60 likes | 75 Views
Explore the challenges of assigning unique unicast addresses and propose a single validation protocol for ensuring address uniqueness in 802 networks. Consider the use of orchestration protocols, such as T11FC-BB-6, and the impact of duplicate addresses on network security. Discuss the resolution of address collisions in managed and adhoc networks, and examine the potential application of protocols like 802.1aq and IEEE802.11ai.
E N D
P802.1CQAssignmentandValidationofUnicastAddress HirokiNakano
ProblemStatement • Howcanweassignlocally-uniqueunicastaddresses? • orchestrationprotocols? • T11FC-BB-6? • random? • Someotherprotocols? • In case of multicast addresses, it may be impossible to detect collision and it’s harmless relatively (really?) • Themostimportantthingis‘UNIQUE’ • Thisisaprerequisiteof802networks. • Duplicateaddressesarealwaysanannoyingproblemfornetworkadministrators. • Cheatingaddressbreaksforwardingdatabasesandenablesattackerstointerceptframes.(althoughitisnotdirectlyrelatedtoassignment...) • Howcanweassureuniqueness?
AssuranceofUniqueness • Historically,aglobally-uniqueaddressisassignedtoeachportbymanufacturer. • Operationalerrorsalwaysoccurs. • Do‘addressassignmentservers’assureuniqueness? • Whenyouoperatemultipleassignmentprotocolsonanetwork,howdotheycooperate? • Myproposal is:802shouldhaveasingle validationprotocol as well as assignment protocols. (althoughitmaybeoptional)
AssignmentandValidation • Multipleassignmentprotocolscanbeoperatedonanetworkandhostscanchooseoneofthem. • Onevalidationprotocolatmostisoperational. • Results of validation are utilized by 802.1X, 802.1AE, etc. Assignment Assignment Assignment Validation DUPLICATE UNIQUE
Validation on ManagedandAdhoc Managed Network Adhoc Network Networksnobodymanageslikehomenetworks,wirelessnetworks. Splittingintoandunitingtwonetworkssometimeshappens. How? Is 802.1aq usable? other ideas? Address collision can occur when two networks unite. How does it resolve? • Networksadministratorsmanage. • Administratorsknowwhen,whereandwhatisconnectedtonetworks. • For example: • 802.1X can be used to check MAC addresses. • MAC-based authentication is a common function for switches. • 802.1aq can be used to gather active MAC addresses.
Other considerations • IEEE802.11ai • This is an effort to reduce time for Initial Link Setup. MAC address assignment may be included in ‘Initial Link Setup’ procedure. To achieve this goal, timeout-less protocol is expected for 802.1CQ, that is, no ’timeout’ procedure in normal successful operation.