ED-138 Network Requirements and Performances For Voice Over Internet Protocol (VoIP) Air Traffic Management (ATM) Systems
ED-138 Network Requirements and Performances For Voice Over Internet Protocol (VoIP) Air Traffic Management (ATM) Systems
ED-138 Network Requirements and Performances For Voice Over Internet Protocol (VoIP) Air Traffic Management (ATM) Systems
ED-138 Part 1
“Month Year”
ED-138 Part 1
“Month Year”
© EUROCAE, 2009
i
FOREWORD
EUROCAE
102 rue Etienne Dolet
92240 MALAKOFF
France
Tel: 33 1 40 92 79 30
Fax: 33 1 46 55 62 65
Email: eurocae@eurocae.net
Web Site: www.eurocae.org
© EUROCAE, 2009
ii
TABLE OF CONTENTS
FOREWORD I
CHAPTER I INTRODUCTION...................................................................................................... 1
1.1. Background..................................................................................................... 1
1.2. ED-138 Presentation ...................................................................................... 3
1.3. Terminology for requirements, recommendations, and options ..................... 4
CHAPTER I References ................................................................................................ 5
© EUROCAE, 2009
iii
3.2.2. Integrity.......................................................................................... 19
3.2.3. Availability...................................................................................... 20
3.3. VoIP Security ................................................................................................ 20
3.3.1. Threats in VoIP networks .............................................................. 20
3.4. Network Model.............................................................................................. 22
3.5. Security requirements................................................................................... 24
3.5.1. Zone 1 (IP Core)............................................................................ 24
3.5.2. Zone 2 (Access to the shared IP Core)......................................... 25
3.5.3. Zone 3 (ANSPs and other related Organizations Domain) ........... 26
3.6. General recommendations ........................................................................... 27
Chapter III References................................................................................................. 28
CHAPTER IV IP ADDRESSING................................................................................................. 30
4.1. Background................................................................................................... 30
4.1.1. IPv4 Overview ............................................................................... 31
4.1.2. IPv6 Overview ............................................................................... 33
4.1.3. Why IPv6 ....................................................................................... 37
4.1.4. Transition Mechanisms ................................................................. 38
4.2. Addressing Scheme (Revised iPAX Scheme).............................................. 39
4.2.1. Address Management ................................................................... 40
Annex A : NETWORK Address ASSIGNMENTS ........................................................ 41
Chapter IV References ................................................................................................ 44
© EUROCAE, 2009
1
CHAPTER I
INTRODUCTION
1.1. BACKGROUND
Components of Ground- Ground ATM voice systems has used digital (TDM/PCM - Time
Division Multiplexing / Pulsed Code Modulation) or analogue technology during a long
time.
Convergence of voice and data into one multimedia network is observed on the market.
As a consequence the ATM communication network is evolving into a common
infrastructure for voice and data services.
As a result of the above described technological trends, the capability of Voice over IP
Technology may fulfil and improve operational and technical ATM communication
requirements, including voice / data convergence, specific Quality of Services (QoS),
security and safety requirements.
The following tasks were achieved for ground-ground ATM communications and ground-
ground segment of air-ground ATM communications:
© EUROCAE, 2009
2
The “Vienna Agreement” defines the different components of the VoIP ATM system
and may be resumed by the following figure on which are described the different
interfaces between the components.
© EUROCAE, 2009
3
The purpose of this document is to specify the network requirements and the needs of
VoIP services for ATM applications in the network - including IP Adressing and Security -
that are to provide the necessary high levels of availability, integrity, performance and
Quality of Service (QoS) for VoIP in ATM applications.
*
ED-138 Part 1 (Network Specification) describes WHAT shall/should/may be done.
© EUROCAE, 2009
4
To avoid confusion with their natural meanings in the English language, the words
SHALL, SHOULD, and MAY take on the meaning stated above only where printed in
boldface. When printed in normal (Arial) typeface, the natural English meaning is meant.
Detailed description of terminology:
The key words "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT" and "MAY” in this
document are to be interpreted as described in RFC 2119.
1. SHALL This word has the same meaning as the phrase "REQUIRED" and
means that the definition is an absolute requirement of the specification.
2. SHALL NOT This phrase means that the definition is an absolute prohibition of
the specification.
4. SHOULD NOT This phrase, or the phrase "NOT RECOMMENDED" mean that
there may exist valid reasons in particular circumstances when the particular
behaviour is acceptable or even useful, but the full implications should be
understood and the case carefully weighed before implementing any behaviour
described with this label.
5. MAY This word, or the adjective "OPTIONAL", mean that an item is truly
optional.
© EUROCAE, 2009
5
CHAPTER I REFERENCES
[1] ED-138 Network Requirements and Performances for VoIP ATM Systems Part 2:
Network Design Guideline;
http://www.eurocae.org
[2] IETF RFC 2119: Key words for use in RFCs to Indicate Requirement Levels;
http://www.ietf.org/rfc/rfc2119.txt
© EUROCAE, 2009
6
CHAPTER II
NETWORK SPECIFICATION
For the purposes of this document, the reference architecture for specifying network
requirements of VoIP in ATM is shown in Figure 2, based upon the “Vienna Agreement”.
Network
FIGURE 2 WG67 VIENNA AGREEMENT INCLUDING NETWORK CONCEPT
WG-67 assumed the responsibility to define the specification of VoIP for ATM Systems to
include the service types as described in Table 1.
1
European Air Traffic Management
© EUROCAE, 2009
7
RADIO
WAN
VoIP
VCS 1 VCS 2
VCS = Voice Communication System
2
Single European Sky; http://www.eurocontrol.int/ses/public/subsite_homepage/homepage.html
© EUROCAE, 2009
8
The following are the definitions of the main concepts that are particular to this Document:
• EDGE is the equipment that serves as the interface to the WAN. This could be one
or a combination of devices (e.g., switches, routers, and firewalls) that deliver the
communication service.
• IP Network means the complete physical and logical mapping and connectivity
(up to Layer 3) between end-system network access points, including the LAN,
EDGE and WAN domains.
IP
IP
IP
IP
IP
IP
IP
IP
LAN EDGE WAN EDGE LAN
© EUROCAE, 2009
9
The IP [2] [3] infrastructure will be expected to provide smooth delivery of voice and
signalling packets to the end systems. To support this, voice and data traffic are expected
to be prioritized differently on the network, to accommodate the extra sensitivity of voice
traffic to latency and because voice is a continuous streaming that should not be
interrupted.
In addition, factors such as jitter, packet loss, security, and incompatibility can affect the
quality of communication services, and need to be handled by the IP infrastructure.
(1) The IP network SHALL be compliant with the following criteria to fulfil ATM Voice
communication needs:
• Performance (e.g., bandwidth, response times for call set up and tear down,
maximum latency, packet throughput, maximum packet size)
• QoS/CoS mechanisms (e.g., prioritization of traffic classes to minimize jitter and
packet loss)
• Reliability/Availability
• Security
• Standardized Interfaces
Detailed explanations of these criteria are provided in this document and solutions are
given in the ED-138 Network Requirements and Performances for VoIP ATM Systems
Part 2: Network Design Guideline [4].
(5) The transport of Multicast traffic according to PIM SSM (RFC 3569) SHALL be supported
by the IP Network for an efficient distribution of audio streams.
A detailed explanation of Multicast criteria is provided in ED-138 Network Requirements
and Performances for VoIP ATM Systems Part 2: Network Design Guideline chapter V.
© EUROCAE, 2009
10
3
All latency values are one-way delays
4
Value is given for the network path between two elements involved in the call-setup
© EUROCAE, 2009
11
2.3.3. Availability
Availability is the probability that the network is operational and functional as required at
any given moment in time.
The expected or measured fraction of time the defined service, device, application, area is
operational. Annual uptime is the amount of time: in days, hours, minutes the item is
operational and functional.
(18) IP Network SHALL achieve the required availability of the overall system.
Note: Availability depends on the overall system architecture and usage of redundancy
and backup-features and last resorts/emergency systems.
A detailed explanation of these criteria is provided in ED-138 Network Requirements and
Performances for VoIP ATM Systems Part 2: Network Design Guideline chapter III.
2.3.4. Class of Service CoS and Quality of Service QoS
(19) Classification: IP Network SHALL provide methods of categorizing traffic into different
classes, also called Class of Service (CoS), and applying QoS parameters to those
classes. IP Network SHALL be able to reapply CoS and QoS parameters to the packets
sourced by different systems in the network, in order to ensure the proper functionality.
5
Multi-station carrier offset mode, with voting override
© EUROCAE, 2009
12
(20) Prioritisation: IP Network SHALL provide methods of prioritising traffic based on Class of
Service in the LAN area, according to the IEEE 802.1p and IEEE 802.1q standards, based
on a common schema among different participants in the network (ANSPs). IP Network
SHALL provide methods of prioritising traffic based on Class of Service in the Edge and
WAN area.
(21) IP Network SHALL support Differentiated Service (Diffserv) (RFC2474/2475) QoS
architecture and SHOULD support the mapping of different service or traffic classes to
Differentiated Service Code Point DSCP.
(22) The DSCP mapping SHALL be configurable when using Diffserv.
(23) When there is an unrecognized DSCP, assigned traffic SHALL be treated according to a
default Per-hop-behaviour PHB that is ‘Best effort’.
(24) When using Diffserv the DSCP SHALL be set by the six most significant bits of ‘Traffic
Class’ byte in IPv6 header. ‘Traffic Class’ SHALL be set by the VoIP ATM application.
(25) When using Diffserv the DSCP SHALL be used and encoded for cross border
communication as follows (see Table 3):
• Eight Class Selector Codepoints compatible with IPv4 and IP Precedence (CS0-7)
• An Expedited Forwarding (EF) Class
• IP packets are forwarded in N independent AF classes, each having M different
levels of drop precedence. Therefore, the Codepoints with the classes and drop
precedence form a matrix AFij, where 1 ≤ i ≤ N and 1 ≤ j ≤ M. Four classes (N=4)
are defined with three Drop Precedences (M=3).
• Packets in a higher AF Classes SHOULD have a higher transmit priority
• Packets with a higher Drop Precedence SHOULD be more likely to be dropped
© EUROCAE, 2009
13
(26) For cross border communication the IP Network SHOULD set the DSCP field of outgoing
packets to the values shown in Table 4.
Application DSCP value Codepoint
(27) When using Diffserv the DSCP mapping in the IP Network SHOULD be used for national
purposes as shown in Table 4.
Definitions and Standards of Diffserv and DSCP, IPv6 Traffic Class and IP Precedence
can be found in ED-138 Network Requirements and Performances for VoIP ATM Systems
Part 2: Network Design Guideline chapter IV.
© EUROCAE, 2009
14
(29) Fault Management SHALL be available for the IP Network to undertake all necessary
actions in order to report the failure, complete diagnosis, and fix network problems.
(30) Preventive fault management actions SHALL be prescribed and maintained to ensure the
availability of primary and backup paths and components for the IP Network.
The VoIP infrastructure changes dynamically, as various devices and their links are
brought on and off line, and when their naming and addressing plans are adjusted.
Additionally, many of these devices host various types of software, each with its own
release, version, and other identifying information, such as:
• Operating system
• Traffic prioritization
The configuration management subsystem displays and highlights changes of network
elements in real time. It also makes this information available for retrieval. All changes to
system hardware and software configurations are effected through the configuration
management subsystem. When a problem occurs, this archive can be searched for clues
that may help solve the problem.
(31) The IP Network SHALL have a capability to monitor and control network configurations so
that the effects on network operation of various types and versions of hardware and
software elements can be tracked and managed.
© EUROCAE, 2009
15
• Capacity planning – The use of modeling techniques to predict the impact of new
applications and increased loading on network performance
• Load generation – Stress testing of networks with scripted usage loads to identify
service saturation levels
(32) The IP Network SHALL have a capability to measure performance variables at the
network level to ascertain compliance with Service Level Agreements.
(33) The IP Network SHOULD have a capability to perform forensic analyses as explained
above.
(34) The IP Network MAY have a capability to perform Capacity planning and Bandwidth on
demand as explained above.
© EUROCAE, 2009
16
• Fast delivery
• Service Availability
• Redundancy/Backup services
• Packet integrity – Verify the integrity of the cryptographic data checksum that
confirms the integrity of unaltered packets
Aside from securing the enterprise data, security management must also ensure that the
infrastructure (e.g., network, servers) cannot be sabotaged intentionally or unintentionally.
A security management subsystem, for example, can monitor users logging on to a
network resource and can refuse access to those who enter inappropriate access codes.
© EUROCAE, 2009
17
(37) The IP Network SHALL have a capability to control access to network elements.
(38) The IP Network SHALL have a capability to perform proactive measures to protect
against security incidents.
(39) The IP Network SHALL have a capability to perform security monitoring, logging and
reporting.
(40) The IP Network SHALL have a capability to take immediate action in the event of
detected security incidents to protect network integrity and performance.
© EUROCAE, 2009
18
CHAPTER II REFERENCES
[1] NIST Security Considerations for Voice Over IP Systems; D. Richard Kuhn, Thomas J.
Walsh, Steffen Fries
http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf
[2] IETF RFC 791: Internet Protocol (IP) version 4;
http://www.ietf.org/rfc/rfc791.txt
[3] IETF RFC 2460: Internet Protocol (IP) version 6 Specification;
http://www.ietf.org/rfc/rfc2460.txt
[4] ED-138 Network Requirements and Performances for VoIP ATM Systems Part 2:
Network Design Guideline;
http://www.eurocae.org
[5] IETF RFC 2545: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain
Routing
IETF RFC 2858: Multiprotocol Extensions for BGP-4
http://www.ietf.org/rfc/rfc2545.txt; http://www.ietf.org/rfc/rfc2858.txt
[6] IETF RFC 2740: OSPF for IPv6
http://www.ietf.org/rfc/rfc2740.txt
© EUROCAE, 2009
19
CHAPTER III
SECURITY POLICY
3.1. BACKGROUND
Current ATM voice switching services for G-G networking are supported with private
dedicated links. Such networks are considered secure, since they are not vulnerable to
network-layer attacks by viruses and other malicious cyber activities.
However, migration of ATM G-G voice communications to a VoIP medium is underway,
which will enable flexible deployment of high-availability services, and cost-effective
sharing of common media with data communications. On the other hand, the accessibility
provided by this technology leaves it open to malicious intrusion. To address such
vulnerabilities, an architecture founded upon robust security protections should be
developed, based upon stakeholder policies and needs, and industry standards and best
practices.
The scope of this chapter is to define the security policy for VoIP implementations to
support ATM communications. This includes the required security architecture and
component mechanisms. This policy only covers information security, and does not
establish requirements for physical security.
Detailed technical solutions are not given in this chapter – they can be found in ED-138
Network Requirements and Performances for VoIP ATM Systems Part 2.
The complexity of ATM security needs in a VoIP environment is best addressed with a
comprehensive policy. This is based upon well-known security principles that encompass
the network, application, and architectural domains. Relevant requirements and
recommendations are described below.
© EUROCAE, 2009
20
This is crucial for VoIP messaging for ATM, where corrupted or modified messages could
incur safety risks for aviation.
3.2.3. Availability
Availability ensures that authorized users have timely and uninterrupted access to the
information in the system within specified parameters. As such, availability establishes a
quantifiable guarantee that the required information, systems and services are
operationally functional when needed. This is important for ATM operations, where
communication interruptions could result in safety issues and flight operations delays.
The key to securing VoIP is to use security policies and mechanisms analogous to those
implemented in data-only networks (e.g., firewalls, encryption, gateways) to emulate the
security level currently available to Private Switched Telephone Network (PSTN) network
users.
Confidentiality
Their impact on confidentiality may be exemplified regarding a communications node,
where eavesdropping on conversations is an obvious concern, but the confidentiality of
other information must also be protected to defend against toll fraud, voice and data
interception, and denial of service attacks. Network IP addresses, operating system type,
telephone number-to-IP address mappings, and communication protocols are all
examples of information that, while not critical as individual pieces of data, can make an
attacker’s job easier.
With conventional telephones, eavesdropping usually requires either physical access to
tap a line, or penetration of a switch. Attempting physical access increases the intruder’s
risk of being discovered, and conventional PBXs have fewer points of access than VoIP
systems. With VoIP, opportunities for eavesdroppers increase dramatically, because of
the many nodes in a packet network.
© EUROCAE, 2009
21
Integrity
Communication nodes must protect the integrity of critical system data (e.g., configuration
messages). Because of the richness of feature sets available on nodes, an attacker who
can compromise the system configuration can accomplish nearly any other goal.
Damaging or deleting information about the IP network used by a VoIP node could result
in a denial of service.
The security system itself provides the capabilities for system abuse and misuse. That is,
compromise of the security system not only allows system abuse but also allows the
elimination of all traceability and the insertion of trapdoors for intruders to use on their next
visit. For this reason, the security system must be carefully protected.
Integrity threats include any in which network functions or data may be corrupted, either
accidentally or because of malicious actions. Misuse may involve legitimate users (i.e.,
insiders performing unauthorized operations) or intruders.
A legitimate user may perform an incorrect or unauthorized operational function (e.g., by
mistake or out of malice) and may cause deleterious modification, destruction, deletion, or
disclosure of sensitive network data. This threat may be caused by several factors,
including the possibility that the level of access permission granted to the user is higher
than what the user needs to remain functional.
Availability
Availability is the most obvious risk for a switch. Attacks exploiting vulnerabilities in the
switch software or protocols may lead to deterioration or even denial of service or
functionality of the switch. A voice over IP system may have additional vulnerabilities due
its exposure to the Internet. As such, attackers may be able to bring down VoIP systems
by exploiting weaknesses in Internet protocols and services.
It is known that any network may be vulnerable to denial of service attacks, simply by
overloading the capacity of the system and interrupting traffic flow. With VoIP, the problem
may be especially severe, because of its sensitivity to packet loss or delay.
© EUROCAE, 2009
22
Assumption: Air Navigation Service Provider (ANSP) local domains (either owned and
defined by a single ANSP, or shared within an ANSP group) or other related organization
domains are operated and managed autonomously. These domains (that each may
contain networks and hosts) do not necessarily have mutual trusting relationships with
each other.
Based on this assumption a simplified model was created to define the different security
zones, as follows:
Security
Zone 1
IP Core Provider
Responsibility of
IP Core
Possible Interconnections
ANSPs/Organizations
Responsibility of
© EUROCAE, 2009
23
The Demarcation Line is the border between the different responsibilities (i.e.,
Organization and Service Provider domains).
The Organization Edge could also be a combination of devices (e.g., modems, switches,
routers, firewalls and cables) with connection to the IP Core Edge.
Organization and IP Core Edge might be located in the same shelf or computer room –
however different responsibilities are assigned as shown in the figure.
Interconnections between different organization networks are possible without using a
shared IP media (e.g., using dedicated leased lines or TDM links).
Such arrangements (as shown in Figure 5 as Possible Interconnections between
Organization Domains) are only required to comply with the ANSP/Organization Edge
requirements in Section 3.5.2.
© EUROCAE, 2009
24
This section describes the security requirements for the Security Zones shown in Figure 5.
© EUROCAE, 2009
25
Common requirements
• Network Management capabilities SHALL use encrypted and authenticated
technologies (e.g., SSH, SNMPv3, IPSec, TLS) and/or Out-Of-Band technologies.
• There SHALL be coordination procedures defined between IP Core Provider and
ANSPs/organizations to mitigate the harmful effects of security incidents (e.g.,
activation of upstream-countermeasures by IP Core Provider in case of an attack-
detection by the ANSPs/organizations).
• Operation of Security elements SHALL stay up-to-date with the evolution of
protection mechanisms.
© EUROCAE, 2009
26
© EUROCAE, 2009
27
The most significant security concerns in a VoIP environment are mentioned in chapter
3.3.1.
Countermeasures to these threats include:
• Secure Real-time Transport (SRTP), which provides confidentiality, message
authentication, and replay protection for RTP and Real-time Transport Control
Protocol (RTCP) traffic [5].
• Authentication: Mechanisms should be activated to ensure the integrity of the
voice packets to ensure that what is presented at the destination node is identical
to what was issued from the source node.
• Access control: This is supported by a tool suite to enable blocking of unauthorized
users from invoking voice services
NIST SP 800-58 [1] discusses the impact of these and related issues on VoIP over private
and public networks, for which it recommends the following:
• Although the thrust of this document is to establish security policy for VoIP ATM
communications, practitioners SHOULD analyse the tradeoff of implementing
security mechanisms with their impact on ATM operational performance.
© EUROCAE, 2009
28
[1] Special Publication 800-58, NIST Security Considerations for Voice Over IP Systems;
D. Richard Kuhn, Thomas J. Walsh, Steffen Fries
http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf
[2] IETF RFC 791: Internet Protocol (IP) version 4;
http://www.ietf.org/rfc/rfc791.txt
[3] IETF RFC 2460: Internet Protocol (IP) version 6 Specification;
http://www.ietf.org/rfc/rfc2460.txt
[4] IETF RFC 2827: Network Ingress Filtering: Defeating Denial of Service Attacks which
employ IP Source Address Spoofing; RFC 3704: Ingress Filtering for Multihomed
Networks
http://www.ietf.org/rfc/rfc2827.txt, http://www.ietf.org/rfc/rfc3704.txt
[5] IETF RFC 3711: The Secure Real-Time Transport Protocol (SRTP);
http://www.ietf.org/rfc/rfc3711.txt
[6] IETF RFC 4301: Security Architecture for the Internet Protocol;
http://www.ietf.org/rfc/rfc4301.txt
[7] IETF RFC 4346: The TLS Protocol Version 1.1; IETF RFC 4366: TLS Extensions;
IETF RFC 4680: TLS Handshake Message for Supplemental Data; IETF RFC 4681:
TLS User Mapping Extension
http://www.ietf.org/rfc/rfc4346.txt, http://www.ietf.org/rfc/rfc4366.txt,
http://www.ietf.org/rfc/rfc4680.txt, http://www.ietf.org/rfc/rfc4681.txt
[8] IETF RFC 4443: Internet Control Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification; IETF RFC 4884: Extended ICMP to Support Multi-part
Messages
http://www.ietf.org/rfc/rfc4443.txt, http://www.ietf.org/rfc4884.txt
[9] IETF RFC 4302: IP Authentication Header (AH); IETF RFC 4835: Cryptographic
Algorithm Implementation Requirements for Encapsulating Security Payload (ESP)
and Authentication Header (AH)
http://www.ietf.org/rfc/rfc4302.txt, http://www.ietf.org/rfc/rfc4835.txt
[10] IETF RFC 4303: IP Encapsulating Security Payload (ESP); IETF RFC 4835:
Cryptographic Algorithm Implementation Requirements for Encapsulating Security
Payload (ESP) and Authentication Header (AH)
http://www.ietf.org/rfc/rfc4303.txt, http://www.ietf.org/rfc/rfc4835.txt
[11] IETF RFC 4306: Internet Key Exchange (IKEv2) Protocol
http://www.ietf.org/rfc/rfc4306.txt
[12] IETF RFC 3550: RTP: A Transport Protocol for Real-Time Applications;
http://www.ietf.org/rfc/rfc3550.txt
[13] IETF RFC 3261: SIP: Session Initiation Protocol; IETF RFC 3265: Session
Initiation Protocol (SIP)-Specific Event Notification; IETF RFC 3853: S/MIME
Advanced Encryption Standard (AES) Requirement for the Session Initiation Protocol
(SIP); IETF RFC 4320: Actions Addressing Identified Issues with the Session Initiation
Protocol's (SIP) Non-INVITE Transaction
© EUROCAE, 2009
29
http://www.ietf.org/rfc/rfc3261.txt, http://www.ietf.org/rfc/rfc3265.txt,
http://www.ietf.org/rfc/rfc3853.txt, http://www.ietf.org/rfc/rfc4320.txt
[14] IETF RFC 3265: Session Initiation Protocol (SIP) – Specific Event Notification;
http://www.ietf.org/rfc/rfc3265.txt
[15] IETF RFC 3435: Media Gateway Control Protocol version 1.0 (section 5); IETF
RFC 3661: Media Gateway Control Protocol (MGCP) Return Code Usage
http://www.ietf.org/rfc/rfc3435.txt, http://www.ietf.org/rfc/rfc3661.txt
[16] IETF RFC 2764: A Framework for IP Based Virtual Private Networks;
http://www.ietf.org/rfc/rfc2764.txt
[17] IETF RFC 3315: DHCP for IPv6; IETF RFC 4361: Node-Specific Client Identifiers
for DHCPv4
http://www.ietf.org/rfc/rfc3315.txt, http://www.ietf.org/rfc/rfc4361.txt
[18] IETF RFC 4251: The SSH Protocol Architecture;
http://www.ietf.org/rfc/rfc4251.txt
[19] IETF STD 62: An Architecture for Describing SNMP Management Frameworks;
http://www.ietf.org
[20] IETF RFC 3031 “Multiprotocol Label Switching Architecture”, RFC 3032 “MPLS
Label Stack Encoding”, RFC 3443 “TTL Processing in MPLS Networks”, RFC 4182
“Removing a Restriction on the Use of MPLS Explicit NULL”
http://www.ietf.org/rfc/rfc3031.txt, http://www.ietf.org/rfc/rfc3032.txt,
http://www.ietf.org/rfc/rfc3443.txt, http://www.ietf.org/rfc/rfc4182.txt
[21] IETF RFC 3414, User-based Security Model (USM) for version 3 of the Simple
Network Management Protocol (SNMPv3)
http://www.ietf.org/rfc/rfc3414.txt
© EUROCAE, 2009
30
CHAPTER IV
IP ADDRESSING
4.1. BACKGROUND
Voice over IP (VoIP) defines a way to carry voice calls over an IP network including the
digitisation and packetisation of the voice streams. The use of IP telephony and the VoIP
standards will support the creation of an ATM communication system where higher-level
features (e.g., advanced call routing, voice mail, call/contact centre) can be deployed to
support air traffic services.
This chapter proposes a standards-based common addressing structure to accommodate
the heterogeneity of end systems in the national and international ATM domains.
The proposed addressing structure is an extract from the results of the iPAX Task Force6.
6
EUROCONTROL EATM Internet Protocol for Aeronautical Exchange Task Force
© EUROCAE, 2009
31
32 bits
0 Byte 2 Byte 3 Byte 4
Class A Byte 1 Host portion
Network portion
1 0
Class B Networking portion Host portion
1 1 0
Class C Networking portion Host portion
1 1 1 0
Class D Multicast address
Class A frames are identified by a 0 value high order bit. They provide 7 bits for the
network portion of the address, and 24 bits for the host. Class A addresses were allocated
at the initial deployment of the Internet, and are primarily held by North American
government agencies, and legacy companies that were involved in early Internet research
and development.
Class B frames are identified with the two high order bits set to 10. These addresses are
typically allocated to Internet Service Providers (ISP) and large organizations.
© EUROCAE, 2009
32
Class C frames are identified with the three high order bits set to 110. Each of these
addresses can support up to 256 hosts. These addresses are typically allocated to LAN
and WAN nodes.
Note: Class A, B, and C addresses are assigned by local, national, or regional Internet
registries (the latter being RIPE NCC [Réseaux IP Européens Network Coordination
Centre] in Europe) to ISPs, from which they assign addresses to their customers.
Class D addresses are identified by the four high order bits set to 1110. These addresses
are used for multi-casting applications, where voice and data packets can be sent to
groups of multiple nodes concurrently. These groups are pre-defined in the network
topology by aggregation of node addresses. Multicasting enables efficient transmission of
high-bandwidth payloads by minimizing multiple streams of voice and data to individual
nodes.
Class E addresses are identified by the four high order bits set to 1111. This address
space is reserved for experimental research.
© EUROCAE, 2009
33
IPv6 [1], [5], Erreur ! Source du renvoi introuvable., [9], features a much larger
addressing space than IPv4, as shown in Figure 7. This enables an ISP or enterprise
organization to aggregate the prefixes of node or user groups (e.g., customers, or internal
users) under a single Network Prefix for advertisement on the IPv6 Internet.
1111111011 Subnet ID
or Set value to Site Link Interface ID
FEC0::10 “0” add (16- (64 – bits)
(10 - bits) (38 – bits) bits)
Site – Local Unicast Address Format
1111111010
or Set value to “0” Interface ID
FE80::10 (54 – bits) (64 – bits)
(10 - bits)
Link – Local Unicast Address format
© EUROCAE, 2009
34
Anycast [9] – a global address that is assigned to a set of interfaces belonging to different
nodes. Anycast addresses have the following restrictions:
• An Anycast address must not be used as a source address of an IPv6 packet
• An Anycast address must not be assigned to an IPv6 host. It may be assigned to an
IPv6 router.
128 – Bits
Figure 9: Anycast Addressing Format
Within each subnet, the highest 128 interface identifier values are reserved for
assignment as subnet anycast addresses. The construction of these addresses depends
upon the IPv6 address type used in the subnet, as indicated by the format prefix of the
address. In particular, IPv6 address types requiring 64 bit interface identifiers in Extended
Unique Identifier-64 (EUI-64) format [11] are constructed as depicted in Figure 10.
© EUROCAE, 2009
35
infrastructure, and is known as an “IPv4-compatible IPv6 address”. The 16 “X” bits take a
value of “FFFF” when used to represent IPv4 nodes in an IPv6 address format, and is
known as an “IPv4-mapped IPv6 address” [9].
Multicast [9] is assigned to a set of interfaces that may belong to different nodes. A
packet sent to a multicast address is delivered to all interfaces identified by that address.
Its format is shown in Figure 12.
© EUROCAE, 2009
36
Table 7 illustrates IPv4 concepts and their IPv6 equivalent Erreur ! Source du renvoi
introuvable..
© EUROCAE, 2009
37
There are many vendors offering IPv6 product lines that are often bundled with router and
operating system offerings on the market
© EUROCAE, 2009
38
Support of legacy systems while transitioning to an IPv6 infrastructure is enabled with the
following strategies, as described:
• Dual stack, which requires that all end systems and networking devices host
concurrent IPv4 and IPv6 services in order to maintain connectivity until full
operational capability of IPv6 is achieved. Implementation of this strategy may
incur additional cost and management resources to support the deployment of
dual stacks at the various end systems. At this moment VoIP gateways between
IPv4 and IPv6 remain unavailable.
• Tunnelling, by encapsulating IPv4 traffic from legacy end systems within IPv6
packets to traverse the upgraded backbone
© EUROCAE, 2009
39
An IPv6 addressing scheme was developed within the context of the iPAX Task Force
(TF) [10], as illustrated in Figure 13.
The addressing scheme follows on from the RIPE allocation to provide /48 assignments.
Indeed, when considering the existing IPv4 addressing schemes, most ANSPs already
work with a private “Class A” address (e.g., 10.x.y.z, where x and y are octets used to
assign sites and subnets). With a /48 allocation, ANSPs have two octets to number their
sites and subnets and can still make use of IPv6 address auto-configuration.
RIPE Responsibilty
(32 bits)
3 13 13 3 3 13 16 64
© EUROCAE, 2009
40
inet6num: 2001:4b50::/32
org: ORG-EitE1-RIPE
netname: BE-EUROCONTROL-20050131
descr: EUROCONTROL, the European Organisation for the Safety of Air Navigation
country: BE
admin-c: EJC2-RIPE
tech-c: EJC2-RIPE
status: ALLOCATED-BY-RIR
notify: eivan.cerasi@eurocontrol.int
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: EURO-HQ-MNT
mnt-routes: EURO-HQ-MNT
changed: hostmaster@ripe.net 20050131
source: RIPE
From this allocation, the EUROCONTROL Agency has begun the assignment of IPv6
addresses.
© EUROCAE, 2009
41
The IPv6 addressing scheme is regularly presented to the EUROCONTROL EATM Communication Team.
© EUROCAE, 2009
42
© EUROCAE, 2009
43
© EUROCAE, 2009
44
CHAPTER IV REFERENCES
[1] IETF RFC-791, September 1991; IETF RFC-2460, December 1998: Internet Protocol
version 4 and version 6 Specifications
http://www.ietf.org/rfc/rfc791.txt; http://www.ietf.org/rfc/rfc2460.txt
[2] IETF RFC-1518, September 1993; An Architecture for IP Address Allocation with
CIDR
http://www.ietf.org/rfc/rfc1518.txt
[3] IETF RFC-2474, December 1998; Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers
http://www.ietf.org/rfc/rfc2474.txt
[4] IETF RFC-1752, January 1995: The Recommendation for IP Next Generation Protocol
http://www.ietf.org/rfc/rfc1752.txt
[5] IETF RFC-2460, December 1998: Internet Protocol, Version 6 (IPv6) Specification
http://www.ietf.org/rfc/rfc2460.txt
[6] IETF RFC-1887, December 1995 (Information): An Architecture for IPv6 Unicast
Address Allocation
http://www.ietf.org/rfc/rfc1887.txt
[7] IETF RFC-1918, February 1996: Address Allocation for Private Internets
http://www.ietf.org/rfc/rfc1918.txt
[8] IETF RFC-3232, January 2002, (Information): Assigned Numbers: RFC-1700 is
replaced by On-line Database
http://www.ietf.org/rfc/rfc3232.txt
[9] IETF-RFC-4291, February 2006: IPv6 Addressing Architecture
http://www.ietf.org/rfc/rfc4291.txt
[10] Internet Protocol for Aeronautical Exchange Task Force (iPAX-TF); Eivan Cerasi
http://www.eurocontrol.int/communications/public/standard_page/com_network.html
[11] IETF RFC-2526, March 1999: Reserved IPv6 Subnet Anycast Addresses
http://www.ietf.org/rfc/rfc2526.txt
[12] IETF RFC-4213, October 2005: Basic Transition Mechanisms for IPv6 Hosts and
Routers
http://www.ietf.org/rfc/rfc4213.txt
[13] IETF RFC-2766, February 2000: Network Address Translation – Protocol
Translation (NAT-PT); IETF RFC-3596, October 2003: DNS Extensions to Support IP
Version 6
http://www.ietf.org/rfc/rfc2766.txt; http://www.ietf.org/rfc/rfc3596.txt
© EUROCAE, 2009
45
© EUROCAE, 2009