Network Working Group                                           D. Clark
Request for Comments: 1287                                           MIT
                                                              L. Chapin
                                                                    BBN
                                                                V. Cerf
                                                                   CNRI
                                                              R. Braden
                                                                    ISI
                                                               R. Hobby
                                                               UC Davis
                                                          December 1991


               Towards the Future Internet Architecture

Status of this Memo

  This informational RFC discusses important directions for possible
  future evolution of the Internet architecture, and suggests steps
  towards the desired goals.  It is offered to the Internet community
  for discussion and comment.  This memo provides information for the
  Internet community.  It does not specify an Internet standard.
  Distribution of this memo is unlimited.

Table of Contents

  1.  INTRODUCTION .................................................  2

  2.  ROUTING AND ADDRESSING .......................................  5

  3.  MULTI-PROTOCOL ARCHITECTURES .................................  9

  4.  SECURITY ARCHITECTURE ........................................ 13

  5   TRAFFIC CONTROL AND STATE .................................... 16

  6.  ADVANCED APPLICATIONS ........................................ 18

  7.  REFERENCES ................................................... 21

  APPENDIX A. Setting the Stage .................................... 22

  APPENDIX B. Group Membership ..................................... 28

  Security Considerations .......................................... 29

  Authors' Addresses ............................................... 29




Clark, Chapin, Cerf, Braden, & Hobby                            [Page 1]

RFC 1287            Future of Internet Architecture        December 1991


1.  INTRODUCTION

  1.1 The Internet Architecture

     The Internet architecture, the grand plan behind the TCP/IP
     protocol suite, was developed and tested in the late 1970s by a
     small group of network researchers [1-4].  Several important
     features were added to the architecture during the early 1980's --
     subnetting, autonomous systems, and the domain name system [5,6].
     More recently, IP multicasting has been added [7].

     Within this architectural framework, the Internet Engineering Task
     Force (IETF) has been working with great energy and effectiveness
     to engineer, define, extend, test, and standardize protocols for
     the Internet.  Three areas of particular importance have been
     routing protocols, TCP performance, and network management.
     Meanwhile, the Internet infrastructure has continued to grow at an
     astonishing rate.  Since January 1983 when the ARPANET first
     switched from NCP to TCP/IP, the vendors, managers, wizards, and
     researchers of the Internet have all been laboring mightily to
     survive their success.

     A set of the researchers who had defined the Internet architecture
     formed the original membership of the Internet Activities Board
     (IAB).  The IAB evolved from a technical advisory group set up in
     1981 by DARPA to become the general technical and policy oversight
     body for the Internet.  IAB membership has changed over the years
     to better represent the changing needs and issues in the Internet
     community, and more recently, to reflect the internationalization
     of the Internet, but it has retained an institutional concern for
     the protocol architecture.

     The IAB created the Internet Engineering Task Force (IETF) to
     carry out protocol development and engineering for the Internet.
     To manage the burgeoning IETF activities, the IETF chair set up
     the Internet Engineering Steering Group (IESG) within the IETF.
     The IAB and IESG work closely together in ratifying protocol
     standards developed within the IETF.

     Over the past few years, there have been increasing signs of
     strains on the fundamental architecture, mostly stemming from
     continued Internet growth.  Discussions of these problems
     reverberate constantly on many of the major mailing lists.

  1.2  Assumptions

     The priority for solving the problems with the current Internet
     architecture depends upon one's view of the future relevance of



Clark, Chapin, Cerf, Braden, & Hobby                            [Page 2]

RFC 1287            Future of Internet Architecture        December 1991


     TCP/IP with respect to the OSI protocol suite.  One view has been
     that we should just let the TCP/IP suite strangle in its success,
     and switch to OSI protocols.  However, many of those who have
     worked hard and successfully on Internet protocols, products, and
     service are anxious to try to solve the new problems within the
     existing framework.  Furthermore, some believe that OSI protocols
     will suffer from versions of many of the same problems.

     To begin to attack these issues, the IAB and the IESG held a one-
     day joint discussion of Internet architectural issues in January
     1991.  The framework for this meeting was set by Dave Clark (see
     Appendix A for his slides).  The discussion was spirited,
     provocative, and at times controversial, with a lot of soul-
     searching over questions of relevance and future direction.  The
     major result was to reach a consensus on the following four basic
     assumptions regarding the networking world of the next 5-10 years.

     (1)  The TCP/IP and OSI suites will coexist for a long time.

          There are powerful political and market forces as well as
          some technical advantages behind the introduction of the OSI
          suite.  However, the entrenched market position of the TCP/IP
          protocols means they are very likely to continue in service
          for the foreseeable future.

     (2)  The Internet will continue to include diverse networks and
          services, and will never be comprised of a single network
          technology.

          Indeed, the range of network technologies and characteristics
          that are connected into the Internet will increase over the
          next decade.

     (3)  Commercial and private networks will be incorporated, but we
          cannot expect the common carriers to provide the entire
          service.  There will be mix of public and private networks,
          common carriers and private lines.

     (4)  The Internet architecture needs to be able to scale to 10**9
          networks.

          The historic exponential growth in the size of the Internet
          will presumably saturate some time in the future, but
          forecasting when is about as easy as forecasting the future
          economy.  In any case, responsible engineering requires an
          architecture that is CAPABLE of expanding to a worst-case
          size.  The exponent "9" is rather fuzzy; estimates have
          varied from 7 to 10.



Clark, Chapin, Cerf, Braden, & Hobby                            [Page 3]

RFC 1287            Future of Internet Architecture        December 1991


  1.3  Beginning a Planning Process

     Another result of the IAB and IESG meeting was the following list
     of the five most important areas for architectural evolution:

     (1)  Routing and Addressing

          This is the most urgent architectural problem, as it is
          directly involved in the ability of the Internet to continue
          to grow successfully.

     (2)  Multi-Protocol Architecture

          The Internet is moving towards widespread support of both the
          TCP/IP and the OSI protocol suites.  Supporting both suites
          raises difficult technical issues, and a plan -- i.e., an
          architecture -- is required to increase the chances of
          success.  This area was facetiously dubbed "making the
          problem harder for the good of mankind."

          Clark had observed that translation gateways (e.g., mail
          gateways) are very much a fact of life in Internet operation
          but are not part of the architecture or planning.  The group
          discussed the possibility of building the architecture around
          the partial connectivity that such gateways imply.

     (3)  Security Architecture

          Although military security was considered when the Internet
          architecture was designed, the modern security issues are
          much broader, encompassing commercial requirements as well.
          Furthermore, experience has shown that it is difficult to add
          security to a protocol suite unless it is built into the
          architecture from the beginning.

     (4)  Traffic Control and State

          The Internet should be extended to support "real-time"
          applications like voice and video.  This will require new
          packet queueing mechanisms in gateways -- "traffic control"
          -- and additional gateway state.

     (5)  Advanced Applications

          As the underlying Internet communication mechanism matures,
          there is an increasing need for innovation and
          standardization in building new kinds of applications.




Clark, Chapin, Cerf, Braden, & Hobby                            [Page 4]

RFC 1287            Future of Internet Architecture        December 1991


     The IAB and IESG met again in June 1991 at SDSC and devoted three
     full days to a discussion of these five topics.  This meeting,
     which was called somewhat perversely the "Architecture Retreat",
     was convened with a strong resolve to take initial steps towards
     planning evolution of the architecture.  Besides the IAB and IESG,
     the group of 32 people included the members of the Research
     Steering Group (IRSG) and a few special guests.  On the second
     day, the Retreat broke into groups, one for each of the five
     areas.  The group membership is listed in Appendix B.

     This document was assembled from the reports by the chairs of
     these groups.  This material was presented at the Atlanta IETF
     meeting, and appears in the minutes of that meeting [8].

2.  ROUTING AND ADDRESSING

  Changes are required in the addressing and routing structure of IP to
  deal with the anticipated growth and functional evolution of the
  Internet.  We expect that:

  o    The Internet will run out of certain classes of IP network
       addresses, e.g., B addresses.

  o    The Internet will run out of the 32-bit IP address space
       altogether, as the space is currently subdivided and managed.

  o    The total number of IP network numbers will grow to the point
       where reasonable routing algorithms will not be able to perform
       routing based upon network numbers.

  o    There will be a need for more than one route from a source to a
       destination, to permit variation in TOS and policy conformance.
       This need will be driven both by new applications and by diverse
       transit services.  The source, or an agent acting for the
       source, must control the selection of the route options.

  2.1  Suggested Approach

     There is general agreement on the approach needed to deal with
     these facts.

     (a)  We must move to an addressing scheme in which network numbers
          are aggregated into larger units as the basis for routing.
          An example of an aggregate is the Autonomous System, or the
          Administrative Domain (AD).

          Aggregation will accomplish several goals: define regions
          where policy is applied, control the number of routing



Clark, Chapin, Cerf, Braden, & Hobby                            [Page 5]

RFC 1287            Future of Internet Architecture        December 1991


          elements, and provide elements for network management.  Some
          believe that it must be possible to further combine
          aggregates, as in a nesting of ADs.

     (b)  We must provide some efficient means to compute common
          routes, and some general means to compute "special" routes.

          The general approach to special routes will be some form of
          route setup specified by a "source route".

     There is not full agreement on how ADs may be expected to be
     aggregated, or how routing protocols should be organized to deal
     with the aggregation boundaries.   A very general scheme may be
     used [ref. Chiappa], but some prefer a scheme that more restricts
     and defines the expected network model.

     To deal with the address space exhaustion, we must either expand
     the address space or else reuse the 32 bit field ("32bf") in
     different parts of the net.  There are several possible address
     formats that might make sense, as described in the next section.

     Perhaps more important is the question of how to migrate to the
     new scheme.  All migration plans will require that some routers
     (or other components inside the Internet) be able to rewrite
     headers to accommodate hosts that handle only the old or format or
     only the new format.  Unless the need for such format conversion
     can be inferred algorithmically, migration by itself will require
     some sort of setup of state in the conversion element.

     We should not plan a series of "small" changes to the
     architecture.  We should embark now on a plan that will take us
     past the exhaustion of the address space.  This is a more long-
     range act of planning than the Internet community has undertaken
     recently, but the problems of migration will require a long lead
     time, and it is hard to see an effective way of dealing with some
     of the more immediate problems, such as class B exhaustion, in a
     way that does not by itself take a long time.  So, once we embark
     on a plan of change, it should take us all the way to replacing
     the current 32-bit global address space.  (This conclusion is
     subject to revision if, as is always possible, some very clever
     idea surfaces that is quick to deploy and gives us some breathing
     room.  We do not mean to discourage creative thinking about
     short-term actions.  We just want to point out that even small
     changes take a long time to deploy.)

     Conversion of the address space by itself is not enough.  We must
     at the same time provide a more scalable routing architecture, and
     tools to better manage the Internet.  The proposed approach is to



Clark, Chapin, Cerf, Braden, & Hobby                            [Page 6]

RFC 1287            Future of Internet Architecture        December 1991


     ADs as the unit of aggregation for routing.  We already have
     partial means to do this.  IDPR does this.  The OSI version of BGP
     (IDRP) does this.  BGP could evolve to do this.  The additional
     facility needed is a global table that maps network numbers to
     ADs.

     For several reasons (special routes and address conversion, as
     well as accounting and resource allocation), we are moving from a
     "stateless" gateway model, where only precomputed routes are
     stored in the gateway, to a model where at least some of the
     gateways have per-connection state.

  2.2  Extended IP Address Formats

     There are three reasonable choices for the extended IP address
     format.

     A)   Replace the 32 bit field (32bf) with a field of the same size
          but with different meaning.  Instead of being globally
          unique, it would now be unique only within some smaller
          region (an AD or an aggregate of ADs).  Gateways on the
          boundary would rewrite the address as the packet crossed the
          boundary.

          Issues: (1) addresses in the body of packets must be found
          and rewritten; (2) the host software need not be changed; (3)
          some method (perhaps a hack to the DNS) must set up the
          address mappings.

          This scheme is due to Van Jacobson.  See also the work by
          Paul Tsuchiya on NAT.

     B)   Expand the 32bf to a 64 bit field (or some other new size),
          and use the field to hold a global host address and an AD for
          that host.

          This choice would provide a trivial mapping from the host to
          the value (the AD) that is the basis of routing.  Common
          routes (those selected on the basis of destination address
          without taking into account the source address as well) can
          be selected directly from the packet address, as is done
          today, without any prior setup.

     3)   Expand the 32bf to a 64 bit field (or some other new size),
          and use the field as a "flat" host identifier.  Use
          connection setup to provide routers with the mapping from
          host id to AD, as needed.




Clark, Chapin, Cerf, Braden, & Hobby                            [Page 7]

RFC 1287            Future of Internet Architecture        December 1991


          The 64 bits can now be used to simplify the problem of
          allocating host ids, as in Ethernet addresses.

     Each of these choices would require an address re-writing module
     as a part of migration.  The second and third require a change to
     the IP header, so host software must change.

  2.3  Proposed Actions

     The following actions are proposed:

     A)   Time Line

          Construct a specific set of estimates for the time at which
          the various problems above will arise, and construct a
          corresponding time-line for development and deployment of a
          new addressing/routing architecture.  Use this time line as a
          basis for evaluating specific proposals for changes.  This is
          a matter for the IETF.

     B)   New Address Format

          Explore the options for a next generation address format and
          develop a plan for migration.  Specifically, construct a
          prototype gateway that does address mapping.  Understand the
          complexity of this task, to guide our thinking about
          migration options.

     C)   Routing on ADs

          Take steps to make network aggregates (ADs) the basis of
          routing.  In particular, explore the several options for a
          global table that maps network numbers to ADs.  This is a
          matter for the IETF.

     D)   Policy-Based Routing

          Continue the current work on policy based routing. There are
          several specific objectives.

          -    Seek ways to control the complexity of setting policy
               (this is a human interface issue, not an algorithm
               complexity issue).

          -    Understand better the issues of maintaining connection
               state in gateways.

          -    Understand better the issues of connection state setup.



Clark, Chapin, Cerf, Braden, & Hobby                            [Page 8]

RFC 1287            Future of Internet Architecture        December 1991


     E)   Research on Further Aggregation

          Explore, as a research activity, how ADs should be aggregated
          into still larger routing elements.

          -    Consider whether the architecture should define the
               "role" of an AD or an aggregate.

          -    Consider whether one universal routing method or
               distinct methods should be used inside and outside ADs
               and aggregates.

     Existing projects planned for DARTnet will help resolve several of
     these issues: state in gateways, state setup, address mapping,
     accounting and so on.  Other experiments in the R&D community also
     bear on this area.

3.  MULTI-PROTOCOL ARCHITECTURE

  Changing the Internet to support multiple protocol suites leads to
  three specific architectural questions:

  o    How exactly will we define "the Internet"?

  o    How would we architect an Internet with n>1 protocol suites,
       regardless of what the suites are?

  o    Should we architect for partial or filtered connectivity?

  o    How to add explicit support for application gateways into the
       architecture?

  3.1  What is the "Internet"?

     It is very difficult to deal constructively with the issue of "the
     multi-protocol Internet" without first determining what we believe
     "the Internet" is (or should be).   We distinguish "the Internet",
     a set of communicating systems, from "the Internet community", a
     set of people and organizations.  Most people would accept a loose
     definition of the latter as "the set of people who believe
     themselves to be part of the Internet community".  However, no
     such "sociological" definition of the Internet itself is likely to
     be useful.

     Not too long ago, the Internet was defined by IP connectivity (IP
     and ICMP were - and still are - the only "required" Internet
     protocols).  If I could PING you, and you could PING me, then we
     were both on the Internet, and a satisfying working definition of



Clark, Chapin, Cerf, Braden, & Hobby                            [Page 9]

RFC 1287            Future of Internet Architecture        December 1991


     the Internet could be constructed as a roughly transitive closure
     of IP-speaking systems.  This model of the Internet was simple,
     uniform, and - perhaps most important - testable.  The IP-
     connectivity model clearly distinguished systems that were "on the
     Internet" from those that were not.

     As the Internet has grown and the technology on which it is based
     has gained widespread commercial acceptance, the sense of what it
     means for a system to be "on the Internet" has changed, to
     include:

     *    Any system that has partial IP connectivity, restricted by
          policy filters.

     *    Any system that runs the TCP/IP protocol suite, whether or
          not it is actually accessible from other parts of the
          Internet.

     *    Any system that can exchange RFC-822 mail, without the
          intervention of mail gateways or the transformation of mail
          objects.

     *    Any system with e-mail connectivity to the Internet, whether
          or not a mail gateway or mail object transformation is
          required.

     These definitions of "the Internet", are still based on the
     original concept of connectivity, just "moving up the stack".

     We propose instead a new definition of the Internet, based on a
     different unifying concept:

     *    "Old" Internet concept:  IP-based.

          The organizing principle is the IP address, i.e., a common
          network address space.

     *    "New" Internet concept:  Application-based.

          The organizing principle is the domain name system and
          directories, i.e., a common - albeit necessarily multiform -
          application name space.

     This suggests that the idea of "connected status", which has
     traditionally been tied to the IP address(via network numbers,
     should instead be coupled to the names and related identifying
     information contained in the distributed Internet directory.




Clark, Chapin, Cerf, Braden, & Hobby                           [Page 10]

RFC 1287            Future of Internet Architecture        December 1991


     A naming-based definition of "the Internet" implies a much larger
     Internet community, and a much more dynamic (and unpredictable)
     operational Internet.  This argues for an Internet architecture
     based on adaptability (to a broad spectrum of possible future
     developments) rather than anticipation.

  3.2  A Process-Based Model of the Multiprotocol Internet

     Rather than specify a particular "multi-protocol Internet",
     embracing a pre-determined number of specific protocol
     architectures, we propose instead a process-oriented model of the
     Internet, which accommodates different protocol architectures
     according to the traditional "things that work" principle.

     A process-oriented Internet model includes, as a basic postulate,
     the assertion that there is no *steady-state* "multi-protocol
     Internet".  The most basic forces driving the evolution of the
     Internet are pushing it not toward multi-protocol diversity, but
     toward the original state of protocol-stack uniformity (although
     it is unlikely that it will ever actually get there).  We may
     represent this tendency of the Internet to evolve towards
     homogeneity as the most "thermodynamically stable" state by
     describing four components of a new process-based Internet
     architecture:

     Part 1: The core Internet architecture

          This is the traditional TCP/IP-based architecture.  It is the
          "magnetic center" of Internet evolution, recognizing that (a)
          homogeneity is still the best way to deal with diversity in
          an internetwork, and (b) IP connectivity is still the best
          basic model of the Internet (whether or not the actual state
          of IP ubiquity can be achieved in practice in a global
          operational Internet).

     "In the beginning", the Internet architecture consisted only of
     this first part.  The success of the Internet, however, has
     carried it beyond its uniform origins;  ubiquity and uniformity
     have been sacrificed in order to greatly enrich the Internet "gene
     pool".

     Two additional parts of the new Internet architecture express the
     ways in which the scope and extent of the Internet have been
     expanded.

     Part 2: Link sharing

          Here physical resources -- transmission media, network



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 11]

RFC 1287            Future of Internet Architecture        December 1991


          interfaces, perhaps some low-level (link) protocols -- are
          shared by multiple, non-interacting protocol suites.  This
          part of the architecture recognizes the necessity and
          convenience of coexistence, but is not concerned with
          interoperability;  it has been called "ships in the night" or
          "S.I.N.".

          Coexisting protocol suites are not, of course, genuinely
          isolated in practice;  the ships passing in the night raise
          issues of management, non-interference, coordination, and
          fairness in real Internet systems.

     Part 3: Application interoperability

          Absent ubiquity of interconnection (i.e., interoperability of
          the "underlying stacks"), it is still possible to achieve
          ubiquitous application functionality by arranging for the
          essential semantics of applications to be conveyed among
          disjoint communities of Internet systems.  This can be
          accomplished by application relays, or by user agents that
          present a uniform virtual access method to different
          application services by expressing only the shared semantics.

          This part of the architecture emphasizes the ultimate role of
          the Internet as a basis for communication among applications,
          rather than as an end in itself.  To the extent that it
          enables a population of applications and their users to move
          from one underlying protocol suite to another without
          unacceptable loss of functionality, it is also a "transition
          enabler".

     Adding parts 2 and 3 to the original Internet architecture is at
     best a mixed blessing.  Although they greatly increase the scope
     of the Internet and the size of the Internet community, they also
     introduce significant problems of complexity, cost, and
     management, and they usually represent a loss of functionality
     (particularly with respect to part 3).  Parts 2 and 3 represent
     unavoidable, but essentially undesirable, departures from the
     homogeneity represented by part 1.  Some functionality is lost,
     and additional system complexity and cost is endured, in order to
     expand the scope of the Internet.  In a perfect world, however,
     the Internet would evolve and expand without these penalties.

     There is a tendency, therefore, for the Internet to evolve in
     favor of the homogeneous architecture represented by part 1, and
     away from the compromised architectures of parts 2 and 3.  Part 4
     expresses this tendency.




Clark, Chapin, Cerf, Braden, & Hobby                           [Page 12]

RFC 1287            Future of Internet Architecture        December 1991


     Part 4: Hybridization/Integration.

          Part 4 recognizes the desirability of integrating similar
          elements from different Internet protocol architectures to
          form hybrids that reduce the variability and complexity of
          the Internet system.  It also recognizes the desirability of
          leveraging the existing Internet infrastructure to facilitate
          the absorption of "new stuff" into the Internet, applying to
          "new stuff" the established Internet practice of test,
          evaluate, adopt.

          This part expresses the tendency of the Internet, as a
          system, to attempt to return to the original "state of grace"
          represented by the uniform architecture of part 1.  It is a
          force acting on the evolution of the Internet, although the
          Internet will never actually return to a uniform state at any
          point in the future.

     According to this dynamic process model, running X.400 mail over
     RFC 1006 on a TCP/IP stack, integrated IS-IS routing, transport
     gateways, and the development of a single common successor to the
     IP and CLNP protocols are all examples of "good things".  They
     represent movement away from the non-uniformity of parts 2 and 3
     towards greater homogeneity, under the influence of the "magnetic
     field" asserted by part 1, following the hybridization dynamic of
     part 4.

4.  SECURITY ARCHITECTURE

  4.1  Philosophical Guidelines

     The principal themes for development of an Internet security
     architecture are simplicity, testability, trust, technology and
     security perimeter identification.

     *    There is more to security than protocols and cryptographic
          methods.

     *    The security architecture and policies should be simple
          enough to be readily understood.  Complexity breeds
          misunderstanding and poor implementation.

     *    The implementations should be testable to determine if the
          policies are met.

     *    We are forced to trust hardware, software and people to make
          any security architecture function.  We assume that the
          technical instruments of security policy enforcement are at



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 13]

RFC 1287            Future of Internet Architecture        December 1991


          least as powerful as modern personal computers and work
          stations; we do not require less capable components to be
          self-protecting (but might apply external remedies such as
          link level encryption devices).

     *    Finally, it is essential to identify security perimeters at
          which protection is to be effective.

  4.2  Security Perimeters

     There were four possible security perimeters: link level,
     net/subnet level, host level, and process/application level.  Each
     imposes different requirements, can admit different techniques,
     and makes different assumptions about what components of the
     system must be trusted to be effective.

     Privacy Enhanced Mail is an example of a process level security
     system; providing authentication and confidentiality for SNMP is
     another example.  Host level security typically means applying an
     external security mechanism on the communication ports of a host
     computer.  Network or subnetwork security means applying the
     external security capability at the gateway/router(s) leading from
     the subnetwork to the "outside".  Link-level security is the
     traditional point-to-point or media-level (e.g., Ethernet)
     encryption mechanism.

     There are many open questions about network/subnetwork security
     protection, not the least of which is a potential mismatch between
     host level (end/end) security methods and methods at the
     network/subnetwork level.  Moreover, network level protection does
     not deal with threats arising within the security perimeter.

     Applying protection at the process level assumes that the
     underlying scheduling and operating system mechanisms can be
     trusted not to prevent the application from applying security when
     appropriate.  As the security perimeter moves downward in the
     system architecture towards the link level, one must make many
     assumptions about the security threat to make an argument that
     enforcement at a particular perimeter is effective.  For example,
     if only link-level encryption is used, one must assume that
     attacks come only from the outside via communications lines, that
     hosts, switches and gateways are physically protected, and the
     people and software in all these components are to be trusted.

  4.3  Desired Security Services

     We need authenticatable distinguished names if we are to implement
     discretionary and non-discretionary access control at application



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 14]

RFC 1287            Future of Internet Architecture        December 1991


     and lower levels in the system.  In addition, we need enforcement
     for integrity (anti-modification, anti-spoof and anti-replay
     defenses), confidentiality, and prevention of denial-of-service.
     For some situations, we may also need to prevent repudiation of
     message transmission or to prevent covert channels.

     We have some building blocks with which to build the Internet
     security system.  Cryptographic algorithms are available (e.g.,
     Data Encryption Standard, RSA, El Gamal, and possibly other public
     key and symmetric key algorithms), as are hash functions such as
     MD2 and MD5.

     We need Distinguished Names (in the OSI sense) and are very much
     in need of an infrastructure for the assignment of such
     identifiers, together with widespread directory services for
     making them known.  Certificate concepts binding distinguished
     names to public keys and binding distinguished names to
     capabilities and permissions may be applied to good advantage.

     At the router/gateway level, we can apply address and protocol
     filters and other configuration controls to help fashion a
     security system.  The proposed OSI Security Protocol 3 (SP3) and
     Security Protocol 4 (SP4) should be given serious consideration as
     possible elements of an Internet security architecture.

     Finally, it must be observed that we have no good solutions to
     safely storing secret information (such as the secret component of
     a public key pair) on systems like PCs or laptop computers that
     are not designed to enforce secure storage.

  4.4  Proposed Actions

     The following actions are proposed.

     A)   Security Reference Model

          A Security Reference Model for the Internet is needed, and it
          should be developed expeditiously.  This model should
          establish the target perimeters and document the objectives
          of the security architecture.

     B)   Privacy-Enhanced Mail (PEM)

          For Privacy Enhanced Mail, the most critical steps seem to be
          the installation of (1) a certificate generation and
          management infrastructure, and (2) X.500 directory services
          to provide access to public keys via distinguished names.
          Serious attention also needs to be placed on any limitations



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 15]

RFC 1287            Future of Internet Architecture        December 1991


          imposed by patent and export restrictions on the deployment
          of this system.

     C)   Distributed System Security

          We should examine security methods for distributed systems
          applications, in both simple (client/server) and complex
          (distributed computing environment) cases.  For example, the
          utility of certificates granting permissions/capabilities to
          objects bound to distinguished names should be examined.

     D)   Host-Level Security

          SP4 should be evaluated for host-oriented security, but SP3
          should also be considered for this purpose.

     E)   Application-Level Security

          We should implement application-level security services, both
          for their immediate utility (e.g., PEM, SNMP authentication)
          and also to gain valuable practical experience that can
          inform the refinement of the Internet security architecture.

5.  TRAFFIC CONTROL AND STATE

  In the present Internet, all IP datagrams are treated equally.  Each
  datagram is forwarded independently, regardless of any relationship
  it has to other packets for the same connection, for the same
  application, for the same class of applications, or for the same user
  class.  Although Type-of-Service and Precedence bits are defined in
  the IP header, these are not generally implemented, and in fact it is
  not clear how to implement them.

  It is now widely accepted that the future Internet will need to
  support important applications for which best-effort is not
  sufficient -- e.g., packet video and voice for teleconferencing.
  This will require some "traffic control" mechanism in routers,
  controlled by additional state, to handle "real-time" traffic.

  5.1  Assumptions and Principles


     o    ASSUMPTION: The Internet will need to support performance
          guarantees for particular subsets of the traffic.

     Unfortunately, we are far from being able to give precise meanings
     to the terms "performance", "guarantees", or "subsets" in this
     statement.  Research is still needed to answer these questions.



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 16]

RFC 1287            Future of Internet Architecture        December 1991


     o    The default service will continue to be the current "best-
          effort" datagram delivery, with no service guarantees.

     o    The mechanism of a router can be separated into (1) the
          forwarding path and (2) the control computations (e.g.,
          routing) which take place in the background.

          The forwarding path must be highly optimized, sometimes with
          hardware-assist, and it is therefore relatively costly and
          difficult to change.  The traffic control mechanism operates
          in the forwarding path, under the control of state created by
          routing and resource control computations that take place in
          background.  We will have at most one shot at changing the
          forwarding paths of routers, so we had better get it right
          the first time.

     o    The new extensions must operate in a highly heterogeneous
          environment, in which some parts will never support
          guarantees.  For some hops of a path (e.g., a high-speed
          LAN), "over-provisioning" (i.e., excess capacity) will allow
          adequate service for real-time traffic, even when explicit
          resource reservation is unavailable.

     o    Multicast distribution is probably essential.

  5.2  Technical Issues

     There are a number of technical issues to be resolved, including:

     o    Resource Setup

          To support real-time traffic, resources need to be reserved
          in each router along the path from source to destination.
          Should this new router state be "hard" (as in connections) or
          "soft" (i.e., cached state)?

     o    Resource binding vs. route binding

          Choosing a path from source to destination is traditionally
          performed using a dynamic routing protocol.  The resource
          binding and the routing might be folded into a single complex
          process, or they might be performed essentially
          independently.  There is a tradeoff between complexity and
          efficiency.

     o    Alternative multicast models

          IP multicasting uses a model of logical addressing in which



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 17]

RFC 1287            Future of Internet Architecture        December 1991


          targets attach themselves to a group.  In ST-2, each host in
          a multicast session includes in its setup packet an explicit
          list of target addresses.  Each of these approaches has
          advantages and drawbacks; it is not currently clear which
          will prevail for n-way teleconferences.

     o    Resource Setup vs. Inter-AD routing

          Resource guarantees of whatever flavor must hold across an
          arbitrary end-to-end path, including multiple ADs.  Hence,
          any resource setup mechanism needs to mesh smoothly with the
          path setup mechanism incorporated into IDPR.

     o    Accounting

          The resource guarantee subsets ("classes") may be natural
          units for accounting.

  5.3  Proposed Actions

     The actions called for here are further research on the technical
     issues listed above, followed by development and standardization
     of appropriate protocols.  DARTnet, the DARPA Research Testbed
     network, will play an important role in this research.

6.  ADVANCED APPLICATIONS

  One may ask: "What network-based applications do we want, and why
  don't we have them now?"  It is easy to develop a large list of
  potential applications, many of which would be based on a
  client/server model.  However, the more interesting part of the
  question is: "Why haven't people done them already?"  We believe the
  answer to be that the tools to make application writing easy just do
  not exist.

  To begin, we need a set of common interchange formats for a number of
  data items that will be used across the network.  Once these common
  data formats have been defined, we need to develop tools that the
  applications can use to move the data easily.

  6.1  Common Interchange Formats

     The applications have to know the format of information that they
     are exchanging, for the information to have any meaning.   The
     following format types are to concern:

     (1)  Text - Of the formats in this list, text is the most stable,
          but today's international Internet has to address the needs



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 18]

RFC 1287            Future of Internet Architecture        December 1991


          of character sets other than USASCII.

     (2)  Image -  As we enter the "Multimedia Age", images will become
          increasingly important, but we need to agree on how to
          represent them in packets.

     (3)  Graphics - Like images, vector graphic information needs a
          common definition. With such a format we could exchange
          things like architectural blueprints.

     (4)  Video - Before we can have a video window running on our
          workstation, we need to know the format of that video
          information coming over the network.

     (5)  Audio/Analog - Of course, we also need the audio to go with
          the video, but such a format would be used for representation
          of all types of analog signals.

     (6)  Display - Now that we are opening windows on our workstation,
          we want to open a window on another person's workstation to
          show her some data pertinent to the research project, so now
          we need a common window display format.

     (7)  Data Objects - For inter-process communications we need to
          agree on the formats of things like integers, reals, strings,
          etc.

     Many of these formats are being defined by other, often several
     other, standards organizations.  We need to agree on one format
     per category for the Internet.

  6.2  Data Exchange Methods

     Applications will require the following methods of data exchange.

     (1)  Store and Forward

          Not everyone is on the network all the time.  We need a
          standard means of providing an information flow to
          sometimes-connected hosts, i.e., we need a common store-and-
          forward service.  Multicasting should be included in such a
          service.

     (2)  Global File Systems

          Much of the data access over the network can be broken down
          to simple file access. If you had a real global file system
          where you access any file on the Internet (assuming you have



Clark, Chapin, Cerf, Braden, & Hobby                           [Page 19]

RFC 1287            Future of Internet Architecture        December 1991


          permission), would you ever need FTP?

     (3)  Inter-process Communications

          For a true distributed computing environment, we need the
          means to allow processes to exchange data in a standard
          method over the network.  This requirement encompasses RPC,
          APIs, etc.

     (4)  Data Broadcast

          Many  applications need to send the same information to many
          other hosts.  A standard and efficient method is needed to
          accomplish this.

     (5)  Database Access

          For good information exchange, we need to have a standard
          means for accessing databases. The Global File System can get
          you to the data, but the database access methods will tell
          you about its structure and content.

     Many of these items are being addressed by other organizations,
     but for Internet interoperability, we need to agree on the methods
     for the Internet.

     Finally, advanced applications need solutions to the problems of
     two earlier areas in this document.  From the Traffic Control and
     State area, applications need the ability to transmit real-time
     data.  This means some sort of expectation level for data delivery
     within a certain time frame.  Applications also require global
     authentication and access control systems from the Security area.
     Much of the usefulness of today's Internet applications is lost
     due to the lack of trust and security.  This needs to be solved
     for tomorrow's applications.
















Clark, Chapin, Cerf, Braden, & Hobby                           [Page 20]

RFC 1287            Future of Internet Architecture        December 1991


7.  REFERENCES

  [1]  Cerf, V. and R. Kahn, "A Protocol for Packet Network
       Intercommunication," IEEE Transactions on Communication, May
       1974.

  [2]  Postel, J., Sunshine, C., and D. Cohen, "The ARPA Internet
       Protocol," Computer Networks, Vol. 5, No. 4, July 1981.

  [3]  Leiner, B., Postel, J., Cole, R., and D. Mills, "The DARPA
       Internet Protocol Suite," Proceedings INFOCOM 85, IEEE,
       Washington DC, March 1985.  Also in: IEEE Communications
       Magazine, March 1985.

  [4]  Clark, D., "The Design Philosophy of the DARPA Internet
       Protocols", Proceedings ACM SIGCOMM '88, Stanford, California,
       August 1988.

  [5]  Mogul, J., and J. Postel, "Internet Standard Subnetting
       Procedure", RFC 950, USC/Information Sciences Institute, August
       1985.

  [6]  Mockapetris, P., "Domain Names - Concepts and Facilities", RFC
       1034, USC/Information Sciences Institute, November 1987.

  [7]  Deering, S., "Host Extensions for IP Multicasting", RFC 1112,
       Stanford University, August 1989.

  [8]  "Proceedings of the Twenty-First Internet Engineering Task
       Force", Bell-South, Atlanta, July 29 - August 2, 1991.





















Clark, Chapin, Cerf, Braden, & Hobby                           [Page 21]

RFC 1287            Future of Internet Architecture        December 1991


APPENDIX A: Setting the Stage


  Slide 1
                          WHITHER THE INTERNET?

                        OPTIONS FOR ARCHITECTURE



                          IAB/IESG -- Jan 1990



                             David D. Clark



  __________________________________________________________________
  Slide 2

                     SETTING THE TOPIC OF DISCUSSION

  Goals:

      o Establish a common frame of understanding for
        IAB, IESG and the Internet community.

      o Understand the set of problems to be solved.

      o Understand the range of solutions open to us.

      o Draw some conclusions, or else
        "meta-conclusions".

















Clark, Chapin, Cerf, Braden, & Hobby                           [Page 22]

RFC 1287            Future of Internet Architecture        December 1991


  __________________________________________________________________
  Slide 3

                       SOME CLAIMS -- MY POSITION

  We have two different goals:
     o Make it possible to build "The Internet"
     o Define a protocol suite called Internet

  Claim: These goals have very different implications.
    The protocols are but a means, though a powerful one.

  Claim: If "The Internet" is to succeed and grow, it will
    require specific design efforts.  This need will continue
    for at least another 10 years.

  Claim: Uncontrolled growth could lead to chaos.

  Claim: A grass-roots solution seems to be the only
    means to success.  Top-down mandates are powerless.


  __________________________________________________________________
  Slide 4

                         OUTLINE OF PRESENTATION

  1) The problem space and the solution space.

  2) A set of specific questions -- discussion.

  3) Return to top-level questions -- discussion.

  4) Plan for action -- meta discussion.

  Try to separate functional requirements from technical approach.

  Understand how we are bounded by our problem space and our
    solution space.

  Is architecture anything but protocols?










Clark, Chapin, Cerf, Braden, & Hobby                           [Page 23]

RFC 1287            Future of Internet Architecture        December 1991


  __________________________________________________________________
  Slide 5

                       WHAT IS THE PROBLEM SPACE?

  Routing and addressing:
     How big, what topology, and what routing model?

  Getting big:
     User services, what technology for host and nets?

  Divestiture of the Internet:
     Accounting, controlling usage and fixing faults.

  New services:
     Video? Transactions? Distributed computing?

  Security:
     End node or network?  Routers or relays?

  __________________________________________________________________
  Slide 6

                       BOUNDING THE SOLUTION SPACE

  How far can we migrate from the current state?
     o Can we change the IP header (except to OSI)?
     o Can we change host requirements in mandatory ways?
     o Can we manage a long-term migration objective?
        -  Consistent direction vs. diverse goals, funding.

  Can we assume network-level connectivity?
     o Relays are the wave of the future (?)
     o Security a key issue; along with conversion.
     o Do we need a new "relay-based" architecture?

  How "managed" can/must "The Internet" be?
     o Can we manage or constrain connectivity?

  What protocols are we working with? One or many?











Clark, Chapin, Cerf, Braden, & Hobby                           [Page 24]

RFC 1287            Future of Internet Architecture        December 1991


  __________________________________________________________________
  Slide 7

                       THE MULTI-PROTOCOL INTERNET

  "Making the problem harder for the good of mankind."

  Are we migrating, interoperating, or tolerating multiple protocols?
     o Not all protocol suites will have same range of functionality
       at the same time.
     o "The Internet" will require specific functions.

  Claim: Fundamental conflict (not religion or spite):
     o Meeting aggressive requirements for the Internet
     o Dealing with OSI migration.

  Conclusion: One protocol must "lead", and the others must follow.
     When do we "switch" to OSI?

  Consider every following slide in this context.

  __________________________________________________________________
  Slide 8

                         ROUTING and ADDRESSING

  What is the target size of "The Internet"?
     o How do addresses and routes relate?
     o What is the model of topology?
     o What solutions are possible?

  What range of policy routing is required?
     o BGP and IDRP are two answers.  What is the question?
     o Fixed classes, or variable paths?
     o Source controlled routing is a minimum.

  How seamless is the needed support for mobile hosts?
     o New address class, rebind to local address, use DNS?

  Shall we push for Internet multicast?











Clark, Chapin, Cerf, Braden, & Hobby                           [Page 25]

RFC 1287            Future of Internet Architecture        December 1991


  __________________________________________________________________
  Slide 9

                       GETTING BIG -- AN OLD TITLE

  (Addressing and routing was on previous slide...)

  What user services will be needed in the next 10 years?
     o Can we construct a plan?
     o Do we need architectural changes?

  Is there a requirement for dealing better with ranges in
     speed, packet sizes, etc.
     o Policy to phase out fragmentation?

  What range of hosts (things != Unix) will we support?


  _________________________________________________________________
  Slide 10

                        DEALING WITH DIVESTITURE

  The Internet is composed of parts separately managed and
  controlled.

  What support is needed for network charging?
     o No architecture implies bulk charges and re-billing, pay
         for lost packets.
     o Do we need controls to supply billing id or routing?

  Requirement: we must support links with controlled sharing.
     (Simple form is classes based on link id.)
     o How general?

  Is there an increased need for fault isolation? (I vote yes!)
     o How can we find managers to talk to?
     o Do we need services in hosts?













Clark, Chapin, Cerf, Braden, & Hobby                           [Page 26]

RFC 1287            Future of Internet Architecture        December 1991


  _________________________________________________________________
  Slide 11

                              NEW SERVICES

  Shall we support video and audio? Real time? What %?
     o Need to plan for input from research.  What quality?
     o Target date for heads-up to vendors.

  Shall we "better" support transactions?
     o Will TCP do? VMTP? Presentation? Locking?

  What application support veneers are coming?
     o Distributed computing -- will it actually happen?
     o Information networking?

  __________________________________________________________________
  Slide 12

                                SECURITY

  Can we persist in claiming the end-node is the only line of defense?
     o What can we do inside the network?
     o What can ask the host to do?

  Do we tolerate relays, or architect them?
  Can find a better way to construct security boundaries?

  Do we need global authentication?

  Do we need new host requirements:
     o Logging.
     o Authentication.
     o Management interfaces.
        - Phone number or point of reference.

  __________________________________________________________________














Clark, Chapin, Cerf, Braden, & Hobby                           [Page 27]

RFC 1287            Future of Internet Architecture        December 1991


APPENDIX B: Group Membership

  Group 1: ROUTING AND ADDRESSING

      Dave Clark, MIT  [Chair]
      Hans-Werner Braun, SDSC
      Noel Chiappa, Consultant
      Deborah Estrin, USC
      Phill Gross, CNRI
      Bob Hinden, BBN
      Van Jacobson, LBL
      Tony Lauck, DEC.

  Group 2: MULTI-PROTOCOL ARCHITECTURE

      Lyman Chapin, BBN  [Chair]
      Ross Callon, DEC
      Dave Crocker, DEC
      Christian Huitema, INRIA
      Barry Leiner,
      Jon Postel, ISI

  Group 3: SECURITY ARCHITECTURE

      Vint Cerf, CNRI  [Chair]
      Steve Crocker, TIS
      Steve Kent, BBN
      Paul Mockapetris, DARPA

  Group 4: TRAFFIC CONTROL AND STATE

      Robert Braden, ISI  [Chair]
      Chuck Davin,  MIT
      Dave Mills, University of Delaware
      Claudio Topolcic, CNRI

  Group 5: ADVANCED APPLICATIONS

      Russ Hobby, UCDavis  [Chair]
      Dave Borman, Cray Research
      Cliff Lynch, University of California
      Joyce K. Reynolds, ISI
      Bruce Schatz, University of Arizona
      Mike Schwartz, University of Colorado
      Greg Vaudreuil, CNRI.






Clark, Chapin, Cerf, Braden, & Hobby                           [Page 28]

RFC 1287            Future of Internet Architecture        December 1991


Security Considerations

  Security issues are discussed in Section 4.

Authors' Addresses

  David D. Clark
  Massachusetts Institute of Technology
  Laboratory for Computer Science
  545 Main Street
  Cambridge, MA 02139

  Phone: (617) 253-6003
  EMail: [email protected]

  Vinton G. Cerf
  Corporation for National Research Initiatives
  1895 Preston White Drive, Suite 100
  Reston, VA 22091

  Phone: (703) 620-8990
  EMail: [email protected]

  Lyman A. Chapin
  Bolt, Beranek & Newman
  Mail Stop 20/5b
  150 Cambridge Park Drive
  Cambridge, MA 02140

  Phone: (617) 873-3133
  EMail: [email protected]

  Robert Braden
  USC/Information Sciences Institute
  4676 Admiralty Way
  Marina del Rey, CA 90292

  Phone: (310) 822-1511
  EMail: [email protected]

  Russell Hobby
  University of California
  Computing Services
  Davis, CA 95616

  Phone: (916) 752-0236
  EMail: [email protected]




Clark, Chapin, Cerf, Braden, & Hobby                           [Page 29]