Sie sind auf Seite 1von 6

2009 First International Conference on Evolving Internet

Anticipate IPv4 Address Exhaustion


A Critical Challenge for Internet Survival

M. Boucadair, J-L. Grimault, P. Lévis, A. Villefranque and P. Morand


France Telecom R&D
42, Rue des Coutures
14066 Caen
e-mail: {mohamed.boucadair, jeanluc.grimault, pierre.levis, alain.villefranque, pierrick.morand}@orange-ftgroup.com

Abstract—This paper introduces a novel solution to face the Expenditure) and OPEX (Operational Expenditure)
IPv4 public address exhaustion. The paper presents a new estimation to activate solution coping with the IPv4 address
architecture using port extended IP address and describes how shortage.
it can be used to overcome the IPv4 address shortage. It also In order to solve this depletion problem, service
provides a mock-up implementation together with the results providers need to investigate and enable means to ensure the
of the tests that assess the applicability of the proposed concept deployment of their service offerings and their delivery to
to various applications. end-users. This paper focuses on this technical challenge
which conditions the survival of the Internet. Other
Keywords-component; IPv4 address shortage, IPv6, double
challenges may be found at [3].
NAT
This paper specifies a promising solution which aims at
solving the depletion problem as encountered by current
I. INTRODUCTION service providers. The proposed concept, called Port Range
The Internet community has reached the consensus that solution is stateless session and does not alter the various
the number of public IPv4 addresses is bound to end [2][16]. services offered. The solution presented in this paper does
Various alarms have been emitted by the IETF and regular not require severe modifications of current engineering
reports were presented within the GROW (Global Routing practices as adopted by service providers. Furthermore, the
Operations Working Group) meetings. Moreover, the solution is scalable and can be deployed in several variants to
community was mobilized in the past to adopt IPv6 [1] prepare the migration towards IPv6. The scalability of this
which supports a larger IP address space as well as several solution is similar to current deployed IP architectures. No
enhancements compared to IPv4. IPv6 specifications are session-related (UDP or TCP) states are maintained in core
mature and current standardisation work is exclusively nodes operated by a given service provider.
dedicated to operational aspects. Despite this effort, IPv6 is This paper is structured as follows. Section II describes
not globally deployed by service providers for both financial in depth the IPv4 shortage challenge and presents the Carrier
and strategic reasons. However, even if a service provider Grade NAT approach. Section III focuses on the proposed
activates IPv6, it will be confronted with the problem to port-range solution. Overview and illustration example are
ensure a global connectivity towards today's Internet v4. also provided in Section III. Section IV describes the
Mechanisms such as NAT-PT (Network Address Translation configuration of the testbed. Finally, Section V presents the
Protocol Translation, [7]) were introduced to ensure the conducted tests and obtained results.
interconnection between two heterogeneous realms (i.e.
IPv4/IPv6). These solutions are stateful and are not suitable II. IPV4 SHORTAGE CHALLENGE
to interconnect an IPv6 domain with a dominant IPv4-only There is a global hierarchical structure that manages the
Internet realm. Further work should be undertaken within IP address space. The top level authority is called Internet
IETF to elaborate lightweight and hopefully stateless Assigned Numbers Authority (IANA), IANA allocates /8
solutions to ease IPv4-IPv6 interworking. Moreover, service blocks to the Regional Internet Registries (RIRs). A /8 block
providers should adopt clear strategies so as to ease the contains 2 to the power of 24 IPv4 addresses, or 16,777,216
adoption of IPv6 and to decrease the complexity related to addresses. There is one RIR per region of the world; for
IPv4-IPv6 interworking [7][8][9],one of the critical issues to example, the one in charge of Europe is the RIPE NCC. Each
be taken into account when designing service platforms. RIR then allocates /8 blocks of addresses to the Local
IPv6 is the long term solution to offer IP connectivity Internet Registries (LIRs), basically the service providers.
services to a large number of customers. From this Eventually, the service providers allocate addresses to their
perspective, service providers should avoid introducing new customers.
functions and nodes which could become problematic when The theoretical total IPv4 addressing space is 2^8 /8
migrating to IPv6. This critical requirement should be taken blocks, or 256 /8 blocks. Taking into consideration the IPv4
into account not only during the technical engineering phase, public address pool currently available at IANA (32 /8 at the
but also when provisioning required CAPEX (Capital time of writing), it is expected that the RIRs will have no

978-0-7695-3748-1/09 $26.00
$25.00 © 2009 IEEE 27
DOI 10.1109/INTERNET.2009.11
more public IPv4 addresses to allocate in the short term by • on the large amount of the sessions-related data to be
2012. At the exhaustion date, service providers will wind up stored for legal obligations (typically kept during
with public address pools that cannot grow. They will enter one year).
an IPv4 address shortage management phase. Two main CGN-based flavors can be distinguished. (1)
As mentioned above, IPv6 is the long term solution to Double NAT, in which two levels of NAT are cascaded: one
solve the IPv4 public address exhaustion, because it is the in the CPE and one in the network (i.e. CGN), this solution is
only solution available that can provide a sufficient compliant the large majority of CPEs. (2) And DS-lite [12]
addressing space to cope with the global IP growth expected which gets rid of the CPE NAT level. This solution requires
during the next decades. However, there will be a more or a Dual Stack (i.e. IPv4 and IPv6) CPE. A given CPE is
less long period during which offering only an access to the assigned with an IPv6 prefix. The IPv4 Internet traffic is
IPv6 Internet won't be satisfactory for customers, because a encapsulated into IPv6 packets between the CPE and the DS-
lot of services will remain IPv4-only accessible - a full IPv6 lite CGN.
world requires universal adoption. To illustrate the behaviour of a Double NAT architecture,
Therefore, service providers must develop solutions allowing let's consider the example shown in Figure 1. When PC1
their clients to communicate with their IPv4 correspondents wants to contact RM, IP packets are issued with an IP source
in this context of IPv4 address shortage and IPv6 growth. address equal to 10.0.0.1 and source port 1234. These
So far, the current practice has been to give a unique packets are then transmitted to the “Home NAT” which
IPv4 public address to each customer. Current designs assign proceeds to a NAT operation. When exiting the “Home
a global IPv4 address to the Customer Premises Equipment NAT”, the source IP address is positioned to 10.0.1.1 and
(CPE), whereas hosts connected through the CPE are source port number 5678. These packets are then transferred
privately-addressed. Therefore, CPE devices activate a across the private service provider network and routed to
Network Address and Port Translator (NAPT) [6] capability “Provider NAT” (CGN). This node proceeds to a second
by default, sourcing IPv4 traffic based upon this sole global NAT operation. When exiting the “Provider NAT” box, the
IPv4 address. In this context, an address that can be seen in IP source address becomes 25.25.25.25 and the source port
any IP packet always refers to a unique customer. This kind number is 9123. The packets are then routed to RM. The
of practice is no more affordable nor suitable to solve the response from RM will also cross the “Provide NAT” box
IPv4 address shortage. Therefore service providers are bound and the entry (10.0.1.1, 5678, 25.25.25.25, 9123) will be
to allocate the same IPv4 public address to several customers used by the CGN to issue the packet toward the CPE.
at the same time. In this new context, an IPv4 address, seen
in an IP packet, can refer to several customers. In addition to
the IP address, the port information must be considered as
well, in order to be able to unambiguously identify the
customer pointed by that shared address. In particular, the
port information along with the address information must
eventually be taken into account by the routing infrastructure
so that it reaches its intended destination. A port-driven
routing process may be required.
All IPv4 address shortage mechanisms extend the address
space in adding port information. They differ on the way
they manage the port value.
The first category of these solutions proposes the
introduction of a NAPT function in the service provider
network, denoted as Carrier Grade NAT (CGN) [13] or
Provider NAT. The CGN is responsible for translating IP
packets issued with private addresses to ones with
publicly routable IPv4 addresses. These solutions may
have significant impacts:
• on the applications that establish inbound Figure 1. CGN: Double NAT Illustration Example.
communications such as P2P, or servers behind a
CPE [5], mainly because port forwarding facility Alternatively to the Provider NAT solution [13], with
(which opens a “door” for incoming packets) may several drawbacks, a second alternative is proposed in this
not be available on the CGN equipment as today in paper. The motivations for introducing this solution are
the CPE; mainly:
• on cost and hardware/software resources, due to the • Not to alter IPv4-based services current delivery and
huge number of sessions (UDP, TCP) dynamically not to impact the introduction of future services [1].
handled by the CGN (all sessions from all CGN- • Optimize CAPEX and OPEX (due to the absence of
aggregated users); session-based handling in the core network).

28
• Be transparent to end-users (e.g., Port forwarding at enforce configuration data received from the service
CPE is still possible provided the port is within the providers so as to constrain their Port Range. More
allocated Port Range). particularly, if DHCP [11] is used to convey configuration
• Ease the implementation of legal requirements (no data, a specific DHCP option (to be assigned by IANA) [14]
session related data need to be stored). has to be supported by that port-restricted device.
Furthermore, port-restricted devices constrain their NAT
III. PORT RANGE BASED SOLUTION operations to use source port numbers within the allocated
Port Range only. If an IP packet is received by a given port-
A. Overview restricted device, with a destination port number outside the
The main principle of the port-range solution is to assign assigned Port Range, the packet is discarded.
the same IP address (called Primary IP Address) to several C. Multiplicative factor
end-users' devices (called port-restricted devices) and to
constrain the source port numbers to be used by each port- The purpose of sharing IPv4 addresses is to increase the
restricted device. In addition to the assigned IP address, an addressing space. A key parameter is the factor by which
additional parameter, called Port Range, is also assigned to service providers want or need to multiply their IPv4 public
the customer's device. This parameter indicates the allowed address space; and the consequence is the number of
port values to be used by a given port-restricted device. customers sharing the same public IPv4 address. It is
For outbound communications, a given port-restricted expected that IPv6 communications will take an increasing
device proceeds with its classical operations except that it part during the years to come, at the expense of IPv4
constrains the source port number to fit within the Port communications. A safety point should be reached in the
Range. The traffic is then routed, without any specific future, where the number of IPv4 public addresses, in use at
treatment, inside the service provider's domain and delivered the same time, will begin to decrease. From a service
to its final destination. For inbound communications, the port provider point of view, this multiplicative factor must be
information needs to be eventually taken into account so that large enough so as to survive until the safety point event
it reached its proper destination. The traffic is handled by a occurs for its own customers. Most likely a one digit factor
dedicated function called: Port Range Router (PRR). This should be sufficient. Whereas the potential is huge, -if we
function may be embedded in current routers or hosted by allocate each customer (one IP address, 1000 ports) we
new nodes integrated in the IP infrastructure of service multiply by 64 the total IPv4 address space-, trying to devise
providers. PRR is a mandatory function that must be applied solutions that can increase the IPv4 space might mean
to all incoming packets. At that end, appropriate routing constantly pushing back IPv6 deployment.
tuning policies are enforced so as to drive the inbound traffic D. Provisioning Considerations
to cross a PRR. Each PRR extracts the Primary IP Address
and the port value in order to retrieve or compute a specific Port-restricted devices are provisioned with the port
identifier called: routing identifier (e.g., Private IPv4 address range to be used. A Port Range is defined by a Port Mask
[10], IPv6 address, point-to-point link identifier, etc). specified itself by a Port Range Value and a Port Range
Information required to route inbound traffic is stored and Mask [14]:
maintained in a dedicated table in the PRR referred to as • The Port Range Value indicates the value of the
binding table. significant bits of the Port Mask. The significant bits
Several modes can be envisaged to assign the may take a value of 0 or 1. All the other bits (non
aforementioned routing identifier, such as using a Secondary significant ones) are set to 0.
IP address or using source routing facilities. If a Secondary • The Port Range Mask indicates, by the bit(s) set to 1,
IP address is used, the PRR consults its binding table and the position of the significant bits of the Port Range
retrieves the corresponding Secondary IP address associated Value.
with the (Destination IP, Port Mask) matching the received Two port numbers are said to belong to the same Port
packet. Once retrieved, the PRR encapsulates the original Range if they have the same Port Mask.
packets in an IPv4 one with a destination IP address equal to At a bootstrapping phase, a given port-restricted device
Secondary IP. This packet is then routed according to issues a DHCP_DISCOVER message. This message is
selected IGP (Interior Gateway Protocol) routes. Once broadcasted. It may be relayed by a DHCP Client Relay [15]
received by the CPE, a de-encapsulation operation is or be received directly by a DHCP Server. Once received by
achieved. The original packet is then handled locally. If the a DHCP Server, the latter answers the requester with a
destination port of the packet is within the Port Range dedicated DHCP_OFFER message containing a
assigned to the CPE, the packet is accepted and passed to configuration offer including particularly a Port Mask
classical NAT operation process. Otherwise, the packet is Option. Then, the port-restricted device constrains its NAT
dropped. operations to the provisioned Port Range.

B. Required Modifications E. Illustration Example


In order to activate the port-range solution, some As shown in Figure 2, the same Primary IP address
modifications are required to be supported by port-restricted 25.25.25.25 is assigned to “Home NAT” (e.g., CPE) of PC1
devices (e.g., CPEs). Indeed, port-restricted devices must (Resp. PC2 and PC3) and to PC4. Together with this IP

29
address, secondary addresses IP_Sec_1 (Resp. IP_Sec_2 and (e.g., HTTP, P2P, FTP, etc.). Only TCP and UDP transport
IP_Sec_3) and IP_Sec_4 are assigned to the “Home NAT” of protocols have been considered in this version of the testbed.
PC1 (Resp. PC2 and PC3) and PC4. Distinct Port Masks are
also assigned to all port-restricted devices. In this example, A. Testbed setup and configuration
these masks are such that the “Home NAT” of PC1 (Resp. All the components of the testbed (e.g., CPEs and PRR)
PC2 and PC3) can use a range of port numbers up to 10000 are Linux-based PCs (except the terminals which may be of
(Resp. 10001 to 20000 and 20001 to 30000) and PC4 itself any OS). The testbed relies only upon Linux configurations.
can use a range of port numbers from 30001 to 40000. No software development has been necessary.
Figure 3 provides an overview of the testbed architecture
and its components, particularly:
• CPE-1 and CPE-2 are two port-restricted devices
which share the same IPv4 address (i.e. IP_pub);
• a PRR node which is connected via Ethernet to the
CPEs.
1) CPEs configuration
In the remaining part, “x” suffix designates either “1” or
“2” (e.g., “CPE-x” refers either to CPE-1 or CPE-2).
As shown in Figure 3, each CPE has two Ethernet
interfaces, each one being set-up with a private IPv4 address:
• Eth_INT: the interface towards the LAN the CPE
serves. This LAN may host terminal(s) and/or
server(s). The private address
[private_addr_INT_CPE-x] is assigned to this
interface.
• Eth_EXT: the interface towards the PRR. The
private address [private_addr_EXT_CPE-x] is
Figure 2. Port Range Illustration Example. configured on this interface.
Netfilter features are used to control the NAT embedded
When PC1 issues an IP packet to RM, the source IP in Linux OS. To force each CPE to send all its outbound IP
address is equal to 10.0.0.1 and the source port number is packets within the assigned port range, dedicated Netfilter
positioned to 1234. Once received by the “Home NAT”, it features have been configured through “iptables” commands,
proceeds to its NAT operations and assigns a port number in as shown below for TCP:
its provisioned port range. In this example, a source port /sbin/iptables -t nat -A POSTROUTING -p tcp -o
number equal to 9123 is assigned. The packet is then routed [Eth_EXT] -j SNAT --to-source [IP_pub]:[port_range-x]
towards its final destination (i.e. RM). RM can send traffic to With:
25.25.25.25:9123. The traffic is intercepted by the PRR node • IP_pub: the shared public address.
which proceeds to a port-driven routing. Concretely, PRR • ports-range-x: the port range assigned to each CPE.
retrieves both destination IP address and destination port For UDP, a similar command has been executed.
number from the received packet. Then, it checks its binding Note that the CPE has no interface set with the shared IP
table (i.e. list of [public IP address, Mask_Port, Secondary IP public address (IP-pub). This latter is only present at the
address] entries) and retrieves the secondary IP address. The NAPT settings level. With this method, direct
initial packet is encapsulated and sent to IP_Sec_1. Packets communications (through PRR) between two CPEs (CPE-1
are routed until the “Home NAT” in front of PC1 which and CPE-2) sharing the same IP-pub address but with
proceeds to a de-encapsulation operation. At this stage, it distinct port ranges, are feasible. This is because our NAT
retrieves a packet destined to 25.25.25.25:9123. Finally, it rules do not refer to any address of local Ethernet interfaces.
checks its mapping table in order to find which local IP
2) PRR configuration and behaviour
address and port number have to be used. In this example, an
To enforce a port-driven routing on the PRR, Linux
entry is already instantiated, 10.0.0.1 and 1234 are returned
Netfilter capabilities [17] are also used. Inbound packets are
and the packet is translated and routed to PC1. All these
marked depending on their destination address and
operations are similar to classical NAT operations except the
destination port number. Particularly, the following iptables
operations undertaken by the PRR and the constrained port
command is executed (e.g., for TCP):
numbers assignment process.
/sbin/iptables -t mangle -A PREROUTING -p tcp --
IV. A PROOF-OF-CONCEPT TESTBED destination [IP_pub] --dport [port_range-x] -j MARK --set-
mark [x]
To assess the validity of the proposed solution, a proof- In Netfilter configuration, [x] marking is associated with
of-concept testbed has been set-up. Various tests have been a routing table dedicated for [x] marked packets. This table
performed to assess the behaviour of the port-range solution contains only one entry: the one pointing to the private
and its level of transparency to well-known applications address of the CPE-x [private_addr_EXT_CPE-x]. Of course

30
in the PRR, there is a mark setting line with a corresponding The slight limitations observed upon one application
routing table for each of the CPEs the PRR serves (i.e. CPE- (described in sub-section C) do not concern the port range
1 and CPE-2). solution.
This marking is purely at Netfilter level and does not
entail any marking of IP packets. B. Port forwarding
Upon receipt of an inbound packet at the outside In today’s practices, a static NAT entry was configured
interface of the PRR (e.g., coming from the Internet): to accept incoming P2P traffic. This practice is motivated by
• The packet is marked relatively to the destination the fact that Linux NAT is not by default an “independent
address and port range in which the destination port endpoint filtering”. This means that an outbound connection
number falls. This is done at pre-routing level, as with a remote machine does not allow another machine to
shown in the iptables command listed above. enter through the created NAT entry. As usual, a port
• Owing to this mark ([x] for CPE-x), the packet forwarding setting in CPEs is necessary to allow such
passes through a routing table which points to inbound connections. The port range solution brings only the
[private_addr_EXT_CPE-x]. This address is seen by constraint that the port value must be configured to be within
the PRR as the first hop of the route towards the the allowed port range. Any port-restricted CPE in the future
CPE-x. The PRR proceeds to an ARP (Address would need to take care of that in displaying Web menus to a
Resolution Protocol) -if not already achieved user who wants to open a port manually. As for the UPnP
previously- and matches this private address with the IGD protocol -which allows to automate this port forwarding
MAC (Media Access Control) address of process- the next version (2.0) should provide a means to
Eth_EXT_CPE-x. answer the request terminal with another port number than
• The packet is then encapsulated into an Ethernet that which was originally requested by the terminal.
frame and transmitted to Eth_EXT_CPE-x. C. Limitation
V. TESTS AND RESULTS Through the tests campaign performed, two limitations
were experienced. The first limitation occurs when two
A. Conducted tests and overall results BitTorrent clients sharing the same IP address want to
retrieve simultaneously the same file located in a single
The objective of the testing activity was to assess the
remote peer server. This limitation is due to the default
transparency of the port range solution for well-known
BitTorrent configuration on the remote peer server which
applications, such as: HTTP, FTP, e-mail, Instant messaging,
does not permit sending the same file to multiple ports of the
P2P and Voice over IP. The results obtained confirmed the
same IP address. However, provided clients sharing the same
validity of the port range solution: all tested services worked
IP address can find each other through a common tracker -
normally through the testbed. Tests have also been
DHT or Peer Exchange- they could exchange portions. Even
performed between a client under CPE-1 and a server under
if they could not, we observed that the remote peer began
CPE-2. Again, no failure to establish the communications
serving portions of the file automatically to the pending
has been experienced. The results show that the tested
client as soon as the other client (sharing the same IP
services are fully compatible with the port range solution.

Figure 3. Testbed Architecture

31
address) had finished downloading. This limitation is VII. REFERENCES
eliminated if the remote peer is configured with [1] Muller, A. Carle, G. Klenk, A., Behavior and classification of NAT
“bt.allow_same_ip == TRUE”. The second limitation occurs devices and implications for NAT traversal, IEEE Network, IEEE,
when a BitTorrent client tries to download a file located on September-October 2008, Volume: 22, Issue: 5, On page(s): 14-19
several seeders, when those seeders share the same IP [2] Francis, P., Is the Internet going NUTSS?, Internet Computing, IEEE,
address. This is because the clients by default enforce Nov.-Dec. 2003, Volume: 7 , Issue: 6, page(s): 94 – 96, ISSN: 1089-
7801
“bt.allow_same_ip” parameter to FALSE. The client will
only be able to connect to one seeder, among those having [3] Greenstein, S., Slouching Toward a Dystopian Internet, Micro, IEEE,
Sept.-Oct. 2008, Volume: 28 , Issue: 5, page(s): 6 – 7, ISSN: 0272-
the same IP address, to download the file (note that the client 1732
can retrieve the file from other seeders having distinct IP [4] S. Deering , R. Hinden, Internet Protocol, Version 6 (IPv6)
addresses). Again, this limitation is eliminated if the local Specification, RFC 2460, 1998
client is configured with “bt.allow_same_ip == TRUE”, [5] M. Holdrege , P. Srisuresh, Protocol Complications with the IP
which is somewhat likely as those clients will directly Network Address Translator, RFC 3027, 2001
experience better throughput by changing their own [6] P. Srisuresh , K. Egevang, Traditional IP Network Address Translator
configuration. Mutual file sharing between hosts having the (Traditional NAT), RFC 3022, 2001
same IP address has been checked. Indeed, machines having [7] G. Tsirtsis , P. Srisuresh, Network Address Translation - Protocol
the same IP address can share files with no alteration Translation (NAT-PT), RFC 2766, 2000
compared to current IP architectures. [8] E. Nordmark, Stateless IP/ICMP Translation Algorithm (SIIT), RFC
These limitations are not specific to the port-range 2765, 2000
solution itself but to the restriction implemented by software [9] H. Kitamura, A SOCKS-based IPv6/IPv4 Gateway Mechanism, RFC
3089, 2001
developers to restrict the access based on IP addresses.
[10] Y. Rekhter , B. Moskowitz , D. Karrenberg , G. J. de Groot , E. Lear,
D. Run servers behind a port-restricted device Address Allocation for Private Internets, RFC1918, 1996
The port range solution allows also a server to be [11] Droms, R., Dynamic Host Configuration Protocol, RFC 2131, March
1997
installed behind a port-restricted CPE (e.g., CPE-2). The
[12] Durand, A., Droms, R., Haberman, B., Woodyatt, J., Dual-stack lite
CPE NAT must be configured to redirect the traffic to the broadband deployments post IPv4 exhaustion, Work in progress,
server. The used port must belong to the Port Range assigned draft-ietf-softwire-dual-stack-lite-00, March 2009
to the CPE. A remote client (or a client behind CPE-1) [13] Maennel, O., Bush, R., Cittadini, L., Bellovin, S., A Better Approach
succeeds to connect normally to the server, provided that the than Carrier-Grade-NAT, 2008, Technical Report CUCS-041-08
client specifies the address and port of the server when [14] Bajko, G., Savolainen , T., Boucadair, M., and P. Levis, Dynamic
launching the connection. Further investigations may be Host Configuration Protocol (DHCP) Option for Port Range
undertaken such as using DynDNS and SRV records so that, Assignment, Work in progress, January 2009
through DNS, the client can retrieve the port number and [15] Patrick, M., DHCP Relay Agent Information Option, RFC 3046,
January 2001
address to access the service.
[16] http://www.potaroo.net/tools/ipv4/index.html [last access: May 11,
VI. CONCLUSION AND FUTURE WORK 2009]
[17] http://www.netfilter.org/ [last access: May 11, 2009]
In this paper we have presented a solution to solve the [18] Boucadair, M. Levis, P., Grimault, J-L., Villefranque, A., Kassi-
IPv4 address exhaustion problem. We have described a Lahlou, M., Flexible IPv6 Migration Scenarios in the Context of IPv4
lightweight architecture that may be deployed by IP network Address Shortage, Work in progress, March 2009
providers to offer IP connectivity services to their current or
future customers. Compared to CGN, this solution can
achieve CAPEX/OPEX reduction because the NAT
resources are still hosted in the CPEs (as today), instead of
being centralized in network equipments (CGN). The results
of the performed tests prove the validity of the proposed
solution. This paper didn’t make any recommendation on the
implementation scenario. Service providers are free to
enforce their own engineering rules based on their internal
policies and available technological means as activated in
their IP infrastructure. The solution is flexible enough to be
set up in various contexts.
As for future work, the focus will be put on IPv6 variant
of the port-range solution since the ultimate target is to
migrate to IPv6 and to ease the interconnection between
heterogonous realms. A stateless IPv4-IPv6 interworking
solution, based on Port Range, is currently under
specification [18].

32

Das könnte Ihnen auch gefallen