Re: Time to kill layer 2
Dimitri Staessens <dimitri.staessens@intec.ugent.be> Fri, 15 April 2016 06:55 UTC
Return-Path: <dimitri.staessens@intec.ugent.be>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8720C12DFBE for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 23:55:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.215
X-Spam-Level:
X-Spam-Status: No, score=-5.215 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aVQfpvrxnGjl for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 23:55:55 -0700 (PDT)
Received: from smtp2.ugent.be (smtp2.ugent.be [157.193.49.126]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C28B612DF7F for <ietf@ietf.org>; Thu, 14 Apr 2016 23:55:54 -0700 (PDT)
Received: from localhost (mcheck3.ugent.be [157.193.71.89]) by smtp2.ugent.be (Postfix) with ESMTP id 9015212C267 for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:53 +0200 (CEST)
X-Virus-Scanned: by UGent DICT
Received: from smtp2.ugent.be ([IPv6:::ffff:157.193.49.126]) by localhost (mcheck3.UGent.be [::ffff:157.193.43.11]) (amavisd-new, port 10024) with ESMTP id ixWD16EHv8g2 for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:52 +0200 (CEST)
Received: from mail2.intec.ugent.be (mail2.intec.ugent.be [157.193.214.245]) by smtp2.ugent.be (Postfix) with ESMTP id 0112212C25D for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:51 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail2.intec.ugent.be (Postfix) with ESMTP id 5D9272D for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:51 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at intec.ugent.be
Received: from mail2.intec.ugent.be ([127.0.0.1]) by localhost (mail2.intec.ugent.be [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uGDx3AFIPfvu for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:51 +0200 (CEST)
Received: from [192.168.66.170] (78-22-161-144.access.telenet.be [78.22.161.144]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: dstaesse) by mail2.intec.ugent.be (Postfix) with ESMTPSA id BD7D22C for <ietf@ietf.org>; Fri, 15 Apr 2016 08:55:50 +0200 (CEST)
Subject: Re: Time to kill layer 2
To: ietf@ietf.org
References: <CAMm+Lwg-HTYCv2pGt=SP2+Xjoko6GcJ73kVzqXC1LBTOMDKV_A@mail.gmail.com> <571011B2.9080003@intec.ugent.be> <CAPt1N1m71Vx6LX-dTuHVoYfZG_X7wykax2QMteqFjcsRt+RThw@mail.gmail.com> <57105657.80006@gmail.com> <5710604a.4d40620a.1fffb.ffffd647@mx.google.com> <57108BF3.4030608@intec.ugent.be>
From: Dimitri Staessens <dimitri.staessens@intec.ugent.be>
Message-ID: <5710906A.3050608@intec.ugent.be>
Date: Fri, 15 Apr 2016 08:55:38 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <57108BF3.4030608@intec.ugent.be>
Content-Type: multipart/alternative; boundary="------------070709050401090503020400"
X-Miltered: at jchkm1 with ID 57109077.000 by Joe's j-chkmail (http://helpdesk.ugent.be/email/)!
X-j-chkmail-Enveloppe: 57109077.000 from mail2.intec.ugent.be/mail2.intec.ugent.be/157.193.214.245/mail2.intec.ugent.be/<dimitri.staessens@intec.ugent.be>
X-j-chkmail-Score: MSGID : 57109077.000 on smtp2.ugent.be : j-chkmail score : . : R=. U=. O=. B=0.000 -> S=0.000
X-j-chkmail-Status: Ham
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/8XNxqo7n35nS2DLQZc_QYNXs8kQ>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Apr 2016 06:55:57 -0000
Upss. I meant Layer 4 of course ;) On 04/15/16 08:36, Dimitri Staessens wrote: > If you killed the user, Layer 3 would stop working... > > On 04/15/16 05:30, Chaitanya D wrote: >> >> The BOFH way - kill the user and let the network be.... ;) >> >> Kidding of course >> >> >> *From: *Carlos M. Martinez >> *Sent: *15 April 2016 08:18 >> *To: *Ted Lemon;Dimitri Staessens >> *Cc: *ietf >> *Subject: *Re: Time to kill layer 2 >> >> All the way up to the user ? Many times. >> >> On 4/14/16 6:56 PM, Ted Lemon wrote: >> >> > Of course! >> >> > >> >> > On Thu, Apr 14, 2016 at 5:54 PM, Dimitri Staessens >> >> > <dimitri.staessens@intec.ugent.be >> >> > <mailto:dimitri.staessens@intec.ugent.be>> wrote: >> >> > >> >> > anyone thought of killing everything on top of layer 2? >> >> > >> >> > >> >> > On 04/14/16 14:59, Phillip Hallam-Baker wrote: >> >> > >> >> > This morning I spent an hour debugging the network to print >> out two >> >> > class projects that were due. Some points: >> >> > >> >> > 1) My ability to debug the network is better than 99% of the >> >> > population >> >> > 2) The interaction of Bonjour, DHCP and auto power saving is >> >> > unfortunate >> >> > 3) Things should still work after I have been away for a week >> >> > 4) If vendors want to be selling all that IoT gear, they >> have to >> >> > solve >> >> > these issues. >> >> > >> >> > 5) I want someone to blame. Right now when the network doesn't >> >> > work, I >> >> > don't know who is the cause. I want one point of contact. >> Whoever is >> >> > that point of contact will get most of my networking money. >> >> > >> >> > >> >> > One of the biggest headaches in debugging is that 'smart >> hubs' are >> >> > not. They are actually very stupid. They make assumptions >> of network >> >> > topology that are not true. Another is the unfortunate >> >> > implementation >> >> > of DHCP. >> >> > >> >> > I don't use SNMP for a simple reason - it is not available >> to most >> >> > ordinary people. I want to understand networking for the 99%, >> >> > not the >> >> > IETF 1%-ers. >> >> > >> >> > All this networking gear is presented to me as black boxes over >> >> > which >> >> > I have absolutely no control (which is fine-ish) and no >> visibility. >> >> > >> >> > What we have today is the product of a historical process. I >> >> > remember >> >> > the days when Ethernet ran on 10BaseT. But I installed my first >> >> > switch >> >> > 30 years ago and it has been a switched protocol for 20 >> years now. >> >> > >> >> > >> >> > It seems to me that there is a business opportunity for any >> >> > vendor who >> >> > takes the rather obvious step of simplifying the system. >> >> > >> >> > People talk about 'IP everywhere' and 'IP end-to-end' which is >> >> > rather >> >> > odd when you think about the fact that virtually every >> local network >> >> > uses MAC addresses for routing. >> >> > >> >> > One of the reasons that IP won against OSI was that it was >> simpler. >> >> > Applications ran on top of the IP layer with only TCP >> inbetween. Of >> >> > course these days we do have a Presentation layer, Web Services >> >> > run on >> >> > HTTP. But unlike the OSI presentation layer, ours does not >> introduce >> >> > extra moving parts. >> >> > >> >> > It seems to me that if we really believed in IP everywhere >> and IP >> >> > end-to-end we would insist that network switches be IP >> routers that >> >> > can be managed using BGP/OSPF or at least routing tables >> rather than >> >> > heuristic devices that try to guess where packets should go >> based on >> >> > goat entrails, phases of the moon or whatever they use. >> >> > >> >> > >> >> > What should have happened many moons ago was that DHCP >> should have >> >> > become a bidirectional protocol or a bootstrap to a >> bidirectional >> >> > protocol. So when a printer joins the network, it >> authenticates and >> >> > tells the network what it is. And this is all defined in >> one set of >> >> > specifications from one organization, none of which assumes >> that >> >> > security is an 'advanced', 'optional' or 'enterprise' feature. >> >> > >> >> > Instead we have an ad-hoc layer trying to achieve the same >> result in >> >> > peer-to-peer fashion. A similar approach works for frogs as a >> >> > reproductive mechanism but only at the species level. It >> certainly >> >> > does not work for the individual ova which may or may not >> connect to >> >> > the printer it is trying to use to print the kids damned >> homework. >> >> > >> >> > >> >> > Seriously, the fact that things have scaled thus far and >> the 1% can >> >> > get them to work does not mean that we can get to the next >> level >> >> > without a serious rethink of the local network architecture. >> >> > >> >> > The type of device I think we need would be first and >> foremost an IP >> >> > router. It would have ethernet plugs on the box and use >> ethernet >> >> > layer >> >> > 1 specs. But when a another 'True-IP' device was plugged in, it >> >> > would >> >> > quickly negotiate a direct IP connection, oh and with >> proper 64KB >> >> > packets. It would also, authenticate, announce and turn on link >> >> > layer >> >> > encryption. >> >> > >> >> > Such a device would also be a legacy router. It would fake >> all the >> >> > signals necessary for a legacy ethernet device to function. >> It would >> >> > also be responsible for maintaining the local information >> for the >> >> > network service database and intercommunicating with other >> hubs to >> >> > achieve a global network view. >> >> > >> >> > >> >> > The net result of all this would be that I would never ever >> need to >> >> > install another printer (no, it is not actually necessary >> for every >> >> > stupid printer to have its own stupid printer driver). >> Opening the >> >> > 'printers' folder would automatically show every printer >> that is on >> >> > the network or can be woken from slumber by the hub it >> connects to. >> >> > >> >> > >> >> > >> >
- Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Michael Richardson
- Re: Time to kill layer 2 chopps
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Christopher Morrow
- Re: Time to kill layer 2 Charlie Perkins
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Brian E Carpenter
- Re: Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Dimitri Staessens
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Carlos M. Martinez
- RE: Time to kill layer 2 Chaitanya D
- Re: Time to kill layer 2 Dimitri Staessens
- Re: Time to kill layer 2 Dimitri Staessens
- Re: Time to kill layer 2 Time Warner Cable
- Re: Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Phillip Hallam-Baker