Locator/ID Separation Protocol: do we really need such a thing? GBR'11 - Beyond Networking Luigi Iannone Senior Research Scientist Deutsche Telekom Laboratories The Internet as we know it?
Who remembers where each of us is working? There is a difference between who we are (ID) and where we are (location in a certain context) L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 2
Who remembers where Christophe is working? We tend to remember (cache) where (location) someone (ID) is ( communication ) when we have frequent contact L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 3
What does it mean? We do not keep detailed contact information of everybody but we are able to locate people we want to communicate with. It scales L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 4
Anybody remembers resolv.txt? Simple Proactive. but turned out to be a nightmare to maintain! An then came on-demand DNS! L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 5
Where am I heading? Internet Routing & Address Infrastructure is a two-tier proactive communist system designed for single connected end-hosts! L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 6
The two-tier Architecture Do you speak BGP? Internet ( DFZ ) ASx ASy L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 7
Designed for single-connected end-hosts AS X ASWiF i AS Y ASG Internet AS4 G That's why we designed Mobile IP L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 8
Communism... People are the State, the State is the people Rekhter s Law Addressing can follow topology or topology can follow addressing. Choose one. L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 9
Proactively tell everything to everybody... 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 10
The BGP s FIB inflation problem 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html Peak Prefix Update Rate per Second IPv4 IPv6 BGP Forwarding Information Base (FIB) and Churn Explosion: PI (Provider Independent) prefix Churn can have peaks of thousands per assignment seconds Multi-homing Churn increases the need processing Traffic-Engineering power... L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 11
.. and some of the reasons! Security: Remember the youtube incident? Big CDNs de-aggregate to avoid prefix hijacking Moore s Law The number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years True for high-volume productions, not for low-volume highly specialized hardware like routers Rekhter s Law Addressing can follow topology or topology can follow addressing. Choose one. Due to: Overloaded IP Address Semantic The single connection design of the Internet L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 12
Is the Sky falling? 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html Let s be clear: There is no hard scaling limit We need: Improve Scalability ( Internet Reduce OpEx (make a cheaper L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 13
More Formally: Internet s Scaling Issues It is commonly recognized that today s Internet routing and addressing system is facing serious scaling problems. D. Meyer, L. Zhang, K. Fall, Report from IAB Workshop on Routing and Addressing, RFC 4984, IETF, September 2007. L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 14
After more than two years of discussion at the IRTF (Internet Research Task Force)... Along with a plethora of proposals: ( LISP ) Locator/ID Separation Protocol ( RANGI ) Routing Architecture for the Next Generation Internet ( Ivip ) Internet Vastly Improved Plumbing ( hipv4 ) Hierarchical IPv4 Framework Name Overlay (NOL) Service for Scalable Internet Routing ( CRM ) Compact Routing in a Locator Identifier Mapping System ( LMS ) Layered Mapping System Two-Phased Mapping ( GLI-Split ) Global Locator, Local Locator, and Identifier Split ( TIDR ) Tunneled Inter-Domain Routing ( ILNP ) Identifier-Locator Network Protocol ( EEMDP ) Enhanced Efficiency of Mapping Distribution protocols in Map-and-Encap Schemes Evolution The Research Group has rough consensus that separating identity from location is desirable and technically feasible. However, the Research Group does NOT have consensus on the best engineering approach to such an identity/location split. Name-Based Sockets ( IRON-RANGER ) Routing and Addressing in Networks with Global Enterprise Recursion ( HAIR ) Hierarchical Architecture for Internet Routing From RFC 6115: Recommendation for a Routing Architecture L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 15
Locator/ID Separation in one Slide ( LISP ) Map & Encap with Locator/ID Separation Protocol Internet RLOC 2 EIDx RLOC 1 EIDy ASx ASy RLOC 1 EIDx RLOC 2 EIDy EIDx RLOC 2 RLOC 2 EIDx EIDy EIDx EIDy Bindings between ID and Locators: Mappings EIDy EIDx EIDy RLOC 1 EIDx RLOC 1 EIDy RLOC 2 EIDx RLOC 2 EIDy L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 16
So... do we really need it? L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 17
Well... it helps alleviating some issues FIB: ( Zone shrunk since stub AS do not inject anything in the DFZ (Default Free PI Addresses: Just a matter of changing RLOCs Multi-Homing: Just a list of RLOCs TE: Just a matter of giving priorities to RLOCs Churn: Flapping Edge AS are not anymore in the DFZ Additional Benefits: Mobility Support Path Diversity L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 18
But it is much more... L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 19
1. We can use it for Mobility in Mesh Networks... Map-Server Bob: WMR1 Alice: WMR3 Alice: WMR4 Bob: WMR1 WMR 5 WMR 6 WMR 4 WMR 1 WMR 2 WMR 3 Bob: WMR1 Bob Alice L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 20
2. We can use it in small devices like smartphones.. Flow-Optimizer Applications Applications use the EID only (Loopback ( Interface Cisco - UPC Linux Implementation: http://lispmob.org/ Dynamic IP (Locator) assigned by your 4G Service Provider ( Locator ) Dynamic IP assigned by your WiFi Service Provider Smart TE Manager LISP 4G if WiFi if Loopback Traffic goes through LISP LISP tunnels through appropriate interface ( EID ) Static IP assigned by your MO Service Provider L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 21
3. Can we finally have seamless connectivity? AS X ASWiF i AS Y ASG Internet AS4 G L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 22
4. WiFi Offloading AS X ASWiF i AS Y ASG Internet AS4 G What to offload? When to offload? How to offload? What support to put in the network? L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 23
5. MOaaS: Mobile Offloading As A Service http://newsroom.cisco.com/feature-content?type=webcontent&articleid=422286 AS X ASWiF i AS Y ASG Internet AS4 G Mobile Offload Service Provider: Third part connection manager on the smartphone Proxy in the network Tunnel in between L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 24
6. We can use it in Huge and Nano Data Centres Load balancing on VM Traffic Engineering WM mobility/migration ( distribution VPN (even for content L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 25
7. Can the Internet Architecture be recursive? Internet ( DFZ ) ASx ASy L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 26
Revolution through Evolution? From Divide and Conquer to Split and Scale? Open Research Issues: Mapping Distribution Design Gain know-how on loc/id split Mobility Traffic Engineering Scalability Data-Centers ( centers Set-top Boxes (nano data Source http://www.lisp4.net L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 27
?? /* */ L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 28