Re: [manet] draft-ietf-manet-aodvv2-13 review - a couple of big ticket Items

ietf@thomasclausen.org Wed, 20 April 2016 15:53 UTC

Return-Path: <ietf@thomasclausen.org>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B477612D7DF for <manet@ietfa.amsl.com>; Wed, 20 Apr 2016 08:53:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=thomasclausen.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eB2kv6f5RGYn for <manet@ietfa.amsl.com>; Wed, 20 Apr 2016 08:53:12 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1678812D86F for <manet@ietf.org>; Wed, 20 Apr 2016 08:53:12 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id DC6E0240150; Wed, 20 Apr 2016 08:53:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thomasclausen.org; s=1.tigertech; t=1461167591; bh=o07dzQFJWj3vmPShuiBefY0ApE0oR6wFk5elsY7IiIw=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=MVuDJ355eLeC6G2VpYAZIMs42KNJ0RO3WrktAgYNmB2BUmvKw9CYJAAugCRGb79BZ G8/eXGtcVkuWTyrN0lttx3kRV80UrwmWxFDUgYbA9I9unmgC/4iCQr1CgAvB/Zb9VD pacARVHilOmNx1skb2kxbrrd5iI4wvYOvFnyQAe8=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [192.168.147.111] (mtg91-1-82-227-24-173.fbx.proxad.net [82.227.24.173]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id CAD08240996; Wed, 20 Apr 2016 08:53:10 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_0F8B0BDA-293A-44D5-9F11-F7236B2B98A1"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: ietf@thomasclausen.org
In-Reply-To: <CA+-pDCcoKn3JUnQcAOAs7aXRsHRumnb=ut0sME1nutMv9nTNEQ@mail.gmail.com>
Date: Wed, 20 Apr 2016 17:53:09 +0200
Message-Id: <7BB65BEE-0057-4165-B853-8DD54F864031@thomasclausen.org>
References: <8C311D85-5C5A-4155-9705-6B09D0AA588B@thomasclausen.org> <CA+-pDCds+kZy2LUz_A0c3_sJKF03NFroh5oXXgQP0fw=aGRNxg@mail.gmail.com> <1AACF97D-5BE6-450A-8474-AE698D2100D5@thomasclausen.org> <CA+-pDCfgYJD=FEBgK3XFY8JEONg8-XZAz-F+001uZcxxrKWDAg@mail.gmail.com> <86E88A09-8C13-4049-AD0D-3C164C5E5E61@thomasclausen.org> <CA+-pDCcoKn3JUnQcAOAs7aXRsHRumnb=ut0sME1nutMv9nTNEQ@mail.gmail.com>
To: Justin Dean <bebemaster@gmail.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/manet/BrVML-MjPg0neYQuzP341OrLh1E>
Cc: Mobile Ad Hoc Networks mailing list <manet@ietf.org>
Subject: Re: [manet] draft-ietf-manet-aodvv2-13 review - a couple of big ticket Items
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/manet/>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2016 15:53:13 -0000

Justin, all,

Apologies for the delayed response to this. Day-job, and all that, I know you know what I’m talking about…

> On Mar 23, 2016, at 13:59, Justin Dean <bebemaster@gmail.com> wrote:
> 
> On Tue, Mar 22, 2016 at 5:04 PM, Thomas Heide Clausen <ietf@thomasclausen.org <mailto:ietf@thomasclausen.org>> wrote:
> 
> 
> On 22 Mar 2016, at 21:51, Justin Dean <bebemaster@gmail.com <mailto:bebemaster@gmail.com>> wrote:
> 
>> I think you're misunderstanding my point. It's my opinion that it's past time to come up with some elegant and complex solution to fix this issue. Simple and safe solutions should be preferred as we'd likely miss something. This is regardless of when the outstanding problem was first raised.
>> 
> 
> My point is that it is an issue that must be addressed: the requirements that multiple interfaces can be sharing the same address is old, I have raised it multiple times over the years. OLSRv2 was built to support it. Henning reported an additional use case.
> 
> The WG chair suggesting to disallow it, or to "bridge it", is *not* solving the issue raised. It is the WG chair ignoring legitimate requirements from the WG, which does not strike me as aligned with proper process.
> 
> The WG chair saying "it is past time to solve" a long raised (and ignored) issue does not strike me as being aligned with proper process either.
> 
> Thomas
> 
> Since you seem quite passionate about this issue let's work on fixing it then. 

Thanks, appreciate it.

> I looked back over NHDP to see how we "solved" this issue (vaguely remembering something about limiting the address assignment when two interfaces on a node could reach the same medium but was unable to find that).

I have not looked it up, but the trick is indeed in that area, plus what you write below also.

Part of the motivation is, that if you do not do that, you may (potentially) break MPR flooding (remember, the race condition diagrams …?), so restrictions like that are in order.

> It works because we tag neighboring addresses with either link or neighbor status based on the incoming interface on which we received hello messages.
> It seems to me that if AODVv2 limited RREP messages to the interface on which the RREQ came in on (multicast or otherwise) that this would fix the issue.

Did anyone work through that/if this approach would work? I haven’t actually constructed a proof, but for a network without reduced relay set flooding optimizations, I’ve not been able to find a counter-example which would easily break it [as described above], which is at least a good thing ;)

Now, as to how to implement it….

> To do this the Neighbor Table (section 6.3) would have to be updated to include the local interface on which this neighbor is associated with. 
> When attempting to check bidirectionality messages would only be sent out on the listed interface.  This would be similar to the link table in NHDP and link tlv types.

Would that not entail an additional restriction required, such that the neighbor (as identified by an address) is reachable only over one, but not the other, interface? I.e., if the same address is used for two interfaces on a router, then those two must unequivocally be on different channels?

It seems that this avenue would be well worth developing, actually.

Best,

Thomas 


> 
> Justin