</reference>


<reference anchor="I-D.ietf-intarea-gue">
   <front>
      <title>Generic UDP Encapsulation</title>
      <author fullname="Tom Herbert" initials="T." surname="Herbert">
         <organization>Quantonium</organization>
      </author>
      <author fullname="Lucy Yong" initials="L." surname="Yong">
         <organization>Independent</organization>
      </author>
      <author fullname="Osama Zia" initials="O." surname="Zia">
         <organization>Microsoft</organization>
      </author>
      <date day="26" month="October" year="2019"/>
      <abstract>
	 <t>   This specification describes Generic UDP Encapsulation (GUE), which
   is a scheme for using UDP to encapsulate packets of different IP
   protocols for transport across layer 3 networks. By encapsulating
   packets in UDP, specialized capabilities in networking hardware for
   efficient handling of UDP packets can be leveraged. GUE specifies
   basic encapsulation methods upon which higher level constructs, such
   as tunnels and overlay networks for network virtualization, can be
   constructed. GUE is extensible by allowing optional data fields as
   part of the encapsulation, and is generic in that it can encapsulate
   packets of various IP protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-gue-09"/>
   
</reference>



<reference anchor="RFC7476">
<front>
<title>Information-Centric Networking: Baseline Scenarios</title>
<author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"><organization/></author>
<author fullname="B. Ohlman" initials="B." surname="Ohlman"><organization/></author>
<author fullname="D. Corujo" initials="D." surname="Corujo"><organization/></author>
<author fullname="G. Boggia" initials="G." surname="Boggia"><organization/></author>
<author fullname="G. Tyson" initials="G." surname="Tyson"><organization/></author>
<author fullname="E. Davies" initials="E." surname="Davies"><organization/></author>
<author fullname="A. Molinaro" initials="A." surname="Molinaro"><organization/></author>
<author fullname="S. Eum" initials="S." surname="Eum"><organization/></author>
<date month="March" year="2015"/>
<abstract><t>This document aims at establishing a common understanding about a set of scenarios that can be used as a base for the evaluation of different information-centric networking (ICN) approaches so that they can be tested and compared against each other while showcasing their own advantages.  Towards this end, we review the ICN literature and document scenarios which have been considered in previous performance evaluation studies.  We discuss a variety of aspects that an ICN solution can address.  This includes general aspects, such as, network efficiency, reduced complexity, increased scalability and reliability, mobility support, multicast and caching performance, real-time communication efficiency, energy consumption frugality, and disruption and delay tolerance.  We detail ICN-specific aspects as well, such as information security and trust, persistence, availability, provenance, and location independence.</t><t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG).</t></abstract>
</front>
<seriesInfo name="RFC" value="7476"/>
<seriesInfo name="DOI" value="10.17487/RFC7476"/>
</reference>


<reference anchor="I-D.ietf-drip-arch">
   <front>
      <title>Drone Remote Identification Protocol (DRIP) Architecture</title>
      <author fullname="Stuart W. Card" initials="S. W." surname="Card">
         <organization>AX Enterprize</organization>
      </author>
      <author fullname="Adam Wiethuechter" initials="A." surname="Wiethuechter">
         <organization>AX Enterprize</organization>
      </author>
      <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
         <organization>HTT Consulting</organization>
      </author>
      <author fullname="Shuai Zhao" initials="S." surname="Zhao">
         <organization>Intel</organization>
      </author>
      <author fullname="Andrei Gurtov" initials="A." surname="Gurtov">
         <organization>Linköping University</organization>
      </author>
      <date day="6" month="March" year="2023"/>
      <abstract>
	 <t>   This document describes an architecture for protocols and services to
   support Unmanned Aircraft System (UAS) Remote Identification (RID)
   and tracking, plus UAS RID-related communications.  This architecture
   adheres to the requirements listed in the DRIP Requirements document
   (RFC 9153).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-drip-arch-31"/>
   
</reference>



<reference anchor="RFC7252">
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname="Z. Shelby" initials="Z." surname="Shelby"><organization/></author>
<author fullname="K. Hartke" initials="K." surname="Hartke"><organization/></author>
<author fullname="C. Bormann" initials="C." surname="Bormann"><organization/></author>
<date month="June" year="2014"/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name="RFC" value="7252"/>
<seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>



<reference anchor="RFC8763">
<front>
<title>Deployment Considerations for Information-Centric Networking (ICN)</title>
<author fullname="A. Rahman" initials="A." surname="Rahman"><organization/></author>
<author fullname="D. Trossen" initials="D." surname="Trossen"><organization/></author>
<author fullname="D. Kutscher" initials="D." surname="Kutscher"><organization/></author>
<author fullname="R. Ravindran" initials="R." surname="Ravindran"><organization/></author>
<date month="April" year="2020"/>
<abstract><t>Information-Centric Networking (ICN) is now reaching technological maturity after many years of fundamental research and experimentation. This document provides a number of deployment considerations in the interest of helping the ICN community move forward to the next step of live deployments. First, the major deployment configurations for ICN are described, including the key overlay and underlay approaches. Then, proposed deployment migration paths are outlined to address major practical issues, such as network and application migration. Next, selected ICN trial experiences are summarized. Finally, protocol areas that require further standardization are identified to facilitate future interoperable ICN deployments. This document is a product of the Information-Centric Networking Research Group (ICNRG).</t></abstract>
</front>
<seriesInfo name="RFC" value="8763"/>
<seriesInfo name="DOI" value="10.17487/RFC8763"/>
</reference>


<reference anchor="I-D.irtf-icnrg-5gc-icn">
   <front>
      <title>Enabling ICN in 3GPP&#x27;s 5G NextGen Core Architecture</title>
      <author fullname="Ravi Ravindran" initials="R." surname="Ravindran">
         <organization>Corning Incorporated</organization>
      </author>
      <author fullname="Prakash Suthar" initials="P." surname="Suthar">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Chonggang Wang" initials="C." surname="Wang">
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname="Greg White" initials="G." surname="White">
         <organization>CableLabs</organization>
      </author>
      <date day="10" month="January" year="2021"/>
      <abstract>
	 <t>   The proposed 3GPP&#x27;s 5G core nextgen architecture (5GC) allows the
   introduction of new user and control plane function, considering the
   support for network slicing functions, that offers greater
   flexibility to handle heterogeneous devices and applications.  In
   this draft, we provide a short description of the proposed 5GC
   architecture, including recent efforts to provide cellular Local Area
   Network (LAN) connectivity, followed by extensions to 5GC&#x27;s control
   and user plane to support Packet Data Unit (PDU) sessions over
   Information-Centric Networks (ICN).  In addition, ICN over 5GLAN is
   also described.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-icnrg-5gc-icn-04"/>
   
</reference>



<reference anchor="RFC8754">
<front>
<title>IPv6 Segment Routing Header (SRH)</title>
<author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"><organization/></author>
<author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"><organization/></author>
<author fullname="S. Previdi" initials="S." surname="Previdi"><organization/></author>
<author fullname="J. Leddy" initials="J." surname="Leddy"><organization/></author>
<author fullname="S. Matsushima" initials="S." surname="Matsushima"><organization/></author>
<author fullname="D. Voyer" initials="D." surname="Voyer"><organization/></author>
<date month="March" year="2020"/>
<abstract><t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t></abstract>
</front>
<seriesInfo name="RFC" value="8754"/>
<seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>



<reference anchor="RFC8595">
<front>
<title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
<author fullname="A. Farrel" initials="A." surname="Farrel"><organization/></author>
<author fullname="S. Bryant" initials="S." surname="Bryant"><organization/></author>
<author fullname="J. Drake" initials="J." surname="Drake"><organization/></author>
<date month="June" year="2019"/>
<abstract><t>This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack.  That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack.  This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t></abstract>
</front>
<seriesInfo name="RFC" value="8595"/>
<seriesInfo name="DOI" value="10.17487/RFC8595"/>
</reference>



<reference anchor="RFC8677">
<front>
<title>Name-Based Service Function Forwarder (nSFF) Component within a Service Function Chaining (SFC) Framework</title>
<author fullname="D. Trossen" initials="D." surname="Trossen"><organization/></author>
<author fullname="D. Purkayastha" initials="D." surname="Purkayastha"><organization/></author>
<author fullname="A. Rahman" initials="A." surname="Rahman"><organization/></author>
<date month="November" year="2019"/>
<abstract><t>Adoption of cloud and fog technology allows operators to deploy a single &quot;Service Function&quot; (SF) to multiple &quot;execution locations&quot;.  The decision to steer traffic to a specific location may change frequently based on load, proximity, etc. Under the current Service Function Chaining (SFC) framework, steering traffic dynamically to the different execution endpoints requires a specific &quot;rechaining&quot;, i.e., a change in the service function path reflecting the different IP endpoints to be used for the new execution points.  This procedure may be complex and take time. In order to simplify rechaining and reduce the time to complete the procedure, we discuss separating the logical Service Function Path (SFP) from the specific execution endpoints. This can be done by identifying the SFs using a name rather than a routable IP endpoint (or Layer 2 address). This document describes the necessary extensions, additional functions, and protocol details in the Service Function Forwarder (SFF) to handle name-based relationships. </t><t>This document presents InterDigital's approach to name-based SFC. It does not represent IETF consensus and is presented here so that the SFC community may benefit from considering this mechanism and the possibility of its use in the edge data centers.</t></abstract>
</front>
<seriesInfo name="RFC" value="8677"/>
<seriesInfo name="DOI" value="10.17487/RFC8677"/>
</reference>



<reference anchor="RFC5517">
<front>
<title>Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment</title>
<author fullname="S. HomChaudhuri" initials="S." surname="HomChaudhuri"><organization/></author>
<author fullname="M. Foschiano" initials="M." surname="Foschiano"><organization/></author>
<date month="February" year="2010"/>
<abstract><t>This document describes a mechanism to achieve device isolation through the application of special Layer 2 forwarding constraints. Such a mechanism allows end devices to share the same IP subnet while being Layer 2 isolated, which in turn allows network designers to employ larger subnets and so reduce the address management overhead.</t><t>Some of the numerous deployment scenarios of the aforementioned mechanism (which range from data center designs to Ethernet-to-the-home-basement networks) are mentioned in the following text to exemplify the mechanism's possible usages; however, this document is not intended to cover all such deployment scenarios nor delve into their details.  This document is not an Internet Standards Track specification; it  is published for informational purposes.</t></abstract>
</front>
<seriesInfo name="RFC" value="5517"/>
<seriesInfo name="DOI" value="10.17487/RFC5517"/>
</reference>



<reference anchor="RFC6158">
<front>
<title>RADIUS Design Guidelines</title>
<author fullname="A. DeKok" initials="A." role="editor" surname="DeKok"><organization/></author>
<author fullname="G. Weber" initials="G." surname="Weber"><organization/></author>
<date month="March" year="2011"/>
<abstract><t>This document provides guidelines for the design of attributes used by the Remote Authentication Dial In User Service (RADIUS) protocol. It is expected that these guidelines will prove useful to authors and reviewers of future RADIUS attribute specifications, within the IETF as well as other Standards Development Organizations (SDOs). This memo documents an Internet Best Current Practice.</t></abstract>
</front>
<seriesInfo name="BCP" value="158"/>
<seriesInfo name="RFC" value="6158"/>
<seriesInfo name="DOI" value="10.17487/RFC6158"/>
</reference>



<reference anchor="RFC4301">
<front>
<title>Security Architecture for the Internet Protocol</title>
<author fullname="S. Kent" initials="S." surname="Kent"><organization/></author>
<author fullname="K. Seo" initials="K." surname="Seo"><organization/></author>
<date month="December" year="2005"/>
<abstract><t>This document describes an updated version of the &quot;Security Architecture for IP&quot;, which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4301"/>
<seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>



<reference anchor="RFC6973">
<front>
<title>Privacy Considerations for Internet Protocols</title>
<author fullname="A. Cooper" initials="A." surname="Cooper"><organization/></author>
<author fullname="H. Tschofenig" initials="H." surname="Tschofenig"><organization/></author>
<author fullname="B. Aboba" initials="B." surname="Aboba"><organization/></author>
<author fullname="J. Peterson" initials="J." surname="Peterson"><organization/></author>
<author fullname="J. Morris" initials="J." surname="Morris"><organization/></author>
<author fullname="M. Hansen" initials="M." surname="Hansen"><organization/></author>
<author fullname="R. Smith" initials="R." surname="Smith"><organization/></author>
<date month="July" year="2013"/>
<abstract><t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t></abstract>
</front>
<seriesInfo name="RFC" value="6973"/>
<seriesInfo name="DOI" value="10.17487/RFC6973"/>
</reference>


<reference anchor="I-D.irtf-pearg-numeric-ids-history">
   <front>
      <title>Unfortunate History of Transient Numeric Identifiers</title>
      <author fullname="Fernando Gont" initials="F." surname="Gont">
         <organization>SI6 Networks</organization>
      </author>
      <author fullname="Ivan Arce" initials="I." surname="Arce">
         <organization>Quarkslab</organization>
      </author>
      <date day="11" month="December" year="2022"/>
      <abstract>
	 <t>   This document analyzes the timeline of the specification and
   implementation of different types of &quot;transient numeric identifiers&quot;
   used in IETF protocols, and how the security and privacy properties
   of such protocols have been affected as a result of it.  It provides
   empirical evidence that advice in this area is warranted.  This
   document is a product of the Privacy Enhancement and Assessment
   Research Group (PEARG) in the IRTF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-numeric-ids-history-11"/>
   
</reference>



<reference anchor="RFC3031">
<front>
<title>Multiprotocol Label Switching Architecture</title>
<author fullname="E. Rosen" initials="E." surname="Rosen"><organization/></author>
<author fullname="A. Viswanathan" initials="A." surname="Viswanathan"><organization/></author>
<author fullname="R. Callon" initials="R." surname="Callon"><organization/></author>
<date month="January" year="2001"/>
<abstract><t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3031"/>
<seriesInfo name="DOI" value="10.17487/RFC3031"/>
</reference>



<reference anchor="RFC7426">
<front>
<title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
<author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"><organization/></author>
<author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"><organization/></author>
<author fullname="S. Denazis" initials="S." surname="Denazis"><organization/></author>
<author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"><organization/></author>
<author fullname="D. Meyer" initials="D." surname="Meyer"><organization/></author>
<author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"><organization/></author>
<date month="January" year="2015"/>
<abstract><t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces.  SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane.  This separation allows faster innovation cycles at both planes as experience has already shown.  However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other.  This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t></abstract>
</front>
<seriesInfo name="RFC" value="7426"/>
<seriesInfo name="DOI" value="10.17487/RFC7426"/>
</reference>


<reference anchor="I-D.ietf-bier-multicast-http-response">
   <front>
      <title>Applicability of BIER Multicast Overlay for Adaptive Streaming Services</title>
      <author fullname="Dirk Trossen" initials="D." surname="Trossen">
         <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname="Akbar Rahman" initials="A." surname="Rahman">
         <organization>InterDigital Communications, LLC</organization>
      </author>
      <author fullname="Chonggang Wang" initials="C." surname="Wang">
         <organization>InterDigital Communications, LLC</organization>
      </author>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies Inc.</organization>
      </author>
      <date day="10" month="July" year="2021"/>
      <abstract>
	 <t>   HTTP Level Multicast, using BIER, is described as a use case in the
   BIER Use Cases document.  HTTP Level Multicast is used in today&#x27;s
   video streaming and delivery services such as HTTP Live Streaming
   (HLS), Augmented Reality and Virtual Reality(AR/VR), generally
   realized over IP Multicast as well as other use cases such as
   software update delivery.  A realization of &quot;HTTP Multicast&quot; over &quot;IP
   Multicast&quot; is described for the video delivery use case.  IP
   Multicast is commonly used for IPTV services.  Digital Video
   Broadcasting (DVB) and Broadband Forum (BBF) also develope a
   reference architecture for IP Multicast service.  A few problems with
   IP Multicast, such as waste of transmission bandwidth, increase in
   signaling when there are few users are described.  Realization over
   BIER, through a BIER Multicast Overlay Layer, is described as an
   alternative.  How BIER Multicast Overlay operation improves over IP
   Multicast, such as reduction in signaling, dynamic creation of
   multicast groups to reduce signaling and bandwidth wastage is
   described.  We conclude with a few next steps.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-bier-multicast-http-response-06"/>
   
</reference>



<reference anchor="RFC8105">
<front>
<title>Transmission of IPv6 Packets over Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE)</title>
<author fullname="P. Mariager" initials="P." surname="Mariager"><organization/></author>
<author fullname="J. Petersen" initials="J." role="editor" surname="Petersen"><organization/></author>
<author fullname="Z. Shelby" initials="Z." surname="Shelby"><organization/></author>
<author fullname="M. Van de Logt" initials="M." surname="Van de Logt"><organization/></author>
<author fullname="D. Barthel" initials="D." surname="Barthel"><organization/></author>
<date month="May" year="2017"/>
<abstract><t>Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE) is a low-power air interface technology that is proposed by the DECT Forum and is defined and specified by ETSI.</t><t>The DECT air interface technology has been used worldwide in communication devices for more than 20 years.  It has primarily been used to carry voice for cordless telephony but has also been deployed for data-centric services.</t><t>DECT ULE is a recent addition to the DECT interface primarily intended for low-bandwidth, low-power applications such as sensor devices, smart meters, home automation, etc.  As the DECT ULE interface inherits many of the capabilities from DECT, it benefits from operation that is long-range and interference-free, worldwide- reserved frequency band, low silicon prices, and maturity.  There is an added value in the ability to communicate with IPv6 over DECT ULE, such as for Internet of Things applications.</t><t>This document describes how IPv6 is transported over DECT ULE using IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) techniques.</t></abstract>
</front>
<seriesInfo name="RFC" value="8105"/>
<seriesInfo name="DOI" value="10.17487/RFC8105"/>
</reference>



<reference anchor="RFC8163">
<front>
<title>Transmission of IPv6 over Master-Slave/Token-Passing (MS/TP) Networks</title>
<author fullname="K. Lynn" initials="K." role="editor" surname="Lynn"><organization/></author>
<author fullname="J. Martocci" initials="J." surname="Martocci"><organization/></author>
<author fullname="C. Neilson" initials="C." surname="Neilson"><organization/></author>
<author fullname="S. Donaldson" initials="S." surname="Donaldson"><organization/></author>
<date month="May" year="2017"/>
<abstract><t>Master-Slave/Token-Passing (MS/TP) is a medium access control method for the RS-485 physical layer and is used primarily in building automation networks.  This specification defines the frame format for transmission of IPv6 packets and the method of forming link-local and statelessly autoconfigured IPv6 addresses on MS/TP networks.</t></abstract>
</front>
<seriesInfo name="RFC" value="8163"/>
<seriesInfo name="DOI" value="10.17487/RFC8163"/>
</reference>


<reference anchor="I-D.ietf-6lo-nfc">
   <front>
      <title>Transmission of IPv6 Packets over Near Field Communication</title>
      <author fullname="Younghwan Choi" initials="Y." surname="Choi">
         <organization>Electronics and Telecommunications Research Institute</organization>
      </author>
      <author fullname="Yong-Geun Hong" initials="Y." surname="Hong">
         <organization>Daejon University</organization>
      </author>
      <author fullname="Joo-Sang Youn" initials="J." surname="Youn">
         <organization>DONG-EUI University</organization>
      </author>
      <date day="6" month="March" year="2023"/>
      <abstract>
	 <t>   Near Field Communication (NFC) is a set of standards for smartphones
   and portable devices to establish radio communication with each other
   by touching them together or bringing them into proximity, usually no
   more than 10 cm apart.  NFC standards cover communications protocols
   and data exchange formats, and are based on existing radio-frequency
   identification (RFID) standards including ISO/IEC 14443 and FeliCa.
   The standards include ISO/IEC 18092 and those defined by the NFC
   Forum.  The NFC technology has been widely implemented and available
   in mobile phones, laptop computers, and many other devices.  This
   document describes how IPv6 is transmitted over NFC using 6LoWPAN
   techniques.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-6lo-nfc-22"/>
   
</reference>



<reference anchor="RFC9354">
<front>
<title>Transmission of IPv6 Packets over Power Line Communication (PLC) Networks</title>
<author fullname="J. Hou" initials="J." surname="Hou"><organization/></author>
<author fullname="B. Liu" initials="B." surname="Liu"><organization/></author>
<author fullname="Y-G. Hong" initials="Y-G." surname="Hong"><organization/></author>
<author fullname="X. Tang" initials="X." surname="Tang"><organization/></author>
<author fullname="C. Perkins" initials="C." surname="Perkins"><organization/></author>
<date month="January" year="2023"/>
<abstract><t>Power Line Communication (PLC), namely using electric power lines for indoor and outdoor communications, has been widely applied to support Advanced Metering Infrastructure (AMI), especially smart meters for electricity.  The existing electricity infrastructure facilitates the expansion of PLC deployments due to its potential advantages in terms of cost and convenience.  Moreover, a wide variety of accessible devices raises the potential demand of IPv6 for future applications. This document describes how IPv6 packets are transported over constrained PLC networks, such as those described in ITU-T G.9903, IEEE 1901.1, and IEEE 1901.2.</t></abstract>
</front>
<seriesInfo name="RFC" value="9354"/>
<seriesInfo name="DOI" value="10.17487/RFC9354"/>
</reference>



<reference anchor="RFC2663">
<front>
<title>IP Network Address Translator (NAT) Terminology and Considerations</title>
<author fullname="P. Srisuresh" initials="P." surname="Srisuresh"><organization/></author>
<author fullname="M. Holdrege" initials="M." surname="Holdrege"><organization/></author>
<date month="August" year="1999"/>
<abstract><t>This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="2663"/>
<seriesInfo name="DOI" value="10.17487/RFC2663"/>
</reference>


<reference anchor="I-D.chen-ati-adaptive-ipv4-address-space">
   <front>
      <title>Adaptive IPv4 Address Space</title>
      <author fullname="Abraham Chen" initials="A." surname="Chen">
         <organization>Avinta Communications</organization>
      </author>
      <author fullname="Ramamurthy R. Ati" initials="R. R." surname="Ati">
         <organization>Avinta Communications</organization>
      </author>
      <author fullname="Abhay Karandikar" initials="A." surname="Karandikar">
         <organization>India Institute of Technology</organization>
      </author>
      <author fullname="David Crowe" initials="D." surname="Crowe">
         <organization>Wireless Telcom Consultant</organization>
      </author>
      <date day="13" month="June" year="2023"/>
      <abstract>
	 <t>   This document describes a solution to the Internet address depletion
   issue through the use of an existing Option mechanism that is part of
   the original IPv4 protocol. This proposal, named EzIP (phonetic for
   Easy IPv4), outlines the IPv4 public address pool expansion and the
   Internet system architecture enhancement considerations. EzIP may
   expand an IPv4 address by a factor of 256M without affecting the
   existing IPv4 based Internet, or the current private networks. It is
   in full conformance with the IPv4 protocol, and supports not only
   both direct and private network connectivity, but also their
   interoperability. EzIP deployments may coexist with existing Internet
   traffic and IoTs (Internet of Things) operations without perturbing
   their setups, while offering end-users the freedom to indepdently
   choose which service. EzIP may be implemented as a software or
   firmware enhancement to Internet edge routers or private network
   routing gateways, wherever needed, or simply installed as an inline
   adjunct hardware module between the two, enabling a seamless
   introduction. The 256M case detailed here establishes a complete
   spherical layer of an overlay of routers for interfacing between the
   Internet fabic (core plus edge routers) and the end user premises or
   IoTs. Incorporating caching proxy technology in the gateway, a fairly
   large geographical region may enjoy address expansion based on as few
   as one ordinary IPv4 public address utilizing IP packets with
   degenerated EzIP header. If IPv4 public pool allocations were
   reorganized, the assignable pool could be multiplied 512M fold or
   even more. Enabling hierarchical address architecture which
   facilitates both hierarchical and mesh routing, EzIP can provide
   nearly the same order of magnitude of address pool resources as IPv6
   while streamlining the administrative aspects of it. The basic EzIP
   will immediately resolve the local IPv4 address shortage, while being
   transparent to the rest of the Internet as a new parallel facility.
   Under the Dual-Stack environment, these proposed interim facilities
   will relieve the IPv4 address shortage issue, while affording IPv6
   more time to reach maturity for providing the availability levels
   required for delivering a long-term general service. The basic EzIP
   may be deployed in two distinctive phases. First, the CG-NAT
   operation may be enhanced by enabling the use of 240/4 netblock in
   addition to the current 100.64/10 netblock of RFC6598. This makes
   end-to-end connectivity feasible within the service area of each
   240/4 netblock. Second, this capability may extend to global coverage
   with the use of the Option Word mechanism in the IP header.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-chen-ati-adaptive-ipv4-address-space-13"/>
   
</reference>



<reference anchor="RFC8484">
<front>
<title>DNS Queries over HTTPS (DoH)</title>
<author fullname="P. Hoffman" initials="P." surname="Hoffman"><organization/></author>
<author fullname="P. McManus" initials="P." surname="McManus"><organization/></author>
<date month="October" year="2018"/>
<abstract><t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t></abstract>
</front>
<seriesInfo name="RFC" value="8484"/>
<seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>


<reference anchor="I-D.thomson-http-oblivious">
   <front>
      <title>Oblivious HTTP</title>
      <author fullname="Martin Thomson" initials="M." surname="Thomson">
         <organization>Mozilla</organization>
      </author>
      <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         <organization>Cloudflare</organization>
      </author>
      <date day="24" month="August" year="2021"/>
      <abstract>
	 <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-thomson-http-oblivious-02"/>
   
</reference>



<reference anchor="RFC4193">
<front>
<title>Unique Local IPv6 Unicast Addresses</title>
<author fullname="R. Hinden" initials="R." surname="Hinden"><organization/></author>
<author fullname="B. Haberman" initials="B." surname="Haberman"><organization/></author>
<date month="October" year="2005"/>
<abstract><t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4193"/>
<seriesInfo name="DOI" value="10.17487/RFC4193"/>
</reference>



<reference anchor="RFC8061">
<front>
<title>Locator/ID Separation Protocol (LISP) Data-Plane Confidentiality</title>
<author fullname="D. Farinacci" initials="D." surname="Farinacci"><organization/></author>
<author fullname="B. Weis" initials="B." surname="Weis"><organization/></author>
<date month="February" year="2017"/>
<abstract><t>This document describes a mechanism for encrypting traffic encapsulated using the Locator/ID Separation Protocol (LISP).  The design describes how key exchange is achieved using existing LISP control-plane mechanisms as well as how to secure the LISP data plane from third-party surveillance attacks.</t></abstract>
</front>
<seriesInfo name="RFC" value="8061"/>
<seriesInfo name="DOI" value="10.17487/RFC8061"/>
</reference>



<reference anchor="RFC4581">
<front>
<title>Cryptographically Generated Addresses (CGA) Extension Field Format</title>
<author fullname="M. Bagnulo" initials="M." surname="Bagnulo"><organization/></author>
<author fullname="J. Arkko" initials="J." surname="Arkko"><organization/></author>
<date month="October" year="2006"/>
<abstract><t>This document defines a Type-Length-Value format for Cryptographically Generated Address (CGA) Extensions.  This document updates RFC 3972.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4581"/>
<seriesInfo name="DOI" value="10.17487/RFC4581"/>
</reference>



<reference anchor="RFC4982">
<front>
<title>Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs)</title>
<author fullname="M. Bagnulo" initials="M." surname="Bagnulo"><organization/></author>
<author fullname="J. Arkko" initials="J." surname="Arkko"><organization/></author>
<date month="July" year="2007"/>
<abstract><t>This document analyzes the implications of recent attacks on commonly used hash functions on Cryptographically Generated Addresses (CGAs) and updates the CGA specification to support multiple hash algorithms.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4982"/>
<seriesInfo name="DOI" value="10.17487/RFC4982"/>
</reference>



<reference anchor="RFC7343">
<front>
<title>An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers Version 2 (ORCHIDv2)</title>
<author fullname="J. Laganier" initials="J." surname="Laganier"><organization/></author>
<author fullname="F. Dupont" initials="F." surname="Dupont"><organization/></author>
<date month="September" year="2014"/>
<abstract><t>This document specifies an updated Overlay Routable Cryptographic Hash Identifiers (ORCHID) format that obsoletes that in RFC 4843. These identifiers are intended to be used as endpoint identifiers at applications and Application Programming Interfaces (APIs) and not as identifiers for network location at the IP layer, i.e., locators. They are designed to appear as application-layer entities and at the existing IPv6 APIs, but they should not appear in actual IPv6 headers.  To make them more like regular IPv6 addresses, they are expected to be routable at an overlay level.  Consequently, while they are considered non-routable addresses from the IPv6-layer perspective, all existing IPv6 applications are expected to be able to use them in a manner compatible with current IPv6 addresses.</t><t>The Overlay Routable Cryptographic Hash Identifiers originally defined in RFC 4843 lacked a mechanism for cryptographic algorithm agility.  The updated ORCHID format specified in this document removes this limitation by encoding, in the identifier itself, an index to the suite of cryptographic algorithms in use.</t></abstract>
</front>
<seriesInfo name="RFC" value="7343"/>
<seriesInfo name="DOI" value="10.17487/RFC7343"/>
</reference>



<reference anchor="RFC9374">
<front>
<title>DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID)</title>
<author fullname="R. Moskowitz" initials="R." surname="Moskowitz"><organization/></author>
<author fullname="S. Card" initials="S." surname="Card"><organization/></author>
<author fullname="A. Wiethuechter" initials="A." surname="Wiethuechter"><organization/></author>
<author fullname="A. Gurtov" initials="A." surname="Gurtov"><organization/></author>
<date month="March" year="2023"/>
<abstract><t>This document describes the use of Hierarchical Host Identity Tags (HHITs) as self-asserting IPv6 addresses, which makes them trustable identifiers for use in Unmanned Aircraft System Remote Identification (UAS RID) and tracking. </t><t>Within the context of RID, HHITs will be called DRIP Entity Tags (DETs).  HHITs provide claims to the included explicit hierarchy that provides registry (via, for example, DNS, RDAP) discovery for third-party identifier endorsement. </t><t>This document updates RFCs 7401 and 7343.</t></abstract>
</front>
<seriesInfo name="RFC" value="9374"/>
<seriesInfo name="DOI" value="10.17487/RFC9374"/>
</reference>



<reference anchor="RFC3118">
<front>
<title>Authentication for DHCP Messages</title>
<author fullname="R. Droms" initials="R." role="editor" surname="Droms"><organization/></author>
<author fullname="W. Arbaugh" initials="W." role="editor" surname="Arbaugh"><organization/></author>
<date month="June" year="2001"/>
<abstract><t>This document defines a new Dynamic Host Configuration Protocol (DHCP) option through which authorization tickets can be easily generated and newly attached hosts with proper authorization can be automatically configured from an authenticated DHCP server.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="3118"/>
<seriesInfo name="DOI" value="10.17487/RFC3118"/>
</reference>



<reference anchor="RFC4014">
<front>
<title>Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option</title>
<author fullname="R. Droms" initials="R." surname="Droms"><organization/></author>
<author fullname="J. Schnizlein" initials="J." surname="Schnizlein"><organization/></author>
<date month="February" year="2005"/>
<abstract><t>The RADIUS Attributes suboption enables a network element to pass identification and authorization attributes received during RADIUS authentication to a DHCP server.  When the DHCP server receives a message from a relay agent containing a RADIUS Attributes suboption, it extracts the contents of the suboption and uses that information in selecting configuration parameters for the client.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="4014"/>
<seriesInfo name="DOI" value="10.17487/RFC4014"/>
</reference>



<reference anchor="RFC2865">
<front>
<title>Remote Authentication Dial In User Service (RADIUS)</title>
<author fullname="C. Rigney" initials="C." surname="Rigney"><organization/></author>
<author fullname="S. Willens" initials="S." surname="Willens"><organization/></author>
<author fullname="A. Rubens" initials="A." surname="Rubens"><organization/></author>
<author fullname="W. Simpson" initials="W." surname="Simpson"><organization/></author>
<date month="June" year="2000"/>
<abstract><t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="2865"/>
<seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>



<reference anchor="RFC6740">
<front>
<title>Identifier-Locator Network Protocol (ILNP) Architectural Description</title>
<author fullname="RJ Atkinson" initials="RJ" surname="Atkinson"><organization/></author>
<author fullname="SN Bhatti" initials="SN" surname="Bhatti"><organization/></author>
<date month="November" year="2012"/>
<abstract><t>This document provides an architectural description and the concept of operations for the Identifier-Locator Network Protocol (ILNP), which is an experimental, evolutionary enhancement to IP.  This is a product of the IRTF Routing Research Group.  This  document defines an Experimental Protocol for the Internet  community.</t></abstract>
</front>
<seriesInfo name="RFC" value="6740"/>
<seriesInfo name="DOI" value="10.17487/RFC6740"/>
</reference>



<reference anchor="RFC2474">
<front>
<title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
<author fullname="K. Nichols" initials="K." surname="Nichols"><organization/></author>
<author fullname="S. Blake" initials="S." surname="Blake"><organization/></author>
<author fullname="F. Baker" initials="F." surname="Baker"><organization/></author>
<author fullname="D. Black" initials="D." surname="Black"><organization/></author>
<date month="December" year="1998"/>
<abstract><t>This document defines the IP header field, called the DS (for differentiated services) field.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="RFC" value="2474"/>
<seriesInfo name="DOI" value="10.17487/RFC2474"/>
</reference>



<reference anchor="RFC8939">
<front>
<title>Deterministic Networking (DetNet) Data Plane: IP</title>
<author fullname="B. Varga" initials="B." role="editor" surname="Varga"><organization/></author>
<author fullname="J. Farkas" initials="J." surname="Farkas"><organization/></author>
<author fullname="L. Berger" initials="L." surname="Berger"><organization/></author>
<author fullname="D. Fedyk" initials="D." surname="Fedyk"><organization/></author>
<author fullname="S. Bryant" initials="S." surname="Bryant"><organization/></author>
<date month="November" year="2020"/>
<abstract><t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t></abstract>
</front>
<seriesInfo name="RFC" value="8939"/>
<seriesInfo name="DOI" value="10.17487/RFC8939"/>
</reference>



<reference anchor="RFC8609">
<front>
<title>Content-Centric Networking (CCNx) Messages in TLV Format</title>
<author fullname="M. Mosko" initials="M." surname="Mosko"><organization/></author>
<author fullname="I. Solis" initials="I." surname="Solis"><organization/></author>
<author fullname="C. Wood" initials="C." surname="Wood"><organization/></author>
<date month="July" year="2019"/>
<abstract><t>Content-Centric Networking (CCNx) is a network protocol that uses a hierarchical name to forward requests and to match responses to requests.  This document specifies the encoding of CCNx messages in a TLV packet format, including the TLV types used by each message element and the encoding of each value.  The semantics of CCNx messages follow the encoding-independent CCNx Semantics specification.</t><t>This document is a product of the Information Centric Networking research group (ICNRG).  The document received wide review among ICNRG participants and has two full implementations currently in active use, which have informed the technical maturity of the protocol specification.</t></abstract>
</front>
<seriesInfo name="RFC" value="8609"/>
<seriesInfo name="DOI" value="10.17487/RFC8609"/>
</reference>



<reference anchor="RFC3986">
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"><organization/></author>
<author fullname="R. Fielding" initials="R." surname="Fielding"><organization/></author>
<author fullname="L. Masinter" initials="L." surname="Masinter"><organization/></author>
<date month="January" year="2005"/>
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name="STD" value="66"/>
<seriesInfo name="RFC" value="3986"/>
<seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>



<reference anchor="RFC2009">
<front>
<title>GPS-Based Addressing and Routing</title>
<author fullname="T. Imielinski" initials="T." surname="Imielinski"><organization/></author>
<author fullname="J. Navas" initials="J." surname="Navas"><organization/></author>
<date month="November" year="1996"/>
<abstract><t>This document describes a possible experiment with geographic addresses. It uses several specific IP addresses and domain names in the discussion as concrete examples to aid in understanding the concepts.  This memo defines an Experimental Protocol for the Internet community.</t></abstract>
</front>
<seriesInfo name="RFC" value="2009"/>
<seriesInfo name="DOI" value="10.17487/RFC2009"/>
</reference>




    </references>


<?line 849?>

<section anchor="SEC:A:features"><name>Desirable Networking Features</name>

<t>The present section outlines the general features that are desirable in a networked system at large, i.e., not specific to any application/usage.
Such list is a "by-product" of the addressing discussion and completely created through mail exchanges.</t>

<t><list style="numbers">
  <t>Always-On: The world is getting more and more connected, leading to being connected to the Internet, anywhere, by any technology (e.g., cable, fiber, or radio), even simultaneously,  "all the time", and, most importantly, automatically (without any switch turning). However, when defining "all the time" there is a clear and important difference to be made between availability and reliability vs "desired usage". In other words, "always on" can be seen as a desirable perception at the end user level or as a characteristic of the underlying system. From an end user perspective, clearly the former is of importance, not necessarily leading to an "always on" system notion but instead "always-app-available", merely requiring the needed availability and reliability to realize the perception of being "always on" (e.g., for earthquake alerts), possibly complemented by app-specific methods to realize the "always on" perception (e.g., using local caching rather than communication over the network).</t>
  <t>Transparency: Being agnostic with respect to local domains network protocols (Bluetooth, ZigBee, Thread, Airdrop, Airplay, or any others) is key to provide an  easy and straightforward method for contacting people and devices without any knowledge of network issues, particularly those specific to network-specific solutions. While having a flexible addressing model that accommodates a wide range of use cases is important, the centrality of the IP protocol remains key as a mean to provide global connectivity.</t>
  <t>Multi-homing: Seamless multi-homing capability for the host is key to best use the connectivity options that may be available to an end user, e.g., for increasing resilience in cases of failures of one available option. Protocols like LISP, SHIM6, QUIC, MPTCP, SCTP (to cite a few) have been successful at providing this capability in an incremental way, but too much of that capability is realized within the specific application domain, making it hard to leverage across all applications.
While today each transport protocol has its own way to perform multi-address discovery, the network layer should provide the multi-homing feature (e.g., SHIM6 can be used to discover all addresses on both ends), and then leave the address selection to the transport. With that, multi-address discovery remains a network feature exposed to the upper layers. This may also mean to update the Socket API (which may be actually the first thing to do), which does not necessarily mean to expose more network details to the applications but instead be more address agnostic, yet, more expressive.</t>
  <t>Mobility: A lot of work has been put in MobileIP (<xref target="RFC5944"/>, <xref target="RFC6275"/>) to provide seamless and lossless communications for moving nodes (vehicle, satellites). However, it has never been widely deployed for several reasons, like complexity of the protocol and the fact that the problem has often been tackled at higher layers, with applications resilient to address changes. However, similar to multi-homing, solving the problem at higher layers means that each and every transport protocol and application have their own way to deal with mobility, leading to similar observations as those for the previous multi-homing aspect.</t>
  <t>Security and Privacy: The COVID-19 pandemic has boosted end users' desire to be protected and protect their privacy. The balance among privacy, security, and accountability is not simple to achieve. There exist different views on what those properties should be, however the network should provide the means to provide what is felt as the best trade-off for the specific use case.</t>
  <t>Performance: While certainly desirable, "performance" is a complex issue that depends on the objectives of those building for but also paying for performance. Examples are (i) speed (shorter paths/direct communications), (ii) bandwidth (10petabit/s for a link), (iii) efficiency (less overlays/encapsulations), (iv) high efficacy or sustainability (avoid waste). From an addressing perspective, length/format/semantics that may adapt to the specific use case (e.g. use short addresses for low power IoT, or, where needed, longer for addresses embedding certificates for strong authentication, authorization and accountability) may contribute to the performance aspects that end users desire, such as reducing waste through not needed encapsulation or needed conversion at network boundaries.</t>
  <t>Availability, Reliability, Predictability: These three properties are important to enable wide-range of services and applications according to the desired usage (cf. point 1).</t>
  <t>Do not do harm: Access to the Internet is considered a human right <xref target="RFC8280"/>. Access to and expression through it should align with this core principle. This issue transcends through a variety of previously discussed 'features' that are desired, such as privacy, security but also availability and reliability. However, lifting the feature of network access onto a basic rights level also brings in the aspect of "do not do harm" through the use of the Internet with respect to wider societal objectives. Similar to other industries, such as electricity or cars, preventing harm usually requires an interplay of commercial, technological, and regulatory efforts, such as the enforcement of seat belt wearing to reduce accident death. As a first step, the potential harmfulness of a novel method must be recognized and weighted against the benefits of its introduction and use. One increasingly important consideration in the technology domain is "sustainability" of resource usage for an end user's consumption of and participation in Internet services. As an example, Distributed Ledger Technologies (DLT) are seen as an important tool for a variety of applications, including Internet decentralization (<xref target="DINRG"/>). However, the non-linear increase in energy consumption means that extending proof-of-work systems to the entire population of the planet would not only be impractical but also possibly highly wasteful, not just at the level of computation but also communication resource usage <xref target="I-D.trossen-rtgwg-impact-of-dlts"/>. This poses the question on how novel methods for addressing may improve on sustainability of such technologies, particularly if adopted more widely.</t>
  <t>Maximum Transmission Unit (MTU): One long standing issue in the Internet is related to the MTU and how to discover the path MTU in order to avoid fragmentation (<xref target="RFC9268"/>, <xref target="I-D.templin-6man-aero"/>). While it makes sense to always leverage as much performance from local systems as possible, this should come without sacrificing the ability to communicate with all systems. Having a solid solution to solve the issue would make the overall interconnection of systems more robust.</t>
</list></t>

</section>
<section anchor="SEC:B:extensions"><name>IP Addressing Extensions driven by Use-Cases</name>

<t>Over the years, a plethora of extensions has been proposed in order to move beyond the native properties of IP addresses. The development of those extensions can be interpreted as attempts, in a limited scope, to go beyond the original properties of Internet addressing and desired new capabilities that those developing the extensions identified as being missing and yet needed and desirable.</t>

<t>The following sub-sections provide a more detailed and in-depth discussion about IP Addressing Extensions dvelopped to cope with the specific requirements of the use cases listed in <xref target="SEC:problem"/>.</t>

<section anchor="SEC:ext:constrained"><name>Communication in Constrained Environments</name>

<t>In a number of communication scenarios, such as those encountered in the Internet of Things (IoT), a simple, communication network demanding minimal resources is required, allowing for a group of IoT network devices to form a network of constrained nodes, with the participating network and end nodes requiring as little computational power as possible and having small memory requirements in order to reduce the total cost of ownership of the network.Furthermore, in the context of industrial IoT, real-time requirements and scalability make IP technology not naturally suitable as communication technology (<xref target="OCADO"/>).</t>

<t>In the context of IoT, there are various technologies that allow to connect small objects. In addition to IEEE 802.15.4, i.e., Low-Rate Wireless Personal Area Network <xref target="IEEE-802.15.4-LR"/>, several limited domains exist through utilizing link layer technologies such as Bluetooth Low Energy (BLE) <xref target="BLE"/>, Digital European Cordless Telecommunications (DECT) - Ultra Low Energy (ULE) <xref target="DECT-ULE"/>, Master-Slave/Token-Passing (MS/TP) <xref target="BACnet"/>, Near-Field-Communication (NFC) <xref target="ECMA-340"/>, and Power Line Communication (PLC) <xref target="IEEE-1901.1"/>.</t>

<t>The end-to-end principle (detailed in <xref target="RFC2775"/>) requires IP addresses (e.g., IPv6 <xref target="RFC8200"/>) to be used on such constrained nodes networks, allowing IoT devices using multiple communication technologies to talk on the Internet. Often, devices located at the edge of constrained networks act as gateway devices, usually performing header compression (<xref target="RFC4919"/>). To ensure security and reliability, multiple gateways must be deployed. IoT devices on the network must select one of those gateways for traffic passthrough by the devices on the (limited domain) network.</t>

<t>Given the constraints imposed on the computational and possibly also communication technology, the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., IPv6 address, may pose a challenge when operating such networks.</t>

<t>Another type of (differently) constrained environment is an aircraft, which encompasses not only passenger communication but also the integration of real-time data exchange to ensure that processes and functions in the cabin are automatically monitored or actuated. For aircraft networks, the goal is to be able to send and receive information reliably and seamlessly. From this perspective, the medium with which these packets of information are sent is of little consequence so long as there is a level of determinism to it. However, there is currently no effective method in implementing wireless inter- and intra-communications between all subsystems. The emerging wireless sensor network technology in commercial applications such as smart thermostat systems, and smart washer/dryer units could be transposed onto aircraft and fleet operations. The proposal for having an Wireless Avionics Intra-Communications (WAIC) system promises reduction in the complexity of electrical wiring harness design and fabrication, reduction in wiring weight, increased configuration, and potential monitoring of otherwise inaccessible moving or rotating aircraft parts. Similar to the IoT concept, WAIC systems consist of short-range communications and are a potential candidate for passenger entertainment systems, smoke detectors, engine health monitors, tire pressure monitoring systems, and other kinds of aircraft maintenance systems.</t>

<t>While there are still many obstacles in terms of network security, traffic control, and technical challenges, future WAIC can enable real-time seamless communications between aircraft and between ground teams and aircraft as opposed to the discrete points of data leveraged today in aircraft communications. For that, WAIC infrastructure should also be connected to outside IP based networks in order to access edge/cloud facilities for data storage and mining.</t>

<t>However, the restricted capacity (energy, communication) of most aircraft devices (e.g. sensors) and the nature of the transmitted data – periodic transmission of small packets – may pose some challenges for the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., an IPv6 address. Moreover, most of the aircraft applications and services are focused on the data (e.g. temperature of gas tank on left wing) and not on the topological location of the data source. This means that the current topological location semantic of IP addresses is not beneficial for aircraft applications and services.</t>

</section>
<section anchor="SEC:ext:dynamic"><name>Communication within Dynamically Changing Topologies</name>

<t>Communication may occur over networks that exhibit dynamically changing<br />
topologies. One such example is that of satellite networks, providing global Internet connections through a combination of inter-satellite and ground station communication. With the convergence of space-based and terrestrial networks, users can experience seamless broadband access, e.g., on cruise ships, flights, and within cars, often complemented by and seamlessly switching between Wi-Fi, cellular, or satellite based networks at any time <xref target="WANG19"/>.</t>

<t>The satellite network service provider will plan the transmission path of user traffic based on the network coverage, satellite orbit, route, and link load, providing potentially high-quality Internet connections for users in areas that are not, or hard to be, covered by terrestrial networks. With large scale LEO (Low Earth Orbit) satellites, the involved topologies of the satellite network will be changing constantly while observing a regular flight pattern in relation to other satellites and predictable overflight patterns to ground users <xref target="CHEN21"/>.</t>

<t>Although satellite bearer services are capable of transporting IPv4 and IPv6 <xref target="CCSDS-702.1-B-1"/>, as well as associated protocols such as IP Multicast, DNS services and routing information, no IP functionality is implemented on-board the spacecraft, limiting the capability of leveraging for instance large scale satellite constellations.</t>

<t>One of the major constraints of deploying routing capability on board of a satellite is power consumption. Due to this, space routers may end up being intermittently powered up during a daytime sunlit pass. Another limitation of the first generation of IP routers in space was the lack of capability to remotely manage and upgrade software while in operation. 
Further, in order to reduce latency, which is the major impairment of satellite networks, there was a need of a networking solution able to perform in a scenario encompassing mobile devices with the capability of storing data, leading to a significant reduction of latency.</t>

<t>The limitations faced in early development of IP based satellite communication payloads, showed the need to develop a flexible networking solution that would enable delay tolerant communications in the presence of intermittent connectivity. Further, in order to reduce latency, which is the major impairment of satellite networks, there was a need of a networking solution able to perform in a scenario encompassing mobile devices with the capability of storing data, leading to a significant reduction of latency.</t>

<t>Moreover, due to the current IP addressing scheme and its focus on IP unicast addressing with extended deployment of IP multicast and some IP anycast, current deployments do not take advantage of the broadcast nature of satellite networks.</t>

<t>As a result of these constraints, the Consultative Committee for Space Data Systems (CCSDS) has produced its own communication standards distinct from those of the IETF. The conceptual model shares many similarities with the Open Systems Interconnection model, and individual CCSDS protocols often address comparable concerns to those standardized by the IETF, but always under the distinct concerns that connectivity may be intermittent, and while throughput rates may be high, so is latency.</t>

<t>Furthermore, the aerospace industry necessarily distinguishes strictly between "system" and "payload", largely for reasons of operational safety. The "system" here consists of aerospace and ground segments that together ensure the reliable operation of a craft within its designated space. At the same time, the "payload" describes any sensor or tool carried by a vehicle that is unrelated to craft operations, even if it may constitute a vital part of the overall mission.</t>

<t>The common practice today is to address system connectivity with the CCSDS protocol stack, while treating payload connectivity increasingly as an IP problem. It was to this end that <xref target="CCSDS-702.1-B-1"/> was developed. By layering IP within the CCSDS stack, it becomes just an opaque payload which may or may not be transmitted depending on current mission parameters. The distinct downside of this approach from a payload deployment perspective is that it is next to impossible in practice to route between an IP-based payload endpoints located on different satellites. The typical deployment scenarios treat each craft's payload and associated ground services as a private network, with no routing between them.</t>

<t>Networking platforms based on a name (data or service) based addressing scheme would bring several potential benefits to satellite network payloads aiming to tackle some of their major challenges, including high propagation delay.</t>

<t>Concerning the vehicular networks use-case, the communication may include Road Side Units (RSU) with the possibility to create ephemeral connections to those RSUs for the purpose of workload offloading, joint computation over multiple (vehicular) inputs, and other purposes <xref target="I-D.ietf-lisp-nexagon"/>. Communication here may exhibit a multi-hop nature, not just involving the vehicle and the RSU over a direct link.</t>

<t>Those topologies are naturally changing constantly due to the dynamic nature of the involved communication nodes.</t>

<t>The advent of Flying Ad-hoc NETworks (FANETs) has opened up an opportunity to create new added-value services <xref target="CHRIKI19"/>. Although these networks share common features with vehicular ad hoc networks, they present several unique characteristics such as energy efficiency, mobility degree, the capability of swarming, and the potential large scale of swarm networks.</t>

<t>Due to high mobility of FANET nodes, the network topology changes more frequently than in a typical vehicular ad hoc network. From a routing point of view, although ad-hoc reactive and proactive routing approaches can be used, there are other type of routing protocols that have been developed for FANETS, such as hybrid routing protocols and position based routing protocols, aiming to increase efficiency in large scale networks with dynamic topologies.</t>

<t>Both type of protocols challenge the current Internet addressing semantic: in the case of hybrid protocols, two different routing strategies are used inside and outside a network zone. While inside a zone packets are routed to a specific destination IP address, between zones, query packets are routed to a subset of neighbors as determined by a broadcast algorithm. In the case of position based routing protocol, the IP addressing scheme is not used at all, since packets are routed to a different identifier, corresponding to the geographic location of the destination and not its topological location. Hence, what is needed is to consolidate the geo-spatial addressing with that of a locator-based addressing in order to optimize routing policies across the zones.</t>

<t>Moreover most of the application/services deployed in FANETs tend to be agnostic of the topological location of nodes, rather focusing on the location of data or services. This distinction is even more important because is dynamic network such as FANET robust networking solutions may rely on the redundancy of data and services, meaning that they may be found in more than one device in the network. This in turn may bring into play a possible service-centric semantic for addressing the packets that need routing in the dynamic network towards a node providing said service (or content).</t>

<t>In the aforementioned network technologies, there is a significant difference between the high dynamics of the underlying network topologies, compared to the relative static nature of terrestrial network topology, as reported in <xref target="HANDLEY18"/>. As a consequence, the notion of a topological network location becomes restrictive in the sense that not only the relation between network nodes and user endpoint may change, but also the relation between the nodes that form the network itself. This may lead to the challenge of maintaining and updating the topological addresses in this constantly changing network topology.</t>

<t>In attempts to utilize entirely different semantics for the addressing itself, geographic-based routing, such as in <xref target="HUGHES03"/>, has been proposed for MANETs (Mobile Ad-hoc NETworks) through providing geographic coordinates based addresses to achieve better routing performance, lower overhead, and lower latency <xref target="ABDALLAH16"/>.</t>

</section>
<section anchor="SEC:ext:mobility"><name>Communication among Moving Endpoints</name>

<t>When packet switching was first introduced, back in the 60s/70s, it was intended to replace the rigid circuit switching with a communication infrastructure that was more resilient to failures. As such, the design never really considered communication endpoints as mobile. Even in the pioneering ALOHA <xref target="KUO95"/> system, despite considering wireless and satellite links, the network was considered static (with the exception of failures and satellites, which fall in what is discussed in <xref target="SEC:ext:dynamic"/>). Ever since, a lot of efforts have been devoted to overcome such limitations once it became clear that endpoint mobility will become a main (if not THE main) characteristic of ubiquitous communication systems.</t>

<t>The IETF has for a long time worked on solutions that would allow extending the IP layer with mobility support. Because of the topological semantic of IP addresses, endpoints need to change addresses each time they visit a different network. However, because routing and endpoint identification is also IP address based, this leads to a communication disruption.</t>

<t>The lack of an efficient mobility management solution at network layer enabled the opportunity to involve the transport layer in mobility solutions, either by introducing explicit in-band signaling to allow for communicating IP address changes (e.g., in SCTP <xref target="RFC5061"/> and MPTCP <xref target="RFC6182"/>), or by introducing some form of connection ID that allows for identifying a communication independently from IP addresses (e.g., the connection ID used in QUIC <xref target="RFC9000"/>).</t>

<t>Concerning network layer only solutions, anchor-based Mobile IP mechanisms have been introduced (<xref target="RFC5177"/>, <xref target="RFC6626"/> <xref target="RFC5944"/>, <xref target="RFC5275"/>). Mobile IP is based on a relatively complex and heavy mechanism that makes it hard to deploy and it is not very efficient. Furthermore, it is even less suitable than native IP in constrained environments like the ones discussed in <xref target="SEC:ext:constrained"/>.</t>

<t>Alternative approaches to Mobile IP often leverage the introduction of some form of overlay. LISP <xref target="RFC9299"/>, by separating the topological semantic from the identification semantic of IP addresses, is able to cope with endpoint mobility by dynamically mapping endpoint identifiers with routing locators <xref target="I-D.ietf-lisp-mn"/>. This comes at the price of an overlay that needs its own additional control plane <xref target="RFC9301"/>.</t>

<t>Similarly, the NVO3 (Network Virtualization Overlays) Working Group, while focusing on Data Center environments, also explored an overlay-based solution for multi-tenancy purposes, but also resilient to mobility since relocating Virtual Machines (VMs) is common practice. NVO3 considered for a long time several data planes that implement slightly different flavors of overlays (<xref target="RFC8926"/>, <xref target="RFC7348"/>, <xref target="I-D.ietf-intarea-gue"/>), but lacks an efficient control plane specifically tailored for DCs.</t>

<t>Alternative mobility architectures have also been proposed in order to cope with endpoint mobility outside the IP layer itself. The Host Identity Protocol (HIP) <xref target="RFC7401"/> introduced a new namespace in order to identify endpoints, namely the Host Identity (HI), while leveraging the IP layer for topological location. On the one hand, such an approach needs to revise the way applications interact with the network layer, by modifying the DNS (now returning an HI instead of an IP address) and applications to use the HIP socket extension. On the other hand, early adopters do not necessarily gain any benefit unless all communicating endpoints upgrade to use HIP.  In spite of this, such a solution may work in the context of a limited domain.</t>

<t>Another alternative approach is adopted by Information-Centric Networking (ICN) <xref target="RFC7476"/>. By making content a first class citizen of the communication architecture, the "what" rather than the "where" becomes the real focus of the communication. However, as explained in the next sub-section, ICN can run either over the IP layer or completely replace it, which in turn can be seen as running the Internet and ICN as logically completely separated limited domains.</t>

<t>Unmanned Aircraft Systems (UAS) are examples of moving devices that require a stable mobility management scheme since they consist of a number of Unmanned Aerial Vehicles (UAV; or drones) subordinated to a Ground Control Station (GCS) <xref target="MAROJEVIC20"/>. The information produced by the different sensors and electronic devices available at each UAV is collected and processed by a software or hardware data acquisition unit, being transmitted towards the GCS, where it is inspected and/or analyzed. Analogously, control information transmitted from the GCS to the UAV enables the execution of control operations over the aircraft, such as changing the route planning or the direction pointed by a camera.</t>

<t>Drones may be classified into several distinct categories, with implications on regulatory requirements. Vehicles carrying people generally fall under manned aircraft regulations whether they manually or automatically piloted. At the opposite end of the spectrum, toy drones require Line-of-Sight operations.</t>

<t>In the middle there are a variety of specialized UAVs that, although may have redundant links to maintain communications in long-range missions (e.g., satellite), perform most of the communications with the GCS over wireless data links, e.g., based on a radio line-of-sight technology such as Wi-Fi or 3G/4G/5G. While in some scenarios, UAVs will operate always under the range of the same cellular base station, in missions with large range, UAVs will move between different cellular or wireless ground infrastructure, meaning that the UAV needs to upload its topological locator and re-start the ongoing communication sessions.</t>

<t>In particular, in Beyond Visual Line of Sight (BVLOS) operations, legal requirements may include the use of multiple redundant radio links (even employing different radio bands), but still require unique identification of the vehicle. This implies that some resolution mechanism is required that securely resolves drone identifiers to link locators.</t>

<t>To this end, Drone Remote Identification Protocol <xref target="I-D.ietf-drip-arch"/> uses hierarchical DRIP Entity Tags, which are hierarchical versions of Host Identity Tags, and thus compatible with HIP <xref target="RFC7401"/>. DRIP does not mandate the use of HIP, but suggests its use in several places. Using the mobility extensions of HIP provides for one way to ensure secure identifier resolution.</t>

<t>In addition to such connectivity considerations, data-centric communication plays an increasing role, where information is named and decoupled from its location, and applications/services operate over these named data rather than on host-to-host communications.</t>

<t>In this context, the Data Distribution Service (<xref target="ALMADANI20"/>) has emerged as an industry-oriented open standard that follows this approach. The space and time decoupling allowed by DDS is very relevant in any dynamic and distributed system, since interacting entities are not forced to know each other and are not forced to be simultaneously present to exchange data. Time decoupling can significantly simplify the management of intermittent data-links, in particular for wireless connectivity between UAS. This model of communication, in turn, questions the locator-based addressing used in IP and instead utilizes a data-centric naming.</t>

<t>In order to clarify and contrast these distinct approaches, it is worth highlighting that in the aerospace industry, it is common practice to distinguish between "system" and "payload" considerations (see above). In principle, command, control (and communications) (C2/C3) link connectivity is limited to system operations, while payload communications is largely out of scope of regulatory frameworks. Practically speaking, especially in light UAV, both types of communications may be overlaid on the same data links.</t>

<t>From this follow legal reliability requirements that apply to systems and C3 links which may make data-centric naming infeasible and making the use of authenticated host-to-host communications a requirement (such as via HIP). For payload communications, named data approaches may be more desirable for their time decoupling properties above.</t>

<t>Both approaches share a need to resolve identifiers to locators. When it comes to C3 link reliability, this translates into an end-point selection problem, as multiple underlying links may be available, but the determination of the "best" link depends on specific radio characteristics <xref target="FINKHAUSER21"/> or even the vehicle's spatial location.</t>

<t>In the case of using IP, mobility of UAVs introduces a significant challenge. Consider the case where a GCS is receiving telemetry information from a specific UAV. Assuming that the UAV moves and changes its point of attachment to the network, it will have to configure a new IP address on its wireless interface. However, this is problematic, as the telemetry information is still being sent by to the previous IP address of the UAV. This simple example illustrates the necessity to deploy mobility management solutions to handle this type of situations.</t>

<t>However, those technologies may not be suitable when the communication includes interconnections of public Internet and private networks (aka private limited domains), or when the movement is so fast that the locator and/or topology update becomes the limitation factor.</t>

<t>Scenarios from research projects such as <xref target="COMP4DRONES"/> and <xref target="ADACORSA"/> regarding connectivity assume worse conditions. Consider an emergency scenario in which 3GPP towers are inoperable. Emergency services need to deploy a mobile ground control station that issues emergency landing overrides to all UAV in the area. UAV must be able to authenticate this mobile GCS to prevent malicious interference with their opreations, but must be able to do so without access to internet-connected authentication databases. HIP provides a means to secure communications to this mobile GCS, with no means for establishing its authority. While such considerations are not directly part of the mechanism by which identifiers may be mapped to locators, they illustrate the need for carrying authenticating and authorizing information within identifiers.</t>

<t>Furthermore, mobility management solutions increase the complexity of the deployment and may impact the performance of data distribution, both in terms of signaling/data overhead and communication path delay. Considering the specific case of multicast data streams, mobility of content producers and consumers is inherently handled by multicast routing protocols, which are able to react to changes of location of mobile nodes by reconstructing the corresponding multicast delivery trees. Nevertheless, this comes with a cost in terms of signaling and data overhead (data may still flow through branches of a multicast delivery tree where there are no receivers while the routing protocol is still converging).</t>

<t>Another alternative is to perform the mobility management of producers and consumers not at the application layer based on IP multicast trees, but on the network layer based on an Information Centric Network approach, which was already mentioned in this section.</t>

<t>Some limited relief may be offered by in-network processing. Sensor data used in autononmous operations becomes ever richer, while available transmission throughput rates do not increase at the same pace. For this reason, the general trend in autonomous vehicles is to move away from transmitting raw sensor data and processing at the ground station. Instead, aggregated Situational Awareness Data is instead transmitted. In networking terms this implies in-network processing, as individual sensor nodes on board a UAV network no longer employ direct communications with a GCS. A similar approach is taken in IoT sensors, where low-powered sensors may send raw data via CoAP <xref target="RFC7252"/> or similar protocols to a processing router, and a UAV collects aggregated data from this router to transmit it to where it may be further processed.</t>

</section>
<section anchor="SEC:ext:service"><name>Communication Across Services</name>

<t>As a communication infrastructure spanning many facets of life, the Internet integrates services and resources from various aspects such as remote collaboration, shopping, content production as well as delivery, education, and many more. Accessing those services and resources directly through URIs has been proposed by methods such as those defined in ICN <xref target="RFC7476"/>, where providers of services and resources can advertise those through unified identifiers without additional planning of identifiers and locations for underlying data and their replicas. Users can access required services and resources by virtue of using the URI-based identification, with an ephemeral relationship built between user and provider, while the building of such relationship may be constrained with user- as well as service-specific requirements, such as proximity (finding nearest provider), load (finding fastest provider), and others.</t>

<t>While systems like ICN <xref target="JACOBSON09"/> provide an alternative to the topological  addressing of IP, its deployment requires an overlay (over IP) or native deployment (alongside IP), the latter with dedicated gateways needed for translation. Underlay deployments are also envisioned in <xref target="RFC8763"/>, where ICN solutions are being used to facilitate communication between IP addressed network endpoints or URI-based service endpoints, still requiring gateway solutions for interconnection with ICN-based networks as well as IP routing based networks (cf., <xref target="I-D.irtf-icnrg-5gc-icn"/><xref target="I-D.trossen-icnrg-internet-icn-5glan"/>).</t>

<t>Although various approaches combining service and location-based addressing have been devised, the key challenge here is to facilitate a "natural", i.e., direct communication, without the need for gateways above the network layer.</t>

<t>Another aspect of communication across services is that of chaining individual services to a larger service. Here, an identifier would be used that serves as a link to next hop destination within the chain of single services, as done in the work on Service Function Chaining (SFC). With this, services are identified at the level of Layer 2/3 (<xref target="RFC7665"/>, <xref target="RFC8754"/>, <xref target="RFC8595"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677"/> although the service chain identification is carried as a Network Service header (NSH) <xref target="RFC7665"/>, separate to the packet identifiers. The forwarding with the chain of services utilizes individual locator-based IP addressing (for L3 chaining) to communicate the chained operations from one Service Function Forwarder <xref target="RFC7665"/> to another, leading to concerns regarding overhead incurred through the stacking of those chained identifiers in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>

</section>
<section anchor="SEC:ext:steering"><name>Communication Traffic Steering</name>

<t>Steering traffic within a communication scenario may involve at least two aspects, namely (i) limiting certain traffic towards a certain set of communication nodes and (ii) restraining the sending of packets towards a given destination (or a chain of destinations) with metrics that would allow the selection among one or more possible destinations.</t>

<t>One possibility for limiting traffic inside limited domains, towards specific objects, e.g., devices, users, or group of them, is subnet partition with techniques such as VLAN <xref target="RFC5517"/>, VxLAN <xref target="RFC7348"/>, or more evolved solution like TeraStream <xref target="TERASTREAM"/> realizing such partitioning. Such mechanisms usually involve significant configuration, and even small changes in network and user nodes could result in a repartition and possibly additional configuration efforts. Another key aspect is the complete lack of correlation of the topological address and any likely more semantic-rich identification that could be used to make policy decisions regarding traffic steering. Suitably enriching the semantics of the packet address, either that of the sender or receiver, so that such decision could be made while minimizing the involvement of higher layer mechanisms, is a crucial challenge for improving on network operations and speed of such limited domain traffic.</t>

<t>When making decisions to select one out of a set of possible destinations for a packet, IP anycast semantics can be applied albeit being limited to the locator semantic of the IP address itself. Recent work in <xref target="WION19"/> suggests utilizing the notion of IP anycast address to encode a "service identifier", which is dynamically mapped onto network locations where service instances fulfilling the service request may be located. Scenarios where this capability may be utilized are provided in <xref target="WION19"/> and include, but are not limited to, scenarios such as edge-assisted VR/AR, transportation, smart cities, smart homes, smart wearables, and digital twins.</t>

<t>The challenge here lies in the possible encoding of not only the service information itself but the constraint information that helps the selection of the "best" service instance and which is likely a service-specific constraint in relation to the particular scenario. The notion of an address here is a conditional (on those constraints) one where this conditional part is an essential aspect of the forwarding action to be taken. It needs therefore consideration in the definition of what an address is, what is its semantic, and how the address structure ought to look like.</t>

<t>As outlined in the previous sub-section, chaining services are another aspect of steering traffic along a chain of constituent services, where the chain is identified through either a stack of individual identifiers, such as in Segment Routing <xref target="RFC8402"/>, or as an identifier that serves as a link to next hop destination within the chain, such as in Service Function Chaining (SFC). The latter can be applied to services identified at the level of Layer 2/3 (<xref target="RFC7665"/>, <xref target="RFC8754"/>, <xref target="RFC8595"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677"/>. However, the overhead incurred through the stacking of those chained identifiers is a concern in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>

</section>
<section anchor="SEC:ext:builtin-sec"><name>Communication with built-in security</name>

<t>Today, strong security in the Internet is usually implemented as a general network service (<xref target="KRAHENBUHL21"/>, <xref target="RFC6158"/>). Among the various reasons for such approach is the limited semantic of current IP addresses, which do not allow to natively express security features or trust relationships.
In specific contexts strong identification and tracking is necessary for safety and security purposes, like for instance for UAS <xref target="RFC9153"/> or aeronautical telecommunications networks <xref target="I-D.haindl-lisp-gb-atn"/>. This becomes very cumbersome when communication goes beyond limited domains and in the public Internet, where security and trust associated to those identifier may be lost or just impossible to verify.</t>

<t>Efforts like Cryptographically Generated Addresses (CGA) <xref target="RFC3972"/>, provide some security features by embedding a truncated public key in the last 57-bit of IPv6 address, thereby greatly enhancing authentication and security within an IP network via asymmetric cryptography and IPsec <xref target="RFC4301"/>. The development of the Host Identity Protocol (HIP) <xref target="RFC7401"/> saw the introduction of cryptographic identifiers for the newly introduced Host Identity (HI) to allow for enhanced accountability, and therefore trust. The use of those HIs, however, is limited by the size of IPv6 128bit addresses.</t>

<t>Through a greater flexibility in addressing, any security-related key, certificate, or identifier could instead be included in a suitable address structure without any information loss (i.e., as-is, without any truncation or operation as such), avoiding therefore compromises such as those in HIP. Instead, CGAs could be created using full length certificates, or being able to support larger HIP addresses in a limited domain that uses it. This could significantly help in constructing a trusted and secure communication at the network layer, leading to connections that could be considered as absolute secure (assuming the cryptography involved is secure). Even more, anti-abuse mechanisms and/or DDoS protection mechanisms like the one under discussion in PEARG (<xref target="PEARG"/>) Research Group may leverage a greater flexibility of the overall Internet addressing, if provided, in order to be more effective.</t>

</section>
<section anchor="SEC:ext:protect-privacy"><name>Communication protecting user privacy</name>

<t>The last decade has witnessed increasing concerns for user privacy (<xref target="RFC7258"/>, <xref target="RFC6973"/>). IP Addresses are particularly exposed because they can easily be associated to end users, allowing fingerprinting and cross-site linking (<xref target="BUJLOW17"/>, <xref target="MISHRA20"/>). Indeed, while encryption is widely used to conceal the traffic payload, the IP header remain, and particularly IP addresses, must be transmitted in clear in order to forward packets.</t>

<t>One widely used approach to obfuscate the mapping between end users and IP addresses is the use of temporary addresses <xref target="RFC8981"/>. The idea here is to reduce the time window during which eavesdroppers and information collectors can correlate network activity based on the simple IP address. Ephemeral IP addresses have been in the working for more than 30 years <xref target="I-D.irtf-pearg-numeric-ids-history"/>, showing that having a temporal semantic in IP addresses can provide improved privacy protection.</t>

</section>
<section anchor="SEC:ext:nin"><name>Communication in Alternative Forwarding Architectures</name>

<t>The performance of communication networks has long been a focus for optimization, due to the immediate impact on cost of ownership for communication service providers. Technologies like MPLS <xref target="RFC3031"/> have been introduced to optimize lower layer communication, e.g., by mapping L3 traffic into aggregated labels of forwarding traffic for the purposes of, e.g., traffic engineering.</t>

<t>Even further, other works have emerged in recent years that have replaced the notion of packets with other concepts for the same purpose of improved traffic engineering and therefore efficiency gains. One such area is that of Software Defined Networks (SDN) <xref target="RFC7426"/>, which has highlighted how a majority of Internet traffic is better identified by flows, rather than packets. Based on such observation, alternate forwarding architectures have been devised that are flow-based or path-based. With this approach, all data belonging to the same traffic stream is delivered over the same path, and traffic flows are identified by some connection or path identifier rather than by complete routing information, possibly enabling fast hardware based switching (e.g. <xref target="DETNETWG"/>, <xref target="PANRG"/>).</t>

<t>On the one hand, such a communication model may be more suitable for real-time traffic like in the context of Deterministic Networks (<xref target="DETNETWG"/>), where indeed a lot of work has focused on how to "identify" packets belonging to the same DETNET flow in order to jointly manage the forwarding within the desired deterministic boundaries.</t>

<t>On the other hand, it may improve the communication efficiency in constrained wireless environments (cf., <xref target="SEC:ext:constrained"/>), by reducing the overhead, hence increasing the number of useful bits per second per Hertz.</t>

<t>Also, the delivery of information across similar flows may be combined into a multipoint delivery of a single return flow, e.g., for scenarios of requests for a video chunk from many clients being responded to with a single (multi-destination) flow, as outlined in <xref target="I-D.ietf-bier-multicast-http-response"/> as an example. Another opportunity to improve communication efficiency is being pursued in ongoing IETF/IRTF work to deliver IP- or HTTP-level packets directly over path-based or flow-based transport network solutions, such as in <xref target="TROSSEN10"/>, <xref target="I-D.ietf-bier-multicast-http-response"/>,<xref target="I-D.trossen-icnrg-internet-icn-5glan"/>, and <xref target="I-D.irtf-icnrg-5gc-icn"/>, with the capability to bundle unicast forward communication streams flexibly together in return path multipoint relations. Such capability is particularly opportune in scenarios such as chunk-based video retrieval or distributed data storage. However, those solutions currently require gateways to "translate" the flow communication into the packet-level addressing semantic in the peering IP networks. Furthermore, the use of those alternative forwarding mechanisms often require the encapsulation of Internet addressing information, leading to wastage of bandwidth as well as processing resources.</t>

<t>Providing an alternative way of forwarding data has also been the motivation for the efforts created in the European Telecommunication Standards Institute (ETSI), which formed an Industry Specification Group (ISG) named Non-IP Networking (NIN) <xref target="ETSI-NIN"/>. This group sets out to develop and standardize a set of protocols leveraging an alternative forwarding architecture, such as provided by a flow-based switching paradigm. The deployment of such protocols may be seen to form limited domains, still leaving the need to interoperate with the (packet-based forwarding) Internet; a situation possibly enabled through a greater flexibility of the addressing used across Internet-based and alternative limited domains alike.</t>

<t>As an alternative to IP routing, EIBP (Extended Internet Bypass Protocol) <xref target="SHENOY21"/> offers a communications model that can work with IP in parallel and entirely transparent and independent to any operation at network layer. For this, EIBP proposes the use of physical and/or virtual structures in networks and among networks to auto assign routable addresses that capture the relative position of routers in a network or networks in a connected set of networks, which can be used to route the packets between end domains. EIBP operates at Layer 2.5 and provides encapsulation (at source domain), routing, and de-encapsulation (at destination domain) for packets. EIBP can forward any type of packets between domains. A resolver to map the domain ID to EIBP's edge router addresses is required. When queried for a specific domain, the resolver will return the corresponding edge router structured addresses.</t>

<t>EIBP decouples routing operations from end domain operations, offering to serve any domain, without point solutions to specific domains. EIBP also decouples routing IDs or addresses from end device/domain addresses. This allows for accommodation of new and upcoming domains. A domain can extend EIBP's structured addresses into the domain, by joining as a nested domain under one or more edge routers, or by extending the edge router's structure addresses to its devices.</t>

</section>
</section>
<section anchor="SEC:C:propext"><name>Examples of Internet Addressing Properties Extensions</name>

<section anchor="length-extensions-1"><name>Length Extensions</name>

<section anchor="shorter-address-length-examples"><name>Shorter Address Length Examples</name>

<t><list style="symbols">
  <t>Header Compression/Translation:
Considering one base station is supposed to serve hundreds of user devices, maximizing the effectiveness for specific spectrum directly improves user quality of experience. To achieve the optimal utilization of the spectrum resource in the wireless area, the RObust Header Compression (ROHC) <xref target="RFC5795"/> mechanism, which has been widely adopted in cellar network like WCDMA, LTE, and 5G, utilizes header compression to shrink existing IPv6 headers onto shorter ones.</t>
</list></t>

<ul empty="true"><li>
  <t>Similarly, header compression techniques for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) have been around for several years now, constituting a main example of using the notion of a 'shared context' in order to reduce the size of the network layer header (<xref target="RFC6282"/>, <xref target="RFC7400"/>, <xref target="BADENHOP15"/>). More recently, other compression solutions have been proposed for Low Power Wide Area Networks (LPWAN - <xref target="RFC8376"/>). Among them, the Static Context Header Compression (SCHC - <xref target="RFC8724"/>) generalized the compression mechanism developed by 6lo. Instead of a standard compression behavior implemented in all 6lo nodes, SCHC introduces the notion of rules shared by two nodes. The SCHC compression technique is generic and can be applied to IPv6 and layers above.  Regarding the nature of the traffic, IPv6 addresses (source and destination) can be elided, partially sent, or replaced by a small index. Instead of the versatile IP packet, SCHC defines new packet formats dedicated to specific applications. SCHC rules are equivalence functions mapping this format to standard IP packets.</t>
</li></ul>

<ul empty="true"><li>
  <t>Also, constraints coming from either devices or carrier links would lead to mixed scenarios and compound requirements for extraordinary header compression. For native IPv6 communications on DECT ULE and MS/TP Networks <xref target="RFC6282"/>, dedicated compression mechanisms are specified in <xref target="RFC8105"/> and <xref target="RFC8163"/>, while the transmission of IPv6 packets over NFC and PLC, specifications are being developed in <xref target="I-D.ietf-6lo-nfc"/> and <xref target="RFC9354"/>.</t>
</li></ul>

<t><list style="symbols">
  <t>Separate device from locator identifier:
Solutions such as proposed in Expedited Internet Bypass Protocol <xref target="SHENOY21"/> and <xref target="RFC9300"/> can utilize a separation of device from locator, where only the latter is used for routing between the different domains using the same technology, therefore enabling the use of shorter addresses in the (possibly constrained) local environment. Device IDs used within such domains are carried as part of the payload by EIBP and hence can be of shorter size suited to the domain, while, for instance, in LISP a flexible address encoding <xref target="RFC8060"/> allows shorter addresses to be supported in the LISP control plane <xref target="RFC9301"/>.</t>
</list></t>

</section>
<section anchor="longer-address-length-examples"><name>Longer Address Length Examples</name>

<t><list style="symbols">
  <t>Split address zone by network realm:
Network Address Translation (NAT), which was first laid out in <xref target="RFC2663"/>, using private address and a stateful address binding to translate between the realms. As outlined in <xref target="RFC2663"/>, basic address translation is usually extended to include port number information in the translation process, supporting bidirectional or simple outbound traffic only. Because the 16-bits port number is used in the address translation, NAT theoretically increase IPv4 address length from 32-bit to 48-bit, i.e., 281 trillion address space.</t>
</list></t>

<ul empty="true"><li>
  <t>Similarly, EzIP <xref target="I-D.chen-ati-adaptive-ipv4-address-space"/> expects to utilize a reserved address block, i.e., 240/4, and an IPv4 header option to include it. Based on this, it can be regarded as EzIP is carrying a hierarchical address with two parts, where each part is a partial 32-bit IPv4 address. The first part is a public address residing in the "address field" of the header from globally routable IPv4 pool <xref target="IPv4pool"/>, i.e., ca. 3.84 billion address space. The second part is the reserved address residing in "option field" and belongs to the 240/4 prefix, i.e., ca. 2^28=268 million. Based on that, each EzIP deployment is tethered on the existing Internet via one single IPv4 address, and EzIP then have 3.84B * 268M address, ca. 1,000,000 trillion. Collectively, the 240/4 can also be used as end point identifier and form an overlay network providing services parallel to the current Internet, yet independent of the latter in other aspects.</t>
</li></ul>

<ul empty="true"><li>
  <t>Compared to NAT, EzIP is able to establish a communication session from either side of it, hence being completely transparent, and facilitating a full end-to-end networking configuration.</t>
</li></ul>

</section>
</section>
<section anchor="identity-extensions-1"><name>Identity Extensions</name>

<section anchor="anonymous-address-identity-examples"><name>Anonymous Address Identity Examples</name>

<t><list style="symbols">
  <t>Traffic Proxy:
Although not initially designed as a traffic proxy approach, a Virtual Private Network (VPN <xref target="KHANVILKAR04"/>) is widely utilized for packets origin hiding as a traffic detouring methodology. As it evolved, VPN derivatives like WireGuard <xref target="DONENFELD17"/> have become a mainstream instance for user privacy and security enhancement.</t>
</list></t>

<ul empty="true"><li>
  <t>With such methodology in mind, onion routing <xref target="GOLDSCHLAG99"/>, instantiated in the  Tor Project <xref target="TOR"/>, achieves high anonymity through traffic hand over via intermediates, before reaching the destination. Since the architecture of Tor requires at least three proxies, none of them is aware of the entire route. Given that the proxies themselves can be deployed all over cyberspace, trust is not the prerequisite if proxies are randomly selected.</t>
</li></ul>

<ul empty="true"><li>
  <t>In addition, dedicated protocols are also expected to be customized for privacy improvement via traffic proxy. For example, Oblivious DNS over HTTPS (ODoH <xref target="RFC9230"/>) use a third-party proxy to obscure identifications of user source addresses during DNS over HTTPS (DoH <xref target="RFC8484"/>) resolution. Similarly, Oblivious HTTP (OHTTP <xref target="I-D.thomson-http-oblivious"/>) involve proxy alike in the HTTP environment.</t>
</li></ul>

<t><list style="symbols">
  <t>Source Address Rollover:
As for source address rollover, it has been standardized that IP addresses for Internet users should be dynamic and temporary every time they are being generated <xref target="RFC8981"/>. This benefits from the available address space in the case of IPv6, through which address generation or assignment should be unpredictable and stochastic for outside observers.</t>
</list></t>

<ul empty="true"><li>
  <t>More radically, <xref target="I-D.gont-v6ops-ipv6-addressing-considerations"/> advocates an 'ephemeral address', changing over time,  for each process. Through this, correlating user behaviors conducted by different identifiers (i.e., source address) becomes much harder, if not impossible, if based on the IP packet header alone.</t>
</li></ul>

<t><list style="symbols">
  <t>Private Addresses:
The use and assignment of private addresses for IPv4 is laid out in <xref target="RFC1918"/>, while unique local addresses (ULAs) in IPv6 <xref target="RFC4193"/> take over the role of private address spaces in IPv4.</t>
  <t>Network Address Translation:
Given address translation can be performed several times in cascade, NATs may exist as part of existing customer premise equipment (CPE), such as a cable or an Ethernet router, with private wired/wireless connectivity, or may be provided in a carrier environment to further translate ISP-internal private addresses to a pool of (assigned) public IP addresses. The latter is often dynamically assigned to CPEs during its bootstrapping.</t>
  <t>Separate device from locator identifier:
EIBP <xref target="SHENOY21"/> utilizes a structured approach to addressing. It separates the routing ID from the device ID, where only the former is used for routing. As such, the device IDs can be encrypted, protecting the end device identity. Similarly, LISP uses separate namespaces for routing and identification allowing to 'hide' identifiers in encrypted LISP packets that expose only known routing information <xref target="RFC8061"/>.</t>
</list></t>

</section>
<section anchor="authenticated-address-identity-examples"><name>Authenticated Address Identity Examples</name>

<t><list style="symbols">
  <t>Self-certified Addresses:
As an example of this methodology serves <xref target="RFC3972"/>, defining IPv6 cryptographically Generated Addresses (CGA). A Cryptographically Generated Address is formed by replacing the least-significant 64 bits of an IPv6 address with the cryptographic hash of the public key of the address owner. Packets are then signed with the private key of the sender. Packets can be authenticate by the receiver by using the public key of the sender and the address of the sender. The original specifications have been already amended (cf., <xref target="RFC4581"/> and <xref target="RFC4982"/>) in order to support multiple (stronger) cryptographic algorithms.</t>
  <t>Collision-resistant addresses:
In order to provide a mechanism for IP mobility considerations, <xref target="RFC7343"/> defines Overlay Routable Cryptographic Hash Identifiers (ORCHIDv2). ORCHIDs use a determinstic scheme for generating statistically unique addresses by concatenating a designated IPv6 prefix, a hash function identifier, and a truncated hash. The hash input is a unique, statically assigned context identifier concatenated with random data. A variation of this scheme is proposed to solve requirements of <xref target="RFC9153"/> in identification of unmanned aerial vehicles using Drone Remote Identification Protocol Entity Tags (DRIP Entity Tag; DET) <xref target="RFC9374"/>. This variation proposes a distinct IPv6 prefix and new hash functions, but the major change is to further truncate the hash, and use the freed bits for a two-level registration authority hierarchy. The hierarchy is intended for delegation both when registering and validating DETs globally.</t>
  <t>Third party granted addresses:
<xref target="RFC3118"/> defines a DHCP option through which authorization tickets can be generated and newly attached hosts with proper authorization can be automatically configured from an authenticated DHCP server. Solutions exist where separate servers are used for user authentication like <xref target="KOMORI02"/> and <xref target="RFC4014"/>. The former proposing to enhance the DHCP system using registered user login and password before actually providing an IP address lease and recording the MAC address of the device the user used to sign-in. The latter, couples the RADIUS authentication protocol (<xref target="RFC2865"/>) with DHCP, basically piggybacking RADIUS attributes in a DHCP sub-option, with the DHCP server contacting the RADIUS server to authenticate the user.</t>
</list></t>

</section>
</section>
<section anchor="semantic-extensions"><name>Semantic Extensions</name>

<section anchor="extended-address-semantics-examples"><name>Extended Address Semantics Examples</name>

<t><list style="symbols">
  <t>Semantic prefixes:
Newer approaches to IP anycast suggest the use of service identification in combination with a binding IP address model <xref target="WION19"/> as a way to allow for metric-based traffic steering decisions; approaches for Service Function Chaining (SFC) <xref target="RFC7665"/> utilize the Network Service Header (NSH) information and packet classification to determine the destination of the next service.</t>
</list></t>

<ul empty="true"><li>
  <t>Another example of the usage of different packet header extensions based on IP addressing is Segment Routing. In this case, the source chooses a path and encodes it in the packet header as an ordered list of segments. Segments are encoded using new Routing Extensions Header type, the Segment Routing Header (SRH), which contains the Segment List, similar to what is already specified in <xref target="RFC8200"/>, i.e., a list of segment ID (SID) that dictate the path to follow in the network. Such segment IDs are coded as 128 bit IPv6 addresses <xref target="RFC8986"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Approaches such as <xref target="CAROFIGLIO19"/> utilize semantic prefixing to allow for ICN forwarding behavior within an IPv6 network. In this case, an HICN name is the hierarchical concatenation of a name prefix and a name suffix, in which the name prefix is encoded as an IPv6 128 bits word and carried in IPv6 header fields, while the name suffix is encoded in transport headers fields such as TCP. However, it is a challenge to determine which IPv6 prefixes should be used as name prefixes. In order to know which IPv6 packets should be interpreted based on an ICN semantic, it is desirable to be able to recognize that an IPv6 prefix is a name prefix, e.g. to define a specific address family (AF_HICN, b0001::/16). This establishment of a specific address family allows the management and control plane to locally configure HICN prefixes and announce them to neighbors for interconnection.</t>
</li></ul>

<t><list style="symbols">
  <t>Separate device from locator identifier:
EIBP <xref target="SHENOY21"/> separates the routing locator from the device identifier, relaxing therefore any semantic constraints on the device identifier. Similarly, LISP uses a flexible encoding named LISP Canonical Address Format (LCAF <xref target="RFC8061"/>), which allows to associate to routing locators any possible form (and length) of identifier. ILNP <xref target="RFC6740"/> introduces as well a different semantic of IP addresses, while aligning to the IPv6 address format (128 bits). Basically, ILNP introduces a sharper logical separation between the 64 most significant bits and the 64 least significant bits of an IPv6 address. The former being a global locator, while the latter being an identifier that can have different semantics (rather than just being an interface identifier).</t>
  <t>Structured addressing:
Network topology captures the physical connectivity among devices in the network. There is a structure associated with the topology. Examples are the core-distribution-access router structure commonly used in enterprise networks and clos topologies that are used to provide multiple connections between Top of Rack (ToR) devices and multiple layers of spine devices. Internet service providers use a tier structure that defines their business relationships. A clear structure of connected networks can be noticed in the Internet. EIBP <xref target="SHENOY21"/> proposes to leverage the physical structure (or a virtual structure overlaid on the physical structure) to auto assign addresses to  routers in a network or networks in an internetwork to capture their relative position in the physical/virtual topology. EIBP proposes to administratively identify routers/networks  with a tier value based on the structure.</t>
  <t>Localized forwarding semantics:
Approaches such as those outlined in <xref target="REED16"/> suggest using a novel forwarding semantic based on path information carried in the packet itself, said path information consists in a fixed size bit-field (see <xref target="REED16"/> for more information on how to represent the path information in said bit-field). In order to utilize existing, e.g., SDN-based, forwarding switches, the direct use of the IPv6 source/destination address is suggested for building appropriate match-action rules (over the suitable binary information representing the local output ports), while preserving the original IPv6 information in the encapsulated packet. As mentioned above, such use of the existing IPv6 address fields limits the size of the network to a maximum of 256 bits (therefore paths in the network over which such packets can be forwarded). <xref target="I-D.trossen-icnrg-internet-icn-5glan"/>, however, goes a step further by suggesting to use the local forwarding as direct network layer mechanism, removing the IP packet and only leaving the transport/application layer, with the path identifier constituting the network-level identifier albeit limited by using the existing IP header for backward compatibility reasons (the next section outlines the removal of this limitation).</t>
</list></t>

</section>
<section anchor="existing-or-extended-header-semantics-examples"><name>Existing or Extended Header Semantics Examples</name>

<t><list style="symbols">
  <t>In-Header extensions:
In order to allow additional semantic with respect to the pure Internet addressing, the original design of IPv4 included the field 'Type of Service' <xref target="RFC2474"/>, while IPv6 introduced the 'Flow label' and the 'Traffic Class' <xref target="RFC8200"/> fields. In a certain way, those fields can be considered 'semantic extensions' of IP addresses, and they are 'in-header' because natively present in the IP header (differently from options and extension headers). However, they proved not to be sufficient. Very often a variety of network operations are performed on the well-known 5-tuple (source and destination addresses; source and destination port number; and protocol number). In some contexts all of the above-mentioned fields are used in order to have a very fine grained solution (<xref target="RFC8939"/>).</t>
  <t>Headers option extensions:
Header options have been largely under-exploited in IPv4. However, the introduction of the more efficient extension header model in IPv6 along with technology progress made the use of header extensions more widespread in IPv6. Segment Routing re-introduced the possibility to add path semantic to the packet by encoding a loosely defined source routing (<xref target="RFC8402"/>). Similarly, in the aim to overcome the inherent shortcoming of the multi-homing in the IP context, SHIM6 (<xref target="RFC5533"/>) also proposed the use of an extension header able to carry multi-homing information which cannot be accommodated natively in the IPv6 header.</t>
</list></t>

<ul empty="true"><li>
  <t>To serve a moving endpoint, mechanisms like Mobile IPv6 <xref target="RFC6275"/> are used for maintaining connection continuity by a dedicated IPv6 extension header. In such case, the IP address of the home agent in Mobile IPv6 is basically an identification of the on-going communication. In order to go beyond the interface identification model of IP, the Host Identity Protocol (HIP) tries to introduce an identification layer to provide (as the name says) host identification. The architecture here relies on the use of another type of extension header <xref target="RFC7401"/>.</t>
</li></ul>

<t><list style="symbols">
  <t>Re-encapsulation extension:
Differently from the previous approach, re-encapsulation prepends complete new IP headers to the original packet introducing a completely custom shim header between the outer and inner header. This is the case for LISP, adding a LISP specific header right after an IP+UDP header (<xref target="RFC9300"/>). A similar design is used by VxLAN (<xref target="RFC7348"/>) and GENEVE (<xref target="RFC8926"/>), even if they are designed for a data center context. IP packets can also be wrapped with headers using more generic and semantically rich names, for instance with ICN <xref target="I-D.trossen-icnrg-internet-icn-5glan"/>.</t>
  <t>Structured addressing:
Solutions such as those described in the previous sub-section, e.g., EIBP <xref target="SHENOY21"/>, can provide structured addresses that are not limited to the IPv6 address length but instead carry the information in an extension header to remove such limitation.</t>
</list></t>

<ul empty="true"><li>
  <t>Also, Information-Centric Networking (ICN) naming approaches usually introduce structures in the (information) names without limiting themselves to the IP address length; more so, ICN proposes its own header format and therefore radically breaks with not only IP addressing semantic but the format of the packet header overall. For this, approaches such as those described in <xref target="RFC8609"/> define a TLV-based binary application component structure that is carried as a 'name' part of the CCN messages. Such a name is a hierarchical structure for identifying and locating a data object, which contains a sequence of name components. Names are coded based on 2-level nested Type-Length-Value (TLV) encodings, where the name-type field in the outer TLV indicates this is a name, while the inner TLVs are name components including a generic name component, an implicit SHA-256 digest component and a SHA-256 digest of Interest parameters. For textual representation, URIs are normally used to represent names, as defined in <xref target="RFC3986"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>In geographic addressing, position based routing protocols use the geographic location of nodes as their addresses, and packets are forwarded when possible in a greedy manner towards the destination. For this purpose, the packet header includes a field coding the geographic coordinates (x, y, z) of the destination node, as defined in <xref target="RFC2009"/>. Some proposals also rely on extra fields in the packet header to code the distance towards the destination, in which case only the geographic coordinates of neighbors are exchanged. This way the location of the destination is protected even if routing packets are eavesdropped.</t>
</li></ul>

<t><list style="symbols">
  <t>Localized forwarding semantics:
Unlike the original suggestion in <xref target="REED16"/> to use existing SDN switches, the proliferation of P4 <xref target="BOSSHART14"/> opens up the possibility to utilize a locally limited address semantic, e.g., expressed through the path identifier, as an entirely new header (including its new address) with an encapsulation of the IP packet for E2E delivery (including further delivery outside the localized forwarding network) or positioning the limited address semantic directly as the network address semantic for the packet, i.e., removing any IP packet encapsulation from the forwarded packet, as done in <xref target="I-D.trossen-icnrg-internet-icn-5glan"/>. Removing the IPv6 address size limitation by not utilizing the existing IP header for the forwarding decision also allows for extensible length approaches for building the path identifier with the potential for increasing the supported network size. On the downside, this approach requires to encapsulate the original IP packet header for communication beyond the local domain in which the new header is being used, such as discussed in the previous point above on 're-encapsulation extension'.</t>
</list></t>

</section>
</section>
</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </contact>
    <contact initials="P." surname="Mendes" fullname="Paulo Mendes">
      <organization abbrev="Airbus">Airbus</organization>
      <address>
        <postal>
          <street>Willy-Messerschmitt Strasse 1</street>
          <city>Munich</city>
          <code>81663</code>
          <country>Germany</country>
        </postal>
        <email>paulo.mendes@airbus.com</email>
      </address>
    </contact>
    <contact initials="N." surname="Shenoy" fullname="Nirmala Shenoy">
      <organization abbrev="R.I.T.">Rochester Institute of Technology</organization>
      <address>
        <postal>
          <street></street>
          <city>New-York</city>
          <code>14623</code>
          <country>USA</country>
        </postal>
        <email>nxsvks@rit.edu</email>
      </address>
    </contact>
    <contact initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization abbrev="IMT-Atlantique">IMT-Atlantique</organization>
      <address>
        <postal>
          <pobox>2 rue de la Chataigneraie</pobox>
          <street>CS 17607</street>
          <city>Cesson-Sevigne Cedex</city>
          <code>35576</code>
          <country>France</country>
        </postal>
        <email>laurent.toutain@imt-atlantique.fr</email>
      </address>
    </contact>
    <contact initials="A. Y." surname="Chen" fullname="Abraham Y. Chen">
      <organization abbrev="Avinta">Avinta Communications, Inc.</organization>
      <address>
        <postal>
          <street>142 N. Milpitas Blvd.</street>
          <city>Milpitas, CA</city>
          <code>95035-4401</code>
          <country>USA</country>
        </postal>
        <email>AYChen@Avinta.com</email>
      </address>
    </contact>
    <contact initials="D." surname="Farinacci" fullname="Dino Farinacci">
      <organization abbrev="lispers.net">lispers.net</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>farinacci@gmail.com</email>
      </address>
    </contact>
    <contact initials="J." surname="Finkhaeuser" fullname="Jens Finkhaeuser">
      <organization abbrev="AnyWi">AnyWi Technologies B.V.</organization>
      <address>
        <postal>
          <street>3e Binnenvestgracht 23H</street>
          <city>Leiden</city>
          <code>2312 NR</code>
          <country>NLD</country>
        </postal>
        <email>jens.finkhaeuser@anywi.com</email>
      </address>
    </contact>
    <contact initials="P." surname="Liu" fullname="Peng Liu">
      <organization abbrev="China Mobile">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Ave</street>
          <city>Xicheng, Beijing</city>
          <code>100053</code>
          <country>P.R. China</country>
        </postal>
        <email>liupengyjy@chinamobile.com</email>
      </address>
    </contact>
    <contact initials="Y." surname="Jia" fullname="Yihao Jia">
      <organization></organization>
      <address>
        <email>yhjia03@gmail.com</email>
      </address>
    </contact>
    <contact initials="D." surname="Eastlake 3rd" fullname="Donald E. Eastlake 3rd">
      <organization abbrev="Futurewei">Futurewei Technologies</organization>
      <address>
        <postal>
          <street>2386 Panoramic Circle</street>
          <city>Apopka, FL</city>
          <code>32703</code>
          <country>United States of America</country>
        </postal>
        <email>d3e3e3@gmail.com</email>
      </address>
    </contact>
    </section>

  </back>


</rfc>

