One document matched: draft-xu-rangi-00.txt


Network Working Group                                        Xiaohu Xu 
Internet Draft                                                  Huawei 
Intended status: Informational                                Raj Jain 
Expires: September 2009                  Washington Univ. in St. Louis 
                                                         March 4, 2009 
 
                                      
       Routing Architecture for the Next Generation Internet (RANGI) 
                           draft-xu-rangi-00.txt 


Status of this Memo 

   This Internet-Draft is submitted to IETF in full conformance with the   provisions 
   of BCP 78 and BCP 79. 

   Internet-Drafts are working documents of the Internet Engineering Task Force 
   (IETF), its areas, and its working groups.  Note that other groups may also 
   distribute working documents as Internet-Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months and may be 
   updated, replaced, or obsoleted by other documents at any time.  It is 
   inappropriate to use Internet-Drafts as reference material or to cite them other 
   than as "work in progress."  

   The list of current Internet-Drafts can be accessed at   
   http://www.ietf.org/ietf/1id-abstracts.txt.  

   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 

   This Internet-Draft will expire on September 4, 2009. 

Copyright Notice 

   Copyright (c) 2009 IETF Trust and the persons identified as the document authors.  
   All rights reserved. 

   This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating 
   to IETF Documents in effect on the date of publication of this document 
   (http://trustee.ietf.org/license-info). Please review these documents carefully, 
   as they describe your rights and restrictions with respect to this document. 

Abstract 

   IRTF Routing Research Group (RRG) is exploring a new routing and addressing 
   architecture to meet the challenges that current Internet is facing, especially in 
   terms of routing scalability. This internet draft describes a new routing and 
 
 
 
Xu and Jain           Expires September 4, 2009               [Page 1] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   addressing architecture, called Routing Architecture for the Next Generation 
   Internet (RANGI) as a solution to the problems of scalability, mobility, 
   multihoming, and traffic engineering. RANGI is a hybrid proposal that combines and 
   enhances the ideas from several proposals particularly those based on 
   identifier/locator split approach. It introduces a hierarchical and cryptographic 
   host identifier and adopts a hierarchical routing mechanism to support routing 
   across multiple independent address spaces. To allow smooth transition from IPv4 
   to IPv6, it adopts an IPv6 address with an IPv4 embedded in the last four bytes as 
   locator. This also simplifies renumbering in case of change of service providers. 
   RANGI allows traffic engineering by allowing border routers to overwrite the 
   source addresses. It allows policy control on ID to address translation by having 
   a hierarchical resolution mechanism. 

Table of Contents 

   1. Introduction............................................ 3 
   2. RANGI: Concepts and Definitions......................... 3 
      2.1. Administrative Domains and Locator Domains......... 3 
      2.2. Identifiers and Locators........................... 4 
      2.3. PI and PA locators................................. 4 
      2.4. Host Identifiers................................... 4 
      2.5. Host Locators...................................... 5 
      2.6. ID Sublayer........................................ 6 
      2.7. Packet Format...................................... 6 
   3. RANGI: Assumptions...................................... 8 
   4. RANGI: Architecture Description......................... 9 
      4.1. ID/Locator Mapping Resolution...................... 9 
      4.2. Routing and Forwarding System...................... 9 
         4.2.1. Host Behavior................................. 9 
         4.2.2. LDBR Behavior................................ 10 
         4.2.3. Non-LDBR Router Behavior..................... 10 
         4.2.4. Forwarding Procedure......................... 10 
      4.3. Multi-homing and Traffic Engineering.............. 12 
      4.4. Mobility.......................................... 14 
   5. Summary................................................ 14 
   6. Acronyms............................................... 15 
   7. Security Considerations................................ 15 
   8. IANA Considerations.................................... 16 
   9. Informative References ................................ 16 
   10. Acknowledgments....................................... 18 
    






 
 
Xu and Jain           Expires September 4, 2009               [Page 2] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

1. Introduction 

   The Internet routing table size is growing at a rate which exceeds the speed of 
   the hardware improvement. This issue has drawn significant attention from both 
   industry and academia. After much discussion following the IAB Routing and 
   Addressing workshop [1] in Amsterdam, a common conclusion was reached that the 
   explosive growth in Internet routing table is caused mainly by the wide adoption 
   of multi-homing, traffic engineering and provider-independent addressing. The 
   underlying reason for the routing scalability issue is the overlapping semantics 
   of IP address which is used both as locator and identifier in current Internet. 
   This contextual overloading of IP address makes it impossible to renumber the 
   addresses in a topologically aggregatable way. This is the so-called routing 
   scalability issue. 

   At present, the IRTF Routing Research Group (RRG) is chartered to explore a new 
   routing and addressing architecture to meet those challenges that the current 
   Internet is facing, especially in scalability, mobility, multi-homing, and inter-
   domain traffic engineering.  

   This internet draft describes a hybrid solution called Routing Architecture for 
   the Next Generation Internet (RANGI) that significantly enhances id/locator split 
   approaches. It introduces a hierarchical and cryptographic host identifier and 
   adopts a hierarchical routing mechanism to support routing across multiple 
   independent address spaces. RANGI's use of 128-bit host IDs (which also look like 
   IPv6 addresses) allows current IPv6 applications to run over RANGI. Using IPv4 
   addresses embedded in the IPv6 locators ease the transition from IPv4 to IPv6. 
   Traffic engineering and policy control is provided by allowing border routers to 
   overwrite the addresses in the outgoing packets. 

   It has recently become clear that hosts IDs have to be separated from their point 
   of attachment (addresses). In other words, the network consists of two tiers -                                                                      - 
   hosts and infrastructure. We have generalized this to a multi-tier virtualizable 
   architecture where users and data form higher tiers of the architecture over the 
   host and infrastructure. We are designing a general architecture for this multi-
   tiered next generation Internet [20-24].  RANGI as described here is limited to 
   just the bottom two tiers and applies to the current Internet 

2. RANGI: Concepts and Definitions 

   2.1. Administrative Domains and Locator Domains 

   In RANGI, we distinguish between the infrastructure and the hosts. Infrastructure 
   is organized as a set of locator domains while the hosts are organized as a set of 
   administrative domains. In the current Internet hosts ID is merged with the ID of 
   the point of attachment to the network.  We separate these two. Administrative 
   domain is the set of all hosts belonging to a single organization. Locator domain 
   is the set of infrastructure point of attachments. 
 
 
Xu and Jain           Expires September 4, 2009               [Page 3] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   2.2. Identifiers and Locators 

   In the ID/Locator split paradigm, it is a general tendency to refer to an 
  "identifier" as "host id", and "locator" as "host address". However both of these 
   need to be bound to a context."Identifier" in RANGI refers to the "host ID" in 
   the context of the administrative domain while "locators" in RANGI are defined in 
   the context of the locator domain.  

   2.3. PI and PA locators 

   Synonymous to provider independent (PI) and Provider aggregatable (PA) addresses, 
   RANGI too has the concept of PI and PA locators. The 96 bit LD ID of RANGI 
   locators is used as a prefix in RANGI routing similar to the prefix based routing 
   of IPv4 and IPv6. Providers may be assigned multiple /96 locator blocks and 
   reassign them in smaller chunks to subscribers. One of the key features of RANGI 
   is that it tries to eliminate the concept of PI locator assignments. RANGI tries 
   to package all the benefits of PI locators using PA locators. Also, with an added 
   layer of indirection of immutable host IDs, PI locator assignments may be 
   considerably reduced in RANGI, thus considerably reducing the scalability problems 
   of the current Internet routing. 

   2.4. Host Identifiers 

   Similar to HIP [5], RANGI uses a 128-bit hierarchical Host Identifier (HI), 
   composed of two parts as shown in Figure 1. The first part is an Administrative 
   Domain (AD) ID which has embedded organizational affiliation and global uniqueness, 
   and the second part is a hash value of the AD ID and the public key. The global 
   uniqueness of the HI should be guaranteed through some registration mechanism. 
   Since the AD ID is globally unique and controlled by the host ID registration and 
   administrative authorities from different countries, the second part of the HI, 
   the hash value just needs to be unique within the AD scope. 

                                                                        
          +--------------------------+-----------------+                
          | Administrative Domain ID |   Local Host ID |                
          +--------------------------+-----------------+                
          |                            \                                
          |                              \                              
          |                                \                            
          |                                   \                         
          |                                      \                      
          +-----------+-------------+-------------+                     
          | Country ID| Authority ID| Region ID   | <------Example      
          +-----------+-------------+-------------+                     
                                                                        
                    Figure 1. Host Identifier structure 
    
 
 
Xu and Jain           Expires September 4, 2009               [Page 4] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   The purpose of the hierarchical host identifier in RANGI is to ease the management 
   of the global identifier namespace and hold the economic and trust model in the 
   id/locator mapping system. In the example shown in Figure 1, the purpose of the 
   Authority ID field in the AD ID is to benefit the market competition among 
   multiple ID registration and administrative authorities.  

   The business model of this ID registration and administration is similar to that 
   of the Domain Name Service (DNS). The owner of the ID should pay for the ID 
   administration and the corresponding ID/Locator mapping service. 

   Generation of the hierarchical host identifiers is similar to the generation of 
   Cryptographically Generated Addresses (CGA) [6]. In CGA, the process of generating 
   a new CGA takes three input values: a 64-bit subnet prefix, the public key of the 
   address owner as a DER-encoded ASN.1 structure of the type SubjectPublicKeyInfo 
   and the security parameter Sec, which is an unsigned three-bit integer. In RANGI, 
   the process of generating a new HI also takes three input values: the n-bit AD ID 
   (the suitable value of "n" has not been determined), the public key and the 
   security parameter Sec. 

   2.5. Host Locators 

   A RANGI locator is a specific IPv6 address with an IPv4 address embedded in the 
   last 4 octets. As shown in Figure 2, the first 96 bits of the locator are "Locator 
   Domain Identifier" (LD ID). This part can be used to globally uniquely identify 
   each LD and it is a provider-assigned (PA) /96 IPv6 prefix. The LD ID has a 
   hierarchical structure for topological aggregation (e.g., in CIDR style). The 
   second part is an IPv4 address. This IPv4 address just needs to be unique within 
   the LD scope.  

                                      
              |<------- 96 bits -------->|<---- 32 bits--->| 
              +--------------------------+-----------------+ 
              |         LD ID            |       IPv4      | 
              +--------------------------+-----------------+ 
                                      
                     Figure 2. Host Locator Structure. 
    
 
   The proposed RANGI locator is designed to allow easy transition from IPv4 networks 
   to IPv6 networks. Today's networks are mostly IPv4 based and the transition to 
   IPv6 is slower than expected. However, IPv6 hosts exist in the current Internet. 
   It is important to accept the fact that the Internet cannot change from IPv4 to 
   IPv6 on a single day. The hierarchical RANGI locator structure depicted as in 
   Figure 2 can make this transition process easier.  



 
 
Xu and Jain           Expires September 4, 2009               [Page 5] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   2.6. ID Sublayer 

   All host based services connect using host IDs.  Hence, for performing these 
   services, RANGI introduces a new RANGI ID sublayer in the network layer of the 
   current host protocol stack. The introduction of this sublayer serves two primary 
   purposes: 

   1. It implements the end-host responsibilities of the distributed host 
   administrative domain functions. 

   2. It de-couples the concerns of a logical end-to-end connectivity over host 
   administrative domains from the concerns of physical end-to-end connectivity over 
   locator domains. 

   The separation of logical connectivity/physical connectivity concerns has huge 
   implications on the flexibility and functionality of the Internet.  In the context 
   of RANGI, logical connections over immutable host IDs are shielded from locator 
   changes as a result of host mobility or multi-homing.  Also, a logical link can 
   accrue attributes of security, trust and reliability through inter-administrative 
   domain negotiations during connection-setup.  

   2.7. Packet Format 

   RANGI-aware hosts reuse IPv6 protocol stack and packet format. The RANGI sublayer 
   information (host identifier) simply appears as a Next Header in the IPv6 packet 
   (as shown in Figure 3), whereas the locator is filled as the IPv6 address in the 
   IPv6 header (as shown in Figure 4). The routers process and forward these RANGI 
   packets as ordinary IPv6 packets.  


















 
 
Xu and Jain           Expires September 4, 2009               [Page 6] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

       0                   1                   2                   3    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |        Reserved               | Protocol Type |   Checksum    | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |                                                               | 
      +                                                               + 
      |                                                               | 
      +                        Source Host ID                         + 
      |                                                               | 
      +                                                               + 
      |                                                               | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |                                                               | 
      +                                                               + 
      |                                                               | 
      +                       Destination Host ID                     + 
      |                                                               | 
      +                                                               + 
      |                                                               | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
                  Figure 3. Host Identifier Header Format 
    

    




















 
 
Xu and Jain           Expires September 4, 2009               [Page 7] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

       0                   1                   2                   3    
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |Version| Traffic Class |           Flow Label                  | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |         Payload Length        |  Next Header  |   Hop Limit   | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |                                                               | 
      +                                                               + 
      |                         Source LD ID                          | 
      +                                                               + 
      |                                                               | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |                     Source IPv4 Address                       | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |                                                               | 
      +                                                               + 
      |                       Destination LD ID                       | 
      +                                                               + 
      |                                                               | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
      |                  Destination IPv4 Address                     | 
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
    
                   Figure 4. Host Locator Header Format 
    

3. RANGI: Assumptions 

   The following are the assumptions of the operational environment of RANGI. 

    

   1. Hosts: All hosts in RANGI domains are basically IPv6 hosts that are RANGI-aware. 
   Each host has an IPv4 local address and a set of IPv6 global addresses. The term 
   "local" means that this address is routable only within the precincts of the 
   legacy IPv4 routing domain. Each RANGI-aware host also has a 128 bit global ID and 
   IPv6 aware higher layer protocols. The RANGI-aware hosts are capable of supporting 
   IPv6 over IPv4 tunnels. 

   2. Border Routers: Border routers have similar requirements as that of RANGI hosts 
   and all border routers support IPv6. Additional border router specific 
   requirements include being able to setup IPv6 based BGP sessions with other border 
   routers.  Border routers in RANGI are also called "Locator Domain Border Routers"                                                                          
   or LDBRs. 


 
 
Xu and Jain           Expires September 4, 2009               [Page 8] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   3. Core (non-border) Routers: The core routers stand between RANGI hosts and their 
   LDBRs (or between LDBRs) and may be IPv4 or IPv6 routers. Generally in the first 
   phase of RANGI deployment, core routers need not change. As core routers upgrade 
   to IPv6 over time, RANGI becomes more efficient operationally. Till then RANGI 
   depends on IPv6 over IPv4 tunneling mechanisms to interoperate with IPv4 core 
   routers. 

4. RANGI: Architecture Description 

   4.1. ID/Locator Mapping Resolution 

   ID/locator split implies a need for storing and distributing the mapping of 
   identifiers and locators. 

   Within RANGI, the mappings of host name and HI are stored in the DNS system, while 
   the mappings of HI and locator are stored in a distributed id/locator mapping 
   system (e.g., a hierarchical Distributed Hash Table (DHT) system, or a reverse DNS 
   system.). 

   When we use hierarchical DHT as the mapping system, we need to use the AD ID 
   (first 96 bits of the Host ID) as a key in the top-level DHT ring to determine the 
   corresponding bottom-level DHT ring. Then we use the hash part (the last 32 bits 
   of the Host ID) as a key to determine the corresponding peer which stores the key 
   value pair. Of course, the top-level DHT ring can be split further into multiple 
   levels since the AD ID itself has hierarchical structure. 

   The resolution infrastructure for the flat host identifier has no "pay-for-your-
   own" model, as the flat names are stored at essentially random nodes. On the 
   contrary, the resolution infrastructure for the hierarchical host identifier, as 
   used in RANGI, has reasonable business and trust model, since the hierarchical 
   host identifier has clear organization affiliation and so the identifier resource 
   can be managed with clear administrative boundaries. 

   4.2. Routing and Forwarding System 

   Within RANGI, LDs are connected via Locator Domain Border Routers (LDBRs). A LDBR 
   has at least one locally unique IPv4 address in each LD to which it is connected. 
   The adjacent LDBRs exchange LD ID or LD prefix (The LD ID can be aggregated into 
   LD prefix) reachability information with an inter-LD routing protocol. In fact, 
   the BGP for IPv6 address family can be used directly as the inter-LD routing 
   protocol with the prefix length being shorter than /96. 

   4.2.1. Host Behavior 

   Generally, a source host will obtain the locator of the destination host from the 
   ID/locator mapping system before initializing a communication with the destination 
   host. If the LD of the source host is the same as that of the destination host, 
 
 
Xu and Jain           Expires September 4, 2009               [Page 9] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   the source host will send the packets directly to the destination host via an IPv6 
   over IPv4 tunnel. Otherwise, the source host will forward the packets towards the 
   local LDBR via an IPv6 over IPv4 tunnel. 

   Hosts can get their local LDBR information in some ways, for example, a new 
   Dynamic Host Configuration Protocol (DHCP) option can be used to convey this 
   information, or a well-known LD-scope anycast address can be allocated to the 
   local LDBRs. 

   4.2.2. LDBR Behavior 

   LDBRs establish MP-BGP session among them so as to exchange LD reachability 
   information. In fact, the LD reachability information is IPv6 routing information 
   and the IPv6 prefix mask length is less than /96. LDBR can forward IPv6 packets on 
   the basis of the LD ID part (first 96 bits) of the special IPv6 address over IPv4 
   tunnel.  

   4.2.3. Non-LDBR Router Behavior 

   There is hardly any additional requirement on the Non-LDBR routers. So there is no 
   need for these internal routers to be upgraded. These non-LDBR routers just need 
   to support IPv4 forwarding capability. 

   4.2.4. Forwarding Procedure 

   RANGI introduces a two-level routing structure which is composed of LD ID based 
   routing and IP address based routing. The former is used for inter-LD routing 
   while the latter is used for intra-LD routing.  

   A simple RANGI routing procedure is illustrated in Figure 5. Before host A sends 
   out the packet, it looks up the current locator of the remote host B through the 
   ID/Locator mapping system. After it gets the RANGI locator of the remote host, it 
   will tunnel the packets to its local LDBR. The LDBR shall find the next hop LDBR 
   based on the IPv6 global routable locator, and forward the packets to it. For the 
   intermediate transit networks, if the core routers are legacy IPv4 and if the 
   packet needs to traverse over them, the ingress LDBR (for that locator domain) 
   tunnels the packet to the egress LDBR of the same locator domain in IPv6 over IPv4 
   tunnels.  








 
 
Xu and Jain           Expires September 4, 2009              [Page 10] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

    
   +-------------+  +-------------+  +-------------+  +-------------+ 
   | Payload     |  | Payload     |  | Payload     |  | Payload     | 
   +-------------+  +-------------+  +-------------+  +-------------+ 
   |HI(A)->HI(B) |  |HI(A)->HI(B) |  |HI(A)->HI(B) |  |HI(A)->HI(B) | 
   +-------------+  +-------------+  +-------------+  +-------------+ 
   |IPv6->IPv6   |  |IPv6->IPv6   |  |IPv6->IPv6   |  |IPv6->IPv6   | 
   | (A)   (B)   |  | (A)   (B)   |  | (A)   (B)   |  | (A)   (B)   | 
   +-------------+  +-------------+  +-------------+  +-------------+ 
   |IPv4->IPv4   |                   | IPv4->IPv4  |  |IPv4->IPv4   | 
   | (A)   (BR1) |                   |(BR2)  (BR3) |  | (BR4) (B)   | 
   +-------------+                   +-------------+  +-------------+ 
   |<- A to BR1  ->|<-BR1 to BR2 ->|<-BR2 to BR3 ->|  |<-BR4 to B ->| 
                                                                      
          +---------              ------             ---------|     
        +---+       \            /      \           /      +---+ 
        |   |        \          /        \         /      /|   | 
        +---+\\       \        /          \       /     // +---+ 
      host|    \\      |      |            |     |     /      | Host 
       A  |      \\ +---+    +---+      +---+   +---+//       |  B 
          |        \|   +----+   +------+   +---+   /         | 
          |         +---+-  -+---+      +---+   +---+ 
          | LD #1   BR1|      |BR2      BR3|     |BR4        | 
           \          /        \          /       \          / 
            \        /          \ LD #2  /         \LD #3   / 
             \      /            \      /           \      / 
              ------              ------             ------ 
    
                        Figure 5. Routing Procedure 
 

   For the intra-LD routing, RANGI uses the IPv6-over-IPv4 tunneling between LDBRs 
   (or between LDBRs and hosts). This usage of IPv6-over-IPv4 tunneling looks more 
   like the usage of the MAC addresses between routers in current Internet (although 
   they are not exactly the same). That's to say, the IPv6-over-IPv4 tunnel plays the 
   role of the link-layer inside an LD (between two LDBRs or between LDBRs and hosts). 
   By doing so, RANGI can achieve a smooth IPv4/IPv6 transition. Once the internal 
   routers within LD are upgraded to IPv6, the requirement of IPv6 over IPv4 tunnel 
   between the LDBRs or between LDBRs and hosts will be eliminated and the packets 
   will be delivered by the LDBRs and the internal IPv6 routers hop by hop without 
   tunneling as shown in Figure 6. 






 
 
Xu and Jain           Expires September 4, 2009              [Page 11] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

    
   +-------------------+  +-------------------+  +-------------------+ 
   |     Payload       |  |     Payload       |  |     Payload       | 
   +-------------------|  +-------------------|  +-------------------| 
   |  HI(A)->HI(B)     |  |  HI(A)->HI(B)     |  |  HI(A)->HI(B)     | 
   +-------------------|  +-------------------|  +-------------------| 
   | IPv6(A)->IPv6(B)  |  | IPv6(A)->IPv6(B)  |  | IPv6(A)->IPv6(B)  | 
   +-------------------|  ++------------------|  +-------------------| 
   |IPv4(A)->IPv4(BR1) |                                              
   +-------------------+                                           
   |<---   A to BR1  --->|<----- BR1 to BR4 --->|<--- BR4 to B   --->| 
                                                                      
               /------              ------               ------      
          +---+       \      |     /      \             /      +---+ 
          |   |        \     |    /        \           /      /|   | 
          +---+\\       \    |   /          \         /     // +---+ 
     Host A |    \\      |      |            |       |     /      |HostB 
            |      \\ +---+    +---+      +---+     +---+//       | 
            |        \|   +--- +   +------+   +---- +   /         | 
            |         +---+-   +---+      +---+     +---+         | 
            | LD #1  BR1 |      |BR2     BR3 |       |BR4         | 
             \           /        \  LD #2    /         \ LD #3    / 
              \  IPv4   /          \ IPv6    /           \ IPv6   / 
               \  Only /            \ Only  /             \ Only / 
                ------              ------               ------ 
    
              Figure 6. Smooth IPv4/IPv6 transition in RANGI. 
    

    
   4.3. Multi-homing and Traffic Engineering 

   RANGI proposes a site multi-homing solution using PA locators (shown in Figure 7). 
   Each multi-homed stub LD shall be given an LDID by each ISP. In fact, these LD IDs 
   are /96 IPv6 prefixes which are provider-aggregatable . The hosts within the site, 
   in turn, have multiple locators by concatenating the provider assigned LD ID with 
   the local IPv4 address. The hosts register their locators with the ID/Locator 
   mapping system. As shown in Figure 7, host A has two LDIDs, LDID_1 is allocated 
   from ISP1, while LDID_2 is allocated from ISP2, host A could choose either one as 
   the source LDID of the outgoing packet. Upon receiving the packet, the site exit 
   LDBR BR1 can implement source-based policy routing. For example, if the source LD 
   is LDID_1, the packet will be forwarded into the ISP1's network, otherwise, it 
   will be forwarded into ISP2's network.   




 
 
Xu and Jain           Expires September 4, 2009              [Page 12] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

                                   ------ 
                                  /      \ 
                                 /        \ 
                                /          \ 
                               |            | 
                              +---+         | 
                              +   +-        | 
                              *---+         | 
                             / |BR 2        | 
                             /  \          / 
             /------        /    \ ISP#1  / 
        +---*       \       /     \      / 
        |   |        \     /       ------ 
        +---+\\       \    / 
   Host A |    \\      |  / 
          |      \\ +---+ / 
          |        \|   +/                -----\ 
          |         +---+--              /      \ 
          |      BR 1  |   --           /        \ 
           \          /      --        /          \ 
            \        /         --     |            | 
             \      /            --  +---+         | 
              ------               --+             | 
            Site A                   +---+         | 
                                      |BR 3        | 
                                       \           / 
                                        \ ISP#2   / 
                                         \       / 
                                          ------ 
    
          Figure 7.  Site multihoming 
    

   The site-controlled traffic-engineering works as follows: 

   I. The source host sends out a packet using the one of its LDIDs 
        (assuming LDID_1 being used) as the source LD ID. 

   II.           The packet is intercepted by the LDBR BR1 and depending on the 
        traffic-engineering policy, the source LD ID of the packet may 
        be re-written from LDID_1 to LDID_2. Then BR1 forwards the 
        packet into ISP2's network due to source-based policy routing. 

   III. Once the packet arrives at the destination host, that host will 
        use the source LD ID in the received packet as the destination 
        LD ID in the response packets. So the response packet will also 
        enter the site A through the ISP2's network.  
 
 
Xu and Jain           Expires September 4, 2009              [Page 13] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   IV.           The source host could accept this change and use LD ID 2 as the 
        source LD ID in the subsequent packets. 

   In this way, the site-controlled traffic-engineering by rewriting the 
   source LD ID will have effect on the path (upstream ISP) selection 
   for both the outgoing packets and the incoming packets. In addition, 
   the multihoming and traffic-engineering usage in RANGI will not cause 
   the routing table growth.  

   4.4. Mobility 

   In RANGI, when a host physically moves from one attachment to another, 
   its host ID remains unchanged. The host needs to register the new 
   locator with the ID/locator mapping system. Meanwhile, it should 
   notify the corresponding entity of its new locator as soon as 
   possible. 

5. Summary 

   RANGI achieves almost all of goals set by RRG as follows: 

   1. Routing Scalability: Scalability is achieved by separating the 
      identifier and locator. Global routing is done based on provider 
      assigned LD IDs (/96 IPv6 prefixes) of the locators. 

   2. Traffic Engineering: LDBRs can overwrite the prefix part of the 
      source locator and implement source-based policy routing 
      according to the source LD ID.  

   3. Mobility and Multihoming: Applications and transport layers are 
      bound to host IDs and so the sessions will not be interrupted due 
      to mobility or multihoming. 

   4. Simplified Renumbering: When changing providers, the local 
      locators (IPv4 part of the locators) do not change. The IPv4 core 
      routers don't need renumbering. 

   5. Decoupling Location and Identifier: Obvious. 

   6. Routing Quality: Since LDBRs only exchange LD reachability and 
      the topology change within LD will not be disclosed outside, the 
      routing stability could be improved greatly. 

   7. Routing Security: RANGI reuses current routing system and does 
      not introduce any security risk into the routing system. 


 
 
Xu and Jain           Expires September 4, 2009              [Page 14] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   8. Incremental Deployability: Core routers within LD can still be 
      IPv4-only. RANGI allows easy transition from current IPv4 
      networks to future IPv6 networks. 

   It should be pointed out that many of the mechanisms used in RANGI 
   have been proposed earlier in isolated contexts to solve either 
   similar or different problems. RANGI provides a single cohesive 
   architecture that uses all these mechanisms together to provide 
   additional benefits. For example, the idea of embedding IPv4 address 
   in IPv6 address was proposed in ISATAP [19].  Address overwriting at 
   border routers was proposed in GSE [12] and Six/One [20]. 
   Cryptographic addresses are described in CGA [6]. 

   A separate internet draft [26] discusses the details of a new 
   function unit called RANGI proxy that allows RANGI hosts to coexist 
   with all the legacy IPv4 or IPv6 hosts.  

6. Acronyms  

   RANGI: Routing Architecture for Next Generation Internet 

   RAWS: Routing and Addressing Workshop 

   PA: Provider Aggregatable 

   AS: Autonomous Systems 

   ID: Identifier 

   ADID: Administrative Domain ID 

   LDID: Locator Domain ID 

   BR: Border Router 

   LDBR: Locator Domain Border Router 

    

7. Security Considerations 

   TBD. 

    

    

 
 
Xu and Jain           Expires September 4, 2009              [Page 15] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

8. IANA Considerations 

   TBD. 

    

9. Informative References 

   [1] D. Meyer, L. Zhang, and K. Fall. "Report from the IAB Workshop on 
             Routing and Addressing". Internet draft, draft-iab-raws-
             report-01.txt, work in progress, February 2007. 

   [2] T. Li, "Design Goals for Scalable Internet Routing", draft-irtf-
             rrg-design-goals-01, July 2007. 

   [3] N. Chiappa, "Endpoints and Endpoint Names: A Proposed Enhancement 
             to the Internet Architecture",         URL 
             http://ana.lcs.mit.edu/~jnc//tech/endpoints.txt, 1999. 

   [4] B. Carpenter, "Architectural Principles of the Internet", RFC1958, 
             June 1996. 

   [5] R. Moskowitz and P. Nikander, "Host Identity Protocol (HIP) 
             Architecture", RFC 4423, May 2006. 

   [6] T. Aura, "Cryptographically Generated Addresses (CGA)", RFC3972, 
             Mar 2005. 

   [7] V. Devarapalli, R. Wakikawa, A. Petrescu and P. Thubert "Network 
             Mobility (NEMO) Basic Support Protocol", RFC 3963, January 
             2005. 

   [8] I. Castineyra, N. Chiappa and M. Steenstrup, "The Nimrod Routing 
             Architecture", RFC 1992, August 1996. 

   [9] R. Hinden, "New Scheme for Internet Routing and Addressing 
             (ENCAPS) for IPNG", RFC 1995, June 1996. 

   [10] L. Subramanian, M. Caesar, C.T. Ee, M. Handley, M. Mao, S. 
             Shenker and I. Stoica, "HLP: A Next Generation Inter-domain 
             Routing Protocol", SIGCOMM'05, August 2005, Philadelphia, 
             Pennsylvania, USA. 

   [11] L. Garces-Erice, E. Biersack, P. Felber, K. Ross, and G. Urvoy-
             Keller, "Hierarchical Peer-to-peer Systems" In Proc. Euro-
             Par 2003, Klagenfurt,Austria, 2003. 

 
 
Xu and Jain           Expires September 4, 2009              [Page 16] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   [12] M. O'Dell, "GSE-An Alternative Addressing Architecture for IPv6", 
             Internet-Draft, Feb 1997. 

   [13] B. Ahlgren, J. Arkko, L. Eggert and J. Rajahalme,"A Node 
             Identity Internetworking Architecture", 9th IEEE Global 
             Internet Symposium, Barcelona, Spain, April 2006. 

   [14] Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker and 
             Sonesh Surana, "Internet Indirection Infrastructure", Proc. 
             ACM SIGCOMM, Pittsburgh, PA, USA, August 2002. 

   [15] Hari Balakrishnan, Karthik Lakshminarayanan, Sylvia 
             Ratnasamy,Scott Shenker, Ion Stoica and Michael Walfish, "A 
             Layered Naming Architecture for the Internet", Proc. ACM 
             SIGCOMM, Portland, Oregon, USA, August 30 - September 3, 
             2004. 

   [16] M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, I. Stoica 
             and S. Shenker, "ROFL: Routing on Flat Labels", SIGCOMM'06, 
             September 2006, Pisa, Italy. 

   [17]  H. Soliman, C. Castelluccia, K. El Malki, L. Bellier, 
             "Hierarchical Mobile IPv6 Mobility Management (HMIPv6) ", 
             RFC4140, August 2005. 

   [18] Deering, S. and R. Hinden, "IPv6 Metro Addressings",  
             http://irl.cs.ucla.edu/references/Deering-metro.txt, March 
             1996. 

   [19] F. Templin, T. Gleeson, ''Intra-Site Automatic Tunnel Addressing 
             Protocol (ISATAP),'' RFC 5214, March, 2008. 

   [20] C. Vogt, ''Six/One: A Solution for Routing and Addressing in 
             IPv6,'' draft-vogt-rrg-six-one-01.txt, November, 2007. 

   [21] R. Jain,  ''Internet 3.0: Ten Problems with Current Internet 
             Architecture and Solutions for the Next Generation,'' in 
             Proceedings of Military Communications Conference (MILCOM 
             2006), Washington, DC, October 23-25, 2006, 
             http://www.cse.wustl.edu/~jain/papers/gina.htm 

   [22] S. Paul, J. Pan, and M. Bowman, ''A Vision of the Next Generation 
             Internet: A Policy Oriented View,'' British Computer Society 
             Conference on Visions of Computer Science, Sep 2008, 
             http://www.cse.wustl.edu/~jain/papers/pona.htm  


 
 
Xu and Jain           Expires September 4, 2009              [Page 17] 

Internet-Draft    A Transition Mechanism for RANGI          March 2009 
    

   [23] J. Pan, S. Paul, R. Jain, and M. Bowman, ''MILSA: A Mobility and 
             Multihoming Supporting Identifier-Locator Split 
             Architecture for Naming in the Next Generation Internet,,'' 
             Globecom 2008, Nov 2008, 
             http://www.cse.wustl.edu/~jain/papers/milsa.htm  

   [24] X. Xu and D. Guo, ''Hierarchical Routing Architecture,'' Proc. 4th 
             Euro-NGI Conference on Next Generation Internetworks, 
             Krakow, Poland, 28-30 April 2008, 7 pp., 
             http://www.cse.wustl.edu/~jain/papers/hra.htm  

   [25] J. Pan, R. Jain, S. Paul, M. Bowman, X. Xu, and S. Chen, 
             "Enhanced MILSA Architecture for Naming, Addressing, 
             Routing and Security Issues in the Next Generation 
             Internet," Proc. IEEE International Conference in 
             Communications (ICC) 2009, Dresden, Germany, June 14-18, 
             2009, http://www.cse.wustl.edu/~jain/papers/emilsa.htm 

   [26] X. Xu and R. Jain, ''A Transition Mechanism for  
             Routing Architecture for the Next Generation Internet 
             (RANGI)'', draft-xu-rangi-proxy-00.txt, March 2009. 

10. Acknowledgments 

   We would like to thank several experts who commented on the earlier 
   versions of this proposal including Dave Oran, Joel Halpern, and Tony 
   Li. 

Authors' Addresses 

   Xiaohu Xu 
   Huawei Technologies, 
   No.3 Xinxi Rd., Shang-Di Information Industry Base,  
   Hai-Dian District, Beijing 100085, P.R. China 
   Phone: +86 10 82836073 
   Email: xuxh@huawei.com 
    
   Raj Jain 
   Washington University in Saint Louis 
   One Brookings Drive, Campus Box 1045 
   Saint Louis, MO 63130 USA 
   Phone: +1 314 935 4963 
   Email: jain@cse.wustl.edu 
    
    
 

 
 
Xu and Jain           Expires September 4, 2009              [Page 18] 


PAFTECH AB 2003-20262026-04-24 13:56:05