[Nsi-wg] Topology section

John MacAuley john.macauley at surfnet.nl
Wed May 16 10:16:13 EDT 2012


Here is the assumption:

a) All NSA will not have peering relationships, and therefore, not every NSA will be able to communicate with all other deployed NSA.
b) A centralized topology solution is undesirable, and therefore, we need to distributed topology discovery.
c) NSA agents will communicated with their provider NSA to discover network topology similar to the provider-to-provider discovery.

The problem is not a hard one as it has been solved in many distributed routing solutions.  The key is controlled learning using directly connected peer NSA.

I thew the policy in there because we always throw the security issue into every message we define ;-)

John

On 2012-05-16, at 4:59 AM, Radek Krzywania wrote:

> Hi,
> Re 1 an 2) - shouldn't we just define a kind of lookup service for all NSI agents in clound (it can be done in distributed manner, like DNS structure eg, or whatever), so the "yellow pages" are always known? Also I am not sure if I understand how "NSA 1 will compare the list of returned networks to the list it has already discovered, then make a decision on the individual network topology to retrieve from NSA 2." Shouldn't we have exactly the same topology in all NSI agents, for sake of clarity and simplicity?
> 
> Re 3) - that's what I don't like. I understand you don’t trust PIONIER and don't want to share the topology with me (the detailed one), no offence :) However making agent different and distributing different topology data to those whom you trust or no makes whole system tough to design and horrible to implement. Also if there are some trusted sites which gets more details, someone may compromise one of such sites and get information now allowed to see (and use it for a network attack e.g.). The trusted domains will also have more information about neighbours, but what to do with such info since domain are independent? Even if you know something about a neighbour, you can't make decisions instead of him. Despite of that the agent will behave differently for domain it trust and knows more, and for the rest. That changes the logic of an agent, and thus make it more complex. My feeling is that the benefit of giving more info to trusted domains is less than implementation problems it generates. 
> 
> Best regards
> Radek
> 
> ________________________________________________________________________
> Radoslaw Krzywania                      Network Research and Development
>                                           Poznan Supercomputing and  
> radek.krzywania at man.poznan.pl                   Networking Center
> +48 61 850 25 26                             http://www.man.poznan.pl
> ________________________________________________________________________
> 
> 
>> -----Original Message-----
>> From: nsi-wg-bounces at ogf.org [mailto:nsi-wg-bounces at ogf.org] On Behalf
>> Of John MacAuley
>> Sent: Wednesday, May 16, 2012 4:21 AM
>> To: Jeroen van der Ham
>> Cc: NSI WG
>> Subject: Re: [Nsi-wg] Topology section
>> 
>> In addition to the topology data representation we will also need to define a
>> topology discover mechanism that fits into the existing NSI framework.  We
>> will need to address the following discover requirements:
>> 
>> 1. Support for controlled discovery.  An NSA will attempt to build a view of
>> network topology through communicating with peer NSA.  Controlled
>> discovery allows an NSA to make decisions on how it will discover the full
>> network topology.  For example, NSA 1 may ask NSA 2 for all the networks it
>> has discovered, but not the detailed topology.  NSA 1 will compare the list of
>> returned networks to the list it has already discovered, then make a decision
>> on the individual network topology to retrieve from NSA 2.
>> 
>> 2. We will need a subscription mechanism for an NSA to register with a peer
>> NSA for topology updates on networks of interest.  If NSA 1 discovers NSA 3
>> through discovery with NSA 2, NSA 1 could register with NSA 2 for any
>> topology updates on NSA 3.
>> 
>> 3. Policy will need to be associated with communicated  topology.  We need
>> additional investigation into this, but I would like to see the ability to
>> associate a propagation policy with my topology.  For example, I may allow
>> UvA and NORDUnet to see my detailed topology, but they are not allowed to
>> propagate, or advertise it to any other peer NSA.  This will allow me to control
>> distribution, and yes, I will need to trust the peer NSA not to propagate it.
>> 
>> John.
>> 
>> On 2012-05-11, at 3:19 AM, Jeroen van der Ham wrote:
>> 
>>> Hi all,
>>> 
>>> I've made a start on the topology section for the NSI v2.0 document. It's
>> not finished yet, but at least it contains some start. Unfortunately, I'll be on
>> holiday next week, so I won't be able to further write on this. If others feel
>> they can contribute, please do so.
>>> 
>>> The document is available for reading at:
>>> https://docs.google.com/document/d/1HIo7uQl7DbTe_y-
>> cnPOrqDkspoRBaTKVVrrldURurTk/edit
>>> 
>>> Guy should be able to give out edit access rights too.
>>> 
>>> Jeroen.
>>> _______________________________________________
>>> nsi-wg mailing list
>>> nsi-wg at ogf.org
>>> https://www.ogf.org/mailman/listinfo/nsi-wg
>> 
>> _______________________________________________
>> nsi-wg mailing list
>> nsi-wg at ogf.org
>> https://www.ogf.org/mailman/listinfo/nsi-wg
> 



More information about the nsi-wg mailing list