Ken Calvert* University of Kentucky *Speaking for myself only.

7
Internet Protocol Considered Harmful Ken Calvert* University of Kentucky *Speaking for myself only

Transcript of Ken Calvert* University of Kentucky *Speaking for myself only.

Page 1: Ken Calvert* University of Kentucky *Speaking for myself only.

Internet ProtocolConsidered Harmful

Ken Calvert*University of Kentucky

*Speaking for myself only

Page 2: Ken Calvert* University of Kentucky *Speaking for myself only.

Proposition

The Internet Protocol (v4) isat best useless,and at worst harmful,

in home networksconsisting of a NAT-ed, single broadcast

domain.

(Belief: this covers most cases.)

Page 3: Ken Calvert* University of Kentucky *Speaking for myself only.

The “Mass Market” Case

Internet

NAT Gateway/Bridge/Router

Page 4: Ken Calvert* University of Kentucky *Speaking for myself only.

1. IP is unnecessary

Inside clients don’t know (or need to know) anything about their own IP addresses

IP functionality is superfluous Single broadcast domain bridging suffices MAC addresses provide both▪ Global uniqueness▪ Technology-independence

Inside IP addresses are meaningless outside Name resolution (if any) can/should use

MAC addresses

Page 5: Ken Calvert* University of Kentucky *Speaking for myself only.

2. IP Causes Headaches in the Home

Requires that the user act as network administrator Choose: static addressing or DHCP? Network prefix? Where is my DHCP server(s)?

Endpoints must allow configuration endpoints can be misconfigured E.g., someone changes host to a static IP address Now the user must also diagnose the problem!▪ With inadequate tools

▪ No way to “RESET” the whole network!

Page 6: Ken Calvert* University of Kentucky *Speaking for myself only.

What’s the alternative?

Third option: “Ignore IP” Should be the default Force user to say “I know what I’m doing” to use

any other option (static assignment or DHCP) Let endpoints use arbitrary IP addresses

Local-scope addresses for uniqueness Transport demux still works

Identify endpoints with MAC addresses Inside applications Ethernet was designed for this!

Note: already happening in data centers

Page 7: Ken Calvert* University of Kentucky *Speaking for myself only.

An Approach

Rely on MAC addresses Establish identities/function of devices Switch based on MAC addresses Infer (some) intent from port numbers

Partial prototype implementation “HomeRun” [Hasan, Edwards, Feamster,

Calvert] Built on NOX Box platform Todo: mechanism for establishing

identities/functions and getting to a “known good” state