skip to main content
10.1145/1544012.1544073acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

LISP-DHT: towards a DHT to map identifiers onto locators

Published:09 December 2008Publication History

ABSTRACT

Recent activities in the IRTF (Internet Research Task Force), and in particular in the Routing Research Group (RRG), focus on defining a new Internet architecture, in order to solve scalability issues related to interdomain routing. The research community has agreed that the separation of the end-systems' addressing space (the identifiers) and the routing locators' space will alleviate the routing burden of the Default Free Zone. Nevertheless, such approach, adding a new level of indirection, implies the need of storing and distributing mappings between identifiers and routing locators. In this paper we present LISP-DHT, a mapping distribution system based on Distributed Hash Tables (DHTs). LISP-DHT is designed to take full advantage of the DHT architecture in order to build an efficient and secured mapping lookup system while preserving the locality of the mapping. The paper describes the overall architecture of LISP-DHT, explaining its main points and how it works.

References

  1. A. Brampton, A. MacQuire, I. A. Rai, N. J. P. Race, and L. Mathy. Stealth distributed hash table: unleashing the real potential of peer-to-peer. Proceedings of the 2005 ACM conference on Emerging network experiment and technology (CoNEXT), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Brim, D. Farinacci, V. Fuller, D. Lewis, and D. Meyer. LISP-CONS: A Content distribution Overlay Network Service for LISP. draft-meyer-lisp-cons-04.txt, IETF Network Working Group, April 2008.Google ScholarGoogle Scholar
  3. S. Brim, D. Farinacci, D. Meyer, and J. Curran. EID Mappings Multicast Across Cooperating Systems for LISP. draft-curran-lisp-emacs-00.txt, IETF Network Working Group, November 2007.Google ScholarGoogle Scholar
  4. D. Farinacci, V. Fuller, and D. Meyer. LISP Alternative Topology (LISP-ALT). draft-fuller-lisp-alt-03.txt, IETF Network Working Group, October 2008.Google ScholarGoogle Scholar
  5. D. Farinacci, V. Fuller, D. Oran, and D. Meyer. Locator/ID Separation Protocol (LISP). draft-farinacci-lisp-09.txt, IETF Network Working Group, October 2008.Google ScholarGoogle Scholar
  6. M. Handley, I. Kouvelas, T. Speakman, and L. Vicisano. Bidirectional Protocol Independent Multicast (BIDIR-PIM). RFC 5015, October 2007.Google ScholarGoogle Scholar
  7. G. Huston, G. Michaelson, and R. Loomans. A Profile for X. 509 PKIX Resource Certificates. draft-ietf-sidr-res-certs-14.txt, IETF Network Working Group, October 2008.Google ScholarGoogle Scholar
  8. E. Lear. NERD: A Not-so-novel EID to RLOC Database. draft-lear-lisp-nerd-04.txt, IETF Network Working Group, April 2008.Google ScholarGoogle Scholar
  9. T. Li. Design Goals for Scalable Internet Routing. draft-irtf-rrg-design-goals-01.txt, IETF Network Working Group, July 2007.Google ScholarGoogle Scholar
  10. X. Meng, Z. Xu, B. Zhang, G. Huston, S. Lu, and L. Zhang. IPv4 Address Allocation and the BGP Routing Table Evolution. Computer Communication Reviews, 35(1): 71--80, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Meyer, L. Zhang, and K. Fall. Report from the IAB Workshop on Routing and Addressing. RFC 4984, IETF Network Working Group, September 2007.Google ScholarGoogle Scholar
  12. B. Quoitin, L. Iannone, C. de Launois, and O. Bonaventure. Evaluating the Benefits of the Locator/Identifier Separation. Proc. 2nd ACM SIGCOMM Workshop on Mobility in the Evolving Internet Architecture (MobiArch), August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I. Stoica, R. Robert, D. Liben-Nowell, D. David, M. Frans, F. Frank, and H. Hari. Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking, 11(1): 17--32, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. LISP-DHT: towards a DHT to map identifiers onto locators

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
                  December 2008
                  526 pages
                  ISBN:9781605582108
                  DOI:10.1145/1544012

                  Copyright © 2008 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 9 December 2008

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate198of789submissions,25%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader