home *** CD-ROM | disk | FTP | other *** search
- To: Linda at ISIF
- Cc: JHaverty at BBNG
-
-
-
-
-
-
-
-
-
-
- IEN-181
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Van Gateway: Some Routing
- and Performance Issues
-
- Jack Haverty
-
- Bolt Beranek and Newman Inc.
-
- May 1981
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- The VAN gateway is a new facility currently under
-
- development for the internet community. Its intended purpose is
-
- to allow interconnection of the ARPANET and therefore the
-
- Internet with Telenet, but it also introduces a new mechanism
-
- whose failure or misuse can seriously affect the system. The key
-
- problem with use of the VAN gateway is to allow and encourage
-
- using it for legitimate purposes, while preventing utilization by
-
- unauthorized users or as a result of a software or hardware
-
- failure in the networks involved.
-
-
- There are two aspects to this problem. The first control on
-
- the gateway usage must be to assure that the packets being
-
- handled are legitimate, in that they are associated with
-
- authorized users. This is a specific example of the need for
-
- mechanisms which have been discussed at various times as
-
- "restricted routing" mechanisms.
-
-
- The second control problem is to assure that the gateway is
-
- being used as intended, with a reasonable level of traffic for
-
- the function being performed. Even if packets are being
-
- processed for authorized users, it is possible for failures
-
- within the routing system or host software, for example, to cause
-
- packets to loop endlessly. Failures of the network protocols
-
- could similarly cause duplicate packets to be sent needlessly.
-
-
-
-
-
- -1-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- In both cases, the concern results from the highly visible
-
- impact which use of Telenet incurs, since charges are computed on
-
- a per-packet basis. However, the same issues are inherent in the
-
- Catenet itself, in that misuse of the network consumes resources
-
- which are then unavailable for legitimate use. Thus the problem
-
- of managing use of the gateway is most critical for the VAN
-
- gateway, but applies as well to all gateways, and in fact to any
-
- shared resource.
-
-
- In the initial implementation of the VAN gateway, resource
-
- management is being provided by use of tables which enumerate the
-
- authorized users of the gateway. These users are simply the
-
- addresses of the hosts, both on the ARPANET (Catenet) side and on
-
- the Telenet side, which will be acceptable as valid source and
-
- destination addresses of packets which transit the gateway. All
-
- other packets which are received by the gateway will be
-
- discarded.
-
-
- In the internet architecture, the Telenet side of the
-
- gateway appears as a single network to the internet mechanisms.
-
- The gateway contains a table which maps artificial host addresses
-
- on that network into real 14-digit Telenet/X.25 addresses, in
-
- much the same way as other networks convert internet addresses
-
- into addresses for their particular attached network. X.25
-
- virtual circuits are only permitted between the gateway and X.25
-
-
-
- -2-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- hosts which are present in this translation table, which
-
- effectively defines the set of authorized gateway users in the
-
- X.25 community.
-
-
- No similar table is necessary for translation of addresses
-
- on the ARPANET side of the gateway, since this translation is
-
- well defined by the internet protocol. Without any additional
-
- mechanisms, this would permit any ARPANET host to use the VAN
-
- gateway. In addition, since gateways to other networks are
-
- simply ARPANET hosts, this would permit any host on the Catenet
-
- to use the VAN gateway.
-
-
- To restrict the user community of the VAN gateway, a second
-
- table is provided, which enumerates all internet addresses which
-
- are acceptable as sources or destinations on the ARPANET side of
-
- the gateway. Each internet datagram which arrives from the
-
- ARPANET or Telenet is checked to assure that the source and
-
- destination addresses in the internet header are listed in one of
-
- the two tables which define the set of hosts which are permitted
-
- to use the VAN gateway.
-
-
- The table entries will be set up directly by DARPA. In
-
- selecting the set of valid hosts, the reliability of the data
-
- presented to the gateway should be considered.
-
-
-
-
-
-
- -3-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- In particular, we note that there is a significant
-
- difference in the addresses presented at the gateway in the
-
- internet header of each packet. If such an address is in fact on
-
- the ARPANET, the gateway can verify it by comparison with the
-
- address supplied by the IMP in the ARPANET leader of the packet.
-
- For packets sent to the ARPANET, one can similarly expect the IMP
-
- subnet to deliver the packet to the host specified in the ARPANET
-
- leader.
-
-
- If the address of a packet handled by the gateway is on
-
- another component network of the Catenet, the packet is
-
- necessarily handled through one or more gateways. The internet
-
- structure permits gateways to freely enter the system. Gateways
-
- are in general under the control of the organization which owns
-
- them and/or the attached network. Gateways in general do not
-
- check the addresses in the internet headers of packets which they
-
- process, so it is possible for malfunctioning hardware or
-
- software to emit packets with incorrect addresses. If such
-
- addresses happen to be present in the VAN gateway tables, these
-
- packets will be processed by the VAN gateway.
-
-
- The impact of this situation on the policy for allowing use
-
- of the VAN gateway is that hosts on networks other than the
-
- ARPANET are to be considered somewhat less reliable in terms of
-
- enforcement of the usage policy. The mechanisms in the initial
-
-
-
- -4-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- VAN gateway implementation will provide some degree of control
-
- over the use of the gateway, but these mechanisms are not to be
-
- considered appropriate or complete in the general sense, and they
-
- are not proof against failures. These mechanisms are intended
-
- only as an interim measure.
-
-
- We suggest that further development work on the internet
-
- gateway system, of which the VAN gateway is a component, should
-
- address the problems of resource control at the internet system
-
- level. Any mechanism which restricts the usage of a gateway must
-
- be designed in conjunction with other network mechanisms, such as
-
- routing, flow control, load sharing, and error control.
-
-
- As an example, we can consider a hypothetical configuration
-
- in which two VAN gateways are connected to Telenet, one from
-
- ARPANET, and the other from SATNET, to support traffic between
-
- Telenet users and hosts on ARPANET or SATNET. Only these
-
- user/hosts would be listed in the VAN gateway tables.
-
-
- Since the VAN gateways are participants in the internet
-
- routing mechanisms, failure of the gateway between ARPANET and
-
- SATNET would cause the system to recognize the path through
-
- TELENET, as a transit network, as a viable route for ARPANET-
-
- SATNET traffic. However, this traffic would be discarded at the
-
- VAN gateway because the addresses are not listed in its tables.
-
-
-
-
- -5-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- This scenario will be avoided by preventing the two VAN
-
- gateways from being "neighbors" for routing purposes, which is
-
- acceptable only in restricted configurations. The general
-
- problem results from the usage restrictions at the VAN gateway,
-
- which makes the path a valid route for one class of packets, but
-
- invalid for other classes. The current routing mechanism cannot
-
- handle this situation.
-
-
- In addition, the effect of the usage restrictions on future
-
- mechanisms for handling partitioned networks, and load sharing of
-
- gateway paths, must be investigated.
-
-
- We have two mechanisms to propose for consideration as
-
- mechanisms to attack this problem. The first is a resource
-
- control model which is a result of the TIP Login work. The
-
- second involves the use of performance models, which monitor use
-
- of resources to determine if unexpected behavior occurs. These
-
- two mechanisms can be introduced to work more effectively in the
-
- VAN gateway problem.
-
-
- The architecture for the TIP Login system identifies several
-
- abstract modules which interact to implement the resource control
-
- functions. A "Control Point" is the module which directly
-
- controls the use of a resource. It is responsible for detecting
-
- an attempt to use some resource, collecting such information
-
-
-
-
- -6-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- which identifies who is trying to use the resource and what they
-
- are trying to do, and then permitting or denying use of the
-
- resource. The decision concerning whether or not a particular
-
- usage is allowed is made by a "Decision Module." This module
-
- takes the information supplied by the Control Point, and applies
-
- the algorithm which defines the resource usage policy.
-
- Typically, and particularly in the Tip Login case, the Decision
-
- Module will obtain more information about the particular user
-
- and/or resource involved in the decision, by using a distributed
-
- database system.
-
-
- In the TIP Login system, the Control Point is at each TIP.
-
- Decision Modules are located in special-purpose hosts. The
-
- database system is present in those hosts as well as on larger
-
- database-maintenance hosts, where tools to manipulate and modify
-
- the database exist. Typically the Decision Module identifies the
-
- particular individual attempting to use a TIP, and retrieves a
-
- record of information specific to that individual, which defines
-
- his authorizations (or lack thereof).
-
-
- Much of this mechanism should prove to be useful as a basis
-
- for control of gateways as well. In such a system, the control
-
- points would be at the gateways. Decision Modules might also be
-
- at the gateways, if decisions must be made on each packet.
-
- Decisions might be based on source or destination addresses, or
-
-
-
- -7-
-
-
- IEN-181 Bolt Beranek and Newman Inc.
- Jack Haverty
-
-
-
- on the identify of the individual responsible for the packet. We
-
- suggest that this approach be considered for further research.
-
-
- A problem which is not being addressed currently is the
-
- second control problem mentioned earlier, namely the monitoring
-
- of the use of some resource by an authorized user, to guarantee
-
- that the resource is being used as intended. In the VAN gateway
-
- case, for example, a malfunctioning TCP might cause many
-
- unnecessary packets to be handled, but since they are associated
-
- with authorized addresses, no control is applied. In addition to
-
- the obvious cost and performance penalties, lack of monitoring
-
- precludes the use of policies which grant limited use of
-
- resources to, for example, allow some users to handle only low-
-
- throughput traffic, or low priority traffic. We believe that the
-
- use of performance models, embedded within the gateways and for
-
- hosts, is a promising direction for attacking this problem.
-
-
- Limitations of the current LSI-11 implementation of the VAN
-
- gateway are likely to preclude any significant testing of these
-
- approaches. We have been pursuing these ideas as research
-
- issues, which have surfaced during the current implementation
-
- efforts.
-
-
-
-
-
-
-
-
-
- -8-
-