Enabling Ethernet devices without Global MAC Addresses. Pat Thaler, Senior Technical Director, Broadcom 20 June 2014

Similar documents
Local Address Management in IoT environments

VXLAN: Scaling Data Center Capacity. White Paper

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Introduction to IP v6

The ABCs of Spanning Tree Protocol

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Implementing DHCPv6 on an IPv6 network

- Hubs vs. Switches vs. Routers -

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

The Looming Ethernet MAC Address Crisis

Can PowerConnect Switches Be Used in IP Multicast Networks?

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

IP Routing Features. Contents

What is VLAN Routing?

The IP Transmission Process. V1.4: Geoff Bennett

Packet Sniffing on Layer 2 Switched Local Area Networks

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Level 2 Routing: LAN Bridges and Switches

ICS 351: Today's plan

ACHILLES CERTIFICATION. SIS Module SLS 1508

Networking Basics for Automation Engineers

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

AT-S60 Version Management Software for the AT-8400 Series Switch. Software Release Notes

Technical Support Information Belkin internal use only

Switching in an Enterprise Network

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Network configuration for the IBM PureFlex System

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

AT-S39 Version 1.3 Management Software for the AT-8024 and AT-8024GB Fast Ethernet Switches. Software Release Notes

16-PORT POWER OVER ETHERNET WEB SMART SWITCH

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Scalable Address Resolution for Data Center and Cloud Computing

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

8.2 The Internet Protocol

Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs

B&B ELECTRONICS WHITE PAPER. Managed Ethernet Switches - Key Features for a Powerful Industrial Network

Microsoft Network Load Balancing and Cisco Catalyst Configuration

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

How To Configure Voice Vlan On An Ip Phone

Exam 1 Review Questions

Network Load Balancing

PART IV. Network Layer

RARP: Reverse Address Resolution Protocol

Fiber Channel Over Ethernet (FCoE)

IP Address Assignment in Large Industrial Networks

What communication protocols are used to discover Tesira servers on a network?

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Turning Copper into Gold

Exploring the Remote Access Configuration Utility

Predictability of Windows DNS resolver. ing. Roberto Larcher robertolarcher@hotmail.com

Flow Monitor Configuration. Content CHAPTER 1 MIRROR CONFIGURATION CHAPTER 2 RSPAN CONFIGURATION CHAPTER 3 SFLOW CONFIGURATION...

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Link Layer Discovery Protocol

Cisco Networking Academy CCNP Multilayer Switching

Network and Host Addresses , Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

Implementing Network Address Translation and Port Redirection in epipe

Direct IP Calls. Quick IP Call Mode

MAC Address Issues in IEEE 802.1

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

IEEE 802.1X Overview. Port Based Network Access Control

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

LANs and VLANs A Simplified Tutorial

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Chapter 25 DHCP Snooping

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

VLAN and QinQ Technology White Paper

Scaling 10Gb/s Clustering at Wire-Speed

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Monitoring solar PV output

UIP1868P User Interface Guide

4m. MONITORING OF ETHERNET/IP NETWORK TRAFFIC.

Chapter 46 Link Layer Discovery Protocol (LLDP)

Detecting rogue systems

Bridgewalling - Using Netfilter in Bridge Mode

Overview of Computer Networks

Contents. Connection Guide. What is Dante? Connections Network Set Up System Examples Copyright 2015 ROLAND CORPORATION

Flow Monitor Configuration. Content CHAPTER 1 MIRROR CONFIGURATION CHAPTER 2 SFLOW CONFIGURATION CHAPTER 3 RSPAN CONFIGURATION...

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED

Internet Control Protocols Reading: Chapter 3

Extending Networking to Fit the Cloud

IPv6 Addressing. How is an IPv6 address represented. Classifications of IPv6 addresses Reserved Multicast addresses. represented in Hexadecimal

Computer Networks I Laboratory Exercise 1

Transcription:

Enabling Ethernet devices without Global MAC Addresses Pat Thaler, Senior Technical Director, Broadcom 20 June 2014 1

Problem statement Network ports moving into smaller and smaller things Sensors and actuators e.g. light switches and thermostats Potentially dozens of ports per home, car or machine Some things may be disposable or short lived Should all these things consume global MAC address space? With cell phones and tablets, the consumption rate of MAC addresses has increased dramatically The 48-bit MAC address space is supposed to last for at least 100 years What about using Local Addresses? User configuration isn t reasonable often no local interface and too large a potential for error Existing automatic protocols configure addresses for virtual ports and rely existence of a physical port MAC address Consider a protocol to get an address from the network with no initial address 2

Alternatives for a protocol without a MAC address Assign an address before the port comes up E.g. using auto-negotiation for Ethernet, from the Access Point on WiFi But this would be MAC and, in some cases, PHY type dependent. Only some Ethernet PHYs have auto-negotiation Assumes the directly attached device (bridge or access point) will be the address server Define a Null address value to use as a source address for the address acquisition protocol This address is never allowed as a destination address New bridges can ignore it for learning when seen as a source address. For existing bridges, it will move around in learning, but since it never is a destination address, it won t matter where they think it is. Could use well-known group addresses for the destination address Possibly one for address servers and one for client nodes Possibly existing LAN scoped addresses e.g. nearest non-tpmr 3

Identifying the right response With a multicast destination address, how does a client know which reply PDUs are for it? Client PDUs include a Client ID with identifier type and value; examples of identifier types: EUI-64 ICC ID (from SIM card) A random number for those devices that have no configured unique ID Response PDU includes the Client ID from the client s PDU Client processes PDUs received with its Client ID and discards ones with other Client IDs 4

Who s the address server? Claiming protocol without a server Client generates a proposed address and initiates a claim, waits for response and uses address if no conflict detected Proposed address might have a set value for the first 24 bits and a randomly generated value for the other 24. Most suited to small* networks which can operate without a server Requires that all nodes receive each other s traffic (or something in the network can proxy for nodes that don t receive the claim). Similar protocols exist for IPv6 (RFC 4862) and FCoE (FC-BB-6 VN2VN) Address Server Address requests go to a server which responds with an address Default address range can be defined for operation without configuration Multiple servers can operate by each having an address range. Bridges as servers Address range could be divided between bridges with a distribution protocol possibly starting from the spanning tree root Reduces multicast traffic but all bridges might need to participate * Small could be ~ 1000 ports 5

Claiming, servers, bridges Claiming and server protocols could coexist Claiming protocol and server protocol can operate on different address ranges Server could listen for Claims and reply with an address assignment Allows the network to have a server or not as dictated by its size and nature and clients to adapt to either without configuration. Bridge Relay Node transmits with Null Source Address Bridge encapsulates in a relay PDU with the bridge s address for source address Encapsulation may include a port identifier. Responses go to bridge which relays to send to the well-know client multicast address Bridge can use the port identifier to choose the output port for the relayed message. Reduces multicast traffic for responses but requires changes to bridges 6

Address stability Client may store the last used address On re-initializing, client may request the same address For server-less, it sends that address in the first claim If the claim fails, the client picks random address component as usual For server, the address request can have a field to carry a proposed address The server assigns the proposed address if it is available and assigns another address if it isn t. 7

Quicker start up for specialized stable networks Some applications such as automotive networks have strict requirements on latency to start the network. E.g. automotive network should work within on the order of 100 ms after power is applied Changes to these networks would be rare Potentially the learned address could be stored in non-volatile memory If necessary, a message could be broadcast indicating that the existing addresses can still be used or a message can be sent to invalidate the existing address and restart address acquisition 8

Conclusion Obtaining a MAC address over the network is possible This allows nodes to operate without a global MAC address and without configuration Such a protocol could protect the 48-bit MAC address space from exhaustion May also simplify the production of small inexpensive devices Removes need to configure with a global address at production time. It may be desirable to standardize two mechanisms Address server-based Server-less claiming, and Provide for coexistence of the two. 9