Policy Proposal: Limit The Address Allocation to Extend The Lifetime of IPv4
نویسندگان
چکیده
IP addresses are critical resources for Internet development. The available IPv4 address pool is projected to fully allocated within 3-5 years, but the deployment of the alternative protocol, IPv6, is not accelerating. Recently, several proposals have introduced new approaches to managing IPv4 allocation. However, the market proposals in particular imply fundamental changes to the nature of IPv4 address allocation. This work analyzes the allocation history of ARIN, the organization which manages address allocation in the America region. Based on the historical data and projected trends, we propose three simple management policies which can be immediately implemented with limited resources and without either significant registrar cost nor drastic modifications on current allocation strategy. We verify the effectiveness of our policies using historical data. 1
منابع مشابه
A Growth-Based Address Allocation Scheme for IPv6
IP address allocation policies significantly impact the Internet infrastructure, affecting many parties such as router manufacturers, ISPs, and end users. An address allocation policy can also directly affect the performance of the Internet. For example, address fragmentation, a key problem in IPv4, degrades address lookup performance in routers. Thus, a well-designed address allocation policy ...
متن کاملImpact of IPv4 Address Allocation Practice on BGP Routing Table Growth
Rapid BGP routing table growth has been a main concern for the operation of the Internet in recent years. In this paper, we study how current IPv4 address allocation practice affects the BGP table growth. The practice includes both the newlymade allocations and two address policies, i.e., allocation size and minimum allocation size. We first found that the address blocks allocated during the pa...
متن کاملSome New Results on Policy Limit Allocations
Suppose that a policyholder faces $n$ risks X1, ..., Xn which are insured under the policy limit with the total limit of l. Usually, the policyholder is asked to protect each Xi with an arbitrary limit of li such that ∑ni=1li=l. If the risks are independent and identically distributed with log-concave cumulative distribution function, using the notions of majorization and stochastic orderings, ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملThe Scarce Drugs Allocation Indicators in Iran: A Fuzzy Delphi Method Based Consensus
Objective: Almost all countries are affected by a variety of drug-supply problems and spend a considerable amount of time and resources to address shortages. The current study aims to reach a consensus on the scarce drug allocation measures to improve the allocation process of scarce drugs in Iran by a population needs-based approach. Methods: To achieve the objective, two phases were co...
متن کامل