< draft-ietf-ipngwg-router-renum-09.txt   draft-ietf-ipngwg-router-renum-10.txt >
IPng Working Group Matt Crawford IPng Working Group Matt Crawford
Internet Draft Fermilab Internet Draft Fermilab
June 25, 1999 March 10, 2000
Router Renumbering for IPv6 Router Renumbering for IPv6
<draft-ietf-ipngwg-router-renum-09.txt> <draft-ietf-ipngwg-router-renum-10.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC 2026. Internet-Drafts are all provisions of Section 10 of RFC 2026. Internet-Drafts are
working documents of the Internet Engineering Task Force (IETF), its working documents of the Internet Engineering Task Force (IETF), its
areas, and its working groups. Note that other groups may also areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts. distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six Internet-Drafts are draft documents valid for a maximum of six
skipping to change at page 21, line 4 skipping to change at page 21, line 4
may be exploited to permit shared management of a border router, for may be exploited to permit shared management of a border router, for
example, or to discard all Router Renumbering traffic arriving over example, or to discard all Router Renumbering traffic arriving over
tunnels. tunnels.
9. Implementation and Usage Advice for Reliability 9. Implementation and Usage Advice for Reliability
Users of Router Renumbering will want to be sure that every non- Users of Router Renumbering will want to be sure that every non-
trivial message reaches every intended router. Well-considered trivial message reaches every intended router. Well-considered
exploitation of Router Renumbering's retransmission and response- exploitation of Router Renumbering's retransmission and response-
directing features should make that goal achievable with high directing features should make that goal achievable with high
confidence in a modestly reliable network. confidence even in a minimally reliable network.
In one set of cases, probably the majority, the network management In one set of cases, probably the majority, the network management
station will know the complete set of routers under its control. station will know the complete set of routers under its control.
Commands can be retransmitted, with the "R" (Reply-requested) flag Commands can be retransmitted, with the "R" (Reply-requested) flag
set in the RR header, until Results have been collected from all set in the RR header, until Results have been collected from all
routers. If unicast Security Associations (or the means for routers. If unicast Security Associations (or the means for
creating them) are available, the management station may switch from creating them) are available, the management station may switch from
multicast to unicast transmission when the number of routers still multicast to unicast transmission when the number of routers still
unheard-from is suitably small. unheard-from is suitably small.
skipping to change at page 22, line 43 skipping to change at page 22, line 43
Pp A presumptive, pessimistic initial estimate of the lower Pp A presumptive, pessimistic initial estimate of the lower
bound of the round-trip probability, P, to prevent early bound of the round-trip probability, P, to prevent early
termination. (See below.) Default 0.75. termination. (See below.) Default 0.75.
Ti The initial time between Command retransmissions. Default 4 Ti The initial time between Command retransmissions. Default 4
seconds. MaxDelay milliseconds (see section 4.1) must be seconds. MaxDelay milliseconds (see section 4.1) must be
added to the retransmission timer. Knowledge of the added to the retransmission timer. Knowledge of the
routers' processing time for RR Commands may influence the routers' processing time for RR Commands may influence the
setting of Ti. Ti+MaxDelay is also the minimum time the setting of Ti. Ti+MaxDelay is also the minimum time the
management must wait for Results after each transmission management station must wait for Results after each
before computing a new confidence level. The phrase "end of transmission before computing a new confidence level. The
the Nth interval" means a time Ti+MaxDelay after the Nth phrase "end of the Nth interval" means a time Ti+MaxDelay
transmission of a Command. after the Nth transmission of a Command.
Tu The upper bound on the period between Command Tu The upper bound on the period between Command
retransmissions. Default 512 seconds. retransmissions. Default 512 seconds.
The following variables, some a function of the retransmission The following variables, some a function of the retransmission
counter N, are used in the next section. counter N, are used in the next section.
T(N) The time between Command transmissions N and N+1 is V*T(N) + T(N) The time between Command transmissions N and N+1 is V*T(N) +
MaxDelay, where V is random and roughly uniform in the range MaxDelay, where V is random and roughly uniform in the range
[0.75, 1.0]. T(1) = Ti and for N > 1, T(N) = min(2*T(N-1), [0.75, 1.0]. T(1) = Ti and for N > 1, T(N) = min(2*T(N-1),
skipping to change at page 28, line 21 skipping to change at page 28, line 21
expertise. Relentless browbeating by various IESG members may have expertise. Relentless browbeating by various IESG members may have
improved the final quality of this specification. improved the final quality of this specification.
12. References 12. References
[AARCH] Hinden, R. and S. Deering, "IP Version 6 Addressing [AARCH] Hinden, R. and S. Deering, "IP Version 6 Addressing
Architecture", RFC 2373. Architecture", RFC 2373.
[AH] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402. [AH] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402.
[ANM] Isaacson, E. and H. B. Keller, "Analysis of Numerical Methods", [ANM] Isaacson, E. and H. B. Keller, "Analysis of Numerical
John Wiley & Sons, New York, 1966. Methods", John Wiley & Sons, New York, 1966.
[ESP] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload [ESP] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload
(ESP)", RFC 2406. (ESP)", RFC 2406.
[IANACON] Narten, T. and H. T. Alvestrand, "Guidelines for Writing [IANACON] Narten, T. and H. T. Alvestrand, "Guidelines for Writing
an IANA Considerations Section in RFCs", RFC 2434. an IANA Considerations Section in RFCs", RFC 2434.
[ICMPV6] Conta, A. and S. Deering, "Internet Control Message [ICMPV6] Conta, A. and S. Deering, "Internet Control Message
Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6)", Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6)",
RFC 2460. RFC 2460.
 End of changes. 6 change blocks. 
9 lines changed or deleted 10 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/