情妇是什么意思| 拉黑色的屎是什么原因| 手淫过度有什么症状| 五指毛桃长什么样| 减肥用什么好| 1996年属鼠五行属什么| 大芒果是什么品种| 白细胞数目偏高是什么意思| 女人做梦梦到蛇是什么意思| 衡于虑的衡什么意思| 梦见在水里游泳是什么意思| 百白破是什么疫苗| 木丹念什么| 观音菩萨叫什么名字| 手链突然断了预示什么| 左眼跳财是什么意思| 婳是什么意思| 蔚字五行属什么| 33数字代表什么意思| lafuma是什么牌子| gmp什么意思| 为什么家里蟑螂特别多| 皮瓣手术是什么意思| 甜菊糖苷是什么| 1为什么读yao| 麦克白夫人什么意思| 喝酒前吃什么不容易醉又不伤胃| 梅长苏结局是什么| 1月15号是什么星座| 奶奶和孙女是什么关系| 属鸡和什么属相相克| 一个日一个安念什么字| 梦见死鸡是什么预兆| 花心什么意思| 史迪奇是什么动物| 布谷鸟什么时候叫| 三餐两点什么意思| 孢子是什么东西| 转氨酶升高有什么症状| 啤酒喝了有什么好处| 相思病是什么意思| 梦见自己和别人结婚是什么意思| 常喝黑苦荞茶有什么好处| 4月4号是什么星座| 关节炎用什么药| 阴道有腥味是什么原因| 什么是道| 自荐是什么意思| 二月初五是什么星座| 做梦笑醒了有什么征兆| 女性尿道出血是什么原因引起的| 什么是三重一大事项| 梦到考试是什么意思| 男生下面长什么样| 11月30是什么星座| 胆是起什么作用的| 外油内干是什么肤质| 锐步是什么档次| 4月3日是什么星座| 测幽门螺旋杆菌挂什么科| 情未了什么意思| 给小孩买什么保险好| 神龙摆尾什么意思| 激情什么意思| 书中自有颜如玉是什么意思| 红棕色是什么颜色| 连奕名为什么娶杨若兮| 下午4点到5点是什么时辰| 臆想症是什么病| 6.4是什么星座| 大姨妈推迟是什么原因| 致电是什么意思| 斯文败类是什么意思| 定亲是什么意思| 影射是什么意思| 摩羯座女和什么星座最配| 吃什么水果补肝养肝最有效| 肝吸虫病有什么症状| 鱼字五行属什么| 查hpv挂什么科| 尿激酶的作用及功效是什么| hlh是什么病| 眼镜发黄是什么原因| 一什么麦子| 未成年喝酒有什么危害| 女人喜欢什么样的阴茎| 牛大力泡酒有什么功效| 老公护着婆婆说明什么| 药师是干什么的| 脸上痒是什么原因| 黄色裤子配什么颜色上衣| 感冒喝什么水好得快| 吴京和吴樾什么关系| 无犯罪证明需要什么材料| 做梦坐飞机是什么意思| 什么春白雪| ibd是什么意思| 宫内暗区是什么意思| 趣味是什么意思| 申时五行属什么| 菏泽有什么好玩的地方| 浅表性胃炎吃什么药好使| 前位子宫和后位子宫有什么区别| 吃什么对睡眠好| 一吃饭就吐是什么原因| 70岁是什么之年| 一个虫一个冉读什么| 玉米什么时候打药| 先兆性流产是什么症状| 本子什么意思| 固执己见是什么意思| 澄面是什么面粉| 丝瓜不可以和什么一起吃| 书签是什么| 营销号是什么| 五彩绳什么时候扔掉| 肝叶钙化灶是什么意思| 炒菜什么时候放盐最合适| 跑酷是什么运动| 弟弟的老婆叫什么| 金可以组什么词| 皮肤瘙痒是什么原因| 卡密是什么| 塞飞洛是什么档次的包| 十八大什么时候| 灰指甲有什么症状| 女人手心发热是什么原因| 混合性皮肤用什么护肤品比较好| 属牛的本命佛是什么佛| 10pcs是什么意思| 山川载不动太多悲哀是什么歌| 麦芽糖是什么糖| 什么是真菌| 慢性鼻炎用什么药| 劈腿什么意思| 什么是ntr| 体检前一天晚上吃什么| 白细胞低吃什么补得快| 金鱼吊兰什么时候开花| 耳洞发炎流脓用什么药| 姘头是什么意思| 七月二十是什么星座| 吾矛之利的利什么意思| 低压高吃什么中成药| 京剧脸谱黑色代表什么| 壁虎怕什么| 结石吃什么药好| 道家思想的核心是什么| 螃蟹吐泡泡是什么原因| 屋里有蝙蝠有什么预兆| 自闭症是什么人投胎| 子非鱼什么意思| 藤椒是什么| 大陆人去香港需要什么证件| 穿什么好呢| bpm是什么单位| 迁移宫代表什么| 小鬼是什么意思| 笑对人生是什么意思| 蓝莓树长什么样| 梦见自己的手镯断了什么意思| 霉菌阳性是什么意思| 什么红什么赤| 吃青提有什么好处| 粉玫瑰适合送什么人| 内脂是什么| 眉毛少是什么原因| 血小板计数偏高是什么意思| 眼睛为什么会得结膜炎| gfr是什么意思| 十余年是什么意思| 婴儿吃什么奶粉好呢| 玫瑰糠疹是什么病| 五七年属什么生肖| 什么有什么造句| 白牡丹属于什么茶| 六字箴言是什么意思| 过敏性紫癜什么症状| 什么是干咳| 催乳素过高是什么原因| 什么蛇没有毒| 什么药治牙疼最快| 吃什么 长高| 补血吃什么食物| 什么是酵素| 盆腔积液是什么原因造成的| 命格是什么意思| 宫闱是什么意思| 易举易泄是什么原因| 贝兄念什么| 吃了火龙果小便红色是什么原因| 喝酒后头晕是什么原因| 四个火是什么字| 为什么月亮是红色的| 富勒烯是什么| 柠檬酸是什么添加剂| 为什么会长胎记| 血糖查什么项目| 吃什么可以补精子| 手抖是什么毛病| 维生素c阳性是什么意思| 营养性贫血是什么意思| 见红是什么颜色| 阿昔洛韦片治什么病| 肩周炎口服什么药最好| 脚上有水泡是什么原因| 隔空打牛是什么意思| 国保大队是干什么的| 北戴河是什么海| 观音菩萨原名叫什么名| 涤纶是什么面料| 补气血吃什么中成药最好| 结膜炎滴什么眼药水| 唇色深是什么原因| 减肥晚餐吃什么好| 调戏什么意思| 黄油可以用什么代替| 爱趴着睡觉是什么原因| 嘿嘿嘿是什么意思| 很多屁放是什么原因| 国防部部长是什么级别| 月经要来之前有什么症状| 延年是什么意思| 异想天开什么意思| 醛固酮高有什么危害| 矫正度数是什么意思| 壤土适合种植什么植物| 肠炎吃什么| 健康证什么时候可以办| 月经来了不能吃什么东西| 刚生完宝宝的产妇吃什么好| 来字五行属什么| 女人来月经有血块是什么原因| 神阙穴在什么位置| 摩羯男和什么星座最配| 长期喝枸杞水有什么好处和坏处| 功能性消化不良是什么意思| 益生菌什么时候吃最好| 医保是什么| 地皮菜是什么菜| 女性下面水少是什么原因| 修为是什么意思| 儿童乘坐高铁需要什么证件| dx是什么| 喉咙溃疡吃什么药| 什么是点映| 大蒜味是什么中毒| 金蝉脱壳比喻什么| 心阳不足吃什么中成药| cnb是什么意思| ap医学上是什么意思| 牙神经疼吃什么药| 吃什么补营养最快| 高考300分能上什么大学| 李知恩为什么叫iu| 扁桃体发炎吃什么消炎药| 9月13日是什么纪念日| 倒挂金钩什么意思| 单纯疱疹病毒是什么病| 秦二世叫什么| 2004年出生属什么| 小腿浮肿是什么原因| lh是什么激素| 每天流鼻血是什么原因| 百度
Skip to main content

能上天也能入海 揭秘鲜为人知的中国空军海战队

Document Type RFC - Informational (February 1997)
Was draft-iab-ip-ad-today (individual)
Authors Yakov Rekhter , Jon Crowcroft , Brian E. Carpenter
Last updated 2025-08-04
RFC stream Internet Architecture Board (IAB)
Formats
RFC 2101
百度 最后,祝广大网友身体健康,事业进步,阖家幸福!中共甘肃省委书记
Network Working Group                                       B. Carpenter
Request for Comments: 2101                                  J. Crowcroft
Category: Informational                                       Y. Rekhter
                                                                     IAB
                                                           February 1997

                      IPv4 Address Behaviour Today

Status of this Memo

   This memo provides information for the Internet community.  This memo
   does not specify an Internet standard of any kind.  Distribution of
   this memo is unlimited.

Abstract

   The main purpose of this note is to clarify the current
   interpretation of the 32-bit IP version 4 address space, whose
   significance has changed substantially since it was originally
   defined.  A short section on IPv6 addresses mentions the main points
   of similarity with, and difference from, IPv4.

Table of Contents

     1. Introduction.................................................1
     2. Terminology..................................................2
     3. Ideal properties.............................................3
     4. Overview of the current situation of IPv4 addresses..........4
       4.1. Addresses are no longer globally unique locators.........4
       4.2. Addresses are no longer all temporally unique............6
       4.3. Multicast and Anycast....................................7
       4.4. Summary..................................................8
     5. IPv6 Considerations..........................................8
     ANNEX: Current Practices for IPv4 Address Allocation & Routing..9
     Security Considerations........................................10
     Acknowledgements...............................................11
     References.....................................................11
     Authors' Addresses.............................................13

1. Introduction

   The main purpose of this note is to clarify the current
   interpretation of the 32-bit IP version 4 address space, whose
   significance has changed substantially since it was originally
   defined in 1981 [RFC 791].

Carpenter, et. al.           Informational                      [Page 1]
RFC 2101              IPv4 Address Behavior Today          February 1997

   This clarification is intended to assist protocol designers, product
   implementors, Internet service providers, and user sites. It aims to
   avoid misunderstandings about IP addresses that can result from the
   substantial changes that have taken place in the last few years, as a
   result of the Internet's exponential growth.

   A short section on IPv6 addresses mentions the main points of
   similarity with, and difference from, IPv4.

2. Terminology

   It is well understood that in computer networks, the concepts of
   directories, names, network addresses, and routes are separate and
   must be analysed separately [RFC 1498].  However, it is also
   necessary to sub-divide the concept of "network address" (abbreviated
   to "address" from here on) into at least two notions, namely
   "identifier" and "locator". This was perhaps less well understood
   when RFC 791 was written.

   In this document, the term "host" refers to any system originating
   and/or terminating IPv4 packets, and "router" refers to any system
   forwarding IPv4 packets from one host or router to another.

   For the purposes of this document, an "identifier" is a bit string
   which is used throughout the lifetime of a communication session
   between two hosts, to identify one of the hosts as far as the other
   is concerned. Such an identifier is used to verify the source of
   incoming packets as being truly the other end of the communication
   concerned, e.g. in the TCP pseudo-header [RFC 793] or in an IP
   Security association [RFC 1825].  Traditionally, the source IPv4
   address in every packet is used for this.

   Note that other definitions of "identifier" are sometimes used; this
   document does not claim to discuss the general issue of the semantics
   of end-point identifiers.

   For the purposes of this document, a "locator" is a bit string which
   is used to identify where a particular packet must be delivered, i.e.
   it serves to locate the place in the Internet topology where the
   destination host is attached. Traditionally, the destination IPv4
   address in every packet is used for this. IP routing protocols
   interpret IPv4 addresses as locators and construct routing tables
   based on which routers (which have their own locators) claim to know
   a route towards the locators of particular hosts.

   Both identifiers and locators have requirements of uniqueness, but
   these requirements are different. Identifiers must be unique with
   respect to each set of inter-communicating hosts. Locators must be

Carpenter, et. al.           Informational                      [Page 2]
RFC 2101              IPv4 Address Behavior Today          February 1997

   unique with respect to each set of inter-communicating routers (which
   we will call a routing "realm"). While locators must be unique within
   a given routing realm, this uniqueness (but not routability) could
   extend to more than one realm.  Thus we can further distinguish
   between a set of realms with unique locators versus a set of realms
   with non-unique (overlapping) locators.

   Both identifiers and locators have requirements of lifetime, but
   these requirements are different. Identifiers must be valid for at
   least the maximum lifetime of a communication between two hosts.
   Locators must be valid only as long as the routing mechanisms so
   require (which could be shorter or longer than the lifetime of a
   communication).

   It will be noted that it is a contingent fact of history that the
   same address space and the same fields in the IP header (source and
   destination addresses) are used by RFC 791 and RFC 793 for both
   identifiers and locators, and that in the traditional Internet a
   host's identifier is identical to its locator, as well as being
   spatially unique (unambiguous) and temporally unique (constant).

   These uniqueness conditions had a number of consequences for design
   assumptions of routing (the infrastructure that IPv4 locators enable)
   and transport protocols (that which depends on the IP connectivity).
   Spatial uniqueness of an address meant that it served as both an
   interface identifier and a host identifier, as well as the key to the
   routing table.  Temporal uniqueness of an address meant that there
   was no need for TCP implementations to maintain state regarding
   identity of the far end, other than the IP address. Thus IP addresses
   could be used both for end-to-end IP security and for binding upper
   layer sessions.

   Generally speaking, the use of IPv4 addresses as locators has been
   considered more important than their use as identifiers, and whenever
   there has been a conflict between the two uses, the use as a locator
   has prevailed. That is, it has been considered more useful to deliver
   the packet, then worry about how to identify the end points, than to
   provide identity in a packet that cannot be delivered. In other
   words, there has been intensive work on routing protocols and little
   concrete work on other aspects of address usage.

3. Ideal properties.

   Whatever the constraints mentioned above, it is easy to see the ideal
   properties of identifiers and locators. Identifiers should be
   assigned at birth, never change, and never be re-used. Locators
   should describe the host's position in the network's topology, and
   should change whenever the topology changes.

Carpenter, et. al.           Informational                      [Page 3]
RFC 2101              IPv4 Address Behavior Today          February 1997

   Unfortunately neither of the these ideals are met by IPv4 addresses.
   The remainder of this document is intended as a snapshot of the
   current real situation.

4. Overview of the current situation of IPv4 addresses.

   It is a fact that IPv4 addresses are no longer all globally unique
   and no longer all have indefinite lifetimes.

   4.1 Addresses are no longer globally unique locators

      [RFC 1918] shows how corporate networks, a.k.a. Intranets, may if
      necessary legitimately re-use a subset of the IPv4 address space,
      forming multiple routing realms. At the boundary between two (or
      more) routing realms, we may find a spectrum of devices that
      enables communication between the realms.

      At one end of the spectrum is a pure Application Layer Gateway
      (ALG). Such a device acts as a termination point for the
      application layer data stream, and is visible to an end-user.  For
      example, when an end-user Ua in routing realm A wants to
      communicate with an end-user Ub in routing realm B, Ua has first
      to explicitly establish communication with the ALG that
      interconnects A and B, and only via that can Ua establish
      communication with Ub. We term such a gateway a "non-transparent"
      ALG.

      Another form of ALG makes communication through the ALG
      transparent to an end user. Using the previous example, with a
      "transparent" ALG, Ua would not be required to establish explicit
      connectivity to the ALG first, before starting to communicate with
      Ub. Such connectivity will be established transparently to Ua, so
      that Ua would only see connectivity to Ub.

      For completeness, note that it is not necessarily the case that
      communicating via an ALG involves changes to the network header.
      An ALG could be used only at the beginning of a session for the
      purpose of authentication, after which the ALG goes away and
      communication continues natively.

      Both non-transparent and transparent ALGs are required (by
      definition) to understand the syntax and semantics of the
      application data stream.  ALGs are very simple from the viewpoint
      of network layer architecture, since they appear as Internet hosts
      in each realm, i.e. they act as origination and termination points
      for communication.

Carpenter, et. al.           Informational                      [Page 4]
RFC 2101              IPv4 Address Behavior Today          February 1997

      At the other end of the spectrum is a Network Address Translator
      (NAT) [RFC 1631]. In the context of this document we define a NAT
      as a device that just modifies the network and the transport layer
      headers, but does not understand the syntax/semantics of the
      application layer data stream (using our terminology what is
      described in RFC1631 is a device that has both the NAT and ALG
      functionality).

      In the standard case of a NAT placed between a corporate network
      using private addresses [RFC 1918] and the public Internet, that
      NAT changes the source IPv4 address in packets going towards the
      Internet, and changes the destination IPv4 address in packets
      coming from the Internet.  When a NAT is used to interconnect
      routing realms with overlapping addresses, such as a direct
      connection between two intranets, the NAT may modify both
      addresses in the IP header.  Since the NAT modifies address(es) in
      the IP header, the NAT also has to modify the transport (e.g.,
      TCP, UDP) pseudo-header checksum.  Upon some introspection one
      could observe  that  when interconnecting routing realms with
      overlapping addresses, the set of operations on the network and
      transport header performed by a NAT forms a (proper) subset of the
      set of operations on the network and transport layer performed by
      a transparent ALG.

      By definition a NAT does not understand syntax and semantics of an
      application data stream. Therefore, a NAT cannot support
      applications that carry IP addresses at the application layer
      (e.g., FTP with PORT or PASV command [RFC 959]). On the other
      hand, a NAT can support any application, as long as such an
      application does not carry IP addresses at the application layer.
      This is in contrast with an ALG that can support only the
      applications coded into the ALG.

      One can conclude that both NATs and ALGs have their own
      limitations, which could constrain their usefulness. Combining NAT
      and ALG functionality in a single device could be used to overcome
      some, but not all, of these limitations.  Such a device would use
      the NAT functionality for the applications that do not carry IP
      addresses, and would resort to the ALG functionality when dealing
      with the applications that carry IP addresses. For example, such a
      device would use the NAT functionality to deal with the FTP data
      connection, but would use the ALG functionality to deal with the
      FTP control connection.  However, such a device will fail
      completely handling an application that carries IP addresses, when
      the device does not support the application via the ALG
      functionality, but rather handles it via the NAT functionality.

Carpenter, et. al.           Informational                      [Page 5]
RFC 2101              IPv4 Address Behavior Today          February 1997

      Communicating through either ALGs or NATs involves changes to the
      network header (and specifically source and destination
      addresses), and to the transport header. Since IP Security
      authentication headers assume that the addresses in the network
      header are preserved end-to-end, it is not clear how one could
      support IP Security-based authentication between a pair of hosts
      communicating through either an ALG or a NAT. Since IP Security,
      when used for confidentiality, encrypts the entire transport layer
      end-to-end, it is not clear how an ALG or NAT could modify
      encrypted packets as they require to.  In other words, both ALGs
      and NATs are likely to force a boundary between two distinct IP
      Security domains, both for authentication and for confidentiality,
      unless specific enhancements to IP Security are designed for this
      purpose.

      Interconnecting routing realms via either ALGs or NATs relies on
      the DNS [RFC 1035].  Specifically, for a given set of
      (interconnected) routing realms, even if network layer addresses
      are no longer unique across the set, fully qualified domain names
      would need to be unique across the set. However, a site that is
      running a NAT or ALG probably needs to run two DNS servers, one
      inside and one outside the NAT or ALG, giving different answers to
      identical queries. This is discussed further in [kre].  DNS
      security [RFC 2065] and some dynamic DNS updates [dns2] will
      presumably not be valid across a NAT/ALG boundary, so we must
      assume that the external DNS server acquires at least part of its
      tables by some other mechanism.

      To summarize, since RFC 1918, we have not really changed the
      spatial uniqueness of an address, so much as recognized that there
      are multiple spaces. i.e.  each space is still a routing realm
      such as an intranet, possibly connected to other intranets, or the
      Internet, by NATs or ALGs (see above discussion). The temporal
      uniqueness of an address is unchanged by RFC 1918.

   4.2. Addresses are no longer all temporally unique

      Note that as soon as address significance changes anywhere in the
      address space, it has in some sense changed everywhere. This has
      in fact already happened.

      IPv4 address blocks were for many years assigned chronologically,
      i.e.  effectively at random with respect to network topology.
      This led to constantly growing routing tables; this does not
      scale. Today, hierarchical routing (CIDR [RFC 1518], [RFC 1519])
      is used as a mechanism to improve scaling of routing within a
      routing realm, and especially within the Internet (The Annex goes
      into more details on CIDR).

Carpenter, et. al.           Informational                      [Page 6]
RFC 2101              IPv4 Address Behavior Today          February 1997

      Scaling capabilities of CIDR are based on the assumption that
      address allocation reflects network topology as much as possible,
      and boundaries for aggregation of addressing information are not
      required to be fully contained within a single organization - they
      may span multiple organizations (e.g., provider with its
      subscribers).  Thus if a subscriber changes its provider, then to
      avoid injecting additional overhead in the Internet routing
      system, the subscriber may need to renumber.

      Changing providers is just one possible reason for renumbering.
      The informational document [RFC 1900] shows why renumbering is an
      increasingly frequent event.  Both DHCP [RFC 1541] and PPP [RFC
      1661] promote the use of dynamic address allocation.

      To summarize, since the development and deployment of DHCP and
      PPP, and since it is expected that renumbering is likely to become
      a common event, IP address significance has indeed been changed.
      Spatial uniqueness should be the same, so addresses are still
      effective locators. Temporal uniqueness is no longer assured. It
      may be quite short, possibly shorter than a TCP connection time.
      In such cases an IP address is no longer a good identifier. This
      has some impact on end-to-end security, and breaks TCP in its
      current form.

   4.3. Multicast and Anycast

      Since we deployed multicast [RFC 1112], we must separate the
      debate over meaning of IP addresses into meaning of source and
      destination addresses.  A destination multicast address (i.e. a
      locator for a topologically spread group of hosts) can traverse a
      NAT, and is not necessarily restricted to an intranet (or to the
      public Internet).  Its lifetime can be short too.

      The concept of an anycast address is of an address that
      semantically locates any of a group of systems performing
      equivalent functions. There is no way such an address can be
      anything but a locator; it can never serve as an identifier as
      defined in this document, since it does not uniquely identify
      host.  In this case, the effective temporal uniqueness, or useful
      lifetime, of an IP address can be less than the time taken to
      establish a TCP connection.

      Here we have used TCP simply to illustrate the idea of an
      association - many UDP based applications (or other systems
      layered on IP) allocate state after receiving or sending a first
      packet, based on the source and/or destination. All are affected
      by absence of temporal uniqueness whereas only the routing
      infrastructure is affected by spatial uniqueness changes.

Carpenter, et. al.           Informational                      [Page 7]
RFC 2101              IPv4 Address Behavior Today          February 1997

   4.4. Summary

      Due to dynamic address allocation and increasingly frequent
      network renumbering, temporal uniqueness of IPv4 addresses is no
      longer globally guaranteed, which puts their use as identifiers
      into severe question.  Due to the proliferation of Intranets,
      spatial uniqueness is also no longer guaranteed across routing
      realms; interconnecting routing realms could be accomplished via
      either ALGs or NATs. In principle such interconnection will have
      less functionality than if those Intranets were directly
      connected. In practice the difference in functionality may or may
      not matter, depending on individual circumstances.

5. IPv6 Considerations

   As far as temporal uniqueness (identifier-like behaviour) is
   concerned, the IPv6 model [RFC 1884] is very similar to the current
   state of the IPv4 model, only more so.  IPv6 will provide mechanisms
   to autoconfigure IPv6 addresses on IPv6 hosts. Prefix changes,
   requiring the global IPv6 addresses of all hosts under a given prefix
   to change, are to be expected. Thus, IPv6 will amplify the existing
   problem of finding stable identifiers to be used for end-to-end
   security and for session bindings such as TCP state.

   The IAB feels that this is unfortunate, and that the transition to
   IPv6 would be an ideal occasion to provide upper layer end-to-end
   protocols with temporally unique identifiers. The exact nature of
   these identifiers requires further study.

   As far as spatial uniqueness (locator-like behaviour) is concerned,
   the IPv6 address space is so big that a shortage of addresses,
   requiring an RFC 1918-like approach and address translation, is
   hardly conceivable.  Although there is no shortage of IPv6 addresses,
   there is also a well-defined mechanism for obtaining link-local and
   site-local addresses in IPv6 [RFC 1884, section 2.4.8].  These
   properties of IPv6 do not prevent separate routing realms for IPv6,
   if so desired (resulting in multiple security domains as well).
   While at the present moment we cannot identify a case in which
   multiple IPv6 routing realms would be required, it is also hard to
   give a definitive answer to whether there will be only one, or more
   than one IPv6 routing realms.  If one hypothesises that there will be
   more than one IPv6 routing realm, then such realms could be
   interconnected together via ALGs and NATs. Considerations for such
   ALGs and NATs appear to be identical to those for IPv4.

Carpenter, et. al.           Informational                      [Page 8]
RFC 2101              IPv4 Address Behavior Today          February 1997

ANNEX: Current Practices for IPv4 Address Allocation & Routing

   Initially IP address structure and IP routing were designed around
   the notion of network number classes (Class A/B/C networks) [RFC
   790].  In the earlier 90s growth of the Internet demanded significant
   improvements in both the scalability of the Internet routing system,
   as well as in the IP address space utilization.  Classful structure
   of IP address space and associated with it classful routing turned
   out to be inadequate to meet the demands, so during 1992 - 1993
   period the Internet adopted Classless Inter-Domain Routing (CIDR)
   [RFC 1380], [RFC 1518], [RFC 1519].  CIDR  encompasses a new address
   allocation architecture, new routing protocols,  and a new structure
   of IP addresses.

   CIDR improves scalability of the Internet routing system by extending
   the notion of hierarchical routing beyond the level of individual
   subnets and networks, to allow routing information aggregation not
   only at the level of individual subnets and networks, but at the
   level of individual sites, as well as at the level of Internet
   Service Providers.  Thus an organization (site) could act as an
   aggregator for all the destinations within the organization.
   Likewise, a provider could act as an aggregator for all the
   destinations within its subscribers (organizations directly connected
   to the provider).

   Extending the notion of hierarchical routing to the level of
   individual sites and providers, and allowing sites and providers to
   act as aggregators of routing information, required changes both to
   the address allocation procedures, and to the routing protocols.
   While in pre-CIDR days address allocation to sites was done without
   taking into consideration the need to aggregate the addressing
   information above the level of an individual network numbers, CIDR-
   based  allocation recommends that address allocation be done in such
   a way as to enable sites and providers to act as aggregators of
   addressing information - such allocation is called "aggregator
   based". To benefit from the "aggregator based" address allocation,
   CIDR introduces an inter-domain routing protocol (BGP-4) [RFC 1771,
   RFC 1772] that provides capabilities for routing information
   aggregation at the level of individual sites and providers.

   CIDR improves address space utilization by eliminating the notion of
   network classes,  and replacing it with the notion of contiguous
   variable size (power of 2) address blocks. This allows a better match
   between the amount of address space requested and the amount of
   address space allocated [RFC 1466]. It also facilitates "aggregator
   based" address allocation. Eliminating the notion of network classes
   requires new capabilities in the routing protocols (both intra and
   inter-domain), and IP forwarding. Specifically, the CIDR-capable

Carpenter, et. al.           Informational                      [Page 9]
RFC 2101              IPv4 Address Behavior Today          February 1997

   protocols are required to handle reachability (addressing)
   information expressed in terms of variable length address prefixes,
   and forwarding  is required to implement the "longest match"
   algorithm.  CIDR implications on routing protocols are described in
   [RFC 1817].

   The scaling capabilities of CIDR are based on the assumption that
   address allocation reflects network topology as much as possible,
   especially at the level of sites, and their interconnection with
   providers, to enable sites and providers to act as aggregators. If a
   site changes its provider, then to avoid injecting additional
   overhead in the Internet routing system, the site may need to
   renumber. While CIDR does not require every site that changes its
   providers to renumber, it is important to stress that if none of the
   sites that change their providers will renumber, the Internet routing
   system might collapse due to the excessive amount of routing
   information it would need to handle.

   Maintaining "aggregator based" address allocation (to promote
   scalable routing), and the need to support the ability of sites to
   change their providers (to promote competition) demands practical
   solutions for renumbering sites.  The need to contain the  overhead
   in a rapidly growing Internet routing system is likely to make
   renumbering  more and more common [RFC 1900].

   The need to scale the Internet routing system, and the use of CIDR as
   the primary mechanism for scaling, results in the evolution of
   address allocation and management policies for the Internet. This
   evolution results in adding the "address lending" policy as an
   alternative to the "address ownership" policy [RFC 2008].

   IP addressing and routing have been in constant evolution since IP
   was first specified [RFC 791]. Some of the addressing and routing
   principles have been deprecated, some of the principles have been
   preserved, while new principles have been introduced. Current
   Internet routing and addresses (based on CIDR) is an evolutionary
   step that extends the use of hierarchy to maintain a routable global
   Internet.

Security Considerations

   The impact of the IP addressing model on security is discussed in
   sections 4.1 and 5 of this document.

Carpenter, et. al.           Informational                     [Page 10]
RFC 2101              IPv4 Address Behavior Today          February 1997

Acknowledgements

   This document was developed in the IAB. Constructive comments were
   received from Ran Atkinson, Jim Bound, Matt Crawford, Tony Li,
   Michael A. Patton, Jeff Schiller. Earlier private communications from
   Noel Chiappa helped to clarify the concepts of locators and
   identifiers.

References

   [RFC 791] Postel, J., "Internet Protocol", STD 5, RFC 791, September
   1981.

   [RFC 790] Postel, J., "Assigned Numbers", September 1981.

   [RFC 959] Postel, J., and J. Reynolds, "File Transfer Protocol", STD
   9, RFC 959, October 1985.

   [RFC 1035] Mockapetris, P., "Domain Names - Implementation and
   Specification", STD 13, RFC 1035, November 1987.

   [RFC 1112] Deering, S., "Host Extensions for IP Multicasting", STD 5,
   RFC 1112, September 1989.

   [RFC 1380] Gross, P., and P. Almquist, "IESG Deliberations on Routing
   and Addressing", RFC 1380, November 1992.

   [RFC 1466] Gerich, E., "Guidelines for Management of IP Address
   Space", RFC 1466, May 1993.

   [RFC 1498] Saltzer, J., "On the Naming and Binding of Network
   Destinations", RFC 1498, August 1993 (originally published 1982).

   [RFC 1518] Rekhter, Y., and T. Li, "An Architecture for IP Address
   Allocation with CIDR", RFC 1518, September 1993.

   [RFC 1519] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless
   Inter-Domain Routing (CIDR): an Address Assignment and Aggregation
   Strategy", RFC 1519, September 1993.

   [RFC 1541] Droms, R., "Dynamic Host Configuration Protocol", RFC
   1541, October 1993.

   [RFC 1661] Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51,
   RFC 1661, July 1994.

   [RFC 1771] Rekhter, Y., and T. Li, "A Border Gateway Protocol 4
   (BGP-4)", RFC 1771, March 1995.

Carpenter, et. al.           Informational                     [Page 11]
RFC 2101              IPv4 Address Behavior Today          February 1997

   [RFC 1772] Rekhter, Y., and P. Gross, "Application of the Border
   Gateway Protocol in the Internet", RFC 1772, March 1995.

   [RFC 1817] Rekhter, Y., "CIDR and Classful Routing", RFC 1817,
   September 1995.

   [RFC 1825] Atkinson, R., "Security Architecture for the Internet
   Protocol", RFC 1825, September 1995.

   [RFC 1900] Carpenter, B., and Y. Rekhter, "Renumbering Needs Work",
   RFC 1900, February 1996.

   [RFC 1918] Rekhter, Y.,  Moskowitz, B., Karrenberg, D., de Groot, G.
   J., and E. Lear, "Address Allocation for Private Internets", RFC
   1918, February 1996.

   [RFC 1933] Gilligan, R., and E. Nordmark, "Transition Mechanisms for
   IPv6 Hosts and Routers", RFC 1933, April 1996.

   [RFC 2008] Rekhter, Y., and T. Li, "Implications of  Various Address
   Allocation Policies for Internet Routing", RFC 2008, October 1996.

   [kre] Elz, R., et. al., "Selection and Operation of Secondary DNS
   Servers", Work in Progress.

   [RFC 2065] Eastlake, E., and C. Kaufman, "Domain Name System Security
   Extensions", RFC 2065, January 1997.

   [dns2] Vixie, P., et. al., "Dynamic Updates in the Domain Name System
   (DNS UPDATE)", Work in Progress.

Carpenter, et. al.           Informational                     [Page 12]
RFC 2101              IPv4 Address Behavior Today          February 1997

Authors' Addresses

   Brian E. Carpenter
   Computing and Networks Division
   CERN
   European Laboratory for Particle Physics
   1211 Geneva 23, Switzerland

   EMail: brian@dxcoms.cern.ch

   Jon Crowcroft
   Dept. of Computer Science
   University College London
   London WC1E 6BT, UK

   EMail: j.crowcroft@cs.ucl.ac.uk

   Yakov Rekhter
   Cisco systems
   170 West Tasman Drive
   San Jose, CA, USA

   Phone: +1 914 528 0090
   Fax: +1 408 526-4952
   EMail: yakov@cisco.com

Carpenter, et. al.           Informational                     [Page 13]
庚寅五行属什么 孕妇梦见老公出轨是什么意思 花木兰是什么剧种 世界上最长的河流是什么 秘诀是什么意思
奠基什么意思 轻断食什么意思 灰指甲挂什么科 免冠是什么意思 68年猴五行属什么
水痘疫苗什么时候接种 大量出汗是什么原因 猫为什么不怕蛇 prc是什么 1970年属狗的是什么命
古人的婚礼在什么时候举行 女性分泌物增多发黄是什么原因 基础医学是什么 胆固醇高吃什么可以降下来 毛主席什么时候去世
农历六月初十是什么日子hcv8jop7ns5r.cn 孕妇吃红薯对胎儿有什么好处hcv7jop6ns1r.cn gopro是什么hcv9jop6ns1r.cn 10月9号是什么星座hcv8jop1ns7r.cn 子宫内膜回声欠均匀什么意思hcv9jop0ns9r.cn
高血糖喝什么茶好hcv8jop3ns1r.cn 尿微量白蛋白高是什么意思hcv7jop9ns8r.cn mo是什么意思hcv8jop1ns1r.cn 00属什么hcv9jop2ns1r.cn 手链突然断了预示什么hcv8jop2ns1r.cn
狗狗有什么品种hcv9jop4ns8r.cn 吃什么能补蛋白hcv8jop8ns5r.cn 等闲识得东风面什么意思hcv8jop2ns8r.cn 吃什么能治疗早射hcv7jop5ns3r.cn 肝硬化什么症状hcv9jop7ns4r.cn
七月有什么花hcv8jop5ns9r.cn 孩子口臭是什么原因zhongyiyatai.com 军犬一般是什么品种hcv8jop9ns1r.cn 检查是否怀孕要挂什么科hcv9jop1ns7r.cn 海扶治疗是什么bfb118.com
百度