LISP-CONS A Mapping Database Service



Similar documents
QuickTime and a decompressor are needed to see this picture. Dave Meyer & Dino Farinacci

Scaling the Internet with LISP

IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2. A Thesis by.

LISP Functional Overview

Multihoming: An Overview

A Review of IPv6 Multihoming Solutions

Network-Based Protocol Innovations in Secure Encryption Environments

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Locator/ID Separation Protocol: do we really need such a thing?

Inter-Domain Multicast: Edge Based Trees

Implementing a BGP-Free ISP Core with LISP

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Multihoming Management for Future Networks

HP Networking BGP and MPLS technology training

MPLS Implementation MPLS VPN

Strategies for Getting Started with IPv6

LISP & NERD: An application person s adventure in routing

Implementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland

IPv6 over IPv4/MPLS Networks: The 6PE approach

Dynamics of Prefix Usage at an Edge Router

Traffic Engineering for Pan-African Research and Education Network: Software Defined Internet exchange Points

Network Level Multihoming and BGP Challenges

Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric

The Benefits. Locator/ID Separation

Simplify Your Route to the Internet:

Tomás P. de Miguel DIT-UPM. dit UPM

Preserve IP Addresses During Data Center Migration

draft-forwarding-label-ccn- 01.txt

Implementing the Locator/ID Separation Protocol: Design and Experience

LISP A Multi-Homing and Mobility Solution for ATN using IPv6

Towards A New Internet Routing Architecture: Arguments for Separating Edges from Transit Core

Cisco Systems August 2009

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

In-band Network Telemetry (INT) Mukesh Hira, VMware Naga Katta, Princeton University

Telematics. 9th Tutorial - IP Model, IPv6, Routing

Inter-domain Routing. Outline. Border Gateway Protocol

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Definition. A Historical Example

Introduction to Mobile IPv6

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Introducing Basic MPLS Concepts

CLASSLESS INTER DOMAIN ROUTING - CIDR

Introduction to The Internet

Using LISP for Secure Hybrid Cloud Extension

Facility Usage Scenarios

Introduction to The Internet. ISP/IXP Workshops

DD2491 p Load balancing BGP. Johan Nicklasson KTHNOC/NADA

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

A Compact Routing based Mapping System for the Locator/ID Separation Protocol (LISP)

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Neighbour Discovery in IPv6

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

Internet Routing: Separating Customers from Providers

IPv6 Potential Routing Table Size

Efficient Virtual Machine Mobility in Cloud Computing

Oblivious DDoS Mitigation with Locator/ID Separation Protocol

The Case for Source Address Routing in Multihoming Sites

Protocol Data Units and Encapsulation

Internet Packets. Forwarding Datagrams

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

Network Working Group Request for Comments: March 1999

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

We Are HERE! Subne\ng

Cross-layer Cooperation to Boost Multipath TCP Performance in Cloud Networks

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Introduction to Routing

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

Cisco IOS Flexible NetFlow Technology

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research

Software Defined Networking (SDN) - Open Flow

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Redundancy & the Netnod Internet Exchange Points

Deploying IPv6 Service Across Local IPv4 Access Networks

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Ceres Messaging and Routing Model

IPv6 Tunneling Over IPV4

A BETTER INTERNET WITHOUT IP ADDRESSES. Craig A. Shue

Lecture 17 - Network Security

Border Gateway Protocol (BGP)

2015 Spring Technical Forum Proceedings

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

How To Make A Network Secure

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January Using BGP topology information for DNS RR sorting

Service Delivery Automation in IPv6 Networks

Network Forensics in a Clean-Slate Internet Architecture

Interconnecting IPv6 Domains Using Tunnels

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction


WAN Traffic Management with PowerLink Pro100

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Extending Networking to Fit the Cloud

Transcription:

A Mapping Database Service David Meyer, Dino Farinacci, Vince Fuller, Darrel Lewis, Scott Brim, Noel Chiappa October, 2007 http://www.1-4-5.net/~dmm/talks/nanog41/cons

Agenda Brief Intro Design Considerations Brief Definitions How CONS Works What We ve Learned Questions/Comments?

What is LISP? Locator/ID Separation Protocol (LISP) draft-farinacci-lisp-03.txt Creates two namespaces: IDs and Locators Why do this? Improve site multihoming Improve ISP Traffic Engineering Reduce site renumbering costs Reduce size of core routing tables PI for all? Some form of mobility?

Locator/ID Split? The idea here is that the IP address is overloaded It encodes both location in the topology (locator) and the identity of the user of the address The locator role is used by the routing system The identity role is used by upper layer protocols e.g., TCP pseudo-header Problem: Since we want locators to aggregate topologically, and since identifiers are usually allocated on organizational boundaries, it is difficult (impossible?) to get one number space to efficiently serve both purposes. There are other issues as well, including The expected lifetime of a name (don t want to reconfigure...) Who has control over the name(s)?...

Locator/ID Split? One solution: split the functions -- This is at the heart of the Locator/ID split idea So how might we achieve this? Architecturally, we might try to Jack-up the existing IP layer Uses IDs Host Stack Uses Locators New IP Layer

Implementing a Locator/ID Split There are two main ways to engineer a Loc/ID split Rewriting If you have enough address space (e.g., IPv6), you could use the lower 64 bits as an identifier, and the upper 64 bits as a locator, and rewrite the locator at the border This is the basis of O Dell s 8+8/GSE scheme Credit to Bob Smart and Dave Clark on this one too Map-n-Encap You could also put another header on the packet, and make the inner header carry the IDs and the outer header carry the locators LISP is an instance of this approach Credit to Bob Hinden & Steve Deering on map-n-encap...

Loc/ID Split in practice IPv6: 2001:0102:0304:0506:1111:2222:3333:4444 Locator ID IPv4: 209.131.36.158.10.0.0.1 Locator ID

LISP is a Jack-Up Uses IDs Host Stack Uses Locators Map-n-Encap

LISP Parts Data-plane Design for encapsulation and tunnel router placement Design for locator reachability Data triggered mapping service Control-plane Design for a scalable mapping service This talk is about LISP Control-planes

LISP Variants LISP 1 Routable IDs over existing topology to probe for mapping reply LISP 1.5 Routable IDs over another topology to probe for mapping reply LISP 2 EIDs are not routable and mappings are in DNS LISP 3 Data-Plane Mapping Control-Plane Mapping EIDs are not routable, mappings obtained using new mechanisms (DHTs perhaps,, NERD, APT)

Quick LISP Terms Endpoint Identifiers (EIDs) IDs for host-use and only routeable in source and dest sites Can be out of PA or PI address space Routing Locators (RLOCs) Routable addresses out of PA address space Ingress Tunnel Router (ITR) Device in source-site that prepends LISP header with RLOCs Egress Tunnel Router (ETR) Device in destination-site that strips LISP header

LISP Control-Plane Build a large distributed mapping database service Scalability paramount to solution How to scale:(state * rate) If both factors large, we have a problem state will be large (O(10 10 ) hosts) Aggregate EIDs into EID-prefixes to reduce state So rate must be small Make mappings have subscription time frequency i.e., we expect such mappings to change with low frequency And no reachibility information in the mapping database

Some Questions for a LISP Control-Plane Where to put the mappings? How to find the mappings? Is it a push model? Is it a pull model? Do you use secondary storage? Do you use a cache? What about securing the mapping entries? What about protecting infrastructure from DOSattacks? What about controlling packet loss and latency?

LISP Control-Plane Push doesn t scale, caching doesn t scale, pick one

is a hybrid approach Push EID-prefixes (but not mappings) at upper levels of hierarchy Pull from lower levels of hierarchy Mappings stored at lower-levels Requests get to where the mappings are Replies are returned This is a crucial point as we ll see in a bit Getting to the lower-levels via pushing of EID-prefixes is a mapping system for LISP 3.0

We can get good EID-prefix aggregation If hierarchy based on EID-prefix allocation and not topology Then build a logical topology based on the EID-prefix allocation Map-Requests routed through logical hierarchy Key is the EID Map-Reply returned to originator With mapping record {EID-prefix, RLOC-set}

Network Elements Content Access Routers (CARs) Querying-CARs Generate Map-Requests on behalf of ITRs Returns answers to ITRs Answering-CARs Hold authoritative mappings at level-0 of hierarchy Aggregate only EID-prefix upwards Respond with Map-Replies Content Distribution Routers (CDRs) Push around EID-prefixes with level-1 to n of hierarchy Aggregate EID-prefix upwards Advertise EID-prefixes in a mesh topology within level Forward Map-Requests and Map-Replies

-- Peering \\ All peering on TCP HMAC protected connections CDR CDR Mesh CDR Sibling Peer CDR CDR Level-1 Within a CDR-mesh, EID-prefixes get seq num pushed with PV lists Parent Peer [ EID-prefix agg ] acar Level-0 Child Peer ETR

No EID-Prefix within mesh, forward to parent peer No mapping cached,forward to parent peer Map-Request 1.1.1.1 Here s s how it works Take shortest path to 1.0.0.0/8 CDR CDR Level-n CDR Mesh CDR Mesh CDR Mesh CDR CDR Level-1 CDR CDR CDR CDR Map-Request 1.1.1.1 Legend: { } : mapping entry [ ] : EID aggregate : mapping table Has morespecific entry downward [ 1.0.0.0/8 ] [ 1.1.0.0/16 ] qcar qcar qcar qcar Level-0 qcar acar acar qcar Map-Request 1.1.1.1 ITR ITR CAR has mapping, returns Map-Reply to orig CAR EID address { 1.1.1.0/24: L1,L2 } { 1.1.2.0/24: L11,L22 } ETR ETR { 1.1.1.0/24: L1,L2 } { 1.1.2.0/24: L11,L22 }

What We ve Learned We wanted to optimize aggregatability of EID prefixes That led to the design in which only EID prefixes were pushed around at the higher levels (but not the mappings themselves) We were concerned about the rate*state product However, some SPs articulated another dimension Latency So you have to tradeoff rate, state, and latency If you push, you wind up with the whole database in network elements (state) If you pull, you incur latency If you try to do mobility, you get lots of updates (rate)

What We ve Learned Current thinking is that a different hybrid approach might be most feasible Push the whole mapping table around in the CDR level ITRs pull mappings from the CAR level This has a few nice properties: You can get the whole mapping table If you happen to want it Latency is reduced because you don t have to traverse the whole hierarchy to retrieve the mappings

Drafts LISP draft-farinacci-lisp-03.txt CONS draft-meyer-lisp-cons-02.txt

Questions/Comments? Thanks!