diff options
Diffstat (limited to 'doc/rfc/rfc1335.txt')
-rw-r--r-- | doc/rfc/rfc1335.txt | 395 |
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc1335.txt b/doc/rfc/rfc1335.txt new file mode 100644 index 0000000..96aeef0 --- /dev/null +++ b/doc/rfc/rfc1335.txt @@ -0,0 +1,395 @@ + + + + + + +Network Working Group Z. Wang +Request for Comments: 1335 J. Crowcroft + University College London + May 1992 + + + A Two-Tier Address Structure for the Internet: + A Solution to the Problem of Address Space Exhaustion + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard. Distribution of this memo is + unlimited. + +Abstract + + This RFC presents a solution to problem of address space exhaustion + in the Internet. It proposes a two-tier address structure for the + Internet. This is an "idea" paper and discussion is strongly + encouraged. + +Introduction + + Address space exhaustion is one of the most serious and immediate + problems that the Internet faces today [1,2]. The current Internet + address space is 32-bit. Each Internet address is divided into two + parts: a network portion and a host portion. This division + corresponds the three primary Internet address classes: Class A, + Class B and Class C. Table 1 lists the network number statistics as + of April 1992. + + Total Allocated Allocated (%) + Class A 126 48 54% + Class B 16383 7006 43% + Class C 2097151 40724 2% + + Table 1: Network Number Statistics (April 1992) + + If recent trends of exponential growth continue, the network numbers + in Class B will soon run out [1,2]. There are over 2 million Class C + network numbers and only 2% have been allocated. However, a Class C + network number can only accommodate 254 host numbers which is too + small for most networks. With the rapid expansion of the Internet + and drastic increase in personal computers, the time when the 32-bit + address space is exhausted altogether is also not too distant [1-3]. + + Recently several proposals have been put forward to deal with the + + + +Wang & Crowcroft [Page 1] + +RFC 1335 Two-Tier Address Structure for the Internet May 1992 + + + immediate problem [1-4]. The Supernetting and C-sharp schemes + attempt to make the Class C numbers more usable by re-defining the + way in which Class C network numbers are classified and assigned + [3,4]. Both schemes require modifications to the exterior routing + algorithms and global coordination across the Internet may be + required for the deployment. The two schemes do not expand the total + number of addresses available to the Internet and therefore can only + be used as a short-term fix for next two or three years. Schemes + have also been put forwarded in which the 32-bit address field is + replaced with a field of the same size but with different meaning and + the gateways on the boundary re-write the address when the packet + crossed the boundary [1,2,5]. Such schemes, however, requires + substantial changes to the gateways and the exterior routing + algorithm. + + In this paper, we present an alternative solution to the problem of + address space exhaustion. The "Dual Network Addressing (DNA)" scheme + proposed here is based on a two-tier address structure and sharing of + addresses. It requires no modifications to the exterior routing + algorithms and any networks can adopt the scheme individually at any + time without affecting other networks. + +The Scheme + + The DNA scheme attempts to reduce the waste in using the Internet + addresses. A useful analogy to our scheme is the extension system + used in the telephone system. Many large organizations usually have + extensive private telephone networks for internal use and at the mean + time hire a limited number of external lines for communications with + the outside world. In such a telephone system, important offices may + have direct external lines and telephones in the public areas may be + restricted to internal calls only. The majority of the telephones + can usually make both internal calls and external calls. But they + must share a limited number of external lines. When an external call + is being made, a pre-defined digit has to be pressed so that an + external line can be allocated from the poll of external lines. + + In the DNA scheme, there are two types of Internet addresses: + Internal addresses and External addresses. An internal address is an + Internet address only used within one network and is unique only + within that network. An interface with an internal address can only + communicate with another interface with an internal address in the + same network. An external address is unique in the entire Internet + and an interface with an external address can communicate directly to + another interface with an external address over the Internet. All + current Internet addresses are external addresses. + + In effect, the external addresses form one global Internet and the + + + +Wang & Crowcroft [Page 2] + +RFC 1335 Two-Tier Address Structure for the Internet May 1992 + + + internal addresses form many private Internets. Within one network, + the external addresses are only used for inter-network communications + and internal addresses for intra-network communications. An External + Address Sharing Service (EASS) is needed to manage the sharing of + external addresses. An EASS server reserves a number of external + addresses. When a machine that only has an internal address wants to + communicate a machine with an external address in other networks, it + can send a request to an EASS server to obtain a temporary external + address. After the use, the machine can return the external address + to the EASS server. + + We believe that, with the DNA scheme, a network can operate with a + limited number of external addresses. The reasons are as follows: + + * In most networks, the majority of the traffic is confined to + its local area networks. This is due the nature of + networking applications and the bandwidth constraints on + inter-network links. + + * The number of machines which act as Internet servers, i.e., + running programs waiting to be called by machines in other + networks, is often limited and certainly much smaller than + the total number of machines. These machines include mail + servers, domain name servers, ftp archive servers, directory + servers, etc. + + * There are an increasingly large number of personal machines + entering the Internet. The use of these machines is + primarily limited to their local environment. They may also + be used as "clients" such as ftp and telnet to access other + machines. + + * For security reasons, many large organizations, such as banks, + government departments, military institution and some + companies, may only allow a very limited number of their + machines to have access to the global Internet. The majority + of their machines are purely for internal use. + + In the DNA scheme, all machines in a network are assigned a permanent + internal address and can communicate with any machines within the + same network. The allocation of external addresses depends on the + functions of the machines and as a result it creates three-level + privileges: + + * machines which act as servers or used as central computing + infrastructure are likely to have frequent communications + with other networks therefore they may require external + addresses all the time. These machines are allocated + + + +Wang & Crowcroft [Page 3] + +RFC 1335 Two-Tier Address Structure for the Internet May 1992 + + + permanent external addresses. + + * machines which are not allowed to communicate with other + networks have no external addresses and can only communicate + with machines within their own network. + + * the rest of the machines share a number of external + addresses. The external addresses are allocated by + the EASS server on request. These machines can only + used as clients to call machines in other networks, + i.e., they can not be called by machines in other networks. + + A network can choose any network number other than its external + network number as its internal network number. Different networks + can use the same network number as their internal number. We propose + to reserve one Class A network number as the well-known network + number for internal use. + +The Advantages + + The DNA scheme attempts to tackle the problem from the bottom of the + Internet, i.e., each individual network, while other schemes + described in the first section deal with the problem from the top of + the Internet, i.e., gateways and exterior routing algorithms. These + schemes, however, do not need to be consider as mutually exclusive. + The DNA scheme has several advantages: + + * The DNA scheme takes an evolutionary approach towards the + changes. Different networks can individually choose to + adopt the scheme at any time only when necessary. + There is no need for global coordination between different + networks for their deployment. The effects of the deployment + are confined to the network in which the scheme is being + implemented, and are invisible to exterior routing + algorithms and external networks. + + * With the DNA scheme, it is possible for a medium size organization + to use a Class C network number with 254 external addresses. + The scheme allows the current Internet to expand to over 2 million + networks and each network to have more than 16 million hosts. + This will allow considerable time for a long-term solution to + be developed and fully tested. + + * The DNA scheme requires modifications to the host software. + However, the modifications are needed only in those networks + which adopt the DNA scheme. Since all existing Class A and B + networks usually have sufficient external addresses for all their + machines, they do not need to adopt the DNA scheme, and therefore + + + +Wang & Crowcroft [Page 4] + +RFC 1335 Two-Tier Address Structure for the Internet May 1992 + + + need no modifications at all to their software. The networks + which need to use the DNA scheme are those new networks which are + set up after the Class A and B numbers run out and have to + use a Class C number. + + * The DNA scheme makes it possible to develop to a new addressing + scheme without expanding the 32-bit address length to 64-bit. + With the two-tier address structure, the current 32-bit space + can accommodate over 4 billion hosts in the global Internet and + 100 million hosts in each individual network. When we move to a + classless multi-hierarchic addressing scheme, the use of external + addresses can be more efficient and less wasteful and the + 32-bit space can be adequate for the external addresses. + + * When a new addressing scheme has been developed, all current + Internet addresses have to be changed. The DNA scheme will make + such a undertaking much easier and smoother, since only the + EASS servers and those have permanent external addresses will + be affected, and communications within the network will not + be interrupted. + +The Modifications + + The major modifications to the host software is in the network + interface code. The DNA scheme requires each machine to have at + least two addresses. But most of the host software currently does + not allow us to bind two addresses to one physical interface. This + problem can be solved by using two network interfaces on each + machine. But this option is too expensive. Note the two interfaces + are actually connected to the same physical network. Therefore, if + we modify the interface code to allow two logical interfaces to be + mapped onto one single physical interface, the machine can then use + both the external address and the internal address with one physical + interface as if it has two physical interfaces. In effect, two + logical IP networks operate over the same physical network. + + The DNA scheme also has implications to the DNS service. Many + machines will have two entries in the local name server. The DNS + server must examine the source address of the request and decide + which entry to use. If the source address matches the well-known + internal network number, it passes the internal address of the domain + name. Otherwise, the name server passes the external address. + + An EASS server is required to manage the sharing of the external + addresses, i.e., to allocate and de-allocate external addresses to + the machines which do not have permanent external addresses. This + service can be provided by using the "Dynamic Host Configuration + Protocol (DHCP)" [6]. + + + +Wang & Crowcroft [Page 5] + +RFC 1335 Two-Tier Address Structure for the Internet May 1992 + + + Many hosts do an inverse lookup of incoming connections. Therefore, + it is desirable the entry in the DNS server be updated whenever a new + external address is allocated. This will also allow an machine which + currently has a temporary external address to be called by other + machines. The updating of the entry in the DNS server can be done + more easily if the EASS server and DNS server are co-located. + +Acknowledgements + + We would like to thank J. K. Reynolds for the network statistics, and + V. Cerf, C. Topolcic, K. McCloghrie, R. Ullmann and K. Carlberg for + their useful comments and discussion. + +References + + [1] Chiappa, N., "The IP Addressing Issue", work in progress, + October 1990. + + [2] Clark, D., Chapin, L., Cerf, V., Braden, R., and R. Hobby, + "Towards the Future Architecture", RFC 1287, MIT, BBN, CNRI, + ISI, UC Davis, December 1991. + + [3] Solensky, F., and F. Kastenholz, "A Revision to IP Address + Classifications", work in progress, March 1992. + + [4] Fuller, V., Li, T., Yu, J., and K. Varadhan, "Supernetting: + an Address Assignment and Aggregation Strategy", work in + progress, March 1992. + + [5] Tsuchiya, P., "The IP Network Address Translator", work in + progress, March 1991. + + [6] Droms, R., "Dynamic Host Configuration Protocol", work in + progress, March 1992. + + + + + + + + + + + + + + + + + +Wang & Crowcroft [Page 6] + +RFC 1335 Two-Tier Address Structure for the Internet May 1992 + + +Security Considerations + + Security issues are not discussed in this memo. + +Authors' Addresses + + Zheng Wang + Dept. of Computer Science + University College London + London WC1E 6BT, UK + + EMail: z.wang@cs.ucl.ac.uk + + + Jon Crowcroft + Dept. of Computer Science + University College London + London WC1E 6BT, UK + + EMail: j.crowcroft@cs.ucl.ac.uk + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Wang & Crowcroft [Page 7] +
\ No newline at end of file |