One document matched: draft-ruffino-conn-scenarios-00.txt
MANET S. Ruffino
Internet-Draft P. Stupar
Expires: August 15, 2005 TILAB
T. Clausen
LIX
S. Singh
SAMSUNG AIT
February 11, 2005
Connectivity Scenarios for MANET
draft-ruffino-conn-scenarios-00
Status of this Memo
This document is an Internet-Draft and is subject to all provisions
of Section 3 of RFC 3667. By submitting this Internet-Draft, each
author represents that any applicable patent or other IPR claims of
which he or she is aware have been or will be disclosed, and any of
which he or she become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 15, 2005.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
This Internet Draft aims at describing a wide spread set of possible
connectivity scenarios involving mobile ad-hoc networks, in order to
Ruffino, et al. Expires August 15, 2005 [Page 1]
Internet-Draft MANET scenarios February 2005
provide reference for standardization effort in this field. The
aspects considered for definition and classification of the scenarios
are number and characteristics of the gateways that connect MANET
nodes to external networks. Analysis will range from a scenario
where no connectivity is provided, i.e. an isolated MANET, to more
complex scenario where a MANET has multiple mobile Gateways.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.1 Isolated MANET . . . . . . . . . . . . . . . . . . . . . . 6
3.2 MANET connected to an external network . . . . . . . . . . 6
3.2.1 Fixed Gateways . . . . . . . . . . . . . . . . . . . . 8
3.2.2 Mobile Gateways scenario . . . . . . . . . . . . . . . 9
3.3 MANET intermittently connected to external networks . . . 10
4. Roaming from a MANET to an Infrastructure Network . . . . . . 11
5. Security Considerations . . . . . . . . . . . . . . . . . . . 12
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 15
A. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 16
Intellectual Property and Copyright Statements . . . . . . . . 17
Ruffino, et al. Expires August 15, 2005 [Page 2]
Internet-Draft MANET scenarios February 2005
1. Introduction
MANET were initially designed to be employed in highly dynamic and
unpredicatable environments, characterized by high mobility of users
and terminals. MANETs are essentially autonomous, self-configuring,
self-healing networks, whose mobile nodes discover other nodes and
supported services in an automatic fashion. MANET routing protocols,
as studied in IETF, enable two generic MANET nodes to exchange data
traffic through multi-hop connections, if a 1-hop radio link between
them is not available. In this way, nodes can freely move within the
MANET: routing protocols dynamically react to movement and constantly
discover the optimal path according to a predifined metric, e.g.
number of hops. If an intermediary node, belonging to a path between
a source and a destination, fails, traffic is automatically re-routed
through an alternative path.
RFC2501 [1] defines a MANET and also introduces the possibility to
connect a MANET to an external network, by means of gateways. These
are devices equipped with two or more network interfaces: a MANET
interface and an interface typically connected to one or more
non-MANET networks. MANET nodes exchange traffic among themselves
using multi-hop paths and can reach outside hosts and the Internet by
means of the gateways. In this case the MANET acts as a "stub"
network, whose nodes route traffic originating and/or terminating
within the MANET itself.
Operators, Network and Service providers show increasing interest in
this type of network, as a consequence of the wide spread deployment
of low-cost radio technologies such as IEEE802.11a/b/g/h and the
increasing customer base. Initially, commercial MANETs are expected
to be deployed as an extension to the traditional infrastructure
networks, to realize the so-called hybrid networks.
An example of this networks are the Mesh Networks, used to extend the
coverage area of a public hot-spot or to realize large-scale low-cost
wireless coverage in urban areas. A further interesting application
and research field is represented by multi-hop cellular networks:
MANETs connected to cellular WAN networks. In this case MANETs can
be used to realize an extended wireless coverage in areas where
"traditional" cellular network is not available.
Many proposals and projects that introduce integration between MANET
and 3G+ networks exist: for example, see [2], [3], [4] and [5].
This Internet Draft aims at describing and analyzing connectivity
scenarios for MANET, to provide a reference for standardization
effort in this field. In fact, the scenarios described herein can be
used as a starting point for the design of solutions to technical
Ruffino, et al. Expires August 15, 2005 [Page 3]
Internet-Draft MANET scenarios February 2005
problems, such as address autoconfiguration, gateway discovery,
Duplicate Address Detection and global prefixes management.
Analysis will range from a scenario where no connectivity is
provided, i.e. an isolated MANET, to more complex scenarios where a
MANET has multiple mobile Gateways. This document is structured in
the following way: in Section 2 a glossary for commonly used terms is
given; in Section 3 connectivity scenarios for a MANET are listed.
In this section particular attention is paid to the connection of a
MANET with other external networks, by means of one or more fixed
(Section 3.2.1) or mobile wireless gateways (Section 3.2.2). In
Section 4 the roaming of a node from a Infrastractured wireless LAN
to an ad-hoc network is considered.
Ruffino, et al. Expires August 15, 2005 [Page 4]
Internet-Draft MANET scenarios February 2005
2. Terminology
Node
An IPv4/IPv6 device which is a MANET element: it runs a MANET
routing protocol and exchanges data with other nodes within a
MANET and with hosts located within external networks. A node has
at least one physical interface connecting it to the MANET.
Gateway
A node equipped with at least two interfaces, one of which
connects it to an external network, i.e. non-MANET, and can be
wired or wireless.
Host
An IPv4/IPv6 terminal/computer, external to the MANET. Host is
defined here as only "External" to differentiate it from the nodes
of the MANET.
Wireless Interface (or MANET interface)
The physical network interface that connects a node to the MANET.
Radio Interface (or Cellular Interface)
The physical network interface that can connect a gateway to an
external Wireless Wide Area Network, owned and administered by an
operator.
Ruffino, et al. Expires August 15, 2005 [Page 5]
Internet-Draft MANET scenarios February 2005
3. Scenarios
In this section, we describe the typical connectivity scenarios of a
MANET. This section is structured as follows: first, the case of an
isolated MANET is examined, where no gateways exist. Then, various
scenarios of a connected MANET are given, classified by the
characteristics and the number of gateways, which can be fixed and/or
mobile. In the end, the case of an intermittently connected MANET is
analyzed.
3.1 Isolated MANET
An isolated MANET is a network that is autonomously set-up among
wireless mobile nodes localized in the same geographical area. Nodes
activate Layer 2 radio links, by which they can exchange traffic with
their neighbors, and run an ad-hoc routing protocol, which enables
multi-hop data forwarding through intermediate nodes. Routing
protocol constantly discovers routes between nodes, in a proactive
([13], [15]) or reactive fashion ([14], [16]): this enables each node
to route traffic to all other nodes within the MANET also during
movements.
In this type of MANET there is no connection to an external network:
all traffic is generated by MANET nodes and addressed to MANET nodes.
Typical applications of this scenario are temporary networks, that
must be set-up in areas where neither wireless coverage nor
infrastructure exist. Examples can be emergency networks used for
disaster recovery, battlefield applications, electronic surveillance.
Other examples can be found in occasional work meetings, where
networks are set-up to enable file sharing among co-workers.
3.2 MANET connected to an external network
In this scenario a MANET is connected to an external network by means
of one or more gateways (Figure 1). A generic MANET node can
exchange data traffic with every other node through multi-hop paths
and communicate with hosts located in the external network, routing
its uplink traffic towards a gateway. Such gateway, in turn, will
receive return traffic from the host and will route it to the source
node.
Ruffino, et al. Expires August 15, 2005 [Page 6]
Internet-Draft MANET scenarios February 2005
H1
|
+---------------+
| Internet |**
+---------------+ *
* * *
* * *
GW1** * GW3
| +--GW2-------+
| | |
---N1--------+ |
/ \ |
N4 \ N2
N3-----/
Figure 1: MANET interconnected to an external network
Gateways play a critical role here. If the number of nodes in the
MANET increases, gateways can become bottlenecks, as they route an
increasing and possibily huge amount of traffic. This also depends
on the available bandwidth on the uplink interface. Moreover,
gateways can be equipped with a number of additional features. For
example, they could participate to the external routing protocol, in
order to announce internal routes to external routers and hosts,
possibly performing some kind of aggregation. They can act as
enforcement points for security purposes: they can control access to
external networks and, following a common practice, they can enforce
Ingress Filtering on MANET generated traffic. Finally they can also
provide services like DNS to MANET nodes.
This scenario can be expanded, depending on the characteristics of
the network interface connecting gateways to the external network: it
can be either wired or wireless, which can, in turn, be of a
different type with respect to the MANET interface. In the first
case Gateways are fixed, while in the second case they can also be
mobile, as the other MANET nodes.
Moreover, a MANET can have only one gateway (fixed or mobile) or can
have multiple gateways (fixed or mobile). Other than guaranteeing a
high degree of reliability and fault tolerance to the entire MANET,
the presence of multiple gateways enables load balancing among the
gateways themselves. This can be very useful especially when the
external network is a low-throughput cellular WAN, such as GPRS/EDGE,
in order not to overload a single gateway with traffic potentially
generated by many nodes at the same time. Single traffic flows of
multiple nodes or many flows of a single node can be routed through
Ruffino, et al. Expires August 15, 2005 [Page 7]
Internet-Draft MANET scenarios February 2005
different gateways, consequently implying an improvement of the
overall performances of the MANET.
Gateways can also be equipped with additional resources in order to
grant better fault tolerance to the entire MANET: additional energy
resources, more processing power, more volatile and non-volatile
memory. This is especially true in case of fixed gateways, that can
be directly powered and directly operated.
The following sections detail usage scenarios for fixed and mobile
gateways.
3.2.1 Fixed Gateways
In this scenario, gateways are deployed in predefined positions
planned by the network operator. Each gateway is connected to the
external network by means of a wired or wireless interface.
Mesh networks and networks used for environmental surveillance can be
categorized under this scenario.
o Mesh Networks: these are probably the most widespread ad-hoc
networks. In a Mesh Network, user terminals (nodes) exchange
traffic between them directly through a layer-2 radio link and
using other nodes or fixed wireless devices as intermediate
relays. A Mesh Network is typically connected to an external
infrastructure network by means of fixed wired Access Points,
which act as gateways and typically connect the Mesh to an
external infrastructure network.
Mesh Networks can be further classified depending on the kind of
devices which form the mesh itself. In fact, in some deployments,
the mesh is realized only among the wireless Access Points, which
are devices endowed with two wireless interfaces: the first
interface forms the mesh with other peer access points,
participating to a routing protocol, the second interface provides
local connectivity to nodes, which cannot set-up a network
themselves, as they don't run any routing protocol. In another
case the mesh is realized among all the nodes, which have to run a
routing protocol.
Applications of this networks are Internet public access
(browsing, email etc.) by mobile users from outdoor areas,
wireless coverage of corporate building to give employees access
to shared data and commonly used services (email, Intranet
browswing). These solutions can bring to savings on cabling and
maintenance costs.
o Surveillance networks: several wireless nodes endowed with sensors
of various kinds are spread over high enviromental risk areas
Ruffino, et al. Expires August 15, 2005 [Page 8]
Internet-Draft MANET scenarios February 2005
(e.g. fires in wooden areas). They communicate through multi-hop
connections and run a routing protocol. When an emergency
situation arises, data collected by sensors are transmitted from
the collecting nodes upwards one or more gateways (which can have
both a wired or wireless interface) and conveyed to a manned
monitoring station.
Topologies of this kind of network are typically static, as the
nodes are installed in fixed positions within the monitored areas.
Moreover, these networks are characterized by multiple constant
low-throughput data flows going from the sensors to the gateways.
3.2.2 Mobile Gateways scenario
In this scenario, the gateway's radio interface, connecting the MANET
to the external network, can be a cellular WAN interface (GSM, GPRS,
EDGE, UMTS), a broadband wireless MAN (WMAN) interface (e.g.
802.16x, 802.20) or a WLAN interface (802.11a/b/g/h/j). In each of
these cases, gateways can forward uplink traffic outside the MANET
only if located within the transmission/reception range of one or
more Base Stations or Access points. Gateways not only can move
freely within the coverage area, but they can also move outside this
area. In such case, the gateway can't forward uplink traffic
destined to external hosts anymore, nor downlink traffic destined to
internal nodes.
In this outlined scenario, the MANET can be seen as a coverage
extension of the radio infrastractured network to which the gateways
are connected. The primary benefit of such extension is that local
communication between two nodes is performed without using any
cellular radio resource, e.g. radio channels. Another benefit is
the possibility to grant network access also to those terminals that
are not equipped with a cellular radio interface (e.g. access
sharing). The implication of this business model on security,
accounting and rewarding aspects are out of the scope of this draft,
neverthless must be carefully investigated.
A more advanced scenario can be realized when most of the nodes are
also equipped with two heterogeneous interfaces. In this case
gateways can be "occasional": they can be nodes that, after setting
up the connection towards the external network, whenever located
within its coverage area, can start forwarding other nodes' outbound
packets. In this kind of scenario, gateways can be "special" nodes
endowed with additional features, but they can also be ordinary MANET
nodes, such as mobile phones and PDAs. In this last case, gateways
are characterized by low computational power and limited energy
resources. Although the MANET can again exploit benefits given by
multiple gateways, additional issues arise: in fact, gateways are not
under operators control anymore. It's possible that the owner of the
Ruffino, et al. Expires August 15, 2005 [Page 9]
Internet-Draft MANET scenarios February 2005
gateway establishes abruplty to turn his terminal off or to tear down
the connection towards the cellular network, in order to save battery
life. Thus, the number and the position of gateways are higly
dynamic and this can cause frequent re-routing of uplink data flows.
o Automotive scenario: a MANET is set up by a group of vehicles.
One or more of these may become a mobile gateway after connecting
to the Wireless LAN of a petrol station or setting up an UMTS
connection and, therefore, may be used by the other vehicles of
the MANET to exchange traffic with the external hosts.
3.3 MANET intermittently connected to external networks
Gateways in a MANET, especially if mobile and equipped with a radio
interface, may not be permanently connected to the external network.
MANETs of this kind have the characteristics of both MANET described
in Section 3.1 (while not connected) and of the ones described in
Section 3.2 (while connected).
Most of the nodes belonging to a MANET of this kind shall exploit the
connection temporally set up to an external network to communicate
with hosts they can't reach while the MANET is isolated. As a
consequence, such MANETs may experience a burst of exchanged traffic
while connected to the external network. The amount and the
distribution of such traffic depends on how long the MANET can be
connected to an external network.
o Train network: a MANET built in a train, which is connected while
stopped at the station and disconnected otherwise. In particular,
if the MANET is set up by some passengers, it may happen that
while the train is stopped at the station, some of the nodes may
become gateways. For example, the station area may be covered by
a wireless technology and some nodes equipped with a non-MANET
interface of the same technology may therefore set up a connection
to the external network. In this case, most of the users may use
the gateways to connect to their mail server, download and
eventually send their e-mails: the MANET they belong to may
therefore experience a burst of traffic exchanged with the
external network.
Ruffino, et al. Expires August 15, 2005 [Page 10]
Internet-Draft MANET scenarios February 2005
4. Roaming from a MANET to an Infrastructure Network
A mobile node, connected e.g. to a IEEE 802.11 network
(infrastructure mode), can roam to a nearby IEEE 802.11 (ad-hoc mode)
MANET. This situation can be very commonly experienced by a mobile
node, during its movement, even not voluntarily. It is worth noting
that such roaming doesn't involve only layer-2 operations. It is
indeed likely that the procedures used within IEEE 802.11 network,
e.g. for address configuration or duplicate address detection, are
different from those used in a MANET. This is mainly due to the fact
that a MANET is characterized by multi-hop paths while in a WLAN all
hosts are connected to the same link.
There can be also situation where the destination MANET uses a
different radio technology for multi-hop links. This scenario, not
addressed in this document, brings added difficulties, because radio
interface should be dynamically switched to use a different Layer 1
and 2 technology.
Ruffino, et al. Expires August 15, 2005 [Page 11]
Internet-Draft MANET scenarios February 2005
5. Security Considerations
This document raises no security issue.
Ruffino, et al. Expires August 15, 2005 [Page 12]
Internet-Draft MANET scenarios February 2005
6. IANA Considerations
This document has no actions for IANA.
7. References
[1] Corson, S. and J. Macker, "Mobile ad hoc networking (MANET):
Routing protocol performance issues and evaluation
considerations", RFC 2501, January 1999.
[2] Siebert, M., "On Ad Hoc Networks in the 4G Integration
Process", Med-Hoc 2004 , June 2004.
[3] "Ambient Networks", http://www.ambient-networks.org .
[4] "Daidalos", http://www.ist-daidalos.org .
[5] "World Wireless Research Forum",
http://www.wireless-world-research.org .
[6] Wakikawa, R., Malinen, J., Perkins, C., Nilsson, A. and A.
Tuominen, "Global connectivity for IPv6 Mobile Ad Hoc
Networks", I-D draft-wakikawa-manet-globalv6-03.txt, October
2003.
[7] Cha, H., Park, J. and H. Kim, "Extended Support for Global
Connectivity for IPv6 Mobile Ad Hoc Networks", October 2003.
[8] Jeong, J., Park, J., Kim, H. and D. Kim, "Ad Hoc IP Address
Autoconfiguration",
I-D draft-jeong-adhoc-ip-addr-autoconf-02.txt, February 2004.
[9] Perkins, C., Malinen, J., Wakikawa, R. and E. Belding-Royer,
"IP Address Autoconfiguration for Ad Hoc Networks",
I-D draft-perkins-manet-autoconf-01.txt, November 2001.
[10] Singh, S., Kim, JH., Choi, YG., Kang, KL. and YS. Roh, "Mobile
multi-gateway support for IPv6 mobile ad hoc networks",
I-D draft-singh-manet-mmg-00.txt, June 2004.
[11] Paakkonen, P., Rantonen, M. and J. Latvakoski, "IPv6 addressing
in a heterogeneous MANET-network",
I-D draft-paakkonen-addressing-htr-manet-00.txt, December 2003.
[12] Jelger, C., Noel, T. and A. Frey, "Gateway and address
autoconfiguration for IPv6 adhoc networks",
I-D draft-jelger-manet-gateway-autoconf-v6-02.txt, April 2004.
Ruffino, et al. Expires August 15, 2005 [Page 13]
Internet-Draft MANET scenarios February 2005
[13] Clausen, T. and P. Jacquet, "Optimized link state routing
protocol", RFC 3626, October 2003.
[14] Perkins, C., Belding-Royer, E. and S. Das, "Ad hoc On-Demand
Distance Vector (AODV) Routing", RFC 3561, July 2003.
[15] Ogier, R., Templin, F. and M. Lewis, "Topology Dissemination
Based on Reverse-Path Forwarding (TBRPF)", RFC 3684, February
2004.
[16] Johnson, D., Maltz, D. and Y. Hu, "The Dynamic Source Routing
Protocol for Mobile Ad Hoc Networks (DSR)",
I-D draft-ietf-manet-dsr-10.txt, July 2004.
[17] Postel, J., "Internet Protocol", STD 5, RFC 791, September
1981.
[18] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6)
Specification", RFC 2460, December 1998.
[19] Thomson, S. and T. Narten, "IPv6 Stateless Address
Autoconfiguration", RFC 2462, December 1998.
[20] Aboba, B., "Dynamic Configuration of Link-Local IPv4
Addresses",
Internet-Draft draft-ietf-zeroconf-ipv4-linklocal-17, July
2004.
[21] Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004.
[22] Sun, Y. and E. Belding-Royer, "A study of dynamic addressing
techniques in mobile ad hod networks", I-D Wireless
communication and mobile computing, May 2004.
[23] Narten, T., Nordmark, E. and W. Simpson, "Neighbor Discovery
for IP Version 6 (IPv6)", RFC 2461, December 1998.
[24] Troan, O. and R. Droms, "IPv6 Prefix Options for Dynamic Host
Configuration Protocol (DHCP) version 6", RFC 3633, December
2003.
[25] Engelstad, P., T°nnesen, A., Hafslund, A. and G. Egeland,
"Internet Connectivity for Multi-Homed Proactive Ad Hoc
Networks", First IEEE International Conference on Sensor and Ad
hoc Communications and Networks , October 2004.
Ruffino, et al. Expires August 15, 2005 [Page 14]
Internet-Draft MANET scenarios February 2005
Authors' Addresses
Simone Ruffino
Telecom Italia LAB
Via G.Reiss Romoli 274
Torino 10148
Italy
Phone: +39 011 228 7566
Email: simone.ruffino@telecomitalia.it
Patrick Stupar
Telecom Italia LAB
Via G.Reiss Romoli 274
Torino 10148
Italy
Phone: +39 011 228 5727
Email: patrick.stupar@telecomitalia.it
Thomas Heide Clausen
Laboratoire d'informatique
Ecole Polytechnique
Palaiseau Cedex 91128
France
Phone: +33 1 6933 2867
Email: thomas.clausen@polytechnique.fr
Shubhranshu Singh
SAMSUNG Advanced Institute of Technology - i-Networking Laboratory
San 14-1, Nongseo-ri, Giheung-eup
Yongin-si, Gyeonggi-do 449-712
Korea
Phone: +82 31 280 9569
Email: shubhranshu@samsung.com
Ruffino, et al. Expires August 15, 2005 [Page 15]
Internet-Draft MANET scenarios February 2005
Appendix A. Acknowledgments
The authors would like to thank Ivano Guardini for his valuable
comments.
Ruffino, et al. Expires August 15, 2005 [Page 16]
Internet-Draft MANET scenarios February 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Ruffino, et al. Expires August 15, 2005 [Page 17]
| PAFTECH AB 2003-2026 | 2026-04-23 05:38:38 |