[Manet-dt] RE: SMF: Usage of IPv4 Identification field
Brian Adamson <adamson@itd.nrl.navy.mil> Fri, 20 April 2007 12:51 UTC
Return-path: <manet-dt-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hesa5-0004Vp-Kj; Fri, 20 Apr 2007 08:51:17 -0400
Received: from manet-dt by megatron.ietf.org with local (Exim 4.43) id 1Hesa4-0004UC-Aw for manet-dt-confirm+ok@megatron.ietf.org; Fri, 20 Apr 2007 08:51:16 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hesa4-0004SQ-0U; Fri, 20 Apr 2007 08:51:16 -0400
Received: from s2.itd.nrl.navy.mil ([132.250.83.3]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Hesa1-0006xh-Kb; Fri, 20 Apr 2007 08:51:15 -0400
Received: from smtp.itd.nrl.navy.mil (smtp.itd.nrl.navy.mil [132.250.86.3]) by s2.itd.nrl.navy.mil (8.13.6+Sun/8.12.8) with SMTP id l3KCp1kP025628; Fri, 20 Apr 2007 08:51:11 -0400 (EDT)
Received: from [132.250.92.151] ([132.250.92.151]) by smtp.itd.nrl.navy.mil (SMSSMTP 4.1.12.43) with SMTP id M2007042008511032650 ; Fri, 20 Apr 2007 08:51:10 -0400
Mime-Version: 1.0
Message-Id: <p06240800c24e61d9db8a@[132.250.92.151]>
In-Reply-To: <001e01c78322$4d8a8980$0202a8c0@Teco>
References: <001e01c78322$4d8a8980$0202a8c0@Teco>
Date: Fri, 20 Apr 2007 08:51:08 -0400
To: Teco Boot <teco@inf-net.nl>, manet-dt@ietf.org
From: Brian Adamson <adamson@itd.nrl.navy.mil>
Subject: [Manet-dt] RE: SMF: Usage of IPv4 Identification field
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 67c1ea29f88502ef6a32ccec927970f0
Cc: 'manet' <manet@ietf.org>
X-BeenThere: manet-dt@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: MANET Design Team <manet-dt.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/manet-dt>, <mailto:manet-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/manet-dt>
List-Post: <mailto:manet-dt@ietf.org>
List-Help: <mailto:manet-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/manet-dt>, <mailto:manet-dt-request@ietf.org?subject=subscribe>
Errors-To: manet-dt-bounces@ietf.org
Teco, This is a good comment. I had also thought of this during the past couple of weeks. The DPD filter I have implemented in the "nrlsmf" code now already supports variable length "packet identifier content" (on a per-flow basis) in order to handle the mix of possible use of IPv4 ID, the IPv6 SMF_DPD option header, IPSec, and the gateway "taggerID" option. So, it should be possible to extend the code to concatenate the fragment offset (when applicable) with the IPv4 ID field as an extended packet identifier ... making a sort of effective 29-bit sequence number. _BUT_ the challenge is that the 13 least signficant bits (the "Fragment Offset") do not incrementally increase in the manner of the other sequence numbers used (i.e, by one with each packet - the "fragment offset" increases as a function of the length of the fragments). However, if one could assume that packets for a flow are fragmented to equal (i.e. MTU) size except for the last fragment, one could translate the "fragment offset" into a few bits of sequence space (i.e. fragmentSequence = (fragmentOffset*8) / fragmentationSize) and the relatively low complexity/not-too-stateful approach of using a bit mask for sequence-based DPD could still be applied without requiring a very large window size ... For the last fragment where the fragmentation size could not be inferred, since the MF flag is not set for this fragment, the implementation could assume that its "fragmentSequence" would be FRAGMENT_SEQ_MAX ... If different fragmentation occurred in different parts of the network path as route changes occur, etc there might be some issue here, but that is not likely a frequent or sustained condition? So, the question is ... what would a reasonable number of bits for the "fragmentSequence" space for an implementation to assume? I would wager that it would not have to be very many, perhaps just 4? Thus extending the 16-bit IPv4 ID field to 20 bits for flows that are fragmented somewhere in the system. Again, for various reasons, I don't think it is often a good policy to forward multicast fragments, particularly in a wireless network ... but this provision could be described in the SMF document if there is agreement among the working group ... At 10:02 AM +0200 4/20/07, Teco Boot wrote: >I have a remark on using IPv4 DPD and support for fragmentation. I think it >is not that difficult to support fragmentation, we only have to extent the >DPD filter for Fragment Offset (and Protocol, to be compliant with RFC791). >Incorporating the Flags field (e.g. more fragments) is not needed but not >harmful either. > >The DPD filter should check on Source Address, Destination Address, >Protocol, Identification and Fragment Offset. Out of RFC791; header fields >not used by DPD are blanked: > > 0 1 2 3 > 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > | | | | | > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > | Identification | | Fragment Offset | > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > | | Protocol | | > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > | Source Address | > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > | Destination Address | > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > | | | > +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ > > Example Internet Datagram Header > > Figure 4. > >IMHO updating DPD to RFC791 is important. Also for using it as remedy for >unicast routing loops as I suggested before. > >Cheers, Teco > >> -----Original Message----- >> From: Teco Boot [mailto:teco@inf-net.nl] >> Sent: vrijdag 13 april 2007 11:36 >> To: 'manet-dt@ietf.org' >> Subject: SMF: Usage of IPv4 Identification field >> >> The SMF ID deviates from RFC791 for the Identification field. >> >> 791: "The originating protocol module of an internet datagram sets the >> identification field to a value that must be unique for that source- >> destination pair and protocol" >> >> SMF: "In the case that resequencing is deemed necessary, it is RECOMMENDED >> that sequence numbering be applied such that a different sequence number >> space per <sourceAddress::destinationAddress> duple be used" >> >> The difference is the protocol field. I see two options, modify SMF or add >> text clarifying the deviation and analyze for consequences. Or are the >> rules for Identification changed since 791? >> >> Teco > > > >_______________________________________________ >Manet-dt mailing list >Manet-dt@ietf.org >https://www1.ietf.org/mailman/listinfo/manet-dt -- Brian __________________________________ Brian Adamson <mailto:adamson@itd.nrl.navy.mil> _______________________________________________ Manet-dt mailing list Manet-dt@ietf.org https://www1.ietf.org/mailman/listinfo/manet-dt
- [Manet-dt] SMF: Usage of IPv4 Identification field Teco Boot
- [Manet-dt] RE: SMF: Usage of IPv4 Identification … Teco Boot
- [Manet-dt] RE: SMF: Usage of IPv4 Identification … Brian Adamson
- Re: [Manet-dt] SMF: Usage of IPv4 Identification … Brian Adamson
- RE: [Manet-dt] RE: SMF: Usage of IPv4 Identificat… Teco Boot
- RE: [Manet-dt] RE: SMF: Usage of IPv4 Identificat… Templin, Fred L