Download INPUT DOCUMENT: Response to Report of the 6th FGNGN

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net neutrality law wikipedia , lookup

Peering wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Net bias wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Peer-to-peer wikipedia , lookup

Kademlia wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
INTERNATIONAL TELECOMMUNICATION UNION
FOCUS GROUP ON FUTURE
NETWORKS
TELECOMMUNICATION
STANDARDIZATION SECTOR
FG-FN OD-39
Original: English
STUDY PERIOD 2009-2012
4th FG-FN meeting:
Tokyo, Japan, 29 March-2 April 2010
OUTPUT DOCUMNET 39
Source:
Editors
Title:
Draft output document for “Identifiers and Identification processes in Future
Networks”
1. Introduction
This is a revised text of Draft Deliverable on “Identifiers and Identification processes in Future
Networks” based on contribution and discussions of 4th FG-FN meeting in Tokyo, 29 March-2
April 2010.
Contact:
Heeyoung JUNG
ETRI
Korea (Rep. of)
Tel:
+82-42-860-4928
Email: [email protected]
Contact:
Takashi Egawa
NEC Corporation
Japan
Tel:
+81-44-431-7770
Email: [email protected]
Attention: This is not a publication made available to the public, but an internal ITU-T Document intended only for use by the
Member States of ITU, by ITU-T Sector Members and Associates, and their respective staff and collaborators in their ITU related
work. It shall not be made available to, and used by, any other persons or entities without the prior written consent of ITU-T.
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of
the source/author of this document.
-2FGFN-OD-39
Identifiers and Identification processes in Future Networks
Summary
This document specifies important objects requiring new identification in future networks,
describes brief analysis on the identification structures of on-going future network works as well as
exisitng networks, and, based on the analysis, specifies requirements and framework for
identification in future network.
-3FGFN-OD-39
Table of Contents
1. Scope …………………………………………………………………………………..…5
2. References ............................................................................................................................ 5
3.1 Terms defined elsewhere ........................................................................................ 5
3.2 Terms defined in this document ............................................................................. 5
4. Abbreviation and acronyms ................................................................................................. 5
5. Considerations on new identification structure .................................................................... 5
6. Analysis of existing identification systems .......................................................................... 5
6.1 Internet .................................................................................................................... 5
6.2 ITU-T NGN ............................................................................................................ 7
6.3 3GPP SAE .............................................................................................................. 7
6.4 On-going works (e.g. AKARI, 4WARD, etc) ........................................................ 7
7. Requirements for identification ........................................................................................... 8
8. Framework of identification in future network .................................................................... 8
9. Future actions for standardization ........................................................................................ 8
Bibliography............................................................................................................................. 8
-4FGFN-OD-39
Identifiers and Identification processes in Future Networks
[Editor’s Note: Working definition of Identification is ‘procedures to identify objects.’ In ITU-T
Rec. F.851 and F.852, this term is defined as ‘A process to identify the UPT user or the UPT service
provider’, but we need our definition.
Some definitions of related terms:
Identifier: An identifier is a series of digits, characters and symbols or any other form of data used
to identify subscriber(s), user(s), network element(s), function(s), network entity(ies) providing
services/applications, or other entities (e.g., physical or logical objects). (ITU-T Rec. Y.2091 and
Y.2720)
Identity: Information about an entity that is sufficient to identify that entity in a particular context.
(ITU-T Rec. Y.2720)]
-5FGFN-OD-39
1. Scope
The scope of this document includes;
 Specification of important objects requiring new identification in future networks;
 Analysis on the identification structures of on-going future network works as well as
exisitng networks;
 Requirements and a framework for identification in future network; and
 Future actions for Identification standardization
2. References
[Editor’s Note: this section will be filled according to future update]
3. Definitions
[Editor’s Note: this section will be filled according to future contributions. Contributions are
solicited]
3.1 Terms defined elsewhere
3.2 Terms defined in this document
4. Abbreviation and acronyms
[Editor’s Note: this section will be filled according to future update]
5. Considerations on new identification structure
[Editor’s Note: This section will specify objects requiring identification. Contributions are solicited]
6. Analysis of existing identification systems
6.1 Internet
[Editor’s Note: this section is updated according to C57. It is indicated that current content may not
enough so this section need to be enhanced according to further contributions. Contributions are
highly requested]
6.1.1 Review on identification in Internet
IETF RFC 1498, “On the Naming and Binding of Network Destination”, analyzes naming and
binding issue in Internet. It specifies 4 types of communication objects that should be distinguished
from other as follows;
1) Service and Users: These are the functions that one uses, and the clients that use them.
Examples of services are one that tells the time of day, one that performs accounting, or one
that forwards packets. An example of a client is a particular desktop computer.
2) Nodes: These are computers that can run services or user programs. Some nodes are clients of
the network, while others help implement the network by running forwarding services.
-6FGFN-OD-39
3) Network attachment points (NAPs): These are the ports of a network, the places where a node
is attached. In many discussions about data communication networks, the term "address" is an
identifier of a network attachment point.
4) Paths: These run between network attachment points, traversing forwarding nodes and
communication links.
The observation about the four types of network objects listed above is that most of the naming
requirements in a network can simply and concisely be described in terms of bindings and changes
of bindings among the four types of objects.
1) A given service may run at one or more nodes, and may need to move from one node to
another without losing its identity as a service.
2) A given node may be connected to one or more network attachment points, and may need to
move from one attachment point to another without losing its identity as a node.
3) A given pair of attachment points may be connected by one or more paths, and those paths may
need to change with time without affecting the identity of the attachment points.
In principle, to send a data packet to a service one must discover three bindings:
1) Find a node on which the required service operates,
2) Find a network attachment point to which that node is connected,
3) Find a path from this attachment point to that attachment point.
There are, in turn, three conceptually distinct binding services that the network needs to provide:
1) Service name resolution, to identify the nodes that run the service.
2) Node name location, to identify attachment points that reach the nodes found in 1.
3) Route service, to identify the paths that lead from the requestor's attachment point to the ones
found in 2).
Service
I want the
service
1) Which
node is the
service
located?
NAPs
Paths
User
Node
3) How can reach
the NAP?
2) Where is the
service node
connected ?
Figure 6.1. 4 types of objects and 3binding in Internet
At each level of binding, there can be several alternatives, so a choice of which node, which
attachment point, and which path must be made.
6.1.2 Observations from the perspective of future network environment
If we review the identifiers for 4 objects which were defined in RFC 1498, they can be summarized
as follows;
-7FGFN-OD-39
• Service and users: URI/L, email address, IP address, NAI, etc.
• Node: IP address
• NAP: IP address & Link address
• Path: IP prefix
In summary, IP address seems a single core ID over most objects and layers.
Binds between objects could be summarized as follows;
• Services/users to node: DNS and host file
• Node to NAP: Fixed
• NAP to Path: IP Prefix
Above observation says that current Internet support only static binding.
It is generally envisioned that mobile will be dominant in future network as we can see in the
visions of many worldwide future Internet activities, e.g., FP7 4WARD and FIND projects. In this
sense, we note that current Internet was basically designed on the assumption of static environment.
Therefore current Internet identifier structure may cause some problems in future mobile
environment as follows;
1) In Internet, static node is basic assumption but mobile one is special case. In mobile context,
a paradigm shift towards “Mobile node is basic but static is special” is highly necessary.
2) It is noted that IP address is a single ID for both node and NAP. However, for a moving
node, the NAP can’t be fixed so two IDs should be separated. It means that we need for
dynamic binding between them (e.g., persistent ID : temporary NAP)
3) It is found that there is no independent ID for a node in Internet. An IP address means a
node’s NAP so we need new node ID.
4) IP address is allocated to moving node but fixed locator of moving nodes may be useless
5) Multiple interfaces are common in mobile environment as we can see in wireless overlay
networks consisting of wireless-BAN/PAN/LAN/MAN/WAN. However, in current
Internet, a node with a single NAP is current assumption. Therefore future network should
consider a node with multiple interface to support multi-homing capability
6) Mobile environment is more vulnerable to attack so higher secure ID structure is required.
7) The location of services/users will be likely to change in future network environment but
current DNS binding is very static. Therefore we need more dynamic binding between a
node and services/users
Not only the problems described above, there could be a lot of possible issues to be solved in
mobile viewpoint. This could be a background why ITU-T should develop new ID standards for
future network.
6.2 ITU-T NGN
6.3 3GPP SAE
6.4 On-going works (e.g. AKARI, 4WARD, etc)
[Editor’s Note: Further items may be added]
-8FGFN-OD-39
7. Requirements for identification
[Editor’s Note: Based on contents of Section 5 and 6, this section will specify the requirements for
identification system for future network]
8. Framework of identification in future network
[Editor’s Note: In line with Section 7, this section will include a structure and relevant procedures
for identification]
9. Future actions for standardization
[Editor’s Note: This section will described necessary future actions for standardization, if
necessary]
Bibliography
[1] IETF RFC 1498, “On the Naming and Binding of Network Destination,” August 1993
____________