Recently, there have been a lot of talks around LISP – location and Identity Separation Protocol. This is a “new” technology aiming to resolve some of the Internet scalability issues and which has been implemented in IOS 15.x. In this blog publication we are going to give a general overview of LISP, pointing out benefits as well as drawbacks of the technology.

Hierarchical Routing and its Problems

Ever since ARPANet has been launched, routing in packet switched networks (PSNs) has been based on hierarchical network addressing to achieve scalability. The groundbreaking work by Kleinrock and Kamoun named “Hierarchical Routing for Large Networks, Performance Evaluation and Optimization” ([KLEIN]) clearly outlined all ideas of hierarchical routing. The main result of this work is that for a network of arbitrary connected N nodes it is possible to devise a hierarchical clustering scheme where nodes inside a single cluster only have to know routes to the nodes in the same cluster and other clusters, provided that addresses are assigned to the nodes following the hierarchical structure. The routing is assumed to be classic shortest-path selection process. Under optimal partitioning scheme, the size of routing table on every router would be of order O(log(N)).


Even though this approach promises compact routing tables if implemented properly, there are three main drawbacks here. Firstly, this approach required strict, topology-based addressing, which was perfect in static environment but didn’t work well with mobile nodes, changing their point of attachment. Secondly, it resulted in suboptimal routes, as every cluster had limited knowledge of the outside topology. The resulting routing paths were longer than shortest paths, or as they say have “stretch” factor above 1 – e.g. a stretch of 2 means that the path is twice as longer as optimal shortest path. In addition to these two main issues, hierarchical routing adds management burden of keeping address space hierarchical, following the network clustering structure.

The modern Internet was built on the same shortest path routing concept using hierarchical addressing for routing scalability (though BGP makes it more complicated that it could have been). This model started showing some signs of instability at the end of 90s. Dramatic growth of Internet routing tables put serious burden on the routing systems as a direct result of explosive routing-tables growth. This growth was a result of two main processes: topology-independent addresses that were obtained for Internet multihoming and routing optimization which has been achieved by injecting “longer” or more specific prefixes into Internet routing tables. These processes attempt to overcome limited mobility and suboptimal routing inherent to hierarchical routing. Even though BGP was designed with scalability in mind, carrying modern Internet routing tables in the core networks becomes a huge burden, not only because of the size of RIB and FIB but also because of the network instabilities exposed by poor summarization. There are some approaches to alleviate the problem, such as Virtual Aggregation ([VA-DFZ]) for in-core FIB size reduction or BGP-aware DNS (see [BGP-DNS]) for efficient multihoming based on PA (Provider Aggregatable) addresses, but they do not offer ultimate solution and have not been widely deployed.

What is LISP

The main problem that causes routing table explosion is inefficient multihoming in topology-aware addressing. With topology-based numbering, node address represents its relative location in the topology. At the same time, mobility or ability to change attachment to the topology (e.g. multihoming) requires the node address to be more of node identifier, which does not change with topology re-attachment. The dual function of IPv4 address (or any topology-based address, e.g. IPv6) prevents it from being effectively used in either role, and this fact has been acknowledged for many years. However, business needs do not allow easy transition from a topology-based addressing to any other, more efficient solution, thought there have been offered a lot of those.

What LISP offers is loosening this location/ID duality by creating two parallel IPv4/IPv6 address spaces: one serving to identify locations (RLOCs or routing locators) and another serving to identify endpoint (EID or endpoint identifiers). To separate the two spaced, tunneling is implemented with outer headers using RLOCs and inner header using EIDs. Effectively, the Internet is partitioned into the “core” based on hierarchical topology-based RLOC addressing and “edge” which uses “mobile” EIDs, with both addresses using the same format. Of course, the use of tunneling implies that EIDs have to be somehow mapped to the closes RLOCs. LISP achieves that by using ITRs (ingress tunnel routers) and ETRs (egress tunnel routers). Both types of routers reside on the “edge” of RLOC Internet and perform encapsulation, decapsulation and mapping functions: ITR receives native packets with EID addressing, finds the corresponding RLOC address of the “optimum” ETR and encapsulates the original packets in RLOC header. The packet is then routed across the network core toward the ETR where it is decapsulated and forwarded based on EID address and potentially using some other routing scheme than used for RLOCs.


In short, LISP creates two parallel namespaces (RLOCs and EIDs) mapped to different topologies (routing and endpoints). The first, underlying topology uses classic IPv4 addressing and the overlay topology may use any other (not necessarily hierarchical) identifiers. So far the EID space is normally based on IPv4 32 bit addresses – this allows for maintaing all applications unchanged. It is important to stress out that in theory EID and RLOC address spaces could be completely different: e.g. EIDs could be MAC addresses while RLOCs could be IPv4 addresses, implementing sort of Ethernet tunneling. The main LISP workhorse is the mapping layer, which represents a “directory lookup” finding the RLOC “closest” to the destination EID. There could be multiple schemes used for mapping, such as ALT, CORD, NERD, DHT etc. This is probably the most important component of LISP architecture, and hence is desires special attention.

LISP Mapping Layer

Internet has been dealing with distributed databases for quite some time, starting with DNS and BGP and evolving to Distributed Hash Tables (DHT) used in peer-to-peer overlay networks, such as Chord. You may be surprised to see BGP here, but you should not – with the growth and evolution of Internet, BGP became more of universal information distribution protocol than a simple routing solution.

In general, every scheme could be characterized as Push, Pull or Hybrid model. The Push model works by broadcasting (in some efficient manner) all mapping information to all interested nodes. A good example could be BGP – information such as VPNv4 prefixes, communities and additional attributes is “flooded” to PE routers in SP network. This model present minimum latency on information retrieval, but requires all interested nodes to store large amounts of state information. Pull models, such as DNS or DHT, distribute information more or less evenly across all participating nodes, and interested node need to issue information search request to locate the mapping. Pull models typically build overlay networks to search for information. Various techniques could be used to improve lookup latency and reliability: e.g. local caching and information duplication in multiple nodes. Pull models are in general more scalable than push, but introduce increased operations delays, sometimes poorly predictable. Finally, Hybrid models attempt to combine the best of Push and Pull by pushing (broadcasting) some condensed information (e.g. discovery hints) to the interested nodes but requiring pull operations to retrieve the actual mappings. Hybrid models are more complex but theoretically offer better performance than pure Pull models.

In addition to the amount of state stored in every participating node, another important scalability factor for the mapping layer is the amount (rate) of changes it may handle. It is obvious that Push models offer rapid propagation of changes (normally in incremental manner) and worse scalability compared to Pull models, due to the fact that changes need to propagate to every interested node. Pull models are not very rapid at propagating changes, as this requires finding the authoritative node and then informing it of the updated information. The use of some performance optimization with the Pull models may further degrade update latency, e.g. it may take some time to expire stale cached information (recall DNS caching). Hybrid models may balance between the two endpoints trading off optimal behavior for extra complexity.

We mentioned multiple mapping models, but mainly going to discuss LISP-ALT (LISP alternative topology), which is being actively tested and supported in the latest IOS releases. The core idea of ATL is to maintain IPv4-based EID address spaces strictly hierarchical and aggregatable and overlay additional MP-BGP mesh (ALT-topology) over existing IPv4 network (RLOC topology). Tunneling techniques such as GRE could be used to implement the overlay topology used to route based on EID, with the tunnel endpoints routed in RLOC space. Since EID space follows clean hierarchy, EID BGP tables should small and manageable. Mapping information is not conveyed in overlay BGP mesh, but rather stored in ETRs (or other special devices). The overlay ALT-topology is used to route LISP mapping requests and replies, based on the MP-BGP next-hop values. Effectively, LISP-ALT is a hybrid push and pull model, where overlay network is used to route LISP requests but the actual LISP mapping information is not propagated in BGP, but rather stored in mapping servers and returned in response to explicit requests. This allows for optimum summarization in EID address space.


In addition to ITR/ETR LIST-ALT also adds the “ALT” routers, which serve the purpose of additional logical endpoints for the ALT space. LISP-ALT topology aims at introducing minimal changes to existing software and, just like LISP technology in general, does not affect network endpoints (hosts) at all. Decoupling RLOC and EID topologies allows for making both of them hierarchical and aggregatable, thus reducing BGP table sizes both in network core and edge. This comes at expense of additional management burden required to keep EID/RLOC topologies strictly hierarchical. On positive note, once allocation has been properly done, any changes in physical attachment will not result in EID address space fragmentation – the overlay topology could be simply changed to accommodate for the new connection, without the need of renumbering EID spaces. Additionally, the EID-to-RLOC mapping layer allows for flexible traffic engineering – different RLOCs could be associated with different EID prefixes, even though ALT only propagates aggregated information in BGP.

The idea of separating address spaces and using overlay tunneling is not novel and has been around for years, implemented in MPLS BGP VPNs. In fact, the EID space looks exactly like a VPN implemented by means of VRF and LISP tunnels. The only significant change to this model is the addition of the mapping requests/replies which allow for the use of new unique traffic-engineering capabilities.

Have all problems been solved?

Not completely. Even though in theory the use of LISP-ALT model allows for transitioning to a highly aggegatable EID address space and reducing routing state in both the Internet core and edge domains it requires significant management efforts. This problem boils down to the fact that the same hierarchical routing model is retained with IPv4 LISP-ALT, resulting in the need to carefully manage EID address block allocation and possibly renumbering the Internet core to allow for better aggregation. Other mapping layer implementations, such as LISP-DHT (distributed hash tables) allow for effectively managing non-hierarchical, even flat address space, but have all typical drawbacks of Pull models. Furthermore, the requirement of keeping EID space strictly hierarchical in LISP-ALT seriously impacts “true mobility” implementation, where single EID could move between its points of attachment. However, the problem of “static” mobility or ISP multihoming/changing is effectively addressed, as the potential points of attachment are known in advance and accounted in the ALT topology.


Theoretically, LISP model solves the routing table growth problem, at the expense of added management complexity. LISP offers non-disruptive transition approach, which does not affect end systems and allows for incremental deployment. Special techniques (proxy ITRs/ETRs not covered in this post) allow for LISP-enabled internet to interoperate with classic Internet during the transition period. But there is a significant problem: for any given organization, unless it is a Tier-1 ISP, there is no direct benefit of transition to LISP. Indeed, the main goal of LISP is to reduce the complexity of ever-growing DFZ tables, which is mainly a problem for core ISPs. For any company that seats at the “edge” of the Internet, the only visible effect of implementing LISP is increased complexity due to the need of renumbering and implementing an overlay topology. At the same time, the Internet edge is where LISP should be mainly deployed. Just like with IPv6, there is no motivation to transition to the new technology, which makes the perspectives of rapid LISP adoption tough.

In addition to the deployment issues, there is a theoretical problem. LISP-ALT architecture implements the same hierarchical routing model for EIDs that has been used in the Internet for years. We already mentioned some of the problems of hierarchical routing earlier in this publication. The main problem is high management burden, required to coordinate and maintain hierarchical address space. Another problem is highly suboptimal routing, which manifests in excessive stretch on the topology exhibiting scale-free (power-law) behavior. Unfortunately, modern Internet seems to be a scale-free graph, which means hierarchical routing is not the best choice (see [COMPACT]). However, dismantling the hierarchical routing model requires clean-slate redesign of modern Internet, which is simply inacceptable. And thus, just like with IPv6, the Internet society is stuck in a difficult situation, where each solution is either not very effective or requires major Internet redesign.

Further Reading

The below is the minimum recommended reading for the topics of location and ID separation. The [LISP-IPJ] contains excellent additional bibliography, which is highly recommended for further reading. Notice that there are proposal similar to LISTP, such as ILNP and IRON, which are not covered in this publication but reference below.

[KLEIN] “Hierarchical Routing for Large Networks, Performance Evaluation and Optimization”, Computer Networks, Vol. 1, No. 3, pp. 155–174, January 1977
[VA-DFZ] “Virtual Aggregation” http://www-europe.cisco.com/web/about/ac123/ac147/archived_issues/ipj_13-1/131_aggregation.html
[BGP-DNS] “BGP DNS” href=http://www.ripe.net/ripe/meetings/ripe-41/presentations/routing-opperman/index.html
[LISP-QA] “LISP Questions and Answers” http://cisco.biz/en/US/prod/collateral/iosswrel/ps6537/ps6554/ps6599/ps10800/qa_c67-582925.html
[LISP-IPJ] “LISP” http://www.ciscosystems.com/web/about/ac123/ac147/archived_issues/ipj_11-1/111_lisp.html
[LIS-CONF] “LISP Configuration Guide” http://www.cisco.com/en/US/docs/ios/lisp/configuration/guide/LISP_configuration_guide.pdf
[COMPACT] “On compact routing for the Internet” http://citeseerx.ist.psu.edu/viewdoc/download?doi=
[ILNP] “ILNP Concept of Operations” http://ilnp.cs.st-andrews.ac.uk/docs/id/draft-rja-ilnp-intro-03.txt
[IRON] “The Internet Routing Overlay Network” http://tools.ietf.org/html/draft-templin-iron-05

About Petr Lapukhov, 4xCCIE/CCDE:

Petr Lapukhov's career in IT begain in 1988 with a focus on computer programming, and progressed into networking with his first exposure to Novell NetWare in 1991. Initially involved with Kazan State University's campus network support and UNIX system administration, he went through the path of becoming a networking consultant, taking part in many network deployment projects. Petr currently has over 12 years of experience working in the Cisco networking field, and is the only person in the world to have obtained four CCIEs in under two years, passing each on his first attempt. Petr is an exceptional case in that he has been working with all of the technologies covered in his four CCIE tracks (R&S, Security, SP, and Voice) on a daily basis for many years. When not actively teaching classes, developing self-paced products, studying for the CCDE Practical & the CCIE Storage Lab Exam, and completing his PhD in Applied Mathematics.

Find all posts by Petr Lapukhov, 4xCCIE/CCDE | Visit Website

You can leave a response, or trackback from your own site.

15 Responses to “A High-Level overview of LISP”

  1. Guruprasad says:

    I’m a graduate student in George Mason University and right now I’m doing a research on Lisp implentation
    This article gives a detail overview of Lisp .
    Really enjoyed reading this article. Thanks.. You guys are really great .!
    I would like to know if Cisco has implemented Lisp-Alt in its latest IOS ver 15, if Yes , if you could provide a sample topology with the Lisp-Alt being implemented to realize the EID-RLOC mapping ,I would be really helpful to you .


  2. @Guru

    You may want to check the link


    for the LISP configuration guide. There is an example on page 18 with sample topology and configurations.

  3. shivlu jain says:

    Again you showed your best…………..lol

    Shivlu Jain

  4. amplebrain says:

    Nice article. Thanks Petr.
    Now I know the full meaning of your name (Proxy Egress Tunnel Router) :)

  5. Daniel White says:


    From Venezuela, thanks for share.

  6. Guruprasad says:

    Thanks !! …You are just too good!!
    Jai ho Peter!! :)

  7. [...] burada ve burada anlatılmış. Cisco’da burada dökümanlanmış. Farklı bir platformda böyle anlatılmış. Son olarak ise Google’ın LISP videoları ise şeklinde part 1, part 2, part 3 [...]

  8. zeus says:

    Hi Petr,

    Can you elaborate on this sentence:

    This growth was a result of two main processes: topology-independent addresses that were obtained for Internet multihoming


    • @zeus

      I was referring to PI (provider independent) address blocks, that could be advertised into Internet via multiple uplink service providers. This result in address space fragmentation and proliferation of “long” prefixes polluting global BGP tables.

  9. [...] A High-Level Overview of LISP [...]

  10. Job Snijders says:

    Dear Petr,

    I’ve written a small reply to your nice write-up on LISP: http://blog.snijders-it.nl/2010/09/re-high-level-overview-of-lisp.html

    - Job

  11. Vinod says:

    Hi Petr,

    This is the best post on LISP so far, very concise and informative.
    Just to summarize my understanding LISP-ALT works best if you have a PI hierarchical scheme right ?

    Many Thanks,
    Vinod M

  12. Anjum says:

    Good arcticle howver, don’t agree with comments that only Tier 1 ISP can take advantage. Enterprise are more interested and beneficaries due to number of used cases of LISP including VM mobility, Disaster Recovery and many others


Leave a Reply


CCIE Bloggers