The Internet Protocol Journal, Volume 12, No.2

From the Editor

After many years of using DSL as my only Internet access option from home, I recently upgraded to a broadband solution provided by a cable modem. As a result, I faced the task of renumbering (and partially rewiring) my home network. As you might have guessed, the addressing scheme provided by my new ISP offers Network Address Translation (NAT), as well as a small number (5) of fixed IPv4 addresses, the latter at an extra cost as you might expect. I probably should have tried to enable IPv6 just as an experiment, but this task will have to wait for another day. In the meantime, I was pleased to find a relatively user-friendly web interface to the cable modem that allows me to configure numerous parameters, including the range of the Dynamic Host Configuration Protocol (DHCP) pool so that certain devices (printers and wireless access points in particular) can have fixed IP addresses for ease of use and configuration. The entire exercise, which took a couple of hours on my very small network, reminded me of what network managers face every day, particularly as they consider the inevitable migration to IPv6. Let me take this opportunity to invite you to share your network management and operations experience, plans for IPv6 migration, and so on. You can send us Letters to the Editor or article proposals. The address, as always, is ipj@cisco.com

The Domain Name System (DNS) has been the target of attacks over its many years of existence. In recent years, new attacks have emerged that exploit some of the attributes of the DNS protocol and its implementation. One of the corrective measures is to improve the security of DNS caches. There are several ways to improve cache security, most of which involve changing the protocol. Another way, without changing the protocol, is to reduce the attack surface of your cache by shrinking the number of users of any given cache. Our first article, by Bill Manning, explores this view in more detail.

This journal has covered numerous current and emerging wireless technologies such as Bluetooth, Wi-Fi, WiMAX, and mobile cellular systems. In this issue, Esa Piri and Kostas Pentikousis describe Media-Independent Handovers (MIH), which allow mobile devices to use different wireless and wired network infrastructures transparently. The protocols associated with operation across such diverse access networks are being standardized by the IEEE 802.21 working group.

—Ole J. Jacobsen, Editor and Publisher
ole@cisco.com