home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1993
/
Internet Info CD-ROM (Walnut Creek) (1993).iso
/
inet
/
internet-drafts
/
draft-hitchcock-eid-00.txt
< prev
next >
Wrap
Text File
|
1993-06-07
|
12KB
|
293 lines
Big Internet D. Hitchcock
INTERNET-DRAFT U.S. DOE
May 1993
Endpoint Identifiers: What do they do and why
are they a good thing?
Status of this Memo
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its Areas, and
its Working Groups. Note that other groups may also distribute working
documents as Internet Drafts).
Internet Drafts are draft documents valid for a maximum of six
months. Internet Drafts may be Updated, replaced, or obsoleted by other
documents at any time. It is not appropriate to use Internet Drafts as
reference material or to cite them other than as a "working draft" or
"work in progress."
Please check the I-D abstract listing contained in each Internet
Draft directory to learn the current status of this or any other Internet
Draft.
Abstract
There has been an ongoing debate on the Big Internet list over the
past year over whether abstracting the concept of Endpoint Identifier
(EID) from the concept of address which has significance in the topology
of the network. This draft attempts to summarize the arguments pro and con
as well as some discussion of whether the EID should be in the network
layer or elsewhere. This draft also contains a specific proposal for EID
format with a discussion of the pros and cons of this choice.
1. Some Background
The assignment of addresses in the internet follows a tree of
Address Assignment Authorities. At the root of the tree is the top-level
(or 0-level) AAA. This AAA assigns blocks of numbers to the next level
down (1-level) AAA, which assigns blocks of numbers from the block it owns
to 2-level AAAs and so on. If a traditional left-to-right bit- wise
significant address is used, these blocks of numbers are low- order-bits-
Big-Internet, Expires November 1, 1993 [Page 1]
INTERNET-DRAFT EID's: Pro and Con April 1993
maskable binary numbers.
Current internet technology is approaching the end of its useful
life due to the expansion in the number of attached networks and hosts.
These expansions have resulted in two problems, depletion of the
assignable address space and explosion in the amount of information
exchanged especially between the top level backbone service providers.
There are a number of proposals currently under consideration to support
the future growth of the internet: TUBA, SIP, IPAE, PIP, Nimrod,... as
well as a near term proposal CIDR to help address these problems as well
as some others. It is likely that some number of these technologies will
need to coexist and interoperate for some period of years.
All of these proposals must address the issue of how to assign these
numbers so that 1) routing scales well, 2) good paths are found, 3)
constraints on the physical topology are minimized, and 4) reconfiguration
of systems is minimized. If one creates a graph where the vertical axis is
scaling (bottom is perfect scaling in top is bad scaling) and the
horizontal axis is path quality (left is perfect paths and right is bad
paths), then the optimal operating point on the graph is the lower left
corner. In general the "physics" of networking forces operating points on
this graph to be at the upper left or lower right. Depending on the type
of address assignment scheme used, however, it is possible to move
somewhat towards the lower left (good solutions) or the upper right (bad
solutions). Moving to the lower left, however, may increase topology
constraints or reconfiguration requirements.
Central to the evaluation of any address assignment scheme are
answers to the questions 1) what constitutes good scaling, 2) what
constitutes a good path, 3) what constitutes unacceptable or costly
topology constraints, and 4) what constitutes unacceptable or costly
reconfiguration. I suspect that the community has or will come to
reasonable agreement on what the characteristics of each address
assignment scheme are. Except for possibly the first question, I also
suspect that the community will not agree on the answers to the questions,
partly because the cost of each aspect is borne by different parties, and
partly because we lack experience.
In the current IP technology the IP number is both the identifier of
a computer system and the carrier of the topological information the
network uses to determine how to route information.
2. What is an Endpoint Identifier (EID)?
For the purposes of this draft an EID is a fixed length string of
defined structure which uniquely identifies a "network endpoint." EID's
have the following properties:
A single EID may have associated with it multiple network attachment
Big-Internet, Expires November 1, 1993 [Page 2]
INTERNET-DRAFT EID's: Pro and Con April 1993
points with multiple addresses.
A single address can be associated with only one EID at any one time
although the binding of addresses to EID's may change over time.
EID's are assigned so that they are unique network wide.
EID's differ from DNS names in that they are fixed length as well as
in some other details... MX records, Cnames,...
EID's are stable over time and are not created or destroyed too
quickly.
EID's are network layer objects in the sense that all transport and
higher layer services on a given endpoint use the same EID.
In order to make these definitions more specific we must define exactly
what we mean by a "network endpoint." This is to some extent a choice of
the most appropriate granularity for stable descriptions of network
entities. The critical elements of the definition of an endpoint are the
concept of fate-sharing developed by Chiappa and the concept of stability.
In most cases a network endpoint is a single computer system. However,
there are cases where a single system might have more than one EID
especially for systems in a multilevel secure environment.
3. What problems do EID's address?
Virtually all the proposals for IPv7 as well as the near term CIDR
proposal will require significant portions of the internet community to
modify their internet addresses, either the assignment, the format, or
both. Furthermore, in the foreseeable future the topological information
required by the network to reach a given destination will become more
changeable rather than less changeable because:
commercial providers will be very motivated to change the topology
to achieve more balance utilization of their investment in
connections.
the sources and destinations of network traffic will themselves
become mobile or changeable.
The current IP addressing and routing technology does not provide easy
answers to these problems. In fact the way IP host software is currently
implemented implies that it is very difficult to accommodate these
issues. The administrative problems of renumbering even a medium sized
site using today's tools is formidable and requires at least rebooting
every machine.
One reason for these problems is that IPv4 uses the IP address both to
Big-Internet, Expires November 1, 1993 [Page 3]
INTERNET-DRAFT EID's: Pro and Con April 1993
route packets and to identify sources and destinations of packets.
4. The Case for and Against EID's
The arguments for EIDs include:
1. System identification and location are qualitatively different
functions and so should be separated architecturally.
2. EID's may facilitate mobile hosts.
3. EIDs may allow global changes in network topology without disrupting
ongoing processes.
4. EID's may facilitate management of local sites in an environment
where "addresses" need to be changed fairly frequently.
The argument against EID's include:
1. Its an extra number space to manage.
2. The essential features of the EID are provided by the DNS name
(since there is no need for EID's in every packet.)
3. EID's may not be the only way to provide mobility and portability
of processes.
Complicating this discussion is the fact that all of these different
advantages and disadvantages have different levels of importance for
various people. In my own view advantages 3 and 4 are very important but
other people have different priorities.
Also, to be clear about my biases, having a single network layer service
EID that multiple higher layer processes could use seems much simpler and
easier to manage than a multitude of higher level processes to perform the
same functions on a process by process basis.
5. EIDs and DNS Names
One issue which needs to be clarified is the realtionship between DNS
names and EIDs.
EIDs are fixed format identifiers which are suitable for inclusion
in every packet; although this may not be required.
EIDs do not support the logical constructs equivalent to CNAMEs and
MX records in the DNS.
One of the major applications which one would like to be robust when
Big-Internet, Expires November 1, 1993 [Page 4]
INTERNET-DRAFT EID's: Pro and Con April 1993
addressing topology changes is the DNS. While it is possible to
imagine complex bootstrap procedures for the DNS to accomplish this
if DNS names were used as EID's transforming the DNS search tree to
refer to EIDs rather than addresses is likely to be a much simpler
way of accomplishing this.
5. Proposed Experiment
However, without real experience with EID's it is impossible to accurately
evaluate any of this. Therefore, I would like to propose the following EID
experiment.
Choose an EID format which is the same as the current IPv4 and build
an implementation which uses two copies of IPv4 one for routing and
one for EID (one could even use the current IP address as EID and
add a RD - routing directive - object which looks like IPv4 to
minimize the impact on current software implementations).
Assume EID assignment follows current DNS delegation procedure.
Modify DNS so it can supply EID as well as "address"
For all those old applications which use the DNS name and "address"
replace "address" with EID
Define EARP (EID ARP) which is same as plain old ARP but uses EID
instead of "address."
Some of the issues which would need to be addressed are how to propagate
changes in EID-"address" binding in real time and maintain coherent view
of the network. I propose that SNMP be used to build the right fragments
to manage this.
Note that once a router passes the EID to a layer 2 subnet the delivery of
packets works just as it does in IP because of EARP.
This testbed is, it seems to me, the minimal thing that one can do to
evaluate how useful EIDs would be. In addition, it has the side benefit
that if it were successful it could lead to an EID structure which would
be directly useful in CIDR.
Big-Internet, Expires November 1, 1993 [Page 5]