MHAP IETF-55 ipv6mh Michel Py -

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advanced Piloting Cruise Plot.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
0 - 0.
2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt ShapesPatterns Counting Number.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
ZMQS ZMQS
Richmond House, Liverpool (1) 26 th January 2004.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
15. Oktober Oktober Oktober 2012.
Quadratic Inequalities
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
“Start-to-End” Simulations Imaging of Single Molecules at the European XFEL Igor Zagorodnov S2E Meeting DESY 10. February 2014.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
A SMALL TRUTH TO MAKE LIFE 100%
PSSA Preparation.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
CpSc 3220 Designing a Database
Traktor- og motorlære Kapitel 1 1 Kopiering forbudt.
Presentation transcript:

MHAP IETF-55 ipv6mh Michel Py -

MHAP Multi Homing Aliasing Protocol Router-based solution. Zero change to hosts. Dual-space protocol. One identifier: PI address (either MHAP or GAPI). Multiple locators: PA addresses. 2

MHAP The identifier and the locators are part of the same name space: IPv6 unicast addresses. The main innovation is that the identifier has limited routability and is used in the identifier-to-locator process. The scalability comes from the fact that the identifiers are not in the defaultless table. 3

MHAP Similarities with multiaddress host-based solutions: A host has n PA addresses associated to it. The address space used for transit is aggregated PA space. 4

MHAP Differences with multiaddress host-based solutions: The multiple addresses are not bound to the host itself. The host has only one address, the PI identifier. There is no source address selection. 5

MHAP Differences with multiaddress host-based solutions: The destination address selection uses BGP. Binding updates are router-based, not host-based. 6

MHAP R RV client R R R R end point ha hb R R R PI-b PA1 PA2 PA-a 7 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bInitial packet PA1 PA2 PI-b PA-a 8 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bInitial packet PA1 PA2 PI-b PA-a 9 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bInitial packet PA1 PA2 PI-b PA-a 10 The MHAP requests are triggered by the initial packet. PI PA3 PA4 MHAP Request 2 MHAP Request 1 PA-4 > PI-b PA-3 > PI-b

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bInitial packet PA1 PA2 PI-b PA-a 11 PI PA3 PA4 MHAP Request 2PA-4 > PI-b PA-3 > PI-bMHAP Request 1

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2 PA-4 > PA-2MHAP Request 2 PA1 PA2 PI-b PI PA-a Initial packet 12 PA3 PA4 MHAP Request 1PA-3 > PA-1 The RV point has aliased all the packets on behalf of the client.

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2 PA-a > PA-2 PA1 PA2 PI-b PA-a Initial packet 13 MHAP Request PI PA3 PA4 MHAP Request 1PA-3 > PA-1

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2 PA-a > PA-2 PA1 PA2 PI-b PA-a Initial packet 14 MHAP Request PI PA3 PA4 MHAP Request 1PA-3 > PA-1

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-b PA1 PA2 PI-b PA-a Initial packet 15 PI PA3 PA4 The endpoint has de- aliased the packet.

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 16 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 17 PA-4 < PA2MHAP Reply2 PA-3 < PA1MHAP Reply1 The MHAP replies are not triggered by the return traffic. PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 18 PA-4 < PA2MHAP Reply2 PA-3 < PA1MHAP Reply1 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 19 PA-4 < PA2MHAP Reply2 PA-3 < PA1MHAP Reply1 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 20 PA-4 < PA2MHAP Reply2 PA-3 < PA1MHAP Reply1 The client builds aliasing entry. PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 21 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a < PI-b PA1 PA2 PI-b PA-a Return traffic 22 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bPacket #2 PA1 PA2 PI-b PA-a 23 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bPacket #2 PA1 PA2 PI-b PA-a 24 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2Packet #2 PA1 PA2 PI-b PA-a 25 PI PA3 PA4 Packet is now aliased by the client, RV point not needed anymore.

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2Packet #2 PA1 PA2 PI-b PA-a 26 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2Packet #2 PA1 PA2 PI-b PA-a 27 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PA-b2Packet #2 PA1 PA2 PI-b PA-a 28 PI PA3 PA4

MHAP R RV client R R R R end point ha hb R R R PA-a > PI-bPacket #2 PA1 PA2 PI-b PA-a 29 PI PA3 PA4 The endpoint has de- aliased the packet.