Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
See below for my responses bracketed by my initials: pat From: Paul Nikolich [mailto:paul.nikolich@xxxxxxx]
Pat, fyi in case you're not on this mailing list. This just came in. --Paul ------ Forwarded Message ------ From: "Rene Struik" <rstruik.ext@xxxxxxxxx> Sent: 10/22/2014 5:06:59 PM Subject: Re: [STDS-802-Privacy] 802c - Local address management presentation Hi Juan Carlos: [pat] In some environments such as a data center, some addresses may be configured by an administrator. This was the initial use envisioned for local MAC addresses. Many 802.5 nodes
used configured local addresses). Some DEC devices Such nodes generally don’t “know” that their address is configured. They are just using what was set in their address register. They won’t be participating in any address acquisition protocol so they won’t
participate in a duplicate address check and they have no ability to change addresses if there is a duplicate.
This kind of use has been allowed since the beginning of IEEE 802 and we need to allow for it to continue. It would be nice for administrators going forward to be able to know what address
range to use without conflicting with other newer ways to get addresses. Also, some data centers can have a large number of entities on the network. Virtualization and cloud increases this number quite a lot. An address acquisition protocol such as distribution
of address by a hypervisor orchestration system might have a default block in the CID space, but for cases where 2^24 addresses aren’t enough additional space might be assigned from the local administration block by the administrator to the orchestration system.
[pat]
[pat] In an address claiming protocol (i.e. a protocol where a device randomly generates part of the address and then checks for duplicates before using), the birthday paradox doesn’t
matter. When a device needs an address, it sends a claim frame to see if the address is in use. If the address is in use, it will get a response to its claim, choose another address and repeat the process. So yes, the birthday paradox says that one or even
a few may need to try more than once. For 1000 devices and 24 bits, there is about a probability of 3% that at least one of the devices fails to get a unique address on the first try. The important thing is that At that
point one has ~999 devices that have successfully chosen an address. The device that failed (or perhaps in a very unlucky case 2 or 3 devices) will repeat the process of generating a new address. It has a probability of less than 0.006% that the second
attempt fails. If making 2 or 3 attempts is unacceptable in a particular application or if you want unique addresses for a stadium full of people, then use an server-based protocol instead of a claiming
protocol. [pat]
[pat] The 2^24 blocks are intended to be per protocol. The protocol would use that as its default block in all its deployments. There might be multiple servers on a given network. For
instance, in the FCoE server-based case, each Fibre Channel Forwarder (the FC switch protocol running as layer 3 over 802.1Q bridges) is a server and the block is divided amongst the servers.
There are 16 million addresses available in a CID block for a server based protocol so that should provide plenty for dividing amongst the servers. But if there is a concern about having
enough addresses, a protocol doesn’t have to allocate a fixed range to each server. A protocol could run between servers with each server requesting the quantity of addresses it initially needs. [pat]
[pat] The downside is that occasional clashes will occur. A pseudo-random address scheme using the whole local address space assumes that all devices and all servers participate in duplicate
address detection to identify and resolve the duplicate addresses. Duplicate address detection also assumes that all devices can see all other devices or at least see something that will proxy for addresses on the network that it can’t see. If that isn’t the
case, duplicate addresses can go undetected. There isn’t a universal duplicate address detection protocol. As I’ve mentioned above and before, devices using administrator configured local addresses (devices that already exist)
won’t be participating in a duplicate address detection protocol. Nor will the existing VMs with local addresses assigned by a virtualization orchestration system. Partitioning allows each protocol to use a duplicate address detection that is appropriate for the protocol while not conflicting with other protocols. [pat]
[pat] I expect that some but not all devices using local addresses will need a unique ID – in some cases an EUI-64. In any case, that was a minor point. [pat]
--
email: rstruik.ext@xxxxxxxxx | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
|