Mobile Ad hoc Networks Working Group Internet-Draft Intended status: Standards Track Expires: January 7, 2016 C. Perkins Futurewei S. Ratliff Idirect J. Dowdell Airbus Defence and Space L. Steenbrink HAW Hamburg, Dept. Informatik V. Mercieca Airbus Defence and Space July 6, 2015 Ad Hoc On-demand Distance Vector (AODVv2) Routing draft-ietf-manet-aodvv2-10 Abstract The revised Ad Hoc On-demand Distance Vector (AODVv2) routing protocol is intended for use by mobile routers in wireless, multihop networks. AODVv2 determines unicast routes among AODVv2 routers within the network in an on-demand fashion, offering rapid convergence in dynamic topologies. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current InternetDrafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 7, 2016. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents Perkins, et al. Expires January 7, 2016 [Page 1] Internet-Draft AODVv2 July 2015 (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. 2. 3. 4. Overview . . . . . . . . . . . . . . . . . . . . . Terminology . . . . . . . . . . . . . . . . . . . . Applicability Statement . . . . . . . . . . . . . . Data Structures . . . . . . . . . . . . . . . . . . 4.1. Interface List . . . . . . . . . . . . . . . . 4.2. Router Client List . . . . . . . . . . . . . . 4.3. Neighbor Table . . . . . . . . . . . . . . . . 4.4. Sequence Numbers . . . . . . . . . . . . . . . 4.5. Multicast Route Message Table . . . . . . . . . 4.6. Route Table Entry . . . . . . . . . . . . . . . 5. Metrics . . . . . . . . . . . . . . . . . . . . . . 5.1. Cost Function . . . . . . . . . . . . . . . . . 5.2. LoopFree Function . . . . . . . . . . . . . . . 5.3. Default Metric Type . . . . . . . . . . . . . . 5.4. Alternate Metric Types . . . . . . . . . . . . 6. AODVv2 Protocol Operations . . . . . . . . . . . . 6.1. Initialization . . . . . . . . . . . . . . . . 6.2. Adjacency Monitoring . . . . . . . . . . . . . 6.3. Message Transmission . . . . . . . . . . . . . 6.4. Route Discovery, Retries and Buffering . . . . 6.5. Processing Received Route Information . . . . . 6.5.1. Evaluating Route Information . . . . . . . 6.5.2. Applying Route Updates . . . . . . . . . . 6.6. Suppressing Redundant Messages . . . . . . . . 6.7. Route Maintenance . . . . . . . . . . . . . . . 6.7.1. Route State . . . . . . . . . . . . . . . . 6.7.2. Reporting Invalid Routes . . . . . . . . . 7. AODVv2 Protocol Messages . . . . . . . . . . . . . 7.1. Route Request (RREQ) Message . . . . . . . . . 7.1.1. RREQ Generation . . . . . . . . . . . . . . 7.1.2. RREQ Reception . . . . . . . . . . . . . . 7.1.3. RREQ Regeneration . . . . . . . . . . . . . 7.2. Route Reply (RREP) Message . . . . . . . . . . 7.2.1. RREP Generation . . . . . . . . . . . . . . 7.2.2. RREP Reception . . . . . . . . . . . . . . 7.2.3. RREP Regeneration . . . . . . . . . . . . . 7.3. Route Reply Acknowledgement (RREP_Ack) Message 7.3.1. RREP_Ack Generation . . . . . . . . . . . . Perkins, et al. Expires January 7, 2016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 5 10 11 11 11 12 13 14 15 17 17 18 18 19 19 19 20 22 22 24 25 26 28 29 29 31 31 31 33 34 35 36 38 39 41 42 42 [Page 2] Internet-Draft AODVv2 7.3.2. RREP_Ack Reception . . 7.4. Route Error (RERR) Message 7.4.1. RERR Generation . . . . 7.4.2. RERR Reception . . . . 7.4.3. RERR Regeneration . . . 8. RFC 5444 Representation . . . . 8.1. RREQ . . . . . . . . . . . 8.1.1. Message Header . . . . 8.1.2. Message TLV Block . . . 8.1.3. Address Block . . . . . 8.1.4. Address Block TLV Block 8.2. RREP . . . . . . . . . . . 8.2.1. Message Header . . . . 8.2.2. Message TLV Block . . . 8.2.3. Address Block . . . . . 8.2.4. Address Block TLV Block 8.3. RREP_Ack . . . . . . . . . 8.3.1. Message Header . . . . 8.3.2. Message TLV Block . . . 8.3.3. Address Block . . . . . 8.3.4. Address Block TLV Block 8.4. RERR . . . . . . . . . . . 8.4.1. Message Header . . . . 8.4.2. Message TLV Block . . . 8.4.3. Address Block . . . . . 8.4.4. Address Block TLV Block 9. Simple Internet Attachment . . 10. Optional Features . . . . . . . 10.1. Expanding Rings Multicast 10.2. Precursor Lists . . . . . 10.3. Intermediate RREP . . . . 10.4. Message Aggregation Delay 11. Configuration . . . . . . . . . 11.1. Timers . . . . . . . . . . 11.2. Protocol Constants . . . . 11.3. Local Settings . . . . . . 11.4. Network-Wide Settings . . 11.5. Optional Feature Settings 12. IANA Considerations . . . . . . 12.1. RFC 5444 Message Types . . 12.2. RFC 5444 Address Block TLV 12.3. MetricType Allocation . . 12.4. AddressType Allocation . . 13. Security Considerations . . . . 14. Acknowledgments . . . . . . . . 15. References . . . . . . . . . . 15.1. Normative References . . . 15.2. Informative References . . Perkins, et al. July 2015 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Expires January 7, 2016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 43 44 46 47 48 49 49 49 49 50 51 51 51 51 51 52 52 53 53 53 53 53 53 53 54 55 56 56 56 57 58 58 58 59 60 60 60 61 61 61 62 62 63 65 66 66 66 [Page 3] Internet-Draft AODVv2 Appendix A. Features Required of IP . . . . . . . . Appendix B. Multi-homing Considerations . . . . . . Appendix C. Router Client Relocation . . . . . . . . Appendix D. Example Algorithms for AODVv2 Operations D.1. General Operations . . . . . . . . . . . . . D.1.1. Check_Route_State . . . . . . . . . . . . D.1.2. Process_Routing_Info . . . . . . . . . . D.1.3. Fetch_Route_Table_Entry . . . . . . . . . D.1.4. Update_Route_Table_Entry . . . . . . . . D.1.5. Create_Route_Table_Entry . . . . . . . . D.1.6. LoopFree . . . . . . . . . . . . . . . . D.1.7. Fetch_Rte_Msg_Table_Entry . . . . . . . . D.1.8. Update_Rte_Msg_Table . . . . . . . . . . D.1.9. Build_RFC_5444_Message_Header . . . . . . D.2. RREQ Operations . . . . . . . . . . . . . . . D.2.1. Generate_RREQ . . . . . . . . . . . . . . D.2.2. Receive_RREQ . . . . . . . . . . . . . . D.2.3. Regenerate_RREQ . . . . . . . . . . . . . D.3. RREP Operations . . . . . . . . . . . . . . . D.3.1. Generate_RREP . . . . . . . . . . . . . . D.3.2. Receive_RREP . . . . . . . . . . . . . . D.3.3. Regenerate_RREP . . . . . . . . . . . . . D.4. RREP_Ack Operations . . . . . . . . . . . . . D.4.1. Generate_RREP_Ack . . . . . . . . . . . . D.4.2. Receive_RREP_Ack . . . . . . . . . . . . D.4.3. Timeout_RREP_Ack . . . . . . . . . . . . D.5. RERR Operations . . . . . . . . . . . . . . . D.5.1. Generate_RERR . . . . . . . . . . . . . . D.5.2. Receive_RERR . . . . . . . . . . . . . . D.5.3. Regenerate_RERR . . . . . . . . . . . . . Appendix E. AODVv2 Draft Updates . . . . . . . . . . E.1. Changes between revisions 9 and 10 . . . . . E.2. Changes between revisions 8 and 9 . . . . . . E.3. Changes between revisions 7 and 8 . . . . . . E.4. Changes between revisions 6 and 7 . . . . . . E.5. Changes between revisions 5 and 6 . . . . . . E.6. Changes between revisions 4 and 5 . . . . . . E.7. Changes between revisions 3 and 4 . . . . . . E.8. Changes between revisions 2 and 3 . . . . . . Authors’ Addresses . . . . . . . . . . . . . . . . . 1. July 2015 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 68 68 68 70 70 71 72 73 74 74 75 75 76 77 77 78 80 81 81 82 83 85 85 85 85 85 85 87 88 90 90 90 93 94 95 96 97 98 99 Overview The revised Ad hoc On-demand Distance Vector (AODVv2) routing protocol [formerly named DYMO] enables on-demand, multihop unicast routing among AODVv2 routers in mobile ad hoc networks [MANETs] [RFC2501]. The basic operations of the AODVv2 protocol are route discovery and route maintenance. Perkins, et al. Expires January 7, 2016 [Page 4] Internet-Draft AODVv2 July 2015 Route discovery is performed when an AODVv2 router needs to forward a packet for one of its clients, but does not have a valid route to the packet’s destination. AODVv2 routers use Route Request (RREQ) and Route Reply (RREP) messages to carry route information between the originator of the route discovery and the target node, establishing a route to both endpoints on all intermediate routers. A metric is included in RREQ and RREP messages to represent the cost of the route to the originator or target of the route discovery. AODVv2 compares route metrics in a way that ensures loop avoidance. AODVv2 also uses sequence numbers to assure loop freedom, enabling identification of stale routing information so that it can be discarded. Route maintenance involves monitoring the router’s links and routes for changes. This includes confirming adjacencies with other AODVv2 routers, issuing Route Error messages if link failures invalidate routes, extending and enforcing route timeouts, and reacting to received Route Error messages. AODVv2 control plane messages use the Generalized MANET Packet/ Message Format defined in [RFC5444] and the parameters in [RFC5498]. AODVv2 defines a set of data elements which map to RFC 5444 Address Blocks, Address Block TLVs, and Message TLVs. Security for authentication of AODVv2 routers and encryption of control messages is dealt with by using the recommendations in [RFC7182]. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. In addition, this document uses terminology from [RFC5444], and defines the following terms: AddressList An AODVv2 Data Element (see Table 1). Adjacency A bi-directional relationship between neighboring AODVv2 routers for the purpose of exchanging routing information. AckReq An AODVv2 Data Element (see Table 1). AODVv2 Router Perkins, et al. Expires January 7, 2016 [Page 5] Internet-Draft AODVv2 July 2015 An IP addressable device in the ad hoc network that performs the AODVv2 protocol operations specified in this document. CurrentTime The current time as maintained by the AODVv2 router. Data Element A named object used within AODVv2 protocol messages (see Table 1). Disregard Ignore for further processing. Invalid route A route that cannot be used for forwarding. MANET A Mobile Ad Hoc Network as defined in [RFC2501]. MetricType An AODVv2 Data Element (see Table 1). MetricTypeList An AODVv2 Data Element (see Table 1). Node An IP addressable device in the ad hoc network. All nodes in this document are either AODVv2 Routers or Router Clients. OrigAddr (Originator Address) An AODVv2 Data Element (see Table 1). OrigMetric An AODVv2 Data Element (see Table 1). OrigNode (Originating Node) The node that launched the application requiring communication with the Target Address. OrigPrefixLen The prefix length, in bits, associated with OrigAddr. OrigSeqNum An AODVv2 Data Element (see Table 1). PktSource An AODVv2 Data Element (see Table 1). PrefixLengthList Perkins, et al. Expires January 7, 2016 [Page 6] Internet-Draft AODVv2 July 2015 An AODVv2 Data Element (see Table 1). Reactive A protocol operation is called "reactive" if it is performed only in reaction to specific events. In this document, "reactive" is synonymous with "on-demand". RERR (Route Error) The AODVv2 message type used to indicate that an AODVv2 router does not have a route toward one or more particular destinations. RERR_Gen (RERR Generating Router) The AODVv2 router generating a Route Error message. Routable Unicast IP Address A routable unicast IP address is a unicast IP address that is scoped sufficiently to be forwarded by a router. Globally-scoped unicast IP addresses and Unique Local Addresses (ULAs) ([RFC4193]) are examples of routable unicast IP addresses. Router Client A node that requires the services of an AODVv2 router. router is also its own client. An AODVv2 RREP (Route Reply) The AODVv2 message type used to reply to a Route Request message. RREP_Gen (RREP Generating Router) The AODVv2 router responsible for the Target Node of a Route Request message, i.e., the router that creates the Route Reply message. RREQ (Route Request) The AODVv2 message type used to discover a route to the Target Address and distribute information about the route to the Originator Address. RREQ_Gen (RREQ Generating Router) The AODVv2 router that creates the Route Request message on behalf of the Originating Node to discover a route for Target Address. RteMsg (Route Message) A Route Request (RREQ) or Route Reply (RREP) message. Sequence Number (SeqNum) One of the sequence numbers maintained by an AODVv2 router to indicate freshness of route information. Used as an AODVv2 Data Element (see Table 1). Perkins, et al. Expires January 7, 2016 [Page 7] Internet-Draft AODVv2 July 2015 SeqNumList An AODVv2 Data Element (see Table 1). TargAddr (Target Address) An AODVv2 Data Element (see Table 1). Target Node The node hosting the IP address toward which a route is needed. TargMetric An AODVv2 Data Element (see Table 1). TargPrefixLen The prefix length, in bits, associated with TargAddr. TargSeqNum An AODVv2 Data Element (see Table 1). Unreachable Address An address for which a valid route is not known. Upstream In the direction from destination to source (from TargAddr to OrigAddr). Valid route A route that can be used for forwarding. ValidityTime An AODVv2 Data Element (see Table 1). This document defines a set of Data Elements in Table 1 which are used in AODVv2 messages. These data elements contain the message data which is transferred into RFC 5444 formatted messages (Section 8) before sending. Perkins, et al. Expires January 7, 2016 [Page 8] Internet-Draft AODVv2 July 2015 +------------------+------------------------------------------------+ | Data Element | Meaning | +------------------+------------------------------------------------+ | AckReq | Presence in RREP means acknowledgement is | | | requested from the router with the address | | | indicated | | AddressList | A list of IP addresses | | MetricType | The metric type for a metric value | | MetricTypeList | Metric types associated with routes to | | | addresses in AddressList, used in RERR | | msg_hop_limit | Number of hops the message is allowed to | | | traverse | | msg_hop_count | Number of hops traversed so far by the message | | OrigMetric | Metric value associated with the route to | | | OrigAddr | | OrigSeqNum | Sequence number associated with OrigAddr, used | | | in RREQ | | OrigAddr | IP address of the Originating Node, the source | | | address of the packet triggering route | | | discovery | | PktSource | Source address of a packet triggering a RERR | | | message | | PrefixLengthList | A list of routing prefixes associated with | | | addresses in AddressList | | SeqNum | Sequence number, when used in RERR | | SeqNumList | A list of generic sequence numbers associated | | | with addresses in an AddressList, used in RERR | | TargAddr | IP address of the Target Node, the destination | | | address for which a route is requested | | TargMetric | Metric value associated with the route to | | | TargAddr | | TargSeqNum | Sequence number associated with TargAddr, used | | | in RREQ (optional) and RREP | | ValidityTime | Length of time a route is offered | +------------------+------------------------------------------------+ Table 1: Data Elements This document uses the notational conventions in Table 2 to simplify the text. Perkins, et al. Expires January 7, 2016 [Page 9] Internet-Draft AODVv2 July 2015 +----------------------+--------------------------------------------+ | Notation | Meaning | +----------------------+--------------------------------------------+ | Route[Address] | A route table entry toward Address | | Route[Address].Field | A field in a route table entry toward | | | Address | | RteMsg | Either RREQ or RREP | | RteMsg.Field | A field in either RREQ or RREP | | AdvRte | A route advertised in an incoming RteMsg | +----------------------+--------------------------------------------+ Table 2: Notational Conventions 3. Applicability Statement The AODVv2 routing protocol is a reactive routing protocol designed for stub or disconnected mobile ad hoc networks, i.e., non-transit networks or those not connected to the internet. AODVv2 handles a wide variety of mobility and traffic patterns by determining routes on-demand. In networks with a large number of routers, AODVv2 is best suited for relatively sparse traffic scenarios where each router forwards packets to a small percentage of other AODVv2 routers in the network. In this case fewer routes are needed, and therefore less control traffic is produced. AODVv2 is well suited to reactive scenarios such as emergency and disaster relief, where the ability to communicate is more important than being assured of secure operations. For other ad hoc networking applications, in which insecure operation could negate the value of establishing communication paths, it is important for neighboring AODVv2 nodes to establish security associations with one another. AODVv2 will not make use of uni-directional links. Route requests from routers which cannot confirm bidirectional connectivity should be ignored to avoid persistent packet loss or protocol failures. AODVv2 is applicable to memory constrained devices, since only a little routing state is maintained in each AODVv2 router. In contrast to proactive routing protocols, which maintain routing information for all destinations within the MANET, AODVv2 routes that are not needed for forwarding data do not need to be maintained. On routers unable to store persistent AODVv2 state, recovery can impose a performance penalty (e.g., in case of AODVv2 router reboot). AODVv2 supports routers with multiple interfaces, as long as each interface configured for AODVv2 has its own unicast routable IP address. Address assignment procedures are out of scope for AODVv2. Perkins, et al. Expires January 7, 2016 [Page 10] Internet-Draft AODVv2 July 2015 Multi-homing is not supported by AODVv2, and therefore a Router Client SHOULD NOT be served by more than one AODVv2 router at any one time. Appendix B contains some notes on this topic. Although AODVv2 is closely related to AODV [RFC3561], and shares some features of DSR [RFC4728], AODVv2 is not interoperable with either of those protocols. The routing algorithm in AODVv2 may be operated at layers other than the network layer, using layer-appropriate addresses. AODVv2 can be configured to perform gateway functions when attached to the internet. Such a gateway router is referred to as an Internet AODVv2 Router (IAR) as discussed in Section 9. The IAR will reply to each route request generated inside the AODVv2 network for an internet destination as if they were responsible for the target address, and may advertise the AODVv2 network to the internet using procedures out of scope for this specification. 4. Data Structures 4.1. Interface List A list of the interfaces supporting AODVv2 should be configured in the AODVv2_INTERFACES list. 4.2. Router Client List An AODVv2 router may provide routing services for its own local applications and for other non-routing nodes that are directly reachable via its network interfaces. These nodes, including the AODVv2 router itself, are referred to as Router Clients. Each AODVv2 router MUST be configured with information about the IP addresses of its clients. If a subnet is configured as a Router Client, the AODVv2 router MUST serve every node in that subnet. A CLIENT_ADDRESSES list should exist to store information about Router Clients, with the following information: RouterClient.IPAddress The IP address of the client node or subnet that requires routing services from the AODVv2 router. RouterClient.PrefixLength The length, in bits, of the routing prefix associated with the client IP address or subnet. Perkins, et al. Expires January 7, 2016 [Page 11] Internet-Draft AODVv2 July 2015 The list of Router Clients for an AODVv2 router is never empty, since an AODVv2 router is always its own client. The IP Addresses of the router’s interfaces will appear in the Router Client list. The router MUST respond to Route Requests for all Router Clients. the initial state, an AODVv2 router is not required to have information about the Router Clients of any other AODVv2 router. In A Router Client SHOULD NOT be served by more than one AODVv2 router at any one time. Shifting responsibility for a Router Client to a different AODVv2 router is discussed in Appendix C. 4.3. Neighbor Table A neighbor table MUST be maintained with information about neighboring AODVv2 routers, including an indication of the state of the adjacency to the router. Section 6.2 discusses how to monitor adjacency. Neighboring routers which cannot confirm adjacency should be marked as blacklisted. Certain AODVv2 messages received from a blacklisted router should be ignored. Routers should be blacklisted for a maximum of MAX_BLACKLIST_TIME, but can be removed from the blacklist before this time if an indication of adjacency is received. Neighbor entries should contain: Neighbor.IPAddress An IP address of the neighboring router. Neighbor.State The state of the adjacency (Confirmed, Unknown, or Blacklisted) Neighbor.ResetTime The time at which this router SHOULD no longer be considered blacklisted. By default this value is calculated at the time the router is blacklisted and is equal to CurrentTime + MAX_BLACKLIST_TIME. After this time, the state should be reset to Unknown. While the neighbor is not marked as blacklisted, this value SHOULD be set to MAX_TIME. Before a neighbor is confirmed, any routes learned through that neighbor are marked as Unconfirmed. When neighbor state is set to Confirmed, the Unconfirmed routes using the neighbor as a next hop can transition to Idle state (see Section 6.7.1). If a neighbor is blacklisted, any valid routes installed which use that neighbor for their next hop should become Invalid. Perkins, et al. Expires January 7, 2016 [Page 12] Internet-Draft AODVv2 July 2015 When the link to a neighbor breaks, the neighbor entry should be removed and all routes using the neighbor as next hop should become Invalid. 4.4. Sequence Numbers Sequence numbers enable AODVv2 routers to determine the temporal order of route discovery messages, identifying stale routing information so that it can be discarded. The sequence number fulfills the same roles as the "Destination Sequence Number" of DSDV [Perkins94], and the AODV Sequence Number in [RFC3561]. Each AODVv2 router in the network MUST maintain its own sequence number as a 16-bit unsigned integer. All route messages (Route Request and Route Reply messages) created by an AODVv2 router include the router’s sequence number. If the router has multiple AODVv2 interfaces, it can maintain different sequence numbers for each interface IP address, but the router MUST NOT use multiple sequence numbers for any one interface IP address. All route messages created on behalf of Router Clients on a particular interface MUST include the sequence number of that interface’s IP address. Each AODVv2 router MUST ensure that its sequence number is strictly increasing. It can ensure this by incrementing the sequence number by one (1) whenever a route message is created, except when the sequence number is 65,535 (the maximum value of a 16-bit unsigned integer), in which case it MUST be reset to one (1). The value zero (0) is reserved to indicate that the sequence number for an address is unknown. A router receiving a route message uses the sequence number to determine the freshness of the route information in the message in comparison with any existing information about the same route. If the sequence number stored in the route table is higher than the sequence number in the message, the received information is considered stale and MUST NOT be used to update the route table. As a consequence, loop freedom is assured. An AODVv2 router SHOULD maintain its sequence number(s) in persistent storage. If a sequence number is lost, the router must follow the procedure in Section 6.1 to safely resume routing operations with a new sequence number. Perkins, et al. Expires January 7, 2016 [Page 13] Internet-Draft 4.5. AODVv2 July 2015 Multicast Route Message Table A route message (RteMsg) is either a Route Request and Route Reply message. The Multicast Route Message Table (RteMsg Table) contains information about previously received multicast route messages, so that when a route message is received, an AODVv2 router can determine if the incoming information is redundant, and avoid unnecessary regeneration of the route message. RREQ messages are usually multicast. Future extensions to AODVv2 MAY enable RREP messages to be multicast. Each entry in the RteMsg Table stores the following information, copied from the route message: RteMsg.MessageType Either RREQ or RREP. RteMsg.OrigAddr The IP address of the originating node wishing to send a packet. RteMsg.OrigPrefixLen The prefix length associated with OrigAddr. RteMsg.TargAddr The IP address of the target node, the destination of the packet. RteMsg.TargPrefixLen The prefix length associated with TargAddr. RteMsg.OrigSeqNum The sequence number associated with the originator, if present in RteMsg. RteMsg.TargSeqNum The sequence number associated with the target, if present in RteMsg. RteMsg.MetricType The metric type of the route requested. RteMsg.Metric The metric value received in the RteMsg. RteMsg.Timestamp The last time this entry was updated. RteMsg.RemoveTime The time at which this entry MUST be removed. Perkins, et al. Expires January 7, 2016 [Page 14] Internet-Draft AODVv2 July 2015 Multicast RteMsgs are considered to be comparable if they have the same MessageType, OrigAddr, TargAddr, and MetricType. The RteMsg Table is maintained so that no two entries are comparable, i.e., all entries either have different MessageType, different OrigAddr, different TargAddr, or different MetricType. See Section 6.6 for details on updating this table. Entries in the RteMsg Table MUST be deleted when the sequence number is no longer valid, i.e., after MAX_SEQNUM_LIFETIME. RemoveTime should be set when the sequence number of the entry is updated, i.e., when OrigSeqNum is updated for a RREQ, and when TargSeqNum is updated for a RREP. RemoveTime should be set to CurrentTime + MAX_SEQNUM_LIFETIME. Memory-constrained devices MAY remove the entry before this time, but the entry should be maintained for at least RteMsg_ENTRY_TIME after the last Timestamp update in order to account for long-lived RREQs traversing the network. 4.6. Route Table Entry The route table entry is a conceptual data structure. Implementations MAY use any internal representation that provides access to the following information: Route.Address An address or address prefix of a node. Route.PrefixLength The prefix length, in bits, associated with the address. If it is less than the length of Route.Address, this is a route to the subnet on which Route.Address resides. Route.SeqNum The sequence number associated with Route.Address, obtained from the last route message that successfully updated this route table entry. Route.NextHop An IP address of the AODVv2 router used for the next hop on the path toward Route.Address. Route.NextHopInterface The interface used to send packets toward Route.Address. Route.LastUsed The time this route was last used to forward a packet. Route.LastSeqNumUpdate The time the sequence number for this route was last updated. Perkins, et al. Expires January 7, 2016 [Page 15] Internet-Draft AODVv2 July 2015 Route.ExpirationTime The time at which this route must be marked as Invalid. Route.MetricType The type of metric associated with this route. Route.Metric The cost of the route toward Route.Address expressed in units consistent with Route.MetricType. Route.State The last known state (Active, Idle, Invalid, or Unconfirmed) of the route. Route.Precursors (optional feature) A list of upstream neighbors using the route (see Section 10.2). There are four possible states for an AODVv2 route: Active An Active route is in current use for forwarding packets. Idle An Idle route has not been used in the last ACTIVE_INTERVAL, but can still be used for forwarding packets. Invalid An Invalid route cannot be used for forwarding packets, but its sequence number information allows incoming information to be assessed for freshness. Unconfirmed An Unconfirmed route cannot be used for forwarding packets. a route learned It is from a Route Request which has not yet been confirmed as bidirectional. Route state changes are detailed in Section 6.7.1. An AODVv2 route may be offered for a limited time. In this case, the route is referred to as a timed route. The length of time for which the route is valid is referred to as validity time, and is included in messages which advertise the route. The shortened validity time is reflected in Route.ExpirationTime. If a route is not timed, the ExpirationTime is MAX_TIME, and the route will become Idle and then Invalid if it is not used. Invalid routes should be maintained for their sequence number information. Perkins, et al. Expires January 7, 2016 [Page 16] Internet-Draft 5. AODVv2 July 2015 Metrics Metrics measure a cost or quality associated with a route or a link, e.g., latency, delay, financial cost, energy, etc. AODVv2 enables the use of multiple metric types. Each metric that can be used in AODVv2 has a MetricType number. Numbers are allocated by IANA as specified in [RFC6551] or detailed in Section 12.3. The default metric type is discussed in Section 5.3. Alternate metrics are discussed in Section 5.4. An AODVv2 implementation MAY be configured to use a limited set of the supported metric types. In the processing described in Section 7, a "known" MetricType can be interpreted as a configured MetricType. If a message is received using an unknown or nonconfigured MetricType it MUST be ignored. Since the message will not be regenerated, other routers which do support the MetricType will not be able to route through a router which does not support the MetricType. For each MetricType, a maximum value is defined, denoted MAX_METRIC[MetricType]. AODVv2 cannot store routes that cost more than MAX_METRIC[MetricType]. Metric information reported in incoming route messages describes the metric as measured by message sender, and does not reflect the cost of traversing the link to that sender. The receiving router calculates the cost of the route from its perspective. This cost is used to determine whether to use incoming information to update an existing route. If the cost exceeds MAX_METRIC[MetricType], the route is ignored. 5.1. Cost Function This document uses the following notation to represent costs: o Cost(L) for link cost o Cost(R) for route cost These functions return the cost of traversing a link or a route. Cost(L) and Cost(R) for the default metric type are detailed in Section 5.3. The Cost() functions for other metric types are beyond the scope of this document. Perkins, et al. Expires January 7, 2016 [Page 17] Internet-Draft 5.2. AODVv2 July 2015 LoopFree Function When comparing an advertised route to an existing route for the same destination and the same metric type, the metric value should be examined to ensure that using the advertised route does not create any routing loops. The function LoopFree(R1, R2) is defined to verify that a route R2 is not a part of another route R1. LoopFree returns TRUE if R2 cannot be a sub-section of the route R1. An AODVv2 router invokes LoopFree() as part of the process in Section 6.5.1. The advertised route (AdvRte) is used as parameter R1, and the stored route (Route) is used as parameter R2. The LoopFree(R1,R2) function for the default metric type is detailed in Section 5.3. The LoopFree(R1,R2) functions for other metric types are beyond the scope of this document. 5.3. Default Metric Type AODVv2’s default metric type (DEFAULT_METRIC_TYPE) is HopCount, and is the only metric described in detail in this document. Alternate metrics are discussed in Section 5.4. For the HopCount metric: o Cost(L) := 1 o Cost(R) := Sum (Cost(L) of each link in the route), i.e., the hop count between the router calculating the cost, and the destination of the route o LoopFree(R1, R2) returns TRUE when the cost of R1 is less than or equal to the cost of R2, i.e., Cost(R1) <= Cost(R2) o MAX_METRIC[HopCount] := MAX_HOPCOUNT The LoopFree function for the HopCount metric is derived from the fact that route cost increases with number of hops. When examining two routes, the route with higher cost may include the route with lower cost as a sub-section of its route. Therefore, an advertised route with higher cost than the corresponding stored route could include the stored route as a sub-section. Replacing the stored route with the received route could form a routing loop. LoopFree returns FALSE in this case to indicate that an advertised route with higher cost is not to be used to update a stored route, even if the stored route is Invalid. Perkins, et al. Expires January 7, 2016 [Page 18] Internet-Draft AODVv2 July 2015 MAX_HOPCOUNT is a constant defined in Section 11.2. It MUST be larger than the AODVv2 network diameter, in order that AODVv2 protocol messages may reach their intended destinations. 5.4. Alternate Metric Types Some applications may require metric information other than hop count. For this reason, AODVv2 enables route selection based on alternate metric types. Using non-default metrics in an AODVv2 message requires the inclusion of the MetricType data element. Alternate metrics may have different types and ranges, for example integers or floating point numbers, or restricted subsets thereof. Therefore the size of the metric field in route messages may vary. See Section 12.3 for further information on MetricType number allocation and size. Metrics might be classified as additive, concave, convex, or multiplicative as discussed in [RFC6551]. Where Cost and LoopFree functions can be developed for a metric type, it can be supported by AODVv2. AODVv2 can support additive metrics using the Cost(R) and LoopFree(R1, R2) functions defined for the default metric. Furthermore, any strictly increasing metric can be supported using the LoopFree function defined. It is, however, out of the scope of this document to specify for alternate metrics the correct Cost(L), Cost(R), and LoopFree() functions. Where possible these should take into account differences in the link cost in each direction. 6. AODVv2 Protocol Operations The AODVv2 protocol’s operations include managing sequence numbers, monitoring adjacent AODVv2 routers, performing route discovery and dealing with requests from other routers, processing incoming route information and updating the route table, suppressing redundant messages, maintaining the route table and reporting broken routes. These processes are discussed in detail in the following sections. 6.1. Initialization During initialization where the previous sequence number is unknown, or if the sequence number is lost at any point, an AODVv2 router resets its sequence number(s) to one (1). However, other AODVv2 routers may still hold sequence number information this router previously issued. Since sequence number information will be removed Perkins, et al. Expires January 7, 2016 [Page 19] Internet-Draft AODVv2 July 2015 if there have been no sequence number updates in MAX_SEQNUM_LIFETIME, the initializing router must wait for MAX_SEQNUM_LIFETIME before it creates any messages containing its sequence number. It can then be sure that the information it sends will not be considered stale. Until MAX_SEQNUM_LIFETIME after its sequence number is reset, the router SHOULD not create RREQ or RREP messages. During this wait period, the router can do the following: o Process information in a received RREQ or RREP message to learn a route to the originator or target o Send a RREP_Ack o Regenerate a received RREQ or RREP o Forward data packets to Router Clients, and to other routers, if a route exists o Create, process and regenerate RERR messages 6.2. Adjacency Monitoring An adjacency is a bidirectional relationship between neighboring AODVv2 routers for the purpose of exchanging routing information. Not every pair of neighboring routers will necessarily form an adjacency, but AODVv2 routers MUST monitor connectivity to neighboring AODVv2 routers along potential routes and MUST NOT establish routes over uni-directional links, since packet losses are likely to occur and route establishment can fail. The default approach for monitoring bidirectional connectivity to the next hop toward OrigAddr is to request acknowledgement of Route Reply messages. Receipt of an acknowledgement proves that bidirectional connectivity exists. All AODVv2 routers MUST support this process, which is explained in Section 7.2 and Section 7.3. Bidirectionality to the next hop toward TargAddr is confirmed by receipt of the Route Reply message, since a Route Reply message is a reply to a Route Request message which previously crossed the link in the opposite direction. When routers perform other operations such as those from the list below, these can be used as additional indications of connectivity: o NHDP HELLO Messages [RFC6130] Perkins, et al. Expires January 7, 2016 [Page 20] Internet-Draft AODVv2 July 2015 o Route timeout o Lower layer triggers, e.g. message reception or link status notifications o TCP timeouts o Promiscuous listening o Other monitoring mechanisms or heuristics For example, receipt of a Neighborhood Discovery Protocol HELLO message with the receiving router listed as a neighbor is a signal of bidirectional connectivity. In this case, acknowledgement of a RREP message sent to that neighbor is unnecessary. Similarly, if AODVv2 receives notification of a timeout, this may be due to a disconnection. The AODVv2 router SHOULD attempt to verify connectivity by requesting acknowledgement of the next RREP sent to that neighbor. The Neighbor Table (Section 4.3) gives the last known state of the neighbor adjacency, either Confirmed, Unknown, or Blacklisted. Until bidirectionality is confirmed, the state is Unknown, and acknowledgement of RREP messages MUST be requested. If the state is Confirmed, the acknowledgement request is unnecessary. If bidirectionality cannot be confirmed, the state is Blacklisted. RREQs received from a blacklisted router, or any router over a link that is known to be incoming-only, MUST be disregarded. Neighbor state is updated as follows: o If a link to a neighbor is determined to be unidirectional, either by failure to acknowledge a RREP, or by some other means, the neighbor MUST be marked as blacklisted. o If a notification indicates that there may be a problem with bidirectionality, and the neighbor state is currently Confirmed, the state SHOULD be set to Unknown to force acknowledgement of the next RREP sent to the neighbor. o If an indication of bidirectional connectivity is received, the neighbor state SHOULD be set to Confirmed. o If the neighbor state is Blacklisted and the reset time is reached, the neighbor state SHOULD be reset to Unknown and the neighbor SHOULD again be allowed to participate in route discovery. Perkins, et al. Expires January 7, 2016 [Page 21] Internet-Draft AODVv2 July 2015 If a link to a neighbor is determined to be broken, the neighbor entry should be removed. 6.3. Message Transmission In its default mode of operation, AODVv2 sends [RFC5444] formatted messages using the parameters for port number and IP protocol specified in [RFC5498]. Mapping of AODVv2 data elements to RFC 5444 is detailed in Section 8. Unless otherwise specified, AODVv2 multicast messages are sent to the link-local multicast address LL-MANET-Routers [RFC5498]. All AODVv2 routers MUST subscribe to LL-MANET-Routers [RFC5498] to receive AODVv2 messages. Implementations are free to choose their own heuristics for reducing multicast overhead. Some methods for doing so are described in [RFC6621]. AODVv2 does not specify which method should be used to restrict the set of AODVv2 routers that have the responsibility to regenerate multicast messages. Note that multicast messages MAY be sent via unicast. For example, this may occur for certain link-types (non-broadcast media), for manually configured router adjacencies, or in order to improve robustness. When multiple interfaces are available, a node transmitting a multicast message to LL-MANET-Routers MUST send the message on all interfaces that have been configured for AODVv2 operation, as given in the AODVv2_INTERFACES list (Section 4.1). Similarly, AODVv2 routers MUST subscribe to LL-MANET-Routers on all their AODVv2 interfaces. To avoid congestion, each AODVv2 router’s rate of message generation (CONTROL_TRAFFIC_LIMIT) SHOULD be limited and administratively configurable. The implementation is free to choose the algorithm for limiting messages, including prioritizing messages when approaching the limit. AODVv2 messages SHOULD be discarded in the following order: RERR for invalidated routes, RREQ, RREP, RERR for undeliverable packet, RREP_Ack. IP packets containing AODVv2 protocol messages SHOULD be given priority queuing and channel access. 6.4. Route Discovery, Retries and Buffering AODVv2’s RREQ and RREP messages are used for route discovery and are together known as route messages (RteMsgs). The main difference between the two messages is that, by default, RREQ messages are multicast to solicit a RREP, whereas RREP is unicast as a response to Perkins, et al. Expires January 7, 2016 [Page 22] Internet-Draft AODVv2 July 2015 the RREQ. The constants used in this section are defined in Section 11. When an AODVv2 router needs to forward a data packet (with source address OrigAddr and destination address TargAddr) from one of its Router Clients, it needs a route to the packet’s destination. If no route exists, the AODVv2 router generates and multicasts a Route Request message (RREQ) using OrigAddr and TargAddr. The procedure for this is described in Section 7.1.1. The AODVv2 router is referred to as RREQ_Gen. Data packets awaiting a route MAY be buffered by RREQ_Gen. of data packets can have both positive and negative effects usually positive). Real-time traffic, voice, and scheduled may suffer if packets are buffered and subjected to delays, connection establishment will benefit if packets are queued route discovery is performed. Buffering (albeit delivery but TCP while The packet buffer is configured with a fixed limited size of BUFFER_SIZE_PACKETS or BUFFER_SIZE_BYTES. Determining which packets to discard first when the buffer is full is a matter of policy at each AODVv2 router. Nodes without sufficient memory available for buffering SHOULD have buffering disabled by configuring BUFFER_SIZE_PACKETS := 0 and BUFFER_SIZE_BYTES := 0. This will affect the latency for launching TCP applications to new destinations. RREQ_Gen awaits reception of a Route Reply message (RREP) containing a route toward TargAddr. A RREQ from TargAddr would also fulfil the request, if adjacency to the next hop is already confirmed. If a route to TargAddr is not learned within RREQ_WAIT_TIME, RREQ_Gen MAY retry the route discovery by generating another RREQ with a new sequence number. To reduce congestion in a network, repeated attempts at route discovery for a particular target address SHOULD utilize a binary exponential backoff, as described in [RFC3561], where the wait time is doubled for each retry. The RREQ is received by neighboring AODVv2 routers, and processed and regenerated as described in Section 7.1. Intermediate routers learn a potential route to OrigAddr from the RREQ. The router responsible for TargAddr responds by generating a Route Reply message (RREP) and sends it back toward RREQ_Gen using the route to OrigAddr learned from the RREQ. Each intermediate router regenerates the RREP and unicasts toward OrigAddr. Links which are not bidirectional cause problems. If a RREP is not received at an intermediate router, the RREP cannot be regenerated and will never reach RREQ_Gen. However, since routers monitor Perkins, et al. Expires January 7, 2016 [Page 23] Internet-Draft AODVv2 July 2015 adjacencies (Section 6.2), the loss of the RREP will cause the last router which regenerated the RREP to blacklist the router which did not receive it. When a timeout occurs at RREQ_Gen, a new RREQ may be regenerated. When the new RREQ arrives again via the blacklisted router, it will be ignored, and the RREQ should discover a different path. Route discovery SHOULD be considered to have failed after DISCOVERY_ATTEMPTS_MAX and the corresponding wait time for a RREP response to the final RREQ. After the attempted route discovery has failed, RREQ_Gen MUST wait at least RREQ_HOLDDOWN_TIME before attempting another route discovery to the same destination. Any data packets buffered for TargAddr MUST also be dropped and a Destination Unreachable ICMP message (Type 3) with a code of 1 (Host Unreachable Error) SHOULD be delivered to the source of the data packet. The source may be an application on RREQ_Gen itself, or on a Router Client with address OrigAddr. If RREQ_Gen does receive a route message containing a route to TargAddr within the timeout, it processes the message according to Section 7. When a valid route is installed, the router can begin sending the buffered packets. Any retry timers for the corresponding RREQ SHOULD be cancelled. During route discovery, all routers on the path learn a route to both OrigAddr and TargAddr, making the constructed route bidirectional. 6.5. Processing Received Route Information All AODVv2 route messages contain a route. A Route Request (RREQ) includes a route to OrigAddr, and a Route Reply (RREP) contains a route to TargAddr. All AODVv2 routers that receive a route message can store the route contained within it. Incoming information is first checked to verify that it is both safe to use and offers an improvement to existing information. This process is explained in Section 6.5.1. The route table may then be updated according to Section 6.5.2. In the processes below, RteMsg is used to denote the route message, AdvRte is used to denote the route contained within it, and Route denotes a stored routing table entry which matches AdvRte. AdvRte has the following properties: o AdvRte.Address := RteMsg.OrigAddr (in RREQ) or RteMsg.TargAddr (in RREP) Perkins, et al. Expires January 7, 2016 [Page 24] Internet-Draft AODVv2 July 2015 o AdvRte.PrefixLength := RteMsg.OrigPrefixLen (in RREQ) or RteMsg.TargPrefixLen (in RREP) if included, or if no prefix length was included in RteMsg, the address length, in bits, of AdvRte.Address o AdvRte.SeqNum := RteMsg.OrigSeqNum (in RREQ) or RteMsg.TargSeqNum (in RREP) o AdvRte.NextHop := IP.SourceAddress (the address of the router from which the AdvRte was received) o AdvRte.MetricType := RteMsg.MetricType if included, or DEFAULT_METRIC_TYPE if not o AdvRte.Metric := RteMsg.Metric o AdvRte.Cost := Cost(R) using the cost function associated with the route’s metric type, where L is the link from the advertising router, i.e. Cost(R) = AdvRte.Metric + Cost(L) for the default metric type o AdvRte.ValidityTime := RteMsg.ValidityTime, if included If prefix length information is present, the route describes the subnet on which the address resides. 6.5.1. Evaluating Route Information To determine whether the advertised route should be used to update the routing table, the incoming route information MUST be processed as follows: 1. Search for a routing table entry (Route) matching AdvRte’s address, prefix length and metric type * If no matching route exists, AdvRte SHOULD be used to update the routing table. Multiple routes to the same destination may exists with different metric types. * If all matching routes have State set to Unconfirmed, AdvRte SHOULD be used to update the routing table, so that it contains multiple Unconfirmed routes. If an Unconfirmed route becomes valid in future, any remaining Unconfirmed routes which would not offer improvement will be expunged. * If a matching route exists with State set to Active, Idle, or Invalid, continue to Step 2. Perkins, et al. Expires January 7, 2016 [Page 25] Internet-Draft 2. 3. 4. AODVv2 July 2015 Compare sequence numbers * If AdvRte is more recent (AdvRte.SeqNum > Route.SeqNum), AdvRte MUST be used to update the routing table. * If AdvRte is stale (AdvRte.SeqNum < Route.SeqNum), AdvRte MUST NOT be used to update the routing table. * If the sequence numbers are equal, continue to Step 3. Check that AdvRte is safe against routing loops (see Section 5.2) * If LoopFree(AdvRte, Route) returns FALSE, AdvRte MUST NOT be used to update the routing table because using the incoming information might cause a routing loop. * If LoopFree(AdvRte, Route) returns TRUE, continue to Step 3. Compare route costs * For some metric types, including the default metric specified in Section 5.3, the best route is the route with the lowest metric value. For other metric types, the best route may be the route with the highest metric. * If AdvRte is better, it SHOULD be used to update the routing table because it offers improvement. * If AdvRte is not better (i.e., it is worse or equal) and Route is valid, AdvRte MUST NOT be used to update the routing table because it does not offer any improvement. * If AdvRte is not better (i.e., it is worse or equal) but Route is Invalid, AdvRte SHOULD be used to update the routing table because it can safely repair the existing Invalid route. If the advertised route SHOULD be used to update the routing table, the procedure in Section 6.5.2 is followed. 6.5.2. Applying Route Updates If AdvRte is from a RREQ message, the next hop neighbor may not be confirmed as adjacent (see Section 4.3). If Neighbor.State is Unknown, the route may not be viable, but it MUST be stored to allow a corresponding RREP to be sent. It SHOULD NOT yet be used to forward data. Route.State will be set to Unconfirmed to indicate this. If a valid route already exists for this destination, the Unconfirmed route should be stored as an additional entry. Perkins, et al. Expires January 7, 2016 [Page 26] Internet-Draft AODVv2 July 2015 The route update is applied as follows: 1. If no existing entry in the route table matches AdvRte on address, prefix length and metric type, continue to Step 3 and create a new route table entry. 2. If a matching entry exists: 3. 4. * If AdvRte.NextHop is not equal to Route.NextHop, and AdvRte.NextHop’s Neighbor.State is Unknown and Route.State is Active or Idle, the current route is valid but the advertised route may offer improvement, if it can be confirmed. Continue to Step 3 and create a new route table entry. It can replace the original route when Neighbor.State is set to Confirmed. * If AdvRte.NextHop’s Neighbor.State is Unknown and Route.State is Invalid, continue to Step 4 and update the existing route table entry. * If AdvRte.NextHop’s Neighbor.State is Confirmed, continue to Step 4 and update the existing route table entry. Create a route table entry and initialize as follows: * Route.Address := AdvRte.Address * Route.PrefixLength := AdvRte.PrefixLength (if included), or the length, in bits, of Route.Address (32 for IPv4 or 128 for IPv6) * Route.MetricType := AdvRte.MetricType Update the route table entry as follows: * Route.SeqNum := AdvRte.SeqNum * Route.NextHop := AdvRte.NextHop * Route.NextHopInterface := interface on which RteMsg was received * Route.Metric := AdvRte.Cost * Route.LastUsed := CurrentTime * Route.LastSeqNumUpdate := CurrentTime Perkins, et al. Expires January 7, 2016 [Page 27] Internet-Draft * 5. AODVv2 July 2015 Route.ExpirationTime := CurrentTime + AdvRte.ValidityTime if a validity time exists, otherwise MAX_TIME If a new route was created, or if the existing Route.State is Invalid or Unconfirmed, update as follows: * Route.State := Unconfirmed (if the next hop’s Neighbor.State is Unknown) or Idle 6. If an existing route changed from Invalid or Unconfirmed to become Idle, any matching inferior routes should be expunged. 7. If this update results in a valid route which fulfills an outstanding route discovery, the associated timers can be cancelled and any buffered packets for this route can be forwarded. 6.6. Suppressing Redundant Messages When route messages are flooded in a MANET, an AODVv2 router may receive multiple similar messages. Regenerating every one of these gives little additional benefit, and generates unnecessary signaling traffic and interference. Each AODVv2 router stores information about recently received route messages in the AODVv2 Multicast RteMsg Table (Section 4.5). Received RteMsgs are tested against previously received RteMsgs, and if determined to be redundant, regeneration can be avoided. Where necessary, regeneration is performed using the processes in Section 7. To determine if a received RREQ is redundant: 1. 2. Search for an entry in the RteMsg Table with the same MessageType, OrigAddr, TargAddr, and MetricType * If there is none, create an entry to store information about the received RREQ and regenerate the RREQ. * If there is an entry, update the timestamp field, since comparable RteMsgs are still traversing the network, and continue to Step 2. Compare the sequence numbers * If the entry has a lower OrigSeqNum than the received RREQ, update the entry using information from the new RREQ and regenerate the RREQ. Perkins, et al. Expires January 7, 2016 [Page 28] Internet-Draft 3. AODVv2 July 2015 * If the entry has a higher OrigSeqNum than the received RREQ, do not update the entry and do not regenerate the RREQ. * If the entry has the same OrigSeqNum, continue to Step 3. 6.7. Compare the metric values * If the entry has a Metric that is worse than the received RREQ, update the entry using information from the new RREQ. * If the entry has a Metric that is better than the received RREQ, do not update the entry. * In both cases, the RREQ MAY be suppressed to avoid extra control traffic. However, if the processing of the RREQ results in an update to the route table, the RREQ MAY be regenerated to ensure other routers have up-to-date information. Route Maintenance Route maintenance involves monitoring and updating route state, handling route timeouts and reporting routes that become Invalid. Before using a route to forward a packet, an AODVv2 router MUST check the status of the route (Section 6.7.1). If the route is valid, it MUST be marked as Active and its LastUsed timestamp MUST be updated, before forwarding the packet to the route’s next hop. If there is no valid route, this MUST be reported to the packet’s source (see Section 6.7.2). 6.7.1. Route State During normal operation, AODVv2 does not require any explicit timeouts to manage the lifetime of a route. At any time, any route table entry can be examined and updated according to the rules below. Route state should be checked before packet forwarding and before any operation based on route state. The four possible states for an AODVv2 route are Active, Idle, Invalid, and Unconfirmed, as defined in Section 4.6. Active If an Active route is not timed (i.e., its ExpirationTime is MAX_TIME), it becomes Idle if not used within ACTIVE_INTERVAL. A timed route (i.e., a route with ExpirationTime not equal to MAX_TIME) remains Active until its expiration time, after which it MAY either be expunged or marked as Invalid. Perkins, et al. Expires January 7, 2016 [Page 29] Internet-Draft AODVv2 July 2015 Idle An Idle route becomes Active if it is used to forward a packet. If not used, an Idle route remains idle for MAX_IDLETIME before becoming an Invalid route. Invalid An Invalid route MAY be maintained until MAX_SEQNUM_LIFETIME after the last sequence number update. This allows incoming information to be assessed for freshness. After this time it should be expunged. Unconfirmed An Unconfirmed route becomes Idle when adjacency with the next hop router is confirmed, or will be expunged if the neighbor is blacklisted, or at MAX_SEQNUM_LIFETIME after the last sequence number update. In all cases, if the time since the route’s last sequence number update exceeds MAX_SEQNUM_LIFETIME, the sequence number must be removed from the route. If the route is Invalid or Unconfirmed at this time, it MUST be expunged. Active and Idle routes can continue to be used to forward packets. The removal of the sequence number is required to ensure that any AODVv2 routers following the initialization procedure can safely begin routing functions using a new sequence number. Appendix D.1.1 contains an algorithmic representation of this timeout behavior. Routes can become Invalid before a timeout occurs: o If a link breaks, all routes using that link as the next hop MUST immediately be marked as Invalid. o If a Route Error (RERR) message containing the route is received from the route’s next hop, the route MUST immediately be marked as Invalid. When an Unconfirmed route is set as Idle as a result of the adjacency with Route.NextHop being Confirmed (see Section 4.3), any inferior matching routes MUST be expunged. Memory constrained devices MAY choose to expunge routes from the AODVv2 route table before their expiration time, but MUST adhere to the following rules: o An Active route MUST NOT be expunged. Perkins, et al. Expires January 7, 2016 [Page 30] Internet-Draft AODVv2 July 2015 o An Idle route SHOULD NOT be expunged. o Any Invalid route MAY be expunged; least recently used Invalid routes SHOULD be expunged first. o An Unconfirmed route MUST NOT be expunged if it was installed within the last RREQ_WAIT_TIME. Otherwise, it MAY be expunged. 6.7.2. Reporting Invalid Routes When an Active route becomes Invalid as a result of a broken link or a received Route Error (RERR) message, other routers should be informed by sending a RERR message containing details of the invalidated route. A RERR message should also be sent when an AODVv2 router receives a packet to forward on behalf of another router but does not have a valid route for the destination of the packet. This packet may be a data packet or, in rare cases, a RREP message, if the route to the request originator has been lost. The packet or message triggering the RERR MUST be discarded. Generation of a RERR message is described in Section 7.4.1. 7. AODVv2 Protocol Messages AODVv2 defines four message types: Route Request (RREQ), Route Reply (RREP), Route Reply Acknowledgement (RREP_Ack), and Route Error (RERR). Each AODVv2 message is defined as a set of data elements. Rules for the generation, reception and regeneration of each message type are described in the following sections. Section 8 discusses how the data elements map to RFC 5444 Message TLVs, Address Blocks, and Address TLVs. 7.1. Route Request (RREQ) Message Route Request messages are used in route discovery operations to request a route to a specified target address. RREQ messages have the following general structure: Perkins, et al. Expires January 7, 2016 [Page 31] Internet-Draft AODVv2 July 2015 +-----------------------------------------------------------------+ | msg_hop_limit, (optional) msg_hop_count | +-----------------------------------------------------------------+ | AddressList | +-----------------------------------------------------------------+ | PrefixLengthList (optional) | +-----------------------------------------------------------------+ | OrigSeqNum, (optional) TargSeqNum | +-----------------------------------------------------------------+ | MetricType (optional) | +-----------------------------------------------------------------+ | OrigMetric | +-----------------------------------------------------------------+ | ValidityTime (optional) | +-----------------------------------------------------------------+ Figure 1: RREQ message structure RREQ Data Elements msg_hop_limit The remaining number of hops allowed for dissemination of the RREQ message. msg_hop_count The number of hops already traversed during dissemination of the RREQ message. AddressList Contains OrigAddr and TargAddr, the source and destination addresses of the packet for which a route is requested. OrigAddr and TargAddr MUST be routable unicast addresses. PrefixLengthList Contains OrigPrefixLen, i.e., the length, in bits, of the prefix associated with OrigAddr. If omitted, the prefix length is equal to OrigAddr’s address length in bits. If OrigAddr resides on a subnet configured as a Router Client, the prefix length represents the number of bits in the subnet mask. OrigSeqNum The sequence number associated with OrigAddr. TargSeqNum A sequence number associated with TargAddr. This may be included if an Invalid route exists to the target. This is useful for the optional Intermediate RREP feature (see Section 10.3). Perkins, et al. Expires January 7, 2016 [Page 32] Internet-Draft AODVv2 July 2015 MetricType The type of metric associated with OrigMetric. This element can be omitted if the default metric type is used. OrigMetric The metric associated with the route to OrigAddr, as measured by the sender of the message. ValidityTime The length of time that the message sender is willing to offer a route toward OrigAddr. Omitted if no time limit is imposed. 7.1.1. RREQ Generation A RREQ is generated when a packet needs to be forwarded for a Router Client, and no valid route currently exists for the packet’s destination. Before creating a RREQ, the router should check if a RREQ has recently been sent for the requested destination. If so, and the wait time for a reply has not yet been reached, the router should continue to await a response without generating a new RREQ. If the timeout has been reached, a new RREQ may be generated. If buffering is configured, the incoming packet SHOULD be buffered until the route discovery is completed. If the limit for the rate of AODVv2 control message generation has been reached, no message should be generated. To generate the RREQ, the router (referred to as RREQ_Gen) follows this procedure: 1. Set msg_hop_limit := MAX_HOPCOUNT 2. Set msg_hop_count := 0, if including it 3. Set AddressList := {OrigAddr, TargAddr} 4. For the PrefixLengthList: 5. * If OrigAddr resides on a Router Client subnet, set PrefixLengthList := {OrigPrefixLen, null}. * Otherwise, omit PrefixLengthList. For OrigSeqNum: Perkins, et al. Expires January 7, 2016 [Page 33] Internet-Draft 6. AODVv2 July 2015 * Increment the SeqNum associated with OrigAddr as specified in Section 4.4. * Set OrigSeqNum := SeqNum. For TargSeqNum: * If an Invalid route exists matching TargAddr using longest prefix matching and has a valid sequence number, set TargSeqNum := route’s sequence number. * If no Invalid route exists matching TargAddr, or the route doesn’t have a sequence number, omit TargSeqNum. 7. Include the MetricType data element if requesting a route for a non-default metric type, and set the type accordingly 8. Set OrigMetric := Route[OrigAddr].Metric 9. Include the ValidityTime data element if advertising that the route to OrigAddr via this router is offered for a limited time, and set ValidityTime accordingly This AODVv2 message is used to create a corresponding RFC 5444 message (see Section 8) which is multicast, by default, to LL-MANETRouters on all interfaces configured for AODVv2 operation. 7.1.2. RREQ Reception Upon receiving a RREQ, an AODVv2 router performs the following steps: 1. 2. If the sender is blacklisted (Section 4.3), check the entry’s reset time * If CurrentTime < Remove Time, ignore this RREQ for further processing. * If CurrentTime >= Remove Time, reset the neighbor state to Unknown and continue to Step 2. Verify that the message hop count, if included, hasn’t exceeded MAX_HOPCOUNT * 3. If so, ignore this RREQ for further processing. Verify that the message contains the required data elements: msg_hop_limit, OrigAddr, TargAddr, OrigSeqNum, and OrigMetric, Perkins, et al. Expires January 7, 2016 [Page 34] Internet-Draft AODVv2 July 2015 and that OrigAddr and TargAddr are valid addresses (routable and unicast) * 4. If not, ignore this RREQ for further processing. If the MetricType data element is present, check that the metric type is known * 5. If not, ignore this RREQ for further processing. Verify that the cost of the advertised route will not exceed the maximum allowed metric value for the metric type (Metric <= MAX_METRIC[MetricType] - Cost(L)) * If it will, ignore this RREQ for further processing. 6. Process the route to OrigAddr as specified in Section 6.5.1 7. Check if the message is redundant by comparing to entries in the RteMsg table (Section 6.6) 8. 7.1.3. * If redundant, ignore this RREQ for further processing. * If not redundant, save the information in the RteMsg table to identify future duplicates and continue processing. Check if the TargAddr belongs to one of the Router Clients * If so, generate a RREP as specified in Section 7.2.1. * If not, continue to RREQ regeneration. RREQ Regeneration By regenerating a RREQ, a router advertises that it will forward packets to the OrigAddr contained in the RREQ according to the information enclosed. The router MAY choose not to regenerate the RREQ, though this could decrease connectivity in the network or result in non-optimal paths. The full set of circumstances under which a router may avoid regenerating a RREQ are not declared in this document, though examples include the router being heavily loaded or low on energy and therefore unwilling to advertise routing capability for more traffic. The RREQ should not be regenerated if the limit for the rate of AODVv2 control message generation has been reached. The procedure for RREQ regeneration is as follows: Perkins, et al. Expires January 7, 2016 [Page 35] Internet-Draft AODVv2 July 2015 1. Set msg_hop_limit := received msg_hop_limit - 1 2. If msg_hop_limit is now zero, do not continue the regeneration process 3. Set msg_hop_count := received msg_hop_count + 1, if included, otherwise omit msg_hop_count 4. Set AddressList, PrefixLengthList, sequence numbers and MetricType to the values in the received RREQ 5. Set OrigMetric := Route[OrigAddr].Metric 6. If the received RREQ contains a ValidityTime, or if the regenerating router wishes to limit the time that it offers a route to OrigAddr, the regenerated RREQ MUST include a ValidityTime data element * The ValidityTime is either the ValidityTime the previous AODVv2 router specified, or the ValidityTime this router wishes to impose, whichever is lower. This AODVv2 message is used to create a corresponding RFC 5444 message (see Section 8) which is multicast, by default, to LL-MANETRouters on all interfaces configured for AODVv2 operation. However, the regenerated RREQ can be unicast to the next hop address of the route toward TargAddr, if known. 7.2. Route Reply (RREP) Message A Route Reply message is sent in response to a Route Request message and offers a route to the Target Address in the RREQ. The RREP is sent by unicast to the next hop router on the route to OrigAddr, if there is a Confirmed entry in the Neighbor Table for the next hop. Otherwise, the RREP is sent multicast to LL-MANET-Routers, including the AckReq data element in the message to indicate the intended next hop address and request acknowledgement to confirm the neighbor adjacency. RREP messages have the following general structure: Perkins, et al. Expires January 7, 2016 [Page 36] Internet-Draft AODVv2 July 2015 +-----------------------------------------------------------------+ | msg_hop_limit, (optional) msg_hop_count | +-----------------------------------------------------------------+ | AckReq (optional) | +-----------------------------------------------------------------+ | AddressList | +-----------------------------------------------------------------+ | PrefixLengthList (optional) | +-----------------------------------------------------------------+ | TargSeqNum | +-----------------------------------------------------------------+ | MetricType (optional) | +-----------------------------------------------------------------+ | TargMetric | +-----------------------------------------------------------------+ | ValidityTime (optional) | +-----------------------------------------------------------------+ Figure 2: RREP message structure RREP Data Elements msg_hop_limit The remaining number of hops allowed for dissemination of the RREP message. msg_hop_count The number of hops already traversed during dissemination of the RREP message. AckReq The address of the intended next hop of the RREP. This data element is used when the RREP is multicast because the next hop toward OrigAddr is a neighbor with Unknown state. It indicates that an acknowledgement to the RREP is requested by the sender from the intended next hop (see Section 6.2). AddressList Contains OrigAddr and TargAddr, the source and destination addresses of the packet for which a route is requested. OrigAddr and TargAddr MUST be routable unicast addresses. PrefixLengthList Contains TargPrefixLen, i.e., the length, in bits, of the prefix associated with TargAddr. If omitted, the prefix length is equal to TargAddr’s address length, in bits. If TargAddr resides on a subnet configured as a Router Client, the prefix length represents the number of bits in the subnet mask. Perkins, et al. Expires January 7, 2016 [Page 37] Internet-Draft AODVv2 July 2015 TargSeqNum The sequence number associated with TargAddr. MetricType The type of metric associated with TargMetric. This element can be omitted if the default metric type is used. TargMetric The metric associated with the route to TargAddr, as seen from the sender of the message. ValidityTime The length of time that the message sender is willing to offer a route toward TargAddr. Omitted if no time limit is imposed. 7.2.1. RREP Generation A RREP is generated when a RREQ arrives for one of the AODVv2 router’s Router Clients. Before creating a RREP, the router should check if the corresponding RREQ is redundant, i.e., a response has already been generated, or if the limit for the rate of AODVv2 control message generation has been reached. If so, the RREP should not be created. If the next hop neighbor on the route to OrigAddr is not yet confirmed as adjacent (as described in Section 6.2), the RREP MUST include an AckReq data element including the intended next hop address, in order to perform adjacency monitoring. If the adjacency is already confirmed, it can be omitted. The AckReq data element indicates that an acknowledgement to the RREP is requested from the intended next hop router in the form of a Route Reply Acknowledgement (RREP_Ack). Implementations may allow a number of retries of the RREP if an acknowledgement is not received within RREP_Ack_SENT_TIMEOUT, doubling the timeout with each retry, up to a maximum of RREP_RETRIES, using the same exponential backoff described in Section 6.4 for RREQ retries. Adjacency confirmation MUST be considered to have failed after the wait time for a RREP_Ack response to the final RREP. The next hop router MUST be marked as blacklisted (Section 4.3), and any installed routes with next hop set to the newly blacklisted router should become Invalid. To generate the RREP, the router (also referred to as RREP_Gen) follows this procedure: Perkins, et al. Expires January 7, 2016 [Page 38] Internet-Draft AODVv2 July 2015 1. Set msg_hop_limit := msg_hop_count from the received RREQ message, if it was included, or MAX_HOPCOUNT if it was not included 2. Set msg_hop_count := 0, if including it 3. If adjacency with the next hop toward OrigAddr is not already confirmed, include the AckReq data element with the address of the intended next hop router 4. Set Address List := {OrigAddr, TargAddr} 5. For the PrefixLengthList: 6. * If TargAddr resides on a Router Client subnet, set PrefixLengthList := {null, TargPrefixLen}. * Otherwise, omit PrefixLengthList. For the TargSeqNum: * Increment the SeqNum associated with TargAddr as specified in Section 4.4. * Set TargSeqNum := SeqNum. 7. Include the MetricType data element if the route requested is for a non-default metric type, and set the type accordingly 8. Set TargMetric := Route[TargAddr].Metric 9. Include the ValidityTime data element if advertising that the route to TargAddr via this router is offered for a limited time, and set ValidityTime accordingly This AODVv2 message is used to create a corresponding RFC 5444 message (see Section 8). If there is a Confirmed entry in the Neighbor Table for the next hop router on the route to OrigAddr, the RREP is sent by unicast to the next hop. Otherwise, the RREP is sent multicast to LL-MANET-Routers. 7.2.2. RREP Reception Upon receiving a RREP, an AODVv2 router performs the following steps: 1. If the sender is blacklisted (Section 4.3), but the RREP answers a recently sent RREQ, the sender state should be set to Confirmed since a RREP is an indication of adjacency Perkins, et al. Expires January 7, 2016 [Page 39] Internet-Draft 2. 7. If it will, ignore this RREP for further processing. If the AckReq data element is present, check the intended recipient of the received RREP * If the receiving router is the intended recipient, send an acknowledgement as specified in Section 7.3 and continue processing. * If the receiving router is not the intended recipient, ignore this RREP for further processing. Process the route to TargAddr as specified in Section 6.5.1 * 8. If not, ignore this RREP for further processing. Verify that the cost of the advertised route will not exceed the maximum allowed metric value for the metric type (Metric <= MAX_METRIC[MetricType] - Cost(L)) * 6. If not, ignore this RREP for further processing. If the MetricType data element is present, check that the metric type is known * 5. If so, ignore this RREQ for further processing. Verify that the message contains the required data elements: msg_hop_limit, OrigAddr, TargAddr, TargSeqNum, and TargMetric, and that OrigAddr and TargAddr are valid addresses (routable and unicast) * 4. July 2015 Verify that the message hop count, if included, hasn’t exceeded MAX_HOPCOUNT * 3. AODVv2 If the route to TargAddr fulfills a previously sent RREQ, any associated timeouts will be cancelled and buffered packets will be forwarded to TargAddr, but processing continues to Step 8. Check if the message is redundant by comparing to entries in the RteMsg table (Section 6.6) * If redundant, ignore this RREP for further processing. * If not redundant, save the information in the RteMsg table to identify future redundant RREP messages and continue processing. Perkins, et al. Expires January 7, 2016 [Page 40] Internet-Draft 9. 7.2.3. July 2015 Check if the OrigAddr belongs to one of the Router Clients * 10. AODVv2 If so, no further processing is necessary. Check if a valid (Active or Idle) or Unconfirmed route exists to OrigAddr * If so, continue to RREP regeneration. * If not, a Route Error message SHOULD be transmitted to TargAddr according to Section 7.4.1 and the RREP should be discarded and not regenerated. RREP Regeneration A received Route Reply message is regenerated toward OrigAddr. Unless the router is prepared to advertise the route contained within the received RREP, it halts processing. By regenerating a RREP, a router advertises that it will forward packets to TargAddr according to the information enclosed. The router MAY choose not to regenerate the RREP, in the same way it may choose not to regenerate a RREQ (see Section 7.1.3), though this could decrease connectivity in the network or result in non-optimal paths. The RREP should not be regenerated if the limit for the rate of AODVv2 control message generation has been reached. If the next hop neighbor on the route to OrigAddr is not yet confirmed as adjacent (as described in Section 6.2), the RREP MUST include an AckReq data element including the intended next hop address, in order to perform adjacency monitoring. If the adjacency is already confirmed, the AckReq data element can be omitted. The AckReq data element indicates that an acknowledgement to the RREP is requested in the form of a Route Reply Acknowledgement (RREP_Ack) from the intended next hop router. The procedure for RREP regeneration is as follows: 1. Set msg_hop_limit := received msg_hop_limit - 1 2. If msg_hop_limit is now zero, do not continue the regeneration process 3. Set msg_hop_count := received msg_hop_count + 1, if it was included, otherwise omit msg_hop_count Perkins, et al. Expires January 7, 2016 [Page 41] Internet-Draft AODVv2 July 2015 4. If an adjacency with the next hop toward OrigAddr is not already confirmed, include the AckReq data element with the address of the intended next hop router 5. Set AddressList, PrefixLengthList, TargSeqNum and MetricType to the values in the received RREP 6. Set TargMetric := Route[TargAddr].Metric 7. If the received RREP contains a ValidityTime, or if the regenerating router wishes to limit the time that it will offer a route to TargAddr, the regenerated RREP MUST include a ValidityTime data element * The ValidityTime is either the ValidityTime the previous AODVv2 router specified, or the ValidityTime this router wishes to impose, whichever is lower. This AODVv2 message is used to create a corresponding RFC 5444 message (see Section 8). If there is a Confirmed entry in the Neighbor Table for the next hop router on the route to OrigAddr, the RREP is sent by unicast to the next hop. Otherwise, the RREP is sent multicast to LL-MANET-Routers. 7.3. Route Reply Acknowledgement (RREP_Ack) Message The Route Reply Acknowledgement MUST be sent in response to a received Route Reply which includes an AckReq data element with an address matching one of the receiving router’s IP addresses. When the RREP_Ack message is received, it confirms the adjacency between the two routers. The RREP_Ack has no data elements. 7.3.1. RREP_Ack Generation A RREP_Ack MUST be generated when a received RREP includes the AckReq data element with the address of the receiving router. The RREP_Ack should not be generated if the limit for the rate of AODVv2 control message generation has been reached. There are no data elements in a RREP_Ack. The RFC 5444 representation is discussed in Section 8. The RREP_Ack is unicast, by default, to the IP address of the router that requested it. 7.3.2. RREP_Ack Reception Upon receiving a RREP_Ack, an AODVv2 router performs the following steps: Perkins, et al. Expires January 7, 2016 [Page 42] Internet-Draft AODVv2 July 2015 1. If a RREP_Ack message was expected from the IP source address of the RREP_Ack, the router cancels any associated timeouts 2. If the RREP_Ack was expected, ensure the router sending the RREP_Ack is marked with state Confirmed in the Neighbor Table (Section 4.3) 7.4. Route Error (RERR) Message A Route Error message is generated by an AODVv2 router to notify other AODVv2 routers of routes that are no longer available. A RERR message has the following general structure: +-----------------------------------------------------------------+ | msg_hop_limit | +-----------------------------------------------------------------+ | PktSource (optional) | +-----------------------------------------------------------------+ | AddressList | +-----------------------------------------------------------------+ | PrefixLengthList (optional) | +-----------------------------------------------------------------+ | SeqNumList (optional) | +-----------------------------------------------------------------+ | MetricTypeList (optional) | +-----------------------------------------------------------------+ Figure 3: RERR message structure RERR Data Elements msg_hop_limit The remaining number of hops allowed for dissemination of the RERR message. PktSource The source IP address of the packet triggering the RERR. If the RERR is triggered by a broken link, the PktSource data element is not required. AddressList The addresses of the routes no longer available through RERR_Gen. PrefixLengthList The prefix lengths, in bits, associated with the routes no longer available through RERR_Gen, indicating whether a route represents a single device or a subnet. Perkins, et al. Expires January 7, 2016 [Page 43] Internet-Draft AODVv2 July 2015 SeqNumList The sequence numbers of the routes no longer available through RERR_Gen (where known). MetricTypeList The types of metric associated with the routes no longer available through RERR_Gen. This element can be omitted if all routes use the default metric type. 7.4.1. RERR Generation A RERR is generated when an AODVv2 router (also referred to as RERR_Gen) needs to report that a destination is no longer reachable. There are two events that cause this response: o If a packet arrives that cannot be forwarded because no valid route exists for its destination, the RERR generated MUST contain the PktSource data element and will contain only one unreachable address. The contents of PktSource and AddressList depend on the packet that triggered the RERR: * If the packet is a data packet forwarded by another AODVv2 router, PktSource is set to the source IP address of the packet, and the AddressList contains the destination IP address of the packet. * If the packet contains a RREP message and the route to OrigAddr has been lost, PktSource is set to the TargAddr of the RREP, and the AddressList contains the OrigAddr from the RREP. The prefix length and sequence number MAY be included if known from an Invalid route entry to the destination of the packet. The MetricTypeList MAY also be included if a MetricType can be determined from the packet itself, or if an Invalid route exists for the packet’s destination and the metric type is not DEFAULT_METRIC_TYPE. RERR_Gen MUST discard the packet or message that triggered generation of the RERR. In order to avoid flooding the network with RERR messages when a stream of packets to an unreachable address arrives, an AODVv2 router SHOULD determine whether a RERR has recently been sent with the same unreachable address and PktSource, and SHOULD avoid creating duplicate RERR messages. o When a link breaks, multiple routes may become Invalid, and the RERR generated MAY contain multiple unreachable addresses. If the Perkins, et al. Expires January 7, 2016 [Page 44] Internet-Draft AODVv2 July 2015 message contents would cause the MTU to be exceeded, multiple RERR messages must be sent. The RERR MUST include the MetricTypeList data element when it contains routes which do not use the DEFAULT_METRIC_TYPE. The PktSource data element is omitted. All previously Active routes that used the broken link MUST be reported. The AddressList, PrefixLengthList, SeqNumList, and MetricTypeList will contain entries for each route which has become Invalid. A RERR message is only sent if an Active route becomes Invalid, though an AODVv2 router can also include Idle routes that become Invalid if the configuration parameter ENABLE_IDLE_IN_RERR is set (see Section 11.3). Incidentally, if an AODVv2 router receives an ICMP error packet to or from the address of one of its Router Clients, it simply forwards the ICMP packet in the same way as any other data packet, and will not generate any RERR message based on the contents of the ICMP packet. The RERR should not be generated if the limit for the rate of AODVv2 control message generation has been reached. To generate the RERR, the router follows this procedure: 1. Set msg_hop_limit := MAX_HOPCOUNT 2. If necessary, include the PktSource data element and set the value to the source address of the packet triggering the RERR 3. For each route that needs to be reported, while respecting the interface MTU: 4. * Insert the route address into the AddressList. * Insert the prefix length into PrefixLengthList, if known and not equal to the address length. * Insert the sequence number into SeqNumList, if known. * Insert the metric type into MetricTypeList, if known and not equal to DEFAULT_METRIC_TYPE. If interface MTU would be exceeded, create additional RERR messages The AODVv2 message is used to create a corresponding RFC 5444 message (see Section 8). Perkins, et al. Expires January 7, 2016 [Page 45] Internet-Draft AODVv2 July 2015 If the RERR is sent in response to an undeliverable packet or message, it SHOULD be sent unicast to the next hop on the route to PktSource, or alternatively it MUST be multicast to LL-MANET-Routers. If the RERR is sent in response to a broken link, the RERR is, by default, multicast to LL-MANET-Routers. If the optional precursor lists feature (see Section 10.2) is enabled, the RERR is unicast to the precursors of the routes being reported. 7.4.2. RERR Reception Upon receiving a RERR, an AODVv2 router performs the following steps: 1. Verify that the message contains the required data elements: msg_hop_limit and at least one unreachable address * 2. If not, ignore this RREP for further processing. For each address in the AddressList, check that: * The address is valid (routable and unicast) * The MetricType, if present, is known (assume DEFAULT_METRIC_TYPE if not present) * There is a valid route with the same MetricType matching the address using longest prefix matching * Either the route’s next hop is the sender of the RERR and route’s next hop interface is the interface on which the RERR was received, or PktSource is present in the RERR and is a Router Client address * The unreachable address’ sequence number is either unknown, or is greater than the route’s sequence number If any of the above are false, the route does not need to be made Invalid and the unreachable address does not need to be advertised in a regenerated RERR. If all of the above are true: * If the route’s prefix length is the same as the unreachable address’ prefix length, set the route state to Invalid, and note that the route should be advertised in a regenerated RERR. Perkins, et al. Expires January 7, 2016 [Page 46] Internet-Draft AODVv2 July 2015 * If the prefix length is shorter than the original route, the route MUST be expunged from the routing table, since it is a sub-route of the larger route which is reported to be Invalid. * If the prefix length is different, create a new route with the unreachable address, and its prefix and sequence number, set the state to Invalid, and note that the route should be advertised in a regenerated RERR. * Update the sequence number on the stored route, if the reported sequence number is greater. 3. If PktSource is included and is a Router Client, do not regenerate the RERR. 4. Check if there are unreachable addresses which need to be advertised in a regenerated RERR * If so, regenerate the RERR as detailed in Section 7.4.3. * If not, take no further action. 7.4.3. RERR Regeneration The RERR should not be generated if the limit for the rate of AODVv2 control message generation has been reached. The procedure for RERR regeneration is as follows: 1. Set msg_hop_limit := received msg_hop_limit - 1 2. If msg_hop_limit is now zero, do not continue the regeneration process 3. If the PktSource data element was included in the original RERR, copy it into the regenerated RERR 4. For each route that needs to be reported, while respecting the interface MTU: * Insert the unreachable address into the AddressList. * Insert the prefix length into PrefixLengthList, if known and not equal to the address length. * Insert the sequence number into SeqNumList, if known. Perkins, et al. Expires January 7, 2016 [Page 47] Internet-Draft * 5. AODVv2 July 2015 Insert the MetricType into MetricTypeList if known, and not equal to DEFAULT_METRIC_TYPE. If interface MTU would be exceeded, create additional RERR messages The AODVv2 message is used to create a corresponding RFC 5444 message (see Section 8). If the RERR contains the PktSource data element, the regenerated RERR SHOULD be sent unicast to the next hop on the route to PktSource, or alternatively it MUST be multicast to LLMANET-Routers. If the RERR is sent in response to a broken link, the RERR is, by default, multicast to LL-MANET-Routers. 8. RFC 5444 Representation AODVv2 specifies that all control plane messages between routers SHOULD use the Generalized Mobile Ad Hoc Network Packet/Message Format [RFC5444], and therefore AODVv2 defines route messages comprising data elements that map to message elements in RFC 5444. RFC 5444 provides a multiplexed transport for multiple protocols. An RFC 5444 multiplexer may choose to optimize the content of certain message elements to reduce control plane overhead. A brief summary of the RFC 5444 format: 1. A packet contains zero or more messages 2. A message contains a Message Header, one Message TLV Block, zero or more Address Blocks, and one Address Block TLV Block per Address Block 3. The Message TLV Block MAY contain zero or more Message TLVs 4. An Address Block TLV Block MAY include zero or more Address Block TLVs 5. Each TLV value in an Address Block TLV Block can be associated with all of the addresses, a contiguous set of addresses, or a single address in the Address Block AODVv2 does not require access to the RFC 5444 packet header. In the message header, AODVv2 uses <msg-hop-limit>, <msg-hop-count>, <msg-type> and <msg-addr-length>. <msg-addr-length> indicates the length of any addresses in the message (using <msg-addr-length> := address length in octets - 1, i.e. 3 for IPv4 and 15 for IPv6). Perkins, et al. Expires January 7, 2016 [Page 48] Internet-Draft AODVv2 July 2015 Each address included in the Address Block is identified as OrigAddr, TargAddr, PktSource, or Unreachable Address by including an ADDRESS_TYPE TLV in the Address Block TLV Block. The addresses in an Address Block may appear in any order, and values in a TLV in the Address Block TLV Block must be associated with the correct address in the Address Block. To indicate which value is associated with each address, the AODVv2 message representation uses lists where the order of the addresses in the AODVv2 AddressList data element matches the order of values in other list-based data elements, e.g., the order of SeqNums in the SeqNumList in a RERR. The following sections show how AODVv2 data elements are represented in RFC 5444 messages. See Section 12 for more information about the Message TLVs and Address Block TLVs AODVv2 defines, and the type numbers allocated. Where the extension type of a TLV is set to zero, this is the default RFC 5444 value and the extension type will not be included in the message. 8.1. 8.1.1. RREQ Message Header +---------------+-----------------+---------------------------------+ | Data Element | Header Field | Value | +---------------+-----------------+---------------------------------+ | None | <msg-type> | RREQ | | msg_hop_limit | <msg-hop-limit> | MAX_HOPCOUNT | | msg_hop_count | <msg-hop-count> | Number of hops traversed so far | | | | by the message. | +---------------+-----------------+---------------------------------+ 8.1.2. Message TLV Block A RREQ contains no Message TLVs. 8.1.3. Address Block A RREQ contains two Addresses, OrigAddr and TargAddr, and each address has an associated prefix length. If the prefix length has not been included in the AODVv2 message, it is equal to the address length in bits. Perkins, et al. Expires January 7, 2016 [Page 49] Internet-Draft AODVv2 July 2015 +-------------------------+------------------------------+ | Data Elements | Address Block | +-------------------------+------------------------------+ | OrigAddr/OrigPrefixLen | <address> + <prefix-length> | | TargAddr/TargPrefixLen | <address> + <prefix-length> | +-------------------------+------------------------------+ 8.1.4. Address Block TLV Block Address Block TLVs are always associated with addresses in the Address Block. The following sections show the TLVs that apply to each address. 8.1.4.1. Address Block TLVs for OrigAddr +--------------+---------------+------------+-----------------------+ | Data Element | TLV Type | Extension | Value | | | | Type | | +--------------+---------------+------------+-----------------------+ | None | ADDRESS_TYPE | 0 | ADDRTYPE_ORIGADDR | | OrigSeqNum | SEQ_NUM | 0 | Sequence Number of | | | | | RREQ_Gen, the router | | | | | which initiated route | | | | | discovery. | | OrigMetric | PATH_METRIC | MetricType | Metric for the route | | /MetricType | | | to OrigAddr, using | | | | | MetricType. | | ValidityTime | VALIDITY_TIME | 0 | ValidityTime for | | | | | route to OrigAddr. | +--------------+---------------+------------+-----------------------+ In the AODVv2 representation, if the message relates to DEFAULT_METRIC_TYPE, MetricType is not included in the message. RFC 5444 representation will set the extension type in the PATH_METRIC TLV to 0. AODVv2 interprets a MetricType of 0 as DEFAULT_METRIC_TYPE. 8.1.4.2. The Address Block TLVs for TargAddr +------------+--------------+-------------+-------------------------+ | Data | TLV Type | Extension | Value | | Element | | Type | | +------------+--------------+-------------+-------------------------+ | None | ADDRESS_TYPE | 0 | ADDRTYPE_TARGADDR | | TargSeqNum | SEQ_NUM | 0 | The last known | | | | | TargSeqNum for | | | | | TargAddr. | +------------+--------------+-------------+-------------------------+ Perkins, et al. Expires January 7, 2016 [Page 50] Internet-Draft 8.2. AODVv2 July 2015 8.2.1. RREP Message Header +---------------+-----------------+---------------------------------+ | Data Element | Header Field | Value | +---------------+-----------------+---------------------------------+ | None | <msg-type> | RREP | | msg_hop_limit | <msg-hop-limit> | <msg-hop-count> from | | | | corresponding RREQ. | | msg_hop_count | <msg-hop-count> | Number of hops traversed so far | | | | by the message. | +---------------+-----------------+---------------------------------+ 8.2.2. Message TLV Block A RREP contains no Message TLVs. 8.2.3. Address Block A RREP contains a minimum of two Addresses, OrigAddr and TargAddr, and each address has an associated prefix length. If the prefix length has not been included in the AODVv2 message, it is equal to the address length in bits. It may also contain the address of the intended next hop, in order to request acknowledgement to confirm adjacency, as described in Section 6.2. The prefix length associated with this address is equal to the address length in bits. +-------------------------+------------------------------+ | Data Elements | Address Block | +-------------------------+------------------------------+ | OrigAddr/OrigPrefixLen | <address> + <prefix-length> | | TargAddr/TargPrefixLen | <address> + <prefix-length> | | AckReq | <address> + <prefix-length> | +-------------------------+------------------------------+ 8.2.4. Address Block TLV Block Address Block TLVs are always associated with addresses in the Address Block. The following sections show the TLVs that apply to each address. Perkins, et al. Expires January 7, 2016 [Page 51] Internet-Draft 8.2.4.1. AODVv2 July 2015 Address Block TLVs for OrigAddr +-------------+---------------+----------------+--------------------+ | Data | TLV Type | Extension Type | Value | | Element | | | | +-------------+---------------+----------------+--------------------+ | None | ADDRESS_TYPE | 0 | ADDRTYPE_ORIGADDR | +-------------+---------------+----------------+--------------------+ 8.2.4.2. Address Block TLVs for TargAddr +--------------+---------------+------------+-----------------------+ | Data Element | TLV Type | Extension | Value | | | | Type | | +--------------+---------------+------------+-----------------------+ | None | ADDRESS_TYPE | 0 | ADDRTYPE_TARGADDR | | TargSeqNum | SEQ_NUM | 0 | Sequence number of | | | | | RREP_Gen, the router | | | | | which created the | | | | | RREP. | | TargMetric | PATH_METRIC | MetricType | Metric for the route | | /MetricType | | | to TargAddr, using | | | | | MetricType. | | ValidityTime | VALIDITY_TIME | 0 | ValidityTime for | | | | | route to TargAddr. | +--------------+---------------+------------+-----------------------+ In the AODVv2 representation, if the message relates to DEFAULT_METRIC_TYPE, MetricType is not included in the message. RFC 5444 representation will set the extension type in the PATH_METRIC TLV to 0. AODVv2 interprets a MetricType of 0 as DEFAULT_METRIC_TYPE. 8.2.4.3. The Address Block TLVs for AckReq Intended Recipient Address +--------------+---------------+-----------------+------------------+ | Data Element | TLV Type | Extension Type | Value | +--------------+---------------+-----------------+------------------+ | None | ADDRESS_TYPE | 0 | ADDRTYPE_INTEND | +--------------+---------------+-----------------+------------------+ 8.3. 8.3.1. RREP_Ack Message Header Perkins, et al. Expires January 7, 2016 [Page 52] Internet-Draft AODVv2 July 2015 +---------------+---------------+-----------+ | Data Element | Header Field | Value | +---------------+---------------+-----------+ | None | <msg-type> | RREP_Ack | +---------------+---------------+-----------+ 8.3.2. Message TLV Block A RREP_Ack contains no Message TLVs. 8.3.3. Address Block A RREP_Ack contains no Address Block. 8.3.4. Address Block TLV Block A RREP_Ack contains no Address Block TLV Block. 8.4. 8.4.1. RERR Message Header +----------------+------------------+---------------+ | Data Element | Header Field | Value | +----------------+------------------+---------------+ | None | <msg-type> | RERR | | msg_hop_limit | <msg-hop-limit> | MAX_HOPCOUNT | +----------------+------------------+---------------+ 8.4.2. Message TLV Block A RERR contains no Message TLVs. 8.4.3. Address Block The Address Block in a RERR may contain PktSource, the source IP address of the packet triggering RERR generation, as detailed in Section 7.4. Prefix Length associated with PktSource is equal to the address length in bits. Address Block always contains one Address per route that is no longer valid, and each address has an associated prefix length. If a prefix length has not been included for this address, it is equal to the address length in bits. Perkins, et al. Expires January 7, 2016 [Page 53] Internet-Draft AODVv2 July 2015 +------------------------------+------------------------------------+ | Data Element | Address Block | +------------------------------+------------------------------------+ | PktSource | <address> + <prefix-length> for | | | PktSource | | AddressList/PrefixLengthList | <address> + <prefix-length> for | | | each unreachable address in | | | AddressList | +------------------------------+------------------------------------+ 8.4.4. Address Block TLV Block Address Block TLVs are always associated with addresses in the Address Block. The following sections show the TLVs that apply to each type of address in the RERR. 8.4.4.1. Address Block TLVs for PktSource +--------------+---------------+---------------+--------------------+ | Data Element | TLV Type | Extension | Value | | | | Type | | +--------------+---------------+---------------+--------------------+ | PktSource | ADDRESS_TYPE | 0 | ADDRTYPE_PKTSOURCE | +--------------+---------------+---------------+--------------------+ 8.4.4.2. Address Block TLVs for Unreachable Addresses +----------------+--------------+------------+----------------------+ | Data Element | TLV Type | Extension | Value | | | | Type | | +----------------+--------------+------------+----------------------+ | None | ADDRESS_TYPE | 0 | ADDRTYPE_UNREACHABLE | | SeqNumList | SEQ_NUM | 0 | Sequence Number | | | | | associated with | | | | | invalid route to the | | | | | unreachable address. | | MetricTypeList | PATH_METRIC | MetricType | None. Extension Type | | | | | set to MetricType of | | | | | the route to the | | | | | unreachable address. | +----------------+--------------+------------+----------------------+ Using the PATH_METRIC TLV without a value is a mechanism used in RERR messages to indicate the MetricType associated with the route being reported, without the need to include a Metric value. Multiple PATH_METRIC TLVs may be necessary if routes with multiple MetricTypes are included in the RERR. Perkins, et al. Expires January 7, 2016 [Page 54] Internet-Draft AODVv2 July 2015 In the AODVv2 representation, if the RERR message includes only routes with DEFAULT_METRIC_TYPE, MetricType is not included in the message. In this case, the RFC 5444 representation does not need to include a PATH_METRIC TLV to indicate the DEFAULT_METRIC_TYPE. If the RERR message includes both routes with DEFAULT_METRIC_TYPE and other MetricTypes, only the routes with non-default MetricType need to be marked with a PATH_METRIC TLV using Extension Type to indicate MetricType. AODVv2 interprets the absence of MetricType information as an indication of DEFAULT_METRIC_TYPE. 9. Simple Internet Attachment Figure 4 shows a stub (i.e., non-transit) network of AODVv2 routers which is attached to the Internet via a single Internet AODVv2 Router (abbreviated IAR). The interface to the Internet MUST NOT be configured in the AODVv2_INTERFACES list. As in any Internet-attached network, AODVv2 routers and clients that wish to be reachable from hosts on the Internet MUST have IP addresses within the IAR’s routable and topologically correct prefix (i.e., 191.0.2.0/24). This AODVv2 network and subnets within it will be advertised to the internet using procedures which are out of scope for this specification. /-------------------------\ / +----------------+ \ / | AODVv2 Router | \ | | 191.0.2.2/32 | | | +----------------+ | Routable | +-----+--------+ Prefix | | Internet | /191.0.2.0/24 | | AODVv2 Router| / | | 191.0.2.1 |/ /---------------\ | | serving net +------+ Internet \ | | 191.0.2.0/24 | \ / | +-----+--------+ \---------------/ | +----------------+ | | | AODVv2 Router | | | | 191.0.2.3/32 | | \ +----------------+ / \ / \-------------------------/ Figure 4: Simple Internet Attachment Example When an AODVv2 router within the AODVv2 MANET wants to discover a route toward a node on the Internet, it uses the normal AODVv2 route discovery for that IP Destination Address. The IAR MUST respond to Perkins, et al. Expires January 7, 2016 [Page 55] Internet-Draft AODVv2 July 2015 RREQ on behalf of all Internet destinations, i.e., destinations not on the configured 191.0.2.0/24 subnet. When a packet from a node on the Internet destined for a node in the AODVv2 MANET reaches the IAR, if the IAR does not have a route toward that exact destination it will perform normal AODVv2 route discovery for that destination. Configuring the IAR as a default router is outside the scope of this specification. 10. Optional Features A number of optional features for AODVv2, associated initially with AODV, MAY be useful in networks with greater mobility or larger node populations, or networks requiring reduced latency for application launches. These features are not required by minimal implementations. 10.1. Expanding Rings Multicast For multicast RREQ, msg_hop_limit MAY be set in accordance with an expanding ring search as described in [RFC3561] to limit the RREQ propagation to a subset of the local network and possibly reduce route discovery overhead. 10.2. Precursor Lists This section specifies an interoperable enhancement to AODVv2 enabling more economical RERR notifications. There can be several sources of traffic for a certain destination. Each source of traffic and each upstream router between the forwarding AODVv2 router and the traffic source is known as a "precursor" for the destination. For each destination, an AODVv2 router MAY choose to keep track of precursors that have provided traffic for that destination. Route Error messages about that destination can be sent unicast to these precursors instead of multicast to all AODVv2 routers. Since a RERR will be regenerated if it comes from a next hop on a valid route, the RERR should ideally be sent backwards along the route that the source of the traffic uses, to ensure it is regenerated at each hop and reaches the traffic source. If the reverse path is unknown, the RERR should be sent toward the source along some other route. Therefore, the options for saving precursor information are as follows: Perkins, et al. Expires January 7, 2016 [Page 56] Internet-Draft AODVv2 July 2015 o Save the next hop on an existing route to the packet’s source address as the precursor. In this case, it is not guaranteed that a RERR that is sent will follow the reverse of the source’s route. In rare situations, this may prevent the route from being invalidated at the source of the data traffic. o Save the packet’s source address as the precursor. In this case, the RERR can be sent along any existing route to the source of the data traffic, and should include the PktSource data element to ensure that the route will be invalidated at the source of the traffic, in case the RERR does not follow the reverse of the source’s route. o By inspecting the MAC address of each forwarded packet, determine which router forwarded the packet, and save the router address as a precursor. This ensures that when a RERR is sent to the precursor router, the route will be invalidated at that router, and the RERR will be regenerated toward the source of the packet. During normal operation, each AODVv2 router maintaining precursor lists for a route must update the precursor list whenever it uses this route to forward traffic to the destination. Precursors are classified as Active if traffic has recently been forwarded by the precursor. The precursor is marked with a timestamp to indicate the time it last forwarded traffic on this route. When an AODVv2 router detects that one or more routes are broken, it MAY notify each Active precursor using a unicast Route Error message instead of creating multicast traffic. Unicast is applicable when there are few Active precursors compared to the number of neighboring AODVv2 routers. However, the default multicast behavior is still preferable when there are many precursors, since fewer message transmissions are required. When an AODVv2 router supporting precursor lists receives a RERR message, it MAY identify the list of its own affected Active precursors for the routes in the RERR, and choose to send a unicast RERR to those, rather than send a multicast RERR. When a route is expunged, any precursor list associated with it must also be expunged. 10.3. Intermediate RREP Without iRREP, only the AODVv2 router responsible for the target address can respond to a RREQ. Using iRREP, route discoveries can be faster and create less control traffic. This specification has been published as a separate Internet Draft [I-D.perkins-irrep]. Perkins, et al. Expires January 7, 2016 [Page 57] Internet-Draft 10.4. AODVv2 July 2015 Message Aggregation Delay The aggregation of multiple messages into a packet is specified in RFC 5444 [RFC5444]. Implementations MAY choose to briefly delay transmission of messages for the purpose of aggregation (into a single packet) or to improve performance by using jitter [RFC5148]. 11. Configuration AODVv2 uses various parameters which can be grouped into the following categories: o Timers o Protocol constants o Administrative parameters and controls This section show the parameters along with their definitions and default values (if any). Note that several fields have limited size (bits or bytes). These sizes and their encoding may place specific limitations on the values that can be set. 11.1. Timers AODVv2 requires certain timing information to be associated with route table entries and message replies. The default values are as follows: +------------------------+----------------+ | Name | Default Value | +------------------------+----------------+ | ACTIVE_INTERVAL | 5 second | | MAX_IDLETIME | 200 seconds | | MAX_BLACKLIST_TIME | 200 seconds | | MAX_SEQNUM_LIFETIME | 300 seconds | | RteMsg_ENTRY_TIME | 12 seconds | | RREQ_WAIT_TIME | 2 seconds | | RREP_Ack_SENT_TIMEOUT | 1 second | | RREQ_HOLDDOWN_TIME | 10 seconds | +------------------------+----------------+ Table 3: Timing Parameter Values Perkins, et al. Expires January 7, 2016 [Page 58] Internet-Draft AODVv2 July 2015 The above timing parameter values have worked well for small and medium well-connected networks with moderate topology changes. The timing parameters SHOULD be administratively configurable. Ideally, for networks with frequent topology changes the AODVv2 parameters should be adjusted using experimentally determined values or dynamic adaptation. For example, in networks with infrequent topology changes MAX_IDLETIME may be set to a much larger value. 11.2. Protocol Constants AODVv2 protocol constants typically do not require changes. The following table lists these constants, along with their values and a reference to the section describing their use. +------------------------+---------+--------------------------------+ | Name | Default | Description | +------------------------+---------+--------------------------------+ | DISCOVERY_ATTEMPTS_MAX | 3 | Section 6.4 | | RREP_RETRIES | 2 | Section 7.2.1 | | MAX_METRIC[MetricType] | [TBD] | Section 5 | | MAX_METRIC[HopCount] | 20 hops | Section 5 and Section 7 | | MAX_HOPCOUNT | 20 | Same as MAX_METRIC[HopCount] | | MAX_TIME | [TBD] | Maximum expressible clock time | | | | (Section 6.5.2) | +------------------------+---------+--------------------------------+ Table 4: AODVv2 Constants Note that <msg-hop-count> is an 8-bit field in the RFC 5444 message header and therefore MAX_HOPCOUNT cannot be larger than 255. Field lengths associated with metrics are to be found in Section 12.3. MAX_METRIC[MetricType] MUST always be the maximum expressible metric of type MetricType. These protocol constants MUST have the same values for all AODVv2 routers in the ad hoc network. If the values were configured differently, the following consequences may be observed: o DISCOVERY_ATTEMPTS_MAX: Nodes with higher values are likely to be more successful at finding routes, at the cost of additional control traffic. o RREP_RETRIES: Nodes with lower values are more likely to blacklist neighbors when there is a temporary fluctuation in link quality. o MAX_HOPCOUNT: Nodes with a value too small would not be able to discover routes to distant addresses. Perkins, et al. Expires January 7, 2016 [Page 59] Internet-Draft AODVv2 July 2015 o MAX_METRIC[MetricType]: No interoperability problems due to variations on different nodes, but nodes with lower values may exhibit overly restrictive behavior during route comparisons. o MAX_TIME: No interoperability problems due to variations on different nodes, but if a lower value is used, route state management may exhibit overly restrictive behavior. 11.3. Local Settings The following table lists AODVv2 parameters which should be administratively configured for each node: +------------------------+------------------------+--------------+ | Name | Default Value | Description | +------------------------+------------------------+--------------+ | AODVv2_INTERFACES | | Section 3 | | BUFFER_SIZE_PACKETS | 2 | Section 6.4 | | BUFFER_SIZE_BYTES | MAX_PACKET_SIZE [TBD] | Section 6.4 | | CLIENT_ADDRESSES | AODVv2_INTERFACES | Section 4.2 | | CONTROL_TRAFFIC_LIMIT | [TBD - 50 pkts/sec?] | Section 7 | +------------------------+------------------------+--------------+ Table 5: Configuration for Local Settings 11.4. Network-Wide Settings The following administrative controls may be used to change the operation of the network. The same settings should be used across the network. Inconsistent settings at different nodes in the network will not result in protocol errors, but poor performance may result, especially if metrics are misinterpreted because DEFAULT_METRIC_TYPE is configured differently at different nodes. +----------------------+----------------------+----------------+ | Name | Default | Description | +----------------------+----------------------+----------------+ | DEFAULT_METRIC_TYPE | 3 (i.e., Hop Count) | [RFC6551] | | ENABLE_IDLE_IN_RERR | Disabled | Section 7.4.1 | +----------------------+----------------------+----------------+ Table 6: Configuration for Network-Wide Settings 11.5. Optional Feature Settings These options are not required for correct routing behavior, although they may reduce AODVv2 protocol overhead in certain situations. The default behavior is to leave these options disabled. Perkins, et al. Expires January 7, 2016 [Page 60] Internet-Draft AODVv2 July 2015 +---------------------------+-----------+---------------------------+ | Name | Default | Description | +---------------------------+-----------+---------------------------+ | PRECURSOR_LISTS | Disabled | Local (Section 10.2) | | MSG_AGGREGATION | Disabled | Local (Section 10.4) | | ENABLE_IRREP | Disabled | Network-wide (Section | | | | 10.3) | | EXPANDING_RINGS_MULTICAST | Disabled | Network-wide (Section | | | | 10.1) | +---------------------------+-----------+---------------------------+ Table 7: Configuration for Optional Features 12. IANA Considerations This section specifies several RFC 5444 message types, message tlvtypes, and address tlv-types required for AODVv2. Also, a new registry of 16-bit metric types is specified. 12.1. RFC 5444 Message Types +-----------------------------------------+-----------+ | Name of Message | Type | +-----------------------------------------+-----------+ | Route Request (RREQ) | 10 (TBD) | | Route Reply (RREP) | 11 (TBD) | | Route Error (RERR) | 12 (TBD) | | Route Reply Acknowledgement (RREP_Ack) | 13 (TBD) | +-----------------------------------------+-----------+ Table 8: AODVv2 Message Types 12.2. RFC 5444 Address Block TLV Types +------------------------+----------+---------------+---------------+ | Name of TLV | Type | Length | Reference | | | | (octets) | | +------------------------+----------+---------------+---------------+ | PATH_METRIC | 10 (TBD) | depends on | Section 7 | | | | MetricType | | | SEQ_NUM | 11 (TBD) | 2 | Section 7 | | ADDRESS_TYPE | 15 (TBD) | 1 | Section 8 | | VALIDITY_TIME | 1 | 1 | [RFC5497] | +------------------------+----------+---------------+---------------+ Table 9: AODVv2 Address Block TLV Types Perkins, et al. Expires January 7, 2016 [Page 61] Internet-Draft 12.3. AODVv2 July 2015 MetricType Allocation Metric types are identified according to the assignments in [RFC6551]. +------------------------+----------+--------------+ | Name of MetricType | Type | Metric Size | +------------------------+----------+--------------+ | Unassigned | 0 | Undefined | | Currently Unsupported | 1 - 2 | TBD | | Hop Count | 3 [TBD] | 1 octet | | Currently Unsupported | 4 - 8 | TBD | | Unallocated | 9 - 254 | TBD | | Reserved | 255 | Undefined | +------------------------+----------+--------------+ Table 10: AODVv2 Metric Types When creating AODVv2 messages which relate to the DEFAULT_METRIC_TYPE, MetricType is not reported in the message. In the RFC 5444 message representation, the PATH_METRIC TLV, if included, will not include an extension type. While RFC 5444 would interpret the lack of an extension type value as indication that extension type is zero, AODVv2 will interpret an extension type of zero to mean the DEFAULT_METRIC_TYPE configured on the router. This is possible because zero is not assigned to any metric type ([RFC6551]). In RERR, the absence of the PATH_METRIC TLV also indicates use of the DEFAULT_METRIC_TYPE. 12.4. AddressType Allocation The values used in the Address Type TLV used in Section 8 are given in the table below: +-----------------------+--------+ | Address Type | Value | +-----------------------+--------+ | ADDRTYPE_ORIGADDR | 0 | | ADDRTYPE_TARGADDR | 1 | | ADDRTYPE_UNREACHABLE | 2 | | ADDRTYPE_PKTSOURCE | 3 | | ADDRTYPE_INTEND | 4 | +-----------------------+--------+ Table 11: AODVv2 Address Types Perkins, et al. Expires January 7, 2016 [Page 62] Internet-Draft 13. AODVv2 July 2015 Security Considerations This section describes various security considerations and potential avenues to secure AODVv2 routing. The objective of the AODVv2 protocol is for each router to communicate reachability information about addresses for which it is responsible, and for routes it has learned from other AODVv2 routers. Positive routing information (i.e. a route exists) is distributed via RREQ and RREP messages. Negative routing information (i.e. a route does not exist) is distributed via RERR messages. AODVv2 routers store the information contained in these messages in order to properly forward data packets, and they generally provide this information to other AODVv2 routers. Networks using AODVv2 to maintain connectivity and establish routes on demand may be vulnerable to certain well-known types of threats. Flooding attacks using RREQ amount to a denial of service for route discovery. Valid route table entries can be replaced by maliciously constructed RREQ and RREP messages. Links could be erroneously treated as bidirectional if malicious unsolicited RREP or RREP_Ack messages were to be accepted. Replay attacks using RERR messages could, in some circumstances, be used to disrupt active routes. Passive inspection of AODVv2 control messages could enable unauthorized devices to gain information about the network topology, since exchanging such information is the main purpose of AODVv2. The on-demand nature of AODVv2 route discovery reduces the vulnerability to route disruption. Since control traffic for updating route tables is diminished, there is less opportunity for failure. Processing requirements for AODVv2 are typically quite small, and would typically be dominated by calculations to verify integrity. This has the effect of reducing (but by no means eliminating) AODVv2’s vulnerability to denial of service attacks. Encryption MAY be used for AODVv2 messages. If the routers share a packet-level security association, the message data can be encrypted prior to message transmission. The establishment of such security associations is outside the scope of this specification. Encryption will not only protect against unauthorized devices obtaining information about network topology but will ensure that only trusted routers participate in routing operations. Message integrity checking is enabled by the Integrity Check Value mechanisms defined in [RFC7182]. The data contained in AODVv2 routing protocol messages SHOULD be verified using ICV values, to avoid the use of message data if the message has been tampered with or replayed. Otherwise, it would be possible to disrupt communications by injecting nonexistent or malicious routes into the Perkins, et al. Expires January 7, 2016 [Page 63] Internet-Draft AODVv2 July 2015 route tables of nodes within the ad hoc network. This can result in loss of data or message processing by unauthorized devices. The remainder of this section provides specific recommendations for the use of the integrity checking and timestamp functions defined in [RFC7182] to ensure the integrity of each AODVv2 message. The calculation used for the Integrity Check Value will depend on the message type. Sequence numbers can be used as timestamps to protect against replay, since they are known to be strictly increasing. RREQ messages advertise a route to OrigAddr, and impose very little processing requirement for receivers. The main threat presented by sending a RREQ message with false information is that traffic to OrigAddr could be disrupted. Since RREQ is multicast and likely to be received by all nodes in the ad hoc network, this threat could have serious impact on applications communicating by way of OrigAddr. The actual threat to disrupt routes to OrigAddr is reduced by the AODVv2 mechanism of marking RREQ-derived routes as "Unconfirmed" until adjacency with the next hop is confirmed. If AODVv2 routers always verify the integrity of the RREQ message data, then the threat of disruption is minimized. The ICV mechanisms offered in [RFC7182] are sufficient for this purpose. Since OrigAddr is included as a data element of the RREQ, the ICV can be calculated and verified using message contents. The ICV should be verified at every step along the dispersal path of the RREQ to mitigate the threat. Since RREQ_Gen’s sequence number is incremented for each new RREQ, replay protection is already afforded and no extra timestamp mechanism is required. RREP messages advertise a route to TargAddr, and impose very little processing requirement for receivers. The main threat presented by sending a RREP message with false information is that traffic to TargAddr could be disrupted. Since RREP is unicast, this threat is restricted to receivers along the path from OrigAddr to TargAddr. If AODVv2 routers always verify the integrity of the RREP message data, then this threat is minimized. This facility is offered by the ICV mechanisms in [RFC7182]. Since TargAddr is included as a data element of the RREP, the ICV can be calculated and verified using message contents. The ICV should be verified at every step along the unicast path of the RREP. Since RREP_Gen’s sequence number is incremented for each new RREP, replay protection is afforded and no extra timestamp mechanism is required. RREP_Ack messages are intended to verify bidirectional neighbor connectivity, and impose very little processing requirement for receivers. The main threat presented by sending a RREP_Ack message with false information is that the route advertised to a target node in a RREP might be erroneously accepted even though the route would Perkins, et al. Expires January 7, 2016 [Page 64] Internet-Draft AODVv2 July 2015 contain a unidirectional link and thus not be suitable for most traffic. Since RREP_Ack is unicast, this threat is strictly local to the RREP transmitter expecting the acknowledgement. A malicious router could also attempt to send an unsolicited RREP_Ack to convince another router that a bidirectional link exists and subsequently use further messages to divert traffic along a route which is not valid. If AODVv2 routers always verify the integrity of the RREP_Ack message data, then this threat is minimized. This facility is offered by the ICV mechanisms in [RFC7182]. The RREP_Gen SHOULD use the source IP address of the RREP_Ack to identify the sender, and so the ICV should be calculated using the message contents and the IP source address. The message must also include the Timestamp defined in [RFC7182] to protect against replay attacks, using TargSeqNum from the RREP as the value in the TIMESTAMP TLV. RERR messages remove routes, and impose very little processing requirement for receivers. The main threat presented by sending a RERR message with false information is that traffic to the advertised destinations could be disrupted. Since RERR is multicast and can be received by many routers in the ad hoc network, this threat could have serious impact on applications communicating by way of the sender of the RERR message. However, since the sender of the RERR message with erroneous information may be presumed to be either malicious or broken, it is better that such routes not be used anyway. Another threat is that a malicious RERR message may be sent with a PktSource data element included, to disrupt PktSource’s ability to send to the addresses contained in the RERR. If AODVv2 routers always verify the integrity of the RERR message data, then this threat is reduced. This facility is offered by the ICV mechanisms in [RFC7182]. The receiver of the RERR SHOULD use the source IP address of the RERR to identify the sender. The message must also include the Timestamp defined in [RFC7182] to protect against replay attacks, using SeqNum from RERR_Gen as the value in the TIMESTAMP TLV. 14. Acknowledgments AODVv2 is a descendant of the design of previous MANET on-demand protocols, especially AODV [RFC3561] and DSR [RFC4728]. Changes to previous MANET on-demand protocols stem from research and implementation experiences. Thanks to Elizabeth Belding and Ian Chakeres for their long time authorship of AODV. Additional thanks to Derek Atkins, Emmanuel Baccelli, Abdussalam Baryun, Ramon Caceres, Thomas Clausen, Justin Dean, Christopher Dearlove, Ulrich Herberg, Henner Jakob, Luke Klein-Berndt, Lars Kristensen, Tronje Krop, Koojana Kuladinithi, Kedar Namjoshi, Keyur Patel, Alexandru Petrescu, Henning Rogge, Fransisco Ros, Pedro Ruiz, Christoph Sommer, Romain Thouvenin, Richard Trefler, Jiazi Yi, Seung Yi, and Cong Yuan, for Perkins, et al. Expires January 7, 2016 [Page 65] Internet-Draft AODVv2 July 2015 their reviews AODVv2 and DYMO, as well as numerous specification suggestions. 15. References 15.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 4291, February 2006. [RFC5082] Gill, V., Heasley, J., Meyer, D., Savola, P., and C. Pignataro, "The Generalized TTL Security Mechanism (GTSM)", RFC 5082, October 2007. [RFC5444] Clausen, T., Dearlove, C., Dean, J., and C. Adjih, "Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format", RFC 5444, February 2009. [RFC5497] Clausen, T. and C. Dearlove, "Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs)", RFC 5497, March 2009. [RFC5498] Chakeres, I., "IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols", RFC 5498, March 2009. [RFC6551] Vasseur, JP., Kim, M., Pister, K., Dejean, N., and D. Barthel, "Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks", RFC 6551, March 2012. 15.2. Informative References [I-D.perkins-irrep] Perkins, C., "Intermediate RREP for dynamic MANET Ondemand (AODVv2) Routing", draft-perkins-irrep-03 (work in progress), May 2015. [Perkins94] Perkins, C. and P. Bhagwat, "Highly Dynamic DestinationSequenced Distance-Vector Routing (DSDV) for Mobile Computers", Proceedings of the ACM SIGCOMM ’94 Conference on Communications Architectures, Protocols and Applications, London, UK, pp. 234-244, August 1994. Perkins, et al. Expires January 7, 2016 [Page 66] Internet-Draft AODVv2 July 2015 [Perkins99] Perkins, C. and E. Royer, "Ad hoc On-Demand Distance Vector (AODV) Routing", Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90-100, February 1999. [RFC2501] Corson, M. and J. Macker, "Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations", RFC 2501, January 1999. [RFC3561] Perkins, C., Belding-Royer, E., and S. Das, "Ad hoc OnDemand Distance Vector (AODV) Routing", RFC 3561, July 2003. [RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast Addresses", RFC 4193, October 2005. [RFC4728] Johnson, D., Hu, Y., and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, February 2007. [RFC4861] Narten, T., Nordmark, E., Simpson, W., and H. Soliman, "Neighbor Discovery for IP version 6 (IPv6)", RFC 4861, September 2007. [RFC5148] Clausen, T., Dearlove, C., and B. Adamson, "Jitter Considerations in Mobile Ad Hoc Networks (MANETs)", RFC 5148, February 2008. [RFC6130] Clausen, T., Dearlove, C., and J. Dean, "Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)", RFC 6130, April 2011. [RFC6621] Macker, J., "Simplified Multicast Forwarding", RFC 6621, May 2012. [RFC7182] Herberg, U., Clausen, T., and C. Dearlove, "Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs)", RFC 7182, April 2014. Appendix A. Features Required of IP AODVv2 needs the following: o information that IP routes are requested o information that packets are flowing Perkins, et al. Expires January 7, 2016 [Page 67] Internet-Draft o AODVv2 July 2015 the ability to queue packets A reactive protocol reacts when a route is needed. A route is requested when an application tries to send a packet. The fundamental concept of reactive routing is to avoid creating routes that are not needed. The trigger for route discovery is an application trying to send a packet. If a route is not available to forward the packet, the packet is queued while the route is requested. Appendix B. Multi-homing Considerations Multi-homing is not supported by the AODVv2 specification. The coordination between multiple AODVv2 routers to distribute routing information correctly for a shared address is not defined. Previous work indicates that it can be supported by expanding the sequence number to include the AODVv2 router’s IP address as a parsable field of the SeqNum. Without this, comparing sequence numbers would not work to evaluate freshness. Even when the IP address is included, there is no good way to compare sequence numbers from different IP addresses, but a handling node can determine whether the two given sequence numbers are comparable. If the route table can store multiple routes for the same destination, then multihoming can work with sequence numbers augmented by IP addresses. This non-normative information is provided simply to document the results of previous efforts to enable multi-homing. The intention is to simplify the task of future specification if multihoming becomes necessary for reactive protocol operation. Appendix C. Router Client Relocation Only one AODVv2 router within a MANET SHOULD be responsible for a particular address at any time. If two AODVv2 routers dynamically shift the advertisement of a network prefix, correct AODVv2 routing behavior must be observed. The AODVv2 router adding the new network prefix must wait for any existing routing information about this network prefix to be purged from the network, i.e., it must wait at least MAX_SEQNUM_LIFETIME after the previous AODVv2 router’s last SeqNum update for this network prefix. Appendix D. Example Algorithms for AODVv2 Operations The following subsections show example algorithms for protocol operations required by AODVv2. AODVv2 requires general algorithms for manipulating and comparing table entries, and algorithms specific to each message type. Perkins, et al. Expires January 7, 2016 [Page 68] Internet-Draft AODVv2 July 2015 Processing for messages follows the following general outline: 1. Receive incoming message. 2. Update route table as appropriate. 3. Respond as needed, often regenerating the incoming message with updated information. Once the route table has been updated, the information contained there is known to be the most recent available information for any fields in the outgoing message. For this reason, the algorithms are written as if outgoing message field values are assigned from the route table information, even though it is often equally appropriate to use fields from the incoming message. The following table indicates the field names used in subsequent sections to describe the AODVv2 algorithms. +-------------------------+-----------------------------------------+ | Parameter | Description | +-------------------------+-----------------------------------------+ | RteMsg | A route message | | | (inRREQ/outRREQ/inRREP/outRREP) | | RteMsg.HopLimit | Hop limit for the message | | RteMsg.HopCount | Hop count for the message | | RteMsg.AckReq | True/False, optional in RREP | | RteMsg.MetricType | The type of metric included, optional | | RteMsg.OrigAddr | Address of source of queued data | | RteMsg.TargAddr | Address route is requested for | | RteMsg.OrigPrefixLen | Prefix length of OrigAddr, optional | | RteMsg.TargPrefixLen | Prefix length of TargAddr, optional | | RteMsg.OrigSeqNum | SeqNum of OrigAddr, in RREQ only | | RteMsg.TargSeqNum | SeqNum of TargAddr, in RREP, optional | | | in RREQ | | RteMsg.OrigMetric | Metric to OrigAddr, in RREQ only | | RteMsg.TargMetric | Metric to TargAddr, in RREP only | | RteMsg.ValidityTime | Time limit for route advertised | | RteMsg.NbrIP | Sender of the RteMsg | | RteMsg.Netif | Interface on which the RteMsg arrived | | AdvRte | Derived from a RteMsg (see Section 6.5) | | AdvRte.Address | Route destination address | | AdvRte.PrefixLength | Route destination prefix length | | AdvRte.SeqNum | SeqNum associated with route | | AdvRte.MetricType | MetricType associated with route | | AdvRte.Metric | Advertised metric of route | | AdvRte.Cost | Cost from receiving router | | AdvRte.ValidityTime | Time limit for route advertised | Perkins, et al. Expires January 7, 2016 [Page 69] Internet-Draft AODVv2 July 2015 | AdvRte.NextHopIP | Sender of the RteMsg | | AdvRte.NextHopIntf | Interface on which the RteMsg arrived | | AdvRte.HopCount | Number of hops traversed | | AdvRte.HopLimit | Allowed number of hops remaining | | Route | A route table entry (see Section 4.6) | | Route.Address | Route destination address | | Route.PrefixLength | Route destination prefix length | | Route.SeqNum | SeqNum associated with route | | Route.NextHop | Address of router which advertised the | | | route | | Route.NextHopInterface | Interface on which next hop is | | | reachable | | Route.LastUsed | Time this route was last used for | | | packet forwarding | | Route.LastSeqNumUpdate | Time the SeqNum of the route was last | | | updated | | Route.ExpirationTime | Time at which the route will expire | | Route.MetricType | MetricType associated with route | | Route.Metric | Cost from receiving router | | Route.State | Active/Idle/Invalid | | Route.Precursors | Optional (see Section 10.2) | | RERR | Route Error message (inRERR/outRERR) | | RERR.HopLimit | Hop limit for the message | | RERR.PktSource | Source address of packet which | | | triggered RERR | | RERR.AddressList[] | List of unreachable route addresses | | RERR.PrefixLengthList[] | List of PrefixLengths for AddressList | | RERR.SeqNumList[] | List of SeqNums for AddressList | | RERR.MetricTypeList[] | MetricType for the invalid routes | | RERR.Netif | Interface on which the RERR arrived | +-------------------------+-----------------------------------------+ Table 12: Notation used in Appendix D.1. D.1.1. General Operations Check_Route_State Perkins, et al. Expires January 7, 2016 [Page 70] Internet-Draft /* AODVv2 July 2015 Update the state of the route entry based on timeouts. Return whether the route can be used for forwarding a packet. */ Check_Route_State(route) { if (CurrentTime > route.ExpirationTime) route.State := Invalid; if ((CurrentTime - route.LastUsed > ACTIVE_INTERVAL + MAX_IDLETIME) AND (route.State != Unconfirmed) AND (route.ExpirationTime == MAX_TIME)) //not a timed route route.State := Invalid; if ((CurrentTime - route.LastUsed > ACTIVE_INTERVAL) AND (route.State != Unconfirmed) AND (route.ExpirationTime == MAX_TIME)) //not a timed route route.State := Idle; if ((CurrentTime - route.LastSeqNumUpdate > MAX_SEQNUM_LIFETIME) AND (route.State == Invalid OR route.State == Unconfirmed)) /* remove route from route table */ if ((CurrentTime - route.LastSeqNumUpdate > MAX_SEQNUM_LIFETIME) AND (route.State != Invalid) route.SeqNum := 0; if (route still exists AND route.State != Invalid AND Route.State != Unconfirmed) return TRUE; else return FALSE; } D.1.2. Process_Routing_Info (See Section 6.5.1) Perkins, et al. Expires January 7, 2016 [Page 71] Internet-Draft AODVv2 July 2015 /* Compare incoming route information to stored route, and if better, use to update stored route. */ Process_Routing_Info (advRte) { rte := Fetch_Route_Table_Entry (advRte); if (!rte exists) { rte := Create_Route_Table_Entry(advRte); return rte; } if (AdvRte.SeqNum > Route.SeqNum /* stored route is stale OR (AdvRte.SeqNum == Route.SeqNum /* same SeqNum AND ((Route.State == Invalid AND LoopFree(advRte, rte)) /* advRte can repair stored OR AdvRte.Cost < Route.Metric))) /* advRte is better { if (advRte is from a RREQ) rte := Create_Route_Table_Entry(advRte); else Update_Route_Table_Entry (rte, advRte); } return rte; */ */ */ */ } D.1.3. Fetch_Route_Table_Entry Perkins, et al. Expires January 7, 2016 [Page 72] Internet-Draft AODVv2 July 2015 /* Lookup a route table entry matching an advertised route */ Fetch_Route_Table_Entry (advRte) { foreach (rteTableEntry in rteTable) { if (rteTableEntry.Address == advRte.Address AND rteTableEntry.MetricType == advRte.MetricType) return rteTableEntry; } return null; } /* Lookup a route table entry matching address and metric type */ Fetch_Route_Table_Entry (destination, metricType) { foreach (rteTableEntry in rteTable) { if (rteTableEntry.Address == destination AND rteTableEntry.MetricType == metricType) return rteTableEntry; } return null; } D.1.4. Update_Route_Table_Entry /* Update a route table entry using AdvRte in received RteMsg */ Update_Route_Table_Entry (rte, advRte); { rte.SeqNum := advRte.SeqNum; rte.NextHop := advRte.NextHopIp; rte.NextHopInterface := advRte.NextHopIntf; rte.LastUsed := CurrentTime; rte.LastSeqNumUpdate := CurrentTime; if (validityTime) rte.ExpirationTime := CurrentTime + advRte.ValidityTime; else rte.ExpirationTime := MAX_TIME; rte.Metric := advRte.Cost; if (rte.State == Invalid) rte.State := Idle (if advRte is from RREP); or Unconfirmed (if advRte is from RREQ); } Perkins, et al. Expires January 7, 2016 [Page 73] Internet-Draft D.1.5. AODVv2 July 2015 Create_Route_Table_Entry /* Create a route table entry from address and prefix length */ Create_Route_Table_Entry (address, prefixLength, seqNum, metricType) { rte := allocate_memory(); rte.Address := address; rte.PrefixLength := prefixLength; rte.SeqNum := seqNum; rte.MetricType := metricType; } /* Create a route table entry from the advertised route */ Create_Route_Table_Entry(advRte) { rte := allocate_memory(); rte.Address := advRte.Address; if (advRte.PrefixLength) rte.PrefixLength := advRte.PrefixLength; else rte.PrefixLength := maxPrefixLenForAddressFamily; rte.SeqNum := advRte.SeqNum; rte.NextHop := advRte.NextHopIp; rte.NextHopInterface := advRte.NextHopIntf; rte.LastUsed := CurrentTime; rte.LastSeqNumUpdate := CurrentTime; if (validityTime) rte.ExpirationTime := CurrentTime + advRte.ValidityTime; else rte.ExpirationTime := MAX_TIME; rte.MetricType := advRte.MetricType; rte.Metric := advRte.Metric; rte.State := Idle (if advRte is from RREP); or Unconfirmed (if advRte is from RREQ); } D.1.6. LoopFree Perkins, et al. Expires January 7, 2016 [Page 74] Internet-Draft AODVv2 July 2015 /* Return TRUE if the route advRte is LoopFree compared to rte */ LoopFree(advRte, rte) { if (advRte.Cost <= rte.Cost) return TRUE; else return FALSE; } D.1.7. Fetch_Rte_Msg_Table_Entry /* Find an entry in the RteMsg table matching the given message’s msg-type, OrigAddr, TargAddr, MetricType */ Fetch_Rte_Msg_Table_Entry (rteMsg) { foreach (entry in RteMsgTable) { if (entry.msg-type == rteMsg.msg-type AND entry.OrigAddr == rteMsg.OrigAddr AND entry.TargAddr == rteMsg.TargAddr AND entry.MetricType == rteMsg.MetricType) return entry; } return NULL; } D.1.8. Update_Rte_Msg_Table (See Section 4.5) /* Update the multicast route message suppression table based on the received RteMsg, return true if it was created or the SeqNum was updated (i.e. it needs to be regenerated) */ Update_Rte_Msg_Table(rteMsg) { /* search for a comparable entry */ entry := Fetch_Rte_Msg_Table_Entry(rteMsg); /* if there is none, create one */ if (entry does not exist) { entry.MessageType := rteMsg.msg_type; entry.OrigAddr := rteMsg.OrigAddr; entry.TargAddr := rteMsg.TargAddr; entry.OrigSeqNum := rteMsg.origSeqNum; // (if present) Perkins, et al. Expires January 7, 2016 [Page 75] Internet-Draft AODVv2 July 2015 entry.TargSeqNum := rteMsg.targSeqNum; // (if present) entry.MetricType := rteMsg.MetricType; entry.Metric := rteMsg.OrigMetric; // (for RREQ) or rteMsg.TargMetric; // (for RREP) entry.Timestamp := CurrentTime; return TRUE; } /* if current entry is stale */ if ( (rteMsg.msg-type == RREQ AND entry.OrigSeqNum OR (rteMsg.msg-type == RREP AND entry.TargSeqNum { entry.OrigSeqNum := rteMsg.OrigSeqNum; // entry.TargSeqNum := rteMsg.TargSeqNum; // entry.Timestamp := CurrentTime; return TRUE; } < rteMsg.OrigSeqNum) < rteMsg.TargSeqNum)) (if present) (if present) /* if received rteMsg is stale */ if ( (rteMsg.msg-type == RREQ AND entry.OrigSeqNum > rteMsg.OrigSeqNum) OR (rteMsg.msg-type == RREP AND entry.TargSeqNum > rteMsg.TargSeqNum)) { entry.Timestamp := CurrentTime; return FALSE; } /* if same SeqNum but rteMsg has lower metric */ if (entry.Metric > rteMsg.Metric) entry.Metric := rteMsg.Metric; entry.Timestamp := CurrentTime; return FALSE; } D.1.9. Build_RFC_5444_Message_Header Perkins, et al. Expires January 7, 2016 [Page 76] Internet-Draft /* AODVv2 July 2015 This pseudocode shows possible RFC 5444 actions, and would not be performed by the AODVv2 implementation. It is shown only to provide more understanding about the AODVv2 message that will be constructed by RFC 5444. MAL := Message Address Length MF := Message Flags Size := number of octets in MsgHdr, AddrBlk, AddrTLVs */ Build_RFC_5444_Message_Header (msgType, Flags, AddrFamily, Size, hopLimit, hopCount, tlvLength) { /* Build RFC 5444 message header fields */ msg-type := msgType; MF := Flags; MAL := 3 or 15; // for IPv4 or IPv6 msg-size := Size; msg-hop-limit := hopLimit; if (hopCount != 0) /* if hopCount is 0, do not include */ msg-hop-count := hopCount; msg.tlvs-length := tlvLength; } D.2. RREQ Operations D.2.1. /* Generate_RREQ Generate a route request message to find a route from OrigAddr to TargAddr using the given MetricType origAddr := IP address of Router Client which generated the packet to be forwarded origPrefix := prefix length associated with the Router Client targAddr := destination IP address in the packet to be forwarded targSeqNum := sequence number in existing route to targAddr mType := metric type for the requested route */ Generate_RREQ(origAddr, origPrefix, targAddr, targSeqNum, mType) { /* Increment sequence number in nonvolatile storage */ mySeqNum := (1 + mySeqNum); /* Marshall parameters */ outRREQ.HopLimit := MAX_HOPCOUNT; outRREQ.HopCount := 0; // if included outRREQ.MetricType := mType; //include if not DEFAULT_METRIC_TYPE outRREQ.OrigAddr := origAddr; outRREQ.TargAddr := targAddr; outRREQ.OrigPrefixLen := origPrefix; //include if not address length outRREQ.OrigSeqNum := mySeqNum; Perkins, et al. Expires January 7, 2016 [Page 77] Internet-Draft AODVv2 July 2015 outRREQ.TargSeqNum := targSeqNum; //included if available outRREQ.OrigMetric := Route[OrigAddr].Metric; //zero by default outRREQ.ValidityTime := limit for route to OrigAddr; //if required /* Build Address Blk using prefix length information from outRREQ.OrigPrefixLen if necessary */ AddrBlk := {outRREQ.OrigAddr, outRREQ.TargAddr}; /* Include sequence numbers in appropriate Address Block TLVs */ /* OrigSeqNum Address Block TLV */ origSeqNumAddrBlkTlv.value := outRREQ.OrigSeqNum; /* TargSeqNum Address Block TLV */ if (outRREQ.TargSeqNum is known) targSeqNumAddrBlkTlv.value := outRREQ.TargSeqNum; /* Build Metric Address Block TLV, include Metric AddrBlkTlv Extension type if a non-default metric */ metricAddrBlkTlv.value := outRREQ.OrigMetric; if (outRREQ.MetricType != DEFAULT_METRIC_TYPE) metricAddrBlkTlv.typeExtension := outRREQ.MetricType; if (outRREQ.ValidityTime is required) { /* Build VALIDITY_TIME Address Block TLV */ VALIDITY_TIMEAddrBlkTlv.value := outRREQ.ValidityTime; } Build_RFC_5444_Message_Header (RREQ, 4, IPv4 or IPv6, NN, outRREQ.HopLimit, outRREQ.HopCount, tlvLength); /* multicast RFC 5444 message to LL-MANET-Routers */ } D.2.2. Receive_RREQ Perkins, et al. Expires January 7, 2016 [Page 78] Internet-Draft /* AODVv2 July 2015 Process a RREQ received on link L */ Receive_RREQ (inRREQ, L) { if (inRREQ.NbrIP present in blacklist) { if (blacklist_expiration_time < CurrentTime) return; // don’t process or regenerate RREQ else remove nbrIP from blacklist; } if (inRREQ does not contain msg_hop_limit, OrigAddr, TargAddr, OrigSeqNum, OrigMetric) return; if (inRREQ.OrigAddr and inRREQ.TargAddr are not valid routable and unicast addresses) return; if (inRREQ.MetricType is present but an unknown value) return; if (inRREQ.OrigMetric > MAX_METRIC[inRREQ.MetricType] - Cost(L)) return; /* Extract inRREQ values */ advRte.Address := inRREQ.OrigAddr; advRte.PrefixLength := inRREQ.OrigPrefixLen; (if present) or the address length of advRte.Address; advRte.SeqNum := inRREQ.OrigSeqNum; advRte.MetricType := inRREQ.MetricType; advRte.Metric := inRREQ.OrigMetric; advRte.Cost := inRREQ.OrigMetric + Cost(L); //according to the indicated MetricType advRte.ValidityTime := inRREQ.ValidityTime; //if present advRte.NextHopIP := inRREQ.NbrIP; advRte.NextHopIntf := inRREQ.Netif; advRte.HopCount := inRREQ.HopCount; advRte.HopLimit := inRREQ.HopLimit; rte := Process_Routing_Info (advRte); /* Update the RteMsgTable and determine if the RREQ needs to be regenerated */ regenerate := Update_Rte_Msg_Table(inRREQ); if (inRREQ.TargAddr is in Router Client list) Generate_RREP(inRREQ, rte); else if (regenerate) Regenerate_RREQ(inRREQ, rte); } Perkins, et al. Expires January 7, 2016 [Page 79] Internet-Draft D.2.3. /* AODVv2 July 2015 Regenerate_RREQ Called from receive_RREQ() rte := the route to OrigAddr */ Regenerate_RREQ (inRREQ, rte) { outRREQ.HopLimit := inRREQ.HopLimit - 1; if (outRREQ.HopLimit == 0) return; // don’t regenerate if (inRREQ.HopCount exists) { if (inRREQ.HopCount >= MAX_HOPCOUNT) return; // don’t regenerate outRREQ.HopCount := inRREQ.HopCount + 1; } /* Marshall parameters */ outRREQ.MetricType := rte.MetricType; outRREQ.OrigAddr := rte.Address; outRREQ.TargAddr := inRREQ.TargAddr; /* include prefix length if not equal to address length */ outRREQ.OrigPrefixLen := rte.PrefixLength; outRREQ.OrigSeqNum := rte.SeqNum; outRREQ.TargSeqNum := inRREQ.TargSeqNum; // if present outRREQ.OrigMetric := rte.Metric; outRREQ.ValidityTime := rte.ValidityTime; or the time limit this router wishes to put on route to OrigAddr /* Build Address Block using prefix length information from outRREQ.OrigPrefixLen if necessary */ AddrBlk := {outRREQ.OrigAddr, outRREQ.TargAddr}; /* Include sequence numbers in appropriate Address Block TLVs */ /* OrigSeqNum Address Block TLV */ origSeqNumAddrBlkTlv.value := outRREQ.OrigSeqNum; /* TargSeqNum Address Block TLV */ if (outRREQ.TargSeqNum is known) targSeqNumAddrBlkTlv.value := outRREQ.TargSeqNum; /* Build Metric Address Block TLV, include Metric AddrBlkTlv Extension type if a non-default metric */ metricAddrBlkTlv.value := outRREQ.OrigMetric; if (outRREQ.MetricType != DEFAULT_METRIC_TYPE) metricAddrBlkTlv.typeExtension := outRREQ.MetricType; Perkins, et al. Expires January 7, 2016 [Page 80] Internet-Draft AODVv2 July 2015 if (outRREQ.ValidityTime is required) { /* Build VALIDITY_TIME Address Block TLV */ VALIDITY_TIMEAddrBlkTlv.value := outRREQ.ValidityTime; } Build_RFC_5444_Message_Header (RREQ, 4, IPv4 or IPv6, NN, outRREQ.HopLimit, outRREQ.HopCount, tlvLength); /* Multicast RFC 5444 message to LL-MANET-Routers, or if inRREQ was unicast, the message can be unicast to the next hop on the route to TargAddr, if known */ } D.3. RREP Operations D.3.1. Generate_RREP Generate_RREP(inRREQ, rte) { /* Increment sequence number in nonvolatile storage */ mySeqNum := (1 + mySeqNum); /* Marshall parameters */ outRREP.HopLimit := inRREQ.HopCount; outRREP.HopCount := 0; /* Include the AckReq when: - previous RREP does not seem to enable any data flow, OR - when RREQ is received from same OrigAddr after RREP was unicast to rte.NextHop */ outRREP.AckReq := TRUE or FALSE; //TRUE if acknowledgement required /* if included, set timeout RREP_Ack_SENT_TIMEOUT */ if (rte.MetricType != DEFAULT_METRIC_TYPE) outRREP.MetricType := rte.MetricType; outRREP.OrigAddr := rte.Address; outRREP.TargAddr := inRREQ.TargAddr; outRREP.TargPrefixLen := rte.PrefixLength; //if not address length outRREP.TargSeqNum := mySeqNum; outRREP.TargMetric := Route[TargAddr].Metric; //zero by default outRREP.ValidityTime := limit for route to TargAddr; //if required if (outRREP.AckReq == TRUE) /* include AckReq Message TLV */ /* Build Address Block using prefix length information from outRREP.TargPrefixLen if necessary */ AddrBlk := {outRREP.OrigAddr, outRREP.TargAddr}; Perkins, et al. Expires January 7, 2016 [Page 81] Internet-Draft AODVv2 July 2015 /* TargSeqNum Address Block TLV */ targSeqNumAddrBlkTlv.value := outRREP.TargSeqNum; /* Build Metric Address Block TLV include Metric AddrBlkTlv Extension type if a non-default metric */ metricAddrBlkTlv.value := outRREP.TargMetric; if (outRREP.MetricType != DEFAULT_METRIC_TYPE) metricAddrBlkTlv.typeExtension := outRREP.MetricType; if (outRREP.ValidityTime is required) { /* Build VALIDITY_TIME Address Block TLV */ VALIDITY_TIMEAddrBlkTlv.value := outRREP.ValidityTime; } Build_RFC_5444_Message_Header (RREP, 4, IPv4 or IPv6, NN, outRREP.HopLimit, outRREQ.HopCount, tlvLength); /* unicast RFC 5444 message to rte[OrigAddr].NextHop */ } D.3.2. /* Receive_RREP Process a RREP received on link L */ Receive_RREP (inRREP, L) { if (inRREP.NbrIP present in blacklist) { if (blacklist_expiration_time < CurrentTime) return; // don’t process or regenerate RREP else remove NbrIP from blacklist; } if (inRREP does not contain msg_hop_limit, OrigAddr, TargAddr, TargSeqNum, TargMetric) return; if (inRREP.OrigAddr and inRREQ.TargAddr are not valid routable and unicast addresses) return; if (inRREP.MetricType is present but an unknown value) return; if (inRREP.TargMetric > MAX_METRIC[inRREP.MetricType] - Cost(L)) return; /* Extract inRREP values */ advRte.Address := inRREP.TargAddr; Perkins, et al. Expires January 7, 2016 [Page 82] Internet-Draft AODVv2 July 2015 advRte.PrefixLength := inRREP.TargPrefixLen; //if present or the address length of advRte.Address; advRte.SeqNum := inRREP.TargSeqNum; advRte.MetricType := inRREP.MetricType; advRte.Metric := inRREP.TargMetric; advRte.Cost := inRREP.TargMetric + Cost(L); //according to the indicated MetricType advRte.ValidityTime := inRREP.ValidityTime; //if present advRte.NextHopIP := inRREP.NbrIP; advRte.NextHopIntf := inRREP.Netif; advRte.HopCount := inRREP.HopCount; advRte.HopLimit := inRREP.HopLimit; //if included rte := Process_Routing_Info (advRte); ‘ if (inRREP includes AckReq data element) Generate_RREP_Ack(inRREP); /* Update the RteMsgTable and determine if the RREP needs to be regenerated */ regenerate := Update_Rte_Msg_Table(inRREP); if (inRREP.TargAddr is in the Router Client list) send_buffered_packets(rte); /* start to use the route */ else if (regenerate) Regenerate_RREP(inRREP, rte); } D.3.3. Regenerate_RREP Regenerate_RREP(inRREP, rte) { if (rte does not exist) { Generate_RERR(inRREP); return; } outRREP.HopLimit := inRREP.HopLimit - 1; if (outRREP.HopLimit == 0) /* don’t regenerate */ return; if (inRREP.HopCount exists) { if (inRREP.HopCount >= MAX_HOPCOUNT) return; // don’t regenerate the RREP outRREP.HopCount := inRREP.HopCount + 1; } Perkins, et al. Expires January 7, 2016 [Page 83] Internet-Draft AODVv2 July 2015 /* Marshall parameters */ /* Include the AckReq when: - previous unicast RREP seems not to enable data flow, OR - when RREQ is received from same OrigAddr after RREP was unicast to rte.NextHop */ outRREP.AckReq := TRUE or FALSE; //TRUE if acknowledgement required /* if included, set timeout RREP_Ack_SENT_TIMEOUT */ if (rte.MetricType != DEFAULT_METRIC_TYPE) outRREP.MetricType := rte.MetricType; outRREP.OrigAddr := inRREP.OrigAddr; outRREP.TargAddr := rte.Address; outRREP.TargPrefixLen := rte.PrefixLength; //if not address length outRREP.TargSeqNum := rte.SeqNum; outRREP.TargMetric := rte.Metric; outRREP.ValidityTime := limit for route to TargAddr; //if required outRREP.NextHop := rte.NextHop if (outRREP.AckReq == TRUE) /* include AckReq Message TLV */ /* Build Address Block using prefix length information from outRREP.TargPrefixLen if necessary */ AddrBlk := {outRREP.OrigAddr, outRREP.TargAddr}; /* TargSeqNum Address Block TLV */ targSeqNumAddrBlkTlv.value := outRREP.TargSeqNum; /* Build Metric Address Block TLV include Metric AddrBlkTlv Extension type if a non-default metric */ metricAddrBlkTlv.value := outRREP.TargMetric; if (outRREP.MetricType != DEFAULT_METRIC_TYPE) metricAddrBlkTlv.typeExtension := outRREP.MetricType; if (outRREP.ValidityTime is required) { /* Build VALIDITY_TIME Address Block TLV */ VALIDITY_TIMEAddrBlkTlv.value := outRREP.ValidityTime; } Build_RFC_5444_Message_Header (RREP, 4, IPv4 or IPv6, NN, outRREP.HopLimit, 0, tlvLength); /* unicast RFC 5444 message to rte[OrigAddr].NextHop */ } Perkins, et al. Expires January 7, 2016 [Page 84] Internet-Draft D.4. AODVv2 July 2015 RREP_Ack Operations D.4.1. Generate_RREP_Ack /* To be sent when a received RREP includes the AckReq data element */ Generate_RREP_Ack(inRREP) { Build_RFC_5444_Message_Header (RREP_Ack, 4, IPv4 or IPv6, NN, 1, 0, 0); /* unicast RFC 5444 message to inRREP.NbrIP */ } D.4.2. Receive_RREP_Ack Receive_RREP_Ack(inRREP_Ack) { /* cancel timeout event for the node sending RREP_Ack */ } D.4.3. Timeout_RREP_Ack Timeout_RREP_Ack(outRREP) { if (numRetries < RREP_RETRIES) /* resend RREP and double the previous timeout */ else /* insert unresponsive node into blacklist */ } D.5. RERR Operations D.5.1. Generate_RERR There are two parts to this function, based on whether it was triggered by an undeliverable packet or a broken link to neighboring AODVv2 router. /* Generate a Route Error message. errorType := undeliverablePacket or brokenLink */ Generate_RERR(errorType, triggerPkt, brokenLinkNbrIp) { switch (errorType) { case (brokenLink): doGenerate := FALSE; num-broken-addr := 0; Perkins, et al. Expires January 7, 2016 [Page 85] Internet-Draft AODVv2 July 2015 precursors[] := new empty precursor list; outRERR.HopLimit := MAX_HOPCOUNT; /* find routes which are now Invalid */ foreach (rte in route table) { if (brokenLinkNbrIp == rte.NextHop AND (rte.State == Active OR (rte.State == Idle AND ENABLE_IDLE_IN_RERR))) { if (rte.State == Active) doGenerate := TRUE; rte.State := Invalid; precursors += rte.Precursors (if any); outRERR.AddressList[num-broken-addr] := rte.Address; outRERR.PrefixLengthList[num-broken-addr] := rte.PrefixLength; outRERR.SeqNumList[num-broken-addr] := rte.SeqNum; outRERR.MetricTypeList[num-broken-addr] := rte.MetricType num-broken-addr := num-broken-addr + 1; } } } case (undeliverablePacket): doGenerate := TRUE; num-broken-addr := 1; outRERR.HopLimit := MAX_HOPCOUNT; outRERR.PktSource := triggerPkt.SrcIP; or triggerPkt.TargAddr; //if pkt was a RREP outRERR.AddressList[0] := triggerPkt.DestIP; or triggerPkt.OrigAddr; //if pkt was RREP /* optional to include outRERR.PrefixLengthList, outRERR.SeqNumList and outRERR.MetricTypeList */ } if (doGenerate == FALSE) return; if (triggerPkt exists) { /* Build PktSource Message TLV */ pktSourceMessageTlv.value := outRERR.PktSource; } /* The remaining steps add address, prefix length, sequence number and metric type information for each unreachable address, while conforming to the allowed MTU. If the MTU is reached, a new message MUST be created. */ Perkins, et al. Expires January 7, 2016 [Page 86] Internet-Draft AODVv2 July 2015 /* Build Address Block using prefix length information from outRERR.PrefixLengthList[] if necessary */ AddrBlk := outRERR.AddressList[]; /* Optionally, add SeqNum Address Block TLV, including index values */ seqNumAddrBlkTLV := outRERR.SeqNumList[]; if (outRERR.MetricTypeList contains non-default MetricTypes) /* include Metric Address Block TLVs with Type Extension set to MetricType, including index values if necessary */ metricAddrBlkTlv.typeExtension := outRERR.MetricTypeList[]; Build_RFC_5444_Message_Header (RERR, 4, IPv4 or IPv6, NN, outRERR.HopLimit, 0, tlvLength); if (undeliverablePacket) /* unicast outRERR to rte[outRERR.PktSource].NextHop */ else if (brokenLink) /* unicast to precursors, or multicast to LL-MANET-Routers */ } D.5.2. Receive_RERR Receive_RERR (inRERR) { if (inRERR does not contain msg_hop_limit and at least one unreachable address) return; /* Extract inRERR values, copy relevant unreachable addresses, their prefix lengths, and sequence numbers to outRERR */ num-broken-addr := 0; precursors[] := new empty precursor list; foreach (unreachableAddress in inRERR.AddressList) { if (unreachableAddress is not valid routable and unicast) continue; if (unreachableAddress MetricType is present but an unknown value) return; /* Find a matching route table entry, assume DEFAULT_METRIC_TYPE if no MetricType included */ rte := Fetch_Route_Table_Entry (unreachableAddress, unreachableAddress MetricType) if (rte does not exist) continue; if (rte.State == Invalid)/* ignore already invalid routes */ continue; Perkins, et al. Expires January 7, 2016 [Page 87] Internet-Draft AODVv2 July 2015 if ((rte.NextHop != inRERR.NbrIP OR rte.NextHopInterface != inRERR.Netif) AND (PktSource is not present OR is not a Router Client)) continue; if (unreachableAddress SeqNum (if known) < rte.SeqNum) continue; /* keep a note of all precursors of newly Invalid routes */ precursors += rte.Precursors; //if any /* assume prefix length is address length if not included */ if (rte.PrefixLength != unreachableAddress prefixLength) { /* create new route with unreachableAddress information */ invalidRte := Create_Route_Table_Entry(unreachableAddress, unreachableAddress PrefixLength, unreachableAddress SeqNum, unreachableAddress MetricType); invalidRte.State := Invalid; if (rte.PrefixLength > unreachableAddress prefixLength) expunge_route(rte); rte := invalidRte; } else if (rte.PrefixLength == unreachableAddress prefixLength) rte.State := Invalid; outRERR.AddressList[num-broken-addr] := rte.Address; outRERR.PrefixLengthList[num-broken-addr] := rte.PrefixLength; outRERR.SeqNumList[num-broken-addr] := rte.SeqNum; outRERR.MetricTypeList[num-broken-addr] := rte.MetricType; num-broken-addr := num-broken-addr + 1; } if (num-broken-addr AND (PktSource is not present OR PktSource is not a Router Client)) Regenerate_RERR(outRERR, inRERR, precursors); } D.5.3. Regenerate_RERR Perkins, et al. Expires January 7, 2016 [Page 88] Internet-Draft AODVv2 July 2015 Regenerate_RERR (outRERR, inRERR, precursors) { /* Marshal parameters */ outRERR.HopLimit := inRERR.HopLimit - 1; if (outRERR.HopLimit == 0) // don’t regenerate return; outRERR.PktSource := inRERR.PktSource; //if included /* AddressList[], SeqNumList[], and PrefixLengthList[] are already up-to-date */ if (outRERR.PktSource exists) { /* Build PktSource Message TLV */ pktSourceMessageTlv.value := outRERR.PktSource; } /* Build Address Block using prefix length information from outRERR.PrefixLengthList[] if necessary */ AddrBlk := outRERR.AddressList[]; /* Optionally, add SeqNum Address Block TLV, including index values */ seqNumAddrBlkTLV := outRERR.SeqNumList[]; if (outRERR.MetricTypeList contains non-default MetricTypes) /* include Metric Address Block TLVs with Type Extension set to MetricType, including index values if necessary */ metricAddrBlkTlv.typeExtension := outRERR.MetricTypeList[]; Build_RFC_5444_Message_Header (RERR, 4, IPv4 or IPv6, NN, outRERR.HopLimit, 0, tlvLength); if (outRERR.PktSource exists) /* unicast RFC 5444 message to next hop towards outRERR.PktSource */ else if (number of precursors == 1) /* unicast RFC 5444 message to precursors[0] */ else if (number of precursors > 1) /* unicast RFC 5444 message to all precursors, or multicast RFC 5444 message to RERR_PRECURSORS if preferable */ else /* multicast RFC 5444 message to LL-MANET-Routers */ } Perkins, et al. Expires January 7, 2016 [Page 89] Internet-Draft Appendix E. E.1. AODVv2 July 2015 AODVv2 Draft Updates Changes between revisions 9 and 10 This section lists the changes between AODVv2 revisions ...-09.txt and ...-10.txt. o Updated RFC 5444 Representation section to add "Address Type" TLV, which explicitly declares the meaning of addresses in the RFC 5444 Address Block. o Relocated route state definitions. throughout. o Updated definition of timed routes. o More consistent use of OrigPrefixLen, TargPrefixLen, and Invalid. o Mandated use of neighbor adjacency checking and support of AckReq and RREP_Ack and clarified related text. o Changed order of LoopFree checking and route cost comparisons in Evaluating Route Information. o Updated structure of section on Applying Route Updates. o Updated AckReq to include intended next hop address, and RREP to be multicast if intended next hop is not a confirmed neighbor. o Clarified that gateway router is not default router. E.2. Minor improvements to clarity Changes between revisions 8 and 9 This section lists the changes between AODVv2 revisions ...-08.txt and ...-09.txt. o Numerous editorial improvements were made, including relocation/removal/renaming/adding of some sections and text, collection and tidying of scattered text on same topic, formatting made more consistent to improve readability. o Removed mentions of precursors from main text, except one mention in Route Table Entry. o Removed use of MIN_METRIC which was not defined. o Changed Current_Time to CurrentTime for consistency. Perkins, et al. Expires January 7, 2016 [Page 90] Internet-Draft AODVv2 July 2015 o Changed OrigAddrMetric and TargAddrMetric to OrigMetric and TargMetric respectively. o Updated Overview to simplify and provide a broader summary. o Updated Terminology definitions, Data Elements tables and combined sections. o Updated Applicability Statement to move some of the nonapplicability text and to simplify what remains. o Updated TLV names to conform to existing naming style. o Updated Blacklist to be a NeighborList to include neighbors that have confirmed bidirectional connectivity. o Updated messages processed if router on blacklist and which are indicators of bidirectional links. o Added RemoveTime to RteMsg Table section. o Added short description of timed route to Route Table Entry section but removed Route.Timed flag. Route is timed if its expiration time is not MAX_TIME. o Added Unconfirmed route state for route to OrigAddr learned from RREQ. o Updated AODVv2 Protocol Operations section and subsections, including Initialization, Adjacency Monitoring, making algorithms easier to read and making notation consistent, general improvements to the text. o Updated Route Discovery, Retries and Buffering to include a more complete description of the route discovery process. o Updated wording relating to different metric types. o Added text regarding control message limit in Message Transmission section. o Added short explanation of positive/negative effects of buffering. o Simplified the packet diagrams, since some of their contents was already explained in the text below and then again as part of generation, reception and regeneration processes. o Clarified some elements of the message content descriptions. Perkins, et al. Expires January 7, 2016 [Page 91] Internet-Draft AODVv2 July 2015 o Moved MetricType above MetricList in message sections, for consistency. o Mirrored structure throughout AODVv2 Protocol Messages. o Changed RREQ and RREP’s use of Lists when only one entry is necessary. o Added some pre-message-generation checks. o Ensured consistency in regeneration (if msg-hop-limit is reduced to zero, do not regenerate). o Removed statements about neighbors but added blacklist checks where necessary. o Noted that RREQ retries should increase the SeqNum. o Added statement that implementations SHOULD retry sending RREP. o Added text explaining what happens if RREP is lost, regarding blacklisting and RREQ retries. o Removed hop limit from RREP_Ack. check. o Updated RERR so that multiple metric types can be reported in the same message. o Updated RERR reception processing to ensure PktSource deletes the contained route. o Added text to show that if a router is the destination of a RERR, the RERR is not regenerated. o Added text that RERRs should not be created if the same RERR has recently been sent. o Updated RFC 5444 overview and simplified/rearranged text in this section. o Major update to RFC 5444 representation section o Updated RERR’s RFC 5444 representation so that PktSource is placed in Address Block, and updated IANA section to make PktSource an Address Block TLV to indicate which address is PktSource. Perkins, et al. Changed order of blacklist Expires January 7, 2016 [Page 92] Internet-Draft AODVv2 July 2015 o Described use of extension type in Metric TLV to represent MetricType, and the interpretation when using the default metric type. o Removed Multicast RREP as an optional feature. o Updated Precursor Lists section to include options for precursor information to store. o Updated Security Considerations. E.3. Changes between revisions 7 and 8 This section lists the changes between AODVv2 revisions ...-07.txt and ...-08.txt. o MetricType is now an Address Block TLV. Minor changes to the text. By using an extension type in the Metric TLV we can represent MetricType more elegantly in the RFC 5444 message. o Updated Overview to be slightly more concise. o Moved MetricType next to Metric when mentioned for better flow. o Added text to Applicability to address comments on mailing list regarding gateway behavior and NHDP HELLO messages. o Removed paragraph in AODVv2 Message Transmission section regarding TTL. o Added reference where precursors are mentioned in route table entry. o Added text to bidirectionality explanation regarding NHDP HELLO messages and lower layer triggers. o Clarified blacklist removal with SHOULD rather than MAY. o Removed pseudo-code from section on evaluating incoming routing information. o Clarified rules for expunging route entries on memory-constrained devices. o Clarified the use of exponential backoff for route discovery attempts. Perkins, et al. Expires January 7, 2016 [Page 93] Internet-Draft AODVv2 July 2015 o Small updates to message sections. if neighbors. o Renamed RFC 5444 parser to multiplexer in Section 10. o Removed "optional feature" to include multiple addresses in RERR. o Removed MetricType from the Message TLV Type Specification. o Updated Security Considerations. o Added reference to RFC 7182. o Small updates to message algorithms, including moving MetricType from Message TLV to the Metric TLV in the Address Block TLV Block, and only generating RERR if an Active route was made Invalid. E.4. Removed steps about checking Changes between revisions 6 and 7 This section lists the changes since AODVv2 revision ...-06.txt o Added Victoria Mercieca as co-author. o Reorganized protocol message descriptions into major subsections for each protocol message. For protocol messages, organized processing into Generation, Reception, and Regeneration subsections. o Separated RREQ and RREP message processing description into separate major subsection which had previously been combined into RteMsg description. o Enlarged RREQ Table function to include similar processing for optional flooded RREP messages. The table name has been correspondingly been changed to be the Table for Multicast RteMsgs. o Moved sections for Multiple Interfaces and AODVv2 Control Message Generation Limits to be major subsections of the AODVv2 Protocol Operations section. o Reorganized the protocol message processing steps into the subsections as previously described, adopting a more step-by-step presentation. o Coalesced the router states Broken and Expired into a new combined state named the Invalid state. No changes in processing are required for this. Perkins, et al. Expires January 7, 2016 [Page 94] Internet-Draft AODVv2 July 2015 o Merged the sections describing Next-hop Router Adjacency Monitoring and Blacklists. o Specified that routes created during Route Discovery are marked as Idle routes. If they are used for carrying data they become Active routes. o Added Route.LastSeqNumUpdate information to route table, so that route activity and sequence number validity can be tracked separately. An active route can still forward traffic even if the sequence number has not been refreshed within MAX_SEQNUM_LIFETIME. o Mandated implementation of RREP_Ack as response to AckReq Message TLV in RREP messages. Added field to RREP_Ack to ensure correspondence to the correct AckReq message. o Added explanations for what happens if protocol constants are given different values on different AODVv2 routers. o Specified that AODVv2 implementations are free to choose their own heuristics for reducing multicast overhead, including RFC 6621. o Added appendix to identify AODVv2 requirements from OS implementation of IP and ICMP. o Deleted appendix showing example RFC 5444 packet formats. o Clarification on the use of RFC 5497 VALIDITY_TIME. o In Terminology, deleted superfluous definitions, added missing definitions. o Numerous editorial improvements and clarifications. E.5. Changes between revisions 5 and 6 This section lists the changes between AODVv2 revisions ...-05.txt and ...-06.txt. o Added Lotte Steenbrink as co-author. o Reorganized section on Metrics to improve readability by putting specific topics into subsections. o Introduced concept of data element, which is used to clarify the method of enabling RFC 5444 representation for AODVv2 data elements. A list of Data Elements was introduced in section 3, Perkins, et al. Expires January 7, 2016 [Page 95] Internet-Draft AODVv2 July 2015 which provides a better understanding of their role than was previously supplied by the table of notational devices. o Replaced instances of OrigNode by OrigAddr whenever the more specific meaning is appropriate. Similarly for instances of other node versus address terminology. o Introduced concepts of PrefixLengthList and MetricList in order to avoid use of index-based terminology such as OrigNdx and TargNdx. o Added section 5, "AODVv2 Message Transmission", describing the intended interface to RFC 5444. o Included within the main body of the specification the mandatory setting of the TLV flag thassingleindex for TLVs OrigSeqNum and TargSeqNum. o Removed the Route.Timed state. Created a new flag for route table entries known as Route.Timed. This flag can be set when the route is in the active state. Previous description would require that the route table entry be in two states at the same time, which seems to be misleading. The new flag is used to clarify other specification details for Timed routes. o Created table 3 to show the correspondence between AODVv2 data elements and RFC 5444 message components. o Replaced "invalid" terminology by the more specific terms "broken" or "expired" where appropriate. o Eliminated the instance of duplicate specification for inclusion of OrigNode (now, OrigAddr) in the message. o Corrected the terminology to be Mid instead of Tail for the trailing address bits of OrigAddr and TargAddr for the example message formats in the appendices. o Repaired remaining instances of phraseology that could be construed as indicating that AODV only supports a single network interface. o Numerous editorial improvements and clarifications. E.6. Changes between revisions 4 and 5 This section lists the changes between AODVv2 revisions ...-04.txt and ...-05.txt. Perkins, et al. Expires January 7, 2016 [Page 96] Internet-Draft AODVv2 July 2015 o Normative text moved out of definitions into the relevant section of the body of the specification. o Editorial improvements and improvements to consistent terminology were made. Replaced "retransmit" by the slightly more accurate term "regenerate". o Issues were resolved as discussed on the mailing list. o Changed definition of LoopFree as suggested by Kedar Namjoshi and Richard Trefler to avoid the failure condition that they have described. In order to make understanding easier, replaced abstract parameters R1 by RteMsg and R2 by Route to reduce the level of abstraction when the function LoopFree is discussed. o Added text to clarify that different metrics may have different data types and different ranges of acceptable values. o Added text to section "RteMsg Structure" to emphasize the proper use of RFC 5444. o Included within the main body of the specification the mandatory setting of the TLV flag thassingleindex for TLVs OrigSeqNum and TargSeqNum. o Made more extensive use of the AdvRte terminology, in order to better distinguish between the incoming RREQ or RREP message (i.e., RteMsg) versus the route advertised by the RteMsg (i.e., AdvRte). E.7. Changes between revisions 3 and 4 This section lists the changes between AODVv2 revisions ...-03.txt and ...-04.txt. o An appendix was added to exhibit algorithmic code for implementation of AODVv2 functions. o Numerous editorial improvements and improvements to consistent terminology were made. Terminology related to prefix lengths was made consistent. Some items listed in "Notational Conventions" were no longer used, and so deleted. o Issues were resolved as discussed on the mailing list. o Appropriate instances of "may" were changed to "MAY". o Definition inserted for "upstream". Perkins, et al. Expires January 7, 2016 [Page 97] Internet-Draft AODVv2 July 2015 o Route.Precursors included as an *optional* route table field o Reworded text to avoid use of "relevant". o Deleted references to "DestOnly" flag. o Refined statements about MetricType TLV to allow for omission when MetricType == HopCount. o Bulletized list in section 8.1 o ENABLE_IDLE_UNREACHABLE renamed to be ENABLE_IDLE_IN_RERR o Transmission and subscription to LL-MANET-Routers converted to MUST from SHOULD. E.8. Changes between revisions 2 and 3 This section lists the changes between AODVv2 revisions ...-02.txt and ...-03.txt. o The "Added Node" feature was removed. This feature was intended to enable additional routing information to be carried within a RREQ or a RREP message, thus increasing the amount of topological information available to nodes along a routing path. However, enlarging the packet size to include information which might never be used can increase congestion of the wireless medium. The feature can be included as an optional feature at a later date when better algorithms are understood for determining when the inclusion of additional routing information might be worthwhile. o Numerous editorial improvements and improvements to consistent terminology were made. Instances of OrigNodeNdx and TargNodeNdx were replaced by OrigNdx and TargNdx, to be consistent with the terminology shown in Table 2. o Example RREQ and RREP message formats shown in the Appendices were changed to use OrigSeqNum and TargSeqNum message TLVs instead of using the SeqNum message TLV. o Inclusion of the OrigNode’s SeqNum in the RREP message is not specified. The processing rules for the OrigNode’s SeqNum were incompletely specified in previous versions of the draft, and very little benefit is foreseen for including that information, since reverse path forwarding is used for the RREP. o Additional acknowledgements were included, and contributors names were alphabetized. Perkins, et al. Expires January 7, 2016 [Page 98] Internet-Draft AODVv2 July 2015 o Definitions in the Terminology section capitalize the term to be defined. o Uncited bibliographic entries deleted. o Ancient "Changes" sections were deleted. Authors’ Addresses Charles E. Perkins Futurewei Inc. 2330 Central Expressway Santa Clara, CA 95050 USA Phone: +1-408-330-4586 Email: [email protected] Stan Ratliff Idirect 13861 Sunrise Valley Drive, Suite 300 Herndon, VA 20171 USA Email: [email protected] John Dowdell Airbus Defence and Space Celtic Springs Newport, Wales NP10 8FZ United Kingdom Email: [email protected] Lotte Steenbrink HAW Hamburg, Dept. Informatik Berliner Tor 7 D-20099 Hamburg Germany Email: [email protected] Perkins, et al. Expires January 7, 2016 [Page 99] Internet-Draft AODVv2 July 2015 Victoria Mercieca Airbus Defence and Space Celtic Springs Newport, Wales NP10 8FZ United Kingdom Email: [email protected] Perkins, et al. Expires January 7, 2016 [Page 100] Mobile Ad hoc Networks Working Group Internet-Draft Intended status: Standards Track Expires: January 7, 2016 S. Ratliff VT iDirect B. Berry S. Jury Cisco Systems D. Satterwhite Broadcom R. Taylor Airbus Defence & Space July 6, 2015 Dynamic Link Exchange Protocol (DLEP) draft-ietf-manet-dlep-15 Abstract When routing devices rely on modems to effect communications over wireless links, they need timely and accurate knowledge of the characteristics of the link (speed, state, etc.) in order to make routing decisions. In mobile or other environments where these characteristics change frequently, manual configurations or the inference of state through routing or transport protocols does not allow the router to make the best decisions. A bidirectional, eventdriven communication channel between the router and the modem is necessary. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current InternetDrafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 7, 2016. Ratliff, et al. Expires January 7, 2016 [Page 1] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . 1.1. Protocol Overview . . . . . . . . . . . 1.2. Requirements . . . . . . . . . . . . . 2. Assumptions . . . . . . . . . . . . . . . . 3. Core Features and Extensions . . . . . . . 3.1. Experiments . . . . . . . . . . . . . . 4. Metrics . . . . . . . . . . . . . . . . . . 4.1. Mandatory Metrics . . . . . . . . . . . 5. DLEP Session Flow . . . . . . . . . . . . . 5.1. Peer Discovery State . . . . . . . . . 5.2. Session Initialization State . . . . . 5.3. In-Session State . . . . . . . . . . . 5.4. Session Termination State . . . . . . . 6. DLEP Signal and Message Processing . . . . 7. DLEP Signal and Message Structure . . . . . 7.1. DLEP Signal Header . . . . . . . . . . 7.2. DLEP Message Header . . . . . . . . . . 7.3. DLEP Generic Data Item . . . . . . . . 8. DLEP Signals and Messages . . . . . . . . . 8.1. Peer Discovery Signal . . . . . . . . . 8.2. Peer Offer Signal . . . . . . . . . . . 8.3. Session Initialization Message . . . . 8.4. Session Initialization Response Message 8.5. Session Update Message . . . . . . . . 8.6. Session Update Response Message . . . . 8.7. Session Termination Message . . . . . . 8.8. Session Termination Response Message . 8.9. Destination Up Message . . . . . . . . 8.10. Destination Up Response Message . . . . 8.11. Destination Down Message . . . . . . . 8.12. Destination Down Response Message . . . Ratliff, et al. Expires January 7, 2016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 7 8 8 10 10 11 12 12 12 13 14 16 16 17 18 18 19 19 20 21 21 22 24 25 25 26 26 27 28 28 [Page 2] Internet-Draft Dynamic Link Exchange Protocol (DLEP) 8.13. Destination Update Message . . . . . 8.14. Heartbeat Message . . . . . . . . . . 8.15. Link Characteristics Request Message 8.16. Link Characteristics Response Message 9. DLEP Data Items . . . . . . . . . . . . . 9.1. Status . . . . . . . . . . . . . . . 9.2. IPv4 Connection Point . . . . . . . . 9.3. IPv6 Connection Point . . . . . . . . 9.4. Peer Type . . . . . . . . . . . . . . 9.5. Heartbeat Interval . . . . . . . . . 9.6. Extensions Supported . . . . . . . . 9.7. MAC Address . . . . . . . . . . . . . 9.8. IPv4 Address . . . . . . . . . . . . 9.9. IPv6 Address . . . . . . . . . . . . 9.10. IPv4 Attached Subnet . . . . . . . . 9.11. IPv6 Attached Subnet . . . . . . . . 9.12. Maximum Data Rate (Receive) . . . . . 9.13. Maximum Data Rate (Transmit) . . . . 9.14. Current Data Rate (Receive) . . . . . 9.15. Current Data Rate (Transmit) . . . . 9.16. Latency . . . . . . . . . . . . . . . 9.17. Resources (Receive) . . . . . . . . . 9.18. Resources (Transmit) . . . . . . . . 9.19. Relative Link Quality (Receive) . . . 9.20. Relative Link Quality (Transmit) . . 9.21. Link Characteristics Response Timer . 10. Credit-Windowing . . . . . . . . . . . . 10.1. Credit-Windowing Messages . . . . . 10.1.1. Destination Up Message . . . . . 10.1.2. Destination Up Response Message 10.1.3. Destination Update Message . . . 10.2. Credit-Windowing Data Items . . . . 10.2.1. Credit Grant . . . . . . . . . . 10.2.2. Credit Window Status . . . . . . 10.2.3. Credit Request . . . . . . . . . 11. Security Considerations . . . . . . . . . 12. IANA Considerations . . . . . . . . . . . 12.1. Registrations . . . . . . . . . . . 12.2. Expert Review: Evaluation Guidelines 12.3. Signal/Message Type Registration . . 12.4. DLEP Data Item Registrations . . . . 12.5. DLEP Status Code Registrations . . . 12.6. DLEP Extensions Registrations . . . 12.7. DLEP Well-known Port . . . . . . . . 12.8. DLEP Multicast Address . . . . . . . 13. Acknowledgements . . . . . . . . . . . . 14. References . . . . . . . . . . . . . . . 14.1. Normative References . . . . . . . . Ratliff, et al. Expires January 7, 2016 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . July 2015 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 30 30 31 32 33 35 36 37 38 39 39 40 41 42 42 43 44 44 45 46 47 47 48 49 49 50 51 51 51 51 52 52 53 54 55 55 55 56 56 56 56 56 57 57 57 57 57 [Page 3] Internet-Draft Dynamic Link Exchange Protocol (DLEP) 14.2. Informative References . . . . . . . . Appendix A. Discovery Signal Flows . . . . . . Appendix B. Peer Level Message Flows . . . . . B.1. Session Initialization . . . . . . . . B.2. Session Initialization - Refused . . . B.3. Router Changes IP Addresses . . . . . . B.4. Modem Changes Session-wide Metrics . . B.5. Router Terminates Session . . . . . . . B.6. Modem Terminates Session . . . . . . . B.7. Session Heartbeats . . . . . . . . . . B.8. Router Detects a Heartbeat timeout . . B.9. Modem Detects a Heartbeat timeout . . . Appendix C. Destination Specific Signal Flows C.1. Common Destination Signaling . . . . . C.2. Multicast Destination Signaling . . . . C.3. Link Characteristics Request . . . . . Authors’ Addresses . . . . . . . . . . . . . . 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . July 2015 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 58 58 58 59 59 59 60 60 61 62 63 63 63 64 64 65 Introduction There exist today a collection of modem devices that control links of variable datarate and quality. Examples of these types of links include line-of-sight (LOS) terrestrial radios, satellite terminals, and cable/DSL modems. Fluctuations in speed and quality of these links can occur due to configuration, or on a moment-to-moment basis, due to physical phenomena like multipath interference, obstructions, rain fade, etc. It is also quite possible that link quality and datarate vary with respect to individual destinations on a link, and with the type of traffic being sent. As an example, consider the case of an 802.11 access point, serving 2 associated laptop computers. In this environment, the answer to the question "What is the datarate on the 802.11 link?" is "It depends on which associated laptop we’re talking about, and on what kind of traffic is being sent." While the first laptop, being physically close to the access point, may have a datarate of 54Mbps for unicast traffic, the other laptop, being relatively far away, or obstructed by some object, can simultaneously have a datarate of only 32Mbps for unicast. However, for multicast traffic sent from the access point, all traffic is sent at the base transmission rate (which is configurable, but depending on the model of the access point, is usually 24Mbps or less). In addition to utilizing variable datarate links, mobile networks are challenged by the notion that link connectivity will come and go over time, without an effect on a router’s interface state (Up or Down). Effectively utilizing a relatively short-lived connection is problematic in IP routed networks, as routing protocols tend to rely on interface state and independent timers at OSI Layer 3 to maintain network convergence (e.g., HELLO messages and/or recognition of DEAD Ratliff, et al. Expires January 7, 2016 [Page 4] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 routing adjacencies). These dynamic connections can be better utilized with an event-driven paradigm, where acquisition of a new neighbor (or loss of an existing one) is signaled, as opposed to a paradigm driven by timers and/or interface state. Another complicating factor for mobile networks are the different methods of physically connecting the modem devices to the router. Modems can be deployed as an interface card in a router’s chassis, or as a standalone device connected to the router via Ethernet or serial link. In the case of Ethernet attachment, with existing protocols and techniques, routing software cannot be aware of convergence events occurring on the radio link (e.g., acquisition or loss of a potential routing neighbor), nor can the router be aware of the actual capacity of the link. This lack of awareness, along with the variability in datarate, leads to a situation where finding the (current) best route through the network to a given destination is difficult to establish and properly maintain. This is especially true of demand-based access schemes such as Demand Assigned Multiple Access (DAMA) implementations used on some satellite systems. With a DAMA-based system, additional datarate may be available, but will not be used unless the network devices emit traffic at a rate higher than the currently established rate. Increasing the traffic rate does not guarantee additional datarate will be allocated; rather, it may result in data loss and additional retransmissions on the link. Addressing the challenges listed above, the co-authors have developed the Dynamic Link Exchange Protocol, or DLEP. The DLEP protocol runs between a router and its attached modem devices, allowing the modem to communicate link characteristics as they change, and convergence events (acquisition and loss of potential routing destinations). The following diagrams are used to illustrate the scope of DLEP packets. |-------Local Node-------| |-------Remote Node------| | | | | +--------+ +-------+ +-------+ +--------+ | Router |=======| Modem |{˜˜˜˜˜˜˜˜}| Modem |=======| Router | | | | Device| | Device| | | +--------+ +-------+ +-------+ +--------+ | | | Link | | | |-DLEP--| | Protocol | |-DLEP--| | | | (e.g. | | | | | | 802.11) | | | Figure 1: DLEP Network In Figure 1, when the local modem detects the presence of a remote node, it (the local modem) sends a message to its router via the DLEP protocol. The message consists of an indication of what change has Ratliff, et al. Expires January 7, 2016 [Page 5] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 occurred on the link (e.g., presence of a remote node detected), along with a collection of DLEP-defined Data Items that further describe the change. Upon receipt of the message, the local router may take whatever action it deems appropriate, such as initiating discovery protocols, and/or issuing HELLO messages to converge the network. On a continuing, as-needed basis, the modem devices use DLEP to report any characteristics of the link (datarate, latency, etc.) that have changed. DLEP is independent of the link type and topology supported by the modem. Note that the DLEP protocol is specified to run only on the local link between router and modem. Some over the air signaling may be necessary between the local and remote modem in order to provide some parameters in DLEP messages between the local modem and local router, but DLEP does not specify how such over the air signaling is carried out. Over the air signaling is purely a matter for the modem implementer. Figure 2 shows how DLEP can support a configuration where routers are connected with different link types. In this example, Modem A implements a point-to-point link, and Modem B is connected via a shared medium. In both cases, the DLEP protocol is used to report the characteristics of the link (datarate, latency, etc.) to routers. The modem is also able to use the DLEP session to notify the router when the remote node is lost, shortening the time required to reconverge the network. Ratliff, et al. Expires January 7, 2016 [Page 6] Internet-Draft Dynamic Link Exchange Protocol (DLEP) +--------+ +----+ Modem A| | | Device | <===== // ======> | +--------+ P-2-P Link +---+----+ | Router | | | +---+----+ | +--------+ +-----+ Modem B| | Device | o o o o o o o o +--------+ o Shared o o Medium o o o o o o o o +--------+ | Modem B| | Device | +---+----+ | | +---+----+ | Router | | | +--------+ July 2015 +--------+ | Modem A+---+ | Device | | +--------+ | +---+----+ | Router | | | +---+----+ +--------+ | | Modem B| | | Device +--+ +--------+ Figure 2: DLEP Network with Multiple Modem Devices 1.1. Protocol Overview As mentioned earlier, DLEP defines a set of messages used by modems and their attached routers. The messages are used to communicate events that occur on the physical link(s) managed by the modem: for example, a remote node entering or leaving the network, or that the link has changed. Associated with these messages are a set of data items - information that describes the remote node (e.g., address information), and/or the characteristics of the link to the remote node. The protocol is defined as a collection of type-length-value (TLV) based formats, specifying the messages that are exchanged between a router and a modem, and the data items associated with the message. This document specifies transport of DLEP messages and data items via the TCP transport, with a UDP-based discovery mechanism. Other transports for the protocol are possible, but are outside the scope of this document. Ratliff, et al. Expires January 7, 2016 [Page 7] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 DLEP uses a session-oriented paradigm between the modem device and its associated router. If multiple modem devices are attached to a router (as in Figure 2), or the modem supports multiple connections (via multiple logical or physical interfaces), then separate DLEP sessions exist for each modem or connection. This router/modem session provides a carrier for information exchange concerning ’destinations’ that are available via the modem device. A ’destination’ can be either physical (as in the case of a specific far-end router), or a logical destination (as in a Multicast group). As such, all of the destination-level exchanges in DLEP can be envisioned as building an information base concerning the remote nodes, and the link characteristics to those nodes. Multicast traffic destined for the variable-quality network (the network accessed via the DLEP modem) is handled in IP networks by deriving a Layer 2 MAC address based on the Layer 3 address. Leveraging on this scheme, multicast traffic is supported in DLEP simply by treating the derived MAC address as any other ’destination’ (albeit a logical one) in the network. To support these logical destinations, one of the DLEP participants (typically, the router) informs the other as to the existence of the logical destination. The modem, once it is aware of the existence of this logical destination, reports link characteristics just as it would for any other destination in the network. The specific algorithms a modem would use to derive metrics on multicast (or logical) destinations are outside the scope of this specification, and is left to specific implementations to decide. 1.2. Requirements The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, RFC 2119 [RFC2119]. 2. Assumptions Routers and modems that exist as part of the same node (e.g., that are locally connected) can use a discovery technique to locate each other, thus avoiding a priori configuration. The router is responsible for initializing the discovery process, using the Peer Discovery signal (Section 8.1). DLEP uses a session-oriented paradigm. A router and modem form a session by completing the discovery and initialization process. This router-modem session persists unless or until it either (1) times out, based on the timeout values supplied, or (2) is explicitly torn down by one of the participants. Note that while use of timers in Ratliff, et al. Expires January 7, 2016 [Page 8] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 DLEP is optional, it is strongly RECOMMENDED that implementations choose to run with timers enabled. DLEP assumes that the MAC address for delivering data traffic is the MAC specified in the Destination Up message (Section 8.9). No manipulation or substitution is performed; the MAC address supplied in Destination Up is used as the OSI Layer 2 Destination MAC address. DLEP also assumes that MAC addresses MUST be unique within the context of a router-modem session. Additionally, DLEP can support MAC addresses in either EUI-48 or EUI-64 format, with the restriction that ALL MAC addresses for a given DLEP session MUST be in the same format, and MUST be consistent with the MAC address format of the connected modem (e.g., if the modem is connected to the router with an EUI-48 MAC, all destination addresses via that modem MUST be expressed in EUI-48 format). DLEP uses UDP multicast for single-hop discovery signalling, and TCP for transport of the control messages. Therefore, DLEP assumes that the modem and router have topologically consistent IP addresses assigned. It is RECOMMENDED that DLEP implementations utilize IPv6 link-local addresses to reduce the administrative burden of address assignment. Destinations can be identified by either the router or the modem, and represent a specific destination (e.g., an address) that exists on the link(s) managed by the modem. A destination MUST contain a MAC address, it MAY optionally include a Layer 3 address (or addresses). Note that since a destination is a MAC address, the MAC could reference a logical destination, as in a derived multicast MAC address, as well as a physical device. As destinations are discovered, DLEP routers and modems build an information base on destinations accessible via the modem. The DLEP messages concerning destinations thus become the way for routers and modems to maintain, and notify each other about, an information base representing the physical and logical (e.g., multicast) destinations accessible via the modem device. The information base would contain addressing information (i.e. MAC address, and OPTIONALLY, Layer 3 addresses), link characteristics (metrics), and OPTIONALLY, flow control information (credits). DLEP assumes that any message not understood by a receiver MUST result in an error indication being sent to the originator, and also MUST result in termination of the session between the DLEP peers. Any DLEP data item not understood by a receiver MUST also result in termination of the session. Ratliff, et al. Expires January 7, 2016 [Page 9] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 DLEP assumes that security on the session (e.g., authentication of session partners, encryption of traffic, or both) is dealt with by the underlying transport mechanism (e.g., by using a transport such as TLS [RFC5246]). This document specifies an implementation of the DLEP messages running over the TCP transport. It is assumed that DLEP running over other transport mechanisms would be documented separately. 3. Core Features and Extensions DLEP has a core set of signals, messages and data items that MUST be parsed without error by an implementation in order to guarantee interoperability and therefore make the implementation DLEP compliant. This document defines this set of signals, messages and data items, listing them as ’core’. It should be noted that some core signals, messages and data items might not be used during the lifetime of a single DLEP session, but a compliant implementation MUST support them. While this document represents the best efforts of the working group to be functionally complete, it is recognized that extensions to DLEP will in all likelihood be necessary as more link types are used. If interoperable protocol extensions are required, they MUST be standardized either as an update to this document, or as an additional stand-alone specification. The requests for IANAcontrolled registries in this document contain sufficient Reserved space, in terms of DLEP signals, messages, data items and status codes, to accommodate future extensions to the protocol and the data transferred. All extensions are considered OPTIONAL. Extensions may be negotiated on a per-session basis during session initialization via the Extensions Supported mechanism. Only the DLEP functionality listed as ’core’ is required by an implementation in order to be DLEP compliant. This specification defines one extension, Credit Windowing, that devices MAY choose to implement. 3.1. Experiments This document requests Private Use numbering space in the DLEP signal/message, data item and status code registries for experimental items. The intent is to allow for experimentation with new signals, messages, data items, and/or status codes, while still retaining the documented DLEP behavior. Ratliff, et al. Expires January 7, 2016 [Page 10] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Use of the experimental signals, messages, data items, status codes, or behaviors MUST be announced as Extensions, using extension identifiers from the Private Use space in the Extensions Supported registry (Table 4), during session initialization with a value agreed upon (a priori) between the participating peers. Multiple experiments MAY be announced in the Session Initialization messages. However, use of multiple experiments in a single session could lead to interoperability issues or unexpected results (e.g., clashes of experimental signals, messages, data items and/or status code types), and is therefore discouraged. It is left to implementations to determine the correct processing path (e.g., a decision on whether to terminate the session, or to establish a precedence of the conflicting definitions) if such conflicts arise. 4. Metrics DLEP includes the ability for the router and modem to communicate metrics that reflect the characteristics (e.g., datarate, latency) of the variable-quality link in use. DLEP does not specify how a given metric value is to be calculated, rather, the protocol assumes that metrics have been calculated with a ’best effort’, incorporating all pertinent data that is available to the modem device. DLEP allows for metrics to be sent within two contexts - metrics for a specific destination within the network (e.g., a specific router), and per-session (those that apply to all destinations accessed via the modem). Most metrics can be further subdivided into transmit and receive metrics. In cases where metrics are provided at session level, the receiver MUST propagate the metrics to all entries in its information base for destinations that are accessed via the originator. DLEP modem implementations MUST announce all metric items that will be reported during the session, and provide default values for those metrics, in the Session Initialization Response message (Section 8.4). In order to use a metric type that was not included in the Session Initialization Response message, modem implementations MUST terminate the session with the router (via the Session Terminate message (Section 8.7)), and establish a new session. It is left to implementations to choose sensible default values based on their specific characteristics. Modems having static (nonchanging) link metric characteristics MAY report metrics only once for a given destination (or once on a modem-wide basis, if all connections via the modem are of this static nature). Ratliff, et al. Expires January 7, 2016 [Page 11] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 A DLEP participant MAY send metrics both in a session context (via the Session Update message) and a specific destination context (via Destination Update) at any time. The heuristics for applying received metrics is left to implementations. 4.1. Mandatory Metrics As mentioned above, DLEP modem implementations MUST announce all supported metric items during the Session Initialization state. However, a modem MUST include the following list of metrics in the Session Initialization Response message (Section 8.4): o Maximum Data Rate (Receive) (Section 9.12) o Maximum Data Rate (Transmit) (Section 9.13) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) 5. DLEP Session Flow All DLEP peers transition through four (4) distinct states during the lifetime of a DLEP session: o Peer Discovery o Session Initialization o In-Session o Session Termination The Peer Discovery state is OPTIONAL to implement for routers. If it is used, this state is the initial state. If it is not used, then one or more preconfigured address/port combinations SHOULD be provided to the router, and the device starts in the Session Initialization state. Modems MUST support the Peer Discovery state. 5.1. Peer Discovery State In the Peer Discovery state, routers send UDP packets containing a Peer Discovery signal (Section 8.1) to the DLEP well-known multicast address (Section 12.8) and port number (Section 12.7) then await a Ratliff, et al. Expires January 7, 2016 [Page 12] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 unicast UDP packet containing a Peer Offer signal (Section 8.2) from a modem. While in the Peer Discovery state, Peer Discovery signals MUST be sent repeatedly by a router, at regular intervals; every three (3) seconds is RECOMMENDED. In the Peer Discovery state, the modem waits for incoming Peer Discovery signals on the DLEP well-known multicast address and port. On receipt of a valid signal, it MUST unicast a Peer Offer signal to the source address of the received UDP packet. Peer Offer signals MAY contain the unicast address and port for TCP-based communication with a modem, via the IPv4 Connection Point data item (Section 9.2) or the IPv6 Connection Point data item (Section 9.3), on which it is prepared to accept an incoming TCP connection. The modem then begins listening for incoming TCP connections, and, having accepted one, enters the Session Initialization state. Anything other than Peer Discovery signals received on the UDP socket MUST be silently dropped. Modems SHOULD be prepared to accept a TCP connection from a router that is not using the Discovery mechanism, i.e. a connection attempt that occurs without a preceeding Peer Discovery signal. The modem MUST accept a TCP connection on only one (1) address/port combination per session. Routers MUST use one or more of the modem address/port combinations from the Peer Offer signal or from a priori configuration to establish a new TCP connection to the modem. If more than one modem address/port combinations is available, router implementations MAY use their own heuristics to determine the order in which they are tried. If a TCP connection cannot be achieved using any of the address/port combinations and the Discovery mechanism is in use, then the router SHOULD resume issuing Peer Discovery signals. If no IP Connection Point data items are included in the Peer Offer signal, the router MUST use the origin address of the signal as the IP address, and the DLEP well-known port number. Once a TCP connection has been established with the modem, the router begins a new session and enters the Session Initialization state. It is up to the router implementation if Peer Discovery signals continue to be sent after the device has transitioned to the Session Initialization state. 5.2. Session Initialization State On entering the Session Initialization state, the router MUST send a Session Initialization message (Section 8.3) to the modem. The router MUST then wait for receipt of a Session Initialization Response message (Section 8.4) from the modem. Receipt of the Ratliff, et al. Expires January 7, 2016 [Page 13] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Session Initialization Response message containing a Status data item (Section 9.1) with value ’Success’, see Table 3, indicates that the modem has received and processed the Session Initialization message, and the router MUST transition to the In-Session state. On entering the Session Initialization state, the modem MUST wait for receipt of a Session Initialization message from the router. Upon receipt and successful parsing of a Session Initialization message, the modem MUST send a Session Initialization Response message, and the session MUST transition to the In-Session state. As mentioned before, DLEP provides an extension negotiation capability to be used in the Session Initialization state. Extensions supported by an implementation MUST be declared to potential DLEP peers using the Extensions Supported data item (Section 9.6). Once both peers have exchanged initialization messages, an implementation MUST NOT emit any message, signal, data item or status code associated with an extension that was not specified in the received initialization message from its peer. If the router receives any message other than a valid Session Initialization Response, it MUST send a Session Termination message (Section 8.7) with a relevant status code, e.g. ’Unexpected Message’, see Table 3, and transition to the Session Termination state. If the modem receives any message other than Session Initialization, or it fails to parse the received message, it MUST NOT send any message, and MUST terminate the TCP connection, then restart at the Peer Discovery state. As mentioned before, the Session Initialization Response message MUST contain metric data items for ALL metrics that will be used during the session. If an additional metric is to be introduced after the session has started, the session between router and modem MUST be terminated and restarted, and the new metric described in the next Session Initialization Response message. 5.3. In-Session State In the In-Session state, messages can flow in both directions between peers, indicating changes to the session state, the arrival or departure of reachable destinations, or changes of the state of the links to the destinations. Ratliff, et al. Expires January 7, 2016 [Page 14] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 In order to maintain the In-Session state, periodic Heartbeat messages (Section 8.14) MAY be exchanged between router and modem. These messages are intended to keep the session alive, and to verify bidirectional connectivity between the two participants. Each DLEP peer is responsible for the creation of heartbeat messages. Receipt of any valid DLEP message MUST reset the heartbeat interval timer (i.e., valid DLEP messages take the place of, and obviate the need for, Heartbeat messages). DLEP provides a Session Update message (Section 8.5), intended to communicate some change in status (e.g., a change of layer 3 address parameters, or a modem-wide link change). In addition to the session messages, the participants will transmit messages concerning destinations in the network. These messages trigger creation/maintenance/deletion of destinations in the information base of the recipient. For example, a modem will inform its attached router of the presence of a new destination via the Destination Up message (Section 8.9). Receipt of a Destination Up causes the router to allocate the necessary resources, creating an entry in the information base with the specifics (i.e. MAC Address, Latency, Data Rate, etc.) of the destination. The loss of a destination is communicated via the Destination Down message (Section 8.11), and changes in status to the destination (e.g., varying link quality, or addressing changes) are communicated via the Destination Update message (Section 8.13). The information on a given destination will persist in the router’s information base until (1) a Destination Down message is received, indicating that the modem has lost contact with the remote node, or (2) the router/modem transitions to the Session Termination state. In addition to receiving metrics about the link, DLEP provides a message allowing a router to request a different datarate, or latency, from the modem. This message is referred to as the Link Characteristics Request message (Section 8.15), and gives the router the ability to deal with requisite increases (or decreases) of allocated datarate/latency in demand-based schemes in a more deterministic manner. The In-Session state is maintained until one of the following conditions occur: o The implementation terminates the session by sending a Session Termination message (Section 8.7)), or o The DLEP peer terminates the session, indicated by receiving a Session termination message. Ratliff, et al. Expires January 7, 2016 [Page 15] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The implementation MUST then transition to the Session Termination state. 5.4. Session Termination State When a DLEP implementation enters the Session Termination state after sending a Session Termination message (Section 8.7) as the result of an invalid message or error, it MUST wait for a Session Termination Response message (Section 8.8) from its peer. If Heartbeat messages (Section 8.14) are in use, senders SHOULD allow four (4) heartbeat intervals to expire before assuming that the peer is unresponsive, and continuing with session termination. If Heartbeat messages are not in use, then if is RECOMMENDED that an interval of eight (8) seconds be used. When a DLEP implementation enters the Session Termination state having received a Session Termination message from its peer, it MUST immediately send a Session Termination Response. The sender and receiver of a Session Termination message MUST release all resources allocated for the session, and MUST eliminate all destinations in the information base accessible via the peer represented by the session. No Destination Down messages (Section 8.11) are sent. Any messages received after either sending or receiving a Session Termination message MUST be silently ignored. Once Session Termination messages have been exchanged, or timed out, the device MUST terminate the TCP connection to the peer, and return to the relevant initial state. 6. DLEP Signal and Message Processing Most messages in DLEP are members of a request/response pair, e.g. Destination Up message (Section 8.9), and Destination Up Response message (Section 8.10). These pairs of messages define an implicit transaction model for both session messages and destination messages. As mentioned before, session message pairs control the flow of the session through the various states, e.g. an implementation MUST NOT leave the Session Initialization state until a Session Initialization message (Section 8.3) and Session Initialization Response message (Section 8.4) have been exchanged. Destination message pairs describe the arrival and departure of logical destinations, and control the flow of information about the destinations in the several ways. Ratliff, et al. Expires January 7, 2016 [Page 16] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Prior to the exchange of a pair of Destination Up and Destination Up Response messages, no messages concerning the logical destination identified by the MAC Address data item (Section 9.7) may be sent. An implementation receiving a message with such an unannounced destination MUST terminate the session by issuing a Session Termination message (Section 8.7) with a status code of ’Invalid Destination’, see Table 3, and transition to the Session Termination state. The receiver of a Destination Up message MAY decline further messages concerning a given destination by sending a Destination Up Response with a status code of ’Not Interested’, see Table 3. Receivers of such responses MUST NOT send further messages concerning that destination to the peer. After exchanging a pair of Destination Down (Section 8.11) and Destination Down Response (Section 8.12) messages, no messages concerning the logical destination identified by the MAC Address data item may be a sent without a previously sending a new Destination Up message. An implementation receiving a message about a down destination MUST terminate the session by issuing a Session Termination message with a status code of ’Invalid Destination’ and transition to the Session Termination state. 7. DLEP Signal and Message Structure DLEP defines two protocol units used in two different ways: Signals and Messages. Signals are only used in the Discovery mechanism and are carried in UDP datagrams. Messages are used bi-directionally over a TCP connection between two peers, in the Session Initialization, In-Session and Session Termination states. Both signals and messages consist of a header followed by an unordered list of data items. Headers consist of Type and Length information, while data items are encoded as TLV (Type-Length-Value) structures. In this document, the data items following a signal or message header are described as being ’contained in’ the signal or message. There is no restriction on the order of data items following a header, and the multiplicity of duplicate data items is defined by the definition of the signal or message declared by the type in the header. All integers in header fields and values MUST be in network byteorder. Ratliff, et al. Expires January 7, 2016 [Page 17] Internet-Draft 7.1. Dynamic Link Exchange Protocol (DLEP) July 2015 DLEP Signal Header The DLEP signal header contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ’D’ | ’L’ | ’E’ | ’P’ | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Signal Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3: DLEP Signal Header "DLEP": Every signal MUST start with the characters: U+44, U+4C, U+45, U+50. Signal Type: An 16-bit unsigned integer containing one of the DLEP Signal/Message Type values defined in this document. Length: The length in octets, expressed as a 16-bit unsigned integer, of all of the DLEP data items associated with this signal. This length SHALL NOT include the length of the header itself. The DLEP signal header is immediately followed by one or more DLEP data items, encoded in TLVs, as defined in this document. If an unrecognized, or unexpected signal is received, or a received signal contains unrecognized, invalid, or disallowed duplicate data items, the receiving peer MUST ignore the signal. 7.2. DLEP Message Header The DLEP message header contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 4: DLEP Message Header Message Type: An 16-bit unsigned integer containing one of the DLEP Signal/Message Type values defined in this document. Ratliff, et al. Expires January 7, 2016 [Page 18] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Length: The length in octets, expressed as a 16-bit unsigned integer, of all of the DLEP data items associated with this message. This length SHALL NOT include the length of the header itself. The DLEP message header is immediately followed by one or more DLEP data items, encoded in TLVs, as defined in this document. If an unrecognized, or unexpected message is received, or a received message contains unrecognized, invalid, or disallowed duplicate data items, the receiving peer MUST issue a Session Termination message (Section 8.7) with a Status data item (Section 9.1) containing the most relevant status code, and transition to the Session Termination state. 7.3. DLEP Generic Data Item All DLEP data items contain the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Value... : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 5: DLEP Generic Data Item Data Item Type: An 16-bit unsigned integer field specifying the type of data item being sent. Length: The length in octets, expressed as an 16-bit unsigned integer, of the value field of the data item. This length SHALL NOT include the length of the header itself. Value: A field of <Length> octets, which contains data specific to a particular data item. 8. DLEP Signals and Messages As mentioned above, all DLEP signals begin with the DLEP signal header, and all DLEP messages begin with the DLEP message header. Therefore, in the following descriptions of specific signals and messages, this header is assumed, and will not be replicated. Ratliff, et al. Expires January 7, 2016 [Page 19] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Following is the set of core signals and messages that MUST be recognized by a DLEP compliant implementation. As mentioned before, not all messages may be used during a session, but an implementation MUST correctly process these messages when received. The core DLEP signals and messages are: +-------------+-----------------------------------------------------+ | Type Code | Description | +-------------+-----------------------------------------------------+ | 0 | Reserved | | 1 | Peer Discovery signal (Section 8.1) | | 2 | Peer Offer signal (Section 8.2) | | 3 | Session Initialization message (Section 8.3) | | 4 | Session Initialization Response message (Section | | | 8.4) | | 5 | Session Update message (Section 8.5) | | 6 | Session Update Response message (Section 8.6) | | 7 | Session Termination message (Section 8.7) | | 8 | Session Termination Response message (Section 8.8) | | 9 | Destination Up message (Section 8.9) | | 10 | Destination Up Response message (Section 8.10) | | 11 | Destination Down message (Section 8.11) | | 12 | Destination Down Response message (Section 8.12) | | 13 | Destination Update message (Section 8.13) | | 14 | Heartbeat message (Section 8.14) | | 15 | Link Characteristics Request message (Section 8.15) | | 16 | Link Characteristics Response message (Section | | | 8.16) | | 17-65519 | Reserved for future extensions | | 65520-65534 | Private Use. Available for experiments | | 65535 | Reserved | +-------------+-----------------------------------------------------+ Table 1: DLEP Signal/Message types 8.1. Peer Discovery Signal A Peer Discovery signal SHOULD be sent by a router to discover DLEP modems in the network. The Peer Offer signal (Section 8.2) is required to complete the discovery process. Implementations MAY implement their own retry heuristics in cases where it is determined the Peer Discovery signal has timed out. To construct a Peer Discovery signal, the Signal Type value in the signal header is set to 1, from Table 1. The Peer Discovery signal MAY contain the following data item: Ratliff, et al. Expires January 7, 2016 [Page 20] Internet-Draft o 8.2. Dynamic Link Exchange Protocol (DLEP) July 2015 Peer Type (Section 9.4) Peer Offer Signal A Peer Offer signal MUST be sent by a DLEP modem in response to a valid Peer Discovery signal (Section 8.1). The Peer Offer signal MUST be sent to the unicast address of the originator of the Peer Discovery signal. To construct a Peer Offer signal, the Signal Type value in the signal header is set to 2, from Table 1. The Peer Offer signal MAY contain the following data item: o Peer Type (Section 9.4) The Peer Offer signal MAY contain one or more of any of the following data items, with different values: o IPv4 Connection Point (Section 9.2) o IPv6 Connection Point (Section 9.3) The IP Connection Point data items indicate the unicast address the receiver of Peer Offer MUST use when connecting the DLEP TCP session. If multiple IP Connection Point data items are present in the Peer Offer signal, implementations MAY use their own heuristics to select the address to connect to. If no IP Connection Point data items are included in the Peer Offer signal, the receiver MUST use the origin address of the signal as the IP address, and the DLEP well-known port number (Section 12.7) to establish the TCP connection. 8.3. Session Initialization Message A Session Initialization message MUST be sent by a router as the first message of the DLEP TCP session. It is sent by the router after a TCP connect to an address/port combination that was obtained either via receipt of a Peer Offer, or from a priori configuration. If any optional extensions are supported by the implementation, they MUST be enumerated in the Extensions Supported data item. If an Extensions Supported data item does not exist in a Session Initialization message, the receiver of the message MUST conclude that there is no support for extensions in the sender. Implementations supporting the Heartbeat Interval (Section 9.5) should understand that heartbeats are not fully established until Ratliff, et al. Expires January 7, 2016 [Page 21] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 receipt of Session Initialization Response message (Section 8.4), and should therefore implement their own timeout and retry heuristics for this message. To construct a Session Initialization message, the Message Type value in the message header is set to 3, from Table 1. The Session Initialization message MUST contain one of each of the following data items: o Heartbeat Interval (Section 9.5) The Session Initialization message MAY contain one of each of the following data items: o Peer Type (Section 9.4) o Extensions Supported (Section 9.6) A Session Initialization message MUST be acknowledged by the receiver issuing a Session Initialization Response message (Section 8.4). 8.4. Session Initialization Response Message A Session Initialization Response message MUST be sent in response to a received Session Initialization message (Section 8.3). The Session Initialization Response message completes the DLEP session establishment; the sender of the message should transition to the InSession state when the message is sent, and the receiver should transition to the In-Session state upon receipt (and successful parsing) of an acceptable Session Initialization Response message. All supported metric data items MUST be included in the Session Initialization Response message, with default values to be used on a ’modem-wide’ basis. This can be viewed as the modem ’declaring’ all supported metrics at DLEP session initialization. Receipt of any DLEP message containing a metric data item not included in the Session Initialization Response message MUST be treated as an error, resulting in the termination of the DLEP session between router and modem. If any optional extensions are supported by the modem, they MUST be enumerated in the Extensions Supported data item. If an Extensions Supported data item does not exist in a Session Initialization Response message, the receiver of the message MUST conclude that there is no support for extensions in the sender. Ratliff, et al. Expires January 7, 2016 [Page 22] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 After the Session Initialization/Session Initialization Response messages have been successfully exchanged, implementations MUST only use extensions that are supported by BOTH peers. To construct a Session Initialization Response message, the Message Type value in the message header is set to 4, from Table 1. The Session Initialization Response message MUST contain one of each of the following data items: o Heartbeat Interval (Section 9.5) o Maximum Data Rate (Receive) (Section 9.12) o Maximum Data Rate (Transmit) (Section 9.13) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) The Session Initialization Response message MUST contain one of each of the following data items, if the data item will be used during the lifetime of the session: o Resources (Receive) (Section 9.17) o Resources (Transmit) (Section 9.18) o Relative Link Quality (Receive) (Section 9.19) o Relative Link Quality (Transmit) (Section 9.20) The Session Initialization Response message MAY contain one of each of the following data items: o Status (Section 9.1) o Peer Type (Section 9.4) o Extensions Supported (Section 9.6) A receiver of a Session Initialization Response message without a Status data item MUST behave as if a Status data item with code ’Success’ had been received. Ratliff, et al. Expires January 7, 2016 [Page 23] Internet-Draft 8.5. Dynamic Link Exchange Protocol (DLEP) July 2015 Session Update Message A Session Update message MAY be sent by a DLEP peer to indicate local Layer 3 address changes, or metric changes on a modem-wide basis. For example, addition of an IPv4 address to the router MAY prompt a Session Update message to its attached DLEP modems. Also, for example, a modem that changes its Maximum Data Rate (Receive) for all destinations MAY reflect that change via a Session Update message to its attached router(s). Concerning Layer 3 addresses, if the modem is capable of understanding and forwarding this information (via proprietary mechanisms), the address update would prompt any remote DLEP modems (DLEP-enabled modems in a remote node) to issue a Destination Update message (Section 8.13) to their local routers with the new (or deleted) addresses. Modems that do not track Layer 3 addresses SHOULD silently parse and ignore Layer 3 data items. The Session Update message MUST be acknowledged with a Session Update Response message (Section 8.6). If metrics are supplied with the Session Update message (e.g., Maximum Data Rate), these metrics are considered to be modem-wide, and therefore MUST be applied to all destinations in the information base associated with the router/modem session. Supporting implementations are free to employ heuristics to retransmit Session Update messages. The sending of Session Update messages for Layer 3 address changes SHOULD cease when either participant (router or modem) determines that the other implementation does not support Layer 3 address tracking. To construct a Session Update message, the Message Type value in the message header is set to 5, from Table 1. The Session Update message MAY contain one of each of the following data items: o Maximum Data Rate (Receive) (Section 9.12) o Maximum Data Rate (Transmit) (Section 9.13) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) o Resources (Receive) (Section 9.17) Ratliff, et al. Expires January 7, 2016 [Page 24] Internet-Draft Dynamic Link Exchange Protocol (DLEP) o Resources (Transmit) (Section 9.18) o Relative Link Quality (Receive) (Section 9.19) o Relative Link Quality (Transmit) (Section 9.20) July 2015 The Session Update message MAY contain one or more of the following data items, with different values: o IPv4 Address (Section 9.8) o IPv6 Address (Section 9.9) A Session Update message MUST be acknowledged by the receiver issuing a Session Update Response message (Section 8.6). 8.6. Session Update Response Message A Session Update Response message MUST be sent by implementations to indicate whether a Session Update message (Section 8.5) was successfully received. To construct a Session Update Response message, the Message Type value in the message header is set to 6, from Table 1. The Session Update Response message MAY contain one of each of the following data items: o Status (Section 9.1) A receiver of a Session Update Response message without a Status data item MUST behave as if a Status data item with code ’Success’ had been received. 8.7. Session Termination Message A Session Termination message MUST be sent by a DLEP participant when the router/modem session needs to be terminated. To construct a Session Termination message, the Message Type value in the message header is set to 7, from Table 1. The Session Termination message MAY contain one of each of the following data items: o Status (Section 9.1) Ratliff, et al. Expires January 7, 2016 [Page 25] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 A receiver of a Session Termination message without a Status data item MUST behave as if a Status of ’Unknown reason for Session Termination’ has been received. A Session Termination message MUST be acknowledged by the receiver issuing a Session Termination Response message (Section 8.8). 8.8. Session Termination Response Message A Session Termination Response message MUST be sent by a DLEP peer in response to a received Session Termination message (Section 8.7). Receipt of a Session Termination Response message completes the teardown of the router/modem session. To construct a Session Termination Response message, the Message Type value in the message header is set to 8, from Table 1. The Session Termination Response message MAY contain one of each of the following data items: o Status (Section 9.1) A receiver of a Session Termination Response message without a Status data item MUST behave as if a Status data item with status code ’Success’, implying graceful termination, had been received. 8.9. Destination Up Message A Destination Up message can be sent either by the modem, to indicate that a new remote node has been detected, or by the router, to indicate the presence of a new logical destination (e.g., a Multicast group) in the network. A Destination Up message MUST be acknowledged by the receiver issuing a Destination Up Response message (Section 8.10). The sender of the Destination Up message is free to define its retry heuristics in event of a timeout. When a Destination Up message is received and successfully processed, the receiver should add knowledge of the new destination to its information base, indicating that the destination is accessible via the modem/router pair. To construct a Destination Up message, the Message Type value in the message header is set to 9, from Table 1. The Destination Up message MUST contain one of each of the following data items: Ratliff, et al. Expires January 7, 2016 [Page 26] Internet-Draft o Dynamic Link Exchange Protocol (DLEP) July 2015 MAC Address (Section 9.7) The Destination Up message MAY contain one of each of the following data items: o Maximum Data Rate (Receive) (Section 9.12) o Maximum Data Rate (Transmit) (Section 9.13) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) o Resources (Receive) (Section 9.17) o Resources (Transmit) (Section 9.18) o Relative Link Quality (Receive) (Section 9.19) o Relative Link Quality (Transmit) (Section 9.20) The Destination Up message MAY contain one or more of the following data items, with different values: o IPv4 Address (Section 9.8) o IPv6 Address (Section 9.9) o IPv4 Attached Subnet (Section 9.10) o IPv6 Attached Subnet (Section 9.11) If the sender has IPv4 and/or IPv6 address information for a destination it SHOULD include the relevant data items in the Destination Up message, reducing the need for the receiver to probe for any address. 8.10. Destination Up Response Message A DLEP participant MUST send a Destination Up Response message to indicate whether a Destination Up message (Section 8.9) was successfully processed. To construct a Destination Up Response message, the Message Type value in the message header is set to 10, from Table 1. Ratliff, et al. Expires January 7, 2016 [Page 27] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The Destination Up Response message MUST contain one of each of the following data items: o MAC Address (Section 9.7) The Destination Up Response message MAY contain one of each of the following data items: o Status (Section 9.1) A receiver of a Destination Up Response message without a Status data item MUST behave as if a Status data item with status code ’Success’ had been received. 8.11. Destination Down Message A DLEP peer MUST send a Destination Down message to report when a destination (a remote node or a multicast group) is no longer reachable. A Destination Down Response message (Section 8.12) MUST be sent by the recipient of a Destination Down message to confirm that the relevant data has been removed from the information base. The sender of the Destination Down message is free to define its retry heuristics in event of a timeout. To construct a Destination Down message, the Message Type value in the message header is set to 11, from Table 1. The Destination Down message MUST contain one of each of the following data items: o 8.12. MAC Address (Section 9.7) Destination Down Response Message A DLEP participant MUST send a Destination Down Response message to indicate whether a received Destination Down message (Section 8.11) was successfully processed. If successfully processed, the sender of the Response MUST have removed all entries in the information base that pertain to the referenced destination. To construct a Destination Down Response message, the Message Type value in the message header is set to 12, from Table 1. The Destination Down Response message MUST contain one of each of the following data items: o MAC Address (Section 9.7) Ratliff, et al. Expires January 7, 2016 [Page 28] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The Destination Down Response message MAY contain one of each of the following data items: o Status (Section 9.1) A receiver of a Destination Down Response message without a Status data item MUST behave as if a Status data item with status code ’Success’ had been received. 8.13. Destination Update Message A DLEP participant SHOULD send the Destination Update message when it detects some change in the information base for a given destination (remote node or multicast group). Some examples of changes that would prompt a Destination Update message are: o Change in link metrics (e.g., Data Rates) o Layer 3 addressing change To construct a Destination Update message, the Message Type value in the message header is set to 13, from Table 1. The Destination Update message MUST contain one of each of the following data items: o MAC Address (Section 9.7) The Destination Update message MAY contain one of each of the following data items: o Maximum Data Rate (Receive) (Section 9.12) o Maximum Data Rate (Transmit) (Section 9.13) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) o Resources (Receive) (Section 9.17) o Resources (Transmit) (Section 9.18) o Relative Link Quality (Receive) (Section 9.19) o Relative Link Quality (Transmit) (Section 9.20) Ratliff, et al. Expires January 7, 2016 [Page 29] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The Destination Update message MAY contain one or more of the following data items, with different values: o IPv4 Address (Section 9.8) o IPv6 Address (Section 9.9) 8.14. Heartbeat Message A Heartbeat message SHOULD be sent by a DLEP participant every N seconds, where N is defined in the Heartbeat Interval data item of the Session Initialization message (Section 8.3) or Session Initialization Response message (Section 8.4). Note that implementations setting the Heartbeat Interval to 0 effectively sets the interval to an infinite value, therefore this message SHOULD NOT be sent. The message is used by participants to detect when a DLEP session partner (either the modem or the router) is no longer communicating. Participants SHOULD allow two (2) heartbeat intervals to expire with no traffic on the router/modem session before initiating DLEP session termination procedures. To construct a Heartbeat message, the Message Type value in the message header is set to 14, from Table 1. There are no valid data items for the Heartbeat message. 8.15. Link Characteristics Request Message The Link Characteristics Request message MAY be sent by the router to request that the modem initiate changes for specific characteristics of the link. The request can reference either a real destination (e.g., a remote node), or a logical destination (e.g., a multicast group) within the network. The Link Characteristics Request message MAY contain either a Current Data Rate (CDRR or CDRT) data item to request a different datarate than what is currently allocated, a Latency data item to request that traffic delay on the link not exceed the specified value, or both. A Link Characteristics Response message (Section 8.16) is required to complete the request. Issuing a Link Characteristics Request with ONLY the MAC Address data item is a mechanism a peer MAY use to request metrics (via the Link Characteristics Response) from its partner. Ratliff, et al. Expires January 7, 2016 [Page 30] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The sender of a Link Characteristics Request message MAY attach a timer to the request using the Link Characteristics Response Timer data item. If a Link Characteristics Response message is received after the timer expires, the sender MUST NOT assume that the request succeeded. Implementations are free to define their retry heuristics in event of a timeout. To construct a Link Characteristics Request message, the Message Type value in the message header is set to 15, from Table 1. The Link Characteristics Request message MUST contain one of each of the following data items: o MAC Address (Section 9.7) The Link Characteristics Request message MAY contain one of each of the following data items: o Link Characteristics Response Timer (Section 9.21) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) 8.16. Link Characteristics Response Message A DLEP participant MUST send a Link Characteristics Response message to indicate whether a received Link Characteristics Request message (Section 8.15) was successfully processed. The Link Characteristics Response message SHOULD contain a complete set of metric data items, and MUST contain a full set (i.e. those declared in the Session Initialization Response message (Section 8.4)), if metrics were requested by only including a MAC address data item. It MUST contain the same metric types as the request. The values in the metric data items in the Link Characteristics Response message MUST reflect the link characteristics after the request has been processed. If an implementation is not able to alter the characteristics of the link in the manner requested, then a Status data item with status code ’Request Denied’, see Table 3, MUST be added to the message. To construct a Link Characteristics Response message, the Message Type value in the message header is set to 16, from Table 1. The Link Characteristics Response message MUST contain one of each of the following data items: Ratliff, et al. Expires January 7, 2016 [Page 31] Internet-Draft o Dynamic Link Exchange Protocol (DLEP) July 2015 MAC Address (Section 9.7) The Link Characteristics Response message SHOULD contain one of each of the following data items: o Maximum Data Rate (Receive) (Section 9.12) o Maximum Data Rate (Transmit) (Section 9.13) o Current Data Rate (Receive) (Section 9.14) o Current Data Rate (Transmit) (Section 9.15) o Latency (Section 9.16) The Link Characteristics Response message MAY contain one of each of the following data items: o Resources (Receive) (Section 9.17) o Resources (Transmit) (Section 9.18) o Relative Link Quality (Receive) (Section 9.19) o Relative Link Quality (Transmit) (Section 9.20) o Status (Section 9.1) A receiver of a Link Characteristics Response message without a Status data item MUST behave as if a Status data item with status code ’Success’ had been received. 9. DLEP Data Items Following is the list of core data items that MUST be recognized by a DLEP compliant implementation. As mentioned before, not all data items need be used during a session, but an implementation MUST correctly process these data items when correctly associated with a signal or message. The core DLEP data items are: Ratliff, et al. Expires January 7, 2016 [Page 32] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 +-------------+-----------------------------------------------------+ | Type Code | Description | +-------------+-----------------------------------------------------+ | 0 | Reserved | | 1 | Status (Section 9.1) | | 2 | IPv4 Connection Point (Section 9.2) | | 3 | IPv6 Connection Point (Section 9.3) | | 4 | Peer Type (Section 9.4) | | 5 | Heartbeat Interval (Section 9.5) | | 6 | Extensions Supported (Section 9.6) | | 7 | MAC Address (Section 9.7) | | 8 | IPv4 Address (Section 9.8) | | 9 | IPv6 Address (Section 9.9) | | 10 | IPv4 Attached Subnet (Section 9.10) | | 11 | IPv6 Attached Subnet (Section 9.11) | | 12 | Maximum Data Rate (Receive) MDRR) (Section 9.12) | | 13 | Maximum Data Rate (Transmit) (MDRT) (Section 9.13) | | 14 | Current Data Rate (Receive) (CDRR) (Section 9.14) | | 15 | Current Data Rate (Transmit) (CDRT) (Section 9.15) | | 16 | Latency (Section 9.16) | | 17 | Resources (Receive) (RESR) (Section 9.17) | | 18 | Resources (Transmit) (REST) (Section 9.18) | | 19 | Relative Link Quality (Receive) (RLQR) (Section | | | 9.19) | | 20 | Relative Link Quality (Transmit) (RLQT) (Section | | | 9.20) | | 21 | Link Characteristics Response Timer (Section 9.21) | | 22-24 | Credit Windowing (Section 10) extension data items | | 25-65407 | Reserved for future extensions | | 65408-65534 | Private Use. Available for experiments | | 65535 | Reserved | +-------------+-----------------------------------------------------+ Table 2: DLEP Data Item types 9.1. Status The Status data item MAY appear in the Session Initialization Response (Section 8.4), Session Termination (Section 8.7), Session Termination Response (Section 8.8), Session Update Response (Section 8.6), Destination Up Response (Section 8.10), Destination Down Response (Section 8.12) and Link Characteristics Response (Section 8.16) messages. For the Session Termination message (Section 8.7), the Status data item indicates a reason for the termination. For all acknowledgement messages, the Status data item is used to indicate the success or failure of the previously received message. Ratliff, et al. Expires January 7, 2016 [Page 33] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The status data item includes an optional Text field that can be used to provide a textual description of the status. The use of the Text field is entirely up to the receiving implementation, i.e., it could be output to a log file or discarded. If no Text field is supplied with the Status data item, the Length field MUST be set to 1. The Status data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Code | Text... : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 1 + Length of text, in octets Status Code: One of the codes defined in Table 3 below. Text: UTF-8 encoded string, describing the cause, used for implementation defined purposes. Since this field is used for description, implementations SHOULD limit characters in this field to printable characters. Implementations receiving this data item SHOULD check for printable characters in the field. An implementation MUST NOT assume the Text field is NUL-terminated. +-------------+---------+-----------+-------------------------------+ | Status Code | Value | Failure | Reason | | | | Mode | | +-------------+---------+-----------+-------------------------------+ | Success | 0 | Success | The message was processed | | | | | successfully. | | Unknown | 1 | Terminate | The message was not | | Message | | | recognized by the | | | | | implementation. | | Unexpected | 2 | Terminate | The message was not expected | | Message | | | while the device was in the | | | | | current state, e.g., a | | | | | Session Initialization | | | | | message (Section 8.3) in the | | | | | In-Session state. | | Invalid | 3 | Terminate | One or more data items in the | | Data | | | message are invalid, | | | | | unexpected or incorrectly | Ratliff, et al. Expires January 7, 2016 [Page 34] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 | | | | duplicated. | | Invalid | 4 | Terminate | The destination provided in | | Destination | | | the message does not match a | | | | | previously announced | | | | | destination. For example, in | | | | | the Link Characteristic | | | | | Response message (Section | | | | | 8.16). | | <Reserved> | 5-90 | Terminate | Reserved for future | | | | | extensions. | | <Private | 91-99 | Terminate | Available for experiments. | | Use> | | | | | Not | 100 | Continue | The receiver is not | | Interested | | | interested in this message | | | | | subject, e.g. a Destination | | | | | Up Response message (Section | | | | | 8.10) to indicate no further | | | | | messages about the | | | | | destination. | | Request | 101 | Continue | The receiver refuses to | | Denied | | | complete the request. | | Timed Out | 102 | Continue | The operation could not be | | | | | completed in the time | | | | | allowed. | | <Reserved> | 103-243 | Continue | Reserved for future | | | | | extensions. | | <Private | 244-254 | Continue | Available for experiments. | | Use> | | | | | <Reserved> | 255 | Terminate | Reserved. | +-------------+---------+-----------+-------------------------------+ Table 3: DLEP Status Codes A failure mode of ’Terminate’ indicates that the session MUST be terminated after sending a response containing the status code. A failure mode of ’Continue’ indicates that the session SHOULD continue as normal. 9.2. IPv4 Connection Point The IPv4 Connection Point data item MAY appear in the Peer Offer signal (Section 8.2). The IPv4 Connection Point data item indicates the IPv4 address and, optionally, the TCP port number on the DLEP modem available for connections. If provided, the receiver MUST use this information to perform the TCP connect to the DLEP server. Ratliff, et al. Expires January 7, 2016 [Page 35] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 The IPv4 Connection Point data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IPv4 Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TCP Port Number (optional) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 4 (or 6 if TCP Port included) IPv4 Address: The IPv4 address listening on the DLEP modem. TCP Port Number: TCP Port number on the DLEP modem. If the Length field is 6, the port number specified MUST be used to establish the TCP session. If the TCP Port Number is omitted, i.e. the Length field is 4, the receiver MUST use the DLEP well-known port number (Section 12.7) to establish the TCP connection. 9.3. IPv6 Connection Point The IPv6 Connection Point data item MAY appear in the Peer Offer signal (Section 8.2). The IPv6 Connection Point data item indicates the IPv6 address and, optionally, the TCP port number on the DLEP modem available for connections. If provided, the receiver MUST use this information to perform the TCP connect to the DLEP server. The IPv6 Connection Point data item contains the following fields: Ratliff, et al. Expires January 7, 2016 [Page 36] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | TCP Port Number (optional) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 16 (or 18 if TCP Port included) IPv6 Address: The IPv6 address listening on the DLEP modem. TCP Port Number: TCP Port number on the DLEP modem. If the Length field is 18, the port number specified MUST be used to establish the TCP session. If the TCP Port Number is omitted, i.e. the Length field is 16, the receiver MUST use the DLEP well-known port number (Section 12.7) to establish the TCP connection. 9.4. Peer Type The Peer Type data item MAY appear in the Peer Discovery (Section 8.1) and Peer Offer (Section 8.2) signals, and the Session Initialization (Section 8.3) and Session Initialization Response (Section 8.4) messages. The Peer Type data item is used by the router and modem to give additional information as to its type. The peer type is a string and is envisioned to be used for informational purposes (e.g., as output in a display command). The Peer Type data item contains the following fields: Ratliff, et al. Expires January 7, 2016 [Page 37] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Peer Type... : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD Length of peer type string, in octets. Peer Type: UTF-8 encoded string. For example, a satellite modem might set this variable to "Satellite terminal". Since this data item is intended to provide additional information for display commands, sending implementations SHOULD limit the data to printable characters, and receiving implmentations SHOULD check the data for printable characters. An implementation MUST NOT assume the Peer Type field is NULterminated. 9.5. Heartbeat Interval The Heartbeat Interval data item MUST appear in both the Session Initialization (Section 8.3) and Session Initialization Response (Section 8.4) messages to indicate the Heartbeat timeout window to be used by the sender. The Interval is used to specify a period (in seconds) for Heartbeat messages (Section 8.14). By specifying an Interval value of 0, implementations MAY indicate the desire to disable Heartbeat messages entirely (i.e., the Interval is set to an infinite value). However, it is RECOMMENDED that implementations use non-0 timer values. The Heartbeat Interval data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interval | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 2 Ratliff, et al. Expires January 7, 2016 [Page 38] Internet-Draft Dynamic Link Exchange Protocol (DLEP) Interval: 0 = Do not use heartbeats on this DLEP session. = Interval, in seconds, for heartbeat messages. 9.6. July 2015 Non-zero Extensions Supported The Extensions Supported data item MAY be used in both the Session Initialization (Section 8.3) and Session Initialization Response (Section 8.4) messages. The Extensions Supported data item is used by the router and modem to negotiate additional optional functionality they are willing to support. The Extensions List is a concatenation of the types of each supported extension, found in the IANA DLEP Extensions repository. Each Extension Type definition includes which additional signals and data-items are supported. The Extensions Supported data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Extensions List... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: TBD Length: Length of the extensions list in octets. the number of extensions. This is twice (2x) Extension List: A list of extensions supported, identified by their 2-octet value as listed in the extensions registry. 9.7. MAC Address The MAC address data item MUST appear in all destination-oriented messages (i.e., Destination Up (Section 8.9), Destination Up Response (Section 8.10), Destination Down (Section 8.11), Destination Down Response (Section 8.12), Destination Update (Section 8.13), Link Characteristics Request (Section 8.15), and Link Characteristics Response (Section 8.16)). The MAC Address data item contains the address of the destination on the remote node. The MAC address MAY be either a physical or a virtual destination, and MAY be expressed in EUI-48 or EUI-64 format. Examples of a virtual destination would be a multicast MAC address, or the broadcast MAC (FF:FF:FF:FF:FF:FF). Ratliff, et al. Expires January 7, 2016 [Page 39] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | MAC Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : MAC Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : MAC Address : (if EUI-64 used) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: 6 for EUI-48 format, or 8 for EUI-64 format MAC Address: 9.8. TBD MAC Address of the destination. IPv4 Address The IPv4 Address data item MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9) and Destination Update (Section 8.13) messages. When included in Destination messages, this data item contains the IPv4 address of the destination. When included in the Session Update message, this data item contains the IPv4 address of the peer. In either case, the data item also contains an indication of whether this is a new or existing address, or is a deletion of a previously known address. The IPv4 Address data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Add/Drop | IPv4 Address : | Indicator | : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv4 | : Address | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 5 Ratliff, et al. Expires January 7, 2016 [Page 40] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Add/Drop: Value indicating whether this is a new or existing address (1), or a withdrawal of an address (0). Values other than 0 or 1 MUST be considered as invalid. IPv4 Address: 9.9. The IPv4 address of the destination or peer. IPv6 Address The IPv6 Address data item MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9) and Destination Update (Section 8.13) messages. When included in Destination messages, this data item contains the IPv6 address of the destination. When included in the Session Update message, this data item contains the IPv6 address of the peer. In either case, the data item also contains an indication of whether this is a new or existing address, or is a deletion of a previously known address. The IPv6 Address data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Add/Drop | IPv6 Address : | Indicator | : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Address | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 17 Add/Drop: Value indicating whether this is a new or existing address (1), or a withdrawal of an address (0). Values other than 0 or 1 MUST be considered as invalid. IPv6 Address: Ratliff, et al. IPv6 Address of the destination or peer. Expires January 7, 2016 [Page 41] Internet-Draft 9.10. Dynamic Link Exchange Protocol (DLEP) July 2015 IPv4 Attached Subnet The DLEP IPv4 Attached Subnet allows a device to declare that it has an IPv4 subnet (e.g., a stub network) attached, or that it has become aware of an IPv4 subnet being present at a remote destination. The IPv4 Attached Subnet data item MAY appear in the Destination Up (Section 8.9) message. Once an IPv4 Subnet has been declared on a device, the declaration SHALL NOT be withdrawn without withdrawing the destination (via the Destination Down message (Section 8.11)) and re-issuing the Destination Up message. The DLEP IPv4 Attached Subnet data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IPv4 Attached Subnet | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Prefix Len. | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 5 IPv4 Subnet: The IPv4 subnet reachable at the destination. Prefix Length: Length of the prefix (1-32) for the IPv4 subnet. A prefix length outside the speficied range MUST be considered as invalid. 9.11. IPv6 Attached Subnet The DLEP IPv6 Attached Subnet allows a device to declare that it has an IPv6 subnet (e.g., a stub network) attached, or that it has become aware of an IPv6 subnet being present at a remote destination. The IPv6 Attached Subnet data item MAY appear in the Destination Up (Section 8.9) message. As in the case of the IPv4 attached Subnet data item above, once an IPv6 attached subnet has been declared, it SHALL NOT be withdrawn without withdrawing the destination (via the Destination Down message (Section 8.11)) and re-issuing the Destination Up message. The DLEP IPv6 Attached Subnet data item contains the following fields: Ratliff, et al. Expires January 7, 2016 [Page 42] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IPv6 Attached Subnet : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Attached Subnet : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Attached Subnet : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : IPv6 Attached Subnet | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Prefix Len. | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 17 IPv4 Subnet: The IPv6 subnet reachable at the destination. Prefix Length: Length of the prefix (1-128) for the IPv6 subnet. A prefix length outside the specified range MUST be considered as invalid. 9.12. Maximum Data Rate (Receive) The Maximum Data Rate (Receive) (MDRR) data item MUST appear in the Session Initialization Response message (Section 8.4), and MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the maximum theoretical data rate, in bits per second, that can be achieved while receiving data on the link. The Maximum Data Rate (Receive) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | MDRR (bps) : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : MDRR (bps) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Ratliff, et al. Expires January 7, 2016 [Page 43] Internet-Draft Data Item Type: Dynamic Link Exchange Protocol (DLEP) Length: July 2015 TBD 8 Maximum Data Rate (Receive): A 64-bit unsigned integer, representing the maximum theoretical data rate, in bits per second (bps), that can be achieved while receiving on the link. 9.13. Maximum Data Rate (Transmit) The Maximum Data Rate (Transmit) (MDRT) data item MUST appear in the Session Initialization Response message (Section 8.4), and MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the maximum theoretical data rate, in bits per second, that can be achieved while transmitting data on the link. The Maximum Data Rate (Transmit) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | MDRT (bps) : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : MDRT (bps) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 8 Maximum Data Rate (Transmit): A 64-bit unsigned integer, representing the maximum theoretical data rate, in bits per second (bps), that can be achieved while transmitting on the link. 9.14. Current Data Rate (Receive) The Current Data Rate (Receive) (CDRR) data item MUST appear in the Session Initialization Response message (Section 8.4), and MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the rate at which the link is currently operating for receiving traffic. Ratliff, et al. Expires January 7, 2016 [Page 44] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 When used in the Link Characteristics Request message (Section 8.15), CDRR represents the desired receive rate, in bits per second, on the link. The Current Data Rate (Receive) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CDRR (bps) : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : CDRR (bps) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 8 Current Data Rate (Receive): A 64-bit unsigned integer, representing the current data rate, in bits per second, that can currently be achieved while receiving traffic on the link. If there is no distinction between current and maximum receive data rates, current data rate receive MUST be set equal to the maximum data rate receive. 9.15. Current Data Rate (Transmit) The Current Data Rate Transmit (CDRT) data item MUST appear in the Session Initialization Response message (Section 8.4), and MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13), and Link Characteristics Response (Section 8.16) messages to indicate the rate at which the link is currently operating for transmitting traffic. When used in the Link Characteristics Request message (Section 8.15), CDRT represents the desired transmit rate, in bits per second, on the link. The Current Data Rate (Transmit) data item contains the following fields: Ratliff, et al. Expires January 7, 2016 [Page 45] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CDRT (bps) : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : CDRT (bps) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 8 Current Data Rate (Transmit): A 64-bit unsigned integer, representing the current data rate, in bits per second, that can currently be achieved while transmitting traffic on the link. If there is no distinction between current and maximum transmit data rates, current data rate transmit MUST be set equal to the maximum data rate transmit. 9.16. Latency The Latency data item MUST appear in the Session Initialization Response message (Section 8.4), and MAY appear in the Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13), and Link Characteristics Response (Section 8.16) messages to indicate the amount of latency, in microseconds, on the link. When used in the Link Characteristics Request message (Section 8.15), Latency represents the maximum latency desired on the link. The Latency value is reported as delay. The calculation of latency is implementation dependent. For example, the latency may be a running average calculated from the internal queuing. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Latency : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : Latency | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Ratliff, et al. Expires January 7, 2016 [Page 46] Internet-Draft Data Item Type: Dynamic Link Exchange Protocol (DLEP) Length: July 2015 TBD 8 Latency: A 64-bit unsigned integer, representing the transmission delay, in microseconds, that a packet encounters as it is transmitted over the link. 9.17. Resources (Receive) The Resources (Receive) (RESR) data item MAY appear in the Session Initialization Response message (Section 8.4), Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the amount of resources for reception (with 0 meaning ’no resources available’, and 100 meaning ’all resources available’) at the destination. The list of resources that might be considered is beyond the scope of this document, and is left to implementations to decide. The Resources (Receive) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RESR | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 1 Resources (Receive): An 8-bit integer percentage, 0-100, representing the amount of resources allocated to receiving data. Any value greater than 100 MUST be considered as invalid. If a device cannot calculate RESR, this data item SHOULD NOT be issued. 9.18. Resources (Transmit) The Resources (Transmit) (REST) data item MAY appear in the Session Initialization Response message (Section 8.4), Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the amount of resources for transmission (with 0 Ratliff, et al. Expires January 7, 2016 [Page 47] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 meaning ’no resources available’, and 100 meaning ’all resources available’) at the destination. The list of resources that might be considered is beyond the scope of this document, and is left to implementations to decide. The Resources (Transmit) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | REST | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 1 Resources (Transmit): An 8-bit integer percentage, 0-100, representing the amount of resources allocated to transmitting data. Any value greater than 100 MUST be considered as invalid. If a device cannot calculate REST, this data item SHOULD NOT be issued. 9.19. Relative Link Quality (Receive) The Relative Link Quality (Receive) (RLQR) data item MAY appear in the Session Initialization Response message (Section 8.4), Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the quality of the link for receiving data. The Relative Link Quality (Receive) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RLQR | +-+-+-+-+-+-+-+-+ Data Item Type: Ratliff, et al. TBD Expires January 7, 2016 [Page 48] Internet-Draft Length: Dynamic Link Exchange Protocol (DLEP) July 2015 1 Relative Link Quality (Receive): A non-dimensional 8-bit integer, 0-100, representing relative link quality. A value of 100 represents a link of the highest quality. Any value greater than 100 MUST be considered as invalid. If a device cannot calculate the RLQR, this data item SHOULD NOT be issued. 9.20. Relative Link Quality (Transmit) The Relative Link Quality (Transmit) (RLQT) data item MAY appear in the Session Initialization Response message (Section 8.4), Session Update (Section 8.5), Destination Up (Section 8.9), Destination Update (Section 8.13) and Link Characteristics Response (Section 8.16) messages to indicate the quality of the link for transmitting data. The Relative Link Quality (Transmit) data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | RLQT | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 1 Relative Link Quality (Transmit): A non-dimensional 8-bit integer, 0-100, representing relative link quality. A value of 100 represents a link of the highest quality. Any value greater than 100 MUST be considered as invalid. If a device cannot calculate the RLQT, this data item SHOULD NOT be issued. 9.21. Link Characteristics Response Timer The Link Characteristics Response Timer data item MAY appear in the Link Characteristics Request message (Section 8.15) to indicate the desired number of seconds the sender will wait for a response to the Ratliff, et al. Expires January 7, 2016 [Page 49] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 request. If this data item is omitted, implementations supporting the Link Characteristics Request SHOULD choose a default value. The Link Characteristics Response Timer data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Interval | +-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 1 Interval: 0 = Do not use timeouts for this Link Characteristics request. Non-zero = Interval, in seconds, to wait before considering this Link Characteristics Request lost. 10. Credit-Windowing DLEP includes an optional Protocol Extension for a credit-windowing scheme analogous to the one documented in [RFC5578]. In this scheme, data plane traffic flowing between the router and modem is controlled by the availability of credits. Credits are expressed as if two unidirectional windows exist between the modem and router. This document identifies these windows as the ’Modem Receive Window’ (MRW), and the ’Router Receive Window’ (RRW). If the credit-windowing extension is used, credits MUST be granted by the receiver on a given window - that is, on the ’Modem Receive Window’ (MRW), the modem is responsible for granting credits to the router, allowing it (the router) to send data plane traffic to the modem. Likewise, the router is responsible for granting credits on the RRW, which allows the modem to send data plane traffic to the router. Credits are managed on a destination-specific basis; that is, separate credit counts are maintained for each destination requiring the service. Credits do not apply to the DLEP session that exists between routers and modems; they are applied only to the data plane traffic. Credits represent the number of octets, or an increment in the number of octets, that MAY be sent on the given window. When sending data Ratliff, et al. Expires January 7, 2016 [Page 50] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 plane traffic to a credit-enabled peer, the sender MUST decriment the appropriate window by the size of the data being sent. For example, when sending data plane traffic via the modem, the router MUST decriment the ’Modem Receive Window’ (MRW) for the corresponding destination. When the number of available credits to the destination reaches 0, a sender MUST stop sending data plane traffic to the destination, until additional credits are supplied. If a peer is able to support the optional credit-windowing extension then it MUST include an Extensions Supported data item (Section 9.6) including the value 1, from Table 4, in the appropriate Session Initialization (Section 8.3) and Session Initialization Response (Section 8.4) message. 10.1. Credit-Windowing Messages The credit-windowing extension introduces no additional DLEP signals or messages. However, if a peer has advertised during session initialization that it supports the credit-windowing extension then the following DLEP messages MAY contain additional credit-windowing data items: 10.1.1. Destination Up Message The Destination Up message MAY contain one of each of the following data items: o Credit Grant (Section 10.2.1) If the Destination Up message does not contain the Credit Grant data item, credits MUST NOT be used for that destination. 10.1.2. Destination Up Response Message If the corresponding Destination Up message contained the Credit Grant data item, the Destination Up Response message MUST contain one of each of the following data items: o Credit Window Status (Section 10.2.2) 10.1.3. Destination Update Message If the corresponding Destination Up message contained the Credit Grant data item, the Destination Update message MUST contain one of each of the following data items: o Credit Window Status (Section 10.2.2) Ratliff, et al. Expires January 7, 2016 [Page 51] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 If the corresponding Destination Up message contained the Credit Grant data item, the Destination Update message MAY contain one of each of the following data items: o Credit Grant (Section 10.2.1) o Credit Request (Section 10.2.3) 10.2. Credit-Windowing Data Items The credit-windowing extension introduces 3 additional data items. If a peer has advertised during session initialization that it supports the credit-windowing extension then it MUST correctly process the following data items: +------------+------------------------------------------------------+ | Type Code | Description | +------------+------------------------------------------------------+ | 23 | Credit Grant (Section 10.2.1) | | 24 | Credit Window Status (Section 10.2.2) | | 25 | Credit Request (Section 10.2.3) | +------------+------------------------------------------------------+ 10.2.1. Credit Grant The Credit Grant data item is sent from a DLEP participant to grant an increment to credits on a window. The Credit Grant data item MAY appear in the Destination Up (Section 8.9) and Destination Update (Section 8.13) messages. The value in a Credit Grant data item represents an increment to be added to any existing credits available on the window. Upon successful receipt and processing of a Credit Grant data item, the receiver MUST respond with a message containing a Credit Window Status data item to report the updated aggregate values for synchronization purposes, and if initializing a new credit window, granting initial credits. When DLEP peers desire to employ the credit-windowing extension, the peer originating the Destination Up message MUST supply an initial, non-zero value as the credit increment of the receive window it controls (i.e., the Modem Recive Window, or Router Receive Window). When receiving a Credit Grant data item on a Destination Up (#msg_dest_up) message, the receiver MUST take one of the following actions: 1. Reject the use of credits for this destination, via the Destination Up Response message containing a Status data item (Section 9.1) with a status code of ’Request Denied’. (See Table 3), or Ratliff, et al. Expires January 7, 2016 [Page 52] Internet-Draft 2. Dynamic Link Exchange Protocol (DLEP) July 2015 Initialize the appropriate window value of zero, then apply the increment specified in the Credit Grant data item. If the initialization completes successfully, the receiver MUST respond to the Destination Up message with a Destination Up Response message that contains a Credit Window Status data item, initializing its receive window. The Credit Grant data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Credit Increment : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : Credit Increment | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 8 Reserved: A 64-bit unsigned integer representing the additional credits to be assigned to the credit window. Since credits can only be granted by the receiver on a window, the applicable credit window (either the MRW or the RRW) is derived from the sender of the grant. The Credit Increment MUST NOT cause the window to overflow; if this condition occurs, implementations MUST set the credit window to the maximum value contained in a 64-bit quantity. 10.2.2. Credit Window Status If the credit-window extension is supported by the DLEP participants (both the router and the modem), the Credit Window Status data item MUST be sent by the participant receiving a Credit Grant for a given destination. The Credit Window Status data item contains the following fields: Ratliff, et al. Expires January 7, 2016 [Page 53] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Modem Receive Window Value : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : Modem Receive Window Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Router Receive Window Value : +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ : Router Receive Window Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 16 Modem Receive Window Value: A 64-bit unsigned integer, indicating the current number of credits available on the Modem Receive Window, for the destination referred to by the message. Router Receive Window Value: A 64-bit unsigned integer, indicating the current number of credits available on the Router Receive Window, for the destination referred to by the message. 10.2.3. Credit Request The Credit Request data item MAY be sent from either DLEP participant, via the Destination Update message (Section 8.13), to indicate the desire for the partner to grant additional credits in order for data transfer to proceed on the session. If the corresponding Destination Up message (Section 8.9) for this session did not contain a Credit Window Status data item, indicating that credits are to be used on the session, then the Credit Request data item MUST be silently dropped by the receiver. The Credit Request data item contains the following fields: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Item Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Data Item Type: Length: TBD 0 Ratliff, et al. Expires January 7, 2016 [Page 54] Internet-Draft 11. Dynamic Link Exchange Protocol (DLEP) July 2015 Security Considerations The potential security concerns when using DLEP are: 1. DLEP peers may be ’spoofed’ by an attacker, either at DLEP session initialization, or by injection of messages once a session has been established, and/or 2. DLEP data items could be altered by an attacker, causing the receiving peer to inappropriately alter its information base concerning network status. The protocol itself does not contain any mechanisms for security (e.g., authentication or encryption), as it assumes that an appropriate level of authentication and non-repudiation is acheived by use of [TLS] when necessary. This specification does not address security of the data plane, as it (the data plane) is not affected, and standard security procedures can be employed. 12. IANA Considerations This section specifies requests to IANA. 12.1. Registrations This specification defines: o A new repository for DLEP signals and messages, with sixteen (16) values currently assigned. o Reservation of a Private Use numbering space for experimental DLEP signals and messages. o A new repository for DLEP data items, with twenty-four (24) values currently assigned. o Reservation of a Private Use numbering space in the data items repository for experimental data items. o A new repository for DLEP status codes, with eight (8) currently assigned. o Reservation of a Private Use numbering space in the status codes repository for experimental status codes. o A new repository for DLEP extensions, with one (1) value currently assigned. Ratliff, et al. Expires January 7, 2016 [Page 55] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 o Reservation of a Private Use numbering space in the extension repository for experimental extensions. o A request for allocation of a well-known port for DLEP TCP and UDP communication. o A request for allocation of a multicast IP address for DLEP discovery. 12.2. Expert Review: Evaluation Guidelines No additional guidelines for expert review are anticipated. 12.3. Signal/Message Type Registration A new repository must be created with the values of the DLEP signals and messages. All signal and message values are in the range [0..65535], defined in Table 1. 12.4. DLEP Data Item Registrations A new repository for DLEP data items must be created. All data item values are in the range [0..65535], defined in Table 2. 12.5. DLEP Status Code Registrations A new repository for DLEP status codes must be created. All status codes are in the range [0..255], defined in Table 3. 12.6. DLEP Extensions Registrations A new repository for DLEP extensions must be created. All extension values are in the range [0..65535]. allocations are: Ratliff, et al. Expires January 7, 2016 Current [Page 56] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 +-------------+-----------------------------------------------------+ | Code | Description | +-------------+-----------------------------------------------------+ | 0 | Reserved | | 1 | Credit Windowing (Section 10) | | 2-65519 | Reserved for future extensions | | 65520-65534 | Private Use. Available for experiments | | 65535 | Reserved | +-------------+-----------------------------------------------------+ Table 4: DLEP Extension types 12.7. DLEP Well-known Port It is requested that IANA allocate a well-known port number for DLEP communication. 12.8. DLEP Multicast Address It is requested that IANA allocate a multicast address for DLEP discovery signals. 13. Acknowledgements We would like to acknowledge and thank the members of the DLEP design team, who have provided invaluable insight. The members of the design team are: Teco Boot, Bow-Nan Cheng, John Dowdell, and Henning Rogge. We would also like to acknowledge the influence and contributions of Greg Harrison, Chris Olsen, Martin Duke, Subir Das, Jaewon Kang, Vikram Kaul, Nelson Powell and Victoria Mercieca. 14. References 14.1. Normative References [RFC2119] 14.2. Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. Informative References [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, August 2008. [RFC5578] Berry, B., Ratliff, S., Paradise, E., Kaiser, T., and M. Adams, "PPP over Ethernet (PPPoE) Extensions for Credit Flow and Link Metrics", RFC 5578, February 2010. Ratliff, et al. Expires January 7, 2016 [Page 57] Internet-Draft Appendix A. Dynamic Link Exchange Protocol (DLEP) July 2015 Discovery Signal Flows Router Modem Signal Description ======================================================================== | | |-------Peer Discovery---->|| ˜ ˜ ˜ ˜ ˜ ˜ ˜ Router discovery timer expires without receiving Peer Offer. | |-------Peer Discovery---------->| | | | | | |<--------Peer Offer-------------| : : : : Appendix B. B.1. Router initiates discovery, starts a timer, send Peer Discovery signal. Router sends another Peer Discovery signal. Modem receives Peer Discovery signal. Modem sends Peer Offer with Connection Point information. Router MAY cancel discovery timer and stop sending Peer Discovery signals. Peer Level Message Flows Session Initialization Router Modem Signal Description ======================================================================== | | |---------TCP connect----------> | | |----Session Initialization----->| | | | | | |<--Session Initialization Resp.-| | | |<<============================>>| : : Ratliff, et al. Router connects to discovered or pre-configured Modem Connection Point. Router sends Session Initialization message. Modem receives Session Initialization message. Modem sends Session Initialization Response, with Success status data item. Session established. Heartbeats begin. Expires January 7, 2016 [Page 58] Internet-Draft B.2. Dynamic Link Exchange Protocol (DLEP) July 2015 Session Initialization - Refused Router Modem Signal Description ======================================================================== | | |---------TCP connect----------> | | |-----Session Initialization---->| | | | | | | | |<-Session Initialization Resp.--| | | | | ||---------TCP close------------|| B.3. Router connects to discovered or pre-configured Modem Connection Point. Router sends Session Initialization message. Modem receives Session Initialization message, and will not support the advertised extensions. Modem sends Session Initialization Response, with ’Request Denied’ status data item. Router receives negative Session Initialization Response, closes TCP connection. Router Changes IP Addresses Router Modem Signal Description ======================================================================== | |-------Session Update---------->| | | | | |<----Session Update Response----| B.4. Router sends Session Update message to announce change of IP address Modem receives Session Update message and updates internal state. Modem sends Session Update Response. Modem Changes Session-wide Metrics Ratliff, et al. Expires January 7, 2016 [Page 59] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Router Modem Signal Description ======================================================================== | | |<--------Session Update---------| | | | | |----Session Update Response---->| B.5. Modem sends Session Update message to announce change of modem-wide metrics Router receives Session Update message and updates internal state. Router sends Session Update Response. Router Terminates Session Router Modem Signal Description ======================================================================== | |------Session Termination------>| | | |-------TCP shutdown (send)---> | | | | | | | |<---Session Termination Resp.---| | | | ||---------TCP close------------|| B.6. Router sends Session Termination message with Status data item. Router stops sending messages. Modem receives Session Termination, stops counting received heartbeats and stops sending heartbeats. Modem sends Session Termination Response with Status ’Success’. Modem stops sending messages. Session terminated. Modem Terminates Session Ratliff, et al. Expires January 7, 2016 [Page 60] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Router Modem Signal Description ======================================================================== | |<----Session Termination--------| | | | | | | | | |---Session Termination Resp.--->| | | | ||---------TCP close------------|| B.7. Modem sends Session Termination message with Status data item. Modem stops sending messages. Router receives Session Termination, stops counting received heartbeats and stops sending heartbeats. Router sends Session Termination Response with Status ’Success’. Router stops sending messages. Session terminated. Session Heartbeats Ratliff, et al. Expires January 7, 2016 [Page 61] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Router Modem Signal Description ======================================================================== |----------Heartbeat------------>| | | | Router sends heartbeat message Modem resets heartbeats missed counter. ˜ ˜ ˜ ˜ ˜ ˜ ˜ |---------[Any message]--------->| | | | | When the Modem receives any message from the Router. Modem resets heartbeats missed counter. ˜ ˜ ˜ ˜ ˜ ˜ ˜ |<---------Heartbeat-------------| | | | Modem sends heartbeat message Router resets heartbeats missed counter. ˜ ˜ ˜ ˜ ˜ ˜ ˜ |<--------[Any message]----------| | | | | B.8. When the Router receives any message from the Modem. Modem resets heartbeats missed counter. Router Detects a Heartbeat timeout Router Modem Signal Description ======================================================================== ||<----------------------| | ||<----------------------| | | |------Session Termination------>| | | : : Ratliff, et al. Router misses a heartbeat Router misses too many heartbeats Router sends Session Termination message with ’Timeout’ Status data item. Termination proceeds as above. Expires January 7, 2016 [Page 62] Internet-Draft B.9. Dynamic Link Exchange Protocol (DLEP) July 2015 Modem Detects a Heartbeat timeout Router Modem Signal Description ======================================================================== |---------------------->|| Modem misses a heartbeat |---------------------->|| Modem misses too many heartbeats | | | |<-----Session Termination-------| | | : : Appendix C. C.1. Modem sends Session Termination message with ’Timeout’ Status data item. Termination proceeds as above. Destination Specific Signal Flows Common Destination Signaling Router Modem Signal Description ======================================================================== | | |<-------Destination Up----------| | |------Destination Up Resp.----->| Modem detects a new logical destination is reachable, and sends Destination Up message. Router sends Destination Up Response. ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | |<-------Destination Update------| Modem detects change in logical destination metrics, and sends Destination Update message. ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | |<-------Destination Update------| Modem detects change in logical destination metrics, and sends Destination Update message. ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | |<-------Destination Down--------| | | | |------Destination Down Resp.--->| Ratliff, et al. Modem detects logical destination is no longer reachable, and sends Destination Down message. Router receives Destination Down, updates internal state, and sends Destination Down Response message. Expires January 7, 2016 [Page 63] Internet-Draft C.2. Dynamic Link Exchange Protocol (DLEP) July 2015 Multicast Destination Signaling Router Modem Signal Description ======================================================================== | | |--------Destination Up--------->| | | | |<-----Destination Up Resp.------| Router detects a new multicast destination is in use, and sends Destination Up message. Modem updates internal state to monitor multicast destination, and sends Destination Up Response. ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | |<-------Destination Update------| Modem detects change in multicast destination metrics, and sends Destination Update message. ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | |<-------Destination Update------| ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | |--------Destination Down------->| | | | |<-----Destination Down Resp.----| C.3. Modem detects change in multicast destination metrics, and sends Destination Update message. Router detects multicast destination is no longer in use, and sends Destination Down message. Modem receives Destination Down, updates internal state, and sends Destination Down Response message. Link Characteristics Request Ratliff, et al. Expires January 7, 2016 [Page 64] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Router Modem Signal Description ======================================================================== Destination has already been announced by either peer. ˜ ˜ ˜ ˜ ˜ ˜ ˜ | | | |--Link Characteristics Request->| | | | | | |<---Link Characteristics Resp.--| Router requires different Characteristics for the destination, and sends Link Characteristics Request message. Modem attempts to adjust link status to meet the received request, and sends a Link Characteristics Response message with the new values. Authors’ Addresses Stan Ratliff VT iDirect 13861 Sunrise Valley Drive, Suite 300 Herndon, VA 20171 USA Email: [email protected] Bo Berry Shawn Jury Cisco Systems 170 West Tasman Drive San Jose, CA 95134 USA Email: [email protected] Darryl Satterwhite Broadcom Email: [email protected] Ratliff, et al. Expires January 7, 2016 [Page 65] Internet-Draft Dynamic Link Exchange Protocol (DLEP) July 2015 Rick Taylor Airbus Defence & Space Quadrant House Celtic Springs Coedkernew Newport NP10 8FZ UK Email: [email protected] Ratliff, et al. Expires January 7, 2016 [Page 66]
© Copyright 2024