IETF 86 i2rs 14 March 20131 Functional Analysis of I2RS: What Are We Putting in the Mixture? Alia Atlas IETF 86, Orlando, FL.

Slides:



Advertisements
Similar presentations
Internet Peer-to-Peer Application Infrastructure Darren New Invisible Worlds, Inc.
Advertisements

Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Ephemeral State for I2RS IETF 91 - Honolulu Jeffrey Haas –
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
1 Copyright  1999, Cisco Systems, Inc. Module10.ppt10/7/1999 8:27 AM BGP — Border Gateway Protocol Routing Protocol used between AS’s Currently Version.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Cesar Martinez Internetworked Virtual Reality October 2002 Cesar Martinez Internetworked Virtual Reality October 2002 A Distributed Architecture for Supporting.
Chapter 25 Internet Routing Internetworking Technology How routing tables are built initially How routing software updates the tables as needed. Propagation.
Protocols and the TCP/IP Suite
RFC 2131 DHCP. Dynamic Host Configuration Protocol.
SIMPLEStone – A presence server performance benchmarking standard SIMPLEStone – A presence server performance benchmarking standard Presented by Vishal.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1 i2rs Usecases for BGP draft-keyupate-i2rs-bgp-usecases-01.txt Keyur Patel,
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Connector Types Interaction services broadly categorize connectors Many details are left unexplained. They fail to provide enough detail to be used in.
IP is a Network Layer Protocol Physical 1 Network DataLink 1 Transport Application Session Presentation Network Physical 1 DataLink 1 Physical 2 DataLink.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Model-based Programmable Networks
Protocols and the TCP/IP Suite
Interface to the Routing System
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
© 2014 Cisco - Cisco INTERNAL only – All Rights Reserved1 Requirements for Subscription to YANG Datastores draft-ietf-i2rs-pub-sub-requirements-01 NECONF.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
1 TCP/IP based TML for ForCES Protocol Hormuzd Khosravi Furquan Ansari Jon Maloy 61 st IETF Meeting, DC.
TOSCA Monitoring Reference Architecture Straw-man Roger Dev CA Technologies March 18, 2015 PRELIMINARY.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
NFD Permanent Face Junxiao Shi, Outline what is a permanent face necessity and benefit of having permanent faces guarantees provided by.
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
1 TCP/IP based TML (Transport Mapping Layer) for ForCES Protocol Hormuzd Khosravi Shuchi Chawla Furquan Ansari Jon Maloy 62 nd IETF Meeting, Minneapolis.
Interprocess Communications
Protocol for I2RS I2RS WG IETF #89 London, UK Dean Bogdanovic v0.1.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Interface to The Internet Routing System (IRS) draft-atlas-irs-problem-statement-00 draft-ward-irs-framework-00 Alia Atlas Thomas Nadeau David Ward IETF.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Moving towards an IRS WG Charter Ross Callon IETF 85, Atlanta.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
Software Connectors. What is a Software Connector? 2 What is Connector? – Architectural element that models Interactions among components Rules that govern.
Interface to The Internet Routing System (IRS) Framework documents Joel Halpern IETF 84 – Routing Area Open Meeting 1.
I2rs Requirements for NETCONF IETF 93. Requirement Documents
Constraints on Automated Key Management for Routing Protocols
Optimizing Routing 1. Using Multiple Routing Protocols
Protocols and the TCP/IP Suite
Last Class: Introduction
BGP-Based SPF IETF 97, Seoul
Distributed Systems.
draft-ietf-teas-yang-te-topo-01
I2RS (interface to Routing System) - RIB Data Model Project
Subscribing to YANG datastore push updates draft-ietf-netconf-yang-push-02 NETMOD WG IETF #95 Buenos Aires 4-April-2015 Alexander Clemm Alberto Gonzalez.
Interface to Routing System (I2RS)
Protocols and the TCP/IP Suite
Stream Issues Alex, Ambika, Eric, Tim
Protocols and the TCP/IP Suite
Connecting to the Network
Network Monitoring Protocol (NMP)
More on Discovery and Advertisement
Presentation transcript:

IETF 86 i2rs 14 March Functional Analysis of I2RS: What Are We Putting in the Mixture? Alia Atlas IETF 86, Orlando, FL

IETF 86 i2rs 14 March Refining I2RS: the Feedback Loop – Keep it reasonably scoped – Don’t rush to the technology (but proto-typing could be useful) Use-cases justify and clarify the need for functionality New Functionality triggers ideas for new Use-Cases

IETF 86 i2rs 14 March It’s Just Like $foo Except… Trying to capture what is new/different/critical Concepts pulled from: – draft-ward-i2rs-framework-00 – draft-atlas-i2rs-policy-framework-00 – draft-rfernando-irs-framework-requirement-00 – Other discussions

IETF 86 i2rs 14 March The Basics NEEDSPEED The NEED for SPEED – ability to react in sub-second time – Handled 100s, 1000s, etc. of operations Reasonable Programmatic Interface for Network Applications – Asynchronous – Not >5 different protocols to accomplish a thing – Pub/Sub model for Events

IETF 86 i2rs 14 March Multi-Headed Control (motivation) Multiple Clients (or Client + CLI) may want to write or modify the same state – CLI comes in to override client application state – Client application wants to override CLI (e.g. to enforce a policy) – Use-Case: Large-flow router and DoS mitigation both identify the same flow/destination to route. Depending on timing of processing of requests leads to unknown router state (which socket read first in a select, latency from an application)

IETF 86 i2rs 14 March Multi-Headed Control (implications) I2rs agent-based arbitration: enforce policy as to which client gets to modify contested state – Store if not best (like RIB policy) Client ownership: determines who can modify vs. delete/replace Notifications on subscription when state is changed by another client Optional garbage collection ephemeral state when client goes away

IETF 86 i2rs 14 March Different Operation Models Three characteristics to an operation: – Start-Time (immediate, temporal, triggered) – Persistence across reboots (permanent, ephemeral) – Duration/State-expiration (unbounded, temporal) CLI and Netconf generally give: Immediate, Permanent, Unbounded

IETF 86 i2rs 14 March Subscriptions and Notifications To be responsive to uncontrollable events, network applications learn via notifications – Has state been overwritten? – Has a next-hop changed? – Has a threshold been passed? – Has a route been installed? Ability to filter and specify thresholds per subscription request. Events and data-publication streams

IETF 86 i2rs 14 March Multiple Transport Sessions Different communications have different requirements – Reliability, secrecy, replay, etc. Clients and agents part of distributed systems – A network application may be distributed to different locations. – A network element may provide services via different system elements, want to distribute notifications and analytics from where they are learn or measured

IETF 86 i2rs 14 March Role-Based Client Identity An application can identify as a client even with: – Different IP address – Different TCP session – Etc. Supports distributed applications, standby for applications, etc.

IETF 86 i2rs 14 March Client Limited Authorization Ability to limit client ability to read and write based upon role. – Can learn subset of topology – Define write-scope in terms of values/ranges as well as data objects in model

IETF 86 i2rs 14 March Client-Specific Priority Client can specify a priority for each operation – Allows in-flight and ASAP operations – Operations across multiple channels can be put into desired order

IETF 86 i2rs 14 March Standard Information and Data Models RIB interactions: – Static routes, redistribution into other protocols, varying admin-distance – Variety of next-hop types – Unicast, multicast, LFIB, etc. BGP policy: – Actions, etc. IGP local policy PIM local policy

IETF 86 i2rs 14 March Topology Varieties of Data – Active IGP topology – Active components (e.g. customer or peer links) – Passive components (can be detected) – Passive components (undectable) – Minimal historical (last up, last peer, etc.) Network Abstractions – Service points-of- presence – VPN topologies – unsummarized topology

IETF 86 i2rs 14 March Motherhood and Apple-Pie: Pick Your Recipe Atomic Operations Preemptable Locking: take ownership at precedence for blocking changes or to write Rollback by client Capabilities Optional garbage collection

IETF 86 i2rs 14 March Flexible Components to Consider Data Modeling Language Protocol Transfer Syntax Transport YANG, ASN.1 XML, Google ProtoBufs, Binary XML, Google ProtoBufs, Binary NetConf, XMPP NetConf, XMPP TCP, UDP, TLS, SCTP TCP, UDP, TLS, SCTP

IETF 86 i2rs 14 March What to keep? Some functionality drives and determines the architecture… Some can be added later… Need to justify with use-cases and consensus TIME to DISCUSS