Re: [dc] Requirement for a method to manage mac address in DC
Donald Eastlake <d3e3e3@gmail.com> Sat, 04 February 2012 19:14 UTC
Return-Path: <d3e3e3@gmail.com>
X-Original-To: dc@ietfa.amsl.com
Delivered-To: dc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1557921F8460 for <dc@ietfa.amsl.com>; Sat, 4 Feb 2012 11:14:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.174
X-Spam-Level:
X-Spam-Status: No, score=-104.174 tagged_above=-999 required=5 tests=[AWL=-0.575, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uxos8EvCLzmc for <dc@ietfa.amsl.com>; Sat, 4 Feb 2012 11:14:53 -0800 (PST)
Received: from mail-lpp01m010-f44.google.com (mail-lpp01m010-f44.google.com [209.85.215.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9BF5721F845F for <dc@ietf.org>; Sat, 4 Feb 2012 11:14:52 -0800 (PST)
Received: by lahl5 with SMTP id l5so2722549lah.31 for <dc@ietf.org>; Sat, 04 Feb 2012 11:14:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=CRF2vE1ogZILlchfrbpf5wPgPhuL0YJ1M9+ZdLYNS6U=; b=xhS27TzGXbhvsERMHDC+eEOdrkgRUeA57wbOxVFqlPMOetDV61FojAnr3u/45LG7NJ V+sp/3j9bgSB60fVfkQRmIaoFZm1dDouAIcR8qL/srWYaMLIS4ts4ZtBgJhWt6bE7eI/ OkKY2PRC8OTKIyYZ5tB5LvHMoZplGGFN84xXg=
Received: by 10.112.29.193 with SMTP id m1mr3278448lbh.12.1328382891492; Sat, 04 Feb 2012 11:14:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.112.88.42 with HTTP; Sat, 4 Feb 2012 11:14:30 -0800 (PST)
In-Reply-To: <EB9B93801780FD4CA165E0FBCB3C3E6701E7ED@SJEXCHMB09.corp.ad.broadcom.com>
References: <CA+E6a66cxJoX3ahEt8E5uQgGoWoP269QXXpozKxN5k7PRw8J3w@mail.gmail.com> <1199197439.684939.1328210516419.JavaMail.root@zimbra-prod-mbox-3.vmware.com> <EB9B93801780FD4CA165E0FBCB3C3E6701D817@SJEXCHMB09.corp.ad.broadcom.com> <CAF4+nEFMuBZ+90AqM2F-ZAbAFWB8Mf76c0_hAEqitV3Z4JmvyA@mail.gmail.com> <EB9B93801780FD4CA165E0FBCB3C3E6701E7ED@SJEXCHMB09.corp.ad.broadcom.com>
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Sat, 04 Feb 2012 14:14:30 -0500
Message-ID: <CAF4+nEGTrCGo2jgocrtZ==UfLpeNNeyV+KGS0QQ-a3j5A9ysmw@mail.gmail.com>
To: Pat Thaler <pthaler@broadcom.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Thomas Narten <narten@us.ibm.com>, "dc@ietf.org" <dc@ietf.org>, yu jinghai <yu.jinghai@zte.com.cn>, Truman Boyes <tboyes@gmail.com>, Lizhong Jin <lizho.jin@gmail.com>, Mallik Mahalingam <mallik@vmware.com>
Subject: Re: [dc] Requirement for a method to manage mac address in DC
X-BeenThere: dc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF Data Center Mailing List <dc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dc>, <mailto:dc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dc>
List-Post: <mailto:dc@ietf.org>
List-Help: <mailto:dc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dc>, <mailto:dc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Feb 2012 19:14:54 -0000
Hi Pat, On Fri, Feb 3, 2012 at 1:51 PM, Pat Thaler <pthaler@broadcom.com> wrote: > Donald, > > Everything has to be somewhere. "remember: no matter where you go... there you are" The Adventures of Buckaroo Banzai Across the 8th Dimension... > By your argument, TRILL bridges aren't layer 3 devices either > because they aren't peering with the routers in your slides. They > are below layer 3 - Yes. Exactly the same form of proof that proves that TRILL switches are above layer 2 also proves that TRILL switches are below layer 3. > not working in the layer 3 addressing domain so they are in layer 2. No. TRILL Data packets are routed by TRILL switches using the TRILL nickname address space. I do not know what the basis is of your assertion that TRILL nicknames are not layer 3 addresses but I don't believe they are layer 2 addresses. > It is just that layer 2 has some sublayers of peered devices. > Long before TRILL and PBB, there were Ethernet repeaters which were > also layer 2 devices and didn't peer with switches. Provider > bridges, provider backbone bridges and TRILL all work at different > sublayers in layer 2. I disagree the TRILL is a sublayer of Layer 2. It is fairly easy to order devices as to relative layer based on peering although, like with anything else, if you apply a sufficiently strong magnifying glass you can find some odd glitches and corner case: Repeater < Prov. Bridge < Cust. Bridge < TRILL Switch < L3 Router In my opinion, the arguments that TRILL is in Layer 2 or Layer 3 are in exact equipoise. I do not agree that anything on or inside the border betwen Layer 2 and Layer 3 should be classified as Layer 2. > I also don't see how that matters to the content of this > discussion. Whether one considers TRILL bridges to be at some new TRILL routers > layer 2.5 or not or even at layer 3 doesn't matter to the point that > they provide isolation between the address spaces of tenants. That > isolation only applies if any traffic between those tenants goes > through a layer 3 devices that removes the original MAC addresses > from the frame. I agree that it does not matter much to the point under discussion. I just didn't want people to be confused about the true nature of TRILL switches. Thanks, Donald ============================= Donald E. Eastlake 3rd +1-508-333-2270 (cell) 155 Beaver Street, Milford, MA 01757 USA d3e3e3@gmail.com > Regards, > Pat > > -----Original Message----- > From: dc-bounces@ietf.org [mailto:dc-bounces@ietf.org] On Behalf Of Donald Eastlake > Sent: Friday, February 03, 2012 10:18 AM > To: Pat Thaler > Cc: Thomas Narten; dc@ietf.org; yu jinghai; Truman Boyes; Lizhong Jin; Mallik Mahalingam > Subject: Re: [dc] Requirement for a method to manage mac address in DC > > Hi Pat, > > Please see below: > > On Thu, Feb 2, 2012 at 3:01 PM, Pat Thaler <pthaler@broadcom.com> wrote: >> Some work on managing MAC addresses of virtual devices in a Data Center may >> be worthwhile, though it isn't clear to me whether such work would better >> fit in IETF or IEEE 802. >> >> >> >> When virtualization ecosystem management entities are handing out addresses, >> there can be data centers with multiple such entities and one can't count on >> them to coordinate their use of the address space. While each of them won't >> hand out duplicate addresses to the set of VMs they manage, the addresses >> may be duplicated for VMs managed by different management entities. >> Sometimes this can be dealt with by manual assignment of ranges, but in a >> data center with multiple tenants, the tenants are unlikely to coordinate >> that. The potential duplicate addresses can in some cases be dealt with by >> mechanisms that keep the address space of the management entities separate >> such as: IVL (or other mechanisms that concatenate VLAN and MAC address for >> bridge learning) or layer 2 (e.g. PBB and TRILL) or layer 3 encapsulations. > > Sorry to be nit-picky, but TRILL is not a layer 2 encapsulation. It is > provably above layer 2. > > In my opinion, the best way to tell if a device of type X is at a > higher layer, at the same layer, or at a lower layer, than a device of > type Y is to look at peering. Generally speaking, layer 2 devices are > transparent to TRILL and TRILL switches peer through layer 2 devices, > just like layer 3 routers peer with each other through layer 2 > devices. On the other hand, TRILL switches look like end stations to > and block peering between layer 2 devices, just like layer 3 routers > look like end stations and block peering between layer 2 devices. See > attached slides. > > Thanks, > Donald > ============================= > Donald E. Eastlake 3rd +1-508-333-2270 (cell) > 155 Beaver Street, Milford, MA 01757 USA > d3e3e3@gmail.com > >> But there could be some areas where a protocol for coordinating assignments >> to avoid duplication would help. >> >> There have been discussions in the IEEE RAC about concerns regarding the use >> of MAC addresses from the global MAC address space for virtual devices; >> issues include potential for exhausting the global address space and that an >> address that looks like a global address is being used as a local address. >> Half the MAC address space is for local addresses, but there aren't >> standardized mechanisms for managing addresses in that space. >> >> >> >> <IEEE 802 Vice-Chair hat on> If work was done in the IETF on MAC address >> management/assignment, there should be close liaison with IEEE 802 and the >> IEEE RAC. >> >> >> >> Pat >> >> >> >> From: dc-bounces@ietf.org [mailto:dc-bounces@ietf.org] On Behalf Of Mallik >> Mahalingam >> Sent: Thursday, February 02, 2012 11:22 AM >> To: Truman Boyes >> Cc: Thomas Narten; yu jinghai; dc@ietf.org; Lizhong Jin >> >> >> Subject: Re: [dc] Requirement for a method to manage mac address in DC >> >> >> >> In a virtualized environment MAC addresses are not totally random generated. >> There is some notion of Management-Entity(s)/controller(s) allocating the >> MAC addresses for VMs and ensures that it does not assign the same MAC >> address to two different VMs and this work only within the scope of that >> management/controller administration. There are some exceptions of course >> (a) MAC address exhaustion under a given OUI category (b) manual >> copy/cloning of VMs and powering on them using standalone management >> entities (c) VMs that use MAC address override for legitimate reasons >> [because else things like licensing software breaks]. There are some >> mechanisms in place to address (a), but (b) and (c) requires co-operation at >> the management-entity/controllers. >> >> Mallik >> >> ________________________________ >> >> From: "Truman Boyes" <tboyes@gmail.com> >> To: "Thomas Narten" <narten@us.ibm.com> >> Cc: "yu jinghai" <yu.jinghai@zte.com.cn>, dc@ietf.org, "Lizhong Jin" >> <lizho.jin@gmail.com> >> Sent: Thursday, February 2, 2012 10:20:07 AM >> Subject: Re: [dc] Requirement for a method to manage mac address in DC >> >> >> On Thu, Feb 2, 2012 at 10:55 AM, Thomas Narten <narten@us.ibm.com> wrote: >> >> Truman Boyes <tboyes@gmail.com> writes: >> >>> The L2 separation between multiple tenants is true in most circumstances >>> in >>> DCs, but in commodity computing (ie. VPS, low cost dedicated servers, or >>> co-location) there is a concern on IPv4 address exhaustion or waste, so >>> machines/instances are grouped on single L2 segments. It is possible to >>> have virtual MAC overlaps on these segments. Is this something that this >>> group wishes to evaluate options to solve? >> >> IMO, this is putting the cart before the horse. >> >> Can we first get a sense for how big a problem this is in practice and >> whether existing mitigation approaches are not sufficient? >> >> I.e., is this a real problem causing significant pain today, or are >> their other bigger "pain points" that we should be looking at? >> >> Thomas >> >> >> In the VPS/VM world, I would say it's not a significant issue because there >> are single entities (Organizations) that manage the MAC addresses. Typically >> software would just increment the virtual MACs, and this does not require >> external protocols to ensure uniqueness. If there are many provisioning >> systems that manage VMs on the same network segment then they will need to >> keep their database in sync. >> >> -- >> --truman
- [dc] 答复: RE: Requirement for a method to manage m… yu.jinghai
- Re: [dc] Requirement for a method to manage mac a… Truman Boyes
- Re: [dc] Requirement for a method to manage mac a… Thomas Narten
- Re: [dc] Requirement for a method to manage mac a… Lizhong Jin
- Re: [dc] Requirement for a method to manage mac a… Thomas Narten
- [dc] Requirement for a method to manage mac addre… yu.jinghai
- [dc] 答复: Requirement for a method to manage mac a… fu.xihua
- Re: [dc] Requirement for a method to manage mac a… Alexander Vainshtein
- Re: [dc] Requirement for a method to manage mac a… Thomas Narten
- Re: [dc] Requirement for a method to manage mac a… Truman Boyes
- Re: [dc] Requirement for a method to manage mac a… Mallik Mahalingam
- Re: [dc] Requirement for a method to manage mac a… Pat Thaler
- [dc] 答复: Re: Requirement for a method to manage m… yu.jinghai
- Re: [dc] 答复: Re: Requirement for a method to mana… Mallik Mahalingam
- Re: [dc] 答复: Re: Requirement for a method to mana… Andy Dockerty
- Re: [dc] 答复: Re: Requirement for a method to mana… Thomas Narten
- Re: [dc] 答复: Re: Requirement for a method to mana… Mallik Mahalingam
- Re: [dc] Requirement for a method to manage mac a… Donald Eastlake
- Re: [dc] Requirement for a method to manage mac a… Pat Thaler
- Re: [dc] Requirement for a method to manage mac a… David Allan I
- Re: [dc] Requirement for a method to manage mac a… Donald Eastlake
- Re: [dc] 答复: Re: Requirement for a method to mana… Joel jaeggli
- Re: [dc] Requirement for a method to manage mac a… AshwoodsmithPeter
- Re: [dc] Requirement for a method to manage mac a… Linda Dunbar
- Re: [dc] Requirement for a method to manage mac a… David Allan I
- Re: [dc] Requirement for a method to manage mac a… Stewart Bryant
- Re: [dc] Requirement for a method to manage mac a… Thomas Narten
- Re: [dc] Requirement for a method to manage mac a… Truman Boyes