Shim6 Architecture Geoff Huston IETF-63 August 2005.

Slides:



Advertisements
Similar presentations
Who Are You? JPNIC GA Presentation Tokyo Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Advertisements

Who Are You? Geoff Huston Chief Scientist APNIC Identity and Location in IP.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.
Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
MIP Extensions: FMIP & HMIP
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
1 Address Selection, Failure Detection and Recovery in MULTI6 draft-arkko-multi6dt-failure-detection-00.txt Multi6 Design Team -- Jari Arkko, Marcelo Bagnulo,
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
Next Step In Signaling (NSIS) and Internet Routing Dynamics Charles Shen and Henning Columbia University in the City of New York Internet.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
1 MPLS Architecture. 2 MPLS Network Model MPLS LSR = Label Switched Router LER = Label Edge Router LER LSR LER LSR IP MPLS IP Internet LSR.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
1 Introduction on the Architecture of End to End Multihoming Masataka Ohta Tokyo Institute of Technology
Host Identity Protocol
Made with OpenOffice.org 1 TCP Multi-Home Options Arifumi Matsumoto Graduate School of Informatics, Kyoto University, Japan
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Exploring the Packet Delivery Process Chapter
An ID/locator split architecture for future networks Ved P. Kafle, Hideki Otsuki, and Masugi Inoue, National Institute of Information and Communications.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
1 November 2006 in Dagstuhl, Germany
Logical Interface Overview Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital Notice:
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
GBUTtem 机密 此报告仅供 NGN 实验室内部使用。未经 NGN 实验室的书面许可,其它任 何机构不得擅自传阅、引用或复制。 sando 09/10/2005 Site-Multihoming over IPv6.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
Multi6 interim meeting agenda Chairs: Brian Carpenter, Kurt Lindqvist 1.IPR reminder, logistics, agenda bashing 2.Charter review 3.draft-lear-multi6-things-to-think-about-03.txt.
4.1.4 multi-homing.
1.0 SIGTRAN protocol. Objectives SIGTRAN application in R4 network SIGTRAN protocol structure and message introduction SIGTRAN signaling flow Upon completion.
IPv6 Site-Local Discussion Bob Hinden & Margaret Wasserman IETF 56 San Francisco March 2003.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
NSIS and Mobility Layer Split & Framework Issues Robert Hancock NSIS Interim Meeting – Columbia University February 2003.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Uni Innsbruck Informatik th IETF, PMTUD WG: Path MTU Discovery Using Options draft-welzl-pmtud-options-01.txt Michael Welzl
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
HIP-Based NAT Traversal in P2P-Environments
Requirements for LER Forwarding of IPv4 Option Packets
IPv6-based Multihoming Standardization Activities April, 2008
4.1.5 multi-homing.
Ingress Filtering, Site Multihoming, and Source Address Selection
6TSCH Webex 06/21/2013.
The Reliable Server Pooling Framework
Hubs Hubs are essentially physical-layer repeaters:
Point to Point Data Link Control
Who Are You? Identity and Location in IP Geoff Huston APNIC.
Hubs Hubs are essentially physical-layer repeaters:
Multi-addressed Multipath TCP
ID / LOC Split - Basic Approach
An Update on Multihoming in IPv6 Report on IETF Activity
1 Multi-Protocol Label Switching (MPLS). 2 MPLS Overview A forwarding scheme designed to speed up IP packet forwarding (RFC 3031) Idea: use a fixed length.
Presentation transcript:

Shim6 Architecture Geoff Huston IETF-63 August 2005

Background draft-ietf-multi6-architecture-04.txt (RFC publication queue)  general description of multi-homing objectives  consideration of major types of approaches  consideration of various types of identity choices and their implications  generic functional decomposition

General Questions How is a session/equivalence state established?  Upper/lower level split  Initial packet exchange  Capability negotiation Re-Homing Triggers  Per session?  Per host? Definition of Identity Equivalence State Locator Selections Session/equivalence state removal

SHIM6 Architecture draft-ietf-shim6-arch-00.txt Initial draft – incomplete  Endpoint Identity considerations  Functional decomposition  To Add (?) Equivalence State definition Design Trade-offs

SHIM6 ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst = Loc(B) SHIM MAPPING Identity Locator

Where is the SHIM? TCPUDPDCCP Transport Protocols IP Endpoint Sublayer AHESPFrag/Reassembly Destination Options Multi6 SHIM IP Routing …

What’s a “ULID”? Upper Layer IDentifier  A selection from the set of locators associated with an endpoint It’s (probably) a viable locator It’s drawn from a structured space (reverse mappable) Its better if it were a unique (deterministic) selection for each host (to be clarified) Its useable in a referral context within and between hosts Its semi-persistent

Turning on SHIM6 The initial SHIM6 state for a ULID pair is the null mapping function (no shim mapping and no locator equivalence set) Subsequent capability negotiation to determine host- paired SHIM6 capability Exchange of current Locator Sets SHIM mapping installed on each endpoint at the IP layer  ULID pair to current Locator pair

Maintaining State Detecting network failure (How does a host know that its time to use a different source and/or destination locator?) (More work needed here)  Single per-endpoint state vs per session state  Heartbeat within the session  Shim heartbeat  Modified transport protocol to trigger locator change  Host / Router interaction to trigger locator change  Application timeframe vs network timeframe  Failure during session startup and failure following session establishment

Maintaining State Locator Failure Triggers  Possible triggers include failure of upper level keepalive signal to the SHIM layer, explicit trigger from upper level, ICMP error, explicit SHIM level reachability failure Any or defined subset?  Re-Homing may involve exhaustive pair exploration to establish a new viable locator pair Reactive or Continuous Probe?  Signal upper level protocol of path state change “Active” end state change procedure “Passive” end state change procedure

Removing State No explicit upper level protocol trigger  Use state timeout to remove stale SHIM mapping information ( The entire area of vertical signalling in the host protocol stack requires further consideration)

Some Open Issues Integration of use of HBAs and CGAs with SHIM6  In particular dynamic vs static locator set management SHIM6 capability negotiation and locator set exchange  Protocol analysis required Explicit packet signals for triggering SHIM mapping on incoming packets  How should you tell an incoming SHIM packet vs a non-SHIM packet? Interaction with site exit routers  Not defined as yet

Open Issues (2) ULID selection  How deterministic should this be? DNS interaction Adds and Wdls from locator pool Per-transport locator failure triggers  i.e. per transport vs per ULID pair SHIM state?

Common Issues Network layer protocol element  How do you know a session is completed? The concept of session establishment and teardown is a transport concept, not an IP level concept  What do you need to do to bootstrap? Are there ‘distinguished’ locators that you always need to use to get a session up?

Common Issues Session Persistence  Use one locator as the “home” locator and encapsulate the packet with alternative locators  Set up the session with a set of locators and have transport protocol maintain the session across the locator set Optionally delay the locator binding, or allow the peer dynamic change of the locator pool  Use a new peering based on an identity protocol element and allow locators to be associated with the session identity

Common Issues Identity / Locator Binding domain (Equivalence Set)  Is the binding maintained per session? In which case multiple sessions with the same endpoints need to maintain parallel bindings  Is the binding shared across sessions? In which case how do you know when to discard a binding set?

Common Issues Bilateral peer applications vs multi-party applications  What changes for 3 or more parties to a protocol exchange? Application hand-over and referral  How does the remote party identify the multi- homed party for third party referrals?

Next Steps Review SHIM6 contributions Solicit explicit answers to open issues from document editors Submit -01 draft for WG Review