SlideShare a Scribd company logo
1 of 46
Download to read offline
© John Day, 2013 1	

Rights Reserved	

The Pouzin Society	

We Got Trouble!
Right Here in River City
With a capital T and that Rhymes with P
and That Stands for IP!	

John Day	

Jan 2013	

It doesn’t have to make sense. It’s religion!	

- Robbie Coltrane	

Nuns on the Run
© John Day, 2013 2	

Rights Reserved	

The Pouzin Society	

As the Song Says	

•  Most of our Troubles start with IP	

•  And the Lack of a Complete Addressing Structure	

•  To Understand Why this is the case, we need to go back in
time, back to . . .
© John Day, 2013 3	

Rights Reserved	

The Pouzin Society	

Addressing in the ARPANET
The Root Cause of our Problems	

IMP	

56K Trunk	

56K Trunk	

56K Trunk	

56K Trunk	

Host	

Host	

Host	

Host	

Each ARPANet IMP (switch) had ports to support a maximum of 4 trunks and 4 hosts.	

Each IMP had a number. The host address (IP address) was the IMP # and the	

Host #, i.e. a port number. Maximum number of hosts was huge: 63.	

So a host’s address was its IMP Port Number.
© John Day, 2013 4	

Rights Reserved	

The Pouzin Society	

Was There a Reason?	

Was there a lot of thought given to how addressing should work?	

Not really. 	

We were doing good to do this much!	

There were many much bigger problems to overcome:	

Like just moving data	

And addressing is a hard problem.	

Sure	

It was easy to build for an experimental network of this size.
© John Day, 2013 5	

Rights Reserved	

The Pouzin Society	

Did it take long to realize	

there was a problem?	

IMP	

14	

IMP	

20	

14, 1	

 20, 3	

Host	

Nope.	

First time (~ 1972) one of the Air Force bases took us at our word that the network 	

was suppose to be survivable and asked for links to two different IMPs	

to connect its host to the Network.	

Naming the hosts by the names of their interfaces	

meant that the two connections looked like two hosts to the Net.	

Still does.
© John Day, 2013 6	

Rights Reserved	

The Pouzin Society	

Address Spaces in Operating Systems
(From my OS Course)	

An name space is defined as a set of identifiers with a given scope.	

An address space is a location-dependent name space.	

In Operating Systems, we have found a need for 3 such independent spaces.	

Virtually all uses of names in computing are for locating.	

Application Name Space
Logical Name Space	

Physical Name Space	

Human use, relatively constant,
not at all tied to the hardware,
i.e. location-independent	

Location Dependent but Hardware
Independent; Creates a logical address
space larger than the physical memory;
Allows processes to be re-locatable. 	

Location-Dependent and
Hardware Dependent
© John Day, 2013 7	

Rights Reserved	

The Pouzin Society	

Saltzer’s View of Networks	

•  Application names map to node addresses.	

•  Node addresses map to points of attachment addresses.	

•  Routes are sequences of points of attachments.	

–  Just as in an operating system.	

–  But networks are more general than operating systems.	

Application Name	

Node	

Address	

Point of Attachment	

Address
© John Day, 2013 8	

Rights Reserved	

The Pouzin Society	

Generalizing Saltzer to Networks of Networks	

•  Directory maintains the mapping between Application-Names and the node
addresses of all Applications reachable without an application relay.	

•  Routes are sequences of node addresses used to compute the next hop.	

•  Node to point of attachment mapping for all nearest neighbors to choose path
to next hop. (Even though Saltzer notices this, he is too intent to see that networks are a
more general case.)	

•  This last mapping and the Directory are the same: 	

–  Mapping of a name in the layer above to a name in the layer below of all nearest neighbors.	

Directory	

Route	

Path	

Here	

And
Here
© John Day, 2013 9	

Rights Reserved	

The Pouzin Society	

Applying Results to Real Architectures: The Internet
(This is a Network Architecture)	

•  The most striking feature is that half of the addressing architecture is missing.	

–  No wonder there are addressing problems.	

–  The only identifier we have for anything is the IP address.	

•  There are no node addresses and no application names.	

–  And the point of attachment is named twice!	

–  If this is an Internet Protocol, where are the Network Addresses? (Lost Layer)	

–  Domain Names are synonyms for IP addresses. URLs name a path to an arbitrary
instance of an application.	

MAC Address	

IP Address	

Socket (local)	

Application	

Application	

Name	

Node Address	

Point of Attachment	

Address	

As if your computer worked only with absolute memory addresses.
© John Day, 2013 10	

Rights Reserved	

The Pouzin Society	

There is An Easier Way to See It.	

•  Route on the address in your layer!	

–  Well, duh!	

–  Routing on the Interface is routing on the address in the layer below.	

•  Learned a couple of other things along the way	

–  Addresses only need to be unique within the scope of a layer	

–  Addresses must generally be assigned by the network because it is the
only one that knows where in the network the node is.	

–  Don’t concatenate an (N)-address with an (N-1) address.	

Physical	

Data Link
Network	

Transport	

Application
Host or End System	

Router	

Points of	

attachment	

Nodes
© John Day, 2013 11	

Rights Reserved	

The Pouzin Society	

If This Were an Internet Architecture, Then	

•  There would be multiple Data Link Layers with limited scope.	

•  Network Layers with greater scope that did intra-domain routing	

•  Internet Layer with greater scope yet that did intra-domain routing.	

•  Network Layer addresses would be interface addresses for the Internet
nodes.	

•  That brings us to the first Internet [sic] addressing crisis.	

Internet Gateways
Data Link
Network
Internet
Application
Data Link
Network
Internet
Application
Net 1 Net 2 Net 3
Host Host
© John Day, 2013 12	

Rights Reserved	

The Pouzin Society	

The First Great Internet Addressing Crisis	

•  In 1992, we have the first addressing crisis.	

–  IPv4 addresses are getting scarce	

•  But the real problem is Router Table Size is increasing exponentially.	

•  The IAB convenes the ROAD process	

–  Recommends CLNP as IPv7	

•  Basically IP with variable length aggregateable addresses.	

•  CLNP names the node. Hence, fixes the multihoming problem.	

•  The IETF goes berserk!	

–  No OSI, no way, no how!	

•  A model? We don’t need no stinking model. We’ve got	

•  Rough Consensus and Running Code!
© John Day, 2013 13	

Rights Reserved	

The Pouzin Society	

The IPng Process	

•  The Rules were:	

–  Fixed Length Address	

–  Continue to Name the Interface.	

–  At least 20 octets of address	

–  Open Standard	

•  Violá! IPv6!	

•  or anything but CLNP.	

•  Still no solution to multihoming	

–  Problem is now 20 years old
© John Day, 2013 14	

Rights Reserved	

The Pouzin Society	

All is Not Well	

•  Less than a Year later, light dawns (slightly)!	

–  Name the Interface, but route aggregation is a must	

–  Implies provider based assignment. 	

–  Means change providers, must renumber. WHAT!?	

•  Kind of shot yourself in the foot, eh?	

•  Transition is dual stack with a NAT	

–  Once you have a NAT, you don’t need v6 . . . oops.	

•  How many feet do you have?
© John Day, 2013 15	

Rights Reserved	

The Pouzin Society	

Techs Play Architect	

•  Finally around 2000, need to deal with multihoming, but	

–  given negative reaction to naming the node, need a workaround	

•  Ahh! The problem is that we have been overloading the semantics of
the IP address with location and identifier information.	

–  We need to split them. Loc/id split is the Answer.	

–  A locator we can route on and a flat endpoint id (EID)	

•  Psssst! Can’t identify something without locating it and vice versa	

–  Saltzer [1977] defines “resolve” as in “resolving a name” as “to locate an object in a
particular context, given its name.”
•  Got another foot?	

•  Don’t bother me with pedantic terminology, 	

–  IPv6 is the future!
© John Day, 2013 16	

Rights Reserved	

The Pouzin Society	

Trouble is Not Much Interest in v6	

•  It offers no benefit to those who pay for adopting it	

–  They just don’t know they want it.	

•  For the next decade, there is the hype:	

–  Better security, better QoS, better mobility	

–  “A desert topping and a floor wax!” - Mike O’Dell	

•  In fact, all of these are the same as IPv4 . . . no different	

•  “IPv6 has all the benefit of a minor technology change with all the
disruption of a major fork-lift upgrade.” - Geoff Huston, 2008.	

–  Just switch to v6 and all will be well.	

•  By 2000, dawning awareness the architecture is running out of steam	

–  NEWARCH, Clean Slate, FIND and GENI are hot!	

–  Starts to be a lot of talk about loc/id split.	

–  This is clearly the answer . . . . (really?).
© John Day, 2013 17	

Rights Reserved	

The Pouzin Society	

Houston, We Have a Problem
(The Second Great Internet Addressing Crisis)	

•  October 2006, major presentation at IEPG. 	

–  Router table size is on the increase, due to multihoming. 	

•  It is either quadratic or exponential, can’t tell yet.	

–  (does it matter!?)	

–  Moore’s Law won’t bail us out this time.	

•  This is a big time crisis. We are in big trouble.	

•  If not fixed, it is the end of the Internet as we know it.	

–  Net will fragment. Costs in the core will skyrocket.	

–  NetworkWorld sits on the story for a year.	

–  Tons of papers written on loc/id split!
© John Day, 2013 18	

Rights Reserved	

The Pouzin Society	

But We Do Multihoming!
(not really)	

•  We kludge it.	

•  Because we route on the interface, this forces route aggregation to be
provider-based.	

–  Addresses with a common prefix go to the same provider then we can
store a single route (to the provider) rather than a route for every address
on that provider.	

•  To do multihoming, must assign provider-independent addresses or
new AS numbers (same thing).	

–  Can’t be aggregated Router table size increases	

–  Remember what our problem is? Router table size is increasing
© John Day, 2013 19	

Rights Reserved	

The Pouzin Society	

So Why Wasn’t It Fixed?	

•  Odd that a DoD network touted to survive nuclear attack didn’t
support redundant links. Lots of “good reasons:”	

–  Not that many hosts need to be multi-homed.	

•  Not then, but the ones that did were the ones everyone wanted to get to.	

–  Not everyone should have to bear the cost for a few.	

•  Classic committee politics: Put a condition on the solution that
guarantees any proposal will be rejected (asymmetry in this case)	

•  Also assumes there is a cost.	

–  Multihoming will be to different providers, so no point.	

•  Assumption is wrong and even if right assumes a static network.	

–  Remember, we tried to fix it but it was rejected by the IETF.
© John Day, 2013 20	

Rights Reserved	

The Pouzin Society	

But By This Time	

•  Cisco and others start proposing solutions to the multihoming problem.	

–  Mostly requiring patches involving NATs and a bevy of new protocols.	

–  In particular, LISP or Loc/ID Split Protocol	

•  This makes everyone nervous, but what else to do?	

•  Well, we could work out a theoretical framework to see what is going on.	

•  This is a crisis! We have to build something!	

•  Best way known to stampede people to your view.
© John Day, 2013 21	

Rights Reserved	

The Pouzin Society	

November 2008
Houston, We have a Bigger Problem	

•  Dave Meyer calls, ‘I have an “architectural issue” to discuss.’	

–  He has come across two problems in implementing LISP.	

–  Both require doing path discovery.	

–  Path discovery doesn’t scale. 	

–  LISP won’t scale. QED	

–  He suspects that any loc/id approach will have the same problem.	

•  draft-meyer-loc-id-implications-01.txt	

•  In case you didn’t notice, we just went to DefCon1	

•  Dave: Why hasn’t anyone noticed this in the last 15 years?
© John Day, 2013 22	

Rights Reserved	

The Pouzin Society	

Dave is Right	

•  All proposals based on loc/id split have the same flaw.	

•  Once put in the context of the RINA theory, it is obvious.	

•  Let us look at it very carefully. What do the locator and the identifier
name?	

Endpoint Identifier	

Locators	

The Locator Locates the Wrong Thing!	

The locator is part of the path, not the final destination.	

No wonder Dave ran into path discovery issues.
© John Day, 2013 23	

Rights Reserved	

The Pouzin Society	

Apply the e2e principle!
(the answer to everything)
Solve the Problem in the Hosts	

•  There are poor misguided souls claiming this.	

–  Mostly done by changing the definition of multihoming.	

–  Ignore that it might take seconds if not minutes to do the failover.	

•  Remember the fundamental problem is that the network doesn’t know
that two paths go to the same place.	

–  This is a problem of delivering, not sending.	

–  There is no host-based solution.	

•  There is no solution as long as one routes only on the interface address.
Which means . . .
© John Day, 2013 24	

Rights Reserved	

The Pouzin Society	

If Loc/ID Doesn’t Scale	

•  Then there is no solution involving routing on the interface that scales.	

•  In other words,	

•  But we saw that coming a long time ago.	

IP is Fundamentally Flawed	

(v4 or v6)
© John Day, 2013 25	

Rights Reserved	

The Pouzin Society	

So What Is the IETF Plan B?	

•  Plan A	

•  What are the major Universities working on?	

•  Plan A	

•  What are the vendors working on?	

•  Plan A . . . . Still?	

•  Talk about scary, there was a summit in the Spring of 2009 to discuss the addressing crisis	

•  The agenda: to determine what form of loc/id split to use! 	

–  It is important to get those deck chairs lined up very neatly.
© John Day, 2013 26	

Rights Reserved	

The Pouzin Society	

What Do the Vendors Say?	

•  Yes, there may be some scaling issues with loc/id split.	

•  But we recommend using it, they are very unlikely to ever be a problem.	

•  You mean unlikely as in “it is very unlikely a lot of people will default
on home mortgages”?	

–  (we know where that went)	

•  Don’t worry! It won’t happen very often, only in a crisis.	

A Black Swan?
© John Day, 2013 27	

Rights Reserved	

The Pouzin Society	

But Everything Works Fine!	

•  Yes and it will for a few more years.	

•  When you notice it, it means we are already over the cliff. 	

 	

	

 	

 	

Vince Fuller, Cisco.	

“Has he vertigo? 	

No, only about	

ten stories more!”	

- Ogden Nash
© John Day, 2013 28	

Rights Reserved	

The Pouzin Society	

Wanna Hear the Real P*sser?	

•  We had the right answer in 1992.	

•  The answer we had known since 1972.	

–  It was rejected by the IETF.	

•  And to add insult to injury, it was DEPLOYED and Operational in the
routers.	

–  We could have spent the last 15 years working on transition	

–  Rather than 100s of millions on a small incremental step that provides no
benefit to your bottom line and is fundamentally flawed.	

–  You just can’t make this stuff up!
© John Day, 2013 29	

Rights Reserved	

The Pouzin Society	

The Problem was Never Separating Locator from Identifier. 
It was always about
Separating Logical Location from Physical Location	

•  It is impossible to locate something without also identifying it.	

•  This pseudo-problem arises from not having a complete address architecture.	

–  And creates enough epicycles upon epicycles to make Clavius proud	

•  But we will give O’Dell the last word:	

–  When all you have is a hammer, everything looks like your thumb	

•  It is still more like DOS than anything else.	

Location dependent,	

Route independent	

Route Dependent	

Location	

Independence	

Application Name Space
Logical Name Space	

Physical Name Space	

Application Names	

Node Address 	

Point of Attachment
© John Day, 2013 30	

Rights Reserved	

The Pouzin Society	

Addressing In RINA	

•  All identifiers are based on the nature of the application
process or in this case, the IPC Process.	

•  First, lets look in brief:
© John Day, 2013 31	

Rights Reserved	

The Pouzin Society	

Applications and Communication	

•  The Application-Entity (AE) is that part of the application concerned
with communication, i.e. shared state with its peer.	

•  The rest of the Application Process is concerned with the reason for
the application in the first place.	

•  An Application Process may have multiple AEs, they assumed, for
different application protocols.	

–  An HTTP library linked into a web browser is an AE; FTP is another.	

Application
Process
Application-Entities
© John Day, 2013 32	

Rights Reserved	

The Pouzin Society	

Application Naming	

•  Application-process names (APN) are globally unambiguous and location-independent,
but system-dependent.	

–  They may have synonyms of less scope from the same or different name space.	

–  There may be multiple instances of the process in the same system.	

•  APN-instance-identifiers are unambiguous within the scope of the Application Process.	

•  Application-entity-identifiers are unambiguous within the application process.	

–  There may be more than one Application-entity (AE) in a process.	

•  Unambiguous within the scope of the Application Process.	

–  There may be more than one instance of each type of Application-Entity.	

•  AE-instance-identifiers are unambiguous within the scope of the AE.	

•  Distributed Application Name is the name of a set of application processes and system-
independent.	

•  Few applications need all of these but a complete theory requires all of them.	

Application
Process
Application-Entities
© John Day, 2013 33	

Rights Reserved	

The Pouzin Society	

What Good is All This?	

•  Many capabilities not possible today or that require specific protocols
are a consequence of naming and enabled by a complete architecture.	

–  Handing off a connection from one system to another;	

–  The need to pass IP addresses among applications is avoided;	

–  Opening multiple connections with different “protocols” to the same
instance of an application process.	

–  Connecting to an existing “conference” call, etc.	

–  And probably 1000s of things we haven’t thought of yet.	

Application
Process
Application-Entities
© John Day, 2013 34	

Rights Reserved	

The Pouzin Society	

Naming in RINA	

•  IPC Process-name is just an application-process-name	

–  An address is a synonym that names an IPC Process with scope restricted to the
DIF and maybe structured to facilitate use within the DIF.	

•  A port-id is a Flow-Allocator-Instance-Id, an AE instance.	

•  A connection-endpoint-id (CEP-id) is an EFCP-instance-id, an AE instance.	

•  Note that these are local to the IPC Process.	

•  A connection-id is created by concatenating source and destination CEP-ids.	

•  That’s It! 	

IPC Management Common Application
Protocol
Resource Allocation
RIB Daemon
IRM
IDD	

RMT
EFCP
Flow Allocator
IPC Process
© John Day, 2013 35	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(Basics)	

•  We have made a big deal of node and point of attachment, but they are
relative, not absolutes.	

–  An (N)-IPC-Process is a node in the (N)-DIF.	

•  An (N-1)-IPC-Process is a node in the (N-1)-DIF	

–  An (N-1)-IPC-Process is a point of attachment to an (N)-IPC-Process.	

–  An (N)-address is a synonym for an (N)-IPC-Process.	

•  So as long as we keep that straight, there is no point to making the distinction.	

•  Note that it is the port-id that creates layer independence. With a port-id, No
Protocol-Id Field is Necessary, or if there is such a field something is wrong.	

Address	

Port -id	

(N)-IPC-Process	

(N-1)-IPC-Process
© John Day, 2013 36	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(Multihoming)	

•  Yea, so? What is the big deal?	

–  It just works	

•  PDU arrives at the (N-1)-IPC Process. If the address designates this IPC
Process, the CEP-id is bound to the port-id, so after stripping off (N-1)-PCI, it
passes it up. 	

•  The process repeats. If the address in the (N)-PCI is this IPC-Process, it looks
at the CEP-id and pass it up as appropriate.	

•  Normal operation. Yes, the (N-1)-bindings may fail from time to time.	

•  Not a big deal.	

Address	

Port -id	

(N)-IPC-Process	

(N-1)-IPC-Process
© John Day, 2013 37	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(Mobility)	

•  Yea, so? What is the big deal?	

–  It just works just like multihoming only the (N-1)-port-ids come and go a
bit more frequently.	

•  O, worried about having to change address if it moves too far? Easy.	

•  Assign a new synonym to it. Put it in the source address field on all outgoing
traffic. Stop advertising the old address as a route to this IPC-Process.	

•  Want to renumber the DIF for some reason? Same procedure.	

•  Again, no special cases. No special protocols. No concept of a home
router. Okay, policies in the DIF may be a bit different to
accommodate faster changing points of attachment, but that is it.	

Address	

Port -id	

(N)-IPC-Process	

(N-1)-IPC-Process	

New Address
© John Day, 2013 38	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names 
(Routing Table Size)	

•  Recursion either reduces the number of routes or shortens them.	

Backbone	

Regionals	

Metros
© John Day, 2013 39	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names 
(Routing Table Size)	

•  For the Internet O((6r)2 where r is the number of routers in the network.	

Non-topological T opological
Metros-DIF 3 O ( ( 2 D n)2
) O ( ( D m)2
) where n is the number of hosts
and m is the number of hosts
and border routers on a single
subnet.
Regionals-DIF 2 O((2Dn2)2
) O ( ( D m2)2
) where n2 is the number of
border routers around the
outside and m2 is number of
border routers at this level on a
single subnet.
Backbone-DIF 1 O((2Dn1)2
) O ( ( 2 D n1)2
) where n1 is the number of
border routers on the backbone.
Note that m  n.
© John Day, 2013 40	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names 
(Choosing a Layer)	

•  In building the IPC Model, the first time there were multiple DIFs (data
link layers in that case), to maintain the API a task was needed to
determine which DIF to use. 	

I
A
P
D
i
r
Mux	

Flow	

Mgr	

– 	

User didn’t have to see all of the wires	

–  But the User shouldn’t have to see all of the “Nets” either.	

•  This not only generalizes but has major implications.
© John Day, 2013 41	

Rights Reserved	

The Pouzin Society	

Implications of the Model  Names
(An Inter-DIF-Directory)	

•  Inter-DIF Manager determines via what DIFs applications are available.	

–  If this system is a not member, it either joins the DIF as before	

–  or creates a new one.	

•  Which Implies that the largest address space has to be only large enough
for the largest e-mall.	

•  Given the structure, 32 or 48 bits is probably more than enough.	

•  You mean?	

•  Right. IPv6 was a waste of time . . .	

•  Twice.	

Inter-DIF	

Dir
© John Day, 2013 42	

Rights Reserved	

The Pouzin Society	

So a Global Address Space is Not Required but
Neither is a Global Application Name Space	

Inter-DIF	

Directory	

To Peers	

In Oher DIFs	

Actually one could still have distinct names spaces within a
DIFs (synonyms) with its own directory database.	

•  Not all names need be in one Global Directory.	

•  Coexisting application name spaces and directory of distributed
databases are not only possible, but useful.	

•  Needless to say, a global name space can be useful, but not a
requirement imposed by the architecture.	

•  The scope of the name space is defined by the chain of databases that
point to each other.
© John Day, 2013 43	

Rights Reserved	

The Pouzin Society	

Scope is Determined by the
Chain of Places to Look	

•  The chain of databases to look for names determines the
scope of the name space.	

–  Here there are 2 non-intersecting chains of systems, that could be
using the same wires, but would be entirely oblivious to the other.
© John Day, 2013 44	

Rights Reserved	

The Pouzin Society	

Multicast and Anycast are Simpler Too	

•  Generalized to Whatevercast:	

–  A set and a rule that returns as many members of the set that satisfy the
rule.	

•  Unicast becomes a degenerate case of whatevercast.	

–  Forwarding table entry maps Destination Address to a list of next hops.
For unicast, the list has one element.	

•  Primarily handled by hosts or border routers, where all whatevercast
traffic is either:	

•  On this subnet (only do spanning tree within subnet if there is a lot) or	

•  Transit to another subnet, (both cases degenerate to point-to-point).	

•  So we see Whatevercast devolves into Unicast.
© John Day, 2013 45	

Rights Reserved	

The Pouzin Society	

Multicast and Anycast are Simpler Too	

•  Information in topological addresses imply an approximate spanning
tree, which can be used to identify the border routers. Thus, in most
cases obviating the need for a separate spanning tree (multicast)
routing algorithm.	

•  And also making it straightforward to multiplex whatevercasts with
common sub-trees which will allow even greater efficiency.	

–  Note that the common sub-trees do not have to be strict sub-trees but
simply have a reasonable degree of commonality to be worthwhile.
© John Day, 2013 46	

Rights Reserved	

The Pouzin Society	

As I said At the Beginning	

What’s All the Fuss? ;-)	

Questions?

More Related Content

Similar to 3 addressingthe problem130123

RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014Eleni Trouva
 
How it works internet networking icann53
How it works internet networking icann53How it works internet networking icann53
How it works internet networking icann53ICANN
 
RINA Introduction, part I
RINA Introduction, part IRINA Introduction, part I
RINA Introduction, part IICT PRISTINE
 
6 security130123
6 security1301236 security130123
6 security130123ARCFIRE ICT
 
In Defence of NATs
In Defence of NATsIn Defence of NATs
In Defence of NATsAPNIC
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115ARCFIRE ICT
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networksSabarishSanjeevi
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
The Internet
The InternetThe Internet
The Internetajf0310
 
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdfHow is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdffsenterprises
 
IPv6 Connectivity: Why does my organization need it?
IPv6 Connectivity: Why does my organization need it?IPv6 Connectivity: Why does my organization need it?
IPv6 Connectivity: Why does my organization need it?SwiftTech Solutions, Inc.
 
OSI ModelMany people use expressions or sentences to remember th.docx
OSI ModelMany people use expressions or sentences to remember th.docxOSI ModelMany people use expressions or sentences to remember th.docx
OSI ModelMany people use expressions or sentences to remember th.docxMARRY7
 

Similar to 3 addressingthe problem130123 (20)

Vtc keynote201110
Vtc keynote201110Vtc keynote201110
Vtc keynote201110
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
 
Pace IT - Introduction to IPv6
Pace IT - Introduction to IPv6Pace IT - Introduction to IPv6
Pace IT - Introduction to IPv6
 
RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014
 
How it works internet networking icann53
How it works internet networking icann53How it works internet networking icann53
How it works internet networking icann53
 
RINA Introduction, part I
RINA Introduction, part IRINA Introduction, part I
RINA Introduction, part I
 
Computing powerpoint
Computing powerpointComputing powerpoint
Computing powerpoint
 
6 security130123
6 security1301236 security130123
6 security130123
 
In Defence of NATs
In Defence of NATsIn Defence of NATs
In Defence of NATs
 
4 addressing theory130115
4 addressing theory1301154 addressing theory130115
4 addressing theory130115
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
What is IPv6?
What is IPv6?What is IPv6?
What is IPv6?
 
Micheal O'Foghlu - TSSG
Micheal O'Foghlu - TSSGMicheal O'Foghlu - TSSG
Micheal O'Foghlu - TSSG
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
The Internet
The InternetThe Internet
The Internet
 
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdfHow is the transition between IPv4 and IPv6 being handled Is it bei.pdf
How is the transition between IPv4 and IPv6 being handled Is it bei.pdf
 
An IPv6 Primer
An IPv6 PrimerAn IPv6 Primer
An IPv6 Primer
 
IPv6 Connectivity: Why does my organization need it?
IPv6 Connectivity: Why does my organization need it?IPv6 Connectivity: Why does my organization need it?
IPv6 Connectivity: Why does my organization need it?
 
The internet
The internetThe internet
The internet
 
OSI ModelMany people use expressions or sentences to remember th.docx
OSI ModelMany people use expressions or sentences to remember th.docxOSI ModelMany people use expressions or sentences to remember th.docx
OSI ModelMany people use expressions or sentences to remember th.docx
 

More from ARCFIRE ICT

Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay NetworkingMulti-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay NetworkingARCFIRE ICT
 
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...ARCFIRE ICT
 
Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...ARCFIRE ICT
 
Design Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi LinksDesign Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi LinksARCFIRE ICT
 
One of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedOne of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedARCFIRE ICT
 
Unifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelUnifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelARCFIRE ICT
 
First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?ARCFIRE ICT
 
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...ARCFIRE ICT
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016ARCFIRE ICT
 
Distributed mobility management and application discovery
Distributed mobility management and application discoveryDistributed mobility management and application discovery
Distributed mobility management and application discoveryARCFIRE ICT
 
Mobility mangement rina iwcnc
Mobility mangement rina   iwcncMobility mangement rina   iwcnc
Mobility mangement rina iwcncARCFIRE ICT
 
5 mngmt idd130115
5 mngmt idd1301155 mngmt idd130115
5 mngmt idd130115ARCFIRE ICT
 
5 mngmt idd130115jd
5 mngmt idd130115jd5 mngmt idd130115jd
5 mngmt idd130115jdARCFIRE ICT
 
Rumba CNERT presentation
Rumba CNERT presentationRumba CNERT presentation
Rumba CNERT presentationARCFIRE ICT
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentationARCFIRE ICT
 
4. Clearwater on rina
4. Clearwater on rina4. Clearwater on rina
4. Clearwater on rinaARCFIRE ICT
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefitsARCFIRE ICT
 
2. RINA overview - TF workshop
2. RINA overview - TF workshop2. RINA overview - TF workshop
2. RINA overview - TF workshopARCFIRE ICT
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF WorkshopARCFIRE ICT
 

More from ARCFIRE ICT (20)

Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay NetworkingMulti-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
Multi-operator "IPC" VPN Slices: Applying RINA to Overlay Networking
 
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
Error and Flow Control Protocol (EFCP) Design and Implementation: A Data Tran...
 
Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...Large-scale Experimentation with Network Abstraction for Network Configuratio...
Large-scale Experimentation with Network Abstraction for Network Configuratio...
 
Design Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi LinksDesign Considerations for RINA Congestion Control over WiFi Links
Design Considerations for RINA Congestion Control over WiFi Links
 
One of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedOne of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB Distributed
 
Unifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA modelUnifying WiFi and VLANs with the RINA model
Unifying WiFi and VLANs with the RINA model
 
First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?First Contact: Can Switching to RINA save the Internet?
First Contact: Can Switching to RINA save the Internet?
 
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
Experimenting with Real Application-specific QoS Guarantees in a Large-scale ...
 
Exp3mq
Exp3mqExp3mq
Exp3mq
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
 
Distributed mobility management and application discovery
Distributed mobility management and application discoveryDistributed mobility management and application discovery
Distributed mobility management and application discovery
 
Mobility mangement rina iwcnc
Mobility mangement rina   iwcncMobility mangement rina   iwcnc
Mobility mangement rina iwcnc
 
5 mngmt idd130115
5 mngmt idd1301155 mngmt idd130115
5 mngmt idd130115
 
5 mngmt idd130115jd
5 mngmt idd130115jd5 mngmt idd130115jd
5 mngmt idd130115jd
 
Rumba CNERT presentation
Rumba CNERT presentationRumba CNERT presentation
Rumba CNERT presentation
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentation
 
4. Clearwater on rina
4. Clearwater on rina4. Clearwater on rina
4. Clearwater on rina
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefits
 
2. RINA overview - TF workshop
2. RINA overview - TF workshop2. RINA overview - TF workshop
2. RINA overview - TF workshop
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 

Recently uploaded

best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 

Recently uploaded (20)

best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

3 addressingthe problem130123

  • 1. © John Day, 2013 1 Rights Reserved The Pouzin Society We Got Trouble! Right Here in River City With a capital T and that Rhymes with P and That Stands for IP! John Day Jan 2013 It doesn’t have to make sense. It’s religion! - Robbie Coltrane Nuns on the Run
  • 2. © John Day, 2013 2 Rights Reserved The Pouzin Society As the Song Says •  Most of our Troubles start with IP •  And the Lack of a Complete Addressing Structure •  To Understand Why this is the case, we need to go back in time, back to . . .
  • 3. © John Day, 2013 3 Rights Reserved The Pouzin Society Addressing in the ARPANET The Root Cause of our Problems IMP 56K Trunk 56K Trunk 56K Trunk 56K Trunk Host Host Host Host Each ARPANet IMP (switch) had ports to support a maximum of 4 trunks and 4 hosts. Each IMP had a number. The host address (IP address) was the IMP # and the Host #, i.e. a port number. Maximum number of hosts was huge: 63. So a host’s address was its IMP Port Number.
  • 4. © John Day, 2013 4 Rights Reserved The Pouzin Society Was There a Reason? Was there a lot of thought given to how addressing should work? Not really. We were doing good to do this much! There were many much bigger problems to overcome: Like just moving data And addressing is a hard problem. Sure It was easy to build for an experimental network of this size.
  • 5. © John Day, 2013 5 Rights Reserved The Pouzin Society Did it take long to realize there was a problem? IMP 14 IMP 20 14, 1 20, 3 Host Nope. First time (~ 1972) one of the Air Force bases took us at our word that the network was suppose to be survivable and asked for links to two different IMPs to connect its host to the Network. Naming the hosts by the names of their interfaces meant that the two connections looked like two hosts to the Net. Still does.
  • 6. © John Day, 2013 6 Rights Reserved The Pouzin Society Address Spaces in Operating Systems (From my OS Course) An name space is defined as a set of identifiers with a given scope. An address space is a location-dependent name space. In Operating Systems, we have found a need for 3 such independent spaces. Virtually all uses of names in computing are for locating. Application Name Space Logical Name Space Physical Name Space Human use, relatively constant, not at all tied to the hardware, i.e. location-independent Location Dependent but Hardware Independent; Creates a logical address space larger than the physical memory; Allows processes to be re-locatable. Location-Dependent and Hardware Dependent
  • 7. © John Day, 2013 7 Rights Reserved The Pouzin Society Saltzer’s View of Networks •  Application names map to node addresses. •  Node addresses map to points of attachment addresses. •  Routes are sequences of points of attachments. –  Just as in an operating system. –  But networks are more general than operating systems. Application Name Node Address Point of Attachment Address
  • 8. © John Day, 2013 8 Rights Reserved The Pouzin Society Generalizing Saltzer to Networks of Networks •  Directory maintains the mapping between Application-Names and the node addresses of all Applications reachable without an application relay. •  Routes are sequences of node addresses used to compute the next hop. •  Node to point of attachment mapping for all nearest neighbors to choose path to next hop. (Even though Saltzer notices this, he is too intent to see that networks are a more general case.) •  This last mapping and the Directory are the same: –  Mapping of a name in the layer above to a name in the layer below of all nearest neighbors. Directory Route Path Here And Here
  • 9. © John Day, 2013 9 Rights Reserved The Pouzin Society Applying Results to Real Architectures: The Internet (This is a Network Architecture) •  The most striking feature is that half of the addressing architecture is missing. –  No wonder there are addressing problems. –  The only identifier we have for anything is the IP address. •  There are no node addresses and no application names. –  And the point of attachment is named twice! –  If this is an Internet Protocol, where are the Network Addresses? (Lost Layer) –  Domain Names are synonyms for IP addresses. URLs name a path to an arbitrary instance of an application. MAC Address IP Address Socket (local) Application Application Name Node Address Point of Attachment Address As if your computer worked only with absolute memory addresses.
  • 10. © John Day, 2013 10 Rights Reserved The Pouzin Society There is An Easier Way to See It. •  Route on the address in your layer! –  Well, duh! –  Routing on the Interface is routing on the address in the layer below. •  Learned a couple of other things along the way –  Addresses only need to be unique within the scope of a layer –  Addresses must generally be assigned by the network because it is the only one that knows where in the network the node is. –  Don’t concatenate an (N)-address with an (N-1) address. Physical Data Link Network Transport Application Host or End System Router Points of attachment Nodes
  • 11. © John Day, 2013 11 Rights Reserved The Pouzin Society If This Were an Internet Architecture, Then •  There would be multiple Data Link Layers with limited scope. •  Network Layers with greater scope that did intra-domain routing •  Internet Layer with greater scope yet that did intra-domain routing. •  Network Layer addresses would be interface addresses for the Internet nodes. •  That brings us to the first Internet [sic] addressing crisis. Internet Gateways Data Link Network Internet Application Data Link Network Internet Application Net 1 Net 2 Net 3 Host Host
  • 12. © John Day, 2013 12 Rights Reserved The Pouzin Society The First Great Internet Addressing Crisis •  In 1992, we have the first addressing crisis. –  IPv4 addresses are getting scarce •  But the real problem is Router Table Size is increasing exponentially. •  The IAB convenes the ROAD process –  Recommends CLNP as IPv7 •  Basically IP with variable length aggregateable addresses. •  CLNP names the node. Hence, fixes the multihoming problem. •  The IETF goes berserk! –  No OSI, no way, no how! •  A model? We don’t need no stinking model. We’ve got •  Rough Consensus and Running Code!
  • 13. © John Day, 2013 13 Rights Reserved The Pouzin Society The IPng Process •  The Rules were: –  Fixed Length Address –  Continue to Name the Interface. –  At least 20 octets of address –  Open Standard •  Violá! IPv6! •  or anything but CLNP. •  Still no solution to multihoming –  Problem is now 20 years old
  • 14. © John Day, 2013 14 Rights Reserved The Pouzin Society All is Not Well •  Less than a Year later, light dawns (slightly)! –  Name the Interface, but route aggregation is a must –  Implies provider based assignment. –  Means change providers, must renumber. WHAT!? •  Kind of shot yourself in the foot, eh? •  Transition is dual stack with a NAT –  Once you have a NAT, you don’t need v6 . . . oops. •  How many feet do you have?
  • 15. © John Day, 2013 15 Rights Reserved The Pouzin Society Techs Play Architect •  Finally around 2000, need to deal with multihoming, but –  given negative reaction to naming the node, need a workaround •  Ahh! The problem is that we have been overloading the semantics of the IP address with location and identifier information. –  We need to split them. Loc/id split is the Answer. –  A locator we can route on and a flat endpoint id (EID) •  Psssst! Can’t identify something without locating it and vice versa –  Saltzer [1977] defines “resolve” as in “resolving a name” as “to locate an object in a particular context, given its name.” •  Got another foot? •  Don’t bother me with pedantic terminology, –  IPv6 is the future!
  • 16. © John Day, 2013 16 Rights Reserved The Pouzin Society Trouble is Not Much Interest in v6 •  It offers no benefit to those who pay for adopting it –  They just don’t know they want it. •  For the next decade, there is the hype: –  Better security, better QoS, better mobility –  “A desert topping and a floor wax!” - Mike O’Dell •  In fact, all of these are the same as IPv4 . . . no different •  “IPv6 has all the benefit of a minor technology change with all the disruption of a major fork-lift upgrade.” - Geoff Huston, 2008. –  Just switch to v6 and all will be well. •  By 2000, dawning awareness the architecture is running out of steam –  NEWARCH, Clean Slate, FIND and GENI are hot! –  Starts to be a lot of talk about loc/id split. –  This is clearly the answer . . . . (really?).
  • 17. © John Day, 2013 17 Rights Reserved The Pouzin Society Houston, We Have a Problem (The Second Great Internet Addressing Crisis) •  October 2006, major presentation at IEPG. –  Router table size is on the increase, due to multihoming. •  It is either quadratic or exponential, can’t tell yet. –  (does it matter!?) –  Moore’s Law won’t bail us out this time. •  This is a big time crisis. We are in big trouble. •  If not fixed, it is the end of the Internet as we know it. –  Net will fragment. Costs in the core will skyrocket. –  NetworkWorld sits on the story for a year. –  Tons of papers written on loc/id split!
  • 18. © John Day, 2013 18 Rights Reserved The Pouzin Society But We Do Multihoming! (not really) •  We kludge it. •  Because we route on the interface, this forces route aggregation to be provider-based. –  Addresses with a common prefix go to the same provider then we can store a single route (to the provider) rather than a route for every address on that provider. •  To do multihoming, must assign provider-independent addresses or new AS numbers (same thing). –  Can’t be aggregated Router table size increases –  Remember what our problem is? Router table size is increasing
  • 19. © John Day, 2013 19 Rights Reserved The Pouzin Society So Why Wasn’t It Fixed? •  Odd that a DoD network touted to survive nuclear attack didn’t support redundant links. Lots of “good reasons:” –  Not that many hosts need to be multi-homed. •  Not then, but the ones that did were the ones everyone wanted to get to. –  Not everyone should have to bear the cost for a few. •  Classic committee politics: Put a condition on the solution that guarantees any proposal will be rejected (asymmetry in this case) •  Also assumes there is a cost. –  Multihoming will be to different providers, so no point. •  Assumption is wrong and even if right assumes a static network. –  Remember, we tried to fix it but it was rejected by the IETF.
  • 20. © John Day, 2013 20 Rights Reserved The Pouzin Society But By This Time •  Cisco and others start proposing solutions to the multihoming problem. –  Mostly requiring patches involving NATs and a bevy of new protocols. –  In particular, LISP or Loc/ID Split Protocol •  This makes everyone nervous, but what else to do? •  Well, we could work out a theoretical framework to see what is going on. •  This is a crisis! We have to build something! •  Best way known to stampede people to your view.
  • 21. © John Day, 2013 21 Rights Reserved The Pouzin Society November 2008 Houston, We have a Bigger Problem •  Dave Meyer calls, ‘I have an “architectural issue” to discuss.’ –  He has come across two problems in implementing LISP. –  Both require doing path discovery. –  Path discovery doesn’t scale. –  LISP won’t scale. QED –  He suspects that any loc/id approach will have the same problem. •  draft-meyer-loc-id-implications-01.txt •  In case you didn’t notice, we just went to DefCon1 •  Dave: Why hasn’t anyone noticed this in the last 15 years?
  • 22. © John Day, 2013 22 Rights Reserved The Pouzin Society Dave is Right •  All proposals based on loc/id split have the same flaw. •  Once put in the context of the RINA theory, it is obvious. •  Let us look at it very carefully. What do the locator and the identifier name? Endpoint Identifier Locators The Locator Locates the Wrong Thing! The locator is part of the path, not the final destination. No wonder Dave ran into path discovery issues.
  • 23. © John Day, 2013 23 Rights Reserved The Pouzin Society Apply the e2e principle! (the answer to everything) Solve the Problem in the Hosts •  There are poor misguided souls claiming this. –  Mostly done by changing the definition of multihoming. –  Ignore that it might take seconds if not minutes to do the failover. •  Remember the fundamental problem is that the network doesn’t know that two paths go to the same place. –  This is a problem of delivering, not sending. –  There is no host-based solution. •  There is no solution as long as one routes only on the interface address. Which means . . .
  • 24. © John Day, 2013 24 Rights Reserved The Pouzin Society If Loc/ID Doesn’t Scale •  Then there is no solution involving routing on the interface that scales. •  In other words, •  But we saw that coming a long time ago. IP is Fundamentally Flawed (v4 or v6)
  • 25. © John Day, 2013 25 Rights Reserved The Pouzin Society So What Is the IETF Plan B? •  Plan A •  What are the major Universities working on? •  Plan A •  What are the vendors working on? •  Plan A . . . . Still? •  Talk about scary, there was a summit in the Spring of 2009 to discuss the addressing crisis •  The agenda: to determine what form of loc/id split to use! –  It is important to get those deck chairs lined up very neatly.
  • 26. © John Day, 2013 26 Rights Reserved The Pouzin Society What Do the Vendors Say? •  Yes, there may be some scaling issues with loc/id split. •  But we recommend using it, they are very unlikely to ever be a problem. •  You mean unlikely as in “it is very unlikely a lot of people will default on home mortgages”? –  (we know where that went) •  Don’t worry! It won’t happen very often, only in a crisis. A Black Swan?
  • 27. © John Day, 2013 27 Rights Reserved The Pouzin Society But Everything Works Fine! •  Yes and it will for a few more years. •  When you notice it, it means we are already over the cliff. Vince Fuller, Cisco. “Has he vertigo? No, only about ten stories more!” - Ogden Nash
  • 28. © John Day, 2013 28 Rights Reserved The Pouzin Society Wanna Hear the Real P*sser? •  We had the right answer in 1992. •  The answer we had known since 1972. –  It was rejected by the IETF. •  And to add insult to injury, it was DEPLOYED and Operational in the routers. –  We could have spent the last 15 years working on transition –  Rather than 100s of millions on a small incremental step that provides no benefit to your bottom line and is fundamentally flawed. –  You just can’t make this stuff up!
  • 29. © John Day, 2013 29 Rights Reserved The Pouzin Society The Problem was Never Separating Locator from Identifier. It was always about Separating Logical Location from Physical Location •  It is impossible to locate something without also identifying it. •  This pseudo-problem arises from not having a complete address architecture. –  And creates enough epicycles upon epicycles to make Clavius proud •  But we will give O’Dell the last word: –  When all you have is a hammer, everything looks like your thumb •  It is still more like DOS than anything else. Location dependent, Route independent Route Dependent Location Independence Application Name Space Logical Name Space Physical Name Space Application Names Node Address Point of Attachment
  • 30. © John Day, 2013 30 Rights Reserved The Pouzin Society Addressing In RINA •  All identifiers are based on the nature of the application process or in this case, the IPC Process. •  First, lets look in brief:
  • 31. © John Day, 2013 31 Rights Reserved The Pouzin Society Applications and Communication •  The Application-Entity (AE) is that part of the application concerned with communication, i.e. shared state with its peer. •  The rest of the Application Process is concerned with the reason for the application in the first place. •  An Application Process may have multiple AEs, they assumed, for different application protocols. –  An HTTP library linked into a web browser is an AE; FTP is another. Application Process Application-Entities
  • 32. © John Day, 2013 32 Rights Reserved The Pouzin Society Application Naming •  Application-process names (APN) are globally unambiguous and location-independent, but system-dependent. –  They may have synonyms of less scope from the same or different name space. –  There may be multiple instances of the process in the same system. •  APN-instance-identifiers are unambiguous within the scope of the Application Process. •  Application-entity-identifiers are unambiguous within the application process. –  There may be more than one Application-entity (AE) in a process. •  Unambiguous within the scope of the Application Process. –  There may be more than one instance of each type of Application-Entity. •  AE-instance-identifiers are unambiguous within the scope of the AE. •  Distributed Application Name is the name of a set of application processes and system- independent. •  Few applications need all of these but a complete theory requires all of them. Application Process Application-Entities
  • 33. © John Day, 2013 33 Rights Reserved The Pouzin Society What Good is All This? •  Many capabilities not possible today or that require specific protocols are a consequence of naming and enabled by a complete architecture. –  Handing off a connection from one system to another; –  The need to pass IP addresses among applications is avoided; –  Opening multiple connections with different “protocols” to the same instance of an application process. –  Connecting to an existing “conference” call, etc. –  And probably 1000s of things we haven’t thought of yet. Application Process Application-Entities
  • 34. © John Day, 2013 34 Rights Reserved The Pouzin Society Naming in RINA •  IPC Process-name is just an application-process-name –  An address is a synonym that names an IPC Process with scope restricted to the DIF and maybe structured to facilitate use within the DIF. •  A port-id is a Flow-Allocator-Instance-Id, an AE instance. •  A connection-endpoint-id (CEP-id) is an EFCP-instance-id, an AE instance. •  Note that these are local to the IPC Process. •  A connection-id is created by concatenating source and destination CEP-ids. •  That’s It! IPC Management Common Application Protocol Resource Allocation RIB Daemon IRM IDD RMT EFCP Flow Allocator IPC Process
  • 35. © John Day, 2013 35 Rights Reserved The Pouzin Society Implications of the Model Names (Basics) •  We have made a big deal of node and point of attachment, but they are relative, not absolutes. –  An (N)-IPC-Process is a node in the (N)-DIF. •  An (N-1)-IPC-Process is a node in the (N-1)-DIF –  An (N-1)-IPC-Process is a point of attachment to an (N)-IPC-Process. –  An (N)-address is a synonym for an (N)-IPC-Process. •  So as long as we keep that straight, there is no point to making the distinction. •  Note that it is the port-id that creates layer independence. With a port-id, No Protocol-Id Field is Necessary, or if there is such a field something is wrong. Address Port -id (N)-IPC-Process (N-1)-IPC-Process
  • 36. © John Day, 2013 36 Rights Reserved The Pouzin Society Implications of the Model Names (Multihoming) •  Yea, so? What is the big deal? –  It just works •  PDU arrives at the (N-1)-IPC Process. If the address designates this IPC Process, the CEP-id is bound to the port-id, so after stripping off (N-1)-PCI, it passes it up. •  The process repeats. If the address in the (N)-PCI is this IPC-Process, it looks at the CEP-id and pass it up as appropriate. •  Normal operation. Yes, the (N-1)-bindings may fail from time to time. •  Not a big deal. Address Port -id (N)-IPC-Process (N-1)-IPC-Process
  • 37. © John Day, 2013 37 Rights Reserved The Pouzin Society Implications of the Model Names (Mobility) •  Yea, so? What is the big deal? –  It just works just like multihoming only the (N-1)-port-ids come and go a bit more frequently. •  O, worried about having to change address if it moves too far? Easy. •  Assign a new synonym to it. Put it in the source address field on all outgoing traffic. Stop advertising the old address as a route to this IPC-Process. •  Want to renumber the DIF for some reason? Same procedure. •  Again, no special cases. No special protocols. No concept of a home router. Okay, policies in the DIF may be a bit different to accommodate faster changing points of attachment, but that is it. Address Port -id (N)-IPC-Process (N-1)-IPC-Process New Address
  • 38. © John Day, 2013 38 Rights Reserved The Pouzin Society Implications of the Model Names (Routing Table Size) •  Recursion either reduces the number of routes or shortens them. Backbone Regionals Metros
  • 39. © John Day, 2013 39 Rights Reserved The Pouzin Society Implications of the Model Names (Routing Table Size) •  For the Internet O((6r)2 where r is the number of routers in the network. Non-topological T opological Metros-DIF 3 O ( ( 2 D n)2 ) O ( ( D m)2 ) where n is the number of hosts and m is the number of hosts and border routers on a single subnet. Regionals-DIF 2 O((2Dn2)2 ) O ( ( D m2)2 ) where n2 is the number of border routers around the outside and m2 is number of border routers at this level on a single subnet. Backbone-DIF 1 O((2Dn1)2 ) O ( ( 2 D n1)2 ) where n1 is the number of border routers on the backbone. Note that m n.
  • 40. © John Day, 2013 40 Rights Reserved The Pouzin Society Implications of the Model Names (Choosing a Layer) •  In building the IPC Model, the first time there were multiple DIFs (data link layers in that case), to maintain the API a task was needed to determine which DIF to use. I A P D i r Mux Flow Mgr – User didn’t have to see all of the wires –  But the User shouldn’t have to see all of the “Nets” either. •  This not only generalizes but has major implications.
  • 41. © John Day, 2013 41 Rights Reserved The Pouzin Society Implications of the Model Names (An Inter-DIF-Directory) •  Inter-DIF Manager determines via what DIFs applications are available. –  If this system is a not member, it either joins the DIF as before –  or creates a new one. •  Which Implies that the largest address space has to be only large enough for the largest e-mall. •  Given the structure, 32 or 48 bits is probably more than enough. •  You mean? •  Right. IPv6 was a waste of time . . . •  Twice. Inter-DIF Dir
  • 42. © John Day, 2013 42 Rights Reserved The Pouzin Society So a Global Address Space is Not Required but Neither is a Global Application Name Space Inter-DIF Directory To Peers In Oher DIFs Actually one could still have distinct names spaces within a DIFs (synonyms) with its own directory database. •  Not all names need be in one Global Directory. •  Coexisting application name spaces and directory of distributed databases are not only possible, but useful. •  Needless to say, a global name space can be useful, but not a requirement imposed by the architecture. •  The scope of the name space is defined by the chain of databases that point to each other.
  • 43. © John Day, 2013 43 Rights Reserved The Pouzin Society Scope is Determined by the Chain of Places to Look •  The chain of databases to look for names determines the scope of the name space. –  Here there are 2 non-intersecting chains of systems, that could be using the same wires, but would be entirely oblivious to the other.
  • 44. © John Day, 2013 44 Rights Reserved The Pouzin Society Multicast and Anycast are Simpler Too •  Generalized to Whatevercast: –  A set and a rule that returns as many members of the set that satisfy the rule. •  Unicast becomes a degenerate case of whatevercast. –  Forwarding table entry maps Destination Address to a list of next hops. For unicast, the list has one element. •  Primarily handled by hosts or border routers, where all whatevercast traffic is either: •  On this subnet (only do spanning tree within subnet if there is a lot) or •  Transit to another subnet, (both cases degenerate to point-to-point). •  So we see Whatevercast devolves into Unicast.
  • 45. © John Day, 2013 45 Rights Reserved The Pouzin Society Multicast and Anycast are Simpler Too •  Information in topological addresses imply an approximate spanning tree, which can be used to identify the border routers. Thus, in most cases obviating the need for a separate spanning tree (multicast) routing algorithm. •  And also making it straightforward to multiplex whatevercasts with common sub-trees which will allow even greater efficiency. –  Note that the common sub-trees do not have to be strict sub-trees but simply have a reasonable degree of commonality to be worthwhile.
  • 46. © John Day, 2013 46 Rights Reserved The Pouzin Society As I said At the Beginning What’s All the Fuss? ;-) Questions?