One document matched: draft-xu-rangi-00.txt
Network Working Group Xiaohu Xu
Internet Draft Huawei
Intended status: Informational Raj Jain
Expires: September 2009 Washington Univ. in St. Louis
March 4, 2009
Routing Architecture for the Next Generation Internet (RANGI)
draft-xu-rangi-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the provisions
of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force
(IETF), its areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be
updated, replaced, or obsoleted by other documents at any time. It is
inappropriate to use Internet-Drafts as reference material or to cite them other
than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on September 4, 2009.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the document authors.
All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating
to IETF Documents in effect on the date of publication of this document
(http://trustee.ietf.org/license-info). Please review these documents carefully,
as they describe your rights and restrictions with respect to this document.
Abstract
IRTF Routing Research Group (RRG) is exploring a new routing and addressing
architecture to meet the challenges that current Internet is facing, especially in
terms of routing scalability. This internet draft describes a new routing and
Xu and Jain Expires September 4, 2009 [Page 1]
Internet-Draft A Transition Mechanism for RANGI March 2009
addressing architecture, called Routing Architecture for the Next Generation
Internet (RANGI) as a solution to the problems of scalability, mobility,
multihoming, and traffic engineering. RANGI is a hybrid proposal that combines and
enhances the ideas from several proposals particularly those based on
identifier/locator split approach. It introduces a hierarchical and cryptographic
host identifier and adopts a hierarchical routing mechanism to support routing
across multiple independent address spaces. To allow smooth transition from IPv4
to IPv6, it adopts an IPv6 address with an IPv4 embedded in the last four bytes as
locator. This also simplifies renumbering in case of change of service providers.
RANGI allows traffic engineering by allowing border routers to overwrite the
source addresses. It allows policy control on ID to address translation by having
a hierarchical resolution mechanism.
Table of Contents
1. Introduction............................................ 3
2. RANGI: Concepts and Definitions......................... 3
2.1. Administrative Domains and Locator Domains......... 3
2.2. Identifiers and Locators........................... 4
2.3. PI and PA locators................................. 4
2.4. Host Identifiers................................... 4
2.5. Host Locators...................................... 5
2.6. ID Sublayer........................................ 6
2.7. Packet Format...................................... 6
3. RANGI: Assumptions...................................... 8
4. RANGI: Architecture Description......................... 9
4.1. ID/Locator Mapping Resolution...................... 9
4.2. Routing and Forwarding System...................... 9
4.2.1. Host Behavior................................. 9
4.2.2. LDBR Behavior................................ 10
4.2.3. Non-LDBR Router Behavior..................... 10
4.2.4. Forwarding Procedure......................... 10
4.3. Multi-homing and Traffic Engineering.............. 12
4.4. Mobility.......................................... 14
5. Summary................................................ 14
6. Acronyms............................................... 15
7. Security Considerations................................ 15
8. IANA Considerations.................................... 16
9. Informative References ................................ 16
10. Acknowledgments....................................... 18
Xu and Jain Expires September 4, 2009 [Page 2]
Internet-Draft A Transition Mechanism for RANGI March 2009
1. Introduction
The Internet routing table size is growing at a rate which exceeds the speed of
the hardware improvement. This issue has drawn significant attention from both
industry and academia. After much discussion following the IAB Routing and
Addressing workshop [1] in Amsterdam, a common conclusion was reached that the
explosive growth in Internet routing table is caused mainly by the wide adoption
of multi-homing, traffic engineering and provider-independent addressing. The
underlying reason for the routing scalability issue is the overlapping semantics
of IP address which is used both as locator and identifier in current Internet.
This contextual overloading of IP address makes it impossible to renumber the
addresses in a topologically aggregatable way. This is the so-called routing
scalability issue.
At present, the IRTF Routing Research Group (RRG) is chartered to explore a new
routing and addressing architecture to meet those challenges that the current
Internet is facing, especially in scalability, mobility, multi-homing, and inter-
domain traffic engineering.
This internet draft describes a hybrid solution called Routing Architecture for
the Next Generation Internet (RANGI) that significantly enhances id/locator split
approaches. It introduces a hierarchical and cryptographic host identifier and
adopts a hierarchical routing mechanism to support routing across multiple
independent address spaces. RANGI's use of 128-bit host IDs (which also look like
IPv6 addresses) allows current IPv6 applications to run over RANGI. Using IPv4
addresses embedded in the IPv6 locators ease the transition from IPv4 to IPv6.
Traffic engineering and policy control is provided by allowing border routers to
overwrite the addresses in the outgoing packets.
It has recently become clear that hosts IDs have to be separated from their point
of attachment (addresses). In other words, the network consists of two tiers - -
hosts and infrastructure. We have generalized this to a multi-tier virtualizable
architecture where users and data form higher tiers of the architecture over the
host and infrastructure. We are designing a general architecture for this multi-
tiered next generation Internet [20-24]. RANGI as described here is limited to
just the bottom two tiers and applies to the current Internet
2. RANGI: Concepts and Definitions
2.1. Administrative Domains and Locator Domains
In RANGI, we distinguish between the infrastructure and the hosts. Infrastructure
is organized as a set of locator domains while the hosts are organized as a set of
administrative domains. In the current Internet hosts ID is merged with the ID of
the point of attachment to the network. We separate these two. Administrative
domain is the set of all hosts belonging to a single organization. Locator domain
is the set of infrastructure point of attachments.
Xu and Jain Expires September 4, 2009 [Page 3]
Internet-Draft A Transition Mechanism for RANGI March 2009
2.2. Identifiers and Locators
In the ID/Locator split paradigm, it is a general tendency to refer to an
"identifier" as "host id", and "locator" as "host address". However both of these
need to be bound to a context."Identifier" in RANGI refers to the "host ID" in
the context of the administrative domain while "locators" in RANGI are defined in
the context of the locator domain.
2.3. PI and PA locators
Synonymous to provider independent (PI) and Provider aggregatable (PA) addresses,
RANGI too has the concept of PI and PA locators. The 96 bit LD ID of RANGI
locators is used as a prefix in RANGI routing similar to the prefix based routing
of IPv4 and IPv6. Providers may be assigned multiple /96 locator blocks and
reassign them in smaller chunks to subscribers. One of the key features of RANGI
is that it tries to eliminate the concept of PI locator assignments. RANGI tries
to package all the benefits of PI locators using PA locators. Also, with an added
layer of indirection of immutable host IDs, PI locator assignments may be
considerably reduced in RANGI, thus considerably reducing the scalability problems
of the current Internet routing.
2.4. Host Identifiers
Similar to HIP [5], RANGI uses a 128-bit hierarchical Host Identifier (HI),
composed of two parts as shown in Figure 1. The first part is an Administrative
Domain (AD) ID which has embedded organizational affiliation and global uniqueness,
and the second part is a hash value of the AD ID and the public key. The global
uniqueness of the HI should be guaranteed through some registration mechanism.
Since the AD ID is globally unique and controlled by the host ID registration and
administrative authorities from different countries, the second part of the HI,
the hash value just needs to be unique within the AD scope.
+--------------------------+-----------------+
| Administrative Domain ID | Local Host ID |
+--------------------------+-----------------+
| \
| \
| \
| \
| \
+-----------+-------------+-------------+
| Country ID| Authority ID| Region ID | <------Example
+-----------+-------------+-------------+
Figure 1. Host Identifier structure
Xu and Jain Expires September 4, 2009 [Page 4]
Internet-Draft A Transition Mechanism for RANGI March 2009
The purpose of the hierarchical host identifier in RANGI is to ease the management
of the global identifier namespace and hold the economic and trust model in the
id/locator mapping system. In the example shown in Figure 1, the purpose of the
Authority ID field in the AD ID is to benefit the market competition among
multiple ID registration and administrative authorities.
The business model of this ID registration and administration is similar to that
of the Domain Name Service (DNS). The owner of the ID should pay for the ID
administration and the corresponding ID/Locator mapping service.
Generation of the hierarchical host identifiers is similar to the generation of
Cryptographically Generated Addresses (CGA) [6]. In CGA, the process of generating
a new CGA takes three input values: a 64-bit subnet prefix, the public key of the
address owner as a DER-encoded ASN.1 structure of the type SubjectPublicKeyInfo
and the security parameter Sec, which is an unsigned three-bit integer. In RANGI,
the process of generating a new HI also takes three input values: the n-bit AD ID
(the suitable value of "n" has not been determined), the public key and the
security parameter Sec.
2.5. Host Locators
A RANGI locator is a specific IPv6 address with an IPv4 address embedded in the
last 4 octets. As shown in Figure 2, the first 96 bits of the locator are "Locator
Domain Identifier" (LD ID). This part can be used to globally uniquely identify
each LD and it is a provider-assigned (PA) /96 IPv6 prefix. The LD ID has a
hierarchical structure for topological aggregation (e.g., in CIDR style). The
second part is an IPv4 address. This IPv4 address just needs to be unique within
the LD scope.
|<------- 96 bits -------->|<---- 32 bits--->|
+--------------------------+-----------------+
| LD ID | IPv4 |
+--------------------------+-----------------+
Figure 2. Host Locator Structure.
The proposed RANGI locator is designed to allow easy transition from IPv4 networks
to IPv6 networks. Today's networks are mostly IPv4 based and the transition to
IPv6 is slower than expected. However, IPv6 hosts exist in the current Internet.
It is important to accept the fact that the Internet cannot change from IPv4 to
IPv6 on a single day. The hierarchical RANGI locator structure depicted as in
Figure 2 can make this transition process easier.
Xu and Jain Expires September 4, 2009 [Page 5]
Internet-Draft A Transition Mechanism for RANGI March 2009
2.6. ID Sublayer
All host based services connect using host IDs. Hence, for performing these
services, RANGI introduces a new RANGI ID sublayer in the network layer of the
current host protocol stack. The introduction of this sublayer serves two primary
purposes:
1. It implements the end-host responsibilities of the distributed host
administrative domain functions.
2. It de-couples the concerns of a logical end-to-end connectivity over host
administrative domains from the concerns of physical end-to-end connectivity over
locator domains.
The separation of logical connectivity/physical connectivity concerns has huge
implications on the flexibility and functionality of the Internet. In the context
of RANGI, logical connections over immutable host IDs are shielded from locator
changes as a result of host mobility or multi-homing. Also, a logical link can
accrue attributes of security, trust and reliability through inter-administrative
domain negotiations during connection-setup.
2.7. Packet Format
RANGI-aware hosts reuse IPv6 protocol stack and packet format. The RANGI sublayer
information (host identifier) simply appears as a Next Header in the IPv6 packet
(as shown in Figure 3), whereas the locator is filled as the IPv6 address in the
IPv6 header (as shown in Figure 4). The routers process and forward these RANGI
packets as ordinary IPv6 packets.
Xu and Jain Expires September 4, 2009 [Page 6]
Internet-Draft A Transition Mechanism for RANGI March 2009
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved | Protocol Type | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Source Host ID +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| |
+ Destination Host ID +
| |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 3. Host Identifier Header Format
Xu and Jain Expires September 4, 2009 [Page 7]
Internet-Draft A Transition Mechanism for RANGI March 2009
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class | Flow Label |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Payload Length | Next Header | Hop Limit |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| Source LD ID |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source IPv4 Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ +
| Destination LD ID |
+ +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Destination IPv4 Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 4. Host Locator Header Format
3. RANGI: Assumptions
The following are the assumptions of the operational environment of RANGI.
1. Hosts: All hosts in RANGI domains are basically IPv6 hosts that are RANGI-aware.
Each host has an IPv4 local address and a set of IPv6 global addresses. The term
"local" means that this address is routable only within the precincts of the
legacy IPv4 routing domain. Each RANGI-aware host also has a 128 bit global ID and
IPv6 aware higher layer protocols. The RANGI-aware hosts are capable of supporting
IPv6 over IPv4 tunnels.
2. Border Routers: Border routers have similar requirements as that of RANGI hosts
and all border routers support IPv6. Additional border router specific
requirements include being able to setup IPv6 based BGP sessions with other border
routers. Border routers in RANGI are also called "Locator Domain Border Routers"
or LDBRs.
Xu and Jain Expires September 4, 2009 [Page 8]
Internet-Draft A Transition Mechanism for RANGI March 2009
3. Core (non-border) Routers: The core routers stand between RANGI hosts and their
LDBRs (or between LDBRs) and may be IPv4 or IPv6 routers. Generally in the first
phase of RANGI deployment, core routers need not change. As core routers upgrade
to IPv6 over time, RANGI becomes more efficient operationally. Till then RANGI
depends on IPv6 over IPv4 tunneling mechanisms to interoperate with IPv4 core
routers.
4. RANGI: Architecture Description
4.1. ID/Locator Mapping Resolution
ID/locator split implies a need for storing and distributing the mapping of
identifiers and locators.
Within RANGI, the mappings of host name and HI are stored in the DNS system, while
the mappings of HI and locator are stored in a distributed id/locator mapping
system (e.g., a hierarchical Distributed Hash Table (DHT) system, or a reverse DNS
system.).
When we use hierarchical DHT as the mapping system, we need to use the AD ID
(first 96 bits of the Host ID) as a key in the top-level DHT ring to determine the
corresponding bottom-level DHT ring. Then we use the hash part (the last 32 bits
of the Host ID) as a key to determine the corresponding peer which stores the key
value pair. Of course, the top-level DHT ring can be split further into multiple
levels since the AD ID itself has hierarchical structure.
The resolution infrastructure for the flat host identifier has no "pay-for-your-
own" model, as the flat names are stored at essentially random nodes. On the
contrary, the resolution infrastructure for the hierarchical host identifier, as
used in RANGI, has reasonable business and trust model, since the hierarchical
host identifier has clear organization affiliation and so the identifier resource
can be managed with clear administrative boundaries.
4.2. Routing and Forwarding System
Within RANGI, LDs are connected via Locator Domain Border Routers (LDBRs). A LDBR
has at least one locally unique IPv4 address in each LD to which it is connected.
The adjacent LDBRs exchange LD ID or LD prefix (The LD ID can be aggregated into
LD prefix) reachability information with an inter-LD routing protocol. In fact,
the BGP for IPv6 address family can be used directly as the inter-LD routing
protocol with the prefix length being shorter than /96.
4.2.1. Host Behavior
Generally, a source host will obtain the locator of the destination host from the
ID/locator mapping system before initializing a communication with the destination
host. If the LD of the source host is the same as that of the destination host,
Xu and Jain Expires September 4, 2009 [Page 9]
Internet-Draft A Transition Mechanism for RANGI March 2009
the source host will send the packets directly to the destination host via an IPv6
over IPv4 tunnel. Otherwise, the source host will forward the packets towards the
local LDBR via an IPv6 over IPv4 tunnel.
Hosts can get their local LDBR information in some ways, for example, a new
Dynamic Host Configuration Protocol (DHCP) option can be used to convey this
information, or a well-known LD-scope anycast address can be allocated to the
local LDBRs.
4.2.2. LDBR Behavior
LDBRs establish MP-BGP session among them so as to exchange LD reachability
information. In fact, the LD reachability information is IPv6 routing information
and the IPv6 prefix mask length is less than /96. LDBR can forward IPv6 packets on
the basis of the LD ID part (first 96 bits) of the special IPv6 address over IPv4
tunnel.
4.2.3. Non-LDBR Router Behavior
There is hardly any additional requirement on the Non-LDBR routers. So there is no
need for these internal routers to be upgraded. These non-LDBR routers just need
to support IPv4 forwarding capability.
4.2.4. Forwarding Procedure
RANGI introduces a two-level routing structure which is composed of LD ID based
routing and IP address based routing. The former is used for inter-LD routing
while the latter is used for intra-LD routing.
A simple RANGI routing procedure is illustrated in Figure 5. Before host A sends
out the packet, it looks up the current locator of the remote host B through the
ID/Locator mapping system. After it gets the RANGI locator of the remote host, it
will tunnel the packets to its local LDBR. The LDBR shall find the next hop LDBR
based on the IPv6 global routable locator, and forward the packets to it. For the
intermediate transit networks, if the core routers are legacy IPv4 and if the
packet needs to traverse over them, the ingress LDBR (for that locator domain)
tunnels the packet to the egress LDBR of the same locator domain in IPv6 over IPv4
tunnels.
Xu and Jain Expires September 4, 2009 [Page 10]
Internet-Draft A Transition Mechanism for RANGI March 2009
+-------------+ +-------------+ +-------------+ +-------------+
| Payload | | Payload | | Payload | | Payload |
+-------------+ +-------------+ +-------------+ +-------------+
|HI(A)->HI(B) | |HI(A)->HI(B) | |HI(A)->HI(B) | |HI(A)->HI(B) |
+-------------+ +-------------+ +-------------+ +-------------+
|IPv6->IPv6 | |IPv6->IPv6 | |IPv6->IPv6 | |IPv6->IPv6 |
| (A) (B) | | (A) (B) | | (A) (B) | | (A) (B) |
+-------------+ +-------------+ +-------------+ +-------------+
|IPv4->IPv4 | | IPv4->IPv4 | |IPv4->IPv4 |
| (A) (BR1) | |(BR2) (BR3) | | (BR4) (B) |
+-------------+ +-------------+ +-------------+
|<- A to BR1 ->|<-BR1 to BR2 ->|<-BR2 to BR3 ->| |<-BR4 to B ->|
+--------- ------ ---------|
+---+ \ / \ / +---+
| | \ / \ / /| |
+---+\\ \ / \ / // +---+
host| \\ | | | | / | Host
A | \\ +---+ +---+ +---+ +---+// | B
| \| +----+ +------+ +---+ / |
| +---+- -+---+ +---+ +---+
| LD #1 BR1| |BR2 BR3| |BR4 |
\ / \ / \ /
\ / \ LD #2 / \LD #3 /
\ / \ / \ /
------ ------ ------
Figure 5. Routing Procedure
For the intra-LD routing, RANGI uses the IPv6-over-IPv4 tunneling between LDBRs
(or between LDBRs and hosts). This usage of IPv6-over-IPv4 tunneling looks more
like the usage of the MAC addresses between routers in current Internet (although
they are not exactly the same). That's to say, the IPv6-over-IPv4 tunnel plays the
role of the link-layer inside an LD (between two LDBRs or between LDBRs and hosts).
By doing so, RANGI can achieve a smooth IPv4/IPv6 transition. Once the internal
routers within LD are upgraded to IPv6, the requirement of IPv6 over IPv4 tunnel
between the LDBRs or between LDBRs and hosts will be eliminated and the packets
will be delivered by the LDBRs and the internal IPv6 routers hop by hop without
tunneling as shown in Figure 6.
Xu and Jain Expires September 4, 2009 [Page 11]
Internet-Draft A Transition Mechanism for RANGI March 2009
+-------------------+ +-------------------+ +-------------------+
| Payload | | Payload | | Payload |
+-------------------| +-------------------| +-------------------|
| HI(A)->HI(B) | | HI(A)->HI(B) | | HI(A)->HI(B) |
+-------------------| +-------------------| +-------------------|
| IPv6(A)->IPv6(B) | | IPv6(A)->IPv6(B) | | IPv6(A)->IPv6(B) |
+-------------------| ++------------------| +-------------------|
|IPv4(A)->IPv4(BR1) |
+-------------------+
|<--- A to BR1 --->|<----- BR1 to BR4 --->|<--- BR4 to B --->|
/------ ------ ------
+---+ \ | / \ / +---+
| | \ | / \ / /| |
+---+\\ \ | / \ / // +---+
Host A | \\ | | | | / |HostB
| \\ +---+ +---+ +---+ +---+// |
| \| +--- + +------+ +---- + / |
| +---+- +---+ +---+ +---+ |
| LD #1 BR1 | |BR2 BR3 | |BR4 |
\ / \ LD #2 / \ LD #3 /
\ IPv4 / \ IPv6 / \ IPv6 /
\ Only / \ Only / \ Only /
------ ------ ------
Figure 6. Smooth IPv4/IPv6 transition in RANGI.
4.3. Multi-homing and Traffic Engineering
RANGI proposes a site multi-homing solution using PA locators (shown in Figure 7).
Each multi-homed stub LD shall be given an LDID by each ISP. In fact, these LD IDs
are /96 IPv6 prefixes which are provider-aggregatable . The hosts within the site,
in turn, have multiple locators by concatenating the provider assigned LD ID with
the local IPv4 address. The hosts register their locators with the ID/Locator
mapping system. As shown in Figure 7, host A has two LDIDs, LDID_1 is allocated
from ISP1, while LDID_2 is allocated from ISP2, host A could choose either one as
the source LDID of the outgoing packet. Upon receiving the packet, the site exit
LDBR BR1 can implement source-based policy routing. For example, if the source LD
is LDID_1, the packet will be forwarded into the ISP1's network, otherwise, it
will be forwarded into ISP2's network.
Xu and Jain Expires September 4, 2009 [Page 12]
Internet-Draft A Transition Mechanism for RANGI March 2009
------
/ \
/ \
/ \
| |
+---+ |
+ +- |
*---+ |
/ |BR 2 |
/ \ /
/------ / \ ISP#1 /
+---* \ / \ /
| | \ / ------
+---+\\ \ /
Host A | \\ | /
| \\ +---+ /
| \| +/ -----\
| +---+-- / \
| BR 1 | -- / \
\ / -- / \
\ / -- | |
\ / -- +---+ |
------ --+ |
Site A +---+ |
|BR 3 |
\ /
\ ISP#2 /
\ /
------
Figure 7. Site multihoming
The site-controlled traffic-engineering works as follows:
I. The source host sends out a packet using the one of its LDIDs
(assuming LDID_1 being used) as the source LD ID.
II. The packet is intercepted by the LDBR BR1 and depending on the
traffic-engineering policy, the source LD ID of the packet may
be re-written from LDID_1 to LDID_2. Then BR1 forwards the
packet into ISP2's network due to source-based policy routing.
III. Once the packet arrives at the destination host, that host will
use the source LD ID in the received packet as the destination
LD ID in the response packets. So the response packet will also
enter the site A through the ISP2's network.
Xu and Jain Expires September 4, 2009 [Page 13]
Internet-Draft A Transition Mechanism for RANGI March 2009
IV. The source host could accept this change and use LD ID 2 as the
source LD ID in the subsequent packets.
In this way, the site-controlled traffic-engineering by rewriting the
source LD ID will have effect on the path (upstream ISP) selection
for both the outgoing packets and the incoming packets. In addition,
the multihoming and traffic-engineering usage in RANGI will not cause
the routing table growth.
4.4. Mobility
In RANGI, when a host physically moves from one attachment to another,
its host ID remains unchanged. The host needs to register the new
locator with the ID/locator mapping system. Meanwhile, it should
notify the corresponding entity of its new locator as soon as
possible.
5. Summary
RANGI achieves almost all of goals set by RRG as follows:
1. Routing Scalability: Scalability is achieved by separating the
identifier and locator. Global routing is done based on provider
assigned LD IDs (/96 IPv6 prefixes) of the locators.
2. Traffic Engineering: LDBRs can overwrite the prefix part of the
source locator and implement source-based policy routing
according to the source LD ID.
3. Mobility and Multihoming: Applications and transport layers are
bound to host IDs and so the sessions will not be interrupted due
to mobility or multihoming.
4. Simplified Renumbering: When changing providers, the local
locators (IPv4 part of the locators) do not change. The IPv4 core
routers don't need renumbering.
5. Decoupling Location and Identifier: Obvious.
6. Routing Quality: Since LDBRs only exchange LD reachability and
the topology change within LD will not be disclosed outside, the
routing stability could be improved greatly.
7. Routing Security: RANGI reuses current routing system and does
not introduce any security risk into the routing system.
Xu and Jain Expires September 4, 2009 [Page 14]
Internet-Draft A Transition Mechanism for RANGI March 2009
8. Incremental Deployability: Core routers within LD can still be
IPv4-only. RANGI allows easy transition from current IPv4
networks to future IPv6 networks.
It should be pointed out that many of the mechanisms used in RANGI
have been proposed earlier in isolated contexts to solve either
similar or different problems. RANGI provides a single cohesive
architecture that uses all these mechanisms together to provide
additional benefits. For example, the idea of embedding IPv4 address
in IPv6 address was proposed in ISATAP [19]. Address overwriting at
border routers was proposed in GSE [12] and Six/One [20].
Cryptographic addresses are described in CGA [6].
A separate internet draft [26] discusses the details of a new
function unit called RANGI proxy that allows RANGI hosts to coexist
with all the legacy IPv4 or IPv6 hosts.
6. Acronyms
RANGI: Routing Architecture for Next Generation Internet
RAWS: Routing and Addressing Workshop
PA: Provider Aggregatable
AS: Autonomous Systems
ID: Identifier
ADID: Administrative Domain ID
LDID: Locator Domain ID
BR: Border Router
LDBR: Locator Domain Border Router
7. Security Considerations
TBD.
Xu and Jain Expires September 4, 2009 [Page 15]
Internet-Draft A Transition Mechanism for RANGI March 2009
8. IANA Considerations
TBD.
9. Informative References
[1] D. Meyer, L. Zhang, and K. Fall. "Report from the IAB Workshop on
Routing and Addressing". Internet draft, draft-iab-raws-
report-01.txt, work in progress, February 2007.
[2] T. Li, "Design Goals for Scalable Internet Routing", draft-irtf-
rrg-design-goals-01, July 2007.
[3] N. Chiappa, "Endpoints and Endpoint Names: A Proposed Enhancement
to the Internet Architecture", URL
http://ana.lcs.mit.edu/~jnc//tech/endpoints.txt, 1999.
[4] B. Carpenter, "Architectural Principles of the Internet", RFC1958,
June 1996.
[5] R. Moskowitz and P. Nikander, "Host Identity Protocol (HIP)
Architecture", RFC 4423, May 2006.
[6] T. Aura, "Cryptographically Generated Addresses (CGA)", RFC3972,
Mar 2005.
[7] V. Devarapalli, R. Wakikawa, A. Petrescu and P. Thubert "Network
Mobility (NEMO) Basic Support Protocol", RFC 3963, January
2005.
[8] I. Castineyra, N. Chiappa and M. Steenstrup, "The Nimrod Routing
Architecture", RFC 1992, August 1996.
[9] R. Hinden, "New Scheme for Internet Routing and Addressing
(ENCAPS) for IPNG", RFC 1995, June 1996.
[10] L. Subramanian, M. Caesar, C.T. Ee, M. Handley, M. Mao, S.
Shenker and I. Stoica, "HLP: A Next Generation Inter-domain
Routing Protocol", SIGCOMM'05, August 2005, Philadelphia,
Pennsylvania, USA.
[11] L. Garces-Erice, E. Biersack, P. Felber, K. Ross, and G. Urvoy-
Keller, "Hierarchical Peer-to-peer Systems" In Proc. Euro-
Par 2003, Klagenfurt,Austria, 2003.
Xu and Jain Expires September 4, 2009 [Page 16]
Internet-Draft A Transition Mechanism for RANGI March 2009
[12] M. O'Dell, "GSE-An Alternative Addressing Architecture for IPv6",
Internet-Draft, Feb 1997.
[13] B. Ahlgren, J. Arkko, L. Eggert and J. Rajahalme,"A Node
Identity Internetworking Architecture", 9th IEEE Global
Internet Symposium, Barcelona, Spain, April 2006.
[14] Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker and
Sonesh Surana, "Internet Indirection Infrastructure", Proc.
ACM SIGCOMM, Pittsburgh, PA, USA, August 2002.
[15] Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia
Ratnasamy,Scott Shenker, Ion Stoica and Michael Walfish, "A
Layered Naming Architecture for the Internet", Proc. ACM
SIGCOMM, Portland, Oregon, USA, August 30 - September 3,
2004.
[16] M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica
and S. Shenker, "ROFL: Routing on Flat Labels", SIGCOMM'06,
September 2006, Pisa, Italy.
[17] H. Soliman, C. Castelluccia, K. El Malki, L. Bellier,
"Hierarchical Mobile IPv6 Mobility Management (HMIPv6) ",
RFC4140, August 2005.
[18] Deering, S. and R. Hinden, "IPv6 Metro Addressings",
http://irl.cs.ucla.edu/references/Deering-metro.txt, March
1996.
[19] F. Templin, T. Gleeson, ''Intra-Site Automatic Tunnel Addressing
Protocol (ISATAP),'' RFC 5214, March, 2008.
[20] C. Vogt, ''Six/One: A Solution for Routing and Addressing in
IPv6,'' draft-vogt-rrg-six-one-01.txt, November, 2007.
[21] R. Jain, ''Internet 3.0: Ten Problems with Current Internet
Architecture and Solutions for the Next Generation,'' in
Proceedings of Military Communications Conference (MILCOM
2006), Washington, DC, October 23-25, 2006,
http://www.cse.wustl.edu/~jain/papers/gina.htm
[22] S. Paul, J. Pan, and M. Bowman, ''A Vision of the Next Generation
Internet: A Policy Oriented View,'' British Computer Society
Conference on Visions of Computer Science, Sep 2008,
http://www.cse.wustl.edu/~jain/papers/pona.htm
Xu and Jain Expires September 4, 2009 [Page 17]
Internet-Draft A Transition Mechanism for RANGI March 2009
[23] J. Pan, S. Paul, R. Jain, and M. Bowman, ''MILSA: A Mobility and
Multihoming Supporting Identifier-Locator Split
Architecture for Naming in the Next Generation Internet,,''
Globecom 2008, Nov 2008,
http://www.cse.wustl.edu/~jain/papers/milsa.htm
[24] X. Xu and D. Guo, ''Hierarchical Routing Architecture,'' Proc. 4th
Euro-NGI Conference on Next Generation Internetworks,
Krakow, Poland, 28-30 April 2008, 7 pp.,
http://www.cse.wustl.edu/~jain/papers/hra.htm
[25] J. Pan, R. Jain, S. Paul, M. Bowman, X. Xu, and S. Chen,
"Enhanced MILSA Architecture for Naming, Addressing,
Routing and Security Issues in the Next Generation
Internet," Proc. IEEE International Conference in
Communications (ICC) 2009, Dresden, Germany, June 14-18,
2009, http://www.cse.wustl.edu/~jain/papers/emilsa.htm
[26] X. Xu and R. Jain, ''A Transition Mechanism for
Routing Architecture for the Next Generation Internet
(RANGI)'', draft-xu-rangi-proxy-00.txt, March 2009.
10. Acknowledgments
We would like to thank several experts who commented on the earlier
versions of this proposal including Dave Oran, Joel Halpern, and Tony
Li.
Authors' Addresses
Xiaohu Xu
Huawei Technologies,
No.3 Xinxi Rd., Shang-Di Information Industry Base,
Hai-Dian District, Beijing 100085, P.R. China
Phone: +86 10 82836073
Email: xuxh@huawei.com
Raj Jain
Washington University in Saint Louis
One Brookings Drive, Campus Box 1045
Saint Louis, MO 63130 USA
Phone: +1 314 935 4963
Email: jain@cse.wustl.edu
Xu and Jain Expires September 4, 2009 [Page 18]
| PAFTECH AB 2003-2026 | 2026-04-24 13:56:05 |