| < draft-ietf-manet-olsrv2-management-snapshot-02.txt | draft-ietf-manet-olsrv2-management-snapshot-03.txt > | |||
|---|---|---|---|---|
| Network Working Group T. Clausen | Network Working Group T. Clausen | |||
| Internet-Draft LIX, Ecole Polytechnique | Internet-Draft LIX, Ecole Polytechnique | |||
| Intended status: Informational U. Herberg | Intended status: Informational U. Herberg | |||
| Expires: February 8, 2015 Fujitsu Laboratories of America | Expires: March 19, 2015 Fujitsu Laboratories of America | |||
| August 7, 2014 | September 15, 2014 | |||
| Snapshot of OLSRv2-Routed MANET Management | Snapshot of OLSRv2-Routed MANET Management | |||
| draft-ietf-manet-olsrv2-management-snapshot-02 | draft-ietf-manet-olsrv2-management-snapshot-03 | |||
| Abstract | Abstract | |||
| This document describes how Mobile Ad Hoc Networks (MANETs) are | This document describes how Mobile Ad Hoc Networks (MANETs) are | |||
| typically managed, in terms of pre-deployment management, as well as | typically managed, in terms of pre-deployment management, as well as | |||
| rationale and means of monitoring and management of MANET routers | rationale and means of monitoring and management of MANET routers | |||
| running the Optimized Link State Routing protocol version 2 (OLSRv2) | running the Optimized Link State Routing protocol version 2 (OLSRv2) | |||
| and its constituent MANET NehgiborHood Discovery Protocol (NHDP). | and its constituent MANET Neighborhood Discovery Protocol (NHDP). | |||
| Apart from pre-deployment management for setting up IP addresses and | Apart from pre-deployment management for setting up IP addresses and | |||
| security related credentials, OLSRv2 only needs routers to agree one | security related credentials, OLSRv2 only needs routers to agree one | |||
| single parameter (called "C"). Other parameters for tweaking network | single configuration parameter (called "C"). Other parameters for | |||
| performance may be determined during operation of the network, and | tweaking network performance may be determined during operation of | |||
| need not be the same in all routers. This, using MIB modules and | the network, and need not be the same in all routers. This, using | |||
| related management protocols such as SNMP (or possibly other, less | MIB modules and related management protocols such as SNMP (or | |||
| "chatty", protocols). In addition, for debugging purposes, | possibly other, less "chatty", protocols). In addition, for | |||
| monitoring data and performance related counters, as well as | debugging purposes, monitoring data and performance related counters, | |||
| notifications ("traps") can be sent to the Network Management System | as well as notifications ("traps") can be sent to the Network | |||
| (NMS) via standardized management protocols. This document | Management System (NMS) via standardized management protocols. | |||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on February 8, 2015. | This Internet-Draft will expire on March 19, 2015. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2014 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 26 ¶ | skipping to change at page 2, line 26 ¶ | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 1.1. Statement of Purpose . . . . . . . . . . . . . . . . . . . 3 | 1.1. Statement of Purpose . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Pre-Deployment Management . . . . . . . . . . . . . . . . . . 4 | 3. Pre-Deployment Management . . . . . . . . . . . . . . . . . . 4 | |||
| 3.1. Lower Layer Alignment . . . . . . . . . . . . . . . . . . 4 | 3.1. Lower Layer Alignment . . . . . . . . . . . . . . . . . . 4 | |||
| 3.2. Interface Addresses . . . . . . . . . . . . . . . . . . . 4 | 3.2. Interface Addresses . . . . . . . . . . . . . . . . . . . 4 | |||
| 3.3. Security Material . . . . . . . . . . . . . . . . . . . . 5 | 3.3. Security Material . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3.4. The Value of C . . . . . . . . . . . . . . . . . . . . . . 5 | 3.4. The Value of C . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. How do we Manage OLSRv2-based MANETs? . . . . . . . . . . . . 5 | 4. How do we Manage OLSRv2-based MANETs? . . . . . . . . . . . . 6 | |||
| 4.1. Internal Management . . . . . . . . . . . . . . . . . . . 6 | 4.1. Internal Management . . . . . . . . . . . . . . . . . . . 6 | |||
| 4.2. External Management . . . . . . . . . . . . . . . . . . . 6 | 4.2. External Management . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. What and Why do we Manage and Monitor? . . . . . . . . . . . . 7 | 5. What and Why do we Manage and Monitor? . . . . . . . . . . . . 7 | |||
| 6. Typical Communication Patterns . . . . . . . . . . . . . . . . 8 | 6. Typical Communication Patterns . . . . . . . . . . . . . . . . 9 | |||
| 7. This Document does not Constrain how to Manage and Monitor | 7. This Document does not Constrain how to Manage and Monitor | |||
| MANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 | MANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 | 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 | |||
| 9. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | 9. Security Considerations . . . . . . . . . . . . . . . . . . . 12 | |||
| 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 12 | 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 11. Informative References . . . . . . . . . . . . . . . . . . . . 12 | 11. Informative References . . . . . . . . . . . . . . . . . . . . 12 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14 | |||
| 1. Introduction | 1. Introduction | |||
| The MANET routing protocol OLSRv2 [RFC7181], as well as its | The MANET routing protocol OLSRv2 [RFC7181], as well as its | |||
| constituent parts NHDP [RFC6130], [RFC5497], [RFC5148], [RFC5444], | constituent parts NHDP [RFC6130], [RFC5497], [RFC5148], [RFC5444], | |||
| [RFC7182], [RFC7183], is designed to autonomously maintain routes | [RFC7182], [RFC7183], [RFC7187], [RFC7188] is designed to | |||
| across a dynamic network topology. OLSRv2 is designed so as to | autonomously maintain routes across a dynamic network topology. | |||
| minimize operator intervention throughout the duration of a network | OLSRv2 is designed so as to minimize operator intervention throughout | |||
| deployment, and to allow for heterogeneous configuration of routers | the duration of a network deployment, and to allow for heterogeneous | |||
| within the same network deployment: most configuration values are | configuration of routers within the same network deployment: most | |||
| either of local significance only (e.g., message jitter parameters) | configuration values are either of local significance only (e.g., | |||
| or, when they are not, are carried in control signals exchanged | message jitter parameters) or, when they are not, are carried in | |||
| between routers (e.g., information validity time). | control signals exchanged between routers (e.g., information validity | |||
| time). | ||||
| All the same, a small set of configuration options must be | All the same, a small set of configuration options must be | |||
| established in each router prior to deployment, with some requiring | established in each router prior to deployment, with some requiring | |||
| agreement among all the routers within the same deployment. | agreement among all the routers within the same deployment. | |||
| Furthermore, throughout the duration of a network deployment, | Furthermore, throughout the duration of a network deployment, | |||
| external management and monitoring of a network may be desirable, | external management and monitoring of a network may be desirable, | |||
| e.g., for performance optimization or debugging purposes. | e.g., for performance optimization or debugging purposes. | |||
| 1.1. Statement of Purpose | 1.1. Statement of Purpose | |||
| skipping to change at page 3, line 39 ¶ | skipping to change at page 3, line 40 ¶ | |||
| such environment may present distinctly different requirements as to | such environment may present distinctly different requirements as to | |||
| management and monitoring. | management and monitoring. | |||
| This document does therefore explicitly not pretend to provide an | This document does therefore explicitly not pretend to provide an | |||
| exhaustive description of how all OLSRv2 network deployments should | exhaustive description of how all OLSRv2 network deployments should | |||
| be managed and monitored - and does, specifically, not prescribe any | be managed and monitored - and does, specifically, not prescribe any | |||
| management model. This document also does not address management of | management model. This document also does not address management of | |||
| MANET routing protocols, other than OLSRv2 (and its constituent | MANET routing protocols, other than OLSRv2 (and its constituent | |||
| protocols). | protocols). | |||
| What this document does, however, is to present how some OLSRv2 | What this document does, however, is to present how typical OLSRv2 | |||
| network deployments are managed and monitored, using well-established | network deployments are managed and monitored, using well-established | |||
| management patterns and well-known protocols. In particular, this | management patterns and well-known protocols. In particular, this | |||
| document addresses several of the consideration from [RFC5706], in | document addresses several of the consideration from [RFC5706], in | |||
| particular Section 3 ("Management Considerations - How Will the | particular Section 3 ("Management Considerations - How Will the | |||
| Protocol Be Managed?"). | Protocol Be Managed?"). | |||
| 2. Terminology | 2. Terminology | |||
| This document uses terminology from [RFC7181], [RFC6130], and | This document uses terminology from [RFC7181], [RFC6130], and | |||
| [RFC5497]. | [RFC5497]. | |||
| skipping to change at page 4, line 24 ¶ | skipping to change at page 4, line 24 ¶ | |||
| Interoperability between routers requires alignment of lower protocol | Interoperability between routers requires alignment of lower protocol | |||
| layers below OLSRv2. In particular, all routers in the same MANET | layers below OLSRv2. In particular, all routers in the same MANET | |||
| topology must be pre-configured to use the same IP address family | topology must be pre-configured to use the same IP address family | |||
| (IPv4 or IPv6). In a single OLSRv2 topology, it is not possible to | (IPv4 or IPv6). In a single OLSRv2 topology, it is not possible to | |||
| mix IPv4 and IPv6 addresses, notably because [RFC5444] messages can | mix IPv4 and IPv6 addresses, notably because [RFC5444] messages can | |||
| contain either IPv4 *or* IPv6 addresses, but not both at the same | contain either IPv4 *or* IPv6 addresses, but not both at the same | |||
| time. It is, however, possible to run two instances of OLSRv2, one | time. It is, however, possible to run two instances of OLSRv2, one | |||
| instance for IPv4 and another one for IPv6, within the same network. | instance for IPv4 and another one for IPv6, within the same network. | |||
| In addition to the IP address family, other lower layer parameters | In addition to the IP address family, other lower layer parameters | |||
| may also need to be aligned, e.g., radio channel selections. A | may also need to be aligned, e.g., MAC as well as radio channel | |||
| single OLSRv2 topology may, of course, span different link layers (or | selections. A single OLSRv2 topology may, of course, span different | |||
| the same link layer with different configuration settings such as | link layers (or the same link layer with different configuration | |||
| cryptographic keys) when routers in the topology have OLSRv2 | settings such as cryptographic keys) when routers in the topology | |||
| interfaces towards these different link layers. | have OLSRv2 interfaces towards these different link layers. | |||
| 3.2. Interface Addresses | 3.2. Interface Addresses | |||
| According to [RFC6130], and as used by [RFC7181], each interface of a | According to [RFC6130], and as used by [RFC7181], each interface of a | |||
| router must be configured with at least one IP address. [RFC6130] | router must be configured with at least one IP address. [RFC6130] | |||
| provides guidance as to the characteristics of such IP addresses, | provides guidance as to the characteristics of such IP addresses, | |||
| including the (limited) conditions under which an IP address may be | including the (limited) conditions under which a single IP address | |||
| configured on multiple interfaces. | may be configured on multiple interfaces. | |||
| While automatic configuration of IP addresses on router interfaces is | While automatic configuration of IP addresses on router interfaces is | |||
| not excluded, currently no address autoconfiguration protocols have | not excluded, currently no address autoconfiguration protocols have | |||
| been standardized (in the IETF) to accomplish this. As a | been standardized (in the IETF) to accomplish this. As a | |||
| consequence, static configuration, or proprietary (as in: non- | consequence, static configuration, or proprietary (as in: non- | |||
| standardized) protocols ensure this. | standardized) protocols ensure this. | |||
| Note that this required pre-deployment of interface addresses does | Note that [RFC6130] and [RFC7181] permit to dynamically add or remove | |||
| not include "external" IP addresses, i.e., IP addresses that are | IP addresses as part of normal network operation. This applies for | |||
| configured on local non-MANET interfaces or IP addresses from remote | local MANET interfaces, as well as for local non-MANET interfaces or | |||
| destinations reachable through this router (i.e., addresses for which | IP addresses from remote destinations reachable through this router | |||
| this router serves as gateway). These can be added or removed | (i.e., addresses for which this router serves as gateway). Interface | |||
| dynamically during runtime of OLSRv2. Such local non-MANET interface | ||||
| addresses are managed by way of the Local Interface Set (as defined | addresses are managed by way of the Local Interface Set (as defined | |||
| in [RFC6130]) and remote addresses by way of the Attached Network Set | in [RFC6130]) and remote addresses by way of the Attached Network Set | |||
| (as defined in [RFC7181]). | (as defined in [RFC7181]). | |||
| 3.3. Security Material | 3.3. Security Material | |||
| Security material (keys, algorithms, etc.) must be available for | Security material (keys, algorithms, etc.) must be available for | |||
| generating Integrity Check Values (ICVs) for outgoing control | generating Integrity Check Values (ICVs) for outgoing control | |||
| messages, and to allow validating ICVs in incoming control messages | messages, and to allow validating ICVs in incoming control messages | |||
| [RFC7182] [RFC7183]. | [RFC7182] [RFC7183]. | |||
| The appropriate way of making such security material available is | The appropriate way of making such security material available is | |||
| dependent on the deployment type. For example, community networks | dependent on the deployment type. For example, community networks | |||
| (such as "Funkfeuer", http://funkfeuer.at), do currently not use any | (such as "Funkfeuer", http://funkfeuer.at), do currently not use any | |||
| security at all. Other deployment types may use a simple manual | security at all. Other deployment types may use a simple manual | |||
| shared key distribution mechanism, or may use a proprietary key | shared key distribution mechanism, or may use a proprietary key | |||
| distribution protocol. Tactical networks have much more stringent | distribution protocol. Tactical networks have much more stringent | |||
| requirements for distributing key material, e.g., using manual | requirements for distributing key material, e.g., using manual | |||
| distribution of the keys on encrypted USB keys, and with defensive | distribution of the keys on encrypted USB flash drives, and with | |||
| mechanisms (up to and including mechanisms involving depleted | defensive mechanisms (up to and including mechanisms involving | |||
| uranium) if the keys are compromised. | depleted uranium) if the keys are compromised. | |||
| In general, Automatic Key Management (AKM) as well as static/manual | In general, Automatic Key Management (AKM) as well as static/manual | |||
| or other out-of-band mechanisms, can be viable options for | or other out-of-band mechanisms, can be viable options for | |||
| distributing keys. Currently, no standardized AKM mechanism for | distributing keys. Currently, no standardized AKM mechanism for | |||
| MANETs exist. If the IETF standardizes such mechanisms in the | MANETs exist. If the IETF standardizes such mechanisms in the | |||
| future, for deployment types where such is appropriate, these can be | future, for deployment types where such is appropriate, these can be | |||
| used for distributing keys. Until such time, manual key distribution | used for distributing keys (with the obvious chicken-and-egg problem | |||
| as well as proprietary mechanisms, prevail. | of using the routing fabric that is being constructed to distribute | |||
| the keys to establish that fabric). Until such an AKM mechanism is | ||||
| standardized, manual key distribution as well as proprietary | ||||
| mechanisms prevail. | ||||
| The important point to make here, however, is that by whichever | The important point to make here, however, is that by whichever | |||
| method (automatic/manual, dynamic/static, ... ) a key and other | method (automatic/manual, dynamic/static, ... ) a key and other | |||
| security material is made available, the security mechanisms of | security material is made available, the security mechanisms of | |||
| OLSRv2, as defined by [RFC7183], will be able to properly use it for | OLSRv2, as defined by [RFC7183], will be able to properly use it for | |||
| generating and validating ICVs. | generating and validating ICVs. | |||
| 3.4. The Value of C | 3.4. The Value of C | |||
| The only pre-deployment configuration parameter that directly impacts | The only pre-deployment configuration parameter that directly impacts | |||
| protocol operation is the value of C. This value is used by each | protocol operation is the value of C. This value is used by each | |||
| router for calculating the representation of interval and validity | router for calculating the representation of interval and validity | |||
| time, as included in control messages. All routers in a deployment | time, as included in control messages. All routers in a deployment | |||
| must agree on the value of C, as described in [RFC5497]. | must agree on the value of C, as described in [RFC5497]. Note that | |||
| since all MANET routers inside a MANET must agree to the same value | ||||
| of C before deployment, C is denoted "constant" in [RFC5497] rather | ||||
| than "parameter" as in this document. From a management perspective, | ||||
| C can be considered as configuration parameter prior to operation of | ||||
| the routing protocol. | ||||
| 4. How do we Manage OLSRv2-based MANETs? | 4. How do we Manage OLSRv2-based MANETs? | |||
| A deployed OLSRv2 network is, as previously discussed, operating | A deployed OLSRv2 network is, as previously discussed, operating | |||
| autonomously, but occasionally with internal or external management | autonomously, but occasionally with internal or external management | |||
| operations being desirable, described in the following two sections. | operations being desirable, described in the following two sections. | |||
| 4.1. Internal Management | 4.1. Internal Management | |||
| Internal management describes a local process running on a router | Internal management describes a local process running on a router | |||
| that automatically (i.e., without external messaging or human | that automatically (i.e., without external messaging or human | |||
| interaction) modifies the configuration of OLSRv2 based on different | interaction) modifies the configuration of OLSRv2 based on different | |||
| environmental factors. For example, the HELLO interval may be | environmental factors. In particular, message intervals can be | |||
| updated according to the rate of topology changes measured (or, | updated dynamically and without external management interaction, | |||
| inferred: after all, the 'M' in MANET is for "Mobility") locally: if | e.g., the HELLO interval may be updated according to the rate of | |||
| the rate is high, then a more frequent HELLO update assures that | topology changes measured (or, inferred: after all, the 'M' in MANET | |||
| routes are more accurate. At a lower rate of topology changes, | is for "Mobility") locally: if the rate is high, then a more frequent | |||
| network capacity and energy capacity of the router may be conserved | HELLO update assures that routes are more accurate. At a lower rate | |||
| by increasing the HELLO interval. | of topology changes, network capacity and energy capacity of the | |||
| router may be conserved by increasing the HELLO interval. In | ||||
| addition to message intervals, minimum intervals can have a | ||||
| significant impact on the operation of OLSRv2, and therefore need to | ||||
| be adjusted with care. If, for instance, the minimum interval | ||||
| between two successive HELLO messages (HELLO_MIN_INTERVAL) is set too | ||||
| low, many messages may be sent within a short timeframe, potentially | ||||
| leading to frame collisions or exhaustion of the available bandwidth. | ||||
| Depending on the use case, many different automatic configuration | Depending on the use case, many different automatic configuration | |||
| agents can be envisioned. As parameters in NHDP and OLSRv2 are | agents can be envisioned. As parameters in NHDP and OLSRv2 are | |||
| either only used locally or, in the case of HELLO_INTERVAL and | either only used locally or, in the case of HELLO_INTERVAL and | |||
| REFRESH_INTERVAL, are selected locally and then included in the | REFRESH_INTERVAL, are selected locally and then included in the | |||
| messages exchanged between adjacent routers in their HELLO messages, | messages exchanged between adjacent routers in their HELLO messages, | |||
| none of these automatic local configuration methods needs necessarily | none of these automatic local configuration methods needs necessarily | |||
| to be standardized: different routers doing different things will | to be standardized: different routers doing different things will | |||
| interoperate. | interoperate. | |||
| skipping to change at page 7, line 43 ¶ | skipping to change at page 8, line 9 ¶ | |||
| As indicated earlier, OLSRv2 and its constituent protocol NHDP, are | As indicated earlier, OLSRv2 and its constituent protocol NHDP, are | |||
| reasonably robust with respect to parameter values: a deployment can | reasonably robust with respect to parameter values: a deployment can | |||
| operate with different parameters used in different routers in the | operate with different parameters used in different routers in the | |||
| same network. That being said, adapting these parameters according | same network. That being said, adapting these parameters according | |||
| to circumstances is (often) desired. For example, in a stable | to circumstances is (often) desired. For example, in a stable | |||
| network (such as a wired network), TC messages may be sent | network (such as a wired network), TC messages may be sent | |||
| infrequently and with long validity times, whereas in a highly | infrequently and with long validity times, whereas in a highly | |||
| dynamic network (such as in a vehicular network) TC messages may need | dynamic network (such as in a vehicular network) TC messages may need | |||
| to be sent more frequently and HELLO messages for discovering the | to be sent more frequently and HELLO messages for discovering the | |||
| local topology (almost) continuously. In a similar vein, the message | local topology (almost) continuously. Note that for highly dynamic | |||
| emission intervals and the information validity times should also be | topologies, an alternative to sending control messages very | |||
| commensurate with the available network capacity: millisecond | frequently is to use long message intervals in combination with all | |||
| intervals between TC messages, for example, will consume all | of the permitted responsive mechanisms (e.g., to send an externally | |||
| available network capacity whereas hourly intervals will be | triggered HELLO when the local topology of a router changes) and with | |||
| inappropriate even for a static and stable, wired, network (by way of | low minimum intervals. In this case, it is possible though that one | |||
| simply new routers arriving in the network, which will not "learn" | control message may get lost, and then OLSRv2 needs to react in order | |||
| the network topology before undue long delays). | to avoid a long convergence time. (One possibility is to reduce | |||
| HELLO_INTERVAL to minimum for a few HELLO messages, then restore it). | ||||
| In a similar vein, the message emission intervals and the information | ||||
| validity times should also be commensurate with the available network | ||||
| capacity: millisecond intervals between TC messages, for example, | ||||
| will consume all available network capacity whereas hourly intervals | ||||
| will be inappropriate even for a static and stable, wired, network | ||||
| (by way of simply new routers arriving in the network, which will not | ||||
| "learn" the network topology before undue long delays). | ||||
| This adaptation may happen autonomously by a central NMS monitoring | This adaptation may happen autonomously by a central NMS monitoring | |||
| and adopting the parameters globally, autonomously by an NMS in each | and adopting the parameters globally, autonomously by an NMS in each | |||
| router, monitoring its local topology (and its stability) and | router, monitoring its local topology (and its stability) and | |||
| adapting parameters locally, or by manual operator intervention. | adapting parameters locally, or by manual operator intervention. | |||
| Given the dynamic and evolutive topology of OLSRv2 networks, a highly | Given the dynamic and evolutive topology of OLSRv2 networks, a highly | |||
| desirable property of an NMS is the ability to display and offer | desirable property of an NMS is the ability to display and offer | |||
| visibility of the current network status - for example, to display a | visibility of the current network status - for example, to display a | |||
| graphical map of which routers are currently part of the network. As | graphical map of which routers are currently part of the network. As | |||
| skipping to change at page 10, line 39 ¶ | skipping to change at page 11, line 13 ¶ | |||
| part of the parameter configuration. The particularity of this | part of the parameter configuration. The particularity of this | |||
| is, that it often is a "broadcast configuration operation" where | is, that it often is a "broadcast configuration operation" where | |||
| new key material is supposed to be sent to everybody, and not just | new key material is supposed to be sent to everybody, and not just | |||
| a single router, e.g., leveraging the optimized flooding mechanism | a single router, e.g., leveraging the optimized flooding mechanism | |||
| of OLSRv2. | of OLSRv2. | |||
| 7. This Document does not Constrain how to Manage and Monitor MANETs | 7. This Document does not Constrain how to Manage and Monitor MANETs | |||
| As explained in Section 1, this document describes how, what and why | As explained in Section 1, this document describes how, what and why | |||
| some (typical) OLSRv2 networks are managed and monitored as of 2014. | some (typical) OLSRv2 networks are managed and monitored as of 2014. | |||
| As such, the document is reflexive, not prescriptive: it does not | As such, the document is reflective, not prescriptive: it does not | |||
| stipulate requirements for how to manage OLSRv2 networks, nor does it | stipulate requirements for how to manage OLSRv2 networks, nor does it | |||
| claim to be a complete list of all management patterns or protocols. | claim to be a complete list of all management patterns or protocols. | |||
| Other ways of managing an OLSRv2 network are very well imaginable - | Other ways of managing an OLSRv2 network are very well imaginable - | |||
| now, or in future deployments of OLSRv2. | now, or in future deployments of OLSRv2. | |||
| As an example of such a "future management scenario", rather than | As an example of such a "future management scenario", rather than | |||
| managing and monitoring routers from a central NMS, a distributed, | managing and monitoring routers from a central NMS, a distributed, | |||
| autonomous management system between multiple routers can be | autonomous management system between multiple routers can be | |||
| envisioned. In particular, monitoring data that is used to debug | envisioned. In particular, monitoring data that is used to debug | |||
| network problems and to tweak inefficiencies could be distributed | network problems and to tweak inefficiencies could be distributed | |||
| skipping to change at page 11, line 41 ¶ | skipping to change at page 12, line 21 ¶ | |||
| With that being said, managing an OLSRv2 network requires the ability | With that being said, managing an OLSRv2 network requires the ability | |||
| to inspect and affect the internal state of the routers therein, by | to inspect and affect the internal state of the routers therein, by | |||
| way of mechanisms other than the protocol signals specified for | way of mechanisms other than the protocol signals specified for | |||
| OLSRv2 [RFC7181] and NHDP [RFC6130]. | OLSRv2 [RFC7181] and NHDP [RFC6130]. | |||
| When affecting the state of the OLSRv2 routing process, a management | When affecting the state of the OLSRv2 routing process, a management | |||
| process can be considered as an "outside process" to OLSRv2 and is | process can be considered as an "outside process" to OLSRv2 and is | |||
| then expected to respect (at least) the constraints given in Section | then expected to respect (at least) the constraints given in Section | |||
| 5.5, Section 5.6, and in Appendix A of [RFC7181], as well as in | 5.5, Section 5.6, and in Appendix A of [RFC7181], as well as in | |||
| Section 5.5 and in Appendix B of [RFC6130]. | Section 5.5 and in Appendix B of [RFC6130]. The example from | |||
| Section 4.1 of setting excessively short message intervals, leading | ||||
| to channel capacity exhaustion and frame collisions, demonstrates | ||||
| that such an outside process can harm network stability considerably | ||||
| when not carefully protected against unauthorized or unintended | ||||
| usage. | ||||
| For both inspecting and affecting the state of an OLSRv2 routing | For both inspecting and affecting the state of an OLSRv2 routing | |||
| process by way of a management interface, great care is necessary to | process by way of a management interface, great care is necessary to | |||
| avoid divulging information that should not be exposed, and in | avoid divulging information that should not be exposed, and in | |||
| opening additional vulnerabilities by way of the management | opening additional vulnerabilities by way of the management | |||
| interface. In part, to be able to benefit from securing existing | interface. In part, to be able to benefit from securing existing | |||
| management interfaces, protocols, and implementations, migration to a | management interfaces, protocols, and implementations, migration to a | |||
| standardized management framework is desired, and was one of the | standardized management framework is desired, and was one of the | |||
| motivators for standardizing MIB modules for OLSRv2 and NHDP in the | motivators for standardizing MIB modules for OLSRv2 and NHDP in the | |||
| first place. | first place. | |||
| skipping to change at page 13, line 19 ¶ | skipping to change at page 13, line 50 ¶ | |||
| [RFC7183] Herberg, U., Dearlove, C., and T. Clausen, "Integrity | [RFC7183] Herberg, U., Dearlove, C., and T. Clausen, "Integrity | |||
| Protection for the Neighborhood Discovery Protocol (NHDP) | Protection for the Neighborhood Discovery Protocol (NHDP) | |||
| and Optimized Link State Routing Protocol Version 2 | and Optimized Link State Routing Protocol Version 2 | |||
| (OLSRv2)", RFC 7183, April 2014. | (OLSRv2)", RFC 7183, April 2014. | |||
| [RFC7184] Herberg, U., Cole, R., and T. Clausen, "Definition of | [RFC7184] Herberg, U., Cole, R., and T. Clausen, "Definition of | |||
| Managed Objects for the Optimized Link State Routing | Managed Objects for the Optimized Link State Routing | |||
| Protocol Version 2", RFC 7184, April 2014. | Protocol Version 2", RFC 7184, April 2014. | |||
| [RFC7187] Dearlove, C. and T. Clausen, "Routing Multipoint Relay | ||||
| Optimization for the Optimized Link State Routing Protocol | ||||
| Version 2 (OLSRv2)", RFC 7187, April 2014. | ||||
| [RFC7188] Dearlove, C. and T. Clausen, "Optimized Link State Routing | ||||
| Protocol Version 2 (OLSRv2) and MANET Neighborhood | ||||
| Discovery Protocol (NHDP) Extension TLVs", RFC 7187, | ||||
| April 2014. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Thomas Clausen | Thomas Clausen | |||
| LIX, Ecole Polytechnique | LIX, Ecole Polytechnique | |||
| 91128 Palaiseau Cedex, | 91128 Palaiseau Cedex, | |||
| France | France | |||
| Phone: +33-6-6058-9349 | Phone: +33-6-6058-9349 | |||
| Email: T.Clausen@computer.org | Email: T.Clausen@computer.org | |||
| URI: http://www.thomasclausen.org | URI: http://www.thomasclausen.org | |||
| End of changes. 23 change blocks. | ||||
| 63 lines changed or deleted | 100 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||