IT Professional, Author / Researcher E. Terrell Internet Draft October 1999 Category: Proposed Standard Document: draft-terrell-ip-spec-ipv7-ipv8-addr-cls-02.txt Expires April 05, 2000 Internet Protocol Specifications for IPv7 and IPv8 Address Classes Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ``work in progress.'' The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. To learn the current status of any Internet-Draft, please check the ``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or ftp.isi.edu (US West Coast). Conventions Please note the font size of the Tables contained in this white paper are smaller than the expected 12 pts. However, if you are using the most current Web Browser, the View Section of the Title bar provides you with the option to either increase or decrease the font size for comfort level of viewing. (Provided that this is the HTML version.) Moreover, the reader should also be well advised, that the Version Numbers, IPv7 and IPv8, are not version numbers assigned by IESG. They nonetheless provide convenience, which serve as the support for the underlining deliberation until such an assignment by IETF/IESG can be made. Contents Abstract Overview Chapter I: An Overview of IPv7 the Expansion of Ipv4 Chapter II: An Overview of IPv8 the Enhancement of Ipv7 Chapter III: The Principles of Subnetting in IPv7 & IPv8 Chapter IV: The Structure of the Header of IPv8 Chapter V Conclusion: The Benefits of IPv7 and IPv8 Security: The Relationship between IPv7 & IPv4, and the Suggested / Recommended Alternatives for IPv8 Appendix I: Graphical Schematic of the IP Slide Ruler Appendix II: The Mathematical Anomaly Explained Appendix III: The Reality of IPv6 vs IPv8 References Abstract This paper is a direct result, necessitated by the correction of the mathematical anomaly that plague IPv4. However, the resolution of this problem which sought an end to the disparities resulting from a shortage of available IP Addresses. Did not seem to garner the unfledging support, through the suggestion of an alternate IP system of addressing. As presented in the paper entitled; "The Mathematical Reality of IP Addressing in IPv4 Questions the need for Another IP System of Addressing". Needless to say, it is thought that a greater clarification of the underlining foundation of this subject matter is that which is needed. Notwithstanding my personal beliefs, that the promises made by the IT Industry itself, will not be forth coming if an adequate IP System of Addressing is not employed. Nevertheless, the Overview is an attempt to provide the reader with a succinct introductory foundation of those aspects of the Internet Protocol that will change as a direct result of the implementation of either IPv7 or IPv8. In other words, I shall present only those aspects of IPv4 that deal with its methods of Addressing and its former Class Structure. However, while admitting this would be an over simplification of its functional use or purpose, and a serious reduction of an adequate explanation of a vast majority the foundational information encompassing the IP Specification. It is nevertheless, seen justifiable, because the remaining aspects concerning the IP Specification will not change, and shall retain their functional use regardless of whether or not these systems are employed. However, there will not be any analysis, which would propose a mandate for implementation of either of these IP Addressing Systems, as the suitable replacement of IPv4. That is to say, not unless the foundations as presented by this work, become the Standard chosen after an extensive review and comprehensive analysis by the members of the committee for the IESG and IETF. In short, the analysis providing the support for a further exploitation of IPv4 has been presented, and the information provided in the remaining chapters of this paper shall entertain only the aspects of IPv7 and IPv8 which differ from that of IPv4. This however, does not include the chapter dealing with Subnetting. Especially since, there is a significant difference, and an argument can be made that would warrant not only a comparative analysis, but support for its justification as well. Overview There are only two main aspects of IPv4 addressing in the IP Specification that warrant mention; that being Addressing and Fragmentation. However, since the methods employed in fragmentation and the IP Specifications dealing with the interaction with other Protocols or its Modules, will not change as such, they will not be a subject entertained in this Overview. Where by, the matters that are presented in brief. Which entertains our present concerns, deal only with the subject matters of the IP Specifications that encompass the Class and the Classless Systems, and their functional use as employed in the IP Addressing of the current system. Nevertheless, the current IP Specification methodology for IP addressing in the IPv4 Addressing Scheme is the 'CLASSLESS System'. Needless to say, while the IP Specifications employing the 'CLASS System' in the IPv4 Addressing Scheme are no longer used. There are however, similarities remaining in each of these systems. In which they share a common foundation, and are still used in the IP Specification for IP Addressing. Where by, the shared practices, descriptions, and methodologies of each system is identified as being: 'The IPv4 Class Address Range'; 'The 32 Bit IP Address Format'; 'The Method for Subnetting'; 'The Principle of the Octet'; and 'The Binary and Decimal representations of the IP Address'. However, notwithstanding the treatment which will be rendered to each in this overview. There will also be a section outlining there differences as well. The Binary and Decimal representations in the IP Address The Binary and Decimal representations are two different mathematical systems of enumeration. In which the Binary Representation is a Mathematical System dealing with the operations of Logical Expressions having only two states, which can be translated to represent Integers and Fractions. While the Decimal Representation, is a Mathematical System involving the operations of Integers, and can only represent the Whole Numbers used in Counting. Nevertheless, in spite of the existing differences. These mathematical systems are shared and used by both, the Class and Classless Systems. The difference however, underlies the structure of their respective Mathematical Systems. In other words, only two Binary Representations exist, that being a 1 or a 0. However, the combined use of One's and Zero's in a series, can be used to represent any Integer. That is, for some representative combination of 1's and 0's in a series, there can exist one and only Integer, in which this Series is Equal to. Even then, a Mathematical Equation involving the Integers must exist, which would 'Translate' this Binary Representation into its Decimal (Integer) Equivalent. In which case, the result would be an enumeration representing 'One-to-One' Correspondence that is an Expression of Equality. In which two different systems represent the same quantity. Nonetheless, each would retain an independence from the other, in any quantitative result of their employ, governed by the Mathematical Laws specific to their operation. Nevertheless, the mathematical operation used to perform this Translation between the Binary and Decimal representations is Multiplication. In which the equation is an Exponential Operation involving Integers. Where by, for every Translation of any Decimal (Integer) number is given by Table 1. TABLE 1. 4 3 2 1 X X X X <----------| | | | | | | | | | v 1. | | | |<---> 2^0 = B x 2^0 | | | 2. | | |<---------> 2^1 = B x 2^1 | | 3. | |<---------------> 2^2 = B x 2^2 | 4. |<---------------------> 2^3 = B x 2^3 Where it is given that, the value of B represents the Binary representation of either a 1 or a 0. Which will equal the value of X (the top of the Table). Needless to say, it should be clear that any Decimal (Integer Value) can be represented using this method. Where by, a Binary value of 1, in the B column of equation 1, is a Binary value of 1 for its corresponding X, and the result of the equation is the Decimal (Integer value) value equal to 1. Hence, the Decimal representation is equal to the Sum of the results from the Equations for which the value of X equals 1, and this process proceeds from the Left to the Right. Nonetheless, while the process of Translating a Decimal (Integer value) number to its Binary equivalent is a little more involved, it is nonetheless this process (Noted above) in the reverse. Which is shown in Table 2. TABLE 2. 4 3 2 1 X X X X <-------------> | | | | | | | | | | v 1. | | | |<---> 2^0 = D - (B x 2^0) = Y | | | 2. | | |<---------> 2^1 = D - (B x 2^1) = Y | | 3. | |<---------------> 2^2 = D - (B x 2^2) = Y | 4. |<---------------------> 2^3 = D - (B x 2^3) = Y In other words, the Reverse process proceeds from the Right to the Left. Which means, according to the corresponding equations, 'the Binary Representation of any Decimal Number D, is equal to the Decimal number (D) minus the Highest Value of the Exponential Equation yielding a Positive Number, Y. Until the value of their Difference, Y, at some point, is Equal to Zero. (Clearly Y is a Variable Integer) Nevertheless, it is clearly a conclusion, as noted in the Tables above, that the Binary Representation of an extremely large Integer number, would indeed, be a very long series of 1's and 0's. Especially since, 1 and 0 are the only numbers of these mathematical systems in which the equality of a One-to-One correspondence exist without the need for a mathematical Translation. Notwithstanding the fact that the Tables above used examples without any specifics or consideration regarding parameters. Nonetheless, in the IPv4 Addressing System, the Boundary's imposed upon the size of the Binary Series and the Range of the Decimal (Integer Values) Representations, help to define the 32 Bit Address Range of the Internet Protocol. Where by, there can only be 8 Bits (Binary 1's and or 0's) in a Binary Series, which provides, in Translation, a Decimal Range of 1 - 255, inclusive. Furthermore, it can also be concluded that the lack of a direct correlation between the 8 digit and 3 digit displacements that are the foundations of these respective systems, can not be achieved without some form of Translation or multiplication Factor. Which would render these respective displacements Equivalent. However, it should be clearly noted. There is soundness in any argument for logical foundation that would support such a justification. In other words, while it is clear that this Digital Representation is an existing difference between them. It should also be understood, that even without Translation they each can only represent one Integer Value. Needless to say, there abounds the possibility of Error in the Calculations involving either of these systems. Especially when either of these Mathematical Systems, are used to represent or determine some resulting value of the other. That is, errors become impossible to avoid without performing the necessary Translation to achieve the One-to-One correspondence, which maps accurately the Total count of one system to that of other. Saying the very least however, it seems to me, the choice would be to allow either the Machine to manipulate the Binary Numbers, or calculate using only the Decimal numbers, then translate the result to a Binary Representation. The 32 Bit Address Format and the Principle of the Octet The 32 Bit Address Format in use today, comprises 4 sections, each having a Binary Series of 8 Bits which can be any combination of 1's and 0's. Hence the name, Octet, represents the 8 Bit Binary representation, of which there are 4 that make up the 32 Bit Address Format. Nevertheless, its Decimal Translation, yields a Dotted Notation having an Integer Range of 0 - 255 inclusive. The IPv4 Address Class System The IP Class System, while somewhat blurred through the use of the Subnet Mask in the Supernetting methodology of the Classless System, it has not yet, lost the significance of its use. Nevertheless, it is given by the defacto Standard, that the IP Class of a given Network Address is determined by the Decimal value of the First Octet relative to the IP Address Class Range in which it is associated. This method is used in conjunction with the Default Subnet Mask to determine the total number of IP Addresses available for the calculation of the total number of Networks and Hosts, and their distribution counts for every IP Address Range. Where by, the Default Subnet Mask maintains a Decimal value of 255 for every Octet in which it is assigned. This Decimal value translates to a Binary Representation of all 1's, or 8 Binary 1's (11111111) in every Octet in which it is used. However, the mathematical method employed to resolve the Network IP Address in which the Default Subnet Mask is associated, is called BITWISE ANDING. Nonetheless, Bitwise Anding is a mathematical operation involving the Binary System, and is given by Table 3. TABLE 3 1. 1 and 1 = 1 2. 1 and 0 = 0 3. 0 and 0 = 0 Where by, the process of BITWISE ANDING is a Machine calculation that can be performed by anyone. Its functional purpose is the resolution of an IP Address, which can be either a Network or an associated Host. Nevertheless, the IP Class structure while providing a count of the total Networks and Hosts for each IP Class, as shown in Table 4. It additionally provided the IPv4 Addressing System with a structure, methodology, and a small set of rules to govern the distribution, deployment, and management of IP Addresses within any given Internetwork or Network domain. Nonetheless, Table 5 provides the description of its Binary interpretation, which is related to the number of available Binary Digits that can be used, when translated, to determine the Decimal Notation an IP Address, and the total number of addresses available. Table 4. Structure of the IPv4 Representation IP Class System Class A, 1 - 126, Default Subnet Mask 255.y.y.y: 126 Networks and 16,777,216 Hosts: 0 Class B, 128- 191, Default Subnet Mask 255.255.y.y: 16,384 Networks and 32,004 Hosts: 10 Class C, 192 - 223, Default Subnet Mask 255.255.255.y: 2,097,151 Networks and 254 Hosts: 110 Table 5 1. Class A: 1 - 126, with 8 Bit Network Count and 24 Bit Host count ; Where 0 (Zero ) and 127 reserved unknown Network and loopback 2. Class B: 128 - 191, with 14 Bit Network Count and 16 Bit Host count 3. Class C: 192 - 223, with 24 Bit Network Count and 8 Bit Host count 4. Class D: 224 - 239 ; Used for Multicasting, Host count not applicable 5. Class E: 240 - 254 ; Denoting Experimental, Host counts not applicable Note: There is no Division of Classes D or E. In fact, their definitions provide descriptions of their functional use. The Rules that enabled and govern the structure of the IPv4 Addressing System, are indeed laws. Where by, either the Internetwork or Networking Domain could become disabled, if a violation of any one or more of these laws occurred. Nevertheless, the laws as outlined in Table 6, represents a Set of Restrictions and their, regarding the Binary and Decimal values assigned to a given IP Address. However, any further, or more detailed analysis of Table 6 would be superfluous, because the presentation itself, is a definition. Nevertheless, notwithstanding the benefits that the hierarchical organizational structure of the IPv4 Class Addressing Scheme provided the Networking Community as a whole. The treatment rendered, regarding its explanation, while somewhat shallow, shall suffice as the grounding foundation for the overall purposes and objectives of this presentation. TABLE 6 1. The Network Address portion of an IP address cannot be Set to either all Binary Ones or All Binary Zeros 2. The Subnet portion of an IP address cannot be Set to either All Binary Ones or All Binary Zeros 3. The Host portion of an IP address cannot be Set to All Binary Ones or All Binary Zeros 4. The IP address 127.x.x.x can never be assigned as a Network Address The Differences between the Class and the Classless Systems The fall of the IPv4 Class System of Addressing, as such, is viewed as resulting from the lack of IP Addresses available for distribution and servicing the every growing Global Internetworking Community. However, the Internet Draft from which this results, describes an alternate view of the reality of its fall. Nevertheless, the IPv4 Class System has been described as an Organized Hierarchical Class Structure. But, this not a definitive depiction, noting that there are parts yet remaining within the IPv4 Class System, that are indeed wanting of a more conclusive and exacting definition of their functional purpose. This however, becomes even more apparent upon analysis of the use of Default Subnet Mask for the Class B. That is, when compared with the results of Appendix II and the definition of the use and purpose of the Default Subnet Mask. Where by, it is clear from the definition of the Default Subnet Mask. That its purpose defines the location of the Octet, which is assigned some Decimal Value from the IP Address Class Range. While, one of it uses, is the identification or resolution of a Network or Host IP Address. But clearly, this is not sufficient. Because this implies that only the first Octet of any given IP Address, maintains the right relative to the IP Address Range, to define the IP Class to which any given IP Address belongs. In other words, given the Class B as our example. Which has a Default Subnet Mask of 255.255.000.000. Then, given the results, as that given by equation 1a. We could conceivably derive two different Decimal Values, which would be an equally accurate determination of the number of Networks present in Class B. That is, provided there does not exist a more precise definition, and or, functional use of the Default Subnet Mask. 1a. 64 x 254 = 16,256 "OR" 64 x 64 = 4,096 (That is, given that: Class B 128 - 191, Default Subnet Mask 255.255.000.000) Needless to say, regardless of the method employed, they are clearly different numerical values representing the same object, which are indeed less than the Binary value given by 2^14 (16,384). Furthermore, without the indulgence of another example, this conclusion is applicable to the Class C as well. (This problem is eliminated in IPv7.) Nevertheless, the concept of Masking and its inverse,'Un-Masking', deserves some attention. That is, the Subnet Mask, which is the Catalysis for this presentation, is used by both of these Systems, the Class and Classless. However, it is the concept of the Subnet Mask, as it shall be discovered, which maintains a far greater significance when distinguishing the difference between these two Systems. Notwithstanding, the notion, idea, or evolution of the Class System would have been a resulting consequence, predicated by some inseparable component regardless. Where by, the misnomer, 'Classless', is not the existing difference, which mandates the defining distinction that separates these Systems. Needless to say, the doubt, which the underpinning of this conclusion surmounts, is the functional definition and the associated boundaries of the IP Class Addressing System. Which is indeed, the IP Addressing Divisional Methodology employed by each of these Systems. Nonetheless, without any support outlining or defining a Structure, one such component whose defined function, which would have caused the predestine evolution each, is indeed that of the Subnet Mask. (But! What are the losses? Or trade-offs of this implementation?) Nevertheless, the associated problems concerning IP Address availability were resolved through the creation of another Sub-Division of the Subnet Mask. Which indeed, is the 'DEBARKATION LINE', defining the difference between these Systems. However, this was a two-phase progression, involving two divisions of the Subnet Mask, the VLSM and the SUPERNETTING of the Class C, CIDR. Nevertheless, Supernetting maintains the distinction as being the USHER for the Classless. That is, the underlining difference distinguishing these Systems. It does moreover, impose a barrier, which limits the overview's presentation to the relevance pertaining thereto. Nonetheless, it is worthy of mention, noting that Supernetting can be viewed as a refinement of VLSM, Variable Length Subnet Mask. The promises of Supernetting, when viewed from its exploitation of the Class C, as relinquishing the dependence upon the Class Structured System, can be realized only if this application is applied to the remaining Classes. At least, this is the current and accepted outline of the Populist's view of the objectives presented. Notwithstanding, the most discomforting drawback encompassing this objective, is the elimination of the process and use of the Default Subnet Mask. Which ultimately means, the redefining of the functional use of all Binary 1's and 0's within the any given Octet, and the loss of the Logical Structure in IP Addressing as well. Nevertheless, there is indeed a warrant for an analysis of the process of Supernetting, which transcends the obligations of this overview. Needless to say, the foundational support of this argument is the underlining objectives found upon the Internet Draft upon which of this presentation resides. Nonetheless, prior to the analysis and investigation of Supernetting, a brief introduction of some of the foundational principles of Subnetting, from which Supernetting is derived, is required. The Binary Representation of 1's and 0's, and the specific rules for their combination or usage, is the chosen form of communication used in Machine Language. The principles of BITWISE ANDING was presented in the section entitled, "The IPv4 Address Class System", which is the mathematical method used by the Computer when the Subnet Mask or the Default Subnet Mask is used to resolve either a Network or Host IP Address. That is, if you were given a Decimal Network IP Address of 172.16.182.19, the Machine or Computer could not read nor translate these Integers into any usable format. That is to say, there is a Translator for the Input and Output for the Computer, because its language is of the Binary Format. In other words, the Computer would read the Input of the IP Address, 172.16.182.19, as that given by figure 1. Figure 1 Bit Map of the 32 Bit IP Address 10101100 00010000 10110110 00010011 However, through the use of the Default Subnet Mask, 255.255.255.000, and its Binary translation, as given in figure 2. The Computer or Router could, through the use of Bitwise Anding resolve the Network Address for the given IP Address, as shown in figure 3. Whose Decimal translation through the Binary Mathematics of Bitwise Anding would yields the Network IP Address as, 172.16.182.000. Figure 2 Bit Map of the 32 Bit IP Address 11111111 11111111 11111111 00000000 Figure 3 Bit Map of the 32 Bit IP Address 10101100 00010000 10110110 00000000 Nevertheless, there are several advantages that can be ascertained through the use of the Subnet Mask, and even more, if the mathematics of Bitwise Anding remain same. In other words, the problems associated with the difference between the Binary and Decimal methods of enumeration do not exist within the Machine's Mathematical Calculations for the Translation into the Binary format. That is, the Binary Format allows for the manipulation of individual BITS. Where by, the resulting Decimal Translation could be either a Fraction or an Integer. In which case, it is assumed that any resulting Fractional Component produces a Range of possible Subnet numbers in which several Network IP Addresses might belong. (Supernetting) Nonetheless, the Breaking-Up, or the division of any Network into smaller Sub-Networks, is called Subnetting. Which is accomplished through the use of the Subnet Mask. Where the Subnet Mask can be used or mapped onto any Octet, except the first Octet, which is used to identify the Address Class Range to which a particular IP Address might belong. Needless to say, there is a De Facto process by which a Subnet Number is chosen, and these numbers are given in Table 7. TABLE 7 Values of Least Binary Decimal Number Significant Bit: Representation: Equivalent: of Subnets: Host / per 0 00000000 0* 0 0 2^7 10000000 128 1 128 2^6 11000000 192 3 64 2^5 11100000 224 7 32 2^4 11110000 240 15 16 2^3 11111000 248 31 8 2^2 11111100 252 63 4 2^1 11111110 254 127 2 2^0 11111111 255* N/A Note: The 'Asterisk' represents Values that can not be used by the OCTET, which is define by the 'Subnet Mask', this is a Law/Rule. Nonetheless, the first example of the use of the Subnet was that of the Default Subnet Mask, which was used with the Binary Mathematical operation of Bitwise Anding to resolve the Network IP Address. However, from the list summarized by Table 7, the Subnetting concept can be further expanded, and use in an example to demonstrate the division of a Network Address into several smaller Network Addresses. That is, if given the Parent Network IP Address of '172.16.0.0', for which smaller Subdivisions are sought. This being the conclusion based upon an examination of the over all Network performance and needs. Then the appropriate Subnet Mask can be derived from the 7 choices given by Table 7 based upon the conclusions. Wherefore, if '252' is chosen, the IP address of this Decimal Number corresponds to the Subnet Mask given by an IP Address of '225.255.252.0'. In which a total number of 63 available Subnets can be generated from '252'. Which is the result generated by its (252) division by the factor determined as being the value of the Least Significant Bit of its Binary Representation (4). However, the inclusive count would maintain a composite value equal 64, which includes 252 in the total. Nevertheless, the resulting Subnet IP Addresses generated would be determined by sequential additions of the Least Significant Bit (4) to the Parent IP Network Address. Which also determine number of hosts per Subnet, and is summarized in Table 7. Notwithstanding, that the example above was a demonstration of the concepts and underlining the principles of Subnetting. However, its principles and concepts needless to say, is the foundation of which the principles underlining the concept of Supernetting is derived. Moreover, since it is the First Octet that is reserved for the Identification of the IP Address Class to which any IP Address belongs. The example chosen could have been selected from any one of the 3 primary IP Address Classes. Hence, Supernetting is the Subnetting of an IP Address having the Default Skeletal Structure as defined for the Class A. (The depiction rendered by this conclusion, is summarized in Table 8 of the next chapter.) The concepts for the principles and beliefs in the Classless System, in closing, is a derivation from the concepts of CLASSLESS INTERDOMAIN ROUTING (CIDR). In which, the basic strategy is the AGGREGATION of Multiple Divisions of an IP Address Class into One Network. Whose size would exceed that of the initial IP Address Class, and could be Routable using a 'One Route Path' for its thoroughfare. In other words, the only real difference between the CLASS and CLASSLESS Systems is that of the Routing Methodology they employ. Chapter I: An Overview of IPv7 the Expansion of Ipv4 The suitable replacement for IPv4 is IPv7, because it provides a greater adherence to the rules of any logical system having an underlining mathematical foundation. Furthermore, while the differences are small modifications to its foundational structure. It is nonetheless, an exploitation and expansion of IPv4. Which the analysis of Tables 4, 5, and 6, including the concepts of Supernetting, produces the results in Table 8 that provide the justification for the results of Table 9. In other words, the vast majority of the grounding principles and applications of IPv4 would be the same in IPv7. Nonetheless, it should be reasonably clear, that a Logical Foundation is the mandated requirement for any system to maintain longevity as an Organized Hierarchical Class Structure. In which case, the words 'De FACTO' and 'De JURE' would not have any relevant significance. Which would warrant the acceptance or use, of some standard that has no rational or logical foundation of its structure or application. Notwithstanding however, the Naming convention is arbitrary. That is, to avoid the problems associated with encoding '4.2', since IPv6 is being used, IPv7 was the next logical choice. Table 8. " The Reality resulting from Supernetting, the combination of TABLES 4 and 5 yields" Class A, 1 - 126, Default Subnet Mask 255.y.y.y: 126 Networks and 2^24 Hosts: 0 Total Number of IP Addresses Available: 126 x 16,777,216 = 2,113,929,216 Class B, 128- 191, Default Subnet Mask 255.y.y.y: 2^6 Networks and 2^24 Hosts: 10 Total Number of IP Addresses Available: 64 x 16,777,216 = 1,073,741,824 Class C, 192 - 223, Default Subnet Mask 255.y.y.y: 2^5 Networks and 2^24 Hosts: 110 Total Number of IP Addresses Available: 32 x 16,777,216 = 536,870,912 Class D, 224 - 239, Default Subnet Mask 255.y.y.y: 2^4 Networks and 2^24 Hosts: 1110 Total Number of IP Addresses Available: 16 x 16,777,216 = 268,435,456 Class E, 240 - 254, Default Subnet Mask 255.y.y.y: 15 Networks and 2^24 Hosts: 1111 Total Number of IP Addresses Available: 15 x 16,777,216 = 251,658,240 Note: Without having the Default Subnet Masking Define as limiting the values of the Octet to the Address Range of the Class in which it is mapped. Then, only the Value of the First Octet in any IP Address can Determine the IP Address Class of which, the resulting IP Address might belong. This means that, the Total number of IP Addresses available is equal to the Binary Bit Count of the Address Range multiplied by the Host Bit Count, 2^24. That is, every Class can maintain the Default IP Address as given for the Class A, which justifies the Expansion as given in Table 7. Table 9. "Structure of the 'IDEAL' Decimal Representation of the IP Class System" 1. Class A-1, 1 - 126, Subnet Identifier 255.000.000.000: 126 Networks and 254^3 Hosts: 0 Class A-2, 1- 126, Subnet Identifier 255.255.000.000: 126^2 Networks and 254^2 Hosts: 0 Class A-3, 1 - 126, Subnet Identifier 255.255.255.000: 126^3 Networks and 254 Hosts: 0 2. Class B-1, 128 - 191, Sublet Identifier 255.000.000.000: 64 Networks and 254^3 Hosts: 10 Class B-2, 128 - 191, Subnet Identifier 255.255.000.000: 64^2 Networks and 254^2 Hosts: 10 Class B-3, 128 -191, Subnet Identifier 255.255.255.000: 64^3 Networks and 254 Hosts: 10 3. Class C-1, 192 - 223, Subnet Identifier 255.000.000.000: 32 Networks and 254^3 Hosts: 110 Class C-2, 192 - 223, Subnet Identifier 255.255.000.000: 32^2 Networks and 254^2 Hosts: 110 Class C-3, 192 - 223, Subnet Identifier 255.255.255.000: 32^3 Networks and 254 Hosts: 110 4. Class D-1, 224 - 239, Subnet Identifier 255.000.000.000: 16 Networks and 254^3 Hosts: 1110 Class D-1, 224 - 239, Subnet Identifier 255.255.000.000: 16^2 Networks and 254^2 Hosts: 1110 Class D-3, 224 - 239, Subnet Identifier 255.255.255.000: 16^3 Networks and 254 Hosts: 1110 5. Class E-1, 240 - 254, Subnet Identifier 255.000.000.000: 15 Networks and 254^3 Hosts: 1111 Class E-2, 240 - 254, Subnet Identifier 255.255.000.000: 15^2 Networks and 254^2 Hosts: 1111 Class E-3, 240 - 254, Subnet Identifier 255.255.255.000: 15^3 Networks and 254 Hosts: 1111 Note: The Equation for Determining the IP Address Range for any IP Class is; (REN - RBN) + 1 = Total of Available IP Addresses for the given Class. (Where R = Range, E = End, B = Beginning, N = Number) However, the resulting expansion, that is IPv7, as summarized in Table 9 raises an issue, while not a major problem. It does indeed, represent a Mathematical Conflict within the of IPv7 Class Addressing Scheme, as depicted in Table 9. Where by, the Mathematics Analysis reveals that the Second Octet of the Primary Section of Each Class maintains a Set of Values within each of their respective IP Address Ranges. Which can not be employed or used as part of the count resulting in the total number of available IP Addresses. This is because they are not available as a valid IP Address, and if they were, then there would exist a mathematical conflict with the calculation of the total number of available IP Addresses of the Secondary Section for each IP Address Class. In other words, there would arise an error in reporting the results of the calculated totals. This can easily visualized when compared with the results of the second Octet of the Secondary Section for each of the IPv7 Class Address Ranges. That is, there exist a barrier imposed by the use of the Subnet Identifier of the second Octet from the Secondary Section of each IPv7 Class Address Schemes, with bars the use of any of the numbers given by the IP Address Range for that given IP Address Class. This is seen true, because the 1 - 254 total Host Count, does indeed contain all of the numbers available to be used as IP Addresses. However, this does not cripple the IPv7 Class Addressing System. Where by, the calculation of the mathematical difference between IP Address Range for each Class and the total Host count would yield the valid Address Range that can be use to calculate that total number of available IP Addresses. This however, is provided that there exist a distinction between, and definitions for the 'Default Subnet Mask', the 'Subnet Mask', and the 'Subnet Identifier', which are given below. Definitions 1. The Subnet Identifier defines the Default Subnet Mask and the Octet, which can only be assigned the values specified by in the IP Class Address Range within boundaries of IP Address Class in which it is used. 2. The Default Subnet Mask has a Binary value of 11111111 and a Decimal value of 255, it is used calculate the IP Network Address and to map the location of the Network portion of the IP Address defined by the Subnet Identifier. 3. The Subnet Mask is used to divide any Parent Network IP Address into several smaller and Logical Sub-Networks. When used in conjunction with the Default Subnet Mask, it identifies the resulting Sub-Network IP Address it was used to create. Nonetheless, the analysis of mathematical procedures for the elimination of this discrepancy is achieved by definitions resulting from the Laws of the Octet, which are summarized in Table 10. TABLE 10 {" The Laws of the Octet "} 1. By definition, there exist 3 distinct Sections or Divisions for every IP Address Class. However, the number of Sections or Divisions is dependent upon IP Bit Address Range defined for the IP Address. 2. The Sections or Divisions of the IP Address Class are defined as: Primary, Secondary, Ternary, etcàAnd are labeled according to their respective Class Location (e.g.: Class A would be Class A-1, Class A-2, Class A-3, and continued as would be necessary to distinguish the remaining Classes, B - E.) 3. The Subnet Identifier assigns to any Octet it defines in any Section or Division of every IP Class, when not use as the Default Subnet Mask, only the value of the numbers available in the IP Address Range assigned to that IP Class. 4. For every OCTET in any Section or Division of any IP Class that the Subnet Identifier does not define, can be assigned any value in the range of 1 - 254. That is, provided that there is no succeeding Section or Division, or if, there is an OCTET in a succeeding Section or Division, whose reference is the same, then it can not be defined by the Subnet Identifier. {This is seen true, because the Octet of this Section or Division, could not be in a Succeeding Section or Division which the Subnet Identifier can define.} 5. For every OCTET within any Section or Division of any IP Class, that is defined by the Subnet Identifier and is preceded by a Section or Division whose reference is the same Octet. Where the case is such that, the Octet of the preceding Section or Division is not defined by the Subnet Identifier. Then the Octet of the preceding Section, or Division, can not be assigned any value as given by the IP Address Range assigned to that IP Class. Needless to say, this situation can be further explored, through mathematical calculations. Where in the given example in this case would be Class A-1 and Class A-2. 1. Class A-1, 1 - 126, Subnet Identifier 255.000.000.000: 126 Networks and 254^3 Hosts: 0 2. Class A-2, 1- 126, Subnet Identifier 255.255.000.000: 126^2 Networks and 254^2 Hosts: 10 Nevertheless, the examination of these classes yields the conclusion. That if Class A-1's second Octet were to maintain any of the values in the IP Address Range, 1 - 126, then it would be reporting IP Address of Class A-2 because the second Octet of this Class is defined by the Subnet Identifier. However, the easiest mathematical method for the determination of the total number of available IP Addresses from Class A-1 would be to calculate the total number of IP Addresses available from its original configuration. Then subtract the value as would be determined from the calculation of the Class A-1 IP Address configuration that can not be used. In which case, we have: 3. Class A-1, 1 - 126, Subnet Identifier 255.126.000.000: 126 Networks and 254^2 Hosts: 0 4. 126 * (254)^2 = 8,129,016 Where the total, would be that given as: 5. 126 * (254)^3 = 2,064,770,064 In other words, the total number of available IP Addresses in Class A-1, that could be assigned as a Global (Parent) Network IP Address for connection to the Internetwork (That is, other than for use in a Private Domain Network), would be the difference between these equations. As given by: 6. 2,064,770,064 - 8,128,016 = 2,056,641,048 This method is summarized in Table 11. Where the results of equation 6 equals the total number of IP Addresses available for assignment as a Parent Network in a Global Internetworking Environment, and the results of equation 4 yield the number of Hosts that can be repeatedly assigned and used as private Domain Network IP Addresses. In which case, one would need to access the Parent Network to have access to any of these internal private Networks and Hosts identified by these IP Addresses. Thus, there would be no conflict from there continued use, which is the process now employed. Table 11. "Reality of the Structure of the Decimal Representation for the IP Class System."(Where the Value for the variable 'X' is given by the Rules in Table 6.) 1. Class A-1, 1 - 126, Subnet Identifier 255.x.x.y: 2,073,026,844 Networks and 8,033,256 Hosts: 0 Class A-2, 1- 126, Subnet Identifier 255.255.x.y: 1,028,256,768 Networks and 31,752 Hosts Class A-3, 1 - 126, Subnet Identifier 255.255.255.y: 472,660,218 Networks and 252, or X = 0, 253 Hosts 2. Class B-1, 128 - 191, Subnet Identifier 255.x.x.y: 1,052,966,016 Networks and 4,080,384 Hosts: 10 Class B-2, 128 - 191, Subnet Identifier 255.255.x.y: 265,281,792 Networks and 16,128 Hosts Class B-3, 128 -191, Subnet Identifier 255.255.255.y: 66,584,576 Networks and 252, or X = 0, 253 Hosts 3. Class C-1, 192 - 223, Subnet Identifier 255.x.x.y: 526,483,008 Networks and 2,040,192 Hosts: 110 Class C-2, 192 - 223, Subnet Identifier 255.255.x.y: 66,316,416 Networks and 8,064 Hosts Class C-3, 192 - 223, Subnet Identifier 255.255.255.y: 8,323,072 Networks and 252, or X = 0, 253 Hosts 4. Class D-1, 224 - 239, Subnet Identifier 255.x.x.y: 263,241,504 Networks and 1,020,096 Hosts: 1110 Class D-1, 224 - 239, Subnet Identifier 255.255.x.y: 16,577,088 Networks and 4,032 Hosts Class D-3, 224 - 239, Subnet Identifier 255.255.255.y: 1,040,384 Networks and 252, or X = 0, 253 Hosts 5. Class E-1, 240 - 254, Subnet Identifier 255.x.x.y: 246,788,910 Networks and 956,340 Hosts: 1111 Class E-2, 240 - 254, Subnet Identifier 255.255.x.y: 14,569,974 Networks and 3,276 Hosts Class E-3, 240 - 254, Subnet Identifier 255.255.255.y: 857,250 Networks and 252, or X = 0, 253 Hosts Note: The Rules given in Table 6 and Table 10 (Laws of the Octet) Limits the Range for the Value of the Variable 'X'. That is, when 'X' represents the HOST, then the Range of Values that 'X' can be assigned is given by the Equation: {X | If X = Y, then X = ([256 - 4] + 1)}. (X can never be Equal to the Numbers; 256, 255, 111, or 000) That is, if and only if, there exist no condition where 'X = N = Y', and N = the Octet defined by the Network IP Address, where when true, then {X | X = ([256 - 5] + 1)} However, when 'X' represents the Network, then the Range of Values that 'X' can be assigned is governed by the Laws of the Octet (Table ??) and given by the Equations: {X | If X = Y, then X = ([256 - 3] + 1)}, where 'X' can never be assigned the values, 256, 255, or 111. Or {X = X | If X = N, then ([256 - 2] + 1)}, where 'X' can Never be assigned the values, 256, or 255. The Subnetting features of Supernetting did not eliminate the IP Address Classes it just changed the format of the structure of their IP Address, which made the Class C become more appealing to the businesses seeking Global Internetworking Connections. However, the benefit was indeed significant to distribution and the availability of IP Addresses. This fact is evinced as a result of the Class restructuring its use ultimately produced. Which caused an increase in the number of IP Addresses available of Class B to twice its original value, and about 12 million for Class C. However, IPv7 doubles even this amount from its expansion of the IPv4 32 Bit Addressing Scheme. In other words, IPv4 offered approximately 3.12 * 10^9 IP Addresses, and Supernetting increased the number of available IP Addresses to approximate 3.6 * 10^9. While IPv7, its expansion given by Table 11, renders the number of available IP Addresses as being approximately 5.6 * 10^9. Which, to say the very least, is nearly double the original value, and the IP Address Bit Range remains '32'. The Binary Representation resulting from the use of Supernetting and IPv7, is summarized in Table 12 and 13 respectively. Table 12. "The Reality resulting from Supernetting, the Binary Representation" Class A, 1 - 126, Default Subnet Mask 255.y.y.y: 126 Networks and 2^24 Hosts: 0 Class B, 128- 191, Default Subnet Mask 255.y.y.y: 2^6 Networks and 2^24 Hosts: 10 Class C, 192 - 223, Default Subnet Mask 255.y.y.y: 2^5 Networks and 2^24 Hosts: 110 Class D, 224 - 239, Default Subnet Mask 255.y.y.y: 2^4 Networks and 2^24 Hosts: 1110 Class E, 240 - 254, Default Subnet Mask 255.y.y.y: 15 Networks and 2^24 Hosts: 1111 Table 13 Structure of the Binary Representation IPv7 Class System 1. Class A-1, 1 - 126, Subnet Identifier 255.000.000.000: 126 Networks and 2^24 Hosts: 0 Class A-2, 1- 126, Subnet Identifier 255.255.000.000: 2^15 Networks and 2^16 Hosts: 0 Class A-3, 1 - 126, Subnet Identifier 255.255.255.000: 2^23 Networks and 2^8 Hosts: 0 2. Class B-1, 128 - 191, Subnet Identifier 255.000.000.000: 2^6 Networks and 2^24 Hosts: 10 Class B-2, 128 - 191, Subnet Identifier 255.255.000.000: 2^14 Networks and 2^16 Hosts: 10 Class B-3, 128 -191, Subnet Identifier 255.255.255.000: 2^22 Networks and 2^8 Hosts: 10 3. Class C-1, 192 - 223, Subnet Identifier 255.000.000.000: 2^5 Networks and 2^24 Hosts: 110 Class C-2, 192 - 223, Subnet Identifier 255.255.000.000: 2^13 Networks and 2^16 Hosts: 110 Class C-3, 192 - 223, Subnet Identifier 255.255.255.000: 2^21 Networks and 2^8 Hosts: 110 4. Class D-1, 224 - 239, Subnet Identifier 255.000.000.000: 2^4 Networks and 2^24 Hosts: 1110 Class D-21, 224 - 239, Subnet Identifier 255.255.000.000: 2^12 Networks and 2^16 Hosts: 1110 Class D-3, 224 - 239, Subnet Identifier 255.255.255.000: 2^20 Networks and 2^8 Hosts: 1110 5. Class E-1, 240 - 254, Subnet Identifier 255.000.000.000: 15 Networks and 2^24 Hosts: 1111 Class E-2, 240 - 254, Subnet Identifier 255.255.000.000: 2^12 Networks and 2^16 Hosts: 1111 Class E-3, 240 - 254, Subnet Identifier 255.255.255.000: 2^20 Networks and 2^8 Hosts: 1111 Note: The number of Networks in the Primary Division of each Class, is the Quantified difference between the IP Address Range Plus 1, for each respective Class Boundary's. [(REN - RBN) + 1)]. Moreover, the Sublet Identifier, 255, has a Binary Representation of; 11111111. Nevertheless, by exploiting the Default Subnet Mask, that is, understanding its real purpose as used in BITWISE ANDING. Which is IP Network Address Resolution by determining the value of the defining Octet. Then anyone could easily visualize that, the former IPv4 Class Addressing Scheme, as summarized in Tables 4 and 5, warrants the expansion to that given by Table 11. Where the Default Subnet Mask, now the Subnet Identifier, assumes the duties of its actual definition. That is, it remains the Default Subnet Mask, which when used in Bitwise Anding serves to resolve the Network IP Address. This working definition provides further justification for the acceptance of IPv7. Especially since, IPv7 can now be viewed as the expansion of the IP Classes from the change in the Default Structure defining each division of the IP Class, which resulted from the use of Supernetting. However, this produced a change in all of the Structures of the IP Classes to the Default Structure as depicted for the Class A. Needless to say, this is the definitive proof that IPv7's evolution is founded upon changes made in IPv4, which compensate for the shortages in the number of available IP Addresses. Nevertheless, these changes are the foundational premises of deductive reasoning, for the logical conclusion, which necessitates IPv7, and offers a cost free solution for the shortages in the number of available IP Addresses. In other words, IPv7 is nothing more than a 'TRANSPARENT OVERLAY' for IPv4 Addressing System, which increases the number of available IP Addresses, and makes absolutely no other changes to any of the underlining foundations characterizing IPv4. Note: Other than the clarification of the functional purpose, enhanced specification for the definitions of a few terms, and the expansion the of the of IP Classes reduced by the use of Supernetting, IPv7 only provides a greater logical Structure, because nothing else changes as a result of its implementation. Chapter II: An Overview of IPv8 the Enhancement of Ipv7 The over all structure and organization regarding the overview of IPv8 offers no change to the foundation, as rendering a major distinction from that underlining IPv7. In other words, it is viewed as an enhancement of IPv7. Where by, IPv8 offers separate copies of the IP Addressing Scheme, as summarized in Table 11. Thus, providing a broader distribution and use of an unlimited number of available IP Addresses for the population of the entire World. Nevertheless, this is evinced by IPv7's IP Address Totals is nearly equal to the present World Population, which is approximately one IP Address assignment per person. In other words, the enhancement offered by IPv8 is characterized by the use and implementation of PREFIXES to the IP Address, such as, 'Country Codes', 'Zone Codes', and 'Area Codes'. The employment of these measures not only guarantees the promises of the IT Industry, while reducing the cost of Long Distance Telephone Calls, but offers a significant boost over the use of 'CIDR' in Router performance, as shall be discussed in the next chapter. In other words, the promises of the IT Industry encompassing the Interactive Television, Live Video Telephone Systems, Video Teleconferencing, and the evolution of a Global Telecommunication Community which encompassed everyone having a telephone today, becomes the Reality of its Dreamers. That is to say, with the implementation of IPv8, all of the promises of the IT Industry would now depend only on the development of the technology to produce these systems. Chapter III: 'The Header Structure in IPv7 & IPv8' The IP Addressing Scheme of IPv7 can serve the Global Internetworking Community now. Its implementation offers some significant improvements over any system presently in use. However, while there is a learning curve, it would actually impose no challenge for the seasoned professional. In fact, there are four reasons that support the its implementation and the reality of it being the suitable replacement for IPv4. 1. It provides over 2 Billion additional IP Addresses. 2. Its Header does not change from that used in IPv4, which means the version number can remain the same. 3. It is only a 'Transparent Overlay' of the Addressing System used in IPv4, which changes absolutely nothing else. 4. It is a Logical Derivative of the IPv4 Addressing System, which eliminates all of the 'PREDEPLOYMENT' testing requirements. In other words, IPv7 is a system that can be used now, which provides the ease of use and implementation of IPv4. While at the same time, providing an almost seamless transition for its enhancement, IPv8. Nevertheless, while IPv7 is called the "Global Internetworking Community", IPv8 is called the "Global Telecommunication Community". The difference however, distinguishing these systems, are two fold. Where by, the former is a shared IP Addressing System, which utilizes the Network medium for limited communication. However, the latter represents a Global Standardization for all Telecommunications Systems in use today. The advantages of IPv8 however, surmount far beyond any 32 Bit IP Addressing System now employed, or ever conceived. Nevertheless, while retaining the ease of use and implementation of IPv7, IPv8 provides an available number of IP Addresses that's staggering, to say the very least. In other words, the comparable analogy would be, IPv7 can provide an IP Address to every individual in the world today. While IPv8, can provide the same number of people with an individual IP Address on over 4 Billion worlds. That is to say, the people of planet Earth can colonize 4 Billion planets with a population equal to the existing count, and still have reserve IP Addresses. Nevertheless, while the foundations underlining IPv8 is the same as those of IPv7. There is indeed a distinction between these two systems, which accounts for the staggering number of available IP Addresses. The difference, while similar to IPv6, is the change in the structure of the IP Header associated with IPv8, and their depiction is given in Figure 5. Figure 5 IP Header for IPv4 and IPv7 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | VER | IHL | TYPE OF SERVICE | TOTAL LENGHT | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | IDENTIFICATION |FLA| FRAGMENT OFFSET | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | TIME TO LIVE | PROTOCOL | CHECK SUM HEADER | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | SOURCE ADDRESS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | DESTINATION ADDRESS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | OPTIONS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | DATA | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| |-------------------------------------------------------------| IP Header for IPv8 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | VER | IHL | TYPE OF SERVICE | TOTAL LENGHT | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | IDENTIFICATION |FLA| FRAGMENT OFFSET | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | TIME TO LIVE | PROTOCOL | CHECK SUM HEADER | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | RESERVED S | S RESERVED | IP S ZONE CODE | IP AREA CODE | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | SOURCE ADDRESS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | RESERVED D | D RESERVED | IP D ZONE CODE | IP AREA CODE | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | DESTINATION ADDRESS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | OPTIONS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | DATA | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| |-------------------------------------------------------------| IP Header for IPv6 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 | VER | PRIO. | FLOW LABEL | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| | PAYLOAD LENGTH | NEXT HEADER | HOP LIMIT | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| |-------------------------------------------------------------| | | | | | | | SOURCE ADDRESS | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| |-------------------------------------------------------------| | | | DESTINATION ADDRESS | | | | | |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| |-------------------------------------------------------------| |+ + + + + + + + + + + + + DATA + + + + + + + + + + + + + + + | |-------------------------------------------------------------| Nevertheless, the obvious lack of a detailed analysis of the Headers reduces the IPv8 Header to one being that of a suggestion. However, it is clear that IPv4 and IPv7 can share the same Header. But, from the structure as offered as choice for the Header of IPv8, an explanation is indeed warranted. Where by, the over all structure of the IPv8 Header of figure 5 is similar to that of IPv6, except that it 'Divides' the Source and Destination Sections of IPv6's Header Structure. However, its defining purpose is the same as that given for IPv7. The distinction however, is the addition of two additional sections, one for the Source and the other for the Destination. These additions make provisions for a greater individual use and deployment of this IP Addressing Scheme. Where by, above the Source Address Section exist another 32 Bit Section, which is divided into 4 distinct and separately defined Octets. There are 2 Octets reserved for growth and expansion, and another is defined as the Source Address Zone, while the last is defined as the Source IP Address Area Code. The Destination Address Section also has an additional 32 Bit section, which has comparable assignments, excepting that, they are defined for the Destination Address Section. Nevertheless, the numbering system employed for use in these sections is defined as the same as that governing the IP System of Address. While the Structure of this addressing system is given by Figure 6. FIGURE 6 1. Source Addressing Structure: 255:255:255.000.000.000 2. Source Addressing Structure: 255:255:255.255.000.000 3. Source Addressing Structure: 255:255:255.255.255.000 4. Destination Addressing Structure: 255:255:255.000.000.000 5. Destination Addressing Structure: 255:255:255.255.000.000 6. Destination Addressing Structure: 255:255:255.255.255.000 Notice that the Primary, Secondary, and Ternary IP Address Classes are also shown in addition to that of the Zone and IP Address Area Codes for the Source and Destination Addresses. Furthermore, it should be clear that each Octet preceding the IP Address is separated by a Colon, which not only indicates their distinction but an order of precedence as well. In other words, the establishment of a sequential order is another boon for IPv8. Especially when considering the Routing and networking implications. Where by, CIDR attempts to improve Router performance through the use of the Subnet Mask by looking at the Back End of an Aggregation the IP Address. Thus, allowing a reduction in the size of the Router's Table, and increasing the thoroughfare by permitting the assignment of several IP Addresses to this Back End Address. However, the implementation of IPv8 suggests just the opposite. Where by, Router's become more specialized Address Forwarding Computers, consisting of three divisions, the Global, the Internetwork, and the Network. These three divisions serve to reduce the Router's Table, reduce Traffic, and enhance System Management. These benefits are accomplished by programming the Routers to Route using the Front End of the IP Addresses. Thus, achieving a significant Router performance, which is a far superior improvement over that which can be achieved using the CIDR technique. The reality of these benefits becomes even clearer when an understanding of Front End Addressing achieved. That is, the Network Router checks first the Zone Address, then the IP AREA CODE Address. This allows the Router to determine if the communication is an Intercom or an Outercom. In which case, if it is Outercom, the Router needs only to know the location, and or Hop Count, of the nearest Internetworking or Global Router. Which need only be 2 or 3 connecting Routes beyond the single Point of Failure. However, while all Intercom communications are Routed as belonging somewhere within the Domain of its Network. The only the communications destine to either the Global or the Internetworking Telecommunication Community would need to access the Global or Internetworking Routers, which are located outside the Domain of the Network. Furthermore, while the Global and Internetworking Routers employ similar, but the reverse techniques of CIDR, the One Route Thoroughfare for Multi IP Address Access. The Back End of the IP Address is not considered until the IP Packet reaches the Gateway Router of its intended Destination. This clearly offers a boon for the Telecommunications Internetworking Industry, because the Router's in place now, only need an up grade of the IOS to perform these tasks. Notwithstanding the obvious benefits, if IPv8 is implemented as the Standard for the Global Telecommunication System Interface. A simple IP Address can become, as planned, the replacement for the Telephone Numbers in use today, because software could be used to eliminate the need for anyone to maintain the obligation of having to remember any number beyond 15 digits. That is, their IP Address and its associated IP Address Area Code Prefix. Nevertheless, it should be very clear, by now, that there can exist 254 Zones, which could result in the independent implementation of the entire IPv8 Addressing Scheme that could have 254 IP Address Area Codes for each IP Address Class and their associated Divisions. Needless to say, while the implementation of IPv8 does noting in the elimination of Subnetting. It does however question, because of the staggering number of IP Addresses available, the need for Supernetting. Especially since, only the IP Addresses assigned to the individual, which is accompanied by its Zone and IP Address Area Code, could have or maintained access to the Global Telecommunications System. Chapter IV: The Principles of Subnetting in IPv7 & IPv8 The concepts and principles which underline the methods of Subnetting and its derivative, Supernetting, will not change. However, there some additional definitions and laws regarding their usage in IPv7 and IPv8. Nevertheless, these Laws and Definitions is a direct consequence of the information provided in the Overview, Table 10, and the definitions derived in Chapter I. Definitions 1. By Definition, every IP BIT Address is divided into sections called OCTETS. Where the first OCTET of any IP Bit Address must be Defined by the Subnet Identifier, and each Octet equals 8 Binary representations of either One's or Zero's that can collectively be Translated into one Decimal (Integer) Number. 2. Every Octet not defined by the Subnet Identifier, may be Defined by the Subnet Mask. Where the value of the Subnet Mask is defined as being equal to the resulting Difference Of Success Subtractions of the Binary number 1 = 2^0 = X and is given by the Equation: [SM = 2^7 - X]. Where by, the Subnet Mask = SM, and given by the Difference of each successive Subtraction of 2^0. 3. Every Network IP Address may contain at least one Subnet Mask. Where the Total Number of Subnet Mask that it can have, depend on the IP Bit Address Range Minus the first Octet in of the IP Address. 4. For every IP Address, having one or more Octets defined by the Subnet Identifier, also defines any IP Network Address which can be Subnetted. Where, if any Logical Division of an IP Network Address, creates multiple IP Addresses derived from the original. Then the derived IP Addresses are called Sub-Networks of the initial IP Address, which is said to be Subnetted. This is provided that every OCTET in the IP Bit Address Range is not defined by the Subnet Identifier. (Where the Subnet Identifier is equal to: 11111111 = 255; The Binary and Decimal Equivalents.). 5. Every Network IP Address having an Octet defined by a Subnet Mask, can be subdivided into only 1 Sub-Network. In which, there are a total of 7 possible logical Sub-Networks that may be defined. 6. For every Octet defined by the Subnet Mask for any Sub-Network IP Address. The Octet referenced as being the IP Network Address from which it was derived, can not be assigned any value in the IP Address Range of the derived Sub-Network IP Addresses. 7. The Laws of the OCTET are applied to every Octet defined by the Subnet Mask. That is, it can not be used in IP Address that would result in a conflict with any IP Address, whose Octet is defined by the Subnet Identifier. Where DE = the Decimal Equivalent that is also equal to the (BR) Binary Representation. That is, the Subnet Mask, can only be assigned the IP Address values summarized in the Table 7. Nonetheless, an example of this Binary Difference is given in Figure 4. Where by, given 2^7 = 11111111 = 255, is the Minuend, then successive Subtractions of 2^0 = 00000001 = the Subtrahend from the resulting Difference is equal to the Summary in Table 7. Figure 4 1. 11111111 - 00000001 = 11111110 = 254 2. 11111110 - 00000001 = 11111100 = 252 3. 11111100 - 00000001 = 11111000 = 248 4. 11111000 - 00000001 = 11110000 = 240 5. 11110000 - 00000001 = 11100000 = 224 6. 11100000 - 00000001 = 11000000 = 192 7. 11000000 - 00000001 = 10000000 = 128 8. 10000000 - 00000001 = 00000000 = 0 9. 11111111 - 11111111 = 00000000 = 0 Note: It should be clear that the Binary method of Subtraction is quite different from the Bitwise Anding method used by the Default Subnet Mask to resolve an IP Address. Nonetheless, there is a logical rationalization for the choice of the values of the Subnet Mask. Where by, the Binary Equations of Subtraction yields functional results, which has a 'Least Significant Digit', that is also the Factor use for the Translation of the Binary representation to its Decimal (Integer) Equivalent. TABLE 7 (Modification of Table 7 noted above) Least Significant Bit: Binary: Decimal: # of Subnets: Host / per | | | | | 0 00000000 0* 0 0 2^7 10000000 128 1 128 - 1 = 127 2^6 11000000 192 3 64 - 1 = 63 2^5 11100000 224 7 32 - 1 = 31 2^4 11110000 240 15 16 - 1 = 15 2^3 11111000 248 31 8 - 1 = 7 2^2 11111100 252 63 4 - 1 = 3 2^1 11111110 254 127 2 - 1 = 1 2^0 11111111 255* N/A N/A Note: The 'Asterisk' represents Values that can not be used by the OCTET, which is define by the 'Subnet Mask'. Nevertheless, since there exist a Total Count of 256 Decimal (Integers) representations expressing the total Number of available IP Addresses. That is, since this is an inclusive count of the given Range 0 - 255. Where by, equation 1, which enumerates this inclusive count, establish the Total number of IP Addresses in the Range '0 - 255'. 1. [(255 - 0) + 1] = 256. Moreover, this is also the Binary Representation, which equal of the inclusive count for the total addresses in the 0 - 255 Range. It can be concluded, that the Minuend 256, is some Multiple of the Number of Total Number of Hosts Bits. That is, given that calculation of this total, is also the inclusive count of the range comprising the Octets. In which case, the Binary Number of Hosts Available would be represented as 2^24, 2^16, and 2^8. Where by, these numbers represent a count relative to the Total Number IP Bit Mapped Host Addresses. However, if the case is such that, the total number of Host Bit available were, '65,536', and the Least Significant Digit given as '128'. Then, the Total of IP Host Bit Addresses available would be given by the equation 2. 2. [65,536 / 128 = 512] Furthermore, if the concept of Supernetting, was the Subnetting of the only Host Octet available in the Class C. Then, the total of IP Host Bit Addresses available, given a Least Significant Digit of 128, is equal to the equation 3. 3. [256 / 128 = 2] Nevertheless, the procedures involving Supernetting, as outlined in the Classless System, did not eliminate the Structure or concepts of the Class System. Especially since, it did not render any provisions to Subnet the only Host Octet available in the Class C. Needless to say, these conclusion clearly justifiable. Nonetheless, the change to the IP Address Skeleton of each Class as summarized in Table 8, and represents the structure of Class A. Notwithstanding, the Definitions and Laws defining the Internet Protocol Specifications for IPv7 and IPv8, which regarding their implementation, would change the concepts of Subnetting and Supernetting. That is to say, the definition of the Subnet Identifier imposes restrictions upon the availability of the Octets, which can be Subnetted or Supernetted. Given that, only the Host Octets are available, and those that can be Subnetted, are the last two within the IP Address. While Supernetting, is now defined as the process of Subentting the last Octet of an IP Address. In other words, the definitions and laws of IPv7 and IPv8 describe an outline for Supernetting and Subnetting, which can not violate the restrictions imposed. However, these changes do not usher any significant change, which would be a major departure from the foundational concepts of IPv4. In other words, except for the laws, definitions, and the resulting constraints imposed, the information provided herein, is the same as that which governed IPv4. Nevertheless, the Tables below summarize the logical format, which outlines the results of the concepts of Subnetting and Supernetting in IPv7 and IPv8. TABLE 14 Decimal & Subnets: Binary Result: Difference Factor: LSD: / ^ \ / ^ \ / ^ \ ^ / | \ / | \ / | \ | / v \ / v \ / v \ /v\ 1.(256 - 128) = 128 = 10000000, 256/128 - 128/128 = 1 2^7 2. 256 - 192 = 64 = 01000000, 256/64 - 192/64 = 1 2^6 3. 256 - 224 = 32 = 00100000, 256/32 - 224/32 = 1 2^5 4. 256 - 240 = 16 = 00010000, 256/16 - 240/16 = 1 2^4 5. 256 - 248 = 8 = 00001000, 256/8 - 248/8 = 1 2^3 6. 256 - 252 = 4 = 00000100, 256/4 - 252/4 = 1 2^2 7. 256 - 254 = 2 = 00000010, 256/2 - 254/2 = 1 2^1 TABLE 15 Subnetting Results in IPv7 and IPv8 Number: Binary Equation to Determine Available Bit Hosts: Equivalent: Subnet Bit Mask Hosts / | \ /|\ / | \ | 1. 512 = 2^9 (16 - 9 = 7) + 16 = 23 508 2. 1024 = 2^10 (16 - 10 = 6) + 16 = 22 1016 3. 2048 = 2^11 (16 - 11 = 5) + 16 = 21 2032 4. 4096 = 2^12 (16 - 12 = 4) + 16 = 20 4064 5. 8192 = 2^13 (16 - 13 = 3) + 16 = 19 8128 6. 16,384 = 2^14 (16 - 14 = 2) + 16 = 18 16,256 7. 32,768 = 2^15 (16 - 15 = 1) + 16 = 17 32,508 TABLE 15 Supernetting Results in IPv7 and IPv8 Number: Binary Equation to Determine Available Bit Hosts: Equivalent: Subnet Bit Mask Hosts / | \ /|\ / | \ / | \ 1. 2 = 2^1 (8 - 1 = 7) + 24 = 31 2 2. 4 = 2^2 (8 - 2 = 6) + 24 = 30 4 + 2 3. 8 = 2^3 (8 - 3 = 5) + 24 = 29 8 + 6 4. 16 = 2^4 (8 - 4 = 4) + 24 = 28 16 + 14 5. 32 = 2^5 (8 - 5 = 3) + 24 = 27 36 + 2 6. 64 = 2^6 (8 - 6 = 2) + 24 = 26 84 + 2 7. 128 = 2^7 (8 - 7 = 1) + 24 = 25 127 Note: The "+" after the Available Hosts Column reveals the number of Hosts remaining. However, this count can be adjusted, because its actual purpose is the determination of the number Hosts in relation to the number of BITS in the Subnet Mask for the Supernet. This situation becomes even more pronounced when the values assigned to the Last Octet of the Host must exclude, '111', '000', '255', and the number of the Supernet Mask (Which would also be a number included in the Network IP Address as well. For example; "255.255.255.Supernet Number".) Chapter V Conclusion: The Benefits of IPv7 and IPv8 The benefits from the implementation of IPv7 could be a reality now. This is because there are absolutely no changes in its Header, or any of the other specifications outlined in other RFC's pertaining to datagrams or its relation to other protocols. However, the addition of a more stringent adherence to the rules of Logic will, to most, seem beneficial. While, the growth in the number of available IP Addresses that are available for assignment and distribution, will usher a more stable growth of the Global Telecommunications Community. Moreover, while mistakes are unavoidable, they will not be an inherent part of the structure of this Addressing System. Furthermore, the benefits from the implementation of IPv8 will seem to overshadow the number of available IP Addresses it provides. That is, its implementation will foster the reality of dreams that were once thought the fantasy found in the pages of a Science fiction novel. This includes the simple problems as those experienced by the Telephone Companies, and the shortages in the supply of telephone numbers. Where by, the adoption of this system would change the count in the number of digits from the present 11, to a maximum of 15. Nonetheless, while this eliminates problems associated with growth and the constantly changing prefix. Its adoption could also change every concept in the Structure, Use, and Underlining Foundations of the Entire Telecommunication Industry. I mean, just think for a moment. Where, something as simple as the 'Junction Box', that now serves as the connecting and distribution point, for homes, business, and apartment complexes. It could quite conceivably, be replaced by a Network Server and a Router, which would lessen the burden associated with the cost of the present arrangement. In short, the existing Private Telephone System would be replaced with a Private Computerized Telecommunication System, and the Public Telephone System would become the Computerized Information Telecommunication Systems. These new systems could service the population of the entire World with any information available from some assigned Resource Distribution Center. While at the same time, IPv8 continues to open many other avenues of exploitation for the Industries of the Entire World. For example, the Television Industry, Cable Television Industry, the Video Telephoning and Video Teleconferencing Industry, are only a few of the many corporations that could benefit from its implementation. However, while this says nothing about the changes and benefits that its implementation offers the producer's of Networking equipment, or any of its associated Hardware and Software. It does nonetheless, bespeaks clearly about the promises and benefits of IPv8, which are indeed an endless reality bound only by the limits of our imagination. Security: The Relationship between IPv7 & IPv4, and the Suggested / Recommended Alternatives for IPv8 There are no differences between the security methodologies employed in IPv4 and that of IPv7. In fact, IPv7 is nothing more than an IP Addressing Scheme Overlay, which expands the number of available IP Addresses. Nevertheless, while there is an existing difference between these addressing Systems, they pertain only to the mathematical operations involving the calculation of the IP Addresses, which are now governed by a Set of Logical Laws. Furthermore, when noting their version numbers, since IPv7 is not an assigned version number, it is not necessary to change from the present use of IPv4. In other words, IPv7 is IPv4 having more IP Addresses available for distribution. That is to say, since it does not require even a version number change for compatibility, IPv7 is IPv4. This also means that the rigorous testing required of a New IP Addressing System can be eliminated. Furthermore, while IPv8 is an enhanced IPv7, it does impose differences, as seen in the IP Addressing System employed, which should not pose any challenges for the IP Community to examine or test. However, this is not to say, that the implementation of Security measures will not be different from that now used in IPv4. What I am saying, is that, IPv8 will prove far less cumbersome than IPv6. This fact will become even more pronounced when it is realized that the consideration for any determination regarding the level of difficulty in the implementation of a Security System, is indeed dependent upon the IP Addressing methods of enumeration. Nevertheless, it should be clear that another distinction maintained by IPv8, which is a provision allows for a separation or division of the Security measures employed. This is a result of the 'Address Block' configuration, which provides a way to Address, Separate and Distinguish the Different Segments of the 48 Bit IP Address in IPv8. However, the result of this method allows for the creation of 3 levels of Security, because there are 3 separate and distinct IP Addresses that equal the total of this 48 Bit configuration; (YYY:JJJ:XXX.XXX.XXX.XXX or 255:255:255.XXX.XXX.XXX). This however, emphasizes a greater the need for Security measures, which should be employed to control InterCom and OuterCom communications of the Global Internetwork. This reality is evinced by the fact that, the Global Telecommunications Community for the first time, will assume its true identity. Where by, because of the need for an ISP to establish the connection to the Internet. We become impressed with the thoughts of the Global Telecommunications Community (The Internet) as being a Dynamic Communications System. That's always on, and never sleeps. However, this is a miss conception, or interpretation of that which is truly as Static System. That is to say, the Global Telecommunications Community (The Internet) is only a thoroughfare, which is not unlike the cable connecting the telephones we use. In other words, to have a single connection requires a Link. It does not matter, if this Link or connection you dialed, provides you with a Requester or an IP Address. The point to be made, is that, a connection must be established with someone, who will grant access to his or her location on party Line. What this means, is that, the Internet is only a Cable. While the Global Telecommunication's Community, is indeed a Community, which consists of several Millions of People who have jointly agreed to become members of this Party Line. Thus, allowing access to their Telecommunications information System, to anyone whom has agreed to become a member. Nevertheless, IPv8 transcends this present and limited notion of the Internet, and truly provides everyone with access to the Global Telecommunications Community. Where by, everyone in the world having a telephone today, would have controllable access to this Party Line. However, everyone connected to the Global Telecommunications Community would use the IPv8 Addressing Configuration related to the connection of the Destination Address with whom they chose to communicate. In other words, if the Destination was located within the Zone and IP Area Code of the Source, then they would only need to use the 32 Bit portion of the 48 Bit IP Address. This is because the Router used to Transmit the communication would be a InterCom Router, capable of routing the IP Area Code Address Block and the 32 Bit IP Address indicating the Network IP Address of both the Source and Destination locations. Needless to say, this diverse functionality provides a greater expansion of the IPv7 IP Addressing System without any sacrifice in the over all Security, as would be the case if a significant departure from the IP Addressing System now employed, were implemented. In fact, the knowledge gained through the implementation of the Security measures in IPv4, should provide a strong foundation for any transition to IPv8. What this means, is that, the degree and type of Security can vary as a matter of choice or concern. For example, an Administrator could use the same level of Security for IntraDomain Communication (InterCom)and either increase or use a different, more specialized type of Security measure for the OuterDomain Communication (OuterCom). In other words, one suggestion that would create this possibility, is to employ a software tool that would allow the user to differentiate the locations they desire to establish a communication with, which is prefixed by either or both, the Zone IP or IP Area Code. The software would then, automatically configure the corresponding IP Addresses within the datagram, which is identical to the current methods in use. This would allow all communication that exist within the same Zone IP and IP Area Code Address to be the same as that which is presently employed. The reality of this process is derived directly from the concept of the Smart Router. Whose programmed task, when routing any transmissions, is that of Striping either the ZONE IP, the IP Area Code, and some sequence of the Network IP Address related to its location for delivery of the transmission to its destination. Nevertheless, this method reduces somewhat, the complexities of implementing Security measures for a 48 Bit System to that of a 32 Bit System, which would resemble IPv4 and IPv7. Whose Security can be controlled by the same methodology, that being, Software Encryption and Access Rights, which is now employed. What this suggests, is that, IPv8 can have 3 distinct levels of Security, which can be implemented automatically by the Routers, and or controlled by Software. What this implies, is that, every Domain must have a minimum of 3 types of Routers to control IP routing and Security; the IntraDomain Router (InterCom Router), the Internetworking Router (OuterCom Router), and a Global Telecommunications Router (Global Router). Their functional purpose would not only facilitate Routing, but enhance Security Communications as well. This is because the methods of Routing employed would consist of the Front End of the IP Address, and Encryption of the Data Segment of the transmitted Packet. Where by, each type of Routers need only know the location of the next Router which routes the either the same IP Address Block or the next IP Address Block in the sequence. This would essentially have the effect of creating a One-Route Path having a Multi-IP-Address-Thoroughfare. That would allow Decryption of Datagrams either by specific Routers, or the Software of the intended Destination. Needless to say, this suggestion does not necessarily impose a challenge upon the Firewall. Where by, Security could be a combination of both, or just controlled by the Smart Router, and access to the InterCom from a Hacker transmitting from some location on the OuterCom would be, for them, the Fort Knox Challenge. In other words, the Router could be used for Decryption and Encryption of the communications it receive and transmits, or Encryption can be performed by the Router and Decryption could be performed by Software. Whose decryption key code is transmitted, embedded in the Datagram. There by, allowing the receiving destination's previous decryption code, to decrypt the Key Code to be used to determine the decryption sequence of the current transmission. The Cable Pay Television Industry could implement such a process. In which the Encryption, Decryption Software would be supplied by them to their customer. While the Global Router could control and be programmed for random sequencing of the Encryption, and corresponding Decryption Key to be sent with the transmission. However, the latter could be the likely scenario used in a High Security Area, such as the Military or some Top Secret Research Facility. Which would have the need to maintain strict control of the InterCom and OuterCom Transmissions. In other words, a Smart Router would be capable of discerning the type of Traffic it is passing. That is, the difference between a transmission that is Encrypted and one which is not, or that which has the correct encryption, and then perform the necessary functions of Decryption on one transmission, while being capable of sending both transmissions to their destinations. This would provide a common access control for Authentication and Synchrozation of the Encryption and Decryption Keys. Thus, providing the necessary Security to control the Inter and Outer Comm communications within the same Zone and IP Area Code. Which would in essence, provide places needing to regulate access to the Global Community or their InterCom, with the Security control they need to regulate the traffic entering or exiting their Domain. In other words, it is suggested that, IPv8 IP Addressing System should be implemented with 3 levels of Security, comprising 48, 40, and the 32 Bit IP Address possibilities it contains. These benefits however, might possess an additional cost, which the long run would prove it worthy. Nevertheless, it can be concluded that the benefits offered by the implementation of IPv8 within the same 'Zone IP Block Address' and 'IP Area Code', changes none of the Security procedures, which are now present in the use of IPv4 today. However, it is a Recommendation, since Global Telecommunications does require the use of the ZONE IP and IP AREA CODE BLOCK Addresses, that another 'DHCP' be specified for use in conjunction with the Global Router. This implementation is seen necessary not only for the 48 Bit IP Address and Network Name Resolution, but also because of the Additional Security Requirement that is fostered by the implementation of this IP Addressing System. Needless to say, this would provide the necessary Security benefits of having controlled access to the Global information in other Zones and or IP Area Codes, which would allow the continued use and enjoyment of the uniform security standard presently used in the 32 Bit IP Addressing System today. Nevertheless, these Enhanced Security Control Features should be viewed as a Boon, because they provide a much greater scrutiny and control over Inter and Outer Comm Communications for every Network Connected to the Global Telecommunications Community. However, this implementation is only possible through the use of the 'Smart Router' and the services provided from a second 'DHCP' Server. Which together, would provide the necessary functions and ability to make these enhanced security features possible. In other words, the recommendation is that, there should exist 2 'DHCP' Servers, one for connection to the Global Community and the other for Communications within the same 'Zone IP Address' and 'IP Area Code'. Nevertheless, these are for the most part suggestions, which can be considered as recommendations, and recommendations. The point made however, is that, with IPv8, any Security Implementation can be Built upon the foundation and knowledge gained from that existing in IPv4. This is not say, IPv8 can be used, or implemented, without extensive testing. Because even I would not recommend this, regardless of the standing similarities is has with IPv7 and IPv4. And while there exist hardware configurations which can remain in use. There exist other hardware concerns, which remain in question. Be that as it may be! Whatever the selection from the multitude of possibilities is chosen as the best possible representation for the 'HEADER' used in IPv8. It should be clearly understood, its choice is arbitrary, which does not necessarily degrade, nor improve the efficiency or use, of IPv8. Needless to say, for every RFC written which entertains issues concerning Security. The implementation of IPv8 that would become effected, or seen as a change from IPv4, concerns only the Zone IP and IP Area Code Block Addresses, which should not require any appreciable change either beyond IPv4 or that which has been recommended. In other words, for the most part, IPv8 is a supple change, and not a major Structural Departure from that of IPv4. Which means that the Security methods implemented in the latter, will retain a measurable degree of validity, use, and application, in the former. Nevertheless, every individual can have their personal IP Address, just like the Phone Number exists today. Which does not exclude the existance of the Disconnected Private Network Domain. Needless to say, the only limitation for Implementation of Security Measures, is the imagination of the Hardware and Software Designers. Appendix I: 'Graphical Schematic of the IP Slide Ruler' ====================================================================== = Octets 2st 3nd 4rd Figure 1 = | | ....... = | | . . = ----- v | . 001 . The IP Addressing Slide Ruler clearly = ^ ....... | ....... establishes the Differences between = | . ** . | . . Decimal and Binary Calculations. = | . 001 . v . 160 . Where, in this case, the Number of = | ................... Rulers or Slides, represents the = | ................... Maximum number of Hosts available in = | . . . . an IP Address Range having an = . 160 . 001 . 188 . Exponental Power of 3. That is, if = IP ................... the First Octet is Defined by the =Address ................... "Subnet Identifier", as providing =Range . . . . a Network within the IP Address = . 188 . 160 . 223 . Range assigned to this Class. That is, =1 - 254 ................... the individual Ruler or Slide, has a = | ................... one-to-one correspondence with the = | . . . . OCTET it represents, and is equal to = | . 223 . 188 . 239 . an Exponental Power of 1. Which also = | ................... maintains this one-to-one = | ................... relationship. In any case, it should = | . . . . be understood that the Decimal is an = | . 239 . 223 . 254 . Integer representing the IP Address, = | ................... and has only 1 value that occupies = | ................... the given Octet. However, the Binary = | . . . representation for the IP Address, is = | . 254 . 239 . an 8 digit Logical Expression = v ............. occuping one Octet. Where each digit = ----- ....... has a 2 state representation of either = . . a 1 or a 0. The distinction is that, = . 254 . this is a Logical expression, that has = ....... no Equivalence. However, there is a = Mathematical Method which resolves =The ( ** ) indicates this distinction, and allows for the =the Reference point Translation of each into the other. =of the IP Side Ruler. In other words, one System can never = be used to interpret any given value = of the other, at least, not without = the Mathematical Method used for = Translation. But each, can separately = be mapped to the structure of the 'IP = Slide Ruler ', rendering a translation = for one of the two representations. = (Noting that the Binary Translation of = its Decimal equivalent must be known = first.) ====================================================================== Note: An example of the assignment of a 'ZONE' Number Prefix in IPv8 would be that of a Continent; North America or South America. While the example of the location for an assigned 'IP AREA CODE'in IPv8 would be some Sub-Region within a 'ZONE Prefix' (Continent): New York or Chicago. The convenience of this structure, is that, the Zone Perfix assigns an entire IP Addressing Scheme to that Area (254 Locations), and the IP AREA CODE allows for a further expansion or division of each IP Address Class (254 Sub-locations) within the Addressing Scheme. However, the assigned Zones and IP Area Codes are not Variables, which means they are permanently assigned to the IP Addressing Scheme. But the IP Addresses they prefix are variables, which can be changed. Nevertheless, the IP Slide Ruler is used only for IP Addressing, and not the Prefixes. Appendix II: The Mathematical Anomaly Explained Nonetheless, this mathematical issue is an argument concerning, whether or not there exist a 'One-to-One' Correspondence between the Mathematical Calculations involving the Decimals (represented as Intehers) and those concerning the Binary Operators (Logical Expressions; the Truth Table values of 1's and 0's). Needless to say, this Mathematical Anomaly becomes even more apparent when one observes the Class B situation. Where by: 1. Class B; 128 -191, IP Address Range Default Subnet Mask; 255.255.000.000 (Which yields: 2^14 Networks and 2^16 Hosts; that is, 16,384 Networks and 65,536 Hosts.) However, this total is not the correct method of enumeration, and it is not the actual number (Integer Number) of available networks. And this FACT becomes even more apparent when the Binary Translation of the Decimal (Integers) Numbers is completed. That is, the result would yield 64 Binary Numerical Representations, ONE for each of the Decimal numbers (Integers) that are available in the IP Address for the Class B. Where Class B should maintain the representation (Which provides the actual Integer enumeration for the calculation of the total IP Addresses available. In other words, their independent count, of their respective totals for the Actual Number of Available IP Addresses in the Class B should Equal 64.) given by: 2. Class B: 128 -191, (Which equal the total of 64 possible IP Addresses for the given Address Range) Default Subnet Mask: 255.255.000.000 9Which results in 64^2 Networks and 254^2 Hosts; that is, 4,096 Networks and 64,516 Hosts.) Nevertheless, an enumeration or break down count association, of each representation, that is, Binary and Decimal. Would indeed, provide a greater support for the conclusion presented thus far. Where by, given the Classes noted in 1 & 2 above. We have: 1a. (128 + 128 + 128 + 128 + ...+ 128) = 128 x 128 = 2^14 1 2 3 4 ... - 128 = Total Count Which equal the Total number of Networks for the Given Address Range. and 1b. (255 + 255 + 255 + 255 +...+ 255) = 255 x 255 = 2^16 1 2 3 4 ... - 255 = Total Count Which equals the Total Number of Hosts for the Given Address Range. While noting that these equations represent the Binary Method for determining the number of Networks and Hosts for the given Address Range of Class B. However, keeping this in mind, notice the difference that exist when this same calculation is used for the Decimal (Integer) representation. 2a. (64 + 64 + 64 + 64 +...+ 64) = 64 x 64 = 64^2 1 2 3 4 ... - 64 = Total Count Where this number equals the number of Networks for the Given Address Range assigned to Class B. And 2b. (254 + 254 + 254 + 254 +...+ 254) = 254 x 254 = 254^2 1 2 3 4 ... - 254 = Total Count Where this equation represent the Total Number of Hosts for the Given Address Range of Class B. In other words, given the equation (191 -128) + 1 = 64. We are then presented with the Total Number of Addresses available for the given Address Range, 128 - 191, for the Class B. Where it can be seen that, any One-to-One mapping of the Numbers in the Address Range and the Counting Numbers (Integers), beginning with 1. Should yield the Total Number of Addresses available in any Count, for the Determination of the Total Number of Networks. And this same line of reasoning applies to the Host count, as well. ['Where the Subscript Number equals the Value of the Total Number of Availabe IP Addresses (a One-to-One Correspondence between the Enumeration of, and the Address Ranges given) for the Network and Host Ranges in Class B. Where both Binary and Decimal Number representations are the given examples.'] Nevertheless, when the Decimal and Binary conversion is completed. That is, when you establish a One-to-One relationship between the Binary and Decimal Numbers. You would discover that the their respective totals would be the same. That is, there can only be 64 Binary numbers and 64 Decimal numbers for the calculation of the Total Number of Networks. And there can only be 254 Binary Numbers and 254 Decimal Numbers for the calculation of the Total Number of Hosts. The difference is that, the former method reveals the Binary calculation, while the latter is the Integer (called the Decimal) Calculation. Needless to say, it should be very clear that the Binary method is a Logical Expression, and does see the Integer Count, that is the 'Difference between the Range Boundaries Plus 1'. Which yields the total number of available IP Addresses to be used to determine the actual number of Hosts within a given IP Address Class Range. Clearly, the Decimal method is indeed a Mathematical Expression representing the operations involving the Integers. Needless to say, if you are confused or are in doubt of these conclusions. Then my suggestion, would be to present my findings to a Professor of Mathematics at some well established university. Appendix III: The Reality of IPv6 vs IPv8 Introduction Any deliberation upon the foundational differences existing between any two or more systems, is a daunting task, whose resulting dissertation would require years just to complete a single reading. However, if such a study first, begun by eliminating those portions of each system, which maintained a universal application to every system in which such a study would comprise. Then, the amount of time would be significantly reduced, because the subject matter would only entail the analysis of those parts pertaining to the differences each systems maintained relative to the other. Nevertheless, it should be clear, that the outline of this Appendix will only present a succinct view of this endless count, of what will be concluded as the beneficial differences maintained by IPv8 when compared to IPv6. Which will nonetheless, be shown far to be far superior to any offering rendered by the implementation of IPv6. In other words, the reality regarding the benefits or short comings of any IP Addressing System, which is not a direct reference to the Mathematical Methodologies entailing the Address themselves, are indeed the universal and superficial extensions, which are not relative to any particular system. Where by, issues such as the Header Structure, Functional Definitions describing Address Classes, and other Operational Methods, which are associated with the Addresses, are all Universal Extensions of the Addressing System that maintains a universal application. Which can be employed for use in any IP System of Addressing. Needless to say, these are inherent facts regarding the discussion of any IP System of Addressing, which necessitate an understanding of the over all implications relating thereto. Where by, after the elimination and resolution of all matters concerning the Universal Extensions, because they maintain or can become a usage, function, or implementation shared by both systems. The focus of attention regarding any implementation of a Global Telecommunications Standard, would now center entirely upon the mathematical enumeration methods of, and the IP Addressing System Schematic itself. Nevertheless, Hinden's work, "IP Next Generation Overview", made reference to several possible uses for the IPv6 protocol. In fact, he tended to ignore other specification, which would probably prove more suitable when configuring Household Appliances; for example IEEE 1394. Needless to say, while it is clear that his objective was to exemplify the possible uses and applications of IPv6. He did in fact ignore, the amount of Network traffic, or Bottlenecks, the inclusion of devices such as these would create. Moreover, while household appliances would probably be connected to a Computer System, which is Networked to the Global Telecommunications Community. It will be the controlling application, which would be accessed from some remote location and not the device itself. Needless to say, he emphasized moreover, that the number of available IP Addresses in the present IPv4 System and Routing, were the underpinning issues, which promoted the need for another IP Addressing System. Nevertheless, the only issues regarding IPv6 and IPv8, which shall embody the topics of this Appendix are, Structure of the IP Address, Routing, and their related issues. The IP Addresses of IPv6 and IPv8 Compared First and foremost, it should be noted that, IPv6 is not a Global Telecommunication Standard, because it did not offer nor include, any incorporation of the existing Telephone Communication System. However, while it does expand the number of available IP Addresses to the Global Internet Community. Needless to say, its expansion is not only redundant, but the definitions outlining its underlining purpose lack the soundness of logical reasoning, and they are indeed superfluous. Where by, IPv6 offers a pure 128 Bit IP Addressing System, and a Backwards compatibility comprising 96 Bits of IPv6 Address and 32 Bits of IPv4 Address. This yields, to say the very least, an unprecedented number of available IP Addresses, with no mention of the possibility of individual IP Address assignment for the general public, which comprises the total population of the world. However, it does provide IP Addresses for business uses, which can then make assignments for use by the general public. Nevertheless, as a point of interest, a 128 Bit IP Address Scheme is equated to '3.4 x 10^38'. Which is, given the total population of the world as being '6.0 x 10^9', approximately equal to assigning 5.6 x 10^28 IP Addresses to each and every individual person on the planet. Nonetheless, one would assume that the purpose for a Global Telecommunication System, was not only the concerns for free enterprise and the ever growing number of people wanting the availability of a much broader means of communication. But to address the needs of the public at large, which the emergence of the 21st Century now mandates. Needless to say, the overall structure of IPv6, bars the assignment of individual IP Addresses. Where by, given that an individual location represents a single NODE Connection. IPv6 almost commands that every Node maintains several INTERFACES, which would allow the assignment of several IP Address Numbers, one per Interface, to establish connections for the services offered by different providers. This scheme almost certainly guarantees, that the present cabling system will become an over burden Network Highway of continuous Traffic Jams and Bottlenecks. This however, does not even raise a Brow regarding the Backseat, that "The Nightmare on Elm Street" must take, when the IT Professionals must consider the Management of such a Network. Just forget about troubleshooting, component failure, or some unforeseen catastrophe! I mean, consider for a moment the layout of the defined Sub-Divisions, nested might I add, which are the purported Hallmark of the IPv6 Addressing Scheme. 1. UNICAST ADDRESS; The One-to-One method of communication, which exist between 2 Nodes. a. Global Based Provider; Provider based unicast addresses are used for global communication. b. NSAP Address c. IPX Hierarchical Address d. Site-Local-Use; single site use. e. Link-Local-Use; single link f. IPv4-Capable Host; "IPv4-compatible IPv6 address" g. With IP Addresses Reserved for Future Expansion 2. Anycast Addresses; an address that is assigned to more than one interfaces (typically belonging to different nodes), with the property that a packet sent to an anycast address is routed to the "nearest" interface having that address, according to the routing protocols' measure of distance. 3. Multicast Addresses; a multicast address is an identifier for a group of interfaces. A interface may belong to any number of multicast groups. TABLE AI Allocation Prefix(binary) Fraction of Address Space Reserved 0000 0000 1/256 Unassigned 0000 0001 1/256 Reserved for NSAP Allocation 0000 001 1/128 Reserved for IPX Allocation 0000 010 1/128 Unassigned 0000 011 1/128 Unassigned 0000 1 1/32 Unassigned 0001 1/16 Unassigned 001 1/8 Provider-Based Unicast Address 010 1/8 Unassigned 011 1/8 Reserved for Neutral-Interconnect-Based Unicast Addresses 100 1/8 Unassigned 101 1/8 Unassigned 110 1/8 Unassigned 1110 1/16 Unassigned 1111 0 1/32 Unassigned 1111 10 1/64 Unassigned 1111 110 1/128 Unassigned 1111 1110 0 1/512 Link Local Use Addresses 1111 1110 10 1/1024 Site Local Use Addresses 1111 1110 11 1/1024 Multicast Addresses 1111 1111 1/256 TABLE AII SCHEMATIC DESIGN OF THE IPv6 IP ADDRESS 1. Provider Based Unicast Addresses | 3 | n bits | m bits | o bits | p bits | o-p bits | +---+-----------+-----------+-------------+---------+----------+ |010|REGISTRY ID|PROVIDER ID|SUBSCRIBER ID|SUBNET ID| INTF. ID | +---+-----------+-----------+-------------+---------+----------+ 2. Local-Use Addresses Link-Local-Use | 10 | | bits | n bits | 118-n bits | +----------+-------------------------+----------------------------+ |1111111010| 0 | INTERFACE ID | +----------+-------------------------+----------------------------+ Site-Local-Use | 10 | | bits | n bits | m bits | 118-n-m bits | +----------+---------+---------------+----------------------------+ |1111111011| 0 | SUBNET ID | INTERFACE ID | +----------+---------+---------------+----------------------------+ 3. IPv6 Addresses with Embedded IPV4 Addresses "IPv4-compatible IPv6 address" | 80 bits | 16 | 32 bits | +--------------------------------------+--------------------------+ |0000..............................0000|0000| IPV4 ADDRESS | +--------------------------------------+----+---------------------+ "IPv4-mapped IPv6 address" | 80 bits | 16 | 32 bits | +--------------------------------------+--------------------------+ |0000..............................0000|FFFF| IPV4 ADDRESS | +--------------------------------------+----+---------------------+ 4. Multicast Addresses | 8 | 4 | 4 | 112 bits | +------ -+----+----+---------------------------------------------+ |11111111|FLGS|SCOP| GROUP ID | +--------+----+----+---------------------------------------------+ We need not concern ourselves with Table AI, because its definitions are arbitrary, and can be applied to any 128 Bit IP Addressing Scheme. However, Table AII provides the reality of the MANY SKELETAL (Default) STRUCTURES an IP Address can have in IPv6. Needless to say, these structures form the bases for the foundation of another, yet undefined Class System, which uses WORDS to define different segments of the Skeletal (Default) IP Address. Furthermore, they exhibit and maintain a repetitive definition having the same overall purpose, which was achieved in the simpler methods of IPv4. To say the very least, this is a more complex structure, differing markedly from IPv4, and the Skeletal IP Address defined by the Default Subnet Mask, now the 'Subnet Identifier' in IPv8. Nevertheless, IPv8 defines a IP Addressing Structure, which is a 48 Bit IP Addressing System, that 'Defaults' to a 32 Bit IP Addressing System when the communications or transmissions are within the predefined Block Addresses of the Zone IP and IP Area Code, for the communicating entities. In other words, IPv8 retains the ease of use, implementation, and simplicity of IPv4/IPv7. Moreover, while almost duplicating IPv4 in functionality, IPv8 derives its strengths from the conceptualization of "Block IP Addressing". Where by, each Block is 8 Bits in length, representing one Octet, which is a complete IP Address comprising the first 32 Bits, 16 of which are reserved for future expansion. Notwithstanding that, it is the 'Block IP Address' concept, comprising a 5 Block IP Address Division. Which allows the entire IPv8 IP Addressing Schematic to be fully implemented, for each Zone IP Address in which it is assigned. Moreover, each Zone IP Block Address is allocated approximately '1.42 x 10^12 IP Addresses' for distribution and assignment. However, this accounts only for the number of available IP Addresses in the first 3 IP Address Classes of this 5 IP Class Addressing Scheme. Nevertheless, this implementation in essence, allows every existing entity previously assigned an IP Address, to continued its use without any change. In fact, IPv8 is a true Global Telecommunication System Standard, because it incorporates every Industry within the Telecommunications Community into one, World Wide Global Telecommunications System, through the use of Block IP Addresses. Needless to say, what makes this all possible, is the use of the Zone IP and IP Area Code Prefixing System. Which, to say the very least, is indeed the Hallmark of IPv8. Moreover, it should be clear, IPv8 offers a smoother transition without issues arising from incompatibilities, backward compatibility, or the difficulties in the learning curve resulting from of the implementation of a new, entirely different IP Addressing System. A Succinct Consideration Regarding Routing in IPv6 vs IPv8 The Routing implementations recommended in IPv8, require the development of 3 types of Smart Routers, Global, OuterCom, and InterCom. These would control 3 major methods of Routing: DIRECT-PP, CIODR-FEA and CIODR-BEA. Which predicts moreover, a reduction in the size of the Router's routing Table, and a reduction in the total number of Routers needing to be deployed, regardless of the size of the Network Domain. Nevertheless these routers are defined in Table AIII. TABLE AIII 1. Global Router: A router having the dual routing path capability defined by the Zone IP and IP Area Code Block IP Addresses (CIODR-FEA). Which can be programmed to discern the differences in data types, capable of encrypt and decrypt of data, and would route the data by either stripping the Prefix Code or transmitting the data to the next router governing the Prefix Code of the intended destination. 2. OuterCom Router: A router having the dual routing path capability defined by the IP Area Code Block IP Address and the First Octet of the 32 Bit IP Address Block (CIODR-FEA). Which can be programmed to discern the differences in data types, capable of encrypt and decrypt of data, and would route the data by either stripping the Prefix Code or transmitting the data to the next router governing the Prefix or Octet of the Address Block of the intended destination. 3. InterCom Router: A router having the dual routing path capability defined by the First Octet 32 Bit IP Address and the Second Octet of the 32 Bit IP Address Block (CIODR-FEA). Which can be programmed to discern the differences in data types, capable of encrypt and decrypt of data, and would route the data by either Forwarding (First Octet) or transmitting the data to the next router governing the Subnet of the 32 Bit IP Address Block of the intended destination, which would then route using CIODR-BEA (CIDR having expanded capabilities for connection to CIODR-FEA). 4. DIRECT-PP: An InterCom, or InterDomain Transmission, which can be Router or Server Controlled, establishes a Peer to Peer or a Conference on a Network or InterCom Communication. 5. CIODR-FEA: A Classless Inter/Outer Domain Routing Technique, which routes using the Front End of the 48 Bit Address Blocks comprising the Zone IP, IP Area Code, and the First 2 Octets of the 32 Bit Address Block. (FEA = Front End Address) 6. CIODR-BEA: A Classless Inter/Outer Domain Routing Technique, which routes using the Back End of the 32 Bit Address Block, that comprise the last 2 Octets. (BEA = Back End Address) Needless to say, the Routing techniques recommended for use in IPv8 are far superior to those implemented in IPv6. Where by, the routing techniques employed in IPv6 necessitate the use of "CIDR" because of the IP Default Addressing Format, and also use a method in which an ISP can control the users transmission through router selection and path. These methods clearly, would require if not mandate, a serious overhead on equipment design and cost. Nevertheless, the unquestionable benefits in the choice of IPv8 over IPv6, is the resounding voice of its superiority. Note: The information obtain and used for IPv6 in this comparison with IPv8 was derived from that note by number 16 in the Reference Section. Which may or may not be up to date, but it does indeed serve the purpose of this Appendix. References 1. E. Terrell ( not published notarized, 1979 ) " The Proof of Fermat's Last Theorem: The Revolution in Mathematical Thought " Outlines the significance of the need for a thorough understanding of the Concept of Quantification and the Concept of the Common Coefficient. These principles, as well many others, were found to maintain an unyielding importance in the Logical Analysis of Exponential Equations in Number Theory. 2. E. Terrell ( not published notarized, 1983 ) " The Rudiments of Finite Algebra: The Results of Quantification " Demonstrates the use of the Exponent in Logical Analysis, not only of the Pure Arithmetic Functions of Number Theory, but Pure Logic as well. Where the Exponent was utilized in the Logical Expansion of the underlining concepts of Set Theory and the Field Postulates. The results yield; another Distributive Property ( i.e. Distributive Law ) and emphasized the possibility of an Alternate View of the Entire Mathematical field. 3. G Boole ( Dover publication, 1958 ) "An Investigation of The Laws of Thought" On which is founded The Mathematical Theories of Logic and Probabilities; and the Logic of Computer Mathematics. 4. R Carnap ( University of Chicago Press, 1947 / 1958 ) "Meaning and Necessity" A study in Semantics and Modal Logic. 5. R Carnap ( Dover Publications, 1958 ) " Introduction to Symbolic Logic and its Applications" 6. Authors: Arnett, Dulaney, Harper, Hill, Krochmal, Kuo, LeValley, McGarvey, Mellor, Miller, Orr, Ray, Rimbey, Wang, ( New Riders Publishing, 1994 ) " Inside TCP/IP " 7. B Graham ( AP Professional, 1996 ) " TCP/IP Addressing " Lectures on the design and optimizing IP addressing. 8. Postel, J. (ed.), "Internet Protocol - DARPA Internet Program Protocol Specification," RFC 791, USC/Information Sciences Institute, September 1981. 9. Cisco Systems, Inc. ( Copyright 1989 - 1999 ) " Internetworking Technology Overview " 10. S. Bradner, A. Mankin, Network Working Group of Harvard University ( December 1993 ) " RFC 1550: IP: Next Generation (IPng) White Paper Solicitation " 11. RFC 791 12. E. Terrell (August 1999) Internet-Draft: "The Mathematical Reality of IP Addressing in IPv4 Questions the need for another IP System of Addressing". 13. Y. Rekhter (September 1993) RFC 1518: "An Architecture for IP Address Allocation with CIDR". 14. S. Bellovin (August 1994) RFC 1675: " Security Concerns for IPng" 15. R. Atkinson (August 1995) RFC 1825: " Security Architecture for the Internet Protocol" 16. R. M. Hinden (May 1995) " IP Next Generation Overview" Author (Please comment to:) Eugene Terrell 24409 Soto Road Apt. 7 Hayward, CA. 94544-1438 Voice: 510-537-2390 E-Mail: eterrell00@netzero.net ["Copyright (C) [ The Internet Society (1999). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into."] This document and the information contained herein is provided on an "AS IS" basis and THE AUTHOR, THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.