summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1707.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1707.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1707.txt')
-rw-r--r--doc/rfc/rfc1707.txt899
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc1707.txt b/doc/rfc/rfc1707.txt
new file mode 100644
index 0000000..806bea2
--- /dev/null
+++ b/doc/rfc/rfc1707.txt
@@ -0,0 +1,899 @@
+
+
+
+
+
+
+Network Working Group: M. McGovern
+Request for Comments: 1707 Sunspot Graphics
+Category: Informational R. Ullmann
+ Lotus Development Corporation
+ October 1994
+
+
+ CATNIP: Common Architecture for the Internet
+
+Status of this Memo
+
+ This memo provides information for the Internet community. This memo
+ does not specify an Internet standard of any kind. Distribution of
+ this memo is unlimited.
+
+Abstract
+
+ This document was submitted to the IETF IPng area in response to RFC
+ 1550 Publication of this document does not imply acceptance by the
+ IPng area of any ideas expressed within. Comments should be
+ submitted to the big-internet@munnari.oz.au mailing list.
+
+Executive Summary
+
+ This paper describes a common architecture for the network layer
+ protocol. The Common Architecture for Next Generation Internet
+ Protocol (CATNIP) provides a compressed form of the existing network
+ layer protocols. Each compression is defined so that the resulting
+ network protocol data units are identical in format. The fixed part
+ of the compressed format is 16 bytes in length, and may often be the
+ only part transmitted on the subnetwork.
+
+ With some attention paid to details, it is possible for a transport
+ layer protocol (such as TCP) to operate properly with one end system
+ using one network layer (e.g. IP version 4) and the other using some
+ other network protocol, such as CLNP. Using the CATNIP definitions,
+ all the existing transport layer protocols used on connectionless
+ network services will operate over any existing network layer
+ protocol.
+
+ The CATNIP uses cache handles to provide both rapid identification of
+ the next hop in high performance routing as well as abbreviation of
+ the network header by permitting the addresses to be omitted when a
+ valid cache handle is available. The fixed part of the network layer
+ header carries the cache handles.
+
+
+
+
+
+
+McGovern & Ullmann [Page 1]
+
+RFC 1707 CATNIP October 1994
+
+
+ The cache handles are either provided by feedback from the downstream
+ router in response to offered traffic, or explicitly provided as part
+ of the establishment of a circuit or flow through the network. When
+ used for flows, the handle is the locally significant flow
+ identifier.
+
+ When used for circuits, the handle is the layer 3 peer-to-peer
+ logical channel identifier, and permits a full implementation of
+ network-layer connection-oriented service if the routers along the
+ path provide sufficient features. At the same time, the packet format
+ of the connectionless service is retained, and hop by hop fully
+ addressed datagrams can be used at the same time. Any intermediate
+ model between the connection oriented and the connectionless service
+ can thus be provided over cooperating routers.
+
+CATNIP Objectives
+
+ The first objective of the CATNIP is a practical recognition of the
+ existing state of internetworking, and an understanding that any
+ approach must encompass the entire problem. While it is common in the
+ IP Internet to dismiss the ISO with various amusing phrases, it is
+ hardly realistic. As the Internet moves into the realm of providing
+ real commercial infrastructure, for telephone, cable television, and
+ the myriad other mundane uses, compliance with international
+ standards is an imperative.
+
+ The argument that the IETF need not (or should not) follow existing
+ ISO standards will not hold. The ISO is the legal standards
+ organization for the planet. Every other industry develops and
+ follows ISO standards. There is (no longer) anything special about
+ computer software or data networking.
+
+ ISO convergence is both necessary and sufficient to gain
+ international acceptance and deployment of IPng. Non-convergence will
+ effectively preclude deployment.
+
+ The CATNIP integrates CLNP, IP, and IPX. The CATNIP design provides
+ for any of the transport layer protocols in use, for example TP4,
+ CLTP, TCP, UDP, IPX and SPX to run over any of the network layer
+ protocol formats: CLNP, IP (version 4), IPX, and the CATNIP.
+
+Incremental Infrastructure Deployment
+
+ The best use of the CATNIP is to begin to build a common Internet
+ infrastructure. The routers and other components of the common system
+ are able to use a single consistent addressing method, and common
+ terms of reference for other aspects of the system.
+
+
+
+
+McGovern & Ullmann [Page 2]
+
+RFC 1707 CATNIP October 1994
+
+
+ The CATNIP is designed to be incrementally deployable in the strong
+ sense: you can plop a CATNIP system down in place of any existing
+ network component and continue to operate normally with no
+ reconfiguration. (Note: not "just a little". None at all. The number
+ of "little changes" suggested by some proposals, and the utterly
+ enormous amount of documentation, training, and administrative effort
+ then required, astounds the present authors.) The vendors do all of
+ the work.
+
+ There are also no external requirements; no "border routers", no
+ requirement that administrators apply specific restrictions to their
+ network designs, define special tables, or add things to the DNS.
+ When the end users and administrators fully understand the combined
+ system, they will want to operate differently, but in no case will
+ they be forced. Not even in small ways. Networks and end user
+ organizations operate under sufficient constraints on deployment of
+ systems anyway; they do not need a new network architecture adding to
+ the difficulty.
+
+ Typically deployment will occur as part of normal upgrade revisions
+ of software, and due to the "swamping" of the existing base as the
+ network grows. (When the Internet grows by a factor of 5, at least
+ 80% will then be "new" systems.) The users of the network may then
+ take advantage of the new capabilities. Some of the performance
+ improvements will be automatic, others may require some
+ administrative understanding to get to the best performance level.
+
+ The CATNIP definitions provide stateless translation of network
+ datagrams to and from CATNIP and, by implication, directly between
+ the other network layer protocols. A CATNIP-capable system
+ implementing the full set of definitions can interoperate with any
+ existing protocol. Various subsets of the full capability may be
+ provided by some vendors.
+
+No Address Translation
+
+ Note that there is no "address translation" in the CATNIP
+ specification. (While it may seem odd to state a negative objective,
+ this is worth saying as people seem to assume the opposite.) There
+ are no "mapping tables", no magic ways of digging translations out of
+ the DNS or X.500, no routers looking up translations or asking other
+ systems for them.
+
+ Addresses are modified with a simple algorithmic mapping, a mapping
+ that is no more than using specific prefixes for IP and IPX
+ addresses. Not a large set of prefixes; one prefix. The entire
+ existing IP version 4 network is mapped with one prefix and the IPX
+ global network with one other prefix. (The IP mapping does provide
+
+
+
+McGovern & Ullmann [Page 3]
+
+RFC 1707 CATNIP October 1994
+
+
+ for future assignment of other IANA/IPv4 domains that are disjoint
+ from the existing one.)
+
+ This means that there is no immediate effect on addresses embedded in
+ higher level protocols.
+
+ Higher level protocols not using the full form (those native to IP
+ and IPX) will eventually be extended to use the full addressing to
+ extend their usability over all of the network layers.
+
+No Legacy Systems
+
+ The CATNIP leaves no systems behind: with no reconfiguration, any
+ system presently capable of IP, CLNP, or IPX retains at least the
+ connectivity it has now. With some administrative changes (such as
+ assigning IPX domain addresses to some CLNP hosts for example) on
+ other systems, unmodified systems may gain significant connectivity.
+ IPX systems with registered network numbers may gain the most.
+
+Limited Scope
+
+ The CATNIP defines a common network layer packet format and basic
+ architecture. It intentionally does not specify ES-IS methods,
+ routing, naming systems, autoconfiguration and other subjects not
+ part of the core Internet wide architecture. The related problems and
+ their (many) solutions are not within the scope of the specification
+ of the basic common network layer.
+
+Existing Addresses and Network Numbers
+
+ The Internet's version 4 numbering system has proven to be very
+ flexible, (mostly) expandable, and simple. In short: it works.
+ However, there are two problems. Neither was considered serious when
+ the CATNIP was first developed in 1988 and 1989, but both are now of
+ major concern:
+
+
+ o The division into network, and then subnet, is insufficient.
+ Almost all sites need a network assignment large enough to
+ subnet. At the top of the hierarchy, there is a need to assign
+ administrative domains.
+
+ o As bit-packing is done to accomplish the desired network
+ structure, the 32-bit limit causes more and more aggravation.
+
+ Another major addressing system used in open internetworking is the
+ OSI method of specifying Network Service Access Points (NSAPs). The
+ NSAP consists of an authority and format identifier, a number
+
+
+
+McGovern & Ullmann [Page 4]
+
+RFC 1707 CATNIP October 1994
+
+
+ assigned to that authority, an address assigned by that authority,
+ and a selector identifying the next layer (transport layer) protocol.
+ This is actually a general multi-level hierarchy, often obscured by
+ the details of specific profiles. (For example, CLNP doesn't specify
+ 20 octet NSAPs, it allows any length. But various GOSIPs profile the
+ NSAP as 20 octets, and IS-IS makes specific assumptions about the
+ last 1-8 octets. And so on.)
+
+ The NSAP does not directly correspond to an IP address, as the
+ selector in IP is separate from the address. The concept that does
+ correspond is the NSAP less the selector, called the Network Entity
+ Title or NET. (An unfortunate acronym, but one we will use to avoid
+ repeating the full term.) The usual definition of NET is an NSAP with
+ the selector set to 0; the NET used here omits the 0 selector.
+
+ There is also a network numbering system used by IPX, a product of
+ Novell, Inc. (referred to from here on as Novell) and other vendors
+ making compatible software. While IPX is not yet well connected into
+ a global network, it has a larger installed base than either of the
+ other network layers.
+
+Network Layer Address
+
+ The network layer address looks like:
+
+ +----------+----------+---------------+---------------+
+ | length | AFI | IDI ... | DSP ... |
+ +----------+----------+---------------+---------------+
+
+ The fields are named in the usual OSI terminology although that leads
+ to an oversupply of acronyms. Here are more detailed descriptions of
+ each field:
+
+ length: the number of bytes (octets) in the remainder of the
+ address.
+
+ AFI: the Authority and Format Identifier. A single byte
+ value, from a set of well-known values registered by
+ ISO, that determines the semantics of the IDI field
+
+ IDI: the Initial Domain Identifier, a number assigned by the
+ authority named by the AFI, formatted according to the
+ semantics implied by the AFI, that determines the
+ authority for the remainder of the address.
+
+ DSP: Domain Specific Part, an address assigned by the
+ authority identified by the value of the IDI.
+
+
+
+
+McGovern & Ullmann [Page 5]
+
+RFC 1707 CATNIP October 1994
+
+
+ Note that there are several levels of authority. ISO, for example,
+ identifies (with the AFI) a set of numbering authorities (like X.121,
+ the numbering plan for the PSPDN, or E.164, the numbering plan for
+ the telephone system). Each authority numbers a set of organizations
+ or individuals or other entities. (For example, E.164 assigns
+ 16172477959 to me as a telephone subscriber.)
+
+ The entity then is the authority for the remainder of the address. I
+ can do what I please with the addresses starting with (AFI=E.164)
+ (IDI=16172477959). Note that this is a delegation of authority, and
+ not an embedding of a data-link address (the telephone number) in a
+ network layer address. The actual routing of the network layer
+ address has nothing to do with the authority numbering.
+
+ The domain-specific part is variable length, and can be allocated in
+ whatever way the authority identified by the AFI+IDI desires.
+
+Network Layer Datagram
+
+ The common architecture format for network layer datagrams is
+ described below. The design is a balance between use on high
+ performance networks and routers, and a desire to minimize the number
+ of bits in the fixed header. Using the current state of processor
+ technology as a reference, the fixed header is all loaded into CPU
+ registers on the first memory cycle, and it all fits within the
+ operation bandwidth. The header leaves the remaining data aligned on
+ the header size (128 bits); with 64 bit addresses present and no
+ options it leaves the transport header 256 bit aligned.
+
+ On very slow and low performance networks, the fixed header is still
+ fairly small, and could be further compressed by methods similar to
+ those used with IP version 4 on links that consider every bit
+ precious. In between, it fits nicely into ATM cells and radio
+ packets, leaving sufficient space for the transport header and
+ application data.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+McGovern & Ullmann [Page 6]
+
+RFC 1707 CATNIP October 1994
+
+
+ +---------------+---------------+-+-+-+-+-+-+-+-+---------------+
+ | NLPID (70) | Header Size |D|S|R|M|E| MBZ | Time to Live |
+ +---------------+---------------+-+-+-+-+-+-+-+-+---------------+
+ | Forward Cache Identifier |
+ +---------------------------------------------------------------+
+ | Datagram Length |
+ +---------------------------------------------------------------+
+ | Transport Protocol | Checksum |
+ +---------------------------------------------------------------+
+ | Destination Address ... |
+ +---------------------------------------------------------------+
+ | Source Address ... |
+ +---------------------------------------------------------------+
+ | Options ... |
+ +---------------------------------------------------------------+
+
+
+ NLPID: The first byte (the network layer protocol identifier in OSI)
+ is an 8 bit constant 70 (hex). This corresponds to Internet
+ Version 7.
+
+ Header Length: The header length is a 8-bit count of the number of
+ 32-bit words in the header. This allows the header to
+ be up to 1020 bytes in length.
+
+ Flags: This byte is a small set of flags determining the datagram
+ header format and the processing semantics. The last three bits
+ are reserved, and must be set to zero. (Note that the
+ corresponding bits in CLNP version 1 are 001, since this byte
+ is the version field. This may be useful.)
+
+ Destination Address Omitted: When the destination address omitted
+ (DAO) flag is zero, the destination address is present as shown
+ in the datagram format diagram. When a datagram is sent with
+ an FCI that identifies the destination and the DAO flag is
+ set, the address does not appear in the datagram.
+
+ Source Address Omitted: The source address omitted (SAO) flag is zero
+ when the source address is present in the datagram. When
+ datagram is sent with an FCI that identifies the source and the
+ SAO flag is set, the source address is omitted from the
+ datagram.
+
+ Report Fragmentation Done: When this bit (RFD) is set, an intermediate
+ router that fragments the datagram (because it is larger than
+ the next subnetwork MTU) should report the event with an ICMP
+ Datagram Too Big message. (Unlike IP version 4, which uses DF
+ for MTU discovery, the RFD flag allows the fragmented datagram
+
+
+
+McGovern & Ullmann [Page 7]
+
+RFC 1707 CATNIP October 1994
+
+
+ to be delivered.)
+
+ Mandatory Router Option: The mandatory router option (MRO) flag
+ indicates that routers forwarding the datagram must look at the
+ network header options. If not set, an intermediate router
+ should not look at the header options. (But it may anyway;
+ this is a necessary consequence of transparent network layer
+ translation, which may occur anywhere.)
+
+ The destination host, or an intermediate router doing
+ translation, must look at the header options regardless of
+ the setting of the MRO flag.
+
+ A router doing fragmentation will normally only use the F
+ flag in options to determine whether options should be copied
+ within the fragmentation code path. (It might also recognize
+ and elide null options.) If the MRO flag is not set, the router
+ may not act on an option even though it copies it properly
+ during fragmentation.
+
+ If there are no options present, MRO should always be zero, so
+ that routers can follow the no-option profile path in their
+ implementation. (Remember that the presence of options cannot
+ be divided from the header length, since the addresses are
+ variable length.)
+
+ Error Report Suppression: The ERS flag is set to suppress the sending
+ of error reports by any system (whether host or router)
+ receiving or forwarding the datagram. The system may log the
+ error, increment network management counters, and take any
+ similar action, but ICMP error messages or CNLP error reports
+ must not be sent.
+
+ The ERS flag is normally set on ICMP messages and other network
+ layer error reports. It does not suppress the normal response
+ to ICMP queries or similar network layer queries (CNLP echo
+ request).
+
+ If both the RFD and ERS flags are set, the fragmentation report
+ is sent. (This definition allows a larger range of
+ possibilities than simply over-riding the RFD flag would; a
+ sender not desiring this behavior can see to it that RFD is
+ clear.)
+
+ Time To Live: The time to live is a 8-bit count, nominally in seconds.
+ Each hop is required to decrement TTL by at least one. A hop
+ that holds a datagram for an unusual amount of time (more than
+ 2 seconds, a typical example being a wait for a subnetwork
+
+
+
+McGovern & Ullmann [Page 8]
+
+RFC 1707 CATNIP October 1994
+
+
+ connection establishment) should subtract the entire waiting
+ time in seconds (rounded upward) from the TTL.
+
+ Forward Cache Identifier: Each datagram carries a 32 bit field, called
+ "forward cache identifier", that is updated (if the information
+ is available) at each hop. This field's value is derived from
+ ICMP messages sent back by the next hop router, a routing
+ protocol (e.g., RAP), or some other method. The FCI is used to
+ expedite routing decisions by preserving knowledge where
+ possible between consecutive routers. It can also be used to
+ make datagrams stay within reserved flows, circuits, and mobile
+ host tunnels. If an FCI is not available, this field must be
+ zero, the SAO and DAO flags must be clear, and both destination
+ and source addresses must appear in the datagram.
+
+ Datagram Length: The 32-bit length of the entire datagram in octets.
+ A datagram can therefore be up to 4294967295 bytes in overall
+ length. Particular networks normally impose lower limits.
+
+ Transport Protocol: The transport layer protocol. For example, TCP is
+ 6.
+
+ Checksum: The checksum is a 16-bit checksum of the entire header,
+ using the familiar algorithm used in IP version 4.
+
+ Destination: The destination address, a count byte followed by the
+ destination NSAP with the zero selector omitted. This field is
+ present only if the DAO flag is zero. If the count field is not
+ 3 modulo 4 (the destination is not an integral multiple of
+ 32-bit words) zero bytes are added to pad to the next multiple
+ of 32 bits. These pad bytes are not required to be ignored:
+ routers may rely on them being zero.
+
+ Source: The source address, in the same format as the destination.
+ Present only if the SAO flag is zero. The source is padded in
+ the same way as destination to arrive at a 32-bit boundary.
+
+ Options: Options may follow. They are variable length, and always
+ 32-bit aligned. If the MRO flag in the header is not set,
+ routers will usually not look at or take action on any option,
+ regardless of the setting of the class field.
+
+Multicasting
+
+ The multicast-enable option permits multicast forwarding of the
+ CATNIP datagram on subnetworks that directly support media layer
+ multicasting. This is a vanishing species, even in 10 Mbps Ethernet,
+ given the increasing prevalence of switching hubs. It also (perhaps
+
+
+
+McGovern & Ullmann [Page 9]
+
+RFC 1707 CATNIP October 1994
+
+
+ more usefully) permits a router to forward the datagram on multiple
+ paths when a multicast routing algorithm has established such paths.
+ There is no option data.
+
+ Note that there is no special address space for multicasting in the
+ CATNIP. Multicast destination addresses can be allocated anywhere by
+ any administration or authority. This supports a number of differing
+ models of addressing. It does require that the transport layer
+ protocol know that the destination is multicast; this is desirable in
+ any case. (For example, the transport will probably want to set the
+ ERS flag.)
+
+ On an IEEE 802.x (ISO 8802.x) type media, the last 23 bits of the
+ address (not including the 0 selector) are used in combination with
+ the multicast group address assigned to the Internet to form the
+ media address when forwarding a datagram with the multicast enable
+ option from a router to an attached network provided that the
+ datagram was not received on that network with either multicast or
+ broadcast media addressing. A host may send a multicast datagram
+ either to the media multicast address (the IP catenet model,) or
+ media unicast to a router which is expected to repeat it to the
+ multicast address within the entire level I area or to repeat copies
+ to the appropriate end systems within the area on non-broadcast media
+ (the more general CLNP model.)
+
+Network Layer Translation
+
+ The objective of translation is to be able to upgrade systems, both
+ hosts and routers, in whatever order desired by their owners.
+ Organizations must be able to upgrade any given system without
+ reconfiguration or modification of any other, and existing hosts must
+ be able to interoperate essentially forever. (Non-CATNIP routers will
+ probably be effectively eliminated at some point, except where they
+ exist in their own remote or isolated corners.)
+
+ Each CATNIP system, whether host or router, must be able to recognize
+ adjacent systems in the topology that are (only) IP version 4, CLNP,
+ or IPX and call the appropriate translation routine just before
+ sending the datagram.
+
+OSI CNLP
+
+ The translation between CLNP and the CATNIP compressed form of the
+ datagrams is the simplest case for CATNIP, since the addresses are
+ the same and need not be extended. The resulting CATNIP datagrams may
+ omit the source and destination addresses as explained previously,
+ and may be mixed with uncompressed datagrams on the same subnetwork
+ link. Alternatively, a subnetwork may operate entirely in the CATNIP,
+
+
+
+McGovern & Ullmann [Page 10]
+
+RFC 1707 CATNIP October 1994
+
+
+ converting all transit traffic to CATNIP datagrams, even if FCIs that
+ would make the compression effective are not available.
+
+ Similarly, all network datagram formats with CATNIP mappings may be
+ compressed into the common form, providing a uniform transit network
+ service, with common routing protocols (such as IS-IS).
+
+Internet Protocol
+
+ All existing version 4 numbers are defined as belonging to the
+ Internet by using a new AFI, to be assigned to IANA by the ISO. This
+ document uses 192 at present for clarity in examples; it is to be
+ replaced with the assigned AFI. The AFI specifies that the IDI is two
+ bytes long, containing an administrative domain number.
+
+ The AD (Administrative Domain), identifies an administration which
+ may be an international authority (such as the existing InterNIC), a
+ national administration, or a large multi-organization (e.g., a
+ government). The idea is that there should not be more than a few
+ hundred of these at first, and eventually thousands or tens of
+ thousands at most.
+
+ AD numbers are assigned by IANA. Initially, the only assignment is
+ the number 0.0, assigned to the InterNIC, encompassing the entire
+ existing version 4 Internet.
+
+ The mapping from/to version 4 IP addresses:
+
+ +----------+----------+---------------+---------------------+
+ | length | AFI | IDI ... | DSP ... |
+ +----------+----------+---------------+---------------------+
+ | 7 | 192 | AD number | version 4 address |
+ +----------+----------+---------------+---------------------+
+
+ While the address (DSP) is initially always the 4 byte, version 4
+ address, it can be extended to arbitrary levels of subnetting within
+ the existing Internet numbering plan. Hosts with DSPs longer than 4
+ bytes will not be able to interoperate with version 4 hosts.
+
+Novell IPX
+
+ The Internetwork Packet Exchange protocol, developed by Novell based
+ on the XNS protocol (Xerox Network System) has many of the same
+ capabilities as the Internet and OSI protocols. At first look, it
+ appears to confuse the network and transport layers, as IPX includes
+ both the network layer service and the user datagram service of the
+ transport layer, while SPX (sequenced packet exchange) includes the
+ IPX network layer and provides service similar to TCP or TP4. This
+
+
+
+McGovern & Ullmann [Page 11]
+
+RFC 1707 CATNIP October 1994
+
+
+ turns out to be mostly a matter of the naming and ordering of fields
+ in the packets, rather than any architectural difference.
+
+ IPX uses a 32-bit LAN network number, implicitly concatenated with
+ the 48-bit MAC layer address to form an Internet address. Initially,
+ the network numbers were not assigned by any central authority, and
+ thus were not useful for inter-organizational traffic without
+ substantial prior arrangement. There is now an authority established
+ by Novell to assign unique 32-bit numbers and blocks of numbers to
+ organizations that desire inter-organization networking with the IPX
+ protocol.
+
+ The Novell/IPX numbering plan uses an ICD, to be assigned, to
+ designate an address as an IPX address. This means Novell uses the
+ authority (AFI=47)(ICD=Novell) and delegates assignments of the
+ following 32 bits.
+
+ An IPX address in the common form looks like:
+
+ +----------+----------+---------------+---------------------+
+ | length | AFI | IDI ... | DSP ... |
+ +----------+----------+---------------+---------------------+
+ | 13 | 47 (hex) | Novell ICD | network+MAC address |
+ +----------+----------+---------------+---------------------+
+
+ This will always be followed by two bytes of zero padding when it
+ appears in a common network layer datagram. Note that the socket
+ numbers included in the native form IPX address are part of the
+ transport layer.
+
+SIPP
+
+ It may seem a little odd to describe the interaction with SIPP-16
+ (version 6 of IP) which is another proposed candidate for the next
+ generation of network layer protocols. However, if SIPP-16 is
+ deployed, whether or not as the protocol of choice for replacement of
+ IP version 4, there will then be four network protocols to
+ accommodate. It is prudent to investigate how SIPP-16 could then be
+ integrated into the common addressing plan and datagram format.
+
+ SIPP-16 defines 128 bit addresses, which are included in the NSAP
+ addressing plan under the Internet AFI as AD number 0.1. It is not
+ clear at this time what administration will hold the authority for
+ the SIPP-16 numbering plan. This produces a 20 byte NSAPA, with the
+ system ID field positioned exactly as expected by (e.g.) IS-IS.
+
+
+
+
+
+
+McGovern & Ullmann [Page 12]
+
+RFC 1707 CATNIP October 1994
+
+
+ +----------+----------+---------------+---------------------+
+ | length | AFI | IDI ... | DSP ... |
+ +----------+----------+---------------+---------------------+
+ | 19 | 192 | AD (0.1) | SIPP-16 address |
+ +----------+----------+---------------+---------------------+
+
+ The SIPP-16 addressing method (the definition of the 128 bits) will
+ not be described here.
+
+ The SIPP proposal also includes an encapsulated-tunnel proposal
+ called IPAE, to address some of the issues that are designed into
+ CATNIP. The CATNIP direct translation does not use the SIPP-IPAE
+ packet formats. IPAE also specifies a "mapping table" for prefixes.
+ This table is kept up-to-date by periodic FTP transfers from a
+ "central site." The CATNIP definitions leave the problem of prefix
+ selection when converting into SIPP firmly within the scope of the
+ SIPP-IPAE proposal, and possible methods are not described here.
+
+ In translating from SIPP (IPv6) to CATNIP (IPv7), the only unusual
+ aspect is that SIPP defines some things that are normally considered
+ options to be "payloads" overloaded onto the transport protocol
+ numbering space. Fortunately, the only one that need be considered
+ is fragmentation; a fragmented SIPP datagram may need to be
+ reassembled prior to conversion. Other "payloads" such as routing
+ are ignored (translated verbatim) and will normally simply fail to
+ achieve the desired effect.
+
+ Translation to SIPP is simple, except for the difficult problem of
+ inventing the "prefix" if an implementation wants to support
+ translating Internet AD 0.0 numbers into the SIPP addressing domain.
+
+Internet DNS
+
+ CATNIP addresses are represented in the DNS with the NSAP RR. The
+ data in the resource record is the NSAP, including the zero selector
+ at the end. The zone file syntax for the data is a string of
+ hexadecimal digits, with a period "." inserted between any two octets
+ where desired for readability. For example:
+
+ The inverse (PTR) zone is .NSAP.INT, with the CATNIP address
+ (reversed). That is, like .IN-ADDR.ARPA, but with .NSAP.INT instead.
+ The nibbles are represented as hexadecimal digits.
+
+ This respects the difference in actual authority: the IANA is the
+ authority for the entire space rooted in .IN-ADDR.ARPA. in the
+ version 4 Internet, while in the new Internet it holds the authority
+ only for 0.C.NSAP.INT. (Following the example of 192 as the AFI
+ value.) The domain 0.0.0.0.0.C.NSAP.INT is to be delegated by IANA to
+
+
+
+McGovern & Ullmann [Page 13]
+
+RFC 1707 CATNIP October 1994
+
+
+ the InterNIC. (Understanding that in present practice the InterNIC is
+ the operator of the authoritative root.)
+
+Security Considerations
+
+ The CATNIP design permits the direct use of the present proposals for
+ network layer security being developed in the IPSEC WG of the IETF.
+ There are a number of detailed requirements; the most relevant being
+ that network layer datagram translation must not affect (cannot
+ affect) the transport layers, since the TPDU is mostly inaccessible
+ to the router. For example, the translation into IPX will only work
+ if the port numbers are shadowed into the plaintext security header.
+
+References
+
+ [Chapin93] Chapin, L., and D. Piscitello, "Open Systems
+ Networking", Addison-Wesley, Reading, Massachusetts,
+ 1993.
+
+ [Perlman92] Perlman, R., "Interconnections: Bridges and Routers"
+ Addison-Wesley, Reading, Massachusetts, 1992.
+
+ [RFC791] Postel, J., Editor, "Internet Protocol - DARPA
+ Internet Program Protocol Specification", STD 5, RFC
+ 791 USC/Information Sciences Institute, September
+ 1981.
+
+ [RFC792] Postel, J., Editor, "Internet Control Message
+ Protocol - DARPA Internet Program Protocol
+ Specification", STD 5, RFC 792, USC/Information
+ Sciences Institute, September 1981.
+
+ [RFC793] Postel, J., Editor, "Transmission Control Protocol -
+ DARPA Internet Program Protocol Specification,
+ STD 7, RFC 793, USC/Information Sciences Institute,
+ September, 1981.
+
+ [RFC801] Postel, J., "NCP/TCP Transition Plan", RFC 801,
+ USC/Information Sciences Institute, November, 1981.
+
+ [RFC1191] Mogul, J., and S. Deering, "Path MTU Discovery",
+ RFC 1191, DECWRL, Stanford University, November,
+ 1990.
+
+ [RFC1234] Provan, D., "Tunneling IPX Traffic Through IP
+ Networks", RFC 1234, Novell, Inc., June 1991.
+
+
+
+
+
+McGovern & Ullmann [Page 14]
+
+RFC 1707 CATNIP October 1994
+
+
+ [RFC1247] Moy, J., "OSPF Version 2", RFC 1247, Proteon, Inc.,
+ July 1991.
+
+ [RFC1287] Clark, D., Chapin, L., Cerf, V., Braden, R., and
+ R. Hobby, "Towards the Future Internet Architecture",
+ RFC 1287, MIT, BBN, CNRI, ISI, UCDavis, December,
+ 1991.
+
+ [RFC1335] Wang, Z., and J. Crowcroft, "A Two-Tier Address
+ Structure for the Internet: A Solution to the
+ Problem of Address Space Exhaustion", RFC 1335,
+ University College London, May 1992.
+
+ [RFC1338] Fuller, V., Li, T., Yu, J., and K. Varadhan,
+ "Supernetting: an Address Assignment and Aggregation
+ Strategy", RFC 1338, BAARNet, cicso, Merit, OARnet,
+ June 1992.
+
+ [RFC1347] Callon, R., "TCP and UDP with Bigger Addresses
+ (TUBA), A Simple Proposal for Internet Addressing
+ and Routing", RFC 1347, DEC, June 1992.
+
+ [RFC1466] Gerich, E., "Guidelines for Management of IP Address
+ Space", RFC 1466, Merit, May 1993.
+
+ [RFC1475] Ullmann, R., "TP/IX: The Next Internet", RFC 1475,
+ Process Software Corporation, June 1993.
+
+ [RFC1476] Ullmann, R., "RAP: Internet Route Access Protocol",
+ RFC 1476, Process Software Corporation, June 1993.
+
+ [RFC1561] Piscitello, D., "Use of ISO CLNP in TUBA
+ Environments", RFC 1561, Core Competence, December
+ 1993.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+McGovern & Ullmann [Page 15]
+
+RFC 1707 CATNIP October 1994
+
+
+Authors' Addresses
+
+ Michael McGovern
+ Sunspot Graphics
+
+ EMail: scrivner@world.std.com
+
+
+ Robert Ullmann
+ Lotus Development Corporation
+ 1 Rogers Street
+ Cambridge, MA 02142
+
+ Phone: +1 617 693 1315
+ EMail: rullmann@crd.lotus.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+McGovern & Ullmann [Page 16]
+