Intelligence at the Edge:
the Evolution of IP Communications
Fred Baker
Cisco Fellow
Former IETF Chair
Chair, IPv6 Operations
IETF liaison to SGIP/SGAC
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
1
Agenda
 Why IPv6?
Main drivers & benefits to evolve/migrate from IPv4 to IPv6
 Industry status
IPv6 penetration and deployment today
 Challenges/issues
IPv6 deployment
IPv4 to IPv6 migration
 Industry best practices & lessons learned
 Future evolution of applications using the architecture
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
2
Near vs Long term perspective
 Perspective:
In the long term, all networks want the relative simplicity and limited
cost of a single networking protocol
In the short term, the world isn’t going to switch simultaneously
 Two definitions:
“Migration”: Turning the new on and turning the old off
“Deployment”: Turning the new on
 I tend to think that:
In the near term, the question is how to deploy and use IPv6 in
new network offerings and interoperate with existing IPv4
capabilities
In the long term, once a critical percentage of users have IPv6
enabled, continuing to run IPv4 becomes a business decision.
When we turn IPv4 off, we have migrated.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
3
Why IPv6?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
4
Why did the IETF design IPv6?
 Running out of IPv4 addresses
Except it was 1992 and statistically we expected to run out in 19931994
 Response to the issue:
RFC 1550: IP: Next Generation (IPng) White Paper Solicitation
Four responses, resulting in IPv6 – RFCs 1883, 1884, 1885,
1886
Also, description of GSE and the NIMROD Routing Architecture
CIDR deployed by RIRs and incorporated into routing protocols –
RFCs 1517, 1518, 1519, 1520, early 1990’s
Also OSPFv2, IS-IS, BGP, and RIPv2
RFC 1918 private addresses, and implementation of Network
Address Translation
 IPng ultimately resolved to IPv6.
We didn’t know it would take 15 years to deploy
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
5
The issue of address depletion
 The ISP problem:
The Internet that is deployed will continue to run
But it will be harder for ISPs and edge networks to deploy new
services and add new customers
 The user problem:
ISPs will be forced to provide current services using shared IPv4
address space and offer IPv6 for user-managed services
At some point, services that consumers want to get to will require
them to use IPv6 as a result
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
6
Where Is the Broadband Internet Today?
The Europe/America/East Asia/ANZ Fiber Corridor
Today
Presentation_ID
Map copyright 2008 TeleGeography
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
7
Power, and by Extension, Money,
Throughout the World
NASA “Earth at Night,” August 2006
Today
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
8
IPv4 Address space throughout the
world today
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
9
IPv6 penetration and deployment
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
10
Who is implementing/adopting
IPv6?
 Originally, the research networks and communities
Internet II, Renater, CERNET2, TWAREN, AARNET, …
Commercial Networks in Japan: NTT, IIJ, KDDI, …
 Large companies, major ISPs, and content providers
Facebook, Google, …
Comcast, Free.fr, Verizon, AT&T, …
 Governments
 Starting to hear of
ISPs losing customers over lack of IPv6 offerings in RFI/RFP
responses, which suggests that auditors are driving enterprise
customers to require IPv6 service even if they don’t buy it today.
IPv6-only networks operated by various providers
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
11
Prepare
Optimize
Plan
IPv6 enabled web sites
Operate
(growing list at sixy.ch)
Design
Implement
http://[2402:6000:200:100::4]
Yosemite
http://[2001:4830:20e0:1::5]
http://[2001:470:d:2ed::1]
ipv6.google.com
http://[2001:b48:12:1::2]
http://[2001:da8:200:200::4:28]
Sandviken Kommun
http://[2001:b48:10::3]
http://[2405:5000:1:2::99]
http://[2001:49f0:1000::3]
http://[2001:44b8:8020:f501:250:56ff:feb3:6633]
http://[2001:218:2001:3005::8a]
http://[2001:252:0:1::2008:6]
http://[2607:f0d0:1000:11:1::2]
http://[2001:470:0:64::2]
Helsingborg Dagblad
http://[2001:2040:2000::6]
http://[2406:0:6a:4::167]
http://[2a02:250::6]
http://[2a01:e0c:1:1599::1]
http://[2001:470:1:1d::d8da:84ea]
http://[2001:558:1004:9:69:252:76:96]
http://[2a01:a8:0:5::26]
http://[2001:470:0:e6::4a52:2717]
http://[2607:f4e8:12:fffe:230:48ff:fe96:f99e]
http://[2001:470:1:3a::13]
http://[2620:0:ef0:13::20]
http://[2607:f0d0:3001:62:1::53]
http://[2001:440:fff9:100:202:b3ff:fea4:a44e]
http://[2620:0:1cfe:face:b00c::3]
http://[2607:f238:2::51]
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
http://[2001:4f8:fff6::21]
http://[2001:9b0:1:104:230:48ff:fe56:31ae]
http://[2a01:48:1:0:2e0:81ff:fe05:4658]
http://[2001:838:1:1:210:dcff:fe20:7c7c]
12
Mobile Telephones and Networks
Data derived from public statements
 Telephones:
iPhone IOS 4.0, Android
IPv6 is on, can run IPv6-only, can’t turn IPv6 off from UI
Samsung, Nokia support IPv6
Windows Mobile has supported IPv6 on the WiFi interface since
2005
Motorola doesn’t yet
 Networks
China Mobile has convened two 3GPP workshops on IPv6-only
networks
3GPP later versions target IPv6-only networks
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
13
Does it work?
Cisco Networkers EMEA
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
14
The experiment
 A ultra-thin team (2 people) deployed IPv6 at a large
networking vendor conference in Barcelona early 2008
 3000+ attendees, little IPv6 knowledge
 IPv6 was not made public
 What can be measured?
 What was measured?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
15
IPv6 Internet
IPv4 Internet
CPU was easy 
www
Monitoring Station
Fedora
ISR
1841 Router
Catalyst
Bridging
WLAN
Bridging
IPv6 Prefix: 2a01:3e0::/64
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
16
Which OS? (based on User-Agent )
A dual-stack web server tracked the User-Agent: IPv6
access
19% Windows XP
16% Windows CE
16% Linux
15% Mac OS/X
12% Vista
6% Symbian
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
17
“The current exponential growth of
the network seems to show that
connectivity is its own reward, and
is more valuable than any
individual application such as mail
or the world-wide web.”
RFC 1958: Architectural Principles of the Internet
http://www.ietf.org/rfc/rfc1958.txt
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
18
18
What trouble can
I get into?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
19
Prepare
Optimize
Plan
Operate
Design
Business Challenges
Implement
 Avoid natural tendency to ignore IPv4 complexity as ‘cost of
doing business’ while highlighting explicit costs to add IPv6.
 IPv6 can lead to less complex, easier to manage,
implementation and operations
Enables greater ROI over time from emerging and new business apps
 Natural evolution to improve operations, productivity, and
service
Could just replace 1:1, but ask:
‘Where does the network need to be in 3-5 years?’
‘Which applications and services will be expected?’
(mobility, virtual presence, …)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
20
Business Risks
 Staff training – reducing perceived service level
 Network management tools – scripts and commercial products
ignoring the IPv6 deployment
 Awareness – Microsoft will tunnel unless there is native service
 Applications – not providing IPv6 support before IPv4 is missing
from part of the network or a partner
 Multi-homing – Global address allocation policy for enterprise
deployments
 Traffic patterns – old wan traffic models dominated by client/server
apps, new by peer-to-peer collaboration tools
 Timing – deployment being forced in short order by a partner
interaction rather than planned and orderly over time
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
21
Prepare
Optimize
Plan
Operate
Design
Business - Costs
Implement
 The largest cost for most network managers will be
training.
Related but different protocol.
 Another major cost will be retooling custom apps and
scripts.
Frequent coding shortcuts assume an address will always be 32 bits.
 Is IPv6 deployment an opportunity to integrate other
engineering changes that have not been large enough
to justify by themselves?
What costs will be attributed to IPv6 vs. general evolution?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
22
Prepare
Optimize
Plan
Operate
Design
Adoption Spectrum
Implement
• Mostly or completely
past the “why?” phase
• Assessment (e2e)
• Weeding out vendors
(features and $)
• Focus on training and
filling gaps
Kicking the tires
Production/Looking
for parity and
beyond
Pilot/Early
Deployment
• Still fighting vendors
• Content and wide-scale
app deployment
• Review operational cost
of 2 stacks
• Competitive/Strategic
advantages of new
environment
• Is it real?
• Do I need to deploy
everywhere?
• Equipment status?
• SP support?
• Addressing
• What does it cost?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
23
Prepare
Optimize
Plan
Operate
Design
IPv6 Deployment strategy
Implement
Train the architects
Protocol differences create an operational experience vacuum
Develop addressing plan
use any initial /32 for infrastructure or labs ; get a real block for customers
customer prefix delegation on nibble boundary to align with ptr authority
Enable core & PE routers
dual-stack, with tunneling where necessary to align with life-cycle
Enable support services
dual-stack the servers, populate DNS AAAA, configure AAA, deploy management and
monitoring tools
Establish peering
encourage content sites to deploy to minimize the need for IPv4/IPv6 nat
Enable customers
tunnel over legacy distribution media where necessary
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
24
Prepare
Optimize
Plan
Operate
Design
Coexistence Strategy
Implement
Don’t forget the Applications
While infrastructure
is everyone’s initial
focus, nothing
happens until the
applications use the
new API.
IPv4-only apps will
remain IPv4-only,
and these legacy
apps will fail when
presented with an
IPv6-only
infrastructure.
Presentation_ID
Services & Applications running over IPv6
IPv4/IPv6 Coexistence Infrastructure
IPv6
Internet
Preserve IPv4
Today
IPv4
Run-Out
2010
2011-12
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
Future
25
Industry best practices for
IPv6 deployment
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
26
IETF looking at deployment
 IPv4/IPv6 coexistence
IPv4/IPv6 Dual Stack Deployment
IPv4/IPv6 Translation
IPv4/IPv6 and IPv6/IPv4 Tunneling
 Moving along
Securing the network
General operational issues
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
27
Recommended Approach to Deployment:
RFC 4213 Dual-Stack Deployment
IPv4+IPv6 Hosts
 Solution:
Hosts today are IPv4+IPv6:
Windows Vista, Macintosh, Linux, BSD
Make the network IPv4+IPv6.
When forced to deploy IPv6-only
networks, they will be able to talk with
other hosts.
IPv4+IPv6
Network
 But…
We have run out of time for this to be
smooth
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
IPv6-only
Hosts or Network
28
Translation: three components
 DNS64:
Translate DNS records
 Translator
IPv4 Internet
Stateless mode
Modified SIIT algorithm
Uses Service Provider Prefix, IPv4 prefix
embedded in IPv6 prefix
Scalable translation IPv4<->IPv6
DNS
ALG
Stateful mode (NAT64) similar to IPv4/IPv4
NAT
Permits session initiation IPv6-native -> IPv4
hosts
No session initiation IPv4 -> IPv6-native
IPv6 Network
 Effect:
Encourage movement of IPv4 servers to
IPv6-only network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
29
Dynamic IPv6/IPv4 tunneling
IPv6 packet
6rd
6rd
6rd
Access
Node
IPv6 packets
IPv4
L3 Edge
(IPv4)
IPv6 packetCE
6rd
Border
Relays
IPv6 + IPv4 Network
SP IPv4 Network
IPv6
IPv6
 IPv6 service in the home is essentially identical to native IPv6 service
 IPv6 Packets Follow IPv4 routing
 6rd Border Relay traversed only when exiting or entering a 6rd Domain
 6rd Border Relays are fully stateless, no limit on “number of subscribers” supported
 Border Relays may be placed in multiple locations, addressed via anycast.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
30
“…it is possible to employ IPv6-only
networking, though there are a number of
issues such as lack of IPv6 support in
some applications and bugs in untested
parts of code.
As a result, dual-stack [RFC4213]
remains as our recommended model for
general purpose networking at this time,
but IPv6-only networking can be
employed by early adopters or highly
controlled networks.”
Jari Arkko
http://tools.ietf.org/html/draft-arkkoipv6-only-experience
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
31
The biggest problems with
coexistence mechanisms
 They give the illusion of full service but deliver a small
subset
Example – the web works well through IPv4/IPv4 translation, but
BitTorrent shows us that far more interesting services are
possible
 Issues of management and fault diagnosis
Everything gets harder for the operator
 Operational and capital costs increase
Since everything is a little harder, it takes smart people to run the
network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
32
For further reading…
 http://tools.ietf.org/html/draft-arkko-ipv6-transitionguidelines
“Guidelines for Using IPv6 Transition Mechanisms during IPv6
Deployment”, Jari Arkko, Fred Baker, 9-Nov-10
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
33
The “Internet of Things”:
New Applications for Internet Technology
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
34
Internet of Things:
What kinds of machines?
 Primarily about autonomous actors
Not your PC, that does things because you tell it to
Not your phone in the sense of placing calls
Often systems that provide support in interesting ways
 Types of services
Building automation – environmental control and telemetry
Industrial automation
Safety and surveillance issues
Health monitoring
And so on…
 Is TCP/IP the right technology for SCADA(Supervisory
Control And Data Acquisition) networks?
This varies with the application
For many purposes, IP future-proofs the network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
35
Forestry
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
36
Mapping forests and forest events
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
37
Deborah Estrin’s sensor networks
 Networks deployed in
random distribution
 Low power
 Delivering sensor data
to a central site for some
purpose
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
38
Forest Management
 Several universities have tested
distributed sensor networks
Monitor weather/climate in a
managed forest
Observe fires in action
 Premise: map isotherms and
isobars
Periodic and event-driven neighborto-neighbor information exchange
Sensors that report sudden changes
and then stop reporting give crisis
information
 Application is a distributed
sensor
Individual sensors relatively
unimportant; GPS location of
reporting sensor more important.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
Courtesy LA Times July39 200
Health Care
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
40
Health Monitoring
 Issue:
Unobtrusive monitoring and early detection of patient health
improves health care
It also reduces the cost of health care dramatically
 Numerous projects, including some in China, are
interested in exploring the use of networked sensors
Infrared detectors for motion and estimation of body temperature
Location of people in the house
And so on…
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
41
What does a sensor look like?
 Thermal Imaging:
Data sheets on some
models claim accuracy to
0.5˚C
 Location:
Motion sensors say
“someone is here”
Surveillance Cameras may
be able to identify people
 Pulse, Pedometer, etc
Available in drug stores
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
42
Requirements for sensors and reporting
 They need to be
Inexpensive
Easy to install/maintain
Networked (mobile or stationary) for
connectivity
Appropriate & acceptable to the client
 They need to be able to
Identify the person they are monitoring
Accurately record and report changes
of important data
Medical measurements
Daily routine
Maintain information privacy
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
43
How would we network them?
 Type of network
3GPP might be a good transmission system for mobile sensors
Fixed sensors could fit into residential broadband
 Application considerations:
Need to log normal events for possible future analysis
Give periodic reports: “Here are my logs, but I don’t see
anything”
Be able to issue alerts: “person pressed the ‘I need help’ button”
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
44
The Smart Grid
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
45
Smart Grid
 The Electrical Grid is a
large network that
supports the reliable
delivery of electrical power
Ongoing measurements for
maintenance and billing
purposes
Communication between
cooperating processes such
as generators and phase
measurement units
Operational command/control
– turning circuits on and off,
demand response, many
other purposes
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
46
Functional Requirements for
communication
 “…the Network should enable an application in a
particular domain to communicate with an application in
any other domain in the information network, with
proper management control over who and where
applications can be interconnected.”
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
NIST Roadmap, Version 1.0, September 2009
47
Conceptual Reference Model
Source: NIST Smart Grid Framework
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
48
Demand Response – Example Only!
IEC 61970
IEC 61968
MultiSpeak
ebXML
OpenADR
SOAP
REST
HTTP
1b. Register
Customer
2b. Announce
Price Event
4a.
Billing
Cycle
3b. Record
Participation
2a. Market Price
Change
1a. Enroll
Customer
4b. Send Bill
2c. Distribute
Price Event
Interface
Message
1a. Sequence Number
Example Standards
Stages:
1. Enrollment
2. Event
3. Monitoring
4. Billing
ZigBee SE
WiFi
BACnet
HomePlug
Ethernet
3a. Report
Usage
ANSI C12
SONET
WDM
Frame Relay
WiMAX
ANSI C12
BPL
Cellular
WiMAX
Proprietary
2d.
Local
Price
Event
2e.
Reduce
Usage
Source: EnerNex
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
49
Example of an attack: Stuxnet
 Said to be military-grade weapon that
attacks specific control systems
Depends on disabling automated
processes in process control
systems
 Not initially carried by the Internet
It is, however, networked once in
Therefore prototypical weapon of
motivated attacker
 Worst way to defeat it:
Security by obscurity
 Best way to defeat it:
Not get the virus
Not execute the code
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
50
DOE / NIST / UCAIug / ASAP-SG Effort
US DOE
FFRDC’s
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
51
Data storage requirements
 In utility company
Kinds of data
Customer billing data
Aggregate planning data
Requirements often met by chain of custody procedures
 In the home
Meter keeps records every few minutes for several hours
Very interesting to:
Occupant, who wants to optimize their bill
Utility, who wants to manage electricity and send bills
Third party services
Third parties that want to play games, rob the house, etc
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
52
Data security requirements
 Billing records have value to many parties, not all of
which are helpful
Utility billing and planning
Customer self-optimization
Neighborhood gossip
Criminal attacks
 Data may need to be
Verifiable after the fact – perhaps years later
Accessible by authorized parties
Shielded from unauthorized parties
Some data needs to be Public in flight
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
53
What kinds of security mechanisms
are available?
Presentation_ID
Communication
Layer
Type of control
Example
Data Content
End to end integrity in
message-based exchange
W3C XML
Signature
Application Layer
Application to application
authentication, authorization,
encryption
TLS, HTTPS,
DKIM,
S/MIME, SSH
Network Layer
System-to-system
authentication, authorization,
encryption
IPsec ESP
Physical/Link
Layer
Limited Membership
SSID, IEEE 802.1X
with EAP-TLS
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
54
General view
 There are numerous other approaches to
communication in use in the grid and in building
automation
IEC 14908 Building Automation
ANSI C12.19, C12.22, and related management
IEC 61850 “Goose” protocol between generators
 Internet Protocol Suite, especially IPv6, considered
appropriate for most uses in the Smart Grid
Specified in numerous IEC specifications
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
55
Intelligence at the Edge:
the Evolution of IP Communications
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
56