Address Allocation for Private Life
ãã©ã¤ãã¼ããªçæ´»ã«ãããã¢ãã¬ã¹å²ãå½ã¦
Status of this Memo ãã®ã¡ã¢ã®ç¶æ
ãã®ææ¸ã¯ãã¤ã³ã¿ã¼ãããçæ´»è
ã®ããã®ãç¾æç¹ã§æãå¹çã®é«ãçæ´»ææ³ã«ã¤ãã¦è¿°ã¹ããã®ã§ãããæ¹åã®ããã®è°è«ãææ¡ãåãä»ãã¦ãããåé
å¸ã«ã¯å¶éããããå¼ç¨ã«ã¯ä¸è¬çãªå¼ç¨ã®è¦ä»¶ãæºè¶³ããå¿
è¦ãããã
1. Introduction 忏ã
ãã®ææ¸ã¯ããã©ã¤ãã¼ããªçæ´»ã«ãããã¢ãã¬ã¹å²ãå½ã¦ã«ã¤ãã¦è¿°ã¹ã¦ãããã¢ãã¬ã¹ãé©åã«å²ãå½ã¦ããã¨ã«ããã人éé¢ä¿ãããã¯ã¼ã¯ã«ãããå¿
è¦ãªå
¨ã¦ã®ãã¼ãã¨ã®éä¿¡ãæ£å¸¸ã«è¡ãããããã«ãªãã人çã䏿ãè¡ãã
2. Motivation åæ©
ä¸çã¯äºæ³ãè¶
ãã¦æé·ãã¦ãã¦ããããã®ç¶ç¶çãªææ°é¢æ°çæé·ã¯ãæ°ããªèª²é¡ãæä¾ãç¶ãã¦ããããã®èª²é¡ã®ä¸ã¤ã«ãã¢ãã¬ã¹ã®æ¯æ¸ãæããããã人å£ã®å¢å ãããã¦ä¸å¸¯ã®å¢å ã«å¯¾ãã¦ãâ¯â¯å¸ÃÃçºâ³â³çªå°â¡â¡å·ãã¨ããã¢ãã¬ã¹ãå²ãå½ã¦ããã¨ãã¦ãããã¯ãå²ãå½ã¦ããã¨ãã§ããªãã®ã ã
ã°ãã¼ãã«ã«ã¦ãã¼ã¯ãªã¢ãã¬ã¹ãå¾ããã¨ãã§ããã®ã¯ãç¸å½ãªéæã¡ã§ããããå·¨é¡ã®è² åµãæ±ãããã¨ã®ã§ããåè
ã§ããããä¸ççãªãããã¯ã¼ã¯ã®ä¸»ã ã£ãã¨ããããã®ãããæ°ãé常ã«å¤§ããã¨ããã§ã¢ãã¬ã¹ã確ä¿ããè
ã§ããããã®ããããã§ãããã¨ã大åã§ããããã®åé¡ã解決ããããã®ææ®µãå¿
è¦ãªã®ã§ããã
ããã¨åæ§ã«ã人éã¯äºæ³ãè¶
ããæé·ãããéç¨ã«ããã¦ãæ¥å¸¸çãªéä¿¡ã®ç¸æå
ãå¤ãããã¨ããããéä¿¡ã®ç¸æå
ã¨ã®ç©ççãªè·é¢ãé·ããã®ã§ãã£ãã¨ãã¦ããååã«æçãã 人éé¢ä¿ãããã¯ã¼ã¯ over TCP/IP ã«ããã¦ã¯ããã®éä¿¡é度ä½ä¸ãä¼éæå¤±ã¯ç¡è¦ã§ããã»ã©å°ãããã¨ããããç¾ä»£çãªäººéé¢ä¿ãããã¯ã¼ã¯ã¯ããã¤ã¦RSAã解決ãããéµé
éãåé¡ã«ç´é¢ãããç¾æç¹ã®æè¡ã§ã¯ãã®éµé
éåé¡ã解決ã§ãã¦ããããäºå㫠人éé¢ä¿ãããã¯ã¼ã¯ over Air ã«ãã£ã¦éµäº¤æããã¦ããªããã°ã over TCP/IP ã®ä¸çã«æã£ã¦è¡ã£ãã¨ãã«ååãªæ§è½ãçºæ®ããããå¤ãã®ä¼éæå¤±ãçºçããã
ãã®éµé
éåé¡ã解決ããããã«ãã©ã¤ãã¼ãã¢ãã¬ã¹ãå²ãå½ã¦ç´ãï¼reallocate / relocateï¼ãã¨ã«ã¯ãååãªã³ã¹ãã¡ãªãããããã
3. Private Address ãã©ã¤ãã¼ãã®ã¢ãã¬ã¹
ãã®åº¦ãèè
ã¯ãã©ã¤ãã¼ãã®ã¢ãã¬ã¹ã®å²ãå½ã¦ã颿±å°æ¹ã«ã¦åãããããã«ããå¿
è¦ãªé¢ä¿åæã¨ 人éé¢ä¿ãããã¯ã¼ã¯ over Air ãæç«ããéµé
éåé¡ã解決ãããã¨ãã§ããè¦éãã§ãããéµäº¤æãååã«å®äºããå¾ã®ãå度ã®ãã©ã¤ãã¼ãã¢ãã¬ã¹ã®å²ãå½ã¦ã«ã¤ãã¦ã¯ãæ¤è¨ä¸ã§ããã
ãªããããã¾ã§å æãã¦ããè¿ç¿å°æ¹ã«ããããã©ã¤ãã¼ãã¢ãã¬ã¹ã¯è§£æ¾æ¸ã¿ã§ãããããä»ã®äººã«å¯¾ãã¦å²ãå½ã¦ããã¦ããå¯è½æ§ãããã
4. Advantages and Disadvantages of Using Private Address ãã©ã¤ãã¼ãã¢ãã¬ã¹ã®é·æã¨çæ
ä¸è¬çãªç¾ä»£äººã¯ãã©ã¤ãã¼ãã¢ãã¬ã¹ã®å²ãå½ã¦ããªããã°å¥åº·ã§æåçãªæä½é度ãéããã¨ãé£ããã¨èãããã¦ããã
5. Operational Considerations éç¨ä¸ã®èª²é¡
ãã©ã¤ãã¼ãã¢ãã¬ã¹ã®åå²ãå½ã¦ã«ã¯ã主ã¨ãã¦æ¬¡ã®ãããªè²»ç¨ããããã
- åå²ãå½ã¦å ã¢ãã¬ã¹ã®ç¢ºä¿ã«ãããè²»ç¨
- ã³ã³ãã³ãã®è»¢éã«ãããè²»ç¨
- ã³ã³ãã³ãã®è»¢éã®ããã«è¦ããæéçè²»ç¨
ãã®ããããã©ã¤ãã¼ãã¢ãã¬ã¹ã®åå²ãå½ã¦ã¯ãä¸äººã«ãå§ãã§ãããã®ã§ã¯ãªãã
6. Security Considerations ã»ãã¥ãªãã£é¢ã®èª²é¡
ãã©ã¤ãã¼ãã¢ãã¬ã¹ã¯ãå
¬éãããã¨ã«ããæ»æã«æãããå¯è½æ§ã䏿ãããããå
¬éã¯ããªãæ¹ãè¯ãã
7. Conclusion ã¾ã¨ã
大ããªè¦æ¨¡ã®äººéã§ãã£ã¦ããç¸å¯¾çã«å°ããªã¢ãã¬ã¹ç©ºéããå¿
è¦ã¨ããªããã¨ããããã
8. Acknowledgements è¬è¾
ä»åã®ãã©ã¤ãã¼ãã¢ãã¬ã¹åå²ãå½ã¦ã®æ©ä¼ãä¸ãããã¨ã¨ãªã£ãããã¼ãã¿ã¤ã ã§ã®å¤ãå
ã®çæ§ãèè
ãéå¶ãã¦ããæ ªå¼ä¼ç¤¾ã®åå¼å
ã®çæ§ãããã¦èè
ãè¿·ã£ã¦ããã¨ããã§å¾æ¼ãããã¦ãããä½åãã®å人éã«æè¬ããããã
9. References åèæç®
10. Author's Address èè ã®ä½æ
Appendix A. 欲ãããã®ãªã¹ã
欲ãããã®ãªã¹ãã¯éå
¬éã§ããã
å¼·ãã¦è¨ããªããæéãæ¬²ããã