<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.7.0) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jia-intarea-internet-addressing-gap-analysis-02" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="Gap Analysis in Internet Addressing">Gap Analysis in Internet Addressing</title>
    <seriesInfo name="Internet-Draft" value="draft-jia-intarea-internet-addressing-gap-analysis-02"/>
    <author initials="Y." surname="Jia" fullname="Yihao Jia">
      <organization abbrev="Huawei">Huawei Technologies Co., Ltd</organization>
      <address>
        <postal>
          <street>156 Beiqing Rd.</street>
          <city>Beijing</city>
          <code>100095</code>
          <country>P.R. China</country>
        </postal>
        <email>jiayihao@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="P." surname="Mendes" fullname="Paulo Mendes">
      <organization abbrev="Airbus">Airbus</organization>
      <address>
        <postal>
          <street>Willy-Messerschmitt Strasse 1</street>
          <city>Munich</city>
          <code>81663</code>
          <country>Germany</country>
        </postal>
        <email>paulo.mendes@airbus.com</email>
      </address>
    </author>
    <author initials="N." surname="Shenoy" fullname="Nirmala Shenoy">
      <organization abbrev="R.I.T.">Rochester Institute of Technology</organization>
      <address>
        <postal>
          <street/>
          <city>New-York</city>
          <code>14623</code>
          <country>USA</country>
        </postal>
        <email>nxsvks@rit.edu</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization abbrev="IMT-Atlantique">IMT-Atlantique</organization>
      <address>
        <postal>
          <pobox>2 rue de la Chataigneraie</pobox>
          <street>CS 17607</street>
          <city>Cesson-Sevigne Cedex</city>
          <code>35576</code>
          <country>France</country>
        </postal>
        <email>laurent.toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="A. Y." surname="Chen" fullname="Abraham Y. Chen">
      <organization abbrev="Avinta">Avinta Communications, Inc.</organization>
      <address>
        <postal>
          <street>142 N. Milpitas Blvd.</street>
          <city>Milpitas, CA</city>
          <code>95035-4401</code>
          <country>USA</country>
        </postal>
        <email>AYChen@Avinta.com</email>
      </address>
    </author>
    <author initials="D." surname="Farinacci" fullname="Dino Farinacci">
      <organization abbrev="lispers.net">lispers.net</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>farinacci@gmail.com</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>There exist many extensions to Internet addressing, as it is defined in <xref target="RFC0791"/> for IPv4 and <xref target="RFC8200"/> for IPv6, respectively. Those extensions have been developed to fill gaps in capabilities beyond the basic properties of Internet addressing. This document outlines those properties as a baseline against which the extensions are categorized in terms of methodology used to fill the gap together with examples of solutions doing so.</t>
      <t>While introducing such extensions, we outline the issues we see with those extensions. This ultimately leads to consider whether or not a more consistent approach to tackling the identified gaps, beyond point-wise extensions as done so far, would be beneficial. The benefits are the ones detailed in the companion document <xref target="I-D.jia-intarea-scenarios-problems-addressing"/>, where, leveraging on the gaps identified in this memo and scenarios provided in <xref target="I-D.jia-intarea-scenarios-problems-addressing"/>, a clear problem statement is provided.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="SEC_intro">
      <name>Introduction</name>
      <t><xref target="I-D.jia-intarea-scenarios-problems-addressing"/> outlines scenarios and problems in Internet addressing through presenting a number of cases of communication that have emerged over the many years of utilizing the Internet and for which various extensions to the network interface-centric addressing of IPv6 have been developed. In order to continue the discussion on the emerging needs for addressing, initiated with <xref target="I-D.jia-intarea-scenarios-problems-addressing"/>, this memo aims at identifying gaps between the Internet addressing model and desirable features that have been added by various extensions, in various contexts.</t>
      <t>The approach to identifying the gaps is guided by key properties of Internet addressing, outlined in <xref target="SEC_properties"/>, namely (i) the fixed length of the IP addresses, (ii) the ambiguity of IP addresses semantic, while still (iii) providing limited IP address semantic support. Those properties are derived directly as a consequence of the respective standards that provide the basis for Internet addressing, most notably <xref target="RFC0791"/> for IPv4 and <xref target="RFC8200"/> for IPv6, respectively.</t>
      <t>Those basic properties, and the potential issues that arise from those properties, give way to extensions that have been proposed over the course of deploying new Internet technologies. <xref target="SEC_extensions"/> discusses those extensions, summarized as gaps against the basic properties in <xref target="SEC_overview"/>.</t>
      <t>Finally, this memo outlines issues that arise with the extension-driven approach to the basic Internet addressing, discussed in <xref target="SEC_issues"/>, arguing that any requirements for solutions that would revise the basic Internet addressing would require to address those issues.</t>
    </section>
    <section anchor="SEC_properties">
      <name>Properties of Internet Addressing</name>
      <t>As the Internet Protocol adoption has grown towards the global communication system we know today, its characteristics have evolved subtly, with <xref target="RFC6250"/> documenting various aspects of the IP service model and its frequent misconceptions, including Internet addressing. In this section, the three most acknowledged properties related to <em>Internet addressing</em> are detailed. Those are (i) fixed IP address length, (ii) ambiguous IP address semantic, and (iii) limited IP address semantic support.</t>
      <t><xref target="SEC_extensions"/> elaborates on various extensions that aim to expand Internet addressing beyond those properties; those extensions are positioned as intentions to close perceived gaps against those key properties.</t>
      <!-- [LI]: We did the hell of a job in defining the properties ;-) -->

<section anchor="SEC_properties_1">
        <name>Property 1: Fixed Address Length</name>
        <t>The fixed IP address length is specified as a key property of the design of Internet addressing, with 32 bits for IPv4 (<xref target="RFC0791"/>), and 128 bits for IPv6 (<xref target="RFC8200"/>), respectively. Given the capability of the hardware at the time of IPv4 design, a fixed length address was considered as a more appropriate choice for efficient packet forwarding. Although the address length was once considered to be variable during the design of Internet Protocol Next Generation ("IPng", cf., <xref target="RFC1752"/>) in the 1990s, it finally inherited the design of IPv4 and adopted a fixed length address towards the current IPv6. As a consequence, the 128-bit fixed address length of IPv6 is regarded as a balance between fast forwarding (i.e., fixed length) and practically boundless cyberspace (i.e., enabled by using 128-bit addresses).</t>
      </section>
      <section anchor="SEC_properties_2">
        <name>Property 2: Ambiguous Address Semantic</name>
        <t>Initially, the meaning of an IP address has been to identify an interface on a network device, although, when <xref target="RFC0791"/> was written, there were no explicit definitions of the IP address semantic.</t>
        <t>With the global expansion of the Internet protocol, the semantic of the IP address is commonly believed to contain at least two notions, i.e., the explicit 'locator', and the implicit 'identifier'. Because of the increasing use of IP addresses to both identify a node and to indicate the physical or virtual location of the node, the intertwined address semantics of identifier and locator was then gradually observed and first documented in <xref target="RFC2101"/> as 'locator/identifier overload' property. With this, the IP address is used as an identification for host and server, very often directly used, e.g., for remote access or maintenance.</t>
      </section>
      <section anchor="SEC_properties_3">
        <name>Property 3: Limited Address Semantic Support</name>
        <t>Although IPv4 <xref target="RFC0791"/> did not add any semantic to IP addresses beyond interface identification (and location), time has proven that additional semantics are desirable (c.f., the history of 127/8 <xref target="HISTORY127"/> or the introduction of private addresses <xref target="RFC1918"/>), hence, IPv6 <xref target="RFC4291"/> introduced some form of additional semantics based on specific prefix values, for instance link-local addresses or a more structured multicast addressing. Nevertheless, systematic support for rich address semantics remains limited and basically prefix-based.</t>
      </section>
    </section>
    <section anchor="SEC_extensions">
      <name>Filling Gaps through Extensions to Internet Addressing Properties</name>
      <t>Over the years, a plethora of extensions has been proposed in order to move beyond the native properties of IP addresses, outlined in the previous section. The development of those extensions can be interpreted as filling gaps between the original properties of Internet addressing and desired new capabilities that those developing the extensions identified as being missing and yet needed and desirable.</t>
      <section anchor="length-extensions">
        <name>Length Extensions</name>
        <t>Extensions in this subsection aim at extending the property described in <xref target="SEC_properties_1"/>, i.e., the fixed IP address length.</t>
        <t>When IPv6 was designed, the main objective was to create an address space that would not lead to the same situation as IPv4, namely to address exhaustion. To this end, while keeping the same addressing model like IPv4, IPv6 adopted a 128-bit address length with the aim of providing a sufficient and future-proof address space. The choice was also founded on the assumption that advances in hardware and Moore's law would still allow to make routing and forwarding faster, and the IPv6 routing table manageable.</t>
        <t>We observe, however, that the rise of new use cases but also the number of new, e.g., industrial/home or small footprint devices, was possibly unforeseen. Sensor networks and more generally the Internet of Things (IoT) emerged after the core body of work on IPv6, thus different from IPv6 assumptions, 128-bit addresses were costly in certain scenarios. On the other hand, given the huge investments that IPv6 deployment involved, certain solutions are expected to increase the addressing space of IPv4 in a compatible way, and thus extend the lifespan of the sunk investment on IPv4.</t>
        <!-- new use cases emerged, where addresses even bigger than 128-bit are useful, like in the context of content centric networks, structured addresses, or cryptographically generated addresses. -->

<t>At the same time, it may also be possible to use variable and longer address lengths to address current networking demands. For example in content delivery networks, longer addresses such as URLs are required to fetch content, an approach that Information-Centric Networking (ICN) applied for any data packet sent in the network, using information-based addressing at the network layer. Furthermore, as an approach to address the routing challenges faced in the Internet, structured addresses may be used in order to avoid the need for routing protocols. Using variable length addresses allow as well to have shorter addresses. So for requirements for smaller network layer headers, shorter addresses could be used, maybe alleviating the need to compress other fields of the header. Furthermore, transport layer port numbers can be considered short addresses, where the high order bits of the extended address is the public IP of a NAT. Hence, in IoT deployments, the addresses of the  devices can be really small and based on the port number, but they all share the global address of the gateway to make each one have a globally unique address.</t>
        <!-- LUIGI: I think the following paragraph overlaps the end of the previous and goes too much in
Further, as an approach to address the routing challenges such as scalability, stability, and the complex interworking between OSPF, eBGP and iBGP faced in the Internet, structured addresses may be used, limiting (or avoiding) the need for routing protocols overall.
-->

<section anchor="shorter-address-length">
          <name>Shorter Address Length</name>
          <section anchor="description">
            <name>Description:</name>
            <t>In the context of IoT <xref target="RFC7228"/>, where bandwidth and energy are very scarce resources, the static length of 128-bit for an IP address is more a hindrance than a benefit since 128-bit for an IP address may occupy a lot of space, even to the point of being the dominant part of a packet. In order to use bandwidth more efficiently and use less energy in end-to-end communication, solutions have been proposed that allow for very small network layer headers instead.</t>
          </section>
          <section anchor="methodology">
            <name>Methodology:</name>
            <ul spacing="normal">
              <li>Header Compression/Translation:
One of the main approaches to reduce header size in the IoT context is by compressing it. Such technique is based on a stateful approach, utilizing what is usually called a 'context' on the IoT sensor and the gateway for communications between an IoT device and a server placed somewhere in the Internet - from the edge to the cloud.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>The role of the 'context' is to provide a way to 'compress' the original IP header into a smaller one, using shorter address information and/or dropping some field(s); the context here serves as a kind of dictionary.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Separate device from locator identifier:
Approaches that can offer customized address length that is adequate for use in such constrained domains are preferred. Using different namespaces for the 'device identifier' and the 'routing' or 'locator identifier' is one such approach.</li>
            </ul>
          </section>
          <section anchor="examples">
            <name>Examples</name>
            <ul spacing="normal">
              <li>Header Compression/Translation:
Considering one base station is supposed to serve hundreds of user devices, maximizing the effectiveness for specific spectrum directly improves user quality of experience. To achieve the optimal utilization of the spectrum resource in the wireless area, the RObust Header Compression (ROHC) <xref target="RFC5795"/> mechanism, which has been widely adopted in cellar network like WCDMA, LTE, and 5G, utilizes header compression to shrink existing IPv6 headers onto shorter ones.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>Similarly, header compression techniques for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) have been around for several years now, constituting a main example of using the notion of a 'shared context' in order to reduce the size of the network layer header (<xref target="RFC6282"/>, <xref target="RFC7400"/>, <xref target="ITU9959"/>). More recently, other compression solutions have been proposed for Low Power Wide Area Networks (LPWAN - <xref target="RFC8376"/>). Among them, the Static Context Header Compression (SCHC - <xref target="RFC8724"/>) generalized the compression mechanism developed by 6lo. Instead of a standard compression behavior implemented in all 6lo nodes, SCHC introduces the notion of rule shared by two nodes. The SCHC compression technique is generic and can be applied to IPv6 and above layers.  Regarding the nature of the traffic, IPv6 addresses (source and destination) can be elided, partially sent, or replaced by a small index. Instead of the versatile IP packet, SCHC defines new packet formats dedicated to specific applications. SCHC rules are equivalence functions mapping this format to standard IP packets.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Also, constraints coming from either devices or carrier links would lead to mixed scenarios and compound requirements for extraordinary header compression. For native IPv6 communications on DECT ULE and MS/TP Networks <xref target="RFC6282"/>, dedicated compression mechanisms are specified in <xref target="RFC8105"/> and <xref target="RFC8163"/>, while the transmission of IPv6 packets over NFC and PLC, specifications are being developed in <xref target="I-D.ietf-6lo-nfc"/> and <xref target="I-D.ietf-6lo-plc"/>.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Separate device from locator identifier:
Solutions such as proposed in <xref target="EIBP"/> and <xref target="I-D.ietf-lisp-rfc6830bis"/> can utilize a separation of device from locator, where only the latter is used for routing between the different domains using the same technology, therefore enabling the use of shorter addresses in the (possibly constrained) local environment. Device IDs used within such domains are carried as part of the payload by EIBP and hence can be of shorter size suited to the domain, while, for instance, in LISP a flexible address encoding <xref target="RFC8060"/> allows shorter addresses to be supported in the LISP control plane <xref target="I-D.ietf-lisp-rfc6833bis"/>.</li>
            </ul>
          </section>
        </section>
        <section anchor="SEC_longer-addr">
          <name>Longer Address Length</name>
          <!-- #### Description

To address current networking demands, it may be preferred to use variable and longer address lengths. For example in content delivery networks, longer addresses such as URLs are required to fetch content, an approach that Information-Centric Networking (ICN) applied for any data packet sent in the network, using information-based addressing at the network layer. Further, as an approach to address the routing challenges faced in the Internet, structured addresses may be used, avoiding the need for routing protocols.

Further, as an approach to address the routing challenges such as scalability, stability, and the complex interworking between OSPF, eBGP and iBGP faced in the Internet, structured addresses may be used, limiting (or avoiding) the need for routing protocols overall.

#### Methodology

The crucial need for longer address lengths comes from *semantic extensions* to IP addresses, where the extensions themselves do not fit within the length limitation of the IP address. {{SEC:semantic_extensions}} discusses those extensions, divided into those where limitations stemming from the IP address lengths are considered and those where information is either represented through a longer address and/or additional header information.

#### Examples

See {{SEC:semantic_extensions}} for examples of solutions that consider extended address and header information to represent extended semantics that are not limited by the IP address length.

 -->

<section anchor="description-1">
            <name>Description</name>
            <t>Historically, obtaining adequate address space is considered as the primary and raw motivation to invent IPv6.
Longer address (more than 32-bit of IPv4 address), which can accommodate almost inexhaustible devices, used to be considered as the surest direction in 1990s. Nevertheless, to protect the sunk cost of IPv4 deployment, certain efforts focus on IPv4 address space depletion question but engineer IPv4 address length in a more practical way. Such effort, i.e., NAT (Network Address Translation), unexpectedly and significantly slows IPv6 deployment because of its high cost-effectiveness in practice.</t>
            <t>Another crucial need for longer address lengths comes from "semantic extensions" to IP addresses, where the extensions themselves do not fit within the length limitation of the IP address. <xref target="SEC_semantic_extensions"/> discusses extensions which extend address semantics that are not limited by the IP address length.</t>
            <t>This sub-section focuses on address length extensions that aim at reducing the IPv4 addresses depletion, while <xref target="SEC_semantic_extensions"/>, i.e., address sematic extensions, may still refer to extensions when longer address length are suitable to accommodate different address semantic. See <xref target="SEC_semantic_extensions"/> for details of sematic-driven address lengthening.</t>
          </section>
          <section anchor="methodology-1">
            <name>Methodology</name>
            <ul spacing="normal">
              <li>Split address zone by network realm:
This methodology first split the network realm into two types: one public realm (i.e., the Internet), and innumerable private realms (i.e., local networks, which may be embedded and/or having different scope). Then, it splits the IP address space into two type of zones: global address zone (i.e., public address) and local address zone (e.g., private address, reserved address). Based on this, it is assumed that in public realm, all devices attached to it should be assigned an address that belongs to the global address zone. While for devices attached to private realms, only addresses belonging to the local address zone will be assigned. Local realms may have different scope or even be embedded one in another, like for instance, light switches local network being part of the building local network, which in turn connects to the Internet. 
In the local realms address may have a pure identification purpose. For instance in last example, addresses of the light switches identify the switches themselves, while the building local network is used to locate them.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>Given that the local address zone is not globally unique, certain mechanisms are designed to express the relationship between the global address zone (in public realm) and the local address zone (in any private realm). In this case, global addresses are used for forwarding when a packet is in the public realm, and local addresses are used for forwarding when a packet is in a private realms.</t>
              </li>
            </ul>
          </section>
          <section anchor="examples-1">
            <name>Examples</name>
            <ul spacing="normal">
              <li>Split address zone by network realm:
Network Address Translation (NAT), which was first laid out in <xref target="RFC2663"/>, using private address and a stateful address binding to translate between the realms. As outlined in <xref target="RFC2663"/>, basic address translation is usually extended to include port number information in the translation process, supporting bidirectional or simple outbound traffic only. Because the 16-bits port number is used in the address translation, NAT theoretically increase IPv4 address length from 32-bit to 48-bit, i.e., 281 trillion address space. 
<!-- LI: NAT is not really transparent. It break things. Better avoiding this statement. But added the transparent property to EzIP below.
Given that NAT is transparent as a middle-box solution, it is friendly for increasing deployment and quickly implemented as global best practice.
-->
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Similarly, EzIP <xref target="EzIP"/> expects to utilize a reserved address block, i.e., 240/4, and an IPv4 header option to include it. Based on this, it can be regarded as EzIP is carrying a hierarchical address with two parts, where each part is a partial 32-bit IPv4 address. The first part is a public address residing in the "address field" of the header from globally routable IPv4 pool <xref target="IPv4pool"/>, i.e., ca. 3.84 billion address space. The second part is the reserved address residing in "option field" and belongs to the 240/4 prefix, i.e., ca. 2^28=268 million. Based on that, each EzIP deployment is tethered on the existing Internet via one single IPv4 address, and EzIP then have 3.84B * 268M address, ca. 1,000,000 trillion. Collectively, the 240/4 can also be used as end point identifier and form an overlay network providing services parallel to the current Internet, yet independent of the latter in other aspects.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Compared to NAT, EzIP is able to establish a communication session from either side of it, hence being completely transparent, and facilitating a full end-to-end networking configuration. 
<!-- However, explicit configuration is needed to enable the reserved 240/4 net-block and "IPv4 Option" function. -->
                </t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="summary">
          <name>Summary</name>
          <t><xref target="table_length"/> summarizes methodologies and examples towards filling gaps on IP address length extensions.</t>
          <table anchor="table_length">
            <name>Summary Length Extensions</name>
            <thead>
              <tr>
                <th align="left"> </th>
                <th align="left">Methodology</th>
                <th align="left">Examples</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Shorter Address Length</td>
                <td align="left">Header compression/translation</td>
                <td align="left">6LoWPAN, ROHC, SCHC</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Separate device from locator identifier</td>
                <td align="left">EIBP, LISP, ILNP, HIP</td>
              </tr>
              <tr>
                <td align="left">Longer Address Length</td>
                <td align="left">Split address zone by network realm</td>
                <td align="left">NAT, EzIP</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="identity-extensions">
        <name>Identity Extensions</name>
        <t>Extensions in this subsection attempt extending the property described in <xref target="SEC_properties_2"/>, i.e., 'locator/identifier overload' of the ambiguous address semantic.</t>
        <t>From the perspective of Internet users, on the one hand, the implicit identifier semantic results in a privacy issue due to network behavior tracking and association. Despite that IP address assignments may be dynamic, they are nowadays considered as 'personal data' and as such undergoes privacy protection regulations like General Data Protection Regulation ("GDPR" <xref target="GDPR"/>). Hence, additional mechanisms are necessary in order to protect end user privacy.</t>
        <t>For network regulation of sensitive information, on the other hand, dynamically allocated IP addresses are not sufficient to guarantee device or user identification. As such, different address allocation systems, with stronger identification properties are necessary where security and authentication are at highest priority. Hence, in order to protect information security within a network, additional mechanism are necessary to identify the users or the devices attached to the network.</t>
        <section anchor="anonymous-address-identity">
          <name>Anonymous Address Identity</name>
          <!-- 
- Seeking Input/Feedback from:  
  - Abram Y. Chen
  - Tom Hebert

This section was present in previous revision of the drafts.
Anything you believe should be added?
-->

<section anchor="description-2">
            <name>Description</name>
            <t>As discussed in <xref target="SEC_properties_2"/>, IP addresses reveal both 'network locations' as well as implicit 'identifier' information to both traversed network elements and destination nodes alike. This enables recording, correlation, and profiling of user behaviors and historical network traces, possibly down to individual real user identity. The IETF, e.g., in <xref target="RFC7258"/>, has taken a clear stand on preventing any such pervasive monitoring means by classifying them as an attack on end users' right to be left alone (i.e., privacy). Regulations such as the EU's General Data Protection Regulation (GDPR) classifies, for instance, the 'online identifier' as personal data which must be carefully protected; this includes end users' IP addresses <xref target="GDPR"/>.</t>
            <t>Even before pervasive monitoring <xref target="RFC7258"/>, IP addresses have been seen as something that some organizational owners of networked system may not want to reveal at the individual level towards any non-member of the same organization. Beyond that, if forwarding is based on semantic extensions, like other fields of the header, extension headers, or any other possible extension, if not adequately protected it may introduce privacy leakage and/or new attack vectors.</t>
          </section>
          <section anchor="methodology-2">
            <name>Methodology:</name>
            <ul spacing="normal">
              <li>Traffic Proxy:
Detouring the traffic to a trusted proxy is a heuristic solution. Since nodes between trusted proxy and destination (including the destination per se) can only observe the source address of the proxy, the 'identification' of the origin source can thereby be hidden. To obfuscate the nodes between origin and the proxy, the traffic on such route would be encrypted via a key negotiated either in-band or off-band. Considering that all applications' traffic in such route can be seen as a unique flow directed to the same 'unknown' node, i.e., the trusted proxy, eavesdroppers in such route have to make more efforts to correlate user behavior through statistical analysis even if they are capable of identifying the users via their source addresses. The protection lays in the inability to isolate single application specific flows. According to the methodology, such approach is IP version independent and works for both IPv4 and IPv6.</li>
              <li>Source Address Rollover:
Privacy issues related to address 'identifier' semantic can be mitigated through regular change (beyond the typical 24 hours lease of DHCP).
Due to the semantics of 'identifier' that an IP address carries, such approach promotes to change the source IP address at a certain frequency. Under such methodology, the refresh cycling window may reach to a balance between privacy protection and address update cost. Due to the limited space that IPv4 contains, such approach usually works for IPv6 only.</li>
              <li>Private Address Spaces:
Their introduction in <xref target="RFC1918"/> foresaw private addresses (assigned to specific address spaces by the IANA) as a means to communicate purely locally, e.g., within an enterprise, by separating private from public IP addresses. Considering that private addresses are never directly reachable from the Internet, hosts adopting private addresses are invisible and thus 'anonymous' for the Internet. Besides, hosts for purely local communication used the latter while hosts requiring public Internet service access would still use public IP addresses.</li>
              <li>Address Translation:
The aforementioned original intention for using private IP addresses, namely for purely local communication, resulted in a lack of flexibility in changing from local to public Internet access on the basis of what application would require which type of service.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>If eventually every end-system in an organization would require some form of public Internet access in addition to local one, an adequate number of public Internet addresses would be required for providing to all end systems. Instead, address translation enables to utilize many private IP addresses within an organization, while only relying on one (or few) public IP addresses for the overall organization.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>In principle, address translation can be applied recursively. This can be seen in modern broadband access where Internet providers may rely on carrier-grade address translation for all their broadband customers, who in turn employ address translation of their internal home or office addresses to those (private again) IP addresses assigned to them by their network provider.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Two benefits arise from the use of (private to public IP) address translation, namely (i) the hiding of local end systems at the level of the (address) assigned organization, and (ii) the reduction of public IP addresses necessary for communication across the Internet. While the latter has been seen for long as a driver for address translation, we focus on the first issue in this section, also since we see such privacy benefit as well as objective as still being valid in addressing systems like IPv6 where address scarcity is all but gone <xref target="GNATCATCHER"/>.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Separate device from locator identifier:
Solutions that make a clear separation between the routing locator and the identifier, can allow for a device ID of any size, which in turn can be encrypted by a network element deployed at the border of routing domain (e.g.,  access/edge router). Both source and end-domain addresses can be encrypted and transported, as in the routing domain, only the routing locator is used.</li>
            </ul>
          </section>
          <section anchor="examples-2">
            <name>Examples:</name>
            <ul spacing="normal">
              <li>Traffic Proxy:
Although not initially designed as a traffic proxy approach, a Virtual Private Network (VPN <xref target="VPN"/>) is widely utilized for packets origin hiding as a traffic detouring methodology. As it evolved, VPN derivatives like WireGuard <xref target="WireGuard"/> have become a mainstream instance for user privacy and security enhancement.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>With such methodology in mind, onion routing <xref target="ONION"/>, instantiated in the  TOR Project <xref target="TOR"/>, achieves high anonymity through traffic hand over via intermediates, before reaching the destination. Since the architecture of TOR requires at least three proxies, none of them is aware of the entire route. Given that the proxies themselves can be deployed all over cyberspace, trust is not the prerequisite if proxies are randomly selected.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>In addition, dedicated protocols are also expected to be customized for privacy improvement via traffic proxy. For example, Oblivious DNS over HTTPS (ODoH <xref target="ODoH"/>) use a third-party proxy to obscure identifications of user source addresses during DNS over HTTPS (DoH <xref target="RFC8484"/>) resolution. Similarly, Oblivious HTTP <xref target="OHTTP"/> involve proxy alike in the HTTP environment.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Source Address Rollover:
As for source address rollover, it has been standardized that IP addresses for Internet users should be dynamic and temporary every time they are being generated <xref target="RFC8981"/>. This benefits from the available address space in the case of IPv6, through which address generation or assignment should be unpredictable and stochastic for outside observers.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>More radically, <xref target="EPHEMERALv6"/> advocates an 'ephemeral address', changing over time,  for each process. Through this, correlating user behaviors conducted by different identifiers (i.e., source address) becomes much harder, if not impossible, if based on the IP packet header alone.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Private Addresses:
The use and assignment of private addresses for IPv4 is laid out in <xref target="RFC1918"/>, while unique local addresses (ULAs) in IPv6 <xref target="RFC4193"/> take over the role of private address spaces in IPv4.</li>
              <li>Network Address Translation:
<!-- The translation from one IP address realm into another is laid out in {{RFC2663}}, using a stateful address binding to translate between the realms, e.g., from a private into a public address space. As outlined in {{RFC2663}}, basic address translation is usually extended to include port information in the translation process, support bidirectional or simple outbound traffic only.  -->
Given address translation can be performed several times in cascade, NATs may exist as part of existing customer premise equipment (CPE), such as a cable or an Ethernet router, with private wired/wireless connectivity, or may be provided in a carrier environment to further translate ISP-internal private addresses to a pool of (assigned) public IP addresses. The latter is often dynamically assigned to CPEs during its bootstrapping.</li>
              <li>Separate device from locator identifier:
EIBP <xref target="EIBP"/> utilizes a structured approach to addressing. It separates the routing ID from the device ID, where only the former is used for routing. As such, the device IDs can be encrypted, protecting the end device identity. Similarly, LISP uses separate namespaces for routing and identification allowing to 'hide' identifiers in encrypted LISP packets that expose only known routing information <xref target="RFC8061"/>.</li>
            </ul>
          </section>
        </section>
        <section anchor="authenticated-address-identity">
          <name>Authenticated Address Identity</name>
          <section anchor="description-3">
            <name>Description</name>
            <t>In some scenarios (e.g., corporate networks) it is desirable to being able authenticate IP addresses in order to prevent malicious attackers spoofing IP addresses. This is usually achieved by using a mechanism that allows to prove ownership of the IP address.</t>
          </section>
          <section anchor="methodology-3">
            <name>Methodology</name>
            <ul spacing="normal">
              <li>Self-certified addresses: 
This method is usually based on the use of nodes' public/private keys. A node creates its own interface ID (IID) by using a cryptographic hash of its public key (with some additional parameters). Messages are then signed using the nodes' private key. The destination of the message will verify the signature through the information in the IP address. Self-certification has the advantage that no third party or additional security infrastructure is needed. Any node can generate its own address locally and then only the address and the public key are needed to verify the binding between the public key and the address.</li>
              <li>Third party granted addresses: 
DHCP (Dynamic Host Configuration Protocol) is widely used to provide IP addresses, however, in its basic form, it does not perform any check and even an unauthorized user without the right to use the network can obtain an IP address. To solve this problem, a trusted third party has to grant access to the network before generating an address (via DHCP or other) that identifies the user. User authentication done securely either based on physical parameters like MAC addresses or based on an explicit login/password mechanism.</li>
            </ul>
          </section>
          <section anchor="examples-3">
            <name>Examples</name>
            <!-- [LI]: May adding some details to the following two paragraphs? -->
<!-- LUIGI Added text to clarify the paragraphs-->

<ul spacing="normal">
              <li>Self-certified Addresses:
As an example of this methodology serves <xref target="RFC3972"/>, defining IPv6 cryptographically Generated Addresses (CGA). A Cryptographically Generated Address is formed by replacing the least-significant 64 bits of an IPv6 address with the cryptographic hash of the public key of the address owner. Packets are then signed with the private key of the sender. Packets can be authenticate by the receiver by using the public key of the sender and the address of the sender. The original specifications have been already amended (cf., <xref target="RFC4581"/> and <xref target="RFC4982"/>) in order to support multiple (stronger) cryptographic algorithms.</li>
              <li>Third party granted addresses:
<xref target="RFC3118"/> defines a DHCP option through which authorization tickets can be generated and newly attached hosts with proper authorization can be automatically configured from an authenticated DHCP server. Solutions exist where separate servers are used for user authentication like <xref target="UA-DHCP"/> and <xref target="RFC4014"/>. The former proposing to enhance the DHCP system using registered user login and password before actually providing an IP address lease and recording the MAC address of the device the user used to sign-in. The latter, couples the RADIUS authentication protocol (<xref target="RFC2865"/>) with DHCP, basically piggybacking RADIUS attributes in a DHCP sub-option, with the DHCP server contacting the RADIUS server to authenticate the user.</li>
            </ul>
          </section>
        </section>
        <section anchor="summary-1">
          <name>Summary</name>
          <t><xref target="table_identity"/>, summarize the methodologies and the examples towards filling the gaps on identity extensions.</t>
          <table anchor="table_identity">
            <name>Summary Identity Extensions</name>
            <thead>
              <tr>
                <th align="left"> </th>
                <th align="left">Methodology</th>
                <th align="left">Examples</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Anonymous Address Identity</td>
                <td align="left">Traffic Proxy</td>
                <td align="left">VPN, TOR, ODoH</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Source Address Rollover</td>
                <td align="left">SLAAC</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Private Address Spaces</td>
                <td align="left">ULA</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Address Translation</td>
                <td align="left">NAT</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Separate device from locator identifier</td>
                <td align="left">EIBP, LISP</td>
              </tr>
              <tr>
                <td align="left">Authenticated Address Identity</td>
                <td align="left">Self-certified Addresses</td>
                <td align="left">CGA</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Third party granted addresses</td>
                <td align="left">DHCP-Option</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="SEC_semantic_extensions">
        <name>Semantic Extensions</name>
        <t>Extensions in this subsection try extending the property described in <xref target="SEC_properties_3"/>, i.e., limited address semantic support.</t>
        <t>As explained in <xref target="SEC_properties_2"/>, IP addresses carry both locator and identification semantic. Some efforts exist that try to separate these semantics either in different address spaces or through different address formats. Beyond just identification, location, and the fixed address size, other efforts extended the semantic through existing or additional header fields (or header options) outside the Internet address.</t>
        <!--
- Seeking Input/Feedback from:  
    - Geoff Huston
    - Dino Farinacci

Input/Feedback on the following paragraph (from the ML discussion)
-->
<t>How much unique and globally routable an address should be? With the effect of centralization, edges communicate with (rather) local DCs, hence a unique address globally routable is not a requirement anymore. There is no need to use globally unique addresses all the time for communication, however, there is the need of having a unique address as a general way to communicate to any connected entity without caring what transmission networks the packets traverse.</t>
        <section anchor="utilizing-extended-address-semantics">
          <name>Utilizing Extended Address Semantics</name>
          <section anchor="description-4">
            <name>Description</name>
            <t>Several extensions have been developed to extend beyond the limited IPv6 semantics. Those approaches may include to apply structure to the address, utilize specific prefixes, or entirely utilize the IPv6 address for different semantics, while re-encapsulating the original packet to restore the semantics in another part of the network. For instance, structured addresses have the capability to introduce delimiters to identify semantic information in the header, therefore not constraining any semantic by size limitations of the address fields.</t>
            <t>We note here that extensions often start out as being proposed as an extended header semantic, while standardization may drive the solution to adopt an approach to accommodate their semantic within the limitations of an IP address. This section does include examples of this kind.</t>
          </section>
          <section anchor="methodology-4">
            <name>Methodology</name>
            <t>*Semantic prefixes:
Semantic prefixes are used to separate the IPv6 address space. Through this, new address families, such as for information-centric networking <xref target="HICN"/>, service routing or other semantically rich addressing, can be defined, albeit limited by the prefix length and structure as well as the overall length limitation of the IPv6 address.</t>
            <ul spacing="normal">
              <li>Separate device/resource from locator identifier:
The option to use separate namespaces for the device address would  offer more freedom for the use of different semantics. For instance, the static binding of IP addresses to servers creates a strong binding between IP addresses and service/resources, which may be a limitation for large Content Distribution networks (CDNs) <xref target="FAYED21"/>.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>As an extreme form of separating resource from locator identifier, recent engineering approaches, described in <xref target="CLOUDFLARE_SIGCOMM"/>, decouple web service (semantics) from the routing address assignments by using virtual hosting capabilities, thereby effectively mapping possibly millions of services onto a single IP address.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Structured addressing:
One approach to address the routing challenges faced in the Internet is the use of structured addresses, e.g., to void the need for routing protocols. Benefits of this approach can be significant, with the structured addresses capturing the relative physical or virtual position of routers in the network as well as being variable in length. Key to the approach, however, is that the structured addresses capturing the relative physical or virtual position of routers in the network, or networks in an internetwork may not fit within the fixed and limited IP address length (cf., <xref target="SEC_longer-addr"/>). Other structured approaches may be the use of application-specific structured binary components for identification, generalizing URL schema used for HTTP-level communication but utilized at the network level for traffic steering decisions.</li>
              <li>Localized forwarding semantics:
Layer 2 hardware, such as SDN switches, are limited to the use of specific header fields for forwarding decisions. Hence, devising new localized forwarding mechanisms may be based on re-using differently existing header fields, such as the IPv6 source/destination fields, to achieve the desired forwarding behavior, while encapsulating the original packets in order to be restored at the local forwarding network boundary. Networks in those solutions are limited by the size of the utilized address field, e.g., 256 bits for IPv6, thereby limiting the way such techniques could be used.</li>
            </ul>
          </section>
          <section anchor="examples-4">
            <name>Examples</name>
            <ul spacing="normal">
              <li>Semantic prefixes:
Newer approaches to IP anycast suggest the use of service identification in combination with a binding IP address model <xref target="SFCANYCAST"/> as a way to allow for metric-based traffic steering decisions; approaches for Service Function Chaining (SFC) <xref target="RFC7665"/> utilize the Network Service Header (NSH) information and packet classification to determine the destination of the next service.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>Another example of the usage of different packet header extensions based on IP addressing is Segment Routing. In this case, the source chooses a path and encodes it in the packet header as an ordered list of segments. Segments are encoded using new Routing Extensions Header type, the Segment Routing Header (SRH), which contains the Segment List, similar to what is already specified in <xref target="RFC8200"/>, i.e., a list of segment ID (SID) that dictate the path to follow in the network. Such segment IDs are coded as 128 bit IPv6 addresses <xref target="RFC8986"/>.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>Approaches such as <xref target="HICN"/> utilize semantic prefixing to allow for ICN forwarding behavior within an IPv6 network. In this case, an HICN name is the hierarchical concatenation of a name prefix and a name suffix, in which the name prefix is encoded as an IPv6 128 bits word and carried in IPv6 header fields, while the name suffix is encoded in transport headers fields such as TCP. However, it is a challenge to determine which IPv6 prefixes should be used as name prefixes. In order to know which IPv6 packets should be interpreted based on an ICN semantic, it is desirable to be able to recognize that an IPv6 prefix is a name prefix, e.g. to define a specific address family (AF_HICN, b0001::/16). This establishment of a specific address family allows the management and control plane to locally configure HICN prefixes and announce them to neighbors for interconnection.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Separate device from locator identifier:
EIBP <xref target="EIBP"/> separates the routing locator from the device identifier, relaxing therefore any semantic constraints on the device identifier. Similarly, LISP uses a flexible encoding named LISP Canonical Address Format (LCAF <xref target="RFC8061"/>), which allows to associate to routing locators any possible form (and length) of identifier. ILNP <xref target="RFC6740"/> introduces as well a different semantic of IP addresses, while aligning to the IPv6 address format (128 bits). Basically, ILNP introduces a sharper logical separation between the 64 most significant bits and the 64 least significant bits of an IPv6 address. The former being a global locator, while the latter being an identifier that can have different semantics (rather than just being an interface identifier).</li>
              <li>Structured addressing:
Network topology captures the physical connectivity among devices in the network. There is a structure associated with the topology. Examples are the core-distribution-access router structure commonly used in enterprise networks and clos topologies that are used to provide multiple connections between Top of Rack (ToR) devices and multiple layers of spine devices. Internet service providers use a tier structure that defines their business relationships. A clear structure of connected networks can be noticed in the Internet. EIBP <xref target="EIBP"/> proposes to leverage the physical structure (or a virtual structure overlaid on the physical structure) to auto assign addresses to  routers in a network or networks in an internetwork to capture their relative position in the physical/virtual topology. EIBP proposes to administratively identify routers/networks  with a tier value based on the structure.</li>
              <li>Localized forwarding semantics:
Approaches such as those outlined in <xref target="REED"/> suggest using a novel forwarding semantic based on path information carried in the packet itself, said path information consists in a fixed size bit-field (see <xref target="REED"/> for more information on how to represent the path information in said bit-field). In order to utilize existing, e.g., SDN-based, forwarding switches, the direct use of the IPv6 source/destination address is suggested for building appropriate match-action rules (over the suitable binary information representing the local output ports), while preserving the original IPv6 information in the encapsulated packet. As mentioned above, such use of the existing IPv6 address fields limits the size of the network to a maximum of 256 bits (therefore paths in the network over which such packets can be forwarded). <xref target="ICNIP"/>, however, goes a step further by suggesting to use the local forwarding as direct network layer mechanism, removing the IP packet and only leaving the transport/application layer, with the path identifier constituting the network-level identifier albeit limited by using the existing IP header for backward compatibility reasons (the next section outlines the removal of this limitation).</li>
            </ul>
          </section>
        </section>
        <section anchor="utilizing-existing-or-extended-header-semantics">
          <name>Utilizing Existing or Extended Header Semantics</name>
          <section anchor="description-5">
            <name>Description:</name>
            <t>While the former sub-section explored extended address semantic, thereby limiting any such extended semantic with that of the existing IPv6 semantic and length, additional semantics may also be placed into the header of the packet or the packet itself, utilized for the forwarding decision to the appropriate endpoint according to the extended semantic.</t>
            <t>Reasons for embedding such new semantics may be related to traffic engineering since it has long been shown that the IP address itself is not enough to steer traffic properly since the IP address itself is not semantically rich enough to adequately describe the forwarding decision to be taken in the network, not only impacting WHERE the packet will need to go but also HOW it will need to be sent.</t>
          </section>
          <section anchor="methodology-5">
            <name>Methodology:</name>
            <ul spacing="normal">
              <li>In-Header extensions:
One way to add additional semantics besides the address fields is to use other fields already present in the header.</li>
              <li>Headers option extensions:
Another mechanism to add additional semantics is to actually add additional fields, e.g., through Header Options in IPv4 or through Extension Headers in IPv6.</li>
              <li>Re-encapsulation extension:
A more radical approach for additional semantics is the use of a completely new header that is designed so to carry the desired semantics in an efficient manner (often as a shim header).</li>
              <li>Structured addressing:
Similar to the methodology that structures addresses within the limitations of the IPv6 address length, outlined in the previous sub-sections, structured addressing can also be applied within existing or extended header semantics, e.g., utilizing a dedicated (extension) header to carry the structured address information.</li>
              <li>Localized forwarding semantics:
This set of solutions applies capabilities of newer (programmable) forwarding technology, such as <xref target="P4"/>, to utilize any header information for a localized forwarding decision. This removes any limitation to use existing header or address information for embedding a new address semantic into the transferred packet.</li>
            </ul>
          </section>
          <section anchor="examples-5">
            <name>Examples:</name>
            <ul spacing="normal">
              <li>In-Header extensions:
In order to allow additional semantic with respect to the pure Internet addressing, the original design of IPv4 included the field 'Type of Service' <xref target="RFC2474"/>, while IPv6 introduced the 'Flow label' and the 'Traffic Class' <xref target="RFC8200"/>. In a certain way, those fields can be considered 'semantic extensions' of IP addresses, and they are 'in-header' because natively present in the IP header (differently from options and extension headers). However, they proved not to be sufficient. Very often a variety of network operation are performed on the well-known 5-tuple (source and destination addresses; source and destination port number; and protocol number). In some contexts all of the above mentioned fields are used in order to have a very fine grained solution (<xref target="RFC8939"/>).</li>
              <li>Headers option extensions:
Header options have been largely under-exploited in IPv4. However, the introduction of the more efficient extension header model in IPv6 along with technology progress made the use of header extensions more widespread in IPv6. Segment Routing re-introduced the possibility to add path semantic to the packet by encoding a loosely defined source routing (<xref target="RFC8402"/>). Similarly, in the aim to overcome the inherent shortcoming of the multi-homing in the IP context, SHIM6 (<xref target="RFC5533"/>) also proposed the use of an extension header able to carry multi-homing information which cannot be accommodated natively in the IPv6 header.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>To serve a moving endpoint, mechanisms like Mobile IPv6 <xref target="RFC6275"/> are used for maintaining connection continuity by a dedicated IPv6 extension header. In such case, the IP address of the home agent in Mobile IPv6 is basically an identification of the on-going communication. In order to go beyond the interface identification model of IP, the Host Identity Protocol (HIP) tries to introduce an identification layer to provide (as the name says) host identification. The architecture here relies on the use of another type of extension header <xref target="RFC7401"/>.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Re-encapsulation extension:
Differently from the previous approach, re-encapsulation prepends complete new IP headers to the original packet introducing a completely custom shim header between the outer and inner header. This is the case for LISP, adding a LISP specific header right after an IP+UDP header (<xref target="I-D.ietf-lisp-rfc6830bis"/>). A similar design is used by VxLAN (<xref target="RFC7348"/>) and GENEVE (<xref target="RFC8926"/>), even if they are designed for a data center context. IP packets can also be wrapped with headers using more generic and semantically rich names, for instance with ICN <xref target="ICNIP"/>.</li>
              <li>Structured addressing:
Solutions such as those described in the previous sub-section, e.g., EIBP <xref target="EIBP"/>, can provide structured addresses that are not limited to the IPv6 address length but instead carry the information in an extension header to remove such limitation.</li>
            </ul>
            <ul empty="true">
              <li>
                <t>Also Information-Centric Networking (ICN) naming approaches usually introduce structures in the (information) names without limiting themselves to the IP address length; more so, ICN proposes its own header format and therefore radically breaks with not only IP addressing semantic but the format of the packet header overall. For this, approaches such as those described in <xref target="RFC8609"/> define a TLV-based binary application component structure that is carried as a 'name' part of the CCN messages. Such a name is a hierarchical structure for identifying and locating a data object, which contains a sequence of name components. Names are coded based on 2-level nested Type-Length-Value (TLV) encodings, where the name-type field in the outer TLV indicates this is a name, while the inner TLVs are name components including a generic name component, an implicit SHA-256 digest component and a SHA-256 digest of Interest parameters. For textual representation, URIs are normally used to represent names, as defined in <xref target="RFC3986"/>.</t>
              </li>
            </ul>
            <ul empty="true">
              <li>
                <t>In geographic addressing, position based routing protocols use the geographic location of nodes as their addresses, and packets are forwarded when possible in a greedy manner towards the destination. For this purpose, the packet header includes a field coding the geographic coordinates (x, y, z) of the destination node, as defined in <xref target="RFC2009"/>. Some proposals also rely on extra fields in the packet header to code the distance towards the destination, in which case only the geographic coordinates of neighbors are exchanged. This way the location of the destination is protected even if routing packets are eavesdropped.</t>
              </li>
            </ul>
            <ul spacing="normal">
              <li>Localized forwarding semantics:
Unlike the original suggestion in <xref target="REED"/> to use existing SDN switches, the proliferation of P4 <xref target="P4"/> opens up the possibility to utilize a locally limited address semantic, e.g., expressed through the path identifier, as an entirely new header (including its new address) with an encapsulation of the IP packet for E2E delivery (including further delivery outside the localized forwarding network or positioning the limited address semantic directly as the network address semantic for the packet, i.e., removing any IP packet encapsulation from the forwarded packet, as done in <xref target="ICNIP"/>. Removing the IPv6 address size limitation by not utilizing the existing IP header for the forwarding decision also allows for extensible length approaches for building the path identifier with the potential for increasing the supported network size. On the downside, this approach requires to encapsulate the original IP packet header for communication beyond the local domain in which the new header is being used, such as discussed in the previous point above on 're-encapsulation extension'.</li>
            </ul>
          </section>
        </section>
        <section anchor="summary-2">
          <name>Summary</name>
          <t><xref target="table_semantic"/>, summarize the methodologies and the examples towards filling the gaps on semantic extensions.</t>
          <table anchor="table_semantic">
            <name>Summary Semantic Extensions</name>
            <thead>
              <tr>
                <th align="left"> </th>
                <th align="left">Methodology</th>
                <th align="left">Examples</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Utilizing Extended Address Semantics</td>
                <td align="left">Semantic prefixes</td>
                <td align="left">HICN</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Separate device from locator identifier</td>
                <td align="left">EIBP, ILNP, LISP, HIP</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Structured addressing</td>
                <td align="left">EIBP, ILNP</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Localized forwarding semantics</td>
                <td align="left">REED</td>
              </tr>
              <tr>
                <td align="left">Utilizing Existing or Extended Header Semantics</td>
                <td align="left">In-Header extensions</td>
                <td align="left">DetNet</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Headers option extensions</td>
                <td align="left">SHIM6, SRv6, HIP</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Re-encapsulation extension</td>
                <td align="left">VxLAN, ICNIP</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Structured addressing</td>
                <td align="left">EIBP</td>
              </tr>
              <tr>
                <td align="left"> </td>
                <td align="left">Localized forwarding semantics</td>
                <td align="left">REED</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="SEC_overview">
      <name>Overview of Approaches to Extend Internet Addressing</name>
      <!-- NOTE: check that all proper checkmarks are placed! -->

<t>The following <xref target="table_extension"/> describes the objectives of the extensions discussed in this memo with respect to the properties of Internet addressing (<xref target="SEC_properties"/>}. As summarized, extensions may aim to extend one property of the Internet addressing, or extend other properties at the same time.</t>
      <table anchor="table_extension">
        <name>Relationship between Extensions and Internet Addressing</name>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="left">Length Extension</th>
            <th align="left">Identity Extension</th>
            <th align="left">Semantic Extension</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">6LoWPAN</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">ROHC</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">EzIP</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">TOR</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">ODoH</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">SLAAC</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">CGA</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">NAT</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">HICN</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">ICNIP</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">CCNx names</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">EIBP</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Geo addressing</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">REED</td>
            <td align="left">x (with P4)</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">DetNet</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">Mobile IP</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">SHIM6</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">SRv6</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">HIP</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">VxLAN</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">LISP</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">SFC</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="SEC_where">
      <name>A System View on Address</name>
      <!--
- Seeking Input/Feedback from: 
    - Geoff Huston
    - Dino Farinacci

Input/Feedback on this section that is part of the summary from the discussion on the INTArea ML.

-->

<t>In the following, we investigate in which parts of the overall Internet system extensions have been proposed and developed. For this, we divide the possible innovation across two dimensions:</t>
      <ul spacing="normal">
        <li>Horizontal: Internet edge vs core. The criticality, scale, investment on the core of the Internet makes it more difficult to introduce innovation, while at the edges there is more flexibility.  As general purpose processors have drastically improved in performance, data-plane features can be implemented in software. At the edge of the Internet, it easier to introduce innovation for several reasons: Economics, faster ROI because of faster deployment; No need of large scale deployment (and hence less standardization effort); less stakeholders involved (sometimes just one, see following point). Furthermore, the fact that the edge is a place where there is less coordination and cooperation from the core, is another factor that ease the innovation.</li>
        <li>Vertical: at which layer of the protocol stack. The difficulty to innovate varies as well depending at which layer the innovation takes place. One thing is to innovate at application layer where the app developer has large degree of freedom, another is to innovate at network layer, which is more constrained because of its central point in the architecture. Innovation at higher layer sometimes leads to walled gardens (aka limited domains <xref target="RFC8799"/>). Indeed because of the centralization phenomena, an actor offering a certain service may very well develop and deploy a custom technology that does not need to be actually standardized because it is done for its own internal usage.</li>
        <li>
          <t>Horizontal vs Vertical Innovation:  </t>
          <ul spacing="normal">
            <li>In the public Internet, core innovation at lower layer is harder, often reduced to app-level innovation or building an overlay limited domain (aka a walled garden).</li>
            <li>At the edges it is easier to  innovate at lower layers (more vertical flexibility) but some form of adaptation is needed if global reachability is wanted.</li>
          </ul>
        </li>
      </ul>
      <t>Despite these two orthogonal dimensions, innovation does not happen either horizontally or vertically, rather in both dimensions simultaneously at various degree.</t>
    </section>
    <section anchor="SEC_issues">
      <name>Issues in Extensions to Internet Addressing</name>
      <t>While the extensions to the original Internet properties, discussed in <xref target="SEC_extensions"/>, demonstrate the benefits of more flexibility in addressing, they also bring with them a number of issues, which are discussed in the following section. To this end, the problems hereafter outlined link to the approaches to extensions summarized in <xref target="SEC_overview"/>.
These issues may not be present all the time and everywhere, since as explained in <xref target="SEC_where"/>, extensions are developed and deployed in different part of the Internet, which may worsen things.</t>
      <section anchor="SEC_issues_limiting">
        <name>Limiting Address Semantics</name>
        <t>Many approaches changing the semantics of communication, e.g., through separating host identification from network node identification <xref target="RFC7401"/>, separating the device identifier from the routing locator (<xref target="EIBP"/>, <xref target="I-D.ietf-lisp-introduction"/>), or through identifying content and services directly <xref target="HICN"/>, are limited by the existing packet size and semantic constraints of IPv6, e.g., in the form of its source and destination network addresses.</t>
        <t>While approaches such as <xref target="ICNIP"/> may override the addressing semantics, e.g., by replacing IPv6 source and destination information with path identification, a possible unawareness of endpoints still requires the carrying of other address information as part of the payload.</t>
        <t>Also, the expressible service or content semantic may be limited, as in <xref target="HICN"/> or the size of supported networks <xref target="REED"/> due to relying on the limited bit positions usable in IPv6 addresses.</t>
      </section>
      <section anchor="SEC_issues_efficiency">
        <name>Complexity and Efficiency</name>
        <t>A crucial issue is the additional complexity introduced for realizing the additional addressing semantics. This is particularly an issue since we see those additional semantics particularly at the edge of the Internet, utilizing the existing addressing semantic of the Internet to interconnect the domains that require those additional semantics.</t>
        <t>Furthermore, any additional complexity often comes with an efficiency and cost penalty, particularly at the edge of the network, where resource constraints may play a significant role. Compression processes, taking <xref target="ROHC"/> as an example, require additional resources both for the sender generating the compressed header but also the gateway linking to the general Internet by re-establishing the full IP header.</t>
        <t>Conversely, the performance requirements of core networks, in terms of packet processing speed, makes the accommodation of extensions to addressing often prohibitive. This is not only due to the necessary extra processing that is specific to the extension, but also due to the complexity that will need to be managed in doing so at significantly higher speeds than at the edge of the network. The observations on the dropping of packets with IPv6 extension headers in the real world is (partially) due to such a implementation complexity <xref target="RFC7872"/>.</t>
        <t>Another example for lowering the efficiency of packet forwarding is the routing in systems like TOR <xref target="TOR"/>. As detailed before, traffic in TOR, for anonymity purposes, should be handed over by at least three intermediates before reaching the destination. Frequent relaying enhances the privacy, however, because such kind of solutions are implemented at application level, they come at the cost of lower communication efficiency. May be a different privacy enhanced address semantic would enable efficient implementation of TOR-like solutions at network layer.</t>
        <section anchor="repetitive-encapsulation">
          <name>Repetitive encapsulation</name>
          <t>Repetitive encapsulation is an issue since it bloats the packets size due to additional encapsulation headers. Addressing proposals such as those in <xref target="ICNIP"/> utilize path identification within an alternative forwarding architecture that acts upon the provided path identification. However, due to the limitation of existing flow-based architectures with respect to the supported header structures (in the form of IPv4 or IPv6 headers), the new routing semantics are being inserted into the existing header structure, while repeating the original, sender-generated header structure, in the payload of the packet as it traverses the local domain, effectively doubling the per-packet header overhead.</t>
          <t>The problem is also present in a number of solutions tackling different issues, e.g., mobility <xref target="I-D.ietf-lisp-mn"/>, DC networking (<xref target="RFC8926"/>, <xref target="RFC7348"/>, <xref target="I-D.ietf-intarea-gue"/>), traffic engineering <xref target="RFC8986"/>, and privacy (<xref target="TOR"/>, <xref target="SPHINX"/>). Certainly these solutions are able to avoid other issues, like path lengthening or privacy issues, as described before, but they come at the price of multiple encapsulations that reduce the effective payload. This, not only hampers efficiency in terms of header-to-payload ratio, but also introduces 'encapsulation points', which in turn add complexity to the (often edge) network as well as fragility due to the addition of possible failure points; this aspect is discussed in further details in <xref target="SEC_issues_fragility"/>.</t>
        </section>
        <section anchor="compounding-issues-with-header-compression">
          <name>Compounding issues with header compression</name>
          <t>IP header overhead requires header compression in constrained environments, such as wireless sensor networks and IoT in general. Together with fragmentation, both tasks constitute significant energy consumption, as shown in <xref target="HEADER_COMP_ISSUES1"/>, negatively impacting resource limited devices that often rely on battery for operation. Further, the reliance on the compression/decompression points creates a dependence on such gateways, which may be a problem for intermittent scenarios.</t>
          <t>According to the implementation of <em>contiki-ng</em> <xref target="CONTIKI"/>, an example of operating system for IoT devices, the source codes for 6LowPan requires at least 600Kb to include a header compression process. In certain use cases, such requirement can be an obstacle for extremely constrained devices, especially for the RAM and energy consumption.</t>
        </section>
        <section anchor="introducing-path-stretch">
          <name>Introducing Path Stretch</name>
          <t>Mobile IP <xref target="RFC6275"/>, which was designed for connection continuity in the face of moving endpoints, is a typical case for path stretch. Since traffic must follow a triangular route before arriving at the destination, such detour routing inevitably impacts transmission efficiency as well as latency.</t>
        </section>
        <section anchor="SEC_issues_traffic">
          <name>Complicating Traffic Engineering</name>
          <t>While many extensions to the original IP address semantic target to enrich the decisions that can be taken to steer traffic, according to requirements like QoS, mobility, chaining, compute/network metrics, flow treatment, path usage, etc., the realization of the mechanisms as individual solutions likely complicates the original goal of traffic engineering when individual solutions are being used in combination. Ultimately, this may even prevent the combined use of more than one mechanism and/or policy with a need to identify and prevent incompatibilities of mechanisms. Key here is not the issue arising from using conflicting traffic engineering policies, rather conflicting realizations of policies that may well generally work well alongside (<xref target="ROBUSTSDN"/>, <xref target="TRANSACTIONSDN"/>).</t>
          <t>This not only increases fragility, as discussed separately in <xref target="SEC_issues_fragility"/>, but also requires careful planning of which mechanisms to use and in which combination, likely needing human-in-the-loop approaches alongside possible automation approaches for the individual solutions.</t>
        </section>
      </section>
      <section anchor="SEC_issues_security">
        <name>Security</name>
        <t>The properties described in <xref target="SEC_properties"/> have, obviously, also consequences in terms of security and privacy related issues, as already mentioned in other parts of this document.</t>
        <t>For instance, in the effort of being somehow backward compatible, HIP <xref target="RFC7401"/> uses a 128-bit Host Identity, which may be not sufficiently  cryptographically strong in the future because of the limited size (future computational power may erode 128-bit security). Similarly, CGA <xref target="RFC3972"/> also aligns to the 128-bit limit, but may use only 59 bits of them, hence, the packet signature may not be sufficiently robust to attacks <xref target="I-D.rafiee-6man-cga-attack"/>.</t>
        <t>IP addresses, even temporary ones meant to protect privacy, have been long recognized as a 'Personal Identification Information' that allows even to geolocate the communicating endpoints <xref target="RFC8280"/>. The use of temporary addresses provides sufficient privacy protection only if the renewal rate is high <xref target="EPHEMERALv6"/>. However, this causes additional issues, like the large overhead due to the Duplicate Address Detection, the impact on the Neighbor Discovery mechanism, in particular the cache, which can even lead to communication disruption. With such drawbacks, the extensions may even lead to defeat the target, actually lowering security rather than increasing it.</t>
        <t>The introduction of alternative addressing semantics has also been used to help in (D)DoS attacks mitigation. This leverages on changing the service identification model so to avoid topological information exposure, making the potential disruptions likely remain limited <xref target="ADDRLESS"/>. However, this increased robustness to DDoS comes at the price of important communication setup latency and fragility, as discussed next.</t>
      </section>
      <section anchor="SEC_issues_fragility">
        <name>Fragility</name>
        <t>From the extensions discussed in <xref target="SEC_extensions"/>, it is evident that having alternative or additional address semantic and formats available for making routing as well as forwarding decisions dependent on these, is common place in the Internet. This, however, adds many extension-specific translation/adaptation points, mapping the semantic and format in one context into what is meaningful in another context, but also, more importantly, creating a dependency towards an additional component, often without explicit exposure to the endpoints that originally intended to communicate.</t>
        <t>For instance, the re-writing of IP addresses to facilitate the use of private address spaces throughout the public Internet, realized through network address translators (NATs), conflicts with the end-to-end nature of communication between two endpoints. Additional (flow) state is required at the NAT middle-box to smoothly allow communication, which in turn creates a dependency between the NAT and the end-to-end communication between those endpoints, thus increasing the fragility of the communication relation.</t>
        <t>A similar situation arises when supporting constrained environments through a header compression mechanism, adding the need for, e.g., a ROHC <xref target="RFC5795"/> element in the communication path, with communication-related compression state being held outside the communicating endpoints. Failure will introduce some inefficiencies due to context regeneration, which  may affects the communicating endpoints, increasing fragility of the system overall.</t>
        <t>Such translation/adaptation between semantic extensions to the original 'semantic' of an IP address is generally not avoidable when accommodating more than a single universal semantic. However, the solution-specific nature of every single extension is likely to noticeably increase the fragility of the overall system, since individual extensions will need to interact with other extensions that may be deployed in parallel, but were not designed taking into account such deployment scenario (cf., <xref target="I-D.ietf-intarea-tunnels"/>). Considering that extensions to traditional per-hop-behavior (based on IP addresses) can essentially be realized over almost 'any' packet field, the possible number of conflicting behaviors or diverging interpretation of the semantic and/or content of such fields, among different extensions, may soon become an issue, requiring careful testing and delineation at the boundaries of the network within which the specific extension has been realized.</t>
      </section>
    </section>
    <section anchor="SEC_overview-issue">
      <name>Summary of issues</name>
      <t><xref target="table_issue"/>, derived from <xref target="SEC_issues"/>, summarizes the issues related to each extension. While each extension involves at least one issue, some others, like ICNIP, may create several issues at the same time.</t>
      <!-- Below are for table drawing

1. Limiting Address Semantics
2. Complexity and Efficiency
   1. Repetitive encapsulation
   2. Compounding issues with header compression
   3. Introducing Path Stretch
   4. Complicating Traffic Engineering
3. Security
4. Fragility

 -->

<table anchor="table_issue">
        <name>Issues in Extensions to Internet Addressing</name>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="left">Limiting Address Semantics</th>
            <th align="left">Complexity and Efficiency</th>
            <th align="left">Security</th>
            <th align="left">Fragility</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">6LoWPAN</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">ROHC</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">EzIP</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">TOR</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">ODoH</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">SLAAC</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">CGA</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">NAT</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">HICN</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">ICNIP</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">CCNx name</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">EIBP</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Geo addressing</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">REED</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">DetNet</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">Mobile IP</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">SHIM6</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">SRv6</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">HIP</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">VxLAN</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">LISP</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">SFC</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="SEC_conclusion">
      <name>Conclusions</name>
      <t>The examples of extensions discussed in <xref target="SEC_extensions"/> to the original Internet addressing scheme show that extensibility beyond the original model (and its underlying per-hop behavior) is a desired capability for networking technologies and has been so for a long time. Generally, we can observe that those extensions are driven by the requirements of stakeholders, expecting a desirable extended functionality from the introduction of the specific extension. If interoperability is required, those extensions require standardization of possibly new fields, new semantics as well as (network and/or end system) operations alike.</t>
      <t>The issues we identified in this document with the extension-specific solution approach, point to the need for a discussion on Internet addressing, as formulated in the companion document <xref target="I-D.jia-intarea-scenarios-problems-addressing"/> that formalizes the problem statement through scenarios that highlight the shortcomings of the Internet addressing model.</t>
      <t>It is our conclusion that the existence of the many extensions to the original Internet addressing is clear evidence for gaps that have been identified over time by the wider Internet community, each of which come with a raft of issues that we need to deal with daily: We believe that it is time to develop an architectural but more importantly a sustainable approach to make Internet addressing extensible in order to capture the many new use cases that will still be identified for the Internet to come.</t>
      <t>To jumpstart any such effort from an addressing perspective, it will be key to suitable define what an address is at which layer of the overall system, let alone the network layer. We argue that any answer to this question must be derived from what features we may want from the network instead of being guided by the answers that the Internet can give us today, e.g., being a mere ephemeral token for accessing PoP-based services (as indicated in related arch-d mailing list discussions).</t>
      <t>This is not to 'second guess' the market and its possible evolution, but to outline clear features from which to derive clear principles for a design. Any such design must not skew the technical capabilities of addressing to the current economic situation of the Internet since this bears the danger of locking down innovation capabilities as an outcome of those technical limitations introduced. Instead, addressing must be aligned with enabling the model of permissionless innovation that the IETF has been promoting, ultimately enabling the serendipity of new applications that has led to many of those applications we can see in the Internet today. Most importantly, any inaction on our side in that regard will only compound the issues identified, eventually hampering the future Internet's readiness for those new uses.</t>
    </section>
    <section anchor="SEC_sec">
      <name>Security Considerations</name>
      <t>The present memo does not introduce any new technology and/or mechanism and as such does not introduce any security threat to the TCP/IP protocol suite.</t>
      <t>As an additional note, and as discussed in this document, security and privacy aspects were not considered as part of the key properties for Internet addressing, which led to the introduction of a number of extensions intending to fix those gaps. The analysis presented in this memo (non-exhaustively) shows those issues are either solved in an ad-hoc manner at application level, or at transport layer, while at network level only few extensions tackling specific aspects exist, albeit often with limitations due to the adherence to the Internet addressing model and its properties.</t>
    </section>
    <section anchor="SEC_iana">
      <name>IANA Considerations</name>
      <t>This document does not include any IANA request.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.ietf-lisp-introduction" target="https://www.ietf.org/archive/id/draft-ietf-lisp-introduction-15.txt">
        <front>
          <title>An Architectural Introduction to the Locator/ID Separation Protocol (LISP)</title>
          <author fullname="Albert Cabellos">
            <organization>UPC-BarcelonaTech</organization>
          </author>
          <author fullname="Damien Saucez (Ed.)">
            <organization>Inria</organization>
          </author>
          <date day="20" month="September" year="2021"/>
          <abstract>
            <t>   This document describes the architecture of the Locator/ID Separation
   Protocol (LISP), making it easier to read the rest of the LISP
   specifications and providing a basis for discussion about the details
   of the LISP protocols.  This document is used for introductory
   purposes, more details can be found in [I-D.ietf-lisp-rfc6830bis] and
   [I-D.ietf-lisp-rfc6833bis], the protocol specifications.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-introduction-15"/>
      </reference>
      <reference anchor="I-D.ietf-lisp-mn" target="https://www.ietf.org/archive/id/draft-ietf-lisp-mn-11.txt">
        <front>
          <title>LISP Mobile Node</title>
          <author fullname="Dino Farinacci">
            <organization>lispers.net</organization>
          </author>
          <author fullname="Darrel Lewis">
            <organization>cisco Systems</organization>
          </author>
          <author fullname="David Meyer">
            <organization>1-4-5.net</organization>
          </author>
          <author fullname="Chris White">
            <organization>Logical Elegance</organization>
          </author>
          <date day="30" month="January" year="2022"/>
          <abstract>
            <t>   This document describes how a lightweight version of LISP's ITR/ETR
   functionality can be used to provide seamless mobility to a mobile
   node.  The LISP Mobile Node design described in this document uses
   standard LISP functionality to provide scalable mobility for LISP
   mobile nodes.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-mn-11"/>
      </reference>
      <reference anchor="I-D.ietf-intarea-gue" target="https://www.ietf.org/archive/id/draft-ietf-intarea-gue-09.txt">
        <front>
          <title>Generic UDP Encapsulation</title>
          <author fullname="Tom Herbert">
            <organization>Quantonium</organization>
          </author>
          <author fullname="Lucy Yong">
            <organization>Independent</organization>
          </author>
          <author fullname="Osama Zia">
            <organization>Microsoft</organization>
          </author>
          <date day="26" month="October" year="2019"/>
          <abstract>
            <t>   This specification describes Generic UDP Encapsulation (GUE), which
   is a scheme for using UDP to encapsulate packets of different IP
   protocols for transport across layer 3 networks. By encapsulating
   packets in UDP, specialized capabilities in networking hardware for
   efficient handling of UDP packets can be leveraged. GUE specifies
   basic encapsulation methods upon which higher level constructs, such
   as tunnels and overlay networks for network virtualization, can be
   constructed. GUE is extensible by allowing optional data fields as
   part of the encapsulation, and is generic in that it can encapsulate
   packets of various IP protocols.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-gue-09"/>
      </reference>
      <reference anchor="EPHEMERALv6" target="https://www.ietf.org/archive/id/draft-gont-v6ops-ipv6-addressing-considerations-01.txt">
        <front>
          <title>IPv6 Addressing Considerations</title>
          <author fullname="Fernando Gont">
            <organization>SI6 Networks</organization>
          </author>
          <author fullname="Guillermo Gont">
            <organization>SI6 Networks</organization>
          </author>
          <date day="21" month="February" year="2021"/>
          <abstract>
            <t>   IPv6 addresses can differ in a number of properties, such as scope,
   stability, and intended usage type.  This document analyzes the
   impact of these properties on aspects such as security, privacy,
   interoperability, and network operations.  Additionally, it
   identifies challenges and gaps that currently prevent systems and
   applications from leveraging the increased flexibility and
   availability of IPv6 addresses.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-gont-v6ops-ipv6-addressing-considerations-01"/>
      </reference>
      <reference anchor="ODoH" target="https://www.ietf.org/archive/id/draft-pauly-dprive-oblivious-doh-11.txt">
        <front>
          <title>Oblivious DNS Over HTTPS</title>
          <author fullname="Eric Kinnear">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Patrick McManus">
            <organization>Fastly</organization>
          </author>
          <author fullname="Tommy Pauly">
            <organization>Apple Inc.</organization>
          </author>
          <author fullname="Tanya Verma">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="17" month="February" year="2022"/>
          <abstract>
            <t>   This document describes a protocol that allows clients to hide their
   IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS
   (DoH) messages.  This improves privacy of DNS operations by not
   allowing any one server entity to be aware of both the client IP
   address and the content of DNS queries and answers.

   This experimental protocol is developed outside the IETF and is
   published here to guide implementation, ensure interoperability among
   implementations, and enable wide-scale experimentation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-11"/>
      </reference>
      <reference anchor="OHTTP" target="https://www.ietf.org/archive/id/draft-thomson-http-oblivious-02.txt">
        <front>
          <title>Oblivious HTTP</title>
          <author fullname="Martin Thomson">
            <organization>Mozilla</organization>
          </author>
          <author fullname="Christopher A. Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="24" month="August" year="2021"/>
          <abstract>
            <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-http-oblivious-02"/>
      </reference>
      <reference anchor="ICNIP" target="https://www.ietf.org/archive/id/draft-trossen-icnrg-internet-icn-5glan-04.txt">
        <front>
          <title>Internet Services over ICN in 5G LAN Environments</title>
          <author fullname="Dirk Trossen">
            <organization>Huawei Technologies Duesseldorf GmbH</organization>
          </author>
          <author fullname="Sebastian Robitzsch">
            <organization>InterDigital Inc.</organization>
          </author>
          <author fullname="Martin Reed">
            <organization>Essex University</organization>
          </author>
          <author fullname="Mays Al-Naday">
            <organization>Essex University</organization>
          </author>
          <author fullname="Janne Riihijarvi">
            <organization>RWTH Aachen</organization>
          </author>
          <date day="1" month="October" year="2020"/>
          <abstract>
            <t>   In this draft, we provide architecture and operations for enabling
   Internet services over ICN over (5G-enabled) LAN environments.
   Operations include ICN API to upper layers, HTTP over ICN, Service
   Proxy Operations, ICN Flow Management, Name Resolution, Mobility
   Handling, and Dual Stack Device Support.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-trossen-icnrg-internet-icn-5glan-04"/>
      </reference>
      <reference anchor="EzIP" target="https://www.ietf.org/archive/id/draft-chen-ati-adaptive-ipv4-address-space-10.txt">
        <front>
          <title>Adaptive IPv4 Address Space</title>
          <author fullname="Abraham Y. Chen">
            <organization>Avinta Communications</organization>
          </author>
          <author fullname="Ramamurthy R. Ati">
            <organization>Avinta Communications</organization>
          </author>
          <author fullname="Abhay Karandikar">
            <organization>India Institute of Technology</organization>
          </author>
          <author fullname="David R. Crowe">
            <organization>Wireless Telcom Consultant</organization>
          </author>
          <date day="8" month="December" year="2021"/>
          <abstract>
            <t>   This document describes a solution to the Internet address depletion
   issue through the use of an existing Option mechanism that is part of
   the original IPv4 protocol. This proposal, named EzIP (phonetic for
   Easy IPv4), outlines the IPv4 public address pool expansion and the
   Internet system architecture enhancement considerations. EzIP may
   expand an IPv4 address by a factor of 256M without affecting the
   existing IPv4 based Internet, or the current private networks. It is
   in full conformance with the IPv4 protocol, and supports not only
   both direct and private network connectivity, but also their
   interoperability. EzIP deployments may coexist with existing Internet
   traffic and IoTs (Internet of Things) operations without perturbing
   their setups, while offering end-users the freedom to indepdently
   choose which service. EzIP may be implemented as a software or
   firmware enhancement to Internet edge routers or private network
   routing gateways, wherever needed, or simply installed as an inline
   adjunct hardware module between the two, enabling a seamless
   introduction. The 256M case detailed here establishes a complete
   spherical layer of an overlay of routers for interfacing between the
   Internet fabic (core plus edge routers) and the end user premises or
   IoTs. Incorporating caching proxy technology in the gateway, a fairly
   large geographical region may enjoy address expansion based on as few
   as one ordinary IPv4 public address utilizing IP packets with
   degenerated EzIP header. If IPv4 public pool allocations were
   reorganized, the assignable pool could be multiplied 512M fold or
   even more. Enabling hierarchical address architecture which
   facilitates both hierarchical and mesh routing, EzIP can provide
   nearly the same order of magnitude of address pool resources as IPv6
   while streamlining the administrative aspects of it. The basic EzIP
   will immediately resolve the local IPv4 address shortage, while being
   transparent to the rest of the Internet as a new parallel facility.
   Under the Dual-Stack environment, these proposed interim facilities
   will relieve the IPv4 address shortage issue, while affording IPv6
   more time to reach maturity for providing the availability levels
   required for delivering a long-term general service.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-chen-ati-adaptive-ipv4-address-space-10"/>
      </reference>
      <reference anchor="GDPR">
        <front>
          <title>The EU General Data Protection Regulation (GDPR)</title>
          <author fullname="Paul Voigt" initials="P." surname="Voigt">
            <organization/>
          </author>
          <author fullname="Axel von dem Bussche" initials="A." surname="von dem Bussche">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="Springer International Publishing" value="book"/>
        <seriesInfo name="DOI" value="10.1007/978-3-319-57959-7"/>
      </reference>
      <reference anchor="ONION">
        <front>
          <title>Onion routing</title>
          <author fullname="David Goldschlag" initials="D." surname="Goldschlag">
            <organization/>
          </author>
          <author fullname="Michael Reed" initials="M." surname="Reed">
            <organization/>
          </author>
          <author fullname="Paul Syverson" initials="P." surname="Syverson">
            <organization/>
          </author>
          <date month="February" year="1999"/>
        </front>
        <seriesInfo name="Communications of the ACM" value="Vol. 42, pp. 39-41"/>
        <seriesInfo name="DOI" value="10.1145/293411.293443"/>
      </reference>
      <reference anchor="VPN">
        <front>
          <title>Virtual private networks: an overview with performance evaluation</title>
          <author fullname="S. Khanvilkar" initials="S." surname="Khanvilkar">
            <organization/>
          </author>
          <author fullname="A. Khokhar" initials="A." surname="Khokhar">
            <organization/>
          </author>
          <date month="October" year="2004"/>
        </front>
        <seriesInfo name="IEEE Communications Magazine" value="Vol. 42, pp. 146-154"/>
        <seriesInfo name="DOI" value="10.1109/mcom.2004.1341273"/>
      </reference>
      <reference anchor="WireGuard">
        <front>
          <title>WireGuard: Next Generation Kernel Network Tunnel</title>
          <author fullname="Jason A. Donenfeld" initials="J." surname="Donenfeld">
            <organization/>
          </author>
          <date year="2017"/>
        </front>
        <seriesInfo name="Proceedings 2017 Network and Distributed System Security" value="Symposium"/>
        <seriesInfo name="DOI" value="10.14722/ndss.2017.23160"/>
      </reference>
      <reference anchor="ROHC">
        <front>
          <title>RObust Header Compression (ROHC) Performance for Multimedia Transmission over 3G/4G Wireless Networks</title>
          <author fullname="Frank H. P. Fitzek" initials="F." surname="Fitzek">
            <organization/>
          </author>
          <author fullname="Stephan Rein" initials="S." surname="Rein">
            <organization/>
          </author>
          <author fullname="Patrick Seeling" initials="P." surname="Seeling">
            <organization/>
          </author>
          <author fullname="Martin Reisslein" initials="M." surname="Reisslein">
            <organization/>
          </author>
          <date month="January" year="2005"/>
        </front>
        <seriesInfo name="Wireless Personal Communications" value="Vol. 32, pp. 23-41"/>
        <seriesInfo name="DOI" value="10.1007/s11277-005-7733-2"/>
      </reference>
      <reference anchor="ITU9959">
        <front>
          <title>Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets</title>
          <author fullname="Christopher Badenhop" initials="C." surname="Badenhop">
            <organization/>
          </author>
          <author fullname="Jonathan Fuller" initials="J." surname="Fuller">
            <organization/>
          </author>
          <author fullname="Joseph Hall" initials="J." surname="Hall">
            <organization/>
          </author>
          <author fullname="Benjamin Ramsey" initials="B." surname="Ramsey">
            <organization/>
          </author>
          <author fullname="Mason Rice" initials="M." surname="Rice">
            <organization/>
          </author>
          <date year="2015"/>
        </front>
        <seriesInfo name="IFIP Advances in Information and Communication Technology" value="pp. 209-227"/>
        <seriesInfo name="DOI" value="10.1007/978-3-319-26567-4_13"/>
      </reference>
      <reference anchor="UA-DHCP">
        <front>
          <title>The secure DHCP system with user authentication</title>
          <author fullname="T. Komori" initials="T." surname="Komori">
            <organization/>
          </author>
          <author fullname="T. Saito" initials="T." surname="Saito">
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
        <seriesInfo name="27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN" value="2002."/>
        <seriesInfo name="DOI" value="10.1109/lcn.2002.1181774"/>
      </reference>
      <reference anchor="ADDRLESS">
        <front>
          <title>Addressless: A new internet server model to prevent network scanning</title>
          <author fullname="Shanshan Hao" initials="S." surname="Hao">
            <organization/>
          </author>
          <author fullname="Renjie Liu" initials="R." surname="Liu">
            <organization/>
          </author>
          <author fullname="Zhe Weng" initials="Z." surname="Weng">
            <organization/>
          </author>
          <author fullname="Deliang Chang" initials="D." surname="Chang">
            <organization/>
          </author>
          <author fullname="Congxiao Bao" initials="C." surname="Bao">
            <organization/>
          </author>
          <author fullname="Xing Li" initials="X." surname="Li">
            <organization/>
          </author>
          <date month="February" year="2021"/>
        </front>
        <seriesInfo name="PLOS ONE" value="Vol. 16, pp. e0246293"/>
        <seriesInfo name="DOI" value="10.1371/journal.pone.0246293"/>
      </reference>
      <reference anchor="SFCANYCAST">
        <front>
          <title>Distributed Function Chaining with Anycast Routing</title>
          <author fullname="Adrien Wion" initials="A." surname="Wion">
            <organization/>
          </author>
          <author fullname="Mathieu Bouet" initials="M." surname="Bouet">
            <organization/>
          </author>
          <author fullname="Luigi Iannone" initials="L." surname="Iannone">
            <organization/>
          </author>
          <author fullname="Vania Conan" initials="V." surname="Conan">
            <organization/>
          </author>
          <date month="April" year="2019"/>
        </front>
        <seriesInfo name="Proceedings of the 2019 ACM Symposium on SDN" value="Research"/>
        <seriesInfo name="DOI" value="10.1145/3314148.3314355"/>
      </reference>
      <reference anchor="REED">
        <front>
          <title>Stateless multicast switching in software defined networks</title>
          <author fullname="Martin J. Reed" initials="M." surname="Reed">
            <organization/>
          </author>
          <author fullname="Mays Al-Naday" initials="M." surname="Al-Naday">
            <organization/>
          </author>
          <author fullname="Nikolaos Thomos" initials="N." surname="Thomos">
            <organization/>
          </author>
          <author fullname="Dirk Trossen" initials="D." surname="Trossen">
            <organization/>
          </author>
          <author fullname="George Petropoulos" initials="G." surname="Petropoulos">
            <organization/>
          </author>
          <author fullname="Spiros Spirou" initials="S." surname="Spirou">
            <organization/>
          </author>
          <date month="May" year="2016"/>
        </front>
        <seriesInfo name="2016 IEEE International Conference on Communications" value="(ICC)"/>
        <seriesInfo name="DOI" value="10.1109/icc.2016.7511036"/>
      </reference>
      <reference anchor="SPHINX">
        <front>
          <title>Sphinx: A Compact and Provably Secure Mix Format</title>
          <author fullname="George Danezis" initials="G." surname="Danezis">
            <organization/>
          </author>
          <author fullname="Ian Goldberg" initials="I." surname="Goldberg">
            <organization/>
          </author>
          <date month="May" year="2009"/>
        </front>
        <seriesInfo name="2009 30th IEEE Symposium on Security and" value="Privacy"/>
        <seriesInfo name="DOI" value="10.1109/sp.2009.15"/>
      </reference>
      <reference anchor="HEADER_COMP_ISSUES1">
        <front>
          <title>The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN)</title>
          <author fullname="Farhad Mesrinejad" initials="F." surname="Mesrinejad">
            <organization/>
          </author>
          <author fullname="Fazirulhisyam Hashim" initials="F." surname="Hashim">
            <organization/>
          </author>
          <author fullname="N. K. Noordin" initials="N." surname="Noordin">
            <organization/>
          </author>
          <author fullname="M. F. A. Rasid" initials="M." surname="Rasid">
            <organization/>
          </author>
          <author fullname="R. S. A. Raja Abdullah" initials="R." surname="Abdullah">
            <organization/>
          </author>
          <date month="October" year="2011"/>
        </front>
        <seriesInfo name="The 17th Asia Pacific Conference on" value="Communications"/>
        <seriesInfo name="DOI" value="10.1109/apcc.2011.6152926"/>
      </reference>
      <reference anchor="ROBUSTSDN">
        <front>
          <title>A distributed and robust SDN control plane for transactional network updates</title>
          <author fullname="Marco Canini" initials="M." surname="Canini">
            <organization/>
          </author>
          <author fullname="Petr Kuznetsov" initials="P." surname="Kuznetsov">
            <organization/>
          </author>
          <author fullname="Dan Levin" initials="D." surname="Levin">
            <organization/>
          </author>
          <author fullname="Stefan Schmid" initials="S." surname="Schmid">
            <organization/>
          </author>
          <date month="April" year="2015"/>
        </front>
        <seriesInfo name="2015 IEEE Conference on Computer Communications" value="(INFOCOM)"/>
        <seriesInfo name="DOI" value="10.1109/infocom.2015.7218382"/>
      </reference>
      <reference anchor="TRANSACTIONSDN">
        <front>
          <title>Transactional Network Updates in SDN</title>
          <author fullname="Maja Curic" initials="M." surname="Curic">
            <organization/>
          </author>
          <author fullname="Zoran Despotovic" initials="Z." surname="Despotovic">
            <organization/>
          </author>
          <author fullname="Artur Hecker" initials="A." surname="Hecker">
            <organization/>
          </author>
          <author fullname="Georg Carle" initials="G." surname="Carle">
            <organization/>
          </author>
          <date month="June" year="2018"/>
        </front>
        <seriesInfo name="2018 European Conference on Networks and Communications" value="(EuCNC)"/>
        <seriesInfo name="DOI" value="10.1109/eucnc.2018.8442793"/>
      </reference>
      <reference anchor="P4">
        <front>
          <title>P4: programming protocol-independent packet processors</title>
          <author fullname="Pat Bosshart" initials="P." surname="Bosshart">
            <organization/>
          </author>
          <author fullname="Dan Daly" initials="D." surname="Daly">
            <organization/>
          </author>
          <author fullname="Glen Gibb" initials="G." surname="Gibb">
            <organization/>
          </author>
          <author fullname="Martin Izzard" initials="M." surname="Izzard">
            <organization/>
          </author>
          <author fullname="Nick McKeown" initials="N." surname="McKeown">
            <organization/>
          </author>
          <author fullname="Jennifer Rexford" initials="J." surname="Rexford">
            <organization/>
          </author>
          <author fullname="Cole Schlesinger" initials="C." surname="Schlesinger">
            <organization/>
          </author>
          <author fullname="Dan Talayco" initials="D." surname="Talayco">
            <organization/>
          </author>
          <author fullname="Amin Vahdat" initials="A." surname="Vahdat">
            <organization/>
          </author>
          <author fullname="George Varghese" initials="G." surname="Varghese">
            <organization/>
          </author>
          <author fullname="David Walker" initials="D." surname="Walker">
            <organization/>
          </author>
          <date month="July" year="2014"/>
        </front>
        <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 44, pp. 87-95"/>
        <seriesInfo name="DOI" value="10.1145/2656877.2656890"/>
      </reference>
      <reference anchor="FAYED21">
        <front>
          <title>The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale</title>
          <author fullname="Marwan Fayed" initials="M." surname="Fayed">
            <organization/>
          </author>
          <author fullname="Lorenz Bauer" initials="L." surname="Bauer">
            <organization/>
          </author>
          <author fullname="Vasileios Giotsas" initials="V." surname="Giotsas">
            <organization/>
          </author>
          <author fullname="Sami Kerola" initials="S." surname="Kerola">
            <organization/>
          </author>
          <author fullname="Marek Majkowski" initials="M." surname="Majkowski">
            <organization/>
          </author>
          <author fullname="Pavel Odintsov" initials="P." surname="Odintsov">
            <organization/>
          </author>
          <author fullname="Jakub Sitnicki" initials="J." surname="Sitnicki">
            <organization/>
          </author>
          <author fullname="Taejoong Chung" initials="T." surname="Chung">
            <organization/>
          </author>
          <author fullname="Dave Levin" initials="D." surname="Levin">
            <organization/>
          </author>
          <author fullname="Alan Mislove" initials="A." surname="Mislove">
            <organization/>
          </author>
          <author fullname="Christopher A. Wood" initials="C." surname="Wood">
            <organization/>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization/>
          </author>
          <date month="August" year="2021"/>
        </front>
        <seriesInfo name="Proceedings of the 2021 ACM SIGCOMM 2021" value="Conference"/>
        <seriesInfo name="DOI" value="10.1145/3452296.3472922"/>
      </reference>
      <reference anchor="CLOUDFLARE_SIGCOMM">
        <front>
          <title>The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale</title>
          <author fullname="Marwan Fayed" initials="M." surname="Fayed">
            <organization/>
          </author>
          <author fullname="Lorenz Bauer" initials="L." surname="Bauer">
            <organization/>
          </author>
          <author fullname="Vasileios Giotsas" initials="V." surname="Giotsas">
            <organization/>
          </author>
          <author fullname="Sami Kerola" initials="S." surname="Kerola">
            <organization/>
          </author>
          <author fullname="Marek Majkowski" initials="M." surname="Majkowski">
            <organization/>
          </author>
          <author fullname="Pavel Odintsov" initials="P." surname="Odintsov">
            <organization/>
          </author>
          <author fullname="Jakub Sitnicki" initials="J." surname="Sitnicki">
            <organization/>
          </author>
          <author fullname="Taejoong Chung" initials="T." surname="Chung">
            <organization/>
          </author>
          <author fullname="Dave Levin" initials="D." surname="Levin">
            <organization/>
          </author>
          <author fullname="Alan Mislove" initials="A." surname="Mislove">
            <organization/>
          </author>
          <author fullname="Christopher A. Wood" initials="C." surname="Wood">
            <organization/>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization/>
          </author>
          <date month="August" year="2021"/>
        </front>
        <seriesInfo name="Proceedings of the 2021 ACM SIGCOMM 2021" value="Conference"/>
        <seriesInfo name="DOI" value="10.1145/3452296.3472922"/>
      </reference>
      <reference anchor="TOR" target="https://www.torproject.org/">
        <front>
          <title>The Tor Project</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="IPv4pool" target="https://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtml">
        <front>
          <title>IANA IPv4 Address Space Registry</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="HICN" target="https://datatracker.ietf.org/meeting/interim-2018-icnrg-01/materials/slides-interim-2018-icnrg-01-sessa-hybrid-icn-hicn-luca-muscariello">
        <front>
          <title>Hybrid Information-Centric Networking: ICN inside the Internet Protocol</title>
          <author initials="L." surname="Muscariello">
            <organization/>
          </author>
          <date year="2018" month="March"/>
        </front>
      </reference>
      <reference anchor="CONTIKI" target="https://github.com/contiki-ng/contiki-ng">
        <front>
          <title>Contiki-NG: The OS for Next Generation IoT Devices</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="GNATCATCHER" target="https://github.com/bslassey/ip-blindness">
        <front>
          <title>Global Network Address Translation Combined with Audited and Trusted CDN or HTTP-Proxy Eliminating Reidentification</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="EIBP" target="First Intl Workshop on Semantic Addressing and Routing for Future Networks">
        <front>
          <title>A Structured Approach to Routing in the Internet</title>
          <author initials="N." surname="Shenoy, S Chandraiah, P Willis">
            <organization/>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="HISTORY127" target="https://elists.isoc.org/pipermail/internet-history/2021-January/006920.html">
        <front>
          <title>History of 127/8 as localhost/loopback addresses</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization/>
          </author>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="I-D.jia-intarea-scenarios-problems-addressing" target="https://www.ietf.org/archive/id/draft-jia-intarea-scenarios-problems-addressing-02.txt">
        <front>
          <title>Challenging Scenarios and Problems in Internet Addressing</title>
          <author fullname="Yihao Jia">
            <organization>Huawei Technologies Co., Ltd</organization>
          </author>
          <author fullname="Dirk Trossen">
            <organization>Huawei Technologies Duesseldorf GmbH</organization>
          </author>
          <author fullname="Luigi Iannone">
            <organization>Huawei Technologies France S.A.S.U.</organization>
          </author>
          <author fullname="Nirmala Shenoy">
            <organization>Rochester Institute of Technology</organization>
          </author>
          <author fullname="Paulo Mendes">
            <organization>Airbus</organization>
          </author>
          <author fullname="Donald E. Eastlake 3rd">
            <organization>Futurewei Technologies</organization>
          </author>
          <author fullname="Peng Liu">
            <organization>China Mobile</organization>
          </author>
          <date day="23" month="October" year="2021"/>
          <abstract>
            <t>   The Internet Protocol (IP) has been the major technological success
   in information technology of the last half century.  As the Internet
   becomes pervasive, IP has been replacing communication technology for
   many domain-specific solutions.  However, domains with specific
   requirements as well as communication behaviors and semantics still
   exist and represent what [RFC8799] recognizes as "limited domains".

   This document describes well-recognized scenarios that showcase
   possibly different addressing requirements, which are challenging to
   be accommodated in the IP addressing model.  These scenarios
   highlight issues related to the Internet addressing model and call
   for starting a discussion on a way to re-think/evolve the addressing
   model so to better accommodate different domain-specific
   requirements.

   The issues identified in this document are complemented and deepened
   by a detailed gap analysis in a separate companion document
   [I-D.jia-intarea-internet-addressing-gap-analysis].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-jia-intarea-scenarios-problems-addressing-02"/>
      </reference>
      <reference anchor="RFC6250" target="https://www.rfc-editor.org/info/rfc6250">
        <front>
          <title>Evolution of the IP Model</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <date month="May" year="2011"/>
          <abstract>
            <t>This RFC attempts to document various aspects of the IP service model and how it has evolved over time.  In particular, it attempts to document the properties of the IP layer as they are seen by upper- layer protocols and applications, especially properties that were (and, at times, still are) incorrectly perceived to exist as well as properties that would cause problems if changed.  The discussion of these properties is organized around evaluating a set of claims, or misconceptions.  Finally, this document provides some guidance to protocol designers and implementers.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6250"/>
        <seriesInfo name="DOI" value="10.17487/RFC6250"/>
      </reference>
      <reference anchor="RFC1752" target="https://www.rfc-editor.org/info/rfc1752">
        <front>
          <title>The Recommendation for the IP Next Generation Protocol</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <author fullname="A. Mankin" initials="A." surname="Mankin">
            <organization/>
          </author>
          <date month="January" year="1995"/>
          <abstract>
            <t>This document presents the recommendation of the IPng Area Directors on what should be used to replace the current version of the Internet Protocol. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1752"/>
        <seriesInfo name="DOI" value="10.17487/RFC1752"/>
      </reference>
      <reference anchor="RFC2101" target="https://www.rfc-editor.org/info/rfc2101">
        <front>
          <title>IPv4 Address Behaviour Today</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter">
            <organization/>
          </author>
          <author fullname="J. Crowcroft" initials="J." surname="Crowcroft">
            <organization/>
          </author>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <date month="February" year="1997"/>
          <abstract>
            <t>The main purpose of this note is to clarify the current interpretation of the 32-bit IP version 4 address space, whose significance has changed substantially since it was originally defined.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2101"/>
        <seriesInfo name="DOI" value="10.17487/RFC2101"/>
      </reference>
      <reference anchor="RFC1918" target="https://www.rfc-editor.org/info/rfc1918">
        <front>
          <title>Address Allocation for Private Internets</title>
          <author fullname="Y. Rekhter" initials="Y." surname="Rekhter">
            <organization/>
          </author>
          <author fullname="B. Moskowitz" initials="B." surname="Moskowitz">
            <organization/>
          </author>
          <author fullname="D. Karrenberg" initials="D." surname="Karrenberg">
            <organization/>
          </author>
          <author fullname="G. J. de Groot" initials="G. J." surname="de Groot">
            <organization/>
          </author>
          <author fullname="E. Lear" initials="E." surname="Lear">
            <organization/>
          </author>
          <date month="February" year="1996"/>
          <abstract>
            <t>This document describes address allocation for private internets.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="5"/>
        <seriesInfo name="RFC" value="1918"/>
        <seriesInfo name="DOI" value="10.17487/RFC1918"/>
      </reference>
      <reference anchor="RFC4291" target="https://www.rfc-editor.org/info/rfc4291">
        <front>
          <title>IP Version 6 Addressing Architecture</title>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <author fullname="S. Deering" initials="S." surname="Deering">
            <organization/>
          </author>
          <date month="February" year="2006"/>
          <abstract>
            <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol.  The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
            <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture".   [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4291"/>
        <seriesInfo name="DOI" value="10.17487/RFC4291"/>
      </reference>
      <reference anchor="RFC7228" target="https://www.rfc-editor.org/info/rfc7228">
        <front>
          <title>Terminology for Constrained-Node Networks</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann">
            <organization/>
          </author>
          <author fullname="M. Ersue" initials="M." surname="Ersue">
            <organization/>
          </author>
          <author fullname="A. Keranen" initials="A." surname="Keranen">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.  This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7228"/>
        <seriesInfo name="DOI" value="10.17487/RFC7228"/>
      </reference>
      <reference anchor="RFC5795" target="https://www.rfc-editor.org/info/rfc5795">
        <front>
          <title>The RObust Header Compression (ROHC) Framework</title>
          <author fullname="K. Sandlund" initials="K." surname="Sandlund">
            <organization/>
          </author>
          <author fullname="G. Pelletier" initials="G." surname="Pelletier">
            <organization/>
          </author>
          <author fullname="L-E. Jonsson" initials="L-E." surname="Jonsson">
            <organization/>
          </author>
          <date month="March" year="2010"/>
          <abstract>
            <t>The Robust Header Compression (ROHC) protocol provides an efficient, flexible, and future-proof header compression concept.  It is designed to operate efficiently and robustly over various link technologies with different characteristics.</t>
            <t>The ROHC framework, along with a set of compression profiles, was initially defined in RFC 3095.  To improve and simplify the ROHC specifications, this document explicitly defines the ROHC framework and the profile for uncompressed separately.  More specifically, the definition of the framework does not modify or update the definition of the framework specified by RFC 3095.</t>
            <t>This specification obsoletes RFC 4995.  It fixes one interoperability issue that was erroneously introduced in RFC 4995, and adds some minor clarifications.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5795"/>
        <seriesInfo name="DOI" value="10.17487/RFC5795"/>
      </reference>
      <reference anchor="RFC6282" target="https://www.rfc-editor.org/info/rfc6282">
        <front>
          <title>Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks</title>
          <author fullname="J. Hui" initials="J." role="editor" surname="Hui">
            <organization/>
          </author>
          <author fullname="P. Thubert" initials="P." surname="Thubert">
            <organization/>
          </author>
          <date month="September" year="2011"/>
          <abstract>
            <t>This document updates RFC 4944, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks".  This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs).  The compression format relies on shared context to allow compression of arbitrary prefixes.  How the information is maintained in that shared context is out of scope. This document specifies compression of multicast addresses and a framework for compressing next headers.  UDP header compression is specified within this framework.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6282"/>
        <seriesInfo name="DOI" value="10.17487/RFC6282"/>
      </reference>
      <reference anchor="RFC7400" target="https://www.rfc-editor.org/info/rfc7400">
        <front>
          <title>6LoWPAN-GHC: Generic Header Compression for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
          <author fullname="C. Bormann" initials="C." surname="Bormann">
            <organization/>
          </author>
          <date month="November" year="2014"/>
          <abstract>
            <t>RFC 6282 defines header compression in 6LoWPAN packets (where "6LoWPAN" refers to "IPv6 over Low-Power Wireless Personal Area Network").  The present document specifies a simple addition that enables the compression of generic headers and header-like payloads, without a need to define a new header compression scheme for each such new header or header-like payload.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7400"/>
        <seriesInfo name="DOI" value="10.17487/RFC7400"/>
      </reference>
      <reference anchor="RFC8376" target="https://www.rfc-editor.org/info/rfc8376">
        <front>
          <title>Low-Power Wide Area Network (LPWAN) Overview</title>
          <author fullname="S. Farrell" initials="S." role="editor" surname="Farrell">
            <organization/>
          </author>
          <date month="May" year="2018"/>
          <abstract>
            <t>Low-Power Wide Area Networks (LPWANs) are wireless technologies with characteristics such as large coverage areas, low bandwidth, possibly very small packet and application-layer data sizes, and long battery life operation.  This memo is an informational overview of the set of LPWAN technologies being considered in the IETF and of the gaps that exist between the needs of those technologies and the goal of running IP in LPWANs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8376"/>
        <seriesInfo name="DOI" value="10.17487/RFC8376"/>
      </reference>
      <reference anchor="RFC8724" target="https://www.rfc-editor.org/info/rfc8724">
        <front>
          <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
          <author fullname="A. Minaburo" initials="A." surname="Minaburo">
            <organization/>
          </author>
          <author fullname="L. Toutain" initials="L." surname="Toutain">
            <organization/>
          </author>
          <author fullname="C. Gomez" initials="C." surname="Gomez">
            <organization/>
          </author>
          <author fullname="D. Barthel" initials="D." surname="Barthel">
            <organization/>
          </author>
          <author fullname="JC. Zuniga" initials="JC." surname="Zuniga">
            <organization/>
          </author>
          <date month="April" year="2020"/>
          <abstract>
            <t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
            <t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
            <t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
            <t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8724"/>
        <seriesInfo name="DOI" value="10.17487/RFC8724"/>
      </reference>
      <reference anchor="RFC8105" target="https://www.rfc-editor.org/info/rfc8105">
        <front>
          <title>Transmission of IPv6 Packets over Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE)</title>
          <author fullname="P. Mariager" initials="P." surname="Mariager">
            <organization/>
          </author>
          <author fullname="J. Petersen" initials="J." role="editor" surname="Petersen">
            <organization/>
          </author>
          <author fullname="Z. Shelby" initials="Z." surname="Shelby">
            <organization/>
          </author>
          <author fullname="M. Van de Logt" initials="M." surname="Van de Logt">
            <organization/>
          </author>
          <author fullname="D. Barthel" initials="D." surname="Barthel">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>Digital Enhanced Cordless Telecommunications (DECT) Ultra Low Energy (ULE) is a low-power air interface technology that is proposed by the DECT Forum and is defined and specified by ETSI.</t>
            <t>The DECT air interface technology has been used worldwide in communication devices for more than 20 years.  It has primarily been used to carry voice for cordless telephony but has also been deployed for data-centric services.</t>
            <t>DECT ULE is a recent addition to the DECT interface primarily intended for low-bandwidth, low-power applications such as sensor devices, smart meters, home automation, etc.  As the DECT ULE interface inherits many of the capabilities from DECT, it benefits from operation that is long-range and interference-free, worldwide- reserved frequency band, low silicon prices, and maturity.  There is an added value in the ability to communicate with IPv6 over DECT ULE, such as for Internet of Things applications.</t>
            <t>This document describes how IPv6 is transported over DECT ULE using IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) techniques.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8105"/>
        <seriesInfo name="DOI" value="10.17487/RFC8105"/>
      </reference>
      <reference anchor="RFC8163" target="https://www.rfc-editor.org/info/rfc8163">
        <front>
          <title>Transmission of IPv6 over Master-Slave/Token-Passing (MS/TP) Networks</title>
          <author fullname="K. Lynn" initials="K." role="editor" surname="Lynn">
            <organization/>
          </author>
          <author fullname="J. Martocci" initials="J." surname="Martocci">
            <organization/>
          </author>
          <author fullname="C. Neilson" initials="C." surname="Neilson">
            <organization/>
          </author>
          <author fullname="S. Donaldson" initials="S." surname="Donaldson">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>Master-Slave/Token-Passing (MS/TP) is a medium access control method for the RS-485 physical layer and is used primarily in building automation networks.  This specification defines the frame format for transmission of IPv6 packets and the method of forming link-local and statelessly autoconfigured IPv6 addresses on MS/TP networks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8163"/>
        <seriesInfo name="DOI" value="10.17487/RFC8163"/>
      </reference>
      <reference anchor="I-D.ietf-6lo-nfc" target="https://www.ietf.org/archive/id/draft-ietf-6lo-nfc-17.txt">
        <front>
          <title>Transmission of IPv6 Packets over Near Field Communication</title>
          <author fullname="Younghwan Choi">
            <organization>Electronics and Telecommunications Research Institute</organization>
          </author>
          <author fullname="Yong-Geun Hong">
            <organization>Electronics and Telecommunications Research Institute</organization>
          </author>
          <author fullname="Joo-Sang Youn">
            <organization>DONG-EUI University</organization>
          </author>
          <author fullname="Dongkyun Kim">
            <organization>Kyungpook National University</organization>
          </author>
          <author fullname="JinHyouk Choi">
            <organization>Samsung Electronics Co.,</organization>
          </author>
          <date day="23" month="August" year="2020"/>
          <abstract>
            <t>   Near Field Communication (NFC) is a set of standards for smartphones
   and portable devices to establish radio communication with each other
   by touching them together or bringing them into proximity, usually no
   more than 10 cm apart.  NFC standards cover communications protocols
   and data exchange formats, and are based on existing radio-frequency
   identification (RFID) standards including ISO/IEC 14443 and FeliCa.
   The standards include ISO/IEC 18092 and those defined by the NFC
   Forum.  The NFC technology has been widely implemented and available
   in mobile phones, laptop computers, and many other devices.  This
   document describes how IPv6 is transmitted over NFC using 6LoWPAN
   techniques.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-6lo-nfc-17"/>
      </reference>
      <reference anchor="I-D.ietf-6lo-plc" target="https://www.ietf.org/archive/id/draft-ietf-6lo-plc-10.txt">
        <front>
          <title>Transmission of IPv6 Packets over PLC Networks</title>
          <author fullname="Jianqiang Hou">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Bing Liu">
            <organization>Huawei Technologies</organization>
          </author>
          <author fullname="Yong-Geun Hong">
            <organization>Daejeon University</organization>
          </author>
          <author fullname="Xiaojun Tang">
            <organization>SGEPRI</organization>
          </author>
          <author fullname="Charles E. Perkins">
            <organization>Lupin Lodge</organization>
          </author>
          <date day="17" month="February" year="2022"/>
          <abstract>
            <t>   Power Line Communication (PLC), namely using the electric-power lines
   for indoor and outdoor communications, has been widely applied to
   support Advanced Metering Infrastructure (AMI), especially smart
   meters for electricity.  The existing electricity infrastructure
   facilitates the expansion of PLC deployments due to its potential
   advantages in terms of cost and convenience.  Moreover, a wide
   variety of accessible devices raises the potential demand of IPv6 for
   future applications.  This document describes how IPv6 packets are
   transported over constrained PLC networks, such as ITU-T G.9903, IEEE
   1901.1 and IEEE 1901.2.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-6lo-plc-10"/>
      </reference>
      <reference anchor="RFC8060" target="https://www.rfc-editor.org/info/rfc8060">
        <front>
          <title>LISP Canonical Address Format (LCAF)</title>
          <author fullname="D. Farinacci" initials="D." surname="Farinacci">
            <organization/>
          </author>
          <author fullname="D. Meyer" initials="D." surname="Meyer">
            <organization/>
          </author>
          <author fullname="J. Snijders" initials="J." surname="Snijders">
            <organization/>
          </author>
          <date month="February" year="2017"/>
          <abstract>
            <t>This document defines a canonical address format encoding used in Locator/ID Separation Protocol (LISP) control messages and in the encoding of lookup keys for the LISP Mapping Database System.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8060"/>
        <seriesInfo name="DOI" value="10.17487/RFC8060"/>
      </reference>
      <reference anchor="I-D.ietf-lisp-rfc6833bis" target="https://www.ietf.org/archive/id/draft-ietf-lisp-rfc6833bis-30.txt">
        <front>
          <title>Locator/ID Separation Protocol (LISP) Control-Plane</title>
          <author fullname="Dino Farinacci">
            <organization>lispers.net</organization>
          </author>
          <author fullname="Fabio Maino">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Vince Fuller">
            <organization>vaf.net Internet Consulting</organization>
          </author>
          <author fullname="Albert Cabellos">
            <organization>UPC/BarcelonaTech</organization>
          </author>
          <date day="18" month="November" year="2020"/>
          <abstract>
            <t>   This document describes the Control-Plane and Mapping Service for the
   Locator/ID Separation Protocol (LISP), implemented by two types of
   LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server --
   that provides a simplified "front end" for one or more Endpoint ID to
   Routing Locator mapping databases.

   By using this Control-Plane service interface and communicating with
   Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and
   Egress Tunnel Routers (ETRs) are not dependent on the details of
   mapping database systems, which facilitates modularity with different
   database designs.  Since these devices implement the "edge" of the
   LISP Control-Plane infrastructure, connecting EID addressable nodes
   of a LISP site, it the implementation and operational complexity of
   the overall cost and effort of deploying LISP.

   This document obsoletes RFC 6830 and RFC 6833.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6833bis-30"/>
      </reference>
      <reference anchor="RFC2663" target="https://www.rfc-editor.org/info/rfc2663">
        <front>
          <title>IP Network Address Translator (NAT) Terminology and Considerations</title>
          <author fullname="P. Srisuresh" initials="P." surname="Srisuresh">
            <organization/>
          </author>
          <author fullname="M. Holdrege" initials="M." surname="Holdrege">
            <organization/>
          </author>
          <date month="August" year="1999"/>
          <abstract>
            <t>This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2663"/>
        <seriesInfo name="DOI" value="10.17487/RFC2663"/>
      </reference>
      <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
        <front>
          <title>DNS Queries over HTTPS (DoH)</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS.  Each DNS query-response pair is mapped into an HTTP exchange.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8484"/>
        <seriesInfo name="DOI" value="10.17487/RFC8484"/>
      </reference>
      <reference anchor="RFC8981" target="https://www.rfc-editor.org/info/rfc8981">
        <front>
          <title>Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6</title>
          <author fullname="F. Gont" initials="F." surname="Gont">
            <organization/>
          </author>
          <author fullname="S. Krishnan" initials="S." surname="Krishnan">
            <organization/>
          </author>
          <author fullname="T. Narten" initials="T." surname="Narten">
            <organization/>
          </author>
          <author fullname="R. Draves" initials="R." surname="Draves">
            <organization/>
          </author>
          <date month="February" year="2021"/>
          <abstract>
            <t>This document describes an extension to IPv6 Stateless Address Autoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8981"/>
        <seriesInfo name="DOI" value="10.17487/RFC8981"/>
      </reference>
      <reference anchor="RFC4193" target="https://www.rfc-editor.org/info/rfc4193">
        <front>
          <title>Unique Local IPv6 Unicast Addresses</title>
          <author fullname="R. Hinden" initials="R." surname="Hinden">
            <organization/>
          </author>
          <author fullname="B. Haberman" initials="B." surname="Haberman">
            <organization/>
          </author>
          <date month="October" year="2005"/>
          <abstract>
            <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4193"/>
        <seriesInfo name="DOI" value="10.17487/RFC4193"/>
      </reference>
      <reference anchor="RFC8061" target="https://www.rfc-editor.org/info/rfc8061">
        <front>
          <title>Locator/ID Separation Protocol (LISP) Data-Plane Confidentiality</title>
          <author fullname="D. Farinacci" initials="D." surname="Farinacci">
            <organization/>
          </author>
          <author fullname="B. Weis" initials="B." surname="Weis">
            <organization/>
          </author>
          <date month="February" year="2017"/>
          <abstract>
            <t>This document describes a mechanism for encrypting traffic encapsulated using the Locator/ID Separation Protocol (LISP).  The design describes how key exchange is achieved using existing LISP control-plane mechanisms as well as how to secure the LISP data plane from third-party surveillance attacks.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8061"/>
        <seriesInfo name="DOI" value="10.17487/RFC8061"/>
      </reference>
      <reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972">
        <front>
          <title>Cryptographically Generated Addresses (CGA)</title>
          <author fullname="T. Aura" initials="T." surname="Aura">
            <organization/>
          </author>
          <date month="March" year="2005"/>
          <abstract>
            <t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3972"/>
        <seriesInfo name="DOI" value="10.17487/RFC3972"/>
      </reference>
      <reference anchor="RFC4581" target="https://www.rfc-editor.org/info/rfc4581">
        <front>
          <title>Cryptographically Generated Addresses (CGA) Extension Field Format</title>
          <author fullname="M. Bagnulo" initials="M." surname="Bagnulo">
            <organization/>
          </author>
          <author fullname="J. Arkko" initials="J." surname="Arkko">
            <organization/>
          </author>
          <date month="October" year="2006"/>
          <abstract>
            <t>This document defines a Type-Length-Value format for Cryptographically Generated Address (CGA) Extensions.  This document updates RFC 3972.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4581"/>
        <seriesInfo name="DOI" value="10.17487/RFC4581"/>
      </reference>
      <reference anchor="RFC4982" target="https://www.rfc-editor.org/info/rfc4982">
        <front>
          <title>Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs)</title>
          <author fullname="M. Bagnulo" initials="M." surname="Bagnulo">
            <organization/>
          </author>
          <author fullname="J. Arkko" initials="J." surname="Arkko">
            <organization/>
          </author>
          <date month="July" year="2007"/>
          <abstract>
            <t>This document analyzes the implications of recent attacks on commonly used hash functions on Cryptographically Generated Addresses (CGAs) and updates the CGA specification to support multiple hash algorithms.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4982"/>
        <seriesInfo name="DOI" value="10.17487/RFC4982"/>
      </reference>
      <reference anchor="RFC3118" target="https://www.rfc-editor.org/info/rfc3118">
        <front>
          <title>Authentication for DHCP Messages</title>
          <author fullname="R. Droms" initials="R." role="editor" surname="Droms">
            <organization/>
          </author>
          <author fullname="W. Arbaugh" initials="W." role="editor" surname="Arbaugh">
            <organization/>
          </author>
          <date month="June" year="2001"/>
          <abstract>
            <t>This document defines a new Dynamic Host Configuration Protocol (DHCP) option through which authorization tickets can be easily generated and newly attached hosts with proper authorization can be automatically configured from an authenticated DHCP server.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3118"/>
        <seriesInfo name="DOI" value="10.17487/RFC3118"/>
      </reference>
      <reference anchor="RFC4014" target="https://www.rfc-editor.org/info/rfc4014">
        <front>
          <title>Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option</title>
          <author fullname="R. Droms" initials="R." surname="Droms">
            <organization/>
          </author>
          <author fullname="J. Schnizlein" initials="J." surname="Schnizlein">
            <organization/>
          </author>
          <date month="February" year="2005"/>
          <abstract>
            <t>The RADIUS Attributes suboption enables a network element to pass identification and authorization attributes received during RADIUS authentication to a DHCP server.  When the DHCP server receives a message from a relay agent containing a RADIUS Attributes suboption, it extracts the contents of the suboption and uses that information in selecting configuration parameters for the client.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4014"/>
        <seriesInfo name="DOI" value="10.17487/RFC4014"/>
      </reference>
      <reference anchor="RFC2865" target="https://www.rfc-editor.org/info/rfc2865">
        <front>
          <title>Remote Authentication Dial In User Service (RADIUS)</title>
          <author fullname="C. Rigney" initials="C." surname="Rigney">
            <organization/>
          </author>
          <author fullname="S. Willens" initials="S." surname="Willens">
            <organization/>
          </author>
          <author fullname="A. Rubens" initials="A." surname="Rubens">
            <organization/>
          </author>
          <author fullname="W. Simpson" initials="W." surname="Simpson">
            <organization/>
          </author>
          <date month="June" year="2000"/>
          <abstract>
            <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2865"/>
        <seriesInfo name="DOI" value="10.17487/RFC2865"/>
      </reference>
      <reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665">
        <front>
          <title>Service Function Chaining (SFC) Architecture</title>
          <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern">
            <organization/>
          </author>
          <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro">
            <organization/>
          </author>
          <date month="October" year="2015"/>
          <abstract>
            <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7665"/>
        <seriesInfo name="DOI" value="10.17487/RFC7665"/>
      </reference>
      <reference anchor="RFC8986" target="https://www.rfc-editor.org/info/rfc8986">
        <front>
          <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo">
            <organization/>
          </author>
          <author fullname="J. Leddy" initials="J." surname="Leddy">
            <organization/>
          </author>
          <author fullname="D. Voyer" initials="D." surname="Voyer">
            <organization/>
          </author>
          <author fullname="S. Matsushima" initials="S." surname="Matsushima">
            <organization/>
          </author>
          <author fullname="Z. Li" initials="Z." surname="Li">
            <organization/>
          </author>
          <date month="February" year="2021"/>
          <abstract>
            <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
            <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
            <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8986"/>
        <seriesInfo name="DOI" value="10.17487/RFC8986"/>
      </reference>
      <reference anchor="RFC6740" target="https://www.rfc-editor.org/info/rfc6740">
        <front>
          <title>Identifier-Locator Network Protocol (ILNP) Architectural Description</title>
          <author fullname="RJ Atkinson" initials="RJ" surname="Atkinson">
            <organization/>
          </author>
          <author fullname="SN Bhatti" initials="SN" surname="Bhatti">
            <organization/>
          </author>
          <date month="November" year="2012"/>
          <abstract>
            <t>This document provides an architectural description and the concept of operations for the Identifier-Locator Network Protocol (ILNP), which is an experimental, evolutionary enhancement to IP.  This is a product of the IRTF Routing Research Group.  This  document defines an Experimental Protocol for the Internet  community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6740"/>
        <seriesInfo name="DOI" value="10.17487/RFC6740"/>
      </reference>
      <reference anchor="RFC2474" target="https://www.rfc-editor.org/info/rfc2474">
        <front>
          <title>Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers</title>
          <author fullname="K. Nichols" initials="K." surname="Nichols">
            <organization/>
          </author>
          <author fullname="S. Blake" initials="S." surname="Blake">
            <organization/>
          </author>
          <author fullname="F. Baker" initials="F." surname="Baker">
            <organization/>
          </author>
          <author fullname="D. Black" initials="D." surname="Black">
            <organization/>
          </author>
          <date month="December" year="1998"/>
          <abstract>
            <t>This document defines the IP header field, called the DS (for differentiated services) field.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2474"/>
        <seriesInfo name="DOI" value="10.17487/RFC2474"/>
      </reference>
      <reference anchor="RFC8939" target="https://www.rfc-editor.org/info/rfc8939">
        <front>
          <title>Deterministic Networking (DetNet) Data Plane: IP</title>
          <author fullname="B. Varga" initials="B." role="editor" surname="Varga">
            <organization/>
          </author>
          <author fullname="J. Farkas" initials="J." surname="Farkas">
            <organization/>
          </author>
          <author fullname="L. Berger" initials="L." surname="Berger">
            <organization/>
          </author>
          <author fullname="D. Fedyk" initials="D." surname="Fedyk">
            <organization/>
          </author>
          <author fullname="S. Bryant" initials="S." surname="Bryant">
            <organization/>
          </author>
          <date month="November" year="2020"/>
          <abstract>
            <t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8939"/>
        <seriesInfo name="DOI" value="10.17487/RFC8939"/>
      </reference>
      <reference anchor="RFC8402" target="https://www.rfc-editor.org/info/rfc8402">
        <front>
          <title>Segment Routing Architecture</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
            <organization/>
          </author>
          <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi">
            <organization/>
          </author>
          <author fullname="L. Ginsberg" initials="L." surname="Ginsberg">
            <organization/>
          </author>
          <author fullname="B. Decraene" initials="B." surname="Decraene">
            <organization/>
          </author>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski">
            <organization/>
          </author>
          <author fullname="R. Shakir" initials="R." surname="Shakir">
            <organization/>
          </author>
          <date month="July" year="2018"/>
          <abstract>
            <t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
            <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t>
            <t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8402"/>
        <seriesInfo name="DOI" value="10.17487/RFC8402"/>
      </reference>
      <reference anchor="RFC5533" target="https://www.rfc-editor.org/info/rfc5533">
        <front>
          <title>Shim6: Level 3 Multihoming Shim Protocol for IPv6</title>
          <author fullname="E. Nordmark" initials="E." surname="Nordmark">
            <organization/>
          </author>
          <author fullname="M. Bagnulo" initials="M." surname="Bagnulo">
            <organization/>
          </author>
          <date month="June" year="2009"/>
          <abstract>
            <t>This document defines the Shim6 protocol, a layer 3 shim for providing locator agility below the transport protocols, so that multihoming can be provided for IPv6 with failover and load-sharing properties, without assuming that a multihomed site will have a provider-independent IPv6 address prefix announced in the global IPv6 routing table.  The hosts in a site that has multiple provider- allocated IPv6 address prefixes will use the Shim6 protocol specified in this document to set up state with peer hosts so that the state can later be used to failover to a different locator pair, should the original one stop working.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5533"/>
        <seriesInfo name="DOI" value="10.17487/RFC5533"/>
      </reference>
      <reference anchor="RFC6275" target="https://www.rfc-editor.org/info/rfc6275">
        <front>
          <title>Mobility Support in IPv6</title>
          <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins">
            <organization/>
          </author>
          <author fullname="D. Johnson" initials="D." surname="Johnson">
            <organization/>
          </author>
          <author fullname="J. Arkko" initials="J." surname="Arkko">
            <organization/>
          </author>
          <date month="July" year="2011"/>
          <abstract>
            <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6275"/>
        <seriesInfo name="DOI" value="10.17487/RFC6275"/>
      </reference>
      <reference anchor="RFC7401" target="https://www.rfc-editor.org/info/rfc7401">
        <front>
          <title>Host Identity Protocol Version 2 (HIPv2)</title>
          <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz">
            <organization/>
          </author>
          <author fullname="T. Heer" initials="T." surname="Heer">
            <organization/>
          </author>
          <author fullname="P. Jokela" initials="P." surname="Jokela">
            <organization/>
          </author>
          <author fullname="T. Henderson" initials="T." surname="Henderson">
            <organization/>
          </author>
          <date month="April" year="2015"/>
          <abstract>
            <t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
            <t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7401"/>
        <seriesInfo name="DOI" value="10.17487/RFC7401"/>
      </reference>
      <reference anchor="I-D.ietf-lisp-rfc6830bis" target="https://www.ietf.org/archive/id/draft-ietf-lisp-rfc6830bis-36.txt">
        <front>
          <title>The Locator/ID Separation Protocol (LISP)</title>
          <author fullname="Dino Farinacci">
            <organization>lispers.net</organization>
          </author>
          <author fullname="Vince Fuller">
            <organization>vaf.net Internet Consulting</organization>
          </author>
          <author fullname="Dave Meyer">
            <organization>1-4-5.net</organization>
          </author>
          <author fullname="Darrel Lewis">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Albert Cabellos">
            <organization>UPC/BarcelonaTech</organization>
          </author>
          <date day="18" month="November" year="2020"/>
          <abstract>
            <t>   This document describes the Data-Plane protocol for the Locator/ID
   Separation Protocol (LISP).  LISP defines two namespaces, End-point
   Identifiers (EIDs) that identify end-hosts and Routing Locators
   (RLOCs) that identify network attachment points.  With this, LISP
   effectively separates control from data, and allows routers to create
   overlay networks.  LISP-capable routers exchange encapsulated packets
   according to EID-to-RLOC mappings stored in a local Map-Cache.

   LISP requires no change to either host protocol stacks or to underlay
   routers and offers Traffic Engineering, multihoming and mobility,
   among other features.

   This document obsoletes RFC 6830.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6830bis-36"/>
      </reference>
      <reference anchor="RFC7348" target="https://www.rfc-editor.org/info/rfc7348">
        <front>
          <title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
          <author fullname="M. Mahalingam" initials="M." surname="Mahalingam">
            <organization/>
          </author>
          <author fullname="D. Dutt" initials="D." surname="Dutt">
            <organization/>
          </author>
          <author fullname="K. Duda" initials="K." surname="Duda">
            <organization/>
          </author>
          <author fullname="P. Agarwal" initials="P." surname="Agarwal">
            <organization/>
          </author>
          <author fullname="L. Kreeger" initials="L." surname="Kreeger">
            <organization/>
          </author>
          <author fullname="T. Sridhar" initials="T." surname="Sridhar">
            <organization/>
          </author>
          <author fullname="M. Bursell" initials="M." surname="Bursell">
            <organization/>
          </author>
          <author fullname="C. Wright" initials="C." surname="Wright">
            <organization/>
          </author>
          <date month="August" year="2014"/>
          <abstract>
            <t>This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.  The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers.  This memo documents the deployed VXLAN protocol for the benefit of the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7348"/>
        <seriesInfo name="DOI" value="10.17487/RFC7348"/>
      </reference>
      <reference anchor="RFC8926" target="https://www.rfc-editor.org/info/rfc8926">
        <front>
          <title>Geneve: Generic Network Virtualization Encapsulation</title>
          <author fullname="J. Gross" initials="J." role="editor" surname="Gross">
            <organization/>
          </author>
          <author fullname="I. Ganga" initials="I." role="editor" surname="Ganga">
            <organization/>
          </author>
          <author fullname="T. Sridhar" initials="T." role="editor" surname="Sridhar">
            <organization/>
          </author>
          <date month="November" year="2020"/>
          <abstract>
            <t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters.  As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components.  Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8926"/>
        <seriesInfo name="DOI" value="10.17487/RFC8926"/>
      </reference>
      <reference anchor="RFC8609" target="https://www.rfc-editor.org/info/rfc8609">
        <front>
          <title>Content-Centric Networking (CCNx) Messages in TLV Format</title>
          <author fullname="M. Mosko" initials="M." surname="Mosko">
            <organization/>
          </author>
          <author fullname="I. Solis" initials="I." surname="Solis">
            <organization/>
          </author>
          <author fullname="C. Wood" initials="C." surname="Wood">
            <organization/>
          </author>
          <date month="July" year="2019"/>
          <abstract>
            <t>Content-Centric Networking (CCNx) is a network protocol that uses a hierarchical name to forward requests and to match responses to requests.  This document specifies the encoding of CCNx messages in a TLV packet format, including the TLV types used by each message element and the encoding of each value.  The semantics of CCNx messages follow the encoding-independent CCNx Semantics specification.</t>
            <t>This document is a product of the Information Centric Networking research group (ICNRG).  The document received wide review among ICNRG participants and has two full implementations currently in active use, which have informed the technical maturity of the protocol specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8609"/>
        <seriesInfo name="DOI" value="10.17487/RFC8609"/>
      </reference>
      <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986">
        <front>
          <title>Uniform Resource Identifier (URI): Generic Syntax</title>
          <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
            <organization/>
          </author>
          <author fullname="R. Fielding" initials="R." surname="Fielding">
            <organization/>
          </author>
          <author fullname="L. Masinter" initials="L." surname="Masinter">
            <organization/>
          </author>
          <date month="January" year="2005"/>
          <abstract>
            <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="66"/>
        <seriesInfo name="RFC" value="3986"/>
        <seriesInfo name="DOI" value="10.17487/RFC3986"/>
      </reference>
      <reference anchor="RFC2009" target="https://www.rfc-editor.org/info/rfc2009">
        <front>
          <title>GPS-Based Addressing and Routing</title>
          <author fullname="T. Imielinski" initials="T." surname="Imielinski">
            <organization/>
          </author>
          <author fullname="J. Navas" initials="J." surname="Navas">
            <organization/>
          </author>
          <date month="November" year="1996"/>
          <abstract>
            <t>This document describes a possible experiment with geographic addresses. It uses several specific IP addresses and domain names in the discussion as concrete examples to aid in understanding the concepts.  This memo defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2009"/>
        <seriesInfo name="DOI" value="10.17487/RFC2009"/>
      </reference>
      <reference anchor="RFC8799" target="https://www.rfc-editor.org/info/rfc8799">
        <front>
          <title>Limited Domains and Internet Protocols</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter">
            <organization/>
          </author>
          <author fullname="B. Liu" initials="B." surname="Liu">
            <organization/>
          </author>
          <date month="July" year="2020"/>
          <abstract>
            <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes. </t>
            <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8799"/>
        <seriesInfo name="DOI" value="10.17487/RFC8799"/>
      </reference>
      <reference anchor="RFC7872" target="https://www.rfc-editor.org/info/rfc7872">
        <front>
          <title>Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World</title>
          <author fullname="F. Gont" initials="F." surname="Gont">
            <organization/>
          </author>
          <author fullname="J. Linkova" initials="J." surname="Linkova">
            <organization/>
          </author>
          <author fullname="T. Chown" initials="T." surname="Chown">
            <organization/>
          </author>
          <author fullname="W. Liu" initials="W." surname="Liu">
            <organization/>
          </author>
          <date month="June" year="2016"/>
          <abstract>
            <t>This document presents real-world data regarding the extent to which packets with IPv6 Extension Headers (EHs) are dropped in the Internet (as originally measured in August 2014 and later in June 2015, with similar results) and where in the network such dropping occurs.  The aforementioned results serve as a problem statement that is expected to trigger operational advice on the filtering of IPv6 packets carrying IPv6 EHs so that the situation improves over time.  This document also explains how the results were obtained, such that the corresponding measurements can be reproduced by other members of the community and repeated over time to observe changes in the handling of packets with IPv6 EHs.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7872"/>
        <seriesInfo name="DOI" value="10.17487/RFC7872"/>
      </reference>
      <reference anchor="I-D.rafiee-6man-cga-attack" target="https://www.ietf.org/archive/id/draft-rafiee-6man-cga-attack-03.txt">
        <front>
          <title>Possible Attack on Cryptographically Generated Addresses (CGA)</title>
          <author fullname="Hosnieh Rafiee">
	 </author>
          <author fullname="Christoph Meinel">
	 </author>
          <date day="8" month="May" year="2015"/>
          <abstract>
            <t>   This document describes the possible attacks with the use of
   Cryptographically Generated Addresses.





            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rafiee-6man-cga-attack-03"/>
      </reference>
      <reference anchor="RFC8280" target="https://www.rfc-editor.org/info/rfc8280">
        <front>
          <title>Research into Human Rights Protocol Considerations</title>
          <author fullname="N. ten Oever" initials="N." surname="ten Oever">
            <organization/>
          </author>
          <author fullname="C. Cath" initials="C." surname="Cath">
            <organization/>
          </author>
          <date month="October" year="2017"/>
          <abstract>
            <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t>
            <t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8280"/>
        <seriesInfo name="DOI" value="10.17487/RFC8280"/>
      </reference>
      <reference anchor="I-D.ietf-intarea-tunnels" target="https://www.ietf.org/archive/id/draft-ietf-intarea-tunnels-10.txt">
        <front>
          <title>IP Tunnels in the Internet Architecture</title>
          <author fullname="Joe Touch">
            <organization>Independent consultant</organization>
          </author>
          <author fullname="Mark Townsley">
            <organization>Cisco</organization>
          </author>
          <date day="12" month="September" year="2019"/>
          <abstract>
            <t>   This document discusses the role of IP tunnels in the Internet
   architecture. An IP tunnel transits IP datagrams as payloads in non-
   link layer protocols. This document explains the relationship of IP
   tunnels to existing protocol layers and the challenges in supporting
   IP tunneling, based on the equivalence of tunnels to links. The
   implications of this document are used to derive recommendations that
   update MTU and fragment issues in RFC 4459.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-tunnels-10"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to all the people that shared insightful comments both privately to the authors as well as on various mailing list, especially on the INTArea Mailing List.
Also thanks for the interesting discussions to Carsten Borman, Brian E. Carpenter.
<!-- [LI]:  add the panelists and all that replied on the mailing list -->
      </t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
