SlideShare a Scribd company logo
1 of 36
1
Institut Mines-Télécom
Vers un renforcement de
l’architecture Internet : le protocole
LISP (“Locator/ID Separation
Protocol”)
1
JCSA 2013
Luigi Iannone
2Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Road Map
- Why LISP???
- LISP Data Plane
• RFC 6830
- LISP Control Plane
• RFC 6833; RFC 6836; draft-ietf-lisp-ddt-01.txt
- The Big Picture
2
3Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Why LISP?????
4Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Internet’s Scaling Issues
- D. Meyer, L. Zhang, K. Fall, “Report from IAB Workshop on
Routing and Addressing”, RFC 4984, IETF, September 2007.
4
“It is commonly recognized that today’s Internet routing and
addressing system is facing serious scaling problems.”
5Telecom ParisTechLuigi Iannone LISP - JCSA 2013 5
The BGP’s FIB inflation problem
No... it is not just natural Internet growth
•PI (Provider Independent) prefix
assignment
• Multi-homing
• Traffic-Engineering
• Security
─Remember the YouTube incident?
01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html
IPv4
IPv6
PeakPrefixUpdateRateperSecond
Churn can have peaks of thousands per
seconds
Churn increases the need processing
power
BGP Forwarding Information Base (FIB) and Churn Explosion:
6Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Cause: The overloaded IP address
semantic
- An IP Address tells:
• Who you are
─ Hi! I am Luigi Iannone 46 Rue Barreault 75013 Paris France
• Where you are
─ .... and I am in Luigi Iannone 46 Rue Barreault 75013 Paris France
- This design was OK in the 70s-80s
• Because was easier to implement
• Because the Internet was a small academic network of networks
6
7Telecom ParisTechLuigi Iannone LISP - JCSA 2013
From “Divide and Conquer” ....
....to “Split and Scale”
- Along with a plethora of proposals:
•Locator/ID Separation Protocol (LISP)
•Routing Architecture for the Next Generation Internet (RANGI)
•Internet Vastly Improved Plumbing (Ivip)
•Hierarchical IPv4 Framework (hIPv4)
•Name Overlay (NOL) Service for Scalable Internet Routing
•Compact Routing in a Locator Identifier Mapping System (CRM)
•Layered Mapping System (LMS)
•Two-Phased Mapping
•Global Locator, Local Locator, and Identifier Split (GLI-Split)
•Tunneled Inter-Domain Routing (TIDR)
•Identifier-Locator Network Protocol (ILNP)
•Enhanced Efficiency of Mapping Distribution protocols in Map-and-Encap Schemes (EEMDP)
•Evolution
•Name-Based Sockets
•Routing and Addressing in Networks with Global Enterprise Recursion (IRON-RANGER)
•Hierarchical Architecture for Internet Routing (HAIR)
7
“The Research Group has rough consensus that separating identity
from location is desirable and technically feasible. However,
the Research Group does NOT have consensus on the best
engineering approach to such an identity/location split.”
From RFC 6115: Recommendation for a Routing Architecture
8Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP: Locator/ID Separation Protocol
- RFC 6830: The Locator/ID Separation Protocol (LISP)
- RFC 6831: The Locator/ID Separation Protocol (LISP) for Multicast Environments
- RFC 6832: Interworking between Locator/ID Separation Protocol (LISP) and Non-LISP Sites
- RFC 6833: Locator/ID Separation Protocol (LISP) Map-Server Interface
- RFC 6834: Locator/ID Separation Protocol (LISP) Map-Versioning
- RFC 6835: The Locator/ID Separation Protocol Internet Groper (LIG)
- RFC 6836: Locator/ID Separation Protocol (LISP) Alternative Logical Topology (LISP+ALT)
- RFC 6837: NERD: A not-so-novel Endpoint ID (EID) to Routing Locator (RLOC) Database
8
9Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP Data Plane (RFC 6830)
10Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Splitting ID and Location
10
Locator Space
Identifier Space
ITR/ETR
Ingress/Egress Tunnel Routers (xTRs)
ITR/ETR
Ingress/Egress Tunnel Routers (xTRs)
11Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Map & Encap Operations: source side
11
DB
LISP-Database:
 Contains mappings “owned”
locally
 Used to select source RLOC
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ |Version| IHL |Type of Service| Total Length |
/ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Identification |Flags| Fragment Offset |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
IH | Time to Live | Protocol | Header Checksum |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Source EID |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Destination EID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
L / |N|L|E|V|I|Flags| Nonce/Map-Version |
I +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
S  | Instance ID/ Locator Status Bits |
P +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ | Source Port = xxxx | Dest Port = 4341 |
UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | UDP Length | UDP Checksum |
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ |Version| IHL |Type of Service| Total Length |
/ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Identification |Flags| Fragment Offset |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
OH | Time to Live | Protocol = 17 | Header Checksum |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Source Routing Locator |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Destination Routing Locator |? ?
12Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Where does LISP find the Mappings?
12
DB
Mapping Distribution System:
 Queried to retrieve mappings
 Used to select Destination
RLOC
Where is located EIDd ?
Mapping
Distribution
System
(ALT, CONS, EMACS, DHT,
NERD, TREE => DDT)
13Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Where does LISP store the Mappings?
13
DB
Mapping
Distribution
System
(ALT, CONS, EMACS, DHT,
NERD, TREE)
Cache
LISP-Cache:
 Queried before the Mapping
system
 Mapping system queried only in
case of miss
 Used to select Destination
RLOC
14Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Map & Encap Operations: destination
side
14
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ |Version| IHL |Type of Service| Total Length |
/ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Identification |Flags| Fragment Offset |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
IH | Time to Live | Protocol | Header Checksum |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Source EID |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Destination EID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
L / |N|L|E|V|I|Flags| Nonce/Map-Version |
I +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
S  | Instance ID/ Locator Status Bits |
P +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ | Source Port = xxxx | Dest Port = 4341 |
UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | UDP Length | UDP Checksum |
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ |Version| IHL |Type of Service| Total Length |
/ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Identification |Flags| Fragment Offset |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
OH | Time to Live | Protocol = 17 | Header Checksum |
| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| | Source Routing Locator |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Destination Routing Locator |
Consistency Checks:
 Check DB: Am I the correct RLOC
for the destination EID?
15Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP Mapping Distribution System
LISP-MS (RFC 6833)
LISP+ALT (RFC 6836)
LISP-DDT (draft-ietf-lisp-ddt-01.txt)
16Telecom ParisTechLuigi Iannone LISP - JCSA 2013
MS: A Mapping System API
16
DB
Mapping
Distribution
System
(ALT, CONS, EMACS, DHT,
NERD, TREE => DDT)
Where is located EIDd ?Map-Request(EID)
Map-Reply(EID: <RLOC1,...>)
Map-Resolver
Map-Server
Map-Register(EID: <RLOC1,...>)
Map-Notify(EID: <RLOC1,...>)
17Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP+ALT
Alternative Logical Topology
17
Mapping Distribution System
MS/MR
MS/MR
MS/MR
MS/MR
MS/MR
MS/MR
MS/MR
- Pros
• Based on existing
well-known
technology
- Cons
• PITA
ALT-Router
BGP over GRE Session
18Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP+ALT Failure
- Used on an international testbed (www.lisp4.net)
• Rapidly resulted in very cumbersome maintenance
- 2nd Week March 2012
- LISP4.net switched to DDT
18
Source: www.lispmon.net
LISP+ALT Topology early 2012
19
- Pros
• Easy maintenance
• Economics
• Security
- Cons
• static manual
configuration of the
tree
Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT
Delegated Database Tree
19
Mapping Distribution System
MS/MR
MS/MR
MS/MR
MS/MR
MS/MR
MS/MR
MS/MR
DDT Node
Logical Delegation
20
MR
Static pointer to root
DDT Nodes
Static pointers to children
authoritative of more-
specific (leafs are MS)
ETR
Registers to statically
configured MS
Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT
Configuration
20
MS
10.6.9/24
MR
ETR
10.6.9/24
DDT Root
0/0
DDT Node
10/8
DDT Node
10.6/16
21
7.ETR sends Map-Reply with
requested mapping to ITR
Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT
Map Retrieval (cold start)
21
MS
10.6.9/24
MR
ETR
10.6.9/24
DDT Root
0/0
DDT Node
10/8
DDT Node
10.6/16
ITR
1.ITR sends Map-Request to
its configured MR
2.MR sends Map-Request to
configured Root Server
3.Root Server sends back
Map-Referral to configured
DDT Node authoritative on
more specific
4.Repeat 2 and 3 until MS
reached
5.MR sends Map-Request to
MS
6.MS forwards Map-Request
to authoritative ETR
22
4.ETR sends Map-Reply with
requested mapping to ITR
Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT
Map Retrieval (regular case)
22
MS
10.6.9/24
MR
ETR
10.6.9/24
DDT Root
0/0
DDT Node
10/8
DDT Node
10.6/16
ITR
1.ITR sends Map-Request to
its configured MR
2.MR sends Map-Request to
cached MS
3.MS forwards Map-Request
to authoritative ETR
23
1.ITR sends Map-Request to
its configured MR
2.MR sends Map-Request to
configured Root Server
3.Root Server sends back
Map-Referral to configured
DDT Node authoritative on
more specific
4.Repeat 2 and 3 until MS
reached
5.MR sends Map-Request to
authoritative MS
6.MS sends back Map-Reply
with requested mapping to
MR
7.MR sends Map-Reply with
requested mapping to ITR
Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT
Map Retrieval with Proxy Reply (cold start)
23
MS
10.6.9/24
MR
ETR
10.6.9/24
DDT Root
0/0
DDT Node
10/8
DDT Node
10.6/16
ITR
24
1.ITR sends Map-Request to
its configured MR
2.MR sends Map-Request to
cache MS
3.MS sends back Map-Reply
with requested mapping to
MR
4.MR sends Map-Reply with
requested mapping to ITR
Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT
Map Retrieval with Proxy Reply (regular
case) start)
24
MS
10.6.9/24
MR
ETR
10.6.9/24
DDT Root
0/0
DDT Node
10/8
DDT Node
10.6/16
ITR
25Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP DDT Topology (early 2013)
25
26Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT Reliability
26
27Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP-DDT RTT
27
28Telecom ParisTechLuigi Iannone LISP - JCSA 2013
The Big Picture....
Does LISP finally solve (all of)
the issues previously
mentioned???
29Telecom ParisTechLuigi Iannone LISP - JCSA 2013
What the Internet looks like with LISP
29
Number of FIB entries (logscale)
 Simulations
 Synthetic topologies generated with GHITTLE
 Hierarchical with business relationship
 14965 ASes
 Gain: 1 order of magnitude
This work has been carried out in collaboration with Prof. B. Quoitin @ UMons
30Telecom ParisTechLuigi Iannone LISP - JCSA 2013
What the Internet looks like with LISP
30
Less than 20% of Today’s BGP RIB
(roughly ~ 100.000 entries)
?
31Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Large Scale LISP Emulation
 LISP Emulation
 Based on PCAP Traces (> 20.000 DSL customers)
 Used BGP Granularity for mappings
31
J. Kim, L. Iannone, and A. Feldmann, “A Deep Dive into the LISP Cache and What ISPs Should Know about It,” in the 10th
IFIP International Conference on Networking (Networking’11), May 2011.
32Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Cache Entries Evolution for Vanilla LISP
32
Cache Miss Classification
24h Cache Size Evolution
Cache Entries Lifetime
Web
MS DSMail
DNS
eMule
HTTPS
NTP
Mail
BitTorrent
BitTorrent
33Telecom ParisTechLuigi Iannone LISP - JCSA 2013
What the Internet looks like with LISP
33
Less than 20% of Today’s BGP RIB
(roughly ~ 100.000 entries)
Depends on Cache Management policy
(but we can easily go for less than 50.000 entries)
Currently lisp4.net has a DFZ potential reduction of 93.8%!
34Telecom ParisTechLuigi Iannone LISP - JCSA 2013
LISP main benefits
- FIB (Forwarding Information Base)
• shrunk since stub AS do not inject anything in the DFZ (Default Free
Zone)
- PI Addresses
• Just a matter of changing RLOCs
- Multi-Homing
• Just a list of RLOCs
- Traffic Engineering
• Just a matter of giving priorities to RLOCs
- Churn
• Flapping Edge AS are not anymore in the DFZ
- Additional Benefits
• Path Diversity
34
35Telecom ParisTechLuigi Iannone LISP - JCSA 2013
But there is much more
- Mobility in Wireless Mesh Networks
- Smartphones seamless connectivity
- WiFi Offloading
- MaaS: Mobility as a Service
- Cloud Networking
• VM migration
• Load Balancing
• VPN
• Content Distribution
- Real-Time Traffic Optimization
- ... and more to come....
35
36Telecom ParisTechLuigi Iannone LISP - JCSA 2013
Thank You!
- datatracker.ietf.org/wg/lisp/
- www.lisp4.net
- www.openlisp.org
- Coming soon...
36

More Related Content

Similar to JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration Protocol") Vers un renforcement de l'architecture Internet

L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)Motonori Shindo
 
Fosscon 2012 firewall workshop
Fosscon 2012 firewall workshopFosscon 2012 firewall workshop
Fosscon 2012 firewall workshopjvehent
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetAfnic
 
Panel with IPv6 CE Vendors
Panel with IPv6 CE VendorsPanel with IPv6 CE Vendors
Panel with IPv6 CE VendorsAPNIC
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPDai Yang
 
Brkrst 3123 previdi-final
Brkrst 3123 previdi-finalBrkrst 3123 previdi-final
Brkrst 3123 previdi-finalStefano Previdi
 
RIPE NCC RIS (Routing Information Service)
RIPE NCC RIS (Routing Information Service)RIPE NCC RIS (Routing Information Service)
RIPE NCC RIS (Routing Information Service)RIPE NCC
 
Protocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNProtocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNGerardo Pardo-Castellote
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream csching
 
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Javier Benitez
 

Similar to JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration Protocol") Vers un renforcement de l'architecture Internet (20)

Networking
NetworkingNetworking
Networking
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)
 
BRKSPG-3001.pdf
BRKSPG-3001.pdfBRKSPG-3001.pdf
BRKSPG-3001.pdf
 
Fosscon 2012 firewall workshop
Fosscon 2012 firewall workshopFosscon 2012 firewall workshop
Fosscon 2012 firewall workshop
 
flow mgmt
flow mgmtflow mgmt
flow mgmt
 
flowing mgmt.ppt
flowing mgmt.pptflowing mgmt.ppt
flowing mgmt.ppt
 
Ipv6 internetdagen-print
Ipv6 internetdagen-printIpv6 internetdagen-print
Ipv6 internetdagen-print
 
IPv6 introduction
IPv6 introductionIPv6 introduction
IPv6 introduction
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
Panel with IPv6 CE Vendors
Panel with IPv6 CE VendorsPanel with IPv6 CE Vendors
Panel with IPv6 CE Vendors
 
Scalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IPScalable Service-Oriented Middleware over IP
Scalable Service-Oriented Middleware over IP
 
Brkrst 3123 previdi-final
Brkrst 3123 previdi-finalBrkrst 3123 previdi-final
Brkrst 3123 previdi-final
 
Rfc1723
Rfc1723Rfc1723
Rfc1723
 
RIPE NCC RIS (Routing Information Service)
RIPE NCC RIS (Routing Information Service)RIPE NCC RIS (Routing Information Service)
RIPE NCC RIS (Routing Information Service)
 
201901-SRv6.pdf
201901-SRv6.pdf201901-SRv6.pdf
201901-SRv6.pdf
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
Protocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDNProtocol and Integration Challenges for SDN
Protocol and Integration Challenges for SDN
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
 
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
Colt IPv6 for Business Customers Case Study - Swiss IPv6 Council Jun 2013-v3
 

More from Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresAfnic
 
Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic
 

More from Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 
Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012Afnic Rapport d'activite 2012
Afnic Rapport d'activite 2012
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration Protocol") Vers un renforcement de l'architecture Internet

  • 1. 1 Institut Mines-Télécom Vers un renforcement de l’architecture Internet : le protocole LISP (“Locator/ID Separation Protocol”) 1 JCSA 2013 Luigi Iannone
  • 2. 2Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Road Map - Why LISP??? - LISP Data Plane • RFC 6830 - LISP Control Plane • RFC 6833; RFC 6836; draft-ietf-lisp-ddt-01.txt - The Big Picture 2
  • 3. 3Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Why LISP?????
  • 4. 4Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Internet’s Scaling Issues - D. Meyer, L. Zhang, K. Fall, “Report from IAB Workshop on Routing and Addressing”, RFC 4984, IETF, September 2007. 4 “It is commonly recognized that today’s Internet routing and addressing system is facing serious scaling problems.”
  • 5. 5Telecom ParisTechLuigi Iannone LISP - JCSA 2013 5 The BGP’s FIB inflation problem No... it is not just natural Internet growth •PI (Provider Independent) prefix assignment • Multi-homing • Traffic-Engineering • Security ─Remember the YouTube incident? 01-Jan-94 to 14-March-11 Source: http://bgp.potaroo.net/index-bgp.html IPv4 IPv6 PeakPrefixUpdateRateperSecond Churn can have peaks of thousands per seconds Churn increases the need processing power BGP Forwarding Information Base (FIB) and Churn Explosion:
  • 6. 6Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Cause: The overloaded IP address semantic - An IP Address tells: • Who you are ─ Hi! I am Luigi Iannone 46 Rue Barreault 75013 Paris France • Where you are ─ .... and I am in Luigi Iannone 46 Rue Barreault 75013 Paris France - This design was OK in the 70s-80s • Because was easier to implement • Because the Internet was a small academic network of networks 6
  • 7. 7Telecom ParisTechLuigi Iannone LISP - JCSA 2013 From “Divide and Conquer” .... ....to “Split and Scale” - Along with a plethora of proposals: •Locator/ID Separation Protocol (LISP) •Routing Architecture for the Next Generation Internet (RANGI) •Internet Vastly Improved Plumbing (Ivip) •Hierarchical IPv4 Framework (hIPv4) •Name Overlay (NOL) Service for Scalable Internet Routing •Compact Routing in a Locator Identifier Mapping System (CRM) •Layered Mapping System (LMS) •Two-Phased Mapping •Global Locator, Local Locator, and Identifier Split (GLI-Split) •Tunneled Inter-Domain Routing (TIDR) •Identifier-Locator Network Protocol (ILNP) •Enhanced Efficiency of Mapping Distribution protocols in Map-and-Encap Schemes (EEMDP) •Evolution •Name-Based Sockets •Routing and Addressing in Networks with Global Enterprise Recursion (IRON-RANGER) •Hierarchical Architecture for Internet Routing (HAIR) 7 “The Research Group has rough consensus that separating identity from location is desirable and technically feasible. However, the Research Group does NOT have consensus on the best engineering approach to such an identity/location split.” From RFC 6115: Recommendation for a Routing Architecture
  • 8. 8Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP: Locator/ID Separation Protocol - RFC 6830: The Locator/ID Separation Protocol (LISP) - RFC 6831: The Locator/ID Separation Protocol (LISP) for Multicast Environments - RFC 6832: Interworking between Locator/ID Separation Protocol (LISP) and Non-LISP Sites - RFC 6833: Locator/ID Separation Protocol (LISP) Map-Server Interface - RFC 6834: Locator/ID Separation Protocol (LISP) Map-Versioning - RFC 6835: The Locator/ID Separation Protocol Internet Groper (LIG) - RFC 6836: Locator/ID Separation Protocol (LISP) Alternative Logical Topology (LISP+ALT) - RFC 6837: NERD: A not-so-novel Endpoint ID (EID) to Routing Locator (RLOC) Database 8
  • 9. 9Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP Data Plane (RFC 6830)
  • 10. 10Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Splitting ID and Location 10 Locator Space Identifier Space ITR/ETR Ingress/Egress Tunnel Routers (xTRs) ITR/ETR Ingress/Egress Tunnel Routers (xTRs)
  • 11. 11Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Map & Encap Operations: source side 11 DB LISP-Database:  Contains mappings “owned” locally  Used to select source RLOC +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / |Version| IHL |Type of Service| Total Length | / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Identification |Flags| Fragment Offset | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ IH | Time to Live | Protocol | Header Checksum | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Source EID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination EID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ L / |N|L|E|V|I|Flags| Nonce/Map-Version | I +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ S | Instance ID/ Locator Status Bits | P +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / | Source Port = xxxx | Dest Port = 4341 | UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | UDP Length | UDP Checksum | 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / |Version| IHL |Type of Service| Total Length | / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Identification |Flags| Fragment Offset | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ OH | Time to Live | Protocol = 17 | Header Checksum | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Source Routing Locator | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Routing Locator |? ?
  • 12. 12Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Where does LISP find the Mappings? 12 DB Mapping Distribution System:  Queried to retrieve mappings  Used to select Destination RLOC Where is located EIDd ? Mapping Distribution System (ALT, CONS, EMACS, DHT, NERD, TREE => DDT)
  • 13. 13Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Where does LISP store the Mappings? 13 DB Mapping Distribution System (ALT, CONS, EMACS, DHT, NERD, TREE) Cache LISP-Cache:  Queried before the Mapping system  Mapping system queried only in case of miss  Used to select Destination RLOC
  • 14. 14Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Map & Encap Operations: destination side 14 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / |Version| IHL |Type of Service| Total Length | / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Identification |Flags| Fragment Offset | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ IH | Time to Live | Protocol | Header Checksum | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Source EID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination EID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ L / |N|L|E|V|I|Flags| Nonce/Map-Version | I +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ S | Instance ID/ Locator Status Bits | P +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / | Source Port = xxxx | Dest Port = 4341 | UDP +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | UDP Length | UDP Checksum | 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ / |Version| IHL |Type of Service| Total Length | / +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Identification |Flags| Fragment Offset | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ OH | Time to Live | Protocol = 17 | Header Checksum | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | Source Routing Locator | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Routing Locator | Consistency Checks:  Check DB: Am I the correct RLOC for the destination EID?
  • 15. 15Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP Mapping Distribution System LISP-MS (RFC 6833) LISP+ALT (RFC 6836) LISP-DDT (draft-ietf-lisp-ddt-01.txt)
  • 16. 16Telecom ParisTechLuigi Iannone LISP - JCSA 2013 MS: A Mapping System API 16 DB Mapping Distribution System (ALT, CONS, EMACS, DHT, NERD, TREE => DDT) Where is located EIDd ?Map-Request(EID) Map-Reply(EID: <RLOC1,...>) Map-Resolver Map-Server Map-Register(EID: <RLOC1,...>) Map-Notify(EID: <RLOC1,...>)
  • 17. 17Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP+ALT Alternative Logical Topology 17 Mapping Distribution System MS/MR MS/MR MS/MR MS/MR MS/MR MS/MR MS/MR - Pros • Based on existing well-known technology - Cons • PITA ALT-Router BGP over GRE Session
  • 18. 18Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP+ALT Failure - Used on an international testbed (www.lisp4.net) • Rapidly resulted in very cumbersome maintenance - 2nd Week March 2012 - LISP4.net switched to DDT 18 Source: www.lispmon.net LISP+ALT Topology early 2012
  • 19. 19 - Pros • Easy maintenance • Economics • Security - Cons • static manual configuration of the tree Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Delegated Database Tree 19 Mapping Distribution System MS/MR MS/MR MS/MR MS/MR MS/MR MS/MR MS/MR DDT Node Logical Delegation
  • 20. 20 MR Static pointer to root DDT Nodes Static pointers to children authoritative of more- specific (leafs are MS) ETR Registers to statically configured MS Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Configuration 20 MS 10.6.9/24 MR ETR 10.6.9/24 DDT Root 0/0 DDT Node 10/8 DDT Node 10.6/16
  • 21. 21 7.ETR sends Map-Reply with requested mapping to ITR Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Map Retrieval (cold start) 21 MS 10.6.9/24 MR ETR 10.6.9/24 DDT Root 0/0 DDT Node 10/8 DDT Node 10.6/16 ITR 1.ITR sends Map-Request to its configured MR 2.MR sends Map-Request to configured Root Server 3.Root Server sends back Map-Referral to configured DDT Node authoritative on more specific 4.Repeat 2 and 3 until MS reached 5.MR sends Map-Request to MS 6.MS forwards Map-Request to authoritative ETR
  • 22. 22 4.ETR sends Map-Reply with requested mapping to ITR Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Map Retrieval (regular case) 22 MS 10.6.9/24 MR ETR 10.6.9/24 DDT Root 0/0 DDT Node 10/8 DDT Node 10.6/16 ITR 1.ITR sends Map-Request to its configured MR 2.MR sends Map-Request to cached MS 3.MS forwards Map-Request to authoritative ETR
  • 23. 23 1.ITR sends Map-Request to its configured MR 2.MR sends Map-Request to configured Root Server 3.Root Server sends back Map-Referral to configured DDT Node authoritative on more specific 4.Repeat 2 and 3 until MS reached 5.MR sends Map-Request to authoritative MS 6.MS sends back Map-Reply with requested mapping to MR 7.MR sends Map-Reply with requested mapping to ITR Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Map Retrieval with Proxy Reply (cold start) 23 MS 10.6.9/24 MR ETR 10.6.9/24 DDT Root 0/0 DDT Node 10/8 DDT Node 10.6/16 ITR
  • 24. 24 1.ITR sends Map-Request to its configured MR 2.MR sends Map-Request to cache MS 3.MS sends back Map-Reply with requested mapping to MR 4.MR sends Map-Reply with requested mapping to ITR Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Map Retrieval with Proxy Reply (regular case) start) 24 MS 10.6.9/24 MR ETR 10.6.9/24 DDT Root 0/0 DDT Node 10/8 DDT Node 10.6/16 ITR
  • 25. 25Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP DDT Topology (early 2013) 25
  • 26. 26Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT Reliability 26
  • 27. 27Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP-DDT RTT 27
  • 28. 28Telecom ParisTechLuigi Iannone LISP - JCSA 2013 The Big Picture.... Does LISP finally solve (all of) the issues previously mentioned???
  • 29. 29Telecom ParisTechLuigi Iannone LISP - JCSA 2013 What the Internet looks like with LISP 29 Number of FIB entries (logscale)  Simulations  Synthetic topologies generated with GHITTLE  Hierarchical with business relationship  14965 ASes  Gain: 1 order of magnitude This work has been carried out in collaboration with Prof. B. Quoitin @ UMons
  • 30. 30Telecom ParisTechLuigi Iannone LISP - JCSA 2013 What the Internet looks like with LISP 30 Less than 20% of Today’s BGP RIB (roughly ~ 100.000 entries) ?
  • 31. 31Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Large Scale LISP Emulation  LISP Emulation  Based on PCAP Traces (> 20.000 DSL customers)  Used BGP Granularity for mappings 31 J. Kim, L. Iannone, and A. Feldmann, “A Deep Dive into the LISP Cache and What ISPs Should Know about It,” in the 10th IFIP International Conference on Networking (Networking’11), May 2011.
  • 32. 32Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Cache Entries Evolution for Vanilla LISP 32 Cache Miss Classification 24h Cache Size Evolution Cache Entries Lifetime Web MS DSMail DNS eMule HTTPS NTP Mail BitTorrent BitTorrent
  • 33. 33Telecom ParisTechLuigi Iannone LISP - JCSA 2013 What the Internet looks like with LISP 33 Less than 20% of Today’s BGP RIB (roughly ~ 100.000 entries) Depends on Cache Management policy (but we can easily go for less than 50.000 entries) Currently lisp4.net has a DFZ potential reduction of 93.8%!
  • 34. 34Telecom ParisTechLuigi Iannone LISP - JCSA 2013 LISP main benefits - FIB (Forwarding Information Base) • shrunk since stub AS do not inject anything in the DFZ (Default Free Zone) - PI Addresses • Just a matter of changing RLOCs - Multi-Homing • Just a list of RLOCs - Traffic Engineering • Just a matter of giving priorities to RLOCs - Churn • Flapping Edge AS are not anymore in the DFZ - Additional Benefits • Path Diversity 34
  • 35. 35Telecom ParisTechLuigi Iannone LISP - JCSA 2013 But there is much more - Mobility in Wireless Mesh Networks - Smartphones seamless connectivity - WiFi Offloading - MaaS: Mobility as a Service - Cloud Networking • VM migration • Load Balancing • VPN • Content Distribution - Real-Time Traffic Optimization - ... and more to come.... 35
  • 36. 36Telecom ParisTechLuigi Iannone LISP - JCSA 2013 Thank You! - datatracker.ietf.org/wg/lisp/ - www.lisp4.net - www.openlisp.org - Coming soon... 36