Mobile Ad hoc Networks Working I. Chakeres
Group E. Belding-Royer
Internet-Draft UC Santa Barbara
Expires: July 5, 2005 C. Perkins
Nokia
January 2005
Dynamic MANET On-demand Routing Protocol (DYMO)
draft-ietf-manet-dymo-00
Status of this Memo
This document is an Internet-Draft and is subject to all provisions
of Section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. The list of
Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 5, 2005.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
The Dynamic MANET On-demand (DYMO) routing protocol is intended for
use by mobile nodes in wireless multihop networks. It offers quick
adaptation to dynamic conditions, low processing and memory overhead,
low network utilization, and determines unicast routes between nodes
within the network.
Chakeres, et al. Expires July 5, 2005 [Page 1]
Internet-Draft DYMO January 2005
Table of Contents
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Data Structures . . . . . . . . . . . . . . . . . . . . . . . 6
3.1 Conceptual Data Structures . . . . . . . . . . . . . . . . 6
3.1.1 Route Table Entry . . . . . . . . . . . . . . . . . . 6
3.2 DYMO Message Elements . . . . . . . . . . . . . . . . . . 6
3.2.1 Fixed Portion of DYMO Elements . . . . . . . . . . . . 6
3.2.2 Routing Element (RE) . . . . . . . . . . . . . . . . . 7
3.2.3 Route Error (RERR) . . . . . . . . . . . . . . . . . . 8
3.2.4 Unsupported-element Error (UERR) . . . . . . . . . . . 8
3.3 Field Descriptions . . . . . . . . . . . . . . . . . . . . 8
4. Detailed Operation . . . . . . . . . . . . . . . . . . . . . . 12
4.1 Sequence Numbers . . . . . . . . . . . . . . . . . . . . . 12
4.1.1 Maintaining a Sequence Number . . . . . . . . . . . . 12
4.1.2 Incrementing a Sequence Number . . . . . . . . . . . . 12
4.1.3 Sequence Number Rollover . . . . . . . . . . . . . . . 12
4.1.4 Actions After Sequence Number Loss . . . . . . . . . . 12
4.2 DYMO Routing Table Operations . . . . . . . . . . . . . . 12
4.2.1 Creating or Updating a Route Table Entry from
Routing Element Information . . . . . . . . . . . . . 12
4.2.2 Route Table Entry Timeouts . . . . . . . . . . . . . . 13
4.3 DYMO General Processing . . . . . . . . . . . . . . . . . 13
4.3.1 DYMO Control Packet Processing . . . . . . . . . . . . 13
4.3.2 Generic Element Pre-processing . . . . . . . . . . . . 14
4.3.3 Processing Unsupported DYMO Elements . . . . . . . . . 14
4.3.3.1 Generating an Unsupported-element Error . . . . . 14
4.3.4 Generic Element Post-processing . . . . . . . . . . . 15
4.3.5 DYMO Control Packet Transmission . . . . . . . . . . . 15
4.4 Routing Element . . . . . . . . . . . . . . . . . . . . . 15
4.4.1 Routing Element Creation . . . . . . . . . . . . . . . 15
4.4.2 Appending Additional Routing Information to an
Existing Routing Element . . . . . . . . . . . . . . . 15
4.4.3 Routing Element Processing . . . . . . . . . . . . . . 16
4.5 Route Discovery . . . . . . . . . . . . . . . . . . . . . 16
4.6 Route Maintenance . . . . . . . . . . . . . . . . . . . . 17
4.6.1 Link Breaks . . . . . . . . . . . . . . . . . . . . . 17
4.6.2 Updating Route Lifetimes . . . . . . . . . . . . . . . 17
4.6.3 Extending Route Lifetimes . . . . . . . . . . . . . . 17
4.6.4 Route Error Generation . . . . . . . . . . . . . . . . 18
4.6.5 Route Error Processing . . . . . . . . . . . . . . . . 18
4.7 Routing Prefix . . . . . . . . . . . . . . . . . . . . . . 19
4.8 Internet Attachment . . . . . . . . . . . . . . . . . . . 19
4.9 Multiple Interfaces . . . . . . . . . . . . . . . . . . . 19
Chakeres, et al. Expires July 5, 2005 [Page 2]
Internet-Draft DYMO January 2005
4.10 Packet Generation Limits . . . . . . . . . . . . . . . . . 20
5. Configuration Parameters . . . . . . . . . . . . . . . . . . . 21
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22
7. Security Considerations . . . . . . . . . . . . . . . . . . . 23
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 24
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 25
9.1 Normative References . . . . . . . . . . . . . . . . . . . 25
9.2 Informative References . . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 25
Intellectual Property and Copyright Statements . . . . . . . . 27
Chakeres, et al. Expires July 5, 2005 [Page 3]
Internet-Draft DYMO January 2005
1. Overview
The Dynamic MANET On-demand (DYMO) routing protocol enables dynamic,
reactive, multihop routing between participating nodes wishing to
communicate. The basic operations of the protocol are route
discovery and management. During route discovery the originating
node causes dissemination of a Routing Element (RE) throughout the
network to find the target node. During dissemination each
intermediate node creates a route to the originating node. When the
target node receives the RE it responds with RE unicast toward
originating node. During propagation each node creates a route to
the target node. When the originating node is reached routes have
been established between the originating node and the target node in
both directions.
In order to react quickly to changes in the network topology nodes
should maintain their routes and monitor their links. When a packet
is received for a route that is no longer available the source of the
packet should be notified. A Route Error (RERR) is sent to the
packet source to indicate the current route is broken. Once the
source receives the RERR, it will re-initiate route discovery if it
still has packets to deliver.
In order to enable extension of the base specification, DYMO defines
the handling of unsupported extensions. By defining default
handling, future extensions are handled in a predetermined understood
fashion.
DYMO uses sequence numbers to ensure loop freedom [3].
All DYMO packets are transmitted via UDP on port TBD.
Chakeres, et al. Expires July 5, 2005 [Page 4]
Internet-Draft DYMO January 2005
2. Terminology
IPBroadcastAddress
Transmit the packet to the IP Limited Broadcast address,
255.255.255.255 (IPv4) or FF:FF:FF:FF:FF:FF (IPv6).
IPDestinationAddress
The destination of a packet, indicated by examining the IP
header.
IPSourceAddress
The source of a packet, indicated by examining the IP header.
MANETcast
Transmit the packet to all MANET nodes within reception range.
In a simple implementation MANETcast packets are sent to the
IPBroadcastAddress. MANETcast SHOULD preform duplicate
suppression.
Valid Route
A known route where the RouteValidTimeout is larger than the
current time.
Chakeres, et al. Expires July 5, 2005 [Page 5]
Internet-Draft DYMO January 2005
3. Data Structures
3.1 Conceptual Data Structures
3.1.1 Route Table Entry
o RouteAddress
o RouteDeleteTimeout
o RouteHopCnt
o RouteIsGateway
o RouteNextHopAddress
o RouteNextHopInterface
o RoutePrefix
o RouteSeqNum
o RouteValidTimeout
3.2 DYMO Message Elements
3.2.1 Fixed Portion of DYMO Elements
All DYMO message elements must conform to the fixed data structure
below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ElemType |T|I| Res | ElemTTL | ElemLen |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. ElemTargetAddress .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. ElemNotifyAddress (Only ElemTypes with M-bit set) .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. .
. ElemData .
. ElemType-Specific Payload .
. .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Chakeres, et al. Expires July 5, 2005 [Page 6]
Internet-Draft DYMO January 2005
3.2.2 Routing Element (RE)
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ElemType |T|I| Res | ElemTTL | ElemLen |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. ElemTargetAddress .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ElemTargetSeqNum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|A|G| Prefix1 | Res | REHopCnt1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. RENodeAddress1 .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RENodeSeqNum1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|R|G| PrefixN | Res | REHopCntN |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Additional RENodeAddressN (if needed) .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Additional RENodeSeqNumN (if needed) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
ElemType: 1. Nodes MUST implement the Routing Element.
Chakeres, et al. Expires July 5, 2005 [Page 7]
Internet-Draft DYMO January 2005
3.2.3 Route Error (RERR)
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ElemType |T|I| Res | ElemTTL | ElemLen |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. ElemTargetAddress .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. UNodeAddress1 .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| UNodeSeqNum1 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. Additional UNodeAddress (if needed) .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Additional UNodeSeqNum (if needed) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
ElemType: 2. Nodes not implementing RERR will ignore the element
and continue.
3.2.4 Unsupported-element Error (UERR)
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| ElemType |T|I| Res | ElemTTL | ElemLen |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. ElemTargetAddress .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. UElemTargetAddress .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
. UERRNodeAddress .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| UElemType |
+-+-+-+-+-+-+-+-+
ElemType: 3. Nodes not implementing UERR will ignore the element
and continue.
3.3 Field Descriptions
A-bit (A)
1-bit selector indicating whether this RE requires an answer RE
by the ElemTargetAddress. If A=1 an answer is required. The
instructions for generating an answer RE are described in
Section 4.4.3.
Chakeres, et al. Expires July 5, 2005 [Page 8]
Internet-Draft DYMO January 2005
Element Data (ElemData)
ElemType-specific payload.
Element Length (ElemLen)
12-bit field that indicates the size of the element in bytes,
including the fixed portion.
Element Notify Address (ElemNotifyAddress)
The node to send a UERR if the ElemType is unsupported. The
ElemNotifyAddress field is only present if the ElemType has the
M-bit is set to one (1).
Element Target Address (ElemTargetAddress)
The node that is the ultimate destination of the element.
Element Time to Live (ElemTTL)
6-bit field that identifies the maximum number of times the
element is to be retransmitted. The ElemTTL field operates
similar to IPTTL (MaxCount) and is decremented at each hop.
When ElemTTL reaches zero (0) the element is dropped.
Element Type (ElemType)
0 0
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
| ElemType | = |M| H | |
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
The ElemType field identifies the element as well as the
handling by nodes that do not implement or understand the
element. The MSB bit, M-bit, denotes whether the element
requires notification via an Unsupported-element Error (UERR)
when the element is not understood or handled by a particular
node. The next two bits, H-bits, identify how the ElemType
MUST be handled by nodes not implementing the ElemType,
regardless of UERR delivery. Section 4.3.3 describes the
handling behavior based on the ElemType.
G-bit (G)
1-bit selector to indicate whether the RENodeAddress1 is a
gateway. If G=1 RENodeAddress1 is a gateway. For more
information on gateway operation see Section 4.8.
I-bit (I)
1-bit selector indicating whether the element has been ignored.
If I=1 the element has been ignored. For a description of
processing for unsupported elements by ElemType see
Section 4.3.3.
Prefix Size (Prefix)
6-bit field that specifies the size of the subnet reachable
through the associated node, see Section 4.7. The definition
of Prefix is different for gateways.
Chakeres, et al. Expires July 5, 2005 [Page 9]
Internet-Draft DYMO January 2005
Routing Element Block Hop Count (REHopCnt)
6-bit field that identifies the number of intermediate nodes
the associated RE block has passed through.
Routing Element Node Address (RENodeAddress)
The IP address of the node that appending its RENodeAddress.
Routing Element Node Sequence Number (RENodeSeqNum)
The sequence number of the node appending its RENodeSeqNum.
Reserved (Res, R)
Reserved bits. These bits are set to zero (0) during element
creation and ignored during processing.
Route Node Address (RouteNodeAddress)
The IP address of the node associated with the routing table
entry.
Route Delete Timeout (RouteDeleteTimeout)
The corresponding routing table entry MUST be deleted if the
current time is after RouteDeleteTimeout.
Route Hop Count (RouteHopCnt)
The number of intermediate node hops before reaching the
RouteNodeAddress.
Route Is Gateway (RouteIsGateway)
1-bit selector indicating whether the RouteNodeAddress is a
gateway.
Route Next Hop Address (RouteNextHopAddress)
The IP address of the next node on the path toward the
RouteNodeAddress.
Route Next Hop Interface (RouteNextHopInterface)
The interface to send packets toward the RouteNodeAddress.
Route Prefix (RoutePrefix)
6-bit field that specifies the size of the subnet reachable
through the RouteNodeAddress, see Section 4.7. The definition
of the Prefix field is different for gateways.
Route Sequence Number (RouteSeqNum)
The sequence number of the RouteNodeAddress.
RouteValidTimeout
The routing table entry is no longer considered valid if the
current time is after RouteValidTimeout.
T-bit (T)
1-bit selector indicating how the element must be transmitted.
If T=0 the element is unicast toward the ElemTargetAddress.
Otherwise, if T=1 the element is MANETcast.
Unreachable Node Address (UNodeAddress)
The IP address of the unreachable node.
Unreachable Node Sequence Number (UNodeSeqNum)
The sequence number of the unreachable node, if known;
otherwise, zero (0).
Unsupported-element Node Address (UERRNodeAddress)
The IP address of the node that generated the UERR.
Chakeres, et al. Expires July 5, 2005 [Page 10]
Internet-Draft DYMO January 2005
Unsupported-element Target Address (UElemTargetAddress)
Address of the destination of the element that caused delivery
of the UERR.
Unsupported-element Type (UElemType)
The ElemType that required generation of the UERR.
Chakeres, et al. Expires July 5, 2005 [Page 11]
Internet-Draft DYMO January 2005
4. Detailed Operation
4.1 Sequence Numbers
4.1.1 Maintaining a Sequence Number
DYMO requires each node in the network maintain its own sequence
number (OwnSeqNum). The circumstances for a node to change its
OwnSeqNum are described in Section 4.4.1.
4.1.2 Incrementing a Sequence Number
When a node increments its OwnSeqNum (as proscribed in Section 4.4.1
and Section 4.4.3) it MUST do so by treating the sequence number
value as if it were an unsigned number. The sequence number zero (0)
is reserved and is used in several DYMO data structures to represent
an unknown sequence number.
4.1.3 Sequence Number Rollover
To accomplish sequence number rollover, if the sequence number has
been assigned to be the largest possible number representable as a
32-bit unsigned integer (i.e., 4294967295), then the sequence number
when incremented MUST be set to one (1).
4.1.4 Actions After Sequence Number Loss
If a node's OwnSeqNum is lost it MUST NOT participate in the MANET
network (forward any data or issue any DYMO control packets) until it
is sure that all other nodes have deleted any sequence number
information about it. If RouteDeleteTimeout is set to
ROUTE_DELETE_TIMEOUT + the current time (as described in
Section 4.2.1), nodes should avoid participation for at least
ROUTE_DELETE_TIMEOUT after sequence number loss.
4.2 DYMO Routing Table Operations
4.2.1 Creating or Updating a Route Table Entry from Routing Element
Information
While processing a RE, as described in Section 4.4.3, a node checks
its routing table for an entry to the RENodeAddress using
longest-prefix matching. In the event that there is no corresponding
entry for the node, an entry is created.
The routing information about RENodeAddress contained in the RE block
is considered stale if:
Chakeres, et al. Expires July 5, 2005 [Page 12]
Internet-Draft DYMO January 2005
o the result of subtracting the RouteSeqNum from RENodeSeqNum is
less than zero (0) using signed 32-bit arithmetic, OR
o the result of subtracting the RouteSeqNum from RENodeSeqNum is
equal to zero (0) using signed 32-bit arithmetic AND the REHopCnt
is greater than RouteHopCnt.
If the information is stale and this RE block is the first node in
the RE (RENodeAddress1) this DYMO packet dropped. Otherwise, the
RENodeAddress and RENodeSeqNum are removed from this RE.
If the route information for RENodeAddress is not stale, then the
following actions occur to the route table entry for RENodeAddress:
o the RouteDeleteTimeout is set to the current time +
ROUTE_DELETE_TIMEOUT,
o the RouteNextHopAddress is set to the node that transmitted this
DYMO packet (IPSourceAddress),
o the RouteNextHopInterface is set to the interface that this DYMO
packet was received on,
o the RoutePrefix is set to Prefix,
o and the RouteSeqNum is set to the RENodeSeqNum.
o the RouteValidTimeout is set to the current time + ROUTE_TIMEOUT,
If a valid route exists to RENodeAddress, the route can be used to
send any queued data packets and to fulfill any outstanding route
requests.
4.2.2 Route Table Entry Timeouts
If the current time is later than a routing entry's
RouteValidTimeout, the route is stale and it is not be used to route
packets.
If the current time is later than a routing entry's
RouteDeleteTimeout, the route MUST be deleted.
4.3 DYMO General Processing
4.3.1 DYMO Control Packet Processing
A DYMO packet may consist of multiple DYMO elements. Each element is
processed individually and in sequence, from first to last. An
incoming DYMO packet MUST be completely processed prior to any DYMO
packet transmissions, resulting from the contained DYMO elements.
The length of IP addresses (32-bits for IPv4 and 128-bits for IPv6)
inside DYMO elements is dependent on the IP packet header. For
example, if the IP header is IPv6 then all DYMO elements contained in
the payload use IPv6 addresses.
Chakeres, et al. Expires July 5, 2005 [Page 13]
Internet-Draft DYMO January 2005
Unless specific element processing requires dropping the DYMO packet,
it is retransmitted after processing.
4.3.2 Generic Element Pre-processing
Each element in a DYMO packet undergoes pre-processing before the
element specific processing occurs. The ElemTTL is decremented by
one (1).
4.3.3 Processing Unsupported DYMO Elements
This section describe the processing for unsupported DYMO ElemTypes.
For unsupported DYMO elements, the ElemType field identifies the
handling by nodes that do not implement or understand the element.
The most significant bit (M-bit) indicates whether an
Unsupported-element Error (UERR) SHOULD be sent to the
ElemNotifyAddress. The next two bits (H-bits) identify how the
element should be handled.
0 0
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
| ElemType | = |M| H | |
+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+
If the M-bit is set is this DYMO element, a UERR is sent to the
ElemNotifyAddress. This is accomplished by following the
instructions in Section 4.3.3.1.
Regardless of whether or not a UERR is sent in response to this
unsupported ElemType, the processing node MUST also examine the
H-bits to determine how this unsupported element is handled. If :
o H == 00: Processing for this ElemType MUST skip the element and
continue, as if the packet did not contain this element.
o H == 01: Processing for this ElemType MUST remove the element
(using the ElemLen) from the packet and continue, as if the packet
did not include this element.
o H == 10: Processing for this ElemType MUST set the ignored bit
(I-bit), skip this element and continue, as if the packet did not
contain this element.
o H == 11: Processing for this ElemType dictates that the packet
MUST be dropped.
4.3.3.1 Generating an Unsupported-element Error
The ElemTargetAddress in the UERR is set to the ElemNotifyAddress
from the unsupported element. The UElemTargetAddress is set to the
ElemTargetAddress from the unsupported element. The UERRNodeAddress
Chakeres, et al. Expires July 5, 2005 [Page 14]
Internet-Draft DYMO January 2005
is set to the generating nodes IP address. The UElemType is the
ElemType from the unsupported element. The ElemTTL is set to
NET_DIAMETER. The UERRNodeAddress is set to the address of the node
generating this UERR. The ElemLen is set to the total number of
bytes in this UERR. The T-bit is set to zero (T=0). The element is
then processed as described in Section 4.3.4.
4.3.4 Generic Element Post-processing
If the ElemTTL is zero (0) AND this element is the first element this
DYMO packet is dropped after processing of all elements in the DYMO
packet. If the ElemTTL is zero (0) AND this is NOT the first
element, this element is removed from the packet. If the ElemTTL is
larger than zero (0), this element is re-transmitted in a DYMO packet
after all elements have been processed.
4.3.5 DYMO Control Packet Transmission
DYMO packet transmission is controlled by the T-bit in the first
element. If T=0 the element is unicast toward the ElemTargetAddress
via a routing table lookup. If the RouteNextHopAddress for the
ElemTargetAddress is not known the packet is dropped. If T=1 the
element is MANETcast.
For all DYMO packets the IPTTL (IPMaxCount) SHOULD be set to 1
(IPTTL=1).
4.4 Routing Element
4.4.1 Routing Element Creation
When a node creates a RE, it first increments its OwnSeqNum by one
according to the rules specified in Section 4.1.2. Then it sets the
RENodeAddress1 to its own address. The RENodeSeqNum1 is the node's
OwnSeqNum. The node may advertise a prefix using the Prefix field,
as described in Section 4.7. Otherwise, the Prefix field is set to
zero (0). This node may advertise it is a gateway by setting the
G-bit, as described in Section 4.8. Otherwise, the G-bit is set to
zero (0). The ElemTTL is set to NET_DIAMETER.
4.4.2 Appending Additional Routing Information to an Existing Routing
Element
After processing a RE, a node MAY append its IP address and OwnSeqNum
to the RE. Appending its own routing information may alleviate some
route discovery procedures to this node from other nodes that process
this RE.
Chakeres, et al. Expires July 5, 2005 [Page 15]
Internet-Draft DYMO January 2005
If this node plans to append its IP address to the RE, it first
increments its OwnSeqNum as defined in Section 4.1.2. Then this node
appends its IP address and OwnSeqNum to the RE. The ElemLen is also
adjusted accordingly.
4.4.3 Routing Element Processing
After general DYMO element pre-processing, the ElemHopCnt is
incremented by one. A route to RENodeAddress1 is then created or
updated using the associated RENodeSeqNum, G-bit, Prefix, and
REHopCnt, as defined in Section 4.2.1.
Each RENodeAddress, RENodeSeqNum, G-bit, Prefix, and REHopCnt block
MAY be processed. First the REHopCnt is incremented, then a route is
created or updated as defined in Section 4.2.1. Each RENodeAddress
block resulting in a valid route entry may alleviate a future route
discovery. Any unprocessed RENodeAddress blocks MUST be removed from
the RE.
If this node is the ElemTargetAddress AND the A-bit is set (A=1),
this node MUST reciprocate with a RE. This node creates a new RE as
described in Section 4.4.1. The ElemTargetAddress in the new RE is
set to the RENodeAddress1 from the RE currently being processed. The
T-bit is set to zero (T=0) and the A-bit is set to (A=0). Then the
new RE undergoes post-processing, according to Section 4.3.5.
If this node is not the ElemTargetAddress the current RE SHOULD be
handled according to Section 4.3.4.
If this node is the ElemTargetAddress the current packet and any
additional elements are processed, but this packet is not
retransmitted.
4.5 Route Discovery
A node generates a Route Request (RREQ) to discover a valid route to
a particular destination (ElemTargetAddress), other than itself. A
RREQ is simply a RE with the T-bit set (T=1) to indicate that this RE
is to be MANETcast. Also, the A-bit is set to one (A=1) to indicate
that the TargetNode must respond with a RE. If a sequence number is
known for the ElemTargetAddress it is placed in the ElemTargetSeqNum
field. Otherwise, ElemTargetSeqNum is set to zero (0).
Before sending the RREQ, the generating node buffers its
RENodeAddress and RENodeSeqNum in its RE Table. The RE is then
transmitted according to the procedure defined in Section 4.3.5.
After issuing the RREQ, the node waits for a route to be created to
Chakeres, et al. Expires July 5, 2005 [Page 16]
Internet-Draft DYMO January 2005
the TargetNode. If a route is not received within RREQ_WAIT_TIME
milliseconds, this node MAY again try to discover a route by issuing
another RREQ.
To reduce congestion in a network, repeated attempts at route
discovery for a particular TargetNode SHOULD utilize a binary
exponential backoff. The first time an node issues a RREQ, it waits
RREQ_WAIT_TIME milliseconds for a route to the TargetNode. If a
route is not found within that time, the node may send another RREQ.
If a route is not found within 2*RREQ_WAIT_TIME, another RREQ may be
sent, up to a total of RREQ_TRIES. For each additional attempt, the
waiting time for the previous RREP is multiplied by 2 so that the
waiting time conforms to a binary exponential backoff.
Data packets waiting for a route SHOULD be buffered.
If a route discovery has been attempted RREQ_TRIES times without
receiving a route to the TargetNode, all data packets destined for
the corresponding TargetNode SHOULD be dropped from the buffer and a
Destination Unreachable ICMP message SHOULD be delivered to the
application.
4.6 Route Maintenance
4.6.1 Link Breaks
Nodes SHOULD monitor links to active neighbors. This may be
accomplished by one or several mechanisms. Such as:
o Link layer feedback
o Hello messages
o Neighbor discovery
o Route timeout
Upon detecting a link break the valid routes utilizing the broken
link MUST set their RouteValidTimeout to the current time.
A RERR MAY be issued after detecting a broken link of an active
route. RERR Generation is described in Section 4.6.4.
4.6.2 Updating Route Lifetimes
To avoid route timeouts for active sources, after receiving a packet
a node MAY update the RouteValidTimeout to the IPSourceAddress to be
the current time + ROUTE_TIMEOUT.
4.6.3 Extending Route Lifetimes
To avoid route timeouts for active routes, an originating node MAY
periodically send a RE with the T-bit set to zero (0), the A-bit set
Chakeres, et al. Expires July 5, 2005 [Page 17]
Internet-Draft DYMO January 2005
to one (A=1) and the ElemTargetAddress set to the target node's
address (RouteAddress). The resultant DYMO packet transmissions and
RE processing (Section 4.2.1) will update the lifetime of routes to
the originating node and target node (RouteAddress) at all
intermediate nodes, if a valid route still exists.
4.6.4 Route Error Generation
When a non-DYMO packet is received for a destination without a valid
routing table entry, a Route Error (RERR) SHOULD be generated by this
node. A RERR informs the source that the current route is no longer
available in a more timely manner than RouteValidTimeout.
In the RERR, the ElemTargetAddress is the node that sent the non-DYMO
packet, the IPSourceAddress. The UNodeAddress1 field is the address
of the unreachable node (IPDestinationAddress) from the non-DYMO
packet. If the UNodeSeqNum is known, it is placed in the RERR;
otherwise zero (0) is placed in the this field of the RERR. The
ElemTTL is set to NET_DIAMETER. The T-bit is set to one (T=1).
Additional unreachable nodes utilizing the same invalid link (routes
with the same RouteNextHopAddress and RouteNextHopInterface) as the
UNodeAddress1 MAY be appended to the RERR. For each unreachable node
their UNodeAddress and UNodeSeqNum are appended. The ElemLen is set
accordingly.
The RERR is then processed as described in Section 4.3.5.
4.6.5 Route Error Processing
When a node processes a RERR after generic element pre-processing, it
SHOULD set the RouteValidTimeout to the current time for each route
to a UNodeAddress that meet all of the following conditions:
The RouteNextHopAddress is the same as the RERR IPSourceAddress.
The RouteNextHopInterface is the same as the interface this RERR
was received.
The UNodeSeqNum is zero (0) OR if the result of subtracting
RouteSeqNum from UNodeSeqNum is less than or equal to zero using
signed 32-bit arithmetic
If any route's RouteValidTimeout is set to the current time, this
RERR MAY be handled as described in Section 4.3.4. Otherwise, the
RERR is dropped.
Prior to RERR element post processing a node MAY remove UNodeAddress,
UNodeSeqNum pairs to decrease the element size.
Chakeres, et al. Expires July 5, 2005 [Page 18]
Internet-Draft DYMO January 2005
4.7 Routing Prefix
Any node can advertise connectivity to a subset of nodes within its
address space by using the prefix field in RE. The nodes within the
advertised prefix SHOULD NOT participate in the MANET, and MUST be
reachable by forwarding packets to the node advertising connectivity.
For example, 192.168.1.1 with a prefix of 16 indicates all nodes with
the prefix 192.168.X.X are reachable through 192.168.1.1.
If the G-bit is set the meaning of the prefix field is altered. For
a gateway the prefix in association with the IP address indicates
that nodes outside the subnet are reachable via the gateway node.
For example, a gateway with IP address 192.168.1.1 and a prefix of 16
indicates all nodes with the IP address NOT matching 192.168.X.X are
reachable through 192.168.1.1.
4.8 Internet Attachment
Basic Internet attachment consists of a stub network of MANET nodes
connected to the Internet via a single gateway node. The gateway is
responsible for responding to RREQs for TargetNodes outside its
configured MANET subnet, as well as delivering packets to
destinations outside the MANET subnet.
MANET nodes wishing to be reachable from nodes in the Internet MUST
have IP addresses within the gateway's configured MANET subnet.
Given a node with a globally route-able address or care-of address
handled by the gateway, the gateway is responsible for performing
route discovery for packets received from the Internet destined for
nodes inside its MANET subnet.
Since many nodes may commonly wish to communicate with the gateway,
the gateway SHOULD indicate to nodes that it is a gateway by setting
the gateway bit (G-bit) in the RE. The G-bit flag indicates to nodes
in the MANET that the RENodeAddress is attached to the Internet and
is capable of routing data packets to all nodes outside of the
configured MANET subnet, described by the RENodeAddress and Prefix
fields.
4.9 Multiple Interfaces
It is likely that DYMO will be used with multiple wireless
interfaces; therefore, the particular interface over which packets
arrive must be known whenever a packet is received. Whenever a new
route is created, the interface through which the RouteAddress can be
reached is also recorded into the route table entry.
When multiple interfaces are available, a node transmitting a
Chakeres, et al. Expires July 5, 2005 [Page 19]
Internet-Draft DYMO January 2005
MANETcast packet SHOULD send the packet on all interfaces that have
been configured for operation in the MANET.
4.10 Packet Generation Limits
To avoid congestion, a node SHOULD NOT transmit more than RATE_LIMIT
control messages per second.
Chakeres, et al. Expires July 5, 2005 [Page 20]
Internet-Draft DYMO January 2005
5. Configuration Parameters
Here are some suggested parameter values for DYMO:
Parameter Name Suggested Value
--------------------------- ---------------
NET_DIAMETER 10
RATE_LIMIT 10
ROUTE_TIMEOUT 3000 milliseconds
ROUTE_DELETE_TIMEOUT 5*ROUTE_TIMEOUT
RREQ_WAIT_TIME 1000 milliseconds
RREQ_TRIES 3
These parameters work well for small well-connected networks with
moderate network topology changes.
For other networks these DYMO parameters SHOULD be adjusted using
either dynamic adaptation or experimentally determined values. For
example in static networks, ROUTE_TIMEOUT may be set to a much larger
value.
Chakeres, et al. Expires July 5, 2005 [Page 21]
Internet-Draft DYMO January 2005
6. IANA Considerations
DYMO defines a ElemType field for each element within a packet sent
to port TBD. A new registry will be created for the values for this
ElemType field, and the following values will be assigned:
ElemType Value
-------------------------------- -----
Routing Element (RE) 1
Route Error (RERR) 2
Unsupported-element Error (UERR) 3
Future values of the ElemType and ErrType will be allocated using
standard actions as described in [1].
Chakeres, et al. Expires July 5, 2005 [Page 22]
Internet-Draft DYMO January 2005
7. Security Considerations
Currently, DYMO does not specify any special security measures.
Routing protocols, however, are prime targets for impersonation
attacks. In networks where the node membership is not known, it is
difficult to determine the occurrence of impersonation attacks, and
security prevention techniques are difficult at best. However, when
the network membership is known and there is a danger of such
attacks, DYMO elements must be protected by the use of authentication
techniques, such as those involving generation of unforgeable and
cryptographically strong message digests or digital signatures.
While DYMO does not place restrictions on the authentication
mechanism used for this purpose, IPsec Authentication Element (AH) is
an appropriate choice for cases where the nodes share an appropriate
security association that enables the use of AH.
In particular, RE messages SHOULD be authenticated to avoid creation
of spurious routes to a destination. Otherwise, an attacker could
masquerade as that destination and maliciously deny service to the
destination and/or maliciously inspect and consume traffic intended
for delivery to the destination. RERR messages, while less
dangerous, SHOULD be authenticated in order to prevent malicious
nodes from disrupting active routes between communicating nodes.
DYMO does not make any assumption about the method by which addresses
are assigned to the mobile nodes except that they are presumed to
have unique IP addresses. Therefore, no special consideration, other
than what is natural because of the general protocol specifications,
can be made about the applicability of IPsec authentication elements
or key exchange mechanisms. However, if the mobile nodes in the ad
hoc network have pre-established security associations, it is
presumed that the purposes for which the security associations are
created include that of authorizing the processing of DYMO control
packets. Given this understanding, the mobile nodes should be able
to use the same authentication mechanisms based on their IP addresses
as they would have used otherwise.
Chakeres, et al. Expires July 5, 2005 [Page 23]
Internet-Draft DYMO January 2005
8. Acknowledgments
DYMO is an decedent of the design of previous MANET reactive
protocols. Special thanks to the authors of AODV [2] and DSR [4].
The authors of AODV and DSR include Charlie Perkins, Elizabeth
Belding-Royer, Samir Das, David Johnson, David Maltz, Yih-Chun Hu and
Jorjeta Jetcheva. Much of the DYMO protocol also stems from research
and implementation of MANET reactive-routing protocols. To mention a
few major contributors Sung-Ju Lee, Mahesh Marina, Erik Nordstrom,
Yves Prelot, J.J. Garcia-Luna-Aceves, Marc Mosko, Manel Guerrero
Zapata, Philippe Jacquet, and Chris Shiflet. Also, special thanks to
Luke Klein-Berndt for extensive implementation and testing of AODV,
early reviewing of DYMO, as well as several technical discussions.
Chakeres, et al. Expires July 5, 2005 [Page 24]
Internet-Draft DYMO January 2005
9. References
9.1 Normative References
[1] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA
Considerations Section in RFCs", RFC 2434, BCP 26, October 1998.
[2] Perkins, C., Belding-Royer, E. and S. Das, "Ad hoc On-demand
Distance Vector (AODV) Routing", RFC 3561, July 2003.
9.2 Informative References
[3] Perkins, C. and E. Belding-Royer, "Ad hoc On-Demand Distance
Vector (AODV) Routing", February 1999.
[4] Johnson, D. and D. Maltz, "Dynamic Source Routing in Ad-hoc
Wireless Networks", August 1996.
Authors' Addresses
Ian Chakeres
University of California Santa Barbara
Dept. of Electrical and Computer Engineering
Santa Barbara, CA 93106
USA
Phone: +1-805-893-8981
Fax: +1-805-893-8553
Email: idc@engineering.ucsb.edu
Elizabeth Belding-Royer
University of California Santa Barbara
Dept. of Computer Science
Santa Barbara, CA 93106-5110
USA
Phone: +1-805-893-3411
Fax: +1-805-893-8553
Email: ebelding@cs.ucsb.edu
Chakeres, et al. Expires July 5, 2005 [Page 25]
Internet-Draft DYMO January 2005
Charlie Perkins
Nokia Research Center
313 Fairchild Drive
Mountain View, CA 94043
USA
Phone: +1-650-625-2986
Fax: +1-650-625-2502
Email: charlie.perkins@nokia.com
Chakeres, et al. Expires July 5, 2005 [Page 26]
Internet-Draft DYMO January 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Chakeres, et al. Expires July 5, 2005 [Page 27]