LISP

LISP (Location Identifier Separation Protocol) is a protocol designed by a small group of Cisco engineers who are responsible for many of the protocols that power today’s Internet. It provides important advancements to the Network Layer, and many necessary features for ease of use, decentralization, security, scalability, and for secure access schemes for hybrid networks. Some of the below features are fully integrated, and others are being deployed through the TAO Framework.

Ease of Use

Imagine if your phone number changed every time you changed location, this is how IP (Internet Protocol) addresses work in their current form. Alternatively, LISP provides a unique End Point Identifier (EID), that allows one to have a consistent address, even when roaming between networks. 

This means that genuine peer-to-peer connectivity is possible, because you are always accessible at one address, and remain so even when you are mobile. LISP enables you to remotely access your staking node from anywhere, while your node is busy working at home. This greatly increases the usability of your Nexus Wallet.

EIDs

EIDs replace your IP address which in a standard network contains the identifier and the location. With LISP, the EID becomes the identifier, while the RLOC (Routing Locator) becomes the location. This decoupling enables a device to freely roam between networks, as only the RLOC changes, not the EID.

 

Decentralization 

Peer Discovery is a concept that is required for an effective and truly decentralized network. Nodes must be available to their peers by being able to accept incoming connection requests. Though this is not a novel concept, it is seldom achieved as the node or a device is usually behind a NAT (Network Address Translator), which generally leads to only 10% of peers being accessible or discovered. LISP handles NAT traversal differently to software such as UPnP, resulting in higher levels of node availability. Therefore, the Nexus network will rely less on ‘seed nodes’ to relay messages, creating a distributed network topology.

Scalability

LISP supports Multicast and IPv6 Crypto-EIDs which provide additional scaling and security to the network, making it a very attractive feature for blockchain applications and the emerging IoT industry.

Multicast

Even though Multicast is a well established protocol, not all routers provide it natively. This is due to the agreement between many ISPs to route each others’ traffic, where there are no incentives to forward multicast traffic. The LISP Overlay solves this with a technique called ‘head end forwarding’, which is consistent and operable across the entire global network regardless of the nuances of the underlay. 

Multicast is important for blockchain scaling, because it routes packets in constant time O(1). This can be likened to a speaker making one speech to an entire group of people, whereas Unicast, the speaker tells one person, who tells the next person, and so on.

IPv6 Addressing

Most Internet devices use IPv4 addressing (the Internet equivalent of phone numbers), which is limited to around 4 billion devices. To accommodate the growth of Internet-connected devices, IPv6 was developed, though even decades later it still has not been widely adopted. LISP is able to use IPv6 as an overlay, since it does not suffer from the compatibility issues of underlay devices. The capacity of IPv6 is 2^128 devices, providing ample capacity for the growth of IoT devices.

Sharding

Another crucial use case for LISP is its role in the sharding of data within the 3D Chain, where it will be used to translate database indexes into usable and routable IPs. This will result in the network becoming one entirely accessible global database.

This means that components of the blockchain, such as transactions and blocks, will receive their own unique EID enabling any node to retrieve data without having to make complex ‘lookups’, or manage many states. This will be similar to typing ‘0xf8ea48fac8’ into your web browser, and in response receiving the data associated with this key. 

In practical applications, nodes will only have to store a small portion of the ledger, and won’t have to undertake long and arduous synchronization processes. This is imperative to scaling, as normal computers are unable to run a full node as the blockchain grows. This was the main factor of the Bitcoin block size debate, which resulted in very small block sizes, and an increasingly unscalable network.

 

Security

The Internet was designed as an open system with few security parameters, which has resulted in many people experiencing hacks, IP spoofing, MITM (Man-In-The-Middle) and DoS attacks. Though openness is one of the cornerstones of the Internet today, security can be improved through the use of the LISP Overlay.

Crypto-EIDs

An EID is a form of identity on the network layer. This is critical to security, as an EID is linked to a Signature Chain, that can be cryptographically associated with reputation on the ledger. This creates an elevated layer of trust to the Internet, as one can verify with certainty that their peer is who they claim to be.

Crypto-EIDs don’t rely on any trusted third party for verification, as they can be proven in a decentralized manner on the ledger. Therefore, having to verify a new IP or a new device will no longer be necessary, as the identity of the device can be easily verified by both the network and ledger layers.

Encryption

LISP supports ‘data plane’ encryption for any device (including IoT devices) to communicate over the underlay, meaning that one benefits from encryption at the level of LISP and at the Nexus application layer.

Privacy

Similar to choosing when to answer your cell-phone, or to respond to a message, LISP provides options of how to interact with other users. This resonates with the Internet’s model of ‘openness’, while simultaneously protecting rights of privacy.

SafeNet

When using the SafeNet, challenges of the old Internet will be a thing of the past, creating a more transparent and authentic Internet where sources are able to build reputation, peers are verifiable, and information is freely exchanged. It will take time to come to fruition, though we believe these innovations and many more will change the way we interact with the Internet.