ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst.

Slides:



Advertisements
Similar presentations
Who Are You? Geoff Huston APNIC Identity and Location in IP.
Advertisements

Approaches to Multi-Homing for IPv6 An Architectural View of IPv6 MultiHoming proposals Geoff Huston 2004.
Architectural Approaches to Multi-Homing for IPv6 A Walk-Through of draft-huston-multi6-architectures-00 Geoff Huston June 2004.
Identity and Locators in IPv6 IAB Meeting IETF 60 August 2004.
SHIM6 Update Geoff Huston Kurtis Lindqvist SHIM6 co-chairs.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
© Antônio M. Alberti 2011 Host Identification and Location Decoupling: A Comparison of Approaches Bruno Magalhães Martins Antônio Marcos Alberti.
Internet Area IPv6 Multi-Addressing, Locators and Paths.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Multihoming in IPV6 Habib Naderi Department of Computer Science University of Auckland.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 22 IPv6 (Based on material from Markus Hidell, KTH)
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
CSE331: Introduction to Networks and Security Lecture 8 Fall 2002.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
1 © 2005 Nokia mobike-transport.ppt/ MOBIKE Transport mode usage and issues Mohan Parthasarathy.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
Transition Mechanisms for Ipv6 Hosts and Routers RFC2893 By Michael Pfeiffer.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Networking. Protocol Stack Generally speaking, sending an message is equivalent to copying a file from sender to receiver.
IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Overview of SHIM6 Multihoming Protocol Fuad Bin Naser Std. No A presentation for CSE6806: Wireless & Mobile Communication Networks.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
Exploring the Packet Delivery Process Chapter
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
GBUTtem 机密 此报告仅供 NGN 实验室内部使用。未经 NGN 实验室的书面许可,其它任 何机构不得擅自传阅、引用或复制。 sando 09/10/2005 Site-Multihoming over IPv6.
SHIM6 Protocol Drafts Overview Geoff Huston, Marcelo Bagnulo, Erik Nordmark.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Shim6 Architecture Geoff Huston IETF-63 August 2005.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
INTERNET CONTROL MESSAGE PROTCOL. ICMP n allows router to send error or control messages to another router or host n provides communication between IP.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
Multi-addressed Multipath TCP draft-ford-mptcp-multiaddressed-02 Alan Ford Costin Raiciu, Mark Handley.
Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations (RFC 6324) Po-Kang Chen Oct 19,
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
HIP-Based NAT Traversal in P2P-Environments
Scaling the Network: Subnetting and Protocols
Introduction to Networks
Basic Router Troubleshooting
Lec 2: Protocols.
6TSCH Webex 06/21/2013.
Hubs Hubs are essentially physical-layer repeaters:
Point to Point Data Link Control
Hubs Hubs are essentially physical-layer repeaters:
Multi-addressed Multipath TCP
CS 457 – Lecture 10 Internetworking and IP
Internet Control Message Protocol (ICMP)
ID / LOC Split - Basic Approach
An Update on Multihoming in IPv6 Report on IETF Activity
How Our Customers Communicate With Us
Presentation transcript:

ID / LOC Split - Basic Approach Sender A Receiver B src = ULID(A) dst = ULID(B) src = ULID(A) dst = ULID(B) src = Loc(A) dst = Loc(B) src = Loc(A) dst = Loc(B) SHIM MAPPING Identity Locator

Where is the SHIM? TCPUDPDCCP Transport Protocols IP Endpoint Sublayer AHESPFrag/Reassembly Destination Options Multi6 SHIM IP Routing …

Whats a ULID? Upper Layer IDentifier A selection from the set of locators associated with an endpoint Its (probably) a viable locator Its drawn from a structured space (reverse mappable) Its better if it were a unique (deterministic) selection for each host Its useable in a referral context within and between hosts Its semi-persistent

Turning on SHIM6 The initial SHIM6 state for a ULID pair is the null map function Subsequent capability negotiation to determine SHIM6 capability Exchange of Locator Sets SHIM mapping installed ULID pair to current Locator pair

Maintaining State Locator failure triggers More work needed here. Possible triggers include failure of upper level keepalive signal to the SHIM layer, explicit trigger from upper level, ICMP error, explicit SHIM level reachability failure Re-Homing may involve exhaustive pair exploration to establish a new viable locator pair (More work needed here) Signal upper level protocol of path state change (More work needed here)

Removing State No explicit upper level protocol trigger Use state timeout to remove stale SHIM mapping information ( The entire area of vertical signalling in the host protocol stack requires further consideration)

Some Open Issues Integration of use of HBAs and CGAs with SHIM6 In particular dynamic vs static locator set management SHIM6 capability negotiation and locator set exchange Protocol analysis required Explicit packet signals for triggering SHIM mapping on incoming packets How should you tell an incoming SHIM packet vs a non- SHIM packet? Interaction with site exit routers Not defined as yet ULID selection How deterministic should this be? DNS interaction Adds and Wdls from locator pool Per-transport locator failure triggers i.e. per transport vs per ULID pair SHIM state?