Re: [Ila] Second round draft charter

Uma Chunduri <uma.chunduri@huawei.com> Fri, 09 February 2018 01:29 UTC

Return-Path: <uma.chunduri@huawei.com>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45068126CC4 for <ila@ietfa.amsl.com>; Thu, 8 Feb 2018 17:29:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.23
X-Spam-Level:
X-Spam-Status: No, score=-4.23 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J8C1PeL9Y7vs for <ila@ietfa.amsl.com>; Thu, 8 Feb 2018 17:29:03 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7574C124BAC for <ila@ietf.org>; Thu, 8 Feb 2018 17:29:03 -0800 (PST)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id EABAB4E9C50CA; Fri, 9 Feb 2018 01:28:59 +0000 (GMT)
Received: from SJCEML701-CHM.china.huawei.com (10.208.112.40) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.361.1; Fri, 9 Feb 2018 01:29:00 +0000
Received: from SJCEML521-MBB.china.huawei.com ([169.254.6.91]) by SJCEML701-CHM.china.huawei.com ([169.254.3.93]) with mapi id 14.03.0382.000; Thu, 8 Feb 2018 17:28:53 -0800
From: Uma Chunduri <uma.chunduri@huawei.com>
To: Tom Herbert <tom@quantonium.net>, "ila@ietf.org" <ila@ietf.org>, "Bogineni, Kalyani" <kalyani.bogineni@verizonwireless.com>
Thread-Topic: [Ila] Second round draft charter
Thread-Index: AQHToTl6trl+RGfAkUG0KVRo+35En6ObRGuA
Date: Fri, 09 Feb 2018 01:28:53 +0000
Message-ID: <25B4902B1192E84696414485F572685413540524@SJCEML521-MBB.china.huawei.com>
References: <CAPDqMeqgk2WtkfCkyeYduGuawWL9OuSaQ3vH8BYoTAu2UiXxaQ@mail.gmail.com>
In-Reply-To: <CAPDqMeqgk2WtkfCkyeYduGuawWL9OuSaQ3vH8BYoTAu2UiXxaQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.209.217.169]
Content-Type: multipart/alternative; boundary="_000_25B4902B1192E84696414485F572685413540524SJCEML521MBBchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/K1oKNzd-8-GDjD8wsdPEQdIj5_E>
Subject: Re: [Ila] Second round draft charter
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2018 01:29:06 -0000

Hi Tom,

Below draft looks fine as a starting point.
Few comments in-line [Uma]:

--
Uma C.

From: ila [mailto:ila-bounces@ietf.org] On Behalf Of Tom Herbert
Sent: Thursday, February 08, 2018 4:04 PM
To: ila@ietf.org; Bogineni, Kalyani <kalyani.bogineni@verizonwireless.com>
Subject: [Ila] Second round draft charter


Hello,



I Incorporated feedback from the first draft including replacing "translation" with "transformation". Aldo, incorporated some of the language from the BOF description.



Please comment!



Thanks,

Tom

------

Identifier-Locator Addressing (ILA) is a protocol to implement transparent network overlays without encapsulation. It addresses the need for network overlays in virtualization and mobility that are efficient, lightweight, performant, scalable, secure, provide seamless mobility, leverage and encourage use of IPv6, provide strong privacy, are interoperable with existing infrastructure, applicable to a variety of use cases, and have simplified control and management.


The use cases of ILA include mobile networks, datacenter virtualization, and network virtualization.

[Uma]: Can you expand mobile networks term here. I hope you meant, cellular and wi-fi networks or anything else? Also please be specific on virtualization application..

A recent trend in the industry is to build converged networks containing all three of these to provide low latency and high availability. A single network overlay solution that works across multiple use cases is appealing.


ILA is a form of identifier/locator split where IPv6 addresses are transformed from application-visible, non-topological “identifier” addresses to topological “locator” addresses. Locator addresses allow packets to be forwarded to the network location where a logical or mobile node currently resides or is attached. Before delivery to the ultimate destination, addresses are reverse transformed back to the original application visible addresses. ILA does address “transformation” as opposed to “translation” since address modifications are always undone. ILA is conceptually similar to ILNP and 8+8, however ILA is contained in the network layer. It is not limited to end node deployment, does not require any changes to transport layer protocols, and does not use extension headers.


ILA includes both a data plane and control plane.

[Uma]: This need to be listed in the charter work items.

The data plane defines the address structure and mechanisms for transforming application visible identifier addresses to locator addresses. The control plane’s primary focus is a mapping system that includes a database of identifier to locator mappings. This mapping database drives ILA transformations. Control plane protocols disseminate identifier to locator mappings amongst ILA nodes.


The goal of this group is to elaborate on use cases, problems, and solution. The expected output is documents that specify the ILA data plane and control plane. Similar to IP routing, different control plane protocols may be defined for different use cases. This group will define at least one control plane reference protocol.

[Uma]: It’s good to be clear and explicit on the scope of the work i.e, with in a single administrative domain or across.


The group will pay particular attention to privacy, secure, and scalability characteristics of the solution. A goal of ILA is to facilitate strong user privacy in addresses; this is achieved by purging IP addresses of hierarchy that could be used to infer geo-location, and also by allowing applications to use source addresses for different flows to prevent unwanted correlations being being made by a third party . Also, the mapping system contains personally identifiable information (PII) that can reveal user identities or physical location of users, hence access to the mapping system must be strictly controlled. The mapping system must be resilient to Denial of Service attack. Scalability of both the deployment architecture and mapping system is important since the number of identifiers in a network is expected to be in the billions.


This group will try to reuse relevant technologies from existing mobility and encapsulation solutions. It will also leverage recent work in scalable distributed databases and key-value stores. The work produced by this group may be relevant to DMM, nvo3, LISP, int-area,

[Uma]: Would suggest to include RTGWG too, as solutions have implications on routing aspects.

v6ops working groups in IETF, as well as other SDOs such as 3GPP.



[Uma]: Would be good to start listing the main work items.