NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt

Slides:



Advertisements
Similar presentations
RSVP-TE Extensions for SRLG Configuration of FA
Advertisements

NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt Charles Shen, Henning Schulzrinne, Sung-Hyuck Lee, Jong Ho Bang IETF#71 – Philadelphia, USA.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
1 IETF 64th meeting, Vancouver, Canada Design Options of NSIS Diagnostics NSLP Xiaoming Fu Ingo Juchem Christian Dickmann Hannes Tschofenig.
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-00.txt Charles Shen, Henning Schulzrinne Sung-Hyuck Lee, Jong Ho Bang IETF#63 – Paris, France August.
Mobility Support in NSIS 57th IETF Meeting, July 13-18, Vienna Xiaoming Fu Henning Schulzrinne Hannes Tschofenig.
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
NSIS Flow ID and packet classification issues Hong Cheng, Qijie Huang, Takako Sanda, Toyoki Ue IETF#63 August, 2005.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
CMPT 471 Networking II Address Resolution IPv6 Neighbor Discovery 1© Janice Regan, 2012.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
0 NAT/Firewall NSLP IETF 62th – March 2005 draft-ietf-nsis-nslp-natfw-05.txt Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
0 NAT/Firewall NSLP Activities IETF 60th - August 2nd 2004 Cedric Aoun, Martin Stiemerling, Hannes Tschofenig.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Discussion on MN multicast activity tracking Luis M. Contreras Telefónica I+D Carlos J. Bernardos Universidad Carlos III de Madrid (UC3M) Berlin, MULTIMOB.
MPLS-TP Loopback Draft draft-boutros-mpls-tp-loopback-02.txt Sami Boutros and a Cast of Thousands.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
RFC 4068bis draft-ietf-mipshop-fmipv6-rfc4068bis-01.txt Rajeev Koodli.
Generic Aggregation of Resource Reservation Protocol (RSVP) for IPv4 and IPv6 Reservation over PCN domains Georgios Karagiannis, Anurag Bhargava draft-karagiannis-pcn-tsvwg-rsvp-pcn-01.
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
Distributed Mobility Management (DMM) WG DMM Work Item: Forwarding Path & Signaling Management (FPSM) draft-ietf-dmm-fpc-cpdp-03.txt M. Liebsch, S. Matsushima,
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
NSLP for Quality of Service Sven van den Bosch (ed) Georgios Karagiannis Andrew McDonald (et al.) draft-ietf-nsis-qos-nslp-02.txt Slides:
IETF 67, Nov 2006Slide 1 VCCV Extensions for Multi- Segment Pseudo-Wire draft-hart-pwe3-segmented-pw-vccv-01.txt draft-ietf-pwe3-segmented-pw-04.txt Mustapha.
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
Booting up on the Home Link
Open issues with PANA Protocol
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Mobile IP.
Transport of Media Independent HO Messages over IP
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
ODL SFC, Implementing IETF SFC November 14, 2016
NSLP for Quality of Service
MPLS-TP Fault Management Draft draft-boutros-mpls-tp-fault-01
NSLP for Metering Configuration Signaling (Metering NSLP)
An IPv6 Flow Label Specification Proposal
draft-ietf-simple-message-sessions-00 Ben Campbell
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Internet Control Message Protocol (ICMP)
A. Báder, L. Westberg, G. Karagiannis,
ERP extension for EAP Early-authentication Protocol (EEP)
IETF 96 (MPLS WG) Abhishek Deshmukh Kireeti Kompella (presenting)
Francois Le Faucheur Cisco
The 66th IETF meeting in Montreal, Canada
Net 323: NETWORK Protocols
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Mobile and Wireless Networking
OGF March 2009 Catania, Italy NSI-WG Chain vs. Tree model
Internet Control Message Protocol (ICMP)
Tunnel Loops and Its Detection draft-ng-intarea-tunnel-loop-00.txt
A Unified Approach to IP Segment Routing
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
IETF 98 (MPLS WG) Abhishek Deshmukh (presenting) Kireeti Kompella
Chapter 15. Internet Protocol
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
draft-ietf-p2psip-base-03
Lecture 4a Mobile IP 1.
IETF 102 (TEAS WG) Abhishek Deshmukh (presenting) Kireeti Kompella
How OAM Identified in Overlay Protocols draft-mirsky-rtgwg-oam-identify Greg Mirsky IETF-104 March 2019, Prague.
DetNet Data Plane Solutions draft-ietf-detnet-dp-sol-ip-02  draft-ietf-detnet-dp-sol-mpls-02  Bala’zs Varga, Jouni Korhonen, Janos Farkas, Lou Berger,
Presentation transcript:

NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt Charles Shen, Henning Schulzrinne, Sung-Hyuck Lee, Jong Ho Bang IETF#71 – Philadelphia, USA March 2008

Overview Problem: Solution: NSIS signaling msgs may be unidentifiable inside IP tunnels How to achieve e2e signaling in the presence of IP tunnels (using QoS NSLP as an example)? Solution: Separate tunnel signalling from e2e session signaling Special tunnel flow ID for in-tunnel packet classification Associate tunnel session with e2e session as necessary

Interaction of Tunnel & e2e Sessions – Sender Initiated Scenario 2 Reserve with BOUND_SESSSION_ID 2’ Reserve 2’ Reserve 1 Reserve 4 Reserve Tnode (NE) Texit (NE) Tentry (NE) Assumes both end-to-end and tunnel sessions are sender- initiated. Tunnel signaling messages in green and e2e signaling messages in red. The sender first sends an end-to-end RESERVE message which arrives at Tentry. If Tentry supports tunnel signaling and determines that an individual tunnel session needs to be established for the end-to-end session, it chooses the tunnel flow ID, creates the tunnel session and associates the end-to-end session with the tunnel session. Tentry then sends a tunnel RESERVE message matching the requests of the end-to-end session toward the Texit to reserve tunnel resources. Tentry also appends to the original RESERVE message with a tunnel BOUND_SESSION_ID object containing the SID of the tunnel session and sends it toward Texit using normal tunnel encapsulation. The tunnel RESERVE message is processed hop by hop inside the tunnel for the flow identified by the chosen tunnel flow ID. When Texit receives the tunnel RESERVE message, reservation state for the tunnel session will be created. Texit may also send a tunnel RESPONSE message to Tentry. On the other hand, the end-to-end RESERVE message passes through the tunnel intermediate nodes just like any other tunneled packets. When Texit receives the end-to-end RESERVE message, it notices the binding of a tunnel session and checks the state for the tunnel session. When the tunnel session state is available, it updates the end-to-end reservation state using the tunnel session state, removes the tunnel BOUND_SESSION_ID object and forwards the end-to-end RESERVE message further along the path towards the receiver. When the end-to-end reservation finishes, an end-to-end RESPONSE may be sent back from the receiver to the sender. 3’ Response 3’ Response 5 Response 5 Response 5 Response tunnel signaling e2e Signaling

NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt Charles Shen, Henning Schulzrinne, Sung-Hyuck Lee, Jong Ho Bang IETF#64 – Vancouver, Canada November 2005

Outline Overview Updates since 00 draft Open issues Next steps

Overview Allow NSIS operation over IP tunnels General approach Currently looking at QoS NSLP in particular Consider two types of QoS capable tunnels Supporting aggregate resource management Supporting dynamic individual flow signalling General approach Separate tunnel signalling from e2e session Special tunnel Flow ID for in-tunnel packet classification Associate tunnel session with e2e session as necessary

Major updates since -00 version Determined interaction between the e2e session and the tunnel session Alternatives moved to appendix Added Main Message Processing Rules at Tunnel Endpoints

Interaction of Tunnel & e2e Sessions – Sender Initiated Scenario 2 Reserve with BOUND_SESSSION_ID 2’ Reserve 2’ Reserve 1 Reserve 4 Reserve Tnode (NE) Texit (NE) Tentry (NE) Assumes both end-to-end and tunnel sessions are sender- initiated. Tunnel signaling messages in green and e2e signaling messages in red. The sender first sends an end-to-end RESERVE message which arrives at Tentry. If Tentry supports tunnel signaling and determines that an individual tunnel session needs to be established for the end-to-end session, it chooses the tunnel flow ID, creates the tunnel session and associates the end-to-end session with the tunnel session. Tentry then sends a tunnel RESERVE message matching the requests of the end-to-end session toward the Texit to reserve tunnel resources. Tentry also appends to the original RESERVE message with a tunnel BOUND_SESSION_ID object containing the SID of the tunnel session and sends it toward Texit using normal tunnel encapsulation. The tunnel RESERVE message is processed hop by hop inside the tunnel for the flow identified by the chosen tunnel flow ID. When Texit receives the tunnel RESERVE message, reservation state for the tunnel session will be created. Texit may also send a tunnel RESPONSE message to Tentry. On the other hand, the end-to-end RESERVE message passes through the tunnel intermediate nodes just like any other tunneled packets. When Texit receives the end-to-end RESERVE message, it notices the binding of a tunnel session and checks the state for the tunnel session. When the tunnel session state is available, it updates the end-to-end reservation state using the tunnel session state, removes the tunnel BOUND_SESSION_ID object and forwards the end-to-end RESERVE message further along the path towards the receiver. When the end-to-end reservation finishes, an end-to-end RESPONSE may be sent back from the receiver to the sender. 3’ Response 3’ Response 5 Response 5 Response 5 Response tunnel signaling e2e Signaling

Interaction of Tunnel & e2e Sessions – Receiver Initiated Scenario 2 Query with BOUND_SESSION_ID 2’ Query 2’ Query 3 Query 1 Query Tnode (NE) Tentry (NE) Texit (NE) 1. Assumes both end-to-end and tunnel sessions are receiver-initiated. 2. When Tentry receives the first end-to-end QUERY message from the sender and knows that this QUERY will trigger a RESERVE, it chooses the tunnel flow ID, creates the tunnel session and sends a tunnel QUERY message matching the requests of the end-to-end session toward the Texit. 3. Tentry also appends to the original QUERY message with a tunnel BOUND_SESSION_ID object containing the SID of the tunnel session and sends it toward the Texit using normal tunnel encapsulation. 4. The tunnel QUERY message is processed hop by hop inside the tunnel for the flow identified by the chosen tunnel flow ID. When Texit receives the tunnel QUERY message, it should create a reservation state for the tunnel session, but it should not send out a tunnel RESERVE message at this time (see open issue II). 5. The end-to-end QUERY message passes along tunnel intermediate nodes just like any other tunneled packets. When Texit receives the end- to-end QUERY message, it notices the binding of a tunnel session and checks state for the tunnel session. When the tunnel session state is available, Texit updates the end-to-end QUERY message using the tunnel session state, removes the tunnel BOUND_SESSION_ID object and forwards the end-to-end QUERY message further along the path. 6. When Texit receives the first end-to-end RESERVE message issued by the receiver, it finds the reservation state of the tunnel session and triggers a tunnel RESERVE message for that session. Meanwhile the end-to-end RESERVE message will be appended with a tunnel BOUND_SESSION_ID object and forwarded towards Tentry. 7. When Tentry receives the tunnel RESERVE, it creates the reservation state for the tunnel session and may send a tunnel RESPONSE back to Texit (not shown). 8. When Tentry receives the end-to-end RESERVE, it creates the end-to- end reservation state and updates it with information from the associated tunnel session reservation state. Then Tentry further forwards the end-to-end RESERVE upstream toward the sender. 9. The sender may send an end-to-end RESPONSE back to receiver (not shown). 5’ Reserve 5’ Reserve 6 Reserve 4 Reserve 5 Reserve with BOUND_SESSION_ID Sender e2e Signaling tunnel signaling

Binding Mechanism for e2e session and tunnel session Binding of e2e and its corresponding tunnel session needs to be established at both tunnel endpoints. The notification from one end to the other of the session binding is achieved by BOUND_SESSION_ID object. (See Open Issue I) The other choice, BOUND_FLOW_ID is not chosen considering possible existence of NAT.

Open Issue I - Enhanced BOUND_SESSION_ID Current BOUND_SESSION_ID object does not indicate any reason for the binding by itself  Propose to add binding codes. Current examples: 0x01 – Tunnel and e2e sessions 0x02 – Bi-directional sessions 0x03 – Aggregate sessions 0x04 – Dependent sessions (one session is alive only if the other is also alive) Different Binding_Codes triggers different msg processing Reserved Binding_Codes Session ID

Open Issue II – Conditional Reservation State In receiver-initiated tunnel reservation scenario, when Texit receives the tunnel Query and end-to-end Query (which will trigger a e2e Reserve), it may create and establish state association for the two sessions but it should wait till the receipt of actual end-to-end Reserve message to trigger the actual Tunnel Reserve Need an additional message-specific flag bit in the common header of QUERY message for this conditional reservation state?

Open Issue III - NSIS-Tunnel Capability Discovery Capability discovery needed when both Tunnel Entry (Tentry) and Tunnel Exit (Texit) need to be NSIS-tunnel aware Choices: Generic tunnel capability discovery at GIST layer? For all types of NSLPs? NSLP specific tunnel capability discovery? Discovery at NSLP layer by defining a Node_Char object (similar to that in RFC 2746)?

Next steps Solve open issues More detailed message processing and state management rules Other NSLP (e.g., NAT/FW) over IP tunnels Should this be a WG item?