Proposal for the MAC address assignment protocol

Slides:



Advertisements
Similar presentations
LAN Segmentation Virtual LAN (VLAN).
Advertisements

CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
© 2002, Cisco Systems, Inc. All rights reserved..
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Functions 1.  How long is MAC address?  How is mac address used in data communication?  What is a frame?  What does an IP address look like? 2.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
Classful IP Addressing
Evolution of Networking Devices
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Sybex CCNA Chapter 8: Layer-2 Switching Instructor & Todd Lammle.
Chapter 8: Virtual LAN (VLAN)
Network 101 By Tom Battaglia Dell Connectivity 2 RR2 DC Drawing 3 Heterogeneous Network 4 OSI Model.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Ethernet Network Fundamentals. Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 8 Ethernet Switching Claes Larsen, CCAI.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
Topic 5 Spanning tree protocol
Discussion for Distributed Aggregation Sublayer Ting Ao, Yuehua Wei, Jinghai Yu 1IEEE Plenary San Francisco 2011.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Identifying Problems That Occur in Redundant Switched.
Copyright 2009 Kenneth M. Chipps Ph.D. Addressing in Networks Last Update
Data Communications is the Real World OSI Layers 1 & 2 a.k.a TCP/IP Network Interface Layer.
CCNA1 v3 Module 8 v3 CCNA 1 Module 8 JEOPARDY S Dow.
Chapter 9 Introduction To Data-Link Layer 9.# 1
Instructor & Todd Lammle
Local MAC Address Assignment Protocol(LAAP) -- Thought on 802.1CQ
Large-scale (Campus) Lan design (Part II)
Virtual Local Area Networks or VLANs
Instructor Materials Chapter 5: Ethernet
Part III Datalink Layer 10.
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Network connectivity to the legacy wired LAN
3. Internetworking (part 2: switched LANs)
Introduction to Networking
Local MAC Address Protocol
Virtual LANs.
Lec 5 Layers Computer Networks Al-Mustansiryah University
Connecting LANs, Backbone Networks, and Virtual LANs
Connecting LANs, Backbone Networks, and Virtual LANs
One Upon A Time Computer Networks
Network Fundamentals – Chapter 9
Virtual Local Area Network
Broadcast and Collision Domains
IP Address.
Network Fundamentals – Chapter 9
Connecting LANs, Backbone Networks,
CCNA 1 v3.1 Module 8 Ethernet Switching
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
© 2002, Cisco Systems, Inc. All rights reserved.
Network Fundamentals – Chapter 9
Dr. Rocky K. C. Chang 23 February 2004
Part III Datalink Layer 10.
Chapter 15. Connecting Devices
Ch 17 - Binding Protocol Addresses
Network connectivity to the legacy wired LAN
Network Fundamentals – Chapter 9
Network Fundamentals – Chapter 9
INFORMATION FLOW ACROSS THE INTERNET
Network Fundamentals – Chapter 9
CCNA 1 v3.1 Module 8 Ethernet Switching
Bridge Software A bridge connects networks and forwards frames from one network to another. PORTS A B E F BRIDGE C D G H.
Bridges Computer Networks.
IPv6 Addresses Hwajung Lee Key Reference:
P802.1CQ Assignment and Validation of Unicast Address
Network Fundamentals – Chapter 9
Presentation transcript:

Proposal for the MAC address assignment protocol Ting Ao ao.ting@zte.com.cn

Local Address Study Group: Prior Arts Local Address Study Group: P802C:define Local MAC address, almost done. P802.1CQ: A Local Address assignment protocol, on going Problems MAC address assignment protocol faces How to get MAC address without any source address How to locate the MAC address requester when response How to avoid MAC address conflict How to avoid broadcast flooding …… How

Our proposal for Local MAC address protocol Define a structured Local MAC address with position information Like: Bridge ID+Host ID Or:Bridge ID+Port ID+Host ID Take a “class-by-class” assignment strategy Every network device get a Bridge ID assignment from its upper class network device and inherit Bridge ID of the upper class network device. Every host get a Host ID from network device it connected and inherit Bridge ID from the network device connected. So Bridge ID+ Host ID make up the MAC address of a host.

Take SAI as an example Request Logical DB Response 1E0000000000 Class 1 Bridge 1 Bridge 2 1E1000000000 2E1000000000 B11 B12 B13 B21 B22 B23 Class 2 1E1000000001 2E1000000002 H1 H2 H3 H4 H5 H6 H7 H8 H9 H 10 H 11 H 12 Note:the lenth of the Bridge ID depend on the scale of this class of network device.

Merits Every MAC address is related to its bridge connected  No MAC addresss conflict exists Every network device communicate with other device it connected directly  No broadcast frames flooded Every network device can keep the mapping between the bridge id/host id assignment and the port. It’s easy locate the requester, the port connected is the requester. Every structured Local MAC address is position related.  Improve the forwarding performance  Easy to locate fault and fault diagnosis

Thanks!