RFC 1686 (rfc1686) - Page 1 of 14
IPng Requirements: A Cable Television Industry Viewpoint
Alternative Format: Original Text Document
Network Working Group M. Vecchi
Request for Comments: 1686 Time Warner Cable
Category: Informational August 1994
IPng Requirements: A Cable Television Industry Viewpoint
Status of this Memo
This memo provides information for the Internet community. This memo
does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.
Abstract
This document was submitted to the IETF IPng area in response to RFC
1550. Publication of this document does not imply acceptance by the
IPng area of any ideas expressed within. The statements in this
paper are intended as input to the technical discussions within IETF,
and do not represent any endorsement or commitment on the part of the
cable television industry or any of its companies. Comments should
be submitted to the mailing list.
Table of Contents
1. Executive Summary .......................................... 2
2. Cable Television Industry Overview ......................... 2
3. Engineering Considerations ................................. 5
3.1 Scaling .................................................. 5
3.2 Timescale ................................................ 5
3.3 Transition and deployment ................................ 6
3.4 Security ................................................. 7
3.5 Configuration, administration and operation .............. 7
3.6 Mobile hosts ............................................. 8
3.7 Flows and resource reservation ........................... 8
3.8 Policy based routing ..................................... 10
3.9 Topological flexibility .................................. 10
3.10 Applicability ............................................ 10
3.11 Datagram service ......................................... 11
3.12 Accounting ............................................... 11
3.13 Support of communication media ........................... 12
3.14 Robustness and fault tolerance ........................... 12
3.15 Technology pull .......................................... 12
3.16 Action items ............................................. 13
4. Security Considerations .................................... 13
5. Conclusions ................................................ 13
6. Author's Address ........................................... 14
Vecchi