SlideShare una empresa de Scribd logo
1 de 46
Descargar para leer sin conexión
© John Day, 2013 1	

Rights Reserved	

The Pouzin Society	

We Got Trouble!
Right Here in River City
With a capital T and that Rhymes with P
and That Stands for IP!	

John Day	

Jan 2013	

It doesn’t have to make sense. It’s religion!	

- Robbie Coltrane	

Nuns on the Run
© John Day, 2013 2	

Rights Reserved	

The Pouzin Society	

As the Song Says	

•  Most of our Troubles start with IP	

•  And the Lack of a Complete Addressing Structure	

•  To Understand Why this is the case, we need to go back in
time, back to . . .
© John Day, 2013 3	

Rights Reserved	

The Pouzin Society	

Addressing in the ARPANET
The Root Cause of our Problems	

IMP	

56K Trunk	

56K Trunk	

56K Trunk	

56K Trunk	

Host	

Host	

Host	

Host	

Each ARPANet IMP (switch) had ports to support a maximum of 4 trunks and 4 hosts.	

Each IMP had a number. The host address (IP address) was the IMP # and the	

Host #, i.e. a port number. Maximum number of hosts was huge: 63.	

So a host’s address was its IMP Port Number.
© John Day, 2013 4	

Rights Reserved	

The Pouzin Society	

Was There a Reason?	

Was there a lot of thought given to how addressing should work?	

Not really. 	

We were doing good to do this much!	

There were many much bigger problems to overcome:	

Like just moving data	

And addressing is a hard problem.	

Sure	

It was easy to build for an experimental network of this size.
© John Day, 2013 5	

Rights Reserved	

The Pouzin Society	

Did it take long to realize	

there was a problem?	

IMP	

14	

IMP	

20	

14, 1	

 20, 3	

Host	

Nope.	

First time (~ 1972) one of the Air Force bases took us at our word that the network 	

was suppose to be survivable and asked for links to two different IMPs	

to connect its host to the Network.	

Naming the hosts by the names of their interfaces	

meant that the two connections looked like two hosts to the Net.	

Still does.
© John Day, 2013 6	

Rights Reserved	

The Pouzin Society	

Address Spaces in Operating Systems
(From my OS Course)	

An name space is defined as a set of identifiers with a given scope.	

An address space is a location-dependent name space.	

In Operating Systems, we have found a need for 3 such independent spaces.	

Virtually all uses of names in computing are for locating.	

Application Name Space
Logical Name Space	

Physical Name Space	

Human use, relatively constant,
not at all tied to the hardware,
i.e. location-independent	

Location Dependent but Hardware
Independent; Creates a logical address
space larger than the physical memory;
Allows processes to be re-locatable. 	

Location-Dependent and
Hardware Dependent
© John Day, 2013 7	

Rights Reserved	

The Pouzin Society	

Saltzer’s View of Networks	

•  Application names map to node addresses.	

•  Node addresses map to points of attachment addresses.	

•  Routes are sequences of points of attachments.	

–  Just as in an operating system.	

–  But networks are more general than operating systems.	

Application Name	

Node	

Address	

Point of Attachment	

Address
© John Day, 2013 8	

Rights Reserved	

The Pouzin Society	

Generalizing Saltzer to Networks of Networks	

•  Directory maintains the mapping between Application-Names and the node
addresses of all Applications reachable without an application relay.	

•  Routes are sequences of node addresses used to compute the next hop.	

•  Node to point of attachment mapping for all nearest neighbors to choose path
to next hop. (Even though Saltzer notices this, he is too intent to see that networks are a
more general case.)	

•  This last mapping and the Directory are the same: 	

–  Mapping of a name in the layer above to a name in the layer below of all nearest neighbors.	

Directory	

Route	

Path	

Here	

And
Here
© John Day, 2013 9	

Rights Reserved	

The Pouzin Society	

Applying Results to Real Architectures: The Internet
(This is a Network Architecture)	

•  The most striking feature is that half of the addressing architecture is missing.	

–  No wonder there are addressing problems.	

–  The only identifier we have for anything is the IP address.	

•  There are no node addresses and no application names.	

–  And the point of attachment is named twice!	

–  If this is an Internet Protocol, where are the Network Addresses? (Lost Layer)	

–  Domain Names are synonyms for IP addresses. URLs name a path to an arbitrary
instance of an application.	

MAC Address	

IP Address	

Socket (local)	

Application	

Application	

Name	

Node Address	

Point of Attachment	

Address	

As if your computer worked only with absolute memory addresses.
© John Day, 2013 10	

Rights Reserved	

The Pouzin Society	

There is An Easier Way to See It.	

•  Route on the address in your layer!	

–  Well, duh!	

–  Routing on the Interface is routing on the address in the layer below.	

•  Learned a couple of other things along the way	

–  Addresses only need to be unique within the scope of a layer	

–  Addresses must generally be assigned by the network because it is the
only one that knows where in the network the node is.	

–  Don’t concatenate an (N)-address with an (N-1) address.	

Physical	

Data Link
Network	

Transport	

Application
Host or End System	

Router	

Points of	

attachment	

Nodes
© John Day, 2013 11	

Rights Reserved	

The Pouzin Society	

If This Were an Internet Architecture, Then	

•  There would be multiple Data Link Layers with limited scope.	

•  Network Layers with greater scope that did intra-domain routing	

•  Internet Layer with greater scope yet that did intra-domain routing.	

•  Network Layer addresses would be interface addresses for the Internet
nodes.	

•  That brings us to the first Internet [sic] addressing crisis.	

Internet Gateways
Data Link
Network
Internet
Application
Data Link
Network
Internet
Application
Net 1 Net 2 Net 3
Host Host
© John Day, 2013 12	

Rights Reserved	

The Pouzin Society	

The First Great Internet Addressing Crisis	

•  In 1992, we have the first addressing crisis.	

–  IPv4 addresses are getting scarce	

•  But the real problem is Router Table Size is increasing exponentially.	

•  The IAB convenes the ROAD process	

–  Recommends CLNP as IPv7	

•  Basically IP with variable length aggregateable addresses.	

•  CLNP names the node. Hence, fixes the multihoming problem.	

•  The IETF goes berserk!	

–  No OSI, no way, no how!	

•  A model? We don’t need no stinking model. We’ve got	

•  Rough Consensus and Running Code!
© John Day, 2013 13	

Rights Reserved	

The Pouzin Society	

The IPng Process	

•  The Rules were:	

–  Fixed Length Address	

–  Continue to Name the Interface.	

–  At least 20 octets of address	

–  Open Standard	

•  Violá! IPv6!	

•  or anything but CLNP.	

•  Still no solution to multihoming	

–  Problem is now 20 years old
© John Day, 2013 14	

Rights Reserved	

The Pouzin Society	

All is Not Well	

•  Less than a Year later, light dawns (slightly)!	

–  Name the Interface, but route aggregation is a must	

–  Implies provider based assignment. 	

–  Means change providers, must renumber. WHAT!?	

•  Kind of shot yourself in the foot, eh?	

•  Transition is dual stack with a NAT	

–  Once you have a NAT, you don’t need v6 . . . oops.	

•  How many feet do you have?
© John Day, 2013 15	

Rights Reserved	

The Pouzin Society	

Techs Play Architect	

•  Finally around 2000, need to deal with multihoming, but	

–  given negative reaction to naming the node, need a workaround	

•  Ahh! The problem is that we have been overloading the semantics of
the IP address with location and identifier information.	

–  We need to split them. Loc/id split is the Answer.	

–  A locator we can route on and a flat endpoint id (EID)	

•  Psssst! Can’t identify something without locating it and vice versa	

–  Saltzer [1977] defines “resolve” as in “resolving a name” as “to locate an object in a
particular context, given its name.”
•  Got another foot?	

•  Don’t bother me with pedantic terminology, 	

–  IPv6 is the future!
© John Day, 2013 16	

Rights Reserved	

The Pouzin Society	

Trouble is Not Much Interest in v6	

•  It offers no benefit to those who pay for adopting it	

–  They just don’t know they want it.	

•  For the next decade, there is the hype:	

–  Better security, better QoS, better mobility	

–  “A desert topping and a floor wax!” - Mike O’Dell	

•  In fact, all of these are the same as IPv4 . . . no different	

•  “IPv6 has all the benefit of a minor technology change with all the
disruption of a major fork-lift upgrade.” - Geoff Huston, 2008.	

–  Just switch to v6 and all will be well.	

•  By 2000, dawning awareness the architecture is running out of steam	

–  NEWARCH, Clean Slate, FIND and GENI are hot!	

–  Starts to be a lot of talk about loc/id split.	

–  This is clearly the answer . . . . (really?).
© John Day, 2013 17	

Rights Reserved	

The Pouzin Society	

Houston, We Have a Problem
(The Second Great Internet Addressing Crisis)	

•  October 2006, major presentation at IEPG. 	

–  Router table size is on the increase, due to multihoming. 	

•  It is either quadratic or exponential, can’t tell yet.	

–  (does it matter!?)	

–  Moore’s Law won’t bail us out this time.	

•  This is a big time crisis. We are in big trouble.	

•  If not fixed, it is the end of the Internet as we know it.	

–  Net will fragment. Costs in the core will skyrocket.	

–  NetworkWorld sits on the story for a year.	

–  Tons of papers written on loc/id split!
© John Day, 2013 18	

Rights Reserved	

The Pouzin Society	

But We Do Multihoming!
(not really)	

•  We kludge it.	

•  Because we route on the interface, this forces route aggregation to be
provider-based.	

–  Addresses with a common prefix go to the same provider then we can
store a single route (to the provider) rather than a route for every address
on that provider.	

•  To do multihoming, must assign provider-independent addresses or
new AS numbers (same thing).	

–  Can’t be aggregated Router table size increases	

–  Remember what our problem is? Router table size is increasing
© John Day, 2013 19	

Rights Reserved	

The Pouzin Society	

So Why Wasn’t It Fixed?	

•  Odd that a DoD network touted to survive nuclear attack didn’t
support redundant links. Lots of “good reasons:”	

–  Not that many hosts need to be multi-homed.	

•  Not then, but the ones that did were the ones everyone wanted to get to.	

–  Not everyone should have to bear the cost for a few.	

•  Classic committee politics: Put a condition on the solution that
guarantees any proposal will be rejected (asymmetry in this case)	

•  Also assumes there is a cost.	

–  Multihoming will be to different providers, so no point.	

•  Assumption is wrong and even if right assumes a static network.	

–  Remember, we tried to fix it but it was rejected by the IETF.
© John Day, 2013 20	

Rights Reserved	

The Pouzin Society	

But By This Time	

•  Cisco and others start proposing solutions to the multihoming problem.	

–  Mostly requiring patches involving NATs and a bevy of new protocols.	

–  In particular, LISP or Loc/ID Split Protocol	

•  This makes everyone nervous, but what else to do?	

•  Well, we could work out a theoretical framework to see what is going on.	

•  This is a crisis! We have to build something!	

•  Best way known to stampede people to your view.
© John Day, 2013 21	

Rights Reserved	

The Pouzin Society	

November 2008
Houston, We have a Bigger Problem	

•  Dave Meyer calls, ‘I have an “architectural issue” to discuss.’	

–  He has come across two problems in implementing LISP.	

–  Both require doing path discovery.	

–  Path discovery doesn’t scale. 	

–  LISP won’t scale. QED	

–  He suspects that any loc/id approach will have the same problem.	

•  draft-meyer-loc-id-implications-01.txt	

•  In case you didn’t notice, we just went to DefCon1	

•  Dave: Why hasn’t anyone noticed this in the last 15 years?
© John Day, 2013 22	

Rights Reserved	

The Pouzin Society	

Dave is Right	

•  All proposals based on loc/id split have the same flaw.	

•  Once put in the context of the RINA theory, it is obvious.	

•  Let us look at it very carefully. What do the locator and the identifier
name?	

Endpoint Identifier	

Locators	

The Locator Locates the Wrong Thing!	

The locator is part of the path, not the final destination.	

No wonder Dave ran into path discovery issues.
© John Day, 2013 23	

Rights Reserved	

The Pouzin Society	

Apply the e2e principle!
(the answer to everything)
Solve the Problem in the Hosts	

•  There are poor misguided souls claiming this.	

–  Mostly done by changing the definition of multihoming.	

–  Ignore that it might take seconds if not minutes to do the failover.	

•  Remember the fundamental problem is that the network doesn’t know
that two paths go to the same place.	

–  This is a problem of delivering, not sending.	

–  There is no host-based solution.	

•  There is no solution as long as one routes only on the interface address.
Which means . . .
© John Day, 2013 24	

Rights Reserved	

The Pouzin Society	

If Loc/ID Doesn’t Scale	

•  Then there is no solution involving routing on the interface that scales.	

•  In other words,	

•  But we saw that coming a long time ago.	

IP is Fundamentally Flawed	

(v4 or v6)
© John Day, 2013 25	

Rights Reserved	

The Pouzin Society	

So What Is the IETF Plan B?	

•  Plan A	

•  What are the major Universities working on?	

•  Plan A	

•  What are the vendors working on?	

•  Plan A . . . . Still?	

•  Talk about scary, there was a summit in the Spring of 2009 to discuss the addressing crisis	

•  The agenda: to determine what form of loc/id split to use! 	

–  It is important to get those deck chairs lined up very neatly.
© John Day, 2013 26	

Rights Reserved	

The Pouzin Society	

What Do the Vendors Say?	

•  Yes, there may be some scaling issues with loc/id split.	

•  But we recommend using it, they are very unlikely to ever be a problem.	

•  You mean unlikely as in “it is very unlikely a lot of people will default
on home mortgages”?	

–  (we know where that went)	

•  Don’t worry! It won’t happen very often, only in a crisis.	

A Black Swan?
© John Day, 2013 27	

Rights Reserved	

The Pouzin Society	

But Everything Works Fine!	

•  Yes and it will for a few more years.	

•  When you notice it, it means we are already over the cliff. 	

 	

	

 	

 	

Vince Fuller, Cisco.	

“Has he vertigo? 	

No, only about	

ten stories more!”	

- Ogden Nash
© John Day, 2013 28	

Rights Reserved	

The Pouzin Society	

Wanna Hear the Real P*sser?	

•  We had the right answer in 1992.	

•  The answer we had known since 1972.	

–  It was rejected by the IETF.	

•  And to add insult to injury, it was DEPLOYED and Operational in the
routers.	

–  We could have spent the last 15 years working on transition	

–  Rather than 100s of millions on a small incremental step that provides no
benefit to your bottom line and is fundamentally flawed.	

–  You just can’t make this stuff up!
© John Day, 2013 29	

Rights Reserved	

The Pouzin Society	

The Problem was Never Separating Locator from Identifier. 
It was always about
Separating Logical Location from Physical Location	

•  It is impossible to locate something without also identifying it.	

•  This pseudo-problem arises from not having a complete address architecture.	

–  And creates enough epicycles upon epicycles to make Clavius proud	

•  But we will give O’Dell the last word:	

–  When all you have is a hammer, everything looks like your thumb	

•  It is still more like DOS than anything else.	

Location dependent,	

Route independent	

Route Dependent	

Location	

Independence	

Application Name Space
Logical Name Space	

Physical Name Space	

Application Names	

Node Address 	

Point of Attachment
© John Day, 2013 30	

Rights Reserved	

The Pouzin Society	

Addressing In RINA	

•  All identifiers are based on the nature of the application
process or in this case, the IPC Process.	

•  First, lets look in brief:
© John Day, 2013 31	

Rights Reserved	

The Pouzin Society	

Applications and Communication	

•  The Application-Entity (AE) is that part of the application concerned
with communication, i.e. shared state with its peer.	

•  The rest of the Application Process is concerned with the reason for
the application in the first place.	

•  An Application Process may have multiple AEs, they assumed, for
different application protocols.	

–  An HTTP library linked into a web browser is an AE; FTP is another.	

Application
Process
Application-Entities
© John Day, 2013 32	

Rights Reserved	

The Pouzin Society	

Application Naming	

•  Application-process names (APN) are globally unambiguous and location-independent,
but system-dependent.	

–  They may have synonyms of less scope from the same or different name space.	

–  There may be multiple instances of the process in the same system.	

•  APN-instance-identifiers are unambiguous within the scope of the Application Process.	

•  Application-entity-identifiers are unambiguous within the application process.	

–  There may be more than one Application-entity (AE) in a process.	

•  Unambiguous within the scope of the Application Process.	

–  There may be more than one instance of each type of Application-Entity.	

•  AE-instance-identifiers are unambiguous within the scope of the AE.	

•  Distributed Application Name is the name of a set of application processes and system-
independent.	

•  Few applications need all of these but a complete theory requires all of them.	

Application
Process
Application-Entities
© John Day, 2013 33	

Rights Reserved	

The Pouzin Society	

What Good is All This?	

•  Many capabilities not possible today or that require specific protocols
are a consequence of naming and enabled by a complete architecture.	

–  Handing off a connection from one system to another;	

–  The need to pass IP addresses among applications is avoided;	

–  Opening multiple connections with different “protocols” to the same
instance of an application process.	

–  Connecting to an existing “conference” call, etc.	

–  And probably 1000s of things we haven’t thought of yet.	

Application
Process
Application-Entities
© John Day, 2013 34	

Rights Reserved	

The Pouzin Society	

Naming in RINA	

•  IPC Process-name is just an application-process-name	

–  An address is a synonym that names an IPC Process with scope restricted to the
DIF and maybe structured to facilitate use within the DIF.	

•  A port-id is a Flow-Allocator-Instance-Id, an AE instance.	

•  A connection-endpoint-id (CEP-id) is an EFCP-instance-id, an AE instance.	

•  Note that these are local to the IPC Process.	

•  A connection-id is created by concatenating source and destination CEP-ids.	

•  That’s It! 	

IPC Management Common Application
Protocol
Resource Allocation
RIB Daemon
IRM
IDD	

RMT
EFCP
Flow Allocator
IPC Process
© John Day, 2013 35	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(Basics)	

•  We have made a big deal of node and point of attachment, but they are
relative, not absolutes.	

–  An (N)-IPC-Process is a node in the (N)-DIF.	

•  An (N-1)-IPC-Process is a node in the (N-1)-DIF	

–  An (N-1)-IPC-Process is a point of attachment to an (N)-IPC-Process.	

–  An (N)-address is a synonym for an (N)-IPC-Process.	

•  So as long as we keep that straight, there is no point to making the distinction.	

•  Note that it is the port-id that creates layer independence. With a port-id, No
Protocol-Id Field is Necessary, or if there is such a field something is wrong.	

Address	

Port -id	

(N)-IPC-Process	

(N-1)-IPC-Process
© John Day, 2013 36	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(Multihoming)	

•  Yea, so? What is the big deal?	

–  It just works	

•  PDU arrives at the (N-1)-IPC Process. If the address designates this IPC
Process, the CEP-id is bound to the port-id, so after stripping off (N-1)-PCI, it
passes it up. 	

•  The process repeats. If the address in the (N)-PCI is this IPC-Process, it looks
at the CEP-id and pass it up as appropriate.	

•  Normal operation. Yes, the (N-1)-bindings may fail from time to time.	

•  Not a big deal.	

Address	

Port -id	

(N)-IPC-Process	

(N-1)-IPC-Process
© John Day, 2013 37	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(Mobility)	

•  Yea, so? What is the big deal?	

–  It just works just like multihoming only the (N-1)-port-ids come and go a
bit more frequently.	

•  O, worried about having to change address if it moves too far? Easy.	

•  Assign a new synonym to it. Put it in the source address field on all outgoing
traffic. Stop advertising the old address as a route to this IPC-Process.	

•  Want to renumber the DIF for some reason? Same procedure.	

•  Again, no special cases. No special protocols. No concept of a home
router. Okay, policies in the DIF may be a bit different to
accommodate faster changing points of attachment, but that is it.	

Address	

Port -id	

(N)-IPC-Process	

(N-1)-IPC-Process	

New Address
© John Day, 2013 38	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names 
(Routing Table Size)	

•  Recursion either reduces the number of routes or shortens them.	

Backbone	

Regionals	

Metros
© John Day, 2013 39	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names 
(Routing Table Size)	

•  For the Internet O((6r)2 where r is the number of routers in the network.	

Non-topological T opological
Metros-DIF 3 O ( ( 2 D n)2
) O ( ( D m)2
) where n is the number of hosts
and m is the number of hosts
and border routers on a single
subnet.
Regionals-DIF 2 O((2Dn2)2
) O ( ( D m2)2
) where n2 is the number of
border routers around the
outside and m2 is number of
border routers at this level on a
single subnet.
Backbone-DIF 1 O((2Dn1)2
) O ( ( 2 D n1)2
) where n1 is the number of
border routers on the backbone.
Note that m  n.
© John Day, 2013 40	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names 
(Choosing a Layer)	

•  In building the IPC Model, the first time there were multiple DIFs (data
link layers in that case), to maintain the API a task was needed to
determine which DIF to use. 	

I
A
P
D
i
r
Mux	

Flow	

Mgr	

– 	

User didn’t have to see all of the wires	

–  But the User shouldn’t have to see all of the “Nets” either.	

•  This not only generalizes but has major implications.
© John Day, 2013 41	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(An Inter-DIF-Directory)	

•  Inter-DIF Manager determines via what DIFs applications are available.	

–  If this system is a not member, it either joins the DIF as before	

–  or creates a new one.	

•  Which Implies that the largest address space has to be only large enough
for the largest e-mall.	

•  Given the structure, 32 or 48 bits is probably more than enough.	

•  You mean?	

•  Right. IPv6 was a waste of time . . .	

•  Twice.	

Inter-DIF	

Dir
© John Day, 2013 42	

Rights Reserved	

The Pouzin Society	

So a Global Address Space is Not Required but
Neither is a Global Application Name Space	

Inter-DIF	

Directory	

To Peers	

In Oher DIFs	

Actually one could still have distinct names spaces within a
DIFs (synonyms) with its own directory database.	

•  Not all names need be in one Global Directory.	

•  Coexisting application name spaces and directory of distributed
databases are not only possible, but useful.	

•  Needless to say, a global name space can be useful, but not a
requirement imposed by the architecture.	

•  The scope of the name space is defined by the chain of databases that
point to each other.
© John Day, 2013 43	

Rights Reserved	

The Pouzin Society	

Scope is Determined by the
Chain of Places to Look	

•  The chain of databases to look for names determines the
scope of the name space.	

–  Here there are 2 non-intersecting chains of systems, that could be
using the same wires, but would be entirely oblivious to the other.
© John Day, 2013 44	

Rights Reserved	

The Pouzin Society	

Multicast and Anycast are Simpler Too	

•  Generalized to Whatevercast:	

–  A set and a rule that returns as many members of the set that satisfy the
rule.	

•  Unicast becomes a degenerate case of whatevercast.	

–  Forwarding table entry maps Destination Address to a list of next hops.
For unicast, the list has one element.	

•  Primarily handled by hosts or border routers, where all whatevercast
traffic is either:	

•  On this subnet (only do spanning tree within subnet if there is a lot) or	

•  Transit to another subnet, (both cases degenerate to point-to-point).	

•  So we see Whatevercast devolves into Unicast.
© John Day, 2013 45	

Rights Reserved	

The Pouzin Society	

Multicast and Anycast are Simpler Too	

•  Information in topological addresses imply an approximate spanning
tree, which can be used to identify the border routers. Thus, in most
cases obviating the need for a separate spanning tree (multicast)
routing algorithm.	

•  And also making it straightforward to multiplex whatevercasts with
common sub-trees which will allow even greater efficiency.	

–  Note that the common sub-trees do not have to be strict sub-trees but
simply have a reasonable degree of commonality to be worthwhile.
© John Day, 2013 46	

Rights Reserved	

The Pouzin Society	

As I said At the Beginning	

What’s All the Fuss? ;-)	

Questions?

Más contenido relacionado

Destacado

Anomaly detection and root cause analysis in distributed application transact...
Anomaly detection and root cause analysis in distributed application transact...Anomaly detection and root cause analysis in distributed application transact...
Anomaly detection and root cause analysis in distributed application transact...
Yuchen Zhao
 
RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...
Eleni Trouva
 

Destacado (20)

Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-stein
 
The hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diego
 
The hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguel
 
The hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzo
 
The hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduard
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peyman
 
Rina sim workshop
Rina sim workshopRina sim workshop
Rina sim workshop
 
Congestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network Architectures
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016
 
Irati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA Workshop
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
Anomaly detection and root cause analysis in distributed application transact...
Anomaly detection and root cause analysis in distributed application transact...Anomaly detection and root cause analysis in distributed application transact...
Anomaly detection and root cause analysis in distributed application transact...
 
Data Science in Industry - Applying Machine Learning to Real-world Challenges
Data Science in Industry - Applying Machine Learning to Real-world ChallengesData Science in Industry - Applying Machine Learning to Real-world Challenges
Data Science in Industry - Applying Machine Learning to Real-world Challenges
 
RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...RINA: Update on research and prototyping activities. Global Future Internet W...
RINA: Update on research and prototyping activities. Global Future Internet W...
 
Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014Experimental evaluation of a RINA prototype - GC 2014
Experimental evaluation of a RINA prototype - GC 2014
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE Workshop
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
 
Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013
 

Similar a 3 addressingthe problem130123

How it works internet networking icann53
How it works internet networking icann53How it works internet networking icann53
How it works internet networking icann53
ICANN
 
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdfHow is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
fsenterprises
 

Similar a 3 addressingthe problem130123 (20)

Dublin addressingtheproblem131224
Dublin addressingtheproblem131224Dublin addressingtheproblem131224
Dublin addressingtheproblem131224
 
1 lost layer130123
1 lost layer1301231 lost layer130123
1 lost layer130123
 
Vtc keynote201110
Vtc keynote201110Vtc keynote201110
Vtc keynote201110
 
Lost layer talk 2014
Lost layer talk 2014Lost layer talk 2014
Lost layer talk 2014
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
 
Pace IT - Introduction to IPv6
Pace IT - Introduction to IPv6Pace IT - Introduction to IPv6
Pace IT - Introduction to IPv6
 
RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014
 
How it works internet networking icann53
How it works internet networking icann53How it works internet networking icann53
How it works internet networking icann53
 
RINA Introduction, part I
RINA Introduction, part IRINA Introduction, part I
RINA Introduction, part I
 
Computing powerpoint
Computing powerpointComputing powerpoint
Computing powerpoint
 
6 security130123
6 security1301236 security130123
6 security130123
 
In Defence of NATs
In Defence of NATsIn Defence of NATs
In Defence of NATs
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
What is IPv6?
What is IPv6?What is IPv6?
What is IPv6?
 
Micheal O'Foghlu - TSSG
Micheal O'Foghlu - TSSGMicheal O'Foghlu - TSSG
Micheal O'Foghlu - TSSG
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
The Internet
The InternetThe Internet
The Internet
 
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdfHow is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
 
An IPv6 Primer
An IPv6 PrimerAn IPv6 Primer
An IPv6 Primer
 

Más de Eleni Trouva

RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
Eleni Trouva
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussion
Eleni Trouva
 
IRATI project presentation
IRATI project presentationIRATI project presentation
IRATI project presentation
Eleni Trouva
 
Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012
Eleni Trouva
 

Más de Eleni Trouva (9)

RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
 
RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013RINA IRATI Korea-EU Workshop 2013
RINA IRATI Korea-EU Workshop 2013
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6
 
Unreliable inter process communication in Ethernet: Migrating to RINA with th...
Unreliable inter process communication in Ethernet: Migrating to RINA with th...Unreliable inter process communication in Ethernet: Migrating to RINA with th...
Unreliable inter process communication in Ethernet: Migrating to RINA with th...
 
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussion
 
IRATI project presentation
IRATI project presentationIRATI project presentation
IRATI project presentation
 
Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012Irati fire-engineering-workshop-nov2012
Irati fire-engineering-workshop-nov2012
 

Último

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

3 addressingthe problem130123

  • 1. © John Day, 2013 1 Rights Reserved The Pouzin Society We Got Trouble! Right Here in River City With a capital T and that Rhymes with P and That Stands for IP! John Day Jan 2013 It doesn’t have to make sense. It’s religion! - Robbie Coltrane Nuns on the Run
  • 2. © John Day, 2013 2 Rights Reserved The Pouzin Society As the Song Says •  Most of our Troubles start with IP •  And the Lack of a Complete Addressing Structure •  To Understand Why this is the case, we need to go back in time, back to . . .
  • 3. © John Day, 2013 3 Rights Reserved The Pouzin Society Addressing in the ARPANET The Root Cause of our Problems IMP 56K Trunk 56K Trunk 56K Trunk 56K Trunk Host Host Host Host Each ARPANet IMP (switch) had ports to support a maximum of 4 trunks and 4 hosts. Each IMP had a number. The host address (IP address) was the IMP # and the Host #, i.e. a port number. Maximum number of hosts was huge: 63. So a host’s address was its IMP Port Number.
  • 4. © John Day, 2013 4 Rights Reserved The Pouzin Society Was There a Reason? Was there a lot of thought given to how addressing should work? Not really. We were doing good to do this much! There were many much bigger problems to overcome: Like just moving data And addressing is a hard problem. Sure It was easy to build for an experimental network of this size.
  • 5. © John Day, 2013 5 Rights Reserved The Pouzin Society Did it take long to realize there was a problem? IMP 14 IMP 20 14, 1 20, 3 Host Nope. First time (~ 1972) one of the Air Force bases took us at our word that the network was suppose to be survivable and asked for links to two different IMPs to connect its host to the Network. Naming the hosts by the names of their interfaces meant that the two connections looked like two hosts to the Net. Still does.
  • 6. © John Day, 2013 6 Rights Reserved The Pouzin Society Address Spaces in Operating Systems (From my OS Course) An name space is defined as a set of identifiers with a given scope. An address space is a location-dependent name space. In Operating Systems, we have found a need for 3 such independent spaces. Virtually all uses of names in computing are for locating. Application Name Space Logical Name Space Physical Name Space Human use, relatively constant, not at all tied to the hardware, i.e. location-independent Location Dependent but Hardware Independent; Creates a logical address space larger than the physical memory; Allows processes to be re-locatable. Location-Dependent and Hardware Dependent
  • 7. © John Day, 2013 7 Rights Reserved The Pouzin Society Saltzer’s View of Networks •  Application names map to node addresses. •  Node addresses map to points of attachment addresses. •  Routes are sequences of points of attachments. –  Just as in an operating system. –  But networks are more general than operating systems. Application Name Node Address Point of Attachment Address
  • 8. © John Day, 2013 8 Rights Reserved The Pouzin Society Generalizing Saltzer to Networks of Networks •  Directory maintains the mapping between Application-Names and the node addresses of all Applications reachable without an application relay. •  Routes are sequences of node addresses used to compute the next hop. •  Node to point of attachment mapping for all nearest neighbors to choose path to next hop. (Even though Saltzer notices this, he is too intent to see that networks are a more general case.) •  This last mapping and the Directory are the same: –  Mapping of a name in the layer above to a name in the layer below of all nearest neighbors. Directory Route Path Here And Here
  • 9. © John Day, 2013 9 Rights Reserved The Pouzin Society Applying Results to Real Architectures: The Internet (This is a Network Architecture) •  The most striking feature is that half of the addressing architecture is missing. –  No wonder there are addressing problems. –  The only identifier we have for anything is the IP address. •  There are no node addresses and no application names. –  And the point of attachment is named twice! –  If this is an Internet Protocol, where are the Network Addresses? (Lost Layer) –  Domain Names are synonyms for IP addresses. URLs name a path to an arbitrary instance of an application. MAC Address IP Address Socket (local) Application Application Name Node Address Point of Attachment Address As if your computer worked only with absolute memory addresses.
  • 10. © John Day, 2013 10 Rights Reserved The Pouzin Society There is An Easier Way to See It. •  Route on the address in your layer! –  Well, duh! –  Routing on the Interface is routing on the address in the layer below. •  Learned a couple of other things along the way –  Addresses only need to be unique within the scope of a layer –  Addresses must generally be assigned by the network because it is the only one that knows where in the network the node is. –  Don’t concatenate an (N)-address with an (N-1) address. Physical Data Link Network Transport Application Host or End System Router Points of attachment Nodes
  • 11. © John Day, 2013 11 Rights Reserved The Pouzin Society If This Were an Internet Architecture, Then •  There would be multiple Data Link Layers with limited scope. •  Network Layers with greater scope that did intra-domain routing •  Internet Layer with greater scope yet that did intra-domain routing. •  Network Layer addresses would be interface addresses for the Internet nodes. •  That brings us to the first Internet [sic] addressing crisis. Internet Gateways Data Link Network Internet Application Data Link Network Internet Application Net 1 Net 2 Net 3 Host Host
  • 12. © John Day, 2013 12 Rights Reserved The Pouzin Society The First Great Internet Addressing Crisis •  In 1992, we have the first addressing crisis. –  IPv4 addresses are getting scarce •  But the real problem is Router Table Size is increasing exponentially. •  The IAB convenes the ROAD process –  Recommends CLNP as IPv7 •  Basically IP with variable length aggregateable addresses. •  CLNP names the node. Hence, fixes the multihoming problem. •  The IETF goes berserk! –  No OSI, no way, no how! •  A model? We don’t need no stinking model. We’ve got •  Rough Consensus and Running Code!
  • 13. © John Day, 2013 13 Rights Reserved The Pouzin Society The IPng Process •  The Rules were: –  Fixed Length Address –  Continue to Name the Interface. –  At least 20 octets of address –  Open Standard •  Violá! IPv6! •  or anything but CLNP. •  Still no solution to multihoming –  Problem is now 20 years old
  • 14. © John Day, 2013 14 Rights Reserved The Pouzin Society All is Not Well •  Less than a Year later, light dawns (slightly)! –  Name the Interface, but route aggregation is a must –  Implies provider based assignment. –  Means change providers, must renumber. WHAT!? •  Kind of shot yourself in the foot, eh? •  Transition is dual stack with a NAT –  Once you have a NAT, you don’t need v6 . . . oops. •  How many feet do you have?
  • 15. © John Day, 2013 15 Rights Reserved The Pouzin Society Techs Play Architect •  Finally around 2000, need to deal with multihoming, but –  given negative reaction to naming the node, need a workaround •  Ahh! The problem is that we have been overloading the semantics of the IP address with location and identifier information. –  We need to split them. Loc/id split is the Answer. –  A locator we can route on and a flat endpoint id (EID) •  Psssst! Can’t identify something without locating it and vice versa –  Saltzer [1977] defines “resolve” as in “resolving a name” as “to locate an object in a particular context, given its name.” •  Got another foot? •  Don’t bother me with pedantic terminology, –  IPv6 is the future!
  • 16. © John Day, 2013 16 Rights Reserved The Pouzin Society Trouble is Not Much Interest in v6 •  It offers no benefit to those who pay for adopting it –  They just don’t know they want it. •  For the next decade, there is the hype: –  Better security, better QoS, better mobility –  “A desert topping and a floor wax!” - Mike O’Dell •  In fact, all of these are the same as IPv4 . . . no different •  “IPv6 has all the benefit of a minor technology change with all the disruption of a major fork-lift upgrade.” - Geoff Huston, 2008. –  Just switch to v6 and all will be well. •  By 2000, dawning awareness the architecture is running out of steam –  NEWARCH, Clean Slate, FIND and GENI are hot! –  Starts to be a lot of talk about loc/id split. –  This is clearly the answer . . . . (really?).
  • 17. © John Day, 2013 17 Rights Reserved The Pouzin Society Houston, We Have a Problem (The Second Great Internet Addressing Crisis) •  October 2006, major presentation at IEPG. –  Router table size is on the increase, due to multihoming. •  It is either quadratic or exponential, can’t tell yet. –  (does it matter!?) –  Moore’s Law won’t bail us out this time. •  This is a big time crisis. We are in big trouble. •  If not fixed, it is the end of the Internet as we know it. –  Net will fragment. Costs in the core will skyrocket. –  NetworkWorld sits on the story for a year. –  Tons of papers written on loc/id split!
  • 18. © John Day, 2013 18 Rights Reserved The Pouzin Society But We Do Multihoming! (not really) •  We kludge it. •  Because we route on the interface, this forces route aggregation to be provider-based. –  Addresses with a common prefix go to the same provider then we can store a single route (to the provider) rather than a route for every address on that provider. •  To do multihoming, must assign provider-independent addresses or new AS numbers (same thing). –  Can’t be aggregated Router table size increases –  Remember what our problem is? Router table size is increasing
  • 19. © John Day, 2013 19 Rights Reserved The Pouzin Society So Why Wasn’t It Fixed? •  Odd that a DoD network touted to survive nuclear attack didn’t support redundant links. Lots of “good reasons:” –  Not that many hosts need to be multi-homed. •  Not then, but the ones that did were the ones everyone wanted to get to. –  Not everyone should have to bear the cost for a few. •  Classic committee politics: Put a condition on the solution that guarantees any proposal will be rejected (asymmetry in this case) •  Also assumes there is a cost. –  Multihoming will be to different providers, so no point. •  Assumption is wrong and even if right assumes a static network. –  Remember, we tried to fix it but it was rejected by the IETF.
  • 20. © John Day, 2013 20 Rights Reserved The Pouzin Society But By This Time •  Cisco and others start proposing solutions to the multihoming problem. –  Mostly requiring patches involving NATs and a bevy of new protocols. –  In particular, LISP or Loc/ID Split Protocol •  This makes everyone nervous, but what else to do? •  Well, we could work out a theoretical framework to see what is going on. •  This is a crisis! We have to build something! •  Best way known to stampede people to your view.
  • 21. © John Day, 2013 21 Rights Reserved The Pouzin Society November 2008 Houston, We have a Bigger Problem •  Dave Meyer calls, ‘I have an “architectural issue” to discuss.’ –  He has come across two problems in implementing LISP. –  Both require doing path discovery. –  Path discovery doesn’t scale. –  LISP won’t scale. QED –  He suspects that any loc/id approach will have the same problem. •  draft-meyer-loc-id-implications-01.txt •  In case you didn’t notice, we just went to DefCon1 •  Dave: Why hasn’t anyone noticed this in the last 15 years?
  • 22. © John Day, 2013 22 Rights Reserved The Pouzin Society Dave is Right •  All proposals based on loc/id split have the same flaw. •  Once put in the context of the RINA theory, it is obvious. •  Let us look at it very carefully. What do the locator and the identifier name? Endpoint Identifier Locators The Locator Locates the Wrong Thing! The locator is part of the path, not the final destination. No wonder Dave ran into path discovery issues.
  • 23. © John Day, 2013 23 Rights Reserved The Pouzin Society Apply the e2e principle! (the answer to everything) Solve the Problem in the Hosts •  There are poor misguided souls claiming this. –  Mostly done by changing the definition of multihoming. –  Ignore that it might take seconds if not minutes to do the failover. •  Remember the fundamental problem is that the network doesn’t know that two paths go to the same place. –  This is a problem of delivering, not sending. –  There is no host-based solution. •  There is no solution as long as one routes only on the interface address. Which means . . .
  • 24. © John Day, 2013 24 Rights Reserved The Pouzin Society If Loc/ID Doesn’t Scale •  Then there is no solution involving routing on the interface that scales. •  In other words, •  But we saw that coming a long time ago. IP is Fundamentally Flawed (v4 or v6)
  • 25. © John Day, 2013 25 Rights Reserved The Pouzin Society So What Is the IETF Plan B? •  Plan A •  What are the major Universities working on? •  Plan A •  What are the vendors working on? •  Plan A . . . . Still? •  Talk about scary, there was a summit in the Spring of 2009 to discuss the addressing crisis •  The agenda: to determine what form of loc/id split to use! –  It is important to get those deck chairs lined up very neatly.
  • 26. © John Day, 2013 26 Rights Reserved The Pouzin Society What Do the Vendors Say? •  Yes, there may be some scaling issues with loc/id split. •  But we recommend using it, they are very unlikely to ever be a problem. •  You mean unlikely as in “it is very unlikely a lot of people will default on home mortgages”? –  (we know where that went) •  Don’t worry! It won’t happen very often, only in a crisis. A Black Swan?
  • 27. © John Day, 2013 27 Rights Reserved The Pouzin Society But Everything Works Fine! •  Yes and it will for a few more years. •  When you notice it, it means we are already over the cliff. Vince Fuller, Cisco. “Has he vertigo? No, only about ten stories more!” - Ogden Nash
  • 28. © John Day, 2013 28 Rights Reserved The Pouzin Society Wanna Hear the Real P*sser? •  We had the right answer in 1992. •  The answer we had known since 1972. –  It was rejected by the IETF. •  And to add insult to injury, it was DEPLOYED and Operational in the routers. –  We could have spent the last 15 years working on transition –  Rather than 100s of millions on a small incremental step that provides no benefit to your bottom line and is fundamentally flawed. –  You just can’t make this stuff up!
  • 29. © John Day, 2013 29 Rights Reserved The Pouzin Society The Problem was Never Separating Locator from Identifier. It was always about Separating Logical Location from Physical Location •  It is impossible to locate something without also identifying it. •  This pseudo-problem arises from not having a complete address architecture. –  And creates enough epicycles upon epicycles to make Clavius proud •  But we will give O’Dell the last word: –  When all you have is a hammer, everything looks like your thumb •  It is still more like DOS than anything else. Location dependent, Route independent Route Dependent Location Independence Application Name Space Logical Name Space Physical Name Space Application Names Node Address Point of Attachment
  • 30. © John Day, 2013 30 Rights Reserved The Pouzin Society Addressing In RINA •  All identifiers are based on the nature of the application process or in this case, the IPC Process. •  First, lets look in brief:
  • 31. © John Day, 2013 31 Rights Reserved The Pouzin Society Applications and Communication •  The Application-Entity (AE) is that part of the application concerned with communication, i.e. shared state with its peer. •  The rest of the Application Process is concerned with the reason for the application in the first place. •  An Application Process may have multiple AEs, they assumed, for different application protocols. –  An HTTP library linked into a web browser is an AE; FTP is another. Application Process Application-Entities
  • 32. © John Day, 2013 32 Rights Reserved The Pouzin Society Application Naming •  Application-process names (APN) are globally unambiguous and location-independent, but system-dependent. –  They may have synonyms of less scope from the same or different name space. –  There may be multiple instances of the process in the same system. •  APN-instance-identifiers are unambiguous within the scope of the Application Process. •  Application-entity-identifiers are unambiguous within the application process. –  There may be more than one Application-entity (AE) in a process. •  Unambiguous within the scope of the Application Process. –  There may be more than one instance of each type of Application-Entity. •  AE-instance-identifiers are unambiguous within the scope of the AE. •  Distributed Application Name is the name of a set of application processes and system- independent. •  Few applications need all of these but a complete theory requires all of them. Application Process Application-Entities
  • 33. © John Day, 2013 33 Rights Reserved The Pouzin Society What Good is All This? •  Many capabilities not possible today or that require specific protocols are a consequence of naming and enabled by a complete architecture. –  Handing off a connection from one system to another; –  The need to pass IP addresses among applications is avoided; –  Opening multiple connections with different “protocols” to the same instance of an application process. –  Connecting to an existing “conference” call, etc. –  And probably 1000s of things we haven’t thought of yet. Application Process Application-Entities
  • 34. © John Day, 2013 34 Rights Reserved The Pouzin Society Naming in RINA •  IPC Process-name is just an application-process-name –  An address is a synonym that names an IPC Process with scope restricted to the DIF and maybe structured to facilitate use within the DIF. •  A port-id is a Flow-Allocator-Instance-Id, an AE instance. •  A connection-endpoint-id (CEP-id) is an EFCP-instance-id, an AE instance. •  Note that these are local to the IPC Process. •  A connection-id is created by concatenating source and destination CEP-ids. •  That’s It! IPC Management Common Application Protocol Resource Allocation RIB Daemon IRM IDD RMT EFCP Flow Allocator IPC Process
  • 35. © John Day, 2013 35 Rights Reserved The Pouzin Society Implications of the Model Names (Basics) •  We have made a big deal of node and point of attachment, but they are relative, not absolutes. –  An (N)-IPC-Process is a node in the (N)-DIF. •  An (N-1)-IPC-Process is a node in the (N-1)-DIF –  An (N-1)-IPC-Process is a point of attachment to an (N)-IPC-Process. –  An (N)-address is a synonym for an (N)-IPC-Process. •  So as long as we keep that straight, there is no point to making the distinction. •  Note that it is the port-id that creates layer independence. With a port-id, No Protocol-Id Field is Necessary, or if there is such a field something is wrong. Address Port -id (N)-IPC-Process (N-1)-IPC-Process
  • 36. © John Day, 2013 36 Rights Reserved The Pouzin Society Implications of the Model Names (Multihoming) •  Yea, so? What is the big deal? –  It just works •  PDU arrives at the (N-1)-IPC Process. If the address designates this IPC Process, the CEP-id is bound to the port-id, so after stripping off (N-1)-PCI, it passes it up. •  The process repeats. If the address in the (N)-PCI is this IPC-Process, it looks at the CEP-id and pass it up as appropriate. •  Normal operation. Yes, the (N-1)-bindings may fail from time to time. •  Not a big deal. Address Port -id (N)-IPC-Process (N-1)-IPC-Process
  • 37. © John Day, 2013 37 Rights Reserved The Pouzin Society Implications of the Model Names (Mobility) •  Yea, so? What is the big deal? –  It just works just like multihoming only the (N-1)-port-ids come and go a bit more frequently. •  O, worried about having to change address if it moves too far? Easy. •  Assign a new synonym to it. Put it in the source address field on all outgoing traffic. Stop advertising the old address as a route to this IPC-Process. •  Want to renumber the DIF for some reason? Same procedure. •  Again, no special cases. No special protocols. No concept of a home router. Okay, policies in the DIF may be a bit different to accommodate faster changing points of attachment, but that is it. Address Port -id (N)-IPC-Process (N-1)-IPC-Process New Address
  • 38. © John Day, 2013 38 Rights Reserved The Pouzin Society Implications of the Model Names (Routing Table Size) •  Recursion either reduces the number of routes or shortens them. Backbone Regionals Metros
  • 39. © John Day, 2013 39 Rights Reserved The Pouzin Society Implications of the Model Names (Routing Table Size) •  For the Internet O((6r)2 where r is the number of routers in the network. Non-topological T opological Metros-DIF 3 O ( ( 2 D n)2 ) O ( ( D m)2 ) where n is the number of hosts and m is the number of hosts and border routers on a single subnet. Regionals-DIF 2 O((2Dn2)2 ) O ( ( D m2)2 ) where n2 is the number of border routers around the outside and m2 is number of border routers at this level on a single subnet. Backbone-DIF 1 O((2Dn1)2 ) O ( ( 2 D n1)2 ) where n1 is the number of border routers on the backbone. Note that m n.
  • 40. © John Day, 2013 40 Rights Reserved The Pouzin Society Implications of the Model Names (Choosing a Layer) •  In building the IPC Model, the first time there were multiple DIFs (data link layers in that case), to maintain the API a task was needed to determine which DIF to use. I A P D i r Mux Flow Mgr – User didn’t have to see all of the wires –  But the User shouldn’t have to see all of the “Nets” either. •  This not only generalizes but has major implications.
  • 41. © John Day, 2013 41 Rights Reserved The Pouzin Society Implications of the Model Names (An Inter-DIF-Directory) •  Inter-DIF Manager determines via what DIFs applications are available. –  If this system is a not member, it either joins the DIF as before –  or creates a new one. •  Which Implies that the largest address space has to be only large enough for the largest e-mall. •  Given the structure, 32 or 48 bits is probably more than enough. •  You mean? •  Right. IPv6 was a waste of time . . . •  Twice. Inter-DIF Dir
  • 42. © John Day, 2013 42 Rights Reserved The Pouzin Society So a Global Address Space is Not Required but Neither is a Global Application Name Space Inter-DIF Directory To Peers In Oher DIFs Actually one could still have distinct names spaces within a DIFs (synonyms) with its own directory database. •  Not all names need be in one Global Directory. •  Coexisting application name spaces and directory of distributed databases are not only possible, but useful. •  Needless to say, a global name space can be useful, but not a requirement imposed by the architecture. •  The scope of the name space is defined by the chain of databases that point to each other.
  • 43. © John Day, 2013 43 Rights Reserved The Pouzin Society Scope is Determined by the Chain of Places to Look •  The chain of databases to look for names determines the scope of the name space. –  Here there are 2 non-intersecting chains of systems, that could be using the same wires, but would be entirely oblivious to the other.
  • 44. © John Day, 2013 44 Rights Reserved The Pouzin Society Multicast and Anycast are Simpler Too •  Generalized to Whatevercast: –  A set and a rule that returns as many members of the set that satisfy the rule. •  Unicast becomes a degenerate case of whatevercast. –  Forwarding table entry maps Destination Address to a list of next hops. For unicast, the list has one element. •  Primarily handled by hosts or border routers, where all whatevercast traffic is either: •  On this subnet (only do spanning tree within subnet if there is a lot) or •  Transit to another subnet, (both cases degenerate to point-to-point). •  So we see Whatevercast devolves into Unicast.
  • 45. © John Day, 2013 45 Rights Reserved The Pouzin Society Multicast and Anycast are Simpler Too •  Information in topological addresses imply an approximate spanning tree, which can be used to identify the border routers. Thus, in most cases obviating the need for a separate spanning tree (multicast) routing algorithm. •  And also making it straightforward to multiplex whatevercasts with common sub-trees which will allow even greater efficiency. –  Note that the common sub-trees do not have to be strict sub-trees but simply have a reasonable degree of commonality to be worthwhile.
  • 46. © John Day, 2013 46 Rights Reserved The Pouzin Society As I said At the Beginning What’s All the Fuss? ;-) Questions?