home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1993
/
Internet Info CD-ROM (Walnut Creek) (1993).iso
/
inet
/
ien
/
ien-178
< prev
next >
Wrap
Text File
|
1988-12-01
|
40KB
|
1,240 lines
IEN 178 April 1981
ADDRESSING PROBLEMS IN MULTI-NETWORK SYSTEMS
Carl A. Sunshine
University of Southern California
Information Sciences Institute
4676 Admiralty Way
Marina del Rey, CA 90291
Abstract
To allow uers in different networks to communicate with
each other, development of powerful yet practical naming,
addressing, and routing facilities is essential. Basic
procedures for multi-network systems under control of a single
organization have begun to be used, but a large set of more
sophisticated goals remain to be addressed. This paper
describes several of these more advanced problems including
extendability, multihoming, network partitioning, mobile
hosts, shared access, local site connections, gateway routing,
and overcoming differences in heterogeneous systems.
Note:
There are three figures associated with this document
which may be obtained from the author by sending a message to
<SUNSHINE@ISIF>.
-1-
Introduction
The interconnection of multiple computer networks makes
it possible for ever wider communities of computer users and
applications to interact with each other. A basic set of
problems that must be solved in accomplishing such
interconnections concerns providing naming, addressing, and
routing procedures that are general and convenient yet
practical. These problems are particularly difficult when
networks of different designs and/or operating under different
authorities must be interconnected.
Current multi-network systems are fairly small (tens of
networks maximum) and largely designed by and under control of
a single organization. (We shall call this "homogeneous"
internetworking.) Basic interconnection is supported by
simple hierarchical addressing and routing procedures employed
uniformly throughout the system [1,4,10,13]. Interconnections
of different multi-network systems (heterogeneous
internetworking) are just beginning to be made, largely by ad
hoc means.
Thus, while some of the basic problems have been solved,
a large set of secondary problems will soon be upon us. These
include problems of scale (current methods are impractical for
systems with hundreds or thousands of networks); supporting
more sophisticated functions such as multihoming, network
-2-
partitioning, mobile hosts, and shared access; and overcoming
the different procedures in heterogeneous systems.
This paper describes several of these interesting
problems, and discusses potential solutions. The emphasis is
on developing a feel for the range of problems and solutions
rather than on detailed or formal treatment of any one
problem. In many cases it will be clear that further research
is needed to clarify the problems or to develop and evaluate
better solutions.
Hierarchical Methods
A basic approach to addressing and routing in large
systems is to use hierarchical methods. These methods can be
applied at various levels (e.g., within networks and among
networks). We give a brief summary of the basic principles
involved since these form the background for many of the other
problems.
As the number of subscribers or "hosts" in a single
network increases, it becomes desirable to introduce a number
of switches, each serving a subset of the hosts. These
switches must maintain routing tables which give the best
outgoing link (or set of links) for any destination. The
tables are used to forward incoming packets properly toward
their destination. In datagram networks, a routing decision
based on final destination is made for every packet, while in
virtual circuit nets only the initial call request packet
-3-
requires the full routing decision (subsequent packets of a
call are forwarded over fixed routes kept in other tables).
If every switch maintained routing information for every
destination individually, the routing tables would become very
large. A standard approach is to introduce hierarchical
addressing, where each host is assigned a particular port on a
particular switch, and hence addresses take the form <switch,
port>. Then routing may also be done hierarchically by
sending all packets destined to a given switch over the same
route, ignoring the "low order" portion of the address. Hence
each switch need only maintain routes to other switches,
greatly reducing the number of different destinations, and
hence entries, in the routing tables.
Note that hierarchical routing is one major motivation
for introducing hierarchical addresses, but these two
techniques do not necessarily go together as we shall see
below. Another reason for hierarchical addresses is simply to
distribute the authority for assigning addresses within a
large system [14].
The same techniques may be extended to multi-network
systems by adding another level to the addressing hierarchy so
that addresses take the form <net, switch, port>. With
hierarchical routing, packets are first routed to the
destination network, ignoring the rest of their address, and
then routed within the final network as above. This form of
-4-
hierarchical addressing has been adopted by the public packet
switching networks in CCITT Recommendation X.121, and it
appears that most public networks intend to use hierarchical
routing as well [13,19].
The reduction of routing table size that accompanies
hierarchical routing has its price. The resulting routes may
not always be optimal. If there are two ways to reach a
remote network (as is often the case), one may be better for
some hosts within that network and the other for other hosts.
But there is by design no way to determine this from a local
routing table which carries a single entry for the entire
remote network. An even more serious consequence of strict
hierarchical routing is discussed in the next section.
To avoid these problems, routing decisions may based on
more of the address where desirable [5,14]. For example, an
internetwork routing table could be augmented with entries for
individual switches receiving high traffic in a remote
network, while other switches in that network were covered by
a single network level entry. This leads to a selective
increase in the size of routing tables, and requires the
ability to search the tables for variable length portions of
addresses and to update tables with varying levels of detail.
Network Partitions
A network is said to be partitioned when enough links
and/or switches fail so that two or more subsets of its hosts
-5-
are formed which cannot communicate with each other. In an
isolated network there is no remedy for this situation until
sufficient repairs are made to restore connectivity. But if
the partitioned net is part of a multi-network system, there
may be paths through other nets which could connect the
partitions. Unfortunately, these paths are not used within
the strictly hierarchical routing procedures described above.
And even if a "local" packet were sent to a neighboring
network by a switch, it would likely be routed right back into
the same paritition by the other network.
This last point indicates another difficulty. Traffic in
a remote network destined for the partitioned net will be
routed into one or the other partition without consideration
of its within-network switch. (Remember that other networks
see a single best route to this network considered as a
whole.) For some destinations, this will be the wrong
partition and the destination will be unreachable by internal
routes, leading to failure to deliver packets routed that way
from remote nets [14,16].
One solution to this problem is to configure the system
with sufficient robustness that partitions occur very rarely,
and to simply tolerate the above delivery problems when they
occur. This may be satisfactory for commercial systems where
loads and outages are fairly predictable.
In military systems where numerous disruptions are
-6-
anticipated, some means of forcing use of any available
connectivity is desirable [3]. One approach is to treat the
number of networks as dynamic, and turn a partitioned network
into two networks, each of which can be an explicit
destination. This requires rather complex methods of updating
each network's view of the overall topology, and promulgates
knowledge of a partition in one network to all other networks
[8]. Another approach might be to return a special error
message to the neighboring router forcing it to choose another
entry point to the failed network. This
backup-and-try-alternate method has been implemented for call
setup in Telenet [19].
"Fast Track" Routing
It is not only in case of catastrophic events like
partitioning that use of external routes between two points
within the same region may be desirable. If two networks
cover the same geographical area, for example a
store-and-forward ground net and a broadcast satellite net,
performance for some types of traffic may be improved by
exiting the ground net near the source, going through the
satellite net, and returning to the ground net near the
destination. File transfer traffic might obtain higher
throughput in this fashion, for example.
To accomplish this, it is once again necessary to violate
hierarchical routing. Either the network level routing must
-7-
distinguish between destinations best reached directly within
the network and those best reached by going outside, or the
within-network level must be made to view paths through other
networks as a special kind of internal link that is available
[9]. But in the latter case, the network level path status
information must be brought into the internal link status
maintenance procedures, probably a messy business.
Multihoming
A subscriber may want to have multiple connections to a
communication system for reliability or performance reasons.
In the simplest case, several independent physical lines may
be managed as one logical data link to obtain greater
reliability, higher throughput, or lower cost (due to the
idiosyncracies of carrier tariffs). Several such multiline
procedures have been developed, for example in Transpac, and
in X.75. The subscriber still has a single address, and no
further complications are involved.
In order to protect against node failures as well as line
failures, lines to different switches must be used. In this
case the user has two (or more) different addresses. The
multiple addresses may be at any level in the address
hierarchy: (e.g. two addresses within a network, or connected
to two different nets). Multiple lines may also provide
better performance by connecting directly to highly used areas
-8-
of the system and thus avoiding extra hops through the
network.
In order to obtain these benefits, the ability to use
both addresses and to select the optimal address must exist.
This may be accomplished by the source explicitly selecting
one address. But this requires the source to know that there
are multiple addresses for a given destination, to select the
best address for performance, and to switch to an alternate
after a failure. These admittedly weighty burdens could be
aided by a remote directory/routing service.
Alternatively, the packet could carry the multiple
addresses explicitly, allowing each switch to pick the best of
the best routes for each address. This of course adds to
packet length and routing processing load.
Instead of carrying the multiple addresses, the packet
might carry the name (or "logical address") of the destination
[14], leaving it for the switches to lookup and select the
best address at each point. This would reduce packet
complexity, but increase the switch processing demands even
further.
Thus we have a spectrum from high source effort to high
network effort in making use of multiple addresses. In
datagram nets it is probably impractical to require complex
processing of the address on every packet, so more source
effort will probably be required. In virtual circuit nets a
-9-
greater amount of effort can be expended by the net on the
call setup request. Some public nets are already providing
call forwarding facilities where a call to one inoperative or
busy address will automatically be forwarded to an alternate
address.
There are problems at the destination as well as the
source. To obtain the benefits of multihoming, the
destination must be willing to accept traffic on all
addresses. In virtual circuit nets, all the traffic for a
given call must flow over the same line, so a failure during
the call cannot be recovered by using an alternate address.
The call must be cleared with possible loss of data, and a new
one requested.
Even in some datagram nets, higher level protocols are
sensitive to the addresses of the local and remote hosts [3].
The source address is used to demultiplex incoming packets to
the proper "connection," and packets coming from an alternate
address from that used to establish the connection would not
be recognized properly. To avoid this problem, the (single)
name of the source could be used in the connection tables, but
this would have to be carried in the packet. Alternatively,
the multiple remote addresses could be stored as part of the
connection table so that a packet specifying any one as source
would match properly. These multiple addresses would have to
be supplied as part of the connection establishment, and might
-10-
be profitably used in sending traffic if the original address
failed.
Mobile Hosts
Mobile hosts represent a special case of the multiple
address problem. Of course all hosts are technically mobile
in the sense that they occasionally change their address due
to reconfiguration and movement within the user organization,
or modifications to the network topology. Hence directory
information to associate the name of a host with its current
address is available in most systems, either locally or via
some remote server.
However, the problem of changing addresses becomes
qualitatively different when the host is expected to change
its network attachment point frequently, even in the midst of
previously established connections. Special dynamic routing
and addressing procedures have been developed for ground based
mobile hosts communicating via packet radio within a single
network [6]. As distances are increased and this technology
is transferred to airplanes, crossing network boundaries may
also be anticipated.
One method for "tracking" mobile hosts would be to
maintain a specialized database of their current locations
(perhaps replicated for reliability), as is done within
individual packet radio nets (by the "station"). The mobile
hosts would send updates to this database as needed, and users
-11-
wishing to establish communication could query the database
much as any other directory service. However, they should be
prepared to receive frequent address change notifications in
the course of a connection, either from the mobile host
itself, alternate relay points, or the database. Further
details of such a scheme may be found in [18].
Assuming traffic reaches them, destinations must still be
"desensitized" from the particular source address as discussed
above, since this will change. But there is no fixed set of
alternates to exchange at connection setup time in this case,
so packets probably must carry a unique identifier (name) of
the source as well as its current address. For reliability
purposes, they should probably also carry the name of the
destination in case it is no longer associated with the
address they reach.
Mobile hosts may have multiple addresses at one moment as
well as at different times (e.g., an aircraft may be in
contact with two radio nets). Thus it becomes apparent that
problems can interact with each other, making solutions more
difficult.
Sharing Network Access
The opposite problem to one host having several access
lines to the net is several hosts sharing a single access
line. This may be desirable where the number of physiscal
interfaces or ports to the network is limited, or to share a
-12-
long access line among nearby subscribers. Public networks
provide multidrop interfaces for terminal traffic (X.28), but
not for packet mode traffic (X.25). For packet level devices,
the alternative to providing a fixed and hence inefficient
frequency or time division multiplexor must be some sort of
"intelligent" multiplexor functioning at the packet level of
network access protocols.
Broadcast networks (e.g., Ethernets and ring nets)
inherently provide this capability since every interface hears
all traffic. Each interface is responsible for accepting
appropriate traffic, and can sometimes be set to intercept
traffic for multiple addresses.
Another approach is to use a higher level of protocol to
provide the necessary demultiplexing. The Arpanet access
(Host-IMP) protocol does not allow for shared interfaces, and
the limitation of 4 host interfaces on the original IMPs has
proved troublesome in some cases. The Internet Protocol (IP)
is the next level above particular network access protocols in
the ARPA hierarchy [10,11]. IP addresses are sufficiently
long to support multiple "logical" hosts at the same physical
host port on the Arpanet. The Host-IMP header indicates the
same physical host address for all such packets, and the
higher level IP module at the destination demultiplexes the
packets to the correct logical host. An independent device to
perform this function has been developed based on PDP-11/03
-13-
hardware. This "port expander" effectively turns each IMP
port into 4-8 ports for hosts that use the Internet Protocol
[7].
Networks vs. Gateways as Switches
In most models of hierarchical routing, networks are
assumed to function as "super-switches," just as switching
nodes do within one network. This view would be literally
true if there were a single internet switching node in each
net to which all incoming traffic from other nets was routed,
and which then forwarded the traffic to another network or to
a local host. Figure X shows a small example of a
multi-network system and a routing table at one
network/switch. The routing table gives the cost in internet
hops and the best neighbor net to use to reach each other
network in the system.
For efficiency, this internet switching function is
usually distributed to processors called "gateways" serving
each of the internet links. Instead of being sent through the
net to some central point, the internet traffic can be routed
immediately at its entry point to the best exit point (either
another gateway or the destination host). Figure Y shows the
same internet system with internet links labeled, and a
routing table at the gateway located on one incoming link.
Since the gateway must send packets across its net to a
-14-
particular outgoing link, the routing table now shows the name
of this next link rather than the next net.
Another step in this progression leads to a single
gateway located in the "middle" of each internet link rather
than two separate processors in each net. The gateways take
on the identity of their internet link(s). In this
configuration, it is more realistic to count the network hops
as the cost fucntion rather than the internet links. Hence
each gateway is maintaining a distance (in network hops)
between gateways, and a best next gateway to use for each
destination. In this model, the gateways may be more
realistically viewed as the switching nodes, and the networks
as the links connecting them. This is essentially the dual of
the earlier model as shown in Figure Z. But the destinations
in the routing table are networks, not gateways, making this a
curious sort of hybrid scheme. Hence it is not clear how to
apply the "link state" type of routing procedures used in
single networks (e.g., the Arpanet) to this multi-network
configuration with gateways as switching nodes.
Local Site Connections
Many sites start with a single host connected to a
long-haul net. As the site develops, a few more hosts are
connected, also directly to the long-haul switch. As even
more hosts want to join the net at that site, problems result
from costly or inefficient use of network access procedures.
-15-
Some sort of port expander or intelligent multiplexor devices
as discussed above become attractive.
This addresses the network connection problem, but not
the local traffic requirements which are also growing, and may
easily exceed traffic to remote sites. The network switch is
handling a lot of traffic that never goes any further through
the net. In some cases the port expanders may be capable of
local switching, forming a rudimentary local net.
To handle local traffic more efficiently, an explicit
local net may be desirable. A question then arises as to
whether this net should be "known" to the rest of the internet
system, and connected to it via one or more full-fledged
gateways, or whether it should be "invisible" at the internet
level with its hosts appearing as if they were directly
connected to the long-haul net. In the first case, local
hosts have internet addresses on an explicit local net, while
in the second they have addresses on the long-haul net.
The explicit local net approach has certain advantages
stemming from the explicit identification of the group of
hosts at a site as a network. If the site is connectected to
two or more other nets, then the internet routing mechansims
will automatically choose the best path to the local hosts,
which have only a single address (on their local net).
However, this participation at the internet level can
also be a problem. As the number of sites with local nets
-16-
increases, so will the number of nets and hence the size of
the routing tables and updates which must be propagated all
over the internet system. If the growth continues at a site
so that there are several local nets connected by "local"
gateways, should all of these nets and the local topology be
known throughout the internet system? At some point treating
local nets on a par with long-haul or backbone nets breaks
down.
The invisible local net approach, on the other hand,
avoids problems of proliferating networks at the internet
level. Many port expander or local distribution systems can
perform an internal switching function, relieving the
long-haul net switch of handling local traffic. But sites
with connections to two or more nets will have multiple
addresses for their hosts (one for each net the hosts appear
"directly" connected to), and this causes some difficulties as
discussed above under Multihoming.
The best solution to this tradeoff is not clear. Adding
an additional level to the addressing hierarchy may be a
temporary solution, but it, too, will become strained in time.
This suggests allowing a variable number of levels in the
addressing hierarchy, adding new levels as complexity
increases in some area. But this imposes a rigid ordering of
levels and hence routing, while in reality "higher" and
"lower" may depend on the viewpoint of the user. Further
-17-
research is needed on how internet systems may grow and still
maintain efficient addressing and routing procedures.
Multiple Domains
Most of the previous discussion has assumed a single
compatible "domain" in which network addressing and routing
procedures are carried out uniformly. In the real world we
have already seen the growth of several large domains with
different conventions, including public, mainframe
manufacturer, Defense Department, and local networks. It is
unrealistic and perhaps impossible that these diverse groups
will ever adopt a single addressing scheme, so we must live
with the problem of multiple domains for the foreseeable
future.
One approach is to assume that one domain will make use
of another merely as transport medium between its own
homogeneous components. The used system appears merely as one
of several types of media that the using system can employ via
appropriate access protocols. The using system's packets will
be "encapsulated" in the used system's protocols. Of course
the two domains can make use of each other, achieving
coexistence, if not complete interoperation, by "mutual
encapsulation" [15].
To achieve full interoperability between heterogeneous
systems, each system must recognize the hosts on the other.
-18-
Two basic choices are possible for crossing domain boundaries:
mapping and source routing.
In the mapping approach, each domain provides a set of
otherwise unused internal addresses which it maps to
particular addresses in other domains. Traffic addressed to
one of these "pseudo-addresses" is routed to an interface or
gateway to the appropriate other domain, at which point the
pseudo-address is converted into an address in the other
domain. In the simplest case, this requires only bilateral
agreements between domains, but it may also be extended across
intermediaries with further collaboration.
A disadvantage of this approach is that the number of
external addresses available is limited to those for which
mappings have been previously defined and installed.
Typically only a small fraction of remote parties are
supported. Another disadvantage is that the same party has
different addresses in different domains--the directory of
names to addresses has many entries for each name, one for
each domain supporting that party. The major advantage is
that for those names supported, the users may address remote
parties in exactly the same fashion as local ones, with no
additional procedures.
In source routing [14,17,5], the source specifies a route
to reach the destination consisting of the addresses of
successive inter-domain gateways, and ending with the final
-19-
destination. Each address in this list is interpreted within
a domain where it is meaningful, and then removed so that the
next address is available in the next domain transitted.
Using this method, the full range of remote parties is
accessable, and the inter-domain gateways do not have to
maintain any predefined mappings or perform address
conversions. The burden is shifted to the source which must
know enough about the overall topology and address formats to
construct a successful source route. Of course packet headers
become bigger, and packet processing increases to accomodate
the variable length source routes. Once again, the "address"
of a given party varies from one domain to another, but it is
now possible to combine this information--if the directory
gives the source route to X from domain A, and a user in
domain B knows a route to domain A, he can concatenate them to
get a route to X from B (although it may not be an optimal
route).
It is often useful to collect a return route at the same
time the source route is being consumed. This allows the
destination to reply. In general the return route is not
simply the inverse of the source route. The return addresses
are added as the packet enters each domain, while the
successive destination addresses are removed as the packet
exits each domain (see [17] for a detailed example).
The "network independent" transport protocol [2]
-20-
developed by the British PSS Users Forum is one of the first
to explicitly deal with the problem of multiple domains. They
suggest essentially a source routing mechanism. There are
additional provisions for translating explicitly identified
address information transmitted as data between end users.
The protocol assumes a route setup procedure as part of call
establishment so that the source route need only be carried in
the call request packet.
The public networks have also provided for a limited form
of source routing in the Call User Data field of X.25 call
request packets. This field may be used by the destination
DTE as additional address information for subsequent steps in
a call. This mechanism was used to allow international calls
between Canadian and US public networks before the
hierarchical X.121 numbering plan was put into effect [12].
The Call User Data field is also beginning to be used in an ad
hoc fashion to provide addressing within various private
and/or local nets connected to public nets.
The Arpa Internet Protocol also supports a source routing
option, but addresses within the route are all expected to be
IP format addresses [11].
Conclusions
We have identified a number of problems that must be
considered in going beyond the simple network interconection
techniques that are in use today. The significance of these
-21-
problems is just beginning to be widely percieved. Some
preliminary solutions have been proposed, but little practical
experience exists. Much work remains to be done in clarifying
the problems, and in developing and evaluating solutions.
Acknowledgements
Many of the concepts presented in this paper have been
discussed over several years as part of the ARPA Internet
project. Much of the credit for developing and clarifying
these ideas belongs to my colleagues at ISI and the other
sites engaged in this project.
References
Note: Several of the references listed below are Internet
Experiment Notes, unpublished memos written for the ARPA
Internet project.
[1] D. R. Boggs, J. F. Shoch, E. A. Taft, and R. M. Metcalfe,
"Pup: An Internetwork Architecture," IEEE Trans. on
Communications 28, 4, April 1980, pp. 612-623.
[2] British Post Office PSS User Forum, A Network Independent
Transport Service, February 1980.
[3] V. G. Cerf, Internet Addressing and Naming in a Tactical
Environment, Internet Experiment Note 110, August 1979.
[4] V. G. Cerf and P. T. Kirstein, "Issues in Packet-Network
Interconnection," Proc. IEEE 66, 11, November 1978, pp.
1386-1408.
[5] D. D. Clark and D. Cohen, A Proposal for Addressing and
Routing in the Internet, Internet Experiment Note 46,
June 1978.
[6] R. E. Kahn, S. A. Gronemeyer, J. Burchfiel, and R. C.
Kunzelman, "Advances in Packet Radio Technology," Proc.
IEEE 66, 11, November 1978, pp. 1468-1496.
-22-
[7] H. A. Nelson, J. E. Mathis, and J. M. Lieb, The ARPANET
IMP Port Expander, SRI Report 1080-140-1, November 1980.
[8] R. Perlman, Flying Packet Radios and Network Partitions,
Internet Experiment Note 146, June 1980.
[9] R. Perlman, Utilizing Internet Routes as Expressways
Through Slow Nets, Internet Experiment Note 147, June
1980.
[10] J. B. Postel, "Internetwork Protocol Approaches," IEEE
Trans. on Communications 28, 4, April 1980, pp. 604-611.
[11] J. B. Postel, C. A. Sunshine, and D. Cohen, "The ARPA
Internet Protocol," to appear in Computer Networks, 1981.
[12] A. M. Rybczynski, D. F. Weir, and I. M. Cunningham,
"Datapac Internetworking for International Services,"
Proc. 4th Int. Conf. on Computer Communication, September
1978, pp. 47-56.
[13] A. M. Rybczinski, J. D. Palframan, and A. Thomas, "Design
of the Datapac X.75 Internetworking Capability," Proc.
5th Int. Conf. on Computer Communication, October 1980,
pp. 735-740.
[14] J. F. Shoch, "Inter-Network Naming, Addressing, and
Routing," Proc. 17th IEEE Computer Society Int. Conf.,
September 1978, pp. 72-79.
[15] J. F. Shoch, D. Cohen, and E. A. Taft, "Mutual
Encapsulation of Internetwork Protocols," to appear in
Computer Networks, 1981.
[16] C. A. Sunshine, "Interconnection of Computer Networks,"
Computer Networks 1, 3, January 1977, pp. 175-195.
[17] C. A. Sunshine, "Source Routing in Computer Networks,"
ACM SIGCOMM Computer Communication Rev. 7, 1, January
1977, pp. 29-33.
[18] C. A. Sunshine and J. B. Postel, Addressing Mobile Hosts
in the ARPA Internet Environment, Internet Experiment
Note 135, March 1980.
[19] D. F. Weir, J. B. Holmblad, and A. C. Rothberg, "An X.75
Based Network Architecture," Proc. 5th Int. Conf. on
Computer Communication, October 1980, pp. 741-750.