Locator/ID Separation Protocol: do we really need such a thing?

Similar documents
The Benefits. Locator/ID Separation

Multihoming: An Overview

A Review of IPv6 Multihoming Solutions

Simplify Your Route to the Internet:

Introducing Basic MPLS Concepts

draft-forwarding-label-ccn- 01.txt

Implementing a BGP-Free ISP Core with LISP

Traffic Engineering for Pan-African Research and Education Network: Software Defined Internet exchange Points

CLASSLESS INTER DOMAIN ROUTING - CIDR

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

Scaling the Internet with LISP

Network Infrastructure Under Siege


A BETTER INTERNET WITHOUT IP ADDRESSES. Craig A. Shue

Dynamics of Prefix Usage at an Edge Router

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing

LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System

Using LISP for Secure Hybrid Cloud Extension

Traffic & Peering Analysis

MOBILE VIDEO WITH MOBILE IPv6

Multihoming Management for Future Networks

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Internet Protocol Address

Lecture 18: Border Gateway Protocol"

Strategies for Getting Started with IPv6

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Network-Based Protocol Innovations in Secure Encryption Environments

LISP Functional Overview

How To Understand The Power Of Icdn

IPv6, Perspective from small to medium ISP

IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2. A Thesis by.

A PKI For IDR Public Key Infrastructure and Number Resource Certification

VPN. Date: 4/15/2004 By: Heena Patel

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Address Scheme Planning for an ISP backbone Network

VPN Technologies: Definitions and Requirements

IPv6 over IPv4/MPLS Networks: The 6PE approach

Network Level Multihoming and BGP Challenges

Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice

Table of Contents. Cisco IP Addressing and Subnetting for New Users

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Building MPLS VPNs with QoS Routing Capability i

ICS 351: Today's plan

The Complete IS-IS Routing Protocol

Group Encrypted Transport VPN

Load balancing and traffic control in BGP

LISP & NERD: An application person s adventure in routing

Enterprise Network Simulation Using MPLS- BGP

- Multiprotocol Label Switching -

Oblivious DDoS Mitigation with Locator/ID Separation Protocol

IP Addressing Introductory material.

Introduction to The Internet

Load balancing and traffic control in BGP

APNIC elearning: BGP Basics. Contact: erou03_v1.0

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

SDN CONTROLLER. Emil Gągała. PLNOG, , Kraków

Module 12 Multihoming to the Same ISP

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

E : Internet Routing

Introduction to The Internet. ISP/IXP Workshops

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015

Telematics. 9th Tutorial - IP Model, IPv6, Routing

Course Contents CCNP (CISco certified network professional)

Building Nameserver Clusters with Free Software

Implementing Object Tracking on Cisco IOS XR Software

What is SDN all about?

Top IT Pain Points: Addressing the bandwidth issues with Ecessa solutions

Customized BGP Route Selection Using BGP/MPLS VPNs

The Case for Source Address Routing in Multihoming Sites

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

Mobility Management Framework in Software Defined Networks

Internet inter-as routing: BGP

How To Understand The Power Of The Internet

ETHEL THE AARDVARK GOES BGP ROUTING

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Transcription:

Locator/ID Separation Protocol: do we really need such a thing? GBR'11 - Beyond Networking Luigi Iannone Senior Research Scientist Deutsche Telekom Laboratories The Internet as we know it?

Who remembers where each of us is working? There is a difference between who we are (ID) and where we are (location in a certain context) L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 2

Who remembers where Christophe is working? We tend to remember (cache) where (location) someone (ID) is ( communication ) when we have frequent contact L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 3

What does it mean? We do not keep detailed contact information of everybody but we are able to locate people we want to communicate with. It scales L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 4

Anybody remembers resolv.txt? Simple Proactive. but turned out to be a nightmare to maintain! An then came on-demand DNS! L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 5

Where am I heading? Internet Routing & Address Infrastructure is a two-tier proactive communist system designed for single connected end-hosts! L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 6

The two-tier Architecture Do you speak BGP? Internet ( DFZ ) ASx ASy L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 7

Designed for single-connected end-hosts AS X ASWiF i AS Y ASG Internet AS4 G That's why we designed Mobile IP L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 8

Communism... People are the State, the State is the people Rekhter s Law Addressing can follow topology or topology can follow addressing. Choose one. L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 9

Proactively tell everything to everybody... 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 10

The BGP s FIB inflation problem 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html Peak Prefix Update Rate per Second IPv4 IPv6 BGP Forwarding Information Base (FIB) and Churn Explosion: PI (Provider Independent) prefix Churn can have peaks of thousands per assignment seconds Multi-homing Churn increases the need processing Traffic-Engineering power... L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 11

.. and some of the reasons! Security: Remember the youtube incident? Big CDNs de-aggregate to avoid prefix hijacking Moore s Law The number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years True for high-volume productions, not for low-volume highly specialized hardware like routers Rekhter s Law Addressing can follow topology or topology can follow addressing. Choose one. Due to: Overloaded IP Address Semantic The single connection design of the Internet L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 12

Is the Sky falling? 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html Let s be clear: There is no hard scaling limit We need: Improve Scalability ( Internet Reduce OpEx (make a cheaper L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 13

More Formally: Internet s Scaling Issues It is commonly recognized that today s Internet routing and addressing system is facing serious scaling problems. D. Meyer, L. Zhang, K. Fall, Report from IAB Workshop on Routing and Addressing, RFC 4984, IETF, September 2007. L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 14

After more than two years of discussion at the IRTF (Internet Research Task Force)... Along with a plethora of proposals: ( LISP ) Locator/ID Separation Protocol ( RANGI ) Routing Architecture for the Next Generation Internet ( Ivip ) Internet Vastly Improved Plumbing ( hipv4 ) Hierarchical IPv4 Framework Name Overlay (NOL) Service for Scalable Internet Routing ( CRM ) Compact Routing in a Locator Identifier Mapping System ( LMS ) Layered Mapping System Two-Phased Mapping ( GLI-Split ) Global Locator, Local Locator, and Identifier Split ( TIDR ) Tunneled Inter-Domain Routing ( ILNP ) Identifier-Locator Network Protocol ( EEMDP ) Enhanced Efficiency of Mapping Distribution protocols in Map-and-Encap Schemes Evolution The Research Group has rough consensus that separating identity from location is desirable and technically feasible. However, the Research Group does NOT have consensus on the best engineering approach to such an identity/location split. Name-Based Sockets ( IRON-RANGER ) Routing and Addressing in Networks with Global Enterprise Recursion ( HAIR ) Hierarchical Architecture for Internet Routing From RFC 6115: Recommendation for a Routing Architecture L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 15

Locator/ID Separation in one Slide ( LISP ) Map & Encap with Locator/ID Separation Protocol Internet RLOC 2 EIDx RLOC 1 EIDy ASx ASy RLOC 1 EIDx RLOC 2 EIDy EIDx RLOC 2 RLOC 2 EIDx EIDy EIDx EIDy Bindings between ID and Locators: Mappings EIDy EIDx EIDy RLOC 1 EIDx RLOC 1 EIDy RLOC 2 EIDx RLOC 2 EIDy L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 16

So... do we really need it? L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 17

Well... it helps alleviating some issues FIB: ( Zone shrunk since stub AS do not inject anything in the DFZ (Default Free PI Addresses: Just a matter of changing RLOCs Multi-Homing: Just a list of RLOCs TE: Just a matter of giving priorities to RLOCs Churn: Flapping Edge AS are not anymore in the DFZ Additional Benefits: Mobility Support Path Diversity L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 18

But it is much more... L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 19

1. We can use it for Mobility in Mesh Networks... Map-Server Bob: WMR1 Alice: WMR3 Alice: WMR4 Bob: WMR1 WMR 5 WMR 6 WMR 4 WMR 1 WMR 2 WMR 3 Bob: WMR1 Bob Alice L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 20

2. We can use it in small devices like smartphones.. Flow-Optimizer Applications Applications use the EID only (Loopback ( Interface Cisco - UPC Linux Implementation: http://lispmob.org/ Dynamic IP (Locator) assigned by your 4G Service Provider ( Locator ) Dynamic IP assigned by your WiFi Service Provider Smart TE Manager LISP 4G if WiFi if Loopback Traffic goes through LISP LISP tunnels through appropriate interface ( EID ) Static IP assigned by your MO Service Provider L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 21

3. Can we finally have seamless connectivity? AS X ASWiF i AS Y ASG Internet AS4 G L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 22

4. WiFi Offloading AS X ASWiF i AS Y ASG Internet AS4 G What to offload? When to offload? How to offload? What support to put in the network? L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 23

5. MOaaS: Mobile Offloading As A Service http://newsroom.cisco.com/feature-content?type=webcontent&articleid=422286 AS X ASWiF i AS Y ASG Internet AS4 G Mobile Offload Service Provider: Third part connection manager on the smartphone Proxy in the network Tunnel in between L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 24

6. We can use it in Huge and Nano Data Centres Load balancing on VM Traffic Engineering WM mobility/migration ( distribution VPN (even for content L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 25

7. Can the Internet Architecture be recursive? Internet ( DFZ ) ASx ASy L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 26

Revolution through Evolution? From Divide and Conquer to Split and Scale? Open Research Issues: Mapping Distribution Design Gain know-how on loc/id split Mobility Traffic Engineering Scalability Data-Centers ( centers Set-top Boxes (nano data Source http://www.lisp4.net L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 27

?? /* */ L. Iannone - Deutsche Telekom Laboratories GBR 2011 - Beyond Networking 28