<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.7.0) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jia-intarea-scenarios-problems-addressing-03" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="Scenarios and Problems in Addressing">Challenging Scenarios and Problems in Internet Addressing</title>
    <seriesInfo name="Internet-Draft" value="draft-jia-intarea-scenarios-problems-addressing-03"/>
    <author initials="Y." surname="Jia" fullname="Yihao Jia">
      <organization abbrev="Huawei">Huawei Technologies Co., Ltd</organization>
      <address>
        <postal>
          <street>156 Beiqing Rd.</street>
          <city>Beijing</city>
          <code>100095</code>
          <country>P.R. China</country>
        </postal>
        <email>jiayihao@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>dirk.trossen@huawei.com</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U.</organization>
      <address>
        <postal>
          <street>18, Quai du Point du Jour</street>
          <city>Boulogne-Billancourt</city>
          <code>92100</code>
          <country>France</country>
        </postal>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="N." surname="Shenoy" fullname="Nirmala Shenoy">
      <organization abbrev="R.I.T.">Rochester Institute of Technology</organization>
      <address>
        <postal>
          <street/>
          <city>New-York</city>
          <code>14623</code>
          <country>USA</country>
        </postal>
        <email>nxsvks@rit.edu</email>
      </address>
    </author>
    <author initials="P." surname="Mendes" fullname="Paulo Mendes">
      <organization abbrev="Airbus">Airbus</organization>
      <address>
        <postal>
          <street>Willy-Messerschmitt Strasse 1</street>
          <city>Munich</city>
          <code>81663</code>
          <country>Germany</country>
        </postal>
        <email>paulo.mendes@airbus.com</email>
      </address>
    </author>
    <author initials="D." surname="Eastlake 3rd" fullname="Donald E. Eastlake 3rd">
      <organization abbrev="Futurewei">Futurewei Technologies</organization>
      <address>
        <postal>
          <street>2386 Panoramic Circle</street>
          <city>Apopka, FL</city>
          <code>32703</code>
          <country>United States of America</country>
        </postal>
        <email>d3e3e3@gmail.com</email>
      </address>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization abbrev="China Mobile">China Mobile</organization>
      <address>
        <postal>
          <street>32 Xuanwumen West Ave</street>
          <city>Xicheng, Beijing</city>
          <code>100053</code>
          <country>P.R. China</country>
        </postal>
        <email>liupengyjy@chinamobile.com</email>
      </address>
    </author>
    <author initials="D." surname="Farinacci" fullname="Dino Farinacci">
      <organization abbrev="lispers.net">lispers.net</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>farinacci@gmail.com</email>
      </address>
    </author>
    <date/>
    <area>Internet</area>
    <workgroup>Internet Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Internet Protocol (IP) has been the major technological success in information technology of the last half century. As the Internet becomes pervasive, IP has been replacing communication technology for many domain-specific solutions. However, domains with specific requirements as well as communication behaviors and semantics still exist and represent what <xref target="RFC8799"/> recognizes as "limited domains".</t>
      <t>This document describes well-recognized scenarios that showcase possibly different addressing requirements, which are challenging to be accommodated in the IP addressing model. These scenarios highlight issues related to the Internet addressing model and call for starting a discussion on a way to re-think/evolve the addressing model so to better accommodate different domain-specific requirements.</t>
      <t>The issues identified in this document are complemented and deepened by a detailed gap analysis in a separate companion document <xref target="I-D.jia-intarea-internet-addressing-gap-analysis"/>.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="SEC_intro">
      <name>Introduction</name>
      <t>The Internet Protocol (IP), positioned as the unified protocol at the (Internet) network layer, is seen by many as key to the innovation stemming from Internet-based applications and services. Even more so, with the success of TCP/IP protocol stack, IP has been gradually replacing existing domain-specific protocols, evolving into the core protocol of the entire communication eco-system. At its inception, roughly 40 years ago <xref target="RFC0791"/>, the Internet addressing system, represented in the form of the IP address and its locator-based (topological) semantics, has brought the notion of a 'common namespace for all communication'. Compared to proprietary technology-specific solutions, such 'common namespace for all communication' advance ensures end-to-end communication from any device connected to the Internet to another.</t>
      <t>However, use cases, associated services, node behaviors, and requirements on packet delivery have since been significantly extended, with the Internet technology being developed to accommodate them in the framework of addressing that stood at the beginning of the Internet's development. This evolution is reflected in the concept of "Limited Domains", first introduced in <xref target="RFC8799"/>. It refers to a single physical network, attached to or running in parallel with the Internet, or is defined by a set of users and nodes distributed over a much wider area, but drawn together by a single virtual network over the Internet. Key to a limited domain is that requirements, behaviors, and semantics could be noticeable local and, more importantly, specific to the limited domain. Very often, the realization of a limited domain is defined by specific communication scenario(s) and/or use case(s) that exhibit the domain-specific behaviors and pose the requirements that lead to the establishment of the limited domain. Identifying limited domains may sometime be not obvious because of blurry boundaries depending on the point of view. For instance, from an end user perspective there is no vision at all on limited domains, hence for end users the dichotomy Internet vs limited domains more transparent. In such cases, it is harder to ensure (and detect) that no limited domain specific semantics leak in the Internet or other limited domains.</t>
      <t>One key architectural aspect, when communicating within limited domains, is that of addressing and, therefore, the address structure, as well as the semantic that is being used for packet forwarding (e.g., service identification, content location, device type). The topological location centrality of IP is fundamental when reconciling the often differing semantics for 'addressing' that can be found in those limited domains. The result of this fundamental role of the single IP addressing is that limited domains have to adopt specific solutions, e.g., translating/mapping/converting concepts, semantics, and ultimately, domain-specific addressing, into the common IP addressing used across limited domains.</t>
      <t>This document advocates flexibility in addressing in order to accommodate limited domain specific semantics, while, if possible, ensuring a single holistic addressing scheme able to reduce, or even entirely remove, the need for aligning the address semantics of different limited domains, such as the current topological location semantic of the Internet. Ultimately, such holistic addressing could be beneficial to those communication scenarios realized within limited domains by improving efficiency, removing of constraints imposed by needing to utilize the limited semantics of IP addressing, and/or in other ways.</t>
      <t>In other words, this document revolves around the following question:</t>
      <ul empty="true">
        <li>
          <t>"Should interconnected limited domains purely rely on IP addresses and therefore deal with the complexity of translating any semantic mismatch themselves, or should flexibility for supporting those limited domains be a key focus for an evolved Internet addressing?"</t>
        </li>
      </ul>
      <t>To that end, this document describes well-recognized scenarios in limited domains that could benefit from greater flexibility in addressing and overviews the problems encountered throughout these scenarios due to the lack of that flexibility. A detailed gap analysis can be found in {I-D.jia-intarea-internet-addressing-gap-analysis}}, which elaborates on the issues identified in this memo in reference to extensions to Internet addressing that have attempted to address those issues. The purpose of this memo is rather to stimulate discussion on the emerging needs for addressing at large with the possibility to fundamentally re-think the addressing in the Internet beyond the current objectives of IPv6 <xref target="RFC8200"/>.</t>
      <t>It is important to remark that any change in the addressing, hence at the data plane level, leads to changes and challenges at the control plane level, i.e., routing. The latter is an even harder problem than just addressing and might need more research efforts that are beyond the objective of this document, which focuses solely on the data plane.</t>
    </section>
    <section anchor="SEC_cases">
      <name>Communication Scenarios in Limited Domains</name>
      <t>The following sub-sections outline a number of scenarios, all of which belong to the concept of "limited domains" <xref target="RFC8799"/>. While the list of scenarios may look long, this document focuses on scenarios with a number of aspects that can be observed in those limited domains, captured in the sub-section titles. For each scenario, possible challenges are highlighted, which are then picked upon in <xref target="SEC_problem"/>, when describing more formally the existing  shortcomings in current Internet addressing.</t>
      <section anchor="SEC_constrained">
        <name>Communication in Constrained Environments</name>
        <t>In a number of communication scenarios, such as those encountered in the Internet of Things (IoT), a simple, communication network demanding minimal resources is required, allowing for a group of IoT network devices to form a network of constrained nodes, with the participating network and end nodes requiring as little computational power as possible and having small memory requirements in order to reduce the total cost of ownership of the network. Furthermore, in the context of industrial IoT, real-time requirements and scalability make IP technology not naturally suitable as communication technology (<xref target="OCADO"/>).</t>
        <t>In addition to IEEE 802.15.4, i.e., Low-Rate Wireless Personal Area Network <xref target="LR-WPAN"/>, several limited domains exist through utilizing link layer technologies such as Bluetooth Low Energy (BLE) <xref target="BLE"/>, Digital European Cordless Telecommunications (DECT) - Ultra Low Energy (ULE) <xref target="DECT-ULE"/>, Master-Slave/Token-Passing (MS/TP) <xref target="BACnet"/>, Near-Field-Communication (NFC) <xref target="ECMA-340"/>, and Power Line Communication (PLC) <xref target="IEEE_1901.1"/>.</t>
        <t>The end-to-end principle (detailed in <xref target="RFC2775"/>) requires IP addresses (e.g., IPv6 <xref target="RFC8200"/>) to be used on such constrained nodes networks, allowing IoT devices using multiple communication technologies to talk on the Internet. Often, devices located at the edge of constrained networks act as gateway devices, usually performing header compression (<xref target="RFC4919"/>). To ensure security and reliability, multiple gateways must be deployed. IoT devices on the network must select one of those gateways for traffic passthrough by the devices on the (limited domain) network.</t>
        <t>Given the constraints imposed on the computational and possibly also communication technology, the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., IPv6 address, may pose a challenge when operating such networks.</t>
        <t>Another type of (differently) constrained environment is an aircraft, which encompasses not only passenger communication but also the integration of real-time data exchange to ensure that processes and functions in the cabin are automatically monitored or actuated. The goal for any aircraft network is to be able to send and receive information reliably and seamlessly. From this perspective, the medium with which these packets of information are sent is of little consequence so long as there is a level of determinism to it. However, there is currently no effective method in implementing wireless inter- and intra-communications between all subsystems. The emerging wireless sensor network technology in commercial applications such as smart thermostat systems, and smart washer/dryer units could be transposed onto aircraft and fleet operations. The proposal for having an Wireless Avionics Intra-Communications (WAIC) system promises reduction in the complexity of electrical wiring harness design and fabrication, reduction in wiring weight, increased configuration, and potential monitoring of otherwise inaccessible moving or rotating aircraft parts. Similar to the IoT concept, WAIC systems consist of short-range communications and are a potential candidate for passenger entertainment systems, smoke detectors, engine health monitors, tire pressure monitoring systems, and other kinds of aircraft maintenance systems.</t>
        <t>While there are still many obstacles in terms of network security, traffic control, and technical challenges, future WAIC can enable real-time seamless communications between aircraft and between ground teams and aircraft as opposed to the discrete points of data leveraged today in aircraft communications. For that, WAIC infrastructure should also be connected to outside IP based networks in order to access edge/cloud facilities for data storage and mining. However, the restricted capacity (energy, communication) of most aircraft devices (e.g. sensors) and the nature of the transmitted data - periodic transmission of small packets - may pose some challenges for the usage of a single addressing semantic in the form of a 128-bit endpoint identifier, i.e., an IPv6 address. Moreover, most of the aircraft applications and services are focused on the data (e.g. temperature of gas tank on left wing) and not on the topological location of the data source. This means that the current topological location semantic of IP addresses is not beneficial for aircraft applications and services.</t>
        <t>Greater flexibility in Internet addressing may avoid complex and energy hungry operations, like header compression and fragmentation, necessary to translate protocol headers from one limited domain to another, while enabling semantics different from locator-based addressing may better support the communication that occurs in those environments.</t>
      </section>
      <section anchor="SEC_dynamic">
        <name>Communication within Dynamically Changing Topologies</name>
        <t>Communication may occur over networks that exhibit dynamically changing topologies. One such example is that of satellite networks, providing global Internet connections through a combination of inter-satellite and ground station communication. With the convergence of space-based and terrestrial networks, users can experience seamless broadband access, e.g., on cruise ships, flights, and within cars, often complemented by and seamlessly switching between Wi-Fi, cellular, or satellite based networks at any time <xref target="WANG19"/>.</t>
        <t>The satellite network service provider will plan the transmission path of user traffic based on the network coverage, satellite orbit, route, and link load, providing potentially high-quality Internet connections for users in areas that are not, or hard to be, covered by terrestrial networks. With large scale LEO (Low Earth Orbit) satellites, the involved topologies of the satellite network will be changing constantly while observing a regular flight pattern in relation to other satellites and predictable overflight patterns to ground users <xref target="CHEN21"/>.</t>
        <t>Although satellite bearer services are capable of transporting IPv4 and IPv6, as well as associated protocols such as IP Multicast, DNS services and routing information, no IP functionality is implemented on-board the spacecraft limiting the capability of leveraging for instance large scale satellite constellations.</t>
        <t>One of the major constraints of deploying routing capability on board of a satellite is power consumption. Due to this, space routers may end up being intermittently powered up during a daytime sunlit pass. Another limitation of the first generation of IP routers in space was the lack of capability to remotely manage and upgrade software while in operation.</t>
        <t>The limitations faced in early development of IP based satellite communication payloads, showed the need to develop a flexible networking solution that would enable delay tolerant communications in the presence of intermittent connectivity. Further, in order to reduce latency, which is the major impairment of satellite networks, there was a need of a networking solution able to perform in a scenario encompassing mobile devices with the capability of storing data, leading to a significant reduction of latency, which is the major impairment of satellite networks.</t>
        <t>Moreover, due to the current IP addressing scheme and its focus on IP unicast addressing with extended deployment of IP multicast and some IP anycast, current deployments do not take advantage of the broadcast nature of satellite networks.</t>
        <t>Moreover networking platforms based on a name (data or service) based addressing scheme would bring several potential benefits to satellite networks aiming to tackle their major challenges, including high propagation delay and changing network topology in the case of LEO constellations.</t>
        <t>Another example is that of vehicular communication, where services may be accessed across vehicles, such as self-driving cars, for the purpose of collaborative objection recognition (e.g., for collision avoidance), road status conveyance (e.g., for pre-warning of road-ahead conditions), and other purposes. Communication may include Road Side Units (RSU) with the possibility to create ephemeral connections to those RSUs for the purpose of workload offloading, joint computation over multiple (vehicular) inputs, and other purposes <xref target="I-D.ietf-lisp-nexagon"/>. Communication here may exhibit a multi-hop nature, not just involving the vehicle and the RSU over a direct link. Those topologies are naturally changing constantly due to the dynamic nature of the involved communication nodes.</t>
        <t>The advent of Flying Ad-hoc NETworks (FANETs) has opened up an opportunity to create new added-value services <xref target="CHRIKI19"/>. Although these networks share common features with vehicular ad hoc networks, they present several unique characteristics such as energy efficiency, mobility degree, the capability of swarming, and the potential large scale of swarm networks. Due to high mobility of FANET nodes, the network topology changes more frequently than in a typical vehicular ad hoc network. From a routing point of view, although ad-hoc reactive and proactive routing approaches can be used, there are other type of routing protocols that have been developed for FANETS, such as hybrid routing protocols and position based routing protocols, aiming to increase efficiency in large scale networks with dynamic topologies.</t>
        <t>Both type of protocols challenge the current Internet addressing semantic: in the case of hybrid protocols, two different routing strategies are used inside and outside a network zone. While inside a zone packets are routed to a specific destination IP address, between zones, query packets are routed to a subset of neighbors as determined by a broadcast algorithm. In the case of position based routing protocol, the IP addressing scheme is not used at all, since packets are routed to a different identifier, corresponding to the geographic location of the destination and not its topological location. Hence, what is needed is to consolidate the geo-spatial addressing with that of a locator-based addressing in order to optimize routing policies across the zones.</t>
        <t>Moreover most of the application/services deployed in FANETs tend to be agnostic of the topological location of nodes, rather focusing on the location of data or services. This distinction is even more important because is dynamic network such as FANET robust networking solutions may rely on the redundancy of data and services, meaning that they may be found in more than one device in the network. This in turn may bring into play a possible service-centric semantic for addressing the packets that need routing in the dynamic network towards a node providing said service (or content).</t>
        <t>In the aforementioned network technologies, there is a significant difference between the high dynamics of the underlying network topologies, compared to the relative static nature of terrestrial network topology, as reported in <xref target="HANDLEY"/>. As a consequence, the notion of a topological network location becomes restrictive in the sense that not only the relation between network nodes and user endpoint may change, but also the relation between the nodes that form the network itself. This may lead to the challenge of maintaining and updating the topological addresses in this constantly changing network topology.</t>
        <t>In attempts to utilize entirely different semantics for the addressing itself, geographic-based routing, such as in <xref target="CARTISEAN"/>, has been proposed for MANETs (Mobile Ad-hoc NETworks) through providing geographic coordinates based addresses to achieve better routing performance, lower overhead, and lower latency <xref target="MANET1"/>.</t>
        <t>Flexibility in Internet addressing here would allow for accommodating such geographic address semantics into the overall Internet addressing, while also enabling name/content-based addressing, utilizing the redundancy of many network locations providing the possible data.</t>
      </section>
      <section anchor="SEC_mobility">
        <name>Communication among Moving Endpoints</name>
        <t>When packet switching was first introduced, back in the 60s/70s, it was intended to replace the rigid circuit switching with a communication infrastructure that was more resilient to failures. As such, the design never really considered communication endpoints as mobile. Even in the pioneering ALOHA <xref target="ALOHA"/> system, despite considering wireless and satellite links, the network was considered static (with the exception of failures and satellites, which fall in what is discussed in <xref target="SEC_dynamic"/>). Ever since, a lot of efforts have been devoted to overcome such limitations once it became clear that endpoint mobility will become a main (if not THE main) characteristic of ubiquitous communication systems.</t>
        <t>The IETF has for a long time worked on solutions that would allow extending the IP layer with mobility support. Because of the topological semantic of IP addresses, endpoints need to change addresses each time they visit a different network. However, because routing and endpoint identification is also IP address based, this leads to a communication disruption.</t>
        <t>To cope with such a situation, sometimes, the transport layer gets involved in mobility solutions, either by introducing explicit in-band signaling to allow for communicating IP address changes (e.g., in SCTP <xref target="RFC5061"/> and MPTCP <xref target="RFC6182"/>), or by introducing some form of connection ID that allows for identifying a communication independently from IP addresses (e.g., the connection ID used in QUIC <xref target="RFC9000"/>).</t>
        <t>Concerning network layer only solutions, anchor-based Mobile IP mechanisms have been introduced (<xref target="RFC5177"/>, <xref target="RFC6626"/> <xref target="RFC5944"/>, <xref target="RFC5275"/>). Mobile IP is based on a relatively complex and heavy mechanism that makes it hard to deploy and it is not very efficient. Furthermore, it is even less suitable than native IP in constrained environments like the ones discussed in <xref target="SEC_constrained"/>.</t>
        <t>Alternative approaches to Mobile IP often leverage the introduction of some form of overlay. LISP <xref target="I-D.ietf-lisp-introduction"/>, by separating the topological semantic from the identification semantic of IP addresses, is able to cope with endpoint mobility by dynamically mapping endpoint identifiers with routing locators <xref target="I-D.ietf-lisp-mn"/>. This comes at the price of an overlay that needs its own additional control plane <xref target="I-D.ietf-lisp-rfc6833bis"/>.</t>
        <t>Similarly, the NVO3 (Network Virtualization Overlays) Working Group, while focusing on Data Center environments, also explored an overlay-based solution for multi-tenancy purposes, but also resilient to mobility since relocating Virtual Machines (VMs) is common practice. NVO3 considered for a long time several data planes that implement slightly different flavors of overlays (<xref target="RFC8926"/>, <xref target="RFC7348"/>, <xref target="I-D.ietf-intarea-gue"/>), but lacks an efficient control plane specifically tailored for DCs.</t>
        <t>Alternative mobility architectures have also been proposed in order to cope with endpoint mobility outside the IP layer itself. The Host Identity Protocol (HIP) <xref target="RFC7401"/> introduced a new namespace in order to identify endpoints, namely the Host Identity (HI), while leveraging the IP layer for topological location. On the one hand, such an approach needs to revise the way applications interact with the network layer, by modifying the DNS (now returning an HI instead of an IP address) and applications to use the HIP socket extension. On the other hand, early adopters do not necessarily gain any benefit unless all communicating endpoints upgrade to use HIP.  In spite of this, such a solution may work in the context of a limited domain.</t>
        <t>Another alternative approach is adopted by Information-Centric Networking (ICN) <xref target="RFC7476"/>. By making content a first class citizen of the communication architecture, the "what" rather than the "where" becomes the real focus of the communication. However, as explained in the next sub-section, ICN can run either over the IP layer or completely replace it, which in turn can be seen as running the Internet and ICN as logically completely separated limited domains.</t>
        <t>Unmanned Aircraft Systems (UAS) are examples of moving devices that require a stable mobility management scheme since they consist of a number of Unmanned Aerial Vehicles (UAV) subordinated to a Ground Control Station (GCS) <xref target="MAROJEVIC20"/>. The information produced by the different sensors and electronic devices available at each UAV is collected and processed by a software or hardware data acquisition unit, being transmitted towards the GCS, where it is inspected and/or analyzed. Analogously, control information transmitted from the GCS to the UAV enables the execution of control operations over the aircraft, such as changing the route planning or the direction pointed by a camera.</t>
        <t>Although UAVs may have redundant links to maintain communications in long-range missions (e.g., satellite), most of the communications between the GCS and the UAVs take place over wireless data links, e.g., based on a radio line-of-sight technology, Wi-Fi or 3G/4G/5G. While in some scenarios, UAVs will operate always under the range of the same cellular base station, in missions with large range, UAVs will move between different cellular or wireless ground infrastructure, meaning that the UAV needs to upload its topological locator and re-start the ongoing communication sessions. In such cases, most of existing Mobile IP approaches may play a role, as well as approaches to split the UAV identifier and the topological locator, such as HIP.</t>
        <t>However, while the industry is given the first steps towards evolved UAS architectures and communication models, the data-centric communication plays an increasing role, where information is named and decoupled from its location, and applications/services operate over these named data rather than on host-to-host communications.</t>
        <t>In this context, the Data Distribution Service (<xref target="DDS"/>) has emerged as an industry-oriented open standard that follows this approach. The space and time decoupling allowed by DDS is very relevant in any dynamic and distributed system, since interacting entities are not forced to know each other and are not forced to be simultaneously present to exchange data. Time decoupling can significantly simplify the management of intermittent data-links, in particular for wireless connectivity between UAS, as well as facilitate seamless UAV mobility between GCSs. This model of communication, in turn, questions the locator-based addressing used in IP and instead utilizes a data-centric naming.</t>
        <t>In the case of using TCP/IP, mobility of UAVs introduces a significant challenge. Consider the case where a GCS is receiving telemetry information from a specific UAV. Assuming that the UAV moves and changes its point of attachment to the network, it will have to configure a new IP address on its wireless interface. However, this is problematic, as the telemetry information is still being sent by to the previous IP address of the UAV. This simple example illustrates the necessity to deploy mobility management solutions to handle this type of situations.</t>
        <t>However, mobility management solutions increase the complexity of the deployment and may impact the performance of data distribution, both in terms of signaling/data overhead and communication path delay. Considering the specific case of multicast data streams, mobility of content producers and consumers is inherently handled by multicast routing protocols, which are able to react to changes of location of mobile nodes by reconstructing the corresponding multicast delivery trees. Nevertheless, this comes with a cost in terms of signaling and data overhead (data may still flow through branches of a multicast delivery tree where there are no receivers while the routing protocol is still converging).</t>
        <t>Another alternative is to perform the mobility management of producers and consumers not at the application layer based on IP multicast trees, but on the network layer based on an Information Centric Network approach, which was already mentioned in this section.</t>
        <t>Greater flexibility in addressing may help in dealing with mobility more efficiently, e.g., through an augmented semantic that may fulfil the mobility requirements <xref target="RFC7429"/> in a more efficient way or through moving from a locator- to a content or service-centric semantic for addressing.</t>
      </section>
      <section anchor="SEC_service">
        <name>Communication Across Services</name>
        <t>As a communication infrastructure spanning many facets of life, the Internet integrates services and resources from various aspects such as remote collaboration, shopping, content production as well as delivery, education, and many more. Accessing those services and resources directly through URIs has been proposed by methods such as those defined in ICN <xref target="RFC7476"/>, where providers of services and resources can advertise those through unified identifiers without additional planning of identifiers and locations for underlying data and their replicas. Users can access required services and resources by virtue of using the URI-based identification, with an ephemeral relationship built between user and provider, while the building of such relationship may be constrained with user- as well as service-specific requirements, such as proximity (finding nearest provider), load (finding fastest provider), and others.</t>
        <t>While systems like ICN <xref target="CCN"/> provide an alternative to the topological  addressing of IP, its deployment requires an overlay (over IP) or native deployment (alongside IP), the latter with dedicated gateways needed for translation. Underlay deployments are also envisioned in <xref target="RFC8763"/>, where ICN solutions are being used to facilitate communication between IP addressed network endpoints or URI-based service endpoints, still requiring gateway solutions for interconnection with ICN-based networks as well as IP routing based networks (cf., <xref target="ICN5G"/><xref target="ICNIP"/>).</t>
        <t>Although various approaches combining service and location-based addressing have been devised, the key challenge here is to facilitate a "natural", i.e., direct communication, without the need for gateways above the network layer.</t>
        <t>Another aspect of communication across services is that of chaining individual services to a larger service. Here, an identifier would be used that serves as a link to next hop destination within the chain of single services, as done in the work on Service Function Chaining (SFC). With this, services are identified at the level of Layer 2/3 (<xref target="RFC7665"/>, <xref target="RFC8754"/>, <xref target="RFC8595"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677"/> although the service chain identification is carried as a Network Service header (NSH) <xref target="RFC7665"/>, separate to the packet identifiers. The forwarding with the chain of services utilizes individual locator-based IP addressing (for L3 chaining) to communicate the chained operations from one Service Function Forwarder <xref target="RFC7665"/> to another, leading to concerns regarding overhead incurred through the stacking of those chained identifiers in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>
        <t>Greater flexibility in addressing may allow for incorporating different information, e.g., service as well as chaining semantics, into the overall Internet addressing.</t>
      </section>
      <section anchor="SEC_steering">
        <name>Communication Traffic Steering</name>
        <t>Steering traffic within a communication scenario may involve at least two aspects, namely (i) limiting certain traffic towards a certain set of communication nodes and (ii) restraining the sending of packets towards a given destination (or a chain of destinations) with metrics that would allow the selection among one or more possible destinations.</t>
        <t>One possibility for limiting traffic inside limited domains, towards specific objects, e.g., devices, users, or group of them, is subnet partition with techniques such as VLAN <xref target="RFC5517"/>, VxLAN <xref target="RFC7348"/>, or more evolved solution like TeraStream <xref target="TERASTREAM"/>   realizing such partitioning. Such mechanisms usually involve significant configuration, and even small changes in network and user nodes could result in a repartition and possibly additional configuration efforts. Another key aspect is the complete lack of correlation of the topological address and any likely more semantic-rich identification that could be used to make policy decisions regarding traffic steering. Suitably enriching the semantics of the packet address, either that of the sender or receiver, so that such decision could be made while minimizing the involvement of higher layer mechanisms, is a crucial challenge for improving on network operations and speed of such limited domain traffic.</t>
        <t>When making decisions to select one out of a set of possible destinations for a packet, IP anycast semantics can be applied albeit being limited to the locator semantic of the IP address itself. Recent work in <xref target="SFCANYCAST"/> suggests utilizing the notion of IP anycast address to encode a "service identifier", which is dynamically mapped onto network locations where service instances fulfilling the service request may be located. Scenarios where this capability may be utilized are provided in <xref target="SFCANYCAST"/> and include, but are not limited to, scenarios such as edge-assisted VR/AR, transportation, smart cities, smart homes, smart wearables, and digital twins.</t>
        <t>The challenge here lies in the possible encoding of not only the service information itself but the constraint information that helps the selection of the "best" service instance and which is likely a service-specific constraint in relation to the particular scenario. The notion of an address here is a conditional (on those constraints) one where this conditional part is an essential aspect of the forwarding action to be taken. It needs therefore consideration in the definition of what an address is, what is its semantic, and how the address structure ought to look like.</t>
        <t>As outlined in the previous sub-section, chaining services are another aspect of steering traffic along a chain of constituent services, where the chain is identified through either a stack of individual identifiers, such as in Segment Routing <xref target="RFC8402"/>, or as an identifier that serves as a link to next hop destination within the chain, such as in Service Function Chaining (SFC). The latter can be applied to services identified at the level of Layer 2/3 (<xref target="RFC7665"/>, <xref target="RFC8754"/>, <xref target="RFC8595"/>) or at the level of name-based service identifiers like URLs <xref target="RFC8677"/>. However, the overhead incurred through the stacking of those chained identifiers is a concern in terms of packet overhead and therefore efficiency in handling in the intermediary nodes.</t>
        <t>Flexibility in addressing may enable more semantic rich encoding schemes that may help in steering traffic at hardware level and speed, without complex mechanisms usually resulting in handling packets in the slow path of routers.</t>
      </section>
      <section anchor="SEC_builtin-sec">
        <name>Communication with built-in security</name>
        <t>Today, strong security in the Internet is usually implemented as a general network service (<xref target="PILA"/>, <xref target="RFC6158"/>). Among the various reasons for such approach is the limited semantic of current IP addresses, which do not allow to natively express security features or trust relationships. Efforts like Cryptographically Generated Addresses (CGA) <xref target="RFC3972"/>, provide some security features by embedding a truncated public key in the last 57-bit of IPv6 address, thereby greatly enhancing authentication and security within an IP network via asymmetric cryptography and IPsec <xref target="RFC4301"/>. The development of the Host Identity Protocol (HIP) <xref target="RFC7401"/> saw the introduction of cryptographic identifiers for the newly introduced Host Identity (HI) to allow for enhanced accountability, and therefore trust. The use of those HIs, however, is limited by the size of IPv6 128bit addresses.</t>
        <t>Through a greater flexibility in addressing, any security-related key, certificate, or identifier could instead be included in a suitable address structure without any information loss (i.e., as-is, without any truncation or operation as such), avoiding therefore compromises such as those in HIP. Instead, CGAs could be created using full length certificates, or being able to support larger HIP addresses in a limited domain that uses it. This could significantly help in constructing a trusted and secure communication at the network layer, leading to connections that could be considered as absolute secure (assuming the cryptography involved is secure). Even more, anti-abuse mechanisms and/or DDoS protection mechanisms like the one under discussion in PEARG (<xref target="PEARG"/>) Research Group may leverage a greater flexibility of the overall Internet addressing, if provided, in order to be more effective.</t>
      </section>
      <section anchor="SEC_protect-privacy">
        <name>Communication protecting user privacy</name>
        <!--
LUIGI: This section comes from both threads
-->
<t>See Comments in Section "Issues".</t>
      </section>
      <section anchor="SEC_nin">
        <name>Communication in Alternative Forwarding Architectures</name>
        <t>The performance of communication networks has long been a focus for optimization due to the immediate impact on cost of ownership for communication service providers. Technologies like MPLS <xref target="RFC3031"/> have been introduced to optimize lower layer communication, e.g., by mapping L3 traffic into aggregated labels of forwarding traffic for the purposes of, e.g., traffic engineering.</t>
        <t>Even further, other works have emerged in recent years that have replaced the notion of packets with other concepts for the same purpose of improved traffic engineering and therefore efficiency gains. One such area is that of Software Defined Networks (SDN) <xref target="RFC7426"/>, which has highlighted how a majority of Internet traffic is better identified by flows, rather than packets. Based on such observation, alternate forwarding architectures have been devised that are flow-based or path-based. With this approach, all data belonging to the same traffic stream is delivered over the same path, and traffic flows are identified by some connection or path identifier rather than by complete routing information, possibly enabling fast hardware based switching (e.g. <xref target="DETNET"/>, <xref target="PANRG"/>).</t>
        <t>On the one hand, such a communication model may be more suitable for real-time traffic like in the context of Deterministic Networks (<xref target="DETNET"/>), where indeed a lot of work has focused on how to "identify" packets belonging to the same DETNET flow in order to jointly manage the forwarding within the desired deterministic boundaries.</t>
        <t>On the other hand, it may improve the communication efficiency in constrained wireless environments (cf., <xref target="SEC_constrained"/>), by reducing the overhead, hence increasing the number of useful bits per second per Hz.</t>
        <t>Also, the delivery of information across similar flows may be combined into a multipoint delivery of a single return flow, e.g., for scenarios of requests for a video chunk from many clients being responded to with a single (multi-destination) flow, as outlined in <xref target="BIER-MC"/> as an example. Another opportunity to improve communication efficiency is being pursued in ongoing IETF/IRTF work to deliver IP- or HTTP-level packets directly over path-based or flow-based transport network solutions, such as in <xref target="TROSSEN"/><xref target="BIER-MC"/><xref target="ICNIP"/><xref target="ICN5G"/> with the capability to bundle unicast forward communication streams flexibly together in return path multipoint relations. Such capability is particularly opportune in scenarios such as chunk-based video retrieval or distributed data storage. However, those solutions currently require gateways to "translate" the flow communication into the packet-level addressing semantic in the peering IP networks. Furthermore, the use of those alternative forwarding mechanisms often require the encapsulation of Internet addressing information, leading to wastage of bandwidth as well as processing resources.</t>
        <t>Providing an alternative way of forwarding data has also been the motivation for the efforts created in the European Telecommunication Standards Institute (ETSI), which formed an Industry Specification Group (ISG) named Non-IP Networking (NIN) <xref target="ETSI-NIN"/>. This group sets out to develop and standardize a set of protocols leveraging an alternative forwarding architecture, such as provided by a flow-based switching paradigm. The deployment of such protocols may be seen to form limited domains, still leaving the need to interoperate with the (packet-based forwarding) Internet; a situation possibly enabled through a greater flexibility of the addressing used across Internet-based and alternative limited domains alike.</t>
        <t>As an alternative to IP routing, EIBP (Extended Internet Bypass Protocol) <xref target="EIBP"/> offers a communications model that can work with IP in parallel and entirely transparent and independent to any operation at network layer. For this, EIBP proposes the use of physical and/or virtual structures in networks and among networks to auto assign routable addresses that capture the relative position of routers in a network or networks in a connected set of networks, which can be used to route the packets between end domains. EIBP operates at Layer 2.5 and provides encapsulation (at source domain), routing, and de-encapsulation (at destination domain) for packets. EIBP can forward any type of packets between domains. A resolver to map the domain ID to EIBP's edge router addresses is required. When queried for a specific domain, the resolver will return the corresponding edge router structured addresses.</t>
        <t>EIBP decouples routing operations from end domain operations, offering to serve any domain, without point solutions to specific domains. EIBP also decouples routing IDs or addresses from end device/domain addresses. This allows for accommodation of new and upcoming domains. A domain can extend EIBP's structured addresses into the domain, by joining as a nested domain under one or more edge routers, or by extending the edge router's structure addresses to its devices.</t>
        <t>A greater flexibility in addressing semantics may reduce the aforementioned wastage by accommodating Internet addressing in the light of such alternative forwarding architectures, instead enabling the direct use of the alternative forwarding information.</t>
      </section>
    </section>
    <section anchor="SEC_features">
      <name>Desired Network Features</name>
      <!--
- Seeking Input/Feedback from:  
    -  Dino Farinacci
    - Michael Richardson
    - Fred Templin
    - Brian Carpenter

Input/Feedback on the proposed section.
-->

<t>From the previous subsection, we recognize that Internet technologies are used across a number of scenarios, each of which brings their own (vertical) view on needed capabilities in order to work in a satisfactory manner to those involved.</t>
      <t>In the following, we complement those vertical-specific insights with answers to the question of network features that end users (in the form of individuals or organizations alike) desire from the networked system at large. Answers to this question look at the network more from a horizontal perspective, i.e. not with a specific usage in mind beyond communication within and across networks. The text here summarizes the discussion that took place on the INT Area mailing list after IETF112 on this issue. For some of those identified features, we can already identify how innovations on addressing may impact the realization of a particular feature.</t>
      <t>We then combine the insights from both scenario-specific and wider horizontal views for the identification of issues when realizing the specific capability of addressing, presented in <xref target="SEC_problem"/>.</t>
      <ol spacing="normal" type="1"><li>Always-On: The world is getting more and more connected, leading to being connected to the Internet, anywhere, by any technology (e.g., cable, fiber, or radio), even simultaneously,  "all the time", and, most importantly, automatically (without any switch turning). However, when defining "all the time" there is a clear and important difference to be made between availability and reliability vs "desired usage". In other words, "always on" can be seen as a desirable perception at the end user level or as a characteristic of the underlying system. From an end user perspective, clearly the former is of importance, not necessarily leading to an "always on" system notion but instead "always-app-available", merely requiring the needed availability and reliability to realize the perception of being "always on" (e.g., for earthquake alerts), possibly complemented by app-specific methods to realize the "always on" perception (e.g., using local caching rather than communication over the network).</li>
        <li>Transparency: Being agnostic with respect to local domains network protocols (Bluetooth, ZigBee, Thread, Airdrop, Airplay, or any others) is key to provide an  easy and straightforward method for contacting people and devices without any knowledge of network issues, particularly those specific to network-specific solutions. While having a flexible addressing model that accommodates a wide range of use cases is important, the centrality of the IP protocol remains key as a mean to provide global connectivity.</li>
        <li>Multi-homing: Seamless multi-homing capability for the host is key to best use the connectivity options that may be available to an end user, e.g., for increasing resilience in cases of failures of one available option. Protocols like LISP, SHIM6, QUIC, MPTCP, SCTP (to cite a few) have been successful at providing this capability in an incremental way, but too much of that capability is realized within the application, making it hard to leverage across all applications.
While today each transport protocol has its own way to perform multi-address discovery, the network layer should provide the multi-homing feature (e.g., SHIM6 can be used to discover all addresses on both ends), and then leave the address selection to the transport. With that, multi-address discovery remains a network feature exposed to the upper layers. This may also mean to update the Socket API (which may be actually the first thing to do), which does not necessarily mean to expose more network details to the applications but instead be more address agnostic yet more expressive.</li>
        <li>Mobility: A lot of work has been put in MobileIP (<xref target="RFC5944"/>,<xref target="RFC6275"/>) to provide seamless and lossless communications for moving nodes (vehicle, satellites). However, it has never been widely deployed for several reasons, like complexity of the protocol and the fact that the problem has often been tackled at higher layers, with applications resilient to address changes. However, similar to multi-homing, solving the problem at higher layers means that each and every transport protocol and application have their own way to deal with mobility, leading to similar observations as those for the previous multi-homing aspect.</li>
        <li>Security and Privacy: The COVID-19 pandemic has boosted end users' desire to be protected and protect their privacy. The balance among privacy, security, and accountability is not simple to achieve. There exist different views on what those properties should be, however the network should provide the means to provide  what is felt as the best trade-off for the specific use case.</li>
        <li>Performance: While certainly desirable, "performance" is a complex issue that depends on the objectives of those building for but also paying for performance. Examples are (i) speed (shorter paths/direct communications), (ii) bandwidth (10petabit/s for a link), (iii) efficiency (less overlays/encapsulations), (iv) high efficacy or sustainability (avoid waste). From an addressing perspective, length/format/semantics that may adapt to the specific use case (e.g. use short addresses for low power IoT, or, where needed, longer for addresses embedding certificates for strong authentication, authorization and accountability) may contribute to the performance aspects that end users desire, such as reducing waste through not needed encapsulation or needed conversion at network boundaries.</li>
        <li>Availability, Reliability, Predictability: These three properties are important to enable wide-range of services and applications according to the desired usage (cf. point 1).</li>
        <li>Do not do harm: Access to the Internet is considered a human right <xref target="RFC8280"/>. Access to and expression through it should align with this core principle. This issue transcends through a variety of previously discussed 'features' that are desired, such as privacy, security but also availability and reliability. However, lifting the feature of network access onto a basic rights level also brings in the aspect of "do not do harm" through the use of the Internet with respect to wider societal objectives. Similar to other industries, such as electricity or cars, preventing harm usually requires an interplay of commercial, technological, and regulatory efforts, such as the enforcement of seat belt wearing to reduce accident death. As a first step, the potential harmfulness of a novel method must be recognized and weighted against the benefits of its introduction and use. One increasingly important consideration in the technology domain is "sustainability" of resource usage for an end user's consumption of and participation in Internet services. As an example, Distributed Ledger Technologies (DLT) are seen as an important tool for a variety of applications, including Internet decentralization (<xref target="DINRG"/>). However, the non-linear increase in energy consumption means that extending proof-of-work systems to the entire population of the planet would not only be impractical but also possibly highly wasteful, not just at the level of computational but also communication resource usage <xref target="DLT-draft"/>. This poses the question on how novel methods for addressing may improve on sustainability of such technologies, particularly if adopted more widely.</li>
        <li>Maximum Transmission Unit (MTU): One long standing issue in the Internet is related to the MTU and how to discover the path MTU in order to avoid fragmentation (<xref target="I-D.ietf-6man-mtu-option"/>, <xref target="I-D.templin-6man-aero"/>). While it makes sense to always leverage as much performance from local systems as possible, this should come without sacrificing the ability to communicate with all systems. Having a solid solution to solve the issue would make the overall interconnection of systems more robust.</li>
      </ol>
      <!-- Link the above to hint at more architectural discussion to be held. -->
<!-- LUIGI: done in the intro of the next section.-->

</section>
    <section anchor="SEC_problem">
      <name>Issues in Addressing</name>
      <t>The desired properties outlined in the previous section have implications that go beyond addressing and need to be tackled from a larger architectural point of view. Such a discussion is left as future action, limiting the present document at discussing only the addressing viewpoint and identifying shortcomings  perceived from this perspective.<br/>
        <!-- TODO
TODO: need to connect the issues below also to the desired network features that will be captured!
LUIGI: first paragraph makes the connection.
-->
There are a number of issues that we can identify from the communication scenarios in <xref target="SEC_cases"/> and the network features generally desire from the network, presented in <xref target="SEC_features"/>. We do not claim to be exhaustive in our list:</t>
      <ol spacing="normal" type="1"><li>Limiting Alternative Address Semantics: Several communication scenarios pursue the use of alternative semantics of what constitute an 'address' of a packet traversing the Internet, which may fall foul of the defined network interface semantic of IP addresses.</li>
        <li>Hampering Security: Aligning with the semantic and length limitations of IP addressing may hamper the security objectives of any new semantic, possibly leading to detrimental effects and possible other workarounds (at the risk of introducing fragility rather than security).</li>
      </ol>
      <!--
- Seeking Input/Feedback:  
    - Tom Herbet

Seekng help in formulating this following point.
-->

<ol spacing="normal" type="1"><li>
          <t>Hampering Privacy:  </t>
          <ul spacing="normal">
            <li>Easy individual identification</li>
            <li>Flow linkability</li>
            <li>App/Activity profiling</li>
          </ul>
        </li>
        <li>Complicating Traffic Engineering: Utilizing a plethora of non-address inputs into the traffic steering decision in real networks complicates traffic engineering in that it makes the development of suitable policies more complex, while also leading to possible contention between methods being used.</li>
        <li>Hampering Efficiency: Extending IP addressing through point-wise solutions also hampers efficiency, e.g., through needed re-encapsulation (therefore increasing the header processing overhead as well as header-to-payload ratio), through introducing path stretch, or through requiring compression techniques to reduce the header proportion of large addresses when operating in constrained environments.</li>
        <li>Fragility: The introduction of point solutions, each of which comes with possibly own usages of address or packet fields, together with extension-specific operations, increases the overall fragility of the resulting system, caused, for instance, through contention between feature extensions that were neither foreseen in the design nor tested during the implementation phase.</li>
        <li>Extensibility: Accommodating new requirements through ever new extensions as an extensibility approach to addressing compounds aspects discussed before, i.e., fragility, efficiency etc. It complicates engineering due to the clearly missing boundaries against which contentions with other extensions could be managed. It complicates standardization since extension-based extensibility requires independent, and often lengthy, standardization processes. And ultimately, deployments are complicated due to backward compatibility testing required for any new extension being integrated into the deployed system.</li>
      </ol>
      <t>The table below shows how the above identified issues do arise somehow in our outlined communication scenarios in <xref target="SEC_cases"/>.
This overview will be deepened in more details in the gap analysis document <xref target="I-D.jia-intarea-internet-addressing-gap-analysis"/>.</t>
      <table anchor="mapping">
        <name>Issues Involved in Challenging Scenarios</name>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="left">Issue 1</th>
            <th align="left">Issue 2</th>
            <th align="left">Issue 3</th>
            <th align="left">Issue 4</th>
            <th align="left">Issue 5</th>
            <th align="left">Issue 6</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Constrained Environments</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Dynamically Changing Topologies</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Moving Endpoints</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Across Services</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Traffic Steering</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Built-in Security</td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">x</td>
            <td align="left">x</td>
          </tr>
          <tr>
            <td align="left">Alternative Forwarding Architectures</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left">x</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="SEC_ps">
      <name>Problem Statement</name>
      <t>This document identifies a number of scenarios as well as general features end users would want from the network, positioning the existing Internet addressing structure itself as a potential hindrance in solving key problems for Internet service provisioning. Such problems include supporting new, e.g., service-oriented, scenarios more efficiently, with improved security and efficient traffic engineering, as well as large scale mobility. We can observe that those new forms of communication are particularly driven by the conceptual framework of limited domains, realizing the requirements of stakeholders for an optimized communication in those limited domains, while still utilizing the Internet for interconnection as well as for access to the wealth of existing Internet services.</t>
      <t>This co-existence of optimized LD-level as well as Internet communication creates a tussle between those requirements on addressing stemming from those limited domains and those coming from the Internet in the form of agreed IPv6 semantics. This tussle directly refers back to our introductory question on flexibility in addressing (or leaving the problem to limited domain solutions to deal with). It is also captured in the discussion on where new features are being introduced, i.e. at the edge or core of the Internet.</t>
      <!--
- Seeking Input/Feedback:
    - Dino Farinacci
    - Geoff Huston

Input/Feedback on the two following paragraphs.
-->

<t>But more importantly, the question on 'what is an address anyway' (derived from what features we may want from the network) should not be guided by the answers that the Internet can give us today, e.g., being a mere ephemeral token for accessing PoP-based services (as indicated in related arch-d mailing list discussions), but instead what features could be enabled by a particular view of what an address is. However, that is not to 'second guess' the market and its possible evolution, but to outline clear features from which to derive clear principles for a design.</t>
      <t>For this, it is important to recognize that skewing the technical capabilities of any feature, let alone addressing, to the current economic situation of the Internet bears the danger of locking down innovation capabilities as an outcome of those technical limitations being introduced. Instead, addressing must align with enabling the model of permissionless but compatible innovation that the IETF has been promoting, ultimately enabling the serendipity of new applications that has led to many of those applications we can see in the Internet today.</t>
      <t>At this stage, this document does not provide a definite answer nor does it propose or promote specific solutions to the problems here portrayed. Instead, this document aims at stimulating discussion on the emerging needs for addressing, with the possibility to fundamentally re-think the addressing in the Internet beyond the current objectives of IPv6, in order to provide the flexibility to suitably support the many new forms of communication that will emerge. Addressing can be rather flexible and can be of any form that applications may need. There is no limitation on the address to preclude any future applications.</t>
      <t>To complement the problem statement in this document, the companion gap analysis document <xref target="I-D.jia-intarea-internet-addressing-gap-analysis"/> deepens the issues identified in <xref target="SEC_problem"/> along key properties of today's Internet addressing.</t>
    </section>
    <section anchor="SEC_sec">
      <name>Security Considerations</name>
      <t>The present memo does not introduce any new technology and/or mechanism and as such does not introduce any security threat to the TCP/IP protocol suite.</t>
      <t>Nevertheless, it is worth to observe whether or not greater flexibility of addressing (as suggested in previous sections) would allow to introduce fully featured security in endpoint identification, potentially able to eradicate the spoofing problem, as one example. Furthermore, it may be used to include application gateways' certificates in order to provide more efficiency, e.g., using web certificates also in the addressing of web services. While increasing security, privacy protection may also be improved.</t>
    </section>
    <section anchor="SEC_iana">
      <name>IANA Considerations</name>
      <t>This document does not include an IANA request.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791">
          <front>
            <title>Internet Protocol</title>
            <author fullname="J. Postel" initials="J." surname="Postel">
              <organization/>
            </author>
            <date month="September" year="1981"/>
          </front>
          <seriesInfo name="STD" value="5"/>
          <seriesInfo name="RFC" value="791"/>
          <seriesInfo name="DOI" value="10.17487/RFC0791"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-lisp-nexagon" target="https://www.ietf.org/archive/id/draft-ietf-lisp-nexagon-19.txt">
          <front>
            <title>Network-Hexagons: H3-LISP GeoState &amp; Mobility Network</title>
            <author fullname="Sharon Barkai">
              <organization>Nexar Inc.</organization>
            </author>
            <author fullname="Bruno Fernandez-Ruiz">
              <organization>Nexar Inc.</organization>
            </author>
            <author fullname="Rotem Tamir">
              <organization>Nexar Inc.</organization>
            </author>
            <author fullname="Alberto Rodriguez-Natal">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Fabio Maino">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Albert Cabellos-Aparicio">
              <organization>J. Paillisse Vilanova</organization>
            </author>
            <author fullname="Dino Farinacci">
              <organization>lispers.net</organization>
            </author>
            <date day="14" month="September" year="2021"/>
            <abstract>
              <t>   This document specifies the use of H3 and LISP for Geolocation
   Services. Geolocation Services utilize geospatial data for:
   Fresh HDMaps, Intelligent Driving, Cruise and Parking assists.
   Geospatial utilization is delivered using in-network compute for
   brokered verification, curation, and localization of data, using:

   - EID addressable geospatial-tiles abstraction of road-segments.
   - EID Interface for detections and uploads to the tile-contexts.
   - EID Routing-Sharing hazards, blockages, parking, road-inventory.
   - EID themed multicast channels per tile to subscribed clients.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-nexagon-19"/>
        </reference>
        <reference anchor="I-D.ietf-lisp-introduction" target="https://www.ietf.org/archive/id/draft-ietf-lisp-introduction-15.txt">
          <front>
            <title>An Architectural Introduction to the Locator/ID Separation Protocol (LISP)</title>
            <author fullname="Albert Cabellos">
              <organization>UPC-BarcelonaTech</organization>
            </author>
            <author fullname="Damien Saucez (Ed.)">
              <organization>Inria</organization>
            </author>
            <date day="20" month="September" year="2021"/>
            <abstract>
              <t>   This document describes the architecture of the Locator/ID Separation
   Protocol (LISP), making it easier to read the rest of the LISP
   specifications and providing a basis for discussion about the details
   of the LISP protocols.  This document is used for introductory
   purposes, more details can be found in [I-D.ietf-lisp-rfc6830bis] and
   [I-D.ietf-lisp-rfc6833bis], the protocol specifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-introduction-15"/>
        </reference>
        <reference anchor="I-D.ietf-lisp-mn" target="https://www.ietf.org/archive/id/draft-ietf-lisp-mn-11.txt">
          <front>
            <title>LISP Mobile Node</title>
            <author fullname="Dino Farinacci">
              <organization>lispers.net</organization>
            </author>
            <author fullname="Darrel Lewis">
              <organization>cisco Systems</organization>
            </author>
            <author fullname="David Meyer">
              <organization>1-4-5.net</organization>
            </author>
            <author fullname="Chris White">
              <organization>Logical Elegance</organization>
            </author>
            <date day="30" month="January" year="2022"/>
            <abstract>
              <t>   This document describes how a lightweight version of LISP's ITR/ETR
   functionality can be used to provide seamless mobility to a mobile
   node.  The LISP Mobile Node design described in this document uses
   standard LISP functionality to provide scalable mobility for LISP
   mobile nodes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-mn-11"/>
        </reference>
        <reference anchor="I-D.ietf-intarea-gue" target="https://www.ietf.org/archive/id/draft-ietf-intarea-gue-09.txt">
          <front>
            <title>Generic UDP Encapsulation</title>
            <author fullname="Tom Herbert">
              <organization>Quantonium</organization>
            </author>
            <author fullname="Lucy Yong">
              <organization>Independent</organization>
            </author>
            <author fullname="Osama Zia">
              <organization>Microsoft</organization>
            </author>
            <date day="26" month="October" year="2019"/>
            <abstract>
              <t>   This specification describes Generic UDP Encapsulation (GUE), which
   is a scheme for using UDP to encapsulate packets of different IP
   protocols for transport across layer 3 networks. By encapsulating
   packets in UDP, specialized capabilities in networking hardware for
   efficient handling of UDP packets can be leveraged. GUE specifies
   basic encapsulation methods upon which higher level constructs, such
   as tunnels and overlay networks for network virtualization, can be
   constructed. GUE is extensible by allowing optional data fields as
   part of the encapsulation, and is generic in that it can encapsulate
   packets of various IP protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-gue-09"/>
        </reference>
        <reference anchor="I-D.jia-intarea-internet-addressing-gap-analysis" target="https://www.ietf.org/archive/id/draft-jia-intarea-internet-addressing-gap-analysis-01.txt">
          <front>
            <title>Gap Analysis in Internet Addressing</title>
            <author fullname="Yihao Jia">
              <organization>Huawei Technologies Co., Ltd</organization>
            </author>
            <author fullname="Dirk Trossen">
              <organization>Huawei Technologies Duesseldorf GmbH</organization>
            </author>
            <author fullname="Luigi Iannone">
              <organization>Huawei Technologies France S.A.S.U.</organization>
            </author>
            <author fullname="Nirmala Shenoy">
              <organization>Rochester Institute of Technology</organization>
            </author>
            <author fullname="Paulo Mendes">
              <organization>Airbus</organization>
            </author>
            <date day="23" month="October" year="2021"/>
            <abstract>
              <t>   There exist many extensions to Internet addressing, as it is defined
   in [RFC0791] for IPv4 and [RFC8200] for IPv6, respectively.  Those
   extensions have been developed to fill gaps in capabilities beyond
   the basic properties of Internet addressing.  This document outlines
   those properties as a baseline against which the extensions are
   categorized in terms of methodology used to fill the gap together
   with examples of solutions doing so.

   While introducing such extensions, we outline the issues we see with
   those extensions.  This ultimately leads to consider whether or not a
   more consistent approach to tackling the identified gaps, beyond
   point-wise extensions as done so far, would be beneficial.  The
   benefits are the ones detailed in the companion document
   [I-D.jia-intarea-scenarios-problems-addressing], where, leveraging on
   the gaps identified in this memo and scenarios provided in
   [I-D.jia-intarea-scenarios-problems-addressing], a clear problem
   statement is provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jia-intarea-internet-addressing-gap-analysis-01"/>
        </reference>
        <reference anchor="SFCANYCAST">
          <front>
            <title>Distributed Function Chaining with Anycast Routing</title>
            <author fullname="Adrien Wion" initials="A." surname="Wion">
              <organization/>
            </author>
            <author fullname="Mathieu Bouet" initials="M." surname="Bouet">
              <organization/>
            </author>
            <author fullname="Luigi Iannone" initials="L." surname="Iannone">
              <organization/>
            </author>
            <author fullname="Vania Conan" initials="V." surname="Conan">
              <organization/>
            </author>
            <date month="April" year="2019"/>
          </front>
          <seriesInfo name="Proceedings of the 2019 ACM Symposium on SDN" value="Research"/>
          <seriesInfo name="DOI" value="10.1145/3314148.3314355"/>
        </reference>
        <reference anchor="ICN5G" target="https://www.ietf.org/archive/id/draft-irtf-icnrg-5gc-icn-04.txt">
          <front>
            <title>Enabling ICN in 3GPP's 5G NextGen Core Architecture</title>
            <author fullname="Ravi Ravindran">
              <organization>Corning Incorporated</organization>
            </author>
            <author fullname="Prakash Suthar">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Dirk Trossen">
              <organization>Huawei Technologies Duesseldorf GmbH</organization>
            </author>
            <author fullname="Chonggang Wang">
              <organization>InterDigital Inc.</organization>
            </author>
            <author fullname="Greg White">
              <organization>CableLabs</organization>
            </author>
            <date day="10" month="January" year="2021"/>
            <abstract>
              <t>   The proposed 3GPP's 5G core nextgen architecture (5GC) allows the
   introduction of new user and control plane function, considering the
   support for network slicing functions, that offers greater
   flexibility to handle heterogeneous devices and applications.  In
   this draft, we provide a short description of the proposed 5GC
   architecture, including recent efforts to provide cellular Local Area
   Network (LAN) connectivity, followed by extensions to 5GC's control
   and user plane to support Packet Data Unit (PDU) sessions over
   Information-Centric Networks (ICN).  In addition, ICN over 5GLAN is
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-icnrg-5gc-icn-04"/>
        </reference>
        <reference anchor="ICNIP" target="https://www.ietf.org/archive/id/draft-trossen-icnrg-internet-icn-5glan-04.txt">
          <front>
            <title>Internet Services over ICN in 5G LAN Environments</title>
            <author fullname="Dirk Trossen">
              <organization>Huawei Technologies Duesseldorf GmbH</organization>
            </author>
            <author fullname="Sebastian Robitzsch">
              <organization>InterDigital Inc.</organization>
            </author>
            <author fullname="Martin Reed">
              <organization>Essex University</organization>
            </author>
            <author fullname="Mays Al-Naday">
              <organization>Essex University</organization>
            </author>
            <author fullname="Janne Riihijarvi">
              <organization>RWTH Aachen</organization>
            </author>
            <date day="1" month="October" year="2020"/>
            <abstract>
              <t>   In this draft, we provide architecture and operations for enabling
   Internet services over ICN over (5G-enabled) LAN environments.
   Operations include ICN API to upper layers, HTTP over ICN, Service
   Proxy Operations, ICN Flow Management, Name Resolution, Mobility
   Handling, and Dual Stack Device Support.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-trossen-icnrg-internet-icn-5glan-04"/>
        </reference>
        <reference anchor="BIER-MC" target="https://www.ietf.org/archive/id/draft-ietf-bier-multicast-http-response-06.txt">
          <front>
            <title>Applicability of BIER Multicast Overlay for Adaptive Streaming Services</title>
            <author fullname="Dirk Trossen">
              <organization>Huawei Technologies Duesseldorf GmbH</organization>
            </author>
            <author fullname="Akbar Rahman">
              <organization>InterDigital Communications, LLC</organization>
            </author>
            <author fullname="Chonggang Wang">
              <organization>InterDigital Communications, LLC</organization>
            </author>
            <author fullname="Toerless Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <date day="10" month="July" year="2021"/>
            <abstract>
              <t>   HTTP Level Multicast, using BIER, is described as a use case in the
   BIER Use Cases document.  HTTP Level Multicast is used in today's
   video streaming and delivery services such as HTTP Live Streaming
   (HLS), Augmented Reality and Virtual Reality(AR/VR), generally
   realized over IP Multicast as well as other use cases such as
   software update delivery.  A realization of "HTTP Multicast" over "IP
   Multicast" is described for the video delivery use case.  IP
   Multicast is commonly used for IPTV services.  Digital Video
   Broadcasting (DVB) and Broadband Forum (BBF) also develope a
   reference architecture for IP Multicast service.  A few problems with
   IP Multicast, such as waste of transmission bandwidth, increase in
   signaling when there are few users are described.  Realization over
   BIER, through a BIER Multicast Overlay Layer, is described as an
   alternative.  How BIER Multicast Overlay operation improves over IP
   Multicast, such as reduction in signaling, dynamic creation of
   multicast groups to reduce signaling and bandwidth wastage is
   described.  We conclude with a few next steps.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-bier-multicast-http-response-06"/>
        </reference>
        <reference anchor="DLT-draft" target="https://www.ietf.org/archive/id/draft-trossen-rtgwg-impact-of-dlts-01.txt">
          <front>
            <title>Impact of DLTs on Provider Networks</title>
            <author fullname="Dirk Trossen">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="David Guzman">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Mike Mc Bride">
              <organization>FutureWei</organization>
            </author>
            <author fullname="Xinxin Fan">
              <organization>IoTeX</organization>
            </author>
            <date day="2" month="March" year="2022"/>
            <abstract>
              <t>   This document discusses the impact of distributed ledger technologies
   being realized over IP-based provider networks.  The focus here lies
   on the impact that the DLT communication patterns have on efficiency
   of resource usage in the underlying networks.  We provide initial
   insights into experimental results to quantify this impact in terms
   of inefficient and wasted communication, aligned along challenges
   that the DLT realization over IP networks faces.

   This document intends to outline this impact but also opportunities
   for network innovations to improve on the identified impact as well
   as the overall service quality.  While this document does not promote
   specific solutions that capture those opportunities, it invites the
   wider community working on DLT and network solutions alike to
   contribute to the insights in this document to aid future research
   and development into possible solution concepts and technologies.

   The findings presented here have first been reported within the
   similarly titled whitepaper released by the Industry IoT Consortium
   (IIC) [IIC_whitepaper].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-trossen-rtgwg-impact-of-dlts-01"/>
        </reference>
        <reference anchor="MANET1">
          <front>
            <title>Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network</title>
            <author fullname="Alaa E. Abdallah" initials="A." surname="Abdallah">
              <organization/>
            </author>
            <author fullname="Emad E. Abdallah" initials="E." surname="Abdallah">
              <organization/>
            </author>
            <author fullname="Mohammad Bsoul" initials="M." surname="Bsoul">
              <organization/>
            </author>
            <author fullname="Ahmed Fawzi Otoom" initials="A." surname="Otoom">
              <organization/>
            </author>
            <date month="October" year="2016"/>
          </front>
          <seriesInfo name="International Journal of Distributed Sensor Networks" value="Vol. 12, pp. 155014771667125"/>
          <seriesInfo name="DOI" value="10.1177/1550147716671255"/>
        </reference>
        <reference anchor="CCN">
          <front>
            <title>Networking named content</title>
            <author fullname="Van Jacobson" initials="V." surname="Jacobson">
              <organization/>
            </author>
            <author fullname="Diana K. Smetters" initials="D." surname="Smetters">
              <organization/>
            </author>
            <author fullname="James D. Thornton" initials="J." surname="Thornton">
              <organization/>
            </author>
            <author fullname="Michael F. Plass" initials="M." surname="Plass">
              <organization/>
            </author>
            <author fullname="Nicholas H. Briggs" initials="N." surname="Briggs">
              <organization/>
            </author>
            <author fullname="Rebecca L. Braynard" initials="R." surname="Braynard">
              <organization/>
            </author>
            <date year="2009"/>
          </front>
          <seriesInfo name="Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT" value="'09"/>
          <seriesInfo name="DOI" value="10.1145/1658939.1658941"/>
        </reference>
        <reference anchor="HANDLEY">
          <front>
            <title>Delay is Not an Option: Low Latency Routing in Space</title>
            <author fullname="Mark Handley" initials="M." surname="Handley">
              <organization/>
            </author>
            <date month="November" year="2018"/>
          </front>
          <seriesInfo name="Proceedings of the 17th ACM Workshop on Hot Topics in" value="Networks"/>
          <seriesInfo name="DOI" value="10.1145/3286062.3286075"/>
        </reference>
        <reference anchor="TROSSEN">
          <front>
            <title>Arguments for an information-centric internetworking architecture</title>
            <author fullname="Dirk Trossen" initials="D." surname="Trossen">
              <organization/>
            </author>
            <author fullname="Mikko Sarela" initials="M." surname="Sarela">
              <organization/>
            </author>
            <author fullname="Karen Sollins" initials="K." surname="Sollins">
              <organization/>
            </author>
            <date month="April" year="2010"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 40, pp. 26-33"/>
          <seriesInfo name="DOI" value="10.1145/1764873.1764878"/>
        </reference>
        <reference anchor="ALOHA">
          <front>
            <title>The ALOHA System</title>
            <author fullname="F. F. Kuo" initials="F." surname="Kuo">
              <organization/>
            </author>
            <date month="January" year="1995"/>
          </front>
          <seriesInfo name="ACM SIGCOMM Computer Communication Review" value="Vol. 25, pp. 41-44"/>
          <seriesInfo name="DOI" value="10.1145/205447.205451"/>
        </reference>
        <reference anchor="CARTISEAN">
          <front>
            <title>Cartesian Ad Hoc Routing Protocols</title>
            <author fullname="Larry Hughes" initials="L." surname="Hughes">
              <organization/>
            </author>
            <author fullname="Kafil Shumon" initials="K." surname="Shumon">
              <organization/>
            </author>
            <author fullname="Ying Zhang" initials="Y." surname="Zhang">
              <organization/>
            </author>
            <date year="2003"/>
          </front>
          <seriesInfo name="Ad-Hoc, Mobile, and Wireless Networks" value="pp. 287-292"/>
          <seriesInfo name="DOI" value="10.1007/978-3-540-39611-6_27"/>
        </reference>
        <reference anchor="WANG19">
          <front>
            <title>Convergence of Satellite and Terrestrial Networks: A Comprehensive Survey</title>
            <author fullname="Peng Wang" initials="P." surname="Wang">
              <organization/>
            </author>
            <author fullname="Jiaxin Zhang" initials="J." surname="Zhang">
              <organization/>
            </author>
            <author fullname="Xing Zhang" initials="X." surname="Zhang">
              <organization/>
            </author>
            <author fullname="Zhi Yan" initials="Z." surname="Yan">
              <organization/>
            </author>
            <author fullname="Barry G. Evans" initials="B." surname="Evans">
              <organization/>
            </author>
            <author fullname="Wenbo Wang" initials="W." surname="Wang">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <seriesInfo name="IEEE Access" value="Vol. 8, pp. 5550-5588"/>
          <seriesInfo name="DOI" value="10.1109/access.2019.2963223"/>
        </reference>
        <reference anchor="CHRIKI19">
          <front>
            <title>FANET: Communication, mobility models and security issues</title>
            <author fullname="Amira Chriki" initials="A." surname="Chriki">
              <organization/>
            </author>
            <author fullname="Haifa Touati" initials="H." surname="Touati">
              <organization/>
            </author>
            <author fullname="Hichem Snoussi" initials="H." surname="Snoussi">
              <organization/>
            </author>
            <author fullname="Farouk Kamoun" initials="F." surname="Kamoun">
              <organization/>
            </author>
            <date month="November" year="2019"/>
          </front>
          <seriesInfo name="Computer Networks" value="Vol. 163, pp. 106877"/>
          <seriesInfo name="DOI" value="10.1016/j.comnet.2019.106877"/>
        </reference>
        <reference anchor="MAROJEVIC20">
          <front>
            <title>Advanced Wireless for Unmanned Aerial Systems: 5G Standardization, Research Challenges, and AERPAW Architecture</title>
            <author fullname="Vuk Marojevic" initials="V." surname="Marojevic">
              <organization/>
            </author>
            <author fullname="Ismail Guvenc" initials="I." surname="Guvenc">
              <organization/>
            </author>
            <author fullname="Rudra Dutta" initials="R." surname="Dutta">
              <organization/>
            </author>
            <author fullname="Mihail L. Sichitiu" initials="M." surname="Sichitiu">
              <organization/>
            </author>
            <author fullname="Brian A. Floyd" initials="B." surname="Floyd">
              <organization/>
            </author>
            <date month="June" year="2020"/>
          </front>
          <seriesInfo name="IEEE Vehicular Technology Magazine" value="Vol. 15, pp. 22-30"/>
          <seriesInfo name="DOI" value="10.1109/mvt.2020.2979494"/>
        </reference>
        <reference anchor="PILA">
          <front>
            <title>Pervasive Internet-Wide Low-Latency Authentication</title>
            <author fullname="Cyrill Krahenbuhl" initials="C." surname="Krahenbuhl">
              <organization/>
            </author>
            <author fullname="Markus Legner" initials="M." surname="Legner">
              <organization/>
            </author>
            <author fullname="Silvan Bitterli" initials="S." surname="Bitterli">
              <organization/>
            </author>
            <author fullname="Adrian Perrig" initials="A." surname="Perrig">
              <organization/>
            </author>
            <date month="July" year="2021"/>
          </front>
          <seriesInfo name="2021 International Conference on Computer Communications and Networks" value="(ICCCN)"/>
          <seriesInfo name="DOI" value="10.1109/icccn52240.2021.9522235"/>
        </reference>
        <reference anchor="CHEN21">
          <front>
            <title>GAMS: An IP Address Management Mechanism in Satellite Mega-constellation Networks</title>
            <author fullname="Yazheng Chen" initials="Y." surname="Chen">
              <organization/>
            </author>
            <author fullname="Hewu Li" initials="H." surname="Li">
              <organization/>
            </author>
            <author fullname="Jun Liu" initials="J." surname="Liu">
              <organization/>
            </author>
            <author fullname="Qian Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <author fullname="Zeqi Lai" initials="Z." surname="Lai">
              <organization/>
            </author>
            <date month="June" year="2021"/>
          </front>
          <seriesInfo name="2021 International Wireless Communications and Mobile Computing" value="(IWCMC)"/>
          <seriesInfo name="DOI" value="10.1109/iwcmc51323.2021.9498722"/>
        </reference>
        <reference anchor="DDS">
          <front>
            <title>DDS-Based Containment Control of Multiple UAV Systems</title>
            <author fullname="Basem AL-Madani" initials="B." surname="AL-Madani">
              <organization/>
            </author>
            <author fullname="Siddig M. Elkhider" initials="S." surname="Elkhider">
              <organization/>
            </author>
            <author fullname="Sami El-Ferik" initials="S." surname="El-Ferik">
              <organization/>
            </author>
            <date month="July" year="2020"/>
          </front>
          <seriesInfo name="Applied Sciences" value="Vol. 10, pp. 4572"/>
          <seriesInfo name="DOI" value="10.3390/app10134572"/>
        </reference>
        <reference anchor="LR-WPAN" target="https://standards.ieee.org/standard/802_15_4-2020.html">
          <front>
            <title>IEEE 802.15.4 - IEEE Standard for Low-Rate Wireless Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="May"/>
          </front>
          <seriesInfo name="IEEE" value="802.15 WPAN Task Group 4"/>
        </reference>
        <reference anchor="DECT-ULE" target="https://www.etsi.org/deliver/etsi_en/300100_300199/30017501/02.06.01_60/en_30017501v020601p.pdf">
          <front>
            <title>Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview</title>
            <author>
              <organization/>
            </author>
            <date year="2009" month="May"/>
          </front>
          <seriesInfo name="ETSI" value="European Standard, EN 300 175-1, V2.6.1"/>
        </reference>
        <reference anchor="BACnet" target="https://www.techstreet.com/ashrae/standards/ashrae-135-2016?product_id=1918140">
          <front>
            <title>BACnet-A Data Communication Protocol for Building Automation and Control Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2016" month="January"/>
          </front>
          <seriesInfo name="ANSI/ASHRAE" value="Standard 135-2016"/>
        </reference>
        <reference anchor="ECMA-340">
          <front>
            <title>Near Field Communication - Interface and Protocol (NFCIP-1) 3rd Ed.</title>
            <author>
              <organization>EECMA-340</organization>
            </author>
            <date year="2013" month="June"/>
          </front>
        </reference>
        <reference anchor="IEEE_1901.1" target="https://ieeexplore.ieee.org/document/8360785">
          <front>
            <title>Standard for Medium Frequency (less than 15 MHz) Power Line Communications for Smart Grid Applications</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="May"/>
          </front>
          <seriesInfo name="IEEE 1901.1" value="IEEE-SA Standards Board"/>
        </reference>
        <reference anchor="BLE" target="https://www.bluetooth.com/specifications">
          <front>
            <title>Bluetooth Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
          <seriesInfo name="Bluetooth" value="SIG Working Groups"/>
        </reference>
        <reference anchor="OCADO" target="https://techmonitor.ai/tech-leaders/ocado-technology-robot-hive-innovation">
          <front>
            <title>Ocado Technology’s robot warehouse a Hive of IoT innovation</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TERASTREAM" target="https://www.telekom.com/en/media/media-information/archive/deutsche-telekom-tests-terastream-the-network-of-the-future-in-croatia-358444">
          <front>
            <title>Deutsche Telekom tests TeraStream, the network of the future, in Croatia</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PEARG" target="https://irtf.org/pearg">
          <front>
            <title>Privacy Enhancements and Assessments Research Group - PEARG</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DETNET" target="https://datatracker.ietf.org/wg/detnet/about/">
          <front>
            <title>Deterministic Networking (DetNet)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PANRG" target="https://datatracker.ietf.org/rg/panrg/about/">
          <front>
            <title>Path Aware Networking Research Group - PANRG</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DINRG" target="https://datatracker.ietf.org/rg/dinrg/about/">
          <front>
            <title>Decentralized Internet Infrastructure - DINRG</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ETSI-NIN" target="https://www.etsi.org/technologies/non-ip-networking">
          <front>
            <title>Non-IP Networking - NIN</title>
            <author>
              <organization>ETSI - European Telecommunication Standards Institute</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EIBP" target="First Intl Workshop on Semantic Addressing and Routing for Future Networks">
          <front>
            <title>A Structured Approach to Routing in the Internet</title>
            <author initials="N." surname="Shenoy, S Chandraiah, P Willis">
              <organization/>
            </author>
            <date year="2021" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC8799" target="https://www.rfc-editor.org/info/rfc8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter">
              <organization/>
            </author>
            <author fullname="B. Liu" initials="B." surname="Liu">
              <organization/>
            </author>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes. </t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200">
          <front>
            <title>Internet Protocol, Version 6 (IPv6) Specification</title>
            <author fullname="S. Deering" initials="S." surname="Deering">
              <organization/>
            </author>
            <author fullname="R. Hinden" initials="R." surname="Hinden">
              <organization/>
            </author>
            <date month="July" year="2017"/>
            <abstract>
              <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="86"/>
          <seriesInfo name="RFC" value="8200"/>
          <seriesInfo name="DOI" value="10.17487/RFC8200"/>
        </reference>
        <reference anchor="RFC2775" target="https://www.rfc-editor.org/info/rfc2775">
          <front>
            <title>Internet Transparency</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter">
              <organization/>
            </author>
            <date month="February" year="2000"/>
            <abstract>
              <t>This document describes the current state of the Internet from the architectural viewpoint, concentrating on issues of end-to-end connectivity and transparency.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2775"/>
          <seriesInfo name="DOI" value="10.17487/RFC2775"/>
        </reference>
        <reference anchor="RFC4919" target="https://www.rfc-editor.org/info/rfc4919">
          <front>
            <title>IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals</title>
            <author fullname="N. Kushalnagar" initials="N." surname="Kushalnagar">
              <organization/>
            </author>
            <author fullname="G. Montenegro" initials="G." surname="Montenegro">
              <organization/>
            </author>
            <author fullname="C. Schumacher" initials="C." surname="Schumacher">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This document describes the assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks.  The set of goals enumerated in this document form an initial set only.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4919"/>
          <seriesInfo name="DOI" value="10.17487/RFC4919"/>
        </reference>
        <reference anchor="RFC5061" target="https://www.rfc-editor.org/info/rfc5061">
          <front>
            <title>Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart">
              <organization/>
            </author>
            <author fullname="Q. Xie" initials="Q." surname="Xie">
              <organization/>
            </author>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen">
              <organization/>
            </author>
            <author fullname="S. Maruyama" initials="S." surname="Maruyama">
              <organization/>
            </author>
            <author fullname="M. Kozuka" initials="M." surname="Kozuka">
              <organization/>
            </author>
            <date month="September" year="2007"/>
            <abstract>
              <t>A local host may have multiple points of attachment to the Internet, giving it a degree of fault tolerance from hardware failures.  Stream Control Transmission Protocol (SCTP) (RFC 4960) was developed to take full advantage of such a multi-homed host to provide a fast failover and association survivability in the face of such hardware failures. This document describes an extension to SCTP that will allow an SCTP stack to dynamically add an IP address to an SCTP association, dynamically delete an IP address from an SCTP association, and to request to set the primary address the peer will use when sending to an endpoint.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5061"/>
          <seriesInfo name="DOI" value="10.17487/RFC5061"/>
        </reference>
        <reference anchor="RFC6182" target="https://www.rfc-editor.org/info/rfc6182">
          <front>
            <title>Architectural Guidelines for Multipath TCP Development</title>
            <author fullname="A. Ford" initials="A." surname="Ford">
              <organization/>
            </author>
            <author fullname="C. Raiciu" initials="C." surname="Raiciu">
              <organization/>
            </author>
            <author fullname="M. Handley" initials="M." surname="Handley">
              <organization/>
            </author>
            <author fullname="S. Barre" initials="S." surname="Barre">
              <organization/>
            </author>
            <author fullname="J. Iyengar" initials="J." surname="Iyengar">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Hosts are often connected by multiple paths, but TCP restricts communications to a single path per transport connection.  Resource usage within the network would be more efficient were these multiple paths able to be used concurrently.  This should enhance user experience through improved resilience to network failure and higher throughput.</t>
              <t>This document outlines architectural guidelines for the development of a Multipath Transport Protocol, with references to how these architectural components come together in the development of a Multipath TCP (MPTCP).  This document lists certain high-level design decisions that provide foundations for the design of the MPTCP protocol, based upon these architectural requirements.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6182"/>
          <seriesInfo name="DOI" value="10.17487/RFC6182"/>
        </reference>
        <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC5177" target="https://www.rfc-editor.org/info/rfc5177">
          <front>
            <title>Network Mobility (NEMO) Extensions for Mobile IPv4</title>
            <author fullname="K. Leung" initials="K." surname="Leung">
              <organization/>
            </author>
            <author fullname="G. Dommety" initials="G." surname="Dommety">
              <organization/>
            </author>
            <author fullname="V. Narayanan" initials="V." surname="Narayanan">
              <organization/>
            </author>
            <author fullname="A. Petrescu" initials="A." surname="Petrescu">
              <organization/>
            </author>
            <date month="April" year="2008"/>
            <abstract>
              <t>This document describes a protocol for supporting Mobile Networks between a Mobile Router and a Home Agent by extending the Mobile IPv4 protocol.  A Mobile Router is responsible for the mobility of one or more network segments or subnets moving together.  The Mobile Router hides its mobility from the nodes on the Mobile Network.  The nodes on the Mobile Network may be fixed in relationship to the Mobile Router and may not have any mobility function.</t>
              <t>Extensions to Mobile IPv4 are introduced to support Mobile Networks. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5177"/>
          <seriesInfo name="DOI" value="10.17487/RFC5177"/>
        </reference>
        <reference anchor="RFC6626" target="https://www.rfc-editor.org/info/rfc6626">
          <front>
            <title>Dynamic Prefix Allocation for Network Mobility for Mobile IPv4 (NEMOv4)</title>
            <author fullname="G. Tsirtsis" initials="G." surname="Tsirtsis">
              <organization/>
            </author>
            <author fullname="V. Park" initials="V." surname="Park">
              <organization/>
            </author>
            <author fullname="V. Narayanan" initials="V." surname="Narayanan">
              <organization/>
            </author>
            <author fullname="K. Leung" initials="K." surname="Leung">
              <organization/>
            </author>
            <date month="May" year="2012"/>
            <abstract>
              <t>The base Network Mobility for Mobile IPv4 (NEMOv4) specification defines extensions to Mobile IPv4 for mobile networks.  This specification defines a dynamic prefix allocation mechanism for NEMOv4.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6626"/>
          <seriesInfo name="DOI" value="10.17487/RFC6626"/>
        </reference>
        <reference anchor="RFC5944" target="https://www.rfc-editor.org/info/rfc5944">
          <front>
            <title>IP Mobility Support for IPv4, Revised</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins">
              <organization/>
            </author>
            <date month="November" year="2010"/>
            <abstract>
              <t>This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about its current point of attachment to the Internet.  The protocol provides for registering the care-of address with a home agent.  The home agent sends datagrams destined for the mobile node through a tunnel to the care-of address.  After arriving at the end of the tunnel, each datagram is then delivered to the mobile node.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5944"/>
          <seriesInfo name="DOI" value="10.17487/RFC5944"/>
        </reference>
        <reference anchor="RFC5275" target="https://www.rfc-editor.org/info/rfc5275">
          <front>
            <title>CMS Symmetric Key Management and Distribution</title>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document describes a mechanism to manage (i.e., set up, distribute, and rekey) keys used with symmetric cryptographic algorithms.  Also defined herein is a mechanism to organize users into groups to support distribution of encrypted content using symmetric cryptographic algorithms.  The mechanism uses the Cryptographic Message Syntax (CMS) protocol and Certificate Management over CMS (CMC) protocol to manage the symmetric keys.  Any member of the group can then later use this distributed shared key to decrypt other CMS encrypted objects with the symmetric key.  This mechanism has been developed to support Secure/Multipurpose Internet Mail Extensions (S/MIME) Mail List Agents  (MLAs).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5275"/>
          <seriesInfo name="DOI" value="10.17487/RFC5275"/>
        </reference>
        <reference anchor="I-D.ietf-lisp-rfc6833bis" target="https://www.ietf.org/archive/id/draft-ietf-lisp-rfc6833bis-30.txt">
          <front>
            <title>Locator/ID Separation Protocol (LISP) Control-Plane</title>
            <author fullname="Dino Farinacci">
              <organization>lispers.net</organization>
            </author>
            <author fullname="Fabio Maino">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Vince Fuller">
              <organization>vaf.net Internet Consulting</organization>
            </author>
            <author fullname="Albert Cabellos">
              <organization>UPC/BarcelonaTech</organization>
            </author>
            <date day="18" month="November" year="2020"/>
            <abstract>
              <t>   This document describes the Control-Plane and Mapping Service for the
   Locator/ID Separation Protocol (LISP), implemented by two types of
   LISP-speaking devices -- the LISP Map-Resolver and LISP Map-Server --
   that provides a simplified "front end" for one or more Endpoint ID to
   Routing Locator mapping databases.

   By using this Control-Plane service interface and communicating with
   Map-Resolvers and Map-Servers, LISP Ingress Tunnel Routers (ITRs) and
   Egress Tunnel Routers (ETRs) are not dependent on the details of
   mapping database systems, which facilitates modularity with different
   database designs.  Since these devices implement the "edge" of the
   LISP Control-Plane infrastructure, connecting EID addressable nodes
   of a LISP site, it the implementation and operational complexity of
   the overall cost and effort of deploying LISP.

   This document obsoletes RFC 6830 and RFC 6833.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lisp-rfc6833bis-30"/>
        </reference>
        <reference anchor="RFC8926" target="https://www.rfc-editor.org/info/rfc8926">
          <front>
            <title>Geneve: Generic Network Virtualization Encapsulation</title>
            <author fullname="J. Gross" initials="J." role="editor" surname="Gross">
              <organization/>
            </author>
            <author fullname="I. Ganga" initials="I." role="editor" surname="Ganga">
              <organization/>
            </author>
            <author fullname="T. Sridhar" initials="T." role="editor" surname="Sridhar">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters.  As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components.  Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8926"/>
          <seriesInfo name="DOI" value="10.17487/RFC8926"/>
        </reference>
        <reference anchor="RFC7348" target="https://www.rfc-editor.org/info/rfc7348">
          <front>
            <title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
            <author fullname="M. Mahalingam" initials="M." surname="Mahalingam">
              <organization/>
            </author>
            <author fullname="D. Dutt" initials="D." surname="Dutt">
              <organization/>
            </author>
            <author fullname="K. Duda" initials="K." surname="Duda">
              <organization/>
            </author>
            <author fullname="P. Agarwal" initials="P." surname="Agarwal">
              <organization/>
            </author>
            <author fullname="L. Kreeger" initials="L." surname="Kreeger">
              <organization/>
            </author>
            <author fullname="T. Sridhar" initials="T." surname="Sridhar">
              <organization/>
            </author>
            <author fullname="M. Bursell" initials="M." surname="Bursell">
              <organization/>
            </author>
            <author fullname="C. Wright" initials="C." surname="Wright">
              <organization/>
            </author>
            <date month="August" year="2014"/>
            <abstract>
              <t>This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.  The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers.  This memo documents the deployed VXLAN protocol for the benefit of the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7348"/>
          <seriesInfo name="DOI" value="10.17487/RFC7348"/>
        </reference>
        <reference anchor="RFC7401" target="https://www.rfc-editor.org/info/rfc7401">
          <front>
            <title>Host Identity Protocol Version 2 (HIPv2)</title>
            <author fullname="R. Moskowitz" initials="R." role="editor" surname="Moskowitz">
              <organization/>
            </author>
            <author fullname="T. Heer" initials="T." surname="Heer">
              <organization/>
            </author>
            <author fullname="P. Jokela" initials="P." surname="Jokela">
              <organization/>
            </author>
            <author fullname="T. Henderson" initials="T." surname="Henderson">
              <organization/>
            </author>
            <date month="April" year="2015"/>
            <abstract>
              <t>This document specifies the details of the Host Identity Protocol (HIP).  HIP allows consenting hosts to securely establish and maintain shared IP-layer state, allowing separation of the identifier and locator roles of IP addresses, thereby enabling continuity of communications across IP address changes.  HIP is based on a Diffie-Hellman key exchange, using public key identifiers from a new Host Identity namespace for mutual peer authentication.  The protocol is designed to be resistant to denial-of-service (DoS) and man-in-the-middle (MitM) attacks.  When used together with another suitable security protocol, such as the Encapsulating Security Payload (ESP), it provides integrity protection and optional encryption for upper-layer protocols, such as TCP and UDP.</t>
              <t>This document obsoletes RFC 5201 and addresses the concerns raised by the IESG, particularly that of crypto agility.  It also incorporates lessons learned from the implementations of RFC 5201.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7401"/>
          <seriesInfo name="DOI" value="10.17487/RFC7401"/>
        </reference>
        <reference anchor="RFC7476" target="https://www.rfc-editor.org/info/rfc7476">
          <front>
            <title>Information-Centric Networking: Baseline Scenarios</title>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis">
              <organization/>
            </author>
            <author fullname="B. Ohlman" initials="B." surname="Ohlman">
              <organization/>
            </author>
            <author fullname="D. Corujo" initials="D." surname="Corujo">
              <organization/>
            </author>
            <author fullname="G. Boggia" initials="G." surname="Boggia">
              <organization/>
            </author>
            <author fullname="G. Tyson" initials="G." surname="Tyson">
              <organization/>
            </author>
            <author fullname="E. Davies" initials="E." surname="Davies">
              <organization/>
            </author>
            <author fullname="A. Molinaro" initials="A." surname="Molinaro">
              <organization/>
            </author>
            <author fullname="S. Eum" initials="S." surname="Eum">
              <organization/>
            </author>
            <date month="March" year="2015"/>
            <abstract>
              <t>This document aims at establishing a common understanding about a set of scenarios that can be used as a base for the evaluation of different information-centric networking (ICN) approaches so that they can be tested and compared against each other while showcasing their own advantages.  Towards this end, we review the ICN literature and document scenarios which have been considered in previous performance evaluation studies.  We discuss a variety of aspects that an ICN solution can address.  This includes general aspects, such as, network efficiency, reduced complexity, increased scalability and reliability, mobility support, multicast and caching performance, real-time communication efficiency, energy consumption frugality, and disruption and delay tolerance.  We detail ICN-specific aspects as well, such as information security and trust, persistence, availability, provenance, and location independence.</t>
              <t>This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7476"/>
          <seriesInfo name="DOI" value="10.17487/RFC7476"/>
        </reference>
        <reference anchor="RFC7429" target="https://www.rfc-editor.org/info/rfc7429">
          <front>
            <title>Distributed Mobility Management: Current Practices and Gap Analysis</title>
            <author fullname="D. Liu" initials="D." role="editor" surname="Liu">
              <organization/>
            </author>
            <author fullname="JC. Zuniga" initials="JC." role="editor" surname="Zuniga">
              <organization/>
            </author>
            <author fullname="P. Seite" initials="P." surname="Seite">
              <organization/>
            </author>
            <author fullname="H. Chan" initials="H." surname="Chan">
              <organization/>
            </author>
            <author fullname="CJ. Bernardos" initials="CJ." surname="Bernardos">
              <organization/>
            </author>
            <date month="January" year="2015"/>
            <abstract>
              <t>This document analyzes deployment practices of existing IP mobility protocols in a distributed mobility management environment.  It then identifies existing limitations when compared to the requirements defined for a distributed mobility management solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7429"/>
          <seriesInfo name="DOI" value="10.17487/RFC7429"/>
        </reference>
        <reference anchor="RFC8763" target="https://www.rfc-editor.org/info/rfc8763">
          <front>
            <title>Deployment Considerations for Information-Centric Networking (ICN)</title>
            <author fullname="A. Rahman" initials="A." surname="Rahman">
              <organization/>
            </author>
            <author fullname="D. Trossen" initials="D." surname="Trossen">
              <organization/>
            </author>
            <author fullname="D. Kutscher" initials="D." surname="Kutscher">
              <organization/>
            </author>
            <author fullname="R. Ravindran" initials="R." surname="Ravindran">
              <organization/>
            </author>
            <date month="April" year="2020"/>
            <abstract>
              <t>Information-Centric Networking (ICN) is now reaching technological maturity after many years of fundamental research and experimentation. This document provides a number of deployment considerations in the interest of helping the ICN community move forward to the next step of live deployments. First, the major deployment configurations for ICN are described, including the key overlay and underlay approaches. Then, proposed deployment migration paths are outlined to address major practical issues, such as network and application migration. Next, selected ICN trial experiences are summarized. Finally, protocol areas that require further standardization are identified to facilitate future interoperable ICN deployments. This document is a product of the Information-Centric Networking Research Group (ICNRG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8763"/>
          <seriesInfo name="DOI" value="10.17487/RFC8763"/>
        </reference>
        <reference anchor="RFC7665" target="https://www.rfc-editor.org/info/rfc7665">
          <front>
            <title>Service Function Chaining (SFC) Architecture</title>
            <author fullname="J. Halpern" initials="J." role="editor" surname="Halpern">
              <organization/>
            </author>
            <author fullname="C. Pignataro" initials="C." role="editor" surname="Pignataro">
              <organization/>
            </author>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7665"/>
          <seriesInfo name="DOI" value="10.17487/RFC7665"/>
        </reference>
        <reference anchor="RFC8754" target="https://www.rfc-editor.org/info/rfc8754">
          <front>
            <title>IPv6 Segment Routing Header (SRH)</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." surname="Previdi">
              <organization/>
            </author>
            <author fullname="J. Leddy" initials="J." surname="Leddy">
              <organization/>
            </author>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima">
              <organization/>
            </author>
            <author fullname="D. Voyer" initials="D." surname="Voyer">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8754"/>
          <seriesInfo name="DOI" value="10.17487/RFC8754"/>
        </reference>
        <reference anchor="RFC8595" target="https://www.rfc-editor.org/info/rfc8595">
          <front>
            <title>An MPLS-Based Forwarding Plane for Service Function Chaining</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="S. Bryant" initials="S." surname="Bryant">
              <organization/>
            </author>
            <author fullname="J. Drake" initials="J." surname="Drake">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document describes how Service Function Chaining (SFC) can be achieved in an MPLS network by means of a logical representation of the Network Service Header (NSH) in an MPLS label stack.  That is, the NSH is not used, but the fields of the NSH are mapped to fields in the MPLS label stack.  This approach does not deprecate or replace the NSH, but it acknowledges that there may be a need for an interim deployment of SFC functionality in brownfield networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8595"/>
          <seriesInfo name="DOI" value="10.17487/RFC8595"/>
        </reference>
        <reference anchor="RFC8677" target="https://www.rfc-editor.org/info/rfc8677">
          <front>
            <title>Name-Based Service Function Forwarder (nSFF) Component within a Service Function Chaining (SFC) Framework</title>
            <author fullname="D. Trossen" initials="D." surname="Trossen">
              <organization/>
            </author>
            <author fullname="D. Purkayastha" initials="D." surname="Purkayastha">
              <organization/>
            </author>
            <author fullname="A. Rahman" initials="A." surname="Rahman">
              <organization/>
            </author>
            <date month="November" year="2019"/>
            <abstract>
              <t>Adoption of cloud and fog technology allows operators to deploy a single "Service Function" (SF) to multiple "execution locations".  The decision to steer traffic to a specific location may change frequently based on load, proximity, etc. Under the current Service Function Chaining (SFC) framework, steering traffic dynamically to the different execution endpoints requires a specific "rechaining", i.e., a change in the service function path reflecting the different IP endpoints to be used for the new execution points.  This procedure may be complex and take time. In order to simplify rechaining and reduce the time to complete the procedure, we discuss separating the logical Service Function Path (SFP) from the specific execution endpoints. This can be done by identifying the SFs using a name rather than a routable IP endpoint (or Layer 2 address). This document describes the necessary extensions, additional functions, and protocol details in the Service Function Forwarder (SFF) to handle name-based relationships. </t>
              <t>This document presents InterDigital's approach to name-based SFC. It does not represent IETF consensus and is presented here so that the SFC community may benefit from considering this mechanism and the possibility of its use in the edge data centers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8677"/>
          <seriesInfo name="DOI" value="10.17487/RFC8677"/>
        </reference>
        <reference anchor="RFC5517" target="https://www.rfc-editor.org/info/rfc5517">
          <front>
            <title>Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment</title>
            <author fullname="S. HomChaudhuri" initials="S." surname="HomChaudhuri">
              <organization/>
            </author>
            <author fullname="M. Foschiano" initials="M." surname="Foschiano">
              <organization/>
            </author>
            <date month="February" year="2010"/>
            <abstract>
              <t>This document describes a mechanism to achieve device isolation through the application of special Layer 2 forwarding constraints. Such a mechanism allows end devices to share the same IP subnet while being Layer 2 isolated, which in turn allows network designers to employ larger subnets and so reduce the address management overhead.</t>
              <t>Some of the numerous deployment scenarios of the aforementioned mechanism (which range from data center designs to Ethernet-to-the-home-basement networks) are mentioned in the following text to exemplify the mechanism's possible usages; however, this document is not intended to cover all such deployment scenarios nor delve into their details.  This document is not an Internet Standards Track specification; it  is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5517"/>
          <seriesInfo name="DOI" value="10.17487/RFC5517"/>
        </reference>
        <reference anchor="RFC8402" target="https://www.rfc-editor.org/info/rfc8402">
          <front>
            <title>Segment Routing Architecture</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils">
              <organization/>
            </author>
            <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi">
              <organization/>
            </author>
            <author fullname="L. Ginsberg" initials="L." surname="Ginsberg">
              <organization/>
            </author>
            <author fullname="B. Decraene" initials="B." surname="Decraene">
              <organization/>
            </author>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski">
              <organization/>
            </author>
            <author fullname="R. Shakir" initials="R." surname="Shakir">
              <organization/>
            </author>
            <date month="July" year="2018"/>
            <abstract>
              <t>Segment Routing (SR) leverages the source routing paradigm.  A node steers a packet through an ordered list of instructions, called "segments".  A segment can represent any instruction, topological or service based.  A segment can have a semantic local to an SR node or global within an SR domain.  SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
              <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane.  A segment is encoded as an MPLS label.  An ordered list of segments is encoded as a stack of labels.  The segment to process is on the top of the stack.  Upon completion of a segment, the related label is popped from the stack.</t>
              <t>SR can be applied to the IPv6 architecture, with a new type of routing header.  A segment is encoded as an IPv6 address.  An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header.  The active segment is indicated by the Destination Address (DA) of the packet.  The next active segment is indicated by a pointer in the new routing header.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8402"/>
          <seriesInfo name="DOI" value="10.17487/RFC8402"/>
        </reference>
        <reference anchor="RFC6158" target="https://www.rfc-editor.org/info/rfc6158">
          <front>
            <title>RADIUS Design Guidelines</title>
            <author fullname="A. DeKok" initials="A." role="editor" surname="DeKok">
              <organization/>
            </author>
            <author fullname="G. Weber" initials="G." surname="Weber">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>This document provides guidelines for the design of attributes used by the Remote Authentication Dial In User Service (RADIUS) protocol. It is expected that these guidelines will prove useful to authors and reviewers of future RADIUS attribute specifications, within the IETF as well as other Standards Development Organizations (SDOs). This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="158"/>
          <seriesInfo name="RFC" value="6158"/>
          <seriesInfo name="DOI" value="10.17487/RFC6158"/>
        </reference>
        <reference anchor="RFC3972" target="https://www.rfc-editor.org/info/rfc3972">
          <front>
            <title>Cryptographically Generated Addresses (CGA)</title>
            <author fullname="T. Aura" initials="T." surname="Aura">
              <organization/>
            </author>
            <date month="March" year="2005"/>
            <abstract>
              <t>This document describes a method for binding a public signature key to an IPv6 address in the Secure Neighbor Discovery (SEND) protocol.  Cryptographically Generated Addresses (CGA) are IPv6 addresses for which the interface identifier is generated by computing a cryptographic one-way hash function from a public key and auxiliary parameters.  The binding between the public key and the address can be verified by re-computing the hash value and by comparing the hash with the interface identifier.  Messages sent from an IPv6 address can be protected by attaching the public key and auxiliary parameters and by signing the message with the corresponding private key.  The protection works without a certification authority or any security infrastructure.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3972"/>
          <seriesInfo name="DOI" value="10.17487/RFC3972"/>
        </reference>
        <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent">
              <organization/>
            </author>
            <author fullname="K. Seo" initials="K." surname="Seo">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer.  This document obsoletes RFC 2401 (November 1998).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC3031" target="https://www.rfc-editor.org/info/rfc3031">
          <front>
            <title>Multiprotocol Label Switching Architecture</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen">
              <organization/>
            </author>
            <author fullname="A. Viswanathan" initials="A." surname="Viswanathan">
              <organization/>
            </author>
            <author fullname="R. Callon" initials="R." surname="Callon">
              <organization/>
            </author>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document specifies the architecture for Multiprotocol Label Switching (MPLS).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3031"/>
          <seriesInfo name="DOI" value="10.17487/RFC3031"/>
        </reference>
        <reference anchor="RFC7426" target="https://www.rfc-editor.org/info/rfc7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis">
              <organization/>
            </author>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis">
              <organization/>
            </author>
            <author fullname="S. Denazis" initials="S." surname="Denazis">
              <organization/>
            </author>
            <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim">
              <organization/>
            </author>
            <author fullname="D. Meyer" initials="D." surname="Meyer">
              <organization/>
            </author>
            <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou">
              <organization/>
            </author>
            <date month="January" year="2015"/>
            <abstract>
              <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces.  SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane.  This separation allows faster innovation cycles at both planes as experience has already shown.  However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other.  This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC6275" target="https://www.rfc-editor.org/info/rfc6275">
          <front>
            <title>Mobility Support in IPv6</title>
            <author fullname="C. Perkins" initials="C." role="editor" surname="Perkins">
              <organization/>
            </author>
            <author fullname="D. Johnson" initials="D." surname="Johnson">
              <organization/>
            </author>
            <author fullname="J. Arkko" initials="J." surname="Arkko">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies Mobile IPv6, a protocol that allows nodes to remain reachable while moving around in the IPv6 Internet.  Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet.  While situated away from its home, a mobile node is also associated with a care-of address, which provides information about the mobile node's current location.  IPv6 packets addressed to a mobile node's home address are transparently routed to its care-of address.  The protocol enables IPv6 nodes to cache the binding of a mobile node's home address with its care-of address, and to then send any packets destined for the mobile node directly to it at this care-of address.  To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option.  All IPv6 nodes, whether mobile or stationary, can communicate with mobile nodes.  This document obsoletes RFC 3775. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6275"/>
          <seriesInfo name="DOI" value="10.17487/RFC6275"/>
        </reference>
        <reference anchor="RFC8280" target="https://www.rfc-editor.org/info/rfc8280">
          <front>
            <title>Research into Human Rights Protocol Considerations</title>
            <author fullname="N. ten Oever" initials="N." surname="ten Oever">
              <organization/>
            </author>
            <author fullname="C. Cath" initials="C." surname="Cath">
              <organization/>
            </author>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document aims to propose guidelines for human rights considerations, similar to the work done on the guidelines for privacy considerations (RFC 6973).  The other parts of this document explain the background of the guidelines and how they were developed.</t>
              <t>This document is the first milestone in a longer-term research effort.  It has been reviewed by the Human Rights Protocol Considerations (HRPC) Research Group and also by individuals from outside the research group.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8280"/>
          <seriesInfo name="DOI" value="10.17487/RFC8280"/>
        </reference>
        <reference anchor="I-D.ietf-6man-mtu-option" target="https://www.ietf.org/archive/id/draft-ietf-6man-mtu-option-13.txt">
          <front>
            <title>IPv6 Minimum Path MTU Hop-by-Hop Option</title>
            <author fullname="Robert M. Hinden">
              <organization>Check Point Software</organization>
            </author>
            <author fullname="Godred Fairhurst">
              <organization>University of Aberdeen</organization>
            </author>
            <date day="28" month="February" year="2022"/>
            <abstract>
              <t>   This document specifies a new IPv6 Hop-by-Hop option that is used to
   record the minimum Path MTU along the forward path between a source
   host to a destination host.  The recorded value can then be
   communicated back to the source using the return Path MTU field in
   the option.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6man-mtu-option-13"/>
        </reference>
        <reference anchor="I-D.templin-6man-aero" target="https://www.ietf.org/archive/id/draft-templin-6man-aero-39.txt">
          <front>
            <title>Automatic Extended Route Optimization (AERO)</title>
            <author fullname="Fred L. Templin">
              <organization>Boeing Research &amp; Technology</organization>
            </author>
            <date day="22" month="February" year="2022"/>
            <abstract>
              <t>   This document specifies an Automatic Extended Route Optimization
   (AERO) service for IP internetworking over Overlay Multilink Network
   (OMNI) interfaces.  AERO/OMNI use an IPv6 link-local address format
   that supports operation of the IPv6 Neighbor Discovery (IPv6 ND)
   protocol.  Prefix delegation/registration services are employed for
   network admission and to manage the IP forwarding and routing
   systems.  Secure multilink operation, mobility management, multicast,
   traffic path selection and route optimization are naturally supported
   through dynamic neighbor cache updates.  AERO is a widely-applicable
   mobile internetworking service especially well-suited to aviation
   services, intelligent transportation systems, mobile end user devices
   and many other applications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-templin-6man-aero-39"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to all the people that shared insightful comments both privately to the authors as well as on various mailing list, especially on the INTArea Mailing List.
Also thanks for the interesting discussions to Stewart Bryant, Ron Bonica, Toerless Eckert,  Brian E. Carpenter, Kiran Makhijani, Fred Templin.</t>
      <!-- [LI]:  add the panelists and all that replied on the mailing list -->

</section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
