<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-jia-intarea-scenarios-problems-addressing-00" category="info">

  <front>
    <title abbrev="Scenarios and Problems in Addressing">Challenging Scenarios and Problems in Internet Addressing</title>

    <author initials="Y." surname="Jia" fullname="Yihao Jia">
      <organization abbrev="Huawei">Huawei Technologies Co., Ltd</organization>
      <address>
        <postal>
          <street>156 Beiqing Rd.</street>
          <city>Beijing</city>
          <code>100095</code>
          <country>P.R. China</country>
        </postal>
        <email>jiayihao@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake 3rd" fullname="Donald E. Eastlake 3rd">
      <organization abbrev="Futurewei">Futurewei Technologies</organization>
      <address>
        <postal>
          <street>2386 Panoramic Circle</street>
          <city>Apopka, FL</city>
          <code>32703</code>
          <country>United States of America</country>
        </postal>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization abbrev="China Mobile">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Ave</street>
          <city>Xicheng, Beijing</city>
          <code>100053</code>
          <country>P.R. China</country>
        </postal>
        <email>liupengyjy@chinamobile.com</email>
      </address>
    </author>

    <date />

    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<!-- 
NOTES: keep title since it is fitting [DONE]
NOTES: replace any wording that suggests a solution, like 'flexible addressing' or the last sentences in each use case, with more 'capability' type of language. [DONE]
NOTES: replace all 'use cases' with 'scenarios' [DONE]
AP Dirk: Do the above
-->

<t>The Internet Protocol (IP) has been the major technological success in information technology of the last half century. As Internet become pervasive, IP start replacing communication technology for domain-specific solutions. However, domains with specific requirements as well as communication behaviors and semantics still exists and represent what <xref target="RFC8799"/> recognizes as “limited domains”. When communicating within limited domains, the address semantic and format may differ with respect to the IP address one. As such, there is a need to adapt the domain-specific addressing to the Internet addressing paradigm. In certain scenarios, such adaptation may raise challenges.</t>

<t>This document describes well-recognized scenarios that showcase possibly different addressing requirements which are challenging to be accommodated in the IP addressing model. These scenarios highlight issues related to the Internet addressing model and call for starting a discussion on a way to re-think/evolve the addressing model so to better accommodate different domain-specific requirements.</t>



    </abstract>


  </front>

  <middle>


<section anchor="SEC:intro" title="Introduction">

<!-- Yihao: Some check points to confirm
- Position: problematic scenarios for IP adaption/dressing?
- avoiding: terms directly/indirectly related to "flexible", e.g., flexible address structure, flexible addressing.
- better to have a clear text about the relationship of "limited domain" and "scenarios" (like these scenarios can usually be categoried as limited domains)
AP Dirk: look again [the second paragraph below links limited domain to scenarios and the exhibited requirements and behaviours defined through them]
-->

<t>The Internet Protocol (IP), positioned as the unified protocol at the (Internet) network layer, is seen by many as key to the innovation stemming from Internet-based applications and services. Even more so, with the success of TCP/IP protocol stack, IP has been gradually replacing existing domain-specific protocols, evolving into the core protocol of the entire communication system. At its inception roughly 40 years ago <xref target="RFC0791"/>, the Internet’s addressing system, represented in the form of the IP address and its locator-based semantics, has brought the notion of a ‘common addressing for all communication’. Compared to proprietary technology-specific solutions, such ‘common addressing for all communication’ advance ensures end-to-end communication from any device connected to the Internet to another.</t>

<t>However, scenarios, associated service, node behaviors, and requirements on packet delivery have since been significantly extended, with Internet technologies being developed to accommodate them in the framework of addressing that stood at the beginning of the Internet’s development. This evolution is reflected in the concept of the “Limited domain”, first introduced in <xref target="RFC8799"/>. It refers to a single physical network, attached to or running in parallel with the Internet, or is defined by set of users and nodes distributed over a much wider area, but drawn together by a single virtual network over the Internet. Key to a limited domain is that requirements, behaviors, and semantics could be noticeable local and, more importantly, specific to the limited domain. Very often, the realization of a limited domain is defined by specific communication scenario(s) that exhibit the domain-specific behaviors and pose the requirements that lead to the establishment of the limited domain.</t>

<t>One key architectural aspect, when communicating within limited domains, is that of addressing and, therefore, the address structure, as well as the semantic that is being used for the routing of packets. The topological location centrality of IP is fundamental when reconciling the often differing semantics for ‘addressing’ that can be found in those limited domains. The result of this fundamental role of the single IP addressing is that limited domains have to adopt specific solutions, e.g., translating/mapping/converting concepts, semantics, and ultimately, domain-specific addressing, into the common IP addressing used across limited domains.</t>

<t>This document advocates the flexibility in addressing in order to accommodate limited domain specific semantics, while, if possible, ensuring a single holistic addressing scheme able to reduce, or even entirely remove, the need for aligning the address semantics of different limited domains, such as the current topological location semantic of the Internet. Ultimately, such holistic addressing could be beneficial to those communication scenarios realized within limited domains by improving efficiency, removing of constraints imposed by needing to utilize the limited semantics of IP addressing, and/or in other ways.</t>

<t>In other words, this document revolves around the following question:</t>

<t><list style='empty'>
  <t>“Should limited domains purely rely on IP addresses and therefore deal with the complexity of translating any semantic mismatch themselves, or should flexibility for supporting those limited domains be a key focus for an evolved Internet addressing?”</t>
</list></t>

<t>To that end, this document describes well-recognized scenarios in limited domains that could benefit from a greater flexibility in addressing and analyses problems encountered throughout these scenarios due to the lack of that flexibility. The purpose of this draft is thus to stimulate discussion on the emerging needs for addressing at large with the possibility to fundamentally re-think the addressing in the Internet beyond the current objectives of IPv6.</t>

<!-- LUIGI: Tentative paragraph to related to the RRG effort == PLEASE REVIEW == -->
<t>It is important to remark that any change in the addressing, hence at the data plane level, leads to changes and challenges on the control plane level, i.e., routing. The latter is an even harder problem than just addressing and might need more research efforts that are beyond the objective of this document, which focuses solely on the data plane.</t>

<!-- BACKUP

# Conventional Terminology {#SEC:term}
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here.

-->

</section>
<section anchor="SEC:cases" title="Communication Scenarios in Limited Domains">

<t>The following sub-section outlines a number of scenarios, all of which belong to the concept of “limited domains” <xref target="RFC8799"/>. While a list of scenarios may be long, this document focuses on scenarios with a number of aspects that we observe in those limited domains, captured in the sub-section titles. For each scenarios, we point at possible challenges, which we will pick upon in <xref target="SEC:problem"/> when describing more formally the issues existing in current Internet addressing.</t>

<section anchor="SEC:constrained" title="Communication in Constrained Environments">

<t>In a number of communication scenarios, such as those encountered in the Internet of Things (IoT),
a simple, low-cost communication network is required, and there are limitations for network devices in computational power, memory, and energy availability.
In addition to IEEE 802.15.4, i.e., Low-Rate Wireless Personal Area Network <xref target="LR-WPAN"/>, several limited domains exists through utilizing link layer technologies such as Bluetooth Low Energy (BLE) <xref target="BLE"/>, Digital European Cordless Telecommunications (DECT) - Ultra Low Energy (ULE) <xref target="DECT-ULE"/>, Master-Slave/Token-Passing (MS/TP) <xref target="BACnet"/>, Near-Field-Communication (NFC) <xref target="ECMA-340"/>, and Power Line Communication (PLC) <xref target="IEEE_1901.1"/>.
Generally, a group of IoT network devices form a constrained node network at the edge, and IoT terminals connect to these network devices for data transmission.
This type of networks and IoT devices in the network require as little computational power as possible, smaller memory requirements, better energy availability to reduce the total cost of ownership of the network.
Furthermore, in the context of industrial IoT, real-time requirements and scalability make IP technology not naturally suitable as communication technology (<xref target="OCADO"/>).</t>

<t>The end-to-end principle (detailed in <xref target="RFC2775"/>) requires Internet protocols (e.g., IPv6 <xref target="RFC8200"/>) to run on such constrained node networks, allowing IoT devices using multiple communication technologies to talk on the Internet.
Often, devices located on the edge of constrained networks act as gateway devices, usually performing header compression (<xref target="RFC4919"/>).
To ensure security and reliability, multiple gateways must be deployed. IoT devices on the network can easily select one of gateways for traffic passthrough by the devices on the (limited domain) network.</t>

<t>Given the constraints imposed on the computational and possibly also communication technology, the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., IPv6 address, may pose a challenge when operating such networks.</t>

<!-- NOTES: Dirk
Can we add any references here that evaluated those overheads? [Yihao] the overhead of what?
-> do this in the gap analysis?

Yihao: I find 2 paper below that might help.
1. Margi C B, Simplicio Jr M A, Näslund M, et al. Impact of operating systems on wireless sensor networks (security) applications and testbeds[C]//2010 Proceedings of 19th International Conference on Computer Communications and Networks. IEEE, 2010: 1-6.
2. Mesrinejad F, Hashim F, Noordin N K, et al. The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN)[C]//The 17th Asia Pacific Conference on Communications. IEEE, 2011: 845-849.
Luigi: may be consider:
- Abdelfadeel KQ, Cionca V, Pesch D. Lschc: Layered static context header compression for lpwans. InProceedings of the 12th Workshop on Challenged Networks 2017 Oct 20 (pp. 13-18).
- Tömösközi M, Seeling P, Ekler P, Fitzek FH. Performance evaluation and implementation of IP and robust header compression schemes for TCP and UDP traffic in static and dynamic wireless contexts. Computer Science and Information Systems. 2017;14(2):283-308.
-->

<t>Greater flexibility in Internet addressing may avoid complex and energy hungry operations, like header compression and fragmentation, necessary to translate protocol headers from one limited domain to another.</t>

</section>
<section anchor="SEC:dynamic" title="Communication within Dynamically Changing Topologies">

<t>Communication may occur over networks that exhibit dynamically changing topologies. One such example is that of satellite networks, providing global Internet connections through a combination of inter-satellite and ground station communication.
With the convergence of space-based and terrestrial networks, users can experience seamless broadband access, e.g., on cruise ships, flights, and within cars, often complemented by and seamlessly switching between Wi-Fi, cellular, or satellite based networks at any time.
The satellite network service provider will plan the transmission path of user traffic based on the network coverage, satellite orbit, route, and link load, providing potentially high-quality Internet connections for users in areas that are not, or hard to be, covered by terrestrial networks. The involved topologies of the satellite network will be changing constantly while observing a regular flight pattern in relation to other satellite and predictable overflight patterns to ground users.</t>

<t>Another example is that of vehicular communication, where services may be accessed across vehicles, such as self-driving cars, for the purpose of collaborative objection recognition (e.g., for collision avoidance), road status conveyance (e.g., for pre-warning of road-ahead conditions) and other purposes. Communication may include RoadSide Units (RSU) with the possibility to create ephemeral connections to those RSUs for the purpose of workload offloading, joint computation over multiple (vehicular) inputs and other purposes <xref target="I-D.ietf-lisp-nexagon"/>. Communication here may exhibit a multi-hop nature, not just involving the vehicle and the RSU over a direct link. Those topologies are naturally changing constantly due to the dynamic nature of the involved communication nodes.</t>

<t>In both network technologies, there is a significant difference between the high dynamics of the underlying network topologies, compared to the relative static nature of terrestrial network topology, as reported in <xref target="HANDLEY"/>. As a consequence, the notion of a topological network location becomes restrictive in the sense that not only the relation between network nodes and user endpoint may change, but also the relation between the nodes that form the network itself. This may lead to the challenge of maintaining and updating the topological addresses in this constantly changing network topology.</t>

<t>In attempts to utilize entirely different semantics for the addressing itself, geographic-based routing, such as in <xref target="CARTISEAN"/>, has been proposed for MANETs (mobile ad-hoc networks) through providing geographic coordinates based addresses to achieve better routing performance, lower overhead, and lower latency <xref target="MANET1"/>.</t>

<t>Flexibility in Internet addressing here would allow for accommodating such geographic address semantics into the overall Internet addressing.</t>

</section>
<section anchor="SEC:mobility" title="Communication among Moving Endpoints">

<!-- Luigi:
This Section was initially suggested to be between steering ans security, however, becasue the topic is close to :changing topology" I put it here. Not sure whether or not we should actually merge it to the previous.
Even more, because this section refers to protocols presented in other sections we might consider putting both section after the alternative forwarding section. 
-->

<!-- Yihao:
As for the name of the subsection, "Communication among Moving Endpoints" and "Communication within Dynamically Changing Topologies" have some overlap. Moving endpoint can lead to Dynamically Changing Topologies (like mobile phone), and Dynamically Changing Topologies can also refer to moving endpoint (like moving vehicles). 

How about:

2.3 Communication within Dynamically Changing Topologies

2.3.1 Communication among Moving Endpoints

2.3.2 Communication within Moving backbone

2.3.3 Communication within Moving Mesh-networking

NOTE: Point taken and need to think how to structure better but to be done in future version
NOTE: let's leave the structure for now and possibly discuss changes if mailing list discussions suggest doing so, also allowing for engaging with the list on how to do those changes

-->

<t>When packet switching was first introduced, back in the 60s/70s, it was intended to replace the rigid circuit switching with a communication infrastructure that was more resilient to failures. As such, the design never really considered communication endpoints as mobile. Even in the pioneering ALOHA <xref target="ALOHA"/> system, despite considering wireless and satellite links, the network was considered static (with the exception of failures and satellites, which fall in what is discussed in <xref target="SEC:dynamic"/>). Ever since, a lot of efforts have been devoted to overcome such limitations once that it became clear that endpoint mobility will become a main (if not THE main) characteristic of ubiquitous communication systems.</t>

<t>The IETF has for a long time worked on solutions that would allow extending the IP layer with mobility support. Because of the topological semantic of IP addresses, endpoints need to change addresses each time they visit a different network. However, because routing and endpoint identification is also IP address based, this leads to a communication disruption.</t>

<t>To cope with such a situation, anchor-based Mobile IP mechanisms have been introduced (<xref target="RFC5177"/>, <xref target="RFC6626"/> <xref target="RFC5944"/>, <xref target="RFC5275"/>). Mobile IP is based on a relatively complex and heavy mechanism that makes it hard to deploy and not very efficient. Furthermore, it is even less suitable than native IP in constrained environments like the ones discussed in <xref target="SEC:constrained"/>.</t>

<t>Alternative approaches to Mobile IP often leverage the introduction of some form of overlay. LISP <xref target="I-D.ietf-lisp-introduction"/>, by separating the topological semantic from the identification semantic of IP addresses, is able to cope with endpoint mobility by dynamically mapping endpoint identifiers with routing locators <xref target="I-D.ietf-lisp-mn"/>. This comes at the price of an overlay that needs its own additional control plane <xref target="I-D.ietf-lisp-rfc6833bis"/>. Similarly, the NVO3 (Network Virtualization Overlays) Working Group, while focusing on Data Center Environments, also explored an overlay-based solution for multi-tenancy purposes, but also resilient to mobility since relocating Virtual Machines (VMs) is common practice. NVO3 considered for a long time several data planes that implement slightly different flavors of overlays (<xref target="RFC8926"/>, <xref target="RFC7348"/>, <xref target="I-D.ietf-intarea-gue"/>), but lack of an efficient control-plane specifically tailored for DCs.</t>

<t>Alternative mobility architectures have also been proposed in order to cope with endpoint mobility outside the IP layer itself. The Host Identity Protocol (HIP) <xref target="RFC7401"/> introduced a new namespace in order to identify endpoints, namely the Host Identity (HI), while leveraging the IP layer for topological location. On the one hand, such an approach needs to revise the way applications interact with the network layer, by modifying the DNS (now returning an HI instead of an IP address) and applications to use the HIP socket extension. On the other hand, early adopters do not necessarily gain any benefit unless all communicating endpoints upgrade to use HIP.  In spite of this, such a solution may work in the context of a limited domain.</t>

<t>Another alternative approach is adopted by Information-Centric Networking (ICN) <xref target="RFC7476"/>. By making content a first class citizen of the communication architecture, the “what” rather than the “where” becomes the real focus of the communication. However, as explained in the next sub-section, ICN can run either over the IP layer or completely replace it, which in turn can be seen as running the Internet and ICN as logically completely separated limited domains.</t>

<t>Sometimes, the transport layer gets involved in mobility solutions, either by introducing explicit in-band signaling to allow for communicating IP address changes (e.g., in SCTP <xref target="RFC5061"/> and MPTCP <xref target="RFC6182"/>), or by introducing some form of connection ID that allows for identifying a communication independently from IP addresses (e.g., the connection ID used in QUIC <xref target="QUIC"/>).</t>

<t>Greater flexibility in addressing may help in dealing with mobility more efficienctly, e.g., through an augmented semantic that may fufill the mobility requirements <xref target="RFC7429"/>.</t>

</section>
<section anchor="SEC:service" title="Communication Across Services">

<t>As a communication infrastructure spanning many facets of life, the Internet integrates services and resources from various aspects such as remote collaboration, shopping, content production as well as delivery, education and many more. Accessing those services and resources directly through URIs has been proposed by methods such as those defined in ICN <xref target="RFC7476"/>, where providers of services and resources can advertise those through unified identifiers without additional planning of identifiers and locations for underlying data and their replicas. Users can access required services and resources by virtue of using the URI-based identification, with an ephemeral relationship built between user and provider, while the building of such relationship may be constrained with user- as well as service-specific requirements, such as proximity (finding nearest provider), load (finding fastest provider), and others.</t>

<t>While systems like ICN <xref target="CCN"/> provide an alternative to the locator-based addressing of IP, its deployment requires an overlay (over IP) or native deployment (alongside IP), the latter with dedicated gateways needed for translation. Underlay deployments are also envisioned in <xref target="RFC8763"/>, where ICN solutions are being used to facilitate communication between IP addressed network endpoints or URI-based service endpoints, still requiring gateway solutions for interconnection with ICN-based networks as well as IP routing based networks (cf., <xref target="ICN5G"/><xref target="ICNIP"/>).</t>

<t>Although various approaches to combining service and location-based addressing have been devised, the key challenge here is to facilitate a “natural”, i.e., direct communication, without the need for gateways above the network layer.</t>

<!-- Yihao:
specifically for the SFC part, there is a strong overlap between "Communication Across Services" and "Steering Communication Traffic". have a better storyline for it? 
For me, ICN related works imply an Alternative Forwarding Architectures. How about we move ICN to the last sub-section and merge "Communication Across Services" and "Steering Communication Traffic" into one sub-section?
(not sure about the postion of dyncast, is it more close to ICN?)

like:

2.4 Communication under traffic control

2.4.1 Communication with traffic permission
vlan...vxlan...

2.4.2 Communication with traffic navigation
SFC...MPLS...SRv6

-->

<t>Another aspect of communication across services is that of chaining individual services to a larger service. Here, an identifier could be used that serves as a link to next hop destination within the chain of individual services, as done in the work on Service Function Chaining (SFC). With this, services are identified at the level of Layer 2/3 (<xref target="RFC7665"/>, <xref target="RFC8754"/>, <xref target="RFC8595"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677"/> although the service chain identification is carried as an NSH header (<xref target="RFC7665"/> separate to the packet identifiers. The forwarding with the chain of services utilizes individual locator-based IP addressing (for L3 chaining) to communicate the chained operations from one Service Function Forwarder <xref target="RFC7665"/> to another, leading to concerns regarding overhead incurred through the stacking of those chained identifiers in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>

<t>Greater flexibility in addressing may allow for incorporating different information, e.g., service as well as chaining semantics, into the overall Internet addressing.</t>

</section>
<section anchor="SEC:steering" title="Steering Communication Traffic">

<t>Steering traffic within a communication scenario may involve at least two aspects, namely (i) limiting certain traffic towards a certain set of communication nodes and (ii) constraining the sending of packets towards a given destination (or a chain of destinations) with metrics that would allow the selection among one or more possible destinations.</t>

<t>One possibility for limiting traffic inside limited domains, towards specific objects, e.g., devices, users, or group of them, is subnet partition with techniques such as VLAN <xref target="RFC5517"/>, VxLAN <xref target="RFC7348"/>, or more evolved solution like Terastream <xref target="TERASTREAM"/> realizing such partitioning. Such mechanisms usually involve quite some configuration, and even small changes in network and user nodes could result in a repartition and possibly even more configuration efforts. Another key aspect is the complete lack of correlation of the topological address and any likely more semantic-rich identification that could be used to make policy decision regarding traffic steering. Suitably enriching the semantics of the packet address, either that of the sender or receiver, so that such decision could be made while minimizing the involvement of higher layer mechanisms, is a crucial challenge for improving on network operations and speed of such limited domain traffic.</t>

<t>When making decisions to select one out of a set of possible destinations for a packet, IP anycast semantics can be applied albeit being limited to the locator semantic of the IP address itself. Recent work in <xref target="DYNCAST"/> suggests utilizing the notion of IP anycast address to encode a “service identifier”, which is dynamically mapped onto network locations where service instances fulfilling the service request may be located.
Scenarios where this capability may be utilized are provided in <xref target="DYNCAST"/> and include, but are not limited to, scenarios such as edge-assisted VR/AR, transportation and digital twins.</t>

<t>The challenge here lies in the possible encoding of not only the service information itself but the constraint information that helps the selection of the “best” service instance and which is likely a service-specific constraint in relation to the particular scenario. The notion of an address here is a conditional (on those constraints) one where this conditional part is an essential aspect of the forwarding action to be taken. It needs therefore consideration in the definition of what an address is, what is its semantic, and how the address structure ought to look like.</t>

<t>As outlined in the previous sub-section, chaining services are another aspect of steering traffic along a chain of constituent services, where the chain is identified through either a stack of individual identifiers, such as in Segment Routing <xref target="RFC8402"/>, or as an identifier that serves as a link to next hop destination within the chain, such as in Service Function Chaining (SFC). The latter can be applied to services identified at the level of Layer 2/3 (<xref target="RFC7665"/>, <xref target="RFC8754"/>, <xref target="RFC8595"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677"/>. However, the overhead incurred through the stacking of those chained identifiers is a concern in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>

<!-- NOTES: Dirk
What other references?
AP: add references also here but discuss gap later (ALL)
-->

<!-- NOTES: Yihao
Shall we spilt this sub-section into two: 1. Communication with traffic permission; 2. Communication with traffic navigation
Dirk: not sure that dividing into explicit sub-section helps. It is steering, one guided by permission and the other by chaining objectives (the latter has a linkage to the previous sub-section on comms across services). Also, the suggested second item is merely another expression for traffic steering (since navigation is close/similar to steering)

NOTE: see above about changes
-->

<t>Flexibity in addressing may enable more semantic rich encoding schemes that may help in steering traffic at hardware level and speed, without complex mechanisms usually resulting in handling packets in the slow path of routers.</t>

</section>
<section anchor="SEC:builtin-sec" title="Communication with built-in security">

<t>Today, strong security and privacy in the Internet is usually implemented as an overlay based on the concept of Mix Networks (<xref target="TOR"/>, <xref target="SPHINX"/>). Among the various reasons for such approach is the limited semantic of current IP addresses, which do not allow to natively express security features or trust relationship. Efforts like Cryptographically Generated Addresses (CGA) <xref target="RFC3972"/>, provide some security features by embedding a truncated public key in the last 57-bit of IPv6 address, thereby greatly enhancing authentication and security within an IP network via asymmetric cryptography and IPsec <xref target="RFC4301"/>. The development of the Host Identity Protocol (HIP) <xref target="RFC7401"/> saw the introduction of cryptographic identifiers for the newly introduced Host Identity (HI) to allow for enhanced accountability, and therefore trust. The use of those HIs, however, is limited by the size of IPv6 128bit addresses.</t>

<t>Through a greater flexibility in addressing, any security-related key, certificate, or identifier could instead be included in a suitable address structure without any information loss (i.e., as-is, without any truncation or operation as such), avoiding therefore compromises such as those in HIP. Instead, CGAs could be created using full length certificates, or being able to support larger HIP addresses in a limited domain that use it.</t>

<t>Greater flexibility in addressing semantic could significantly help in constructing a trusted and secure communication at the network layer. This could lead to connections that could be considered as absolute secure (assuming the cryptography involved is secure). Even more, anti-abuse mechanisms and/or DDoS protection mechanisms like the one under discussion in PEARG (<xref target="PEARG"/>) Research Group may leverage a greater flexibility of the overall Internet addressing, if provided, in order to be more effective.</t>

</section>
<section anchor="SEC:nin" title="Communication in Alternative Forwarding Architectures">

<!-- Yihao: 

Now if our position is only pointing out the problem of the current Internet addressing, is it really apporiate to say the current internet have problem when apply it in an Alternative Forwarding Architectures?

how about we use name: Communication for flow-level optimization

-->

<!-- Yihao:

I feel that the way we narrate this sub-section is somehow weird.
As this section is talk about use cases/requirement from the real world, like constrained devices, security, traffic steering... However, an Alternative Forwarding Architectures look like requirement from another dimension. For me, Alternative Forwarding Architectures is more like requirement from technical aspect, not the real world. Since user in real world never care about the forwarding architecture, and it's not the use case from users' perspective.

On the other hand, flexible addressing itself could imply the Alternative Forwarding Architectures. For example, "Communication Across Services" should already imply an Alternative Forwarding Architectures.

I suggest that we use the real use cases for these Alternative Forwarding Architectures as we describe here, like video, Deterministic QoS, and what works better under flow-based or path-based stream (instead of packet-based).

Besides, Sheng Jiang is worrying about NIN, and the way we mention NIN.
Maybe it is better to talk the "use case" of NIN, instead of Alternative Forwarding Architectures like NIN. Thus we could totally avoid mentioning NIN.

-->

<!-- Dirk: I suggest keeping the 'alternative forwarding architecture'. In the other sections, we address the 'aspect' of communication, e.g., changing topology, mobility, ..., not the use cases either. The use case for the sat aspect in 'changing topologies' is plain Internet access, so not particularly 'out there'. Further, the introduction of SDN was not just, if at all, motivated by better handling of streaming scenarios; nor for NIN. Hence, I'd leave it as is. -->

<!-- AP: Dirk: start this sub-section with a clear goal motivating 'alternative forwarding architecture'. This could be the desired higher efficiency, e.g., for streaming scenarios [DOne: create the starting paragraph, also with reference to MPLS and its motivation to improve on traffic engineering]
AP: Luigi: review that new paragraph and link it to ETSI paragraph  [DONE minor changes]

-->

<t>The performance of communication networks has long been a focus for optimization due to the immediate impact on cost of ownership for communication service providers. Technologies like MPLS <xref target="RFC3031"/> have been introduced to optimize lower layer communication, e.g., by mapping L3 traffic into aggregated labels of forwarding traffic for the purposes of, e.g., traffic engineering.</t>

<t>Even further, other works have emerged in recent years that have replaced the notion of packets with other concepts for the same purpose of improved traffic engineering and therefore efficiency gains. One such area is that of Software Defined Networks (SDN) <xref target="RFC7426"/>, which has highlighted how a majority of Internet traffic is better identified by flows, rather than packets. Based on such observation, alternate forwarding architectures have been devised that are flow-based or path-based. With this approach, all data belonging to the same traffic stream is delivered over the same path, and traffic flows are identified by some connection or path identifier rather than by complete routing information, possibly enabling fast hardware based switching.</t>

<t>On the one hand, such a communication model may be more suitable to real-time traffic like that in the context of Deterministic Networks (<xref target="DETNET"/>), where indeed a lot of work has focused on how to “identify” packets belonging to the same DETNET flow in order to jointly manage the forwarding within the desired deterministic boundaries.</t>

<t>On the other hand, it may improve the communication efficiency in constrained wireless environments (cf., <xref target="SEC:constrained"/>), by reducing the overhead, hence increasing the number of useful bits per second per Hz. Also, the delivery of information across similar flows may be combined into a multipoint delivery of a single return flow, e.g., for scenarios of requests for a video chunk from many clients being responded to with a single (multi-destination) flow, as outlined in <xref target="BIER-MC"/> as an example. Another opportunity to improve communication efficiency is being pursued in ongoing IETF/IRTF work to deliver IP- or HTTP-level packets directly over path-based or flow-based transport network solutions, such as in <xref target="TROSSEN"/><xref target="BIER-MC"/><xref target="ICNIP"/><xref target="ICN5G"/> with the capability to bundle unicast forward communication streams flexibly together in return path multipoint relations. Such capability is particularly opportune in scenarios such as chunk-based video retrieval or distributed data storage. However, those solutions currently require gateways to “translate” the flow communication into the packet-level addressing semantic in the peering IP networks. Furthermore, the use of those alternative forwarding mechanisms often require the encapsulation of Internet addressing information, leading to wastage of bandwidth as well as processing resources.</t>

<!-- NOTES: Dirk: I reworded the paragraph here, particularly removing any linkage to TCP and IP but centring the work on the alternative forwarding architectures and the formation of a limited domain through this
Luigi: Looks OK for me.
-->

<t>Alternative way of forwarding data has also been the motivation for the efforts created in the European Telecommunication Standards Institute (ETSI), who formed a Industry Specification Group (ISG) named Non-IP Networking (NIN) <xref target="ETSI-NIN"/>. This group sets out to develop and standardize a set of protocols leveraging an alternative forwarding architecture, such as provided by a flow-based switching paradigm. The deployment of such protocols may be seen to form limited domains, still leaving the need to interoperate with the (packet-based forwarding) Internet; a situation possibly enabled through a greater flexibility of the addressing used across Internet-based and alternative limited domains alike.</t>

<!-- NOTES: Dirk
Make the addressing angle of NIN here clearer (Dirk, then Luigi to review)
DIRK: changed the NIN paragraph to position NIN solutions as limited domains with the need for flexible addressing for cross-domain comms.
DIRK: simplifed first paragraph since there was repetition in the next one (where the comms model was seen more suitable for real-time traffic)
-->

<t>A greater flexibility in addressing semantics may reduce the aforementioned wastage by accommodating Internet addressing in the light of such alternative forwarding architectures, instead enabling the direct use of the alternative forwarding information.</t>

</section>
</section>
<section anchor="SEC:problem" title="Issues in Addressing">
<!-- NOTES Dirk: I tried addressing the sub-section headings as something 'limiting' to some extent, given that it's the "problems" section -->

<!-- AP Dirk -->

<section anchor="SEC:pro:semantics" title="Limiting Alternative Address Semantics">

<t>Many approaches to changing the semantics of communication, e.g., through separating host identification from network node identification <xref target="RFC7401"/> or through identifying content and services directly <xref target="HICN"/>, are limited by the existing packet size and semantic constraints of IPv6, e.g., in the form of its source and destination network addresses.</t>

<t>While approaches such as <xref target="ICNIP"/> may override the addressing semantics, e.g., by replacing IPv6 source and destination information with path identification, a possible unawareness of endpoints still requires the carrying of other address information as part of the payload, as discussed in <xref target="SEC:pro:efficiency"/>.
Also, the expressible service or content semantic may be limited, as in <xref target="HICN"/> or the size of supported networks <xref target="REED"/> due to relying on the limited bit positions usable in IPv6 addresses.</t>

<!-- Move paragraph to secuirty section since it is more suitable -->
<!-- AP Luigi [DONE] -->

</section>
<section anchor="SEC:pro:security" title="Hampering Security">

<t>Fitting any new semantic into existing size constraints may hamper the original objectives for introducing the new semantics in the first place. For instance, host identifiers <xref target="RFC7401"/> or security information may be limited by the IPv6 address size, as discussed in <xref target="SEC:builtin-sec"/> with the example of CGA <xref target="RFC3972"/>. On the one hand, greater flexibility of addressing would allow to introduce fully featured security in endpoint identification, potentially able to eradicate the spoofing problem. On the other hand, it may be used to include application gateways’ certificates in order to provide more efficiency, e.g., using web certificates also used in the addressing of web services.</t>

<t>While increasing security, privacy protection can be improved. IP addresses, even temporary ones, have been long recognized as a “Personal Identification Information” that allows even to geolocating the communicating endpoints <xref target="RFC8280"/>. Greater flexibility in addressing may allow the use of cryptographically generated anonymous addresses when considered needed, and protect from geolocation by making such addresses topologically independent. Such property potentially allows implemetation of secure architetures like <xref target="TOR"/> and <xref target="SPHINX"/> at network layer, improving the overall efficiency as described in <xref target="SEC:pro:efficiency"/>.</t>

<t>Alternative addressing semantics may also help in (D)DoS mitigation. This can be achieved by changing the service identification model, making it completely orthogonal from network topology semantic. And by not exposing all of the topological information the attack exposes, the potential disruptions, may remain limited <xref target="ADDRLESS"/>. In this way, mounting such type of attack may become harder.</t>

<!-- AP Dirk -->

</section>
<section anchor="SEC:pro:traffic" title="Complicating Traffic Engineering">

<t>Efforts in traffic engineering have long shown that the IP address itself is not enough to steer traffic properly, seeing the introduction of differentiated service code points (DSCP), the use of header information of various kinds (such as ports) as flow information, and the entirely separate expression of path information, e.g., in the form of MPLS labels or through introducing bitposition-based path identifiers (cf., <xref target="BIER-MC"/>, <xref target="REED"/>). Newer approaches to IP anycast suggest the use of service identification in combination with a binding IP address model <xref target="DYNCAST"/> as a way to allow for metric-based traffic steering decisions; approaches for service function chaining <xref target="RFC7665"/> utilize the next service header (NSH) information and packet classification to determine the destination of the next packet hop.</t>

<t>Overall, when it comes to providing capabilities for traffic engineering, the IP address itself is not semantically rich enough to adequately describe the forwarding decision to be taken in the network, not only impacting WHERE the packet will need to go but also HOW it will need to be sent. Instead, various supplementary information needs to be taken into account for a successful delivery to take place.</t>

<!-- AP Luigi -->
<!-- NOTES Dirk: I suggest folding this under efficiency since this is mainly covered by 'introducing path stretch' -->
<!-- LUIGI: Agreed. I added some mobility-related sentences in the efficiency sub-sections -->
<!-- ## Supporting Mobility {#SEC:pro:mobility} -->

<!-- AP Yihao -->

</section>
<section anchor="SEC:pro:efficiency" title="Hampering Efficiency">

<section anchor="header-proportion" title="Header proportion">

<t>Although fiber and ethernet dominate the Internet infrastructure, numerous radio channels are expected to improve the wireless communication efficiency. As IPv6 header fixedly occupies 40 byte in a packet <xref target="RFC8200"/>, header compression techniques are introduced to shaping payload occupation within a packet. RObust Header Compression (ROHC) <xref target="RFC5795"/>, which customized for cellar network, is being widely adopted in radios like WCDMA, LTE, and 5G. Considering one base station is supposed to serve hundreds of user devices, maximizing the effectiveness for specific spectrum directly improve user quality of experience.</t>

<t>Similar header compression mechanisms are usually adopted for communications among constrained devices. Due to the memory or battery constraint, constrained devices prefer maximize carrying efficiency for each packet they deliver. For personal area network, the IEEE 802.15.4 enabled devices, which occupy the most share of the market, either equipped with customized proprietary protocols, or compress the header utterly as in <xref target="RFC4944"/>. Particular for proprietary protocols, e.g., Zigbee, an application level gateway should be introduced at the edge of the local network. Terminations of the communications by such gateway break the end-to-end principle via uncondictional trust as potential weak points, thus looping back to the security crisis in <xref target="SEC:pro:security"/>.</t>

<t>Also, constraints coming from either devices or carrier links would lead to a mixed scenarios and compound requirements for extraordinary header compression. For native IPv6 communications on DECT ULE and MS/TP Networks, dedicated compression mechanisms are specified in <xref target="RFC8105"/> and <xref target="RFC8163"/>, while the transmission of IPv6 packets over NFC and PLC, specifications are being developed in <xref target="I-D.ietf-6lo-nfc"/> and <xref target="I-D.ietf-6lo-plc"/>. For low power wide-area network, a generic framework for static context header compression is depicted in <xref target="RFC8724"/> for efficiency improvement.</t>

</section>
<section anchor="introducing-path-stretch" title="Introducing Path Stretch">

<t>To serve a moving endpoint (cf., <xref target="SEC:mobility"/>), mechanisms like Mobile IP <xref target="RFC3775"/> are used for the maintenance of connection continuity. As the result of the locator semantic in IP address <xref target="RFC2101"/>, traffic must follow a triangular route before arriving the updated location inevitably affecting the transmission efficiency as well as latency.</t>

<!-- NOTES Dirk: didn't really quite get the paragraph below -->
<!-- LUIGI: TOR actually uses path stretch as part of path privacy, in TOR nobody knows how many relays are used and nobody knows all the set of them. SO basically this is a feature not a bug. AKA I miss the point as well ...   -->

<t>Another example for introducing additional path lengthening is the routing in TOR (cf., <xref target="SEC:builtin-sec"/>). As the address indicates identifications to a certain extent <xref target="RFC2101"/>, privacy enhancement mechanisms usually involve the concealment of the source IP address during communications. To achieve high anonymity, traffic should be handed over by several (at least three) intermediates before reaching the destination. Undoubtedly, frequent relaying enhance the privacy at the cost of lower communication efficiency, no matter how close the destination is located.</t>

<t>IP Anycast <xref target="RFC7094"/> is usually adopted for efficient content delivery through extensive replica distribution. In most cases, request packets should be guided to the nearest server in relation to, e.g., geography or network topology, while occasionally, traffic may also be directed to a remote or suboptimal site. Given that Autonomous Systems (AS) always select route according to their own preference, e.g., route of customer AS path (rather than shortest path), traffic guidance for the nearest site is hard to be guaranteed (cf., <xref target="ANYCAST"/>), while computing-related metrics are mostly ignored.</t>

</section>
<section anchor="repetitive-encapsulation" title="Repetitive encapsulation">

<t>Addressing proposals such as those in <xref target="ICNIP"/> utilize path identification within an alternative forwarding architecture that acts upon the provided path identification. However, due to the limitation of existing flow-based architectures with respect to the supported header structures (in the form of IPv4 or IPv6 headers), the new routing semantics are being inserted into the existing header structure, while repeating the original, sender-generated header structure, in the payload of the packet as it traverses the limited domain, effectively doubling the header overhead per packet.</t>

<t>The problem is also present in a number of solutions tackling different issues, e.g., mobility  <xref target="I-D.ietf-lisp-introduction"/>, DC networking (<xref target="RFC8926"/>, <xref target="RFC7348"/>, <xref target="I-D.ietf-intarea-gue"/>), and privacy (<xref target="TOR"/>, <xref target="SPHINX"/>). Certainly these solutions are able to avoid other issues, like path lengthening or privacy, but they come at the price of multiple encapsulations that reduce the effective payload.</t>

</section>
</section>
</section>
<section anchor="problem-statement" title="Problem Statement">

<t>This document highlights that, with the emergence of limited domains, novel approaches to addressing in communication scenarios are being developed and deployed within those limited domains.</t>

<t>While this may be interpreted as a crucial point to the flexibility of addressing in the Internet, evidences exist (as describe in this document) that the existing Internet addressing structure itself is a potential hinderance in solving key problems for Internet service provisioning. Such problems include supporting new, e.g., service-oriented, scenarios more efficiently, with improved security and efficient traffic engineering, as well as large scale mobility.</t>

<t>As a problem statement, this document’s goal is not to propose or promote specific solutions to the problems here portrayed. Instead, this document aims at stimulating discussion on the emerging needs for addressing with the possibility to fundamentally re-think the addressing in the Internet beyond the current objectives of IPv6.</t>

</section>
<section anchor="SEC:sec" title="Security Considerations">

<t>TBD.</t>

</section>
<section anchor="SEC:iana" title="IANA Considerations">

<t>This document does not include an IANA request.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC0791" target='https://www.rfc-editor.org/info/rfc791'>
<front>
<title>Internet Protocol</title>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1981' month='September' />
</front>
<seriesInfo name='STD' value='5'/>
<seriesInfo name='RFC' value='791'/>
<seriesInfo name='DOI' value='10.17487/RFC0791'/>
</reference>



<reference  anchor="RFC8200" target='https://www.rfc-editor.org/info/rfc8200'>
<front>
<title>Internet Protocol, Version 6 (IPv6) Specification</title>
<author initials='S.' surname='Deering' fullname='S. Deering'><organization /></author>
<author initials='R.' surname='Hinden' fullname='R. Hinden'><organization /></author>
<date year='2017' month='July' />
<abstract><t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t></abstract>
</front>
<seriesInfo name='STD' value='86'/>
<seriesInfo name='RFC' value='8200'/>
<seriesInfo name='DOI' value='10.17487/RFC8200'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-lisp-nexagon">
<front>
<title>Network-Hexagons: H3-LISP GeoState &amp; Mobility Network</title>

<author initials='s' surname='sbarkai@gmail.com' fullname='sbarkai@gmail.com'>
    <organization />
</author>

<author initials='B' surname='Fernandez-Ruiz' fullname='Bruno Fernandez-Ruiz'>
    <organization />
</author>

<author initials='S' surname='Barkai' fullname='Sharon Barkai'>
    <organization />
</author>

<author initials='R' surname='Tamir' fullname='Rotem Tamir'>
    <organization />
</author>

<author initials='A' surname='Rodriguez-Natal' fullname='Alberto Rodriguez-Natal'>
    <organization />
</author>

<author initials='F' surname='Maino' fullname='Fabio Maino'>
    <organization />
</author>

<author initials='A' surname='Cabellos-Aparicio' fullname='Albert Cabellos-Aparicio'>
    <organization />
</author>

<author initials='D' surname='Farinacci' fullname='Dino Farinacci'>
    <organization />
</author>

<date month='October' day='17' year='2020' />

<abstract><t>This document specifies use of H3 and LISP to publish subscribe and reflect the real-time state and status of public spaces and public roads: - Tile by tile, indexed annotation of streets &amp; curbs in near real time - Sharing hazards, blockages, parking, weather, maintenance, inventory.. - Between MobilityClients who produce and consume geo-state information - Using geo-spatial IP channels of current state of the physical world</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-lisp-nexagon-06' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-lisp-nexagon-06.txt' />
</reference>



<reference anchor="I-D.ietf-lisp-introduction">
<front>
<title>An Architectural Introduction to the Locator/ID Separation Protocol (LISP)</title>

<author initials='A' surname='Cabellos-Aparicio' fullname='Albert Cabellos-Aparicio'>
    <organization />
</author>

<author initials='D' surname='Saucez' fullname='Damien Saucez'>
    <organization />
</author>

<date month='April' day='2' year='2015' />

<abstract><t>This document describes the architecture of the Locator/ID Separation Protocol (LISP), making it easier to read the rest of the LISP specifications and providing a basis for discussion about the details of the LISP protocols.  This document is used for introductory purposes, more details can be found in RFC6830, the protocol specification.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-lisp-introduction-13' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-lisp-introduction-13.txt' />
</reference>



<reference anchor="I-D.ietf-lisp-mn">
<front>
<title>LISP Mobile Node</title>

<author initials='D' surname='Farinacci' fullname='Dino Farinacci'>
    <organization />
</author>

<author initials='D' surname='Lewis' fullname='Darrel Lewis'>
    <organization />
</author>

<author initials='D' surname='Meyer' fullname='David Meyer'>
    <organization />
</author>

<author initials='C' surname='White' fullname='Chris White'>
    <organization />
</author>

<date month='August' day='24' year='2020' />

<abstract><t>This document describes how a lightweight version of LISP's ITR/ETR functionality can be used to provide seamless mobility to a mobile node.  The LISP Mobile Node design described in this document uses standard LISP functionality to provide scalable mobility for LISP mobile nodes.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-lisp-mn-08' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-lisp-mn-08.txt' />
</reference>



<reference anchor="I-D.ietf-intarea-gue">
<front>
<title>Generic UDP Encapsulation</title>

<author initials='T' surname='Herbert' fullname='Tom Herbert'>
    <organization />
</author>

<author initials='L' surname='Yong' fullname='Lucy Yong'>
    <organization />
</author>

<author initials='O' surname='Zia' fullname='Osama Zia'>
    <organization />
</author>

<date month='October' day='26' year='2019' />

<abstract><t>This specification describes Generic UDP Encapsulation (GUE), which is a scheme for using UDP to encapsulate packets of different IP protocols for transport across layer 3 networks. By encapsulating packets in UDP, specialized capabilities in networking hardware for efficient handling of UDP packets can be leveraged. GUE specifies basic encapsulation methods upon which higher level constructs, such as tunnels and overlay networks for network virtualization, can be constructed. GUE is extensible by allowing optional data fields as part of the encapsulation, and is generic in that it can encapsulate packets of various IP protocols.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-intarea-gue-09' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-intarea-gue-09.txt' />
</reference>



<reference anchor="DYNCAST">
<front>
<title>Dynamic-Anycast in Compute First Networking (CFN-Dyncast) Use Cases and Problem Statement</title>

<author initials='L' surname='Geng' fullname='Liang Geng'>
    <organization />
</author>

<author initials='P' surname='Liu' fullname='Peng Liu'>
    <organization />
</author>

<author initials='P' surname='Willis' fullname='Peter Willis'>
    <organization />
</author>

<date month='October' day='30' year='2020' />

<abstract><t>Service providers are exploring the edge computing to achieve better response time, control over data and carbon energy saving by moving the computing services towards the edge of the network in scenarios of 5G MEC (Multi-access Edge Computing), virtualized central office, and others.  Providing services by sharing computing resources from multiple edges is emerging and becoming more and more useful for computationally intensive tasks.  The service nodes attached to multiple edges normally have two key features, service equivalency and service dynamism.  Ideally they should serve the service in a computational balanced way.  However lots of approaches dispatch the service in a static way, e.g., to the geographically closest edge, and they may cause unbalanced usage of computing resources at edges which further degrades user experience and system utilization.  This draft provides an overview of scenarios and problems associated.  Networking taking account of computing resource metrics as one of its top parameters is called Compute First Networking (CFN) in this document.  The document identifies several key areas which require more investigations in architecture and protocol to achieve the balanced computing and networking resource utilization among edges in CFN.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-geng-rtgwg-cfn-dyncast-ps-usecase-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-geng-rtgwg-cfn-dyncast-ps-usecase-00.txt' />
</reference>



<reference anchor="QUIC">
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>

<author initials='J' surname='Iyengar' fullname='Jana Iyengar'>
    <organization />
</author>

<author initials='M' surname='Thomson' fullname='Martin Thomson'>
    <organization />
</author>

<date month='January' day='14' year='2021' />

<abstract><t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration.  QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.  DO NOT DEPLOY THIS VERSION OF QUIC  DO NOT DEPLOY THIS VERSION OF QUIC UNTIL IT IS IN AN RFC.  This version is still a work in progress.  For trial deployments, please use earlier versions.  Note to Readers  Discussion of this draft takes place on the QUIC working group mailing list (quic@ietf.org (mailto:quic@ietf.org)), which is archived at https://mailarchive.ietf.org/arch/search/?email_list=quic  Working Group information can be found at https://github.com/quicwg; source code and issues list for this draft can be found at https://github.com/quicwg/base-drafts/labels/-transport.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-quic-transport-34' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-quic-transport-34.txt' />
</reference>



<reference anchor="ICN5G">
<front>
<title>Enabling ICN in 3GPP's 5G NextGen Core Architecture</title>

<author initials='R' surname='Ravindran' fullname='Ravi Ravindran'>
    <organization />
</author>

<author initials='P' surname='suthar' fullname='Prakash suthar'>
    <organization />
</author>

<author initials='D' surname='Trossen' fullname='Dirk Trossen'>
    <organization />
</author>

<author initials='C' surname='Wang' fullname='Chonggang Wang'>
    <organization />
</author>

<author initials='G' surname='White' fullname='Greg White'>
    <organization />
</author>

<date month='January' day='10' year='2021' />

<abstract><t>The proposed 3GPP's 5G core nextgen architecture (5GC) allows the introduction of new user and control plane function, considering the support for network slicing functions, that offers greater flexibility to handle heterogeneous devices and applications.  In this draft, we provide a short description of the proposed 5GC architecture, including recent efforts to provide cellular Local Area Network (LAN) connectivity, followed by extensions to 5GC's control and user plane to support Packet Data Unit (PDU) sessions over Information-Centric Networks (ICN).  In addition, ICN over 5GLAN is also described.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-irtf-icnrg-5gc-icn-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-irtf-icnrg-5gc-icn-04.txt' />
</reference>



<reference anchor="ICNIP">
<front>
<title>Internet Services over ICN in 5G LAN Environments</title>

<author initials='D' surname='Trossen' fullname='Dirk Trossen'>
    <organization />
</author>

<author initials='S' surname='Robitzsch' fullname='Sebastian Robitzsch'>
    <organization />
</author>

<author initials='U' surname='Essex' fullname='University Essex'>
    <organization />
</author>

<author initials='M' surname='AL-Naday' fullname='Mays AL-Naday'>
    <organization />
</author>

<author initials='J' surname='Riihijarvi' fullname='Janne Riihijarvi'>
    <organization />
</author>

<date month='October' day='1' year='2020' />

<abstract><t>In this draft, we provide architecture and operations for enabling Internet services over ICN over (5G-enabled) LAN environments. Operations include ICN API to upper layers, HTTP over ICN, Service Proxy Operations, ICN Flow Management, Name Resolution, Mobility Handling, and Dual Stack Device Support.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-trossen-icnrg-internet-icn-5glan-04' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-trossen-icnrg-internet-icn-5glan-04.txt' />
</reference>



<reference anchor="BIER-MC">
<front>
<title>Applicability of BIER Multicast Overlay for Adaptive Streaming Services</title>

<author initials='D' surname='Trossen' fullname='Dirk Trossen'>
    <organization />
</author>

<author initials='A' surname='Rahman' fullname='Akbar Rahman'>
    <organization />
</author>

<author initials='C' surname='Wang' fullname='Chonggang Wang'>
    <organization />
</author>

<author initials='T' surname='Eckert' fullname='Toerless Eckert'>
    <organization />
</author>

<date month='January' day='10' year='2021' />

<abstract><t>HTTP Level Multicast, using BIER, is described as a use case in the BIER Use Cases document.  HTTP Level Multicast is used in today's video streaming and delivery services such as HLS, AR/VR, etc., generally realized over IP Multicast as well as other use cases such as software update delivery.  A realization of "HTTP Multicast" over "IP Multicast" is described for the video delivery use case.  IP Multicast is commonly used for IPTV services.  DVB and BBF also develope a reference architecture for IP Multicast service.  A few problems with IP Multicast, such as waste of transmission bandwidth, increase in signaling when there are few users are described. Realization over BIER, through a BIER Multicast Overlay Layer, is described as an alternative.  How BIER Multicast Overlay operation improves over IP Multicast, such as reduction in signaling, dynamic creation of multicast groups to reduce signaling and bandwidth wastage is described.  We conclude with a few next steps.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-bier-multicast-http-response-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-bier-multicast-http-response-05.txt' />
</reference>

<reference anchor="ANYCAST" >
  <front>
    <title>Internet anycast: performance, problems, &amp; potential</title>
    <author initials="Z." surname="Li" fullname="Zhihao Li">
      <organization></organization>
    </author>
    <author initials="D." surname="Levin" fullname="Dave Levin">
      <organization></organization>
    </author>
    <author initials="N." surname="Spring" fullname="Neil Spring">
      <organization></organization>
    </author>
    <author initials="B." surname="Bhattacharjee" fullname="Bobby Bhattacharjee">
      <organization></organization>
    </author>
    <date year="2018" month="August"/>
  </front>
  <seriesInfo name="Proceedings of the 2018 Conference of the ACM Special Interest Group on Data" value="Communication"/>
  <seriesInfo name="DOI" value="10.1145/3230543.3230547"/>
</reference>

<reference anchor="ADDRLESS" >
  <front>
    <title>Addressless: A new internet server model to prevent network scanning</title>
    <author initials="S." surname="Hao" fullname="Shanshan Hao">
      <organization></organization>
    </author>
    <author initials="R." surname="Liu" fullname="Renjie Liu">
      <organization></organization>
    </author>
    <author initials="Z." surname="Weng" fullname="Zhe Weng">
      <organization></organization>
    </author>
    <author initials="D." surname="Chang" fullname="Deliang Chang">
      <organization></organization>
    </author>
    <author initials="C." surname="Bao" fullname="Congxiao Bao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xing Li">
      <organization></organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="PLOS ONE" value="Vol. 16, pp. e0246293"/>
  <seriesInfo name="DOI" value="10.1371/journal.pone.0246293"/>
</reference>

<reference anchor="MANET1" >
  <front>
    <title>Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network</title>
    <author initials="A." surname="Abdallah" fullname="Alaa E. Abdallah">
      <organization></organization>
    </author>
    <author initials="E." surname="Abdallah" fullname="Emad E. Abdallah">
      <organization></organization>
    </author>
    <author initials="M." surname="Bsoul" fullname="Mohammad Bsoul">
      <organization></organization>
    </author>
    <author initials="A." surname="Otoom" fullname="Ahmed Fawzi Otoom">
      <organization></organization>
    </author>
    <date year="2016" month="October"/>
  </front>
  <seriesInfo name="International Journal of Distributed Sensor Networks" value="Vol. 12, pp. 155014771667125"/>
  <seriesInfo name="DOI" value="10.1177/1550147716671255"/>
</reference>

<reference anchor="CCN" >
  <front>
    <title>Networking named content</title>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization></organization>
    </author>
    <author initials="D." surname="Smetters" fullname="Diana K. Smetters">
      <organization></organization>
    </author>
    <author initials="J." surname="Thornton" fullname="James D. Thornton">
      <organization></organization>
    </author>
    <author initials="M." surname="Plass" fullname="Michael F. Plass">
      <organization></organization>
    </author>
    <author initials="N." surname="Briggs" fullname="Nicholas H. Briggs">
      <organization></organization>
    </author>
    <author initials="R." surname="Braynard" fullname="Rebecca L. Braynard">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
  <seriesInfo name="Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT" value="'09"/>
  <seriesInfo name="DOI" value="10.1145/1658939.1658941"/>
</reference>

<reference anchor="HANDLEY" >
  <front>
    <title>Delay is Not an Option: Low Latency Routing in Space</title>
    <author initials="M." surname="Handley" fullname="Mark Handley">
      <organization></organization>
    </author>
    <date year="2018" month="November"/>
  </front>
  <seriesInfo name="Proceedings of the 17th ACM Workshop on Hot Topics in" value="Networks"/>
  <seriesInfo name="DOI" value="10.1145/3286062.3286075"/>
</reference>

<reference anchor="TROSSEN" >
  <front>
    <title>Arguments for an information-centric internetworking architecture</title>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization></organization>
    </author>
    <author initials="M." surname="Sarela" fullname="Mikko Sarela">
      <organization></organization>
    </author>
    <author initials="K." surname="Sollins" fullname="Karen Sollins">
      <organization></organization>
    </author>
    <date year="2010" month="April"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 40, pp. 26-33"/>
  <seriesInfo name="DOI" value="10.1145/1764873.1764878"/>
</reference>

<reference anchor="REED" >
  <front>
    <title>Stateless multicast switching in software defined networks</title>
    <author initials="M." surname="Reed" fullname="Martin J. Reed">
      <organization></organization>
    </author>
    <author initials="M." surname="Al-Naday" fullname="Mays Al-Naday">
      <organization></organization>
    </author>
    <author initials="N." surname="Thomos" fullname="Nikolaos Thomos">
      <organization></organization>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization></organization>
    </author>
    <author initials="G." surname="Petropoulos" fullname="George Petropoulos">
      <organization></organization>
    </author>
    <author initials="S." surname="Spirou" fullname="Spiros Spirou">
      <organization></organization>
    </author>
    <date year="2016" month="May"/>
  </front>
  <seriesInfo name="2016 IEEE International Conference on Communications" value="(ICC)"/>
  <seriesInfo name="DOI" value="10.1109/icc.2016.7511036"/>
</reference>

<reference anchor="SPHINX" >
  <front>
    <title>Sphinx: A Compact and Provably Secure Mix Format</title>
    <author initials="G." surname="Danezis" fullname="George Danezis">
      <organization></organization>
    </author>
    <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
      <organization></organization>
    </author>
    <date year="2009" month="May"/>
  </front>
  <seriesInfo name="2009 30th IEEE Symposium on Security and" value="Privacy"/>
  <seriesInfo name="DOI" value="10.1109/sp.2009.15"/>
</reference>

<reference anchor="ALOHA" >
  <front>
    <title>The ALOHA System</title>
    <author initials="F." surname="Kuo" fullname="F. F. Kuo">
      <organization></organization>
    </author>
    <date year="1995" month="January"/>
  </front>
  <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 25, pp. 41-44"/>
  <seriesInfo name="DOI" value="10.1145/205447.205451"/>
</reference>

<reference anchor="CARTISEAN" >
  <front>
    <title>Cartesian Ad Hoc Routing Protocols</title>
    <author initials="L." surname="Hughes" fullname="Larry Hughes">
      <organization></organization>
    </author>
    <author initials="K." surname="Shumon" fullname="Kafil Shumon">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhang" fullname="Ying Zhang">
      <organization></organization>
    </author>
    <date year="2003"/>
  </front>
  <seriesInfo name="Ad-Hoc, Mobile, and Wireless Networks" value="pp. 287-292"/>
  <seriesInfo name="DOI" value="10.1007/978-3-540-39611-6_27"/>
</reference>


<reference anchor="LR-WPAN" target="https://standards.ieee.org/standard/802_15_4-2020.html">
  <front>
    <title>IEEE 802.15.4 - IEEE Standard for Low-Rate Wireless Networks</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="May"/>
  </front>
  <seriesInfo name="IEEE" value="802.15 WPAN Task Group 4"/>
</reference>
<reference anchor="DECT-ULE" target="https://www.etsi.org/deliver/etsi_en/300100_300199/30017501/02.06.01_60/en_30017501v020601p.pdf">
  <front>
    <title>Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview</title>
    <author >
      <organization></organization>
    </author>
    <date year="2009" month="May"/>
  </front>
  <seriesInfo name="ETSI" value="European Standard, EN 300 175-1, V2.6.1"/>
</reference>
<reference anchor="BACnet" target="https://www.techstreet.com/ashrae/standards/ashrae-135-2016?product_id=1918140">
  <front>
    <title>BACnet-A Data Communication Protocol for Building Automation and Control Networks</title>
    <author >
      <organization></organization>
    </author>
    <date year="2016" month="January"/>
  </front>
  <seriesInfo name="ANSI/ASHRAE" value="Standard 135-2016"/>
</reference>
<reference anchor="ECMA-340" >
  <front>
    <title>Near Field Communication - Interface and Protocol (NFCIP-1) 3rd Ed.</title>
    <author >
      <organization>EECMA-340</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="IEEE_1901.1" target="https://ieeexplore.ieee.org/document/8360785">
  <front>
    <title>Standard for Medium Frequency (less than 15 MHz) Power Line Communications for Smart Grid Applications</title>
    <author >
      <organization></organization>
    </author>
    <date year="2018" month="May"/>
  </front>
  <seriesInfo name="IEEE 1901.1" value="IEEE-SA Standards Board"/>
</reference>
<reference anchor="BLE" target="https://www.bluetooth.com/specifications">
  <front>
    <title>Bluetooth Specification</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
  <seriesInfo name="Bluetooth" value="SIG Working Groups"/>
</reference>
<reference anchor="OCADO" target="https://techmonitor.ai/tech-leaders/ocado-technology-robot-hive-innovation">
  <front>
    <title>Ocado Technology’s robot warehouse a Hive of IoT innovation</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TERASTREAM" target="https://www.telekom.com/en/media/media-information/archive/deutsche-telekom-tests-terastream-the-network-of-the-future-in-croatia-358444">
  <front>
    <title>Deutsche Telekom tests TeraStream, the network of the future, in Croatia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PEARG" target="https://irtf.org/pearg">
  <front>
    <title>Privacy Enhancements and Assessments Research Group - PEARG</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DETNET" target="https://datatracker.ietf.org/wg/detnet/about/">
  <front>
    <title>Deterministic Networking (DetNet)</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ETSI-NIN" target="https://www.etsi.org/technologies/non-ip-networking">
  <front>
    <title>Non-IP Networking - NIN</title>
    <author >
      <organization>ETSI - European Telecommunication Standards Institute</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="TOR" target="https://www.torproject.org/">
  <front>
    <title>The Tor Project</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="HICN" target="https://datatracker.ietf.org/meeting/interim-2018-icnrg-01/materials/slides-interim-2018-icnrg-01-sessa-hybrid-icn-hicn-luca-muscariello">
  <front>
    <title>Hybrid Information-Centric Networking: ICN inside the Internet Protocol</title>
    <author initials="L." surname="Muscariello">
      <organization></organization>
    </author>
    <date year="2018" month="March"/>
  </front>
</reference>




<reference  anchor="RFC8799" target='https://www.rfc-editor.org/info/rfc8799'>
<front>
<title>Limited Domains and Internet Protocols</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter'><organization /></author>
<author initials='B.' surname='Liu' fullname='B. Liu'><organization /></author>
<date year='2020' month='July' />
<abstract><t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of &quot;limited domain membership&quot; and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes. </t><t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t></abstract>
</front>
<seriesInfo name='RFC' value='8799'/>
<seriesInfo name='DOI' value='10.17487/RFC8799'/>
</reference>



<reference  anchor="RFC2775" target='https://www.rfc-editor.org/info/rfc2775'>
<front>
<title>Internet Transparency</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter'><organization /></author>
<date year='2000' month='February' />
<abstract><t>This document describes the current state of the Internet from the architectural viewpoint, concentrating on issues of end-to-end connectivity and transparency.</t></abstract>
</front>
<seriesInfo name='RFC' value='2775'/>
<seriesInfo name='DOI' value='10.17487/RFC2775'/>
</reference>



<reference  anchor="RFC4919" target='https://www.rfc-editor.org/info/rfc4919'>
<front>
<title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
<author initials='N.' surname='Kushalnagar' fullname='N. Kushalnagar'><organization /></author>
<author initials='G.' surname='Montenegro' fullname='G. Montenegro'><organization /></author>
<author initials='C.' surname='Schumacher' fullname='C. Schumacher'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks.  The set of goals enumerated in this document form an initial set only.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4919'/>
<seriesInfo name='DOI' value='10.17487/RFC4919'/>
</reference>



<reference  anchor="RFC5177" target='https://www.rfc-editor.org/info/rfc5177'>
<front>
<title>Network Mobility (NEMO) Extensions for Mobile IPv4</title>
<author initials='K.' surname='Leung' fullname='K. Leung'><organization /></author>
<author initials='G.' surname='Dommety' fullname='G. Dommety'><organization /></author>
<author initials='V.' surname='Narayanan' fullname='V. Narayanan'><organization /></author>
<author initials='A.' surname='Petrescu' fullname='A. Petrescu'><organization /></author>
<date year='2008' month='April' />
<abstract><t>This document describes a protocol for supporting Mobile Networks between a Mobile Router and a Home Agent by extending the Mobile IPv4 protocol.  A Mobile Router is responsible for the mobility of one or more network segments or subnets moving together.  The Mobile Router hides its mobility from the nodes on the Mobile Network.  The nodes on the Mobile Network may be fixed in relationship to the Mobile Router and may not have any mobility function.</t><t>Extensions to Mobile IPv4 are introduced to support Mobile Networks. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5177'/>
<seriesInfo name='DOI' value='10.17487/RFC5177'/>
</reference>



<reference  anchor="RFC6626" target='https://www.rfc-editor.org/info/rfc6626'>
<front>
<title>Dynamic Prefix Allocation for Network Mobility for Mobile IPv4 (NEMOv4)</title>
<author initials='G.' surname='Tsirtsis' fullname='G. Tsirtsis'><organization /></author>
<author initials='V.' surname='Park' fullname='V. Park'><organization /></author>
<author initials='V.' surname='Narayanan' fullname='V. Narayanan'><organization /></author>
<author initials='K.' surname='Leung' fullname='K. Leung'><organization /></author>
<date year='2012' month='May' />
<abstract><t>The base Network Mobility for Mobile IPv4 (NEMOv4) specification defines extensions to Mobile IPv4 for mobile networks.  This specification defines a dynamic prefix allocation mechanism for NEMOv4.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6626'/>
<seriesInfo name='DOI' value='10.17487/RFC6626'/>
</reference>



<reference  anchor="RFC5944" target='https://www.rfc-editor.org/info/rfc5944'>
<front>
<title>IP Mobility Support for IPv4, Revised</title>
<author initials='C.' surname='Perkins' fullname='C. Perkins' role='editor'><organization /></author>
<date year='2010' month='November' />
<abstract><t>This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet.  The protocol provides for registering the care-of address with a home agent.  The home agent sends datagrams destined for the mobile node through a tunnel to the care-of address.  After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5944'/>
<seriesInfo name='DOI' value='10.17487/RFC5944'/>
</reference>



<reference  anchor="RFC5275" target='https://www.rfc-editor.org/info/rfc5275'>
<front>
<title>CMS Symmetric Key Management and Distribution</title>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2008' month='June' />
<abstract><t>This document describes a mechanism to manage (i.e., set up, distribute, and rekey) keys used with symmetric cryptographic algorithms.  Also defined herein is a mechanism to organize users into groups to support distribution of encrypted content using symmetric cryptographic algorithms.  The mechanism uses the Cryptographic Message Syntax (CMS) protocol and Certificate Management over CMS (CMC) protocol to manage the symmetric keys.  Any member of the group can then later use this distributed shared key to decrypt other CMS encrypted objects with the symmetric key.  This mechanism has been developed to support Secure/Multipurpose Internet Mail Extensions (S/MIME) Mail List Agents  (MLAs).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5275'/>
<seriesInfo name='DOI' value='10.17487/RFC5275'/>
</reference>



<reference anchor="I-D.ietf-lisp-rfc6833bis">
<front>
<title>Locator/ID Separation Protocol (LISP) Control-Plane</title>

<author initials='D' surname='Farinacci' fullname='Dino Farinacci'>
    <organization />
</author>

<author initials='F' surname='Maino' fullname='Fabio Maino'>
    <organization />
</author>

<author initials='V' surname='Fuller' fullname='Vince Fuller'>
    <organization />
</author>

<author initials='A' surname='Cabellos-Aparicio' fullname='Albert Cabellos-Aparicio'>
    <organization />
</author>

<date month='November' day='18' year='2020' />

<abstract><t>This document describes the Control-Plane and Mapping Service for the Locator/ID Separation Protocol (LISP), implemented by two types of LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server -- that provides a simplified "front end" for one or more Endpoint ID to Routing Locator mapping databases.  By using this Control-Plane service interface and communicating with Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs) are not dependent on the details of mapping database systems, which facilitates modularity with different database designs.  Since these devices implement the "edge" of the LISP Control-Plane infrastructure, connecting EID addressable nodes of a LISP site, it the implementation and operational complexity of the overall cost and effort of deploying LISP.  This document obsoletes RFC 6830 and RFC 6833.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-lisp-rfc6833bis-30' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-lisp-rfc6833bis-30.txt' />
</reference>



<reference  anchor="RFC8926" target='https://www.rfc-editor.org/info/rfc8926'>
<front>
<title>Geneve: Generic Network Virtualization Encapsulation</title>
<author initials='J.' surname='Gross' fullname='J. Gross' role='editor'><organization /></author>
<author initials='I.' surname='Ganga' fullname='I. Ganga' role='editor'><organization /></author>
<author initials='T.' surname='Sridhar' fullname='T. Sridhar' role='editor'><organization /></author>
<date year='2020' month='November' />
<abstract><t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters.  As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components.  Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t></abstract>
</front>
<seriesInfo name='RFC' value='8926'/>
<seriesInfo name='DOI' value='10.17487/RFC8926'/>
</reference>



<reference  anchor="RFC7348" target='https://www.rfc-editor.org/info/rfc7348'>
<front>
<title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
<author initials='M.' surname='Mahalingam' fullname='M. Mahalingam'><organization /></author>
<author initials='D.' surname='Dutt' fullname='D. Dutt'><organization /></author>
<author initials='K.' surname='Duda' fullname='K. Duda'><organization /></author>
<author initials='P.' surname='Agarwal' fullname='P. Agarwal'><organization /></author>
<author initials='L.' surname='Kreeger' fullname='L. Kreeger'><organization /></author>
<author initials='T.' surname='Sridhar' fullname='T. Sridhar'><organization /></author>
<author initials='M.' surname='Bursell' fullname='M. Bursell'><organization /></author>
<author initials='C.' surname='Wright' fullname='C. Wright'><organization /></author>
<date year='2014' month='August' />
<abstract><t>This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.  The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers.  This memo documents the deployed VXLAN protocol for the benefit of the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='7348'/>
<seriesInfo name='DOI' value='10.17487/RFC7348'/>
</reference>



<reference  anchor="RFC7401" target='https://www.rfc-editor.org/info/rfc7401'>
<front>
<title>Host Identity Protocol Version 2 (HIPv2)</title>
<author initials='R.' surname='Moskowitz' fullname='R. Moskowitz' role='editor'><organization /></author>
<author initials='T.' surname='Heer' fullname='T. Heer'><organization /></author>
<author initials='P.' surname='Jokela' fullname='P. Jokela'><organization /></author>
<author initials='T.' surname='Henderson' fullname='T. Henderson'><organization /></author>
<date year='2015' month='April' />
<abstract><t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t><t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t></abstract>
</front>
<seriesInfo name='RFC' value='7401'/>
<seriesInfo name='DOI' value='10.17487/RFC7401'/>
</reference>



<reference  anchor="RFC7476" target='https://www.rfc-editor.org/info/rfc7476'>
<front>
<title>Information-Centric Networking: Baseline Scenarios</title>
<author initials='K.' surname='Pentikousis' fullname='K. Pentikousis' role='editor'><organization /></author>
<author initials='B.' surname='Ohlman' fullname='B. Ohlman'><organization /></author>
<author initials='D.' surname='Corujo' fullname='D. Corujo'><organization /></author>
<author initials='G.' surname='Boggia' fullname='G. Boggia'><organization /></author>
<author initials='G.' surname='Tyson' fullname='G. Tyson'><organization /></author>
<author initials='E.' surname='Davies' fullname='E. Davies'><organization /></author>
<author initials='A.' surname='Molinaro' fullname='A. Molinaro'><organization /></author>
<author initials='S.' surname='Eum' fullname='S. Eum'><organization /></author>
<date year='2015' month='March' />
<abstract><t>This document aims at establishing a common understanding about a set of scenarios that can be used as a base for the evaluation of different information-centric networking (ICN) approaches so that they can be tested and compared against each other while showcasing their own advantages.  Towards this end, we review the ICN literature and document scenarios which have been considered in previous performance evaluation studies.  We discuss a variety of aspects that an ICN solution can address.  This includes general aspects, such as, network efficiency, reduced complexity, increased scalability and reliability, mobility support, multicast and caching performance, real-time communication efficiency, energy consumption frugality, and disruption and delay tolerance.  We detail ICN-specific aspects as well, such as information security and trust, persistence, availability, provenance, and location independence.</t><t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG).</t></abstract>
</front>
<seriesInfo name='RFC' value='7476'/>
<seriesInfo name='DOI' value='10.17487/RFC7476'/>
</reference>



<reference  anchor="RFC5061" target='https://www.rfc-editor.org/info/rfc5061'>
<front>
<title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
<author initials='R.' surname='Stewart' fullname='R. Stewart'><organization /></author>
<author initials='Q.' surname='Xie' fullname='Q. Xie'><organization /></author>
<author initials='M.' surname='Tuexen' fullname='M. Tuexen'><organization /></author>
<author initials='S.' surname='Maruyama' fullname='S. Maruyama'><organization /></author>
<author initials='M.' surname='Kozuka' fullname='M. Kozuka'><organization /></author>
<date year='2007' month='September' />
<abstract><t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5061'/>
<seriesInfo name='DOI' value='10.17487/RFC5061'/>
</reference>



<reference  anchor="RFC6182" target='https://www.rfc-editor.org/info/rfc6182'>
<front>
<title>Architectural Guidelines for Multipath TCP Development</title>
<author initials='A.' surname='Ford' fullname='A. Ford'><organization /></author>
<author initials='C.' surname='Raiciu' fullname='C. Raiciu'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='S.' surname='Barre' fullname='S. Barre'><organization /></author>
<author initials='J.' surname='Iyengar' fullname='J. Iyengar'><organization /></author>
<date year='2011' month='March' />
<abstract><t>Hosts are often connected by multiple paths, but TCP restricts communications to a single path per transport connection.  Resource usage within the network would be more efficient were these multiple paths able to be used concurrently.  This should enhance user experience through improved resilience to network failure and higher throughput.</t><t>This document outlines architectural guidelines for the development of a Multipath Transport Protocol, with references to how these architectural components come together in the development of a Multipath TCP (MPTCP).  This document lists certain high-level design decisions that provide foundations for the design of the MPTCP protocol, based upon these architectural requirements.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6182'/>
<seriesInfo name='DOI' value='10.17487/RFC6182'/>
</reference>



<reference  anchor="RFC7429" target='https://www.rfc-editor.org/info/rfc7429'>
<front>
<title>Distributed Mobility Management: Current Practices and Gap Analysis</title>
<author initials='D.' surname='Liu' fullname='D. Liu' role='editor'><organization /></author>
<author initials='JC.' surname='Zuniga' fullname='JC. Zuniga' role='editor'><organization /></author>
<author initials='P.' surname='Seite' fullname='P. Seite'><organization /></author>
<author initials='H.' surname='Chan' fullname='H. Chan'><organization /></author>
<author initials='CJ.' surname='Bernardos' fullname='CJ. Bernardos'><organization /></author>
<date year='2015' month='January' />
<abstract><t>This document analyzes deployment practices of existing IP mobility protocols in a distributed mobility management environment.  It then identifies existing limitations when compared to the requirements defined for a distributed mobility management solution.</t></abstract>
</front>
<seriesInfo name='RFC' value='7429'/>
<seriesInfo name='DOI' value='10.17487/RFC7429'/>
</reference>



<reference  anchor="RFC8763" target='https://www.rfc-editor.org/info/rfc8763'>
<front>
<title>Deployment Considerations for Information-Centric Networking (ICN)</title>
<author initials='A.' surname='Rahman' fullname='A. Rahman'><organization /></author>
<author initials='D.' surname='Trossen' fullname='D. Trossen'><organization /></author>
<author initials='D.' surname='Kutscher' fullname='D. Kutscher'><organization /></author>
<author initials='R.' surname='Ravindran' fullname='R. Ravindran'><organization /></author>
<date year='2020' month='April' />
<abstract><t>Information-Centric Networking (ICN) is now reaching technological maturity after many years of fundamental research and experimentation. This document provides a number of deployment considerations in the interest of helping the ICN community move forward to the next step of live deployments. First, the major deployment configurations for ICN are described, including the key overlay and underlay approaches. Then, proposed deployment migration paths are outlined to address major practical issues, such as network and application migration. Next, selected ICN trial experiences are summarized. Finally, protocol areas that require further standardization are identified to facilitate future interoperable ICN deployments. This document is a product of the Information-Centric Networking Research Group (ICNRG).</t></abstract>
</front>
<seriesInfo name='RFC' value='8763'/>
<seriesInfo name='DOI' value='10.17487/RFC8763'/>
</reference>



<reference  anchor="RFC7665" target='https://www.rfc-editor.org/info/rfc7665'>
<front>
<title>Service Function Chaining (SFC) Architecture</title>
<author initials='J.' surname='Halpern' fullname='J. Halpern' role='editor'><organization /></author>
<author initials='C.' surname='Pignataro' fullname='C. Pignataro' role='editor'><organization /></author>
<date year='2015' month='October' />
<abstract><t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t></abstract>
</front>
<seriesInfo name='RFC' value='7665'/>
<seriesInfo name='DOI' value='10.17487/RFC7665'/>
</reference>



<reference  anchor="RFC8754" target='https://www.rfc-editor.org/info/rfc8754'>
<front>
<title>IPv6 Segment Routing Header (SRH)</title>
<author initials='C.' surname='Filsfils' fullname='C. Filsfils' role='editor'><organization /></author>
<author initials='D.' surname='Dukes' fullname='D. Dukes' role='editor'><organization /></author>
<author initials='S.' surname='Previdi' fullname='S. Previdi'><organization /></author>
<author initials='J.' surname='Leddy' fullname='J. Leddy'><organization /></author>
<author initials='S.' surname='Matsushima' fullname='S. Matsushima'><organization /></author>
<author initials='D.' surname='Voyer' fullname='D. Voyer'><organization /></author>
<date year='2020' month='March' />
<abstract><t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t></abstract>
</front>
<seriesInfo name='RFC' value='8754'/>
<seriesInfo name='DOI' value='10.17487/RFC8754'/>
</reference>



<reference  anchor="RFC8595" target='https://www.rfc-editor.org/info/rfc8595'>
<front>
<title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
<author initials='A.' surname='Farrel' fullname='A. Farrel'><organization /></author>
<author initials='S.' surname='Bryant' fullname='S. Bryant'><organization /></author>
<author initials='J.' surname='Drake' fullname='J. Drake'><organization /></author>
<date year='2019' month='June' />
<abstract><t>This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack.  That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack.  This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='8595'/>
<seriesInfo name='DOI' value='10.17487/RFC8595'/>
</reference>



<reference  anchor="RFC8677" target='https://www.rfc-editor.org/info/rfc8677'>
<front>
<title>Name-Based Service Function Forwarder (nSFF) Component within a Service Function Chaining (SFC) Framework</title>
<author initials='D.' surname='Trossen' fullname='D. Trossen'><organization /></author>
<author initials='D.' surname='Purkayastha' fullname='D. Purkayastha'><organization /></author>
<author initials='A.' surname='Rahman' fullname='A. Rahman'><organization /></author>
<date year='2019' month='November' />
<abstract><t>Adoption of cloud and fog technology allows operators to deploy a single &quot;Service Function&quot; (SF) to multiple &quot;execution locations&quot;.  The decision to steer traffic to a specific location may change frequently based on load, proximity, etc. Under the current Service Function Chaining (SFC) framework, steering traffic dynamically to the different execution endpoints requires a specific &quot;rechaining&quot;, i.e., a change in the service function path reflecting the different IP endpoints to be used for the new execution points.  This procedure may be complex and take time. In order to simplify rechaining and reduce the time to complete the procedure, we discuss separating the logical Service Function Path (SFP) from the specific execution endpoints. This can be done by identifying the SFs using a name rather than a routable IP endpoint (or Layer 2 address). This document describes the necessary extensions, additional functions, and protocol details in the Service Function Forwarder (SFF) to handle name-based relationships. </t><t>This document presents InterDigital's approach to name-based SFC. It does not represent IETF consensus and is presented here so that the SFC community may benefit from considering this mechanism and the possibility of its use in the edge data centers.</t></abstract>
</front>
<seriesInfo name='RFC' value='8677'/>
<seriesInfo name='DOI' value='10.17487/RFC8677'/>
</reference>



<reference  anchor="RFC5517" target='https://www.rfc-editor.org/info/rfc5517'>
<front>
<title>Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment</title>
<author initials='S.' surname='HomChaudhuri' fullname='S. HomChaudhuri'><organization /></author>
<author initials='M.' surname='Foschiano' fullname='M. Foschiano'><organization /></author>
<date year='2010' month='February' />
<abstract><t>This document describes a mechanism to achieve device isolation through the application of special Layer 2 forwarding constraints. Such a mechanism allows end devices to share the same IP subnet while being Layer 2 isolated, which in turn allows network designers to employ larger subnets and so reduce the address management overhead.</t><t>Some of the numerous deployment scenarios of the aforementioned mechanism (which range from data center designs to Ethernet-to-the-home-basement networks) are mentioned in the following text to exemplify the mechanism's possible usages; however, this document is not intended to cover all such deployment scenarios nor delve into their details.  This document is not an Internet Standards Track specification; it  is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='5517'/>
<seriesInfo name='DOI' value='10.17487/RFC5517'/>
</reference>



<reference  anchor="RFC8402" target='https://www.rfc-editor.org/info/rfc8402'>
<front>
<title>Segment Routing Architecture</title>
<author initials='C.' surname='Filsfils' fullname='C. Filsfils' role='editor'><organization /></author>
<author initials='S.' surname='Previdi' fullname='S. Previdi' role='editor'><organization /></author>
<author initials='L.' surname='Ginsberg' fullname='L. Ginsberg'><organization /></author>
<author initials='B.' surname='Decraene' fullname='B. Decraene'><organization /></author>
<author initials='S.' surname='Litkowski' fullname='S. Litkowski'><organization /></author>
<author initials='R.' surname='Shakir' fullname='R. Shakir'><organization /></author>
<date year='2018' month='July' />
<abstract><t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called &quot;segments&quot;.  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t><t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t><t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t></abstract>
</front>
<seriesInfo name='RFC' value='8402'/>
<seriesInfo name='DOI' value='10.17487/RFC8402'/>
</reference>



<reference  anchor="RFC3972" target='https://www.rfc-editor.org/info/rfc3972'>
<front>
<title>Cryptographically Generated Addresses (CGA)</title>
<author initials='T.' surname='Aura' fullname='T. Aura'><organization /></author>
<date year='2005' month='March' />
<abstract><t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3972'/>
<seriesInfo name='DOI' value='10.17487/RFC3972'/>
</reference>



<reference  anchor="RFC4301" target='https://www.rfc-editor.org/info/rfc4301'>
<front>
<title>Security Architecture for the Internet Protocol</title>
<author initials='S.' surname='Kent' fullname='S. Kent'><organization /></author>
<author initials='K.' surname='Seo' fullname='K. Seo'><organization /></author>
<date year='2005' month='December' />
<abstract><t>This document describes an updated version of the &quot;Security Architecture for IP&quot;, which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4301'/>
<seriesInfo name='DOI' value='10.17487/RFC4301'/>
</reference>



<reference  anchor="RFC3031" target='https://www.rfc-editor.org/info/rfc3031'>
<front>
<title>Multiprotocol Label Switching Architecture</title>
<author initials='E.' surname='Rosen' fullname='E. Rosen'><organization /></author>
<author initials='A.' surname='Viswanathan' fullname='A. Viswanathan'><organization /></author>
<author initials='R.' surname='Callon' fullname='R. Callon'><organization /></author>
<date year='2001' month='January' />
<abstract><t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3031'/>
<seriesInfo name='DOI' value='10.17487/RFC3031'/>
</reference>



<reference  anchor="RFC7426" target='https://www.rfc-editor.org/info/rfc7426'>
<front>
<title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
<author initials='E.' surname='Haleplidis' fullname='E. Haleplidis' role='editor'><organization /></author>
<author initials='K.' surname='Pentikousis' fullname='K. Pentikousis' role='editor'><organization /></author>
<author initials='S.' surname='Denazis' fullname='S. Denazis'><organization /></author>
<author initials='J.' surname='Hadi Salim' fullname='J. Hadi Salim'><organization /></author>
<author initials='D.' surname='Meyer' fullname='D. Meyer'><organization /></author>
<author initials='O.' surname='Koufopavlou' fullname='O. Koufopavlou'><organization /></author>
<date year='2015' month='January' />
<abstract><t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces.  SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane.  This separation allows faster innovation cycles at both planes as experience has already shown.  However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other.  This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t></abstract>
</front>
<seriesInfo name='RFC' value='7426'/>
<seriesInfo name='DOI' value='10.17487/RFC7426'/>
</reference>



<reference  anchor="RFC8280" target='https://www.rfc-editor.org/info/rfc8280'>
<front>
<title>Research into Human Rights Protocol Considerations</title>
<author initials='N.' surname='ten Oever' fullname='N. ten Oever'><organization /></author>
<author initials='C.' surname='Cath' fullname='C. Cath'><organization /></author>
<date year='2017' month='October' />
<abstract><t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t><t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t></abstract>
</front>
<seriesInfo name='RFC' value='8280'/>
<seriesInfo name='DOI' value='10.17487/RFC8280'/>
</reference>



<reference  anchor="RFC5795" target='https://www.rfc-editor.org/info/rfc5795'>
<front>
<title>The RObust Header Compression (ROHC) Framework</title>
<author initials='K.' surname='Sandlund' fullname='K. Sandlund'><organization /></author>
<author initials='G.' surname='Pelletier' fullname='G. Pelletier'><organization /></author>
<author initials='L-E.' surname='Jonsson' fullname='L-E. Jonsson'><organization /></author>
<date year='2010' month='March' />
<abstract><t>The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future-proof header compression concept.  It is designed to operate efficiently and robustly over various link technologies with different characteristics.</t><t>The ROHC framework, along with a set of compression profiles, was initially defined in RFC 3095.  To improve and simplify the ROHC specifications, this document explicitly defines the ROHC framework and the profile for uncompressed separately.  More specifically, the definition of the framework does not modify or update the definition of the framework specified by RFC 3095.</t><t>This specification obsoletes RFC 4995.  It fixes one interoperability issue that was erroneously introduced in RFC 4995, and adds some minor clarifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5795'/>
<seriesInfo name='DOI' value='10.17487/RFC5795'/>
</reference>



<reference  anchor="RFC4944" target='https://www.rfc-editor.org/info/rfc4944'>
<front>
<title>Transmission of IPv6 Packets over IEEE 802.15.4 Networks</title>
<author initials='G.' surname='Montenegro' fullname='G. Montenegro'><organization /></author>
<author initials='N.' surname='Kushalnagar' fullname='N. Kushalnagar'><organization /></author>
<author initials='J.' surname='Hui' fullname='J. Hui'><organization /></author>
<author initials='D.' surname='Culler' fullname='D. Culler'><organization /></author>
<date year='2007' month='September' />
<abstract><t>This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4944'/>
<seriesInfo name='DOI' value='10.17487/RFC4944'/>
</reference>



<reference  anchor="RFC8105" target='https://www.rfc-editor.org/info/rfc8105'>
<front>
<title>Transmission of IPv6 Packets over Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE)</title>
<author initials='P.' surname='Mariager' fullname='P. Mariager'><organization /></author>
<author initials='J.' surname='Petersen' fullname='J. Petersen' role='editor'><organization /></author>
<author initials='Z.' surname='Shelby' fullname='Z. Shelby'><organization /></author>
<author initials='M.' surname='Van de Logt' fullname='M. Van de Logt'><organization /></author>
<author initials='D.' surname='Barthel' fullname='D. Barthel'><organization /></author>
<date year='2017' month='May' />
<abstract><t>Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE) is a low-power air interface technology that is proposed by the DECT Forum and is defined and specified by ETSI.</t><t>The DECT air interface technology has been used worldwide in communication devices for more than 20 years.  It has primarily been used to carry voice for cordless telephony but has also been deployed for data-centric services.</t><t>DECT ULE is a recent addition to the DECT interface primarily intended for low-bandwidth, low-power applications such as sensor devices, smart meters, home automation, etc.  As the DECT ULE interface inherits many of the capabilities from DECT, it benefits from operation that is long-range and interference-free, worldwide- reserved frequency band, low silicon prices, and maturity.  There is an added value in the ability to communicate with IPv6 over DECT ULE, such as for Internet of Things applications.</t><t>This document describes how IPv6 is transported over DECT ULE using IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) techniques.</t></abstract>
</front>
<seriesInfo name='RFC' value='8105'/>
<seriesInfo name='DOI' value='10.17487/RFC8105'/>
</reference>



<reference  anchor="RFC8163" target='https://www.rfc-editor.org/info/rfc8163'>
<front>
<title>Transmission of IPv6 over Master-Slave/Token-Passing (MS/TP) Networks</title>
<author initials='K.' surname='Lynn' fullname='K. Lynn' role='editor'><organization /></author>
<author initials='J.' surname='Martocci' fullname='J. Martocci'><organization /></author>
<author initials='C.' surname='Neilson' fullname='C. Neilson'><organization /></author>
<author initials='S.' surname='Donaldson' fullname='S. Donaldson'><organization /></author>
<date year='2017' month='May' />
<abstract><t>Master-Slave/Token-Passing (MS/TP) is a medium access control method for the RS-485 physical layer and is used primarily in building automation networks.  This specification defines the frame format for transmission of IPv6 packets and the method of forming link-local and statelessly autoconfigured IPv6 addresses on MS/TP networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='8163'/>
<seriesInfo name='DOI' value='10.17487/RFC8163'/>
</reference>



<reference anchor="I-D.ietf-6lo-nfc">
<front>
<title>Transmission of IPv6 Packets over Near Field Communication</title>

<author initials='Y' surname='Choi' fullname='Younghwan Choi'>
    <organization />
</author>

<author initials='Y' surname='Hong' fullname='Yong-Geun Hong'>
    <organization />
</author>

<author initials='J' surname='Youn' fullname='Joo-Sang Youn'>
    <organization />
</author>

<author initials='D' surname='Kim' fullname='Dongkyun Kim'>
    <organization />
</author>

<author initials='J' surname='Choi' fullname='JinHyeock Choi'>
    <organization />
</author>

<date month='August' day='23' year='2020' />

<abstract><t>Near Field Communication (NFC) is a set of standards for smartphones and portable devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than 10 cm apart.  NFC standards cover communications protocols and data exchange formats, and are based on existing radio-frequency identification (RFID) standards including ISO/IEC 14443 and FeliCa. The standards include ISO/IEC 18092 and those defined by the NFC Forum.  The NFC technology has been widely implemented and available in mobile phones, laptop computers, and many other devices.  This document describes how IPv6 is transmitted over NFC using 6LoWPAN techniques.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-6lo-nfc-17' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-6lo-nfc-17.txt' />
</reference>



<reference anchor="I-D.ietf-6lo-plc">
<front>
<title>Transmission of IPv6 Packets over PLC Networks</title>

<author initials='J' surname='Hou' fullname='Jianqiang Hou'>
    <organization />
</author>

<author initials='B' surname='Liu' fullname='Bing Liu'>
    <organization />
</author>

<author initials='Y' surname='Hong' fullname='Yong-Geun Hong'>
    <organization />
</author>

<author initials='X' surname='Tang' fullname='Xiaojun Tang'>
    <organization />
</author>

<author initials='C' surname='Perkins' fullname='Charles Perkins'>
    <organization />
</author>

<date month='October' day='28' year='2020' />

<abstract><t>Power Line Communication (PLC), namely using the electric-power lines for indoor and outdoor communications, has been widely applied to support Advanced Metering Infrastructure (AMI), especially smart meters for electricity.  The inherent advantage of existing electricity infrastructure facilitates the expansion of PLC deployments, and moreover, a wide variety of accessible devices raises the potential demand of IPv6 for future applications.  This document describes how IPv6 packets are transported over constrained PLC networks, such as ITU-T G.9903, IEEE 1901.1 and IEEE 1901.2.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-6lo-plc-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-6lo-plc-05.txt' />
</reference>



<reference  anchor="RFC8724" target='https://www.rfc-editor.org/info/rfc8724'>
<front>
<title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
<author initials='A.' surname='Minaburo' fullname='A. Minaburo'><organization /></author>
<author initials='L.' surname='Toutain' fullname='L. Toutain'><organization /></author>
<author initials='C.' surname='Gomez' fullname='C. Gomez'><organization /></author>
<author initials='D.' surname='Barthel' fullname='D. Barthel'><organization /></author>
<author initials='JC.' surname='Zúñiga' fullname='JC. Zúñiga'><organization /></author>
<date year='2020' month='April' />
<abstract><t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t><t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t><t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t><t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t></abstract>
</front>
<seriesInfo name='RFC' value='8724'/>
<seriesInfo name='DOI' value='10.17487/RFC8724'/>
</reference>



<reference  anchor="RFC3775" target='https://www.rfc-editor.org/info/rfc3775'>
<front>
<title>Mobility Support in IPv6</title>
<author initials='D.' surname='Johnson' fullname='D. Johnson'><organization /></author>
<author initials='C.' surname='Perkins' fullname='C. Perkins'><organization /></author>
<author initials='J.' surname='Arkko' fullname='J. Arkko'><organization /></author>
<date year='2004' month='June' />
<abstract><t>This document specifies a protocol which allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3775'/>
<seriesInfo name='DOI' value='10.17487/RFC3775'/>
</reference>



<reference  anchor="RFC2101" target='https://www.rfc-editor.org/info/rfc2101'>
<front>
<title>IPv4 Address Behaviour Today</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter'><organization /></author>
<author initials='J.' surname='Crowcroft' fullname='J. Crowcroft'><organization /></author>
<author initials='Y.' surname='Rekhter' fullname='Y. Rekhter'><organization /></author>
<date year='1997' month='February' />
<abstract><t>The main purpose of this note is to clarify the current interpretation of the 32-bit IP version 4 address space, whose significance has changed substantially since it was originally defined.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='2101'/>
<seriesInfo name='DOI' value='10.17487/RFC2101'/>
</reference>



<reference  anchor="RFC7094" target='https://www.rfc-editor.org/info/rfc7094'>
<front>
<title>Architectural Considerations of IP Anycast</title>
<author initials='D.' surname='McPherson' fullname='D. McPherson'><organization /></author>
<author initials='D.' surname='Oran' fullname='D. Oran'><organization /></author>
<author initials='D.' surname='Thaler' fullname='D. Thaler'><organization /></author>
<author initials='E.' surname='Osterweil' fullname='E. Osterweil'><organization /></author>
<date year='2014' month='January' />
<abstract><t>This memo discusses architectural implications of IP anycast and provides some historical analysis of anycast use by various IETF protocols.</t></abstract>
</front>
<seriesInfo name='RFC' value='7094'/>
<seriesInfo name='DOI' value='10.17487/RFC7094'/>
</reference>




    </references>


<!-- 

# Change Log

**NOTES**: Please remove this section prior to publication of a final version of this document.

TBD.

# Acknowledgments
{:numbered="false"}

Here is Acknowledgements.

-->



  </back>

<!-- ##markdown-source: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-->

</rfc>

