< draft-thubert-tree-discovery-06.txt   draft-thubert-tree-discovery-07.txt >
NEMO Working Group P. Thubert NEMO Working Group P. Thubert
Internet-Draft Cisco Internet-Draft Cisco
Expires: January 4, 2008 C. Bontoux Expires: February 2, 2009 C. Bontoux
Fortinet Fortinet
N. Montavont N. Montavont
LSIIT - ULP LSIIT - ULP
July 3, 2007 B. McCarthy
Lancaster
August 1, 2008
Nested Nemo Tree Discovery Nested Nemo Tree Discovery
draft-thubert-tree-discovery-06.txt draft-thubert-tree-discovery-07.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 37 skipping to change at page 1, line 39
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 4, 2008. This Internet-Draft will expire on February 2, 2009.
Copyright Notice Copyright Notice
Copyright (C) The IETF Trust (2007). Copyright (C) The IETF Trust (2008).
Abstract Abstract
This paper describes a simple distance vector protocol that exposes This paper describes a simple distance vector protocol that exposes
only a default route towards the infrastructure in a nested NEMO only a default route towards the infrastructure in a nested NEMO
configuration. The draft extends the Neighbor Discovery Protocol [1] configuration. The draft extends the Neighbor Discovery Protocol [1]
in order to carry information and metrics which will help a Mobile in order to carry information and metrics which will help a Mobile
Router select its Attachment Router(s) in an autonomous fashion and Router select its Attachment Router(s) in an autonomous fashion and
provides generic rules which guarantee that the interaction of provides generic rules which guarantee that the interaction of
different selection processes will not create loops. different selection processes will not create loops.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5
2. Terms and Abbreviations . . . . . . . . . . . . . . . . . . . 4 2. Terms and Abbreviations . . . . . . . . . . . . . . . . . . . 5
3. Motivations . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. Motivations . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Multi-Homed nested mobile network . . . . . . . . . . . . 5 3.1. Multi-Homed nested mobile network . . . . . . . . . . . . 6
3.2. Loops in nested Nemo . . . . . . . . . . . . . . . . . . . 6 3.2. Loops in nested Nemo . . . . . . . . . . . . . . . . . . . 7
4. Tree Information Option . . . . . . . . . . . . . . . . . . . 8 4. Tree Information Option . . . . . . . . . . . . . . . . . . . 9
4.1. TIO base option . . . . . . . . . . . . . . . . . . . . . 8 4.1. TIO base option . . . . . . . . . . . . . . . . . . . . . 9
4.2. TIO suboptions . . . . . . . . . . . . . . . . . . . . . . 11 4.2. TIO suboptions . . . . . . . . . . . . . . . . . . . . . . 12
4.2.1. Format . . . . . . . . . . . . . . . . . . . . . . . . 11 4.2.1. Format . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2.2. Pad1 . . . . . . . . . . . . . . . . . . . . . . . . . 11 4.2.2. Pad1 . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2.3. PadN . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.2.3. PadN . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2.4. Bandwidth Suboption . . . . . . . . . . . . . . . . . 12 4.2.4. Bandwidth Suboption . . . . . . . . . . . . . . . . . 13
4.2.5. Stable time Suboption . . . . . . . . . . . . . . . . 13 4.2.5. Stable time Suboption . . . . . . . . . . . . . . . . 14
4.2.6. Tree Group ID Suboption . . . . . . . . . . . . . . . 14 4.2.6. Tree Group ID Suboption . . . . . . . . . . . . . . . 15
4.2.7. Path Free Medium Time Suboption . . . . . . . . . . . 14 4.2.7. Path Free Medium Time Suboption . . . . . . . . . . . 15
4.2.8. Uniform Path Metric Suboption . . . . . . . . . . . . 15 4.2.8. Uniform Path Metric Suboption . . . . . . . . . . . . 16
5. Tree Discovery . . . . . . . . . . . . . . . . . . . . . . . . 17 5. Tree Discovery . . . . . . . . . . . . . . . . . . . . . . . . 17
5.1. tree selection . . . . . . . . . . . . . . . . . . . . . . 18 5.1. tree selection . . . . . . . . . . . . . . . . . . . . . . 18
5.2. Sub-tree mobility . . . . . . . . . . . . . . . . . . . . 19 5.2. Sub-tree mobility . . . . . . . . . . . . . . . . . . . . 19
5.3. Administrative depth . . . . . . . . . . . . . . . . . . . 20 5.3. Administrative depth . . . . . . . . . . . . . . . . . . . 20
5.4. DRL entries states and stability . . . . . . . . . . . . . 20 5.4. DRL entries states and stability . . . . . . . . . . . . . 20
5.4.1. Held-Up . . . . . . . . . . . . . . . . . . . . . . . 20 5.4.1. Held-Up . . . . . . . . . . . . . . . . . . . . . . . 20
5.4.2. Held-Down . . . . . . . . . . . . . . . . . . . . . . 21 5.4.2. Held-Down . . . . . . . . . . . . . . . . . . . . . . 21
5.4.3. Collision . . . . . . . . . . . . . . . . . . . . . . 21 5.4.3. Collision . . . . . . . . . . . . . . . . . . . . . . 21
5.4.4. Instability . . . . . . . . . . . . . . . . . . . . . 22 5.4.4. Instability . . . . . . . . . . . . . . . . . . . . . 22
5.4.5. Density . . . . . . . . . . . . . . . . . . . . . . . 23
5.5. Legacy Routers . . . . . . . . . . . . . . . . . . . . . . 23 5.5. Legacy Routers . . . . . . . . . . . . . . . . . . . . . . 23
6. Directed Acyclic Graph Discovery . . . . . . . . . . . . . . . 23 6. Directed Acyclic Graph Discovery . . . . . . . . . . . . . . . 23
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 23 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 24
8. Security Considerations . . . . . . . . . . . . . . . . . . . 23 8. Security Considerations . . . . . . . . . . . . . . . . . . . 24
9. Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 9. Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
9.1. Changes from version 00 to 01 . . . . . . . . . . . . . . 24 9.1. Changes from version 00 to 01 . . . . . . . . . . . . . . 24
9.2. Changes from version 01 to 02 . . . . . . . . . . . . . . 24 9.2. Changes from version 01 to 02 . . . . . . . . . . . . . . 24
9.3. Changes from version 02 to 03 . . . . . . . . . . . . . . 24 9.3. Changes from version 02 to 03 . . . . . . . . . . . . . . 24
9.4. Changes from version 03 to 04 . . . . . . . . . . . . . . 24 9.4. Changes from version 03 to 04 . . . . . . . . . . . . . . 25
9.5. Changes from version 04 to 05 . . . . . . . . . . . . . . 24 9.5. Changes from version 04 to 05 . . . . . . . . . . . . . . 25
9.6. Changes from version 05 to 06 . . . . . . . . . . . . . . 24 9.6. Changes from version 05 to 06 . . . . . . . . . . . . . . 25
10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25
11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26
11.1. Normative Reference . . . . . . . . . . . . . . . . . . . 26 11.1. Normative Reference . . . . . . . . . . . . . . . . . . . 26
11.2. Informative Reference . . . . . . . . . . . . . . . . . . 26 11.2. Informative Reference . . . . . . . . . . . . . . . . . . 26
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 27 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 27
Intellectual Property and Copyright Statements . . . . . . . . . . 28 Intellectual Property and Copyright Statements . . . . . . . . . . 28
skipping to change at page 14, line 50 skipping to change at page 15, line 50
This suboption carries the Free Medium Time available up the tree via This suboption carries the Free Medium Time available up the tree via
a specific parent at a given point of time. It is an indication of a specific parent at a given point of time. It is an indication of
whether bandwidth is available to place VoIP calls for instance. As whether bandwidth is available to place VoIP calls for instance. As
defined by the Quality of Service (QoS) Task Group of the Wi-Fi defined by the Quality of Service (QoS) Task Group of the Wi-Fi
Alliance, the Medium Time describes the amount of time admitted to Alliance, the Medium Time describes the amount of time admitted to
access the medium, in units of 32 microsecond periods per second. access the medium, in units of 32 microsecond periods per second.
The Free Medium Time is the amount of time left the medium, in other The Free Medium Time is the amount of time left the medium, in other
words ((1000000/32) - SIGMA(MT)). The Path Free Medium Time is the words ((1000000/32) - SIGMA(MT)). The Path Free Medium Time is the
lowest available Free Medium Time along the way and it reflects the lowest available Free Medium Time along the way and it reflects the
actual use of those links in run time. actual use of those links in run time. The Path Free Medium Time
suboption does not have any alignment requirements. Its format is as
The Path Free Medium Time suboption does not have any alignment follows:
requirements. Its format is as follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 5 | Length = 2 | Path Free Medium Time | | Type = 5 | Length = 2 | Path Free Medium Time |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 8: Path Free Medium Time Suboption Figure 8: Path Free Medium Time Suboption
Type: Set to 5 for the Path Free Medium Time Suboption. Type: Set to 5 for the Path Free Medium Time Suboption.
skipping to change at page 15, line 30 skipping to change at page 16, line 29
microsecond periods per second. The clusterhead initializes that microsecond periods per second. The clusterhead initializes that
field to the Free MT on the link where the TIO is issued. An field to the Free MT on the link where the TIO is issued. An
attached MR propagates it as the minimum of the Path Free MT as attached MR propagates it as the minimum of the Path Free MT as
received in the TIO from the parent and the Path Free MT on the received in the TIO from the parent and the Path Free MT on the
link on which the TIO is propagated. As a result, the value link on which the TIO is propagated. As a result, the value
received from a candidate AR is that of the bottleneck between received from a candidate AR is that of the bottleneck between
that AR and the clusterhead. that AR and the clusterhead.
4.2.8. Uniform Path Metric Suboption 4.2.8. Uniform Path Metric Suboption
This suboption carries the Uniform Path Metric for the path along the This suboption carries the Uniform Path Metric (UPM) for the path
tree. It is set to zero by the clusterhead and incremented as the along the tree. It is set to zero by the clusterhead and incremented
TIO is propagated down the tree. The Uniform Path Metric Suboption as the TIO is propagated down the tree. The Uniform Path Metric
has an alignment requirement of 4n+2. Its format is as follows: Suboption has an alignment requirement of 4n+2. Its format is as
follows:
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 6 | Length = 4 | | Type = 6 | Length = 4 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Uniform Path Metric | | Uniform Path Metric |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 9: Uniform Path Metric Suboption Figure 9: Uniform Path Metric Suboption
Type: 8-bit unsigned integer. Its value is 6 for the Uniform Path Type: 8-bit unsigned integer. Its value is 6 for this suboption.
Metric.
Length: 8-bit unsigned integer. Its value is 4 for the Uniform Path Length: 8-bit unsigned integer. Its value is 4 for this suboption.
Metric suboption.
Uniform Path Metric: 32-bit unsigned integer aggragating the cost of Uniform Path Metric: 32-bit unsigned integer aggregating the cost of
multiple radio hops. radio hops.
5. Tree Discovery 5. Tree Discovery
Tree Discovery is a form of distance vector protocol for use in Tree Discovery is a form of distance vector protocol for use in
wireless mesh networks. TD locates the nearest exit and forms a wireless mesh networks. TD locates the nearest exit and forms a
Directed Acyclic Graphs towards that exit, usually a tree. TD Directed Acyclic Graphs towards that exit, usually a tree. TD
enables Mobile Routers to implement different policies for selecting enables Mobile Routers to implement different policies for selecting
their preferred parent in the Tree by introducing the concept of their preferred parent in the Tree by introducing the concept of
plug-in, and does not specify the plug-in operation. Rather, TD plug-in, and does not specify the plug-in operation. Rather, TD
specifies a set of rules to be implemented by all plug-ins to ensure specifies a set of rules to be implemented by all plug-ins to ensure
skipping to change at page 23, line 10 skipping to change at page 23, line 10
Down. Down.
Instability is transient (in the order of tree hop timers). When a Instability is transient (in the order of tree hop timers). When a
Mobile Router is unstable, it MUST NOT send RAs with TIO. This Mobile Router is unstable, it MUST NOT send RAs with TIO. This
avoids loops when Mobile Router A wishes to attach to Mobile Router B avoids loops when Mobile Router A wishes to attach to Mobile Router B
and Mobile Router B wishes to attach to Mobile Router A. Unless RA and Mobile Router B wishes to attach to Mobile Router A. Unless RA
cross (see Collision section), a Mobile Router receives TIO from cross (see Collision section), a Mobile Router receives TIO from
stable Attachment Routers, which do not plan to attach to itself, so stable Attachment Routers, which do not plan to attach to itself, so
the Mobile Router can safely attach to them. the Mobile Router can safely attach to them.
5.4.5. Density
In a dense environment, it is useless that all routers that can
provide backhauling service actually do so; in practice, limiting the
number of routers that accept visitors saves memory in the visitors
and reduces the cost of signalling. Also, limiting the number of
nodes (mobile routers that is) in the tree improves the multicast
operations.
Algorithms such a Trickle could be used by a Mobile Router to decide
to stop providing its access services for visitors if there are a
number of neighboring routers that provide similar services. The
simplest abstraction of such similarity is that a multiple routers
advertising a same depth, though such a simple similarity does not
address the specifics of a router selection in the plugins. In a
more general fashion, a Mobile Router can associate the concept of
similarity with the characteristics of its own attachment router
selection plug in.
5.5. Legacy Routers 5.5. Legacy Routers
A legacy router sends its Router Advertisements without a TIO. A legacy router sends its Router Advertisements without a TIO.
Consequently, a legacy router can be mistaken for a fixed Access Consequently, a legacy router can be mistaken for a fixed Access
Router when it is placed within a nested NEMO structure, and defeat Router when it is placed within a nested NEMO structure, and defeat
the loop avoidance mechanism. Consequently, it is important for the the loop avoidance mechanism. Consequently, it is important for the
administrator to prevent address autoconfiguration by visiting Mobile administrator to prevent address autoconfiguration by visiting Mobile
Routers from such a legacy router. Routers from such a legacy router.
6. Directed Acyclic Graph Discovery 6. Directed Acyclic Graph Discovery
skipping to change at page 25, line 13 skipping to change at page 25, line 32
depth vs. the plug-ins. depth vs. the plug-ins.
10. Acknowledgments 10. Acknowledgments
The authors wish to thank Marco Molteni and Patrick Wetterwald The authors wish to thank Marco Molteni and Patrick Wetterwald
(cisco) for their participation to this design and the review of the (cisco) for their participation to this design and the review of the
document, Massimo Villari (university of Messina), for his early work document, Massimo Villari (university of Messina), for his early work
on simulation and research on the subject and Julien Abeille for his on simulation and research on the subject and Julien Abeille for his
advanced participation in simulation and real testing. Also the advanced participation in simulation and real testing. Also the
authors wish to thank Christopher Dearlove for his suggestion for authors wish to thank Christopher Dearlove for his suggestion for
additional protection against loops in TD. This work is also based additional protection against loops in TD, and Philip Levis, David
on prior publications, in particular HMRA [6] by Hosik Cho and Eun- Cueller and Jonathan Hui for the suggestions about Trickle. This
Kyoung Paik from Seoul National University and other non IETF work is also based on prior publications, in particular HMRA [6] by
publications coauthored with Thierry Ernst and Thomas Noel. Finally, Hosik Cho and Eun-Kyoung Paik from Seoul National University and
the authors heartily thank Marcelo Bagnulo Braun and Teco Boot for other non IETF publications coauthored with Thierry Ernst and Thomas
their very constructive reviews. Noel. Finally, the authors heartily thank Marcelo Bagnulo Braun and
Teco Boot for their very constructive reviews.
11. References 11. References
11.1. Normative Reference 11.1. Normative Reference
[1] Narten, T., Nordmark, E., and W. Simpson, "Neighbor Discovery [1] Narten, T., Nordmark, E., and W. Simpson, "Neighbor Discovery
for IP Version 6 (IPv6)", RFC 2461, December 1998. for IP Version 6 (IPv6)", RFC 2461, December 1998.
[2] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in [2] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004. IPv6", RFC 3775, June 2004.
skipping to change at page 28, line 5 skipping to change at page 27, line 37
LSIIT - Univerity Louis Pasteur LSIIT - Univerity Louis Pasteur
Pole API, bureau C444 Pole API, bureau C444
Boulevard Sebastien Brant Boulevard Sebastien Brant
Illkirch 67400 Illkirch 67400
FRANCE FRANCE
Phone: (33) 3 90 24 45 87 Phone: (33) 3 90 24 45 87
Email: montavont@dpt-info.u-strasbg.fr Email: montavont@dpt-info.u-strasbg.fr
URI: http://www-r2.u-strasbg.fr/~montavont/ URI: http://www-r2.u-strasbg.fr/~montavont/
Ben McCarthy
Lancaster University
Computing Department
Infolab21, South Drive
Lancaster University
Lancaster LA1 4WA
UK
Phone: +44 1524 510 383
Email: b.mccarthy@lancaster.ac.uk
Full Copyright Statement Full Copyright Statement
Copyright (C) The IETF Trust (2007). Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors contained in BCP 78, and except as set forth therein, the authors
retain all their rights. retain all their rights.
This document and the information contained herein are provided on an This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
 End of changes. 22 change blocks. 
47 lines changed or deleted 79 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/