idnits 2.17.1 draft-terrell-ip-spec-ipv7-ipv8-addr-cls-06.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- ** Looks like you're using RFC 2026 boilerplate. This must be updated to follow RFC 3978/3979, as updated by RFC 4748. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- ** The document seems to lack a 1id_guidelines paragraph about 6 months document validity -- however, there's a paragraph with a matching beginning. Boilerplate error? == There is 1 instance of lines with non-ascii characters in the document. == The page length should not exceed 58 lines per page, but there was 1 longer page, the longest (page 1) being 2964 lines Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** The document seems to lack a Security Considerations section. ** The document seems to lack an IANA Considerations section. (See Section 2.2 of https://www.ietf.org/id-info/checklist for how to handle the case when there are no actions for IANA.) ** The document seems to lack separate sections for Informative/Normative References. All references will be assumed normative when checking for downward references. ** There are 6 instances of lines with control characters in the document. == There are 37 instances of lines with non-RFC6890-compliant IPv4 addresses in the document. If these are example addresses, they should be changed. == There are 3 instances of lines with private range IPv4 addresses in the document. If these are generic example addresses, they should be changed to use any of the ranges defined in RFC 6890 (or successor): 192.0.2.x, 198.51.100.x or 203.0.113.x. Miscellaneous warnings: ---------------------------------------------------------------------------- == Line 888 has weird spacing: '...mber of avail...' -- The document seems to lack a disclaimer for pre-RFC5378 work, but may have content which was first submitted before 10 November 2008. If you have contacted all the original authors and they are all willing to grant the BCP78 rights to the IETF Trust, then this is fine, and you can ignore this comment. If not, you may need to add the pre-RFC5378 disclaimer. (See the Legal Provisions document at https://trustee.ietf.org/license-info for more information.) -- The document date (June 08, 2000) is 8721 days in the past. Is this intentional? Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) No issues found here. Summary: 6 errors (**), 0 flaws (~~), 5 warnings (==), 2 comments (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 1 IT Professional, Author / Researcher E. Terrell 2 Internet Draft December 1999 3 Category: Proposed Standard 4 Document: draft-terrell-ip-spec-ipv7-ipv8-addr-cls-06.txt 5 Expires June 08, 2000 7 Internet Protocol Specifications for IPv7 and IPv8 Address Classes 9 Status of this Memo 11 This document is an Internet-Draft and is in full conformance with 12 all provisions of Section 10 of RFC2026. 14 Internet-Drafts are working documents of the Internet Engineering 15 Task Force (IETF), its areas, and its working groups. Note that 16 other groups may also distribute working documents as Internet- 17 Drafts. 19 Internet-Drafts are draft documents valid for a maximum of six months 20 and may be updated, replaced, or obsoleted by other documents at any 21 time. It is inappropriate to use Internet-Drafts as reference 22 material or to cite them other than as ``work in progress''. 24 The list of current Internet-Drafts can be accessed at 25 http://www.ietf.org/ietf/1id-abstracts.txt 27 The list of Internet-Draft Shadow Directories can be accessed at 28 http://www.ietf.org/shadow.html. 30 Conventions 32 Please note the font size of the Tables contained in this white paper 33 are smaller than the expected 12 pts. However, if you are using the 34 most current Web Browser, the View Section of the Title bar provides 35 you with the option to either increase or decrease the font size for 36 comfort level of viewing. (Provided that this is the HTML version.) 38 Moreover, the reader should also be well advised, that the Version 39 Numbers, IPv7 and IPv8, are not version numbers assigned by IESG. 40 They nonetheless provide convenience, which serve as the support 41 for the underlining deliberation until such an assignment by 42 IETF/IESG can be made. 44 Contents 46 Preface 48 Abstract 50 Overview 52 Chapter I: An Overview of IPv7 the Exploitation of Ipv4 54 Chapter II: An Overview of IPv8 the Enhancement of Ipv7 56 Chapter III: The Principles of Subnetting in IPv7 & IPv8 58 Chapter IV: The Structure of the Header of IPv8 60 Chapter V Conclusion: The Benefits of IPv7 and IPv8 62 Security: The Relationship between IPv7 & IPv4, and the 63 Suggested / Recommended Alternatives for IPv8 65 Appendix I: Graphical Schematic of the IP Slide Ruler 67 Appendix II: The Mathematical Anomaly Explained 69 Appendix III: The Reality of IPv6 vs IPv8 71 References 73 Preface 75 The Internet is a tool, a growing medium, which is for the use, 76 enjoyment and exploitation by all of Humanity. And I truly believe, 77 it is the hope of every contributor, that we, I mean everyone, can 78 benefit from its use. 80 The writing of this draft, as well as the other independent and 81 informative works posted on Wed-Sites throughout the Internet. For 82 the most part, are intended to provide or impart knowledge to the 83 general and faceless public the world over. These works, via the 84 Internet, open a Public forum for discussion and debate regarding 85 the subject matter of their deliberation, which has never existed 86 before. And while this is not to say, that personal feeling will or 87 will not become an integral part of these forums. Personal feelings 88 notwithstanding, however, they can not maintain a place in any 89 Scientific Investigation. Nor should they become the decisive factor 90 regarding the determination of the validity and truth of any material 91 facts whose weight is the same. This is not to say however, that the 92 author of such works, are not obligated to provide the essential 93 facts and evidence that would support the foundation of subject matter 94 they are presenting. Quite the contrary, there is a demand imposed 95 upon all of us, the constraint inherent to time. Which commands, that 96 we provide as much information as possible, so that every reader can 97 understand the concepts of the presentation in the shortest amount of 98 time. 100 Needless to say, the provisions, as is the foundations of this 101 presentation, are not designed to invoke or promote personal feelings. 102 And they shall not under any circumstances, become a subject worthy 103 of intellectual discourse. 105 Nevertheless, there are several points presented in this work, which 106 has sparked much debate and disagreement: 108 1. Class vs Classless System- Which are we really using? 110 2. The Mathematical Anomaly- Can we use what the Router uses? Or! 111 Does the limit of 254, as applied to the Host count, apply to 112 the Network counts as well? 114 3. The Expansion and Exploitation of IPv4- Is IPv7 & IPv8 logical? 116 4. The Difference between the Binary and Decimal Methods- What the 117 Router must know vs what is available to the Administrators! Or- 118 Is their respective knowledge of the IP Addresses governed by 119 the same Laws regarding usage and implementation? 121 To clarify the ongoing disagreements, as noted above. I would first 122 call to the attention of the readers, the work published by 'Craig 123 Hunt and Robert Bruce Thompson'; "Windows NT TCP/IP Network 124 Administration". The authors state, regarding number 1 noted above 125 (Chapter 2, Subnets, last paragraph, page 34): "Whether the address 126 is divided in the network and host parts by address class rules, 127 classless address mask, or a subnet mask, the constituent parts of 128 the address are both used to deliver the data. ..." And clearly 129 points out the difference between the Router's view of the Bit or 130 Binary Address numbers, and the Decimal Addresses, which impose 131 constraints upon the Administrators (relating to numbers 2 and 4 132 noted above). Which implies, that the Router must know and use every 133 number within the Address Range. However, while the Administrator can 134 and often uses both methods, definitions limit the number of Decimal 135 addresses available. Furthermore, regarding number 3 noted above, 136 that is, IPv7 and IPv8. It should be understood, they are in fact the 137 logical derivatives resulting from the expansion and exploitation of 138 IPv4, and the gist underlining the presentation of this paper. 140 In other words, except for the exploitation and expansion of IPv4, 141 and the trade-off of presenting a logically deduced structure for 142 Supernetting the Binary or the Decimal representations: where the 143 Subnet Bit Mask was the winner. Nothing else is new. That is, all 144 other material presented herein is either well known, or has been 145 presented to the readers in some form of another. Moreover, this 146 would also account for the Mathematical Error in IPv7, which the 147 calculated result of the Exploitation IPv7 did not yield the 148 2.0 x 10^9 additional IP Addresses, but an amount of available IP 149 Addresses identical number of available and existing in IPv4: 150 3.64 x 10^9. The reality of which, is that, the total number of 151 available IP Addresses from the Supernetting of IPv4 is equal the 152 number of available IP Addresses in IPv7. Moreover, the proof of this 153 final conclusion, if not considered the satisfactory result embodied 154 in this work. It should be clearly understood, that its conclusion is 155 indeed logically derived, and can be presented as such in a more 156 rigorous work, which is well beyond the scope of this presentation. 158 Nevertheless, there is absolutely No Con's accompanying the Author's 159 acknowledgment of his error. However, the Pro's are that, IPv7 is 160 equal to and Logically Derived from IPv4, having only a different 161 representation of its IP Addressing Scheme. Furthermore, its 162 enhancement, IPv8, can be shown to maintain a greater number of 163 available IP Addresses. Whose ease of use and implementation alone, 164 make it a far superior IP Addressing System than IPv6. Not to mention, 165 the applause, which is determined to be an expansion far greater than 166 3.64 x 10^9 addresses available in IPv7 / IPv4. Which can be equal to 167 either, the previously calculated total of 1.43 x 10^12 IP Addresses 168 per Zone IP having 254 available IP Area Codes. Or 9.24 x 10^11 IP 169 Addresses per Zone IP (254) having 254 available IP Area Codes, 170 which is the logical derivative of IPv7. And while this presentation 171 can only suggest IPv8 as an alternate solution in resolving the IP 172 Addressing dilemma. It is indeed a recommendation that the choice 173 would be that which is the Logical Derivative of IPv7. 175 Nevertheless, the information presented herein establishes the 176 identity existing between IPv4 and IPv7. Which also provides an 177 unquestionable proof, that this identity clearly shows there was 178 never an elimination of the Class System governing IP Addressing. 179 In which case, this also eliminates the claim of the existence of the 180 Classless System as being false. While strengthening the call, if not 181 demand for a more rigorous adherence to the Rules of Logic, and the 182 need to employ the services of the Educated Professionals from 183 noted Universities, to evaluate the works which might become a 184 standard used by all of humanity. 186 Abstract 188 This paper is a direct result, necessitated by the correction of the 189 mathematical anomaly that plague IPv4. Whose resolution also proposed 190 an end to the disparities resulting from a shortage of available IP 191 Addresses. However, the proposal did not seem to garner the unfledging 192 support through the suggestion of an alternate IP system of 193 addressing. Which is nothing more than an exploitation of the present 194 IPv4 system. As presented in the paper entitled; "The Mathematical 195 Reality of IP Addressing in IPv4 Questions the need for Another IP 196 System of Addressing". 198 Needless to say, it is thought that a greater clarification of the 199 underlining foundation of this subject matter is that which is 200 needed. Notwithstanding my personal beliefs, that the promises made 201 by the IT Industry itself, will not be forth coming if an adequate 202 IP System of Addressing is not employed. Nor the mention of the hidden 203 cost the consumer is expected to pay, which is a direct result of 204 their knowledge regarding a clear understanding of our present 205 technology, and the ability of the Technology to the IT Industry, 206 which could reduce the overall cost today. All while fulfilling of the 207 promises they made to the consumer, which becomes the reality of a 208 future which benefits all mankind. 210 Nevertheless, the Overview is an attempt to provide the reader with 211 a succinct introductory foundation of those aspects of the Internet 212 Protocol that will change as a direct result of the implementation 213 of either IPv7 or IPv8. In other words, I shall present only those 214 aspects of IPv4 that deal with its methods of Addressing and its 215 former Class Structure. However, while admitting this would be an 216 over simplification of its functional use or purpose, and a serious 217 reduction of an adequate explanation of a vast majority of the 218 information that encompasses the foundation of IP Specification. It is 219 nevertheless, seen justifiable, because the remaining aspects 220 concerning the IP Specification will not change, and shall retain 221 their functional use regardless of whether or not these systems are 222 employed. However, there will not be any analysis, which would 223 propose a mandate for implementation of either of these IP Addressing 224 Systems, as the suitable replacement of IPv4. That is to say, not 225 unless the foundations as presented by this work, become the Standard 226 chosen after an extensive review and comprehensive analysis by the 227 members of the committee for the IESG and IETF. 229 In short, the analysis providing the support for a further 230 exploitation of IPv4 has been presented, and the information provided 231 in the remaining chapters of this paper shall entertain only the 232 aspects of IPv7 and IPv8 which differ from that of IPv4. This 233 however, does not include the chapter dealing with Subnetting. 234 Especially since, there is a significant difference, and an argument 235 can be made that would warrant not only a comparative analysis, but 236 support for its justification as well. 238 Overview 240 There are several issues of concern when dealing with the topic of IP 241 Addressing. However, the two main aspects of addressing in the IP 242 Specifications that warrant mention are, Addressing and Fragmentation. 243 Nevertheless, since the methods employed in fragmentation and the IP 244 Specifications dealing with the interaction with other Protocols or 245 its Modules, will not change as such, they will not be a subject 246 entertained in this Overview. Where as, the matters which are 247 presented, deal only with the subject of Addressing and Address 248 Availability in the IP Specifications for IPv4, which encompass the 249 'Class and the Classless Systems'. Hence, all other related subject 250 matters are beyond the scope of this presentation. 252 Nevertheless, the current IP Specification methodology for IP 253 addressing in the present Addressing Scheme, is the 'CLASSLESS 254 System'. However, while the IP Specifications employing the 'CLASS 255 System' of Addressing are no longer used. There are similarities 256 remaining in each of these systems, especially since they are both 257 derived from the IPv4 IP Specifications. That is, the shared 258 practices, descriptions, and methodologies of each system is 259 governed by and identified as being: 'The IPv4 Class Address Range'; 260 'The 32 Bit IP Address Format'; 'The Method for Subnetting'; 261 'The Principle of the Octet'; and 'The Binary and Decimal 262 representations of the IP Address'. 264 The Binary and Decimal representations in the IP Address 266 The Binary and Decimal representations are two different mathematical 267 systems of enumeration. In which the Binary Representation is a 268 Mathematical System dealing with the operations of Logical 269 Expressions having only two states, which can be translated to 270 represent Integers and Fractions. While the Decimal Representation, 271 is a Mathematical System involving the operations of Integers, and 272 can only represent the Whole Numbers used in Counting. Needless to 273 say, in spite of the existing differences. These mathematical systems 274 are shared and used by both, the Class and Classless Systems. 276 The difference however, underlies the structure of their respective 277 Mathematical Systems. In other words, only two Binary Representations 278 exist, that being a '1' or a '0'. However, the combined use of One's 279 and Zero's in a series, can be used to represent any Integer. That is, 280 for some representative combination of 1's and 0's in a series, there 281 can exist one and only Integer, in which this Series is Equal to. 282 Even then, a Mathematical Equation involving the Integers must exist, 283 which would 'Translate' this Binary Representation into its Decimal 284 (Integer) Equivalent. In which case, the result would be an 285 enumeration representing 'One-to-One' Correspondence that is an 286 Expression of Equality. In which two different systems represent the 287 same quantity. Nonetheless, each would retain an independence from 288 the other, in any quantitative result of their employ, governed by 289 the Mathematical Laws specific to their operation. 291 Nevertheless, the mathematical operation used to perform this 292 Translation between the Binary and Decimal representations is 293 Multiplication. In which the equation is an Exponential Operation 294 involving Integers. Where by, for every Translation of any Decimal 295 (Integer) number is given by Table 1. 297 TABLE 1. 299 4 3 2 1 300 X X X X <----------| 301 | | | | | 302 | | | | v 303 1. | | | |<---> 2^0 = B x 2^0 304 | | | 305 2. | | |<---------> 2^1 = B x 2^1 306 | | 307 3. | |<---------------> 2^2 = B x 2^2 308 | 309 4. |<---------------------> 2^3 = B x 2^3 311 Where it is given that, the value of B represents the Binary 312 representation of either a 1 or a 0. Which will equal the value of 313 X (the top of the Table). Needless to say, it should be clear that 314 any Decimal (Integer Value) can be represented using this method. 315 Where by, a Binary value of 1, in the B column of equation 1, is a 316 Binary value of 1 for its corresponding X, and the result of the 317 equation is the Decimal (Integer value) value equal to 1. Hence, 318 the Decimal representation is equal to the Sum of the results from 319 the Equations for which the value of X equals 1, and this process 320 proceeds from the Left to the Right. 322 Nonetheless, while the process of Translating a Decimal (Integer 323 value) number to its Binary equivalent seems a little more involved. 324 It is nonetheless, the reverse of the process as noted above. Which 325 is shown in Table 2. 327 TABLE 2. 329 4 3 2 1 330 X X X X <-------------> | 331 | | | | | 332 | | | | v 333 1. | | | |<---> 2^0 = D - (B x 2^0) = Y 334 | | | 335 2. | | |<---------> 2^1 = D - (B x 2^1) = Y 336 | | 337 3. | |<---------------> 2^2 = D - (B x 2^2) = Y 338 | 339 4. |<---------------------> 2^3 = D - (B x 2^3) = Y 341 In other words, the Reverse process proceeds from the Right to the 342 Left. Which means, according to the corresponding equations, 'the 343 Binary Representation of any Decimal Number D, is equal to the 344 Decimal number (D) minus the Highest Value of the Exponential 345 Equation yielding a Positive Number, Y. Until the value of their 346 Difference, Y, at some point, is Equal to Zero. 347 (Clearly Y is a Variable Integer) 349 Nevertheless, it is clearly a conclusion, as noted in the Tables 350 above, that the Binary Representation of an extremely large Integer 351 number, would indeed be a very long series of 1's and 0's. 352 Especially since, 1 and 0 are the only numbers used in enumeration 353 in this mathematical systems. In which the equality of a One-to-One 354 correspondence can exist only through the use of a mathematical 355 Translation, which clearly shows the existing differences in their 356 representations. 358 Nevertheless, the Tables above provided without any specifics or 359 consideration regarding any defining parameters, an explanation of 360 the method regarding Mathematical Translation for the representation 361 of either a Binary or Decimal number, into one or the other. 363 To be more specific however, in the IPv4 Addressing System, there are 364 Boundary's imposed upon the size of the Binary Series and the Range 365 of the Decimal (Integer Values)Representations, which help to define 366 the 32 Bit Address Range of the Internet Protocol. Where by, there 367 can only be 8 Bits (Binary 1's and or 0's) in a Binary Series, which 368 provides, in Translation, a Decimal Range of 1 - 255, inclusive. 370 Furthermore, it can also be concluded that a direct correlation 371 between the 8 digit and 3 digit displacements that are the 372 foundations of these respective systems, can not be achieved without 373 some form of Translation or multiplication Factor. Which would render 374 their respective displacements Equivalent. However, it should be 375 clearly noted. There is soundness in any argument for logical 376 foundation that would support such a justification. That is, a 377 One-to-One Correspondence between these two Mathematical Systems could 378 not be achieved without it. 380 In other words, while it is clear that this Digital Representation 381 is an existing difference between them. It should also be understood, 382 that even without Translation they each can only represent one Integer 383 Value. Needless to say, there abounds the possibility of Error in the 384 Calculations involving either of these systems. Especially when either 385 of these Mathematical Systems are used to represent or determine some 386 resulting value of the other. That is, errors become impossible to 387 avoid, with or without performing the necessary Translation to 388 achieve the One-to-One correspondence. Which maps accurately the 389 Total count of one system to that of other. Saying the very least 390 however, it seems to me, the choice would be to allow either the 391 Machine to manipulate the Binary Numbers, or calculate using only 392 the Decimal numbers, then translate the result to a Binary 393 Representation. 395 The 32 Bit Address Format and the Principle of the Octet 397 The 32 Bit Address Format in use today, comprises 4 sections, each 398 having a Binary Series of 8 Bits which can be any combination of 399 1's and 0's. Hence the name, Octet, represents the 8 Bit Binary 400 representation, of which there are 4 that make up the 32 Bit Address 401 Format. Nevertheless, its Decimal Translation, yields a Dotted 402 Notation having an Integer Range of 0 - 255 inclusive. 404 The IPv4 Address Class System 406 The IP Class System, while somewhat blurred through the use of the 407 Subnet Mask in the Supernetting methodology of the Classless System, 408 it has not yet, lost the significance of its use. 410 Nevertheless, it is given by the defacto Standard, that the IP Class 411 of a given Network Address is determined by the Decimal value of the 412 First Octet relative to the IP Address Class Range in which it is 413 associated. This method is used in conjunction with the Default 414 Subnet Mask to determine the total number of IP Addresses available 415 for the calculation of the total number of Networks and Hosts, and 416 their distribution counts for every IP Address Range. Where by, the 417 Default Subnet Mask maintains a Decimal value of 255 for every Octet 418 in which it is assigned. This Decimal value translates to a Binary 419 Representation of all 1's, or 8 Binary 1's (11111111) in every Octet 420 in which it is used. However, the mathematical method employed to 421 resolve the Network IP Address in which the Default Subnet Mask is 422 associated, is called BITWISE ANDING. Nonetheless, Bitwise Anding is 423 a mathematical operation involving the Binary System, and is given 424 by Table 3. 426 TABLE 3 428 1. 1 and 1 = 1 429 2. 1 and 0 = 0 430 3. 0 and 0 = 0 432 Where by, the process of BITWISE ANDING is a Machine calculation 433 that can be performed by anyone. Its functional purpose is the 434 resolution of an IP Address, which can be either a Network or an 435 associated Host. 437 Nevertheless, the IP Class structure while providing a count of the 438 total Networks and Hosts for each IP Class, as shown in Table 4. 439 It additionally provided the IPv4 Addressing System with a structure, 440 methodology, and a small set of rules to govern the distribution, 441 deployment, and management of IP Addresses within any given 442 Internetwork or Network domain. Nonetheless, Table 5 provides the 443 description of its Binary interpretation, which is related to the 444 number of available Binary Digits that can be used, when translated, 445 to determine the Decimal Notation an IP Address, and the total number 446 of addresses available. 448 Table 4. 450 Structure of the IPv4 Representation IP Class System 452 Class A, 1 - 126, Default Subnet Mask 255.x.x.x: 453 126 Networks and 16,387,064 Hosts: 0 455 Class B, 128- 191, Default Subnet Mask 255.255.x.x: 456 16,256 Networks and 64,516 Hosts: 10 458 Class C, 192 - 223, Default Subnet Mask 255.255.255.x: 459 1,032,256 Networks and 254 Hosts: 110 461 Table 5 462 Structure of the Binary Representation of IPv4 464 1. Class A: 1 - 126, with 8 Bit Network Count and 24 Bit Host 465 count or 16,777,216 Hosts; Where 0 (Zero ) and 127 reserved 466 unknown Network and loopback, respectively. 468 2. Class B: 128 - 191, with 14 Bit Network Count and 469 16 Bit Host count or 65,536 Hosts 471 3. Class C: 192 - 223, with 24 Bit Network Count and 472 8 Bit Host count or 256 Hosts 474 4. Class D: 224 - 239 ; Used for Multicasting, Host 475 count not applicable 477 5. Class E: 240 - 254 ; Denoting Experimental, Host 478 counts not applicable 480 Note: There is no Division of Classes D or E. In fact, their 481 definitions provide descriptions of their functional use. 483 The Rules that enabled and govern the structure of the IPv4 484 Addressing System, are indeed laws. Where by, either the Internetwork 485 or Networking Domain could become disabled, if a violation of any one 486 or more of these laws occurred. Nevertheless, the laws as outlined in 487 Table 6, represents a Set of Restrictions and their, regarding the 488 Binary and Decimal values assigned to a given IP Address. However, 489 any further, or more detailed analysis of Table 6 would be 490 superfluous, because the presentation itself, is a definition. 492 Nevertheless, notwithstanding the benefits that the hierarchical 493 organizational structure of the IPv4 Class Addressing Scheme provided 494 the Networking Community as a whole. The treatment rendered, 495 regarding its explanation, while somewhat shallow, shall suffice as 496 the grounding foundation for the overall purposes and objectives of 497 this presentation. 499 TABLE 6 501 1. The Network Address portion of an IP address cannot be Set to 502 either all Binary Ones or All Binary Zeros 504 2. The Subnet portion of an IP address cannot be Set to either 505 All Binary Ones or All Binary Zeros 507 3. The Host portion of an IP address cannot be Set to All Binary 508 Ones or All Binary Zeros 510 4. The IP address 127.x.x.x can never be assigned as a Network 511 Address 513 The Differences between the Class and the Classless Systems 515 The fall of the IPv4 Class System of Addressing, as such, is viewed 516 as resulting from the lack of IP Addresses available for distribution 517 and servicing the every growing Global Internetworking Community. 519 Nevertheless, the IPv4 Class System has been described as an 520 Organized Hierarchical Class Structure. But, this not a definitive 521 depiction, noting that there are parts yet remaining within the IPv4 522 Class System, that are indeed wanting of a more conclusive and 523 exacting definition of their functional purpose. 525 This however, becomes even more apparent upon analysis of the use of 526 Default Subnet Mask for the Class B. That is, when compared with the 527 results of Appendix II and the definition of the use and purpose of 528 the Default Subnet Mask. Where by, it is clear from the definition 529 of the Default Subnet Mask. That its purpose defines the location 530 of the Octet, which is assigned some Decimal Value from the IP 531 Address Class Range. While its second use, is the identification or 532 resolution of a Network or Host IP Address. But clearly, this is not 533 sufficient. This is because, the processes underlining its functional 534 purpose are assumed, and based upon descriptive use, and not the 535 soundness of Logical reasoning derived from definitions. What this 536 implies, is that only the first Octet of any given Default IP Address, 537 maintains the right to be governed by some value relative to the IP 538 Address Range, which defines the IP Class to which any given IP 539 Address belongs. This, to say the very least, confounds the purpose 540 and use of the Default Subnet Mask in general, if not overall. 542 In other words, given the Class B as our example. Which has a Default 543 Subnet Mask of 255.255.000.000. Then, given the results, as that 544 given by equation 1a. We could conceivably derive two different 545 Decimal Values, which would be an equally accurate determination of 546 the number of Networks present in Class B. That is, provided there 547 does not exist a more precise definition, and or, functional use of 548 the Default Subnet Mask. And this is true, at least, regarding the 549 present interpretation and use of the Default Subnet Mask. 551 1a. 64 x 254 = 16,256 "OR" 64 x 64 = 4,096 553 (That is, given that: Class B 128 - 191, 554 Default Subnet Mask 255.255.000.000) 556 What this implies, is that, at present, we can use any value in the 557 range 0 - 255, to represent an IP Address, and this is regardless of 558 whether or not the Octet is governed by the Default Subnet Number, 255. 560 Needless to say, regardless of the method employed, they are clearly 561 different numerical values representing the same object, which are 562 indeed less than the Binary value given by 2^14 (16,384). Furthermore, 563 without the indulgence of another example, this conclusion is 564 applicable to the Class C as well. 565 (This problem is eliminated in IPv7.) 567 NOTE: This issue is even more pronounced when one considers 568 the Bit Count of the Number of Host for each of the 569 Default IP Address Class Ranges, and its corresponding 570 Decimal value. 572 Nevertheless, the concept of Masking and its inverse, 'Un-Masking', 573 deserves some attention. That is, the Subnet Mask, which is the 574 Catalysis for this presentation, is used by both of these Systems, 575 the Class and Classless. However, it is the concept of the Subnet 576 Mask, as it shall be discovered, which maintains a far greater 577 significance when distinguishing the difference between these two 578 Systems. 580 Notwithstanding, the notion, idea, or evolution of the Class System 581 would have been a resulting consequence, predicated by some 582 inseparable component regardless. Where by, the misnomer, 583 'Classless', is not the existing difference, which mandates the 584 defining distinction that separates these Systems. Needless to say, 585 the doubt, which the underpinning of this conclusion surmounts, is 586 the functional definition and the associated boundaries of the IP 587 Class Addressing System. Which is indeed, the IP Addressing 588 Divisional Methodology employed by each of these Systems. 590 Nonetheless, without any support outlining or defining a Structure, 591 one such component whose defined function, which would have caused 592 the predestine evolution each, is indeed that of the Subnet Mask. 594 Where by, the associated problems concerning IP Address availability 595 were resolved through the creation of another Sub-Division of the 596 Subnet Mask. Which indeed, is the 'DEBARKATION LINE', defining the 597 difference between these Systems. However, this was a two-phase 598 progression, involving two divisions of the Subnet Mask, the VLSM 599 and the SUPERNETTING of the Class C, CIDR. Nevertheless, Supernetting 600 maintains the distinction as being the USHER for the Classless. That 601 is, the underlining difference distinguishing these Systems. It does 602 moreover, impose a barrier, which limits the overview's presentation 603 to the relevance pertaining thereto. Nonetheless, it is worthy of 604 mention, noting that Supernetting can be viewed as a refinement of 605 VLSM, Variable Length Subnet Mask. 607 The promises of Supernetting, when viewed from its exploitation of 608 the Class C, as relinquishing the dependence upon the Class 609 Structured System, can be realized only if this application is 610 applied to the remaining Classes. At least, this is the current and 611 accepted outline of the Populist's view of the objectives presented. 612 Notwithstanding, the most discomforting drawback encompassing this 613 objective, is the elimination of the process and use of the Default 614 Subnet Mask( Which is blurred anyway.). Which ultimately means, the 615 redefining of the functional use of all Binary 1's and 0's within the 616 any given Octet, and the loss of the Logical Structure in IP 617 Addressing as well. 619 Nevertheless, there is indeed a warrant for an analysis of the 620 process of Supernetting, which transcends the obligations of this 621 overview. Needless to say, the foundational support of this argument 622 is the underlining objectives found upon the Internet Draft upon 623 which this presentation resides. Needless to say, prior to the 624 analysis and investigation of Supernetting, a brief introduction of 625 some of the foundational principles of Subnetting, from which 626 Supernetting is derived, is required. 628 The Binary Representation of 1's and 0's, and the specific rules for 629 their combination or usage, is the chosen form of communication used 630 in Machine Language. The principles of BITWISE ANDING was presented 631 in the section entitled, "The IPv4 Address Class System", which is 632 the mathematical method used by the Computer when the Subnet Mask 633 or the Default Subnet Mask is used to resolve either a Network or 634 Host IP Address. That is, if you were given a Decimal Network IP 635 Address of 172.16.182.19, the Machine or Computer could not read nor 636 translate these Integers into any usable format. That is to say, 637 there is a Translator for the Input and Output for the Computer, 638 because its language is of the Binary Format. In other words, the 639 Computer would read the Input of the IP Address, 172.16.182.19, as 640 given in figure 1. 642 Figure 1 643 Bit Map of the 32 Bit IP Address 645 10101100 00010000 10110110 00010011 647 However, through the use of the Default Subnet Mask, 255.255.255.000, 648 and its Binary translation, as given in figure 2. The Computer or 649 Router could, through the use of Bitwise Anding resolve the Network 650 Address for the given IP Address, as shown in figure 3. Whose Decimal 651 translation through the Binary Mathematics of Bitwise Anding would 652 yields the Network IP Address as, 172.16.182.000. 654 Figure 2 655 Bit Map of the 32 Bit IP Address 657 11111111 11111111 11111111 00000000 659 Figure 3 660 Bit Map of the 32 Bit IP Address 662 10101100 00010000 10110110 00000000 664 Nevertheless, there are several advantages that can be ascertained 665 through the use of the Subnet Mask, and even more, if the mathematics 666 of Bitwise Anding remain same. In other words, the problems 667 associated with the difference between the Binary and Decimal methods 668 of enumeration do not exist within the Machine's Mathematical 669 Calculations for the Translation into the Binary format. That is, the 670 Binary Format allows for the manipulation of individual BITS. Where 671 by, the resulting Decimal Translation could be either a Fraction or 672 an Integer. In which case, it is assumed that any resulting Fractional 673 Component produces a Range of possible Subnet numbers in which several 674 Network IP Addresses might belong. (Supernetting) 676 Nonetheless, the Breaking-Up, or the division of any Network into 677 smaller Sub-Networks, is called Subnetting. Which is accomplished 678 through the use of the Subnet Mask. Where the Subnet Mask can be 679 used or mapped onto any Octet, except the first Octet, which is 680 used to identify the Address Class Range to which a particular IP 681 Address might belong. Needless to say, there is a De Facto process 682 by which a Subnet Number is chosen, and these numbers are given in 683 Table 7. 685 TABLE 7 687 Values of Least Binary Decimal Number 688 Significant Bit: Representation: Equivalent: of Subnets: Host / per 690 0 00000000 0* 0 0 692 2^7 10000000 128 1 128 694 2^6 11000000 192 3 64 696 2^5 11100000 224 7 32 698 2^4 11110000 240 15 16 700 2^3 11111000 248 31 8 702 2^2 11111100 252 63 4 704 2^1 11111110 254 127 2 706 2^0 11111111 255* N/A 708 Note: The 'Asterisk' represents Values that can not 709 be used by the OCTET, which is define by the 710 'Subnet Mask', this is a Law/Rule. 712 Nonetheless, the first example of the use of the Subnet was that of 713 the Default Subnet Mask, which was used with the Binary Mathematical 714 operation of Bitwise Anding to resolve the Network IP Address. 715 However, from the list summarized by Table 7, the Subnetting concept 716 can be further expanded, and use in an example to demonstrate the 717 division of a Network Address into several smaller Network Addresses. 718 That is, if given the Parent Network IP Address of '172.16.0.0', for 719 which smaller Subdivisions are sought. This being the conclusion 720 based upon an examination of the over all Network performance and 721 needs. Then the appropriate Subnet Mask can be derived from the 7 722 choices given by Table 7 based upon the conclusions. Wherefore, if 723 '252' is chosen, the IP address of this Decimal Number corresponds 724 to the Subnet Mask given by an IP Address of '225.255.252.0'. In 725 which a total number of 63 available Subnets can be generated from 726 '252'. Which is the result generated by its (252) division by the 727 factor determined as being the value of the Least Significant Bit 728 of its Binary Representation (4). However, the inclusive count 729 would maintain a composite value equal 64, which includes 252 in 730 the total. 732 Nevertheless, the resulting Subnet IP Addresses generated would be 733 determined by sequential additions of the Least Significant Bit (4) 734 to the Parent IP Network Address. Which also determine number of 735 hosts per Subnet, and is summarized in Table 7. 737 Notwithstanding, that the example above was a demonstration of the 738 concepts and underlining the principles of Subnetting. However, 739 its principles and concepts needless to say, is the foundation of 740 which the principles underlining the concept of Supernetting is 741 derived. Moreover, since it is the First Octet that is reserved 742 for the Identification of the IP Address Class to which any IP 743 Address belongs. The example chosen could have been selected from 744 any one of the 3 primary IP Address Classes. Hence, Supernetting 745 is the Subnetting of an IP Address having the Default Skeletal 746 Structure as defined for the Class A. (The depiction rendered by 747 this conclusion, is summarized in Table 8 of the next chapter.) 749 The concepts for the principles and beliefs in the Classless System, 750 in closing, is a derivation from the concepts of CLASSLESS 751 INTERDOMAIN ROUTING (CIDR). In which, the basic strategy is the 752 AGGREGATION of Multiple Divisions of an IP Address Class into One 753 Network. Whose size would exceed that of the initial IP Address 754 Class, and could be Routable using a 'One Route Path' for its 755 thoroughfare. In other words, the only real difference between the 756 CLASS and CLASSLESS Systems is that of the Routing Methodology they 757 employ. 759 Chapter I: An Overview of IPv7 the Expansion of Ipv4 761 The suitable replacement for IPv4 is IPv7, because it is identical, 762 and provides a greater adherence to the rules of any logical system 763 having an underlining mathematical foundation. Furthermore, while the 764 differences are small modifications to its foundational structure. 765 It is nonetheless, an exploitation and visual enhancement of IPv4. 766 Which the analysis of Tables 4, 5, and 6, including the concepts of 767 Supernetting, produces the results in Table 8 that provide the 768 justification for the results of Table 9. In other words, the vast 769 majority of the grounding principles and applications of IPv4 would 770 be the same in IPv7. 772 Nonetheless, it should be reasonably clear, that a Logical Foundation 773 is the mandated requirement for any system to maintain longevity as 774 an Organized Hierarchical Class Structure. In which case, the words 775 'De FACTO' and 'De JURE' would not have any relevant significance. 776 Which would warrant the acceptance or use, of some standard that 777 has no rational or logical foundation of its structure or application. 779 Table 8. 780 " The Reality resulting from Supernetting, the 781 combination of TABLES 4 and 5 yields" 783 Class A, 1 - 126, Default Subnet Mask 255.x.x.x: 784 126 Networks and 254^3 Hosts: 0 785 Total Number of IP Addresses Available: 786 126 x 16,387,064 = 2,064,770,064 788 Class B, 128- 191, Default Subnet Mask 255.x.x.x: 789 2^6 Networks and 254^3 Hosts: 10 790 Total Number of IP Addresses Available: 791 64 x 16,387,064 = 1,048,772,096 793 Class C, 192 - 223, Default Subnet Mask 255.x.x.x: 794 2^5 Networks and 254^3 Hosts: 110 795 Total Number of IP Addresses Available: 796 32 x 16,387,064 = 524,386,048 798 Class D, 224 - 239, Default Subnet Mask 255.x.x.x: 799 2^4 Networks and 254^3 Hosts: 1110 800 Total Number of IP Addresses Available: 801 16 x 16,387,064 = 262,193,024 803 Class E, 240 - 254, Default Subnet Mask 255.x.x.x: 804 15 Networks and 254^3 Hosts: 1111 805 Total Number of IP Addresses Available: 806 15 x 16,387,064 = 245,805,960 808 Note: Without having the Default Subnet Masking Define as limiting 809 the values of the Octet to the Address Range of the Class 810 in which it is mapped. Then, only the Value of the First 811 Octet in any IP Address can Determine the IP Address Class 812 of which, the resulting IP Address might belong. This means 813 that, the Total number of IP Addresses available is equal 814 to the Binary Bit Count of the Address Range multiplied 815 by the Host Bit Count, 2^24. That is, every Class can 816 maintain the Default IP Address as given for the Class A, 817 which justifies the Expansion as given in Table 7. 819 Table 9. 820 "Structure of the 'IDEAL' Decimal Representation of 821 the IP Class System" 823 1. Class A-1, 1 - 126, Subnet Identifier 255.000.000.000: 824 126 Networks and 254^3 Hosts: 0 825 Class A-2, 1- 126, Subnet Identifier 255.255.000.000: 826 126^2 Networks and 254^2 Hosts: 0 827 Class A-3, 1 - 126, Subnet Identifier 255.255.255.000: 828 126^3 Networks and 254 Hosts: 0 830 2. Class B-1, 128 - 191, Sublet Identifier 255.000.000.000: 831 64 Networks and 254^3 Hosts: 10 832 Class B-2, 128 - 191, Subnet Identifier 255.255.000.000: 833 64^2 Networks and 254^2 Hosts: 10 834 Class B-3, 128 -191, Subnet Identifier 255.255.255.000: 835 64^3 Networks and 254 Hosts: 10 837 3. Class C-1, 192 - 223, Subnet Identifier 255.000.000.000: 838 32 Networks and 254^3 Hosts: 110 839 Class C-2, 192 - 223, Subnet Identifier 255.255.000.000: 840 32^2 Networks and 254^2 Hosts: 110 841 Class C-3, 192 - 223, Subnet Identifier 255.255.255.000: 842 32^3 Networks and 254 Hosts: 110 844 4. Class D-1, 224 - 239, Subnet Identifier 255.000.000.000: 845 16 Networks and 254^3 Hosts: 1110 846 Class D-1, 224 - 239, Subnet Identifier 255.255.000.000: 847 16^2 Networks and 254^2 Hosts: 1110 848 Class D-3, 224 - 239, Subnet Identifier 255.255.255.000: 849 16^3 Networks and 254 Hosts: 1110 851 5. Class E-1, 240 - 254, Subnet Identifier 255.000.000.000: 852 15 Networks and 254^3 Hosts: 1111 853 Class E-2, 240 - 254, Subnet Identifier 255.255.000.000: 854 15^2 Networks and 254^2 Hosts: 1111 855 Class E-3, 240 - 254, Subnet Identifier 255.255.255.000: 856 15^3 Networks and 254 Hosts: 1111 858 Note: The Equation for Determining the IP Address Range for any IP 859 Class is; (REN - RBN) + 1 = Total of Available IP Addresses for 860 the given Class. (Where R = Range, E = End, B = Beginning, 861 N = Number) 863 However, the resulting expansion, that is IPv7, as summarized in 864 Table 9 raises an issue, while not a major problem. It does indeed, 865 represent a Mathematical Conflict within the of IPv7 Class Addressing 866 Scheme, as depicted in Table 9. Where by, the Mathematics Analysis 867 reveals that the Second Octet of the Primary Section of Each Class 868 maintains a Set of Values within each of their respective IP Address 869 Ranges. Which can not be employed or used as part of the count 870 resulting in the total number of available IP Addresses. This is 871 because they are not available as a valid IP Address, and if they 872 were, then there would exist a mathematical conflict with the 873 calculation of the total number of available IP Addresses of the 874 Secondary Section for each IP Address Class. In other words, there 875 would arise an error in reporting the results of the calculated 876 totals. This can easily visualized when compared with the results 877 of the second Octet of the Secondary Section for each of the IPv7 878 Class Address Ranges. That is, there exist a barrier imposed by the 879 use of the Subnet Identifier of the second Octet from the Secondary 880 Section of each IPv7 Class Address Schemes, with bars the use of 881 any of the numbers given by the IP Address Range for that given IP 882 Address Class. This is seen true, because the 1 - 254 total Host 883 Count, does indeed contain all of the numbers available to be used 884 as IP Addresses. However, this does not cripple the IPv7 Class 885 Addressing System. Where by, the calculation of the mathematical 886 difference between IP Address Range for each Class and the total 887 Host count would yield the valid Address Range that can be use to 888 calculate that total number of available IP Addresses. This however, 889 is provided that there exist a distinction between, and definitions 890 for the 'Default Subnet Mask', the 'Subnet Mask', and the 'Subnet 891 Identifier', which are given below. 893 Definitions 895 1. The Subnet Identifier defines the Default Subnet Mask and the 896 Octet, which can only be assigned the values specified by in 897 the IP Class Address Range within boundaries of IP Address 898 Class in which it is used. 900 2. The Default Subnet Mask has a Binary value of 11111111 and a 901 Decimal value of 255, it is used calculate the IP Network 902 Address and to map the location of the Network portion of the 903 IP Address defined by the Subnet Identifier. 905 3. The Subnet Mask is used to divide any Parent Network IP Address 906 into several smaller and Logical Sub-Networks. When used in 907 conjunction with the Default Subnet Mask, it identifies the 908 resulting Sub-Network IP Address it was used to create. 910 Nonetheless, the analysis of mathematical procedures for the 911 elimination of this discrepancy is achieved by definitions resulting 912 from the Laws of the Octet, which are summarized in Table 10. 914 TABLE 10 916 {" The Laws of the Octet "} 918 1. By definition, there exist 3 distinct Sections or Divisions 919 for every IP Address Class. However, the number of Sections 920 or Divisions is dependent upon IP Bit Address Range defined 921 for the IP Address. 923 2. The Sections or Divisions of the IP Address Class are defined 924 as: Primary, Secondary, Ternary, etc�And are labeled according 925 to their respective Class Location (e.g.: Class A would be Class 926 A-1, Class A-2, Class A-3, and continued as would be necessary 927 to distinguish the remaining Classes, B - E.) 929 3. The Subnet Identifier assigns to any Octet it defines in any 930 Section or Division of every IP Class, when not use as the 931 Default Subnet Mask, only the value of the numbers available 932 in the IP Address Range assigned to that IP Class. 934 4. For every OCTET in any Section or Division of any IP Class 935 that the Subnet Identifier does not define, can be assigned 936 any value in the range of 1 - 254. That is, provided that 937 there is no succeeding Section or Division, or if, there is 938 an OCTET in a succeeding Section or Division, whose reference 939 is the same, then it can not be defined by the Subnet 940 Identifier. {This is seen true, because the Octet of this 941 Section or Division, could not be in a Succeeding Section or 942 Division which the Subnet Identifier can define.} 944 5. For every OCTET within any Section or Division of any IP 945 Class, that is defined by the Subnet Identifier and is 946 preceded by a Section or Division whose reference is the 947 same Octet. Where the case is such that, the Octet of the 948 preceding Section or Division is not defined by the Subnet 949 Identifier. Then the Octet of the preceding Section, or 950 Division, can not be assigned any value as given by the IP 951 Address Range assigned to that IP Class. 953 Needless to say, this situation can be further explored, through 954 mathematical calculations. Where in the given example in this case 955 would be Class A-1 and Class A-2. 957 1. Class A-1, 1 - 126, Subnet Identifier 255.000.000.000: 958 126 Networks and 254^3 Hosts: 0 960 2. Class A-2, 1- 126, Subnet Identifier 255.255.000.000: 961 126^2 Networks and 254^2 Hosts: 10 963 Nevertheless, the examination of these classes yields the conclusion. 964 That the total number of available IP Addresses for each Class 965 Division equals the total number of IP Addresses available for the 966 given Address Class Range. Therefore, if Class A-1's second Octet 967 were to maintain any of the values in the IP Address Range, 1 - 126, 968 then it would be reporting IP Address of Class A-2 because the second 969 Octet of this Class is defined by the Subnet Identifier. However, the 970 easiest mathematical method for the determination of the total number 971 of available IP Addresses for any Class Division, would be to 972 calculate the total number of IP Addresses available from its DEFAULT 973 structure, as outlined in Table 11 and explained in the Note that 974 follows. Thus the value as would be determined from the calculation of 975 the Class A-1 IP Address configuration that can not be used. As is the 976 result of equation 3 and 4, becomes the number of available Hosts for 977 the Division or Section of the Class for which the calculation was 978 made. 980 In other words, the total number of IP Addresses available for any 981 given Address Class, must be equal to the sum of the total number of 982 addresses available per section or division comprising that Class. In 983 which case, our example would yield: 985 3. Class A-1, 1 - 126, Subnet Identifier 255.Y.X.X: 986 (126 x 128 x 254 x 254) = 1,040,514,048 Networks 987 {Where Y = the Range 127 - 254, inclusive} 989 and 991 4. 128 * (254)^2 = 8,258,048 Hosts: 0 993 Where the total number of available IP Addresses for the Class A 994 would be that given as: 996 5. 126 * (254)^3 = 2,064,770,064 998 In other words, equation 5 represents the total number of available 999 IP Addresses in the Class A, and equation 4 represents the total 1000 number of Hosts available to each network IP Address assigned to 1001 Class A-1. Furthermore, it should be understood, given by the 1002 Laws of the Octet, that the total number of available Network IP 1003 Addresses assigned to Class A-1 is given by equation 6: 1005 6. 126 x (254 - 126) x 254 x 254 = 1,040,514,048 1007 This method is summarized in Table 11. Where the results of equation 1008 6 equals the total number of IP Addresses available for assignment 1009 as a Parent Network in a Global Internetworking Environment, and 1010 the results of equation 4 yield the number of Hosts that can be 1011 repeatedly assigned and used as private Domain Network IP Addresses. 1012 In which case, one would need to access the Parent Network to have 1013 access to any of these internal private Networks and Hosts identified 1014 by these IP Addresses. Thus, there would be no conflict from there 1015 continued use, which is the process now employed. This of course, also 1016 means, that for every Global IP Address Assigned, there exist a total 1017 of 8.1 x 10^6 possible Networks that can be derived. 1019 NOTE: So not to violate the Laws of the Octet. It should 1020 be clearly understood that the last section of every 1021 Class can be represented by the Default Address given 1022 by: 255.255.ooo.ttt. (Where O = is the difference given 1023 by the equation: "254 - Y {IP Address Class Value}", and 1024 T = Total number of available IP Addresses{254}.) Where 1025 by, the total number of available Hosts, when Class A is 1026 the given example, for the last section of the Class A is 1027 given by: 1029 7. T x O = 126 x 254 = Host Count = 32,004 1031 Table 11. 1032 "Reality of the Structure of the Decimal Representation for the IP 1033 Class System."(Where the Value for the variable 'Y' is given by 1034 the Laws of the Octet.) 1036 1. Class A-1, 1 - 126, Subnet Identifier 255.y.x.x: 1037 1,040,514,048 Networks and 8,129,016 Hosts: 0 1038 Class A-2, 1- 126, Subnet Identifier 255.255.y.x: 1039 516,160,512 Networks and 32,004 Hosts 1040 Class A-3, 1 - 126, Subnet Identifier 255.255.255.y: 1041 256,048,128 Networks and 126 Hosts 1043 2. Class B-1, 128 - 191, Subnet Identifier 255.y.x.x: 1044 784,514,560 Networks and 4,129,024 Hosts: 10 1045 Class B-2, 128 - 191, Subnet Identifier 255.255.y.x: 1046 197,672,960 Networks and 16,256 Hosts 1047 Class B-3, 128 -191, Subnet Identifier 255.255.255.y: 1048 49,807,360 Networks and 64 Hosts 1050 3. Class C-1, 192 - 223, Subnet Identifier 255.y.x.x: 1051 458,321,664 Networks and 2,064,512 Hosts: 110 1052 Class C-2, 192 - 223, Subnet Identifier 255.255.y.x: 1053 57,741,312 Networks and 8,128 Hosts 1054 Class C-3, 192 - 223, Subnet Identifier 255.255.255.y: 1055 7,274,496 Networks and 32 Hosts 1057 4. Class D-1, 224 - 239, Subnet Identifier 255.y.x.x: 1058 245,676,928 Networks and 1,032,256 Hosts: 1110 1059 Class D-1, 224 - 239, Subnet Identifier 255.255.y.x: 1060 15,475,712 Networks and 4,064 Hosts 1061 Class D-3, 224 - 239, Subnet Identifier 255.255.255.y: 1062 978,944 Networks and 16 Hosts 1064 5. Class E-1, 240 - 254, Subnet Identifier 255.y.x.x: 1065 231,289,860 Networks and 967,740 Hosts: 1111 1066 Class E-2, 240 - 254, Subnet Identifier 255.255.y.x: 1067 13,658,850 Networks and 3,810 Hosts 1068 Class E-3, 240 - 254, Subnet Identifier 255.255.255.y: 1069 803,250 Networks and 15 Hosts 1071 The Rules given in Table 6 and Table 10 (Laws of the Octet) Limits 1072 the Range for the Value of the Variable 'Y' and 'X'. That is, when 1073 'X' = 'Y' or 'X' = '254', which represents either the Network or HOST 1074 IP Address Count, then the Range of Values that 'X' or 'Y' can be 1075 assigned is governed by the Laws and Rules noted above. Which 1076 encompasses the Range given by '0 - 254'. These principles can be 1077 expressed mathematically, given that it is understood that the Total 1078 number of available IP Addresses per unit of Division of the Address 1079 Classes of IPv7, can not be greater than the Total number of available 1080 IP Addresses as would result from any calculation used to determine 1081 this total without such a division. In other words, if the Total 1082 Number of Available IP Addresses, as represented by the Supernetting 1083 of IPv4, is given as 3.64 x 10^9, then its exploitation IPv7, must be 1084 equal to the same amount. Where by, if we were given, as a result of 1085 Supernetting IPv4, the Equation: 1087 8. {X | If X = 254 in 255.X.X.X, and 255.X.X.X is the format which 1088 results from this process. Where, in all situations in which 1089 255 represent some value that indicates the IP Address Class 1090 Range for every Address Class in IPv4, then the total number of 1091 Addresses is given by the Sum of there Totals: 1092 [A + B + C + D + E]. 1094 Hence, the total number of available IP addresses in IPv7, which 1095 comprise several divisions, is equal to the total that results from 1096 the Supernetting of IPv4. That is, if and only if, there exist no 1097 condition such that, 'X = N = Y'; where N = the Octet defined by the 1098 Subnet Identifier, and Y = the Octet within any given Class preceding 1099 a Section or Division of the same Class having the definition equal to 1100 N. [Which would indeed be in violation of the Laws of the OCTET.] 1102 While on the other hand. When the consideration of the value of 'Y' 1103 is the issue; we have: {Y | Y = some value within the Range 0 - 254. 1104 Which is the Octet of any succeeding Section or Division having an 1105 identical Octet mapping of the Section it precedes. Where Y is not 1106 defined by the Subnet Identifier, and the preceding Section is. Then, 1107 there exists a case, where by, the Total Number of available Host IP 1108 Addresses for any given Section or division is given by Equation 7, 1109 as noted above. 1111 However, there exist a special case for determination of the number 1112 of available Hosts in the last Section or Division of each Address 1113 Class in IPv7. Where by, the determination of the total number of 1114 available Host for each Section or Division preceding the Last 1115 Section or Division of every Address Class has no bearing on the Total 1116 number of available IP Addresses in IPv7. In other words, they are 1117 exempt from the calculated total, and could only maintain a 1118 significance, regarding IP Addressing, in IPv8. 1120 In other words, it should be understood, as it is implied by the 1121 analysis thus far, that there would exist IP Addresses available as 1122 Hosts, which are derived from the count of the total number of IP 1123 Addresses in the last Section or Division of each Class. This 1124 conclusion is supported by equation 7, above Table 11. Where it should 1125 be understood, the values for which 'T' and 'O' can maintain is 1126 dependent upon the IP Address Range of Values which are assigned to 1127 the Class itself, and governed by the Laws of the Octet. Given by 1128 equation 9. 1130 9. {H | H = the Total Number of available Hosts IP Addresses, 1131 which is defined by the Default IP Address as 255.255.255.y. 1132 Which is comprised of N Networks and H Hosts, is given by the 1133 equation; 255^3 = N, and H = y = (254 - Q). Where Q is the 1134 difference between the Address total and the Address Class 1135 Range. 1137 Nevertheless, the demand for logical continuity commands that the 1138 Host count for All Sections or Divisions follow the same provisions 1139 as outlined for every Section or Division of each Class. Hence, the 1140 proper representation for the Host Count for the Last Section or 1141 Division for every Class would be given by the equation: 1143 10. [(254 - Q) = Y]; where Q = the IP Address Range determined 1144 for the IP Address Class under question.) 1146 Nevertheless, it should be clearly understood that the Subnetting 1147 features of Supernetting did not eliminate the IP Address Classes. 1148 In fact, it just changed the format of the structure of their 1149 IP Address, which made the Class C become more appealing to the 1150 businesses seeking Global Internetworking Connections. However, 1151 the benefit was indeed significant to distribution and the 1152 availability of IP Addresses. This fact is evinced as a result of the 1153 Class restructuring its use ultimately produced. Which caused an 1154 increase in the number of IP Addresses available of Class B to twice 1155 its original value, and about 12 million for Class C. 1156 However, while IPv7 does not increase this amount from its 1157 exploitation of the IPv4 32 Bit Addressing Scheme. It does however, 1158 provides unquestionable proof that the Class System still exist, and 1159 establishes a path for a smooth transition for the implementation of 1160 IPv8. 1162 In other words, IPv4 offered approximately 3.12 * 10^9 IP Addresses, 1163 and Supernetting increased the number of available IP Addresses to 1164 approximate 3.64 * 10^9, with the claim of the elimination of the 1165 Class System of Addressing. However, while IPv7 offered no increase 1166 to this count, its exploitation of IPv4, as given by Table 11, proved 1167 that the claim of the existence of the Classless System was indeed 1168 false. All while providing a more efficient use of the available IP 1169 Addresses, and offered a more stable, less redundant alternative 1170 solution for the shortages of IP Addresses than the highly taunted 1171 IPv6. Nevertheless, the Binary Representation resulting from the use 1172 of Supernetting and IPv7, is summarized in Table 12 and 13 1173 respectively. 1175 Table 12. 1176 "The Reality resulting from Supernetting, 1177 the Binary Representation" 1179 Class A, 1 - 126, Default Subnet Mask 255.x.x.x: 1180 126 Networks and 2^24 Hosts: 0 1182 Class B, 128- 191, Default Subnet Mask 255.x.x.x: 1183 2^6 Networks and 2^24 Hosts: 10 1185 Class C, 192 - 223, Default Subnet Mask 255.x.x.x: 1186 2^5 Networks and 2^24 Hosts: 110 1188 Class D, 224 - 239, Default Subnet Mask 255.x.x.x: 1189 2^4 Networks and 2^24 Hosts: 1110 1191 Class E, 240 - 254, Default Subnet Mask 255.x.x.x: 1192 15 Networks and 2^24 Hosts: 1111 1194 Table 13 1195 Structure of the Binary Representation IPv7 Class System 1197 1. Class A-1, 1 - 126, Subnet Identifier 255.000.000.000: 1198 126 Networks and 2^24 Hosts: 0 1199 Class A-2, 1- 126, Subnet Identifier 255.255.000.000: 1200 2^15 Networks and 2^16 Hosts: 0 1201 Class A-3, 1 - 126, Subnet Identifier 255.255.255.000: 1202 2^23 Networks and 2^8 Hosts: 0 1204 2. Class B-1, 128 - 191, Subnet Identifier 255.000.000.000: 1205 2^6 Networks and 2^24 Hosts: 10 1206 Class B-2, 128 - 191, Subnet Identifier 255.255.000.000: 1207 2^14 Networks and 2^16 Hosts: 10 1208 Class B-3, 128 -191, Subnet Identifier 255.255.255.000: 1209 2^22 Networks and 2^8 Hosts: 10 1211 3. Class C-1, 192 - 223, Subnet Identifier 255.000.000.000: 1212 2^5 Networks and 2^24 Hosts: 110 1213 Class C-2, 192 - 223, Subnet Identifier 255.255.000.000: 1214 2^13 Networks and 2^16 Hosts: 110 1215 Class C-3, 192 - 223, Subnet Identifier 255.255.255.000: 1216 2^21 Networks and 2^8 Hosts: 110 1218 4. Class D-1, 224 - 239, Subnet Identifier 255.000.000.000: 1219 2^4 Networks and 2^24 Hosts: 1110 1220 Class D-21, 224 - 239, Subnet Identifier 255.255.000.000: 1221 2^12 Networks and 2^16 Hosts: 1110 1222 Class D-3, 224 - 239, Subnet Identifier 255.255.255.000: 1223 2^20 Networks and 2^8 Hosts: 1110 1225 5. Class E-1, 240 - 254, Subnet Identifier 255.000.000.000: 1226 15 Networks and 2^24 Hosts: 11110 1227 Class E-2, 240 - 254, Subnet Identifier 255.255.000.000: 1228 2^11 Networks and 2^16 Hosts: 11110 1229 Class E-3, 240 - 254, Subnet Identifier 255.255.255.000: 1230 2^19 Networks and 2^8 Hosts: 11110 1232 Note: The number of Networks in the Primary Division of each Class, 1233 is the Quantified difference between the IP Address Range 1234 Plus 1, for each respective Class Boundary's. 1235 [(REN - RBN) + 1)]. Moreover, the Sublet Identifier, 255, 1236 has a Binary Representation of; 11111111. 1238 Nevertheless, by exploiting the Default Subnet Mask, that is, 1239 understanding its real purpose as used in BITWISE ANDING. Which 1240 is IP Network Address Resolution by determining the value of the 1241 defining Octet. Then anyone could easily visualize that, the former 1242 IPv4 Class Addressing Scheme, as summarized in Tables 4 and 5, 1243 warrants the expansion to that given by Table 11. Where the Default 1244 Subnet Mask, now the Subnet Identifier, assumes the duties of its 1245 actual definition. That is, it remains the Default Subnet Mask, 1246 which when used in Bitwise Anding serves to resolve the Network 1247 IP Address. This working definition provides further justification 1248 for the acceptance of IPv7. Especially since, IPv7 can now be viewed 1249 as the expansion of the IP Classes from the change in the Default 1250 Structure defining each division of the IP Class, which resulted from 1251 the use of Supernetting. However, this produced a change in all of 1252 the Structures of the IP Classes to the Default Structure as 1253 depicted for the Class A. Needless to say, this is the definitive 1254 proof that IPv7's evolution is founded upon changes made in IPv4, 1255 which compensate for the shortages in the number of available IP 1256 Addresses through the use of Supernetting. 1258 Needless to say, these changes are the foundational premises of 1259 deductive reasoning, for the logical conclusion, which necessitates 1260 IPv7, and offers a cost free solution for the shortages in the number 1261 of available IP Addresses. In other words, IPv7 is nothing more than 1262 a 'TRANSPARENT OVERLAY' for IPv4 Addressing System, which increases 1263 the efficiency of IP Addressing, and makes absolutely no other 1264 changes to any of the underlining foundations characterizing IPv4. 1266 Note: Other than the clarification of the functional 1267 purpose, enhanced specification for the definitions 1268 of a few terms, and the exploitation the of the of IP 1269 Classes reduced by the use of Supernetting, IPv7 only 1270 provides a greater logical Structure, because 1271 nothing else changes as a result of its 1272 implementation. 1274 Chapter II: An Overview of IPv8 the Enhancement of Ipv7 1276 The over all structure and organization regarding the overview of 1277 IPv8 offers no change to the foundation, as rendering a major 1278 distinction from that underlining IPv7. In other words, it is viewed 1279 as an enhancement of IPv7, which provides separate copies of the 1280 entire IP Addressing Scheme, as summarized in Table 11. Thus, allowing 1281 a broader distribution and use of an almost unlimited number of 1282 available IP Addresses for the population of the entire World. 1283 Nevertheless, this is evinced by IPv7's IP Address Totals is nearly 1284 equal to half the present World Population, which is approximately 1285 one IP Address assignment per person. 1287 In other words, the enhancement offered by IPv8 is characterized by 1288 the use and implementation of PREFIXES to the IP Address, such as, 1289 'Country Codes', 'Zone Codes', and 'Area Codes'. The employment of 1290 these measures not only guarantees the promises of the IT Industry, 1291 while reducing the cost of Long Distance Telephone Calls, but offers 1292 a significant boost over the use of 'CIDR' in Router performance, as 1293 shall be discussed in the next chapter. 1295 In other words, the promises of the IT Industry encompassing the 1296 Interactive Television, Live Video Telephone Systems, Video 1297 Teleconferencing, and the evolution of a Global Telecommunication 1298 Community which encompassed everyone having a telephone today, 1299 becomes the Reality of its Dreamers. That is to say, with the 1300 implementation of IPv8, all of the promises of the IT Industry would 1301 now depend only on the development of the technology to produce 1302 these systems. 1304 Chapter III: 'The Header Structure in IPv7 & IPv8' 1306 The IP Addressing Scheme of IPv7 can serve the Global Internetworking 1307 Community now. Its implementation offers some significant 1308 improvements over any system presently in use. However, while there 1309 is a learning curve, it would actually impose no challenge for the 1310 seasoned professional. In fact, there are four reasons that support 1311 the its implementation and the reality of it being the suitable 1312 replacement for IPv4. 1314 1. It is Identical to IPv4 in the total number of 1315 Addresses. 1317 2. Its Header does not change from that used 1318 in IPv4, which means the version number 1319 can remain the same. 1321 3. It is only a 'Transparent Overlay' of the 1322 Addressing System used in IPv4, which 1323 changes absolutely nothing else. 1325 4. It is a Logical Derivative of the IPv4 1326 Addressing System, which eliminates all 1327 of the 'PREDEPLOYMENT' testing 1328 requirements, while providing a flawless 1329 transition to IPv8. 1331 5. Increase efficiency in the use of IP 1332 Addresses, because there are no IP 1333 Addresses wasted on Host assignments. 1334 This means that every IP Address is 1335 available for assignment. 1337 In other words, IPv7 is a system that can be used now, which provides 1338 the ease of use and implementation of IPv4. While at the same time, 1339 providing an almost seamless transition for its enhancement, IPv8. 1341 Nevertheless, while IPv7 is called the "Global Internetworking 1342 Community", IPv8 is called the "Global Telecommunication Community". 1343 The difference however, distinguishing these systems, are two fold. 1344 Where by, the former is a shared IP Addressing System, which utilizes 1345 the Network medium for limited communication. However, the latter 1346 represents a Global Standardization for all Telecommunications 1347 Systems in use today. 1349 The advantages of IPv8 however, surmount far beyond any 32 Bit IP 1350 Addressing System now employed, or ever conceived. Nevertheless, 1351 while retaining the ease of use and implementation of IPv7, IPv8 1352 provides an available number of IP Addresses that's staggering, to 1353 say the very least. In other words, the comparable analogy would be, 1354 IPv7 can provide an IP Address to nearly every adult in the world 1355 today. While IPv8, can provide an individual IP Address to every 1356 person, the total population of the world today, on over 2.5 1357 Billion worlds. That is to say, the people of planet Earth can 1358 colonize 2.5 Billion planets with a population equal to the existing 1359 count, and still have reserve IP Addresses. 1361 Furthermore, while the foundations underlining IPv8 is the same as 1362 those of IPv7. There is indeed a distinction between these two 1363 systems, which accounts for the staggering number of available IP 1364 Addresses. The difference, while similar to IPv6, is the change in 1365 the structure of the IP Header associated with IPv8, and their 1366 depiction is given in Figure 5. 1368 Figure 5 1370 IP Header for IPv4 and IPv7 1371 0 1 2 3 1372 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 1373 | VER | IHL | TYPE OF SERVICE | TOTAL LENGHT | 1374 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1375 | IDENTIFICATION |FLA| FRAGMENT OFFSET | 1376 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1377 | TIME TO LIVE | PROTOCOL | CHECK SUM HEADER | 1378 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1379 | SOURCE ADDRESS | 1380 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1381 | DESTINATION ADDRESS | 1382 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1383 | OPTIONS | 1384 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1385 | DATA | 1386 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1387 |-------------------------------------------------------------| 1389 IP Header for IPv8 1390 0 1 2 3 1391 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 1392 | VER | IHL | TYPE OF SERVICE | TOTAL LENGHT | 1393 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1394 | IDENTIFICATION |FLA| FRAGMENT OFFSET | 1395 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1396 | TIME TO LIVE | PROTOCOL | CHECK SUM HEADER | 1397 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1398 | S RESERVED | S RESERVED | IP S ZONE CODE | IP AREA CODE | 1399 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1400 | SOURCE ADDRESS | 1401 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1402 | D RESERVED | D RESERVED | IP D ZONE CODE | IP AREA CODE | 1403 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1404 | DESTINATION ADDRESS | 1405 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1406 | OPTIONS | 1407 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1408 | DATA | 1409 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1410 |-------------------------------------------------------------| 1412 IP Header for IPv6 1413 0 1 2 3 1414 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 1415 | VER | PRIO. | FLOW LABEL | 1416 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1417 | PAYLOAD LENGTH | NEXT HEADER | HOP LIMIT | 1418 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1419 |-------------------------------------------------------------| 1420 | | 1421 | | 1422 | | 1423 | SOURCE ADDRESS | 1424 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1425 |-------------------------------------------------------------| 1426 | | 1427 | DESTINATION ADDRESS | 1428 | | 1429 | | 1430 |+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +| 1431 |-------------------------------------------------------------| 1432 |+ + + + + + + + + + + + + DATA + + + + + + + + + + + + + + + | 1433 |-------------------------------------------------------------| 1435 Nevertheless, the obvious lack of a detailed analysis of the Headers 1436 reduces the IPv8 Header to one being that of a suggestion. However, 1437 it is clear that IPv4 and IPv7 can share the same Header. But, from 1438 the structure as offered as choice for the Header of IPv8, an 1439 explanation is indeed warranted. Where by, the over all structure of 1440 the IPv8 Header of figure 5 is similar to that of IPv6, except that 1441 it 'Divides' the Source and Destination Sections of IPv6's Header 1442 Structure. However, its defining purpose is the same as that given for 1443 IPv7. The distinction however, is the addition of two additional 1444 sections, one for the Source and the other for the Destination. These 1445 additions make provisions for a greater individual use and deployment 1446 of this IP Addressing Scheme. 1448 Where by, above the Source Address Section exist another 32 Bit 1449 Section, which is divided into 4 distinct and separately defined 1450 Octets. There are 2 Octets reserved for growth and expansion, and 1451 another is defined as the Source Address Zone, while the last is 1452 defined as the Source IP Address Area Code. The Destination Address 1453 Section also has an additional 32 Bit section, which has comparable 1454 assignments, excepting that, they are defined for the Destination 1455 Address Section. Nevertheless, the numbering system employed for use 1456 in these sections is defined as the same as that governing the IP 1457 System of Address. While the Structure of this addressing system is 1458 given by Figure 6. 1460 FIGURE 6 1462 1. Source Addressing Structure: 255:255:255.000.000.000 1464 2. Source Addressing Structure: 255:255:255.255.000.000 1466 3. Source Addressing Structure: 255:255:255.255.255.000 1468 4. Destination Addressing Structure: 255:255:255.000.000.000 1470 5. Destination Addressing Structure: 255:255:255.255.000.000 1472 6. Destination Addressing Structure: 255:255:255.255.255.000 1474 Notice that the Primary, Secondary, and Ternary IP Address Classes 1475 are also shown in addition to that of the Zone and IP Address Area 1476 Codes for the Source and Destination Addresses. Furthermore, it 1477 should be clear that each Octet preceding the IP Address is separated 1478 by a Colon, which not only indicates their distinction but an order 1479 of precedence as well. 1481 In other words, the establishment of a sequential order is another 1482 boon for IPv8. Especially when considering the Routing and networking 1483 implications. Where by, CIDR attempts to improve Router performance 1484 through the use of the Subnet Mask by looking at the Back End of an 1485 IP Address Aggregation. Thus, allowing a reduction in the size of 1486 the Router's Table, and increasing the thoroughfare by permitting the 1487 assignment of several IP Addresses to this Back End Address. However, 1488 the implementation of IPv8 suggests just the opposite. Where by, 1489 Router's become more specialized Address Forwarding Computers, 1490 consisting of three divisions, the Global, the Internetwork, and 1491 the Network. These three divisions serve to reduce the Router's Table, 1492 reduce Traffic, and enhance System Management. These benefits are 1493 accomplished by programming the Routers to Route using the Front End 1494 of the IP Addresses. Thus, achieving a significant Router performance, 1495 which is a far superior improvement over that which can be achieved 1496 using the CIDR technique. 1498 The reality of these benefits becomes even clearer when an 1499 understanding of Front End Addressing achieved. That is, the Network 1500 Router checks first the Zone Address, then the IP AREA CODE Address. 1501 This allows the Router to determine if the communication is an 1502 Intercom or an Outercom. In which case, if it is Outercom, the Router 1503 needs only to know the location, and or Hop Count, of the nearest 1504 Internetworking or Global Router. Which need only be 2 or 3 connecting 1505 Routes beyond the single Point of Failure. 1507 However, while all Intercom communications are Routed as belonging 1508 somewhere within the Domain of its Network. The only the 1509 communications destine to either the Global or the Internetworking 1510 Telecommunication Community would need to access the Global or 1511 Internetworking Routers, which are located outside the Domain of the 1512 Network. Furthermore, while the Global and Internetworking Routers 1513 employ similar, but the reverse techniques of CIDR, the One Route 1514 Thoroughfare for Multi IP Address Access. The Back End of the IP 1515 Address is not considered until the IP Packet reaches the Gateway 1516 Router of its intended Destination. This clearly offers a boon for 1517 the Telecommunications Internetworking Industry, because the Router's 1518 in place now, only need an up grade of the IOS to perform these tasks. 1520 Notwithstanding the obvious benefits, if IPv8 is implemented as the 1521 Standard for the Global Telecommunication System Interface. A simple 1522 IP Address can become, as planned, the replacement for the Telephone 1523 Numbers in use today, because software could be used to eliminate the 1524 need for anyone to maintain the obligation of having to remember any 1525 number beyond 15 digits. That is, their IP Address and its associated 1526 IP Address Area Code Prefix. 1528 Nevertheless, it should be very clear, by now, that there can exist 1529 254 Zones, which could result in the independent implementation of 1530 the entire IPv8 Addressing Scheme that could have 254 IP Address Area 1531 Codes for each IP Address Class and their associated Divisions. 1532 Needless to say, while the implementation of IPv8 does noting in the 1533 elimination of Subnetting. It does however question, because of the 1534 staggering number of IP Addresses available, the need for 1535 Supernetting. Especially since, only the IP Addresses assigned to the 1536 individual, which is accompanied by its Zone and IP Address Area 1537 Code, could have or maintained access to the Global 1538 Telecommunications System. 1540 Chapter IV: The Principles of Subnetting in IPv7 & IPv8 1542 The concepts and principles which underline the methods of Subnetting 1543 and its derivative, Supernetting, will not change. However, there are 1544 some additional definitions and laws regarding their usage in IPv7 1545 and IPv8. Nevertheless, these Laws and Definitions is a direct 1546 consequence of the information provided in the Overview, Table 10, 1547 and the definitions derived in Chapter I. 1549 Definitions 1551 1. By Definition, every IP BIT Address is divided into sections 1552 called OCTETS. Where the first OCTET of any IP Bit Address must 1553 be Defined by the Subnet Identifier, and each Octet equals 8 1554 Binary representations of either One's or Zero's that can 1555 collectively be Translated into one Decimal (Integer) Number. 1557 2. Every Octet not defined by the Subnet Identifier, may 1558 be Defined by the Subnet Mask. Where the value of the Subnet Mask 1559 is defined as being equal to the resulting Difference Of Success 1560 Subtractions of the Binary number 1 = 2^0 = X and is given by the 1561 Equation: [SM = 2^7 - X]. Where by, the Subnet Mask = SM, and 1562 given by the Difference of each successive Subtraction of 2^0. 1564 3. Every Network IP Address may contain at least one Subnet Mask. 1565 Where the Total Number of Subnet Mask that it can have, depend 1566 on the IP Bit Address Range Minus the first Octet in of the IP 1567 Address. 1569 4. For every IP Address, having one or more Octets defined by the 1570 Subnet Identifier, also defines any IP Network Address which can 1571 be Subnetted. Where, if any Logical Division of an IP Network 1572 Address, creates multiple IP Addresses derived from the original. 1573 Then the derived IP Addresses are called Sub-Networks of the 1574 initial IP Address, which is said to be Subnetted. This is 1575 provided that every OCTET in the IP Bit Address Range is not 1576 defined by the Subnet Identifier. (Where the Subnet Identifier is 1577 equal to: 11111111 = 255; The Binary and Decimal Equivalents.). 1579 5. Every Network IP Address having an Octet defined by a Subnet Mask, 1580 can be subdivided into only 1 Sub-Network. In which, there are 1581 a total of 7 possible logical Sub-Networks that may be defined. 1583 6. For every Octet defined by the Subnet Mask for any Sub-Network IP 1584 Address. The Octet referenced as being the IP Network Address 1585 from which it was derived, can not be assigned any value in the 1586 IP Address Range of the derived Sub-Network IP Addresses. 1588 7. The Laws of the OCTET are applied to every Octet defined by the 1589 Subnet Mask. That is, it can not be used in IP Address that would 1590 result in a conflict with any IP Address, whose Octet is defined 1591 by the Subnet Identifier. 1593 Where DE = the Decimal Equivalent that is also equal to the (BR) 1594 Binary Representation. That is, the Subnet Mask, can only be 1595 assigned the IP Address values summarized in the Table 7. 1596 Nonetheless, an example of this Binary Difference is given in 1597 Figure 4. Where by, given 2^7 = 11111111 = 255, is the Minuend, 1598 then successive Subtractions of 2^0 = 00000001 = the Subtrahend 1599 from the resulting Difference is equal to the Summary in Table 7. 1601 Figure 4 1603 1. 11111111 - 00000001 = 11111110 = 254 1605 2. 11111110 - 00000001 = 11111100 = 252 1607 3. 11111100 - 00000001 = 11111000 = 248 1609 4. 11111000 - 00000001 = 11110000 = 240 1611 5. 11110000 - 00000001 = 11100000 = 224 1613 6. 11100000 - 00000001 = 11000000 = 192 1615 7. 11000000 - 00000001 = 10000000 = 128 1617 8. 10000000 - 00000001 = 00000000 = 0 1619 9. 11111111 - 11111111 = 00000000 = 0 1621 Note: It should be clear that the Binary method of 1622 Subtraction is quite different from the Bitwise 1623 Anding method used by the Default Subnet Mask to 1624 resolve an IP Address. 1626 Nonetheless, there is a logical rationalization for the choice of 1627 the values of the Subnet Mask. Where by, the Binary Equations of 1628 Subtraction yields functional results, which has a 'Least Significant 1629 Digit', that is also the Factor use for the Translation of the Binary 1630 representation to its Decimal (Integer) Equivalent. 1632 TABLE 7 1633 (Modification of Table 7 noted above) 1634 Least Significant Bit: Binary: Decimal: # of Subnets: Host / per 1635 | | | | | 1637 0 00000000 0* 0 0 1639 2^7 10000000 128 1 128 - 1 = 127 1641 2^6 11000000 192 3 64 - 1 = 63 1643 2^5 11100000 224 7 32 - 1 = 31 1645 2^4 11110000 240 15 16 - 1 = 15 1647 2^3 11111000 248 31 8 - 1 = 7 1649 2^2 11111100 252 63 4 - 1 = 3 1651 2^1 11111110 254 127 2 - 1 = 1 1653 2^0 11111111 255* N/A N/A 1655 Note: The 'Asterisk' represents Values that can not 1656 be used by the OCTET, which is define by the 1657 'Subnet Mask'. 1659 Nevertheless, since there exist a Total Count of 256 Decimal 1660 (Integers) representations expressing the total Number of available 1661 IP Addresses. That is, since this is an inclusive count of the given 1662 Range 0 - 255. Where by, equation 1, which enumerates this inclusive 1663 count, establish the Total number of IP Addresses in the Range 1664 '0 - 255'. 1666 1. [(255 - 0) + 1] = 256. 1668 Moreover, this is also the Binary Representation, which equal of the 1669 inclusive count for the total addresses in the 0 - 255 Range. It can 1670 be concluded, that the Minuend 256, is some Multiple of the Number 1671 of Total Number of Hosts Bits. That is, given that calculation of 1672 this total, is also the inclusive count of the range comprising the 1673 Octets. In which case, the Binary Number of Hosts Available would be 1674 represented as 2^24, 2^16, and 2^8. Where by, these numbers represent 1675 a count relative to the Total Number IP Bit Mapped Host Addresses. 1676 However, if the case is such that, the total number of Host Bit 1677 available were, '65,536', and the Least Significant Digit given as 1678 '128'. Then, the Total of IP Host Bit Addresses available would be 1679 given by the equation 2. 1681 2. [65,536 / 128 = 512] 1683 Furthermore, if the concept of Supernetting, was the Subnetting of 1684 the only Host Octet available in the Class C. Then, the total of IP 1685 Host Bit Addresses available, given a Least Significant Digit of 128, 1686 is equal to the equation 3. 1688 3. [256 / 128 = 2] 1690 Nevertheless, the procedures involving Supernetting, as outlined in 1691 the Classless System, did not eliminate the Structure or concepts of 1692 the Class System. Especially since, it did not render any provisions 1693 to Subnet the only Host Octet available in the Class C. Needless to 1694 say, these conclusion clearly justifiable. Nonetheless, the change 1695 to the IP Address Skeleton of each Class as summarized in Table 8, 1696 and represents the structure of Class A. 1698 Notwithstanding, the Definitions and Laws defining the Internet 1699 Protocol Specifications for IPv7 and IPv8, which regarding their 1700 implementation, would change the concepts of Subnetting and 1701 Supernetting. That is to say, the definition of the Subnet 1702 Identifier imposes restrictions upon the availability of the Octets, 1703 which can be Subnetted or Supernetted. Where by, if only the Host 1704 Octets are available, then those that can be Subnetted are the lasts 1705 two within the IP Address. While Supernetting, is now defined as 1706 the process of Subentting the last Octet of an IP Address. In other 1707 words, the definitions and laws of IPv7 and IPv8 describe an outline 1708 for Supernetting and Subnetting, which can not violate the 1709 restrictions imposed. 1711 However, these changes do not usher any significant change, which 1712 would be a major departure from the foundational concepts of IPv4. 1713 In other words, except for the laws, definitions, and the resulting 1714 constraints imposed, the information provided herein, is the same 1715 as that which governed IPv4. Nevertheless, the Tables below 1716 summarize the logical format, which outlines the results of the 1717 concepts of Subnetting and Supernetting in IPv7 and IPv8. 1719 TABLE 14 1721 Decimal & Subnets: Binary Result: Difference Factor: LSD: 1722 / ^ \ / ^ \ / ^ \ ^ 1723 / | \ / | \ / | \ | 1724 / v \ / v \ / v \ /v\ 1725 1.(256 - 128) = 128 = 10000000, 256/128 - 128/128 = 1 2^7 1726 2. 256 - 192 = 64 = 01000000, 256/64 - 192/64 = 1 2^6 1727 3. 256 - 224 = 32 = 00100000, 256/32 - 224/32 = 1 2^5 1728 4. 256 - 240 = 16 = 00010000, 256/16 - 240/16 = 1 2^4 1729 5. 256 - 248 = 8 = 00001000, 256/8 - 248/8 = 1 2^3 1730 6. 256 - 252 = 4 = 00000100, 256/4 - 252/4 = 1 2^2 1731 7. 256 - 254 = 2 = 00000010, 256/2 - 254/2 = 1 2^1 1733 TABLE 15 1734 Subnetting Results in IPv7 and IPv8 1736 Number: Binary Equation to Determine Available 1737 Bit Hosts: Equivalent: Subnet Bit Mask Hosts 1738 / | \ /|\ / | \ | 1739 1. 512 = 2^9 (16 - 9 = 7) + 16 = 23 508 1740 2. 1024 = 2^10 (16 - 10 = 6) + 16 = 22 1016 1741 3. 2048 = 2^11 (16 - 11 = 5) + 16 = 21 2032 1742 4. 4096 = 2^12 (16 - 12 = 4) + 16 = 20 4064 1743 5. 8192 = 2^13 (16 - 13 = 3) + 16 = 19 8128 1744 6. 16,384 = 2^14 (16 - 14 = 2) + 16 = 18 16,256 1745 7. 32,768 = 2^15 (16 - 15 = 1) + 16 = 17 32,508 1747 TABLE 16 1748 Supernetting Results in IPv7 and IPv8 1750 Number: Binary Equation to Determine Available 1751 Bit Hosts: Equivalent: Subnet Bit Mask Hosts 1752 / | \ /|\ / | \ / | \ 1753 1. 0 = 2^0 (8 - 0 = 8) + 24 = 32 0 1754 2. 2 = 2^1 (8 - 1 = 7) + 24 = 31 2 1755 3. 4 = 2^2 (8 - 2 = 6) + 24 = 30 4 1756 4. 8 = 2^3 (8 - 3 = 5) + 24 = 29 8 1757 5. 16 = 2^4 (8 - 4 = 4) + 24 = 28 16 1758 6. 32 = 2^5 (8 - 5 = 3) + 24 = 27 32 1759 7. 64 = 2^6 (8 - 6 = 2) + 24 = 26 64 1760 8. 128 = 2^7 (8 - 7 = 1) + 24 = 25 128 1762 Chapter V Conclusion: The Benefits of IPv7 and IPv8 1764 The benefits from the implementation of IPv7 could be a reality now. 1765 This is because there are absolutely no changes in its Header, or 1766 any of the other specifications outlined in other RFC's pertaining 1767 to datagrams or its relation to other protocols. Needless to say, the 1768 addition of a more stringent adherence to the rules of Logic will, 1769 to most, seem beneficial. However, while the growth in the number of 1770 available IP Addresses, that are available for assignment and 1771 distribution remains unchanged from that provided by Supernetting. 1772 Clearly, IPv7 will usher a more stable growth, as a result of the 1773 implementation of IPv8 to the Global Telecommunications Community. 1774 Moreover, while mistakes are unavoidable, they will not be an inherent 1775 part of the structure of this Addressing System. This is evident from 1776 its structure, where most of the subnetting now employed are an 1777 inherent part of its addressing scheme. 1779 Furthermore, the benefits from the implementation of IPv8 will 1780 seem to overshadow the number of available IP Addresses it provides. 1781 That is, its implementation will foster the reality of dreams that 1782 were once thought the fantasy found in the pages of a Science 1783 fiction novel. This includes such simple problems as those 1784 experienced by the Telephone Companies, the shortages in the 1785 supply of telephone numbers. Where by, the adoption of this system 1786 would change the count in the number of digits from the present 11, 1787 to a maximum of 15. Nonetheless, while this eliminates problems 1788 associated with growth and the constantly changing prefix. Its 1789 adoption could also change every concept in the Structure, Use, 1790 and Underlining Foundations of the Entire Telecommunication Industry. 1792 I mean, just think for a moment. Where, something as simple as the 1793 'Junction Box', that now serves as the connecting and distribution 1794 point, for homes, business, and apartment complexes. It could quite 1795 conceivably, be replaced by a Network Server, a Router, and Hub, which 1796 would lessen the burden associated with the cost of the present 1797 arrangement. In short, the existing Private Telephone System would 1798 be replaced with a Private Computerized Telecommunication System, 1799 and the Public Telephone System would become the Computerized 1800 Information Telecommunication Systems. These new systems could 1801 service the population of the entire World with any information 1802 available from some assigned Resource Distribution Center. 1804 While at the same time, IPv8 continues to open many other avenues 1805 of exploitation for the Industries of the Entire World. For example, 1806 the Television Industry, Cable Television Industry, the Video 1807 Telephoning and Video Teleconferencing Industry, are only a few 1808 of the many corporations that could benefit from its implementation. 1809 However, while this says nothing about the changes and benefits that 1810 its implementation offers the producer's of Networking equipment, or 1811 any of its associated Hardware and Software. It does nonetheless, 1812 bespeaks clearly about the promises and benefits of IPv8, 1813 which is indeed an endless reality bound only by the limits of 1814 our imagination. 1816 Security: The Relationship between IPv7 & IPv4, and the 1817 Suggested / Recommended Alternatives for IPv8 1819 There are no differences between the security methodologies 1820 employed in IPv4 and that of IPv7. In fact, IPv7 is nothing more 1821 than an IP Addressing Scheme Overlay, which exploits the format 1822 of the IP Address Scheme used in IPv4. Nevertheless, while there is 1823 an existing difference between these Addressing Systems, they pertain 1824 only to the mathematical operations involving the calculation of their 1825 respective IP Addresses, which are now governed by a Set of Logical 1826 Laws. Furthermore, when noting their version numbers, since IPv7 is 1827 not an assigned version number and identical to IPv4. It is not 1828 necessary to change from the present use of IPv4. In other words, 1829 IPv7 is IPv4 having a different IP Addressing Schematic depicting the 1830 number of available IP Addresses for distribution. That is to say, 1831 since it does not require even a version number change for 1832 compatibility, IPv7 is IPv4. This also means that the rigorous 1833 testing required of a New IP Addressing System can be eliminated. 1835 Nevertheless, while IPv8 is an enhancement derived from IPv7, it does 1836 maintain marked differences, as seen in the IP Addressing System 1837 employed. However, this should not pose any challenges for the IP 1838 Community to examine or test. But, this is not to say, that its 1839 implementation of Security measures will not be different from that 1840 now used in IPv4. What I am saying, is that, IPv8 will prove far less 1841 cumbersome than IPv6. This fact will become even more pronounced when 1842 it is realized that the consideration for any determination regarding 1843 the level of difficulty in the implementation of a Security System, is 1844 indeed dependent upon the IP Addressing methods of enumeration. 1846 Moreover, it should be clear that another distinction maintained 1847 by IPv8, which is a provision allows for a separation or division of 1848 the Security measures employed. This is a result of the 'Address 1849 Block' configuration, which provides a way to Address, Separate and 1850 Distinguish the Different Segments of the 48 Bit IP Address in IPv8. 1851 However, the result of this method allows for the creation of 3 1852 levels of Security, because there are 3 separate and distinct IP 1853 Addresses that equal the total of this 48 Bit configuration; 1854 (YYY:JJJ:XXX.XXX.XXX.XXX or 255:255:255.XXX.XXX.XXX). 1856 This however, emphasizes a greater the need for Security measures, 1857 which should be employed to control InterCom and OuterCom 1858 communications of the Global Internetwork. This reality is evinced by 1859 the fact that, the Global Telecommunications Community for the 1860 first time, will assume its true identity. Where by, because of the 1861 need for an ISP to establish the connection to the Internet. We 1862 become impressed with the thoughts of the Global Telecommunications 1863 Community (The Internet) as being a Dynamic Communications System. 1864 That's always on, and never sleeps. However, this is a miss 1865 conception, or interpretation of that which is truly as Static System. 1867 That is to say, the Global Telecommunications Community (The Internet) 1868 is only a thoroughfare, which is not unlike the cable connecting the 1869 telephones we use. In other words, to have a single connection 1870 requires a Link. It does not matter, if this Link or connection you 1871 dialed, provides you with a Requester or an IP Address. The point to 1872 be made, is that, a connection must be established with someone, 1873 who will grant access to his or her location on party Line. What this 1874 means, is that, the Internet is only a Cable. While the Global 1875 Telecommunication's Community, is indeed a Community, which consists 1876 of several Millions of People who have jointly agreed to become 1877 members of this Party Line. Thus, allowing access to their 1878 Telecommunications information System, to anyone whom has agreed to 1879 become a member. 1881 Nevertheless, IPv8 transcends this present and limited notion of the 1882 Internet, and truly provides everyone with access to the Global 1883 Telecommunications Community. Where by, everyone in the world having 1884 a telephone today, would have controllable access to this Party Line. 1885 However, everyone connected to the Global Telecommunications 1886 Community would use the IPv8 Addressing Configuration related to 1887 the connection of the Destination Address with whom they chose to 1888 communicate. In other words, if the Destination was located within 1889 the Zone and IP Area Code of the Source, then they would only need 1890 to use the 32 Bit portion of the 48 Bit IP Address. This is because 1891 the Router used to Transmit the communication would be a InterCom 1892 Router, capable of routing the IP Area Code Address Block and the 1893 32 Bit IP Address indicating the Network IP Address of both the 1894 Source and Destination locations. 1896 Needless to say, this diverse functionality provides a greater 1897 expansion of the IPv7 IP Addressing System without any sacrifice 1898 in the over all Security, as would be the case if a significant 1899 departure from the IP Addressing System now employed, were 1900 implemented. In fact, the knowledge gained through the implementation 1901 of the Security measures in IPv4, should provide a strong foundation 1902 for any transition to IPv8. 1904 What this means, is that, the degree and type of Security can vary 1905 as a matter of choice or concern. For example, an Administrator 1906 could use the same level of Security for IntraDomain Communication 1907 (InterCom)and either increase or use a different, more specialized 1908 type of Security measure for the OuterDomain Communication (OuterCom). 1910 In other words, one suggestion that would create this possibility, 1911 is to employ a software tool that would allow the user to 1912 differentiate the locations they desire to establish a communication 1913 with, which is prefixed by either or both, the Zone IP or IP Area 1914 Code. The software would then, automatically configure the 1915 corresponding IP Addresses within the datagram, which is identical 1916 to the current methods in use. This would allow all communication 1917 that exists within the same Zone IP and IP Area Code Address to be 1918 the same as that which is presently employed. The reality of this 1919 process is derived directly from the concept of the Smart Router. 1920 Whose programmed task, when routing any transmissions, is that of 1921 Striping either the ZONE IP, the IP Area Code, and some sequence of 1922 the Network IP Address related to its location for delivery of the 1923 transmission to its destination. 1925 Nevertheless, this method reduces somewhat, the complexities of 1926 implementing Security measures for a 48 Bit System to that of a 32 1927 Bit System, which would resemble IPv4 and IPv7. Whose Security can 1928 be controlled by the same methodology, that being, Software 1929 Encryption and Access Rights, which is now employed. What this 1930 suggests, is that, IPv8 can have 3 distinct levels of Security, 1931 which can be implemented automatically by the Routers, and or 1932 controlled by Software. 1934 What this implies, is that, every Domain must have a minimum of 3 1935 types of Routers to control IP routing and Security; the IntraDomain 1936 Router (InterCom Router), the Internetworking Router (OuterCom 1937 Router), and a Global Telecommunications Router (Global Router). Their 1938 functional purpose would not only facilitate Routing, but enhance 1939 Security Communications as well. This is because the methods of 1940 Routing employed would consist of the Front End of the IP Address, 1941 and Encryption of the Data Segment of the transmitted Packet. Where 1942 by, each type of Routers need only know the location of the next 1943 Router which routes the either the same IP Address Block or the next 1944 IP Address Block in the sequence. This would essentially have the 1945 effect of creating a One-Route Path having a 1946 Multi-IP-Address-Thoroughfare. That would allow Decryption of 1947 Datagrams either by specific Routers, or the Software of the intended 1948 Destination. Needless to say, this suggestion does not necessarily 1949 impose a challenge upon the Firewall. Where by, Security could be a 1950 combination of both, or just controlled by the Smart Router, and 1951 access to the InterCom from a Hacker transmitting from some location 1952 on the OuterCom would be, for them, the Fort Knox Challenge. 1954 In other words, the Router could be used for Decryption and 1955 Encryption of the communications it receive and transmits, or 1956 Encryption can be performed by the Router and Decryption could be 1957 performed by Software. Whose decryption key code is transmitted, 1958 embedded in the Datagram. There by, allowing the receiving 1959 destination's previous decryption code, to decrypt the Key Code to 1960 be used to determine the decryption sequence of the current 1961 transmission. The Cable Pay Television Industry could implement such 1962 a process. In which the Encryption, Decryption Software would be 1963 supplied by them to their customer. While the Global Router could 1964 control and be programmed for random sequencing of the Encryption, 1965 and corresponding Decryption Key to be sent with the transmission. 1966 However, the latter could be the likely scenario used in a High 1967 Security Area, such as the Military or some Top Secret Research 1968 Facility. Which would have the need to maintain strict control of 1969 the InterCom and OuterCom Transmissions. In other words, a Smart 1970 Router would be capable of discerning the type of Traffic it is 1971 passing. That is, the difference between a transmission that 1972 is Encrypted, not Encrypted, or that which has the correct 1973 encryption. And then perform the necessary functions of Decryption 1974 on one transmission, while being capable of sending both 1975 transmissions to their destinations. 1977 This would provide a common access control for Authentication and 1978 Synchronization of the Encryption and Decryption Keys. Thus, providing 1979 the necessary Security to control the Inter and Outer Comm 1980 communications within the same Zone and IP Area Code. Which would 1981 in essence, provide places needing to regulate access to the Global 1982 Community or their InterCom, with the Security control they need to 1983 regulate the traffic entering or exiting their Domain. In other words, 1984 it is suggested that, IPv8 IP Addressing System should be implemented 1985 with 3 levels of Security, comprising 48, 40, and the 32 Bit IP 1986 Address possibilities it contains. These benefits however, might 1987 possess an additional cost, which the long run would prove it worthy. 1989 Nevertheless, it can be concluded that the benefits offered by the 1990 implementation of IPv8 within the same 'Zone IP Block Address' and 1991 'IP Area Code', changes none of the Security procedures, which are now 1992 present in the use of IPv4 today. However, it is a Recommendation, 1993 since Global Telecommunications does require the use of the ZONE IP 1994 and IP AREA CODE BLOCK Addresses, that another 'DHCP' be specified 1995 for use in conjunction with the Global Router. This implementation is 1996 seen necessary not only for the 48 Bit IP Address and Network Name 1997 Resolution, but also because of the Additional Security Requirement 1998 that is fostered by the implementation of this IP Addressing System. 2000 Needless to say, this would provide the necessary Security benefits 2001 of having controlled access to the Global information in other Zones 2002 and or IP Area Codes, which would allow the continued use and 2003 enjoyment of the uniform security standard presently used in the 2004 32 Bit IP Addressing System today. Nevertheless, these Enhanced 2005 Security Control Features should be viewed as a Boon, because they 2006 provide a much greater scrutiny and control over Inter and Outer Comm 2007 Communications for every Network Connected to the Global 2008 Telecommunications Community. However, this implementation is only 2009 possible through the use of the 'Smart Router' and the services 2010 provided from a second 'DHCP' Server. Which together, would provide 2011 the necessary functions and ability to make these enhanced security 2012 features possible. In other words, the recommendation is that, there 2013 should exist 2 'DHCP' Servers, one for connection to the Global 2014 Community and the other for Communications within the same 'Zone IP 2015 Address' and 'IP Area Code'. 2017 Nevertheless, these are for the most part suggestions, which can be 2018 considered as recommendations, and recommendations. The point made 2019 however, is that, with IPv8, any Security Implementation can be Built 2020 upon the foundation and knowledge gained from that existing in IPv4. 2021 This is not say, IPv8 can be used, or implemented, without extensive 2022 testing. Because even I would not recommend this, regardless of the 2023 standing similarities is has with IPv7 and IPv4. And while there 2024 exist hardware configurations that can remain in use. There exist 2025 other hardware concerns, which remain in question. Be that as it may 2026 be! Whatever the selection from the multitude of possibilities is 2027 chosen as the best possible representation for the 'HEADER' used in 2028 IPv8. It should be clearly understood, its choice is arbitrary, 2029 which does not necessarily degrade, nor improve the efficiency or use, 2030 of IPv8. Needless to say, for every RFC written which entertains 2031 issues concerning Security. The implementation of IPv8 that would 2032 become effected, or seen as a change from IPv4, concerns only the 2033 Zone IP and IP Area Code Block Addresses, which should not require 2034 any appreciable change either beyond IPv4 or that which has been 2035 recommended. In other words, for the most part, IPv8 is a supple 2036 change, and not a major Structural Departure from that of IPv4. 2037 Which means that the Security methods implemented in the latter, will 2038 retain a measurable degree of validity, use, and application, in the 2039 former. 2041 Nevertheless, every individual can have their personal IP Address, 2042 just like the Phone Number exists today. Which does not exclude the 2043 existence of the Disconnected Private Network Domain. Needless to say, 2044 the only limitation for Implementation of Security Measures, is the 2045 imagination of the Hardware and Software Designers. 2047 Appendix I: 'Graphical Schematic of the IP Slide Ruler' 2049 ====================================================================== 2050 = Octets 2st 3nd 4rd Figure 1 2051 = | | ....... 2052 = | | . . 2053 = ----- v | . 001 . The IP Addressing Slide Ruler clearly 2054 = ^ ....... | ....... establishes the Differences between 2055 = | . ** . | . . Decimal and Binary Calculations. 2056 = | . 001 . v . 160 . Where, in this case, the Number of 2057 = | ................... Rulers or Slides, represents the 2058 = | ................... Maximum number of Hosts available in 2059 = | . . . . an IP Address Range having an 2060 = . 160 . 001 . 188 . Exponential Power of 3. That is, if 2061 = IP ................... the First Octet is Defined by the 2062 =Address ................... "Subnet Identifier", as providing 2063 =Range . . . . a Network within the IP Address 2064 = . 188 . 160 . 223 . Range assigned to this Class. That is, 2065 =1 - 254 ................... the individual Ruler or Slide, has a 2066 = | ................... one-to-one correspondence with the 2067 = | . . . . OCTET it represents, and is equal to 2068 = | . 223 . 188 . 239 . an Exponential Power of 1. Which also 2069 = | ................... maintains this one-to-one 2070 = | ................... relationship. In any case, it should 2071 = | . . . . be understood that the Decimal is an 2072 = | . 239 . 223 . 254 . Integer representing the IP Address, 2073 = | ................... and has only 1 value that occupies 2074 = | ................... the given Octet. However, the Binary 2075 = | . . . representation for the IP Address, is 2076 = | . 254 . 239 . an 8 digit Logical Expression 2077 = v ............. occupying one Octet. Where each digit 2078 = ----- ....... has a 2-state representation of either 2079 = . . a 1 or a 0. The distinction is that, 2080 = . 254 . this is a Logical expression that has 2081 = ....... no Equivalence. However, there is a 2082 = Mathematical Method which resolves 2083 =The ( ** ) indicates this distinction, and allows for the 2084 =the Reference point Translation of each into the other. 2085 =of the IP Side Ruler. In other words, one System can never 2086 = be used to interpret any given value 2087 = of the other, at least, not without 2088 = the Mathematical Method used for 2089 = Translation. But each, can separately 2090 = be mapped to the structure of the 'IP 2091 = Slide Ruler ', rendering a translation 2092 = for one of the two representations. 2093 = (Noting that the Binary Translation of 2094 = its Decimal equivalent must be known 2095 = first.) 2096 ====================================================================== 2098 Note:[ An example of the assignment of a 'ZONE' Number Prefix in IPv8 2099 would be that of a Continent; North America or South America. While 2100 the example of the location for an assigned 'IP AREA CODE' in IPv8 2101 would be some Sub-Region within a 'ZONE Prefix' (Continent): New York 2102 or Chicago. The convenience of this structure, is that, the Zone 2103 Prefix assigns an entire IP Addressing Scheme to that Area (254 2104 Locations), and the IP AREA CODE allows for a further expansion or 2105 division of each IP Address Class (254 Sub-locations) within the 2106 Addressing Scheme. However, the assigned Zones and IP Area Codes are 2107 not Variables, which means they are permanently assigned to the IP 2108 Addressing Scheme. But the IP Addresses they prefix are variables, 2109 which can be changed. Nevertheless, the IP Slide Ruler is used only 2110 for IP Addressing, and not the Prefixes.] 2112 Appendix II: The Mathematical Anomaly Explained 2114 Nonetheless, this mathematical issue is an argument concerning, 2115 whether or not there exist a 'One-to-One' Correspondence between the 2116 Mathematical Calculations involving the Decimals (represented as 2117 Integers) and those concerning the Binary Operators (Logical 2118 Expressions; the Truth Table values of 1's and 0's). Needless to say, 2119 this Mathematical Anomaly becomes even more apparent when one observes 2120 the Class B situation. Where by: 2122 1. Class B; 128 -191, IP Address Range 2123 Default Subnet Mask; 255.255.000.000 2124 (Which yields: 2^14 Networks and 2^16 Hosts; 2125 that is, 16,384 Networks and 65,536 Hosts.) 2127 However, this total is not the correct method of enumeration, 2128 and it is not the actual number (Integer Number) of available 2129 networks. And this FACT becomes even more apparent when the 2130 Binary Translation of the Decimal (Integers) Numbers is 2131 completed. That is, the result would yield 64 Binary 2132 Numerical Representations, ONE for each of the Decimal numbers 2133 (Integers) that are available in the IP Address for the Class B. 2134 Where Class B should maintain the representation 2135 (Which provides the actual Integer enumeration for the 2136 calculation of the total IP Addresses available. 2137 In other words, their independent count, of their respective 2138 totals for the Actual Number of Available IP Addresses in the 2139 Class B should Equal 64.) given by: 2141 2. Class B: 128 -191, (Which equal the total of 64 2142 possible IP Addresses for the given Address Range) 2143 Default Subnet Mask: 255.255.000.000 2144 9Which results in 64^2 Networks and 254^2 Hosts; 2145 that is, 4,096 Networks and 64,516 Hosts.) 2147 Nevertheless, an enumeration, or break down count association, of each 2148 representation, that is, Binary and Decimal. Would indeed, provide a 2149 greater support for the conclusion presented thus far. Where by, 2150 given the Classes noted in 1 & 2 above. We have: 2152 1a. (128 + 128 + 128 + 128 + ...+ 128) = 128 x 128 = 2^14 2153 1 2 3 4 ... - 128 = Total Count 2155 Which equal the Total number of Networks for the Given Address 2156 Range. 2158 and 2160 1b. (255 + 255 + 255 + 255 +...+ 255) = 255 x 255 = 2^16 2161 1 2 3 4 ... - 255 = Total Count 2163 Which equals the Total Number of Hosts for the Given Address 2164 Range. 2166 While noting that these equations represent the Binary Method 2167 for determining the number of Networks and Hosts for the given 2168 Address Range of Class B. However, keeping this in mind, notice 2169 the difference that exist when this same calculation is used 2170 for the Decimal (Integer) representation. 2172 2a. (64 + 64 + 64 + 64 +...+ 64) = 64 x 64 = 64^2 2173 1 2 3 4 ... - 64 = Total Count 2175 This remains true regardless, that is, if an argument regarding the 2176 difference existing with the flux in the variable range of the Second 2177 Octet, having any value in the range 0 - 254, were not possible. In 2178 which case, the result of 2a, as noted above, would be given as, 2179 64 x 255 = 16,256. Needless to say, the count given by the Binary 2180 representation in 1a, noted above, is still wrong! Nevertheless, this 2181 situation was indeed revealed in Chapter 4. 2183 Where this number equals the number of Networks for the 2184 Given Address Range assigned to Class B. 2186 And 2188 2b. (254 + 254 + 254 + 254 +...+ 254) = 254 x 254 = 254^2 2189 1 2 3 4 ... - 254 = Total Count 2191 Where this equation represent the Total Number of Hosts for 2192 the Given Address Range of Class B. 2194 In other words, given the equation (191 -128) + 1 = 64. We are then 2195 presented with the Total Number of Addresses available for the given 2196 Address Range, 128 - 191, for the Class B. Where it can be seen that, 2197 any One-to-One mapping of the Numbers in the Address Range and the 2198 Counting Numbers (Integers), beginning with 1. Should yield the Total 2199 Number of Addresses available in any Count, for the Determination of 2200 the Total Number of Networks. And this same line of reasoning applies 2201 to the Host count, as well. 2203 ['Where the Subscript Number equals the Value of the Total Number of 2204 Available IP Addresses (a One-to-One Correspondence between the 2205 Enumeration of, and the Address Ranges given) for the Network 2206 and Host Ranges in Class B. Where both Binary and Decimal Number 2207 representations are the given examples.'] 2209 Nevertheless, when the Decimal and Binary conversion is completed. 2210 That is, when you establish a One-to-One relationship between the 2211 Binary and Decimal Numbers. You would discover that the their 2212 respective totals would be the same. That is, there can only be 64 2213 Binary numbers and 64 Decimal numbers for the calculation of the Total 2214 Number of Networks. And there can only be 254 Binary Numbers and 254 2215 Decimal Numbers for the calculation of the Total Number of Hosts. The 2216 difference is that, the former method reveals the Binary calculation, 2217 while the latter is the Integer (called the Decimal) Calculation. 2218 Needless to say, it should be very clear that the Binary method is a 2219 Logical Expression, and does see the Integer Count, that is the 2220 'Difference between the Range Boundaries Plus 1'. Which yields the 2221 total number of available IP Addresses to be used to determine the 2222 actual number of Hosts within a given IP Address Class Range. Clearly, 2223 the Decimal method is indeed a Mathematical Expression representing 2224 the operations involving the Integers. 2226 Needless to say, if you are confused or are in doubt of these 2227 conclusions. Then my suggestion, would be to present my findings 2228 to a Professor of Mathematics at some well established university. 2230 Appendix III: The Reality of IPv6 vs IPv8 2232 Introduction 2234 Any deliberation upon the foundational differences existing between 2235 any two or more systems, is a daunting task, whose resulting 2236 dissertation would require years just to complete a single reading. 2237 However, if such a study first, begun by eliminating those portions 2238 of each system, which maintained a universal application to every 2239 system in which such a study would comprise. Then, the amount of time 2240 would be significantly reduced, because the subject matter would only 2241 entail the analysis of those parts pertaining to the differences each 2242 systems maintained relative to the other. Nevertheless, it should be 2243 clear, that the outline of this Appendix will only present a succinct 2244 view of this endless count, of what will be concluded as the 2245 beneficial differences maintained by IPv8 when compared to IPv6. 2246 Which will nonetheless, be shown far to be far superior to any 2247 offering rendered by the implementation of IPv6. 2249 In other words, the reality regarding the benefits or short comings 2250 of any IP Addressing System, which is not a direct reference to the 2251 Mathematical Methodologies entailing the Address themselves, are 2252 indeed the universal and superficial extensions, which are not 2253 relative to any particular system. Where by, issues such as the 2254 Header Structure, Functional Definitions describing Address Classes, 2255 and other Operational Methods, which are associated with the 2256 Addresses, are all Universal Extensions of the Addressing System 2257 that maintains a universal application. Which can be employed for 2258 use in any IP System of Addressing. Needless to say, these are 2259 inherent facts regarding the discussion of any IP System of 2260 Addressing, which necessitate an understanding of the over all 2261 implications relating thereto. Where by, after the elimination and 2262 resolution of all matters concerning the Universal Extensions, 2263 because they maintain or can become a usage, function, or 2264 implementation shared by both systems. The focus of attention 2265 regarding any implementation of a Global Telecommunications Standard, 2266 would now center entirely upon the mathematical enumeration methods 2267 of, and the IP Addressing System Schematic itself. 2269 Nevertheless, Hinden's work, "IP Next Generation Overview", made 2270 reference to several possible uses for the IPv6 protocol. In fact, 2271 he tended to ignore other specification, which would probably prove 2272 more suitable when configuring Household Appliances; for example 2273 IEEE 1394. Needless to say, while it is clear that his objective was 2274 to exemplify the possible uses and applications of IPv6. He did in 2275 fact ignore, the amount of Network traffic, or Bottlenecks, the 2276 inclusion of devices such as these would create. Moreover, while 2277 household appliances would probably be connected to a Computer 2278 System, which is Networked to the Global Telecommunications 2279 Community. It will be the controlling application, which would be 2280 accessed from some remote location and not the device itself. 2281 Needless to say, he emphasized moreover, that the number of available 2282 IP Addresses in the present IPv4 System and Routing, were the 2283 underpinning issues, which promoted the need for another IP 2284 Addressing System. 2286 Nevertheless, the only issues regarding IPv6 and IPv8, which shall 2287 embody the topics of this Appendix are, Structure of the IP Address, 2288 Routing, and their related issues. 2290 The IP Addresses of IPv6 and IPv8 Compared 2292 First and foremost, it should be noted that, IPv6 is not a Global 2293 Telecommunication Standard, because it did not offer nor include, 2294 any incorporation of the existing Telephone Communication System. 2295 However, while it does expand the number of available IP Addresses 2296 to the Global Internet Community. Needless to say, its expansion is 2297 not only redundant, but the definitions outlining its underlining 2298 purpose lack the soundness of logical reasoning, and they are indeed 2299 superfluous. 2301 Where by, IPv6 offers a pure 128 Bit IP Addressing System, and a 2302 Backwards compatibility comprising 96 Bits of IPv6 Address and 32 2303 Bits of IPv4 Address. This yields, to say the very least, an 2304 unprecedented number of available IP Addresses, with no mention 2305 of the possibility of individual IP Address assignment for the 2306 general public, which comprises the total population of the world. 2307 However, it does provide IP Addresses for business uses, which can 2308 then make assignments for use by the general public. Nevertheless, 2309 as a point of interest, a 128 Bit IP Address Scheme is equated to 2310 '3.4 x 10^38'. Which is, given the total population of the world 2311 as being '6.0 x 10^9', approximately equal to assigning 5.6 x 10^28 2312 IP Addresses to each and every individual person on the planet. 2314 Nonetheless, one would assume that the purpose for a Global 2315 Telecommunication System, was not only the concerns for free 2316 enterprise and the ever growing number of people wanting the 2317 availability of a much broader means of communication. But to address 2318 the needs of the public at large, which the emergence of the 21st 2319 Century now mandates. 2321 Needless to say, the overall structure of IPv6, bars the assignment 2322 of individual IP Addresses. Where by, given that an individual 2323 location represents a single NODE Connection. IPv6 almost commands 2324 that every Node maintains several INTERFACES, which would allow the 2325 assignment of several IP Address Numbers, one per Interface, to 2326 establish connections for the services offered by different providers. 2327 This scheme almost certainly guarantees, that the present cabling 2328 system will become an over burden Network Highway of continuous 2329 Traffic Jams and Bottlenecks. This however, does not even raise a 2330 Brow regarding the Backseat, that "The Nightmare on Elm Street" must 2331 take, when the IT Professionals must consider the Management of such 2332 a Network. Just forget about troubleshooting, component failure, or 2333 some unforeseen catastrophe! 2335 I mean, consider for a moment the layout of the defined Sub-Divisions, 2336 nested might I add, which is the purported Hallmark of the IPv6 2337 Addressing Scheme. 2339 1. UNICAST ADDRESS; The One-to-One method of 2340 communication, which exist between 2 Nodes. 2342 a. Global Based Provider; Provider based unicast 2343 addresses are used for global communication. 2344 b. NSAP Address 2345 c. IPX Hierarchical Address 2346 d. Site-Local-Use; single site use. 2347 e. Link-Local-Use; single link 2348 f. IPv4-Capable Host; "IPv4-compatible IPv6 address" 2349 g. With IP Addresses Reserved for Future Expansion 2351 2. Anycast Addresses; an address that is assigned to 2352 more than one interfaces (typically belonging to 2353 different nodes), with the property that a packet 2354 sent to an anycast address is routed to the 2355 "nearest" interface having that address, according 2356 to the routing protocols' measure of distance. 2358 3. Multicast Addresses; a multicast address is an 2359 identifier for a group of interfaces. A interface 2360 may belong to any number of multicast groups. 2362 TABLE AI 2364 Allocation Prefix(binary) Fraction of Address Space 2366 Reserved 0000 0000 1/256 2367 Unassigned 0000 0001 1/256 2369 Reserved for NSAP Allocation 0000 001 1/128 2370 Reserved for IPX Allocation 0000 010 1/128 2372 Unassigned 0000 011 1/128 2373 Unassigned 0000 1 1/32 2374 Unassigned 0001 1/16 2375 Unassigned 001 1/8 2377 Provider-Based Unicast Address 010 1/8 2379 Unassigned 011 1/8 2381 Reserved for 2382 Neutral-Interconnect-Based 2383 Unicast Addresses 100 1/8 2385 Unassigned 101 1/8 2386 Unassigned 110 1/8 2387 Unassigned 1110 1/16 2388 Unassigned 1111 0 1/32 2389 Unassigned 1111 10 1/64 2390 Unassigned 1111 110 1/128 2391 Unassigned 1111 1110 0 1/512 2393 Link Local Use Addresses 1111 1110 10 1/1024 2394 Site Local Use Addresses 1111 1110 11 1/1024 2395 Multicast Addresses 1111 1111 1/256 2397 TABLE AII 2398 SCHEMATIC DESIGN OF THE IPv6 IP ADDRESS 2400 1. Provider Based Unicast Addresses 2402 | 3 | n bits | m bits | o bits | p bits | o-p bits | 2403 +---+-----------+-----------+-------------+---------+----------+ 2404 |010|REGISTRY ID|PROVIDER ID|SUBSCRIBER ID|SUBNET ID| INTF. ID | 2405 +---+-----------+-----------+-------------+---------+----------+ 2407 2. Local-Use Addresses 2408 Link-Local-Use 2409 | 10 | 2410 | bits | n bits | 118-n bits | 2411 +----------+-------------------------+----------------------------+ 2412 |1111111010| 0 | INTERFACE ID | 2413 +----------+-------------------------+----------------------------+ 2415 Site-Local-Use 2417 | 10 | 2418 | bits | n bits | m bits | 118-n-m bits | 2419 +----------+---------+---------------+----------------------------+ 2420 |1111111011| 0 | SUBNET ID | INTERFACE ID | 2421 +----------+---------+---------------+----------------------------+ 2423 3. IPv6 Addresses with Embedded IPV4 Addresses 2424 "IPv4-compatible IPv6 address" 2426 | 80 bits | 16 | 32 bits | 2427 +--------------------------------------+--------------------------+ 2428 |0000..............................0000|0000| IPV4 ADDRESS | 2429 +--------------------------------------+----+---------------------+ 2431 "IPv4-mapped IPv6 address" 2433 | 80 bits | 16 | 32 bits | 2434 +--------------------------------------+--------------------------+ 2435 |0000..............................0000|FFFF| IPV4 ADDRESS | 2436 +--------------------------------------+----+---------------------+ 2438 4. Multicast Addresses 2440 | 8 | 4 | 4 | 112 bits | 2441 +------ -+----+----+---------------------------------------------+ 2442 |11111111|FLGS|SCOP| GROUP ID | 2443 +--------+----+----+---------------------------------------------+ 2445 We need not concern ourselves with Table AI, because its definitions 2446 are arbitrary, and can be applied to any 128 Bit IP Addressing Scheme. 2447 However, Table AII provides the reality of the MANY SKELETAL (Default) 2448 STRUCTURES an IP Address can have in IPv6. Needless to say, these 2449 structures form the bases for the foundation of another, yet undefined 2450 Class System, which uses WORDS to define different segments of the 2451 Skeletal (Default) IP Address. Furthermore, they exhibit and maintain 2452 a repetitive definition having the same overall purpose, which was 2453 achieved in the simpler methods of IPv4. To say the very least, this 2454 is a more complex structure, differing markedly from IPv4, and the 2455 Skeletal IP Address defined by the Default Subnet Mask, now the 2456 'Subnet Identifier' in IPv8. 2458 Nevertheless, IPv8 defines a IP Addressing Structure, which is a 48 2459 Bit IP Addressing System, that 'Defaults' to a 32 Bit IP Addressing 2460 System when the communications or transmissions are within the 2461 predefined Block Addresses of the Zone IP and IP Area Code, for the 2462 communicating entities. In other words, IPv8 retains the ease of use, 2463 implementation, and simplicity of IPv4/IPv7. 2465 Moreover, while almost duplicating IPv4 in functionality, IPv8 2466 derives its strengths from the conceptualization of "Block IP 2467 Addressing". Where by, each Block is 8 Bits in length, representing 2468 one Octet, which is a complete IP Address comprising the first 32 2469 Bits, 16 of which are reserved for future expansion. Notwithstanding 2470 that, it is the 'Block IP Address' concept, comprising a 5 Block IP 2471 Address Division. Which allows the entire IPv8 IP Addressing 2472 Schematic to be fully implemented, for each Zone IP Address in which 2473 it is assigned. Moreover, each Zone IP Block Address is allocated 2474 approximately '1.42 x 10^12 IP Addresses' for distribution and 2475 assignment. However, this accounts only for the number of available 2476 IP Addresses in the first 3 IP Address Classes of this 5 IP Class 2477 Addressing Scheme. Nevertheless, this implementation in essence, 2478 allows every existing entity previously assigned an IP Address, to 2479 continued its use without any change. 2481 In fact, IPv8 is a true Global Telecommunication System Standard, 2482 because it incorporates every Industry within the Telecommunications 2483 Community into one, World Wide Global Telecommunications System, 2484 through the use of Block IP Addresses. Needless to say, what makes 2485 this all possible, is the use of the Zone IP and IP Area Code 2486 Prefixing System. Which, to say the very least, is indeed the 2487 Hallmark of IPv8. Moreover, it should be clear, IPv8 offers a 2488 smoother transition without issues arising from incompatibilities, 2489 backward compatibility, or the difficulties in the learning curve 2490 resulting from of the implementation of a new, entirely different 2491 IP Addressing System. 2493 A Succinct Consideration Regarding Routing in IPv6 vs IPv8 2495 The Routing implementations recommended in IPv8, require the 2496 development of 3 types of Smart Routers, Global, OuterCom, and 2497 InterCom. These would control 3 major methods of Routing: DIRECT-PP, 2498 CIODR-FEA and CIODR-BEA. Which predicts moreover, a reduction in the 2499 size of the Router's routing Table, and a reduction in the total 2500 number of Routers needing to be deployed, regardless of the size of 2501 the Network Domain. 2503 Nevertheless these routers are defined in Table AIII. 2505 TABLE AIII 2507 1. Global Router: A router having the dual 2508 routing path capability defined by the Zone 2509 IP and IP Area Code Block IP Addresses 2510 (CIODR-FEA). Which can be programmed to 2511 discern the differences in data types, capable 2512 of encrypt and decrypt of data, and would route 2513 the data by either stripping the Prefix Code or 2514 transmitting the data to the next router 2515 governing the Prefix Code of the intended 2516 destination. 2518 2. OuterCom Router: A router having the dual 2519 routing path capability defined by the IP Area 2520 Code Block IP Address and the First Octet of 2521 the 32 Bit IP Address Block (CIODR-FEA). Which 2522 can be programmed to discern the differences 2523 in data types, capable of encrypt and decrypt of 2524 data, and would route the data by either stripping 2525 the Prefix Code or transmitting the data to the 2526 next router governing the Prefix or Octet of the 2527 Address Block of the intended destination. 2529 3. InterCom Router: A router having the dual 2530 routing path capability defined by the First 2531 Octet 32 Bit IP Address and the Second Octet 2532 of the 32 Bit IP Address Block (CIODR-FEA). 2533 Which can be programmed to discern the 2534 differences in data types, capable of encrypt 2535 and decrypt of data, and would route the data by 2536 either Forwarding (First Octet) or transmitting 2537 the data to the next router governing the Subnet 2538 of the 32 Bit IP Address Block of the intended 2539 destination, which would then route using 2540 CIODR-BEA (CIDR having expanded capabilities for 2541 connection to CIODR-FEA). 2543 4. DIRECT-PP: An InterCom, or InterDomain 2544 Transmission, which can be Router or Server 2545 Controlled, establishes a Peer to Peer or 2546 a Conference on a Network or InterCom 2547 Communication. 2549 5. CIODR-FEA: A Classless Inter/Outer Domain 2550 Routing Technique, which routes using the 2551 Front End of the 48 Bit Address Blocks 2552 comprising the Zone IP, IP Area Code, and 2553 the First 2 Octets of the 32 Bit Address 2554 Block. (FEA = Front End Address) 2556 6. CIODR-BEA: A Classless Inter/Outer Domain 2557 Routing Technique, which routes using the 2558 Back End of the 32 Bit Address Block, that 2559 comprise the last 2 Octets. 2560 (BEA = Back End Address) 2562 Needless to say, the Routing techniques recommended for use in IPv8 2563 are far superior to those implemented in IPv6. Where by, the routing 2564 techniques employed in IPv6 necessitate the use of "CIDR" because of 2565 the IP Default Addressing Format, and also use a method in which an 2566 ISP can control the users transmission through router selection and 2567 path. These methods clearly, would require if not mandate, a serious 2568 overhead on equipment design and cost. 2570 Nevertheless, the unquestionable benefits in the choice of IPv8 over 2571 IPv6, is the resounding voice of its superiority. 2573 Note: The information obtained and used for IPv6 in this 2574 comparison with IPv8 was derived from that noted by 2575 number 16 in the Reference Section. Which may or may 2576 not be up to date, but it does indeed serve the purpose 2577 of this Appendix. 2579 References 2581 1. E. Terrell ( not published notarized, 1979 ) " The Proof of 2582 Fermat's Last Theorem: The Revolution in Mathematical Thought " 2583 Outlines the significance of the need for a thorough understanding 2584 of the Concept of Quantification and the Concept of the Common 2585 Coefficient. These principles, as well many others, were found to 2586 maintain an unyielding importance in the Logical Analysis of 2587 Exponential Equations in Number Theory. 2589 2. E. Terrell ( not published notarized, 1983 ) " The Rudiments of 2590 Finite Algebra: The Results of Quantification " Demonstrates the 2591 use of the Exponent in Logical Analysis, not only of the Pure 2592 Arithmetic Functions of Number Theory, but Pure Logic as well. 2593 Where the Exponent was utilized in the Logical Expansion of the 2594 underlining concepts of Set Theory and the Field Postulates. The 2595 results yield; another Distributive Property ( i.e. Distributive 2596 Law ) and emphasized the possibility of an Alternate View of the 2597 Entire Mathematical field. 2599 3. G Boole ( Dover publication, 1958 ) "An Investigation of The Laws 2600 of Thought" On which is founded The Mathematical Theories of Logic 2601 and Probabilities; and the Logic of Computer Mathematics. 2603 4. R Carnap ( University of Chicago Press, 1947 / 1958 ) "Meaning and 2604 Necessity" A study in Semantics and Modal Logic. 2606 5. R Carnap ( Dover Publications, 1958 ) " Introduction to Symbolic 2607 Logic and its Applications" 2609 6. Authors: Arnett, Dulaney, Harper, Hill, Krochmal, Kuo, LeValley, 2610 McGarvey, Mellor, Miller, Orr, Ray, Rimbey, Wang, ( New Riders 2611 Publishing, 1994 ) " Inside TCP/IP " 2613 7. B Graham ( AP Professional, 1996 ) " TCP/IP Addressing " 2614 Lectures on the design and optimizing IP addressing. 2616 8. Postel, J. (ed.), "Internet Protocol - DARPA Internet Program 2617 Protocol Specification," RFC 791, USC/Information Sciences 2618 Institute, September 1981. 2620 9. Cisco Systems, Inc. ( Copyright 1989 - 1999 ) " Internetworking 2621 Technology Overview " 2623 10. S. Bradner, A. Mankin, Network Working Group of Harvard University 2624 ( December 1993 ) " RFC 1550: IP: Next Generation (IPng) White 2625 Paper Solicitation " 2627 11. RFC 791 2629 12. Y. Rekhter (September 1993) RFC 1518: "An Architecture 2630 for IP Address Allocation with CIDR". 2632 13. S. Bellovin (August 1994) RFC 1675: " Security Concerns 2633 for IPng" 2635 14. R. Atkinson (August 1995) RFC 1825: " Security 2636 Architecture for the Internet Protocol" 2638 15. R. M. Hinden (May 1995) " IP Next Generation Overview" 2640 Author 2641 (Please comment to:) 2643 Eugene Terrell 2644 24409 Soto Road Apt. 7 2645 Hayward, CA. 94544-1438 2646 Voice: 510-537-2390 2647 E-Mail: eterrell00@netzero.net 2649 ["Copyright (C) [ The Internet Society (1999). All Rights Reserved. 2650 This document and translations of it may be copied and furnished to 2651 others, and derivative works that comment on or otherwise explain it 2652 or assist in its implementation may be prepared, copied, published and 2653 distributed, in whole or in part, without restriction of any kind, 2654 provided that the above copyright notice and this paragraph are 2655 included on all such copies and derivative works. However, this 2656 document itself may not be modified in any way, such as by removing 2657 the copyright notice or references to the Internet Society or other 2658 Internet organizations, except as needed for the purpose of developing 2659 Internet standards in which case the procedures for copyrights defined 2660 in the Internet Standards process must be followed, or as required to 2661 translate it into."] 2663 This document and the information contained herein is provided on an 2664 "AS IS" basis and THE AUTHOR, THE INTERNET SOCIETY AND THE INTERNET 2665 ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, 2666 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 2667 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 2668 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.