[rrg] Late proposal addition: RANGER

Tony Li <tony.li@tony.li> Sat, 16 January 2010 07:25 UTC

Return-Path: <tony.li@tony.li>
X-Original-To: rrg@core3.amsl.com
Delivered-To: rrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EA0723A67AD for <rrg@core3.amsl.com>; Fri, 15 Jan 2010 23:25:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.319
X-Spam-Level:
X-Spam-Status: No, score=-1.319 tagged_above=-999 required=5 tests=[AWL=-0.312, BAYES_00=-2.599, DATE_IN_PAST_12_24=0.992, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LtaXGVqEaP1M for <rrg@core3.amsl.com>; Fri, 15 Jan 2010 23:25:03 -0800 (PST)
Received: from qmta02.emeryville.ca.mail.comcast.net (qmta02.emeryville.ca.mail.comcast.net [76.96.30.24]) by core3.amsl.com (Postfix) with ESMTP id D32CE3A67B6 for <rrg@irtf.org>; Fri, 15 Jan 2010 23:25:02 -0800 (PST)
Received: from omta22.emeryville.ca.mail.comcast.net ([76.96.30.89]) by qmta02.emeryville.ca.mail.comcast.net with comcast id W7Ml1d0021vN32cA27R1Dv; Sat, 16 Jan 2010 07:25:01 +0000
Received: from [192.168.0.110] ([24.6.155.154]) by omta22.emeryville.ca.mail.comcast.net with comcast id W7RS1d0013L8a8Q8i7RS20; Sat, 16 Jan 2010 07:25:26 +0000
Message-ID: <4B50A83F.3060002@tony.li>
Date: Fri, 15 Jan 2010 09:39:11 -0800
From: Tony Li <tony.li@tony.li>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: RRG <rrg@irtf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [rrg] Late proposal addition: RANGER
X-BeenThere: rrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IRTF Routing Research Group <rrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/rrg>, <mailto:rrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/rrg>
List-Post: <mailto:rrg@irtf.org>
List-Help: <mailto:rrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/rrg>, <mailto:rrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jan 2010 07:25:04 -0000

Hi all,

Some of you may have noticed that Fred Templin's RANGER proposal has 
been noticeably absent from our document.  Fred has been working on this 
quite vocally since the earliest days of this work and to exclude his 
proposal would leave out a notable component in our discussions.

Through a series of miscommunications, the summary was not presented by 
the official deadline.  As a result, the chairs have decided to grant 
RANGER an exception.  The attached summary will be included in the document.

Regards,
Lixia & Tony



proposal:
---------
Routing and Addressing in Next-Generation EnteRprises (RANGER)

key idea:
---------
RANGER is a locator-identifier separation approach that uses IP-in-IP
encapsulation to connect edge networks across transit networks such
as the global Internet. End systems use endpoint interface identifier
(EID) addresses that may be routable within edge networks but do not
appear in transit network routing tables. EID to Routing Locator (RLOC)
address bindings are instead maintained in mapping tables and also
cached in default router FIBs (i.e., very much the same as for the
global DNS and its associated caching resolvers). RANGER enterprise
networks are organized in a recursive hierarchy with default mappers
connecting lower layers to the next higher layer in the hierarchy.
Default mappers forward initial packets and push mapping information
to lower-tier routers and end systems through secure redirection.

RANGER is an architectural framework derived from the Intra-Site
Automatic Tunnel Addressing Protocol (ISATAP).

gains:
------
- provides scalable routing system alternative in instances where
   dynamic routing protocols are impractical
- naturally supports a recursively-nested "network-of-networks"
   (or, "enterprise-within-enterprise") hierarchy
- uses asymmetric securing mechanisms (i.e., secure neighbor
   discovery) to secure router discovery and the redirection
   mechanism
- can quickly detect path failures and pick alternate routes
- naturally supports provider-independent addressing
- support for site multihoming and traffic engineering
- ingress filtering for multi-homed sites
- mobility-agile through explicit cache invalidation (much more
   reactive than DynDns)
- supports neighbor discovery and neighbor unreachability
   detection over tunnels
- no changes to end systems
- no changes to most routers
- supports IPv6 transition
- compatible with true identity/locator split mechansims such
   as HIP (i.e., packets contain HIP HIT as end system identifier,
   IPv6 address as endpoint Interface iDentifier (EID) in inner IP
   header and IPv4 address as Routing LOCator (RLOC) in outer
   IP header)
- prototype code available

costs:
------
- new code needed in enterprise border routers
- locator/path liveness detection using RFC4861 neighbor
   unreachability detection (i.e., extra control messages,
   but data-driven)

full documentation:
-------------------
draft-templin-ranger-09.txt (RANGER Architecture)
draft-russert-rangers-01.txt (RANGER Scenarios)
draft-templin-intarea-vet-06.txt (Virtual Enterprise Traversal)
draft-templin-intarea-seal-08.txt (Subnetwork Encapsulation and 
Adaptation Layer)
RFC5214 (Intra-site Automatic Tunnel Addressing Protocol - IETF RFC)
RFC4214 (Intra-site Automatic Tunnel Addressing Protocol - IETF RFC)