An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.

Slides:



Advertisements
Similar presentations
The Architecture of the Internet or Waist Watching in IP
Advertisements

Who Are You? JPNIC GA Presentation Tokyo Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.
Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
Why do current IP semantics cause scaling issues? −Today, “addressing follows topology,” which limits route aggregation compactness −Overloaded IP address.
Hierarchical Routing Architecture Introduction draft-xu-rrg-hra-00.txt Routing Research Group Xiaohu XU
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Giảng viên : Ts. Lê Anh Ngọc Học viên: Trịnh Hồng Điệp Nguyễn Minh H ư ớng 1.
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
Who Are You? Geoff Huston Identity and Location in IP.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
ConnectionMigration 818L Network Centric Computing Spring 2002 Ishan Banerjee.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Host Identity Protocol
Made with OpenOffice.org 1 TCP Multi-Home Options Arifumi Matsumoto Graduate School of Informatics, Kyoto University, Japan
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
An ID/locator split architecture for future networks Ved P. Kafle, Hideki Otsuki, and Masugi Inoue, National Institute of Information and Communications.
CS 540 Computer Networks II Sandy Wang
Req1 - Separability Old: –An RO scheme MUST have the ability to be bypassed by traffic types that desire to use bidirectional tunnels through an HA. New:
Unrestricted Connection Manager MIF WG IETF 79, Beijing Gaétan Feige - Cisco Pierrick Seïté, France Telecom - Orange
1 November 2006 in Dagstuhl, Germany
GBUTtem 机密 此报告仅供 NGN 实验室内部使用。未经 NGN 实验室的书面许可,其它任 何机构不得擅自传阅、引用或复制。 sando 09/10/2005 Site-Multihoming over IPv6.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
Multi6 interim meeting agenda Chairs: Brian Carpenter, Kurt Lindqvist 1.IPR reminder, logistics, agenda bashing 2.Charter review 3.draft-lear-multi6-things-to-think-about-03.txt.
Routing Architecture for the Next-Generation Internet (RANGI) draft-xu-rangi-01.txt Xiaohu Xu IETF76 Hiroshima.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion Ved P. Kafle, Hideki Otsuki, and Masugi Inoue National.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
Things to Think About Eliot Lear IETF 59. What the document ISN’T This is not a requirements document –We did one of those already – RFC 3582 Not an architectural.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Separating Location from Identification Dino Farinacci March 3, 2008.
IETF #58 in Minneapolis1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-02.txt.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 John Scudder, David Ward Emerging Routing Issues.
IETF #57 in Viena1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-01.txt.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
IPv6-based Multihoming Standardization Activities April, 2008
Network Address Translation (NAT)
4.1.5 multi-homing.
Internet technologies
Network Address Translation (NAT)
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Who Are You? Identity and Location in IP Geoff Huston APNIC.
Multi-addressed Multipath TCP
ID / LOC Split - Basic Approach
An Update on Multihoming in IPv6 Report on IETF Activity
Computer Networks Protocols
Design Expectations vs. Deployment Reality in Protocol Development
Internet Protocol version 6 (IPv6)
Presentation transcript:

An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC

Resiliency in IP  How do you create a service that’s available 100% of the time? Use a server architecture and location environment that uses sufficient resiliency to provide 100% availability Connect to the Internet using a service provider than can provide 100% _guaranteed_ availability  100% network availability? Multiple connections to a single provider?  No – there’s a single routing state that is vulnerable to failure Multiple Connections to multiple providers  More attractive, potentially allowing for failover from one provider to another in the event of various forms of network failure

Current approach Either: Obtain a local AS Obtain PI space Advertise the PI space to all upstream providers Follow routing Or: Use PA space fragment from one provider Advertise the fragment to all other upstream providers Follow routing

The cost of routing  This approach adds an additional entry into the routing system for each multi- homed end site  The routing system is not an unbounded system  Is there an alternative approach that can support multi-homing without imposing a massive load on the routing system?

What we would like…  The multi-homed site uses 2 address blocks One from each provider  No additional routing table entry required

The idealized Multi6 problem space ISP AISP B Site Exit Router(s) Local M-H Host Remote Host M-H Site Path B Path A

Functional goals  RFC3582 enumerates the goals as Redundancy Load Sharing Traffic Engineering Policy Simplicity Transport-Layer Survivability DNS compatibility Filtering Capability Scaleability Legacy compatibility  Also we need to think about Interaction with routing Aspects of an ID/Locator split, if used Changes to packets on the wire Names, Hosts, endpoints and the DNS

But this is not IP as we knew it  The IP protocol architecture has made a number of simplifying assumptions  One major assumption was that IP hosts didn’t move! Your IP address is the same as your identity (who) Your IP address is the same as your location (where) Your IP address is used to forward packets to you (how)  If you want multi-homing to work then your identity (who) must be dynamically mappable to multiple locations (where) and forwarding paths (how) “its still me, but my location address has changed”

The multi-homing plan  For multi-homing to work in a scalable fashion then we need to separate the “who” from the “where” Or, we need to distinguish between the identity of the endpoint from the network-based location of that endpoint  One aspect of a broader topic that is commonly termed “ID/Locator split”

Generic IP Approaches  Insert a new level in the protocol stack (identity element) New protocol element  Modify the Transport or IP layer of the protocol stack in the host Modified protocol element  Modify the behaviour of the host/site exit router interaction Modified forwarding architecture

New protocol element  Define a new Protocol element that: Presents an identity-based token to the upper layer protocol Allows multiple IP address locators to be associated with the identity Allows sessions to be defined by an identity peering, and allows the lower levels to be agile across a set of locators IP Transport ULP

Modified protocol element behaviour  Alter the Transport Protocol to allow a number of locators to be associated with a session e.g. SCTP, HIP  Alter the IP protocol to support IP- in-IP structures that distinguish between current-locator-address and persistent-locator-address i.e. MIPv6 IP Transport ULP IP Transport ULP

Benefits  If we could make this work why would it be useful? Allow indirection between identity and location Provide appropriate authentication mechanisms for the right function Allow location addresses to reflect strict topology Allow identities to be persistent across location change (mobility, re-homing)

IP Identity protocol element Identity Transport ULP IP Identity Transport ULP Connect to server.telstra.net Connect to id: id:  2001:360::1 Packet to 2001:360::1

Identity protocol element IP Identity Transport ULP IP Identity Transport ULP Connect to server.telstra.net Connect to id: id:  2001:FFFF::1 Packet to 2001:FFFF::1 Locator switch

Protocol element implementation “Conventional” Add a wrapper around the upper level protocol data unit and communicate with the peer element using this “in band” space IP Header Identity Field Transport Header Payload IP Identity Transport ULP

Protocol element implementation “Out of Band” Use distinct protocol to allow the protocols element to exchange information with its peer IP Identity Transport ULP IP Identity Transport ULP Identity Peering Protocol Transport Protocol

Protocol element implementation “Referential” Use a reference to a third party point as a means of peering (e.g. DNS Identifier RRs) IP Identity Transport ULP IP Identity Transport ULP Transport Protocol DNS

Protocol element implementation Self-Referential Use an opportunistic identity as an equivalence token for a collection of locators IP Identity Transport ULP IP Identity Transport ULP Transport Session Locator Pair A Locator Pair B Locator Pair C

Modified host / router interaction  Modify the interaction between the host and the Site Exit router to allow Source-based routing for support of host- based site-exit router selection Site Exit router packet header modification Host / Site Exit Router exchange of reachability information

Proposals for an identity protocol element  Use identity tokens lifted from a protocol’s “address space” DNS, Appns, Transport all manipulate an “address”  Use a distinguished locator (‘base’ or ‘home’ locator)  128 bit value without location semantics  64 bit structured interface identity value  32 bit value that has no IPv6 semantics IP functions on “locators” Stack Protocol element performs mapping  FQDN as the identity token Is this creating a circular dependency? Does this impose unreasonable demands on the properties of the DNS?  Structured token What would be the unique attribute of a novel token space that distinguishes it from the above?  Unstructured token Allows for self-allocation of identity tokens (opportunistic tokens) How to map from identity tokens to locators using a lookup service?

Issues  Identity / Locator Binding domain Session or host? Dynamic or static? Configured or negotiated?  Scope of identity role Locator independent identity Equivalence binding for multiple locators  Locator Selection  Application visibility of identity capability How does an application refer to ‘me’ and ‘you’?  Identity Referrals and hand-overs  Scoped identities  Third party locator rewriting  Security and integrity of the binding

Current Efforts in Multi6 WG  Architecture Overview  Threats Analysis  Considerations  Design Team Effort: Currently looking at use of identity values derived from locator set hashes, passed in the interface identity field of IPv6 Applying this as binding state held in the IP layer

Identity protocol element location  Multi6 Design Team effort is working on an IP level approach: Above the IP forwarding layer (Routing) Below IP fragmentation and IPSEC (IP Endpoint) IP Transport ULP Identity insertion point

Open Questions  Are structured identity spaces a heavy weight solution to a light weight problem?  How serious a routing problem is multi-homing anyway?  Can routing scope be a better solution than complete protocol-reengineering?  What’s a practical compromise vs an engineered solution to an ill-defined problem space?  Is per-session opportunistic identity a suitably lightweight solution? Why push this into the IP layer?

Thank you! Questions ?