Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.

Slides:



Advertisements
Similar presentations
The Architecture of the Internet or Waist Watching in IP
Advertisements

Who Are You? JPNIC GA Presentation Tokyo Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.
Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
Hierarchical IPv4 Framework Patrick Frejborg 18 Dec 2009.
Internetworking II: MPLS, Security, and Traffic Engineering
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Juan F. Rodríguez, Marcelo Bagnulo,
Giảng viên : Ts. Lê Anh Ngọc Học viên: Trịnh Hồng Điệp Nguyễn Minh H ư ớng 1.
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Who Are You? Geoff Huston Identity and Location in IP.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
1 MAST and Multi6 MAST and Multi6  MAST  Multiple Address Service for Transport  draft-crocker-mast-proposal  A service to maintain locator pools Simultaneous.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Host Identity Protocol
Made with OpenOffice.org 1 TCP Multi-Home Options Arifumi Matsumoto Graduate School of Informatics, Kyoto University, Japan
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
IETF DMM WG Mobility Exposure and Selection WT Call#2 Nov 6, 2014.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
An ID/locator split architecture for future networks Ved P. Kafle, Hideki Otsuki, and Masugi Inoue, National Institute of Information and Communications.
Simple Multihoming Experiment draft-huitema-multi6-experiment-00.txt Christian Huitema, Microsoft David Kessens, Nokia.
1 November 2006 in Dagstuhl, Germany
GBUTtem 机密 此报告仅供 NGN 实验室内部使用。未经 NGN 实验室的书面许可,其它任 何机构不得擅自传阅、引用或复制。 sando 09/10/2005 Site-Multihoming over IPv6.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Multi6 interim meeting agenda Chairs: Brian Carpenter, Kurt Lindqvist 1.IPR reminder, logistics, agenda bashing 2.Charter review 3.draft-lear-multi6-things-to-think-about-03.txt.
4.1.4 multi-homing.
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Mar del Plata, Argentina, 31 Aug – 1 Sep 2009 ITU-T Kaleidoscope 2009 Innovations for Digital Inclusion Ved P. Kafle, Hideki Otsuki, and Masugi Inoue National.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
Things to Think About Eliot Lear IETF 59. What the document ISN’T This is not a requirements document –We did one of those already – RFC 3582 Not an architectural.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
IETF #58 in Minneapolis1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-02.txt.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
IETF #57 in Viena1 IPv6 Address Assignment and Route Selection for End-to-End Multihoming Kenji Ohira Kyoto University draft-ohira-assign-select-e2e-multihome-01.txt.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
HIP-Based NAT Traversal in P2P-Environments
Advanced Computer Networks
Requirements for LER Forwarding of IPv4 Option Packets
4.1.5 multi-homing.
Internet and Intranet Fundamentals
Global Locator, Local Locator, and Identifier Split (GLI-Split)
Who Are You? Identity and Location in IP Geoff Huston APNIC.
ID / LOC Split - Basic Approach
An Update on Multihoming in IPv6 Report on IETF Activity
Presentation transcript:

Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004

The Objective The desire is to generate a taxonomy of approaches to multi-homing in V6 The taxonomy is to be based on an architectural analysis of the solution space Individual approaches can then be analysed against this architectural taxonomy

The Problem Space ISP AISP B Site Exit Router(s) Local M-H Host Remote Host PA::idPB::id M-H Site

Functional Goals RFC3582 enumerates the goals as: Redundancy Load Sharing Traffic Engineering Policy Simplicity Transport-Layer Surviveability DNS compatibility Filtering Capability Scaleability Simplicity Legacy compatibility draft-lear includes some 30 additional questions relating various aspects of the proposals in the areas of: Interaction with routing Aspects of an ID/Locator split, if used Changes to packets on the wire Names, Hosts, endpoints and the DNS

Generic Approaches: Insert a new level in the protocol stack (identity element) New protocol element Modify the Transport or IP layer of the protocol stack in the host Modified protocol element Modify the behaviour of the host/site exit router interaction Modified forwarding architecture

New Protocol Element Define a new Protocol element that: presents an identity-based token to the upper layer protocol Allows multiple IP address locators to be associated with the identity Allows sessions to be defined by an identity peering, and allows the lower levels to be agile across a set of locators IP Transport ULP

Protocol Element Implementation “Conventional” Add a wrapper around the upper level protocol data unit and communicate with the peer element using this “in band” space “Out of Band” Use distinct protocol to allow the protocols element to exchange information with its peer “Referential” Use a reference to a third party point as a means of peering (e.g. DNS Identifier RRs) IP Transport ULP

Modified Protocol Element Behaviour Alter the Transport Protocol to allow a number of locators to be associated with a session e.g. SCTP Alter the IP protocol to support IP- in-IP structures that distinguish between current-locator-address and persistent-locator-address i.e. MIP6 IP Transport ULP IP Transport ULP

Modified Host / Router Interaction Modify the interaction between the host and the Site Exit router to allow: Source-based routing for support of host-based site-exit router selection Site Exit router packet header modification Host / Site Exit Router exchange of reachability information

None of the above: Mapping to IPv4 Status Quo to IPv6 Such as: Obtain a local AS Obtain PI space Advertise the PI space to all upstream providers Follow routing Or: Use PA space from one provider Advertise it to all other upstream providers Follow routing

Common Issues Host based locator address selection How to pick the “best” source locator for the reverse packet? How to pick the “best” destination locator if there are more than one available? Detection of network element failure How to detect reverse path failure? Session Persistence How and when to switch locators for active sessions ?

Proposals for a new Protocol Element HIP: Shim between Transport and IP layer Presents a stable identity to the transport layer Allows multiple locators to be bound to the identity, and communicates this binding to the remote end (HIP protocol) Allows the local host to switch source locators in the event of network failure to ensure session surviveability IP Transport ULP

Proposals for a new Protocol Element NOID + SIM (CBID 128) + CB64: Addition of an identifier shim layer to the protocol stack. The identifier / locator mapping may be contained in the DNS (NOID) or may be contained within a protocol exchange (SIM), or a hybrid approach (CB64) Permits Site Exit routers to rewrite source locators on egress (i.e. includes elements of host / Site Exit Router interaction) IP Transport ULP

Identity Protocol Element Location It appears that the proposals share a common approach: Above the IP forwarding layer (Routing) Below IP fragmentation and IPSEC (IP Endpoint) IP Transport ULP

Proposals for an Identity Protocol Element Use identity tokens lifted from a protocol’s “address space” DNS, Appns, Transport manipulate an “address” IP functions on “locators” Stack Protocol element performs mapping FQDN as the identity token Is this creating a circular dependency? Does this impose unreasonable demands on the properties of the DNS? Structured token What would be the unique attribute of a novel token space that distinguishes it from the above? Unstructured token Allows for self-allocation of identity tokens (opportunistic tokens) How to map from identity tokens to locators using a lookup service? Hierarchically Structured Space Unstructured

Proposal for a Modified Transport Protocol SCTP: Host-based solution that sets up multiple locators for a session Changes locators on end-to-end heartbeat failure Depends on IPSEC for operational integrity of locator exchange IP Transport ULP

Proposal for a Modified IP Layer MIP6: Use one locator as the home address Allow a dynamic switch to an alternate locator as a session surviveability response An instance of a generic approach of packet encapsulation, where the outer encap is the current locator binding and the inner packet is the identifier peering. IP Transport ULP

Modified Host / Site Exit Router interaction Site Exit Anycast proposal Allows local forwarding of outgoing packets to the ‘matching’ site exit router for the selected source address Local Site source locator-based forwarding Site Exit source address rewriting May be used in combination with locator protocol element proposals Have upstream accept all of the site’s sources and use host-based source locator selection

Common Issues Picking the ‘best’ source locator (how do know what destination works at the remote end?) Use each locator in turn until a response is received Use a identity peering protocol to allow the remote end to make its own selection from a locator set

Common Issues Picking the ‘best’ destination locator Longest match Use each in turn Picking the ‘best” source / destination locator pair As these may be related choices

Common Issues Detecting network failure (How does a host know that its time to use a different source and/or destination locator?) Heartbeat within the session Modified transport protocol to trigger locator change Host / Router interaction to trigger locator change Application timeframe vs network timeframe Failure during session startup and failure following session establishment

Common Issues Session Persistence Use one locator as the “home” locator and encapsulate the packet with alternative locators Set up the session with a set of locators and have transport protocol maintain the session across the locator set Optionally delay the locator binding, or allow the peer dynamic change of the locator pool Use a new peering based on an identity protocol element and allow locators to be associated with the session identity

Common Issues Bilateral peer applications vs multi-party applications What changes for 3 or more parties to a protocol exchange? Application hand-over and referral How does the remote party identify the multi-homed party for third party referrals?

Security Considerations Not considered in the scope of this work Worthy of a separate effort to identify security issues in the various proposals following up on threats draft