home *** CD-ROM | disk | FTP | other *** search
Text File | 1991-04-20 | 59.9 KB | 1,403 lines |
-
-
-
-
-
-
- Network Working Group M. Little
- Request for Comments: 1126 SAIC
- October 1989
-
-
- Goals and Functional Requirements for
- Inter-Autonomous System Routing
-
- Status of this Memo
-
- This document describes the functional requirements for a routing
- protocol to be used between autonomous systems. This document is
- intended as a necessary precursor to the design of a new inter-
- autonomous system routing protocol and specifies requirements for the
- Internet applicable for use with the current DoD IP, the ISO IP, and
- future Internet Protocols. It is intended that these requirements
- will form the basis for the future development of a new inter-
- autonomous systems routing architecture and protocol. This document
- is being circulated to the IETF and Internet community for comment.
- Comments should be sent to: "open-rout-editor@bbn.com". This memo
- does not specify a standard. Distribution of this memo is unlimited.
-
- 1. Introduction
-
- The development of an inter-autonomous systems routing protocol
- proceeds from those goals and functions seen as both desirable and
- obtainable for the Internet environment. This document describes
- these goals and functional requirements. The goals and functional
- requirements addressed by this document are intended to provide a
- context within which an inter-autonomous system routing architecture
- can be developed which will meet both current and future Internet
- routing needs. The goals presented indicate properties and general
- capabilities desired of the Internet routing environment and what the
- inter-autonomous system routing architecture is to accomplish as a
- whole.
-
- The goals are followed by functional requirements, which address
- either detailed objectives or specific functionality to be achieved
- by the architecture and resulting protocol(s). These functional
- requirements are enumerated for clarity and grouped so as to map
- directly to areas of architectural consideration. This is followed
- by a listing and description of general objectives, such as
- robustness, which are applicable in a broad sense. Specific
- functions which are not reasonably attainable or best left to future
- efforts are identified as non-requirements.
-
- The intent of this document is to provide both the goals and
- functional requirements in a concise fashion. Supporting arguments,
-
-
-
- Little [Page 1]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- tradeoff considerations and the like have been purposefully omitted
- in support of this. An appendix has been included which addresses
- this omission to a limited extent and the reader is directed there
- for a more detailed discussion of the issues involved.
-
- The goals and functional requirements contained in this document are
- the result of work done by the members of the Open Routing Working
- Group. It is our intention that these goals and requirements reflect
- not only those foreseen in the Internet community but are also
- similar to those encountered in environments proposed by ANSI, ECMA
- and ISO. It is expected that there will be some interaction and
- relationship between this work and the product of these groups.
-
- 2. Overall Goals
-
- In order to derive a set functional requirements there must be one or
- more principals or overall goals for the routing environment to
- satisfy. These high level goals provide the basis for each of the
- functional requirements we have derived and will guide the design
- philosophy for achieving an inter-autonomous system routing solution.
- The overall goals we are utilizing are described in the following
- sections.
-
- 2.1 Route to Destination
-
- The routing architecture will provide for the routing of datagrams
- from a single source to one or more destinations in a timely manner.
- The larger goal is to provide datagram delivery to an identifiable
- destination, one which is not necessarily immediately reachable by
- the source. In particular, routing is to address the needs of a
- single source requiring datagram delivery to one or more
- destinations. The concepts of multi-homed hosts and multicasting
- routing services are encompassed by this goal. Datagram delivery is
- to be provided to all interconnected systems when not otherwise
- constrained by autonomous considerations.
-
- 2.2 Routing is Assured
-
- Routing services are to be provided with assurance, where the
- inability to provide a service is communicated under best effort to
- the requester within an acceptable level of error. This assurance is
- not to be misconstrued to mean guaranteed datagram delivery nor does
- it imply error notification for every lost datagram. Instead,
- attempts to utilize network routing services when such service cannot
- be provided will result in requester notification within a reasonable
- period given persistent attempts.
-
-
-
-
-
- Little [Page 2]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- 2.3 Large System
-
- The design of the architecture, and the protocols within this
- architecture, should accommodate a large number of routing entities.
- The exact order of magnitude is a relative guess and the best designs
- would provide for a practical level of unbounded growth.
- Nevertheless, the routing architecture is expected to accommodate the
- growth of the Internet environment for the next 10 years.
-
- 2.4 Autonomous Operation
-
- The routing architecture is to allow for stable operation when
- significant portions of the internetworking environment are
- controlled by disjoint entities. The future Internet environment is
- envisioned as consisting of a large number of internetworking
- facilities owned and operated by a variety of funding sources and
- administrative concerns. Although cooperation between these
- facilities is necessary to provide interconnectivity, it is viewed
- that both the degree and type of cooperation will vary widely.
- Additionally, each of these internetworking facilities desires to
- operate as independently as possible from the concerns and activities
- of other facilities individually and the interconnection environment
- as a whole. Those resources used by (and available for) routing are
- to be allowed autonomous control by those administrative entities
- which own or operate them. Specifically, each controlling
- administration should be allowed to establish and maintain policies
- regarding the use of a given routing resource.
-
- 2.5 Distributed System
-
- The routing environment developed should not depend upon a data
- repository or topological entity which is either centralized or
- ubiquitous. The growth pattern of the Internet, coupled with the
- need for autonomous operation, dictates an independence from the
- topological and administrative centralization of both data and
- control flows. Past experience with a centralized topology has shown
- that it is both impractical for the needs of the community and
- restrictive of administrative freedoms. A distributed routing
- environment should not be restrictive of either redundancy or
- diversity. Any new routing environment must allow for arbitrary
- interconnection between internetworks.
-
- 2.6 Provide A Credible Environment
-
- The routing environment and services should be based upon mechanisms
- and information that exhibit both integrity and security. The
- routing mechanisms should operate in a sound and reliable fashion
- while the routing information base should provide credible data upon
-
-
-
- Little [Page 3]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- which to base routing decisions. The environment can be unreliable
- to the extent that the resulting effect on routing services is
- negligible. The architecture and protocol designs should be such
- that the routing environment is reasonably secure from unwanted
- modification or influence.
-
- 2.7 Be A Managed Entity
-
- Provide a manger insight into the operation of the inter-autonomous
- system routing environment to support resource management, problem
- solving, and fault isolation. Allow for management control of the
- routing system and collect useful information for the internetwork
- management environment. Datagram events as well as the content and
- distribution characteristics of relevant databases are of particular
- importance.
-
- 2.8 Minimize Required Resources
-
- Any feasible design should restrain the demand for resources required
- to provide inter-autonomous systems routing. Of particular interest
- are those resources required for data storage, transmission, and
- processing. The design must be practical in terms of today's
- technology. Specifically, do not assume significant upgrades to the
- existing level of technology in use today for data communication
- systems.
-
- 3. Functional Requirements
-
- The functional requirements we have identified have been derived from
- the overall goals and describe the critical features expected of
- inter-autonomous system routing. To an extent, these functions are
- vague in terms of detail. We do not, for instance, specify the
- quantity or types for quality-of-service parameters. This is
- purposeful, as the functional requirements specified here are
- intended to define the features required of the inter-autonomous
- system routing environment rather than the exact nature of this
- environment. The functional requirements identified have been
- loosely grouped according to areas of architectural impact.
-
- 3.1 Route Synthesis Requirements
-
- Route synthesis is that functional area concerned with both route
- selection and path determination (identification of a sequence of
- intermediate systems) from a source to a destination. The functional
- requirements identified here provide for path determination which is
- adaptive to topology changes, responsive to administrative policy,
- cognizant of quality-of-service concerns, and sensitive to an
- interconnected environment of autonomously managed systems.
-
-
-
- Little [Page 4]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- a) Route around failures dynamically
-
- Route synthesis will provide a best effort attempt to detect
- failures in those routing resources which are currently being
- utilized. Upon detection of a failed resource, route synthesis
- will provide a best effort to utilize other available routing
- resources in an attempt to provide the necessary routing
- service.
-
- b) Provide loop free paths
-
- The path provided for a datagram, from source to destination,
- will be free of circuits or loops most of the time. At those
- times a circuit or loop exists, it occurs with both negligible
- probability and duration.
-
- c) Know when a path or destination is unavailable
-
- Route synthesis will be capable of determining when a path
- cannot be constructed to reach a known destination.
- Additionally, route synthesis will be capable of determining
- when a given destination cannot be determined because the
- requested destination is unknown (or this knowledge is
- unavailable).
-
- d) Provide paths sensitive to administrative policies
-
- Route synthesis will accommodate the resource utilization
- policies of those administrative entities which manage the
- resources identified by the resulting path. However, it is
- inconceivable to accommodate all policies which can be defined
- by a managing administrative entity. Specifically, policies
- dependent upon volatile events of great celerity or those which
- are non-deterministic in nature cannot be accommodated.
-
- e) Provide paths sensitive to user policies
-
- Paths produced by route synthesis must be sensitive to policies
- expressed by the user. These user policies are expressed in
- terms relevant to known characteristics of the topology. The
- path achieved will meet the requirements stated by the user
- policy.
-
- f) Provide paths which characterize user quality-of-service
- requirements
-
- The characteristics of the path provided should match those
- indicated by the quality-of-service requested. When
-
-
-
- Little [Page 5]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- appropriate, utilize only those resources which can support the
- desired quality-of-service (e.g., bandwidth).
-
- g) Provide autonomy between inter- and intra-autonomous system
- route synthesis
-
- The inter- and intra-autonomous system routing environments
- should operate independent of one another. The architecture
- and design should be such that route synthesis of either
- routing environment does not depend upon information from the
- other for successful functioning. Specifically, the inter-
- autonomous system route synthesis design should minimize the
- constraints on the intra-autonomous system route synthesis
- decisions when transiting (or delivering to) the autonomous
- system.
-
- 3.2 Forwarding Requirements
-
- The following requirements specifically address the functionality of
- the datagram forwarding process. The forwarding process transfers
- datagrams to intermediate or final destinations based upon datagram
- characteristics, environmental characteristics, and route synthesis
- decisions.
-
- a) Decouple inter- and intra-autonomous system forwarding
- decisions
-
- The requirement is to provide a degree of independence between
- the inter-autonomous system forwarding decision and the intra-
- autonomous system forwarding decision within the forwarding
- process. Though the forwarding decisions are to be independent
- of each other, the inter-autonomous system delivery process may
- necessarily be dependent upon intra-autonomous system route
- synthesis and forwarding.
-
- b) Do not forward datagrams deemed administratively inappropriate
-
- Forward datagrams according to the route synthesis decision if
- it does not conflict with known policy. Policy sensitive route
- synthesis will prevent normally routed datagrams from utilizing
- inappropriate resources. However, a datagram routed abnormally
- due to unknown events or actions can always occur and the only
- way to prohibit unwanted traffic from entering or leaving an
- autonomous system is to provide policy enforcement within the
- forwarding function.
-
-
-
-
-
-
- Little [Page 6]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- c) Do not forward datagrams to failed resources
-
- A datagram is not to be forwarded to a resource known to be
- unavailable, notably an intermediate system such as a gateway.
- This implies some ability to detect and react to resource
- failures.
-
- d) Forward datagram according to its characteristics
-
- The datagram forwarding function is to be sensitive to the
- characteristics of the datagram in order to execute the
- appropriate route synthesis decision. Characteristics to
- consider are the destination, quality-of-service, precedence,
- datagram (or user) policy, and security. Note that some
- characteristics, precedence for example, affect the forwarding
- service provided whereas others affect the path chosen.
-
- 3.3 Information Requirements
-
- This functional area addresses the general information requirements
- of the routing environment. This encompasses both the nature and
- disbursal of routing information. The characteristics of the routing
- information and its disbursal are given by the following functional
- requirements.
-
- a) Provide a distributed and descriptive information base
-
- The information base must not depend upon either centralization
- or exact replication. The content of the information base must
- be sufficient to support all provided routing functionality,
- specifically that of route synthesis and forwarding.
- Information of particular importance includes resource
- characteristics and resource utilization policies.
-
- b) Determine resource availability
-
- Provide a means of determining the availability of any utilized
- resource in a timely manner. The timeliness of this
- determination is dependent upon the routing service(s) to be
- supported.
-
- c) Restrain transmission utilization
-
- The dynamics of routing information flow should be such that a
- significant portion of transmission resources are not consumed.
- Routing information flow should adjust to the demands of the
- environment, the capacities of the distribution facilities
- utilized, and the desires of the resource manager.
-
-
-
- Little [Page 7]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- d) Allow limited information exchange
-
- Information distribution is to be sensitive to administrative
- policies. An administrative policy may affect the content or
- completeness of the information distributed. Additionally,
- administrative policy may determine the extent of information
- distributed.
-
- 3.4 Environmental Requirements
-
- The following items identify those requirements directly related to
- the nature of the environment within which routing is to occur.
-
- a) Support a packet-switching environment
-
- The routing environment should be capable of supporting
- datagram transfer within a packet-switched oriented networking
- environment.
-
- b) Accommodate a connection-less oriented user transport service
-
- The routing environment should be designed such that it
- accommodates the model for connection-less oriented user
- transport service.
-
- c) Accommodate 10K autonomous systems and 100K networks
-
- This requirement identifies the scale of the internetwork
- environment we view as appearing in the future. A routing
- design which does not accommodate this order of magnitude is
- viewed as being inappropriate.
-
- d) Allow for arbitrary interconnection of autonomous systems
-
- The routing environment should accommodate interconnectivity
- between autonomous systems which may occur in an arbitrary
- manner. It is recognized that a practical solution is likely
- to favor a given structure of interconnectivity for reasons of
- efficiency. However, a design which does not allow for and
- utilize interconnectivity of an arbitrary nature would not be
- considered a feasible design.
-
- 3.5 General Objectives
-
- The following are overall objectives to be achieved by the inter-
- autonomous routing architecture and its protocols.
-
- a) Provide routing services in a timely manner
-
-
-
- Little [Page 8]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- Those routing services provided, encapsulated by the
- requirements stated herein, are to be provided in a timely
- manner. The time scale for this provision must be reasonable
- to support those services provided by the internetwork
- environment as a whole.
-
- b) Minimize constraints on systems with limited resources
-
- Allow autonomous systems, or gateways, of limited resources to
- participate in the inter-autonomous system routing
- architecture. This limited participation is not necessarily
- without cost, either in terms of responsiveness, path
- optimization, or other factor(s).
-
- c) Minimize impact of dissimilarities between autonomous systems
-
- Attempt to achieve a design in which the dissimilarities
- between autonomous systems do not impinge upon the routing
- services provided to any autonomous system.
-
- d) Accommodate the addressing schemes and protocol mechanisms of
- the autonomous systems
-
- The routing environment should accommodate the addressing
- schemes and protocol mechanisms of autonomous systems, where
- these schemes and mechanisms may differ among autonomous
- systems.
-
- e) Must be implementable by network vendors
-
- This is to say that the algorithms and complexities of the
- design must be such that they can be understood outside of the
- research community and implementable by people other than the
- designers themselves. Any feasible design must be capable of
- being put into practice.
-
- 4. Non-Goals
-
- In view of the conflicting nature of many of the stated goals and the
- careful considerations and tradeoffs necessary to achieve a
- successful design, it is important to also identify those goals or
- functions which we are not attempting to achieve. The following
- items are not considered to be reasonable goals or functional
- requirements at this time and are best left to future efforts. These
- are non-goals, or non-requirements, within the context of the goals
- and requirements previously stated by this document as well as our
- interpretation of what can be practically achieved.
-
-
-
-
- Little [Page 9]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- a) Ubiquity
-
- It is not a goal to design a routing environment in which any
- participating autonomous system can obtain a routing service to
- any other participating autonomous system in a ubiquitous
- fashion. Within a policy sensitive routing environment, the
- cooperation of intermediate resources will be necessary and
- cannot be guaranteed to all participants. The concept of
- ubiquitous connectivity will not be a valid one.
-
- b) Congestion control
-
- The ability for inter-autonomous system routing to perform
- congestion control is a non-requirement. Additional study is
- necessary to determine what mechanisms are most appropriate and
- if congestion control is best realized within the inter-AS
- and/or intra-AS environments, and if both, what the dynamics of
- the interactions between the two are.
-
- c) Load splitting
-
- The functional capability to distribute the flow of datagrams,
- from a source to a destination, across two or more distinct
- paths through route synthesis and/or forwarding is a non-
- requirement.
-
- d) Maximizing the utilization of resources
-
- There is no goal or requirement for the inter-autonomous system
- routing environment to be designed such that it attempts to
- maximize the utilization of available resources.
-
- e) Schedule to deadline service
-
- The ability to support a schedule to deadline routing service
- is a non-requirement for the inter-autonomous routing
- environment at this point in time.
-
- f) Non-interference policies of resource utilization
-
- The ability to support routing policies based upon the concept
- of non-interference is a not a requirement. An example of such
- a policy is one where an autonomous system allows the
- utilization of excess bandwidth by external users as long as
- this does not interfere with local usage of the link.
-
-
-
-
-
-
- Little [Page 10]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- 5. Considerations
-
- Although neither a specific goal nor a functional requirement,
- consideration must be given to the transition which will occur from
- the current operational routing environment to a new routing
- environment. A coordinated effort among all participants of the
- Internet would be impractical considering the magnitude of such an
- undertaking. Particularly, the issues of transitional coexistence,
- as opposed to phased upgrading between disjoint systems, should be
- addressed as a means to minimize the disruption of service. Careful
- consideration should also be given to any required changes to hosts.
- It is very unlikely that all hosts could be changed, given historical
- precedence, their diversity and their large numbers.
-
- Appendix - Issues in Inter-Autonomous Systems Routing
-
- A.0 Acknowledgement
-
- This appendix is an edited version of the now defunct document
- entitled "Requirements for Inter-Autonomous Systems Routing", written
- by Ross Callon in conjunction with the members of the Open Routing
- Working Group.
-
- A.1 Introduction
-
- The information and discussion contained here historically precedes
- that of the main document body and was a major influence on its
- content. It is included here as a matter of reference and to provide
- insight into some of the many issues involved in inter-autonomous
- systems routing.
-
- The following definitions are utilized:
-
- Boundary Gateway
-
- A boundary gateway is any autonomous system gateway which
- has a network interface directly reachable from another
- autonomous system. As a member of an autonomous system, a
- boundary gateway participates in the Interior Gateway
- Protocol and other protocols used for routing (and other
- purposes) between other gateways of this same autonomous
- system and between those networks directly reachable by this
- autonomous system. A boundary gateway may also
- participate in an Inter-Autonomous System Routing Protocol.
- As a participant in the inter-autonomous system routing
- protocol, a boundary gateway interacts with other boundary
- gateways in other autonomous systems, either directly or
- indirectly, in support of the operation of the
-
-
-
- Little [Page 11]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- Inter-Autonomous System Routing Protocol.
-
- Interior Gateway
-
- An interior gateway is any autonomous system gateway which
- is not a boundary gateway. As such, an interior gateway
- does not have any network interfaces which are directly
- reachable by any other autonomous system. An interior
- gateway is part of an autonomous system and, as such,
- takes part in the Interior Gateway Protocol and other
- protocols used in that autonomous system. However, an
- interior gateway does not directly exchange routing
- information with gateways in other autonomous systems via
- the Inter-Autonomous System Routing Protocol.
-
- The following acronyms are used:
-
- AS -- Autonomous System
-
- This document uses the current definition of "Autonomous
- System": a collection of cooperating gateways running a
- common interior routing protocol. This implies that networks
- and hosts may be reachable through one or more Autonomous
- Systems.
-
- NOTE: The current notion of "Autonomous System" implicitly
- assumes that each gateway will belong to exactly one AS.
- Extensions to allow gateways which belong to no AS's
- and/or gateways which belong to multiple AS's, are beyond
- the scope of this discussion. However, we do not preclude
- the possibility of considering such extensions in the
- future.
-
- IARP -- Inter-Autonomous System Routing Protocol
-
- This is the protocol used between boundary gateways for
- the purpose of routing between autonomous systems.
-
- IGP -- Interior Gateway Protocol
-
- This is the protocol used within an autonomous system for
- routing within that autonomous system.
-
- A.2 Architectural Issues
-
- The architecture of an inter-autonomous system routing environment is
- mutually dependent with the notion of an Autonomous System. In
- general, the architecture should maximize independence of the
-
-
-
- Little [Page 12]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- internals of an AS from the internals of other AS's, as well as from
- the inter-autonomous system routing protocols (IARP). This
- independence should allow technological and administrative
- differences among AS's as well as protection against propagation of
- misbehavior. The following issues address ways to achieve
- interoperation and protection, and to meet certain performance
- criteria. We also put forth a set of minimal constraints to be
- imposed among Autonomous Systems, and between inter- and intra-AS
- functions.
-
- A.2.1 IGP Behavior
-
- The IARP should be capable of tolerating an Autonomous System in
- which its IGP is unable to route packets, provides incorrect
- information, and exhibits unstable behavior. Interfacing to such an
- ill-behaved AS should not produce global instabilities within the
- IARP and the IARP should localize any effects. On the other hand,
- the IGP should provide a routing environment where the information
- and connectivity provided to the IARP from the IGP does not exhibit
- rapid and continual changes. An Autonomous System therefore should
- appear as a relatively stable environment.
-
- A.2.2 Independence of Autonomous Systems
-
- The IARP should not constrain any AS to require the use any one
- specific IGP. This applies both to IGPs and potentially to any other
- internal protocols. The architecture should also allow intra-AS
- routing and organizational structures to be hidden from inter-AS use.
- An Autonomous System should not be required to use any one specific
- type of linkage between boundary gateways within the AS. However,
- there are some minimal constraints that gateways and the associated
- interior routing protocol within an AS must meet in order to be able
- to route Inter-AS traffic, as discussed in Section A.2.6.
-
- A.2.3 General Topology
-
- The routing architecture should provide significant flexibility
- regarding the interconnection of AS's. The specification of IARP
- should impose no inherent restriction on either interconnection
- configuration or information passing among autonomous systems. There
- may be administrative and policy limitations on the interconnection
- of AS's, and on the extent to which routing information and data
- traffic may be passed between AS's. However, there should be no
- inherent restrictions imposed by limitations in the design of the
- routing architecture. The architecture should allow arbitrary
- topological interconnection of Autonomous Systems. Propagation of
- routing information should not be restricted by the specification of
- the IARP. For example, the restrictions imposed by the "core model"
-
-
-
- Little [Page 13]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- used by EGP are not acceptable.
-
- A.2.4 Routing Firewalls
-
- We expect AS's to have a certain amount of insulation from other
- AS's. This protection should apply to both the adequacy and
- stability of routes produced by the routing scheme, and also to the
- amount of overhead traffic and other costs necessary to run the
- routing scheme. There are several forms which these "routing
- firewalls" may take:
-
- - An AS must be able to successfully route its own internal
- traffic in the face of arbitrary failures of other IGPs and the
- IARP. In other words, the AS should be able to effectively
- shutout the rest of the world.
-
- - The IARP should be able to operate correctly in the face of IGP
- failures. In this case, correct operation is defined as
- recognizing that an AS has failed, and routing around it if
- possible (traffic to or from that AS may of course fail).
-
- - In addition, problems in Inter-AS Routing should, as much as
- possible, be limited in the extent of their effect.
-
- Routing firewalls may be explicit, or may be inherent in the design
- of the algorithms. We expect that both explicit and inherent
- firewalls will be utilized. Examples of firewalls include:
-
- - Separating Intra- and Inter-AS Routing to some extent
- isolates each of these from problems with the other. Clearly
- defined interfaces between different modules/protocols provides
- some degree of protection.
-
- - Access control restrictions may provide some degree of
- firewalls. For example, some AS's may be non-transit (won't
- forward transit traffic). Failures within such AS's may be
- prevented from affecting traffic not associated with that AS.
-
- - Protocol design can help. For example, with link state routing
- you can require that both ends must report a link before is may
- be regarded as up, thereby eliminating the possibility of a
- single node causing fictitious links.
-
- - Finally, explicit firewalls may be employed using explicit
- configuration information.
-
-
-
-
-
-
- Little [Page 14]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- A.2.5 Boundary Gateways
-
- Boundary gateways will exchange Inter-AS Routing information with
- other boundary gateways using the IARP. Each AS which is to take
- part in Inter-AS Routing will have one or more boundary gateways, of
- which one or more of these boundary gateways exchanges information
- with peer boundary gateways in other AS's.
-
- Information related to Inter-AS Routing may be passed between
- connected boundary gateways in different AS's. Specific designated
- boundary gateways will therefore be required to understand the IARP.
- The external link between the boundary gateways may be accomplished
- by any kind of connectivity that can be modeled as a direct link
- between two gateways -- a LAN, an ARPANET, a satellite link, a
- dedicated line, and so on.
-
- A.2.6 Minimal Constraints on the Autonomous System
-
- The architectural issues discussed here for inter-AS routing imply
- certain minimal functional constraints that an AS must satisfy in
- order to take part in the Inter-AS Routing scheme. These minimal
- requirements are described in greater detail in this section. This
- list of functional constraints is not necessarily complete.
-
- A.2.6.1 Internal Links between Boundary Gateways
-
- In those cases where an AS may act as a transit AS (i.e., may pass
- traffic for which neither the source nor the destination is in that
- AS), the gateways internal to that AS will need to know which
- boundary gateway is to serve as the exit gateway from that AS. There
- are several ways in which this may be accomplished:
-
- 1. Boundary gateways are directly connected
-
- 2. "Tunneling" (i) using source routing (ii) using encapsulation
-
- 3. Interior gateways participate (i) limited participation (ii)
- fully general participation
-
- With solution (1), the boundary gateways in an AS are directly
- connected. This eliminates the need for other gateways in the AS to
- have any knowledge of Inter-AS Routing. Transit traffic is passed
- directly among the boundary gateways of the AS.
-
- With solution (2), transit traffic may traverse interior gateways,
- but these interior gateways are protected from any need to have
- knowledge about Inter-AS routes by means such as source routing or
- encapsulation. The boundary gateway by which the packet enters an AS
-
-
-
- Little [Page 15]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- determines the boundary gateway which will serve as the exit gateway.
- This may require that the entrance boundary gateway add a source
- route to the packet, or encapsulate the packet in another level of IP
- or gateway-to-gateway header. This allows boundary gateways to
- forward data traffic using the appropriate tunnelling technique.
-
- Finally, with solution (3), the interior gateways have some knowledge
- of Inter-AS Routing. At a minimum, the interior gateways would need
- to know the identity of each boundary gateway, the address(es) that
- can be reached by that gateway, and the Inter-AS metric associated
- with the route to that address(es). If the IARP allows for separate
- routing for multiple TOS classes, then the information that the
- interior gateways need to know includes a separate Inter-AS metric
- for each TOS class. The Inter-AS metrics are necessary to allow
- gateways to choose among multiple possible exit boundary gateways.
- In general, it is not necessary for the Inter-AS metrics to have any
- relationship with the metric used within an AS for interior routing.
- The interior gateways do not need to know how to interpret the
- exterior metrics, except to know that each metric is to be
- interpreted as an unsigned integer and a lesser value is preferable
- to a greater value. It would be possible, but not necessary, for the
- interior gateways to have full knowledge of the IARP.
-
- It is not necessary for the Inter-AS Routing architecture to specify
- which of these solutions are to be used for any particular AS.
- Rather, it is possible for individual AS's to choose which scheme or
- combination of schemes to use. Independence of the IARP from the
- internal operation of each AS implies that this decision be left up
- to the internal protocols used in each AS. The IARP must be able to
- operate as if the boundary gateways were directly connected.
-
- A.2.6.2 Forwarding of Data from the AS
-
- The scheme used for forwarding transit traffic across an AS also has
- implications for the forwarding of traffic which originates within an
- AS, but whose destination is reachable only from other AS's. If
- either of solutions (1) or (2) in Section A.2.6.1 is followed, then
- it will be sufficient for an interior gateway to forward such traffic
- to any boundary gateway. Greater efficiency may optionally be
- achieved in some cases by providing interior gateways with additional
- information which will allow them to choose the "best" boundary
- gateway in some sense. If solution (3) is followed, then the
- information passed to interior gateways to allow them to forward
- transit traffic will also be sufficient to forward traffic
- originating within that AS.
-
-
-
-
-
-
- Little [Page 16]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- A.2.6.3 Forwarding of Data to a Destination in the AS
-
- If a packet whose destination is reachable from an AS arrives at that
- AS, then it is desired that the interior routing protocol used in
- that AS be able to successfully deliver the packet without reliance
- on Inter-AS Routing. This does not preclude that the Inter-AS
- Routing protocol will deal with partitioned AS's.
-
- An AS may have access control, security, and policy restrictions that
- restrict which data packets may enter or leave the AS. However, for
- any data packet which is allowed access to the AS, the AS is expected
- to deliver the packet to its destination without further restrictions
- between parts of the AS. In this sense, the internal structure of
- the AS should not be visible to the IARP.
-
- A.3 Policy Issues
-
- The interconnection of multiple heterogeneous networks and multiple
- heterogeneous autonomous systems owned and operated by multiple
- administrations into a single combined internet is a very complex
- task. It is expected that the administrations associated with such
- an internet will wish to impose a variety of constraints on the
- operation of the internet. Specifically, externally imposed routing
- constraints may include a variety of transit access control,
- administrative policy, and security constraints.
-
- Transit access control refers to those access control restrictions
- which an AS may impose to restrict which traffic the AS is willing to
- forward. There are a large number of access control restrictions
- which one could envision being used. For example, some AS's may wish
- to operate only as "non-transit" AS's, that is, they will only
- forward data traffic which either originates or terminates within
- that AS. Other AS's may restrict transit traffic to datagrams which
- originate within a specified set of source hosts. Restrictions may
- require that datagrams be associated with specific applications (such
- as electronic mail traffic only), or that datagrams be associated
- with specific classes of users.
-
- Policy restrictions may allow either the source of datagrams, or the
- organization that is paying for transmission of a datagram, to limit
- which AS's the datagrams may transit. For example, an organization
- may wish to specify that certain traffic originating within their AS
- should not transit any AS administered by its main competitor.
-
- Security restrictions on traffic relates to the official security
- classification level of traffic. As an example, an AS may specify
- that all classified traffic is not allowed to leave its AS.
-
-
-
-
- Little [Page 17]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- The main problem with producing a routing scheme which is sensitive
- to transit access control, administrative policy, and security
- constraints is the associated potential for exponential growth of
- routes. For example, suppose that there are 20 packets arriving at a
- particular gateway, each for the same destination, but subject to a
- different combination of access control, policy, and security
- constraints. It is possible that all 20 packets would need to follow
- different routes to the destination.
-
- This explosive growth of routes leads to the question: "Is it
- practically feasible to deal with complete general external routing
- constraints?" One approach would allow only a smaller subset of
- constraints, chosen to provide some useful level of control while
- allowing minimal impact on the routing protocol. Further work is
- needed to determine the feasibility of this approach.
-
- There is another problem with dealing with transit access control,
- policy, and security restrictions in a fully general way.
- Specifically, it is not clear just what the total set of possible
- restrictions should be. Efforts to study this issue are currently
- underway, but are not expected to produce definitive results within a
- short to medium time frame. It is therefore not practical to wait
- for this effort to be finished before defining the next generation of
- Inter-AS Routing.
-
- A.4 Service Features
-
- The following paragraphs discuss issues concerning the services an
- Inter-AS Routing Protocol may provide. This is not a complete list
- of service issues but does address many of those services which are
- of concern to a significant portion of the community.
-
- A.4.1 Cost on Toll Networks
-
- Consideration must be given to the use of routing protocols with toll
- (i.e., charge) networks. Although uncommon in the Internet at the
- moment, they will become more common in the future, and thought needs
- to be given to allowing their inclusion in an efficient and effective
- manner.
-
- There are two areas in which concerns of cost intrude. First,
- provision must be made to include in the routing information
- distributed throughout the system the information that certain links
- cost money, so that traffic patterns may account for the cost.
- Second, the actual operation of the algorithm, in terms of the
- messages that must be exchanged to operate the algorithm, must
- recognize that fact that on certain links, the exchange may have an
- associated cost which must be taken into account. These areas often
-
-
-
- Little [Page 18]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- involve policy questions on the part of the user. It is a
- requirement of the algorithm that facilities be available to allow
- different groups to answer these questions in different ways. The
- first area is related to type-of-service routing, and is discussed in
- Section A.4.2. The second area is discussed below.
-
- Previous attempts at providing these sorts of controls were
- incomplete because they were not thought through fully; a new effort
- must avoid these pitfalls. For instance, even though the Hello rate
- in EGP may be adjusted, turning the rate down too low (to control the
- costs) could cause the route to be dropped from databases through
- timeout.
-
- In a large internet, changes will be occurring constantly; a
- simplistic mechanism might mean that a site which is only connected
- by toll networks has to either accept having an old picture of the
- network, or spend more to keep a more current picture of things.
- However, that is not necessarily the case if incomplete knowledge and
- cache-based techniques are used more. For instance, if a site
- connected only by toll links keeps an incomplete or less up-to-date
- map of the situation, an agreement with a neighbor which does not
- labor under these restrictions might allow it to get up-to-date
- information only when needed.
-
- A.4.2 Type-of-Service Routing
-
- The need for type-of-service (TOS) has been increasing as networks
- become more heterogeneous in physical channel components, high-level
- applications, and administrative management. For instance, some
- recently installed fiber cables provide abundant communication
- bandwidths, while old narrow-band channels will still be with us for
- a long time period. Electronic mail traffic tolerates delivery
- delays and low throughput. New image transmissions are coming up;
- these require high bandwidths but are not effected by a few bit
- errors. Furthermore, some networks may soon install accounting
- functions to charge users, while others may still provide free
- services.
-
- Considering the long life span of a new routing architecture, it is
- mandatory that it be built with mechanisms to provide TOS routing.
- Unfortunately, we have had very little experience with TOS routing,
- even with a single network. No TOS routing system has ever been
- field-tested on a large-scale basis.
-
- We foresee the need for TOS routing and recognize the possible
- complexities and difficulties in design and implementation. We also
- consider that new applications coming along may require novel
- services that are unforeseeable today. We feel a practical approach
-
-
-
- Little [Page 19]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- is to provide a small set of TOS routing functions as a first step
- while the design of the architecture should be such that new classes
- of TOS can be easily added later and incrementally deployed. The
- Inter-AS Routing Architecture should allow both globally and locally
- defined TOS classes.
-
- We intend to address TOS routing based on the following metrics:
-
- - Delay
-
- - Throughput
-
- - Cost
-
- Delay and throughput are the main network performance concerns.
- Considering that some networks may soon start charging users for the
- transmission services provided, the cost should also be added as a
- factor in route selection.
-
- Reliability is not included in the above list. Different
- applications with different reliability requirements will differ in
- terms of what Transport Protocol they use. However, IP offers only a
- "moderate" level of reliability, suitable to applications such as
- voice, or possibly even less than that required by voice. The level
- of reliability offered by IP will not differ substantially based on
- the application. Thus the requested level of reliability will not
- affect Inter-AS Routing.
-
- Delay and throughput will be measured from the physical
- characteristics of communication channels, without considering
- instantaneous load. This is necessary in order to provide stable
- routes, and to minimize the overhead caused by the Inter-AS Routing
- scheme.
-
- A number of TOS service classes may be defined according to these
- metrics. Each class will present defined requirements for each of
- the TOS metrics. For example, one class may require low delay,
- require only low throughput, and require low cost.
-
- A.4.3 Multipath Routing
-
- There are two types of multipath routing which are useful for Inter-
- AS Routing: (1) there may be multiple gateways between any two
- neighboring AS's; (2) there may be multiple AS-to-AS paths between
- any pair of source and destination AS's. Both forms of multipath are
- useful in order to allow for loadsplitting. Provision for multipath
- routing in the IARP is desirable, but not an absolute requirement.
-
-
-
-
- Little [Page 20]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- A.5 Performance Issues
-
- The following paragraphs discuss issues related to the performance of
- an Inter-AS Routing Protocol. This discussion addresses size as well
- as efficiency considerations.
-
- A.5.1 Adaptive Routing
-
- It is necessary that the Inter-AS Routing scheme respond in a timely
- fashion to major network problems, such as the failure of specific
- network resources. In this sense, Inter-AS Routing needs to use
- adaptive routing mechanisms similar to those commonly used within
- individual networks and AS's. It is important that the adaptive
- routing mechanism chosen for Inter-AS Routing achieve rapid
- convergence following internet topological changes, with little or
- none of the serious convergence problems (such as "counting to
- infinity") that have been experienced in some existing dynamic
- routing protocols.
-
- The Inter-AS Routing scheme must provide stability of routes. It is
- totally unacceptable for routes to vary on a frequent basis. This
- requirement is not meant to limit the ability of the routing
- algorithm to react rapidly to major topological changes, such as the
- loss of connectivity between two AS's. The need for adaptive routing
- does not imply any desire for load-based routing.
-
- A.5.2 Large Internets
-
- One key question in terms of the targets is the maximum size of the
- Internet this algorithm is supposed to support. To some degree, this
- is tied to the timeline for which this protocol is expected to be
- active. However, it is necessary to have some size targets.
- Techniques that work at one order of size may be impractical in a
- system ten or twenty times larger.
-
- Over the past five years there has been an approximate doubling of
- the Internet each year. In January 1988, there were more than 330
- operational networks and more than 700 network assigned numbers.
- Exact figures for the future growth rate of the Internet are
- difficult to predict accurately. However, if this doubling trend
- continues, we would reach 10,000 nets sometime near January 1993.
-
- Taking a projection purely on the number of networks (the top level
- routing entity) may be overly conservative since the introduction and
- wide use of subnets has absorbed some growth, but will not continue
- to be able to do so. In addition, there are plans being discussed
- that will continue or accelerate the current rate of growth.
- Nonetheless, the number of networks is very important because
-
-
-
- Little [Page 21]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- networks constitute the "top level entities" in the current
- addressing structure.
-
- The implications of the size parameter are fairly serious. The
- current system has only one level of addressing above subnets. While
- it is possible to adjust certain parameters (for example, the
- unsolicited or unnecessary retransmission rate) to produce a larger
- but less robust system, other parameters (for example, the rate of
- change in the system) cannot be so adjusted. This will provide
- eventual limits on the size of a system that can be dealt with in a
- flat address space.
-
- The exact size that necessitates moving from the current single-
- level system to a multi-level system is not clear. Among the
- parameters which affect it are the assumed minimum speed of links in
- the system (faster links can allocate more bandwidth to routing
- traffic before it becomes obtrusive), speed and memory capacity of
- routing nodes (needed to store and process routing data), rate at
- which topology changes, etc. The maximum size which can be handled
- in a single layer is generally thought to be somewhere on the order
- of 10 thousand objects. The IARP must be designed to deal with
- internets bigger than this.
-
- A.5.3 Addressing Implications
-
- Given the current rate of growth of the Internet, we can expect that
- the current addressing structure will become unworkable early within
- the lifetime of the new IARP. It is therefore essential that any new
- IARP be able to use a new addressing format which allows for
- addressing hierarchies beyond the network level. Any new IARP should
- allow for graceful migration from the current routing protocols, and
- should also allow for graceful migration from a routing scheme based
- on the current addressing, to a scheme based on a new multi-level
- addressing format such as that described by OSI 8473.
-
- A.5.4 Memory, CPU, and Bandwidth Costs
-
- Routing costs can be measured in terms of the memory needed to store
- routing information, the CPU costs of calculating routes and
- forwarding packets, and the bandwidth costs of exchanging routing
- information and of forwarding packets. These significant factors
- should provide the basis for comparison between competing proposals
- in IARP design.
-
-
-
-
-
-
-
-
- Little [Page 22]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- The routing architecture will be driven by the expected size of the
- Internet, the expected memory capacity of the gateways, capacity of
- the Inter-AS links, and the computing speed of the gateways. Given
- our experience with the current Internet, it is clearly necessary for
- the scheme to function adequately even if the Internet grows more
- quickly than we predict and its capacity grows more slowly. Memory,
- CPU, and bandwidth costs should be in line with what is economically
- practical at any point in time given the size of the Internet at that
- time.
-
- A.6 Other Issues
-
- The following are issues of a general nature and includes discussion
- of items which have been considered to be best left for future
- efforts.
-
- A.6.1 Implementation
-
- The specification of IARP should allow interoperation among multi-
- vendor implementations. This requires that multiple vendors be able
- to implement the same protocol, and that equipment from multiple
- vendors be able to interoperate successfully.
-
- There are potential practical difficulties of realizing multi-vendor
- interoperation. Any such difficulty should not be inherent to the
- protocol specifications. Towards this end, we should produce a
- protocol specification that is precise and unambiguous. This implies
- that the specification should include a detailed specification using
- Pseudo-Code or a Formal Description Technique.
-
- A.6.2 Configuration
-
- It is expected that any IARP will require a certain amount of
- configuration information to be maintained by gateways. However, in
- practice it is often difficult to maintain configuration information
- in a fully correct and up-to-date form. Problems in configuration
- have been known to cause significant problems in existing operational
- networks and internets. The design of an Inter-AS Routing
- architecture must therefore simplify the maintenance of configuration
- information, consistent with other requirements. Simplification of
- configuration information may require minimizing the amount of
- configuration information, and using automated or semi-automated
- configuration mechanisms.
-
- A.6.3 Migration
-
- In any event, whether the address format changes or not, a viable
- transition plan which allows for interoperability must be arranged.
-
-
-
- Little [Page 23]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- In a system of this magnitude, which is in operational use, a
- coordinated change is not possible. Where possible, changes should
- not affect the hosts, since deploying such a change is probably
- several orders of magnitude more difficult than changing only the
- gateways, due to the larger number of host implementations as well as
- hosts. There are two important questions that need to be addressed:
- (1) migration from the existing EGP to a new IARP; (2) migration from
- the current DD IP to future protocols (including the ISO IP, and
- other future protocols).
-
- A.6.4 Load-Based Routing
-
- Some existing networks are able to route packets based on current
- load in the network. For example, one approach to congestion
- involves adjusting the routes in real time to send as much traffic as
- possible on lightly loaded network links.
-
- This sort of load-based routing is a relatively delicate procedure
- which is prone to instability. It is particularly difficult to
- achieve stability in multi-vendor environments, in large internets,
- and in environments characterized by a large variation in network
- characteristics. For these reasons, we believe that it would be a
- mistake to attempt to achieve effective load-based routing in an
- Inter-AS Routing scheme.
-
- A.6.5 Non-Interference Policies
-
- There are policies which are in effect, or desired to be in effect,
- which are based upon the concept of non-interference. These policies
- state that the utilization of a given resource is permissible by one
- party as long as that utilization does not disrupt the current or
- future utilization of another party. These policies are often of the
- kind "you may use the excess capacity of my link" without
- guaranteeing any capacity will be available. The expectation is to
- be able to utilize the link as needed, perhaps to the exclusion of
- the other party. The problem with supporting such a policy is the
- need to be cognizant of highly dynamic state information and the
- implicit requirement to adapt to these changes. Rapid, persistent,
- and non-deterministic state changes would lead to routing
- oscillations and looping. We do not believe it is feasible to
- support policies based on these considerations in a large
- internetworking environment based on the current design of IP.
-
- Security Considerations
-
- Security issues are not addressed in this memo.
-
-
-
-
-
- Little [Page 24]
-
- RFC 1126 Inter-Autonomous System Routing October 1989
-
-
- Author's Address
-
- Mike Little
- Science Applications International Corporation (SAIC)
- 8619 Westwood Center Drive
- Vienna, Virginia 22182
-
- Phone: 703-734-9000
-
- EMail: little@SAIC.COM
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Little [Page 25]
-