ID / LOC Split - Basic Approach

Slides:



Advertisements
Similar presentations
ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.
Advertisements

Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
Exploring the Packet Delivery Process Chapter
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
GBUTtem 机密 此报告仅供 NGN 实验室内部使用。未经 NGN 实验室的书面许可,其它任 何机构不得擅自传阅、引用或复制。 sando 09/10/2005 Site-Multihoming over IPv6.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
K. Salah1 Security Protocols in the Internet IPSec.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
HIP-Based NAT Traversal in P2P-Environments
Introduction to Networks
© 2003, Cisco Systems, Inc. All rights reserved.
UDP Encapsulation for IP Tunneling
Introduction to TCP/IP networking
5. End-to-end protocols (part 1)
ICMP ICMP – Internet Control Message Protocol
Lec 2: Protocols.
6TSCH Webex 06/21/2013.
Hubs Hubs are essentially physical-layer repeaters:
Client-Server Interaction
How Data Flows through the Internet
Hubs Hubs are essentially physical-layer repeaters:
Multi-addressed Multipath TCP
CS 457 – Lecture 10 Internetworking and IP
Internet Control Message Protocol (ICMP)
Setting Up Firewall using Netfilter and Iptables
TCP/IP Protocol Suite: Review
COS 561: Advanced Computer Networks
An Update on Multihoming in IPv6 Report on IETF Activity
Lecture 12 Internet Protocols Internet resource allocation and QoS
TCP/IP Protocol Suite: Review
Lecture 2: Overview of TCP/IP protocol
How Our Customers Communicate With Us
Network Fundamentals – Chapter 5
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
Review of Internet Protocols Network Layer
TCP Connection Management
Presentation transcript:

ID / LOC Split - Basic Approach Sender A Receiver B Identity src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) SHIM MAPPING SHIM MAPPING src = Loc(A) dst = Loc(B) Locator src = Loc(A) dst = Loc(B)

Where is the SHIM? Transport Protocols TCP UDP DCCP … IP Endpoint Sublayer AH ESP Frag/Reassembly Destination Options Multi6 SHIM IP Routing

Whats a “ULID”? Upper Layer IDentifier A selection from the set of locators associated with an endpoint It’s (probably) a viable locator It’s drawn from a structured space (reverse mappable) Its better if it were a unique (deterministic) selection for each host Its useable in a referral context within and between hosts Its semi-persistent

Turning on SHIM6 The initial SHIM6 state for a ULID pair is the null map function Subsequent capability negotiation to determine SHIM6 capability Exchange of Locator Sets SHIM mapping installed ULID pair to current Locator pair

Maintaining State Locator failure triggers More work needed here. Possible triggers include failure of upper level keepalive signal to the SHIM layer, explicit trigger from upper level, ICMP error, explicit SHIM level reachability failure Re-Homing may involve exhaustive pair exploration to establish a new viable locator pair (More work needed here) Signal upper level protocol of path state change (More work needed here)

Removing State No explicit upper level protocol trigger Use state timeout to remove stale SHIM mapping information (The entire area of vertical signalling in the host protocol stack requires further consideration)

Some Open Issues Integration of use of HBAs and CGAs with SHIM6 In particular dynamic vs static locator set management SHIM6 capability negotiation and locator set exchange Protocol analysis required Explicit packet signals for triggering SHIM mapping on incoming packets How should you tell an incoming SHIM packet vs a non-SHIM packet? Interaction with site exit routers Not defined as yet ULID selection How deterministic should this be? DNS interaction Adds and Wdls from locator pool Per-transport locator failure triggers i.e. per transport vs per ULID pair SHIM state?