Re: [Roll] WG Last Call draft-ietf-roll-trickle-mcast-02

"Jonathan Hui (johui)" <johui@cisco.com> Mon, 05 November 2012 13:27 UTC

Return-Path: <johui@cisco.com>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A44221F853B for <roll@ietfa.amsl.com>; Mon, 5 Nov 2012 05:27:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ojdcXhrXqy3j for <roll@ietfa.amsl.com>; Mon, 5 Nov 2012 05:27:29 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) by ietfa.amsl.com (Postfix) with ESMTP id 39CFA21F8672 for <roll@ietf.org>; Mon, 5 Nov 2012 05:27:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7113; q=dns/txt; s=iport; t=1352122039; x=1353331639; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=BOzV/M+ttuuuh3DDz+wHXo5b52JivO5tibxz3/GGa8A=; b=edEsPNGc6GLTWdSGXKTFXoym+xrdgTRtDUEjL5YGoxcLKcLi2ZYJ6RGK UymwKNqC3DZphjjo/PApAyE78YHVjgmLnrCY5amIPNq9SBnZ4DljaPR2m XQLemXPXj6+3JL0wlq6Gic26Y3yC6IlbedfCXAvTi75MAptRs1SLd6N4N w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av4EAFS+l1CtJV2b/2dsb2JhbAA6CsNAgQiCHgEBAQMBEgEnPwULAgEIGAoUEDIlAgQOBQgah2IGmk2fX4wBEAWFRmEDpFSBa4JvgVwfHg
X-IronPort-AV: E=Sophos;i="4.80,715,1344211200"; d="scan'208";a="135866829"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-9.cisco.com with ESMTP; 05 Nov 2012 13:27:18 +0000
Received: from xhc-aln-x01.cisco.com (xhc-aln-x01.cisco.com [173.36.12.75]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id qA5DRI9E008227 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 5 Nov 2012 13:27:18 GMT
Received: from xmb-rcd-x04.cisco.com ([169.254.8.200]) by xhc-aln-x01.cisco.com ([173.36.12.75]) with mapi id 14.02.0318.001; Mon, 5 Nov 2012 07:27:18 -0600
From: "Jonathan Hui (johui)" <johui@cisco.com>
To: "<consultancy@vanderstok.org>" <consultancy@vanderstok.org>
Thread-Topic: [Roll] WG Last Call draft-ietf-roll-trickle-mcast-02
Thread-Index: AQHNt+Sjjd3eM9iNy0mrVYgwyyr3Lg==
Date: Mon, 05 Nov 2012 13:27:18 +0000
Message-ID: <B50D0F163D52B74DA572DD345D5044AF0F702989@xmb-rcd-x04.cisco.com>
References: <CCB50B52.1B637%d.sturek@att.net> <B50D0F163D52B74DA572DD345D5044AF0F6E519E@xmb-rcd-x04.cisco.com> <b4475c01a2da3a733b3fae9fccab42a7@xs4all.nl> <B50D0F163D52B74DA572DD345D5044AF0F6E9646@xmb-rcd-x04.cisco.com> <5091B2A3.1090205@exegin.com> <B50D0F163D52B74DA572DD345D5044AF0F6ECE93@xmb-rcd-x04.cisco.com> <c04faf7dd80fa0cc01bc2c5123da0c7b@xs4all.nl> <404.1351779310@obiwan.sandelman.ca> <21d5e8c9a5f4a517a8fa421497f37c8a@xs4all.nl> <19755.1351900015@sandelman.ca> <7a5d49da82e9b77ea808b389792ccdeb@xs4all.nl>
In-Reply-To: <7a5d49da82e9b77ea808b389792ccdeb@xs4all.nl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.21.124.110]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19340.004
x-tm-as-result: No--39.851600-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: text/plain; charset="us-ascii"
Content-ID: <70B6FB24A57F154DA723748589EB33FB@cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "roll@ietf.org WG" <roll@ietf.org>
Subject: Re: [Roll] WG Last Call draft-ietf-roll-trickle-mcast-02
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/roll>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Nov 2012 13:27:34 -0000

Hi Peter,

To reiterate my thoughts - this works because the IPv6 multicast address identifying the endpoints also identifies the MPL domain.  How would you limit the scope of disseminating a message sent to a well-known IPv6 multicast address?  Or is the answer (i) we don't support anything other than unicast-prefix-based multicast addresses or (ii) we don't limit the dissemination scope sent to anything else?

The options I see:

1) Use the same IPv6 multicast address for identifying both endpoints and MPL domain.
1a) MPL is not used to disseminate packets destined to other IPv6 multicast addresses.
1b) MPL may be used to disseminate packets destined to other IPv6 multicast addresses, but will disseminate across any connected region of MPL forwarders.

In supporting the cases above, a well-known link-local multicast address is used in the outer IPv6 header when encapsulation is used.  The outer header's MPL Option and the inner header's IPv6 destination address is used to determine whether to (i) pass up to higher layers and (ii) forward the packet.

If we decide to support inclusion of the MPL Option without encapsulation, then a forwarder needs to understand that the MPL Option and IPv6 destination address in the same IPv6 header are used to determine (i) pass up to higher layers and (ii) forward the packet.

2) Decouple the concept of MPL domain and application endpoint identifiers.
2a) Identify MPL domain using outer header's IPv6 destination address.
2b) Identify MPL domain using "instance" field in MPL Option.

Both cases above would allow limiting the dissemination scope of any arbitrary IPv6 multicast address, including well-known addresses.  Furthermore, the forwarding decision is made using only information contained in a single IPv6 header - option 2a relies on the MPL Option and the IPv6 destination address of the outer header, option 2b relies only on information contained in the MPL Option.

Both options 1 and 2 require managing another identifier space.  Option 1 requires configuring the devices with a prefix.  Option 2a requires configuring devices with a multicast group.  Option 2b requires configuring devices with an MPL instance.

Option 1 avoids the need to carry a separate MPL domain identifier since it requires the IPv6 multicast addresses to use the same prefix that identifies the MPL domain.

Comments/thoughts?

--
Jonatan Hui

On Nov 5, 2012, at 7:23 AM, peter van der Stok <stokcons@xs4all.nl> wrote:

> Hi Michael,
> 
> The answer to your question is given by the scenario of Dario that I reproduced below.
> 
> Actions  4 and 5 describe what I intended to limit the forwarding.
> 
> In addition I like to mention that when a multicast is intended for a group with members in N2 and N1
> the multicast address could have a prefix that is a prefix to Fd01::/64 and Fd02::/64.
> For example the MC address is then FF35:0040:FD0::1.
> In accordance, I suggest that all forwarders in N1 and in N2 accept and forward the message.
> 
> 
> As an aside I like to mention that BR1 and BR2 use the same channel for 802.15.4 because often there are many physical and organisational constraints who may dictate such an alocation.
> 
> Greetings,
> 
> Peter
> 
> -------- DArio scenario     -------
> 
> Example: Two border routers (BR1 and BR2) each forming a network:
> 
> --- Network 1 (BR1) ---
> Unicast prefix: FD01::/64
> Unicast-prefix-based multicast address prefix: FF35:0040:FD01::/96
> 
> --- Network 2 (BR2) ---
> Unicast prefix: FD02::/64
> Unicast-prefix-based multicast address prefix: FF35:0040:FD02::/96
> 1.	A non-MPL aware node in network 1 wishes to send a multicast to all nodes in network 1.
> 2.	It sends to multicast address FF35:0040:FD01::1, un-encapsulated.
> 3.	The packet is received by a MPL router in network 2 (N2R1).
> 4.	N2R1 finds no higher layer listening to FF35:0040:FD01::1 and, therefore, does not pass the packet up.
> 5.	N2R1 finds no matching routing information for FF35:0040:FD01::1 and does not forward the packet. The packet is, therefore, discarded.
> 6.	The packet is also received by a MPL router in network 1 (N1R1).
> 7.	N1R1 finds a higher layer listening to FF35:0040:FD01::1 and passes a copy of the packet up. Note: This would depend on whether or not any higher layers were actually interested in the mc group. Also, this step is not a prerequisite for the next step to occur.
> 8.	N1R1 finds matching routing information for FF35:0040:FD01::1, because it is a member of network FD01::/64
> 9.	N1R1 encapsulates the packet with a MPL HbH option such that the outer and inner destination addresses appear as: [FF02::MPL][FF35:0040:FD01::1], respectively.
> 10.	N1R1 transmits the new resulting packet.
> 11.	The packet is received by another MPL router in network 1 (N1R2).
> 12.	Seeing that the destination address is FF02::MPL, N1R2 decapsulates the packet (i.e. the original packet exits the tunnel).
> 13.	N1R2 finds a higher layer listening to FF35:0040:FD01::1 and passes a copy of the inner packet up. Note: This step is not a prerequisite for the next step to occur.
> 14.	N1R2 also finds matching routing information for FF35:0040:FD01::1, because it is a member of network FD01::/64.
> 15.	N1R2 re-encapsulates the packet with the *original* MPL HbH option such that the outer and inner destination addresses appear as: [FF02::MPL][FF35:0040:FD01::1], respectively.
> 16.	N1R2 transmits the resulting packet.
> 17.	The packet is received by yet another MPL router in network 2 (N2R2).
> 18.	Seeing that the destination address is FF02::MPL, N2R2 decapsulates the packet (i.e. the original packet exits the tunnel).
> 19.	N2R2 finds no matching routing information or listener for FF35:0040:FD01::1 and, therefore, discards the packet.
> 
> ----- end Dario scenario -------
> 
> Michael Richardson schreef op 2012-11-03 00:46:
>> see inline
>> 
>> peter van der Stok <stokcons@xs4all.nl> wrote:
>>    peter> It is related to the scope of the multicast, but not in the
>>    peter> administrative sense, but in an operational sense when
>>    peter> wireless forwarders receive MPL messages and they should be
>>    peter> able to filter only those messages that are targeted to the
>>    peter> subnet of which they are part.
>> 
>> Is this about configuring multicast (hardware) filters so that the wrong
>> nodes aren't woken up?
>> Is the case you speak up articulated by one of Robert's diagrams?
>> 
>>    peter> I explained the case earlier with an example.
>> 
>> Yes, I had asked a question about that too.  I didn't understand how
>> the two networks overlapped.  Do they share the same 15.4 key material?
>> Do they have the same beacons?
>> 
>> My feeling is that you are solving a problem which exists on paper, but
>> not in a real 15.4 network.  But, I could be completely wrong.
>