ED-138 Part 1
ED-138 Part 1
ED-138 Part 1
ED-138 Part 1
February 2009
ED-138 Part 1
February 2009
© EUROCAE, 2009
i
FOREWORD
1 The document ED-138 “Network Requirements and Performances for
VoIP ATM Systems” was prepared by EUROCAE Working Group 67 and
was accepted by the Council of EUROCAE on 2 February 2009.
2 EUROCAE is an international non-profit making organisation. Membership is
open to manufacturers and users in Europe of equipment for aeronautics,
trade associations, national civil aviation administrations and non-European
organisations. Its work programme is principally directed to the preparation
of performance specifications and guidance documents for civil aviation
equipment, for adoption and use at European and world-wide levels.
3 The findings of EUROCAE are resolved after discussion among its members
and, where appropriate, in collaboration with RTCA Inc., Washington D.C.
USA and/or the Society of Automotive Engineers (SAE), Warrendale, PA,
USA through their appropriate committee.
4 The document represents “the minimum specification required for
Manufacturers and Users to qualify Network interconnecting VoIP ATM
Systems”.
5 EUROCAE performance specifications are recommendations only.
EUROCAE is not an official body of the European governments; its
recommendations are valid statements of official policy only when adopted
by a particular government or conference of governments.
6 Copies of this document may be obtained from:
EUROCAE
102 rue Etienne Dolet
92240 MALAKOFF
France
Tel: 33 1 40 92 79 30
Fax: 33 1 46 55 62 65
Email: eurocae@eurocae.net
Web Site: www.eurocae.net
© EUROCAE, 2009
ii
TABLE OF CONTENTS
FOREWORD .......................................................................................................................... I
TABLE OF CONTENTS .................................................................................................................. II
CHAPTER I INTRODUCTION .............................................................................................. 1
1.1. Background....................................................................................................... 1
1.2. ED-138 Presentation ........................................................................................ 2
1.3. Terminology for requirements, recommendations, and options ....................... 3
CHAPTER I REFERENCES............................................................................................................ 4
CHAPTER II NETWORK SPECIFICATION........................................................................... 5
2.1. General information .......................................................................................... 5
2.1.1. Operational Voice Applications in ATM............................................. 6
2.1.2. Numbering of Requirements, Recommendations and Options......... 6
2.1.3. Network Concepts ............................................................................. 7
2.2. Specific Network and Services Requirements ................................................. 7
2.2.1. IP Addressing and Protocols ............................................................. 8
2.2.2. IP Networking and Routing................................................................ 8
2.2.3. Applications and Quality of Service (QoS) requirements.................. 9
2.3. Network Functional and Performance Requirements....................................... 9
2.3.1. Network connectivity ......................................................................... 9
2.3.2. Quality and Performance................................................................... 10
2.3.3. Availability.......................................................................................... 10
2.3.4. Class of Service CoS and Quality of Service QoS............................ 10
2.3.5. Maintenance and Diagnostics ........................................................... 12
2.4. Network Management and Procedures ............................................................ 12
2.4.1. Fault Management ............................................................................ 12
2.4.2. Configuration Management ............................................................... 13
2.4.3. Performance Management................................................................ 13
2.5. Specific Safety and Security Requirements ..................................................... 14
2.5.1. Security Policy and requirements...................................................... 14
2.5.2. Security Management ....................................................................... 14
CHAPTER II REFERENCES........................................................................................................... 16
CHAPTER III SECURITY POLICY ......................................................................................... 17
3.1. Background....................................................................................................... 17
3.2. ATM Security Principles.................................................................................... 17
3.2.1. Confidentiality.................................................................................... 17
3.2.2. Integrity.............................................................................................. 17
3.2.3. Availability.......................................................................................... 18
3.3. VoIP Security .................................................................................................... 18
3.3.1. Threats in VoIP networks .................................................................. 18
3.4. Network Model.................................................................................................. 19
© EUROCAE, 2009
iii
© EUROCAE, 2009
1
CHAPTER I
INTRODUCTION
1.1 BACKGROUND
Components of Ground- Ground ATM voice systems has used digital (TDM/PCM -
Time Division Multiplexing / Pulsed Code Modulation) or analogue technology during a
long time.
Convergence of voice and data into one multimedia network is observed on the
market. As a consequence the ATM communication network is evolving into a
common infrastructure for voice and data services.
As a result of the above described technological trends, the capability of Voice over IP
Technology may fulfil and improve operational and technical ATM communication
requirements, including voice / data convergence, specific Quality of Services (QoS),
security and safety requirements.
So after analysing the situation regarding:
• Operational and Technical Air-Ground (A/G) and Ground-Ground (G/G) ATM
Voice system requirements
• Existing IP Voice protocols and signaling standards
• IP networks capability for Voice services
• Security, QoS, Convergence (infrastructure, protocol, applications)
• Existing IP Voice ATM systems and their service interfaces,
The following tasks were achieved for ground-ground ATM communications and
ground-ground segment of air-ground ATM communications:
• Define IP Voice ATM Systems and identify their components (Voice
Communication System / VCS, Ground based Radio Station / GRS…)
• Determine possible additional operational and technical ATM requirements for
new IP Voice ATM systems, also taking into consideration A/G communications.
• Accordingly, make recommendations to upgrade current standardisation
documents.
• Develop a Technical Specification for an IP Voice ATM System including:
o Minimum performance and safety / security requirements for the system
and, if appropriate, for components
o Interoperability requirements between IP components of the IP Voice
ATM systems
o Minimum performance requirements of an IP Network aimed to support
Voice in ATM.
o Guidelines for qualification tests of IP Voice ATM systems and IP Voice
ATM components.
So four documents with a common reference to “Vienna Agreement” was provided:
ED-136 VoIP ATM System Operational and Technical Requirements
ED-137 Interoperability Standards for VoIP ATM Components
ED-138 Network Requirements and Performances for VoIP ATM Systems
ED-139 Qualification tests for VoIP ATM Components and Systems
© EUROCAE, 2009
2
The “Vienna Agreement” defines the different components of the VoIP ATM system
and may be resumed by the following figure on which are described the different
interfaces between the components.
The purpose of this document is to specify the network requirements and the needs of
VoIP services for ATM applications in the network - including IP Adressing and
Security - that are to provide the necessary high levels of availability, integrity,
performance and Quality of Service (QoS) for VoIP in ATM applications.
ED-138 is divided into two parts:
• ED-138 Part 1 (this document)
o Network Specification
o Security Policy
o IP Addressing Plan
• ED-138 Part 2 [1]:
o Network Design Guideline
*
ED-138 Part 1 (Network Specification) describes WHAT shall/should/may be done.
© EUROCAE, 2009
3
© EUROCAE, 2009
4
CHAPTER I REFERENCES
[1] ED-138 Network Requirements and Performances for VoIP ATM Systems Part
2: Network Design Guideline;
http://www.eurocae.net
[2] IETF RFC 2119: Key words for use in RFCs to Indicate Requirement Levels;
http://www.ietf.org/rfc/rfc2119.txt
© EUROCAE, 2009
5
CHAPTER II
NETWORK SPECIFICATION
2.1 GENERAL INFORMATION
For the purposes of this document, the reference architecture for specifying network
requirements of VoIP in ATM is shown in Figure 2, based upon the “Vienna
Agreement”.
Network
FIGURE 2 - WG67 VIENNA AGREEMENT INCLUDING NETWORK CONCEPT
© EUROCAE, 2009
6
RADIO
WAN
VoIP
VCS 1 VCS 2
VCS = Voice Communication System
All Requirements, Recommendations and Options in this chapter are marked with a
cardinal number in brackets on the left side of the paragraph.
1
European Air Traffic Management
2
Single European Sky; http://www.eurocontrol.int/ses/public/subsite_homepage/homepage.html
© EUROCAE, 2009
7
The following are the definitions of the main concepts that are particular to this
Document:
• EDGE is the equipment that serves as the interface to the WAN. This could be
one or a combination of devices (e.g., switches, routers, and firewalls) that
deliver the communication service.
• LAN (Local Area Network) is a network covering a relatively small geographic
area.
• WAN shall be understood as being the interconnecting infrastructure of a
communications enterprise, which may be based upon the IP (though not
necessarily so), supported by underlying technologies (e.g., MPLS, Gigabit
Ethernet, Frame Relay, TDM). The WAN serves users across a broad
geographic area and often uses transmission devices provided by common
carriers. A WAN can be a Provider’s Core network, a private network or the
combination of both of them.
• IP Network means the complete physical and logical mapping and connectivity
(up to Layer 3) between end-system network access points, including the LAN,
EDGE and WAN domains.
Figure 4 shows the different Network domains and their terminology.
IP
IP
IP
IP
IP
IP
IP
IP
LAN EDGE WAN EDGE LAN
The IP [2] [3] infrastructure will be expected to provide smooth delivery of voice and
signalling packets to the end systems. To support this, voice and data traffic are
expected to be prioritized differently on the network, to accommodate the extra
sensitivity of voice traffic to latency and because voice is a continuous streaming that
should not be interrupted.
In addition, factors such as jitter, packet loss, security, and incompatibility can affect
the quality of communication services, and need to be handled by the IP
infrastructure.
© EUROCAE, 2009
8
(6) Native Routing of IPv6 packets SHALL be supported by the EDGE; IPv6
transportation SHALL be supported by the WAN and LAN.
(7) Border Gateway Protocol Version 4+ (BGP4+) [5] and static/default routing
SHALL be supported by the WAN entry point in order to properly route traffic
between WANs.
(8) Open Shortest Path First (OSPF) [6] SHOULD be supported within the WAN
domain.
A detailed explanation of Routing criteria is provided in ED-138 Network Requirements
and Performances for VoIP ATM Systems Part 2: Network Design Guideline chapter
III.
© EUROCAE, 2009
9
(9) The IP Network SHALL be able to support the applications with Quality of
Service QoS shown in Table 2. Typically these QoS parameters are defined in
Service Level Agreements (SLA’s).
(10) The IP Network SHALL be able to distinguish between different Classes of
Service (CoS) and different requirements regarding delay, jitter, bandwidth
demand, and packet loss. The different requirements are shown in Table 2.
Typical packet
length
1. payload only Acceptable
Acceptable
Application latency3 (without Acceptable Jitter3
2. with CRTP Packet Loss rate
jitter)
3. with CRTP and
IPSec
1. 160 Bytes
Telephone voice 2. 164 Bytes 100ms 15ms 0.5%
3. 212-222 Bytes
1. 160 Bytes
Radio voice 2. 164 Bytes 50ms 15ms 0.5%
3. 212-222 Bytes
Telephone
100ms4 50ms 0.5%
Signalling
Radio
50ms4 50ms 0.5%
Signalling
Recording 100ms 50ms 0.5%
TABLE 2 - APPLICATION REQUIREMENTS
(11) Ethernet according to IEEE 802.3 standards SHALL be available in the LAN
environment for the access of client devices to the IP network.
(12) For legal recording local physical Ports which duplicates traffic (Span or Mirror
Port) MAY be available in LAN.
(13) If manual compensation mode for Climax5 is chosen, fixed network paths
SHOULD be used in the IP Network.
3
All latency values are one-way delays
4
Value is given for the network path between two elements involved in the call-setup
5
Multi-station carrier offset mode, with voting override
© EUROCAE, 2009
10
2.3.3 Availability
Availability is the probability that the network is operational and functional as required
at any given moment in time.
The expected or measured fraction of time the defined service, device, application,
area is operational. Annual uptime is the amount of time: in days, hours, minutes the
item is operational and functional.
(18) IP Network SHALL achieve the required availability of the overall system.
Note: Availability depends on the overall system architecture and usage of
redundancy and backup-features and last resorts/emergency systems.
A detailed explanation of these criteria is provided in ED-138 Network Requirements
and Performances for VoIP ATM Systems Part 2: Network Design Guideline chapter
III.
© EUROCAE, 2009
11
© EUROCAE, 2009
12
(26) For cross border communication the IP Network SHOULD set the DSCP field of
outgoing packets to the values shown in Table 4.
(28) The IP Network SHALL have the capability to conduct maintenance and
diagnostic procedures to support the quality and performance requirements.
The goal of fault management is to detect, filter, log, notify users of (e.g., trigger
alarms), and automatically fix network problems, when possible, to keep the network
running effectively. Because faults can cause downtime or unacceptable network
degradation, fault management is perhaps the most widely implemented in network
management elements. A graphical view of network topology is used to indicate
network element connectivity and faults in real time.
Fault statistics are aggregated to compile long-term failure trends. For example,
availability, reliability, and maintainability metrics may be compiled to assess network
service compliance with service level agreements.
(29) Fault Management SHALL be available for the IP Network to undertake all
necessary actions in order to report the failure, complete diagnosis, and fix
network problems.
(30) Preventive fault management actions SHALL be prescribed and maintained to
ensure the availability of primary and backup paths and components for the IP
Network.
© EUROCAE, 2009
13
© EUROCAE, 2009
14
(35) Security procedures and mechanisms SHALL be described for the IP Network
to protect against security incidents; principles of Security Policy (CHAPTER III)
SHALL be used.
(36) Static firewalling rules MAY be used for Raw RTP sessions in the IP Network.
© EUROCAE, 2009
15
© EUROCAE, 2009
16
CHAPTER II REFERENCES
[1] NIST Security Considerations for Voice Over IP Systems; D. Richard Kuhn,
Thomas J. Walsh, Steffen Fries
http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf
[2] IETF RFC 791: Internet Protocol (IP) version 4;
http://www.ietf.org/rfc/rfc791.txt
[3] IETF RFC 2460: Internet Protocol (IP) version 6 Specification;
http://www.ietf.org/rfc/rfc2460.txt
[4] ED-138 Network Requirements and Performances for VoIP ATM Systems Part
2: Network Design Guideline;
http://www.eurocae.net
[5] IETF RFC 2545: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain
Routing
IETF RFC 2858: Multiprotocol Extensions for BGP-4
http://www.ietf.org/rfc/rfc2545.txt; http://www.ietf.org/rfc/rfc2858.txt
[6] IETF RFC 2740: OSPF for IPv6
http://www.ietf.org/rfc/rfc2740.txt
© EUROCAE, 2009
17
CHAPTER III
SECURITY POLICY
3.1 BACKGROUND
Current ATM voice switching services for G-G networking are supported with private
dedicated links. Such networks are considered secure, since they are not vulnerable
to network-layer attacks by viruses and other malicious cyber activities.
However, migration of ATM G-G voice communications to a VoIP medium is
underway, which will enable flexible deployment of high-availability services, and cost-
effective sharing of common media with data communications. On the other hand, the
accessibility provided by this technology leaves it open to malicious intrusion. To
address such vulnerabilities, an architecture founded upon robust security protections
should be developed, based upon stakeholder policies and needs, and industry
standards and best practices.
The scope of this chapter is to define the security policy for VoIP implementations to
support ATM communications. This includes the required security architecture and
component mechanisms. This policy only covers information security, and does not
establish requirements for physical security.
Detailed technical solutions are not given in this chapter – they can be found in ED-
138 Network Requirements and Performances for VoIP ATM Systems Part 2.
The complexity of ATM security needs in a VoIP environment is best addressed with a
comprehensive policy. This is based upon well-known security principles that
encompass the network, application, and architectural domains. Relevant
requirements and recommendations are described below.
3.2.1 Confidentiality
3.2.2 Integrity
Integrity ensures that the information relayed from its source to its intended destination
is authentic, complete, and accurate within specified parameters.
Integrity is enabled with the following approaches:
• Prevention of the modification of information by unauthorized users
• Prevention of the unauthorized or unintentional modification of information by
authorized users
• Preservation of the internal and external consistency
This is crucial for VoIP messaging for ATM, where corrupted or modified messages
could incur safety risks for aviation.
© EUROCAE, 2009
18
3.2.3 Availability
Availability ensures that authorized users have timely and uninterrupted access to the
information in the system within specified parameters. As such, availability establishes
a quantifiable guarantee that the required information, systems and services are
operationally functional when needed. This is important for ATM operations, where
communication interruptions could result in safety issues and flight operations delays.
The key to securing VoIP is to use security policies and mechanisms analogous to
those implemented in data-only networks (e.g., firewalls, encryption, gateways) to
emulate the security level currently available to Private Switched Telephone Network
(PSTN) network users.
© EUROCAE, 2009
19
Availability
Availability is the most obvious risk for a switch. Attacks exploiting vulnerabilities in the
switch software or protocols may lead to deterioration or even denial of service or
functionality of the switch. A voice over IP system may have additional vulnerabilities
due its exposure to the Internet. As such, attackers may be able to bring down VoIP
systems by exploiting weaknesses in Internet protocols and services.
It is known that any network may be vulnerable to denial of service attacks, simply by
overloading the capacity of the system and interrupting traffic flow. With VoIP, the
problem may be especially severe, because of its sensitivity to packet loss or delay.
The most significant security concerns in a VoIP environment are:
• Denial of Service (DoS) Attacks: Endpoints, such as IP telephones, and VoIP
gateways (w/ embedded SIP proxies), can be attacked via bombardment with
rogue packets to disrupt communications.
• Call Interception: Unauthorized monitoring of voice packets or hacking of the
Real-Time Transport Protocol (RTP) [12].
• Signal Protocol Tampering: Similar to call interception but for signalling traffic, a
malicious user could monitor and capture the packets that set up the call. By
doing this, they can manipulate fields in the data stream and interfere with
communications, which could be used for a DoS attack.
• Presence Theft: Impersonation of a legitimate user sending or receiving data
Assumption: Air Navigation Service Provider (ANSP) local domains (either owned and
defined by a single ANSP, or shared within an ANSP group) or other related
organization domains are operated and managed autonomously. These domains (that
each may contain networks and hosts) do not necessarily have mutual trusting
relationships with each other.
Based on this assumption a simplified model was created to define the different
security zones, as follows:
Zone 1: IP Core (e.g., Pan European Network Service (PENS) or an alternative
shared IPv4/IPv6 00[3] Backbone)
This zone is typically used for cross border communication.
Zone 2: Access (from Organizations to the shared IP Core infrastructure)
Zone 3: ANSPs and other related Organizations Domains
© EUROCAE, 2009
20
Security
Zone 1
IP Core Provider
Responsibility of
IP Core
Possible Interconnections
ANSPs/Organizations
Responsibility of
© EUROCAE, 2009
21
This section describes the security requirements for the Security Zones shown in
Figure 5.
Requirements:
• Edge-to-Edge encryption SHALL be available for the different connections, its actual use is to
be specified in Service-Level-Agreements (SLA’s).
• Network Management services SHALL use encrypted and authenticated technologies (e.g.,
SSH, SNMPv3, IPSec, TLS) and/or Out-Of-Band technologies.
© EUROCAE, 2009
22
Requirements:
• Firewalls and Intrusion Detection/Intrusion Prevention systems (IDS/IPS) SHALL be used in
private networks to control traffic to/from non-operational networks (e.g., administrative
networks). Non-operational networks can be private or public networks.
• Data and Voice networks SHALL be separated logically (e.g., VLAN technology) or physically.
• Filtering mechanisms for traffic between servers and clients SHALL be used to protect the
servers.
• The network infrastructure SHALL offer technical means to ensure the integrity of the overall
voice communication service. Any violation of the integrity SHOULD be detectable.
• The network infrastructure SHALL offer technical means to ensure the confidentiality of the
overall voice communication service. Any violation of confidentiality SHOULD be detectable.
• The network infrastructure SHALL offer technical means to ensure the authenticity of the
source/destination of the overall voice communication service. Any violation of the authenticity
SHOULD be detectable.
• The management functions SHALL be separated logically (e.g., VLAN, out of band) or
physically.
• Network Configuration Management SHALL use encrypted and authenticated technologies
(e.g., SSH, SNMPv3, IPSec, TLS) and/or Out-Of-Band technologies.
• Operation of Security elements SHALL stay up-to-date with the evolution of protection
mechanisms.
© EUROCAE, 2009
23
NIST SP 800-58 [1] discusses the impact of these and related issues on VoIP over
private and public networks, for which it recommends the following:
• Appropriate network architecture SHOULD be developed
• Voice and data SHOULD be separated on logically different networks.
• Multimedia protocols SHOULD be isolated from the data network. Strong authentication and
access control SHOULD be used on the voice gateway system, which interfaces with the
PSTN, SIP, H.323, or MGCP [15] connections from data network.
• Mechanisms SHOULD be deployed for allowing VoIP traffic to traverse firewalls (e.g.,
Application Level Gateways, Session Border Controllers).
• Stateful packet filters SHOULD be implemented to track connections and deny non-compliant
packets.
• IPSec [9] [10] [11], MPLS [20], and tunnelling technologies SHOULD be used to secure network
and link layers and TLS [7] SHOULD be used to protect multimedia protocol signalling for upper
layers.
• To enhance performance, encryption at the router or gateway SHOULD be invoked, not at the
endpoints, to provide for IPSec tunnelling.
• Uninterruptible Power Supplies (UPS) and other mechanisms SHOULD be used to enhance
availability and integrity.
• Separate Dynamic Host Configuration Protocol (DHCP) servers SHOULD be provided to ease
the incorporation of intrusion-detection and VoIP firewall protection [17].
• Softphone systems SHOULD be avoided when security and privacy is a concern.
• Although the thrust of this document is to establish security policy for VoIP ATM
communications, practitioners SHOULD analyse the tradeoff of implementing security
mechanisms with their impact on ATM operational performance.
© EUROCAE, 2009
24
© EUROCAE, 2009
25
[15] IETF RFC 3435: Media Gateway Control Protocol version 1.0 (section 5); IETF
RFC 3661: Media Gateway Control Protocol (MGCP) Return Code Usage
http://www.ietf.org/rfc/rfc3435.txt, http://www.ietf.org/rfc/rfc3661.txt
[16] IETF RFC 2764: A Framework for IP Based Virtual Private Networks;
http://www.ietf.org/rfc/rfc2764.txt
[17] IETF RFC 3315: DHCP for IPv6; IETF RFC 4361: Node-Specific Client
Identifiers for DHCPv4
http://www.ietf.org/rfc/rfc3315.txt, http://www.ietf.org/rfc/rfc4361.txt
[18] IETF RFC 4251: The SSH Protocol Architecture;
http://www.ietf.org/rfc/rfc4251.txt
[19] IETF STD 62: An Architecture for Describing SNMP Management Frameworks;
http://www.ietf.org
[20] IETF RFC 3031 “Multiprotocol Label Switching Architecture”, RFC 3032 “MPLS
Label Stack Encoding”, RFC 3443 “TTL Processing in MPLS Networks”, RFC
4182 “Removing a Restriction on the Use of MPLS Explicit NULL”
http://www.ietf.org/rfc/rfc3031.txt, http://www.ietf.org/rfc/rfc3032.txt,
http://www.ietf.org/rfc/rfc3443.txt, http://www.ietf.org/rfc/rfc4182.txt
[21] IETF RFC 3414, User-based Security Model (USM) for version 3 of the Simple
Network Management Protocol (SNMPv3)
http://www.ietf.org/rfc/rfc3414.txt
© EUROCAE, 2009
26
CHAPTER IV
IP ADDRESSING
4.1 BACKGROUND
Voice over IP (VoIP) defines a way to carry voice calls over an IP network including
the digitisation and packetisation of the voice streams. The use of IP telephony and
the VoIP standards will support the creation of an ATM communication system where
higher-level features (e.g., advanced call routing, voice mail, call/contact centre) can
be deployed to support air traffic services.
This chapter proposes a standards-based common addressing structure to
accommodate the heterogeneity of end systems in the national and international ATM
domains.
The proposed addressing structure is an extract from the results of the iPAX Task
Force6.
Network addressing is embedded in IP packets to enable their routing to intermediate
or end systems (e.g., servers or telephones). The format of this addressing is
dependent on the version of IP being used (i.e., IPv4 [1] [2] or IPv6 [1] [4] [5]), which
are described below.
IPv4 addresses are used to identify device interfaces to hosts, routers, gateways,
adapters, and IPv4 telephones. Each device interface in an IPv4 network must be
assigned to a unique IPv4 address to receive or transmit voice and data packets.
IPv4 uses 32-bit binary numbers to identify the source and destination address in each
information packet. IPv4 addresses are parsed into two portions - Network and Host.
The predominance of one portion over the other within the 32-bit space determines
the Address Class. Those classes are referred to as Class A through Class E [1].
Please see information about CIDR Address Allocation Architecture in [2].
Figure 6 illustrates the five IPv4 address class formats.
32 bits
0 Byte 2 Byte 3 Byte 4
Class A Byte 1 Host portion
Network portion
1 0
Class B Networking portion Host portion
1 1 0
Class C Networking portion Host portion
1 1 1 0
Class D Multicast address
6
EUROCONTROL EATM Internet Protocol for Aeronautical Exchange Task Force
© EUROCAE, 2009
27
Class A frames are identified by a 0 value high order bit. They provide 7 bits for the
network portion of the address, and 24 bits for the host. Class A addresses were
allocated at the initial deployment of the Internet, and are primarily held by North
American government agencies, and legacy companies that were involved in early
Internet research and development.
Class B frames are identified with the two high order bits set to 10. These addresses
are typically allocated to Internet Service Providers (ISP) and large organizations.
Class C frames are identified with the three high order bits set to 110. Each of these
addresses can support up to 256 hosts. These addresses are typically allocated to
LAN and WAN nodes.
Class D addresses are identified by the four high order bits set to 1110. These
addresses are used for multi-casting applications, where voice and data packets can
be sent to groups of multiple nodes concurrently. These groups are pre-defined in the
network topology by aggregation of node addresses. Multicasting enables efficient
transmission of high-bandwidth payloads by minimizing multiple streams of voice and
data to individual nodes.
Class E addresses are identified by the four high order bits set to 1111. This address
space is reserved for experimental research.
To isolate the critical ATM VoIP infrastructure from the public Internet, and to mitigate
the acquisition of scarce addressing from the global IP space, private addressing 0 [7]
may be structured and allocated. However, this architecture may be incompatible with
other independently structured privately addressed domains, or with the public
Internet, unless the Network Address Translation (NAT) mechanisms and firewalls
supporting such private addressing are designed for this type of interfacing.
IPv6 [1], [5], [1], [9], features a much larger addressing space than IPv4, as shown in
Figure 7. This enables an ISP or enterprise organization to aggregate the prefixes of
node or user groups (e.g., customers, or internal users) under a single Network Prefix
for advertisement on the IPv6 Internet.
XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX
© EUROCAE, 2009
28
The 128-bit IPv6 address is separated into eight 16-bit hexadecimal numbers. In order
to alleviate the cumbersome size of these addresses, the IPv6 community has
developed the following notational shorthand:
• Leading “0”s can be removed
• 0000 = 0 (compressed form)
• “::” represents one or more groups of 16-bits; “0” can only appear once in an
address. For example, 2001:0:13FF:09FF:0:0:0:0001 = 2001:0:13FF:09FF::1
• The lower four 8-bits can use decimal representation of IPv4 address for
example, 0:0:0:0:0:0:192.168.0.1
IPv6 addressing encompasses the following types:
• Unicast [6] – used to identify a single interface. Unicast supports the following
address types: Global Unicast Address, Site – Local Unicast address, and Link
– Local Unicast address as illustrated in Figure 8
1111111011 Subnet ID
or Set value to Site Link Interface ID
FEC0::10 “0” add (16- (64 – bits)
(10 - bits) (38 – bits) bits)
Site – Local Unicast Address Format
1111111010
or Set value to “0” Interface ID
FE80::10 (54 – bits) (64 – bits)
(10 - bits)
Link – Local Unicast Address format
© EUROCAE, 2009
29
128 – Bits
FIGURE 9 - ANYCAST ADDRESSING FORMAT
Within each subnet, the highest 128 interface identifier values are reserved for
assignment as subnet anycast addresses. The construction of these addresses
depends upon the IPv6 address type used in the subnet, as indicated by the format
prefix of the address. In particular, IPv6 address types requiring 64 bit interface
identifiers in Extended Unique Identifier-64 (EUI-64) format [11] are constructed as
depicted in Figure 10.
Subnet Prefix 111111X1111…. 111 Anycast ID
(64 – bits) (57- bits) (7 – bits)
FIGURE 10 - RESERVED SUBNET ANYCAST ADDRESS FORMAT WITH EUI-64 INTERFACE
IDENTIFIERS
Multicast [9] is assigned to a set of interfaces that may belong to different nodes. A
packet sent to a multicast address is delivered to all interfaces identified by that
address. Its format is shown in Figure 12.
11111111 Flags (4-bits) Group ID (112 – bits)
(8-bits) and
Scope (4-bits)
FIGURE 12 - MULTICAST ADDRESSING FORMAT
© EUROCAE, 2009
30
The leading eight bits (“11111111”) identifies the address as being a multicast
address. “Flags” is a set of four bits, as configured below:
0 0 0 T
T = 0 indicates a permanently assigned address by the Internet Assigned Number
Authority (IANA) [8].
T = 1 indicates a non-permanently-assigned (transient) multicast address.
Scope is a 4-bit field, used to limit the scope of the multicast group. The values are:
1 = Interface – local
2 = Link - local
3 = Subnet - local
4 = Admin - local
5 = Site - local
8 = Organization – local
E = Global
© EUROCAE, 2009
31
IPv4 was initially standardized in 1981. As the Internet became ubiquitous, the
inherent IPv4 QoS, security, addressing, and scalability capabilities were pushed to
their limit. These deficiencies, as well as new network services, exacerbated the strain
placed on IPv4 technology and its quest to accommodate the global needs for Internet
services. To continue using IPv4 under this load required that new features and
capabilities be developed, standardized, and “bolted on”. This approach would have
been costly, risky, and difficult to manage. This resulted in the development of a next
generation networking protocol IPv6. IPv6 was designed to overcome the limitations
of IPv4 by:
• Expanding available IP address space to accommodate future demand
• More efficient addressing design and handling at the IP network layer
• Improving QoS to minimize packet loss/drops
• Operating over greater bandwidths for video conferencing and Voice over IP
(VoIP) applications
• Enhancing end-to-end security, which is critical for ATM applications
• Enabling more granularity and flexibility in message dissemination to individuals
and groups
• Establishing a “plug and play” capability for installing devices in an Ipv6 network
• Providing more robust network management on an enterprise scale
• Eliminating the need for network address translation (NAT)
• Incorporating a compact base header structure, which expedites packet routing
– less frequently used options are relegated to extension headers
There are many vendors offering IPv6 product lines that are often bundled with router
and operating system offerings on the market
As ATM communication services proliferate domestically and internationally, its
connectivity and communications capabilities need to become more robust and
scalable. IPv6 is an industry-standard solution that can support such growth in
L communication demand and geographical scope.
The key reason of deploying IPv6 is due to the current IPv4 deployments between
ANSPs which have extensive IP address domain overlaps making the use of inter-
WAN IPv4 too complex
© EUROCAE, 2009
32
An IPv6 addressing scheme was developed within the context of the iPAX Task Force
(TF) [10], as illustrated in Figure 13.
The addressing scheme follows on from the RIPE allocation to provide /48
assignments. Indeed, when considering the existing IPv4 addressing schemes, most
ANSPs already work with a private “Class A” address (e.g., 10.x.y.z, where x and y
are octets used to assign sites and subnets). With a /48 allocation, ANSPs have two
octets to number their sites and subnets and can still make use of IPv6 address auto-
configuration.
RIPE Responsibilty
(32 bits)
3 13 13 3 3 13 16 64
© EUROCAE, 2009
33
inet6num: 2001:4b50::/32
org: ORG-EitE1-RIPE
netname: BE-EUROCONTROL-20050131
descr: EUROCONTROL, the European Organisation for the Safety of Air
Navigation
country: BE
admin-c: EJC2-RIPE
tech-c: EJC2-RIPE
status: ALLOCATED-BY-RIR
notify: eivan.cerasi@eurocontrol.int
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: EURO-HQ-MNT
mnt-routes: EURO-HQ-MNT
changed: hostmaster@ripe.net 20050131
source: RIPE
From this allocation, the EUROCONTROL Agency has begun the assignment of IPv6
addresses.
© EUROCAE, 2009
34
ANNEX A
© EUROCAE, 2009
35
© EUROCAE, 2009
36
© EUROCAE, 2009
37
CHAPTER IV REFERENCES
[1] IETF RFC-791, September 1991; IETF RFC-2460, December 1998: Internet
Protocol version 4 and version 6 Specifications
http://www.ietf.org/rfc/rfc791.txt; http://www.ietf.org/rfc/rfc2460.txt
[2] IETF RFC-1518, September 1993; An Architecture for IP Address Allocation
with CIDR
http://www.ietf.org/rfc/rfc1518.txt
[3] IETF RFC-2474, December 1998; Definition of the Differentiated Services Field
(DS Field) in the IPv4 and IPv6 Headers
http://www.ietf.org/rfc/rfc2474.txt
[4] IETF RFC-1752, January 1995: The Recommendation for IP Next Generation
Protocol
http://www.ietf.org/rfc/rfc1752.txt
[5] IETF RFC-2460, December 1998: Internet Protocol, Version 6 (IPv6)
Specification
http://www.ietf.org/rfc/rfc2460.txt
1
[6] IETF RFC-1887, December 1995 (Information): An Architecture for IPv6 Unicast
Address Allocation
http://www.ietf.org/rfc/rfc1887.txt
[7] IETF RFC-1918, February 1996: Address Allocation for Private Internets
http://www.ietf.org/rfc/rfc1918.txt
[8] IETF RFC-3232, January 2002, (Information): Assigned Numbers: RFC-1700 is
replaced by On-line Database
http://www.ietf.org/rfc/rfc3232.txt
[9] IETF-RFC-4291, February 2006: IPv6 Addressing Architecture
http://www.ietf.org/rfc/rfc4291.txt
[10] Internet Protocol for Aeronautical Exchange Task Force (iPAX-TF); Eivan
Cerasi
http://www.eurocontrol.int/communications/public/standard_page/com_network.
html
[11] IETF RFC-2526, March 1999: Reserved IPv6 Subnet Anycast Addresses
http://www.ietf.org/rfc/rfc2526.txt
[12] IETF RFC-4213, October 2005: Basic Transition Mechanisms for IPv6 Hosts
and Routers
http://www.ietf.org/rfc/rfc4213.txt
[13] IETF RFC-2766, February 2000: Network Address Translation – Protocol
Translation (NAT-PT); IETF RFC-3596, October 2003: DNS Extensions to
Support IP Version 6
http://www.ietf.org/rfc/rfc2766.txt; http://www.ietf.org/rfc/rfc3596.txt
© EUROCAE, 2009
38
© EUROCAE, 2009