IETF MANET Working Group Josh Broch
INTERNET-DRAFT David B. Johnson
David A. Maltz
Carnegie Mellon University
13 March 1998
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks
<draft-ietf-manet-dsr-00.txt>
Status of This Memo
This document is a submission to the Mobile Ad-hoc Networks (manet)
Working Group of the Internet Engineering Task Force (IETF).
Comments should be submitted to the Working Group mailing list at
"manet@itd.nrl.navy.mil". Distribution of this memo is unlimited.
This document is an Internet-Draft. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at
any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
To view the entire list of current Internet-Drafts, please check
the "1id-abstracts.txt" listing contained in the Internet-Drafts
Shadow Directories on ftp.is.co.za (Africa), ftp.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).
Abstract
Dynamic Source Routing (DSR) is a routing protocol designed
specifically for use in mobile ad hoc networks. The protocol allows
nodes to dynamically discover a source route across multiple network
hops to any destination in the ad hoc network. When using source
routing, each packet to be routed carries in its header the complete,
ordered list of nodes through which the packet must pass. A key
advantage of source routing is that intermediate hops do not need
to maintain routing information in order to route the packets they
receive, since the packets themselves already contain all of the
necessary routing information. This, coupled with the dynamic,
on-demand nature of Route Discovery, completely eliminates the need
for periodic router advertisements and link status packets, reducing
the overhead of DSR, especially during periods when the network
topology is stable and these packets serve only as keep-alives.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page i]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Contents
Status of This Memo i
Abstract i
1. Introduction 1
2. Assumptions 1
3. Terminology 2
3.1. General Terms . . . . . . . . . . . . . . . . . . . . . . 2
3.2. Specification Language . . . . . . . . . . . . . . . . . 4
4. Protocol Overview 5
4.1. Route Discovery and Route Maintenance . . . . . . . . . . 5
4.2. Packet Forwarding . . . . . . . . . . . . . . . . . . . . 6
4.3. Conceptual Data Structures . . . . . . . . . . . . . . . 6
4.3.1. Route Cache . . . . . . . . . . . . . . . . . . . 6
4.3.2. Node Information Cache . . . . . . . . . . . . . 8
4.3.3. Send Buffer . . . . . . . . . . . . . . . . . . . 8
4.3.4. Retransmission Buffer . . . . . . . . . . . . . . 8
5. Packet Formats 10
5.1. Destination Options Headers . . . . . . . . . . . . . . . 10
5.1.1. DSR Route Request Option . . . . . . . . . . . . 11
5.1.2. DSR Route Reply Option . . . . . . . . . . . . . 13
5.1.3. DSR Route Error Option . . . . . . . . . . . . . 14
5.1.4. DSR Acknowledgment Option . . . . . . . . . . . . 15
5.2. DSR Routing Header . . . . . . . . . . . . . . . . . . . 17
6. Detailed Operation 19
6.1. Route Discovery . . . . . . . . . . . . . . . . . . . . . 19
6.1.1. Originating a Route Request . . . . . . . . . . . 19
6.1.2. Processing a Route Request Option . . . . . . . . 19
6.1.3. Originating a Route Reply . . . . . . . . . . . . 20
6.1.4. Processing a Route Reply Option . . . . . . . . . 21
6.2. Route Maintenance . . . . . . . . . . . . . . . . . . . . 21
6.2.1. Originating a Route Error . . . . . . . . . . . . 21
6.2.2. Processing a Route Error Option . . . . . . . . . 21
6.2.3. Processing a DSR Acknowledgment Option . . . . . 22
6.3. Processing a Routing Header . . . . . . . . . . . . . . . 22
7. Optimizations 24
7.1. Leveraging the Route Cache . . . . . . . . . . . . . . . 24
7.1.1. Promiscuous Learning of Source Routes . . . . . . 24
Broch, Johnson, and Maltz Expires 13 September 1998 [Page ii]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
7.1.2. Answering Route Requests using the Route Cache . 25
7.2. Route Discovery Using Expanding Ring Search . . . . . . . 25
7.3. Preventing Route Reply Storms . . . . . . . . . . . . . . 26
7.4. Piggybacking on Route Discoveries . . . . . . . . . . . . 27
7.5. Discovering Shorter Routes . . . . . . . . . . . . . . . 27
7.6. Rate Limiting the Route Discovery Process . . . . . . . . 28
7.7. Improved Handling of Route Errors . . . . . . . . . . . . 29
8. Constants 30
9. IANA Considerations 31
10. Security Considerations 32
Location of DSR Functions in the ISO Model 33
Implementation Status 34
Acknowledgments 35
Areas for Refinement 36
References 37
Chair's Address 39
Authors' Addresses 40
Broch, Johnson, and Maltz Expires 13 September 1998 [Page iii]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
1. Introduction
This document describes Dynamic Source Routing (DSR) [6, 7], a
protocol developed by the Monarch Project [8, 14] at Carnegie Mellon
University for routing packets in a mobile ad hoc network [3].
Source routing is a routing technique in which the sender of a packet
determines the complete sequence of nodes through which to forward
the packet; the sender explicitly lists this route in the packet's
header, identifying each forwarding "hop" by the address of the next
node to which to transmit the packet on its way to the destination
host.
DSR offers a number of potential advantages over other routing
protocols for mobile ad hoc networks. First, DSR uses no periodic
routing messages (e.g., no router advertisements and no link-level
neighbor status messages), thereby reducing network bandwidth
overhead, conserving battery power, and avoiding the propagation of
potentially large routing updates throughout the ad hoc network. Our
Dynamic Source Routing protocol is able to adapt quickly to changes
such as host movement, yet requires no routing protocol overhead
during periods in which no such changes occur.
In addition, DSR has been designed to compute correct routes in
the presence of asymmetric (uni-directional) links. In wireless
networks, links may at times operate asymmetrically due to sources
of interference, differing radio or antenna capabilities, or the
intentional use of asymmetric communication technology such as
satellites. Due to the existence of asymmetric links, traditional
link-state or distance vector protocols may compute routes that
do not work. DSR, however, will find a correct route even in the
presence of asymmetric links.
2. Assumptions
We assume that all hosts wishing to communicate with other hosts
within the ad hoc network are willing to participate fully in the
protocols of the network. In particular, each host participating in
the network should also be willing to forward packets for other hosts
in the network.
We refer to the minimum number of hops necessary for a packet to
reach from any host located at one extreme edge of the network to
another host located at the opposite extreme, as the diameter of the
network. We assume that the diameter of an ad hoc network will be
small (e.g., perhaps 5 or 10 hops), but may often be greater than 1.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 1]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Packets may be lost or corrupted in transmission on the wireless
network. A host receiving a corrupted packet can detect the error
and discard the packet.
We assume that hosts can enable a promiscuous receive mode on
their wireless network interface hardware, causing the hardware to
deliver every received packet to the network driver software without
filtering based on link-layer destination address. Although we do
not require this facility, it is for example common in current LAN
hardware for broadcast media including wireless, and some of our
optimizations take advantage of it if available. Use of promiscuous
mode does increase the software overhead on the CPU, but we believe
that wireless network speeds are more the inherent limiting factor to
performance in current and future systems. We believe that portions
of the protocol are also suitable for implementation directly within
a programmable network interface unit to avoid this overhead on the
CPU.
3. Terminology
3.1. General Terms
node
A device that implements IP.
router
A node that forwards IP packets not explicitly addressed to
itself.
host
Any node that is not a router.
link
A communication facility or medium over which nodes can
communicate at the link layer, such as an Ethernet (simple or
bridged). A link is the layer immediately below IP.
interface
A node's attachment to a link.
prefix
A bit string that consists of some number of initial bits of an
address.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 2]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
interface index
An 8-bit quantity which uniquely identifies an interface among
a given node's interfaces.
link-layer address
A link-layer identifier for an interface, such as IEEE 802
addresses on Ethernet links.
packet
An IP header plus payload.
home address
An IP address that is assigned for an extended period of time
to a mobile node. It remains unchanged regardless of where
the node is attached to the Internet [9]. If a node has more
than one home address, it SHOULD select and use a single home
address when participating in the ad hoc network.
source route
A source route from node A to node B is an ordered list of home
addresses, starting with the home address of node A and ending
with the home address of the node B. Between A and B, the
source route includes an ordered list of all the intermediate
hops between A and B, as well as the interface index of the
interface through which the packet should be transmitted to
reach the next hop. Note that the packet formats defined in
Section 5.1 encode the Target Address (node B) separately,
instead of encoding it as the last hop on the source route.
Route Discovery
The method in DSR by which a node A dynamically obtains a
source route to node B that will carry packets through the
network from A to B. Performing a route discovery involves
sending one or more Route Request packets.
Route Maintenance
The process in DSR of monitoring the status of a source route
while in use, so that any link-failures along the source route
can be detected and the broken source route removed from use.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 3]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
3.2. Specification Language
The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [2].
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 4]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
4. Protocol Overview
4.1. Route Discovery and Route Maintenance
A source routing protocol must solve two challenges, which DSR terms
Route Discovery and Route Maintenance. Route Discovery is the
mechanism whereby a node S wishing to send a packet to a destination
D obtains a source route to D.
Route Maintenance is the mechanism whereby S is able to detect, while
using a source route to D, if the network topology has changed such
that it can no longer use its route to D because a hop along the
route no longer works. When Route Maintenance indicates a source
route is broken, S can attempt to use any other route it happens to
know to D, or can invoke Route Discovery again to find a new route.
To perform Route Discovery, the source node S broadcasts a Route
Request packet with a recorded source route listing only itself.
Each node that hears the Route Request forwards the Request if
appropriate, adding its own address to the recorded source route in
this copy of the Request and rebroadcasts the packet. The forwarding
of Requests is constructed so that copies of the Request propagate
hop-by-hop outward from the node initiating the Route Discovery,
until either the target of the Request is found or until another node
is found that can supply a route to the target.
The basic mechanism of forwarding Route Requests forwards the Request
if the node (1) is not the target of the Request and (2) is not
already listed in the recorded source route in this copy of the
Request. In addition, however, each node maintains an LRU cache of
recently received Route Requests and does not propagate any copies
of a Request after the first, avoiding the overhead of forwarding
additional copies that reach this node along different paths. Also,
the Time-to-Live field in the IP header of the packet carrying the
Route Request MAY be used to limit the scope over which the Request
will propagate, using the normal behavior of Time-to-Live defined by
IP [12, 1]. Additional optimizations on the handling and forwarding
of Route Requests are also used to further reduce the Route Discovery
overhead. When the target of the Request (e.g., node D) receives the
Route Request, it copies the recorded source route into a Route Reply
packet which it then sends this Reply back to the initiator of the
Route Request (e.g., node S).
All source routes learned by a node are kept in a Route Cache, which
is used to further reduce the cost of Route Discovery. When a node
wishes to send a packet, it examines its own Route Cache and performs
Route Discovery only if no suitable source route is found in its
Cache.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 5]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Further, when a node B receives a Route Request from S for another
node D, B searches its own Route Cache for a route to D. If B finds
such a route, it does not propagate the Route Request, but instead
returns a Route Reply to node S based on the concatenation of the
recorded source route from S to B in the Route Request and the cached
route from B to D. The details of replying from a Route Cache in this
way are discussed in Section 7.1.
As a node overhears routes being used by others, either by
promiscuously snooping on them or when forwarding packets, the node
MAY insert those routes into its Route Cache, leveraging the Route
Discovery operations of the other nodes.
4.2. Packet Forwarding
To represent a source route within a packet's header, DSR uses a
Routing Header that conforms to the Routing Header format specified
for IPv6, adapted to the needs of DSR and to the use of the DSR in
IPv4 (or in IPv6 in the future). The DSR Routing Header uses a
unique Routing Type field value to distinguish it from the existing
Type 0 Routing Header defined within IPv6 [4].
To forward a packet, a receiving node N simply processes the Routing
Header as specified in the IPv6 [4] and transmits the packet to
the next hop. If a forwarding error occurs along the link to
the next hop in the route, this node N sends a Route Error back
to the originator S of the packet informing S that this link is
"broken". If node N's Route Cache contains a different route to the
destination, then the packet is retransmitted using the new source
route. Each node overhearing or forwarding a Route Error packet also
removes from its Route Cache the link indicated to be broken, thereby
cleaning the stale cache data from the network.
4.3. Conceptual Data Structures
All information a node needs for participation in an ad hoc
network using the Dynamic Source Routing Protocol can be organized
conceptually into four data structures: a Route Cache, a Node
Information Cache, a Send Buffer, and a Retransmission Buffer. These
data structures MAY be implemented in any manner consistent with the
external behavior described in this document.
4.3.1. Route Cache
All routing information needed by a node participating in an ad hoc
network is stored in a Route Cache. Each node in the network
maintains its own Route Cache. The node adds information to the
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 6]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
cache as it learns of new links between nodes in the ad hoc network,
for example through packets carrying either a Route Reply or a
Routing Header. Likewise, the node removes information from the
cache as it learns existing links in the ad hoc network have broken,
for example through packets carrying a Route Error or through the
link-layer retransmission mechanism reporting a failure in forwarding
a packet to its next-hop destination. The Route Cache is indexed
logically by destination node, and supports the following operations:
void Insert(Route RT)
Information extracted from source route RT is inserted into the
Route Cache.
Route Get(Node DEST)
A source route from this node to DEST (if it exists) is
returned.
void Delete(Node FROM, Node TO)
Any routes in the cache that assume the existence of a
unidirectional link from node FROM to node TO are removed from
the cache.
Each implementation MAY choose the cache replacement and cache search
strategies most appropriate for its particular network environment.
For example, some environments may choose to return the shortest
route to a node (the shortest sequence of hops), while others may
select an alternate metric for the Get() operation.
The Route Cache SHOULD support storing more than one source route for
each destination.
If node S is using a source route to destination D that includes
intermediate node I, S SHOULD shorten the route to destination D when
it learns of a shorter route to node I. A node S using a source route
to destination D through node I, MAY shorten the source route if it
learns of a shorter path from node I to node D.
The Route Cache replacement policy SHOULD allow routes to be
categorized based upon "preference", where routes with a higher
preferences are less likely to be removed from the cache. For
example, a node could prefer routes for which it initiated a Route
Discovery over routes that it learned as the result of promiscuous
snooping. In particular, a node SHOULD prefer routes that it is
presently using over those that it is not.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 7]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
The Route Cache SHOULD time-stamp each route as it is inserted into
the cache. If the route is not used within ROUTE_CACHE_TIMEOUT
seconds, it SHOULD be removed from the cache.
4.3.2. Node Information Cache
The Node Information Cache is a collection of records indexed by home
address. A record maintained on node N1 for node N2 contains the
following:
- The time that N1 last began a Route Discovery for N2.
- The interval of time that N1 must wait before the next attempt at
a Route Discovery for N2.
- The Time-to-live (TTL) field in the IP header of last Route
Request transmitted by N1 for N2.
- A FIFO cache of the last ID_FIFO_SIZE Identification values
observed in Route Request packets initiated by N2.
Nodes SHOULD use an LRU policy to manage the entries of the Node
Information Cache.
4.3.3. Send Buffer
The Send Buffer is a queue of packets that cannot be transmitted
because the transmitting node does not yet have a source route
to the packets' destinations. Each packet in the Send Buffer is
stamped with the time that it is placed into the Buffer, and SHOULD
be removed from the Send Buffer and discarded SEND_BUFFER_TIMEOUT
seconds after initially being placed in the Buffer. If necessary, a
FIFO strategy SHOULD be used to evict packets before they timeout to
prevent the buffer from overflowing.
Subject to the rate limiting defined in Section 6.1, a Route
Discovery SHOULD be initiated as often as possible for any packets
residing in the Send Buffer.
4.3.4. Retransmission Buffer
The Retransmission Buffer is a queue of packets that are awaiting the
receipt of an explicit acknowledgment from the next hop in the source
route (Section 5.2).
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 8]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
For each packet in the Retransmission Buffer, a node maintains (1) a
count of the number of retransmissions and (2) the time of the last
retransmission.
Packets are removed from the buffer when an acknowledgment
is received, or when the number of retransmissions exceeds
MAX_EXPLICIT_REXMIT. In the later case, the removal of the packet
from the Retransmission Buffer should result in a Route Error being
returned to the initial source of the packet (Section 6.2).
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 9]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
5. Packet Formats
5.1. Destination Options Headers
Dynamic Source Routing makes use of four options carrying control
information that can be piggybacked in any existing IP packet.
The mechanism used for these options is based on the design of
the Destination Option mechanism in IPv6 [4]. This notion of
a Destination Option must be build in to a IPv4 protocol stack.
Specifically, the Protocol field in the IP header should be used to
indicate that a Destination Options header exists between the IP
header and the remaining portion of a packet's payload (such as a
transport layer header). The Next Header field in the Destination
Options header will then indicate the type of header that follows it
in a packet.
The Destination Options header is used to carry optional information
that need be examined only by a packet's destination node(s). The
Destination Options header is identified by a Next Header value of 60
in the immediately preceding header, and has the following format:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
| |
. .
. Options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The following destination options are used by the Dynamic Source
Routing protocol:
- DSR Route Request option (Section 5.1.1)
- DSR Route Reply option (Section 5.1.2)
- DSR Route Error option (Section 5.1.3)
- DSR Acknowledgement option (Section 5.1.4)
All of these destination options MAY appear multiple times within a
single Destination Options header.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 10]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
5.1.1. DSR Route Request Option
The DSR Route Request destination option is encoded in
type-length-value (TLV) format as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length | Identification |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Target Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Index[1] | Index[2] | Index[3] | Index[4] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[1] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[2] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[3] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[4] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Index[5] | Index[6] | Index[7] | Index[8] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
IP fields:
Source Address
MUST be the home address of the node transmitting this packet.
Destination Address
MUST be the limited broadcast address (255.255.255.255).
Hop Limit (TTL)
Can be varied from 1 to 255, for example to implement
expanding-ring searches.
Route Request fields:
Option Type
???. A node that does not understand this option MUST discard
the packet (the top two bits must be 01).
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 11]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Option Length
8-bit unsigned integer. Length of the option, in octets,
excluding the Option Type and Option Length fields.
Identification
A unique value generated by the initiator (original sender)
of the Route Request. This value allows a recipient to
determine whether or not it has recently seen this a copy of
this Request; if it has, the packet is simply discarded. When
propagating a Route Request, this field MUST be copied from the
received copy of the Request being forwarded.
Target Address
The home address of the node that is the target of the Route
Request.
Index[1..n]
Index[i] is the interface index of the ith hop recorded in in
the Route Request option (in Address[i]).
Address[1..n]
Address[i] is the home address of the ith hop recorded in the
Route Request option.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 12]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
5.1.2. DSR Route Reply Option
The DSR Route Reply destination option is encoded in
type-length-value (TLV) format as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length |R|F| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Target Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Index[1] | Index[2] | Index[3] | Index[4] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[1] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[2] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[3] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[4] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Index[5] | Index[6] | Index[7] | Index[8] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type
???. A node that does not understand this option should ignore
this option and continue processing the packet (the top two
bits should be 00).
Option Length
8-bit unsigned integer. Length of the option, in octets,
excluding the Option Type and Option Length fields.
Router (R)
If the Router (R) bit is set, the last address recorded in this
header is the home address of a router that believes it can
reach the Target Address specified in the Route Request packet.
Foreign Agent (F)
If the Foreign Agent (F) bit is set, the last address recorded
in this header is the home address of an IETF Mobile IP [9]
Foreign Agent. The Router (R) bit and the Foreign Agent (F)
bit are mutually exclusive as (F) implies (R).
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 13]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Reserved
Sent as 0; ignored on reception.
Target Address
The home address of the node that is the ultimate destination
of the source route contained in the Route Reply.
Index[1..n]
Index[i] is the interface index of the ith hop listed in the
Route Reply option (in Address[i]).
Address[1..n]
Address[i] is the home address of the ith hop listed in the
Route Reply option.
5.1.3. DSR Route Error Option
The DSR Route Error destination option is encoded in
type-length-value (TLV) format as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length | Index |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Originator Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| From Hop Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Hop Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type
???. A node that does not understand this option should ignore
the option and continue processing the packet (the top two bits
must be 00).
Option Length
8-bit unsigned integer. Length of the option, in octets,
excluding the Option Type and Option Length fields.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 14]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Index
The interface index of the network interface over which the
link from the From Hop Address node to the Next Hop Node is
being reported as broken by this Route Error option. This
Index refers to an interface on the From Hop Address node.
Originating Address
The home address of the node which originated the packet that
could not be forwarded.
From Hop Address
The home address of the node that attempted to forward a packet
and discovered the link failure.
Next Hop Address
The home address of the node that was found to be unreachable
(the next hop neighbor to which the node at Originating Address
was attempting to transmit the packet).
5.1.4. DSR Acknowledgment Option
The DSR Acknowledgment destination option is encoded in
type-length-value (TLV) format as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length | Identification |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[1] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type
???. A node that does not understand this option should ignore
the option and continue processing the packet (the top two bits
must be 00).
Option Length
8-bit unsigned integer. Length of the option, in octets,
excluding the Option Type and Option Length fields.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 15]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Identification
A unique value assigned by the originator of the packet.
This value is used to match explicit acknowledgments to the
corresponding packet.
Address[1]
The home address of the original source of the IP packet.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 16]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
5.2. DSR Routing Header
As specified for IPv6 [4], a Routing header is used by a source to
list one or more intermediate nodes to be "visited" on the way to
a packet's destination. This function is similar to IPv4's Loose
Source and Record Route option, but the Routing header does not
record the route taken as the packet is forwarded. The specific
processing steps required to implement the Routing header must be
added to an IPv4 protocol stack. The Routing header is identified by
a Next Header value of 43 in the immediately preceding header, and
has the following format:
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Header | Hdr Ext Len | Routing Type | Segments Left |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. type-specific data .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The type specific data for a Routing Header carrying a DSR Source
Route is:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|R| Reserved | Identification |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Index[1] | Index[2] | Index[3] | Index[4] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[1] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[2] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[3] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address[4] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Index[5] | Index[6] | Index[7] | Index[8] |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ... |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 17]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Routing Header Fields:
Next Header
8-bit selector. Identifies the type of header immediately
following the Routing Request header.
Hdr Ext Len
8-bit unsigned integer. Length of the Routing header in
8-octet units, not including the first 8 octets.
Routing Type
???
Segments Left
Number of route segments remaining, i.e., number of explicitly
listed intermediate nodes still to be visited before reaching
the final destination.
Type Specific Fields:
Acknowledgment Request (R)
The Acknowledgment Request (R) bit is set to request an
explicit acknowledgment from the next hop.
Reserved
Sent as 0; ignored on reception.
Identification
A unique value assigned by the originator of the packet. This
value is used to match acknowledgments (passive or explicit) to
the appropriate packet.
Index[1..n]
Index[i] is the interface index of the ith hop in the Routing
header.
Address[1..n]
Address[i] is the home address of the ith hop in the Routing
header.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 18]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
6. Detailed Operation
6.1. Route Discovery
Route Discovery is the demand-driven process by which nodes actively
obtain source routes to destinations to which they are actively
attempting to send packets. The destination node for which a Route
Discovery is initiated to discover a route is known as the "target"
of the Route Discovery. A Route Discovery for a destination SHOULD
NOT be initiated unless the initiating node has an unexpired packet
to be delivered to that destination.
A Route Discovery for a given target node MUST NOT be initiated
unless the difference between the current time and the time that a
Route Discovery was last initiated for destination D is greater than
the backoff interval currently listed in the Node Information Cache
for node D. After each Route Discovery attempt, the interval between
successive Route Discoverys must be doubled, up to a maximum of
MAX_RTDISCOV_INTERVAL.
The basic Route Discovery algorithm is to originate a single
Route Request packet as described below that targets the desired
destination and has a maximum hop limit set to MAX_ROUTE_LEN.
6.1.1. Originating a Route Request
A node originates a Route Request for a particular host when it has
no route to that host. The Option Length field in the Route Request
option MUST be set to 6, the Identification field MUST be set to a
unique number, and the Target Address field MUST contain the Home
Address of the node for which a route is being requested.
6.1.2. Processing a Route Request Option
Let P1 be the received packet containing a Route Request option.
Let P2 be a packet containing a corresponding Route Reply. A Route
Request option is processed as follows:
1. Determine the originator of the Route Request.
If no addresses are presently listed in P1.REQUEST.Address[],
then P1.Source_Address identifies the originator of the Route
Request. Otherwise, P1.REQUEST.Address[1] identifies the
originator of the Route Request.
2. If the combination (Originator Address, P1.REQUEST.Identification)
is in the node's cache of recently seen (Address, Identification)
pairs, then discard the packet. DONE.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 19]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
3. If the home address of this node is already listed in
P1.REQUEST.Address[], then discard the packet. DONE.
4. If P1.REQUEST.Target_Address matches the home address of
this node, then this packet contains a complete source route
describing the path from the initiator of the Route Request to
this node.
(a) Send a Route Reply as described in Section 6.1.3.
(b) If P1.REQUEST.Next_Header indicates No Next Header, DONE.
(c) Otherwise, swap P1.REQUEST.Target_Address and
P1.Source_Address and pass the packet up the protocol
stack. DONE.
5. Set P1.REQUEST.Address[n+1] = home address of this node.
Re-broadcast the Route Request packet jittered by T milliseconds,
where T is a uniformly distributed, random number between 0 and
BROADCAST_JITTER. DONE.
6.1.3. Originating a Route Reply
Let P1 be the received packet containing a Route Request option. Let
P2 be a packet containing a corresponding Route Reply. A Route Reply
is transmitted in response to a Route Request as follows:
1. If P1.REQUEST.Address[] does not contain any hops, then this node
is only a single hop from the originator of the Route Request.
Build a Route Replay packet as follows:
P2.Destination_Address = P1.Source_Address
P2.Source_Address = P1.REQUEST.Target_Address
GOTO 3.
2. Otherwise, build a Route Reply packet as follows:
P2.Destination_Address = P1.REQUEST.Address[1]
P2.Source_Address = P1.REQUEST.Target_Address
P2.REPLY.Address[1..n] = P1.REQUEST.Address[1..n]
3. Transmit the Route Reply jittered by T milliseconds, where
T is a uniformly distributed, random number between 0 and
BROADCAST_JITTER. DONE.
If sending a Route Reply packet to the originator of the Route
Request requires performing a Route Discovery, the Route Reply
destination option MUST be piggybacked on the packet that contains
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 20]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
the Route Request. This prevents a loop wherein the target of the
Route Request (which was itself the originator of the original Route
Request) must do another Route Request in order to return its Route
Reply.
If sending the Route Reply to the originator of the Route Request
does not require performing Route Discovery, nodes SHOULD send a
unicast Route Reply in response to every Route Request targeted at
them.
6.1.4. Processing a Route Reply Option
Upon receipt of a Route Reply, a node should extract the source route
(Address[1..n] + Target Address) and insert this route into its Route
Cache. Any packets in the Send Buffer that are addressed to Target
Address SHOULD be processed.
6.2. Route Maintenance
6.2.1. Originating a Route Error
If while forwarding a packet with a Routing Header, the next hop
specified in the source route is found to be unreachable, a Route
Error packet (Section 5.1.3) MUST be returned to the originator
(Address[1]) of the packet.
The forwarding node SHOULD consider the next hop to be unreachable if
any of the following conditions occurs:
- The failure to receive a passive acknowledgment when such passive
acknowledgments had been received previously.
- The failure to receive an explicitly requested acknowledgment
after MAX_EXPLICIT_REXMIT retransmissions.
- In link layers providing retransmissions and acknowledgments
(e.g., 802.11), a signal from the link layer that it is unable to
deliver the packet.
6.2.2. Processing a Route Error Option
Upon receipt of a Route Error via any mechanism, a node SHOULD remove
any route from its Route Cache that uses the hop (From Hop Address,
Next Hop Address).
When the Route Error is returned to the Originator Address, the
originator must verify that the source route in the Route Error
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 21]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
packet (From Hop Address...Originator Address) includes the same
hops as the working prefix of the original packet's source route
(Originator Address...From Hop Address). If any hop listed in the
working prefix is not included in the Route Error's source route,
then the originator must transmit the Route Error back along the
working prefix (Originator Address...From Hop Address) so that each
node along the working prefix will remove the invalid route from its
Route Cache.
If the node processing a Route Error option discovers its home
address equals the Router Error's Originator Address and the packet
contains an additional nested Route Error, the node MUST perform the
following steps:
1. Remove the Route Error being processed from the packet.
2. Copy the Originator Address from the next nested Route Error to
the IP destination field of the packet.
3. Attach a source route and send the packet to the IP destination,
performing Route Discovery if needed.
6.2.3. Processing a DSR Acknowledgment Option
Upon receipt of a DSR Acknowledgment, a node should remove any packet
in its Retransmission Buffer matching the (Address, Identification)
pair found in the Acknowledgment option. If no match is found, the
Acknowledgment should be silently discarded.
[I'm supposed to say something intelligent here, but I can't remember
what... -josh]
6.3. Processing a Routing Header
A DSR Routing Header should be processed in accordance with the steps
outlined for Routing Headers in [4]. The Routing Header is only
processed by the node whose address appears as the IP destination
of the packet. A few additional rules apply to processing the type
specific data of a DSR Source Route:
1. The interface used to transmit the packet MUST be the interface
denoted by Index[n] where Address[n] is the home address of this
node.
2. If the Acknowledgment Request (R) bit is set, the node MUST
create and transmit a packet containing the DSR Acknowledgment
option to the IP Source of the packet, performing Route Discovery
if necessary.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 22]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
3. If the node chooses to set the Acknowledgment Request (R) bit in
the packet when it forwards it, it must first make a copy of the
packet and insert this copy into its Retransmission Buffer.
4. If a node finds the next hop in the Routing Header to be
unreachable, it MUST send a Route Error packet to the originator
of the packet, denoted by ROUTING.Address[1].
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 23]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
7. Optimizations
A number of optimizations can be added to the basic operation of
Route Discovery and route maintenance as described in Section 4.1
that can reduce the number of overhead packets and improve the
average efficiency of the routes used on data packets. This section
discusses some of those optimizations.
7.1. Leveraging the Route Cache
The data in a node's Route Cache may be stored in any format, but
the active routes in its cache form a tree of routes, rooted at
this node, to other nodes in the ad hoc network. For example, the
illustration below shows an ad hoc network of six mobile nodes, in
which mobile node A has earlier completed a Route Discovery for
mobile node D and has cached a route to D through B and C:
B->C->D
+---+ +---+ +---+ +---+
| A |---->| B |---->| C |---->| D |
+---+ +---+ +---+ +---+
+---+
| F | +---+
+---+ | E |
+---+
Since nodes B and C are on the route to D, node A also learns the
route to both of these nodes from its Route Discovery for D. If A
later performs a Route Discovery and learns the route to E through B
and C, it can represent this in its Route Cache with the addition of
the single new hop from C to E. If A then learns it can reach C in a
single hop (without needing to go through B), A SHOULD use this new
route to C to also shorten the routes to D and E in its Route Cache.
7.1.1. Promiscuous Learning of Source Routes
A node can add entries to its Route Cache any time it learns a
new route. In particular, when a node forwards a data packet as
an intermediate hop on the route in that packet, the forwarding
node is able to observe the entire route in the packet. Thus, for
example, when node B forwards packets from A to D, B SHOULD add the
route information from that packet to its own Route Cache. If a
node forwards a Route Reply packet, it SHOULD also add the route
information from the route record being returned in the Route Reply,
to its own Route Cache.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 24]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Finally, since all wireless network transmissions are inherently
broadcast, a node MAY configure its network interface into
promiscuous receive mode, and add to its Route Cache the route
information from any packet it can overhear.
7.1.2. Answering Route Requests using the Route Cache
A node SHOULD use its Route Cache to avoid propagating a Route
Request packet received from another node. In particular, suppose a
node receives a Route Request packet for which it is not the target
and which it does not discard on based on the logic of section 6.1.1.
If the node has a Route Cache entry for the target of the request,
it may append this cached route to the accumulated route record
in the packet, and may return this route in a Route Reply packet
to the initiator without propagating (re-broadcasting) the Route
Request. Thus, for example, if node F in the example network shown
in Section 7.1 needs to send a packet to node D, it will initiate
a Route Discovery and broadcast a Route Request packet. If this
broadcast is received by A, A can simply return a Route Reply packet
to F containing the complete route to D consisting of the sequence of
hops A, B, C, and D.
Before transmitting a Route Reply packet that was generated using
information from its Route Cache, a node MUST verify that:
1. The resulting route does not contain any loops.
2. The node issuing the Route Reply is listed in the route that it
is replying with. This increases the probability that the route
is valid, since the node in question should have received a Route
Error if this route stopped working.
7.2. Route Discovery Using Expanding Ring Search
The propagating nature of a basic Route Request packet means that
potentially every node in the ad hoc network will be disturbed
whenever one is originated. To reduce this network-wide cost, all
nodes SHOULD limit the maximum propagation of their Route Requests in
some way, and MAY use the following algorithm.
1. Whenever the backoff algorithm permits the initiation of a Route
Discovery, initially send a Route Request with a hop limit of one
(we refer to this as a non-propagating Route Request).
2. If no Route Reply is received from the non-propagating Route
Request after RING0_TIMEOUT seconds, send a new Route Request
with the hop limit set to MAX_ROUTE_LEN.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 25]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
A single attempt at Route Discovery for destination node D may
therefore involve sending two Route Request packets. Nodes MUST
not backoff between the sending a Route Request with a hop limit of
one and the subsequent sending of Route Request with a hop limit of
MAX_ROUTE_LEN. This procedure uses the hop limit on the Route Request
packet to inexpensively check if the target is currently within
wireless transmitter range of the initiator, or if another node
within range has a Route Cache entry for this target (effectively
using the caches of this node's neighbors as an extension of its own
cache). Since the initial request is limited to one network hop, the
timeout period before sending the propagating request can be quite
small.
7.3. Preventing Route Reply Storms
The ability for nodes to reply to a Route Request not targeted at
them using their Route Caches can result in a Route Reply storm. If
a node broadcasts a Route Request for a node that its neighbors have
in their Route Caches, each neighbor may attempt to send a Route
Reply thereby wasting bandwidth and increasing the rate of collisions
in the area. For example, in the network shown in Section 7.1, if
both A and B receive F's Route Request, they will both attempt to
reply from their Route Caches. Both will send their replies at
about the same time since they receive the broadcast at about the
same time. Particularly when more than the two mobile nodes in this
example are involved, these simultaneous replies from the mobile
nodes receiving the broadcast may create packet collisions among
some or all of these replies and may cause local congestion in the
wireless network. In addition, it will often be the case that the
different replies will indicate routes of different lengths. For
example, A's reply will indicate a route to D that is one hop longer
than that in B's reply.
For interfaces which can promiscuously listen to the channel, mobile
nodes SHOULD use the following algorithm to reduce the number of
simultaneous replies by slightly delaying their Route Reply:
1. Pick a delay period
d = H * (h - 1 + r)
where h is the length in number of network hops for the route to
be returned in this node's reply, r is a random number between 0
and 1, and H is a small constant delay to be introduced per hop.
2. Delay transmitting the Route Reply from this node for a period
of d.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 26]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
3. Within the delay period, promiscuously receive all packets at
this node. If a packet is received by this node during the delay
period that is addressed to the target of this Route Discovery
(the target is the final destination address for the packet,
through any sequence of intermediate hops), and if the length of
the route on this packet is less than h, then cancel the delay
and do not transmit the Route Reply from this node; this node
may infer that the initiator of this Route Discovery has already
received a Route Reply, giving an equal or better route.
7.4. Piggybacking on Route Discoveries
As described in Section 4.1, when one node needs to send a packet
to another, if the sender does not have a Route Cached to the
destination node, it must initiate a Route Discovery, either
buffering the original packet until the Route Reply is returned, or
discarding it and relying on a higher-layer protocol to retransmit
it if needed. The delay for Route Discovery and the total number
of packets transmitted can be reduced by allowing data to be
piggybacked on Route Request packets. Since some Route Requests may
be propagated widely within the ad hoc network, though, the amount
of data piggybacked must be limited. We currently use piggybacking
when sending a Route Reply or a Route Error packet, since both are
naturally small in size, and small data packets such as the initial
SYN packet opening a TCP connection [13] could easily be piggybacked.
One problem, however, arises when piggybacking on Route Request
packets. If a Route Request is received by a node that replies
to the request based on its Route Cache without propagating the
request (Section 7.1), the piggybacked data will be lost if the node
simply discards the Route Request. In this case, before discarding
the packet, the node must construct a new packet containing the
piggybacked data from the Route Request packet. The source route
in this packet MUST be constructed to appear as if the new packet
had been sent by the initiator of the Route Discovery and had been
forwarded normally to this node. Hence, the first portion of the
route is taken from the accumulated route record in the Route Request
packet and the remainder of the route is taken from this node's Route
Cache. The sender address in the packet should also be set to the
initiator of the Route Discovery. Since the replying node will be
unable to correctly recompute an Authentication header for the split
off piggybacked data, data covered by an Authentication header SHOULD
NOT be piggybacked on Route Request packets.
7.5. Discovering Shorter Routes
Once a route between a packet source and a destination has been
discovered, the basic DSR protocol MAY continue to use that route for
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 27]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
all traffic from the source to the destination, even if the nodes
move such that a shorter route becomes possible. In many cases, the
basic route maintenance procedure will discover the shorter route,
since if a node moves enough to create a shorter route, it will
likely also move out of transmission range of at least one hop on the
existing route.
When operating in promiscuous receive mode, a node SHOULD use the
following algorithm to process a received packet. Whenever possible,
this algorithm shortens routes that already exist in the Route Cache.
1. If the packet is not a data packet containing a Routing Header,
drop the packet. DONE.
2. If the IP destination is the home address of this node, then
follow the normal steps to process the packet. DONE.
3. If the home address of this node does not appear in the portion
of the source route that has not yet been processed (indicated by
Segments Left), then drop the packet. DONE.
4. The node S indicated by the Source Address field in the IP header
can communicated directly with this node N. Create a Route Reply.
The Route Reply MUST list the entire source routing contained in
the received packet with the exception of the intermediate nodes
between node S and node N.
7.6. Rate Limiting the Route Discovery Process
One common error condition that must be handled in an ad hoc network
is the case in which the network effectively becomes partitioned.
That is, two nodes that wish to communicate are not within
transmission range of each other, and there are not enough other
mobile nodes between them to form a sequence of hops through which
they can forward packets. If a new Route Discovery was initiated
for each packet sent by a node in this situation, a large number of
unproductive Route Request packets would be propagated throughout the
subset of the ad hoc network reachable from this node. In order to
reduce the overhead from such route discoveries, we use exponential
backoff to limit the rate at which new route discoveries may be
initiated from any node for the same target. If the node attempts to
send additional data packets to this same node more frequently than
this limit, the subsequent packets SHOULD be buffered in the Send
Buffer until a Route Reply is received, but it MUST NOT initiate a
new Route Discovery until the minimum allowable interval between new
route discoveries for this target has been reached. This limitation
on the maximum rate of route discoveries for the same target is
similar to the mechanism required by Internet nodes to limit the rate
at which ARP requests are sent to any single IP address [1].
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 28]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
7.7. Improved Handling of Route Errors
All nodes SHOULD process all of the Route Error messages they
receive, regardless of whether the node is the destination of
the Route Error, is forwarding the Route Error, or promiscuously
overhears the Route Error.
Since a Route Error packet names both ends of the hop that is no
longer valid, any of the nodes receiving the error packet may update
their Route Caches to reflect the fact that the two nodes indicated
in the packet can no longer directly communicate. A node receiving
a Route Error packet simply searches its Route Cache for any routes
using this hop. For each such route found, the route is truncated at
this hop. All nodes on the route before this hop are still reachable
on this route, but subsequent nodes are not.
An experimental optimization to improve the handling of errors is
to support the caching of "negative" information in a node's Route
Cache. The goal of negative information is to record that a given
route was tried and found not to work, so that if the same route
is discovered again shortly after the failure, the Route Cache can
ignore or downgrade the metric of the failed route.
We have not currently included this caching of negative information
in our simulations, since it appears to be unnecessary if nodes also
promiscuously receive Route Error packets.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 29]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
8. Constants
BROADCAST_JITTER 10 milliseconds
ID_FIFO_SIZE 8 identifiers
INVALID_INTERFACE_INDEX 0xFF
MAX_EXPLICIT_REXMIT 3 attempts
MAX_RTDISCOV_INTERVAL 120 seconds
MAX_ROUTE_LEN 15 nodes
RING0_TIMEOUT 30 milliseconds
ROUTE_CACHE_TIMEOUT 300 seconds
SEND_BUFFER_TIMEOUT 30 seconds
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 30]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
9. IANA Considerations
This document defines four new types of IPv6 destination option, each
of which must be assigned an Option Type value:
- The DSR Route Request option, described in Section 5.1.1
- The DSR Route Reply option, described in Section 5.1.2
- The DSR Route Error option, described in Section 5.1.3
- The DSR Acknowledgment option, described in Section 5.1.4
DSR also requires a routing header Routing Type be allocated for the
DSR Source Route defined in section 5.2.
In IPv4, we require two new protocol numbers be issued to identify
the next header as either an IPv6-style destination option, or an
IPv6-style routing header. Other protocols can make use of these
protocol numbers as nodes that support them will processes any
included destination options or routing headers according to the
normal IPv6 semantics.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 31]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
10. Security Considerations
This document does not specifically address security concerns. This
document does assume that all nodes participating in the DSR protocol
do so in good faith and with out malicious intent to corrupt the
routing ability of the network. In mission-oriented environments
where all the nodes participating in the DSR protocol share a
common goal that motivates their participation in the protocol, the
communications between the nodes can be encrypted at the physical
channel or link layer to prevent attack by outsiders.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 32]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Location of DSR Functions in the ISO Model
When designing DSR, we had to determine at what level within the
protocol hierarchy to implement source routing. We considered two
different options: routing at the link layer (ISO layer 2) and
routing at the network layer (ISO layer 3). Originally, we opted to
route at the link layer for the following reasons:
- Pragmatically, running the DSR protocol at the link layer
maximizes the number of mobile nodes that can participate in
ad hoc networks. For example, the protocol can route equally
well between IP [12], IPv6 [4], and IPX [5] nodes.
- Historically, DSR grew from our contemplation of a multihop ARP
protocol [6, 7] and source routing bridges [10]. ARP [11] is a
layer 2protocol.
- Technically, we designed DSR to be simple enough that that it
could be implemented directly in network interface cards, well
below the layer 3 software within a mobile node. We see great
potential for DSR running between clouds of mobile nodes around
fixed base stations. DSR would act to transparently fill in the
coverage gaps between base stations. Mobile nodes that would
otherwise be unable to communicate with the base station due to
factors such as distance, fading, or local interference sources
could then reach the base station through their peers.
Ultimately, however, we decided to design DSR as a layer 3 protocol
since this is the only layer at which we could realistically support
nodes with multiple interfaces of different types.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 33]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Implementation Status
We have implemented Dynamic Source Routing (DSR) under the
FreeBSD 2.2.2 operating system running on Intel x86 platforms.
FreeBSD is based on a variety of free software, including 4.4 BSD
Lite from the University of California, Berkeley.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 34]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Acknowledgments
The protocol described in this draft has been designed within
the CMU Monarch Project, a research project at Carnegie Mellon
University which is developing adaptive networking protocols and
protocol interfaces to allow truly seamless wireless and mobile host
networking [8, 14]. The current members of the CMU Monarch Project
include:
- Josh Broch
- Yih-Chun Hu
- Jorjeta Jetcheva
- David B. Johnson
- David A. Maltz
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 35]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Areas for Refinement
We are currently working to refine the DSR protocol in the following
ways:
- Improve the algorithms and data structures used by the Route
Cache. We currently represent the Route Cache as a directed
acyclic tree of paths branching out from a root that represents
the node owning the Route Cache. However, each source
route learned by the Route Cache effectively describes the
interconnectedness of all the hops listed on the route, and
can be treated as a type of partial information Link State
Packet as one would find in a Link State routing algorithm.
By generalizing the Route Cache to a graph of all known links
between all known nodes, it may be possible to better leverage
the information a node overhears.
- Support for better route selection. In order to select the
best source route to send a packet with, nodes need be able to
evaluate the costs/benefits of each of their cached routes to the
destination. If those routes involve forwarding through nodes
with more than one interface, some routes may be better suited to
the traffic type because the bandwidth/range/latency/error-rate
characteristics of of the interfaces used on those routes best
match the needs of the traffic type. The Route Request and Route
Reply option format must be extended to enable node to report
the properties of the interfaces on the route, as well as the
interface index used in basic DSR forwarding.
- Improved Route Discovery algorithms. We are investigating ways
to cancel a propagating Route Request if the target of the
request has already been found in another part of the network.
Similarly, we are studying various ring-search algorithms in case
a more sophisticated algorithm might perform better than the
2-step algorithm we currently use.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 36]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
References
[1] R. Braden, editor. Requirements for Internet Hosts --
Communication Layers. RFC 1122, October 1989.
[2] Scott Bradner. Key words for use in RFCs to Indicate
Requirement Levels. RFC 2119, March 1997.
[3] Scott Corson and Joseph Macker. Mobile Ad Hoc Networking
(MANET): Routing Protocol Performance Issues and Evaluation
Considerations. Internet-Draft, draft-ietf-manet-issues-00.txt,
September 1997. Work in progress.
[4] Stephen E. Deering and Robert M. Hinden. Internet
Protocol, Version 6 (IPv6) Specification. Internet-Draft,
draft-ietf-ipngwg-ipv6-spec-v2-01.txt, November 1997. Work in
progress.
[5] IPX Router Specification. Novell Part Number 107-000029-001,
Document Version 1.30, March 1996.
[6] David B. Johnson. Routing in ad hoc networks of mobile hosts.
In Proceedings of the IEEE Workshop on Mobile Computing Systems
and Applications, pages 158--163, December 1994.
[7] David B. Johnson and David A. Maltz. Dynamic source routing in
ad hoc wireless networks. In Mobile Computing, edited by Tomasz
Imielinski and Hank Korth, chapter 5, pages 153--181. Kluwer
Academic Publishers, 1996.
[8] David B. Johnson and David A. Maltz. Protocols for adaptive
wireless and mobile networking. IEEE Personal Communications,
3(1):34--42, February 1996.
[9] Charles Perkins, editor. IP Mobility Support. RFC 2002,
October 1996.
[10] Radia Perlman. Interconnections: Bridges and Routers.
Addison-Wesley, Reading, Massachusetts, 1992.
[11] David C. Plummer. An Ethernet Address Resolution Protocol: Or
Converting Network Protocol Address to 48.bit Ethernet Addresses
for Transmission on Ethernet Hardware. RFC 826, November 1982.
[12] J. Postel, editor. Internet Protocol. RFC 791, September 1981.
[13] J. Postel, editor. Transmission Control Protocol. RFC 793,
September 1981.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 37]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
[14] The CMU Monarch Project. http://www.monarch.cs.cmu.edu/.
Computer Science Department, Carnegie Mellon University.
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 38]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Chair's Address
The Working Group can be contacted via its current chairs:
M. Scott Corson
Institute for Systems Research
University of Maryland
College Park, MD 20742
USA
Phone: +1 301 405-6630
Email: corson@isr.umd.edu
Joseph Macker
Information Technology Division
Naval Research Laboratory
Washington, DC 20375
USA
Phone: +1 202 767-2001
Email: macker@itd.nrl.navy.mil
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 39]
INTERNET-DRAFT The Dynamic Source Routing Protocol 13 March 1998
Authors' Addresses
Questions about this document can also be directed to the authors:
Josh Broch
Carnegie Mellon University
Electrical and Computer Engineering Department
5000 Forbes Avenue
Pittsburgh, PA 15213-3891
USA
Phone: +1 412 268-3056
Email: broch@andrew.cmu.edu
David B. Johnson
Carnegie Mellon University
Computer Science Department
5000 Forbes Avenue
Pittsburgh, PA 15213-3891
USA
Phone: +1 412 268-7399
Fax: +1 412 268-5576
Email: dbj@cs.cmu.edu
David A. Maltz
Carnegie Mellon University
Computer Science Department
5000 Forbes Avenue
Pittsburgh, PA 15213-3891
USA
Phone: +1 412 268-3621
Fax: +1 412 268-5576
Email: dmaltz@cs.cmu.edu
Broch, Johnson, and Maltz Expires 13 September 1998 [Page 40]