RFC 3789 (rfc3789) - Page 1 of 10
Introduction to the Survey of IPv4 Addresses in Currently Deployed IETF Standards Track and Experimental Documents
Alternative Format: Original Text Document
Network Working Group P. Nesser, II
Request for Comments: 3789 Nesser & Nesser Consulting
Category: Informational A. Bergstrom, Ed.
Ostfold University College
June 2004
Introduction to the Survey of IPv4 Addresses in
Currently Deployed IETF Standards Track and Experimental Documents
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2004).
Abstract
This document is a general overview and introduction to the v6ops
IETF workgroup project of documenting all usage of IPv4 addresses in
IETF standards track and experimental RFCs. It is broken into seven
documents conforming to the current IETF areas. It also describes
the methodology used during documentation, which types of RFCs have
been documented, and provides a concatenated summary of results.
Table of Contents
1.0. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Short Historical Perspective . . . . . . . . . . . . . 2
1.2. An Observation on the Classification of Standards. . . 3
2.0. Methodology. . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Scope. . . . . . . . . . . . . . . . . . . . . . . . . 4
3.0. Summary of Results . . . . . . . . . . . . . . . . . . . . . 5
3.1. Application Area Specifications. . . . . . . . . . . . 5
3.2. Internet Area Specifications . . . . . . . . . . . . . 5
3.3. Operations and Management Area Specifications. . . . . 6
3.4. Routing Area Specifications. . . . . . . . . . . . . . 6
3.5. Security Area Specifications . . . . . . . . . . . . . 6
3.6. Sub-IP Area Specifications . . . . . . . . . . . . . . 6
3.7. Transport Area Specifications. . . . . . . . . . . . . 7
4.0. Discussion of "Long Term" Stability of Addresses on
Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . 7
5.0. Security Considerations. . . . . . . . . . . . . . . . . . . 8
6.0. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8
Nesser II & Bergstrom Informational