Re: [Ila] BOF proposal draft

Margaret Cullen <mrcullen42@gmail.com> Fri, 02 February 2018 03:36 UTC

Return-Path: <mrcullen42@gmail.com>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D632C126D73 for <ila@ietfa.amsl.com>; Thu, 1 Feb 2018 19:36:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.45
X-Spam-Level:
X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UMAgasiG87j8 for <ila@ietfa.amsl.com>; Thu, 1 Feb 2018 19:36:26 -0800 (PST)
Received: from mail-qk0-x231.google.com (mail-qk0-x231.google.com [IPv6:2607:f8b0:400d:c09::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3118C126BF0 for <ila@ietf.org>; Thu, 1 Feb 2018 19:36:26 -0800 (PST)
Received: by mail-qk0-x231.google.com with SMTP id d21so22292174qkj.3 for <ila@ietf.org>; Thu, 01 Feb 2018 19:36:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=LqJkLdvv821Yzu8V0O1h34wbODzZ8CUjnFfWANKfTyU=; b=pWQBKopF+8B4tmtaHAV8Pa7PR1cl5yAib6bxnJeKLrM140d41UsGExZsWF9OQodhEK gRd3xgq1coPXAntEejK1MWpcZqPVD9Afe5k8MPnZ54/wYARS+sSDPEmL6RzvZIcGB/03 NUApoBefG/fPq+8O08zNEt4wVwcKWhPI0oH+0j17+2FkYYqiBPU1wOT3oCuKXl+rbOC+ kJ2D0vxrfPMSavlllPzqjS0sPAJt1+Exjfysu+qPBL5uaBexWrz9Oj3BBcEyCpKDz+z1 2r0/B7um/r/dn1yPAyxooskjy7W5PLXqCENYwunA0dVR7+Io78iEjrbuUkl4sNc0qB3R b+Pg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=LqJkLdvv821Yzu8V0O1h34wbODzZ8CUjnFfWANKfTyU=; b=NRCoEqlj/kM9lxnkoCKmYtvWJVAc3f3vgE7bFae8toFLfkzePL/8fzN4Q5LYw1nm3C o+e+3jWAHUHAo2lkQl9HPFU2BEmbGo3MyTAidj73rbBHyu3egBLQqqB+o/Y1kn/eYNeW n0O3hPKzItFiQrAKdsScNLI9XRUF6jr/fveGYTDjCl1Krut9u83g4PMS/KfU3gCK+OjU TrVDPwg9kinSeHl4SvwHWGR8eOvQSmd6npec/jSYD70fZb2h0HBKXWXF5PMEvOO1+Mua JEjey7kXLYJz/8JTRdloHOBd9YavHhlolkY28yOYjfOgtFx65x8kh3UzE4hyGDTnmx7I tcZg==
X-Gm-Message-State: AKwxytdSkuFtqzWixPiYacfoJ3PI/KuKENkJBIhIsRx1ZaE/pG3NiyQj z/hziRcXI6ixzUckUd5PdbRS5X6s
X-Google-Smtp-Source: AH8x2262EuIxL4zRdP/YN1mgoBFjfYmS8xLyFAvBYn9DjzkeiGWCAtrIZ9ArLPGBgbtDwRgebQULTw==
X-Received: by 10.55.5.1 with SMTP id 1mr56876708qkf.247.1517542585202; Thu, 01 Feb 2018 19:36:25 -0800 (PST)
Received: from ?IPv6:2601:18c:503:a54a:69d0:cdd1:c77b:3956? ([2601:18c:503:a54a:69d0:cdd1:c77b:3956]) by smtp.gmail.com with ESMTPSA id s7sm749685qkd.67.2018.02.01.19.36.23 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 01 Feb 2018 19:36:24 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Margaret Cullen <mrcullen42@gmail.com>
In-Reply-To: <CAPDqMeoLo+vv6ndx6y6nobsVXyb8-jr0cGKQGmMZ+mkz4R68YQ@mail.gmail.com>
Date: Thu, 01 Feb 2018 22:36:22 -0500
Cc: ila@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <E07BDF30-2938-4B55-8FB2-7FBB302F8879@gmail.com>
References: <CAPDqMeoLo+vv6ndx6y6nobsVXyb8-jr0cGKQGmMZ+mkz4R68YQ@mail.gmail.com>
To: Tom Herbert <tom@quantonium.net>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/y3g1wo0Q3-1A6dwUtsQoL036cPQ>
Subject: Re: [Ila] BOF proposal draft
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Feb 2018 03:36:29 -0000

Hi Tom,

Can you tell me how the ILA proposal differs from earlier proposals along this line?

For instance, the 8+8 proposal made by Masataka Ohta, documented here in 2004 (but proposed in the mid-90s):
https://tools.ietf.org/html/draft-ohta-multi6-8plus8-00

Also, the GSE proposal made by Mike O’Dell, documented here in 1997:
https://tools.ietf.org/html/draft-ietf-ipngwg-gseaddr-00

In particular, how does ILA address the problems raised with these proposals that caused us to set them aside at the time?

Is there an I-D that describes what you are proposing that I should read?

Thanks,
Margaret


> On Feb 1, 2018, at 8:07 PM, Tom Herbert <tom@quantonium.net> wrote:
> 
> Hello,
> 
> Here is dome draft text for a BOF proposal description. Please comment!
> 
> Thanks,
> Tom
> -----------------------------
> The goal of this group is to standardize Identifier-Locator Addressing (ILA).
> 
> The problem to be addressed by this group is how to provide network
> overlays with high efficiency, low latency, scaling to billions of
> users, seamless mobility, strong privacy and security guarantees, be
> interoperable with existing networks, be anchorless, be usable for a
> variety of use cases, and have simplified control and management.
> These requirements are being driven by a huge growth in number of
> connected devices, particularly IoT, as well as the emergence of next
> generation applications such as AR and VR that have stringent
> networking requirements. While there have been many solutions proposed
> and defined by IETF to provide network overlays, including countless
> variations of encapsulation, NAT, and segment routing-- we believe
> none of these have been shown meet all these requirements.
> 
> ILA is a type of identifier/locator split that partitions an IPv6
> address into two components. One part of an address expresses the
> immutable identity of a node, and another part indicates the
> topological location of a node which can be dynamic. ILA is a means to
> implement network overlays without the overhead or complexity of
> encapsulation or extension headers. ILA leverages the immense size of
> the IPv6 address space.  In this regard, ILA bears similarity to
> Identifier-Locator Network Protocol (ILNP), however there are some
> major differences in protocol layer and the control plane.
> 
> There are three primary use cases proposed for Identifier Locator Addressing:
> 
>  * Mobile user-plane
> 
>  * Datacenter virtualization
> 
>  * Network virtualization
> 
> A recent trend in the industry is to build converged networks that
> contain all three of these use cases. In order to meet very low
> latency requirements and provide high availability, many mobile
> providers are housing data centers within their networks to run
> applications. Similarly, many providers also run cloud services within
> their network. A single networking solution with a common control
> plane is desirable.
> 
> There are two aspects to ILA: a data plane and control plane. The data
> plane includes the ILA address transformation mechanism, checksum
> neutral handling, and ancillary protocol support (such as
> considerations of ICMP when ILA addresses are involved). A
> transformation is drive by a mapping lookup on an identifier to a
> locator. The control plane’s main focus is on the mapping system.
> There are two critical problems to be solved in a mapping system 1)
> scaling to support billions of entries 2) securing information in the
> mapping system which is inherently privacy sensitive data.  The
> mapping system is essentially a key-value store database. There has
> been a lot of innovation in key-value store solutions over the past
> few years,  one goal of this group will be to evaluate key-value
> solutions for providing the mapping system.
> 
> This activity may leverage protocols and work from working groups
> within IETF including dmm, nvo3, lisp, 6man, and int-area.
> Additionally, work in other SDOs, particularly 3GPP, is relevant. Open
> source projects, particular work in key-value store technology and
> databases, are also relevant.
> 
> _______________________________________________
> ila mailing list
> ila@ietf.org
> https://www.ietf.org/mailman/listinfo/ila