O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The LISP Network: Evolution to the Next-Generation of Data Networks

Book Description

In an era of ubiquitous clouds, virtualization, mobility, and the Internet of Things, information and resources must be accessible anytime, from anywhere. Connectivity to devices and workloads must be seamless even when people move: location must be fully independent of device identity.

The LISP protocol makes all this possible. LISP is address-family agnostic, so it can encapsulate any protocol within another, and route across virtually any network. LISP applications include very-large-scale virtualization for WANs and multi-tenant data centers; host mobility and location services across data centers; advanced mobile networks; ad-hoc networks; IPv6 enablement, seamless site multi-homing; workload mobility; cellular mobility; multicast and traffic engineering, and more.


The LISP Network is the first comprehensive, in-depth guide to LISP concepts, architecture, techniques, and applications. Co-authored by LISP co-creator Dino Farinacci and two pioneering developers of Cisco's LISP implementation, this guide will help you plan and implement LISP in any data center, WAN edge, or service provider core network. Largely implementation-agnostic, this book offers actionable answers to questions such as:

  • What problems does LISP address, and how does it address them?
  • How does LISP work?
  • What are LISP's applications, and how do you architect LISP solutions for each application?
  • How does LISP fit with SDN, IoT, and IPv6?
  • What is LISP's future?

The LISP Network concludes with detailed deployment case studies of several LISP applications, each drawn from the authors' pioneering experience.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. About the Authors
    1. About the Technical Reviewers
  5. Dedications
  6. Acknowledgments
  7. Contents at a Glance
  8. Reader Services
  9. Contents
  10. Icons Used in This Book
  11. Introduction
    1. Goals and Methods
    2. Who Should Read This Book?
    3. How This Book Is Organized
  12. Chapter 1. LISP and the Future of Networking
    1. A Brief History of LISP: Motivation, Base Premises, Evolution
    2. LISP in the Standards and Open Community
    3. Use Cases for LISP: Supporting Future Trends
  13. Chapter 2. LISP Architecture
    1. Seminal Idea: Location-Identity Separation
    2. Map and Encapsulate
    3. Demand-Based Routing and Caching
    4. LISP Roles
    5. An Asset-Controlled Mapping Database
    6. Networking Beyond Traditional Address Types
    7. The LISP Data Plane
    8. NAT Traversal
    9. Summary
  14. Chapter 3. Data Center Trends
    1. A Brief History of Application Virtualization
    2. Multitiered Applications, Virtualization, and the Network
    3. Evolving Switching Fabrics
    4. Optimizing Connectivity to the Data Center with LISP
    5. Mobility: Subnets Really Don’t Work
    6. Segmentation: 32 Bits Needed
    7. Policy: The Network as an Enforcer
    8. The Hybrid Cloud and Carrier Neutrality
    9. Summary
  15. Chapter 4. The Wide-Area Network: Bringing Traffic from Access to the Data Center
    1. Modern WAN Services
    2. Hybrid WAN: Efficient xTR Multihoming
    3. Scale Considerations
    4. Logical Topologies: Peer-to-Peer Connectivity and Service Insertion
    5. Security: Connection Integrity and Confidentiality
    6. Segmentation
    7. The Access Network: Multisite Considerations
    8. Manageability
    9. Summary
  16. Chapter 5. Mega-Scale Access Networks: LISP, User Access, and the Internet of Things
    1. Access Networks Using LISP
    2. Mobility and Wireless Integration
    3. The Internet of Things
    4. Summary
  17. Chapter 6. Security
    1. Attack Surfaces, Lateral Moves, and Bot-nets
    2. Policy, Segmentation, and the Virtual Perimeter
    3. Cryptography in LISP
    4. How the LISP Control Plane Is Secured
    5. Anonymity in LISP
    6. Summary
  18. Chapter 7. LISP and the Next-Generation Mobile Network
    1. LISP EID Mobility and LISP Mobile Node
    2. Mobility Convergence Optimization
    3. Use Cases
    4. Summary