NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:

Slides:



Advertisements
Similar presentations
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt Charles Shen, Henning Schulzrinne, Sung-Hyuck Lee, Jong Ho Bang IETF#71 – Philadelphia, USA.
Advertisements

Report from the MSTP Design Team Robert Hancock IETF#68 – Prague March 2007.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Progress Report: Metering NSLP (M-NSLP) 66th IETF meeting, NSIS WG.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
1 IETF 64th meeting, Vancouver, Canada Design Options of NSIS Diagnostics NSLP Xiaoming Fu Ingo Juchem Christian Dickmann Hannes Tschofenig.
1 IETF 64th meeting, Vancouver, Canada Context Transfer Using GIST Xiaoming Fu John Loughney.
Applicability Statement of NSIS Protocols in Mobile Environments (draft-ietf-nsis-applicability-mobility-signaling-03) Sung-Hyuck Lee, Seong-Ho Jeong,
Trade-offs and open issues with path discovery and transport or not all requirements are orthogonal… Henning Schulzrinne Columbia University
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
IPv6 Home Networking Architecture - update IETF homenet WG Interim meeting Philadelphia, 6 th Oct 2011 draft-chown-homenet-arch-00.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 8 Lessons 1 and 2 1 BSCI Module 8 Lessons 1 and 2 Introducing IPv6 and Defining.
NSIS NATFW NSLP: A Network Firewall Control Protocol draft-ietf-nsis-nslp-natfw-08.txt IETF NSIS Working Group January 2006 M. Stiemerling, H. Tschofenig,
GIMPS – The NSIS Transport Layer draft-ietf-nsis-ntlp-02.txt Slides: Robert Hancock, Henning Schulzrinne.
NSIS Path-coupled Signaling for NAT/Firewall Traversal Martin Stiemerling, Miquel Martin (NEC) Hannes Tschofenig (Siemens AG) Cedric Aoun (Nortel)
GIMPS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-06.txt Slides: Robert Hancock, Henning.
NSIS IETF 56 MONDAY, March 17, 2003: Morning Session TUESDAY, March 18, 2003: Afternoon Sessions I.
0 NAT/Firewall NSLP IETF 62th – March 2005 draft-ietf-nsis-nslp-natfw-05.txt Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
GIMPS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-05.txt Slides: Robert Hancock, Henning.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
QoS NSLP draft-ietf-nsis-qos-nslp-06.txt Slides: Sven van den Bosch, Georgios Karagiannis, Andrew McDonald.
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
NAT traversal for GIST in 300 seconds A. Pashalidis; H. Tschofenig.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
NSIS Transport Layer draft-ietf-nsis-ntlp-01.txt Slides:
Problems in using HIP for P2PSIP Philip Matthews Avaya
Applicability Statement of NSIS Protocols in Mobile Environments (draft-ietf-nsis-applicability-mobility-signaling-00) Sung-Hyuck Lee, Seong-Ho Jeong,
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Enterprise IPv6 Transition Analysis IETF 62 IPv6 Operations Working Group March 7-11, 2005 Minneapolis, MN Presenter Jim Bound Jim Bound (Editor), Yanick.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
4: Network Layer4b-1 IPv6 r Initial motivation: 32-bit address space completely allocated by r Additional motivation: m header format helps speed.
Requirements For Handover Information Services MIPSHOP – IETF #65 Srinivas Sreemanthula (Ed.)
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
Chapter 27 IPv6 Protocol.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP draft-ietf-mmusic-rfc2396bis-10 Magnus Westerlund Co-auhtors: Henning Schulzrinne, Rob Lanphier,
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
Moving HIP to Standards Track Robert Moskowitz ICSAlabs an Independent Div of Verizon Business Systems July 30, 2009 Slides presented.
Design Considerations for the Common MIH Protocol Functions draft-hepworth-mipshop-mih-design-considerations-01 Ele Hepworth (*), Robert Hancock, Srinivas.
IETF 55 Nov A Two-Level Architecture for Internet Signaling draft-braden-2level-signal-arch-01.txt Bob Braden, Bob Lindell USC Information.
GIMPS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-04.txt Slides: Robert Hancock, Henning.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Partly-Decoupled Signalling in NSIS draft-hancock-nsis-pds-problem-03.txt Robert Hancock, Cornelia Kappler, Juergen Quittek, Martin Stiemerling IETF#65.
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
NSIS Terminology Issues Robert Hancock IETF #55 - Atlanta November 2002.
David B. Johnson Rice University Department of Computer Science DSR Draft Status Monarch Project 57th IETF.
Problem Statement: Media Independent Handover Signalling draft-hepworth-mipshop-mih-problem-statement-01 Ele Hepworth (*), Greg Daley, Srinivas Sreemanthula,
NSLP for Quality of Service Sven van den Bosch (ed) Georgios Karagiannis Andrew McDonald (et al.) draft-ietf-nsis-qos-nslp-02.txt Slides:
1 NSIS: A New Extensible IP Signaling Protocol Suite Myungchul Kim Tel:
GxxxS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-07.txt Slides: Robert Hancock, Henning.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
BANANA BOF Scope & Problem Description
Thierry Ernst (INRIA and WIDE) Hesham Soliman (Ericsson)
Chapter 18 IP Security  IP Security (IPSec)
BANANA BOF Scope & Problem Description
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt
NTLP strawman draft-schulzrinne-gimps
Editors: Bala’zs Varga, Jouni Korhonen
Presentation transcript:

NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides: Robert Hancock, Henning Schulzrinne (editors) IETF#58 – Minneapolis November 2003

Overview Origins Purported Status (& outline of operation)? Major Issues ‘Explicit messaging association’ approach (& a hum?) Encapsulation options Less Major Issues Openings for Inputs

Origins ‘Starting NTLP work’ IETF#56) Framework (and Requirements) I-Ds 2 initial drafts at IETF#57 Some discussion in Vienna and on list Some expert review Detail from one used to expand ‘conceptual description’ of the other Plus a lot more explanation and examples Still not yet a complete protocol design

Status & Outline (1/2) 1. Introduction (& 2. Terminology) Basically follows from f/w – assumed  3. Design Methodology How 2205-like transport is extended with ‘real’ transport/security protocols to provide 2747/2961-like functionality – basically an ‘extended strawman’ 4 [Overview of Operation] & 5 [Formats] mainly provide more discussion of the implications of 3.1 WG needs to commit to the approach of 3.1, or some alternative (in scope of the charter…)

Status & Outline (2/2) 6. Advanced Protocol Features Covers NATs, routing, transition etc. At current level of detail, follows directly from f/w (if you believe 3/4/5) 7. Security Considerations Allocation of threats and solutions At current level of detail, follows directly from f/w (if you believe 3) 8. Open Issues Basically questions about detailed aspects of 4/5

Design Approach (1/4) Various ways to get required additional functionality into 2205-like approach Currently: build a new messaging framework which incorporates 2205 functions and existing transport/security protocols Tarted-up version of Fig. 2 here (stack diagram)

Design Approach (2/4) Message flows within a node: Tarted-up version of Fig 3. Here (distinguish 2205 world and ‘better’ world)

Design Approach (3/4) Routing state is set up as in 2205 When routing state exists, policy dictates when messaging associations are set up and used (these two operations are actually largely decoupled) Improved version of Fig. 4 here (clearer about decoupling of when MAs are set up)

Design Approach (4/4) Implications (among others): + Re-use existing transport/security technology + No ‘new’ protocol development + Additional functionality scales like #peers, not #flows/sessions 0 Time/space overhead: little/no impact (given the functionality that is being achieved) - Nodes have to implement (non-trivial) transport/security protocols - Processing at intermediaries gets harder - Routing state maintenance stops being ‘free’ ?

Formats General approach: a message is a header + a bundle of TLV-encoded objects Some objects can be signalling application payloads No fundamental difference between connection/datagram modes Some datagram messages need IP Router Alert Option setting Preferred (?) method for message interception Some transport protocols need additional header information

Encapsulations How far should a messaging association go? Further = ‘better’ service to protocol user Further = more problems for intermediates Can trade these off by making messaging encapsulation more complex In extreme case, handle discovery overhead problem too Peak-and-trough diagram here (App. C)

Three Options Three options for connection mode Raw: simple, but all processing nodes terminate all messaging associations Explicit PtP: more complex, NAT/’NSLP-lites’ don’t require MA to be terminated Implicit PtP: more complex, all signalling automatically finds route changes Which to allow (or >1?) Impacts subsequent tradeoffs in NTLP/NSLP split ‘Real’ answer is a new protocol, but out of scope…

Other Open Issues See Section 8! 8.1 Protocol Naming 8.2 General IP Layer Issues 8.3 Encapsulation and Addressing for Datagram Mode 8.4 Intermediate Node Bypass and Router Alert Values 8.5 Messaging Association Flexibility 8.6 Messaging Association Setup Message Sequences 8.7 Connection Mode Encapsulation 8.8 GIMPS State Teardown 8.9 Datagram Mode Retries & Single Shot Message Support 8.10 GIMPS Support for Message Scoping 8.11 Mandatory or Optional Reverse Routing State 8.12 Additional Discovery Mechanisms Could knock up a slide for each in short order…?

Openings for Input Routing/mobility/multihoming analysis See Thursday, also network multihoming NSIS-[un]aware NAT traversal analysis STUN or alternative NSIS datagram modes? v4/v6 transition analysis Especially 6to4 details, anycast tunnels Can section 7 be made more precise? Validation against NSLP work Including proxy operations, receiver initiation scenarios