DHC Working Group                                         Sheng Jiang
Internet Draft                            Huawei Technologies Co., Ltd
Intended status: Informational                           July 09, 2012
Expires: January 05, 2013

                          Semantic IPv6 Prefix
                   draft-jiang-semantic-prefix-00.txt


Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that other
   groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
        http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
        http://www.ietf.org/shadow.html

   This Internet-Draft will expire on January 05, 2013.



Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.






Sheng Jiang          Expires September 18, 2012               [Page 1]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012



Abstract

   Some Internet Service Providers desire to be aware of more
   information about each packet, so that packets can be treated
   differently and efficiently. IPv6, with a large address space, allows
   semantics to be embedded into addresses. Routers can easily apply
   relevant operations accordingly. This document provides analysis on
   how to form semantic prefix and corresponding use cases, and
   identifies the technical requirements to maximize the benefits of the
   semantic prefix approach. It is recommended to use 4~12 bits in
   prefix for embedded semantics.

Table of Contents

   1. Introduction ................................................ 3
   2. Why Prefix .................................................. 4
   3. The Semantic Prefix Domain .................................. 5
   4. The Embedded Semantics ...................................... 5
   5. Formation of Semantic prefix ................................ 6
      5.1. An example of semantic prefix .......................... 7
   6. Benefits .................................................... 7
   7. Gaps ........................................................ 8
   8. Security Considerations ..................................... 9
   9. IANA Considerations ......................................... 9
   10. References ................................................. 9
      10.1. Normative References .................................. 9
      10.2. Informative References ................................ 9






















Sheng Jiang           Expires January 05, 2012                [Page 2]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012



1. Introduction

   While the global Internet increases explosively, more and more
   differentiated requirements are raised for the packet delivery of
   networks. Internet Service Providers desire to be aware of more
   information about each packet, such as destination location, user
   types, service types, applications, security requirments, quality
   requirements, etc. Based on the information, network operators could
   treat packets differently and efficiently.

   However, except for destination location, almost of abovementioned
   information is not expressed explicitly. Hence, it is difficult for
   network operators to identify.

   Two passive and indirect technologies are already developed to
   distinguish the packets. Deep Packet Inspection (DPI) has been used
   by ISPs to learn the characters of packets. But DPI is expensive for
   both operational costs and process latency. Its time delay is too
   much to be able to be used for real time traffic control. Overlay
   networks are constructed in order to permit routing of packets to
   destinations not specified by IP addresses. But still, the overlay
   has no control over how packets are routed in the underlying network
   between two overlay nodes. Although tunnel or label forwarding may
   operate the traffic path, they introduce extra overhead while they
   depend on indirect information sources.

   An initiative solution, Quality of Service (QoS) and DiffServ
   [RFC2474] was also developed. It specifies a simple, scalable and
   coarse-grained mechanism for classifying and managing network
   traffic. However, the DiffServ fields set by the packet senders are
   not trustable by the network operators. In the real user case, ISPs
   deploy "remarking" points at the edge network, which classify each
   received packet and rewrite its DiffServ field according to user
   information learned from AAA or VLAN.

   The abovementioned solutions are mainly developed in IPv4 era, in
   which IP address is only locator, nothing else, giving the limited
   space. Although DiffServ was developed identically for IPv4 and IPv6,
   it did not inherit the same limitation.

   IPv6 has broken such limitation with its very large address space. It
   allows certain semantics to be embedded into addresses. Applications
   or ISPs can proactively embed pre-defined information into addresses
   so that intermediate devices can easily apply relevant operations on
   packet since addresses are the most explicit element in a packet. It
   provides an easy access and trustable fundamental for packet
   differentiated treatment.



Sheng Jiang           Expires January 05, 2012                [Page 3]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012

   The technical fact that IPv6 allow multiple addresses on a single
   interface also provides precondition for the approach that user
   chooses application-associated address differently.

   This approach transfers much network complexity to the planning and
   management of IPv6 address and IP address based policies. It indeed
   simplifies the management of ISP networks.

   This document provides analysis on how to form semantic prefix and
   its user cases. It is recommended to use 4~12 bits in prefix for
   embedded semantics. This document also analyzes the technical gaps to
   maximum the benefits of semantics prefix approach.

2. Why Prefix

   Although interface identifier of IPv6 address has arbitrary bits and
   extension header can carry much more information, they are not
   trustable by network operators. Selfish users may easily change the
   setting of interface identifier or extension header in order to
   obtain undeserved priorities/privileges, while servers or enterprise
   users may be much more self-restricted since they are charged
   accordingly.

   Prefix is almost the only thing an operator can trust in an IP packet
   because it is delegated by the network and the network can detect any
   undesired modifications, then filter the packet.

   The prefix concept here refers the most left bits in IP addresses,
   that are delegated by the network management plane. It could be
   longer than 64, if the network operators strictly manage the address
   assignment by using Dynamic Host Configuration Protocol for IPv6
   (DHCPv6) [RFC3315] (but in this case standard Stateless Address
   Autoconfiguration - SLACC [RFC4862] cannot be used).

   Two major arguments against this approach should be considered. One
   of them is practical: although IPv6 address space is plentiful, it
   should not be wasted. This argument can be dealt with by ensuring
   that only a small number of traffic classes are identified within a
   given user's traffic, so only a few bits in the prefix are needed.
   The second argument is that addresses should not, as a matter of
   principle, contain application semantics, because this violates the
   layering structure of protocols. This argument can be answered by
   ensuring that the only impact of the approach on the routing and
   forwarding system is to modestly increase the number of internal
   routes handled by the ISP concerned; there should be no impact on
   aggregated routes that the ISP announces to other ISPs.






Sheng Jiang           Expires January 05, 2012                [Page 4]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012

3. The Semantic Prefix Domain

   A Semantic Prefix domain, analagous to a Differentiated Services
   Domain [RFC2474], is a contiguous portion of the Internet over which
   a consistent set of semantic prefix policies are administered in a
   coordinated fashion.  A Semantic Prefix domain can represent
   different administrative domains or autonomous systems, different
   trust regions, different network technologies, hosts and routers,
   different user groups, different services, different traffic groups,
   different applications, etc.

   The selections of semantics are various among different Semantic
   Prefix Domains. Network operators should choose semantics according
   to their needs for network management and services management. If an
   ISP has several discontinuous address blocks, it may be organized as
   a single semantic Prefix domain if the same semantic definition
   shared among these discontinuous address blocks. If these blocks have
   different sizes, their semantic prefix domains may be distinguished
   each other by minimum differences of semantic definition.

   A Semantic Prefix domain has a set of pre-defined semantic
   definitions. Without an efficient semantics notification or
   exchanging mechanism, the definitions of semantics are only
   meaningful within local semantic prefix domain. The semantics
   notification or exchanging does not have to through protocols. Manual
   interactions between network operators may also work out. However,
   this may involve trust models among network operators.

   Sharing semantic definition among Semantic Prefix domains enables
   more semantic based network operations.

4. The Embedded Semantics

   As mentioned in Section 1, much information regarding to packets is
   useful for network operators, such as destination location, user
   types, service types, applications, security requires, quality
   requirements, etc. But, the prefix bits that can be used for embedded
   semantics are very limited. Therefore, only the selected, most useful
   semantics can be embedded in the prefix. Note, however, that DiffServ
   provides a very rich QoS semantic with only 6 bits. The available
   bits increase largely in the strictly managed network by DHCPv6.

   The following are some semantics may be useful by network operators:
   user types, service types, security information, traffic identity
   types, applications or application types, etc. When used, all of them
   should be restricted in a highly abstracted way.

   In a given Semantic Prefix Domain, multiple semantics can be used
   combinatorially. They may be organized by using semantic type bits in



Sheng Jiang           Expires January 05, 2012                [Page 5]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012

   prefix or any pre-defined arbitrary way. However, the former is
   preferred.

   To use the limited bits efficiently, bits semantics should be pre-
   defined very carefully. Some formation recommendations are introduced
   below.

5. Formation of Semantic prefix

   Depending on the IPv6 address space that network operators received
   from IANA, the number of arbitrary bits in prefix is different. For
   now, this document only discusses unicast address within IP Version 6
   Addressing Architecture [RFC4291].

   Typically, network operators would have /13 ~ /20 address space
   according to its user scale. It allows 51~44 arbitrary bits in prefix
   to be set by network operators (assuming the network is not strictly
   managed by DHCPv6). However, many ISPs plan to assign /56 or even /48
   for subscribers, the arbitrary bits are reduced to 43~32.

   The locator function of IP address should be ensured first. Enough
   consideration should be given for future expanding. Some address
   space may be wasted in aggregation. For a Semantic Prefix Domain that
   organizes several millions subscribers with a continuous IPv6 address
   block, 28 bits for locator function is a minimum safe allocation.
   Several bits may be good for safety margin.

   The current network is mainly aggregated according to locator. Hence,
   it is recommended using the most left bits of prefix for locator
   function and lower bits for semantics. However, if the network
   operator would like to organize network aggregation by semantic
   prior, using higher bits for semantics is also possible. Mixed
   aggregation model can be reached by put semantics or part of
   semantics bits in the middle of locator bits.

   According to the above analysis, it is recommended to use 4~12 bits
   in prefix for embedded semantics. It is recommended network operator
   only use necessary semantics when they can bring benefits to network
   operations.

   The network operator should be very careful to plan and manage the
   semantic field. The first and most important principle is to avoid
   semantic overlap. Any potential scenarios that a given packet may be
   mapped two or more semantic prefixes are considered harmful.

   While assigning all these bits on a separated subfield mechanism is
   considered inefficient and lack of flexibility, it is recommended to
   assign in low granularity, such as bit by bit.




Sheng Jiang           Expires January 05, 2012                [Page 6]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012

5.1. An example of semantic prefix

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |      IANA assigned block  |            locator                |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  locator (Cont.)      | Semantic Field|    Subscriber bits    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   The above figure represents an example of semantic prefix.

   In this example, the semantic prefix domain have a /14 IPv6 address
   space. The 30 most-left bits are allocated as locator. It serves
   network aggregation of topology based. The 12 most-right bits are
   subscriber bits. It means /52 prefix is assigned to subscribers. 8
   bits (from bit 44 to 51) are assigned as semantic field. It may be
   assigned further for semantic combinations.

   A further detailed example, combing user type, service type, VPNs,
   and application virtual overlay networks, the semantic field can be
   assigned like blow (presented in octet):

     00   Normal individual user with normal internet access services
     01   High-end individual user with normal internet access
            services
     02   High-end individual user with secure internet access
            services
     03~07 Reserved
     08   Enterprise user with normal internet access services
     09   Enterprise user with secure internet access services
     0A~0F Reserved
     10~3F VPNs (with 48 sub-IDs)
     40~7F Application virtual overlay networks (with 64 sub-IDs)
     80~FF Reserved

   In practice, a host may belong to several semantics. It means several
   IPv6 addresses are available on a single physical interface. A
   certain packet would only serve a certain semantic. The stack or
   applications on that host must know and understand these semantics
   and its correspondent bits in order to choose right source address
   when forming a packet.

6. Benefits

   This section presents some, definitely not all, benefits. Depending
   on embedded semantics, various beneficial scenarios can be expected.

   - Easy measurement and statistic



Sheng Jiang           Expires January 05, 2012                [Page 7]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012

   The semantic prefix provides explicit identifiers for measurement and
   statistic. They are as simple as checking certain bits of address in
   each packets.

   - Easy flow control

   By applying policies according to certain bit value, it is easy to
   control packets that have the same semantics.

   - Policy aggregation

   Semantic prefix allows many policies to be aggregated according to
   the same semantics in the policy based routing system [RFC1104].

   - Application-aware routing

   Embedding application information into IP addresses is the simplest
   way to realize application aware routing.

7. Gaps

   The simplest model of semantic prefix is only embedded abstracted
   user type semantic into the prefix. It can be supported with the
   current network architecture because each subscribe still assigned
   one prefix, while they are not notified the semantic within it.

   The more semantics embedded into prefix, the more complicated
   functions are needed for prefix delegation, host notification and
   address selections.

   - Associate semantics with prefix delegation

   When DHCPv6-PD [RFC3633] delegates a prefix, the associated semantics
   should be bounded.

   - Notify prefix semantics to hosts

   When a host connects to network, it should be assign a short prefix
   locator with some enabled semantics rules.

   - Address selection according to semantics on hosts

   In this architecture, hosts have to be intelligent enough to choose
   its source address according to its given information. It may also
   receive address select information from the applications. In some
   complicated scenarios, choosing destination address may also need
   further supporting functions.

   The current address selection algorithms and address selection API
   [RFC5014] are too simple to support this architecture.


Sheng Jiang           Expires January 05, 2012                [Page 8]


Internet-Draft     draft-jiang-semantic-prefix-00            July 2012

8. Security Considerations

   This document provides no new security features.

9. IANA Considerations

   This document has no IANA considerations.

10. References

10.1. Normative References

   [RFC1104] H.W. Braun, "Models of policy based routing", RFC 1104,
             June 1989.

   [RFC2474] K. Nichols, S. Blake, F. Baker, and D. Black, "Definition
             of the Differentiated Services Field (DS Field) in the IPv4
             and IPv6 Headers", RFC 2474, December 1998

   [RFC3315] R. Droms, et al., "Dynamic Host Configure Protocol for
             IPv6", RFC 3315, July 2003.

   [RFC3633] O. Troan, and R. Droms, "IPv6 Prefix Options for Dynamic
             Host Configuration Protocol (DHCP) version 6", RFC 3633,
             December 2003.

   [RFC4862] S. Thomson, T. Narten, and T. Jinmei, "IPv6 Stateless
             Address Autoconfiguration", RFC 4862, September 2007.

   [RFC4291] R. Hinden, and S. Deering, "IP Version 6 Addressing
             Architecture", RFC4291, February 2006.

10.2. Informative References

   [RFC5014] E. Nordmark, S. Chakrabarti, J. Laganier, "IPv6 Socket API
             for Source Address Selection", RFC 5014, September 2007.



   Author's Addresses

   Sheng Jiang
   Huawei Technologies Co., Ltd
   Q14, Huawei Campus
   No.156 Beiqing Road
   Hai-Dian District, Beijing  100095
   P.R. China
   EMail: jiangsheng@huawei.com




Sheng Jiang           Expires January 05, 2012                [Page 9]