datatracker.ietf.org
Sign in
Version 5.7.4, 2014-11-12
Report a bug

Enhanced Duplicate Address Detection
draft-hsingh-6man-enhanced-dad-04

Document type: Replaced Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2013-05-10 (latest revision 2012-01-05)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Replaced by draft-ietf-6man-enhanced-dad
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found here:
http://www.ietf.org/archive/id/draft-hsingh-6man-enhanced-dad-04.txt

Abstract

Appendix A of the IPv6 Duplicate Address Detection (DAD) document in RFC 4862 discusses Loopback Suppression and DAD. However, RFC 4862 does not settle on one specific automated means to detect loopback of Neighbor Discovery (ND of RFC 4861) messages used by DAD. Several service provider communities have expressed a need for automated detection of looped backed ND messages used by DAD. This document includes mitigation techniques and then outlines the Enhanced DAD algorithm to automate detection of looped back IPv6 ND messages used by DAD. For network loopback tests, the Enhanced DAD algorithm allows IPv6 to self-heal after a loopback is placed and removed. Further, for certain access networks the document automates resolving a specific duplicate address conflict.

Authors

Carlos Pignataro <cpignata@cisco.com>
Eli Dart <dart@es.net>
Hemant Singh <shemant@cisco.com>
Rajiv Asati <rajiva@cisco.com>
Wes Beebee <wbeebee@cisco.com>
Wesley George <wesley.george@twcable.com>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)