From patchwork Mon May 7 01:38:21 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Linus_L=C3=BCssing?= X-Patchwork-Id: 17338 Return-Path: X-Original-To: patchwork@open-mesh.org Delivered-To: patchwork@open-mesh.org Received: from open-mesh.org (localhost [IPv6:::1]) by open-mesh.org (Postfix) with ESMTP id 15622822FF; Mon, 7 May 2018 03:38:38 +0200 (CEST) Received-SPF: None (mailfrom) identity=mailfrom; client-ip=138.201.29.205; helo=mail.aperture-lab.de; envelope-from=linus.luessing@c0d3.blue; receiver= Received: from mail.aperture-lab.de (mail.aperture-lab.de [138.201.29.205]) by open-mesh.org (Postfix) with ESMTPS id BFA6B8092A for ; Mon, 7 May 2018 03:38:34 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.aperture-lab.de (Postfix) with ESMTP id 46077E04F1; Mon, 7 May 2018 03:38:34 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at aperture-lab.de Received: from mail.aperture-lab.de ([127.0.0.1]) by localhost (mail.aperture-lab.de [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id GBc-WM0E9nGP; Mon, 7 May 2018 03:38:32 +0200 (CEST) Received: from localhost (unknown [IPv6:2a01:170:1112:0:bcd7:94ff:fefd:2ddd]) (Authenticated sender: linus.luessing@c0d3.blue) by mail.aperture-lab.de (Postfix) with ESMTPSA; Mon, 7 May 2018 03:38:32 +0200 (CEST) From: =?utf-8?q?Linus_L=C3=BCssing?= To: b.a.t.m.a.n@lists.open-mesh.org Date: Mon, 7 May 2018 03:38:21 +0200 Message-Id: <20180507013823.739-1-linus.luessing@c0d3.blue> X-Mailer: git-send-email 2.17.0 MIME-Version: 1.0 Subject: [B.A.T.M.A.N.] [PATCH v3 0/2] batman-adv: DHCP snooping for DAT X-BeenThere: b.a.t.m.a.n@lists.open-mesh.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: The list for a Better Approach To Mobile Ad-hoc Networking List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: The list for a Better Approach To Mobile Ad-hoc Networking Errors-To: b.a.t.m.a.n-bounces@lists.open-mesh.org Sender: "B.A.T.M.A.N" Finally, after some more discussions, observations and better overall understanding of the issue we were able to find a successful strategy for ARP reduction. The result is an additional patch which introduces a generic "noflood mark" which for ARP Requests means a prevention of the DAT broadcast fallback. At Freifunk Darmstadt, an 800 nodes setup, these two patches were tested for a month with no issues so far but a significant amount of ARP Request reduction. More details can be found here: https://www.open-mesh.org/projects/batman-adv/wiki/DAT_DHCP_Snooping Regards, Linus