Multicast in Identifier/Locator Separation Architectures

Size: px
Start display at page:

Download "Multicast in Identifier/Locator Separation Architectures"

Transcription

1 Multicast in Identifier/Locator Separation Architectures Michal Kryczka Universidad Carlos III de Madrid Abstract Many assumptions which were made during projecting current Internet are not valid any longer what forces us to rethink and redesign some elements of present network architecture. This paper presents identifier/locator split technologies which try to overcome problems of using IP address as a main identifier of the host. Paper covers also multicast aspects in that technologies. I. INTRODUCTION Since first packets through ARPANET were sent, the Internet has extremely evolved and changed its face. In present world mobility has become a central aspect of our lives. Nowadays, IP addresses are used to identify host. However, IP address primarily describes a topological location of a host in network, so it needs to be changed when a host changes its location in the network. As a result, using IP addresses as identifiers is quite problematic. As in real world, where we define the person by name rather than his address of living, it would be very beneficial to identify place in the network by using some different name space. This is the main idea of new proposals which introduces separation between identificator and locator. These new proposals also imply multicast techniques to be changed what can be a great opportunity to improve present multicast and overcome problems it suffers now. Next four Chapters will present different architectures and protocol proposals (TRIAD, IPNL, LISP, HIP respectively) together with multicast solutions before concluding in Chapter V. II. TRIAD TRIAD, proposed in [1], is the new network architecture which focuses on content distribution an is oriented on data. In this proposal all end to end identification is based on names rather then addresses. It is according to way how we use Internet nowadays, which is primary content distribution (web pages, audio or video streams). Because users are mainly interest in content not particular machine or IP address, TRIAD introduces a special content layer which serves clients requests and locates nearest place to get content. Client asks for a content identified by URL (optionally with cookies) and TRIAD returns a network pointer to a content, which is realised by HTTP/TCP connection through which content is read or written. For example, client can send a request for the news page of some portal (e.g. cnn.com) to its own content router, which then, based on URL, tries to Fig. 1. WRAP packet find replica for this content and forward request to a next hop. In the same time, CNN content server advertises the content cnn.com to nearby content router. Finally, user can directly have access to the content on the server which is located nearby. Key parts of the TRIAD are then content routers (forwards requests based on name routing table, augments present IP router, proxies and NAT) and content servers (answers content requests, advertises content through content router, augments present web servers, cache and proxy). Two significant parts of TRIAD architecture are Internet Name Resolution Protocol (INRP) and Name-Based Routing Protocol (NBRP). First one routes a content request (based on its name) towards the closest server for that name. Name routing tables are used and they keep next-hop for a corresponding name. The second one, NBRP, augments but not replace IP routing. In general it advertises naming information into the network using a dynamic routing protocol. NBRP is similar to BGP but operates on name suffixes rather then on address prefixes. Additionally, TRIAD introduce WRAP - a shim protocol for content routing control, which allows path-based addressing. It is used in inter-realm packet delivery. WRAP Relay Agents (RAs) exist and they have two interfaces, each in a different address realm. WRAP packets (Fig. 1) contains two Internet Relay Tokens (ITR) which are mapped from domain names and respectively indicates path the packet has taken (reserve token) and path the packet is going to take (forward token). The simplest version simply contains a sequence of IPv4 intra-realm addresses. Each this address identifies RA which forward packets from one address realm to another. Multicast in TRIAD with WRAP supports a model called EXPlicity REquested Single Source (EXPRESS) which is described in [2]. This solution introduces multicast channels. It is simply a datagram delivery service identified by (S,E) where S is an address of a sender and E is a channel destination address. Subscriber host requests reception of

2 2 Fig. 2. Difference between channel and group addressing data sent to a channel by specifying both S and E in the request. Source S sends data to the channel, by transmitting a datagram addressed to E. Thus, packets are addressed to the channel rather then to a host or host group (Fig. 2). With this in mind, channels (S,E) and (S,E) are unrelated despite common destination address. EXPRESS Count Management Protocol (ECMP) is also proposed and it maintains distribution tree, supports counting and voitng. It also sets up entries in FIB at the routers that are used to look up the (S,E) pairs for multicast distribution. With WRAP a subscriber joins a multicast channel by specifying name, and by making lookup, it gets required multicast channel addressing information. To perform multicast WRAP the same as unicast one, WRAP header contains multicast address of group repeated r times, where r is the maximum number of relay hops. TRIAD provides a very efficient architecture for content routing. It introduces new content layer and integrates routing and naming what provides better availability of data. It can be used with any kind of addressing (IPv4, IPv6, WRAP), however WRAP is recommended by authors as it solves the problem of address exhaustion while some of the IPv4 equipment does not need to be change. Using an EXPRESS model of multicast gives some benefits like receiving traffic only from the source which was designated by subscriber, simplifying address management or mechanism which allows for counting the number of subscribers. However, in this solution only a single-source multicast is allowed. III. IPNL In [3] the solution called IP Next Layer (IPNL) is proposed. This architecture bases on IP infrastructure and adds an extra layer between IP and TCP/UDP layers. The topology of IPNL consists huge middle realm (continuation of present Internet) connected with private realms or directly attached hosts. Moreover, private realms can be aggregated in realm groups and reach middle realm through a single middle realm IP address (MRIP). With this approach, we can see that IPNL topology is quite similar to today s Internet with private realm separated from public Internet using NAT. The example of IPNL topology is presented on Fig. 3. On this illustration, we can see three private realms which creates one group with single MRIP, three separated private realms and directly connected hosts. Fig. 4. Fig. 3. IPNL topology IPNL address structure IPNL address has a length of 80 bits and contains three fields: Middle Realm IP Address (MRIP, 32 bits), globally unique Realm Number (RN, 16 bits), aggregates private realms End Host IP Address (EHIP, 32 bits), locally unique IP realms are connected by IPNL routers, each of which can belong to one of three categories (Fig. 4): frontdoor router, which uses MRIP to connect a realm group with global Internet backdoor router, which connects two realm groups, which can have overlapping realm numbers interior router, which connects private realms within realm group Routing in IPNL is quite straightforward and bases on encapsulating and decapsulating IP packets with each realm crossing. Inside realms, all the work is made by IP routing. Within realm group, there is a BGP-like path vector routing

3 3 Fig. 5. Example of routing in IPNL protocol, which advertises and propagates realm numbers. It is used by interior routers and frontdoor routers (advertise middle realm). When interior router will find a packet, which destination is a private realm group attached to that router, router rewrites EHIP address into encapsulating IP header and forward it to the destination. On the other hand, if such a router finds a packet, with realm number which is not private, packet is by default forwarded to frontdoor router. When frontdoor router gets such a packet it rewrites MIRP address and put it into encapsulating IP header and forward to middle realm. If frontdoor router gets a packet from middle realm it forwards it to the appropriate interior router. Additionally communication between two realm groups with usage of backdoor routing can happen. In this case it may happen that realm numbers in each of realm group can overlap. Thus, it is necessary for backdoor router to keep correct translation, and overwrite realm number groups in packets it forwards. Next innovation proposed in IPNL, is using Fully Qualified Domain Name (FQDN) as a fully routable address, what allows for end-to-end consistency and addressing symmetry. However, because FQDN has no fix length and using it in every packet will be very costly, FQDN is only sent in some packets (typically in the first), together with IPNL address what allows router to automatically learn and keep appropriate translation. Fig. 5 shows an example of usage FQDN. When two locally addressed hosts want to setup connection, routing with FQDN is straightforward as interior routers keep a table with zonerealm number entries. Thus, if host a.phy.xyz.edu wants to establish connection with b.math.xyz.edu, interior router C, will know the next hop. Now, lets imagine situation, when this host wants to communicate with c.b.com, which is globally addressed. In this situation packet is sent to frontdoor router, which uses DNS for resolving MRIP address of destination. Then packet is encapsulated into IP packet with MRIP as destination address. Once packet will reach frontdoor router of destination, it determines proper realm number and forwards packet to this realm and then to destination. The idea of multicast in IPNL is quite similar to unicast transmissions and is described in [4]. Both, FQDN and IPNL address, are used. FQDN which define multicast group is syntactically the same as unicast FQDN. The difference is that hosts learn about FQDN of the group while joining a group, unlike in unicast when sending data packet. Multicast packets are distinguished because of destination host IP address in IPNL header, which is IP class D address. The rest of the header is syntactically the same. Source address is the unicast address of the sender. Home realm of IPNL multicast FQDN assignes IP multicast address to the multicast group. This address needs to be unique in the realm, but can overlap with other multicast addresses assigned by other realms. IPNL multicast address contains then IP multicast address, number of home realm and MRIP of the home realm, if it contains not local users (it can be distinguished by router). When joining multicast group, host transmits a join message together with FQDN of the group to its IPNL router. Because of join message, router knows that FQDN is multicast rather then unicast. If router does not know the address of multicast group yet, it forwards the message to home realm of the multicast FQDN. Then router in home realm assignes IP multicast address for a group (if has not done earlier). This address is return to the source host, which now can start transmitting and receiving packets within the group. IPNL looks as a good alternative to IPv6 and solves problem of increasing demands for IPv4 addresses. IPNL can coexist with present infrastructure (DNS, routing protocols, IPv4 hosts) but also has some drawbacks including need of significant change in TCP/IP protocol and quite complicated architecture. Multicast in IPNL is based on present multicast and it is simply extending IP multicast rather then projecting new architecture. Usage of FQDNs and extended address simplifies multicast address assignment, however, authors claim that it can be profitable to design new multicast architecture to overcome problems which exist with present multicast. IV. LISP One of the proposal of locator/identifier separation proposed in [5] and discussed in [6] is a Locator/ID Separation Protocol (LISP). It is an IP-over-IP tunnelling protocol, which gives to a network layer support to routing locators and allows for endhost identifiers separation. The biggest advantage of LISP that it does not modify current protocol stack but adopts IP and it can be incrementally implemented without sudden negative impact on current architecture. In LISP (Fig. 6) we can distinguish two key elements: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs). EIDs are IP addresses which on the beginning can still be routable globally but finally are supposed to be routable only in the area of local AS. RLOCs are IP addresses of Tunnel Routers. These addresses will remain routable globally. Ingress Tunel Router (ITR) adds a LISP header to each packet and Egress Tunel Router (ETR) remove this new header before

4 4 Fig. 6. LISP topology delivering packet to final destination. Every EID is associated with at least one RLOC. While communication between two hosts occurs, first host sends a packet with its EID as a source address, and EID of the receiver as a destination address. Packet is routed in local AS to one of the locator RLOC (choice depends on traffic engineering policy). RLOC performs a lookup to find the address of the locator of the destination and then IP packet is sent with LISP header (address of corresponding locators are used as a source and destination address). Packet is routed through the Internet and once it reaches appropriate locator, LISP header is stripped and packet is normally routed in local AS. Main issue of that is to design EID-to-RLOC mapping function. Different solutions were proposed including new ICMP messages, DNS service or rely on BGP. Multicast in LISP is described in [7]. The whole idea is based on encapsulating a multicast packet into another multicast packet. The multicast packet received from a source is encapsulated into LISP multicast header. Destination group address from inner header is copied to outer header. Inner source address is EID of multicast source host and outer address is RLOC of router which encapsultes packet. Joining a multicast group is made in the same way as today (using IGMP). Multicast ETR at receiver site gets a PIM Join/Prune message which contains two things: source EID address and group receiver want to join (S-EID,G). ETR makes a mapping for source EID and gets corresponding source RLOC. Next two PIM Join/Prune messageges are sent. One is unicast message (S-EID,G) to ITR S-RLOC address and the other is (S-RLOC,G) through core, so core network could create multicast state from ETR to ITR. When multicast ITR at source site receives unicast PIM Join/Prune message (S- EID,G), it forwads it to source site. ITR also acts as root of (S-RLOC,G) tree for site. Whenever multicast message is sent now, ITR encapsulates (S-EID,G) packet into (S-RLOC,G) and ETR at receiver site decapsulates it from (S-RLOC,G) to (S- EID,G). Thanks to Locator/Identifier separation we can improve Traffic Engineering capabilities and reduce size of FIBs what has influence on resource usage by router or speed of forwarding table updates. Authors claim also that ASes can obtain more paths in shorter time than using BGP-based Fig. 7. HIP architecture multihoming. Also presented architecture of multicast, where multicast state in the core operates on locators and multicast state at the sites operates on EIDs, is consistent and scalable with LISP architecture. It makes no changes to hosts and can be deployed incrementally. V. HIP Opposite to LISP, the other proposal, Host Identity Protocol (HIP) [8] [9] introduces a completely new name space - Host Identity (HI), which is simply a public cryptographic key of a public-private key-pair. Host, which has a private key of the key-pair can prove that it owns the public key which is used to identify in the network. Each host can generate short-term or long-term keys, depending of what is the need. As HI is quite long, instead of this, Host Identity Tag (HIT) is used in transmission, which has a length of 128 bits and is generated by hashing HI. Because of the length it can be directly used with IPv6 applications. HIP introduces a new layer which insulates upper layer from IP addresses. Upper layers, including applications, instead of seeing IP addresses, they see HIT. Each HI is mapped locally to the IP address of the node. When packets leave the host, correct route is chosen and corresponding IP addresses are put into the packet as a source and destination address. Such an architecture is presented on Fig. 7 HIP session bases on four-way handshake (Fig. 8). During this exchange, a Diffle-Hellman authenticated key exchange is used to create a session key and establish a pair of IPSec ESP Security Associations (SA). The ESP SAs between the hosts are bound to the Host Identities. Arriving packet is identified and mapped to the correct SA using Security Parameter Index (SPI) value from the IPSec header. Thanks to this, changing the location information in the packet will not make any problems as packet will still be correctly identified by SPI. There is also a proposal of extending HIP protocol for supporting multicast, and it was presented in [10]. In proposed model, authors introduce Multicast Agents (MAs), what improves control and managing and also strengthens a security

5 5 Fig. 8. HIP session Any multicast traffic with corresponding GIT and GK will now go to the host. When host decides to leave the group he sends an extended packet with HIP parameter leave request to its MA. Similarly creating a group is made with usage of HIP option create group. HIP looks as a very promising architecture. It implements identifier/locator split and provides better security, mobility, multihoming and IPv4/IPv6 interoperability. Also extension of HIP, which provides secure multicast looks very promising. The main part of the system is MA, which is responsible for tree and key management, authentication of group members and collecting accounting information. All that makes the multicast more secure and easy to manage. VI. CONCLUSIONS In this paper different solutions about splitting identifier and locator were introduced. Corresponding proposals about multicast were also presented and discussed. Introducing new protocol for current architecture can be also a good opportunity for improving present multicast. The last described protocol, HIP, is investigated now quite widely (an IETF formed HIP working group in 2003) and has a status of experimental RFC. It can be assumed that this protocol has a chance of being adopted in nearest future. While HIP implies modification in present architecture it can be also beneficial to introduce new multicast architecture which will base on HIP. Solution described in the paper sounds very promising as it provides secure, reliable and easy to manage multicast. REFERENCES Fig. 9. HIP-multicast model in comparison to present multicast architecture. Example of HIP-multicast model is presented in (Fig. 9) New model works different from traditional IP-multicast. Instead of using IGMP for group managing, it uses HIP. There is also no more need for IP multicast addresses as they are replaced by a Group Identity (GI). Similarly to HI, it is represented by a group of public key. Also similarly to HIT, Group Identity Tag (GIT) is used, which is created by hashing GI and has a length of 128 bits. During four way handshaking, packets which are sent are extended and they also carry GIT. When a host (both it can be a group receiver or MA) wants to join a multicast group, it sends a request to related MA asking for joining multicast group (specified by GIT). After successful authentication, MA adds the authenticated host to the related multicast tree, updates forwarding table and sends packet to the initiator confirmating the GIT and sending Group Key (GK). Then host finishes authentication and joins multicast group. [1] D. R. Cheriton and M. Gitter, TRIAD: A next generation internet architecture, Stanford Univeristy, Computer Sciece Department, January [2] H. W. Holbrook and D. R. Cheriton, IP multicast channels: EXPRESS support for large-scale single-source applications, Stanford Univeristy, Computer Sciece Department, [3] P. Francais and R. Gummadi, IPNL: A simpler and cheaper fix for IP, SIGCOMM, [4], IPNL protocol specification, IPNL specification, [5] D. Farinacci, V. Fueller, D. Oran, D. Meyer, and S. Brim, Locator/ID separation protocol (LISP), work in progress, December [6] B. Quoitin, L. Iannone, C. Launois, and O. Bonaventure, Evaluating the benefits of the locator/identifier separation, MobiArch 07, Kyoto, Japan, August [7] D. Farinacci, D. Meyer, J. Zwiebel, and S. Venaas, LISP for multicast environments, work in progress, November [8] R. Moskovitz, P. Nikander, P. Jokela, and T. Henderson, Host identity protocol, RFC5201, April [9] P. Jokela, P. Nikander, J. Melen, J. Ylitalo, and J. Wall, Host identity protocol - extended abstract, Ericsson Research, NomadicLab, [10] X. Zhou and J. W. Atwood, A secure multicast model for peer-topeer and access networks using the host identity protocol, Consumer Communications and Networking Conference, January 2007.

Internet Engineering Task Force (IETF) Request for Comments: Cisco Systems January 2013

Internet Engineering Task Force (IETF) Request for Comments: Cisco Systems January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6831 Category: Experimental ISSN: 2070-1721 D. Farinacci D. Meyer J. Zwiebel S. Venaas Cisco Systems January 2013 The Locator/ID Separation

More information

Locator ID Separation Protocol (LISP) Overview

Locator ID Separation Protocol (LISP) Overview Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address: Endpoint identifiers (EIDs) assigned to end hosts.

More information

IPNL: A Simpler and Cheaper Fix for IP

IPNL: A Simpler and Cheaper Fix for IP 1 IPNL: A Simpler and Cheaper Fix for IP Paper number: 205 Total number of pages: 14 (Page 14 for appendix) Abstract IP Next Layer (IPNL) is a new internet protocol architecture. IPNL has two advantages

More information

Cisco IOS LISP Application Note Series: Access Control Lists

Cisco IOS LISP Application Note Series: Access Control Lists Cisco IOS LISP Application Note Series: Access Control Lists Version 1.1 (28 April 2011) Background The LISP Application Note Series provides targeted information that focuses on the integration and configuration

More information

TTL Propagate Disable and Site-ID Qualification

TTL Propagate Disable and Site-ID Qualification The TTL Propagate Disable feature supports disabling of the TTL (Time-To-Live) propagation for implementing the traceroute tool in a LISP network when RLOC and EID belong to different address-family. The

More information

Future Routing and Addressing Models

Future Routing and Addressing Models Future Routing and Addressing Models Rob Evans JANET(UK) The JNT Association 2008 Networkshop 36 1 If it ain't broke... BGP is the inter-domain protocol of choice. Not that there's much choice. Carries

More information

Improvements to LISP Mobile Node

Improvements to LISP Mobile Node Improvements to LISP Mobile Node Michael Menth, Dominik Klein, and Matthias Hartmann University of Würzburg, Institute of Computer Science, Germany Abstract The Locator/Identifier Separation Protocol (LISP)

More information

Intended status: Informational. C. White Logical Elegance, LLC. October 24, 2011

Intended status: Informational. C. White Logical Elegance, LLC. October 24, 2011 Network Working Group Internet-Draft Intended status: Informational Expires: April 26, 2012 D. Farinacci D. Lewis D. Meyer cisco Systems C. White Logical Elegance, LLC. October 24, 2011 LISP Mobile Node

More information

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

Locator/ID Separation Protocol (LISP)

Locator/ID Separation Protocol (LISP) Locator/ID Separation Protocol (LISP) Damien Saucez* INRIA Sophia Antipolis FRNOG 18, December 2 th, 2011 * special thanks to Olivier Bonaventure, Luigi Iannone and Dino Farinacci Disclaimer Not a vendor

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Evaluating the Benefits of the Locator/Identifier Separation

Evaluating the Benefits of the Locator/Identifier Separation Evaluating the Benefits of the Locator/Identifier Separation Bruno Quoitin IP Networking Lab Computer Science and Engineering Dept. Université catholique de Louvain, Belgium (bruno.quoitin@uclouvain.be)

More information

LISP Router IPv6 Configuration Commands

LISP Router IPv6 Configuration Commands ipv6 alt-vrf, page 2 ipv6 etr, page 4 ipv6 etr accept-map-request-mapping, page 6 ipv6 etr map-cache-ttl, page 8 ipv6 etr map-server, page 10 ipv6 itr, page 13 ipv6 itr map-resolver, page 15 ipv6 map-cache-limit,

More information

IP Routing: LISP Configuration Guide, Cisco IOS Release 15M&T

IP Routing: LISP Configuration Guide, Cisco IOS Release 15M&T First Published: 2012-07-27 Last Modified: 2013-03-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

APT: A Practical Transit-Mapping Service Overview and Comparisons

APT: A Practical Transit-Mapping Service Overview and Comparisons APT: A Practical Transit-Mapping Service Overview and Comparisons draft-jen-apt Dan Jen, Michael Meisel, Dan Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang The Big Picture APT is similar to LISP at

More information

LISP: Intro and Update

LISP: Intro and Update LISP: Intro and Update RIPE Berlin May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) http://www.vaf.net/prezos/lisp-ripe-short.pdf Agenda What is LISP? What problem is LISP solving? www.vaf.net/prezos/rrg-prague.pdf

More information

Internet Engineering Task Force (IETF) Category: Experimental ISSN: D. Meyer D. Lewis. Cisco Systems. January 2013

Internet Engineering Task Force (IETF) Category: Experimental ISSN: D. Meyer D. Lewis. Cisco Systems. January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6830 Category: Experimental ISSN: 2070-1721 D. Farinacci Cisco Systems V. Fuller D. Meyer D. Lewis Cisco Systems January 2013 The Locator/ID

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Future Internet Research Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer New requirements on TCP/IP Growth

More information

LISP: What and Why. RIPE Berlin May, Vince Fuller (for Dino, Dave, Darrel, et al)

LISP: What and Why. RIPE Berlin May, Vince Fuller (for Dino, Dave, Darrel, et al) LISP: What and Why RIPE Berlin May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) http://www.vaf.net/prezos/lisp-ripe-long.pdf Agenda What is the problem? What is LISP? Why Locator/ID Separation? Data

More information

Deploying LISP Host Mobility with an Extended Subnet

Deploying LISP Host Mobility with an Extended Subnet CHAPTER 4 Deploying LISP Host Mobility with an Extended Subnet Figure 4-1 shows the Enterprise datacenter deployment topology where the 10.17.1.0/24 subnet in VLAN 1301 is extended between the West and

More information

Request for Comments: 8112 Category: Informational. I. Kouvelas Arista D. Lewis Cisco Systems May 2017

Request for Comments: 8112 Category: Informational. I. Kouvelas Arista D. Lewis Cisco Systems May 2017 Independent Submission Request for Comments: 8112 Category: Informational ISSN: 2070-1721 D. Farinacci lispers.net A. Jain Juniper Networks I. Kouvelas Arista D. Lewis Cisco Systems May 2017 Locator/ID

More information

On the Cost of Supporting Mobility and Multihoming

On the Cost of Supporting Mobility and Multihoming On the Cost of Supporting Mobility and Multihoming VATCHE ISHAKIAN IBRAHIM MATTA JOSEPH AKINWUMI COMPUTER SCIENCE DEPARTMENT, BOSTON UNIVERSITY {visahak, matta, akin}@cs.bu.edu Abstract As the Internet

More information

Internet Engineering Task Force (IETF) Category: Experimental. D. Meyer Brocade V. Fuller September 2016

Internet Engineering Task Force (IETF) Category: Experimental. D. Meyer Brocade V. Fuller September 2016 Internet Engineering Task Force (IETF) Request for Comments: 7954 Category: Experimental ISSN: 2070-1721 L. Iannone Telecom ParisTech D. Lewis Cisco Systems, Inc. D. Meyer Brocade V. Fuller September 2016

More information

IP Mobility Design Considerations

IP Mobility Design Considerations CHAPTER 4 The Cisco Locator/ID Separation Protocol Technology in extended subnet mode with OTV L2 extension on the Cloud Services Router (CSR1000V) will be utilized in this DRaaS 2.0 System. This provides

More information

ID/LOC Separation Network Architecture for Mobility Support in Future Internet

ID/LOC Separation Network Architecture for Mobility Support in Future Internet ID/LOC Separation Network Architecture for Mobility Support in Future Internet Nakjung Choi, Taewan You, Jungsoo Park, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering, Seoul

More information

Enhanced Mobility Control in Mobile LISP Networks

Enhanced Mobility Control in Mobile LISP Networks Enhanced Mobility Control in Mobile LISP Networks Moneeb Gohar School of Computer Science and Engineering Kyungpook National University Daegu, South Korea moneebgohar@gmail.com Ji In Kim School of Computer

More information

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility Mukankunga Bisamaza Angel and Choong Seon Hong Departement of Computer Engineering Kyung Hee University 1 Seocheon,

More information

LISP Multicast. Finding Feature Information. Prerequisites for LISP Multicast

LISP Multicast. Finding Feature Information. Prerequisites for LISP Multicast The feature introduces support for carrying multicast traffic over a Locator ID Separation Protocol (LISP) overlay. This support currently allows for unicast transport of multicast traffic with head-end

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking

More information

Cisco Nexus 7000 Series NX-OS LISP Command Reference

Cisco Nexus 7000 Series NX-OS LISP Command Reference First Published: 2016-11-24 Last Modified: -- Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax:

More information

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

Internet Engineering Task Force (IETF) May Signal-Free Locator/ID Separation Protocol (LISP) Multicast

Internet Engineering Task Force (IETF) May Signal-Free Locator/ID Separation Protocol (LISP) Multicast Internet Engineering Task Force (IETF) Request for Comments: 8378 Category: Experimental ISSN: 2070-1721 V. Moreno Cisco Systems D. Farinacci lispers.net May 2018 Abstract Signal-Free Locator/ID Separation

More information

LISP Locator/ID Separation Protocol

LISP Locator/ID Separation Protocol LISP Locator/ID Separation Protocol Hernán Contreras G. Consulting Systems Engineer hcontrer@cisco.com LISP Next Gen Routing Architecture Locator-ID Separation Protocol (LISP) Elevator Pitch LISP is a

More information

Separating identifiers from locators to scale the Internet

Separating identifiers from locators to scale the Internet Separating identifiers from locators to scale the Internet Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve

More information

LISP. - innovative mobility w/ Cisco Architectures. Gerd Pflueger Consulting Systems Engineer Central Europe Version 0.

LISP. - innovative mobility w/ Cisco Architectures. Gerd Pflueger Consulting Systems Engineer Central Europe Version 0. Version 0.2 22 March 2012 LISP - innovative mobility w/ Cisco Architectures Gerd Pflueger Consulting Systems Engineer Central Europe gerd@cisco.com 2012 Cisco and/or its affiliates. All rights reserved.

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Extending the address space of the Internet

Extending the address space of the Internet UNIVERSITY CARLOS III OF MADRID Department of Telematics Engineering Master of Science Thesis Extending the address space of the Internet Author: Michal Kryczka Supervisor: Dr. Arturo Azcorra Leganes,

More information

LISP (Locator/Identifier Separation Protocol)

LISP (Locator/Identifier Separation Protocol) LISP (Locator/Identifier Separation Protocol) Damien Saucez* June 28 th, 2010 http://inl.info.ucl.ac.be *Thanks to Olivier Bonaventure and Pierre François Department of Computing Science and Engineering

More information

Integration of LISP and LISP-MN in INET

Integration of LISP and LISP-MN in INET Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia, Matthias Hartmann (University of Wuerzburg, Germany) Michael Höfling, Michael Menth (University of Tuebingen, Germany)

More information

LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008

LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008 LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008 1 CONCERNS TO ADDRESS Accurately describe what LISP separates Describe properties of EIDs Discuss overlapping EIDs and RLOCs CHARTER

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast

IPv6 Addressing. There are three types of IPV6 Addresses. Unicast:Multicast:Anycast IPv6 Addressing There are three types of IPV6 Addresses. Unicast:Multicast:Anycast Unicast IPv6 addresses A unicast address identifies a single interface within the scope of the type of unicast address.

More information

Interdomain Traffic Engineering in a Locator/Identifier Separation Context

Interdomain Traffic Engineering in a Locator/Identifier Separation Context 1 Interdomain Traffic Engineering in a Locator/Identifier Separation Context Damien Saucez, Benoit Donnet, Luigi Iannone, Olivier Bonaventure Université catholique de Louvain, Belgium Abstract The Routing

More information

On the Dynamics of Locators in LISP

On the Dynamics of Locators in LISP On the Dynamics of Locators in LISP Damien Saucez 1 and Benoit Donnet 2 1 INRIA, Sophia Antipolis, France 2 Université deliège, Liège, Belgium Abstract. In the Internet, IP addresses play the dual role

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 4 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information advertisement 8 Inter-AS VPN

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

A New Addressing and Forwarding Architecture for the Internet

A New Addressing and Forwarding Architecture for the Internet A New Addressing and Forwarding Architecture for the Internet by Cong Guo A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics

More information

A Multihoming based IPv4/IPv6 Transition Approach

A Multihoming based IPv4/IPv6 Transition Approach A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Network Architectures Jianping Pan Summer 2007 5/16/07 csc485b/586b/seng480b 1 Internet architectures Design principles store-and-forward packet switching end-to-end arguments

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers

Category: Standards Track June Mobile IPv6 Support for Dual Stack Hosts and Routers Network Working Group H. Soliman, Ed. Request for Comments: 5555 Elevate Technologies Category: Standards Track June 2009 Status of This Memo Mobile IPv6 Support for Dual Stack Hosts and Routers This document

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

Table of Contents 1 Multicast VPN Configuration 1-1

Table of Contents 1 Multicast VPN Configuration 1-1 Table of Contents 1 Multicast VPN Configuration 1-1 Multicast VPN Overview 1-1 Introduction to MPLS L3VPN 1-1 Introduction to Multicast VPN 1-2 Introduction to MD-VPN 1-4 Protocols and Standards 1-7 How

More information

MPLS опорни мрежи MPLS core networks

MPLS опорни мрежи MPLS core networks MPLS опорни мрежи MPLS core networks Николай Милованов/Nikolay Milovanov http://niau.org Objectives Identify the drawbacks of traditional IP routing Describe basic MPLS concepts and LSR types. MPLS Labels

More information

An Identifier / Locator Split Architecture for Multi-homing and Mobility Support

An Identifier / Locator Split Architecture for Multi-homing and Mobility Support IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 13 An Identifier / Locator Split Architecture for Multi-homing and Mobility Support Joonsuk KANG and Koji OKAMURA,

More information

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

Federal Agencies and the Transition to IPv6

Federal Agencies and the Transition to IPv6 Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Multi-Instance MSDP 1-7 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring

More information

Table of Contents Chapter 1 Tunneling Configuration

Table of Contents Chapter 1 Tunneling Configuration Table of Contents Table of Contents... 1-1 1.1 Introduction to Tunneling... 1-1 1.1.1 IPv6 over IPv4 Tunnel... 1-2 1.1.2 IPv4 over IPv4 Tunnel... 1-7 1.2 Tunneling Configuration Task List... 1-8 1.3 Configuring

More information

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far the most common of them. TCP/IP can be compared to the

More information

MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet

MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet Jianli Pan, Subharthi Paul, Raj Jain Department of Computer Science and Engineering

More information

DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet

DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet Hyung-Woo Kang Kyungpook National University Daegu, Korea hwkang0621@gmail.com Ji-In Kim Kyungpook National University

More information

A Comparative Analysis of Centralized and Distributed Mobility Management in IP-Based Mobile Networks

A Comparative Analysis of Centralized and Distributed Mobility Management in IP-Based Mobile Networks A Comparative Analysis of Centralized and Distributed Mobility Management in IP-Based Mobile Networks The Mobility Management (MM) is one of the crucial requirements for future mobile networks. The current

More information

Internet Engineering Task Force (IETF) Request for Comments: D. Lewis Cisco Systems January 2013

Internet Engineering Task Force (IETF) Request for Comments: D. Lewis Cisco Systems January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6836 Category: Experimental ISSN: 2070-1721 V. Fuller D. Farinacci D. Meyer D. Lewis Cisco Systems January 2013 Locator/ID Separation Protocol

More information

Other Design Choices Mobility Overview of

Other Design Choices Mobility Overview of IPNL Architecture and Protocol Description Paul Francis ACIRI francis@aciri.org May 8, 2000 Contents 1 Introduction 3 2 Rough Architectural Overview 4 2.1 Unicast Routing and Addressing....................................

More information

Configuring SSM. Finding Feature Information. Prerequisites for Configuring SSM

Configuring SSM. Finding Feature Information. Prerequisites for Configuring SSM Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 2 Information About SSM, page 3 How to Configure SSM, page 7 Monitoring SSM, page 15 Configuration Examples for Source

More information

LISP Parallel Model Virtualization

LISP Parallel Model Virtualization Finding Feature Information, page 1 Information About, page 1 How to Configure, page 6 Configuration Examples for, page 24 Additional References, page 25 Feature Information for, page 26 Finding Feature

More information

Configuring MSDP. MSDP overview. How MSDP works. MSDP peers

Configuring MSDP. MSDP overview. How MSDP works. MSDP peers Contents Configuring MSDP 1 MSDP overview 1 How MSDP works 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 6 Configuring basic MSDP functions 7 Configuration prerequisites

More information

USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS

USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS USING HIP TO SOLVE MULTI-HOMING IN IPV6 NETWORKS Zhangyi Yuan 1, Xiaohong Huang 1, Junyi Zhang 2, Fred Baker 3 1 Research Institute of Networking Technology, Beijing University of Posts and Telecommunications,

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP

More information

Validation of a LISP Simulator

Validation of a LISP Simulator Validation of a LISP Simulator Albert Cabellos-Aparicio, Jordi Domingo-Pascual Technical University of Catalonia Barcelona, Spain Damien Saucez, Olivier Bonaventure Université catholique de Louvain Louvain-La-Neuve,

More information

Network Working Group. Category: Informational Bay Networks Inc. September 1997

Network Working Group. Category: Informational Bay Networks Inc. September 1997 Network Working Group Request for Comments: 2185 Category: Informational R. Callon Cascade Communications Co. D. Haskin Bay Networks Inc. September 1997 Routing Aspects Of IPv6 Transition Status of this

More information

IPv4 to IPv6 Transition Mechanisms

IPv4 to IPv6 Transition Mechanisms IPv4 to IPv6 The mechanisms for the changeover from IPv4 to IPv6 are described in RFC 4213, updating the original mechanisms described in RFC 2893. As mentioned in the notes for IP, a portion of the IPv6

More information

Key Management in IP Multicast

Key Management in IP Multicast Key Management in IP Multicast Petri Jokela Helsinki University of Technology petri.jokela@nomadiclab.com ABSTRACT The IP networking was originally designed to operate in point topoint way. However, when

More information

CSCI-1680 Network Layer:

CSCI-1680 Network Layer: CSCI-1680 Network Layer: Wrapup Rodrigo Fonseca Based partly on lecture notes by Jennifer Rexford, Rob Sherwood, David Mazières, Phil Levis, John JannoA Administrivia Homework 2 is due tomorrow So we can

More information

LISP Mobile-Node. draft-meyer-lisp-mn-05.txt. Chris White, Darrel Lewis, Dave Meyer, Dino Farinacci cisco Systems

LISP Mobile-Node. draft-meyer-lisp-mn-05.txt. Chris White, Darrel Lewis, Dave Meyer, Dino Farinacci cisco Systems LISP Mobile-Node draft-meyer-lisp-mn-05.txt Chris White, Darrel Lewis, Dave Meyer, Dino Farinacci cisco Systems EID: dino@cisco.com RLOC: IRTF MobOpts Quebec City July 28 2011 What if... A mobile device

More information

Impacts of Realistic Traffic on the Mapping Scheme in Locator/Identifier Separation Networks

Impacts of Realistic Traffic on the Mapping Scheme in Locator/Identifier Separation Networks Proceedings of 29 Conference on Communication Faculty Impacts of Realistic Traffic on the Mapping Scheme in Locator/Identifier Separation Networks WANG Hongchao, ZHANG Hongke, LUO Hongbin National Engineering

More information

Contents. EVPN overview 1

Contents. EVPN overview 1 Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote

More information

Configuring MSDP. Overview. How MSDP operates. MSDP peers

Configuring MSDP. Overview. How MSDP operates. MSDP peers Contents Configuring MSDP 1 Overview 1 How MSDP operates 1 MSDP support for VPNs 6 Protocols and standards 6 MSDP configuration task list 7 Configuring basic MSDP functions 7 Configuration prerequisites

More information

Example questions for the Final Exam, part A

Example questions for the Final Exam, part A ETSF10, ETSF05 Ht 2010 Example questions for the Final Exam, part A 1. In AdHoc routing there are two main strategies, reactive and proactive routing. Describe in a small number of words the concept of

More information

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003 Network Working Group Request for Comments: 3446 Category: Informational D. Kim Verio D. Meyer H. Kilmer D. Farinacci Procket Networks January 2003 Status of this Memo Anycast Rendevous Point (RP) mechanism

More information

Internet Engineering Task Force (IETF) Category: Experimental. O. Bonaventure Universite catholique de Louvain January 2013

Internet Engineering Task Force (IETF) Category: Experimental. O. Bonaventure Universite catholique de Louvain January 2013 Internet Engineering Task Force (IETF) Request for Comments: 6834 Category: Experimental ISSN: 2070-1721 L. Iannone Telecom ParisTech D. Saucez INRIA Sophia Antipolis O. Bonaventure Universite catholique

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

ETSF10 Internet Protocols Routing on the Internet

ETSF10 Internet Protocols Routing on the Internet ETSF10 Internet Protocols Routing on the Internet 2013, Part 2, Lecture 1.2 Jens Andersson (Kaan Bür) Routing on the Internet Unicast routing protocols (part 2) [ed.5 ch.20.3] Multicast routing, IGMP [ed.5

More information

Multi-site Datacenter Network Infrastructures

Multi-site Datacenter Network Infrastructures Multi-site Datacenter Network Infrastructures Petr Grygárek rek 2009 Petr Grygarek, Advanced Computer Networks Technologies 1 Why Multisite Datacenters? Resiliency against large-scale site failures (geodiversity)

More information

LISP. Migration zu IPv6 mit LISP. Gerd Pflueger Version Feb. 2013

LISP. Migration zu IPv6 mit LISP. Gerd Pflueger Version Feb. 2013 Version 0.7 24 Feb. 2013 LISP Migration zu IP mit LISP Gerd Pflueger gerd@cisco.com 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2011 Cisco and/or its affiliates. All rights reserved.

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

DNA SA Border Node Support

DNA SA Border Node Support Digital Network Architecture (DNA) Security Access (SA) is an Enterprise architecture that brings together multiple building blocks needed for a programmable, secure, and highly automated fabric. Secure

More information