Re: [rrg] Host changes vs. network changes

Patrick Frejborg <pfrejborg@gmail.com> Wed, 09 December 2009 01:58 UTC

Return-Path: <pfrejborg@gmail.com>
X-Original-To: rrg@core3.amsl.com
Delivered-To: rrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF44628C0DB for <rrg@core3.amsl.com>; Tue, 8 Dec 2009 17:58:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level:
X-Spam-Status: No, score=x tagged_above=-999 required=5 tests=[]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GIY3fDPaWIPX for <rrg@core3.amsl.com>; Tue, 8 Dec 2009 17:58:48 -0800 (PST)
Received: from mail-yw0-f183.google.com (mail-yw0-f183.google.com [209.85.211.183]) by core3.amsl.com (Postfix) with ESMTP id 0D2293A682E for <rrg@irtf.org>; Tue, 8 Dec 2009 17:58:47 -0800 (PST)
Received: by ywh13 with SMTP id 13so6818756ywh.29 for <rrg@irtf.org>; Tue, 08 Dec 2009 17:58:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=lcu+mP5lxBB9mGH37jrttTCGUmf3NWZfDu45espW1+I=; b=U4a+0LKLbDM37q8RHHBIMnnFV9m4+IDGM1Jky4Dg1uW5cYvQPxjim8l8zUe3RfofhU 30REyL3auJFWfveQpQ/Wzo6Lwk9PedwCk+iKLqm1zT+CwmFOs7VVChfdr1bk+DQEb94t Ye5DAnsdqva0ZNFH08MeQlS7m60LQpHBYolSU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=FRHWZrg/cycgtyUKJw+TDUsE/6rbd4nLphnuR/gyckOaC9bEZDe5opPo386buZrRD6 Cbpq2cOAAtrjmsYeTh3UJQ6RsmTBsGlmVJOEyr6k7ehbhGWc7UzLm+Ag6ZhiaVg1feTv kX+rDkm0jFpeamHv/80HxXcXmNGAeASTawaaQ=
MIME-Version: 1.0
Received: by 10.101.134.16 with SMTP id l16mr2213702ann.165.1260323914440; Tue, 08 Dec 2009 17:58:34 -0800 (PST)
In-Reply-To: <4B1D6181.3000906@joelhalpern.com>
References: <20091201230739.23A196BE5D3@mercury.lcs.mit.edu> <B10F6402-1B24-4731-87C7-FDFAF50E74EB@ericsson.com> <4B1C1475.6080403@gmail.com> <20091207180629.GA7835@cisco.com> <B4AD21BC-2295-4528-8D30-0C8ED9C5F61E@castlepoint.net> <4B1D6181.3000906@joelhalpern.com>
Date: Wed, 09 Dec 2009 03:58:34 +0200
Message-ID: <5bc37fd40912081758m74dcd255mc1f0bd901c51c4b9@mail.gmail.com>
From: Patrick Frejborg <pfrejborg@gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, rrg@irtf.org
Content-Type: multipart/mixed; boundary="001636c924be38e328047a42072c"
Subject: Re: [rrg] Host changes vs. network changes
X-BeenThere: rrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IRTF Routing Research Group <rrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/rrg>, <mailto:rrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/rrg>
List-Post: <mailto:rrg@irtf.org>
List-Help: <mailto:rrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/rrg>, <mailto:rrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Dec 2009 01:58:49 -0000

Hi all,

Sorry for spamming the list with a presentation but it was the fastest
and easiest way to show my findings when I checked the corner cases if
both camps are integrated into one framework.

When e.g. LISP is used between two endpoints, there is nothing new
When hIPv4 is used between two endpoints, that is described in my
draft and nothing new

Two new use cases needs to be checked, i.e.
1) legacy client with an ITR in front establishing a session to a
hIPv4 enabled server
2) a hIPv4 client establishes a session to a legacy server with an ETR in front

To better understand I need to explain some syntax, please don't throw
stones on me because it has been a hot topic for while :-)
- endpoint locator, ELOC = endpoint identifier, EID in LISP
- RLOC, as defined in LISP
- ALOC, as defined in hIPv4
So three types of locators are needed, but in the Map-server and DNS
either ALOC or RLOC is used at a time for an entry - depending upon
the status of the site, are the endpoints upgraded to hIPv4 or not.

And the xTRs could also act as MPTCP proxies :-)

This is an early brain dump, so give it hard times - but it seems to
be possible to integrated both into one framework and then the
Internet citizens do have a choice to upgrade what suits them best.

Comments?

-- patte
On Mon, Dec 7, 2009 at 10:11 PM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
> I like the picture painted below of synergistic, incremental, flexbile
> deployment of improved behavior.
>
> However, this two-ended incentive relates to one of the things that concerns
> me about the current paths of this work.
>
> On the one hand, we are looking at a variety of tunneling mechanisms
> designed to relive the PI pressure on the core.
> One of the other important goals of most of these proposals is that they
> remove the difficulty of multihoming and changing providers (thus providing
> an incentive for enterprise cooperation / deployment.)
>
> Meanwhile, other sides of our house are looking at interesting ideas such as
> TCP Multipath support.  These techniques work most simply when the tcp
> sender and receiver have visibility to the attachment addresses of the site
> to the Internet, and the ability to select which one is used.
> All of the network based tunneling techniques I can see seem to have the
> property that in providing for multihoming and the ability to change
> providers, they remove exactly the visibility that our other hand is trying
> to utilize.
>
> There seems to be a systemic disconnect.
>
> Yours,
> Joel
>
> Shane Amante wrote:
>>
>> Scott,
>>
>> On Dec 7, 2009, at 11:06 MST, Scott Brim wrote:
>>>
>>> Excerpts from Brian E Carpenter on Mon, Dec 07, 2009 09:30:45AM +1300:
>>>>
>>>> I was thinking about commenting on this point too, but Christian
>>>> beat me to it.
>>>>
>>>> We *can* propagate changes to the numerically significant host
>>>> operating systems. It takes years, so any solution based on this
>>>> must be one with a completely incremental deployment model. One
>>>> view of the IPv6 deployment problem is that it depends on *both*
>>>> incremental deployment to all hosts *and* centralised deployment
>>>> by operators. That's the worst case, but seems inevitable for
>>>> an actual change of the IP packet format.
>>>>
>>>> So, I think that tells us that a solution that requires host stack
>>>> changes only, *or* infrastructure changes only, but not both,
>>>> is deployable.
>>>>
>>>> Personally, I wouldn't expect something called "routing research
>>>> group" to propose a strategy based 100% on host changes and 0% on
>>>> changes to the routing system. But we could conceivably propose
>>>> something based on changes to both, and that would surely be
>>>> a big mistake.
>>>
>>> Right.  And best of all is to start at both ends and work toward
>>> something good.  Do something in endpoints that helps them accomplish
>>> their goals without depending on the network.  Do something in the
>>> network that has the ability to help scale routing and addressing even
>>> assuming hosts don't change, BUT is designed so that as the hosts DO
>>> change that ability can be abandoned, and the whole system can become
>>> more streamlined.
>>
>> I *very* much agree with all of the above points!  Specifically, it's
>> critical that we develop both types of solutions as different
>> networks/domains are going to be vastly different in terms budget, staff,
>> priorities and size/scale.  For example, those with large size/scale may
>> have a significant amount of 'legacy' equipment they have to maintain "as
>> is" (or it would take [much] longer to 'upgrade' it in some form), therefore
>> they're likely to start with a network-based solution.  OTOH, those networks
>> that are green-field, planning/obligated to do host O/S upgrades and/or
>> small(er) networks may choose to start with a host-based solution.
>>
>> An analogy from a security standpoint is that hopefully most
>> administrators realize that host-based firewall solutions are superior
>> (particularly for laptops, etc. that roam outside a corporate firewall)[1];
>> however, 'legacy systems' may not [ever, or initially] support host-based
>> firewall solutions, therefore a network-based firewall is necessary to
>> provide protection to them ...
>>
>> The bottom-line is various networks (and, hosts in them) are continually
>> evolving *and* are evolving at different time-scales.
>>
>> -shane
>>
>> [1] This would be analogous to host-based ID/Loc split solutions, assuming
>> they provide adequate mobility.
>> _______________________________________________
>> rrg mailing list
>> rrg@irtf.org
>> http://www.irtf.org/mailman/listinfo/rrg
>>
> _______________________________________________
> rrg mailing list
> rrg@irtf.org
> http://www.irtf.org/mailman/listinfo/rrg
>