Internet DRAFT - draft-zhang-dmm-lisp
draft-zhang-dmm-lisp
Network Working Group Hongke Zhang
Internet Draft Feng Qiu
Expires: March 2013 Huachun Zhou
Xiaoqian Li
Fei Song
September 4, 2012
A Distributed Mobility Management Solution in LISP networks
draft-zhang-dmm-lisp-00.txt
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with
the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
This Internet-Draft will expire on March 4, 2013.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
Zhang et al. Expires March 4, 2013 [Page 1]
Internet-Draft dmm-lisp September 2012
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided without
warranty as described in the Simplified BSD License.
Abstract
In traditional Internet architectures, current centralized mobility
management solutions face scalability issues due to the creation of
network bottlenecks and a single mobility agent of failures. To
address these issues, we propose a Distributed Mobility Management
solution in Locator/ID Separation Protocol (DMMLISP). We divide the
network into many domains according to the area of Autonomous
Systems (ASs). Each domain consists of a Mapping Server and several
Tunnel Routers (xTRs). The Mapping Server stores global mappings
between EID (Endpoint Identifier) prefixes and AS Numbers (ASNs) to
lookup the mobile nodes'(MNs') home domain. Meanwhile, the Mapping
Server also contains ASN-to-xTR mappings so that it can forward Map-
Register and Map-Request messages to any xTR of the MN's home domain,
thus enhancing reliability. In addition, the xTRs in each domain
constitute one-hop DHT (Distributed Hash Table). Moreover, any xTR
in the MN's home domain may be the home agent of MNs, and the MNs'
EID-to-RLOC (Routing Locator) mapping is stored in two xTRs using
two hash functions. In this way, it not only supports quick lookup
but also improves scalability and survivability.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 0.
Table of Contents
1. Introduction ................................................ 3
2. Definition of items ......................................... 4
3. A distributed mobility management in LISP networks ...........6
3.1. The architecture of DMMLISP .............................6
3.2. Host mobility .......................................... 8
3.3. Call delivery procedure................................. 9
4. Properties of DMMLISP .......................................10
4.1. Optimize path ......................................... 10
4.2. Split the signaling and the data .......................10
4.3. Improve survivability.................................. 10
4.4. Hide location information of MNs .......................11
4.5. Network-based mobility management ......................11
4.6. Support routing scalability ............................11
Zhang et al. Expires March 4, 2013 [Page 2]
Internet-Draft dmm-lisp September 2012
5. Security Considerations..................................... 11
6. IANA Considerations ........................................ 11
7. Acknowledgments ............................................ 11
8. References ................................................. 12
Author's Addresses ............................................ 12
Acknowledgment ................................................ 13
1. Introduction
The conventional Internet does not natively support mobility because
IP addresses are used as both host identifiers and locators. Many
solutions based on the current Internet have been specified to
support mobility. Mobile IPv6 (MIPv6) [MIPv6] as a host-based
mobility protocol requires that an MN uses a Home Address (HoA) to
indicate its identifier and a Care of Address (CoA) to represent its
location information. A home agent (HA) as a location manager
maintains HoA-to-CoA mappings and takes charge of forwarding data
traffic for MNs. Proxy Mobile IPv6 (PMIPv6) [PMIPv6] is a network-
based mobility protocol in which a Local Mobility Anchor (LMA)
provides a prefix for an MN as its identifier. The IP address of a
Mobile Access Gateway (MAG) is used as the location of an MN, and
the LMA keeps the mapping between the MN's prefix and the serving
MAG address. In this way, whenever mobility events occur, the HoA or
the MN's prefix is unchanged, so it can keep transport connections
alive.
However, a HA and a LMA can be viewed as centralized mobility agents.
All traffic to MNs associated with the HA or the LMA is routed
through their agent. Such a centralized mobility solution has some
issues [Problem-dmm]. First, when a single mobility agent generally
serves a large number of MNs, it becomes a potential bottleneck
because all the traffic from and towards an MN has to go through the
centralized mobility agent. Second, a centralized mobility agent
often results in a non-optimal path. An MN and a correspondent node
(CN) may be close to each other but be both far from the mobility
agent. Packets destined to the MN need to be forwarded via the
mobility agent, which is not the shortest path. If the CoA of an MN
is given to the CN in MIPv6 Route Optimization (RO) mode, the
location privacy of the MN will be not protected. And we can not
expect RO capabilities to exist at each CN. Third, malicious MNs can
attack HAs or LMAs directly (e.g. MNs send a large mount of data
traffic), so it can bring insecure factors and a single point of
failures is more vulnerable. Finally, the current Internet faces
serious scaling problems. MIPv6 and PMIPv6 which develop based on
the traditional TCP/IP are not suitable for an increasing demand for
future Internet scalability.
Zhang et al. Expires March 4, 2013 [Page 3]
Internet-Draft dmm-lisp September 2012
To address the above issues, we propose a Distributed Mobility
Management in Locator/ID Separation Protocol (DMMLISP), which can
improve scalability and survivability of the network. When an MN
crosses different subnets, it only changes its RLOC but its EID used
by the transport layer's connection is invariable, so it can offer
services connectivity and support global roaming [MILSA]. A Tunnel
Router (xTR) receives packets from sites on one side [LISP] and
encapsulates them with RLOCs toward the Internet on the other side,
so routers in the core networks only need to maintain RLOCs, which
addresses routing scalability problems [Report-RoutingAddressing].
Meanwhile, we separate the signaling and data planes by introducing
the mapping system as an overlay architecture to deliver signaling
messages, which avoids evil MNs attacking map servers (MSs) [LISP-MS]
directly. In addition, we divide the Internet into different domains
according to the coverage area of Autonomous Systems (ASs). Each
domain is managed by an MS who takes charge of forwarding Map-
Request and Map-Register messages for xTRs by storing the global
EID-prefix-to-ASN (AS number) and ASN-to-xTR mappings. In this way,
even if one MS break down, other MSs can substitute it.
In addition, xTRs are distributed in different sites so that packets
may be routed via a nearby router. In this way, all the data between
two xTRs near to hosts can be transited on the shortest path. Hence,
it can help reduce the delay and overhead. Meanwhile, the xTRs in
each domain constitute one-hop DHT (Distributed Hash Table). We
store the MN's EID-to-RLOC mappings in two xTRs, avoiding a single
point of failures.
2. Definition of items
Autonomous System (AS): Within the Internet, an autonomous system is
a collection of connected IP routing prefixes under the control of
one or more network operators that presents a common, clearly
defined routing policy to the Internet.
Endpoint ID (EID): An EID is a 32-bit (for IPv4) or 128-bit (for IPv6)
value used in the source and destination address fields of the
first (most inner) LISP header of a packet. An EID is allocated to
a host from an EID-prefix block associated with the site where the
host is located. See [LISP] for details.
Routing Locator (RLOC): A RLOC is an IPv4 or IPv6 address of an
egress tunnel router (ETR). A RLOC is the output of an EID-to-RLOC
mapping lookup. An EID maps to one or more RLOCs. Typically, RLOCs
Zhang et al. Expires March 4, 2013 [Page 4]
Internet-Draft dmm-lisp September 2012
are numbered based on the connectivity of provider networks. See
[LISP] for details.
EID-prefix: An EID-prefix is a power-of-two block of EIDs which are
allocated to a site by an address allocation authority. EID-prefix
allocations can be broken up into smaller blocks when an RLOC set
is to be associated with the smaller EID-prefix.
EID-to-RLOC mapping: a binding between an EID or EID-prefix and a
RLOC set which can be used to reach the EID. The xTRs can
encapsulate packets with the RLOC in the EID-to-RLOC mapping to
reach the destination EID. A RLOC set may contain multiple RLOCs to
perform multihoming or traffic engineering.
Ingress Tunnel Router (ITR): An ITR accepts an IP packet and prepends
an "outer" header with RLOCs. It sends a Map-request to the mapping
system when it does not have the EID-to-RLOC mapping for the
destination EID.
Egress Tunnel Router (ETR): An ETR accepts packets with the RLOCs as
the destination addresses. It strips the outer header and forwards
packets based on EIDs.
xTR: A xTR is a reference to an ITR or ETR when direction of data
flow is not part of the context description. xTR refers to the
router that is the tunnel endpoint.
Mapping Server (MS): A Mapping Server is a component, which stores
the EID-prefix-to-ASN and ASN-to-xTR mappings. The MS forwards Map-
Register or Map-Request messages to xTRs.
Mapping Domain (MD): This document defines the area that a Mapping
Server covers as a Mapping Domain.
EID-prefix-to-ASN mapping: It indicates which AS EID-prefix belongs
to.
ASN-to-xTR mapping: A binding between ASN and the xTR, which is one-
to-many relationship.
Zhang et al. Expires March 4, 2013 [Page 5]
Internet-Draft dmm-lisp September 2012
3. A distributed mobility management in LISP networks
3.1. The architecture of DMMLISP
+-------------------------------------------------+
| Mapping +----+ +----+ |
| System | MS |------------ | MS | |
| +----+ +----+ |
| | | |
| | | |
| +----+ +----+ |
| | MS |------------ | MS | |
| +----+ +----+ |
| / \ |
| ----------/----------------------\------------- |
| MD1 / | MD2 \ |
| +----+ +----+ | +---+ +---+ |
| -|HxTR|----|DxTR|-- | --|xTR|----|xTR|-- |
| |+----+ +----+ | | | +---+ +---+ | |
| | | | | | |
|+----+ +---+ | +---+ +---+ |
||HxTR| |xTR| | |xTR| |xTR| |
|+----+ +---+ | +---+ +---+ |
| | | | | | |
| | +---+ +----+ | | |+----+ +----+ | |
| --|xTR|---|xTR1|-- | -|xTR2|---|CxTR|-- |
| +---+ +----+ | +----+ +----+ |
| | | | |
| +----+ | +----+ |
| | MN | | | CN | |
| +----+ | +----+ |
| | |
+-------------------------------------------------+
Figure 1 :Architecture of DMMLISP
Figure 1 shows the architecture of DMMLISP, which is divided into
different domains according to the coverage area of the AS. Each
domain is managed by an MS who stores EID-prefix-to-ASN and ASN-to-
xTR mappings. All the xTRs in the same AS constitute one-hop DHT and
maintain EID-to-RLOC mappings.
Each xTR collects local EID-prefixes and notifies these prefixes to
the associated MS. MSs advertise their EID-prefix-to-ASN mappings
each other through BGP (Border Gateway Protocol) extension, so each
MS can know global EID-prefixes. In this way, it is possible to
aggregate local prefixes efficiently in an AS so that it can
alleviate the stored overload in the MS. Moreover, the change of the
Zhang et al. Expires March 4, 2013 [Page 6]
Internet-Draft dmm-lisp September 2012
topology within an AS does not impact on the mappings between EID-
prefix-to-ASN mappings in other MSs. Thus, the mapping system is
more scalability and stable.
In addition, the MS also maintains the ASN-to-xTR mappings, which is
one-to-many relationship. When the MS receives Map-Register or Map-
Request messages, it randomly selects one of xTRs as the destination
xTR (DxTR) and forwards these messages to the DxTR. Even if the DxTR
fails, any other xTRs in the destination AS can replace it by
reselecting other DxTRs. Hence, it enhances the survivability of
DMMLISP.
There are two ways to replace a broken MS. One way is that MSs use
BGP (Border Gateway Protocol), which entablishes on TCP. If one MS
breaks down, the peer MS can detect that the TCP connection is
broken and replaces the broken MS. Because each MS maintains ASN-to-
xTR mappings, the peer MS can notify all the xTRs in the AS of the
broken MS. In this way, the MS can replace the broken MS. Another
way is we replicate an MS in each AS. One MS is primary and the
other is for backup.
We deploy one-hop DHT ring in each AS. Any xTRs in the DHT ring may
be the agent of MNs, which inherits the advantages on scalability
and robustness of the DHT-based infrastructure. We store the MN's
EID-to-RLOC mapping in two xTRs. The DxTR uses different hash
functions to map the MN's EID to two home xTRs (HxTR) in order to
avoid a single point of failures. Hence, it can enhance the
survivability of the mobile network. The operations in detail are
described in the following sections.
Zhang et al. Expires March 4, 2013 [Page 7]
Internet-Draft dmm-lisp September 2012
3.2. Host mobility
+--+ +----+ +----+ +--+ +----+ +----+ +----+
|MN| |xTR1| |xTR2| |MS| |DxTR| |HxTR| |CxTR|
+--+ +----+ +----+ +--+ +----+ +----+ +----+
| |-handover->| | | | |
|<--1-Attachment---->| | | | |
| | | 2 Map- | | | |
| | |Register->| | | |
| | | |3 Map- | | |
| | | |Register->| | |
| | | | |4 Map- | |
| | | | |Register->| |
| | 5 Map- | | | | |
| | <-Update- | | | | |
| | | | | | |
| |-------------------6 Map--Update-------------------->|
| | | | | | |
Figure 2 : Host Mobility Scenario
Fig. 2 illustrates the message flows for host mobility. When an MN
moves from the coverage area of the xTR1 to the xTR2, it connects to
the xTR2 (Message 1). Then, the xTR2 checks whether the EID belongs
to its local AS or not. If yes, it indicates that this AS is the
home domain of the MN. The xTR2 hashes the EID to find its HxTR and
updates the MN's EID-to-RLOC mapping in the HxTR. If not, it
indicates that the MN has left its home domain, the xTR2 sends a
Map-Register message to its local MS (Message 2).
Each MS stores two tables: an EID-prefix-to-ASN table and an ASN-to-
xTR table. When receiving a Map-Register message, the MS lookups the
EID-prefix-to-ASN table to obtain the MN's home AS number. Then, it
lookups the ASN-to-xTR table and randomly chooses one xTR as the
DxTR. After that, the MS forwards the Map-Register message to the
DxTR (Message 3).
Once receiving the Map-Register message, the DxTR uses the MN's EID
as a key and hashes it in order to obtain the MN's HxTR. The HxTR
stores the mapping between the EID and the RLOC. To improve the
survivability of the system, we use two Hash functions and store the
EID-to-RLOC mapping in two HxTRs (Message 4). Even if one HxTR
breaks down, the other can replace it and respond to the Map-Request
message.
In addition, the xTR2 sends a location update message to the xTR1
(message 5) including the new MN's EID-to-RLOC mapping. Then, xTR1
sends a message to the correspondent's xTRs (CxTR) in order to
Zhang et al. Expires March 4, 2013 [Page 8]
Internet-Draft dmm-lisp September 2012
update the new MN's mapping information in the CxTR's mapping table
(message 6). Once the CxTR obtains the new mapping, packets destined
to the MN are directly forwarded to the xTR2, so that it is not
necessary to pass through the old xTR1. Thus, the scheme can achieve
route optimization.
3.3. Call delivery procedure
Fig. 3 illustrates the message flows for the call delivery procedure.
When a CN wants to communicate with an MN, it sends packets to the
CxTR using its EID and the MN's EID as the packets's source address
and destination address (Message 1). The CxTR checks whether the EID
belongs to the local AS. If the MN's home domain and the CxTR are
different, the CxTR sends a Map-Request message to the associated MS
(Message 2). The MS lookups the EID-prefix-to-ASN table and obtains
the home AS of the MN. Then, the MS lookups the ASN-to-xTR table in
order to find one of its home domain's DxTRs, and forwards the Map-
Request message to the DxTR (Message 3). If the MS does not receive
the response message of the DxTR, it will choose another DxTR and
send the Map-Request message to the DxTR. As long as one DxTR of the
MN's home domain is active, the signalling can be forwarded to the
DxTR. In this way, the survivability of the system is enhanced.
The DxTR randomly selects one of two hash functions to find the MN's
HxTR and then forwards the Map-Request message to it (Message 4).
The HxTR responds to a Map-Reply Message including the EID-to-RLOC
mapping to the CxTR (Message 5). Then, the CxTR encapsulates packets
with RLOCs and sends them to the xTR which the MN attaches to. When
receiving packets, the xTR of the MN strips the encapsulated header
and forwards them to the MN (Message 6).
Zhang et al. Expires March 4, 2013 [Page 9]
Internet-Draft dmm-lisp September 2012
+--+ +----+ +---+ +----+ +--+ +----+ +----+
|MN| |xTR2| |HTR| |DxTR| |MS| |CxTR| | CN |
+--+ +----+ +---+ +----+ +--+ +----+ +----+
| | | | | | |
| | | | | |1<=Packets=|
| | | | | | |
| | | | | 2 Map- | |
| | | | |<-Request| |
| | | | 3 Map- | | |
| | | |<-Request| | |
| | | 4 Map- | | | |
| | |<-Request | | | |
| | |---------5 Map--Reply-------->| |
| | | | | | |
|6 <=====|<===============Packets===================| |
Figure 3 : Call delivery procedure
4. Properties of DMMLISP
4.1. Optimize path
In PMIPv6 and MIPv6, the LMA or the HA is required to deliver data
packets and they as location managers need to encapsulate packets.
In DMMLISP, xTRs are distributed in different access networks so
that data packets may be routed via a nearby xTR without passing
through MSs. In this way, compared to PMIPv6 and MIPv6, there is not
an extra encapsulated overhead on location managers. Moreover, the
data transmission delay can be reduced.
4.2. Split the signaling and the data
The mapping system as an overlay architecture on the top of the
Internet is used to deliver signaling messages. The mapping system
consists of many MSs who manage mobility-related signaling.
Meanwhile, the locator/ID separation avoids evil MNs sending a great
many data to MSs. Thus, it can offer better controllability,
manageability and security.
4.3. Improve survivability
Each MS stores the global EID-prefix-to-ASN mappings. In this way,
even if one MS breaks down, other MSs can replace its function to
Zhang et al. Expires March 4, 2013 [Page 10]
Internet-Draft dmm-lisp September 2012
forward Map-Request and Map-Register messages. In addition, we store
the MN's EID-to-RLOC mapping in two HxTRs via two hash functions, so
the HxTR is also alternative. Thus, our scheme can enhance the
survivability of DMMLISP.
4.4. Hide location information of MNs
In LISP networks, a CN only knows the MN's identifier but location
information of the MN is hidden to the CN, which avoids malicious
CNs attacking MNs directly.
4.5. Network-based mobility management
The MN is not required to participate in any mobility-related
signaling, so the proposed scheme avoids a part of signaling
overhead in wireless links and makes use of wireless resources
efficiently. Moreover, our network-based mobility management
solution does not require any modification on the MNs.
4.6. Support routing scalability
One of aims for the Locator/ID separation solution is to support
routing scalability by removing hosts' EIDs from core routers in the
current routing system. After packets which are sent by a host
arrive at an xTR, they are encapsulated with RLOCs and then are
forwarded to its destination xTR. We design a distributed mobility
management solution based on LISP which does not damage the
architecture and can solve both global routing scalability problems
and mobility support.
5. Security Considerations
TBD
6. IANA Considerations
This document makes no request of the IANA.
7. Acknowledgments
Zhang et al. Expires March 4, 2013 [Page 11]
Internet-Draft dmm-lisp September 2012
8. References
[MIPv6] D. Johnson, C. Perkins, J. Arkko, Mobility Support in
IPv6, RFC 3775, 2004.
[PMIPv6] Sri G, Kent L, Vijay D, Kuntal C, Basavaraj P. Proxy
Mobile IPv6, RFC 5213, 2008.
[LISP] Dino F, Vince F, Dave M, Darrel L, Locator/ID Separation
Protocol (LISP), Internet draft, draft-ietf-lisp-22, February 2012.
[Problem-dmm] H Anthony C. Requirements of Distributed Mobility
Management, IETF Internet draft-chan-dmm-requirements-00, 2012.
[MILSA] Jianli P, Raj J, Subharthi P, Chakchai S. MILSA: A New
Evolutionary Architecture for Scalability, Mobility, and Multihoming
in the Future Internet, IEEE Journal on Selected Areas in
Communications, 2010;28(8):1344-1361.
[Report-RoutingAddressing] David M, Lixia Z, Kevin F. Report from
the IAB Workshop on Routing and Addressing, IETF RFC 4984, 2007.
[LISP-MS] Vince F, Dino F. LISP Map Server Interface, IETF
Internet draft-ietf-lisp-ms-16, 2012.
Author's Addresses
Hongke Zhang, Feng Qiu, Huachun Zhou, Xiaoqian Li, Fei Song
National Engineering Laboratory for Next Generation Internet
Interconnection Devices
School of Electronics and Information Engineering
Beijing Jiaotong University of China
Phone: +86 01051685677
hkzhang@bjtu.edu.cn
07111019@bjtu.edu.cn
hczhou@bjtu.edu.cn
Zhang et al. Expires March 4, 2013 [Page 12]
Internet-Draft dmm-lisp September 2012
xiaoqianli@bjtu.edu.cn
fsong@bjtu.edu.cn
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Zhang et al. Expires March 4, 2013 [Page 13]