Local Address Management in IoT environments

Similar documents
The Looming Ethernet MAC Address Crisis

MAC Address Issues in IEEE 802.1

VXLAN: Scaling Data Center Capacity. White Paper

Zonal Address Partitioning in the Local Space

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

What is VLAN Routing?

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Implementing DHCPv6 on an IPv6 network

Cloud Infrastructure Planning. Chapter Six

Can PowerConnect Switches Be Used in IP Multicast Networks?

Scalable Address Resolution for Data Center and Cloud Computing

Introduction to IP v6

The ABCs of Spanning Tree Protocol

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

IP Routing Features. Contents

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED

IP Address Assignment in Large Industrial Networks

Lab IP Addressing Overview

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Detecting rogue systems

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

A Link Layer Discovery Protocol Fuzzer

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Recommended IP Addressing Methods for EtherNet/IP Devices

Network setup and troubleshooting

Monitoring solar PV output

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

LANs and VLANs A Simplified Tutorial

- Hubs vs. Switches vs. Routers -

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Implementation of Virtual Local Area Network using network simulator

RARP: Reverse Address Resolution Protocol

The IP Transmission Process. V1.4: Geoff Bennett

TCP/IP Basis. OSI Model

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

Extending Networking to Fit the Cloud

IEEE 802.1X Overview. Port Based Network Access Control

8.2 The Internet Protocol

Network and Host Addresses , Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

CSE 3461 / 5461: Computer Networking & Internet Technologies

What communication protocols are used to discover Tesira servers on a network?

Network Access Security It's Broke, Now What? June 15, 2010

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Direct IP Calls. Quick IP Call Mode

Packet Sniffing on Layer 2 Switched Local Area Networks

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

The Internet of Things: Opportunities & Challenges

ICS 351: Today's plan

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Cisco Networking Academy CCNP Multilayer Switching

Data Center Convergence. Ahmad Zamer, Brocade

ACHILLES CERTIFICATION. SIS Module SLS 1508

Contents. Connection Guide. What is Dante? Connections Network Set Up System Examples Copyright 2015 ROLAND CORPORATION

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

A Dell Technical White Paper Dell PowerConnect Team

Redundancy and load balancing at L3 in Local. Fulvio Risso Politecnico di Torino

Internet of Things. Laurent Toutain. June 11, Caen () IPv6 opérateur June 11, / 14

Flow Monitor Configuration. Content CHAPTER 1 MIRROR CONFIGURATION CHAPTER 2 RSPAN CONFIGURATION CHAPTER 3 SFLOW CONFIGURATION...

Networking Basics for Automation Engineers

PANDORA FMS NETWORK DEVICES MONITORING

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

Sentrollers and The Internet of Things

TRILL Large Layer 2 Network Solution

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Configuring Cisco Nexus 5000 Switches Course DCNX5K v2.1; 5 Days, Instructor-led

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

IPv6 Security from point of view firewalls

Nokia E90 Communicator Using WLAN

Predictability of Windows DNS resolver. ing. Roberto Larcher robertolarcher@hotmail.com

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Konica Minolta s Optimised Print Services (OPS)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Configuration Guide. DHCP Server. LAN client

VLAN and QinQ Technology White Paper

Precision Time Protocol on Linux ~ Introduction to linuxptp

WISE-4000 Series. WISE IoT Wireless I/O Modules

Data Center Networking Designing Today s Data Center

PANDORA FMS NETWORK DEVICE MONITORING

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Transcription:

Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1

PROBLEM STATEMENT 2

MAC address consumption ramps up When MAC addresses were created (~1980) network ports were used only on computers and large printers in enterprises. Approaching the 2nd decade (2000), MAC address usage was still on a pace to last centuries. A typical user might have 3-5 devices with MAC addresses Now, it isn t unusual to have a dozen or more addresses per person Cell phones, TVs, Blu-ray players, tablets, printers, network devices, laptops, media computer and many of these have multiple addresses for multiple ports. With IoT network ports moving into smaller and smaller things Sensors and actuators e.g. light switches and thermostats Potentially dozens of ports per home, car or machine Some may be disposable or short lived, e.g. medical sensors 3

The problem statement Should all these things consume global MAC address space? With cell phones and tablets, the consumption rate of MAC addresses has increased dramatically The 48-bit MAC address space is supposed to last for at least 100 years An explosion of IoT devices could burn through the address space long before the target 100 years. For example, Ethernet is moving into cars and by 2020 there may be 50 to 150 ports per car. What about using Local Addresses? User configuration isn t reasonable often no local interface and too large a potential for error Existing automatic protocols configure addresses for virtual ports and rely existence of a physical port MAC address We need to enable easy use of the Local Address Space without configuration. 4

Local Address Space The Local Address space is has been: A huge flat space: 2 46 addresses But lacking in organization to enable using it for anything but by a local administrator It has not been widely used The first step in enabling use is providing structure. Leave a portion for local administration Provide a portion with address blocks assignment to organizations An organization can use such a block for an address acquisition protocol without conflicting with protocols using other blocks Provide recommendations for use of the local address space Define a standard generic protocol for address acquisition Some uses such as assignment of addresses to VMs are likely to use their own proprietary protocols Applications such as IoT in home or Smart Grid devices would benefit from a standard for interoperable acquisition of addresses. 5

STRUCTURING LOCAL ADDRESS USE 6

Providing Structure IEEE RAC has defined Company IDs (CID) 24-bit values similar to Organizationally Unique Identifiers (OUI) except that the global/local bit is set to local One use of these is intended to be for local address blocks. Assigned out of one quadrant of the local address space IEEE 802.1 has proposed a PAR for IEEE 802c An amendment to IEEE 802 Overview and Architecture to add guidance on using the local address space. Recommend using only one quadrant of the space for local administration Use the CID quadrant for default address blocks for protocol Forwarding the PAR will be considered at the November meeting 7

LOCAL ADDRESS ACQUISITION PROTOCOL 8

Status of work on a protocol IEEE 802.1 is currently considering a project to define an address acquisition protocol Probably will decide whether to forward a PAR sometime next year. The following slides are some thoughts on a protocol 9

Transmitting before MAC address Acquisition There is currently no way to transmit without a MAC address This is okay for obtaining an address for a virtual port because there is a physical port address that can be used. That doesn t work for an IoT device with no physical address Define a Null address value to use as a source address for the address acquisition protocol This address is never allowed as a destination address New bridges can ignore it for learning when seen as a source address. For existing bridges, it will move around in learning, but since it never is a destination address, it won t matter where they think it is. Could use well-known group addresses for the destination address Possibly one for address servers and one for client nodes Possibly existing LAN scoped addresses e.g. nearest non-tpmr 10

Identifying the right response With a multicast destination address, how does a client know which reply PDUs are for it? Client PDUs include a Client ID with identifier type and value; examples of identifier types: EUI-64 ICC ID (from SIM card) A random number for those devices that have no configured unique ID Response PDU includes the Client ID from the client s PDU Client processes PDUs received with its Client ID and discards ones with other Client IDs 11

Who s the address server? Claiming protocol without a server Client generates a proposed address and initiates a claim, waits for response and uses address if no conflict detected Proposed address might have a set value for the first 24 bits and a randomly generated value for the other 24. Most suited to small* networks which can operate without a server Requires that all nodes receive each other s traffic (or something in the network can proxy for nodes that don t receive the claim). Similar protocols exist for IPv6 (RFC 4862) and FCoE (FC-BB-6 VN2VN) Address Server Address requests go to a server which responds with an address Default address range can be defined for operation without configuration Multiple servers can operate by each having an address range. * Small could be ~ 1000 ports 12

Claiming, servers, bridges Claiming and server protocols could coexist Claiming protocol and server protocol can operate on different address ranges Server could listen for Claims and reply with an address assignment Allows the network to have a server or not as dictated by its size and nature and clients to adapt to either without configuration. Bridge Relay to reduce multicast Node transmits with Null Source Address Bridge encapsulates in a relay PDU with the bridge s address for source address Encapsulation may include a port identifier. Responses go to bridge which relays to send to the well-know client multicast address Bridge can use the port identifier to choose the output port for the relayed message. Reduces multicast traffic for responses but requires changes to bridges 13

Address stability Client may store the last used address On re-initializing, client may request the same address For server-less, it sends that address in the first claim If the claim fails, the client picks random address component as usual For server, the address request can have a field to carry a proposed address The server assigns the proposed address if it is available and assigns another address if it isn t. 14

Duplicate address protection Protocols should protect against duplicate addresses Servers should detect each other Might partition the address space to avoid duplication On network merge there could be address duplication Protocol should provide for periodic checks that addresses are still unique 15

Quicker start up for specialized stable networks Some applications such as automotive networks have strict requirements on latency to start the network. E.g. automotive network should work within on the order of 100 ms after power is applied Changes to these networks would be rare Potentially the learned address could be stored in non-volatile memory If necessary, a message could be broadcast indicating that the existing addresses can still be used or a message can be sent to invalidate the existing address and restart address acquisition 16

Conclusion IoT devices should be able to operate without a global MAC address and without configuration A protocol for this could protect the 48-bit MAC address space from exhaustion May also simplify the production of small inexpensive devices Removes need to configure with a global address at production time. It is desirable to standardize two mechanisms Address server-based Server-less claiming, and Provide for coexistence of the two. Use of the Local Address space without configuration should be enabled by: Structuring use of the address space Providing an address acquisition protocol 17