SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Slide 1
A Service-Inferred, Deterministic
Traffic Forwarding Scheme
C. Jacquenet
christian.jacquenet@orange.com
Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Slide 2
Outline
• New challenges
• Basic issue and typical use case
• Introducing Network Located Function
Chaining (NLFC)
• NLFC operation
• Pending questions
Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Challenges
• Network service design and operation now assume
the combined and sometimes ordered activation of
elementary capabilities
– Forwarding and routing, firewall, QoS, DPI, etc.
– Function chaining may be conditioned by traffic directionality
• These Network-Located Functions (NLF) may be
activated on the same I/F or network segment
– E.g., the (s)Gi I/F of mobile networks
• Inferred complexity suggests robust mastering of
chained NLF activation
– For the sake of optimized service delivery and efficient
forwarding scheme
Slide 3 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Core Issue
• IP network operation now assumes the
complex chaining of various elementary
capabilities
– Besides basic routing and forwarding functions
• How to efficiently forward traffic entering a
network that supports these functions?
– Differentiation is ensured by tweaking the set of
network functions to be invoked
• Packet processing decisions become service-
inferred and policy-derived
Slide 4 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Slide 5
Business-Driven Forwarding
Use Case
• Best path is now computed and selected
based upon network service orchestration
– May differ from typical hop-by-hop path
computation and forwarding schemes
Unsuitable
Network
Typical best path
Business best path
User
2 paths
1 path
1 path
Unsuitable network
is not visible to first
service provider
network
Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLFC Objectives
• Compute and establish service-inferred data paths
– For the sake of optimized traffic flow forwarding
• Master NLF chaining regardless of the underlying
topology and routing policies
– Yielding a NLF-based differentiated forwarding paradigm
• Facilitate NLF operation while avoiding any major
topology upgrade
– Adapt chronology of NLF activation according to the required
service and associated parameters
• Contribute to the automation of dynamic resource
allocation and policy enforcement procedures
Slide 6 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Rationale
• Dynamic NLF provisioning is separated from
packet processing
• NLF functions are seen as black boxes
• NLF chaining varies as a function of the
service and the traffic directionality
– Chaining is described by an information processed
by devices that participate to the delivery of a
given service
– Such information is signaled by the packets
themselves
Slide 7 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLFC Environment
• Policy Decision Point (PDP) *makes* decisions
according to policies documented in NLFC Policy
Tables
– PDP decisions are applied by NLF (boundary) nodes which
process traffic accordingly
Slide 8 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
The Intelligence Resides In
The PDP
• PDP-maintained NLFC Policy Tables describe
the NLF-specific policy to be enforced
• NLF nodes are provisioned with:
– Local NLF Identifier(s) so that the node can position
itself in the NLFC Map
– NLFC Maps and Locators
• Boundary nodes are also provisioned with
Classification Rules
– A Rule is bound to one NLFC Map
– (Packet) Classifier relies upon various packet header
fields (DA, SA, DS, etc.)
Slide 9 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLFC Processing
• Assign NLF Identifiers
– NLF functions are listed and identified in a repository
maintained by the NLFC administrative entity (ISP)
• Identifier is a case-sensitive string
• Assign NLF Locators
– Meant to locate a NLF which can be supported by several
devices
• Locator is typically an IP address (could be a FQDN)
• One or multiple Locators can be configured for each NLF
• Build NLFC Maps
– Detail the list of NLFs to be invoked in a specific order
– Maps are identified by an Index and are specific to traffic
directionality
Slide 10 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
NLF Node Operation
• Check whether the incoming packet conveys
a NLFC Map Index
– If not, proceed with typical forwarding rules
• If so, packet is subject to NLFC according to:
– The NLFC Map
– The number of NLF functions supported by the
node
• If node is not the last in the Map, node
forwards packet to the next NLF node as
described in the Map
– Proceeds with typical forwarding rules otherwise
Slide 11 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Example
• A node supports NLF function a
– Function a must be invoked only for packets
matching Rules 1 and 3, as per NLFC Maps
– Next NLF functions to be invoked for such packets
are c (Map Index 1) and h (Map Index 3),
respectively
Slide 12 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
At NLFC Domain Boundaries
• Ingress Node
– Strips any existing NLFC Map Index
– Checks whether received packet matches any existing
classification rule
• If not, proceed with typical forwarding rules
– If so, retrieves the locator of the first NLF as per the
corresponding Map entry
• If next NLF node is not the next hop, packet is encapsulated
(e.g., GRE) and forwarded to next NLF node
• Egress Node
– Strips any existing NLFC Map Index
– Proceeds with typical forwarding rules
Slide 13 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Pending Questions
• NLC Map Index encoding
– 8-bit is probably enough, 16-bit is comfortable
• Where to store NLFC Map Index?
– DS field, Flow Label, new IPv6 extension header, new IP
option, L2 field, TCP option, define a new shim, etc.
• NLFC forwarding suggests encapsulation
– When next NLF node is not the next hop as per IGP/BGP
machinery
– GRE, IP-in-IP, LISP, etc., are candidate options
• Security issues at NLFC domain boundaries
– Means to protect against DDoS or illegitimate invocation of
resources must be supported
Slide 14 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Reading Material
• Problem statement
– http://tools.ietf.org/html/draft-quinn-nsc-problem-
statement-00
• Global framework
– http://tools.ietf.org/html/draft-boucadair-network-
function-chaining-01
• Network Service Header (as a means to
encapsulate information that describes a
service path)
– http://tools.ietf.org/html/draft-quinn-nsh-00
Slide 15 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.
Thank You!
Slide 16 Conseil Scientifique AFNIC – 9 juillet 2013
Copyright Orange. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...
chiportal
 
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
chiportal
 

Was ist angesagt? (20)

2.FPGA for dummies: modern FPGA architecture
2.FPGA for dummies: modern FPGA architecture2.FPGA for dummies: modern FPGA architecture
2.FPGA for dummies: modern FPGA architecture
 
Rpl
Rpl Rpl
Rpl
 
Update on IRATI technical work after month 6
Update on IRATI technical work after month 6Update on IRATI technical work after month 6
Update on IRATI technical work after month 6
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...TRACK D: A breakthrough in logic design drastically improving performances fr...
TRACK D: A breakthrough in logic design drastically improving performances fr...
 
3.FPGA for dummies: HDL languages
3.FPGA for dummies: HDL languages3.FPGA for dummies: HDL languages
3.FPGA for dummies: HDL languages
 
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
Scaling the Web to Billions of Nodes: Towards the IPv6 “Internet of Things” b...
 
Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013Rina IRATI GLIF Singapore 2013
Rina IRATI GLIF Singapore 2013
 
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
 
LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 
RouteFlow & IXPs
RouteFlow & IXPsRouteFlow & IXPs
RouteFlow & IXPs
 
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
TRACK F: OpenCL for ALTERA FPGAs, Accelerating performance and design product...
 
1.FPGA for dummies: Basic FPGA architecture
1.FPGA for dummies: Basic FPGA architecture 1.FPGA for dummies: Basic FPGA architecture
1.FPGA for dummies: Basic FPGA architecture
 
Architecture of OpenFlow SDNs
Architecture of OpenFlow SDNsArchitecture of OpenFlow SDNs
Architecture of OpenFlow SDNs
 
0.FPGA for dummies: Historical introduction
0.FPGA for dummies: Historical introduction0.FPGA for dummies: Historical introduction
0.FPGA for dummies: Historical introduction
 
DEVNET-1006 Getting Started with OpenDayLight
DEVNET-1006	Getting Started with OpenDayLightDEVNET-1006	Getting Started with OpenDayLight
DEVNET-1006 Getting Started with OpenDayLight
 
IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
 
Ieee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorialIeee nfv-sdn-2020-srv6-tutorial
Ieee nfv-sdn-2020-srv6-tutorial
 
Mpls
MplsMpls
Mpls
 

Andere mochten auch (6)

Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréalAct 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
Act 00109 géo-trafic la plateforme mobilité temps-réel de la ville de montréal
 
Routage avancé et contrôle du trafic sous linux
Routage avancé et contrôle du trafic sous linuxRoutage avancé et contrôle du trafic sous linux
Routage avancé et contrôle du trafic sous linux
 
Comment générer du trafic vers votre site internet en 2017 ?
Comment générer du trafic vers votre site internet en 2017  ?Comment générer du trafic vers votre site internet en 2017  ?
Comment générer du trafic vers votre site internet en 2017 ?
 
netsurf ppt in hindi
netsurf ppt in hindinetsurf ppt in hindi
netsurf ppt in hindi
 
Digital in store - point de vente proximite - Retail and Detail Solutions
Digital in store - point de vente proximite - Retail and Detail SolutionsDigital in store - point de vente proximite - Retail and Detail Solutions
Digital in store - point de vente proximite - Retail and Detail Solutions
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déterministe

P4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and ControlP4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and Control
Open-NFP
 
On SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergOn SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve Rothenberg
CPqD
 
Cumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open sourceCumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open source
Nat Morris
 

Ähnlich wie JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déterministe (20)

Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
Barak Perlman, ConteXtream - SFC (Service Function Chaining) Using Openstack ...
 
P4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and ControlP4 for Custom Identification, Flow Tagging, Monitoring and Control
P4 for Custom Identification, Flow Tagging, Monitoring and Control
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
On SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergOn SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve Rothenberg
 
OpenFlow Extensions
OpenFlow ExtensionsOpenFlow Extensions
OpenFlow Extensions
 
IP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and FutureIP QoS signaling in the IETF:Past, Present and Future
IP QoS signaling in the IETF:Past, Present and Future
 
Segment Routing: A Tutorial
Segment Routing: A TutorialSegment Routing: A Tutorial
Segment Routing: A Tutorial
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-case
 
Making our networking stack truly extensible
Making our networking stack truly extensible Making our networking stack truly extensible
Making our networking stack truly extensible
 
IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013IPv6 Deployment: Why and Why not? - HostingCon 2013
IPv6 Deployment: Why and Why not? - HostingCon 2013
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
 
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoTNon-Fluff Software Defined Networking, Network Function Virtualization and IoT
Non-Fluff Software Defined Networking, Network Function Virtualization and IoT
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
How OPNFV Uses OpenStack & How It's Useful
How OPNFV Uses OpenStack & How It's UsefulHow OPNFV Uses OpenStack & How It's Useful
How OPNFV Uses OpenStack & How It's Useful
 
Three years of OFELIA - taking stock
Three years of OFELIA - taking stockThree years of OFELIA - taking stock
Three years of OFELIA - taking stock
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
 
Cardigan at ISCC 2014
Cardigan at ISCC 2014Cardigan at ISCC 2014
Cardigan at ISCC 2014
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton
 
CellSpectrum - An universal solution essential for advanced wireless deployments
CellSpectrum - An universal solution essential for advanced wireless deploymentsCellSpectrum - An universal solution essential for advanced wireless deployments
CellSpectrum - An universal solution essential for advanced wireless deployments
 
Cumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open sourceCumulus networks - Overcoming traditional network limitations with open source
Cumulus networks - Overcoming traditional network limitations with open source
 

Mehr von Afnic

JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic
 

Mehr von Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'InternetJCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déterministe

  • 1. Slide 1 A Service-Inferred, Deterministic Traffic Forwarding Scheme C. Jacquenet christian.jacquenet@orange.com Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 2. Slide 2 Outline • New challenges • Basic issue and typical use case • Introducing Network Located Function Chaining (NLFC) • NLFC operation • Pending questions Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 3. Challenges • Network service design and operation now assume the combined and sometimes ordered activation of elementary capabilities – Forwarding and routing, firewall, QoS, DPI, etc. – Function chaining may be conditioned by traffic directionality • These Network-Located Functions (NLF) may be activated on the same I/F or network segment – E.g., the (s)Gi I/F of mobile networks • Inferred complexity suggests robust mastering of chained NLF activation – For the sake of optimized service delivery and efficient forwarding scheme Slide 3 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 4. Core Issue • IP network operation now assumes the complex chaining of various elementary capabilities – Besides basic routing and forwarding functions • How to efficiently forward traffic entering a network that supports these functions? – Differentiation is ensured by tweaking the set of network functions to be invoked • Packet processing decisions become service- inferred and policy-derived Slide 4 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 5. Slide 5 Business-Driven Forwarding Use Case • Best path is now computed and selected based upon network service orchestration – May differ from typical hop-by-hop path computation and forwarding schemes Unsuitable Network Typical best path Business best path User 2 paths 1 path 1 path Unsuitable network is not visible to first service provider network Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 6. NLFC Objectives • Compute and establish service-inferred data paths – For the sake of optimized traffic flow forwarding • Master NLF chaining regardless of the underlying topology and routing policies – Yielding a NLF-based differentiated forwarding paradigm • Facilitate NLF operation while avoiding any major topology upgrade – Adapt chronology of NLF activation according to the required service and associated parameters • Contribute to the automation of dynamic resource allocation and policy enforcement procedures Slide 6 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 7. Rationale • Dynamic NLF provisioning is separated from packet processing • NLF functions are seen as black boxes • NLF chaining varies as a function of the service and the traffic directionality – Chaining is described by an information processed by devices that participate to the delivery of a given service – Such information is signaled by the packets themselves Slide 7 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 8. NLFC Environment • Policy Decision Point (PDP) *makes* decisions according to policies documented in NLFC Policy Tables – PDP decisions are applied by NLF (boundary) nodes which process traffic accordingly Slide 8 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 9. The Intelligence Resides In The PDP • PDP-maintained NLFC Policy Tables describe the NLF-specific policy to be enforced • NLF nodes are provisioned with: – Local NLF Identifier(s) so that the node can position itself in the NLFC Map – NLFC Maps and Locators • Boundary nodes are also provisioned with Classification Rules – A Rule is bound to one NLFC Map – (Packet) Classifier relies upon various packet header fields (DA, SA, DS, etc.) Slide 9 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 10. NLFC Processing • Assign NLF Identifiers – NLF functions are listed and identified in a repository maintained by the NLFC administrative entity (ISP) • Identifier is a case-sensitive string • Assign NLF Locators – Meant to locate a NLF which can be supported by several devices • Locator is typically an IP address (could be a FQDN) • One or multiple Locators can be configured for each NLF • Build NLFC Maps – Detail the list of NLFs to be invoked in a specific order – Maps are identified by an Index and are specific to traffic directionality Slide 10 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 11. NLF Node Operation • Check whether the incoming packet conveys a NLFC Map Index – If not, proceed with typical forwarding rules • If so, packet is subject to NLFC according to: – The NLFC Map – The number of NLF functions supported by the node • If node is not the last in the Map, node forwards packet to the next NLF node as described in the Map – Proceeds with typical forwarding rules otherwise Slide 11 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 12. Example • A node supports NLF function a – Function a must be invoked only for packets matching Rules 1 and 3, as per NLFC Maps – Next NLF functions to be invoked for such packets are c (Map Index 1) and h (Map Index 3), respectively Slide 12 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 13. At NLFC Domain Boundaries • Ingress Node – Strips any existing NLFC Map Index – Checks whether received packet matches any existing classification rule • If not, proceed with typical forwarding rules – If so, retrieves the locator of the first NLF as per the corresponding Map entry • If next NLF node is not the next hop, packet is encapsulated (e.g., GRE) and forwarded to next NLF node • Egress Node – Strips any existing NLFC Map Index – Proceeds with typical forwarding rules Slide 13 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 14. Pending Questions • NLC Map Index encoding – 8-bit is probably enough, 16-bit is comfortable • Where to store NLFC Map Index? – DS field, Flow Label, new IPv6 extension header, new IP option, L2 field, TCP option, define a new shim, etc. • NLFC forwarding suggests encapsulation – When next NLF node is not the next hop as per IGP/BGP machinery – GRE, IP-in-IP, LISP, etc., are candidate options • Security issues at NLFC domain boundaries – Means to protect against DDoS or illegitimate invocation of resources must be supported Slide 14 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 15. Reading Material • Problem statement – http://tools.ietf.org/html/draft-quinn-nsc-problem- statement-00 • Global framework – http://tools.ietf.org/html/draft-boucadair-network- function-chaining-01 • Network Service Header (as a means to encapsulate information that describes a service path) – http://tools.ietf.org/html/draft-quinn-nsh-00 Slide 15 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.
  • 16. Thank You! Slide 16 Conseil Scientifique AFNIC – 9 juillet 2013 Copyright Orange. All rights reserved.