Local MAC Address Assignment Protocol(LAAP) -- Thought on 802.1CQ

Slides:



Advertisements
Similar presentations
Diameter Credit Control Application Tutorial - IETF67
Advertisements

CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
LACP Project Proposal.
Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00 Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black,
IPv6 The Next Generation Presented by Anna La Mura Jens Waldecker.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Host Autoconfiguration ALTTC, Ghaziabad. IPv4 Address and IPv6 equivalents ALTTC, Ghaziabad.
PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric. Presented by: Vinuthna Nalluri Shiva Srivastava.
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
Sept 28, 2004CS573: Network Protocols and Standards D – Selective Multicast Network Protocols and Standards Autumn
802.1D – Selective Multicast
1 6/13/ :23 CS575ATM LAN Emulation1 Rivier College CS575: Advanced LANs ATM LAN Emulation ATM Network LAN.
Jan 01, 2008CS573: Network Protocols and Standards D – Selective Multicast Network Protocols and Standards Winter
© 2002, Cisco Systems, Inc. All rights reserved..
IGMP and MLD Optimization in Wireless and Mobile Networks 1 draft-liu-multimob-igmp-mld-wireless-mobile-00.
1 Chapter Overview IP (v4) Address IPv6. 2 IPv4 Addresses Internet Protocol (IP) is the only network layer protocol with its own addressing system and.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Lecture 3a Mobile IP 1. Outline How to support Internet mobility? – by Mobile IP. Our discussion will be based on IPv4 (the current version). 2.
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
IEEE 802.1q - VLANs Nick Poorman.
CS 350 Chapter-11Switching. Switching Service Hardware-based bridging (ASIC: application-specific integrated circuits) Wire speed Low latency Low cost.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-02.txt John Buford, Avaya Labs Research IETF 71.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Initialization Protocols for IEEE Based Ad Hoc Networks C. – S. Hsu and J. P. Sheu International Conference on Parallel and Distributed Systems.
IETF78 Multimob Masstricht1 Proposal for Tuning IGMPv3/MLDv2 Protocol Behavior in Wireless and Mobile networks draft-wu-multimob-igmp-mld-tuning-02 Qin.
( Address Resolution Protocol )
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Network Load Balancing Addressing
Chapter 05 Exam Review CCNA Discovery 01 – Computer and Network Fundamentals Presented by: Phillip Place Cisco Academy Instructor Lake Michigan College.
Group multicast fanOut Procedure
Networking Devices.
Spanning Tree Algorithm
Fast Handover for Multicast in Proxy Mobile IPv6
Local MAC Address Protocol
One Upon A Time Computer Networks
IEEE 802 EC Privacy Recommendation SG Comments on 802c PAR and CSD
Proposal for IEEE 802.1CQ-LAAP
© 2002, Cisco Systems, Inc. All rights reserved.
Proposal for IEEE 802.1CQ-LAAP
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
© 2002, Cisco Systems, Inc. All rights reserved.
Internet Protocol INTERNET PROTOCOL.
Proposal for IEEE 802.1CQ-LAAP
Proposal for the MAC address assignment protocol
July 2014 doc.: IEEE /17/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
MAC address assignment in IEEE through IEEE aq
MAC address assignment in IEEE through IEEE aq
San Diego 802.1CQ discussions
MAC address assignment in IEEE through IEEE aq
MAC Address Acquisition Protocol
<month year> <doc.: IEEE doc> November 2014
MAC address assignment in IEEE through IEEE aq
MAC Address Acquisition Protocol
Network Address Translation (NAT)
Chapter 13: I/O Systems.
Lecture 4a Mobile IP 1.
Antonio de la Oliva (UC3M)
<month year> <doc.: IEEE doc> November 2014
Bridge Software A bridge connects networks and forwards frames from one network to another. PORTS A B E F BRIDGE C D G H.
P802.1CQ Assignment and Validation of Unicast Address
Proposed liaison to IEEE 1722 Working Group
Layering and the TCP/IP protocol Suite
Presentation transcript:

Local MAC Address Assignment Protocol(LAAP) -- Thought on 802.1CQ Ting Ao(ZTE) ao.ting@zte.com.cn

Content Previous Arts Basic Requirements for LAAP Two modes in LAAP Server Mode Peer-to-Peer Mode

Prior Arts 802.1CQ PAR&CSD: This standard specifies protocols, procedures, and management objects for locally-unique assignment of 48-bit and 64-bit addresses in IEEE 802 networks. Peer-to-peer address claiming and address server capabilities are specified. http://www.ieee802.org/1/files/public/docs2015/dcb-thaler-1CQ-par-local-address-prot-1115-v0.pdf http://www.ieee802.org/1/files/public/docs2015/dcb-thaler-1CQ-csd-local-address-prot-1115.pdf 802.1CQ Objective: Allow for acquiring multiple addresses Allow for edge bridge / access point proxy http://www.ieee802.org/1/files/public/docs2016/cq-thaler-objectives-1116.pdf Assignment and Validation of Unicast Address 802 should have a single validation protocol as well as assignment protocols. http://www.ieee802.org/1/files/public/docs2016/cq-cas-assignment-and-validation-0316-v00.pptx Structured MAC address assignment with Server Assign structured MAC address hierarchically http://www.ieee802.org/1/files/public/docs2016/cq-ao-local-address-assignment-1116-v00.pptx

Requirements on LAAP LAAP: Local MAC Address Assignment Protocol Basic requirements: Support server assignment and peer-to-peer claim assignment* Allow proxy for fast assignment* It should be a lightweight protocol Avoid addresses conflict Avoid too many multicast packets and avoid loop

Server Mode Principle: Every Host sends MAC Address Request Message to ask for MAC address . Server sends MAC Address Response Message to assign MAC address to the Host. To make sure that the Request Message and Response Message is one-to-one relationship, there should be a Message ID in Request Message and Respond Message. Bridge in the network forward the Request Message to Server, and then forward the Response Message to the Host according to the Message ID. Some Bridges can play as a Proxy to request MAC address block first, so that once it get Request Message, the Proxy can respond instead of Server .

Message Content Message Type Message ID MAC address block MAC Address Request Message MAC Address Respond Message Message ID Identify each message 60 bits/80 bits:48/64 bits MAC address+ 16 bits random number MAC address block MAC address starting address Quantity: number of MAC addresses in the block

Scenarios on Server mode-1 ①H(Host) send Request Message with Message ID and address number ②B(Bridge) save the mapping information of Message ID and ingress port, and forward the Request Message to the Server ③S(Server) get the Request Message and assign a MAC address block in Response Message. The Response Message has the same Message ID with corresponding Request Message. ④B forward Response Message back to the Host according to the mapping information 3 B1 B2 2 4 B11 B12 B21(P21) B22 1 H1 H2 H3 H4 H5 H6 H7 H8

Scenarios on Server mode-2 ①B(Bridge) as a Proxy send Request Message to ask a MAC address block as a minor MAC address resource ②S(Server) assign some MAC address to B first ③H(Host) send Request Message to get MAC addresses ④B(Bridge) as a proxy send Response Message instead of Server with assigned MAC address. Note: Bridges as Server Proxy can be hierarchical. Server 2 B1 B2 1 4 B11(P11) B12 B21(P21) B22 3 H1 H2 H3 H4 H5 H6 H7 H8

Peer-to-Peer Mode Principle: Every Host sends a Register Message to claim its MAC address Every Requester sends a Declare Message to confirm its MAC address if there is no Conflict Message received An ID must be included to differentiate every request no matter it’s a Register Message, Conflict Message or Declare Message. A Proxy entity is involved to make the claim action be more efficient.

Message Content Message Type Message ID MAC address block Register Message: To register MAC address block in the network Conflict Message: To inform the conflict Declare Message: To declare MAC address block in the network. Once declared, the MAC addresses can be used by the declarant. Message ID Identify each message 60 bits/80 bits:48/64 bits MAC address+ 16 bits random number MAC address block MAC address starting address Quantity: number of MAC addresses in the block

Scenarios on Peer-to-Peer mode-1 ①T(Talker) send Register Message with Message ID and MAC address block ②B(Bridge) save the mapping information of Message ID and ingress port, and forward the Register Message to other ports except ingress port ③L(Listener) get the Register Message and check the MAC address block if there is a conflict. If yes, L send out a Conflict message with the same Message ID in the Register Message. If not, terminate the Register Message. ④Bridge forward the Conflict Message according to the mapping information. ⑤If T get the Conflict Message and start a new registration cycle. If not, T send Declare Message to the network B 2 4 B T B L B L 1 5 3

Scenarios on Peer-to-Peer mode-2 ①T(Talker) send Register Message with Message ID and MAC address block ②B(Bridge) save the mapping information of Message ID and ingress port, and forward the Register Message to other ports except ingress port ③P(Proxy) check the MAC address block in the Register Message whether there is a conflict. If yes, send out Conflict Message back to T. If not, forward the Register Message to other ports. ④If T get the Conflict Message, it starts a new registration cycle. If not, T send Declare Message to the network ⑤P record the MAC address block to be used according to the information in Declare Message. 3 B(P) 5 2 B T B L B L 1 4

Scenarios on Peer-to-Peer mode-3 ①T(Talker) send Register Message with Message ID and MAC address block ②B(Bridge) save the mapping information of Message ID and ingress port, and forward the Register Message to the Server ③S(Server) not only can assign MAC address , but also can check the MAC address block in the Register Message whether there is a conflict. If yes, send out Conflict Message back to T. ④If T get the Conflict Message then start a new registration cycle. If not, T send Declare Message to the network ⑤S record the MAC address block to be used according to the information in Declare Message., and will not assign these MAC addresses to other Requester. 3 S 5 2 B T B L B L 1 4

Some thought to be considered What should LAAP based? MRP, LRP? LLDP, VDP? Or as a new protocol Multicast address assignment will be considered VM migration may lead to issues to the protocol No matter MAC Address Request Message , MAC Address Register Message or MAC Address Declare Message, they are multicast packets, and loop avoidance should be considered. Coordination need to be considered when multiple assignment protocols co-exist.

Thanks!