diff options
Diffstat (limited to 'doc/rfc/rfc1104.txt')
-rw-r--r-- | doc/rfc/rfc1104.txt | 563 |
1 files changed, 563 insertions, 0 deletions
diff --git a/doc/rfc/rfc1104.txt b/doc/rfc/rfc1104.txt new file mode 100644 index 0000000..e9c9eb1 --- /dev/null +++ b/doc/rfc/rfc1104.txt @@ -0,0 +1,563 @@ + + + + + + +Network Working Group H-W. Braun +Request for Comments: 1104 Merit/NSFNET + June 1989 + + + Models of Policy Based Routing + +1. Status of this Memo + + The purpose of this RFC is to outline a variety of models for policy + based routing. The relative benefits of the different approaches are + reviewed. Discussions and comments are explicitly encouraged to move + toward the best policy based routing model that scales well within a + large internetworking environment. + + Distribution of this memo is unlimited. + +2. Acknowledgements + + Specific thanks go to Yakov Rekhter (IBM Research), Milo Medin + (NASA), Susan Hares (Merit/NSFNET), Jessica Yu (Merit/NSFNET) and + Dave Katz (Merit/NSFNET) for extensively contributing to and + reviewing this document. + +3. Overview + + To evaluate the methods and models for policy based routing, it is + necessary to investigate the context into which the model is to be + used, as there are a variety of different methods to introduce + policies. Most frequently the following three models are referenced: + + Policy based distribution of routing information + Policy based packet filtering/forwarding + Policy based dynamic allocation of network resources (e.g., + bandwidth, buffers, etc.) + + The relative properties of those methods need to be evaluated to find + their merits for a specific application. In some cases, more than + one method needs to be implemented. + + While comparing different models for policy based routing, it is + important to realize that specific models have been designed to + satisfy a certain set of requirements. For different models these + requirements may or may not overlap. Even if they overlap, they may + have a different degree of granularity. In the first model, the + requirements can be formulated at the Administrative Domain or + network number level. In the second model, the requirements can be + formulated at the end system level or probably even at the level of + + + +Braun [Page 1] + +RFC 1104 Models of Policy Based Routing June 1989 + + + individual users. In the third model, the requirements need to be + formulated at both the end system and local router level, as well as + at the level of Routing Domains and Administrative Domains. + + Each of these models looks at the power of policy based routing in a + different way. They may be implemented separately or in combination + with other methods. The model to describe policy based dynamic + allocation of network resources is orthogonal to the model of policy + based distribution of routing information. However, in an actual + implementation each of these models may interact. + + It is important to realize that the use of a policy based scheme for + individual network applications requires that the actual effects as + well as the interaction of multiple methods need to be determined + ahead of time by policy. + + While uncontrolled dynamic routing and allocation of resources may + have a better real time behavior, the use of policy based routing + will provide a predictable, stable result based on the desires of the + administrator. In a production network, it is imperative to provide + continuously consistent and acceptable services. + +4. Policy based distribution of routing information + + Goals: + + The goal of this model is to enforce certain flows by means of + policy based distribution of routing information. This + enforcement allows control over who can and who can not use + specific network resources. + + Enforcement is done at the network or Administrative Domain (AD) + level - macroscopic policies. + + Description: + + A good example of policy based routing based on the distribution + of routing information is the NSFNET with its interfaces to mid- + level networks [1], [2]. At the interface into the NSFNET, the + routing information is authenticated and controlled by four means: + + 1. Routing peer authentication based on the source address. + + 2. Verification of the Administrative Domain identification + (currently EGP Autonomous System numbers). + + 3. Verification of Internet network numbers which are + advertised via the routing peer. + + + +Braun [Page 2] + +RFC 1104 Models of Policy Based Routing June 1989 + + + 4. Control of metrics via a Routing Policy Data Base for the + announced Internet network numbers to allow for primary + paths to the NSFNET as well as for paths of a lesser + degree. + + At the interfaces that pass routing traffic out of the NSFNET, the + NSS routing code authenticates the router acting as an EGP peer by + its address as well as the Administrative Domain identification + (Autonomous System Number). + + Outbound announcements of network numbers via the EGP protocol are + controlled on the basis of Administrative Domains or individual + network numbers by the NSFNET Routing Policy Data Base. + + The NSFNET routing policy implementation has been in place since + July 1988 and the NSFNET community has significant experience with + its application. + + Another example of policy controlled dissimination of routing + information is a method proposed for ESNET in [3]. + + Benefits: + + A major merit of the control of routing information flow is that + it enables the engineering of large wide area networks and allows + for a more meshed environment than would be possible without tight + control. Resource allocation in a non-hostile environment is + possible by filtering specific network numbers or Administrative + Domains on a per need basis. Another important benefit of this + scheme is that it allows for network policy control with virtually + no performance degradation, as only the routing packets themselves + are relevant for policy control. Routing tables are generated as + a result of these interactions. This means that this scheme + imposes only very little impact on packet switching performance at + large. + + Concerns: + + Policy based routing information distribution does not address + packet based filtering. An example is the inability to prevent + malicious attacks by introduced source routed IP packets. While + resource allocation is possible, it extends largely to filtering + on network numbers or whole Administrative Domains, but it would + not extend to end systems or individual users. + + Costs: + + Policy based routing in the NSFNET is implemented in a series of + + + +Braun [Page 3] + +RFC 1104 Models of Policy Based Routing June 1989 + + + configuration files. These configuration files are in turn + generated from a routing information database. The careful + creation of this routing information database requires knowledge + of the Internet at large. Because the Internet is changing + constantly, the upkeep of this routing information database is a + continuous requirement. However, the effort of collecting and + maintaining an accurate view of the Internet at large can be + distributed. + + Since policy controlled distribution of routing information allows + for filtering on the basis of network numbers or Administrative + Domains, the routing information database only needs to collect + information for the more than 1300 networks within the Internet + today. + +5. Policy based packet filtering/forwarding + + Goals: + + The goal of the model of policy based packet filtering/forwarding + is to allow the enforcement of certain flows of network traffic on + a per packet basis. This enforcement allows the network + administrator to control who can and who can not use specific + network resources. + + Enforcement may be done at the end system or even individual user + level - microscopic policies. + + Description: + + An example of packet/flow based policies is outlined in [4]. In a + generic sense, policy based packet filtering/forwarding allows + very tight control of the distribution of packet traffic. An + implemented example of policy based filtering/forwarding is a + protection mechanism built into the NSFNET NSS structure, whereby + the nodes can protect themselves against packets targeted at the + NSFNET itself by filtering according to IP destination. While this + feature has so far not been enabled, it is fully implemented and + can be turned on within a matter of seconds. + + Benefits: + + The principal merit of this scheme is that it allows the + enforcement of packet policies and resource allocation down to + individual end systems and perhaps even individual end users. It + does not address a sane distribution of routing information. If + policies are contained in the packets themselves it could identify + users, resulting in the ability of users to move between + + + +Braun [Page 4] + +RFC 1104 Models of Policy Based Routing June 1989 + + + locations. + + Concerns: + + The major concern would be the potentially significant impact on + the performance of the routers, as, at least for tight policy + enforcements, each packet to be forwarded would need to be + verified against a policy data base. This limitation makes the + application of this scheme questionable using current Internet + technology, but it may be very applicable to circuit switched + environments (with source-routed IP packets being similar to a + circuit switched environment). Another difficulty could be the + sheer number of potential policies to be enforced, which could + result in a very high administrative effort. This could result + from the creation of policies at the per-user level. Furthermore, + the overhead of carrying policy information in potentially every + packet could result in additional burdens on resource + availabilities. This again is more applicable to connection- + oriented networks, such as public data networks, where the policy + would only need to be verified at the call setup time. It is an + open question how well packet based policies will scale in a large + and non homogeneous Internet environment, where policies may be + created by all of the participants. These creations of policy + types of services may have to be doable in real time. + + Scaling may require hierarchy. Hierarchy may conflict with + arbitrary Type of Service (TOS) routing, which is one of the + benefits of this model. + + Costs of implementation: + + A large scale implemention of packet based policy routing would + require a routing information base that would contain information + down to the end system level and possibly end users. If one would + assume that for each of the 1300 networks there is an average of + 200 end systems, this would result in over 260000 end systems + Internet wide. Each end system in turn could further contribute + some information on the type of traffic desired, including types + of service (issues like agency network selection), potentially on + a per-user basis. The effort for the routing policy data base + could be immense, in particular if there is a scaling requirement + towards a variety of policies for backbones, mid-level networks, + campus networks, subnets, hosts, and users. The administration of + this "packet routing" database could be distributed. However, + with a fully distributed database of this size several consistency + checks would have to be built into the system. + + + + + +Braun [Page 5] + +RFC 1104 Models of Policy Based Routing June 1989 + + +6. Policy based dynamic allocation of network resources (e.g., + bandwidth, buffers, etc.). + + Goals: + + Flexible and economical allocation of network resources based on + current needs and certain policies. Policies may be formulated at + the network or Administrative Domain (AD) levels. It is also + possible to formulate policies which will regulate resource + allocation for different types of traffic (e.g., Telnet, FTP, + precedence indicators, network control traffic). + + Enforcement of policy based allocation of network resources might + be implemented within the following parts of the network: + + routers for networks and Administrative Domain (AD) levels + circuit switches for networks + end systems establishing network connections + + Description: + + Policy based allocation of bandwidth could allow the modulation of + the circuits of the networking infrastructure according to real + time needs. Assuming that available resources are limited towards + an upper bound, the allocation of bandwidth would need to be + controlled by policy. One example might be a single end system + that may or may not be allowed to, perhaps even automatically, + take resources away from other end systems or users. An example + of dynamic bandwidth allocation is the currently implemented + circuit switched IDNX component of the NSFNET, as well as the MCI + Digital Reconfiguration Service (DRS) which is planned for the + NSFNET later this year. + + Another model for resource allocation occurs at the packet level, + where the allocation is controlled by multiple packet queues. + This could allow for precedence queuing, with preferences based on + some type of service and preferred forwarding of recognized + critical data, such as network monitoring, control and routing. + An example can be found in the NSFNET, where the NSFNET nodes + prefer traffic affiliated with the NSFNET backbone network number + over all other traffic, to allow for predictable passing of + routing information as well as effective network monitoring and + control. At the other end of the spectrum, an implementation + could also allow for queues of most deferrable traffic (such as + large background file transfers). + + + + + + +Braun [Page 6] + +RFC 1104 Models of Policy Based Routing June 1989 + + + Benefits: + + Dynamic allocation of bandwidth could allow for a truly flexible + environment where the networking infrastructure could create + bandwidth on a per need basis. This could result in significant + cost reductions during times when little bandwidth is needed. + This method could potentially accommodate real time transient high + bandwidth requirements, potentially by reducing the bandwidth + available to other parts of the infrastructure. A positive aspect + is that the bandwidth allocation could be protocol independent, + with no impact on routing protocols or packet forwarding + performance. + + Policy based allocation of bandwidth can provide a predictable + dynamic environment. The rules about allocation of bandwidth at + the circuit level or at the packet level need to be determined by + a consistent and predictable policy, so that other networks or + Administrative Domains can tune their allocation of networking + resources at the same time. + + Concerns: + + The policies involved in making dynamic bandwidth allocation in a + largely packet switching environment possible are still in the + development phase. Even the technical implications of + infrastructure reconfiguration in result of events happening on a + higher level still requires additional research. + + A policy based allocation of bandwidth could tune the network to + good performance, but could cause networks located in other + Administrative Domains to pass traffic poorly. It is important + that network resource policy information for a network be + discussed within the context of its Administrative Domain. + Administrative Domains need to discuss their network resource + allocation policies with other Administrative Domains. + + The technical problem of sharing network resource policy + information could be solved by a making a "network resource policy + information" database available to all administrators of networks + and Administrative Domains. However, the political problems + involved in creating a network resource policy with impact on + multiple Administrative Domains does still require additional + study. + +7. Discussion + + Both the first and the second model of policy based routing are + similar in the sense that their goal is to enforce certain flows. + + + +Braun [Page 7] + +RFC 1104 Models of Policy Based Routing June 1989 + + + This enforcement allows the control of access to scarce network + resources (if the resource is not scarce, there is no performance + reason to control access to it). The major difference is the level + of enforcement: macroscopic level versus microscopic level control. + + Associated with the enforcement for a certain network resource is the + cost. If this cost is higher than the cost required to make a + particular resource less scarce, then the feasibility of enforcement + may be questionable. + + If portions of the Internet find that microscopic enforcement of + policy is necessary, then this will need to be implementable without + significant performance degradation to the networking environment at + large. Local policies within specific Routing Domains or + Administrative Domains should not affect global Internet traffic or + routing. Policies within Administrative Domains which act as traffic + transit systems (such as the NSFNET) should not be affected by + policies a single network imposes for its local benefit. + + Some models of policy routing are trying to deal with cases where + network resources require rather complex usage policies. One of + scenarios in [4] is one in which a specific agency may have some + network resource (in the example it is a link) which is sometimes + underutilized. The goal is to sell this resource to other agencies + during the underutilization period to recover expenses. This + situation is equivalent to the problem of finding optimum routes, + with respect to a certain TOS, in the presence of network resources + (e.g., links) with variable characteristics. Any proposed solution + to this problem should address such issues as network and route + stability. More feasibility study is necessary for the whole + approach where links used for global communication are also subject + to arbitrary local policies. An alternative approach would be to + reconfigure the network topology so that underutilized links will be + dropped and possibly returned to the phone company. This is + comparable to what the NSFNET is planning on doing with the MCI + Digital Reconfiguration Service (DRS). A DRS model may appear + cleaner and more easy to implement than a complicated model like the + one outlined in [4]. + + The models for policy based routing emphasize that careful + engineering of the Internet needs to decided upon the profile of + traffic during normal times, outage periods, and peak loads. This + type of engineering is not a new requirement. However, there could + potentially be a significant benefit in deciding these policies ahead + of time and using policy based routing to implement specific routing + policies. + + + + + +Braun [Page 8] + +RFC 1104 Models of Policy Based Routing June 1989 + + +8. Accounting vs. Policy Based Routing + + Quite often Accounting and Policy Based Routing are discussed + together. While the application of both Accounting and Policy Based + Routing is to control access to scarce network resources, these are + separate (but related) issues. + + The chief difference between Accounting and Policy Based Routing is + that Accounting combines history information with policy information + to track network usage for various purposes. Accounting information + may in turn drive policy mechanisms (for instance, one could imagine + a policy limiting a certain organization to a fixed aggregate + percentage of dynamically shared bandwidth). Conversely, policy + information may affect accounting issues. Network accounting + typically involves route information (at any level from AD to end + system) and volume information (packet, octet counts). + + Accounting may be implemented in conjunction with any of the policy + models mentioned above. Similar to the microscopic versus + macroscopic policies, accounting may be classified into different + levels. One may collect accounting data at the AD level, network + level, host level, or even at the individual user level. However, + since accounting may be organized hierarchically, microscopic + accounting may be supported at the network or host level, while + macroscopic accounting may be supported at the network or AD level. + An example might be the amount of traffic passed at the interface + between the NSFNET and a mid-level network or between a mid-level + network and a campus. Furthermore, the NSFNET has facilities + implemented to allow for accounting of traffic trends from individual + network numbers as well as application-specific information. + + Full-blown accounting schemes suffer the same types of concerns + previously discussed, with the added complication of potentially + large amounts of additional data gathered that must be reliably + retrieved. As pointed out in [4], policy issues may impact the way + accounting data is collected (one administration billing for packets + that were then dropped in the network of another administration). + Microscopic accounting may not scale well in a large internet. + + Furthermore, from the standpoint of billing, it is not clear that the + services provided at the network layer map well to the sorts of + services that network consumers are willing to pay for. In the + telephone network (as well as public data networks), users pay for + end-to-end service and expect good quality service in terms of error + rate and delay (and may be unwilling to pay for service that is + viewed as unacceptable). In an internetworking environment, the + heterogeneous administrative environment combined with the lack of + end-to-end control may make this approach infeasible. + + + +Braun [Page 9] + +RFC 1104 Models of Policy Based Routing June 1989 + + + Lightweight approaches to accounting can be used (with less impact) + when specific, limited goals are set. One suggested approach + involves monitoring traffic patterns. If a pattern of abuse (e.g., + unauthorized use) develops, an accounting system could track this and + allow corrective action to be taken, by changing routing policy or + imposing access control (blocking hosts or nets). Note that this is + much less intrusive into the packet forwarding aspects of the + routers, but requires distribution of a policy database that the + accounting system can use to reduce the raw information. Because + this approach is statistical in nature, it may be slow to react. + +9. References + + [1] Rekhter, Y., "EGP and Policy Based Routing in the New NSFNET + Backbone", RFC 1092, IBM Research, February 1989. + + [2] Braun, H-W., "The NSFNET Routing Architecture", RFC 1093, + Merit/NSFNET Project, February 1989. + + [3] Collins, M., and R. Nitzan, "ESNET Routing", DRAFT Version 1.0, + LLNL, May 1989. + + [4] Clark, D., "Policy Routing in Internet Protocols", RFC 1102, + M.I.T. Laboratory for Computer Science, May 1989. + +Author's Address + + Hans-Werner Braun + Merit Computer Network + University of Michigan + 1075 Beal Avenue + Ann Arbor, Michigan 48109 + + Telephone: 313 763-4897 + Fax: 313 747-3745 + EMail: hwb@merit.edu + + + + + + + + + + + + + + + +Braun [Page 10] +
\ No newline at end of file |