| < draft-davies-fdr-reqs-00.txt | draft-davies-fdr-reqs-01.txt > | |||
|---|---|---|---|---|
| IRTF Routing Research Elwyn Davies, Avri Doria, Nortel Networks | ||||
| Internet Draft Malin Carlzon, SUNET | ||||
| Anders Bergsten, Olle Pers, Yong Jiang, Telia Research | ||||
| Lenka Carr Motyckova, Pierre Fransson, Olov Schelen | ||||
| Lulea University of Technology | ||||
| February, 2001 | IRTF Routing Research Elwyn Davies, Avri Doria, Howard Berkowitz, | |||
| Internet Draft Dmitri Krioukov, Nortel Networks | ||||
| Malin Carlzon, SUNET | ||||
| Anders Bergsten, Olle Pers, Yong Jiang, | ||||
| Telia Research | ||||
| Lenka Carr Motyckova, Pierre Fransson, Olov Schelen | ||||
| Lulea University of Technology | ||||
| Tove Madsen, Utfors Bredband AB | ||||
| Future Domain Routing Requirements | Document: draft-davies-fdr-reqs-01.txt July, 2001 | |||
| <draft-davies-fdr-reqs-00.txt> | Future Domain Routing Requirements | |||
| <draft-davies-fdr-reqs-01.txt> | ||||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet Draft and is in full conformance with | This document is an Internet Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026. Internet Drafts are | all provisions of Section 10 of RFC2026. Internet Drafts are working | |||
| working documents of the Internet Engineering Task Force (IETF), | documents of the Internet Engineering Task Force (IETF), its Areas, | |||
| its Areas, and its Working Groups. Note that other groups may | and its Working Groups. Note that other groups may also distribute | |||
| also distribute working documents as Internet Drafts. | working documents as Internet Drafts. | |||
| Internet Drafts are draft documents valid for a maximum of six | Internet Drafts are draft documents valid for a maximum of six | |||
| months. Internet Drafts may be updated, replaced, or obsoleted by | months. Internet Drafts may be updated, replaced, or obsoleted by | |||
| other documents at any time. It is not appropriate to use | other documents at any time. It is not appropriate to use Internet | |||
| Internet Drafts as reference material or to cite them other than | Drafts as reference material or to cite them other than as a "working | |||
| as a "working draft" or "work in progress". | draft" or "work in progress". | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | ||||
| http://www.ietf.org/shadow.html. | ||||
| Discussion and suggestions for improvement are requested. This | The list of Internet-Draft Shadow Directories can be accessed at | |||
| document will expire before September, 2001. Distribution of this | http://www.ietf.org/shadow.html. | |||
| draft is unlimited. | ||||
| Copyright Notice | Discussion and suggestions for improvement are requested. This | |||
| Copyright (C) The Internet Society (2001). All Rights Reserved. | document will expire before September, 2001. Distribution of this | |||
| draft is unlimited. | ||||
| Copyright Notice | ||||
| Copyright (C) The Internet Society (2001). All Rights Reserved. | ||||
| Abstract | Abstract | |||
| This document sets out a set of requirements which we believe are | This document sets out a set of requirements which we believe are | |||
| desirable for the future routing architecture and routing | desirable for the future routing architecture and routing protocols | |||
| protocols of a successful Internet. This first version is, of | of a successful Internet. This first version is, of necessity, | |||
| necessity, incomplete. It is hoped that this document will be | incomplete. It is hoped that this document will be useful as a | |||
| useful as a catalyst to the work that needs to be done in both the | catalyst to the work that needs to be done in both the IRTF and the | |||
| IRTF and the IETF. | IETF. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| CONTENTS | ||||
| 1. Introduction...................................................... 4 | ||||
| 1.1 Background.................................................... 5 | ||||
| 1.2 Goals ........................................................ 6 | ||||
| 2. Historical Perspective .......................................... 10 | ||||
| 2.1 The legacy of RFC1126........................................ 10 | ||||
| 2.2 Nimrod Requirements.......................................... 19 | ||||
| 2.3 PNNI ........................................................ 21 | ||||
| 3. Existing problems of BGP and the current EGP/IGP Architecture.... 22 | ||||
| 3.1 BGP and Auto-aggregation .................................... 22 | ||||
| 3.2 Convergence and Recovery Issues ............................. 22 | ||||
| 3.3 Non-locality of Effects of Instability and Misconfiguration . 23 | ||||
| 3.4 Multihoming Issues........................................... 23 | ||||
| 3.5 AS-number exhaustion......................................... 24 | ||||
| 3.6 Partitioned AS's............................................. 24 | ||||
| 3.7 Load Sharing................................................. 25 | ||||
| 3.8 Hold down issues............................................. 25 | ||||
| 3.9 Interaction between Inter domain routing and intra domain | ||||
| routing .................................................... 26 | ||||
| 3.10 Policy Issues............................................... 26 | ||||
| 3.11 Security Issues............................................. 27 | ||||
| 3.12 Support of MPLS and VPNS ................................... 27 | ||||
| 3.13 IPv4 / IPv6 Ships in the Night ............................. 28 | ||||
| 3.14 Existing Tools to Support Effective Deployment of Inter- | ||||
| Domain Routing ............................................. 29 | ||||
| 4. Expected Users .................................................. 30 | ||||
| 4.1 Organisations................................................ 30 | ||||
| 4.2 Human Users.................................................. 32 | ||||
| 5. Mandated Constraints ............................................ 33 | ||||
| 5.1 The Federated Environment ................................... 33 | ||||
| 5.2 Working with different sorts of network ..................... 34 | ||||
| 5.3 Delivering Diversity......................................... 34 | ||||
| 5.4 When will the new solution be required? ..................... 34 | ||||
| 6. Assumptions...................................................... 36 | ||||
| 7. Functional Requirements ......................................... 38 | ||||
| 7.1 Topology .................................................... 38 | ||||
| 7.2 Distribution................................................. 39 | ||||
| 7.3 Addressing................................................... 41 | ||||
| 7.4 Management Requirements...................................... 42 | ||||
| 7.5 Mathematical Provability .................................... 42 | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| 7.6 Traffic Engineering.......................................... 43 | ||||
| 7.7 Multi-homing support......................................... 43 | ||||
| 7.8 Statistics support........................................... 44 | ||||
| 8. Performance Requirements ........................................ 45 | ||||
| 9. Backwards compatibility (cutover) and Maintainability ........... 46 | ||||
| 10. Security Requirements .......................................... 47 | Davies et al 1 | |||
| CONTENTS | ||||
| 11. Open Issues..................................................... 48 | 1. Introduction...............................................4 | |||
| 11.1 System Modeling............................................. 48 | 1.1 Background............................................5 | |||
| 11.2 Advantages and Disadvantages of having the same protocols | 1.2 Goals.................................................6 | |||
| for EGP and IGP ........................................... 48 | 2. Historical Perspective.....................................9 | |||
| 11.3 Introduction of new control mechanisms ..................... 52 | 2.1 The legacy of RFC1126.................................9 | |||
| 11.4 Robustness.................................................. 52 | 2.2 Nimrod Requirements..................................20 | |||
| 11.5 VPN Support................................................. 52 | 2.3 PNNI.................................................21 | |||
| 11.6 End to End Reliability...................................... 53 | 2.4 Recent Research Work.................................22 | |||
| 3. Existing problems of BGP and the current EGP/IGP Architecture | ||||
| .....................................................24 | ||||
| 3.1 BGP and Auto-aggregation.............................24 | ||||
| 3.2 Convergence and Recovery Issues......................24 | ||||
| 3.3 Non-locality of Effects of Instability and Misconfiguration | ||||
| ..................................................25 | ||||
| 3.4 Multihoming Issues...................................25 | ||||
| 3.5 AS-number exhaustion.................................26 | ||||
| 3.6 Partitioned ASÆs.....................................26 | ||||
| 3.7 Load Sharing.........................................27 | ||||
| 3.8 Hold down issues.....................................27 | ||||
| 3.9 Interaction between Inter domain routing and intra domain | ||||
| routing...........................................27 | ||||
| 3.10 Policy Issues.....................................28 | ||||
| 3.11 Security Issues...................................29 | ||||
| 3.12 Support of MPLS and VPNS..........................29 | ||||
| 3.13 IPv4 / IPv6 Ships in the Night....................29 | ||||
| 3.14 Existing Tools to Support Effective Deployment of Inter- | ||||
| Domain Routing....................................30 | ||||
| 4. Expected Users............................................32 | ||||
| 4.1 Organisations........................................32 | ||||
| 4.2 Human Users..........................................34 | ||||
| 5. Mandated Constraints......................................34 | ||||
| 5.1 The Federated Environment............................35 | ||||
| 5.2 Working with different sorts of network..............35 | ||||
| 5.3 Delivering Diversity.................................35 | ||||
| 5.4 When will the new solution be required?..............36 | ||||
| 6. Assumptions...............................................36 | ||||
| 7. Functional Requirements...................................38 | ||||
| 7.1 Topology.............................................38 | ||||
| 7.2 Distribution.........................................39 | ||||
| 7.3 Addressing...........................................40 | ||||
| 7.4 Management Requirements..............................42 | ||||
| 7.5 Mathematical Provability.............................42 | ||||
| 7.6 Traffic Engineering..................................42 | ||||
| 7.7 Support for NATs and other Mid-boxes.................43 | ||||
| 7.8 Statistics support...................................43 | ||||
| 8. Performance Requirements..................................44 | ||||
| 9. Backwards compatibility (cutover) and Maintainability.....44 | ||||
| 10. Security Requirements....................................44 | ||||
| 11. Open Issues..............................................46 | ||||
| 11.1 System Modeling...................................46 | ||||
| 11.2 Advantages and Disadvantages of having the same protocols | ||||
| for EGP and IGP...................................46 | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 2 | |||
| 11.3 Introduction of new control mechanisms............49 | ||||
| 11.4 Robustness........................................49 | ||||
| 11.5 VPN Support.......................................50 | ||||
| 11.6 End to End Reliability............................50 | ||||
| 12. Acknowledgements.........................................50 | ||||
| 13. References...............................................51 | ||||
| 14. Author's Addresses.......................................54 | ||||
| Davies, et al Expires: January 2002 3 | ||||
| 1. Introduction | 1. Introduction | |||
| It is generally accepted that there are major shortcomings in the | It is generally accepted that there are major shortcomings in the | |||
| inter-domain routing of the Internet today and that these may | inter-domain routing of the Internet today and that these may result | |||
| result in meltdown within an unspecified period of time. | in meltdown within an unspecified period of time. Remedying these | |||
| Remedying these shortcomings will require extensive research to | shortcomings will require extensive research to tie down the exact | |||
| tie down the exact failure modes that lead to these shortcomings | failure modes that lead to these shortcomings and identify the best | |||
| and identify the best techniques to remedy the situation. | techniques to remedy the situation. | |||
| Various developments in the nature and quality of the services | Various developments in the nature and quality of the services that | |||
| that users want from the Internet are difficult to provide within | users want from the Internet are difficult to provide within the | |||
| the current framework as they impose requirements which were never | current framework as they impose requirements never foreseen by the | |||
| foreseen by the original architects of the Internet routing | original architects of the Internet routing system. | |||
| system. | ||||
| Taken together with the radically altered and now commercially- | The potential advent of IPv6 and the application of IP mechanisms to | |||
| based organization of the Internet and the potential advent of | private commercial networks offering specific service guarantees as | |||
| IPv6, major changes to the inter-domain routing system are | an improvement over the best efforts services of the Public Internet | |||
| inevitable. | epitomize the kind of radical changes which have to be accommodated: | |||
| Major changes to the inter-domain routing system are inevitable if it | ||||
| is to provide an efficient underpinning for the radically changed and | ||||
| increasingly, commercially-based networks which rely on the IP | ||||
| protocol suite. | ||||
| Although inter-domain routing is seen as the major source of | Although inter-domain routing is seen as the major source of | |||
| problems, the interactions with intra-domain routing and the | problems, the interactions with intra-domain routing and the | |||
| constraints that confining changes to the inter-domain would | constraints that confining changes to the inter-domain arena would | |||
| impose, means that we should consider the whole area of routing as | impose, means that we should consider the whole area of routing as an | |||
| an integrated system. This is done for 2 reasons: | integrated system. This is done for 2 reasons: | |||
| - Requirements should not presuppose the solution. A continued | - Requirements should not presuppose the solution. A continued | |||
| commitment to the current definitions and split between inter- | commitment to the current definitions and split between inter- | |||
| domain and intra-domain routing would constitute such a | domain and intra-domain routing would constitute such a | |||
| presupposition. Therefore the name Future Domain Routing | presupposition. Therefore the name Future Domain Routing(FDR) is | |||
| (FDR)is being used in this document, | being used in this document, | |||
| - As an acknowledgement of how intertwined inter-domain and | - As an acknowledgement of how intertwined inter-domain and intra- | |||
| intra-domain routing are within today's routing architecture. | domain routing are within todayÆs routing architecture. | |||
| Although the meaning of Domain Routing will be developed | We are aware that using the term Domain Routing is already fraught | |||
| implicitly throughout the document, a bit of explicit definition | with danger because of possible misinterpretation due to prior usage: | |||
| of the word `domain' is required. This document uses domain in a | The meaning of Domain Routing will be developed implicitly throughout | |||
| very broad sense to mean any collection of systems or domains | the document, but a little advance explicit definition of the word | |||
| which come under a common authority that determines the attributes | ædomainÆ is required, as well as some expansion on the scope of | |||
| that define, and the policies that control that collection. The | æroutingÆ. | |||
| use of domain in this context is very similar to the concept of | ||||
| Region that was put forth by John Wroclawski in his Metanet model | ||||
| [10]. The idea includes the notion that within a domain certain | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | This document uses domain in a very broad sense to mean any | |||
| collection of systems or domains which come under a common authority | ||||
| that determines the attributes defining, and the policies controlling | ||||
| that collection. The use of domain in this context is very similar to | ||||
| the concept of Region that was put forth by John Wroclawski in his | ||||
| Metanet model [10]. The idea includes the notion that within a domain | ||||
| certain system attributes will characterize the behavior of the | ||||
| systems in the domain and that there will be borders between domains. | ||||
| The idea of domain presented does not inherently presuppose that the | ||||
| system attributes will characterize the behavior of the systems in | Davies, et al Expires: January 2002 4 | |||
| the domain and that there will be borders between domains. The | ||||
| idea of domain presented does not inherently presuppose that the | ||||
| identifying behaviors between two domains are to be the same. Nor | identifying behaviors between two domains are to be the same. Nor | |||
| does it presuppose anything about the hierarchical nature of | does it presuppose anything about the hierarchical nature of domains. | |||
| domains. Finally it does not place restrictions on the nature of | Finally it does not place restrictions on the nature of the | |||
| the attributes that might be used to determine membership in a | attributes that might be used to determine membership in a domain. | |||
| domain. Since today's routing domains are a subset of all domains | Since todayÆs routing domains are a subset of all domains as | |||
| as conceived of in this document, there has been no attempt to | conceived of in this document, there has been no attempt to create a | |||
| create a new term. | new term. | |||
| This draft makes a start on this process in Section 2 by | Current practice stresses the need to separate the concerns of the | |||
| revisiting the requirements for a future routing system which were | control plane in a router and the forwarding plane: This document | |||
| last documented in RFC1126 - "Goals and Functional Requirements | will follow this practice, but we still use the term æroutingÆ as a | |||
| for Inter-Autonomous System Routing" [4] as a precursor to the | global portmanteau to cover all aspects of the system. | |||
| design of BGP in 1989. The historical perspective is also fleshed | ||||
| out by looking at some other work that has been carried out since | This draft makes a start on the process of improving domain routing | |||
| RFC1126 was published. Some of the requirements derive from the | in Section 2 by revisiting the requirements for a future routing | |||
| problems that are currently being experienced in the Internet | system which were last documented in RFC1126 - ôGoals and Functional | |||
| today. These will be discussed in Section 3. The environment in | Requirements for Inter-Autonomous System Routingö [4] as a precursor | |||
| which the future domain routing system will have to work is | to the design of BGP in 1989. This section also looks at some other | |||
| covered in Sections 4 - 6. Specific requirements for a future | work that has been carried out since RFC1126 was published in order | |||
| Domain routing system are discussed in Sections 7 - 10. | to flesh out the historical perspective. Some of the requirements | |||
| derive from the problems that are currently being experienced in the | ||||
| Internet today. These will be discussed in Section 3. The | ||||
| environment in which the future domain routing system will have to | ||||
| work is covered in Sections 4 - 6. Specific requirements for a | ||||
| future Domain routing system are discussed in Sections 7 - 10. | ||||
| Inevitably this document is incomplete: Some known Open Issues are | Inevitably this document is incomplete: Some known Open Issues are | |||
| discussed in Section 11. | discussed in Section 11. | |||
| 1.1 Background | 1.1 Background | |||
| Today's Internet uses an addressing and routing structure which | ||||
| has developed in ad hoc, more or less upwards compatible fashion | ||||
| from the essentially single domain, non-commercial Internet to a | ||||
| solution which is handling, albeit not totally satisfactorily, | ||||
| today's multi-domain, federated, combined commercial and not-for- | ||||
| profit Internet. The result is not ideal, particularly as regards | ||||
| inter-domain routing mechanisms which have to implement a host of | ||||
| domain specific routing policies for competing, communicating | ||||
| domains. | ||||
| Based a large body of anecdotal evidence, but also on experimental | ||||
| evidence [11] and analytic work on the stability of BGP under | ||||
| certain policy specifications [12], the main Internet inter-domain | ||||
| routing protocol, BGP4, appears to have a number of problems which | ||||
| need to be resolved. Some of these problems may be relieved by | ||||
| patches and fix-ups and some of these problems may require a new | ||||
| architecture and new protocols. The starting point of this work is | ||||
| to step back from the current state, examine how the Internet | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | TodayÆs Internet uses an addressing and routing structure that has | |||
| developed in an ad hoc, more or less upwards-compatible fashion. It | ||||
| has progressed from handling a single domain, non-commercial Internet | ||||
| to a solution that is just about controlling todayÆs multi-domain, | ||||
| federated, combination commercial and not-for-profit Internet. The | ||||
| result is not ideal, particularly as regards inter-domain routing | ||||
| mechanisms that have to implement a host of domain specific routing | ||||
| policies for competing, communicating domains, but it does a pretty | ||||
| fair job at its primary goal of providing any-to-any connectivity to | ||||
| many millions of computers. | ||||
| might develop in the future and derive a new set of requirements | Based on a large body of anecdotal evidence, but also on experimental | |||
| for a routing architecture from this work. | evidence [11] and analytic work on the stability of BGP under certain | |||
| policy specifications [12], the main Internet inter-domain routing | ||||
| protocol, BGP4, appears to have a number of problems that need to be | ||||
| resolved. Additionally, the hierarchical nature of the inter-domain | ||||
| routing problem appears to be changing as the connectivity between | ||||
| domains becomes increasingly meshed [13] which alters some of the | ||||
| scaling and structuring assumptions on which BGP4 is built. Patches | ||||
| and fix-ups may relieve some of these problems but others may require | ||||
| a new architecture and new protocols. The starting point of this work | ||||
| is to step back from the current state, examine how the Internet | ||||
| might develop in the future and derive a new set of requirements for | ||||
| a routing architecture from this work. | ||||
| The development of the Internet is likely to be driven by a number | Davies, et al Expires: January 2002 5 | |||
| of changes that will affect the organization and the usage of the | The development of the Internet is likely to be driven by a number of | |||
| changes that will affect the organization and the usage of the | ||||
| network, including: | network, including: | |||
| - Ongoing evolution of the commercial relationships between | ||||
| - Ongoing evolution of the commercial relationships between | (connectivity) service providers, leading to changes in the way in | |||
| (connectivity) service providers, leading to changes in the way | which peering between providers is organised and the way in which | |||
| in which peering between providers is organised and the way in | transit traffic is routed | |||
| which transit traffic is routed | - Requirements for traffic engineering within and between domains | |||
| - Requirements for traffic engineering within and between domains | ||||
| including coping with multiple paths between domains | including coping with multiple paths between domains | |||
| - Potential addition of a second IP addressing technique through | ||||
| - Potential addition of a second IP addressing technique through | ||||
| IPv6. | IPv6. | |||
| - Evolution of the end to end principle to deal with the expanded | ||||
| role of the Internet as discussed in [32]. This paper discusses | ||||
| the possibility that the range of new requirements, especially the | ||||
| social and techno-political ones, that are being placed on the | ||||
| future Internet may compromise the InternetÆs original design | ||||
| principles. This might cause the Internet to lose some of its key | ||||
| features, in particular its ability to support new and | ||||
| unanticipated applications. The discussion is linked to the rise | ||||
| of new stakeholders in the Internet, especially ISPs; new | ||||
| government interests; the changing motivations of the ever growing | ||||
| user base; and the tension between the demand for trustworthy | ||||
| overall operation and the inability to trust the behaviour of | ||||
| individual users. | ||||
| - Incorporation of alternative forwarding techniques such as the | ||||
| pipes supplied by the Generalised MPLS environment[25]. | ||||
| - Integrating additional constraints into route determination from | ||||
| interactions with other layers (e.g. Shared Risk Link Groups [31]) | ||||
| - Support for alternative and multiple routing techniques that are | ||||
| better suited to delivering types of content organised other than | ||||
| into IP addressed packets. | ||||
| - Incorporation of alternative forwarding techniques such as the | Philosophically, the Internet has the mission of transferring | |||
| pipes supplied by combined MPLS and Optical Lambda environments | information from one place to another. Conceptually, this | |||
| information is rarely organised into conveniently sized, IP-addressed | ||||
| - Support for alternative and multiple routing techniques which | packets and the FDR needs to consider how the information (content) | |||
| are better suited to delivering some types of content. | to be carried is identified, named and addressed. Routing techniques | |||
| can then be adapted to handle the expected types of content. | ||||
| 1.2 Goals | 1.2 Goals | |||
| This section attempts to answer two questions: | This section attempts to answer two questions: | |||
| - What are we trying to achieve in a new architecture? | ||||
| What are we trying to achieve in a new architecture? | - Why should the Internet community care? | |||
| Why should the Internet community care? | ||||
| There is a third question which needs to be answered as well, but | There is a third question which needs to be answered as well, but | |||
| which, for the present, is mostly not explicitly discussed: | which, for the present, is mostly not explicitly discussed: | |||
| - How will we know when we have succeeded? | ||||
| How will we know when we have succeeded? | 1.2.1 Providing a Routing System matched to Domain Organisation | |||
| 1.2.1 Providing a Routing System matched to Domain Organisation | ||||
| Many of today's routing problems are caused by a routing system | Many of todayÆs routing problems are caused by a routing system which | |||
| which is not well-matched to the organization and policies which | is not well-matched to the organization and policies which it is | |||
| it is trying to support. It is our goal to develop a routing | ||||
| architecture where even domain organization which is not | ||||
| envisioned today can be served by a routing architecture that | ||||
| matches its requirements. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 6 | |||
| trying to support. It is our goal to develop a routing architecture | ||||
| where even domain organization which is not envisioned today can be | ||||
| served by a routing architecture that matches its requirements. | ||||
| We will know when this goal is achieved when the desired policies, | We will know when this goal is achieved when the desired policies, | |||
| rules and organization can be mapped into the routing system in a | rules and organization can be mapped into the routing system in a | |||
| natural, consistent and simply understood way. | natural, consistent and simply understood way. | |||
| 1.2.2 Supporting a range of different communication services | 1.2.2 Supporting a range of different communication services | |||
| Currently only best-effort datagram connectivity is supported in | TodayÆs routing protocols only support a single data forwarding | |||
| BGP. With, for example, DiffServ it is possible to construct | service which is typically used to deliver a best efforts service in | |||
| different services within the network. A number of PDBs has been | the Public Internet. On the other hand, with, for example, DiffServ | |||
| proposed to the IETF. Also a number of services has been talked | it is possible to construct a number of different bit transport | |||
| about outside the IETF. These services might for example be | services within the network. Using some of the PDBs which have been | |||
| Virtual Wire [18] and Assured rate [19]. | discussed in the IETF, it should be possible to construct services | |||
| such as Virtual Wire [18] and Assured Rate [19]. | ||||
| Providers today promise how traffic will be handled in the | Providers today offer rudimentary promises about how traffic will be | |||
| network, for example delay and packet loss guarantees, and this | handled in the network, for example delay and long term packet loss | |||
| will probably be even more relevant in the future. Communicating | guarantees, and this will probably be even more relevant in the | |||
| this information (i.e., the service characteristics) in routing | future. Communicating the service characteristics of paths in routing | |||
| protocols is necessary in near future. | protocols will be necessary in the near future, and it will be | |||
| necessary to be able to route packets according to their service | ||||
| requirements. | ||||
| Thus, a goal with this architecture is to allow for more | Thus, a goal of this architecture is to allow for adequate | |||
| information passed between operators and support other services | information about path service characteristics passed between domains | |||
| than the best-effort datagram connectivity service. | and consequently allow the delivery of bit transport services other | |||
| than the best-effort datagram connectivity service which is the | ||||
| current common denominator. | ||||
| 1.2.3 Scaleable well beyond current predictable needs | 1.2.3 Scaleable well beyond current predictable needs | |||
| Any proposed new FDR system should scale beyond the size and | Any proposed new FDR system should scale beyond the size and | |||
| performance we can foresee for the next ten years. The previous | performance we can foresee for the next ten years. The previous IDR | |||
| IDR proposal has, with some massaging, held up for somewhat over | proposal has, with some massaging, held up for somewhat over ten | |||
| ten years in which time the Internet has grown far beyond the | years in which time the Internet has grown far beyond the predictions | |||
| predictions that were made in the requirements that were placed on | that were made in the requirements that were placed on it originally. | |||
| it originally. | ||||
| 1.2.4 Supporting alternative forwarding mechanisms | ||||
| With the advent of circuit based technologies (e.g., MPLS [24], | Unfortunately, we will only know if we have succeeded in this goal if | |||
| G-MPLS [25]) managed by IP routers there are forwarding mechanisms | the improved system survives beyond its design lifetime without | |||
| other than the datagram service that need to be supported by the | serious massaging: Failure will be much easier to spot! | |||
| routing architecture. | ||||
| An explicit goal of this architecture is to support more | 1.2.4 Supporting alternative forwarding mechanisms | |||
| forwarding mechanisms than just the datagram forwarding. | ||||
| 1.2.5 Supporting separation of topology map and connectivity service | With the advent of circuit based technologies (e.g., MPLS [24] used | |||
| for RSVP-TE or CR-LDP for traffic engineering, G-MPLS [25]) managed | ||||
| by IP routers there are forwarding mechanisms other than the datagram | ||||
| service that need to be supported by the routing architecture. | ||||
| It is envisioned that an organization can support multiple | An explicit goal of this architecture is to support more forwarding | |||
| services on top of a single network. These services can, for | mechanisms than just hop-by-hop datagram forwarding driven by | |||
| globally unique IP addresses. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 7 | |||
| 1.2.5 Supporting separation of topology map and connectivity service | ||||
| example, be of different quality, of different type of | It is envisioned that an organization can support multiple services | |||
| connectivity, or different protocols (e.g. IPv4 and IPv6). For all | on top of a single network. These services can, for example, be of | |||
| these services there may be common domain topology, even though | different quality, of different type of connectivity, or different | |||
| the policies might differ. | protocols (e.g. IPv4 and IPv6). For all these services there may be | |||
| common domain topology, even though the policies controlling the | ||||
| routing of information might differ from service to service. | ||||
| Thus, a goal with this architecture is to support separation | Thus, a goal with this architecture is to support separation between | |||
| between creation of an domain (or organization) topology map and | creation of a domain (or organization) topology map and service | |||
| service creation. | creation. | |||
| 1.2.6 Achieving full/appropriate separation of concerns between | 1.2.6 Achieving full/appropriate separation of concerns between | |||
| routing and forwarding | routing and forwarding | |||
| The architecture of a router is composed of two main separable | The architecture of a router is composed of two main separable parts; | |||
| parts; control and forwarding. These components, while inter- | control and forwarding. These components, while inter-dependent, | |||
| dependent, perform functions that are largely independent of each | perform functions that are largely independent of each other. | |||
| other. Control (routing, signaling, and management) is typically | Control (routing, signaling, and management) is typically done in | |||
| done in software while forwarding typically is done with | software while forwarding typically is done with specialized ASICs or | |||
| specialized ASICs or network processors. | network processors. | |||
| The nature of an IP based network today is that control and data | The nature of an IP based network today is that control and data | |||
| protocols share the same network and forwarding regime. This may | protocols share the same network and forwarding regime. This may not | |||
| not always be the case in future networks and we should be careful | always be the case in future networks and we should be careful to | |||
| to avoid building this sharing in as an assumption in the FDR. | avoid building this sharing in as an assumption in the FDR. | |||
| A goal of this architecture is to support full separation of | A goal of this architecture is to support full separation of control | |||
| control and forwarding. | and forwarding, and to consider what additional concerns might be | |||
| properly considered separately (e.g. adjacency management). | ||||
| 1.2.7 Providing means of using different routing paradigms | 1.2.7 Providing means of using different routing paradigms seamlessly | |||
| seamlessly in different areas of the same network | in different areas of the same network | |||
| A number of different routing paradigms have been used or | A number of different routing paradigms have been used or researched | |||
| researched in addition to conventional shortest path hop-by-hop | in addition to conventional shortest path hop-by-hop paradigm that is | |||
| paradigm that is the current mainstay of the Internet. In | the current mainstay of the Internet. In particular, differences in | |||
| particular, differences in underlying transport networks may mean | underlying transport networks may mean that other kinds of routing | |||
| that other kinds of routing are more relevant, and the perceived | are more relevant, and the perceived need for traffic engineering | |||
| need for traffic engineering will certainly alter the routing | will certainly alter the routing chosen in various domains. | |||
| chosen in various domains. | ||||
| 1.2.8 Preventing denial of service and other security attacks | Implicitly, one of these routing paradigms should be the current | |||
| routing paradigm, so that the new paradigms will inter-operate in a | ||||
| backwards compatible way with todayÆs system. This will facilitate a | ||||
| migration strategy which avoids flag days. | ||||
| 1.2.8 Preventing denial of service and other security attacks | ||||
| Part of the problem here is that the Internet offers a global, | Part of the problem here is that the Internet offers a global, | |||
| unmoderated connectivity service. Existence of a route to a | unmoderated connectivity service. Existence of a route to a | |||
| Davies, et al Expires: January 2002 8 | ||||
| destination effectively implies that anybody who can get a packet | destination effectively implies that anybody who can get a packet | |||
| onto the network is entitled to use that route. Whilst there are | onto the network is entitled to use that route. Whilst there are | |||
| limitations to this generalization, there is a clear invitation to | limitations to this generalization, there is a clear invitation to | |||
| denial of service attacks. A goal of the FDR system should be to | denial of service attacks. A goal of the FDR system should be to | |||
| allow traffic to be specifically linked to whole or partial routes so | ||||
| that a destination or link resources can be protected from | ||||
| unauthorized use. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | 1.2.9 Providing provable convergence with verifiable policy | |||
| allow traffic to be specifically linked to whole or partial routes | ||||
| so that a destination or link resources can be protected form | ||||
| malicious use. | ||||
| 1.2.9 Providing provable convergence with verifiable policy | ||||
| interaction | interaction | |||
| It has been shown both analytically by Griffin et al (see [12]) | It has been shown both analytically by Griffin et al (see [12]) and | |||
| and practically (see [20]) that BGP will not converge stably or is | practically (see [20]) that BGP will not converge stably or is only | |||
| only meta-stable (i.e. will not reconverge in the face of a single | meta-stable (i.e. will not reconverge in the face of a single | |||
| failure) when certain types of policy constraint are applied to | failure) when certain types of policy constraint are applied to | |||
| categories of network topology. The addition of policy to the | categories of network topology. The addition of policy to the basic | |||
| basic distance vector algorithm invalidates the mathematical | distance vector algorithm invalidates the mathematical proofs that | |||
| proofs that applied to RIP and could be applied to a policy free | applied to RIP and could be applied to a policy free BGP | |||
| BGP implementation. | implementation. | |||
| A goal of the FDR should be to achieve mathematically provable | A goal of the FDR should be to achieve mathematically provable | |||
| convergence of the protocols used which may involve constraining | convergence of the protocols used which may involve constraining the | |||
| the topologies used and vetting the polices imposed to ensure that | topologies used, vetting the polices imposed to ensure that they are | |||
| they are compatible across domain boundaries. | compatible across domain boundaries and result in a globally | |||
| consistent policy set. | ||||
| 1.2.10 Providing robustness despite errors and failures | 1.2.10 Providing robustness despite errors and failures | |||
| From time to time in the history of the Internet there have been | From time to time in the history of the Internet there have been | |||
| occurrences where global connectivity has been destroyed by people | occurrences where people misconfiguring routers have destroyed global | |||
| misconfiguring routers. This should never be possible. | connectivity. This should never be possible. | |||
| A goal of the FDR is to be robust to configuration errors and | A goal of the FDR is to be robust to configuration errors and | |||
| failures. This should probably involve ensuring that the effects | failures. This should probably involve ensuring that the effects of | |||
| of misconfiguration and failure can be confined to some suitable | misconfiguration and failure can be confined to some suitable | |||
| locality of the failure or misconfiguration: This is not | locality of the failure or misconfiguration: This is not currently | |||
| currently the case as both misconfigurations and problems in any | the case as both misconfigurations and problems in any AS can, under | |||
| AS can, under the right circumstances, have global effects across | the right circumstances, have global effects across the entire | |||
| the entire Internet. | Internet. | |||
| 1.2.11 Simplicity in management | 1.2.11 Simplicity in management | |||
| With the policy work ([26], [27] and [28]) that has been done at | With the policy work ([26], [27] and [28]) that has been done at IETF | |||
| IETF there exists an architecture that standardizes and simplifies | there exists an architecture that standardizes and simplifies | |||
| management of QoS. This kind of simplicity is needed in a future | management of QoS. This kind of simplicity is needed in a future | |||
| domain routing architecture and its protocols. | domain routing architecture and its protocols. | |||
| A goal of this architecture is to make configuration and | A goal of this architecture is to make configuration and management | |||
| management of inter-domain routing as simple as possible. | of inter-domain routing as simple as possible. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| 2. Historical Perspective | 2. Historical Perspective | |||
| 2.1 The legacy of RFC1126 | 2.1 The legacy of RFC1126 | |||
| RFC1126 outlined a set of requirements that were to guide the | Davies, et al Expires: January 2002 9 | |||
| development of BGP. While the network is definitely different then | RFC1126 outlined a set of requirements that were to guide the | |||
| it was in 1989, many of the same requirements remain. As a first | development of BGP. While the network is definitely different then it | |||
| step in setting requirements for the future, we need to understand | was in 1989, many of the same requirements remain. As a first step | |||
| the requirements that were originally set for the current | in setting requirements for the future, we need to understand the | |||
| protocols. And in charting a future architecture we must first be | requirements that were originally set for the current protocols. And | |||
| sure to do no harm. Which means a future domain routing has to | in charting a future architecture we must first be sure to do no | |||
| support as its base requirement, the level of function that is | harm. Which means a future domain routing has to support as its base | |||
| available today. | requirement, the level of function that is available today. | |||
| The following sections each relate to a requirement, or non | The following sections each relate to a requirement, or non | |||
| requirement listed in RFC1126. In fact the section names are | requirement listed in RFC1126. In fact the section names are direct | |||
| direct quotes from the document. The discussion of these | quotes from the document. The discussion of these requirements | |||
| requirements covers the following areas | covers the following areas: | |||
| Relevance: Is the requirement of RFC1126 still relevant, and to | Optionally, interpretation for todayÆs audience of the intent of the | |||
| what degree? Should it be understood differently in today's | requirement | |||
| environment? | ||||
| Current practice: How well is the requirement met by current | Relevance: Is the requirement of RFC1126 still relevant, and | |||
| protocols and practice. | to what degree? Should it be understood | |||
| 2.1.1 "General Requirements" | differently in todayÆs environment? | |||
| 2.1.1.1 "Route to Destination" | Current practice: How well is the requirement met by current | |||
| protocols and practice? | ||||
| Timely routing to all reachable destinations, including | 2.1.1 ææGeneral RequirementsÆÆ | |||
| multihoming and multicast. | ||||
| 2.1.1.1 ææRoute to DestinationÆÆ | ||||
| Timely routing to all reachable destinations, including multihoming | ||||
| and multicast. | ||||
| Relevance: Valid, but requirements for multihoming need further | Relevance: Valid, but requirements for multihoming need further | |||
| discussion and elucidation. The requirement should include | discussion and elucidation. The requirement should include | |||
| multiple source multicast routing. | multiple source multicast routing. | |||
| Current practice: Multihoming is not efficient and the proposed | Current practice: Multihoming is not efficient and the proposed | |||
| inter-domain multicast protocol BGMP is an add-on to BGP | inter-domain multicast protocol BGMP is an add-on to BGP | |||
| following many of the same strategies but not integrated into | following many of the same strategies but not integrated | |||
| the BGP framework [23]. | into the BGP framework [23]. | |||
| 2.1.1.2 "Routing is Assured" | ||||
| This requires that a user be notified within a reasonable time | 2.1.1.2 ææRouting is AssuredÆÆ | |||
| period of attempts, about inability to provide a service. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | This requires that a user be notified within a reasonable time period | |||
| of attempts, about inability to provide a service. | ||||
| Relevance: Valid | Relevance: Valid | |||
| Current practice: There are ICMP messages for this, but in many | Current practice: There are ICMP messages for this, but in many cases | |||
| cases they are not used, either because of fears about creating | they are not used, either because of fears about creating | |||
| message storms or uncertainty about whether the end system can | message storms or uncertainty about whether the end system | |||
| do anything useful with the resulting information. | can do anything useful with the resulting information. | |||
| 2.1.1.3 "Large System | ||||
| Davies, et al Expires: January 2002 10 | ||||
| 2.1.1.3 ææLarge SystemÆÆ | ||||
| The architecture was designed to accommodate the growth of the | The architecture was designed to accommodate the growth of the | |||
| Internet. | Internet. | |||
| Relevance: Valid. Properties of Internet topology might be an | Relevance: Valid. Properties of Internet topology might be an issue | |||
| issue for future scalability (topology varies from a very | for future scalability (topology varies from very sparse | |||
| sparse to a quite dense now). Instead of setting growth in a | to quite dense at present). Instead of setting growth in a | |||
| time-scale, indefinite growth should be accommodated. | time-scale, indefinite growth should be accommodated. On | |||
| the other hand, such growth has to be accommodated without | ||||
| making the protocols too expensive - trade-offs may be | ||||
| necessary. | ||||
| Current practice: Scalability of the protocols will not be | Current practice: Scalability of the protocols will not be sufficient | |||
| sufficient under the current rate of growth . There are | under the current rate of growth. There are problems with | |||
| problems with BGP convergence for large dense topologies, | BGP convergence for large dense topologies, problems with | |||
| problems with routing information propagation between routers | routing information propagation between routers in transit | |||
| in transit domain, limited support for hierarchy, etc. | domain, limited support for hierarchy, etc. | |||
| 2.1.1.4 "Autonomous Operation" | ||||
| 2.1.1.4 ææAutonomous OperationÆÆ | ||||
| Relevance: Valid. There may need to be additional requirements for | Relevance: Valid. There may need to be additional requirements for | |||
| adjusting policy decisions to the global functionality and to | adjusting policy decisions to the global functionality and | |||
| avoid contradictory policies would decrease a possibility of | to avoid contradictory policies would decrease a | |||
| unstable routing behavior. | possibility of unstable routing behavior. | |||
| There should also be a separate requirement for handling | ||||
| various degrees of trust in autonomous operation, ranging from | There should also be a separate requirement for handling | |||
| no trust (e.g., between separate ISPs) to very high trust where | various degrees of trust in autonomous operation, ranging | |||
| the domains have a common goal of optimizing their mutual | from no trust (e.g., between separate ISPs) to very high | |||
| policies. | trust where the domains have a common goal of optimizing | |||
| Policies for intra domain operations should in some cases be | their mutual policies. | |||
| revealed, using suitable abstractions, to a global routing | ||||
| mechanism? | Policies for intra domain operations should in some cases | |||
| be revealed, using suitable abstractions, to a global | ||||
| routing mechanism? | ||||
| Current practice: Policy management is in the control of network | Current practice: Policy management is in the control of network | |||
| managers, as required, but there is little support for handling | managers, as required, but there is little support for | |||
| policies at an abstract level for a domain. Cooperating | handling policies at an abstract level for a domain. | |||
| administrative entities decide about the extent of cooperation | Cooperating administrative entities decide about the | |||
| independently. | extent of cooperation independently. Lack of coordination | |||
| 2.1.1.5 "Distributed System" | combined with global range of effects results in | |||
| occasional melt-down of Internet routing. | ||||
| 2.1.1.5 ææDistributed SystemÆÆ | ||||
| The routing environment is a distributed system. The distributed | The routing environment is a distributed system. The distributed | |||
| routing environment supports redundancy and diversity of nodes and | routing environment supports redundancy and diversity of nodes and | |||
| links. Both data and operations are distributed. | links. Both data and operations are distributed. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Relevance: Valid. RFC1126 is very clear that we should not be using | |||
| centralized solutions, but maybe we need a requirement on | ||||
| trade-offs between common knowledge and distribution | ||||
| (e.g., to allow for uniform policy routing) (e.g., GSM | ||||
| Relevance: Valid. RFC1126 is very clear that we should not be | Davies, et al Expires: January 2002 11 | |||
| using centralized solutions, but maybe we need a requirement on | systems are in a sense centralized (but with hierarchies) | |||
| trade-offs between common knowledge and distribution (e.g., to | and they work) This requirement should not rule out | |||
| allow for uniform policy routing) (e.g., GSM systems are in a | certain solutions that are needed to meet other | |||
| sense centralized (but with hierarchies) and they work) This | requirements in this document. | |||
| requirement should not rule out certain solutions that are | ||||
| needed to meet other requirements in this document. | ||||
| Current practice: Routing is very distributed, but lacking | Current practice: Routing is very distributed, but lacking abilities | |||
| abilities to consider optimization over several hops or | to consider optimization over several hops or domains. | |||
| domains. | ||||
| 2.1.1.6 "Provide A Credible Environment" | ||||
| Routing mechanism information must be integral and secure | 2.1.1.6 ææProvide A Credible EnvironmentÆÆ | |||
| (credible data, reliable operation). Security from unwanted | ||||
| modification and influence is required. | Routing mechanism information must be integral and secure (credible | |||
| data, reliable operation). Security from unwanted | ||||
| modification and influence is required. | ||||
| Relevance: Valid. | Relevance: Valid. | |||
| Current practice: BGP provides a mechanism for authentication and | Current practice: BGP provides a mechanism for authentication and | |||
| security. There are however security problems with current | security. There are however security problems with | |||
| practice. | current practice. | |||
| 2.1.1.7 "Be A Managed Entity" | ||||
| Requires that a manager should get enough information on a state | 2.1.1.7 ææBe A Managed EntityÆÆ | |||
| of network so that (s)he could make informed decisions. | ||||
| Requires that a manager should get enough information on a state of | ||||
| network so that (s)he could make informed decisions. | ||||
| Relevance: The requirement is reasonable, but we might need to be | Relevance: The requirement is reasonable, but we might need to be | |||
| more specific on what information should be available, e.g. to | more specific on what information should be available, | |||
| prevent routing oscillations. | e.g. to prevent routing oscillations. | |||
| Current practice: All policies are determined locally, where they | Current practice: All policies are determined locally, where they may | |||
| may appear reasonable but there is no global coordination, and | appear reasonable but there is limited global coordination | |||
| therefore a manager cannot make a globally consistent decision. | through the routing policy databases operated by the | |||
| 2.1.1.8 "Minimize Required Resources" | Internet registries (ARIN, RIPE, APNIC etc). Operators | |||
| are not required to register their policies; even when | ||||
| policies are registered, it is difficult to check that the | ||||
| actual policies in use match the declared policies and | ||||
| therefore a manager cannot guarantee to make a globally | ||||
| consistent decision. | ||||
| Relevance: Valid, however, the paragraph states that assumptions | 2.1.1.8 ææMinimize Required ResourcesÆÆ | |||
| on significant upgrades shouldn't be made. Although this is | ||||
| reasonable, a new architecture should perhaps be prepared to | ||||
| use upgrades when they occur. | ||||
| Current practice: Most bandwidth is consumed by the exchange of | Relevance: Valid, however, the paragraph states that assumptions on | |||
| the NLRI. Usage of CPU depends on the stability of the | significant upgrades shouldnÆt be made. Although this is | |||
| Internet. Both phenomena have a local nature, so there are not | reasonable, a new architecture should perhaps be prepared | |||
| scaling problems with bandwidth and CPU usage. Instability of | to use upgrades when they occur. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Current practice: Most bandwidth is consumed by the exchange of the | |||
| NLRI. Usage of CPU depends on the stability of the | ||||
| Internet. Both phenomena have a local nature, so there are | ||||
| not scaling problems with bandwidth and CPU usage. | ||||
| Instability of routing increases the consumption of | ||||
| resources in any case. The number of networks in the | ||||
| Internet dominates memory requirements - this is a scaling | ||||
| problem. | ||||
| routing increases the consumption of resources in any case. | Davies, et al Expires: January 2002 12 | |||
| Memory requirements are dominated by the number of networks in | 2.1.2 ææFunctional RequirementsÆÆ | |||
| the Internet ¡ this is a scaling problem. | ||||
| 2.1.2 "Functional Requirements" | ||||
| 2.1.2.1 "Route Synthesis Requirements" | 2.1.2.1 ææRoute Synthesis RequirementsÆÆ | |||
| 2.1.2.1.1 "Route around failures dynamically" | 2.1.2.1.1 ææRoute around failures dynamicallyÆÆ | |||
| Relevance: Valid. Should perhaps be stronger. Only providing a | Relevance: Valid. Should perhaps be stronger. Only providing a best- | |||
| best-effort attempt may not be enough if real-time services are | effort attempt may not be enough if real-time services are | |||
| to be provided for. Detections may need to be faster than 100ms | to be provided for. Detections may need to be faster than | |||
| to avoid being noticed by end-users. | 100ms to avoid being noticed by end-users. | |||
| Current practice: latency of fail-over is too high (minutes). | Current practice: latency of fail-over is too high (minutes). | |||
| 2.1.2.1.2 "Provide loop free paths" | 2.1.2.1.2 ææProvide loop free pathsÆÆ | |||
| Relevance: Valid. Loops should occur only with negligible | Relevance: Valid. Loops should occur only with negligible probability | |||
| probability and duration. | and duration. | |||
| Current practice: both link-state intra domain routing and BGP | Current practice: both link-state intra domain routing and BGP inter- | |||
| inter-domain routing (if correctly configured) are forwarding- | domain routing (if correctly configured) are forwarding- | |||
| loop free after having converged. However, convergence time for | loop free after having converged. However, convergence | |||
| BGP can be very long and routing-loops may occur due to bad | time for BGP can be very long and poorly designed routing | |||
| routing policies. | policies may result in a number of BGP speakers engaging | |||
| 2.1.2.1.3 "Know when a path or destination is unavailable" | in a cyclic pattern of advertisements and withdrawals | |||
| which never converges to a stable result [20]. | ||||
| 2.1.2.1.3 ææKnow when a path or destination is unavailableÆÆ | ||||
| Relevance: Valid to some extent, but there is a trade-off between | Relevance: Valid to some extent, but there is a trade-off between | |||
| aggregation and immediate knowledge of reachability. It | aggregation and immediate knowledge of reachability. It | |||
| requires that routing tables contain enough information to | requires that routing tables contain enough information to | |||
| determine that the destination is unknown or a path cannot be | determine that the destination is unknown or a path cannot | |||
| constructed to reach it. | be constructed to reach it. | |||
| Current practice: Knowledge about lost reachability propagates | Current practice: Knowledge about lost reachability propagates slowly | |||
| slowly through the networks due to slow convergence for route | through the networks due to slow convergence for route | |||
| withdrawals. | withdrawals. | |||
| 2.1.2.1.4 "Provide paths sensitive to administrative policies" | ||||
| 2.1.2.1.4 ææProvide paths sensitive to administrative policiesÆÆ | ||||
| Relevance: Valid. Policy control of routing is of increasingly | Relevance: Valid. Policy control of routing is of increasingly | |||
| importance as the Internet has turned into business. | importance as the Internet has turned into business. | |||
| Current practice: Supported to some extent. Policies are only | Current practice: Supported to some extent. Policies are only | |||
| possible to apply locally in an AS and not globally. At least | possible to apply locally in an AS and not globally. At | |||
| there is very small possibilities to affect policies in other | least there is very small possibilities to affect policies | |||
| AS's. Furthermore, only static policies are supported; between | in other ASÆs. Furthermore, only static policies are | |||
| supported; between static policies and `policies dependent | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | upon volatile events of great celerity` there should exist | |||
| events that routing should be aware of. Lastly, there is | ||||
| no support for policies other than route-properties (such | ||||
| as AS-origin, AS-path, destination prefix, MED-values | ||||
| etc). | ||||
| static policies and policies dependent upon volatile events of | Davies, et al Expires: January 2002 13 | |||
| great celerity there should exist events that routing should | 2.1.2.1.5 ææProvide paths sensitive to user policiesÆÆ | |||
| be aware of. Lastly, there is no support for policies other | ||||
| than route-properties (such as AS-origin, AS-path, destination | ||||
| prefix, MED-values etc). | ||||
| 2.1.2.1.5 "Provide paths sensitive to user policies" | ||||
| Relevance: Valid to some extent, as it may contradict with the | Relevance: Valid to some extent, as they may conflict with the | |||
| policies of the network administrator. | policies of the network administrator. It is likely that | |||
| this requirement will be met by means of different bit | ||||
| transport services offered by an operator, but at the cost | ||||
| of adequate provisioning, authentication and policing when | ||||
| utilizing the service. | ||||
| Current practice: not supported in normal routing. Can be | Current practice: not supported in normal routing. Can be | |||
| accomplished to some extent with lose source routing, resulting | accomplished to some extent with loose source routing, | |||
| in inefficient forwarding in the routers. | resulting in inefficient forwarding in the routers. The | |||
| 2.1.2.1.6 "Provide paths which characterize user | various attempts to introduce QoS (Integrated Services and | |||
| quality-of-service requirements" | DiffServ) can also be seen as means to support this | |||
| requirement but they have met with limited success. | ||||
| Relevance: Valid to some extent, as it may contradict the policies | 2.1.2.1.6 ææProvide paths which characterize user quality-of-service | |||
| of the operator | requirementsÆÆ | |||
| Current practice: Creating routes with specified QoS is not | Relevance: Valid to some extent, as they may conflict with the | |||
| possible now. | policies of the operator. It is likely that this | |||
| 2.1.2.1.7 "Provide autonomy between inter- and intra-autonomous | requirement will be met by means of different bit | |||
| system route synthesis" | transport services offered by an operator, but at the cost | |||
| of adequate provisioning, authentication and policing when | ||||
| utilizing the service. It has become clear that offering | ||||
| to provide a particular QoS to any arbitrary destination | ||||
| from a particular source is generally impossible: QoS | ||||
| except in very æsoftÆ forms such as overall long term | ||||
| average packet delay, is generally associated with | ||||
| connection oriented routing. | ||||
| Current practice: Creating routes with specified QoS is not generally | ||||
| possible at present. | ||||
| 2.1.2.1.7 ææProvide autonomy between inter- and intra-autonomous system | ||||
| route synthesisÆÆ | ||||
| Relevance: Inter and intra domain routing should stay independent, | Relevance: Inter and intra domain routing should stay independent, | |||
| but one should notice that this to some extent contradicts the | but one should notice that this to some extent contradicts | |||
| previous three requirements. There is a trade-off between | the previous three requirements. There is a trade-off | |||
| abstraction and optimality. | between abstraction and optimality. | |||
| Current practice: inter-domain routing is performed independently | Current practice: inter-domain routing is performed independently of | |||
| of intra-domain routing. Intra-domain routing is, especially in | intra-domain routing. Intra-domain routing is, especially | |||
| transit domains, very interrelated to inter-domain routing. | in transit domains, very interrelated to inter-domain | |||
| 2.1.2.2 "Forwarding Requirements" | routing. | |||
| 2.1.2.2.1 "Decouple inter- and intra-autonomous system | 2.1.2.2 ææForwarding RequirementsÆÆ | |||
| forwarding decisions" | ||||
| 2.1.2.2.1 ææDecouple inter- and intra-autonomous system forwarding | ||||
| decisionsÆÆ | ||||
| Relevance: Valid. | Relevance: Valid. | |||
| Current practice: As explained in 2.1.2.1.7, intra-domain | Davies, et al Expires: January 2002 14 | |||
| forwarding in transit domains is codependent with inter-domain | Current practice: As explained in 2.1.2.1.7, intra-domain forwarding | |||
| forwarding decisions. | in transit domains is codependent with inter-domain | |||
| 2.1.2.2.2 "Do not forward datagrams deemed administratively | forwarding decisions. | |||
| inappropriate" | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | 2.1.2.2.2 ææDo not forward datagrams deemed administratively | |||
| inappropriateÆÆ | ||||
| Relevance: Valid, however packets that have been misrouted due to | Relevance: Valid, and increasingly important in the context of | |||
| transient routing problems perhaps should be forwarded to reach | enforcing policies correctly expressed through routing | |||
| the destination, although along an unexpected path. | advertisements but flouted by rogue peers which send | |||
| traffic for which a route has not been advertised. On the | ||||
| other hand, packets that have been misrouted due to | ||||
| transient routing problems perhaps should be forwarded to | ||||
| reach the destination, although along an unexpected path. | ||||
| Current practice: at stub domains there is packet filtering, e.g., | Current practice: at stub domains there is packet filtering, e.g., to | |||
| to catch source address spoofing on outgoing traffic or to | catch source address spoofing on outgoing traffic or to | |||
| filter out unwanted incoming traffic. In the backbone, | filter out unwanted incoming traffic. Filtering can in | |||
| intentional packet dropping based on policies is not common. | particular reject traffic (such as unauthorized transit | |||
| 2.1.2.2.3 "Do not forward datagrams to failed resources" | traffic) that has been sent to a domain even when it has | |||
| not advertised a route for such traffic on a given | ||||
| interface. The growing class of æmid boxesÆ (e.g. NATs) | ||||
| is quite likely to apply administrative rules that will | ||||
| prevent forwarding of packets. Note that security | ||||
| policies may deliberately hide administrative denials. In | ||||
| the backbone, intentional packet dropping based on | ||||
| policies is not common. | ||||
| Relevance: blurry to some extent. There is a trade-off between | 2.1.2.2.3 ææDo not forward datagrams to failed resourcesÆÆ | |||
| scalability and keeping track of unreachable resources. The | ||||
| closer to a failing resource, the stronger reason for that the | ||||
| failure should be known. | ||||
| Current practice: routing protocols keep track of failing routers, | Relevance: Unclear, although it is clearly desirable to minimise | |||
| but not other resources (e.g., end-hosts switches etc.) | waste of forwarding resources by discarding datagrams | |||
| 2.1.2.2.4 "Forward datagram according to its characteristics" | which cannot be delivered at the earliest opportunity. | |||
| There is a trade-off between scalability and keeping track | ||||
| of unreachable resources. Equipment closest to a failed | ||||
| node has the highest motivation to keep track of failures | ||||
| so that waste can be minimised. | ||||
| Current practice: routing protocols use both internal adjacency | ||||
| management sub-protocols (e.g. Hello protocols) and | ||||
| information from equipment and lower layer link watchdogs | ||||
| to keep track of failures in routers and connecting links. | ||||
| Failures will eventually result in the routing protocol | ||||
| reconfiguring the routing to avoid (if possible) a failed | ||||
| resource, but this is generally very slow (30s or more). | ||||
| In the meantime datagrams may well be forwarded to failed | ||||
| resources. In general terms, end hosts and some non- | ||||
| router midboxes do not participate in these notifications | ||||
| and failures of such boxes will not affect the routing | ||||
| system. | ||||
| 2.1.2.2.4 ææForward datagram according to its characteristicsÆÆ | ||||
| Davies, et al Expires: January 2002 15 | ||||
| Relevance: Valid. Is necessary in enabling differentiation in the | Relevance: Valid. Is necessary in enabling differentiation in the | |||
| network, based on QoS, precedence, policy or security. | network, based on QoS, precedence, policy or security. | |||
| Current practice: ingress and egress filtering can be done on | Current practice: ingress and egress filtering can be done on policy. | |||
| policy. | ||||
| 2.1.2.3 "Information Requirements | ||||
| 2.1.2.3.1 "Provide a distributed and descriptive information | 2.1.2.3 ææInformation RequirementsÆÆ | |||
| base" | ||||
| 2.1.2.3.1 ææProvide a distributed and descriptive information baseÆÆ | ||||
| Relevance: Valid, however hierarchical IBs might provide more | Relevance: Valid, however hierarchical IBs might provide more | |||
| possibilities. | possibilities. | |||
| Current practice: IBs are distributed, not sure whether they | Current practice: IBs are distributed, not sure whether they support | |||
| support all provided routing functionality. | all provided routing functionality. | |||
| 2.1.2.3.2 "Determine resource availability" | ||||
| Relevance: Valid. It should be possible for reource availablity | 2.1.2.3.2 ææDetermine resource availabilityÆÆ | |||
| and levels of resource availability to be determined. This | ||||
| prevents needing to discover unavailabity through failure. | ||||
| 2.1.2.3.3 "Restrain transmission utilization" | ||||
| Relevance: Valid. However certain requirements, as fast detection | Relevance: Valid. It should be possible for resource availability | |||
| of faults may be worth consumption of more resources. | and levels of resource availability to be determined. | |||
| This prevents needing to discover unavailability through | ||||
| failure. Resource location and discovery is arguably a | ||||
| separate concern which could be addressed outside the core | ||||
| routing requirements. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Current practice: Resource availability is predominantly handled | |||
| outside of the routing system. | ||||
| 2.1.2.3.3 ææRestrain transmission utilizationÆÆ | ||||
| Relevance: Valid. However certain requirements in the control plane, | ||||
| such as fast detection of faults may be worth consumption | ||||
| of more resources. Similarly, simplicity of | ||||
| implementation may make it cheaper to æback haulÆ traffic | ||||
| to central locations to minimise the cost of routing if | ||||
| bandwidth is cheaper than processing. | ||||
| Current practice: BGP messages probably do not ordinarily consume | Current practice: BGP messages probably do not ordinarily consume | |||
| excessive resources, but might during erroneous conditions. | excessive resources, but might during erroneous | |||
| 2.1.2.3.4 "Allow limited information exchange" | conditions. In the data plane, the near universal | |||
| adoption of shortest path protocols could be considered to | ||||
| result in minimization of transmission utilization. | ||||
| 2.1.2.3.4 ææAllow limited information exchangeÆÆ | ||||
| Relevance: Valid. But perhaps routing could be improved if certain | Relevance: Valid. But perhaps routing could be improved if certain | |||
| information could be globally available. | information could be globally available. | |||
| Current practice: Policies are used to determine which | Current practice: Policies are used to determine which reachability | |||
| reachability information that is exported. | information that is exported. | |||
| 2.1.2.4 "Environmental Requirements" | ||||
| 2.1.2.4.1 "Support a packet-switching environment" | 2.1.2.4 ææEnvironmental RequirementsÆÆ | |||
| Davies, et al Expires: January 2002 16 | ||||
| 2.1.2.4.1 ææSupport a packet-switching environmentö | ||||
| Relevance: Valid but should not be exclusive. | Relevance: Valid but should not be exclusive. | |||
| Current practice: supported. | Current practice: supported. | |||
| 2.1.2.4.2 "Accommodate a connection-less oriented user transport | 2.1.2.4.2 ææAccommodate a connection-less oriented user transport | |||
| service" | serviceÆÆ | |||
| Relevance: Valid, but should not be exclusive. | Relevance: Valid, but should not be exclusive. | |||
| Current practice: accommodated. | Current practice: accommodated. | |||
| 2.1.2.4.3 "Accommodate 10K autonomous systems and 100K networks" | 2.1.2.4.3 ææAccommodate 10K autonomous systems and 100K networksÆÆ | |||
| Relevance: No longer valid. Needs to be increased substantially. | Relevance: No longer valid. Needs to be increased potentially | |||
| indefinitely. It is extremely difficult to foresee the | ||||
| future size expansion of the Internet so that the utopian | ||||
| solution would be to achieve an Internet whose | ||||
| architecture is scale invariant. Regrettably, this may | ||||
| not be achievable without introducing undesirable | ||||
| complexity and a suitable trade off between complexity and | ||||
| scalability is likely to be necessary. | ||||
| Current Practice: Yes but perhaps reaching the limit. | Current Practice: Yes but perhaps reaching the limit. | |||
| 2.1.2.4.4 "Allow for arbitrary interconnection of autonomous systems" | 2.1.2.4.4 ææAllow for arbitrary interconnection of autonomous systemsÆÆ | |||
| Relevance: Valid. However perhaps not all interconnections should | Relevance: Valid. However perhaps not all interconnections should be | |||
| be used globally. | accessible globally. | |||
| Current practice: BGP-4 allows for arbitrary interconnections. | Current practice: BGP-4 allows for arbitrary interconnections. | |||
| 2.1.2.5 "General Objectives" | 2.1.2.5 ææGeneral ObjectivesÆÆ | |||
| 2.1.2.5.1 "Provide routing services in a timely manner" | 2.1.2.5.1 ææProvide routing services in a timely mannerÆÆ | |||
| Relevance: Valid, stated before. The more complex a service is the | Relevance: Valid, as stated before. The more complex a service is the | |||
| longer it should be allowed to take, linearly, polynomially, | longer it should be allowed to take, but the | |||
| exponentially (NP-complete problems?) | implementation of services requiring (say) NP-complete | |||
| calculation should be avoided. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Current practice: More or less, with the exception of convergence and | |||
| fault robustness. | ||||
| Current practice: More or less, with the exception of convergence | 2.1.2.5.2 ææMinimize constraints on systems with limited resourcesÆÆ | |||
| and fault robustness. | ||||
| 2.1.2.5.2 "Minimize constraints on systems with limited | ||||
| resources" | ||||
| Relevance: Valid | Relevance: Valid | |||
| Current practice: Systems with limited resources are typically | Current practice: Systems with limited resources are typically stub | |||
| stub domains that advertise very little information. | domains that advertise very little information. | |||
| 2.1.2.5.3 "Minimize impact of dissimilarities between | ||||
| autonomous systems" | Davies, et al Expires: January 2002 17 | |||
| 2.1.2.5.3 ææMinimize impact of dissimilarities between autonomous | ||||
| systemsÆÆ | ||||
| Relevance: Important. This requirement is critical to a future | Relevance: Important. This requirement is critical to a future | |||
| architecture. In a domain routing environment where the | architecture. In a domain routing environment where the | |||
| internal properties of domains may differ radically, it will be | internal properties of domains may differ radically, it | |||
| important to be sure that these dissimilarities are minimized | will be important to be sure that these dissimilarities | |||
| at the borders. | are minimized at the borders. | |||
| Current: practice: for the most part this capability isn't | Current: practice: for the most part this capability isnÆt required | |||
| required in today's networks since the intra-domain attribute | in todayÆs networks since the intra-domain attribute are | |||
| are nearly identical to start with. | nearly identical to start with. | |||
| 2.1.2.5.4 "Accommodate the addressing schemes and protocol | ||||
| mechanisms of the autonomous systems" | ||||
| Relevance: Important | 2.1.2.5.4 ææAccommodate the addressing schemes and protocol mechanisms | |||
| of the autonomous systemsÆÆ | ||||
| Relevance: Important, probably more so than when RFC1126 was | ||||
| originally developed because of the potential deployment | ||||
| of IPv6, wider usage of MPLS and the increasing usage of | ||||
| VPNs. | ||||
| Current practice: Largely only one global addressing scheme is | Current practice: Largely only one global addressing scheme is | |||
| supported in most autonomous systems. | supported in most autonomous systems. | |||
| 2.1.2.5.5 "Must be implementable by network vendors"³ | ||||
| Requirement: Valid | 2.1.2.5.5 ææMust be implementable by network vendorsÆÆ³ | |||
| Current practice: BGP was implemented; | Requirement: Valid, but note that what can be implemented today is | |||
| different from what was possible when RFC1126 was written: | ||||
| FDR should not be unreasonably constrained by past | ||||
| limitations. | ||||
| 2.1.3 "Non-Goals" | Current practice: BGP was implemented. | |||
| RFC1126 also included a section discussing non goals. To what | 2.1.3 ææNon-Goalsö | |||
| extent are these still non goals? Does the fact that they were | ||||
| non-goals adversely affect today's IDR system? | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | RFC1126 also included a section discussing non goals. To what extent | |||
| are these still non goals? Does the fact that they were non-goals | ||||
| adversely affect todayÆs IDR system? | ||||
| 2.1.4 "Ubiquity" | 2.1.3.1 ææUbiquityÆÆ | |||
| In a sense this `non-goal' has effectively been achieved by the | In a sense this ænon-goalÆ has effectively been achieved by the | |||
| Internet and IP protocols. This requirement reflects a different | Internet and IP protocols. This requirement reflects a different | |||
| world view where there was serious competition for network | world view where there was serious competition for network protocols | |||
| protocols which is really no longer the case. Ubiquitous | which is really no longer the case. Ubiquitous deployment of inter- | |||
| deployment of inter-domain routing in particular has been achieved | domain routing in particular has been achieved and must not be undone | |||
| and must not be undone by any proposed FDR. On the other hand, | by any proposed FDR. On the other hand: | |||
| ubiquitous connectivity cannot be reached in policy sensitive | - ubiquitous connectivity cannot be reached in a policy sensitive | |||
| environment and should not be an aim. | environment and should not be an aim, | |||
| - it must not be required that the same routing mechanisms are | ||||
| used throughout provided that they can interoperate | ||||
| appropriately | ||||
| - the information needed to control routing in a part of the | ||||
| network should not necessarily be ubiquitously available and it | ||||
| Relevance: De facto essential for a FDR but ensure that we mean | Davies, et al Expires: January 2002 18 | |||
| ubiquity of the routing system rather than ubiquity of | must be possible for an operator to hide commercially sensitive | |||
| connectivity. | information that is not needed outside a domain. | |||
| Relevance: De facto essential for a FDR but what is required is | ||||
| ubiquity of the routing system rather than ubiquity of | ||||
| connectivity. | ||||
| Current practice: de facto ubiquity achieved. | Current practice: de facto ubiquity achieved. | |||
| 2.1.4.1 "Congestion control" | 2.1.3.2 ææCongestion controlÆÆ | |||
| Relevance: Not clear if they mean routing or forwarding. It is | Relevance: It is not clear if this non-goal was to be applied to | |||
| definitely a non-goal to adapt the choice of route at transient | routing or forwarding. It is definitely a non-goal to | |||
| congestion. However, to add support for congestion avoidance | adapt the choice of route at transient congestion. | |||
| (e.g., ECN and ICMP messages) in the forwarding process would | However, to add support for congestion avoidance (e.g., | |||
| be OK. | ECN and ICMP messages) in the forwarding process would be | |||
| a useful addition. There is also extensive work going on | ||||
| in traffic engineering which should result in congestion | ||||
| avoidance through routing as well as in forwarding. | ||||
| Current practice: There exists some ICMP-messages (source quench) | Current practice: Some ICMP messages (e.g. source quench) exist to | |||
| but these are not used. | deal with congestion control but these are not generally | |||
| 2.1.4.2 "Load splitting" | used as they either make the problem worse or there is no | |||
| mechanism to reflect the message into the application | ||||
| which is providing the source. | ||||
| Relevance: This should not be a non-goal, or an explicit goal. It | 2.1.3.3 ææLoad splittingÆÆ | |||
| might be desirable in some cases. | ||||
| Current practice: Can be implemented by exporting different | Relevance: This should neither be a non-goal, nor an explicit goal. | |||
| prefixes on different links, but this requires manual | It might be desirable in some cases. | |||
| configuration and does not consider actual load. | ||||
| 2.1.4.3 "Maximizing the utilization of resources | ||||
| Relevance: Valid. Cost-efficiency should be strived for, | Current practice: Can be implemented by exporting different prefixes | |||
| maximizing resource utilization does not always lead to | on different links, but this requires manual configuration | |||
| greatest cost-efficiency. | and does not consider actual load. | |||
| 2.1.4.4 "Schedule to deadline service" | ||||
| This non-goal was put in place to ensure that the IDR did not have | 2.1.3.4 ææMaximizing the utilization of resourcesÆÆ | |||
| to meet real time deadline goals such as might apply to CBR | ||||
| services in ATM. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Relevance: Valid. Cost-efficiency should be strived for, maximizing | |||
| resource utilization does not always lead to greatest | ||||
| cost-efficiency. | ||||
| Relevance: The hard form of deadline services is still a non-goal | Current practice: To the extent possible. | |||
| for the FDR but overall delay bounds are much more of the | ||||
| essence than was the case when RFC1126 was written. | ||||
| Current Practice: Service providers are now offering overall | 2.1.3.5 ææSchedule to deadline serviceÆÆ | |||
| probabilistic delay bounds on traffic contracts. To implement | ||||
| these contracts there is a requirement for a rather looser | ||||
| form of delay sensitive routing. | ||||
| 2.1.4.5 "Non-interference policies of resource utilization" | ||||
| The requirement in RFC1126 is somewhat opaque, but appears to | This non-goal was put in place to ensure that the IDR did not have to | |||
| imply that what we would today call QoS routing is a non-goal and | meet real time deadline goals such as might apply to CBR services in | |||
| that routing would not seek to control the elastic characteristics | ATM. | |||
| of Internet traffic whereby a TCP connection can seek to utilize | ||||
| all the spare bandwidth on a route, possibly to the detriment of | ||||
| other connections sharing the route or crossing it. | ||||
| Relevance: Open Issue. It is not clear whether dynamic QoS | Relevance: The hard form of deadline services is still a non-goal for | |||
| routing can or should be implemented. Such a system would seek | the FDR but overall delay bounds are much more of the | |||
| to control the admission and routing of traffic depending on | essence than was the case when RFC1126 was written. | |||
| current or recent resource utilization. | ||||
| Current practice: Routing does not consider dynamic resource | Davies, et al Expires: January 2002 19 | |||
| availability. Forwarding can support service differentiation | Current Practice: Service providers are now offering overall | |||
| probabilistic delay bounds on traffic contracts. To | ||||
| implement these contracts there is a requirement for a | ||||
| rather looser form of delay sensitive routing. | ||||
| 2.2 Nimrod Requirements | 2.1.3.6 ææNon-interference policies of resource utilizationö | |||
| Nimrod as expressed by Noel Chiappa in his early document, "A New | The requirement in RFC1126 is somewhat opaque, but appears to imply | |||
| IP Routing and Addressing Architecture" and later in the NIMROD | that what we would today call QoS routing is a non-goal and that | |||
| Working Group documents RFC 1753 and RFC1992 established a number | routing would not seek to control the elastic characteristics of | |||
| of requirements that need to be considered by any new routing | Internet traffic whereby a TCP connection can seek to utilize all the | |||
| architecture. The Nimrod requirements took RFC1126 as a starting | spare bandwidth on a route, possibly to the detriment of other | |||
| point and went further. | connections sharing the route or crossing it. | |||
| The goals of Nimrod, quoted from RFC1992, were as follows: | Relevance: Open Issue. It is not clear whether dynamic QoS routing | |||
| can or should be implemented. Such a system would seek to | ||||
| control the admission and routing of traffic depending on | ||||
| current or recent resource utilization. This would be | ||||
| particularly problematic where traffic crosses an | ||||
| ownership boundary because of the need for potentially | ||||
| commercially sensitive information to be made available | ||||
| outside the ownership boundary. | ||||
| 1. To support a dynamic internetwork of arbitrary size by | Current practice: Routing does not consider dynamic resource | |||
| availability. Forwarding can support service | ||||
| differentiation. | ||||
| providing mechanisms to control the amount of routing | 2.2 Nimrod Requirements | |||
| information that must be known throughout an internetwork. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Nimrod as expressed by Noel Chiappa in his early document, ææA New IP | |||
| Routing and Addressing ArchitectureÆÆ (1991) and later in the NIMROD | ||||
| Working Group documents RFC 1753 and RFC1992 established a number of | ||||
| requirements that need to be considered by any new routing | ||||
| architecture. The Nimrod requirements took RFC1126 as a starting | ||||
| point and went further. | ||||
| 2. To provide service-specific routing in the presence of | The goals of Nimrod, quoted from RFC1992, were as follows: | |||
| multiple constraints imposed by service providers and | ||||
| users. | ||||
| 3. To admit incremental deployment throughout an internetwork. | 1. To support a dynamic internetwork of *arbitrary size* (our | |||
| emphasis) by providing mechanisms to control the amount of | ||||
| routing information that must be known throughout an | ||||
| internetwork. | ||||
| It is certain that these goals remain as requirements for any new | 2. To provide service-specific routing in the presence of multiple | |||
| domain routing architecture. | constraints imposed by service providers and users. | |||
| As discussed in other sections of this document the amount | 3. To admit incremental deployment throughout an internetwork. | |||
| of information needed to maintain the routing system is | ||||
| growing at a rate that does not scale. And yet, as the | ||||
| services and constraints upon those services grow there is a | ||||
| need for more information to be maintained by the routing | ||||
| system. | ||||
| One of the key terms in the first requirements is `control'. | ||||
| While increasing amounts of information need to be known and | ||||
| maintained in the Internet, the amounts and kinds on | ||||
| information that are distributed can be controlled. | ||||
| This goal will be reflected in the requirements for the | ||||
| future domain architecture. | ||||
| If anything, the demand for specific services in the | It is certain that these goals remain as requirements for any new | |||
| internet has grown since 1996 when the Nimrod architecture | domain routing architecture. | |||
| was published. Additionally the kinds of constraints that | ||||
| service providers need to impose upon their networks and | ||||
| that services need to impose upon the routing have also | ||||
| increased. There have been no changes to the network in the | ||||
| last half decade that have improved this situation any. | ||||
| This is still a absolute necessity. It is impossible to | - As discussed in other sections of this document the amount of | |||
| imagine that a new routing architecture could supplant the | information needed to maintain the routing system is growing at | |||
| current architecture on a flag day. Instead any new | a rate that does not scale. And yet, as the services and | |||
| architecture will need to be able to incrementally deploy | ||||
| within the Internet. | ||||
| At one point in time Nimrod, with its addressing and routing | Davies, et al Expires: January 2002 20 | |||
| architectures was seen as a candidate for IPng. History shows | constraints upon those services grow there is a need for more | |||
| that it was not accepted as the IPng. The reason offered are | information to be maintained by the routing system. | |||
| various. | One of the key terms in the first requirements is æcontrolÆ. | |||
| While increasing amounts of information need to be known and | ||||
| maintained in the Internet, the amounts and kinds of information | ||||
| that are distributed can be controlled. | ||||
| This goal will be reflected in the requirements for the future | ||||
| domain architecture. | ||||
| - If anything, the demand for specific services in the Internet | ||||
| has grown since 1996 when the Nimrod architecture was published. | ||||
| Additionally the kinds of constraints that service providers | ||||
| need to impose upon their networks and that services need to | ||||
| impose upon the routing have also increased. Any changes made | ||||
| to the network in the last half-decade have not significantly | ||||
| improved this situation. | ||||
| - The ability to incrementally deploy any new routing architecture | ||||
| within the Internet is still a absolute necessity. It is | ||||
| impossible to imagine that a new routing architecture could | ||||
| supplant the current architecture on a flag day | ||||
| Instead IPv6 has been put forth as the IPng. Without entering a | At one point in time Nimrod, with its addressing and routing | |||
| discussion of the relative merits of IPv6 versus Nimrod, it is | architectures was seen as a candidate for IPng. History shows that | |||
| apparent that IPv6, while it may solve many problems, does not | it was not accepted as the IPng, having been ruled out of the | |||
| solve the critical routing problems in the Internet today. In | selection process by the IESG in 1994 on the grounds that it was ætoo | |||
| fact in some sense it exacerbates them by adding a requirements | much of a research effortÆ [35], although input for the requirements | |||
| for support of two internet protocols and their respective | of IPng was explicitly solicited from Chiappa [8]. IÆd still like to | |||
| addressing methods. In many ways the addition of IPv6 to the mix | know more about what those reasons wereà | |||
| Instead IPv6 has been put forth as the IPng. Without entering a | ||||
| discussion of the relative merits of IPv6 versus Nimrod, it is | ||||
| apparent that IPv6, while it may solve many problems, does not solve | ||||
| the critical routing problems in the Internet today. In fact in some | ||||
| sense it exacerbates them by adding a requirements for support of two | ||||
| internet protocols and their respective addressing methods. In many | ||||
| ways the addition of IPv6 to the mix of methods in todayÆs Internet | ||||
| only points to the fact that the goals, as set forth by the Nimrod | ||||
| team, remain as necessary goals. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | There is another sense in which study of Nimrod and its architecture | |||
| may be important to deriving a FDR. Nimrod can be said to have two | ||||
| derivatives: | ||||
| - MPLS in that it took the notion of forwarding along well known | ||||
| paths | ||||
| - PNNI in that it took the notion of abstracting topological | ||||
| information and using that information to create connections for | ||||
| traffic. | ||||
| It is important to note, that whilst MPLS and PNNI borrowed ideas | ||||
| from Nimrod, neither of them can be said to be an implementation of | ||||
| this architecture. | ||||
| of methods in today's Internet only points to the fact that the | 2.3 PNNI | |||
| goals, as set forth by the Nimrod team, remain as necessary goals. | ||||
| There is another sense in which study of Nimrod and its | PNNI was developed under the ATM ForumÆs auspices as a hierarchical | |||
| architecture may be important to deriving a FDR. Nimrod can be | route determination protocol for ATM, a connection oriented | |||
| said to have two derivatives: | architecture. It is reputed to have developed several of it methods | |||
| MPLS in that it took the notion of forwarding along well | Davies, et al Expires: January 2002 21 | |||
| known paths | from a study of the Nimrod architecture. What can be gained from an | |||
| analysis of what did and did not succeed in PNNI? | ||||
| PNNI in that it took the notion of abstracting topological | The PNNI protocol includes the assumption that all peer groups are | |||
| information and using that information to create | willing to cooperate, and that the entire network is under the same | |||
| connections for traffic. | top administration. Are there limitations that stem from this æworld | |||
| nodeÆ presupposition? As we know [13], the Internet is no longer a | ||||
| clean hierarchy and there is a lot of resistance to having any sort | ||||
| of æultimate authorityÆ controlling or even brokering communication. | ||||
| It is important to note, that whilst MPLS and PNNI borrowed ideas | PNNI is the first deployed example of a routing protocol that uses | |||
| from Nimrod, neither of them can be said to be an implementation | abstract map exchange (as opposed to distance vector or link state | |||
| of this architecture. | mechanisms) for inter-domain routing information exchange. One | |||
| 2.3 PNNI | consequence of this is that domains need not all use the same | |||
| mechanism for map creation. What were the results of this | ||||
| abstraction and source based route calculation mechanism? | ||||
| PNNI was developed under the ATM Forum's auspices as a | Since the authors of this document do not have experience running a | |||
| hierarchical route determination protocol for ATM, a connection | PNNI network, the comments above are from a theoretical perspective. | |||
| oriented architecture. It is reputed to have developed several of | Information on these issues, and any other relevant issues, is | |||
| it methods from a study of the Nimrod architecture. What can be | solicited from those who do have such operational experience. | |||
| gained from an analysis of what and did not succeed in PNNI? | ||||
| The PNNI protocol includes the assumption that all peer groups are | 2.4 Recent Research Work | |||
| willing to cooperate, and that the entire network is under the | ||||
| same top administration. Are there limitations that stem from this | ||||
| `world node' presupposition? | ||||
| Additionally PNNI is not designed to support a single standardised | 2.4.1 Developments in Internet Connectivity | |||
| "SPF" algorithm that must be present in all routers. Instead it | ||||
| relies on the entry node to compute a constraint-based path. It | ||||
| also relies on topological maps that presented an abstracted view | ||||
| of one network to another. What were the results of this | ||||
| abstraction and source based route calculation mechanism? | ||||
| Since the authors of this document do not have experience running | The recent work commissioned from Geoff Huston by the Internet | |||
| a PNNI network, the comments above are from a theoretical | Architecture Board [13] draws a number of conclusions from analysis | |||
| perspective. Information on these issues, and any other relevant | of BGP routing tables and routing registry databases: | |||
| issues, is solicited from those who do have such operational | - The connectivity between provider ASs is becoming more like a | |||
| experience | dense mesh than the tree structure which was commonly assumed to | |||
| be commonplace a couple of years ago. This has been driven by the | ||||
| increasing amounts charged for peering and transit traffic by | ||||
| global service providers. Local direct peering and internet | ||||
| exchanges are becoming steadily more common as the cost of local | ||||
| fibre connections drops. | ||||
| - End user sites are increasingly resorting to multi-homing onto two | ||||
| or more service providers as a way of improving resiliency. This | ||||
| has a knock-on effect of spectacularly fast depletion of the | ||||
| available pool of AS numbers as end user sites require public AS | ||||
| numbers to become multi-homed and corresponding increase in the | ||||
| number of prefixes advertised in BGP. | ||||
| - Multi-homed sites are using advertisement of longer prefixes in | ||||
| BGP as a means of traffic engineering to load spread across their | ||||
| multiple external connections with further impact on the size of | ||||
| the BGP tables. | ||||
| - Operational practices are not uniform, and in some cases lack of | ||||
| knowledge or training is leading to instability and/or excessive | ||||
| advertisement of routes by incorrectly configured BGP speakers. | ||||
| - All these factors are quickly negating the advantages in limiting | ||||
| the expansion of BGP routing tables that were gained by the | ||||
| introduction of CIDR and consequent prefix aggregation in BGP. It | ||||
| is also now impossible for IPv6 to realize the world view in which | ||||
| the default free zone would be limited to perhaps 10,000 prefixes. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 22 | |||
| - The typical æwidthÆ of the Internet in AS hops is now around five, | ||||
| and much less in many cases. | ||||
| These conclusions have a considerable impact on the requirements for | ||||
| the FDR: | ||||
| - Topological hierarchy (e.g. mandating a tree structured | ||||
| connectivity) cannot be relied upon to deliver scalability of a | ||||
| large Internet routing system | ||||
| - Aggregation cannot be relied upon to constrain the size of routing | ||||
| tables for an all-informed routing system | ||||
| 2.4.2 Defending the End To End Principle | ||||
| DARPA is funding a project to think about a new architecture for | ||||
| future generation Internet, called imaginatively NewArch | ||||
| (http://www.isi.edu/newarch/). Work started in the first half of | ||||
| 2000 but the published results are limited to an introductory paper | ||||
| and some slides. | ||||
| The main development so far is to conclude that as the Internet | ||||
| becomes mainstream infrastructure, fewer and fewer of the | ||||
| requirements are truly global but may apply with different force or | ||||
| not at all in certain parts of the network. This (it is claimed) | ||||
| makes the compilation of a single, ordered list of requirements | ||||
| deeply problematic. Instead we may have to produce multiple | ||||
| requirement sets with support for differing requirement importance at | ||||
| different times and in different places. This æmeta-requirementÆ | ||||
| significantly impacts architectural design. | ||||
| Potential new technical requirements identified so far include: | ||||
| - Commercial environment concerns such as richer inter-provider | ||||
| policy controls and support for a variety of payment models | ||||
| - Trustworthiness | ||||
| - Ubiquitous mobility | ||||
| - Policy driven self-organisation (ædeep auto configurationÆ) | ||||
| - Extreme short-time-scale resource variability | ||||
| - Capacity allocation mechanisms | ||||
| - Speed, propagation delay and Delay/BandWidth Product issues | ||||
| Non-technical or political ærequirementsÆ include: | ||||
| - Legal and Policy drivers such as | ||||
| o Privacy and free/anonymous speech | ||||
| o Intellectual property concerns | ||||
| o Encryption export controls | ||||
| o Law enforcement surveillance regulations | ||||
| o Charging and taxation issues | ||||
| - Reconciling national variations and consistent operation in a | ||||
| world wide infrastructure | ||||
| One of the participants in this work (Dave Clark) with one of his | ||||
| associates has also just published a very interesting paper analyzing | ||||
| the impact of some of these new requirements on the end to end | ||||
| principle that has guided the development of the Internet to date | ||||
| [32]. Their primary conclusion is that the loss of trust between the | ||||
| Davies, et al Expires: January 2002 23 | ||||
| users at the ends of end to end has the most fundamental effect on | ||||
| the Internet. This is clear in the context of the routing system, | ||||
| where operators are unwilling to reveal the inner workings of their | ||||
| networks for commercial reasons. Similarly, trusted third parties | ||||
| and their avatars (mainly mid-boxes of one sort or another) have a | ||||
| major impact on the end to end principles and the routing mechanisms | ||||
| that went with them. Overall, the end to end principles should be | ||||
| defended so far as is possible - some changes are already too deeply | ||||
| embedded to make it possible to go back to full trust and openness - | ||||
| at least partly as a means of staving off the day when the network | ||||
| will ossify into an unchangeable form and function (much as the | ||||
| telephone network has done). The hope is that by that time a new | ||||
| Internet will appear to offer a context for unfettered innovation. | ||||
| 3. Existing problems of BGP and the current EGP/IGP Architecture | 3. Existing problems of BGP and the current EGP/IGP Architecture | |||
| Although most of the people who have to work with BGP today | Although most of the people who have to work with BGP today believe | |||
| believe it to be a useful, working protocol, discussions have | it to be a useful, working protocol, discussions have brought to | |||
| brought to light a number of areas where BGP or the relationship | light a number of areas where BGP or the relationship between BGP and | |||
| between BGP and the IGPs in use today could be improved. This | the IGPs in use today could be improved. This section is, to a large | |||
| section is, to a large extent, a wish list for the FDR based on | extent, a wish list for the FDR based on those areas where BGP is | |||
| those areas where BGP is seen to be lacking, rather than simply a | seen to be lacking, rather than simply a list of problems with BGP. | |||
| list of problems with BGP. The shortcomings of today's inter- | The shortcomings of todayÆs inter-domain routing system have also | |||
| domain routing system have also been extensively surveyed in | been extensively surveyed in æArchitectural Requirements for Inter- | |||
| `Architectural Requirements for Inter-Domain Routing in the | Domain Routing in the InternetÆ [13], particularly with respect to | |||
| Internet' [13], particularly with respect to its stability and the | its stability and the problems produced by explosions in the size of | |||
| problems produced by explosions in the size of the Internet. | the Internet. | |||
| 3.1 BGP and Auto-aggregation | 3.1 BGP and Auto-aggregation | |||
| The stability and later linear growth rates of the number of | The stability and later linear growth rates of the number of routing | |||
| routing objects (prefices) that was achieved by the introduction | objects (prefixes) that was achieved by the introduction of CIDR | |||
| of CIDR around 1994, has now been once again been replaced by | around 1994, has now been once again been replaced by near- | |||
| near-exponential growth of number of routing objects. The | exponential growth of number of routing objects. The granularity of | |||
| granularity of many of the objects advertised in the DFZ is very | many of the objects advertised in the DFZ is very small (prefix | |||
| small (prefix length of 22 or longer): This granularity appears | length of 22 or longer): This granularity appears to be a by-product | |||
| to be a by-product of attempts to perform precision traffic | of attempts to perform precision traffic engineering related to | |||
| engineering related to increasing levels of multi-homing. At | increasing levels of multi-homing. At present there is no mechanism | |||
| present there is no mechanism in BGP that would allow an AS to | in BGP that would allow an AS to aggregate such prefixes without | |||
| aggregate such prefices without advance knowledge of their | advance knowledge of their existence, even if it was possible to | |||
| existence, even if it was possible to deduce automatically that | deduce automatically that they could be aggregated. Achieving | |||
| they could be aggregated. Achieving satisfactory auto-aggregation | satisfactory auto-aggregation would also significantly reduce the | |||
| would also significantly reduce the non-locality problems | non-locality problems associated with instability in peripheral ASs. | |||
| associated with instability in peripheral ASs. | ||||
| 3.2 Convergence and Recovery Issues | On the other hand, it may be that alterations to the connectivity of | |||
| the net as described in [13] and Section 2.4.1 may limit the | ||||
| usefulness of auto-aggregation | ||||
| BGP today is a stable protocol under most circumstances but this | 3.2 Convergence and Recovery Issues | |||
| has been achieved at the expense of making the convergence time of | ||||
| the inter-domain routing system very slow under some conditions. | BGP today is a stable protocol under most circumstances but this has | |||
| This has a detrimental effect on the recovery of the network from | been achieved at the expense of making the convergence time of the | |||
| inter-domain routing system very slow under some conditions. This | ||||
| Davies, et al Expires: January 2002 24 | ||||
| has a detrimental effect on the recovery of the network from | ||||
| failures. | failures. | |||
| The timers that control the behavior of BGP are typically set to | The timers that control the behavior of BGP are typically set to | |||
| values in the region of several tens of seconds to a few minutes, | values in the region of several tens of seconds to a few minutes, | |||
| which constrains the responsiveness of BGP to failure conditions. | which constrains the responsiveness of BGP to failure conditions. | |||
| In the early days of deployment of BGP, poor network stability and | In the early days of deployment of BGP, poor network stability and | |||
| router software problems lead to storms of withdrawals closely | router software problems lead to storms of withdrawals closely | |||
| followed by re-advertisements of many prefices. To control the load | ||||
| on routing software imposed by these æroute flapsÆ, route flap | ||||
| damping was introduced into BGP. Most operators have now implemented | ||||
| a degree of route flap damping in their deployments of BGP. This | ||||
| restricts the number of times that the routing tables will be rebuilt | ||||
| even if a route is going up and down very frequently. Unfortunately, | ||||
| the effect of route flap damping is exponential in its behavior which | ||||
| can result in some parts of the Internet being inaccessible for hours | ||||
| at a time. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | There is evidence ([13] and our own measurements) that in todayÆs | |||
| followed by re-advertisements of many prefices. To control the | ||||
| load on routing software imposed by these `route flaps', route | ||||
| flap damping was introduced into BGP. Most operators have now | ||||
| implemented a degree of route flap damping in their deployments of | ||||
| BGP. This restricts the number of times that the routing tables | ||||
| will be rebuilt even if a route is going up and down very | ||||
| frequently. Unfortunately, the effect of route flap damping is | ||||
| exponential in its behavior which can result in some parts of the | ||||
| Internet being inaccessible for hours at a time. | ||||
| There is evidence ( [13] and our own measurements) that in today's | ||||
| network route flap is disproportionately associated with the fine | network route flap is disproportionately associated with the fine | |||
| grain prefices (length 22 or longer) associated with traffic | grain prefices (length 22 or longer) associated with traffic | |||
| engineering at the periphery of the network. Auto-aggregation as | engineering at the periphery of the network. Auto-aggregation as | |||
| previously discussed would tend to mask such instability and | previously discussed would tend to mask such instability and prevent | |||
| prevent it being propagated across the whole network. | it being propagated across the whole network. | |||
| 3.3 Non-locality of Effects of Instability and Misconfiguration | 3.3 Non-locality of Effects of Instability and Misconfiguration | |||
| There have been a number of instances, some of which are well- | There have been a number of instances, some of which are well- | |||
| documented (e.g. The April 1997 incident when misconfiguration of | documented (e.g. The April 1997 incident when misconfiguration of BGP | |||
| BGP at a small company in Virginia, USA, turned the company into a | at a small company in Virginia, USA, turned the company into a | |||
| traffic magnet for much of the traffic in the Internet resulting | traffic magnet for much of the traffic in the Internet resulting in | |||
| in global problems until it was fixed) of a mistake in BGP | global problems until it was fixed) of a mistake in BGP configuration | |||
| configuration in a single peripheral AS propagating across the | in a single peripheral AS propagating across the whole Internet and | |||
| whole Internet and resulting in misrouting of most of the traffic | resulting in misrouting of most of the traffic in the Internet. | |||
| in the Internet. | ||||
| Similarly, route flap in a single peripheral AS can require route | Similarly, route flap in a single peripheral AS can require route | |||
| table recalculation across the entire Internet. | table recalculation across the entire Internet. | |||
| This non-locality of effects is highly undesirable, and it would | This non-locality of effects is highly undesirable, and it would be a | |||
| be a considerable improvement if such effects were naturally | considerable improvement if such effects were naturally limited to a | |||
| limited to a small area of the network around the problem. | small area of the network around the problem. | |||
| 3.4 Multihoming Issues | 3.4 Multihoming Issues | |||
| As discussed previously, the increasing use of multi-homing as a | As discussed previously, the increasing use of multi-homing as a | |||
| robustness technique by peripheral ASs requires that multiple | robustness technique by peripheral ASs requires that multiple routes | |||
| routes have to be advertised for such domains. These routes must | have to be advertised for such domains. These routes must not be | |||
| not be aggregated close in to the multi-homed domain as this would | aggregated close in to the multi-homed domain as this would defeat | |||
| defeat the traffic engineering implied by multi-homing and | the traffic engineering implied by multi-homing and currently cannot | |||
| currently cannot be aggregated further away from the multi-homed | be aggregated further away from the multi-homed domain due to the | |||
| domain due to the lack of auto-aggregation capabilities. | lack of auto-aggregation capabilities. Consequentially the DFZ | |||
| Consequentially the DFZ routing table is growing exponentially | routing table is growing exponentially again. | |||
| again. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| Davies, et al Expires: January 2002 25 | ||||
| The longest prefix match routing technique introduced by CIDR, and | The longest prefix match routing technique introduced by CIDR, and | |||
| implemented in BGP4, when combined with provider address | implemented in BGP4, when combined with provider address allocation | |||
| allocation is an obstacle to effective multi-homing if load | is an obstacle to effective multi-homing if load sharing across the | |||
| sharing across the multiple links is required: If an AS has been | multiple links is required: If an AS has been allocated its | |||
| allocated its addresses from an upstream provider, the upstream | addresses from an upstream provider, the upstream provider can | |||
| provider can aggregate those addresses with those of other | aggregate those addresses with those of other customers and need only | |||
| customers and need only advertise a single prefix for a range of | advertise a single prefix for a range of customers. But, if the | |||
| customers. But, if the customer AS is also connected to another | customer AS is also connected to another provider, the second | |||
| provider, the second provider is not able to aggregate the | provider is not able to aggregate the customer addresses because they | |||
| customer addresses because they are not taken from his allocation, | are not taken from his allocation, and will therefore have to | |||
| and will therefore have to announce a more specific route to the | announce a more specific route to the customer AS. The longest match | |||
| customer AS. The longest match rule will then direct all traffic | rule will then direct all traffic through the second provider, which | |||
| through the second provider which is not as required. | is not as required. | |||
| Example: | ||||
| AS3 has received its addresses from AS1, which means AS1 can | Example: | |||
| Aggregate. But if AS3 want its traffic to be seen | AS3 has received its addresses from AS1, which means AS1 can | |||
| equally both ways, AS1 is forced to announce both the | Aggregate. But if AS3 want its traffic to be seen equally | |||
| aggregate and the more specific route to AS3. | both ways, AS1 is forced to announce both the aggregate and | |||
| the more specific route to AS3. | ||||
| \ / | \ / | |||
| AS1 AS2 | AS1 AS2 | |||
| \ / | \ / | |||
| AS3 | AS3 | |||
| This problem has induced many ASs to apply for their own address | This problem has induced many ASs to apply for their own address | |||
| allocation even though they could have been allocated from an | allocation even though they could have been allocated from an | |||
| upstream provider further exacerbating the DFZ route table size | upstream provider further exacerbating the DFZ route table size | |||
| explosion. This problem also interferes with the desire of many | explosion. This problem also interferes with the desire of many | |||
| providers in the DFZ to route only prefixes which are equal to or | providers in the DFZ to route only prefixes that are equal to or | |||
| shorter than 20 or 19 bits. | shorter than 20 or 19 bits. | |||
| 3.5 AS-number exhaustion | Note that some problems which are referred to as multihoming issues | |||
| are not and should not solvable through the routing system (e.g. | ||||
| where a TCP load distributor is needed), and multihoming is not a | ||||
| panacea for the general problem of robustness in a routing | ||||
| system [38]. | ||||
| The domain identifier or AS-number is a 16-bit number. Allocation | 3.5 AS-number exhaustion | |||
| of AS-numbers is currently increasing 51% p.a. [13] with the | ||||
| result that exhaustion is likely around 2005. The IETF is | ||||
| currently studying proposals to increase the available range of | ||||
| AS-numbers to 32 bits, but this will present a deployment | ||||
| challenge during transition. | ||||
| 3.6 Partitioned AS's | The domain identifier or AS-number is a 16-bit number. Allocation of | |||
| AS-numbers is currently increasing 51% p.a. [13] with the result that | ||||
| exhaustion is likely around 2005. The IETF is currently studying | ||||
| proposals to increase the available range of AS-numbers to 32 bits, | ||||
| but this will present a deployment challenge during transition. | ||||
| BGP is unable to handle an AS which has been split into two or | 3.6 Partitioned ASÆs | |||
| more unconnected pieces. One school of opinion is that this is | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Tricks with discontinuous ASs are used by operators, for example, to | |||
| implement anycast. Discontinuous ASs may also come into being by | ||||
| appropriate behaviour and should not be changed: The view is that | Davies, et al Expires: January 2002 26 | |||
| responsibility for maintaining connectivity within the AS should | chance if a multi-homed domain becomes partitioned as a result of a | |||
| belong solely to the administrators of the domain. On the other | fault and part of the domain can access the Internet through each | |||
| hand, improving the robustness of the FDR may necessitate solving | connection. It may be desirable to make BGPÆs support for this kind | |||
| this problem, particularly as multi-homing becomes increasingly | of situation more transparent than at present. | |||
| prevalent. | ||||
| 3.7 Load Sharing | 3.7 Load Sharing | |||
| Load splitting or sharing was not a goal of the original designers | Load splitting or sharing was not a goal of the original designers of | |||
| of BGP and it is now a problem for today's network designers and | BGP and it is now a problem for todayÆs network designers and | |||
| managers. Trying to fool BGP into load sharing between several | managers. Trying to fool BGP into load sharing between several links | |||
| links is a constantly recurring exercise for most operators today. | is a constantly recurring exercise for most operators today. Traffic | |||
| Traffic engineering extensions to the FDR which will facilitate | engineering extensions to the FDR which will facilitate load sharing | |||
| load sharing are essential. | are essential. | |||
| 3.8 Hold down issues | 3.8 Hold down issues | |||
| As with the interval between `hello' messages in OSPF, the typical | As with the interval between æhelloÆ messages in OSPF, the typical | |||
| size and defined granularity (seconds to tens of seconds) of the | size and defined granularity (seconds to tens of seconds) of the | |||
| `hold down' time negotiated at start-up for each BGP connection | ækeep-aliveÆ time negotiated at start-up for each BGP connection | |||
| constrains the responsiveness of BGP to link failures. | constrains the responsiveness of BGP to link failures. | |||
| The recommended values and the available lower limit for this | The recommended values and the available lower limit for this timer | |||
| timer were set to limit the overhead caused by keep-alive messages | were set to limit the overhead caused by keep-alive messages when | |||
| when link bandwidths were typically much lower than today. | link bandwidths were typically much lower than today. Analysis and | |||
| Analysis and experiment ([14], [15]) indicate that faster links | experiment ([14], [15] & [33]) indicate that faster links could | |||
| could sustain a much higher rate of keep-alive messages without | sustain a much higher rate of keep-alive messages without | |||
| significantly impacting normal data traffic. This would improve | significantly impacting normal data traffic. This would improve | |||
| BGP's responsiveness to link and node failures but with a | BGPÆs responsiveness to link and node failures but with a | |||
| corresponding increase in the risk of instability, if the error | corresponding increase in the risk of instability, if the error | |||
| characteristics of the link are not taken properly into account | characteristics of the link are not taken properly into account when | |||
| when setting the hold-down interval. | setting the keep-alive interval. | |||
| An additional problem with the hold-down mechanism in BGP is the | An additional problem with the hold-down mechanism in BGP is the | |||
| amount of information that has to be exchanged to re-establish the | amount of information that has to be exchanged to re-establish the | |||
| database of route advertisements on each side of the link when it | database of route advertisements on each side of the link when it is | |||
| is re-established after a failure. Currently any failure, however | re-established after a failure. Currently any failure, however brief | |||
| brief forces a full exchange which could perhaps be constrained by | forces a full exchange which could perhaps be constrained by | |||
| retaining some state across limited time failures and using | retaining some state across limited time failures and using revision | |||
| revision control, transaction and replication techniques to re- | control, transaction and replication techniques to re-synchonise the | |||
| synchonise the databases. Proprietary techniques have been | databases. Various techniques have been implemented to try to reduce | |||
| implemented to try to reduce this problem. | this problem but they have not yet been standardised. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| 3.9 Interaction between Inter domain routing and intra domain | 3.9 Interaction between Inter domain routing and intra domain routing | |||
| routing | ||||
| Today, many operators' backbone routers run both I-BGP and an IGP | Today, many operatorsÆ backbone routers run both I-BGP and an IGP | |||
| maintain the routes that reach between the borders of the domain. | maintain the routes that reach between the borders of the domain. | |||
| Exporting routes from BGP into IGP and bringing them back up to | Exporting routes from BGP into IGP and bringing them back up to BGP | |||
| BGP is not recommended [29], but it is still necessary for all | is not recommended [29], but it is still necessary for all backbone | |||
| backbone routers to run both protocols. BGP is used to find the | routers to run both protocols. BGP is used to find the egress point | |||
| egress point and IGP to find the path (next hop router) to the | and IGP to find the path (next hop router) to the egress point across | |||
| egress point across the domain. This is not only a management | the domain. This is not only a management problem but may also create | |||
| problem but may also create other problems: | other problems: | |||
| Davies, et al Expires: January 2002 27 | ||||
| - BGP is a distance vector protocol, as compared with most IGPs | - BGP is a distance vector protocol, as compared with most IGPs | |||
| which are link state protocols, and as such it is not optimised | which are link state protocols, and as such it is not optimised | |||
| for convergence. | for convergence speed although they generally require less | |||
| processing power. Incidentally, more efficient distance vector | ||||
| algorithms are available such as [34]. | ||||
| - The metrics used in BGP and the IGP are rarely comparable or | - The metrics used in BGP and the IGP are rarely comparable or | |||
| combinable. | combinable. Whilst there are arguments that the optimizations | |||
| inside a domain may be different from those for end-to-end paths, | ||||
| there are occasions, such as calculating the ætopologically | ||||
| nearestÆ server when computable or combinable metrics would be of | ||||
| assistance. | ||||
| - Policy control in BGP is designed for simple policies between | - The policies that can be implemented using BGP are designed for | |||
| operators, not for controlling paths within a domain. | control of traffic exchange between operators, not for controlling | |||
| paths within a domain. Policies for BGP are most conveniently | ||||
| expressed in RPSL and this could be extended if thought desirable | ||||
| to include IGP policies. | ||||
| - If all paths between two border routers have been lost, and | - If the NEXT HOP destination for a set of BGP routes becomes | |||
| this is known by the IGP this may not always be used in BGP. | inaccessible because of IGP problems, the routes using the | |||
| Instead the border router may wait until the logical connection | vanished next hop have to be invalidated at the next available | |||
| between the borders has been lost, and first at this point | UPDATE. Subsequently, if the next hop route reappears, this would | |||
| declare the destinations as unreachable. | normally lead to the BGP speaker requesting a full table from its | |||
| neighbour(s). Current implementations may attempt to circumvent | ||||
| the effects of IGP route flap by caching the invalid routes for a | ||||
| period in case the next hop is restored. | ||||
| - Synchronization between IGP and EGP is a problem as long as we | - Synchronization between IGP and EGP is a problem as long as we use | |||
| use different protocols for IGP and EGP, which will most | different protocols for IGP and EGP, which will most probably be | |||
| probably be the case even in the future because of the | the case even in the future because of the differing requirements | |||
| differing requirements in the two situations. Some sort of | in the two situations. Some sort of synchronization between those | |||
| synchronization between those two protocols would be useful. | two protocols would be useful. The draft æOSPF Transient Blackhole | |||
| The draft `OSPF Transient Blackhole Avoidance' [22], the IGP | AvoidanceÆ [22], the IGP side of the story is covered. | |||
| side of the story is covered. | ||||
| - Synchronizing in BGP means waiting for the IGP to know about | - Synchronizing in BGP means waiting for the IGP to know about the | |||
| the same networks as the EGP, which can take a significant | same networks as the EGP, which can take a significant period of | |||
| period of time and slows down the convergence of BGP by adding | time and slows down the convergence of BGP by adding the IGP | |||
| the IGP convergence time into each cycle. | convergence time into each cycle. | |||
| 3.10 Policy Issues | 3.10 Policy Issues | |||
| There are several classes of issue with current BGP policy: | There are several classes of issue with current BGP policy: | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | - Policy is installed in an ad-hoc manner in each autonomous | |||
| system. There isnÆt a method for ensuring that the policy | ||||
| Policy is installed in an ad-hoc manner in each autonomous | installed in one router is coherent with policies installed in | |||
| system. There isn't a method for ensuring that the policy | other routers. | |||
| installed in one router is coherent with policies installed | - As described in Griffin [12] and in McPherson [20] it is | |||
| in other routers. | possible to create policies for ASs, and instantiate them in | |||
| routers, that will cause BGP to fail to converge in certain | ||||
| As described in Griffin [12] and in McPherson [20] it is | types of topology | |||
| possible to install policies in routers that will cause | - There is no available network model for describing policy in a | |||
| routing loops and will never converge in certain types of | coherent manner. | |||
| topology | ||||
| There is no available network model for describing policy in | ||||
| a coherent manner. | ||||
| Davies, et al Expires: January 2002 28 | ||||
| Policy management is extremely complex and mostly done without the | Policy management is extremely complex and mostly done without the | |||
| aid of any automated procedures. The extreme complexity means | aid of any automated procedures. The extreme complexity means that a | |||
| that highly qualified specialist are required for policy | highly qualified specialist is required for policy management of | |||
| management of border routers. The training of these specialists is | border routers. The training of these specialists is quite lengthy | |||
| quite lengthy and needs to involve long periods of hands-on | and needs to involve long periods of hands-on experience. There is, | |||
| experience. There is, therefore, a shortage of qualified staff | therefore, a shortage of qualified staff for installing and | |||
| for installing and maintaining the routing policies. | maintaining the routing policies. Also many training courses cover | |||
| only the basic configuration aspects and do not cover policy issues. | ||||
| 3.11 Security Issues | 3.11 Security Issues | |||
| While many of the issues with BPG security have been traced either | While many of the issues with BPG security have been traced either to | |||
| to implementation issues or to operational issues, BGP is | implementation issues or to operational issues, BGP is vulnerable to | |||
| vulnerable to DDOS attacks. Additionally routers can be used as | DDOS attacks. Additionally routers can be used as unwitting | |||
| unwitting forwarders in DDOS attacks on other systems. | forwarders in DDOS attacks on other systems. | |||
| Though DDOS attacks can be fought in a variety of ways, most | Though DDOS attacks can be fought in a variety of ways, most | |||
| filtering methods, it is takes constant vigilance. There is | filtering methods, it is takes constant vigilance. There is nothing | |||
| nothing in the current architecture or in the protocols that | in the current architecture or in the protocols that serves to | |||
| serves to protect the forwarders from these attacks. | protect the forwarders from these attacks. | |||
| 3.12 Support of MPLS and VPNS | 3.12 Support of MPLS and VPNS | |||
| Recently BGP has been modified to function as a signalling | Recently BGP has been modified to function as a signalling protocol | |||
| protocol for MPLS and for VPNs [16]. This over-loading of the | for MPLS and for VPNs [16]. Some people see this over-loading of | |||
| BGP protocol is seen as a boon by some and as a problem by others. | the BGP protocol as a boon whilst others see it as a problem. While | |||
| While it was certainly convenient as a vehicle for vendors to | it was certainly convenient as a vehicle for vendors to deliver extra | |||
| deliver extra functionality for to their products, it has | functionality for to their products, it has exacerbated some of the | |||
| exacerbated some of the performance and complexity issues of BGP. | performance and complexity issues of BGP. Two important problems are, | |||
| the additional state that must be retained and refreshed to support | ||||
| An ISP that is providing VPN service needs to distribute VPN | VPN tunnels and that BGP does not provide end-to-end notification | |||
| specific state to the provider edge (PE) nodes involved in each | making it difficult to confirm that all necessary state has been | |||
| installed or updated. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| VPN (core nodes, i.e. ISP's nodes that are not PE nodes, do not | ||||
| need the VPN specific state). Specifically, each PE node | ||||
| participating in VPN X must distribute a VPN Tunnel Object to | ||||
| every other PE node in VPN X . The VPN Tunnel Object includes the | ||||
| originating PE's Router ID, the VPN's identifier X, a VPN Tunnel | ||||
| identifier, e.g. a label, and either the VPN destinations that are | ||||
| reachable using that tunnel or the virtual Router ID of a VPN | ||||
| specific virtual router that is reachable via the tunnel. | ||||
| A PE node must distribute VPN Tunnel Objects pertaining to VPN X | ||||
| through the ISPs network to every other PE Nodes participating in | ||||
| VPN X. In one proposal, an ISPs IBGP system is used for this | ||||
| distribution. The proposal requires scaleability in the number of | ||||
| PEs, VPNs and therefore VPN Tunnel Objects and so recommends the | ||||
| use of Route Reflectors within the IBGP system. In this | ||||
| application, BGP fails to meet the applications requirements in | ||||
| several ways: for example, delivery of the VPN Tunnel Objects to | ||||
| the appropriate PE Nodes is unreliable (a RR cannot guarantee | ||||
| propagation of BGP routes) and no confirmation of delivery is | ||||
| given. Since BGP has no notion of end-to-end messages, reliability | ||||
| and acknowledgements will not be possible. Additionally, the RRs | ||||
| are burdened with storing the locally irrelevant VPN Tunnel | ||||
| Objects' data in their RIBs. The RRs' RIB sizes then adversely | ||||
| affects processing of IBGP updates containing the VPN Tunnel | ||||
| Objects. In a final, typically BGP example, these two problems | ||||
| multiply each other: for reduced unreliability, a PE may attach to | ||||
| two different RRs which leads to a four times increase in RR RIB | ||||
| sizes and the number of updates a RR must process. | ||||
| In creating the future domain routing architecture, serious | In creating the future domain routing architecture, serious | |||
| consideration must be given to the argument that VPN signalling | consideration must be given to the argument that VPN signaling | |||
| protocols should remain separate from the route determination | protocols should remain separate from the route determination | |||
| protocols. | protocols. | |||
| 3.13 IPv4 / IPv6 Ships in the Night | 3.13 IPv4 / IPv6 Ships in the Night | |||
| The fact that service providers would need to maintain two | The fact that service providers would need to maintain two completely | |||
| completely separate networks; one for IPv4 and one for IPv6 has | separate networks; one for IPv4 and one for IPv6 has been a real | |||
| been a real hindrance to the introduction of IPv6. Even if IPv6 | hindrance to the introduction of IPv6. Even if IPv6 does get | |||
| does get deployed it will do so without causing the disappearance | deployed it will do so without causing the disappearance of IPv4. | |||
| of IPv4. This means that unless something is done, service | This means that unless something is done, service providers would | |||
| providers would need to maintain the two networks in perpetuity. | need to maintain the two networks in perpetuity. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | It is possible to use a single set of BGP speakers with multiprotocol | |||
| extensions [37] to exchange information about both IPv4 and IPv6 | ||||
| routes between domains, but the use of TCP as the transport protocol | ||||
| for the information exchange results in an asymmetry when choosing to | ||||
| use one of TCP over IPv4 or TCP over IPv6. Successful information | ||||
| Davies, et al Expires: January 2002 29 | ||||
| exchange confirms one of IPv4 or IPv6 reachability between the | ||||
| speakers but not the other, making it possible that reachability is | ||||
| being advertised for a protocol for which it is not present. | ||||
| Also, current implementations do not allow a route to be advertised | ||||
| for both IPv4 and IPv6 in the same UPDATE message, because it is not | ||||
| possible to explicitly link the reachability information for an | ||||
| address family to the corresponding next hop information. This could | ||||
| be improved, but currently results in independent UPDATEs being | ||||
| exchanged for each address family. | ||||
| The tools available to network operators | ||||
| 3.14 Existing Tools to Support Effective Deployment of Inter-Domain | 3.14 Existing Tools to Support Effective Deployment of Inter-Domain | |||
| Routing | Routing | |||
| 3.14.1 Routing Policy Specification Language RPSL (RFC 2622, 2650) | The tools available to network operators to assist in configuring and | |||
| and RIPE NCC Database (RIPE 157) | maintaining effective inter-domain routing in line with their defined | |||
| policies are limited, and almost entirely passive. | ||||
| Routing Policy Specification Language RPSL enables a network | For example: | |||
| operator to describe routes, routers and autonomous systems ASs | - there are no tools to facilitate the planning of the routing of a | |||
| that are connected to the local AS. | domain (either intra- or inter-domain); there are a limited | |||
| number of display tools which will visualize the routing once it | ||||
| has been configured | ||||
| - there are no tools to assist in converting business policy | ||||
| specifications into the RPSL language; there are limited tools to | ||||
| convert the RPSL into BGP commands and to check, post-facto, that | ||||
| the proposed policies are consistent with the policies in adjacent | ||||
| domains (always provided that these have been revealed and | ||||
| accurately documented). | ||||
| - there are no tools to monitor BGP route changes in real time and | ||||
| warn the operator about policy inconsistencies and/or | ||||
| instabilities. | ||||
| Using the RPSL language a distributed database is created to | The following section summarises the tools that are available to | |||
| describe routing policies in the Internet as described by each AS | assist with the use of RPSL. Note they are all batch mode tools used | |||
| independently. The database can be used to check the consistency | off-line from a real network. These tools will provide checks for | |||
| of routing policies stored in the database. | skilled inter-domain routing configurers but limited assistance for | |||
| the novice. | ||||
| Tools exist (RIPE 81, 181, 103) that can be applied on the | 3.14.1 Routing Policy Specification Language RPSL (RFC 2622, 2650) and | |||
| database to answer requests of the form, e.g. | RIPE NCC Database (RIPE 157) | |||
| - flag when two neighboring network operators specify conflicting | Routing Policy Specification Language RPSL enables a network operator | |||
| or inconsistent routing information exchanges with each other | to describe routes, routers and autonomous systems ASs that are | |||
| and also detect global inconsistencies where possible; | connected to the local AS. | |||
| Using the RPSL language a distributed database is created to describe | ||||
| routing policies in the Internet as described by each AS | ||||
| independently. The database can be used to check the consistency of | ||||
| routing policies stored in the database. | ||||
| Davies, et al Expires: January 2002 30 | ||||
| Tools exist (RIPE 81, 181, 103) that can be applied on the database | ||||
| to answer requests of the form, e.g. | ||||
| - flag when two neighboring network operators specify conflicting or | ||||
| inconsistent routing information exchanges with each other and | ||||
| also detect global inconsistencies where possible; | ||||
| - extract all AS-paths between two networks which are allowed by | - extract all AS-paths between two networks which are allowed by | |||
| routing policy from the routing policy database; display the | routing policy from the routing policy database; display the | |||
| connectivity a given network has according to current policies. | connectivity a given network has according to current policies. | |||
| The database queries enable a partial static solution to the | The database queries enable a partial static solution to the | |||
| convergence problem. They analyze routing policies of very limited | convergence problem. They analyze routing policies of very limited | |||
| part of Internet and verify that they do not contain conflicts | part of Internet and verify that they do not contain conflicts that | |||
| that could lead to protocol divergence. The static analysis of | could lead to protocol divergence. The static analysis of convergence | |||
| convergence of the entire system has exponential time complexity, | of the entire system has exponential time complexity, so | |||
| so approximation algorithms would have to be used. | approximation algorithms would have to be used. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| Davies, et al Expires: January 2002 31 | ||||
| 4. Expected Users | 4. Expected Users | |||
| This section addresses the question of the target audience of the | This section considers the requirements imposed by the target | |||
| FDR both in terms of organizations that might own networks which | audience of the FDR both in terms of organizations that might own | |||
| would use FDR and the human users who will have to interact with | networks, which would use FDR, and the human users who will have to | |||
| the FDR> | interact with the FDR. | |||
| 4.1 Organisations | 4.1 Organisations | |||
| The organizations that own networks connected to the Internet have | The organizations that own networks connected to the Internet have | |||
| become much more diverse since RFC1126 [4] was published. In | become much more diverse since RFC1126 [4] was published. In | |||
| particular a major part of the network is now owned by commercial | particular a major part of the network is now owned by commercial | |||
| service provider organizations in the business of making profits | service provider organizations in the business of making profits from | |||
| from carrying data traffic. | carrying data traffic. | |||
| 4.1.1 Commercial Service Providers | 4.1.1 Commercial Service Providers | |||
| The routing system must take into account their desires for | The routing system must take into account their desires for | |||
| commercial secrecy and security, as well as allowing them to | commercial secrecy and security, as well as allowing them to organize | |||
| organize their business as flexibly as possible. | their business as flexibly as possible. | |||
| Service providers will often wish to conceal the details of the | Service providers will often wish to conceal the details of the | |||
| network from other connected networks. So far as is possible, the | network from other connected networks. So far as is possible, the | |||
| routing system should not require the service providers to expose | routing system should not require the service providers to expose | |||
| more details of the topology and capability of their networks than | more details of the topology and capability of their networks than is | |||
| is strictly necessary. | strictly necessary. | |||
| Many service providers will also offer contracts to their | Many service providers will also offer contracts to their customers | |||
| customers in the form of Service Level Agreements (SLAs) and the | in the form of Service Level Agreements (SLAs) and the routing system | |||
| routing system must allow the providers to support these SLAs | must allow the providers to support these SLAs through traffic | |||
| through traffic engineering and load balancing as well as | engineering and load balancing as well as multihoming allowing them | |||
| multihoming allowing them to achieve the degree of resilience and | to achieve the degree of resilience and robustness that they need. | |||
| robustness that they need. | ||||
| Service providers can be categorized as | Service providers can be categorized as | |||
| Global Service Providers (GSPs) with networks which have a | - Global Service Providers (GSPs) with networks which have a | |||
| global reach. Such providers may and usually will wish to | global reach. Such providers may and usually will wish to | |||
| constrain traffic between their customers to run entirely on | constrain traffic between their customers to run entirely on | |||
| their networks. Such providers will interchange traffic at | their networks. Such providers will interchange traffic at | |||
| multiple peering points with other GSPs and need extensive | multiple peering points with other GSPs and need extensive | |||
| policy-based controls to control the interchange of traffic. | policy-based controls to control the interchange of traffic. | |||
| Peering may be through the use of dedicated private lines | Peering may be through the use of dedicated private lines | |||
| between the partners or increasingly through Internet Exchange | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Points. | |||
| - National Service Providers (NSPs)which are similar to GSPs but | ||||
| between the partners or increasingly through Internet | typically cover one country. Such organizations may operate as | |||
| Exchange Points. | a federation which provides similar reach to a GSP and may wish | |||
| to be able to steer traffic preferentially to other federation | ||||
| National Service Providers (NSPs)which are similar to GSPs | members to achieve global reach. | |||
| but typically cover one country. Such organizations may | - Local Internet Service Providers (ISPs) operate regionally and | |||
| operate as a federation which provides similar reach to a | will typically purchase transit capacity from NSPs or GSPs to | |||
| GSP and may wish to be able to steer traffic preferentially | provide global connectivity, but may also peer with neighbouring | |||
| to other federation members to achieve global reach. | ISPs. | |||
| Local Internet Service Providers (ISPs) operate regionally | Davies, et al Expires: January 2002 32 | |||
| and will typically purchase transit capacity from NSPs or | The routing system should be sufficiently flexible to accommodate the | |||
| GSPs to provide global connectivity, but may also peer with | continually changing business relationships of the providers, and the | |||
| neighbouring ISPs. | various levels of trustworthiness that they apply to customers and | |||
| partners. | ||||
| The routing system should be sufficiently flexible to accommodate | Service providers will need to be involved in accounting for Internet | |||
| the continually changing business relationships of the providers. | usage, monitoring the traffic, and may be involved in government | |||
| action to tax the usage of the Internet, enforce social mores and | ||||
| intellectual property rules or apply surveillance to the traffic to | ||||
| detect or prevent crime. | ||||
| 4.1.2 Enterprises | 4.1.2 Enterprises | |||
| The leaves of the network domain graph are in many cases networks | The leaves of the network domain graph are in many cases networks | |||
| supporting a single enterprise. Such networks cover an enormous | supporting a single enterprise. Such networks cover an enormous | |||
| range of complexity with some multi-national companies owning | range of complexity with some multi-national companies owning | |||
| networks which rival the complexity and reach of a GSP whereas | networks that rival the complexity and reach of a GSP whereas many | |||
| many fall into the Small Office-Home Office (SOHO) category. The | fall into the Small Office-Home Office (SOHO) category. The routing | |||
| routing system should allow simple and robust configuration and | system should allow simple and robust configuration and operation for | |||
| operation for the SOHO category, whilst effectively supporting the | the SOHO category, whilst effectively supporting the larger | |||
| larger enterprise. | enterprise. | |||
| Enterprises are particularly likely to lack the capability to | Enterprises are particularly likely to lack the capability to | |||
| configure and manage a complex routing system and every effort | configure and manage a complex routing system and every effort should | |||
| should be made to provide simple configuration and operation for | be made to provide simple configuration and operation for such | |||
| such networks. | networks. | |||
| Enterprises will also wish to be able to change their service | Enterprises will also wish to be able to change their service | |||
| provider with ease. | provider with ease. Whilst this is predominantly a naming and | |||
| addressing issue, the routing system must be able to support seamless | ||||
| changeover, for example, by coping with a changeover period when both | ||||
| sets of addresses are in use. | ||||
| Enterprises will wish to be able to multihome to one or more | Enterprises will wish to be able to multihome to one or more | |||
| providers to provide robustness. | providers as one possible means of enhancing the resilience of their | |||
| network. | ||||
| 4.1.3 Domestic Networks | Enterprises will also frequently wish to control the trust that they | |||
| place both in workers and external connections through firewalls and | ||||
| similar mid-boxes placed at their external connections. | ||||
| Increasingly domestic networks are likely to be `always on' and | 4.1.3 Domestic Networks | |||
| will resemble SOHO enterprises networks with no special | ||||
| requirements of the routing system. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Increasingly domestic networks are likely to be æalways onÆ and will | |||
| resemble SOHO enterprises networks with no special requirements of | ||||
| the routing system. | ||||
| In the meantime, the routing system must support dial-up users. | In the meantime, the routing system must support dial-up users. | |||
| 4.1.4 Internet Exchange Points | 4.1.4 Internet Exchange Points | |||
| Peering of service providers, academic networks and larger | Peering of service providers, academic networks and larger | |||
| enterprises is increasingly happening at specific Internet | enterprises is increasingly happening at specific Internet Exchange | |||
| Exchange Points where many networks are linked together in a | Points where many networks are linked together in a relatively small | |||
| relatively small physical area. The resources of the exchange may | ||||
| be owned by a broker or jointly by the connecting networks. The | ||||
| routing systems should support such exchange points without | ||||
| requiring the exchange point to either operate as a superior | ||||
| entity with every connected network logically inferior to it or | ||||
| requiring the exchange point to be a member of one (or all) | ||||
| connected networks. | ||||
| 4.1.5 Content Providers | Davies, et al Expires: January 2002 33 | |||
| physical area. The resources of the exchange may be owned by a | ||||
| trusted third party or jointly by the connecting networks. The | ||||
| routing systems should support such exchange points without requiring | ||||
| the exchange point to either operate as a superior entity with every | ||||
| connected network logically inferior to it or requiring the exchange | ||||
| point to be a member of one (or all) connected networks. The | ||||
| connecting networks have to delegate a certain amount of trust to the | ||||
| exchange point operator. | ||||
| Content providers are at one level a special class of enterprise, | 4.1.5 Content Providers | |||
| but the desire to deliver content efficiently means that a content | ||||
| Content providers are at one level a special class of enterprise, but | ||||
| the desire to deliver content efficiently means that a content | ||||
| provider may provide multiple replicated origin servers or caches | provider may provide multiple replicated origin servers or caches | |||
| across a network. The routing system should facilitate delivering | across a network. These may also be provided by a separate content | |||
| delivery service. The routing system should facilitate delivering | ||||
| content from the most efficient location. | content from the most efficient location. | |||
| 4.2 Human Users | 4.2 Human Users | |||
| This section covers the most important human users of the FDR and | This section covers the most important human users of the FDR and | |||
| their expected interactions with the system. | their expected interactions with the system. | |||
| 4.2.1 Network Planners | 4.2.1 Network Planners | |||
| The routing system should allow them to plan and implement a | The routing system should allow them to plan and implement a network | |||
| network which can be proved to be stable and will meet their | that can be proved to be stable and will meet their traffic | |||
| traffic engineering requirements. | engineering requirements. | |||
| 4.2.2 Network Operators | 4.2.2 Network Operators | |||
| The routing system should, so far as is possible, be simple to | The routing system should, so far as is possible, be simple to | |||
| configure and operate, behave in a predictable, stable fashion and | configure and operate, behave in a predictable, stable fashion and | |||
| deliver appropriate statistics and events to allow the network to | deliver appropriate statistics and events to allow the network to be | |||
| be managed and upgraded in an efficient and timely fashion. | managed and upgraded in an efficient and timely fashion. | |||
| 4.2.3 Mobile End Users | ||||
| The routing system must support mobile end users. | 4.2.3 Mobile End Users | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | The routing system must support mobile end users. The NewArch team | |||
| (see Section 2.4.2) considers that mobility will become æubiquitousÆ | ||||
| 5. Mandated Constraints | 5. Mandated Constraints | |||
| While many of the requirement to which the protocol must respond | While many of the requirement to which the protocol must respond are | |||
| are technical, some aren't. These mandated constraints are those | technical, some arenÆt. These mandated constraints are those that | |||
| that are determined by conditions of the world around us. | are determined by conditions of the world around us. Understanding | |||
| Understanding these requirements requires and analysis of the | these requirements requires and analysis of the world in which these | |||
| world in which these systems will be deployed,. The constraints | systems will be deployed,. The constraints include those that are | |||
| include those that are determined by: | determined by: | |||
| - Environmental factors. | ||||
| Environmental factors. | - Geography | |||
| - Political boundaries and considerations | ||||
| Geography | ||||
| Political boundaries and considerations | Davies, et al Expires: January 2002 34 | |||
| - Technological factors such as the prevalence of different | ||||
| levels of technology in the developed world as opposed to in | ||||
| the developing or undeveloped world. | ||||
| Technological factors such as the prevalence of different | 5.1 The Federated Environment | |||
| levels of technology in the developed world as opposed to | ||||
| in the developing or undeveloped world. | ||||
| 5.1 The Federated Environment | ||||
| The graph of the Internet network with routers and other control | The graph of the Internet network with routers and other control | |||
| boxes at the nodes and communication links along the edges is | boxes at the nodes and communication links along the edges is today | |||
| today partitioned administratively into a large number of disjoint | partitioned administratively into a large number of disjoint domains, | |||
| domains, known as Autonomous Systems (ASs). | known as Autonomous Systems (ASs). | |||
| A common administration may have responsibility for one or more | A common administration may have responsibility for one or more | |||
| domains which may or may not be adjacent in the graph. | domains that may or may not be adjacent in the graph. | |||
| Commercial and policy constraints affecting the routing system | Commercial and policy constraints affecting the routing system will | |||
| will typically be exercised at the boundaries of these domains | typically be exercised at the boundaries of these domains where | |||
| where traffic is exchanged between domains. | traffic is exchanged between domains. | |||
| The perceived need for commercial confidentiality will seek to | The perceived need for commercial confidentiality will seek to | |||
| minimise the information transferred across these boundaries, | minimise the information transferred across these boundaries, leading | |||
| leading to requirements for aggregated information, abstracted | to requirements for aggregated information, abstracted maps of | |||
| maps of connectivity exported from domains and mistrust of | connectivity exported from domains and mistrust of supplied | |||
| supplied information. | information. | |||
| One possible extension to the requirements would be to require | The perceived desire for anonymity may require the use of zero- | |||
| the protocols to provide the ability for groups of peering domains | knowledge security protocols to allow users to access resources | |||
| to be treated as a (super-)domain. These domains would have a | without exposing their identity. | |||
| common administrative policy. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | One possible extension to the requirements would be to require the | |||
| protocols to provide the ability for groups of peering domains to be | ||||
| treated as a (super-)domain. These domains would have a common | ||||
| administrative policy. | ||||
| 5.2 Working with different sorts of network | 5.2 Working with different sorts of networks | |||
| The diverse Layer 2 networks over which the layer 3 routing system | The diverse Layer 2 networks over which the layer 3 routing system is | |||
| is implemented have typically been operated totally independently | implemented have typically been operated totally independently from | |||
| from the layer 3 network. Consideration needs to be given to the | the layer 3 network. Consideration needs to be given to the degree | |||
| degree and nature of leakage of information between the layers | and nature of interchange of information between the layers that is | |||
| that is desirable. In particular, the desire for robustness | desirable. In particular, the desire for robustness through diverse | |||
| through diverse routing implies knowledge of the underlying | routing implies knowledge of the underlying networks to be able to | |||
| networks to be able to guarantee the robustness | guarantee the robustness. | |||
| Mobile access networks may also impose extra requirements on Layer | Mobile access networks may also impose extra requirements on Layer 3 | |||
| 3 routing. | routing. | |||
| 5.3 Delivering Diversity | 5.3 Delivering Diversity | |||
| The routing system is operating at Layer 3 in the network. To | The routing system is operating at Layer 3 in the network. To | |||
| achieve robustness and resilience at this layer requires that | achieve robustness and resilience at this layer requires that where | |||
| where multiple diverse routes are employed as part of delivering | multiple diverse routes are employed as part of delivering the | |||
| the resilience, the routing system at Layer 3 needs to be assured | resilience, the routing system at Layer 3 needs to be assured that | |||
| that the Layer 2 and lower routes are really diverse. The | the Layer 2 and lower routes are really diverse. The ædiamond | |||
| `diamond problem' is the simplest form of this problem ¡ layer 3 | problemÆ is the simplest form of this problem - layer 3 provider | |||
| provider attempting to provide diversity buys layer 2 services | ||||
| from two separate providers who in turn buy wayleaves from the | Davies, et al Expires: January 2002 35 | |||
| same provider: | attempting to provide diversity buys layer 2 services from two | |||
| separate providers who in turn buy wayleaves from the same provider: | ||||
| Layer 3 service | Layer 3 service | |||
| / \ | / \ | |||
| / \ | / \ | |||
| Layer 2 Layer 2 | Layer 2 Layer 2 | |||
| Provider A Provider B | Provider A Provider B | |||
| \ / | \ / | |||
| \ / | \ / | |||
| Trench provider | Trench provider | |||
| Now when the backhoe cuts the trench, the Layer 3 provider has no | Now when the backhoe cuts the trench, the Layer 3 provider has no | |||
| resilience unless he had taken special steps to verify that the | resilience unless he had taken special steps to verify that the | |||
| trench wasn't common. The routing system should facilitate | trench wasnÆt common. The routing system should facilitate avoidance | |||
| avoidance of this kind of trap. | of this kind of trap. | |||
| 5.4 When will the new solution be required? | ||||
| There is a full range of opinion on this subject. An informal | ||||
| survey indicates that the range varies from 2 years to 6 years. | ||||
| And while there are those, possibly outliers, who think there is | ||||
| no need for a new routing architecture as well as those who think | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Some work is going on to understand the sort of problems that stemm | |||
| from this requirement, such as the work on Shared Risk Link Groups | ||||
| [31]. Unfortunately, the full generality of the problem requires | ||||
| diversity be maintained over time between an arbitrarily large set of | ||||
| mutually distrustful providers. For some cases, it may be sufficient | ||||
| for diversity to be checked at provisioning or route instantiation | ||||
| time, but this remains a hard problem requiring research work. | ||||
| a new architecture was need years ago, the median seems to lie at | 5.4 When will the new solution be required? | |||
| around 4 years. As in all projections of the future this is | ||||
| largely not provable. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | There is a full range of opinion on this subject. An informal survey | |||
| indicates that the range varies from 2 years to 6 years. And while | ||||
| there are those, possibly outliers, who think there is no need for a | ||||
| new routing architecture as well as those who think a new | ||||
| architecture was needed years ago, the median seems to lie at around | ||||
| 4 years. As in all projections of the future this is largely not | ||||
| provable. | ||||
| 6. Assumptions | 6. Assumptions | |||
| The assumptions so far in the work to derive the requirements for | In projecting the requirements for the Future Routing Domain a number | |||
| the Future Routing Domain have been: | of assumptions have been made. The requirements set out should be | |||
| consistent with these assumptions, but there are doubtless a number | ||||
| 1. The number of hosts today is somewhere in the area of 100 | of other assumptions which are not explicitly articulated here: | |||
| Million. With dial in and NATs this is likely to turn into up | ||||
| to 500 Million users (see [30]). In a number of years, with | ||||
| wireless accesses and different gizmos attaching to the | ||||
| Internet, we are likely to see a couple of Billion users on | ||||
| the Internet. The number of globally addressable hosts is very | ||||
| much dependent on how common NATs will be in the future. | ||||
| 2. NATs exist and we cannot assume that NATs will cease being a | ||||
| presence in the networks. | ||||
| 1. The number of hosts today is somewhere in the area of 100 Million. | ||||
| With dial in and NATs this is likely to turn into up to 500 | ||||
| Million users (see [30]). In a number of years, with wireless | ||||
| accesses and different ægizmosÆ attaching to the Internet, we are | ||||
| likely to see a couple of Billion æusersÆ on the Internet. The | ||||
| number of globally addressable hosts is very much dependent on how | ||||
| common NATs will be in the future. | ||||
| 2. NATs and other mid-boxes exist and we cannot assume that they will | ||||
| cease being a presence in the networks. | ||||
| 3. The number of operators in the Internet will probably not grow | 3. The number of operators in the Internet will probably not grow | |||
| very much, as there is a likelihood that operators will tend to | very much, as there is a likelihood that operators will tend to | |||
| merge. However, as Internet-connectivity expands to new | ||||
| countries, new operators will emerge and then merge again. | ||||
| 4. Today, there are around 9,500 AS's with a growth rate of around | ||||
| 51% per annum [13]. With current use of AS's (for e.g., multi- | ||||
| homing) the number of AS's grow to 70,000 within 3 - 5 years. | ||||
| 5. In contrast to the number of operators, the number of domains | ||||
| is likely to grow significantly. Today, each operator has | ||||
| different domains within an AS, but this also shows in SLAs and | ||||
| policies internal to the operator. Making this globally visible | ||||
| would create a number of domains 10-100 times the amount of | ||||
| ASs, i.e., between 100,000 and 1,000,000. | ||||
| Davies, et al Expires: January 2002 36 | ||||
| merge. However, as Internet-connectivity expands to new countries, | ||||
| new operators will emerge and then merge again. | ||||
| 4. Today, there are around 9,500 ASÆs with a growth rate of around | ||||
| 51% per annum [13]. With current use of ASÆs (for e.g., multi- | ||||
| homing) the number of ASÆs grow to 70,000 within 3 - 5 years. | ||||
| 5. In contrast to the number of operators, the number of domains is | ||||
| likely to grow significantly. Today, each operator has different | ||||
| domains within an AS, but this also shows in SLAs and policies | ||||
| internal to the operator. Making this globally visible would | ||||
| create a number of domains 10-100 times the amount of ASs, i.e., | ||||
| between 100,000 and 1,000,000. | ||||
| 6. With more and more capacity at the edge of the network the IP | 6. With more and more capacity at the edge of the network the IP | |||
| network will expand. Today there are operators with several | network will expand. Today there are operators with several | |||
| thousands of routers, but this is likely to be increased. A | thousands of routers, but this is likely to be increased. A domain | |||
| domain will probably contain tens of thousands of routers. | will probably contain tens of thousands of routers. | |||
| 7. The speed of connections in the (fixed) access will technically be | ||||
| 7. The speed of connections in the (fixed) access will technically | (almost) unconstrained. However, the cost for the links will not | |||
| be (almost) unconstrained. However, the cost for the links will | be negligible so that the apparent speed will be effectively | |||
| not be negligible so that the apparent speed will be | bounded. Within a number of years some will have multi-Gigabit- | |||
| effectively bounded. Within a number of years some will have | speed in the access. | |||
| Gigabit-speed in the access. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| 8. At the same time, the bandwidth of wireless access still has a | 8. At the same time, the bandwidth of wireless access still has a | |||
| strict upper-bound. Within the foreseeable future each user | strict upper-bound. Within the foreseeable future each user will | |||
| will only have a tiny amount of resources available compared to | only have a tiny amount of resources available compared to fixed | |||
| fixed accesses (10kbps to 2Mbps with only a few achieving the | accesses (10kbps to 2Mbps for UMTS with only a few achieving the | |||
| higher figure). | higher figure as the bandwidth is shared between the active users | |||
| in a cell and only small cells can actually reach this speed, but | ||||
| 11Mbps or more for wireless LAN connections). | ||||
| 9. Assumptions 7 and 8 taken together suggest a span of bandwidth | 9. Assumptions 7 and 8 taken together suggest a span of bandwidth | |||
| between 10 kbps to 1000 Mbps. | between 10 kbps to 10 Gbps. | |||
| 10. The speed in the backbone has grown rapidly, and there is no | ||||
| 10. The speed in the backbone has grown rapidly, and there is | evidence that the growth will stop in the coming years. Terabit- | |||
| no evidence that the growth will stop in the coming years. | speed is likely to be the minimum backbone speed in a couple of | |||
| Terabit-speed is likely to be the minimum backbone speed in a | years. The range of bandwidths that might need to be represented | |||
| couple of years. | will require some thought to be given to how to represent the | |||
| values in the protocols. | ||||
| 11. There have been discussions as to whether Moore's law will | 11. There have been discussions as to whether Moore's law will | |||
| continue to hold for processor speed. If Moore's law does not | continue to hold for processor speed. If Moore's law does not | |||
| hold, then communication circuits might play a more important | hold, then communication circuits might play a more important role | |||
| role in the future. Also, optical routing is based on circuit | in the future. Also, optical routing is based on circuit | |||
| technology which is the main reason for taking ³circuits³ into | technology, which is the main reason for taking ³circuits³ into | |||
| account when designing an FDR. | account when designing an FDR. | |||
| 12. However, the datagram model still remains the fundamental model | ||||
| for the Internet. | ||||
| 13. The number of peering points in the network is likely to grow, as | ||||
| multi-homing becomes important. Also traffic will become more | ||||
| locally distributed, which will drive the demand for local | ||||
| peering. | ||||
| 14. The FDR will achieve the same degree of ubiquity as the current | ||||
| Internet and IP routing. | ||||
| 12. However, the datagram model still remains the fundamental | Davies, et al Expires: January 2002 37 | |||
| model for the Internet. | 7. Functional Requirements | |||
| 13. The number of peering points in the network is likely to | This section includes a detailed discussion of new requirements for a | |||
| grow, as multi-homing becomes important. Also traffic will | future domain routing architecture. As discussed in section 2.1 a | |||
| become more locally distributed, which will drive the demand | new architecture must build upon the requirements for past routing | |||
| for local peering. | architecture. For that reason, the requirements discussed in section | |||
| 2.1 are not repeated here. In case where the requirement has changed | ||||
| significantly, was omitted from the discussions in RFC1126 or was | ||||
| treated as a non-goal in RFC1126 but may now be significant, it will | ||||
| be discussed in further detail in this section. | ||||
| 14. The FDR will achieve the same degree of ubiquity as the | 7.1 Topology | |||
| current Internet and IP routing. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | 7.1.1 Routers should be able to know and exploit the domain topology | |||
| 7. Functional Requirements | Routers need to know the domain topology. BGP today operates with a | |||
| policy database, but does not provide a link state database for the | ||||
| connectivity of each AS - the extent to which this is feasible or | ||||
| desirable needs to be investigated. | ||||
| This section includes a detailed discussion of new requirements | The OSI Inter-Domain Routing Protocol (IDRP) [36] utilized a related | |||
| for a future domain routing architecture. As discussed in section | capability which allowed a collection of topologically related | |||
| 2.1 a new architecture must build upon the requirements for past | domains to be replaced by a domain collection object in a similar way | |||
| routing architecture. For that reason, the requirements discussed | to Nimrod domain hierarchies, allowing a route to be more compactly | |||
| in section 2.1 are not repeated here. In case where the | represented by a single collection in place of a sequence of | |||
| requirement has changed significantly, was omitted from the | individual domains. This abstraction and aggregation feature is | |||
| discussions in RFC1126 or were treated as non-goals in RFC1126 but | similar to but somewhat more powerful than the BGP community | |||
| may now be significant, it will be discussed in further detail I | capability. | |||
| this section.Topology | ||||
| 7.1.1 The same topology information should support different path | 7.1.2 The same topology information should support different path | |||
| selection ideas: | selection ideas: | |||
| The same topology information need to provide a more flexible | The same topology information needs to provide a more flexible | |||
| spectrum of path selection methods that we might expect to find in | spectrum of path selection methods that we might expect to find in a | |||
| a future Internet, including, amongst others, both distributed | future Internet, including, amongst others, both distributed | |||
| techniques such as hop by hop, shortest path, local optimization | techniques such as hop-by-hop, shortest path, local optimization | |||
| constraint-based, class of service, source address routing, and | constraint-based, class of service, source address routing, and | |||
| destination address routing as well as the centralized, global | destination address routing as well as the centralized, global | |||
| optimization constraint-based `traffic engineering' type (Open | optimization constraint-based ætraffic engineeringÆ type (Open | |||
| constraints should be allowed). Allowing different path selection | constraints should be allowed). Allowing different path selection | |||
| techniques to be used will produce a much more predictable and | techniques to be used will produce a much more predictable and | |||
| comprehensible result than the `clever tricks' which are currently | comprehensible result than the æclever tricksÆ that are currently | |||
| needed to achieve the same results. Traffic engineering functions | needed to achieve the same results. Traffic engineering functions | |||
| need to be combined. | need to be combined. | |||
| Routers need to know the domain topology. BGP today operates with | 7.1.3 Separation between the routing information topology from the | |||
| a policy database, but does not provide a link state database for | ||||
| the connectivity of each AS ¡ the extent to which this is feasible | ||||
| or desirable needs to be investigated. | ||||
| 7.1.2 Separation between the routing information topology from the | ||||
| data transport topology. | data transport topology. | |||
| The controlling network should be logically separate from the | The controlling network should be logically separate from the | |||
| controlled network. Physically, the two functional "planes" can | controlled network. Physically, the two functional "planes" can | |||
| reside in the same nodes and share the same links, but this is not | reside in the same nodes and share the same links, but this is not | |||
| the only possibility. Other options can also be feasible, and may | the only possibility. Other options can also be feasible, and may | |||
| sometimes be necessary. An example is a pure circuit switch (that | sometimes be necessary. An example is a pure circuit switch (that | |||
| cannot see individual IP packets), combined with an external | cannot see individual IP packets), combined with an external | |||
| controller. Another example may be where there are multiple links | ||||
| between two routers, and all the links are used for data | ||||
| forwarding, but only one is used for carrying the routing session. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 38 | |||
| controller. Another example may be where there are multiple links | ||||
| between two routers, and all the links are used for data forwarding, | ||||
| but only one is used for carrying the routing session. | ||||
| 7.2 Distribution | 7.2 Distribution | |||
| 7.2.1 Distribution mechanisms | 7.2.1 Distribution mechanisms | |||
| The important requirement is that every entity gets the | The important requirement is that every entity gets the information | |||
| information it needs in a fast, reliable, and trusted way. | it needs in a fast, reliable, and trusted way. | |||
| Possible distribution mechanisms for routing information exchange | Possible distribution mechanisms for routing information exchange may | |||
| may be for example full mesh, route reflections, flooding, and | be for example full mesh, spanning tree, route reflections, flooding, | |||
| multicast. | and multicast. | |||
| The current I-BGP seems to have unnecessary limitations in this | The current I-BGP seems to have unnecessary limitations in this | |||
| respect, where a router requires full mesh to obtain all available | respect, where a router requires full mesh to all other I-BGP | |||
| routes. Route reflection avoids the need of full meshes but loses | speakers in the domain to obtain all available routes. Route | |||
| information since the route reflector chooses the best route for | reflection avoids the need of full meshes but requires very careful | |||
| all the other routers. This best route might be different if all | configuration to ensure that the best route available is still | |||
| routers do the selection themselves in a full mesh. | selected as if all routers were connected in a full mesh. | |||
| 7.2.2 Path advertisement | 7.2.2 Path advertisement | |||
| The inter-domain routing system must be able to advertise more | The inter-domain routing system must be able to advertise more kinds | |||
| kinds of information than just connectivity and AS path. The FDR | of information than just connectivity and AS path. The FDR should | |||
| should support the Service Level Specifications (SLSs) that are | support the Service Level Specifications (SLSs) that are being | |||
| being developed under the Differentiated Services imprimatur. | developed under the Differentiated Services imprimatur. | |||
| Examples of such additional information can be: | Careful attention should be paid to ensuring that the distribution of | |||
| additional information with path advertisements remains scalable as | ||||
| domains and the Internet get larger. | ||||
| Possible examples of such additional information that might be | ||||
| carried include: | ||||
| - QoS information | - QoS information | |||
| To allow an ISP to sell predictable end-to-end QoS service to any | To allow an ISP to sell predictable end-to-end QoS service to any | |||
| destination, the routing system should have information about the | destination, the routing system should have information about the | |||
| end-to-end QoS. This means that the routing system should be able | end-to-end QoS. This means that the routing system should be able to | |||
| to support different paths for different DSCP's or TOS-values. The | support different paths for different services identified by DiffServ | |||
| outing system should also be able to carry information about the | PDBÆs or TOS-values. The routing system should also be able to carry | |||
| expected (or actually, promised) characteristics of the entire | information about the expected (or actually, promised) | |||
| path and also the price for the service. (If such information is | characteristics of the entire path and also the price for the | |||
| exchanged at all between network operators today, it is through | service. (If such information is exchanged at all between network | |||
| bilateral management interfaces, and not through the routing | operators today, it is through bilateral management interfaces, and | |||
| protocols.) | not through the routing protocols.) | |||
| This would allow for the operator to optimise the choice of path | This would allow for the operator to optimise the choice of path | |||
| based on a price/performance trade-off. | based on a price/performance trade-off. | |||
| It is possible that providing dynamic QoS information to control | It is possible that providing dynamic QoS information to control | |||
| routing is not scalable, and an alternative would be to use static | routing is not scalable, and an alternative would be to use static | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 39 | |||
| class-of-service information such as is suggested in the | class-of-service information such as is suggested in the | |||
| Differentiated Services work. | Differentiated Services work. | |||
| - security information | - security information | |||
| Security characteristics of other ASs (in the path or in the map) | Security characteristics of other ASs (in the path or in the map) can | |||
| can allow the routing entity to choose routing decision based on | allow the routing entity to choose routing decision based on some | |||
| some political reasons. The information itself is assumed to be so | political reasons. The information itself is assumed to be so secure | |||
| secure that you can trust it. | that you can trust it. | |||
| - usage and cost information | - usage and cost information | |||
| This can be used for billing and traffic engineering purpose. In | This can be used for billing and traffic engineering purpose. In | |||
| order to support cost based routing policies for customers (ie | order to support cost based routing policies for customers (ie peer | |||
| peer ISPs), information such as "traffic on this link or path | ISPs), information such as "traffic on this link or path costs XXX | |||
| costs XXX USD per Gigabyte" needs to be advertised, so that the | USD per Gigabyte" needs to be advertised, so that the customer can | |||
| customer can choose a cheap or an expensive route from an economic | choose a cheap or an expensive route from an economic perspective. | |||
| perspective. | ||||
| - monitored performance | - monitored performance | |||
| Some performance information such as delay and drop frequency can | Some performance information such as delay and drop frequency can be | |||
| be carried. (This is may only be suitable inside a domain.). This | carried. (This is may only be suitable inside a domain because of | |||
| should support at least the kind of delay bound contractual terms | trust considerations). This should support at least the kind of | |||
| that are currently being offered by service providers. | delay bound contractual terms that are currently being offered by | |||
| service providers. Note that these values refer to the outcome of | ||||
| carrying bits on the path, whereas the QOS information refers to the | ||||
| proposed behaviour which results in this outcome. | ||||
| 7.2.3 Stability of Routing Information | 7.2.3 Stability of Routing Information | |||
| 7.2.3.1 Avoiding Routing Oscillations | 7.2.3.1 Avoiding Routing Oscillations | |||
| The FDR should seek to minimize oscillations in route | The FDR must minimize oscillations in route advertisements. | |||
| advertisements. | ||||
| 7.2.3.2 Providing Loop Free Routing and Forwarding | 7.2.3.2 Providing Loop Free Routing and Forwarding | |||
| In line with the separation of concerns of routing and forwarding, | In line with the separation of concerns of routing and forwarding, | |||
| the distribution of routing information should be, so far as is | the distribution of routing information should be, so far as is | |||
| possible, loop-free, and the forwarding information created from | possible, loop-free, and the forwarding information created from this | |||
| this routing information should also seek to minimize loops in the | routing information should also seek to minimize persistent loops in | |||
| data forwarding paths. | the data forwarding paths. It is accepted that transient loops may | |||
| occur during convergence of the protocol and that there are trade- | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | offs between loop avoidance and global scalability. | |||
| 7.3 Addressing | ||||
| 7.3.1 Support mix of IPv4 and IPv6 addresses and other types of | ||||
| addresses too | ||||
| The routing system must support a mix of different kinds of | 7.3 Addressing | |||
| addresses, including at least IPv4 and IPv6 addresses, and | ||||
| preferably various types of non-IP addresses too. For instance | ||||
| networks like SDH/SONET and WDM may prefer to use non-IP | ||||
| addresses. | ||||
| 7.3.2 Support for domain renumbering | ||||
| The routing system must support renumbering (when a new prefix is | 7.3.1 Support mix of IPv4, IPv6 and other types of addresses | |||
| given to an old network, and the change is known in advance). | ||||
| 7.3.3 Multicast and Anycast | The routing system must support a mix of different kinds of | |||
| addresses, including at least IPv4 and IPv6 addresses, and preferably | ||||
| various types of non-IP addresses too. For instance networks like | ||||
| SDH/SONET and WDM may prefer to use non-IP addresses. It may also be | ||||
| The routing system must support multicast addressing, both within | Davies, et al Expires: January 2002 40 | |||
| a domain and across multiple domains. It also needs to support | necessary to support multiple sets of æprivateÆ RFC1918 addresses | |||
| anycast addressing within a domain, and inter-domain anycast | when dealing with multiple customer VPNs. | |||
| addressing should preferably not be excluded. | ||||
| 7.3.4 Address scoping | The routing system should support the capability to use a single | |||
| topology representation to generate routing and forwarding tables for | ||||
| multiple address families on the same network. This capability would | ||||
| minimise the protocol overhead when exchanging routes. | ||||
| The routing system must support scoping of addresses, for each of | Note that both Integrated IS-IS and BGP with multi-protocol | |||
| the unicast, multicast, and anycast types. | extensions [37] can support different address families. Extended BGP | |||
| is used, for example, in RFC2547 [16] to carry the VPN-IPv4 address | ||||
| family. | ||||
| For unicast address scoping as of IPv6, there seems to be no | 7.3.2 Support for domain renumbering/readdressing | |||
| special problems with respect to routing. Inter-domain routing | ||||
| handles only global addresses, while intra-domain routing also | ||||
| needs to be aware of site-local addresses. Link-local addresses | ||||
| are never routed at all. | ||||
| For scoping in a more general sense, and for scoping of multicast | The routing system must support readdressing (when a new prefix is | |||
| and anycast addresses, more study may be needed to identify the | given to an old network, and the change is known in advance) by | |||
| requirements. | maintaining routing during the changeover period [39], [40]. | |||
| 7.3.5 Mobility Support | 7.3.3 Multicast and Anycast | |||
| The routing system shall support end system mobility (and | The routing system must support multicast addressing, both within a | |||
| movability, and portability, whatever the differences may be). | domain and across multiple domains. It must also support anycast | |||
| addressing within a domain, and should support inter-domain anycast | ||||
| addressing. | ||||
| We observe that the existing solutions based on re-numbering | 7.3.4 Address scoping | |||
| and/ortunneling are designed to work with the current routing, so | ||||
| they do not add any new requirements to future routing. But the | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | The routing system must support scoping of addresses, for each of the | |||
| unicast, multicast, and anycast types. | ||||
| requirement is general, and future solutions may not be restricted | For unicast address scoping as of IPv6, there seems to be no special | |||
| to the ones we have today. | problems with respect to routing. Inter-domain routing handles only | |||
| global addresses, while intra-domain routing also needs to be aware | ||||
| of site-local addresses. Link-local addresses are never routed at | ||||
| all. | ||||
| 7.4 Management Requirements | For scoping in a more general sense, and for scoping of multicast and | |||
| anycast addresses, more study may be needed to identify the | ||||
| requirements. | ||||
| 7.4.1 Simple policy management | 7.3.5 Mobility Support | |||
| - Less manual configuration than today | The routing system shall support end system mobility (and movability, | |||
| and portability, whatever the differences may be). | ||||
| - Operators/providers want easy handling, but cannot afford to | We observe that the existing solutions based on re-numbering and/or | |||
| lose control. | tunneling are designed to work with the current routing, so they do | |||
| not add any new requirements to future routing. But the requirement | ||||
| is general, and future solutions may not be restricted to the ones we | ||||
| have today. | ||||
| - All the information should be available | Davies, et al Expires: January 2002 41 | |||
| 7.4 Management Requirements | ||||
| - But should not be visible except for when desired. | 7.4.1 Simple policy management | |||
| - Less manual configuration than today | ||||
| - Operators/providers want easy handling, but cannot afford to lose | ||||
| control. | ||||
| - All the information should be available | ||||
| - But should not be visible except for when desired. | ||||
| - Advertise policy (not only the result of policy) | - Advertise policy (not only the result of policy) | |||
| - Policy conflict Resolution | ||||
| - Policy conflict Resolution | (e g one would like to have one default behavior, and possibilities | |||
| to choose other options. But much of this depends on implementation, | ||||
| (e g one would like to have one default behavior, and | and not on the protocols) | |||
| possibilities to choose other options. But much of this depends | ||||
| on implementation, and not on the protocols) | ||||
| 7.5 Mathematical Provability | 7.5 Mathematical Provability | |||
| The protocol is required to be resistant to bad routing policy | The protocol is required to be resistant to bad routing policy | |||
| decisions made by operators. Tools are needed to check | decisions made by operators. Tools are needed to check compatibility | |||
| compatibility of routing policies. Routing policies are compatible | of routing policies. Routing policies are compatible if their global | |||
| if their global interaction does not cause divergence (collection | interaction does not cause divergence (collection of ASes exchange | |||
| of ASes exchange routing messages indefinitely never entering a | routing messages indefinitely never entering a stable state). Tools | |||
| stable state). Tools must be provided to make routing system | must be provided to make routing system convergent. A routing system | |||
| convergent. A routing system is convergent if after an exchange of | is convergent if after an exchange of routing information, routing | |||
| routing information, routing tables reach a stable state that does | tables reach a stable state that does not change until routing | |||
| not change until routing policies change. | policies change. | |||
| To achieve the above mentioned goals a mechanism is needed to | ||||
| publish and communicate policies so that operational coordination | ||||
| and fault isolation is possible. Tools are required that verify | ||||
| stable properties routing system in specified parts of Internet. | ||||
| The tools should be efficient (fast) and have a broad scope of | ||||
| operation (check large portions of Internet). | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | To achieve the above mentioned goals a mechanism is needed to publish | |||
| and communicate policies so that operational coordination and fault | ||||
| isolation is possible. Tools are required that verify stable | ||||
| properties routing system in specified parts of Internet. The tools | ||||
| should be efficient (fast) and have a broad scope of operation (check | ||||
| large portions of Internet). | ||||
| Tools analyzing routing policies can be applied statically or | Tools analyzing routing policies can be applied statically or | |||
| (preferably) dynamically. Dynamic solution requires tools that can | (preferably) dynamically. Dynamic solution requires tools that can be | |||
| be used for run time checking for a source of oscillations that | used for run time checking for a source of oscillations that arise | |||
| arise from policy conflicts. Research is needed to prove that | from policy conflicts. Research is needed to prove that there is an | |||
| there is an efficient solution to the dynamic checking of | efficient solution to the dynamic checking of oscillations. | |||
| oscillations. | ||||
| 7.6 Traffic Engineering | 7.6 Traffic Engineering | |||
| 7.6.1 Load Balancing (ECMP/OMP) | 7.6.1 Support for and Provision of Traffic Engineering Tools | |||
| At present there is an almost total lack of effective traffic | ||||
| engineering tools, whether on-line at all times for network control | ||||
| or off-line for network planning. The routing system should | ||||
| encourage the provision of such tools and generate statistical and | ||||
| accounting information in such a way that these tools can be used | ||||
| both in real time and for off-line planning and management. | ||||
| Davies, et al Expires: January 2002 42 | ||||
| 7.6.2 Support of Multiple Parallel Paths | ||||
| The routing system shall support the controlled distribution over | The routing system shall support the controlled distribution over | |||
| multiple links or paths, of traffic towards the same destination. | multiple links or paths, of traffic towards the same destination. | |||
| This applies to domains with two or more connections to the same | This applies to domains with two or more connections to the same | |||
| neighbor domain, and to domains with connections to more than one | neighbor domain, and to domains with connections to more than one | |||
| neighbor domain. Load balancing can be both static and dynamic. | neighbor domain. The paths need not have the same metric. | |||
| In intra-domain routing, the metric needs to contain more | This capability should be provided to support both cases where the | |||
| properties of the link such as delay, loss and utilization, to | offered traffic is known to exceed the available capacity of a single | |||
| construct multiple paths and split load. | link, and also cases where load is to be shared over paths for cost | |||
| or resiliency reasons. | ||||
| 7.6.2 Peering support | Imposition of this requirement on the routing system requires that | |||
| the corresponding forwarding should avoid reordering of packets in | ||||
| individual micro-flows, and should have mechanisms to allow the | ||||
| traffic to be reallocated back on to a single path when the multiple | ||||
| paths are not needed. | ||||
| The FDR must support peer¡level connectivity as well as purely | 7.6.3 Peering support | |||
| The FDR must support peer-level connectivity as well as purely | ||||
| hierarchical inter-domain connections. The network is becoming | hierarchical inter-domain connections. The network is becoming | |||
| increasingly complex with private peering arrangements set up | increasingly complex with private peering arrangements set up between | |||
| between providers at every level of the hierarchy of service | providers at every level of the hierarchy of service providers and | |||
| providers and even by certain large enterprises, in the form of | even by certain large enterprises, in the form of dedicated | |||
| dedicated extranets. | extranets. | |||
| The FDR must facilitate traffic engineering of these peer routes | The FDR must facilitate traffic engineering of these peer routes so | |||
| so that the network operators can make optimal use of the | that traffic can be readily constrained to travel as the network | |||
| operators desire and they can consequentially make optimal use of the | ||||
| available connectivity. | available connectivity. | |||
| 7.7 Multi-homing support | 7.7 Support for NATs and other Mid-boxes | |||
| An FDR protocol must support multi-homing, i.e. support an AS to | ||||
| peer with several other domains. | ||||
| As soon as a domain is multi-homed its prefixes are generally hard | ||||
| to aggregate as they are advertised further away from the | ||||
| multihomed domain, even if a domain is allotted a group of | ||||
| prefixes by a provider domain. As described above, multi-homing is | ||||
| leading to explosion of the size of the routing tables in the DFZ. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| The rapid growth of the size of the routing tables has to be | ||||
| solved by one means or another. This may be achieved by forcing | ||||
| domains to aggregate more, by a form of auto-aggregation or by | ||||
| looking at a new routing architecture. | ||||
| 7.7.1 Support for NATs | ||||
| One of our assumptions is that NATs are here to stay. The FDR | One of our assumptions is that NATs and other Mid-boxes such as | |||
| should seek to work with NATs to aid in bi-directional | firewalls, web proxies and address family (e.g. IPv4 to IPv6) | |||
| connectivity through the NAT without compromising the additional | translators are here to stay. | |||
| opacity and privacy which the NAT offers. This problem is closely | ||||
| analogous to the abstraction problem which is already under | ||||
| discussion for the interchange of routing information between | ||||
| domains. | ||||
| 7.8 Statistics support | The FDR should seek to work with NATs to aid in bi-directional | |||
| connectivity through the NAT without compromising the additional | ||||
| opacity and privacy which the NAT offers. This problem is closely | ||||
| analogous to the abstraction problem, which is already under | ||||
| discussion for the interchange of routing information between | ||||
| domains. | ||||
| Both the routing and forwarding parts of the FDR must maintain | 7.8 Statistics support | |||
| statistical information about the performance of their functions. | ||||
| This may be an extended version of the MIBs provided for IP | ||||
| forwarding, BGP and the relevant IGP. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Both the routing and forwarding parts of the FDR must maintain | |||
| statistical information about the performance of their functions. | ||||
| This may be an extended version of the MIBs provided for IP | ||||
| forwarding, BGP and the relevant IGP. | ||||
| Davies, et al Expires: January 2002 43 | ||||
| 8. Performance Requirements | 8. Performance Requirements | |||
| Over the past several years, the perfomance of the routing system | Over the past several years, the perfomance of the routing system has | |||
| has frequently been discussed. Some of the questions being asked | frequently been discussed. Some of the questions being asked | |||
| include: | include: | |||
| - How fast does an AS converge (given that we understand what we | ||||
| mean by convergence)? How fast must domains converge? | ||||
| - How big are the Areas, the ASs? How big should domains be? How | ||||
| many peers should a BGP Speaker be able to cope with? Can the | ||||
| routing protocols manage domains of this size | ||||
| - How much or how little data may be transferred in a routing | ||||
| message? | ||||
| - How much state can be stored and processed in route control | ||||
| processors. | ||||
| - Measures of network availability | ||||
| - Measure of network reliability | ||||
| - Global and Local measures of network Stability | ||||
| - Capacity Measurement | ||||
| - How fast does an AS converge? How fast must domains converge? | In many cases there has been very little data or statistical evidence | |||
| for many of the performance claims being made. In recent years | ||||
| - How big are the Areas, the ASs? How big should domains be? | several efforts have been initiated to gather data and do the | |||
| analyses required to make scientific assessments of the performance | ||||
| - How much or how little data may be transferred in a routing | issues and requirements. In order to complete this section of the | |||
| message? | requirements analysis, the data and analyses from these studies needs | |||
| to be gathered and collated into this document. This work has been | ||||
| - How much state can be stored and processed in route control | started but has yet to be completed. | |||
| processors. | ||||
| - Measures of network availability | ||||
| - Measure of network reliability | ||||
| - Global and Local measures of network Stability | ||||
| - Capacity Measurement | ||||
| In many cases there has been very little data or statistical evidence | ||||
| for many of the performance claims being made. In recent years | ||||
| several efforts have been initiated to gather data and do the | ||||
| analyses required to make scientific assessments of the performance | ||||
| issues and requirements. In order to complete this section of the | ||||
| requirements analysis, the data and analyses from these studies needs | ||||
| to be gathered and collated into this document. This work has been | ||||
| started but has yet to be completed. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | ||||
| 9. Backwards compatibility (cutover) and Maintainability | 9. Backwards compatibility (cutover) and Maintainability | |||
| This area poses a dilemma. On one hand it is an absolute | This area poses a dilemma. On one hand it is an absolute requirement | |||
| requirements that introduction of FDR not require any flag days. | that introduction of FDR must not require any flag days. The network | |||
| The network currently in place has to keep running at least as | currently in place has to keep running at least as well as it does | |||
| well as it does now while the new network is being brought in | now while the new network is being brought in around it. | |||
| around it. | ||||
| However, at the same time, it is also an absolute requirement that | However, at the same time, it is also an absolute requirement that | |||
| the new architecture not be limited by the restrictions that | the new architecture not be limited by the restrictions that plague | |||
| plague today's network. Thos restrictions cannot be allow to | todayÆs network. Those restrictions cannot be allowed to become | |||
| become permanent baggage on the new architecture. If they do, the | permanent baggage on the new architecture. If they do, the effort to | |||
| effort to create a new system will come to naught. | create a new system will come to naught. | |||
| These two requirements have significance not only for the | These two requirements have significance not only for the transition | |||
| transition strategy, but for the architecture itself since the | strategy, but for the architecture itself implying that it must be | |||
| determine that it must be possible for an internet such as today's | possible for an internet such as todayÆs BGP controlled network, or | |||
| BGP controlled network, or one of its ASs, can exist as a domain | one of its ASs, to exist as a domain within the new FDR. | |||
| within the FDR. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | 10. Security Requirements | |||
| 10. Security Requirements | As previously discussed, one of the major changes to have overtaken | |||
| the Internet since its inception, is the erosion of trust between end | ||||
| users making use of the net, between those users and the suppliers of | ||||
| services, and between the multiplicity of providers. Hence security, | ||||
| in all its aspects, will be much more important in the FDR. | ||||
| Davies, et al Expires: January 2002 44 | ||||
| It must be possible to secure the routing communication: the | It must be possible to secure the routing communication: the | |||
| communicating entities shall be able to identify who sent and who | communicating entities shall be able to identify who sent and who | |||
| received the information (authentication), and verify that the | received the information (authentication), and verify that the | |||
| information has not been changed on the way (integrity). | information has not been changed on the way (integrity). | |||
| Security is more important in inter-domain routing where the | Security is more important in inter-domain routing where the operator | |||
| operator has no control to the other domains, and less serious in | has no control to the other domains, and less serious in intra-domain | |||
| intra-domain routing since all the links and the nodes are under | routing since all the links and the nodes are under the | |||
| the administration of the operator and can be expected to share a | administration of the operator and can be expected to share a trust | |||
| trust relationship. | relationship. | |||
| The routing communication mechanism shall be robust against | ||||
| denial-of-service attacks. | ||||
| Should we also require: | ||||
| - that no one else but the intended recipient can access | ||||
| (privacy) or understand (confidentiality) the information? | ||||
| - possibility to verify that all the information has been | The routing communication mechanism shall be robust against denial- | |||
| received (non-repudiation)? | of-service attacks. | |||
| Is there a need to separate security of routing from security of | Further considerations which may impose requirements include: | |||
| forwarding? | - Whether no one else but the intended recipient must be able to | |||
| access (privacy) or understand (confidentiality) the information. | ||||
| - Whether it is possible to verify that all the information has been | ||||
| received (non-repudiation). | ||||
| - Whether there is a need to separate security of routing from | ||||
| security of forwarding. | ||||
| - Whether traffic flow security is needed (i.e. whether there is | ||||
| value in concealing who can connect to whom, and what volumes of | ||||
| data are exchanged). | ||||
| Securing the BGP session, as done today, only secures the exchange | Securing the BGP session, as done today, only secures the exchange of | |||
| of messages from the peering AS, not the content of the | messages from the peering AS, not the content of the information. In | |||
| information. In other words, we can confirm that the information | other words, we can confirm that the information we got is what our | |||
| we got is what our neighbor really sent us, but we do not know if | neighbor really sent us, but we do not know if this information (that | |||
| this information (that originated in some remote AS) is true or | originated in some remote AS) is true or not. | |||
| not. | ||||
| Is it enough to rely on chains of trust (we trust our peers who | A decision has to be made on whether to rely on chains of trust (we | |||
| trust their peers who..), or do we also need authentication and | trust our peers who trust their peers who..), or whether we also need | |||
| integrity of the information end-to-end? | authentication and integrity of the information end-to-end. This | |||
| information includes both routes and addresses. There has been | ||||
| interest in having digital signatures both on originated routes, but | ||||
| also countersignatures by address authorities to confirm that the | ||||
| originator has authority to advertise the prefix. Even understanding | ||||
| who can confirm the authority is non-trivial as it might be the | ||||
| provider who delegated the prefix (with a whole chain of authority | ||||
| back to ICANN) or it may be straight to an address registry. Where a | ||||
| prefix delegated by a provider is being advertised though another | ||||
| provider as in multi-homing, both may have to be involved to confirm | ||||
| that the prefix may be advertised through the provider who doesnÆt | ||||
| have any interest in the prefix! | ||||
| The FDR should seek to cooperate with the security policies of | The FDR should seek to cooperate with the security policies of | |||
| firewalls whenever possible. This is likely to involve further | firewalls and other third-party controlled mid-boxes whenever | |||
| requirements for abstraction of information, as the firewall is | possible. This is likely to involve further requirements for | |||
| seeking to minimize interchange of information which could lead to | abstraction of information, as, for example, the firewall is seeking | |||
| a security breach. | to minimize interchange of information that could lead to a security | |||
| breach. The effect of such changes on the end-to-end principle | ||||
| should be carefully considered as discussed in [32]. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 45 | |||
| Provision may have to be made to override some of these requirements | ||||
| when local laws mandate interception of communication capabilities. | ||||
| 11. Open Issues | 11. Open Issues | |||
| This section covers issues that need to considered and resolved in | This section covers issues that need to be considered and resolved in | |||
| deciding on a future domain routing architecture. While they | deciding on a future domain routing architecture. While they canÆt | |||
| can't be described as requirements, they do affect the types of | be described as requirements, they do affect the types of solution | |||
| solution that are acceptable. The discussions included below are | that are acceptable. The discussions included below are very open- | |||
| very open-ended. | ended. | |||
| 11.1 System Modeling | 11.1 System Modeling | |||
| It is still a new assumption that object modeling of a system is | The assumption that object modeling of a system is an essential first | |||
| an essential first step to creating a new system. Frequently the | step to creating a new system is still novel in this context. | |||
| effort to object model becomes an end in itself and does not lead | Frequently the effort to object model becomes an end in itself and | |||
| to system creation. But there is a balance and a lot that can be | does not lead to system creation. But there is a balance and a lot | |||
| discovered in an ongoing effort to model a system such as the | that can be discovered in an ongoing effort to model a system such as | |||
| future domain routing system. | the future domain routing system. | |||
| It is recommended that this process be included in the | ||||
| requirements. It should not, however be a gating event to all | ||||
| other work. | ||||
| Some of the most important realizations will occur during the | ||||
| process of determining the following: | ||||
| - Object classification | ||||
| - Relationships and containment | It is recommended that this process be included in the requirements. | |||
| It should not, however be a gating event to all other work. | ||||
| - Roles and Rules | Some of the most important realizations will occur during the process | |||
| of determining the following: | ||||
| - Object classification | ||||
| - Relationships and containment | ||||
| - Roles and Rules | ||||
| 11.2 Advantages and Disadvantages of having the same | 11.2 Advantages and Disadvantages of having the same protocols for EGP | |||
| protocols for EGP and IGP | and IGP | |||
| Inter-domain and intra-domain routing have different targets and | Inter-domain and intra-domain routing have different targets and | |||
| business assumptions. An IGP figures out how each node in the | business assumptions. An IGP figures out how each node in the network | |||
| network gets to every other node in the network in the most | gets to every other node in the network in the most optimal way. In | |||
| optimal way. In this context the word optimal refers to the cost | this context the word optimal refers to the cost of the path measured | |||
| of the path measured by metrics associated with each link in the | by metrics associated with each link in the network. The area of | |||
| network. The area of network infrastructure (primarily routers) | network infrastructure (primarily routers) over which an IGP runs is | |||
| over which an IGP runs is typically under the same technical and | typically under the same technical and administrative control, and it | |||
| administrative control, and it defines the boundary of an AS | defines the boundary of an AS (Autonomous System). The purpose of an | |||
| (Autonomous System). The purpose of an EGP is to allow two | EGP is to allow two different ASs to exchange routing information so | |||
| different ASs to exchange routing information so that data traffic | that data traffic can be forwarded across the AS border. Because an | |||
| AS border router both separates and attaches two different areas of | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | technical and administrative control, the specifications and | |||
| implementations of EGPs include mechanisms for doing policy routing, | ||||
| can be forwarded across the AS border. Because an AS border router | meaning that control can be exerted over which routing information | |||
| both separates and attaches two different areas of technical and | crosses the border between two ASs. EGPs contain features that are | |||
| administrative control, the specifications and implementations of | like metrics in IGPs, but unlike IGPs, the function of an EGP is not | |||
| EGPs include mechanisms for doing policy routing, meaning that | ||||
| control can be exerted over which routing information crosses the | ||||
| border between two ASs. EGPs contain features that are like | ||||
| metrics in IGPs, but unlike IGPs, the function of an EGP is not | ||||
| necessarily to optimize the path that data traffic takes through a | necessarily to optimize the path that data traffic takes through a | |||
| backbone. Having different protocols for EGP and IGP reflects this | backbone. Having different protocols for EGP and IGP reflects this | |||
| difference. | difference. | |||
| However, there is increasing demand in IGP to do policy routing. | However, there is increasing demand in IGP to do policy routing. The | |||
| The shortest path may not be the best path in the light of the | shortest path may not be the best path in the light of the policies. | |||
| policies. Network operators need to have more flexibility in | ||||
| choosing routes for reasons such as load balancing. This means | Davies, et al Expires: January 2002 46 | |||
| both inter-domain routing and intra-domain routing are for the | Network operators need to have more flexibility in choosing routes | |||
| same purpose of choosing the best route according to operators' | for reasons such as load balancing. This means both inter-domain | |||
| own policies. Having the same protocol will emphasize the need to | routing and intra-domain routing are for the same purpose of choosing | |||
| do policy control in IGP. This especially important since the | the best route according to operators' own policies. Having the same | |||
| current IBGP is actually for intra-domain routing | protocol will emphasize the need to do policy control in IGP. | |||
| This comment touches on the fact that the level of manual control | This comment touches on the fact that the level of manual control | |||
| (policy) is much larger in EGP. Why is this so? | (policy) is much larger in EGP. Why is this so? | |||
| EGP: | EGP: | |||
| - Manifests business relations to peers, providers and customers. | ||||
| - Manifests business relations to peers, providers and customers. | - Borders to resources outside of our control. We don't trust others | |||
| to behave well when configuring routing. These resources are also | ||||
| - Borders to resources outside of our control. We don't trust | often be less stable (eg customer access). | |||
| others to behave well when configuring routing. These resources | - Network size extremely large. This gives many updates which means | |||
| are also often be less stable (eg customer access). | we need to have a simple calculation of paths. It also gives an | |||
| extremely large amount of information (due to the network size) | ||||
| - Network size extremely large. This gives many updates which | which gives the need for aggregation. Also we need policy to | |||
| means we need to have a simple calculation of paths. It also | protect our network from receiving bad announcements causing our | |||
| gives an extremely large amount of information (due to the | egress traffic to take the "wrong" way and to avoid sending bad | |||
| network size) which gives the need for aggregation. Also we | announcements attracting the "wrong" traffic. | |||
| need policy to protect our network from receiving bad | ||||
| announcements causing our egress traffic to take the "wrong" | ||||
| way and to avoid sending bad announcements attracting the | ||||
| "wrong" traffic. | ||||
| IGP: | IGP: | |||
| - The network resources are under our control and we trust ourself | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | to behave well (in a sense defined by ourselves) when configuring | |||
| routing. | ||||
| - The network resources are under our control and we trust | - The network resources of today are fairly stable in a backbone | |||
| ourself to behave well (in a sense defined by ourselves) when | ||||
| configuring routing. | ||||
| - The network resources of today are fairly stable in a backbone | ||||
| network. | network. | |||
| - The size of the network is limited. So, the domain is fairly | ||||
| stable which gives a limited number of updates. Limited number of | ||||
| updates gives the option of using processor intensive automation | ||||
| (distributed link state routing). This gives us fast and easy to | ||||
| manage dynamic routing. BUT stability and visibility issues still | ||||
| constrain us from going further down the path of policy routing. | ||||
| - The size of the network is limited. So, the domain is fairly | 11.2.1 The necessity to clearly identify all identities related to | |||
| stable which gives a limited number of updates. Limited number | ||||
| of updates gives the option of using processor intensive | ||||
| automation (distributed link state routing). This gives us fast | ||||
| and easy to manage dynamic routing. BUT stability and | ||||
| visibility issues still constrain us from going further down | ||||
| the path of policy routing. | ||||
| 11.2.1 The necessity to clearly identify all identities related to | ||||
| routing | routing | |||
| As in all other fields, the words used to refer to concepts and to | As in all other fields, the words used to refer to concepts and to | |||
| describe operations about routing are important. Rather than | describe operations about routing are important. Rather than describe | |||
| describe concepts using terms that are inaccurate or rarely used | concepts using terms that are inaccurate or rarely used in the real | |||
| in the real world of networking, an effort is necessitated to use | world of networking, it is necessary to make an effort to use the | |||
| the correct words. Many networking terms are used casually, and | correct words. Many networking terms are used casually, and the | |||
| the result is a partial or incorrect understanding of the | result is a partial or incorrect understanding of the underlying | |||
| underlying concept. Entities such as nodes, interfaces, sub- | concept. Entities such as nodes, interfaces, sub-networks, tunnels, | |||
| networks, tunnels, and the grouping concepts such as ASs, domains, | and the grouping concepts such as ASs, domains, areas, and regions, | |||
| areas, and regions, need to be clearly identified and defined to | need to be clearly identified and defined to avoid mixing from each | |||
| avoid mixing from each other. And even if they are all identified | other. And, even if they are all identified by IP numbers, the | |||
| by IP numbers, the routing entities should know what kind of | routing entities should know what kind of entities they are. | |||
| entities they are. | ||||
| There is also a need to separate identifiers (what or who) from | There is also a need to separate identifiers (what or who) from | |||
| locators (where) from routes (how to reach). One of the problems | locators (where) from routes (how to reach). One of the problems with | |||
| with the current BGP is if there is a topology change, the amount | the current BGP is if there is a topology change, the amount of | |||
| of information circulated is a function of the number of IP | information circulated is a function of the number of IP prefixes | |||
| prefixes being routed. This is a common problem for a distance | ||||
| vector protocol. If the topology information is properly separated | ||||
| from addressing information in a state map, then when a link | ||||
| between two ASs goes down, this is the only information which | ||||
| needs to be advertised, instead of advertising the inability to | ||||
| reach some network prefixes. This example shows the need to | ||||
| separate end node identifiers from routing information. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Davies, et al Expires: January 2002 47 | |||
| being routed. This is a common problem for a distance vector | ||||
| protocol. If the topology information is properly separated from | ||||
| addressing information in a state map, then when a link between two | ||||
| ASs goes down, this is the only information which needs to be | ||||
| advertised, instead of advertising the inability to reach some | ||||
| network prefixes. This example shows the need to separate end node | ||||
| identifiers from routing information. | ||||
| 11.2.2 Map distribution and/or route Distribution | 11.2.2 Map distribution and/or route Distribution | |||
| 11.2.2.1 Map Abstraction | 11.2.2.1 Class of protocol to use | |||
| If every detail is advertised throughout the Internet, there will | BGP4 is an enhanced distance vector protocol, which is the oldest and | |||
| be a lot of information. Scalable solutions requires abstraction. | least sophisticated type of mechanism for distributing routes. It | |||
| would be possible to retain the basic route distribution mechanism | ||||
| but use an improved convergence mechanism such as is described in | ||||
| [34]. | ||||
| - If we summarise too much, some information will be lost on the | Alternatively, it would be possible to move to the more sophisticated | |||
| Map Distribution class of protocol such as PNNI. This has some | ||||
| advantages in that it probably easier to isolate the routing | ||||
| mechanisms on a per domain basis when exchanging information by maps | ||||
| which are a more sophisticated data structure. | ||||
| 11.2.2.2 Map Abstraction | ||||
| If every detail is advertised throughout the Internet, there will be | ||||
| a lot of information. Scalable solutions require abstraction. | ||||
| - If we summarise too much, some information will be lost on the | ||||
| way. | way. | |||
| - If we summarize too little, then more information then required | - If we summarize too little, then more information then required is | |||
| is available contributing to scaling limitations. | available contributing to scaling limitations. | |||
| - One can allow more summarisation, if there also is a mechanism | - One can allow more summarisation, if there also is a mechanism to | |||
| to query for more details within policy limits. | query for more details within policy limits. | |||
| - The basic requirement is not that the information shall be | - The basic requirement is not that the information shall be | |||
| advertised, but that the information shall be available to | advertised, but that the information shall be available to those | |||
| those who need it. (We should not presuppose a solution where | who need it. (We should not presuppose a solution where | |||
| advertising is the only possible mechanism. | advertising is the only possible mechanism.) | |||
| 11.2.3 Robustness and redundancy: | 11.2.3 Robustness and redundancy: | |||
| The routing association between two domains should survive even if | The routing association between two domains should survive even if | |||
| some individual connection between two ASBR routers goes down. | some individual connection between two ASBR routers goes down. | |||
| The "session" should operate between logical "routing entities" on | The "session" should operate between logical "routing entities" on | |||
| each domain side, and not necessarily be bound to individual | each domain side, and not necessarily be bound to individual routers | |||
| routers or IP addresses. Such a logical entity can be physically | or IP addresses. Such a logical entity can be physically distributed | |||
| distributed over multiple network elements. Or it can reside in a | over multiple network elements. Or it can reside in a single router, | |||
| single router, which would default to the current situation. | which would default to the current situation. | |||
| 11.2.4 Hierarchy | ||||
| A more flexible hierarchy with more levels and recursive groupings | Davies, et al Expires: January 2002 48 | |||
| in both upward and downward directions allows more structured | 11.2.4 Hierarchy | |||
| routing. So that no single level will get too big for routers to | ||||
| handle. | ||||
| Note that groupings can look different depending on which aspect | A more flexible hierarchy with more levels and recursive groupings in | |||
| we use to define them. A DiffServ area, a MPLS domain, a trusted | both upward and downward directions allows more structured routing. | |||
| domain, a QoS area, a multicast domain, etc, do not always | The consequence is that no single level will get too big for routers | |||
| coincide. And neither are they strict hierarchical subsets of each | to handle. | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | On the other hand, it appears that the real world Internet is | |||
| becoming less hierarchical, so that it will be increasingly difficult | ||||
| to use hierarchy for scaling control. | ||||
| other. The basic distinction at each level is "this grouping | Note that groupings can look different depending on which aspect we | |||
| versus everything outside". | use to define them. A DiffServ area, a MPLS domain, a trusted domain, | |||
| a QoS area, a multicast domain, etc, do not always coincide. And | ||||
| neither are they strict hierarchical subsets of each other. The basic | ||||
| distinction at each level is "this grouping versus everything | ||||
| outside". | ||||
| Each AS is still independent, and forms the basis for policy | Each AS is still independent, and forms the basis for policy | |||
| decisions. However, is there a need for a higher level aggregation | decisions. However, is there a need for a higher level aggregation | |||
| which is above AS? If yes, who will be responsible for this level? | which is above AS? If yes, who will be responsible for this level? | |||
| Can a network make policy decisions on such aggregated ASs without | Can a network make policy decisions on such aggregated ASs without | |||
| seeing the individual ASs? | seeing the individual ASs? | |||
| 11.3 Introduction of new control mechanisms | 11.3 Introduction of new control mechanisms | |||
| Is it be possible to apply a control theory framework, and analyze | Is it be possible to apply a control theory framework, and analyze | |||
| the stability of the control system of the whole network domain, | the stability of the control system of the whole network domain, for | |||
| for e g speed and the frequency response, and then use the | e.g. convergence speed and the frequency response, and then use the | |||
| results from that analysis to set the timers and other protocol | results from that analysis to set the timers and other protocol | |||
| parameters. | parameters. | |||
| Control theory could also play a part is QoS Routing, by modifying | ||||
| current link state protocols with link costs dependent on load. | ||||
| Control theory is used to increase the stability of such systems. | ||||
| At best, it might be possible to construct a new totally dynamical | ||||
| routing protocol solely on a control theoretic basis as opposed to | ||||
| the current protocols which are based in graph theory and static in | ||||
| nature. | ||||
| 11.4 Robustness | 11.4 Robustness | |||
| Is solution to the Byzantine Generals problem a requirement? What | Is solution to the Byzantine Generals problem a requirement? This is | |||
| are some of the other network robustness issues that must be | problem of reaching a consensus among distributed units if some of | |||
| resolved. | them give misleading answers. The original problem concerns generals | |||
| plotting a coup. Some generals lie about whether they will support a | ||||
| particular plan and what other generals told them. What percentage of | ||||
| liars can a decision-making algorithm tolerate and still correctly | ||||
| determine a consensus? The current intra-domain routing system is, | ||||
| at one level, totally intolerant of misleading information, but the | ||||
| effect of different sorts of misleading or incorrect information has | ||||
| Davies, et al Expires: January 2002 49 | ||||
| vastly varying results, from total collapse after the æsmall Virginia | ||||
| ISPÆ incident through to purely local disconnection of a single AS. | ||||
| This sort of behaviour is not very desirable. | ||||
| What are some of the other network robustness issues that must be | ||||
| resolved? | ||||
| 11.5 VPN Support | 11.5 VPN Support | |||
| Today BGP is also used for VPN and other stuff for example as | Today BGP is also used for VPN and other stuff for example as | |||
| described in RFC2547 | described in RFC2547 | |||
| Internet routing and VPN routing have different purposes, and most | Internet routing and VPN routing have different purposes, and most | |||
| often exchange different information between different devices. | often exchange different information between different devices. Most | |||
| Most Internet routers do not need to know any VPN specific | Internet routers do not need to know any VPN specific information. | |||
| information. The concepts should be clearly separated. | The concepts should be clearly separated. | |||
| But when it comes to the mechanisms, VPN routing can share the | ||||
| same protocol as ordinary Internet routing, it can use a separate | ||||
| instance of the same protocol, or it can use a different protocol. | ||||
| All variants are possible and have their own merits. | ||||
| For example, all the AS Border Routers within one AS participate | But when it comes to the mechanisms, VPN routing can share the same | |||
| in a full-mesh I-BGP process for distributing external IP routes. | protocol as ordinary Internet routing, it can use a separate instance | |||
| At the same time a separate "VPN-routing" protocol can be | of the same protocol, or it can use a different protocol. All | |||
| operating between all the PE routers of some "VPN provider". These | variants are possible and have their own merits. | |||
| PE routers can be located in different ASs, and some of them may | ||||
| also be ASBRs. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | For example, all the AS Border Routers within one AS participate in a | |||
| full-mesh I-BGP process for distributing external IP routes. At the | ||||
| same time a separate "VPN-routing" protocol can be operating between | ||||
| all the PE routers of some "VPN provider". These PE routers can be | ||||
| located in different ASs, and some of them may also be ASBRs. | ||||
| 11.6 End to End Reliability | 11.6 End to End Reliability | |||
| The existing Internet architecture neither requires or provides | The existing Internet architecture neither requires or provides end- | |||
| end-to-end reliability of control information dissemination. For | to-end reliability of control information dissemination. For | |||
| example, in distributing VPN information there is, however, a | example, in distributing VPN information there is, however, a | |||
| requirement for end to end reliability of control information, | requirement for end to end reliability of control information, i.e. | |||
| i.e. the ends of the VPN established need to have a | the ends of the VPN established need to have a acknowledgement of the | |||
| acknowledgement of the success in setting up the VPN. While it | success in setting up the VPN. While it is not necessarily the | |||
| is not necessarily the function of a routing architecture to | function of a routing architecture to provide end-to-end reliability | |||
| provide end-to-end reliability for this kind of purpose, we must | for this kind of purpose, we must be clear that end-to-end | |||
| be clear that end-to-end reliability becomes a requirement if the | reliability becomes a requirement if the network has to support such | |||
| network has to support such reliable control signalling. There | reliable control signalling. There may be other requirements that | |||
| may be other requirements that derive from requiring the FDR to | derive from requiring the FDR to support reliable control signaling. | |||
| support reliable control signaling. | ||||
| Acknowledgements | 12. Acknowledgements | |||
| The authors would like to acknowledge the helpful comments and | The authors would like to acknowledge the helpful comments and | |||
| suggestions of the following individuals: Loa Anderson, Tomas | suggestions of the following individuals: Loa Andersson, Tomas | |||
| Ahlstr÷m, Niklas Borg, Nigel Bragg, Krister Edlund, Owe Grafford, | Ahlstr÷m, Niklas Borg, Nigel Bragg, Thomas Chmara, Krister Edlund, | |||
| Torbj÷rn Lundberg, Jasminko Mulahusic, Bernhard Stockman, Henrik | Owe Grafford, Torbj÷rn Lundberg, Jasminko Mulahusic, Florian-Daniel | |||
| Villf÷r, Tom Worster, Roberto Zamparo,. | Otel Bernhard Stockman, Henrik Villf÷r, Tom Worster, Roberto | |||
| Zamparo,. | ||||
| In addition, the authors are indebted to the folks who wrote all | In addition, the authors are indebted to the folks who wrote all the | |||
| the references we have consulted in putting this paper together. | references we have consulted in putting this paper together. This | |||
| This includes not only the reference explicitly listed below, but | ||||
| those who contributed to the mailing lists we have been | ||||
| participating in for years. | ||||
| References | Davies, et al Expires: January 2002 50 | |||
| includes not only the reference explicitly listed below, but those | ||||
| who contributed to the mailing lists we have been participating in | ||||
| for years. | ||||
| [1] Clark, D., "Policy Routing in Internet Protocols", RFC | 13. References | |||
| 1102, May 1989. | ||||
| [2] Estrin, D., "Requirements for Policy Based Routing in the | [1] Clark, D., "Policy Routing in Internet | |||
| Research Internet", RFC 1125, November 1989. | Protocols", RFC 1102, May 1989. | |||
| [3] Steenstrup, M,. "An Architecture for Inter-Domain Policy | [2] Estrin, D., "Requirements for Policy Based | |||
| Routing", RFC 1478, June 1993 | Routing in the Research Internet", RFC 1125, | |||
| November 1989. | ||||
| [4] Little, M., "Goals and Functional Requirements for Inter- | [3] Steenstrup, M,. ææAn Architecture for Inter- | |||
| Autonomous System Routing", RFC 1126, July | Domain Policy RoutingÆÆ, RFC 1478, June 1993 | |||
| 1989. | ||||
| [5] Perlman, R., "Interconnections Second Edition", 1999, | [4] Little, M., "Goals and Functional Requirements | |||
| Addison Wesley Longman, Inc. | for Inter-Autonomous System Routing", RFC 1126, | |||
| July 1989. | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | [5] Perlman, R., ææInterconnections Second EditionÆÆ, | |||
| 1999, Addison Wesley Longman, Inc. | ||||
| [6] Perlman, R., "Network Layer Protocols with Byzantine | [6] Perlman, R., "Network Layer Protocols with | |||
| Robust-ness", Ph.D. Thesis, Department of | Byzantine Robust-ness", Ph.D. Thesis, Department | |||
| Electrical Engineering and Computer Science, | of Electrical Engineering and Computer Science, | |||
| MIT, August 1988. | MIT, August 1988. | |||
| [7] Castineyra, I., Chiappa, N., Steenstrup, M., "the Nimrod | [7] Castineyra, I., Chiappa, N., Steenstrup, M., | |||
| Routing Architecture", RFC1992, Aug 1996 | ææthe Nimrod Routing ArchitectureÆÆ, RFC1992, Aug | |||
| 1996 | ||||
| [8] Chiappa, N., "IPng Technical Requirements of the Nimrod | [8] Chiappa, N., ææIPng Technical Requirements of the | |||
| Routing and Addressing Architecture", RFC 1753, | Nimrod Routing and Addressing ArchitectureÆÆ, RFC | |||
| Dec 1994 | 1753, Dec 1994 | |||
| [9] Chiappa, N., "A New IP Routing and Addressing | [9] Chiappa, N., ææA New IP Routing and Addressing | |||
| Architecture" | ArchitectureÆÆ | |||
| [10] Wroclowski, J., The Metanet White Paper - Workshop on | [10] Wroclowski, J., The Metanet White Paper - | |||
| Research Directions for the Next Generation | Workshop on Research Directions for the Next | |||
| Internet, 1995 | Generation Internet, 1995 | |||
| [11] Labovitz, C., Ahuja, A., Farnam J., Bose, A., Experimental | [11] Labovitz, C., Ahuja, A., Farnam J., Bose, A., | |||
| Measurement of Delayed Convergence, NANOG | Experimental Measurement of Delayed Convergence, | |||
| NANOG | ||||
| [12] Griffin, T.G., Wilfong, G., An Analysis of BGP Convergence | [12] Griffin, T.G., Wilfong, G., An Analysis of BGP | |||
| Properties, SIGCOMM 1999 | Convergence Properties, SIGCOMM 1999 | |||
| [13] Huston, G., Architectural Requirements for Inter-Domain | [13] Huston, G., Architectural Requirements for Inter- | |||
| Routing in the Internet, Internet Draft ¡ | Domain Routing in the Internet, Internet Draft - | |||
| draft-iab-bgparch-00, Feb 2001, Work in | draft-iab-bgparch-00, Feb 2001, Work in Progress | |||
| Progress | ||||
| [14] Alaettinoglu, C., Jacobson, V. and Yu, H, , Towards | Davies, et al Expires: January 2002 51 | |||
| Milli-Second IGP Convergence, Internet Draft - | ||||
| draft-alaettinoglu-isis-convergence-00, | ||||
| Nov 2000 Work in Progress | ||||
| [15] Sandick, H., Squire, M., Cain, B., Duncan, I., | [14] Alaettinoglu, C., Jacobson, V. and Yu, H, , | |||
| Haberman, B., Fast LIveness Protocol (FLIP), | Towards Milli-Second IGP Convergence, Internet | |||
| Internet Draft - draft-sandiick-flip-00, | Draft - draft-alaettinoglu-isis-convergence-00, | |||
| Feb 2000, Work in Progress | Nov 2000 Work in Progress | |||
| [16] Rosen, E. and Rekhter, Y., BGP/MPLS VPNs, RFC2547, | [15] Sandick, H., Squire, M., Cain, B., Duncan, I., | |||
| March 1999 | Haberman, B., Fast LIveness Protocol (FLIP), | |||
| Internet Draft - draft-sandiick-flip-00, | ||||
| Feb 2000, Work in Progress | ||||
| [17] Clark, D., Chapin, L., Cerf, V., Braden, R., Hobby, R., | [16] Rosen, E. and Rekhter, Y., BGP/MPLS VPNs, | |||
| "towards the Future Internet Architecture", | RFC2547, March 1999 | |||
| RFC1287, December 1991 | ||||
| [18] Jacobson, V., Nichols, K. and Poduri, K., The `Virtual | [17] Clark, D., Chapin, L., Cerf, V., Braden, R., | |||
| Wire' Behavior Aggregate, Internet Draft ¡ | Hobby, R., æætowards the Future Internet | |||
| draft-ietf-diffserv-pdb-vw-00, July 2000, Work | ArchitectureÆÆ, RFC1287, December 1991 | |||
| in Progress | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | [18] Jacobson, V., Nichols, K. and Poduri, K., The | |||
| æVirtual WireÆ Behavior Aggregate, Internet Draft | ||||
| - draft-ietf-diffserv-pdb-vw-00, July 2000, Work | ||||
| in Progress | ||||
| [19] Seddigh, N., Nandy, B., and Heinanen, J., | [19] Seddigh, N., Nandy, B., and Heinanen, J., | |||
| An Assured Rate Per-Domain Behaviour for | An Assured Rate Per-Domain Behaviour for | |||
| Differentiated Services, Internet Draft - | Differentiated Services, Internet Draft - | |||
| draft-ietf-diffserv-pdb-ar-00, Feb 2001, Work | draft-ietf-diffserv-pdb-ar-00, Feb 2001, Work in | |||
| in Progress | Progress | |||
| [20] McPherson, D., Gill, V., Walton, D. and Retana, A., | [20] McPherson, D., Gill, V., Walton, D. and Retana, | |||
| "BGP Persistent Route Oscillation Condition", | A., ææBGP Persistent Route Oscillation | |||
| Internet Draft - draft-mcpherson-bgp-route- | ConditionÆÆ, | |||
| oscillation-00, Dec 2000, Work in Progress | Internet Draft - draft-mcpherson-bgp-route- | |||
| oscillation-00, Dec 2000, Work in Progress | ||||
| [21] Hain, T, "Architectural Implications of NAT", RFC 2993, | [21] Hain, T, ææArchitectural Implications of NATÆÆ, | |||
| November 2000 | RFC 2993, November 2000 | |||
| [22] McPherson, D. and Przygienda, T., OSPF Transient Blackhole | [22] McPherson, D. and Przygienda, T., OSPF Transient | |||
| Avoidance, Internet Draft - draft-mcpherson- | Blackhole Avoidance, Internet Draft - draft- | |||
| ospf-transient-00, July 2000 Work In Progress | mcpherson-ospf-transient-00, July 2000 Work In | |||
| Progress | ||||
| [23] Thaler, D., Estrin, D. and Meyer, D. (editors), Border | [23] Thaler, D., Estrin, D. and Meyer, D. (editors), | |||
| Gateway Multicast Protocol (BGMP): Protocol | Border Gateway Multicast Protocol (BGMP): | |||
| Specification, Internet Draft - draft-ietf- | Protocol Specification, Internet Draft - draft- | |||
| bgmp-spec-02, Nov 2000 Work in progress | ietf-bgmp-spec-02, Nov 2000 Work in progress | |||
| [24] Rosen E. Et al., Multiprotocol Label Switching | [24] Rosen, E. Et al., Multiprotocol Label Switching | |||
| Architecture, RFC 3031 | Architecture, RFC 3031 | |||
| [25] Ashwood-Smith P. Et al., Generalized MPLS - Signaling | [25] Ashwood-Smith, P. Et al., Generalized MPLS - | |||
| Functional Description, Internet Draft ¡ | Signaling Functional Description, Internet Draft | |||
| draft-ietf-mpls-generalized-signaling-01.txt, | - draft-ietf-mpls-generalized-signaling-01.txt, | |||
| Work in progress | Work in progress | |||
| [26] IETF Resource Allocation Protocol working group, | Davies, et al Expires: January 2002 52 | |||
| http://www.ietf.org/html.charters/rap- | ||||
| charter.html | ||||
| [27] IETF Configuration management with SNMP working group, | [26] IETF Resource Allocation Protocol working group, | |||
| http://www.ietf.org/html.charters/snmpconf- | http://www.ietf.org/html.charters/rap- | |||
| charter.html | charter.html | |||
| [28] IETF Policy working group, | [27] IETF Configuration management with SNMP working | |||
| http://www.ietf.org/html.charters/policy- | group, | |||
| charter.html | http://www.ietf.org/html.charters/snmpconf- | |||
| charter.html | ||||
| [29] Yu J., Scalable Routing Design Principles, RFC 2791 | [28] IETF Policy working group, | |||
| http://www.ietf.org/html.charters/policy- | ||||
| charter.html | ||||
| [30] Telcordia Technologies Netsizer web site | [29] Yu J., ææScalable Routing Design PrinciplesÆÆ, | |||
| http://www.netsizer.com/ | RFC 2791 | |||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | [30] Telcordia Technologies Netsizer web site | |||
| http://www.netsizer.com/ | ||||
| Author's Addresses | [31] Inference of Shared Risk Link Groups, | |||
| draft-many-inference-srlg-00.txt, | ||||
| Work in progress | ||||
| [32] Blumenthal, Marjory S. and Clark, David D., | ||||
| Rethinking the design of the Internet: | ||||
| The end to end arguments vs. the brave new world, | ||||
| May 2001, | ||||
| http://ana-www.lcs.mit.edu/anaweb/papers.html | ||||
| [33] Lang et al, Link Management Protocol, | ||||
| draft-lang-mpls-lmp-02.txt, | ||||
| Work in progress | ||||
| [34] Xu, Z., Dai, S. and Garcia-Luna-Aceves, J.J., | ||||
| A More Efficient Distance Vector Routing | ||||
| Algorithm, Proc. IEEE MILCOM 97, Monterey, | ||||
| California, November 2-5, 1997, | ||||
| http://www.cse.ucsc.edu/research/ccrg/ | ||||
| publications/zhengyu.milcom97.pdf | ||||
| [35] Bradner, S. and Mankin, A., "The Recommendation | ||||
| for the IP Next Generation Protocol", RFC 1752, | ||||
| January 1995. | ||||
| [36] ISO/IEC, "Protocol for Exchange of Inter-Domain | ||||
| Routeing Information among Intermediate | ||||
| Systems to support Forwarding of ISO 8473 PDUs", | ||||
| International Standard 10747, | ||||
| ISO/IEC JTC 1,Switzerland 1993 | ||||
| [37] Bates, T., Rekhter, Y., Chandra, R. and Katz, D, | ||||
| ææMultiprotocol Extensions to BGP-4ö, | ||||
| RFC2858, June 2000 | ||||
| Davies, et al Expires: January 2002 53 | ||||
| [38] Berkowitz, H. and Krioukov, D, ææTo Be | ||||
| Multihomed: Requirements and DefinitionsÆÆ, | ||||
| draft-berkowitz-multirqmt-02.txt, | ||||
| Work in progress. | ||||
| [39] Ferguson, P. and Berkowitz, H. ææNetwork | ||||
| Renumbering Overview: Why would I want it and | ||||
| what is it anyway?ÆÆ, RFC2071, January 1997 | ||||
| [40] Berkowitz, H., ææRouter Renumbering GuideÆÆ, | ||||
| RFC2072, January 1997 | ||||
| 14. Author's Addresses | ||||
| Elwyn Davies | Elwyn Davies | |||
| Nortel Networks | Nortel Networks | |||
| London Road | London Road | |||
| Harlow, Essex CM17 9NA, UK | Harlow, Essex CM17 9NA, UK | |||
| Phone: +44-1279-405498 | Phone: +44-1279-405498 | |||
| Email: elwynd@nortelnetworks.com | Email: elwynd@nortelnetworks.com | |||
| Avri Doria | Avri Doria | |||
| Nortel Networks | Nortel Networks | |||
| 600 Technology Park Drive | 600 Technology Park Drive | |||
| Billerica, MA | Billerica, MA, USA | |||
| Phone: +1 978 288 6627 | Phone: +1 978 288 6627 | |||
| Email: avri@nortelnetworks.com | Email: avri@nortelnetworks.com | |||
| Malin Carlzon | Howard Berkowitz | |||
| Royal Institute of Technology | Nortel Networks | |||
| Network Operating Centre | 5012 South 25th St | |||
| KTHNOC | Arlington | |||
| SE-100 44 | VA 22206, USA | |||
| Stockholm, Sweden | Phone: +1 703 998-5819 | |||
| Phone: +46 70 269 6519 | Email: hcb@clark.net/hberkowi@nortelnetworks.com | |||
| Email: malin@sunet.se | ||||
| Anders Bergsten | Dmitri Krioukov | |||
| Telia Research AB | Nortel Networks | |||
| Aurorum 6 | 1st Floor | |||
| S-977 75 Lulea, SWEDEN | 205 van Buren Street | |||
| Phone: +46 920 754 50 | Herndon | |||
| Email: anders.p.bergsten@telia.se | VA 20170, USA | |||
| Phone: +1 703 709 8518 | ||||
| Email: dima@nortelnetworks.com | ||||
| Olle Pers | Davies, et al Expires: January 2002 54 | |||
| Telia Research AB | Malin Carlzon | |||
| Stockholm, SWEDEN | Royal Institute of Technology | |||
| Phone: +46 8 713 8182 | Network Operating Centre | |||
| Email: olle.k.pers@telia.se | KTHNOC | |||
| SE-100 44 | ||||
| Stockholm, Sweden | ||||
| Phone: +46 70 269 6519 | ||||
| Email: malin@sunet.se | ||||
| Yong Jiang | Anders Bergsten | |||
| Telia Research AB | Telia Research AB | |||
| 123 86 Farsta SWEDEN | Aurorum 6 | |||
| Phone: +46 8 713 8125 | S-977 75 Lulea, SWEDEN | |||
| Email: yong.b.jiang@telia.se | Phone: +46 920 754 50 | |||
| Email: anders.p.bergsten@telia.se | ||||
| Internet Draft Future Domain Routing Requirements 2001-02-23 | Olle Pers | |||
| Telia Research AB | ||||
| Stockholm, SWEDEN | ||||
| Phone: +46 8 713 8182 | ||||
| Email: olle.k.pers@telia.se | ||||
| Lenka Carr Motyckova | Yong Jiang | |||
| Div. of Computer | Telia Research AB | |||
| Lulea University of Technology | 123 86 Farsta SWEDEN | |||
| S-971 87 | Phone: +46 8 713 8125 | |||
| Lulea, SWEDEN | Email: yong.b.jiang@telia.se | |||
| Phone: (+46) 920 91769 | ||||
| Email: lenka@sm.luth.se | ||||
| Pierre Fransson | Lenka Carr Motyckova | |||
| Div. of Computer | Div. of Computer | |||
| Lulea University of Technology | Lulea University of Technology | |||
| S-971 87 | S-971 87 | |||
| Lulea, SWEDEN | Lulea, SWEDEN | |||
| Phone: (+46) 70 646 0384 | Phone: (+46) 920 91769 | |||
| Email: pierre@cdt.luth.se | Email: lenka@sm.luth.se | |||
| Olov Schelen | Pierre Fransson | |||
| Div. of Computer | Div. of Computer | |||
| Lulea University of Technology | Lulea University of Technology | |||
| S-971 87 | S-971 87 | |||
| Lulea, SWEDEN | Lulea, SWEDEN | |||
| Phone: (+46) 70 536 2030 | Phone: (+46) 70 646 0384 | |||
| Email: Olov.Schelen@cdt.luth.se | Email: pierre@cdt.luth.se | |||
| Olov Schelen | ||||
| Div. of Computer | ||||
| Lulea University of Technology | ||||
| S-971 87 | ||||
| Lulea, SWEDEN | ||||
| Phone: (+46) 70 536 2030 | ||||
| Email: Olov.Schelen@cdt.luth.se | ||||
| Davies, et al Expires: January 2002 55 | ||||
| Tove Madsen | ||||
| Utfors Bredband AB | ||||
| R…sundav„gen 12 | ||||
| P.O. Box 525 | ||||
| SE-169 29 Solna | ||||
| Sweden | ||||
| Phone: +46 (8) 5270 5040 | ||||
| Email: tove.madsen@utfors.se | ||||
| Davies, et al Expires: January 2002 56 | ||||
| End of changes. 484 change blocks. | ||||
| 1744 lines changed or deleted | 2152 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||