draft-forwarding-label-ccn- 01.txt



Similar documents
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

ICN based Scalable Video Conferencing on Virtual Edge Service Routers (VSER) Platform

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

ICN-IoT and its Evaluation

Internetworking and Internet-1. Global Addresses

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Florian Liers, Thomas Volkert, Andreas Mitschele-Thiel

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Locator/ID Separation Protocol: do we really need such a thing?

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

Network Infrastructure Under Siege

How To Provide Qos Based Routing In The Internet

TORA : Temporally Ordered Routing Algorithm

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

What is VLAN Routing?

The Benefits. Locator/ID Separation

- Multiprotocol Label Switching -

IPv6 over IPv4/MPLS Networks: The 6PE approach

Static IP Routing and Aggregation Exercises

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

NDN Technical Memo: NDNS, NDN based Domain Name System

Link-State Routing Protocols

SANE: A Protection Architecture For Enterprise Networks

HP Networking BGP and MPLS technology training

Using OSPF in an MPLS VPN Environment

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

Multidomain Network Based on Programmable Networks: Security Architecture

DG Forwarding Algorithm

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

Telematics. 9th Tutorial - IP Model, IPv6, Routing

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

Virtual Leased Lines - Martini

TRILL for Data Center Networks

The Case for Source Address Routing in Multihoming Sites

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

OF-CCN: CCN over OpenFlow. NDN hands-on Workshop Junho Suh ( jhsuh@mmlab.snu.ac.kr)

How To Build A Policy Aware Switching Layer For Data Center Data Center Servers

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

A Link Load Balancing Solution for Multi-Homed Networks

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

Facility Usage Scenarios

Differentiated Services

MPLS Architecture for evaluating end-to-end delivery

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Flexible SDN Transport Networks With Optical Circuit Switching

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Internet Packets. Forwarding Datagrams

Neighbour Discovery in IPv6

Realtime Multi-party Video Conferencing Service over Information Centric Networks

Border Gateway Protocol BGP4 (2)

IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt

APNIC elearning: BGP Basics. Contact: erou03_v1.0

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

FileSync/NDN: Peer-to-Peer File Sync over Named Data Networking

IP Switching: Issues and Alternatives

The Complete IS-IS Routing Protocol

NDSS: A Named Data Storage System

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

Internet Engineering Task Force (IETF) Request for Comments: 6422 Updates: 3315 Category: Standards Track ISSN: December 2011

Three Key Design Considerations of IP Video Surveillance Systems

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Configuring a Load-Balancing Scheme

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

MPLS Concepts. Overview. Objectives

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CS 348: Computer Networks. - DNS; 22 nd Oct Instructor: Sridhar Iyer IIT Bombay

References and Requirements for CPE Architectures for Data Access

Introduction to Service Oriented Architectures (SOA)

Administrative Distance

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

CS268 Exam Solutions. 1) End-to-End (20 pts)

Chapter 4. Distance Vector Routing Protocols

ITL BULLETIN FOR JANUARY 2011

Transcription:

draft-forwarding-label-ccn- 01.txt Ravi Ravindran and Asit Chakraborti Huawei (IETF/ICNRG, Yokohama, 94) [ravi.ravindran@huawei.com] [asit.chakraborti@huawei.com]

Agenda Draft Objectives Terminology Why ID/Locator Split in CCN FL Object Management FIB Processing PIT/CS Processing Multi-Domain Considerations Security Consideration Use case scenarios Next Steps

Draft Objectives Second iteration of this draft. Proposes to have ID/Locator Split in CCN. The locator is called Forwarding-Label which can be modified in the infrastructure. Could be used by for different purposes: Mobility Opportunistic Indirections (off-path caching) Service Affinity (Edge Computing) In-Network Computing (e.g. NFN) Inter-domain Routing.. The draft talks about FL management, PIT/CS Processing, Multi-Domain Scenario Handling, Usage Scenarios. Also also opens many questions around managing two

Terminology Interesting discussion during the Interim meeting Don t want to use these terminologies because they meant something in the past. For our discussion ID=Locator=Name Name := Hierarchically Structured Identifier Should this be Routable? CCN1.0 or NDN Name definition doesn t require Routeability We should eventually address, non Routable names too, e.g. selfcertified ID, e.g. M2M communications. For this discussion we assume, ID are names managed by Applications and Locators are Names managed by the infrastructure provider, hence topologically relevant. They are Routable Names in a given context. ID :/disney/video/. Locator : /att/santaclara/..

ID/Locator Split in CCN Why do we need ID/locator Split? Management: ID and Locator belong to different administrative authorities, and do not want to be influenced by each other. Security/Turst : Security/Trust over IDs independent of the network requirements. Flexibility : In the context of CCN, this it to aid dynamic scenarios like content replication, mobility, migration, multihoming etc. Scalability : Routing on IDs (even though aggregateable) is challenging. Better for core networks to only deal with locator

Advantages CCN Routing on IDs A single name space for both network and applications. IDs are contextual, hence several services can be invoked: Security, Policy Based Routing, Strategy layer forwarding Disadvantages Infrastructure provider may not want to work with Application IDs. Large name space - always growing ID Dynamism affect its stability: Replication, Migration, Mobility etc.

We see there are considerable benefits with Challenges too, so these have to be studied further. CCN Routing on ID+Locators Advantages Achieves Management, Flexibility, Scalability, Security requirements. The network can apply name based routing only at the edges routers, but the core can be based on locators only. Core Network independent of application name dynamism Edge networks can be Name based Disadvantages Explicit guidelines on handling two names in the Interest/Content Packet. Mapping required from names to locators, either managed by the application or by the network or both. Forwarding looses contextual operation that it can derive from names, e.g. strategy forwarding features. Open to malicious acts, e.g. cache poisoning, but primarily a trust concern.

FL Object Encoding As a Optional hop-by-hop Header TLV. CCN Fixed Header FL-Object Optional Hop-by- Hop Header TLVs Interest/Data Message

[1] Afanasyev, A., "Map-and-Encap for Scaling NDN Routing., NDN Technical Report ndn-004-02, 2015. FL-Object Object embeds three kinds of information: LID : Locator ID (T_LID_NAME): AS-ID/Router- ID etc FL-Metadata (optional) : Service specific metadata, to aid FL processing in a given context, e.g. as in Mobility, In-Network Computing etc. FL-Security (optional) : ID to LID binding Security information, similar to LINK-Object [1]

FL Object Insertion FL can be inserted by applications or the network. FL insertion by the network can be policy based Policy based actions on the names, Interest Marking etc. For Applications this may be a default choice, or based on feedback from the network. Depending on the trust context, networks may or may not choose to trust these suggestions. FL insertions by applications may be subjected to security validation. Validation is between ID and the LID The infrastructure may choose to only accept FL Object from trusted applications, while ignoring or explicitly removing the rest.

FL Object Swapping/Termination FL objects may be swapped at designated points in the network. FL can be terminated by designated points in the network Edge Service Routers, Middlebox, Border Routers Here the FL matches one of the LocatorID of the forwarder A node may have multiple locator names. e.g. /att/santaclara or /att/santaclara/poa Further service logic is applied, and the FL can be replaced by another FL Object Else Name based routing may ensue

FIB Processing Depends on the use of FL Object, hence multiple possibilities. Case 1: the FL can always given priority over ID in the Interest, assuming they are always trusted in-directions. Case 2: forwarder could always prioritize ID based routing, and if that fails, use the FL for forwarding Case 3: If policy based routing is involved, the ID could be used to decide the FL insertion, while the core nodes always uses 1 or 2. Then we discuss the FIB processing for case 1. Validate FL Object if it is not trusted If lookup(lid) is a Node ID Then invoke appropriate service logic else if it results in a next-hop Forward it.

PIT Processing The question here is if we need to have FL Object state in the PIT or the CS? Depends on the purpose of the FL Object Case 1: If it is simply a in-direction directive Case 2: Consumer imply more meaning on the ID and FL Object. Case 1: FL-Objects purpose is to guide Interest messages to improve routing efficiency and offer flexibility. Simple policy is not to have any FL state in the PIT In certain situations, for the same Interest Name and different FL aggregation will not allow those Interests to be forwarded In this case, the PIT will require saving the FL Object state Is it only LID or the whole FL Object? Case 2: Consumers implies a tight binding between ID and the FL Object. In this case, PIT saves the whole FL Object, which is also returned with the CO. In this case, if the FL Object is swapped, then the it should be replaced by appropriate FL Object in the return path.

CS Processing Follows the PIT processing discussion. CO may carry the FL Object only if there is a such an expectation from the Consumers.

FL Security Depends on the purpose it will be used for. Security Considerations: 1) Malicious publisher injecting incorrect mapping between ID and the LID 2) Malicious interceptor between the node seeking mapping and the mapping system 3) Compromised intermediate router maliciously changing the FL 4) Untrusted application may inject invalid FL Object 1&2 are issues addressed in other protocols like DNS-SEC, LISP-SEC 3 requires new security mechanisms to enable a domain level trust infrastructure 4 is policy driven, require authentication of the consumer and the ID/LID binding, more lightweight mechanisms can be studied.

FL Object Application Scenarios Producer Mobility: Late Binding Edge Routers/PoA late binds Interest to its current location Using semantic names, can be used to realize a Decentralized Name Resolution Manifests Contains indirections to CO. Here FL Object can contain the LID, while CO has the immutable name. Related to discussion around Nameless CO. Routing Optimization Application controllers in the domain can apply policy based routing based on service names. So request for a CO can be handled in a specialized manner. Inter-domain Routing Routing scalability problem is handled, as LID is a bounded name space, in DFZ it will bound it O(#of AS).

Evolving the draft Clarification of Terminologies More details on FL Management/Processing Security Considerations Detailing use case scenarios Feedback is welcome..anytime.

Thank You and Questions