Re: [manet] A proposed draft "draft-peterlau-manet-topology-refresh"

"Peter S Lau (peterlau)" <peterlau@memphis.edu> Mon, 09 January 2017 20:06 UTC

Return-Path: <peterlau@memphis.edu>
X-Original-To: manet@ietfa.amsl.com
Delivered-To: manet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F347A1295A2 for <manet@ietfa.amsl.com>; Mon, 9 Jan 2017 12:06:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.057
X-Spam-Level:
X-Spam-Status: No, score=-3.057 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.156, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GgMkCb6fyNiR for <manet@ietfa.amsl.com>; Mon, 9 Jan 2017 12:06:54 -0800 (PST)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0082.outbound.protection.outlook.com [104.47.37.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2979D120727 for <manet@ietf.org>; Mon, 9 Jan 2017 12:06:54 -0800 (PST)
Received: from BLUPR0401MB1731.namprd04.prod.outlook.com (10.162.215.21) by BLUPR0401MB1731.namprd04.prod.outlook.com (10.162.215.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.829.7; Mon, 9 Jan 2017 20:06:52 +0000
Received: from BLUPR0401MB1731.namprd04.prod.outlook.com ([10.162.215.21]) by BLUPR0401MB1731.namprd04.prod.outlook.com ([10.162.215.21]) with mapi id 15.01.0829.013; Mon, 9 Jan 2017 20:06:52 +0000
From: "Peter S Lau (peterlau)" <peterlau@memphis.edu>
To: Justin Dean <bebemaster@gmail.com>
Thread-Topic: [manet] A proposed draft "draft-peterlau-manet-topology-refresh"
Thread-Index: AQHSZeN4eitj+utMfUKMGDE1x3UIoaEoCDCAgAAKmOCAAGTvgIAII4rH
Date: Mon, 09 Jan 2017 20:06:52 +0000
Message-ID: <BLUPR0401MB17312C9FDBE9613555713CC3C9640@BLUPR0401MB1731.namprd04.prod.outlook.com>
References: <BLUPR0401MB1731F4A2461F01E0550CBE70C96E0@BLUPR0401MB1731.namprd04.prod.outlook.com> <97591271-9997-4245-BDED-056BE872AF8B@jiaziyi.com> <B31EEDDDB8ED7E4A93FDF12A4EECD30DA51A9158@GLKXM0003v.GREENLNK.net>, <CA+-pDCc256=xny66r_M70YTDpkg+mnHsAuKY4YrPEce63Tp56Q@mail.gmail.com>
In-Reply-To: <CA+-pDCc256=xny66r_M70YTDpkg+mnHsAuKY4YrPEce63Tp56Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=peterlau@memphis.edu;
x-originating-ip: [132.245.8.5]
x-ms-office365-filtering-correlation-id: dee17580-7b36-4462-1f40-08d438cb0d92
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001); SRVR:BLUPR0401MB1731;
x-microsoft-exchange-diagnostics: 1; BLUPR0401MB1731; 7:Y+GQqL4DuPGsrzmeHHHEEQhBm4NWbjbl9eT9cFsQgJf+uqBP7ofoQwJNUoAiV6tC9L64MFZ7Jrf+Y6POGp3VcBGwDH+vytQDMyUuL/GCChbMYUav1jwW4KShzebz1vQRYa7I+/CMCJddDfc5WV3xWlL+1IgHIfeZnbLrivk8kT7gBflIXnuEsu790EYlAlHJ6VLDUZtEa2xBUSrVrdpbggUOwI2jDetJm3atH0OXGq4OH2bTgbXdV0ZDHeMCwZqcQtRkgIFYF3XBblf2JIq2unuc0ybOfFvJz+urlFoheomRJfvFhVH4W+SOQb/H9JYSa3zzBBw+aRzY6AeHsCOd2p8OTQq2VUdIA+lazWLrH+f0JMpXmJb4b8Bc9knWmD5kxfjhgdngPxGlDgxlzXMg2KGkwRwOTPCRUvxHP47C4leY5HUSwCtOFDNZJV54OuwakcivNi2RbMM2vZCctWiNAA==
x-microsoft-antispam-prvs: <BLUPR0401MB1731FE06F5F9C2E52178D1F7C9640@BLUPR0401MB1731.namprd04.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(113876321673885)(278428928389397)(192374486261705)(84894511551618);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6041248)(20161123562025)(20161123555025)(20161123564025)(20161123560025)(6072148); SRVR:BLUPR0401MB1731; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0401MB1731;
x-forefront-prvs: 0182DBBB05
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(7916002)(39450400003)(189002)(377454003)(199003)(24454002)(7696004)(3846002)(230783001)(6606003)(19627405001)(8936002)(6116002)(102836003)(110136003)(105586002)(106356001)(106116001)(8676002)(88552002)(7066003)(4326007)(5660300001)(81166006)(81156014)(92566002)(6916009)(9686003)(2950100002)(6306002)(68736007)(1411001)(66066001)(2906002)(3280700002)(3660700001)(122556002)(93886004)(86362001)(50986999)(54906002)(3900700001)(74316002)(97736004)(101416001)(6436002)(7736002)(345774005)(54896002)(7906003)(229853002)(38730400001)(189998001)(606005)(39060400001)(33656002)(5890100001)(99286003)(55016002)(76176999)(6506006)(75432002)(77096006)(54356999)(2900100001)(10126002)(25786008); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR0401MB1731; H:BLUPR0401MB1731.namprd04.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: memphis.edu does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BLUPR0401MB17312C9FDBE9613555713CC3C9640BLUPR0401MB1731_"
MIME-Version: 1.0
X-OriginatorOrg: memphis.edu
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Jan 2017 20:06:52.1477 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ae145aea-cdb2-446a-b05a-7858dde5ddba
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0401MB1731
Archived-At: <https://mailarchive.ietf.org/arch/msg/manet/DjB8ch9vpVq3KZl8zAhY5Nk_AWo>
Cc: "Dearlove, Christopher (UK)" <chris.dearlove@baesystems.com>, "manet@ietf.org" <manet@ietf.org>
Subject: Re: [manet] A proposed draft "draft-peterlau-manet-topology-refresh"
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/manet/>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jan 2017 20:06:58 -0000

Dear all:

Thank you for the comments. I am going to respond to some comments and
leave the others at a later time.

Thanks,

Peter Lau



1. Response to the comment "there thus may or may not be a space for a
lightweight proactive protocol" made by Christopher.

1.a TRP is intended for nearby social network where people are moving
around with smartphones (installed with TRP) discover and communicate
with each other on the fly when they move into the vicinity of each
other. I believe OLSR/OLSv2 and others were not conceived to support such
an application. I list three requirements that may justify a space for a
lightweight protocol, like TRP.

1.b Delay is very important in highly interactive applications, such as
nearby social network, that must be kept low. This calls for a proactive
protocol. For such a real-time interactive application, it is reasonably
to expect the response time to be a fraction of a second. Performance
study in [WTS2015] shows that TRP achieves sub-second message end-to-end
delay. A rough estimate of OLSR/OLSRv2 message end-to-end delay includes
HNDP (link break detection) delay, TC message delay, and routing set
calculation delay. An experiment done in [www.dtic.mil/cgi-bin/
GetTRDoc?AD=ADA521173] has demonstrated that the delay for OLSR is
multiple seconds for a 18-node manet. Perhaps, solely from the delay
perspective for the intended application, a lightweight protocol, like
TRP, is warranted.

1.c Conserving battery energy for smartphones is another important issue.
TRP attacks the problem in two fronts: less taxing the CPU with a
lightweight protocol and selecting forwarding paths to exclude devices
with low remaining battery energy. By contrast, OLSR/OLSRv2 are running
in routers (which are not smartphones) and presummably have no energy
depletion issue.

1.d Participants in a nearby social network are constantly and rapidly
changing. Users need to know who are in the network to be able to select
them to chat. TRP solves the problem by periodically presenting to the
users with an updated list of all users who are happen nearby, i.e., in
the nearby social network. OLSR/OLSRv2 and others do not have such
capability essential to nearby social networks.

1.e The above argue for a lightweight protocol for nearby social
networks. I think we need to decide first whether there is a space for a
lightweight protocol, like TRP. Are there any existing protocols that can
support nearby social network applications?

2. Response to the comment "Could you please briefly introduce what's the
difference between TRP and other proactive protocols like OLSR(v2)?" made
by Jiazi

2.a OLSR/OLSRv2 use MPRs to aggregate LS information to thereby reducing
LS flooding overhead and for topology reduction. The current form of TRP
does not aggregate type 2 control information. After some thought,
aggregation may be possible in TRP, any ideas?

2.b While OLSR/OLSRv2 requires neighborhood discovery, TRP does not,
contributing to its light weight. Because nearby social networks are
highly dynamic (users are constantly moving), a discovered neighborhood
could quickly become outdated.

2.c While OLSR/OLSRv2 carry out routing set calculation from the network
topology graph after receiving TC messages for the link states, TRP
creates and updates forwarding entries on the fly when processing
individual control messages, eliminating the extra calculations. This
contributes to the TRP's light weight.

2.d While OLSR/OLSRv2 can actively remove advertised content, TRP relies
on timeout to remove users, who have left the network, from the user
list.

2.e While OLSR/OLSRv2 requires bidirectional links, TRP does not test if
a link is bidirectional because directionality could quickly change as
users are moving around. After some thought, it makes sense that once a
node has chosen the next node for a destination, the node confirms the
bidirectional link between the next node and itself.

2.f TRP supports devices with and without cellular data, with and without
a connection to an access point, and therefore, they may or may not have
an IP address. A TRP node self-assigns a node id (which is neither a 4-
byte nor 16-byte IP address but a 2-byte quantity for overhead
efficiency) and relies on id collision detection. Unique IP addresses are
configured (or by some other means) into OLSR/OLSRv2 routers.

2.g While OLSR/OLSRv2 operates up to the transport layer, TRP remains in
the data link layer.

2.h Smartphones have very limited battery energy but OLSR/OLSRv2 routers
do not have energy limitation.

2.i A TRP user can dynamically limit other users to within a physical
distance from herself. OLSR/OLSRv2 do not have such capability.

2.j A TRP user is constantly updated with a list of users within a
distance from her. OLSR/OLSRv2 do not have such capability.

2.k TRP users can independently choose how frequent to broadcast their
presence in the network. OLSR/OLSRv2 do not allow such an option.

2.l While OLSR/OLSRv2 are optimized for large and dense networks, TRP
must support large/small and dense/sparse networks.

2.m While OLSR/OLSRv2 supports security, TRP in its current state does
not call for security. I cannot think of scenarios that require security
in a nearby social network application. Any ideas?

2.n I think the protocol differences are due to the different intended
applications.

3. Response to the comment "Especially, it would be very helpful for the
readers to understand by providing a bit more text about the mechanism of
the protocol in the overview" made by Jiazi

3.a A node (say node X), upon receiving a control message, knows the node
who originated the message (say Node S, the originator) and the node from
which the message was received (say Node N, the forwarder). It is because
the originator puts its id in the control message and the forwarder
modifies the message by putting its id in it before retransmitting it. N
must be a neighbor of X. For example, if S sent the message, then N = S.

3.b An entry (destination node, forwarding node) = (S, N) in the
forwarding table is either created or updated in X. Of course the entry
contains other information such as sequence number, hop count, etc.)

3.c When X needs to forward a user message to S, X will transmit it to N.
The user message may be generated locally in X or forwarded to X by a
neighbor of X.

3.d It is entirely possible that X receives two or more control messages,
each with the same originator but different forwarders. Among these
control messages, X will select the one based on the sequence number, hop
count, etc. to create or update the entry. The other control messages are
discarded.

3.e X then modifies the selected message by putting its id in it and
retransmits it.

3.f As the control messages, with S as the originator, propagate
throughout the network, a tree rooted at S is built. The size of the tree
is limited by the maximum allowable hop count and the physical distance
between S and a leaf node.

3.g Since every node originates control messages, the result is a
complete topology of end-to-end paths.

3.h The tree rooted at a node is updated every time the node transmits a
control message. Since every node periodically transmits control
messages, the result is that the topology is constantly tracking the
movement of the users.

Peter Lau
The University of Memphis
Electrical and Computer Engineering


________________________________
From: Justin Dean <bebemaster@gmail.com>
Sent: Wednesday, January 4, 2017 9:46 AM
To: Peter S Lau (peterlau)
Cc: Jiazi Yi; manet@ietf.org; Dearlove, Christopher (UK)
Subject: Re: [manet] A proposed draft "draft-peterlau-manet-topology-refresh"

Thank you for the submission. I too have some misgivings about the documents current state and tradeoffs with regard to packet format and lack of use of the Manet building blocks which seem like they could be easily incorporated. RFC5444 has Hop-limit/count and sequence number fields, and NHDP (RFC6130) has neighbor discovery and fixes the bidirectional problem. In addition to the other security pieces and leveraging of CDS algorithms found in either SMF or OLSRv2 one could build a similar protocol with only the addition of a message type and a few TLVS. The two that jump out at me for being useful beyond just this proposed protocol would be GPS and Application/Higher Layer ID TLV encodings.

Justin Dean

On Wed, Jan 4, 2017 at 5:10 AM, Dearlove, Christopher (UK) <chris.dearlove@baesystems.com<mailto:chris.dearlove@baesystems.com>> wrote:
There some immediate retrograde steps compared to existing protocols: fixed message format (making adding new information to be used by the protocol hard), forwarding by blind flooding (hence scalability issues), and no security (an example of something that to add would require a changed format). The rather peculiar link metric (in effect) that mixes hop count, time and battery power leads to many questions (and while not simply hop count is likely to be a backward step in flexibility). There’s a rather unusual message body that is not used by this protocol but said to be for the application, which is a bit of a layering issue. GPS is included with no indication how to use and hence no indication why it is there. They are also underspecified in terms of format information (and for GPS at least even size of field). There’s quite a lot underspecified, such as route determination, and there’s no consideration of how the acknowledgements are used - and even what the meaning of acknowledgements in what must be (but is not so described) as a local broadcast/multicast message (with potentially unknown recipients). I don’t see any handling of the problems that link asymmetry produces. I’d have issues over timing parameters and their management (these being not reflected in the message). And in a proposed IETF protocol, I don’t see any IP addresses. That it hasn’t even caught up with the existence of RFC 7181 (only quoting RFC 3626) is not a good sign. It is suggested that RFC 3626 (and hence, no doubt, RFC 7181) is too complex. That may or may not be so (there are reasons for the added complexity in RFC 7181, which need to be understood before deciding whether you need them) and there thus may or may not be a space for a lightweight proactive protocol, but this is not that protocol in current or foreseeable evolutionary form.

--
Christopher Dearlove
Senior Principal Engineer
BAE Systems Applied Intelligence Laboratories
__________________________________________________________________________

T:  +44 (0)1245 242194<tel:+44%201245%20242194>  |  E: chris.dearlove@baesystems.com<mailto:chris.dearlove@baesystems.com>

BAE Systems Applied Intelligence, Chelmsford Technology Park, Great Baddow, Chelmsford, Essex CM2 8HN.
www.baesystems.com/ai<http://www.baesystems.com/ai>
BAE Systems Applied Intelligence Limited
Registered in England & Wales No: 01337451
Registered Office: Surrey Research Park, Guildford, Surrey, GU2 7YP

From: manet [mailto:manet-bounces@ietf.org<mailto:manet-bounces@ietf.org>] On Behalf Of Jiazi Yi
Sent: 04 January 2017 09:08
To: Peter S Lau (peterlau)
Cc: manet@ietf.org<mailto:manet@ietf.org>
Subject: Re: [manet] A proposed draft "draft-peterlau-manet-topology-refresh"


*** WARNING ***
This message originates from outside our organisation, either from an external partner or the internet.
Consider carefully whether you should click on any links, open any attachments or reply.
For information regarding Red Flags that you can look out for in emails you receive, click here<http://ws-sites.ent.baesystems.com/sites/HOSECStdsLibrary/StandardsLibrary/Everyone/Red%20Flags.pdf>.
If you feel the email is suspicious, please follow this process<http://ws-sites.ent.baesystems.com/sites/HOSECStdsLibrary/StandardsLibrary/Everyone/Dealing%20With%20Suspicious%20Emails.pdf>.
*** WARNING ***
EXTERNAL EMAIL -- This message originates from outside our organization.

Dear Peter,

Thanks very much for your draft.

Looking at the overview section:

   TRP is a table-driven proactive data forwarding protocol and at the
   same time allows users to announce their presence to the network.  A
   node, wishing to be contacted, periodically broadcasts control
   messages about itself to the network.  A node, receiving control
   messages, caches an optimal path to each of the originators of the
   control messages.

Could you please briefly introduce what’s the difference between TRP and other proactive protocols like OLSR(v2)?

Especially, it would be very helpful for the readers to understand by providing a bit more text about the mechanism of the protocol in the overview.

best

Jiazi

On 3 Jan 2017, at 18:09, Peter S Lau (peterlau) <peterlau@memphis.edu<mailto:peterlau@memphis.edu>> wrote:

Dear manet Working Group:

I have uploaded a proposed draft entitled "draft-peterlau-manet-topology-refresh-00". for the WG to consider.

Regards,
Peter Lau

Peter Lau
The University of Memphis
Electrical and Computer Engineering
_______________________________________________
manet mailing list
manet@ietf.org<mailto:manet@ietf.org>
https://www.ietf.org/mailman/listinfo/manet


********************************************************************
This email and any attachments are confidential to the intended
recipient and may also be privileged. If you are not the intended
recipient please delete it from your system and notify the sender.
You should not copy it or use it for any purpose nor disclose or
distribute its contents to any other person.
********************************************************************

_______________________________________________
manet mailing list
manet@ietf.org<mailto:manet@ietf.org>
https://www.ietf.org/mailman/listinfo/manet