Re: Time to kill layer 2
Ted Lemon <mellon@fugue.com> Thu, 14 April 2016 21:57 UTC
Return-Path: <mellon@fugue.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB8A112D955 for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 14:57:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fugue-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NSufsp29isNT for <ietf@ietfa.amsl.com>; Thu, 14 Apr 2016 14:57:20 -0700 (PDT)
Received: from mail-lf0-x22e.google.com (mail-lf0-x22e.google.com [IPv6:2a00:1450:4010:c07::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2888F12D9A9 for <ietf@ietf.org>; Thu, 14 Apr 2016 14:57:20 -0700 (PDT)
Received: by mail-lf0-x22e.google.com with SMTP id e190so125163158lfe.0 for <ietf@ietf.org>; Thu, 14 Apr 2016 14:57:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fugue-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=bGi65gjzPbZOgl6MpYcl+PFNihrP/XzlXTP7VmPR10c=; b=DK/G4hcFqDO4z3iccGgS5KLektfi9rBycheC6gqFmzeZWSOD/GFucitPZ86+QFz/0r +zK2Zxg5DnaOORagUloOryk5gZrOgOIVfQQpQi2FkMOqtpZn2GnMLJLQIxP9CAYrS/P3 GzvnIg5XUJgY2N+Qqctq4G6KmbhLcHkmIRkIqXCr7FcEYLOAovGSgSChEaf58X4Hlf2a A+cQ8lx79m4xr+pzo4GzthYtwBg5oL2qvp0bNFf6wzq10I/kYAG+lsWuaqkfK7neUMxj jRbwrlsEXPFXkVbFZBdU5KJCR8+U3kYMNsPH9yk4JcGr3iNkdKpPnHYyG8G39kpPBe8Q Wz0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=bGi65gjzPbZOgl6MpYcl+PFNihrP/XzlXTP7VmPR10c=; b=l7vDZagIAmemUehTt9gOC6frX43YqysPguXhwEjATBraLMZXzD+mFcBevZVQX6gC/R nASy2qRcJxe/rtgH9ilhb1RCly140jU/G5yRSmo4tKgrr3KdQSn2Yyxkz5zAh8LsuRe1 meQfLSZ4PYIZSj+cdJKZFW1dNGhJwuuMT7rhqYNPzqP3k9u1KstXgxpnYyzfRnr1N0V7 1fmpAkdG23WjFLhyhvOBuM9iIuXu30BOmuerYf7J4hs5xSjQJ0f/W7ccOZJED4HORX8N UMGMZtuRD02+UR5ckUSpcycbbZetb9xxOHTSkWoEudv30754HNKJb/AovHz3jS3RN267 qUHg==
X-Gm-Message-State: AOPr4FW3wypLpzr67O/KtoMDUWKCh7Yyz8me9/4Edh24gpnZwItLEiRdcurahzsk/wH7e2Hj8W0z4e3BwqkZMA==
X-Received: by 10.25.32.213 with SMTP id g204mr4520031lfg.119.1460671038308; Thu, 14 Apr 2016 14:57:18 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.213.19 with HTTP; Thu, 14 Apr 2016 14:56:38 -0700 (PDT)
X-Originating-IP: [71.233.41.235]
In-Reply-To: <571011B2.9080003@intec.ugent.be>
References: <CAMm+Lwg-HTYCv2pGt=SP2+Xjoko6GcJ73kVzqXC1LBTOMDKV_A@mail.gmail.com> <571011B2.9080003@intec.ugent.be>
From: Ted Lemon <mellon@fugue.com>
Date: Thu, 14 Apr 2016 17:56:38 -0400
Message-ID: <CAPt1N1m71Vx6LX-dTuHVoYfZG_X7wykax2QMteqFjcsRt+RThw@mail.gmail.com>
Subject: Re: Time to kill layer 2
To: Dimitri Staessens <dimitri.staessens@intec.ugent.be>
Content-Type: multipart/alternative; boundary="001a11401fec5f596a053078fafe"
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/oNpmRceDYaJONsUvZWIQLKKADkw>
Cc: ietf <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Apr 2016 21:57:22 -0000
Of course! On Thu, Apr 14, 2016 at 5:54 PM, Dimitri Staessens < dimitri.staessens@intec.ugent.be> wrote: > anyone thought of killing everything on top of layer 2? > > > On 04/14/16 14:59, Phillip Hallam-Baker wrote: > >> This morning I spent an hour debugging the network to print out two >> class projects that were due. Some points: >> >> 1) My ability to debug the network is better than 99% of the population >> 2) The interaction of Bonjour, DHCP and auto power saving is unfortunate >> 3) Things should still work after I have been away for a week >> 4) If vendors want to be selling all that IoT gear, they have to solve >> these issues. >> >> 5) I want someone to blame. Right now when the network doesn't work, I >> don't know who is the cause. I want one point of contact. Whoever is >> that point of contact will get most of my networking money. >> >> >> One of the biggest headaches in debugging is that 'smart hubs' are >> not. They are actually very stupid. They make assumptions of network >> topology that are not true. Another is the unfortunate implementation >> of DHCP. >> >> I don't use SNMP for a simple reason - it is not available to most >> ordinary people. I want to understand networking for the 99%, not the >> IETF 1%-ers. >> >> All this networking gear is presented to me as black boxes over which >> I have absolutely no control (which is fine-ish) and no visibility. >> >> What we have today is the product of a historical process. I remember >> the days when Ethernet ran on 10BaseT. But I installed my first switch >> 30 years ago and it has been a switched protocol for 20 years now. >> >> >> It seems to me that there is a business opportunity for any vendor who >> takes the rather obvious step of simplifying the system. >> >> People talk about 'IP everywhere' and 'IP end-to-end' which is rather >> odd when you think about the fact that virtually every local network >> uses MAC addresses for routing. >> >> One of the reasons that IP won against OSI was that it was simpler. >> Applications ran on top of the IP layer with only TCP inbetween. Of >> course these days we do have a Presentation layer, Web Services run on >> HTTP. But unlike the OSI presentation layer, ours does not introduce >> extra moving parts. >> >> It seems to me that if we really believed in IP everywhere and IP >> end-to-end we would insist that network switches be IP routers that >> can be managed using BGP/OSPF or at least routing tables rather than >> heuristic devices that try to guess where packets should go based on >> goat entrails, phases of the moon or whatever they use. >> >> >> What should have happened many moons ago was that DHCP should have >> become a bidirectional protocol or a bootstrap to a bidirectional >> protocol. So when a printer joins the network, it authenticates and >> tells the network what it is. And this is all defined in one set of >> specifications from one organization, none of which assumes that >> security is an 'advanced', 'optional' or 'enterprise' feature. >> >> Instead we have an ad-hoc layer trying to achieve the same result in >> peer-to-peer fashion. A similar approach works for frogs as a >> reproductive mechanism but only at the species level. It certainly >> does not work for the individual ova which may or may not connect to >> the printer it is trying to use to print the kids damned homework. >> >> >> Seriously, the fact that things have scaled thus far and the 1% can >> get them to work does not mean that we can get to the next level >> without a serious rethink of the local network architecture. >> >> The type of device I think we need would be first and foremost an IP >> router. It would have ethernet plugs on the box and use ethernet layer >> 1 specs. But when a another 'True-IP' device was plugged in, it would >> quickly negotiate a direct IP connection, oh and with proper 64KB >> packets. It would also, authenticate, announce and turn on link layer >> encryption. >> >> Such a device would also be a legacy router. It would fake all the >> signals necessary for a legacy ethernet device to function. It would >> also be responsible for maintaining the local information for the >> network service database and intercommunicating with other hubs to >> achieve a global network view. >> >> >> The net result of all this would be that I would never ever need to >> install another printer (no, it is not actually necessary for every >> stupid printer to have its own stupid printer driver). Opening the >> 'printers' folder would automatically show every printer that is on >> the network or can be woken from slumber by the hub it connects to. >> >> >
- Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Michael Richardson
- Re: Time to kill layer 2 chopps
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Christopher Morrow
- Re: Time to kill layer 2 Charlie Perkins
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Brian E Carpenter
- Re: Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Dimitri Staessens
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Carlos M. Martinez
- RE: Time to kill layer 2 Chaitanya D
- Re: Time to kill layer 2 Dimitri Staessens
- Re: Time to kill layer 2 Dimitri Staessens
- Re: Time to kill layer 2 Time Warner Cable
- Re: Time to kill layer 2 Phillip Hallam-Baker
- Re: Time to kill layer 2 Ted Lemon
- Re: Time to kill layer 2 Phillip Hallam-Baker