Internet DRAFT - draft-clausen-autoconf-criteria

draft-clausen-autoconf-criteria






MANET Autoconfiguration (AUTOCONF)                            T. Clausen
Internet-Draft                                                J. Garnier
Expires: January 12, 2006               LIX, Ecole Polytechnique, France
                                                                S. Singh
                                                Samsung AIT, South Korea
                                                      Chris. Christopher
                                                          Baesystems, UK
                                                           July 11, 2005


           Evaluation Criteria for MANET Autoconf Mechanisms
                   draft-clausen-autoconf-criteria-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on January 12, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   This document gives a general set of objective criteria to evaluate
   an autoconfiguration mechanism in a MANET environment.  All criteria
   are important to outline an evaluation of an autoconfiguration
   mechanism.  These criteria have been grouped into three classes:



Clausen, et al.         Expires January 12, 2006                [Page 1]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   functional criteria, performance criteria and usability criteria.
   For each of the criteria, a description is outlined, hints are given
   on how to perform an adequate measure of the criterium, and an
   evaluation features the importance of the criterium in the full
   evaluation of a mechanism.














































Clausen, et al.         Expires January 12, 2006                [Page 2]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


1.  Introduction

   This document gives a general set of objective criteria to evaluate
   an autoconfiguration mechanism in a MANET environment.  All criteria
   are important to outline an evaluation of an autoconfiguration
   mechanism.  These criteria have been grouped into three classes:
   functional criteria, performance criteria and usability criteria.
   For each of the criteria, a description is outlined, hints are given
   on how to perform an adequate measure of the criterium, and an
   evaluation features the importance of the criterium in the full
   evaluation of a mechanism.








































Clausen, et al.         Expires January 12, 2006                [Page 3]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


2.  Functional Criteria

   This section describes functionalities that a mechanism must aim at
   featuring.  Besides Duplicate Address Avoidance, DAA, an autoconfiguration
   mechanism implements at least one of these functionalities.  These
   address issues result from the MANET environment in addition to usual
   issues of autoconfiguration.  The more functionalities a system
   implements, the better it should be evaluated provided that these
   functionalities are correctly designed and that overall network
   performance does not suffer from this variety.

2.1  Duplicate Address Avoidance

2.1.1  Presentation

   This functionality is mandatory in an autoconfiguration mechanism.
   It consists of making all functionalities assign addresses only after
   checking their uniqueness.  This principle must be the core of any
   design of an autoconfiguration mechanism.  It is consequently crucial
   to test the efficiency of these functionalities from this point of
   view.  A mechanism often assigning duplicate addresses should be
   disregarded quickly, for instance.

2.1.2  Measurement

   Experimental evaluation could consist in counting misassignments,
   i.e. assignments of already used addresses.  Weak DAD is the result
   of the application of this principle to all mechanisms involving
   address assignments.  Simple scenarios testing the functionalities of
   a mechanism are sufficient to assess these misassignments.

2.1.3  Evaluation

   This functionality is the only mandatory functionality in an
   autoconfiguration mechanism, as it reflects the assumption of
   uniqueness upon which the routing protocol is based.

2.2  Duplicate Address Detection

2.2.1  Presentation

   Duplicate Address Detection, DAD consists in mechanisms aiming to detect
   address collisions and solve them through address reassignment.
   Draconian ways of doing so involve reconfiguration of all the
   conflicting interfaces whereas more subtle mechanisms keep one
   interface up and reconfigure the others.  Evaluation should prefer
   the latter way, since it allows more preservation of ongoing
   connections.  Such DAD mechanisms are in fact ways of enforcing the



Clausen, et al.         Expires January 12, 2006                [Page 4]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   principle of uniqueness of address for each interface, if failures
   happen, and should be evaluated the same way.  Strong DAD may be an
   idealization of such a mechanism.

2.2.2  Measurement

   Simulations and experiments can easily be staged showing duplicate
   addresses.  Mechanisms can be tested and evaluated according to their
   ability to handle such scenarios.

2.2.3  Evaluation

   Duplicate address detection allows the adaptative approach to strong
   DAD, i.e. a flexible way of controlling address uniqueness.
   Therefore, it is a very important criterium.

2.3  Address Assignment for Incomming Nodes

2.3.1  Presentation

   A mechanism in charge of assigning an address to an incoming node in
   a network is a base for almost all other more complex
   functionalities.  It is also the first functionality expected from an
   autoconfiguration mechanism.

2.3.2  Measurement

   Simulations and experiments can be put up to test this functionality.
   Simple simulations or experiments with an already configured network
   and incoming nodes are sufficient.  The number of incoming nodes,
   their location and the frequency of appearance can vary to thoroughly
   test the mechanism.

2.3.3  Evaluation

   This criterium is about a functionality that is a basis to more
   complex mechanisms.  It is therefore central and must be evaluated in
   depth.  The widespread use of address assignment mechanism, the DHCP
   protocol, shows the need for such a functionality.

   Absent an address assignment mechanism, other functionalities
   involving reconfiguration of nodes cannot properly be performed
   without a mechanism to reconfigure the node.  Duplicate address
   detection cannot result in solutions to collisions.






Clausen, et al.         Expires January 12, 2006                [Page 5]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


2.4  Full network configuration from scratch

2.4.1  Presentation

   This functionality, also called bootstrap capability, is the ability
   of unconfigured nodes to form a whole functional network, without any
   user intervention.

2.4.2  Measurement

   Simulations and experiments can be put up to test this
   functionality, using adequate scenarios, i.e. sets of scattered
   unconfigured nodes with various topology will be sufficient to test
   this functionality.

2.4.3  Evaluation

   This functionality is one among the several final goals of the design
   of an autoconfiguration mechanism.  A particular attention must be
   paid to the prerequisites such a mechanism.





2.5  Network merger treatment

2.5.1  Presentation

   This functionality consists in uniting or reuniting more than one
   independent network in a way that preserves address uniqueness.  The
   most important here is to specify the situations in which it is
   applicable.  This can be done using a negotiation between the several
   networks or a direct merger followed by an address collision
   detection to eliminate the duplicate addresses.

2.5.2  Measurement

   Simulations and experiments can be put up to easily test this
   functionality, using scenarios showing two or more network of various
   relative importance.  This notion of relative importance, which is
   basically the relative difference of size between the protagonists is
   a significant parameter.  For instance, the situation of two networks
   of the same size showing as many conflicts as their number of nodes
   is likely to be more difficult to handle than the case when one is
   much bigger than the other.  The structure of the network can indeed
   be highly perturbed during the response to the merger.




Clausen, et al.         Expires January 12, 2006                [Page 6]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


2.5.3  Evaluation

   This functionality is complex because it involves the resolution of a
   large possible number of concurrent address collisions.  A MANET
   lacking this functionality has a restrained mobility as this MANET
   cannot handle any encounter with a similar network.

2.6  Network partitioning treatment

2.6.1  Presentation

   An autoconfiguration mechanism implementing treatment of network
   mergers should be able to handle network partitioning as what causes
   difficulties in these situations is the merger after the
   partitioning.  However, if the merger mechanism involves
   reconfiguring all the nodes of one of the 2 networks, this can be a
   source of inefficiency especially in the case of partitioning due to
   a lack of information diffusion.

2.6.2  Measurement

   Simulations and experiments can here again be put up to easily test
   this functionality, using adequate scenarios from the point of view
   of the mobility of nodes.  Groups of variable relative size must be
   staged with motions leading to a splitting, followed by a merger.  To
   test the functionality properly, additional nodes must have been
   added between the partitioning and the merger to simulate what the
   issue really consists in.

2.6.3  Evaluation

   Even though this functionality seems to highly depend on the
   treatment of network mergers, it can be a separate problem in
   mechanisms where networks can be discriminated.  A MANET that cannot
   handle partitionings does not profit from the mobility of the nodes
   that constitute it.

2.7  Service Discovery

2.7.1  Presentation

   Service discovery is not always mentioned in the required
   functionalities of an autoconfiguration system.  However,
   autoconfiguration rmechanisms should advertise the required 
   information within the network. Furthermore, as forming a network
   is about sharing resources, integrated systems can profit from more
   general advertisement of such services.




Clausen, et al.         Expires January 12, 2006                [Page 7]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


2.7.2  Measurement

   Simulations and experiments to test this functionality must show the
   behaviour of the mechanism with one or several service providers, of
   one or different nature.  A theoretical evaluation must also take
   into account the ability to append additional information to the
   advertisement service, including description or other parameters for
   instance.

2.7.3  Evaluation

   This criterium is not often mentioned as a important functionality.
   As a secondary criterium, it can be left aside.  However a treatment
   of this problem indicates a complete mechanism.





































Clausen, et al.         Expires January 12, 2006                [Page 8]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


3.  Performance Criteria

   All MANET environments share a set of characteristics that are
   specific to this sort of networks.  A MANET autoconfiguration
   mechanism must take these characteristics into account to achieve
   properly their task.  In this section are outlined criteria to
   evaluate the compliance of autoconfiguration mechanisms to the
   limitation of MANETs.

3.1  Nodes with Limited Ressources

3.1.1  Presentation

   A mobile node in a MANET environment has finite resources.  Power can
   be limited by battery capacities, computation capabilities can be low
   and memory can be scarce.  Therefore, a mechanism should be highly
   optimized to ensure it can be functional without using huge storage
   structures and without the need of large amounts of computations.

3.1.2  Measurement

   To evaluate this, one could measure the additional memory used by the
   autoconfiguration mechanism and compare it with the memory used by
   the single routing protocol at the same time.  The same comparison
   should be made as regards the computation time.  Battery consumption
   can be derived from the combination of these measures with the
   lifetime of the node.  Simulators such as NS2 can also give a direct
   access to the power consumption.

3.1.3  Evaluation

   This criterium is essential in MANET since one of the main assumption
   as regards MANETs is the mobility, that implies compact nodes and the
   use of batteries as power supply.  A mechanism that would not take
   such limitations into account is likely not to be adaptable to real
   mobile networks.

3.2  Medium Overhead

3.2.1  Presentation

   The medium on which the nodes can exchange packets suffers from
   several limitations.  As the nodes can only emit within a finite
   range, the medium cannot be considered as unique.  Any node A can be
   within range from any other two nodes B and C that cannot listen to each 
   other. If both nodes decide to send a message at the same time, A can not
   receive any of them.  Such situations are called collisions.  They
   are very likely to occur in saturated networks with many nodes and



Clausen, et al.         Expires January 12, 2006                [Page 9]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   many control messages to transmit, or in very dynamic networks, which
   are networks with a quickly changing topology which must be
   continually updated.  The ideal bandwidth is already limitted without
   such effects.

   Two types of overhead must be studied:

   Local overhead is the load of messages that are not forwarded but
   occupy the medium around an active node during a local negociation
   for instance.  If the traffic is disturbed in the neighbourhood of a
   point where something related to autoconfiguration is happening, it
   can result in global problems, if the control messages intended to go
   through this zone are not relayed, neither in the zone nor further.

   Global overhead is the overhead induced by flooding procedures.  As
   flooding operation result in much traffic throughout the network,
   such procedures should be avoided as much as possible.

3.2.2  Measurement

   The overhead induced by the autoconfiguration must be studied both
   theoretically through the count of the messages that must be sent in
   any situation, and experimentally.  Simulators give an immediate
   access to the packets that were exchanged.  The count is therefore
   possible in simulations.

3.2.3  Evaluation

   This criterium also reflects a key assumption and can be applied to
   even more situations than the previous one.  In fact, it is often
   considered that the limitation of the medium is drastically more
   constraining than the limitation of the abilities of the nodes.
   Saturating the medium often leads to a collapse of the network as
   information cannot be exchanged any more.

3.3  Tolerance to information losses

3.3.1  Presentation

   Proactive protocols are based on knowledge of full and up-to-date
   topological description of the network by each node.  As pointed out
   in the previous subsection, information diffusion is not guarantied.
   On the contrary, information incompleteness should be considered as a
   possibility.

   Therefore, any autoconfiguration mechanism should provide lightweight
   though efficient backup systems to solve the problems induced by
   information losses.



Clausen, et al.         Expires January 12, 2006               [Page 10]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


3.3.2  Measurement

   This evaluation is primarily theoretic because the presence of such
   systems can be checked at this level.  Information lacks must not
   make the whole system collapse.

   An experimental analysis of this can be performed assigning
   probabilities to transmissions so that packet diffusion is randomly
   perturbated.  The backup mechanisns can also be tested by staging the
   situations resulting from such failures.

3.3.3  Evaluation

   This criterium must not be neglected as it is based upon an important
   characteristics of MANETs.  A mechanism not tolerating information
   losses would be exposed to many failures during its functioning time.
   This must be prevented.

3.4  Convergence Time

3.4.1  Presentation

   An address autoconfiguration mechanism aims at performing automatic
   management of addresses in a network.  The goal is to react as
   quickly as possible to any changes and provide a solution to a new
   situation.  This is intended to ease the access to shared resources
   within a MANET.

   Here, what is referred to as convergence is the fact that after a
   change, there is a period during which the network detects the change
   and reacts to it.  An event concerning autoconfiguration triggers
   possible changes in the configuration of interfaces, information
   diffusion.  Convergence is achieved when all nodes are informed of
   the new status and have adapted their configuration accordingly.  A
   possibly good indicator can be the amount of additional messages
   induced by the event.  When the emission of such messages ceases, one
   can consider convergence is reached.  Convergence time is the time
   between the event and convergence.  If this time is infinite,
   convergence is never reached.  In some cases, this could induce
   instability or even collapse of the network.

3.4.2  Measurement

   More practically, as the evaluated mechanism must adapt the routing
   protocol to the changing environment, the responding times of the
   autoconfiguration mechanism must be shorter than the characteristic
   times for network changes, whatever their nature, for instance
   topology changes or incoming new nodes.  Measures must take into



Clausen, et al.         Expires January 12, 2006               [Page 11]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   account different characteristic times.  For instance, the
   configuration of a network from scratch matches the lifetime of a
   network and the convergence time should be much shorter than the
   lifetime.  The configuration of a new incoming node can be considered
   as an event regarding topology.  The time of this process must not
   exceed much the time needed by topology information sharing, i.e. a
   few control messages.

   All needed times must be measured and compared to their expected
   value: bootstrap time, address assignment time, merger time and
   address conflict resolution time for instance.

3.4.3  Evaluation

   This criterium is relevant for all functionalities and is of prime
   importance.  A system with an infinite or very long convergence time
   is at best useless and can even be harmful in some cases.

3.5  Address Space Usage

3.5.1  Presentation

   In the stateful case, a network is mostly assigned a specific address 
   space among which addresses can be picked and assigned to nodes.  As 
   the number of available addresses can be little larger than the number 
   of possible nodes, it is important that no possible addresses should 
   be wasted. Wasted addresses are addresses that have not been assigned 
   and that cannot be assigned to requesting nodes due to the design of 
   the evaluated mechanism.

   From this point of view, two different approaches can be used to assign
   addresses to incoming nodes.  Address ranges can be assigned to
   different consistent parts of the network, each one responsible for
   its own address domain.  This will be called local responsability.
   The other approach is to keep addresses common.  Each new node must
   upon configuration advertise its choice to the whole network.  This
   is global responsability.  Global  responsability implies a good
   information exchange.  Local responsability requires an additional
   system to exchange addresses should an important need be felt in a
   part of the network.

3.5.2  Measurement

   This criterium must be evaluated mainly theoretically especially in
   the case of local responsibility: idle addresses must not be blocked
   by some nodes while other nodes lack addresses.  It is relevant for
   all functionalities and must be evaluated in each of them.  It can be
   detected in simulations and experiments through an analysis of the



Clausen, et al.         Expires January 12, 2006               [Page 12]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   addresses that nodes can get hold on and assign.  This is more
   difficult an evaluation.

3.5.3  Evaluation

   This criterium is important in networks that are assigned a short
   range of addresses, as well as in large and dense networks.  If too
   many addresses are wasted by the autoconfiguration mechanism, such
   that all idle and accessible addresses are in use, an incoming node
   cannot be granted an address.  This invalidates many of the
   functionalities.

3.6  Saturation point: multiple concurrent conflicts

3.6.1  Presentation

   Usual mechanisms are primarily designed to handle one situation at
   once.  For instance, the traditional situation for duplicate
   addresses is one case at a time with several nodes bearing the same
   address.  But cases with several concurrent conflict are likely to
   occur.  Hence the need to assess the performance of the
   functionalities of an autoconfiguration mechanism in situations where
   several conflicts occur concurrently.  A merger of two networks of the
   same size with as many collision as the number of nodes in both is a
   complex case as it also involves the possible destruction of the
   whole structure of the network through reconfiguration for instance.

3.6.2  Measurement

   Theoretically, the mechanism must be conceived so that multiple
   concurrent problems can be resolved.

   Experiments and simulations are good approaches to evaluate this
   criterium.  Scenarios with several concurrent conflicts can be staged
   directly.  Saturation point must be determined using the fact that
   around this point, either convergence time becomes infinite, or
   large, or odd phenomena occur.

3.6.3  Evaluation

   This criterium allows a good evaluation of mechanisms.  Solving more
   complex situations with several conflicts indicates a well designed
   mechanism.  Moreover, concurrent conflicts are very likely to occur
   and must therefore be treated by an autoconfiguration mechanism.

3.7  Saturation point: conflict size





Clausen, et al.         Expires January 12, 2006               [Page 13]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


3.7.1  Presentation

   The symmetric of the previous criterium is the size of conflicts.
   Usual address collisions concern 2 nodes bearing the same address.
   However, cases with more colliding nodes can occur.  Usual mergers
   involve 2 networks.  However larger problems can happen with 3 or
   more independent networks. Mobility for instance can make more than two
   networks reunite at the same time with possibly big conflicts
   involving at least as many protagonists as the number of connecting
   networks.

   Therefore, a serious mechanism must handle larger problems than the
   basic 2 protagonist problem.

3.7.2  Measurement

   Theoretically, the mechanism must be conceived so that multiple
   protagonist problems can be resolved.

   Experiments and simulations are a good approach to evaluate this
   criterium.  Scenarios with large conflicts can be staged directly.
   The saturation point must be determined using the fact that around
   this point, either convergence time becomes infinite, or large, or
   odd phenomena occur.

3.7.3  Evaluation

   This criterium allows a very efficient evaluation of mechanisms.
   Solving situations with big conflicts indicates a well designed
   mechanism.  Big conflicts can happen and if a network is blocked in
   such a case, this will cause problems.

3.8  Scalability

3.8.1  Presentation

   An ideal autoconfiguration mechanism should be applicable to networks
   of any size.  However, as such a mechanism generates overhead to the
   nodes as well as to the medium, scalability limitations should be
   evaluated.  Information diffusion also suffers from a large size as
   the diffusion delay can increase such that information arrives at a
   node from distant parts of the network with a long delay.  In such
   cases, DAA and DAD become uncertain processes if timeout times are
   not adapted.

3.8.2  Measurement

   The limit of the autoconfiguration mechanism is the number of nodes



Clausen, et al.         Expires January 12, 2006               [Page 14]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   beyond which either the network collapses or the mechanism becomes so
   slow it is not functional anymore.  This limit can be a range of
   values according to situations.  The higher the limit, the better the
   mechanism can be considered.  As routing protocols have similar
   limits, if the limits of the autoconfiguration mechanism and of the
   routing protocol are approximately the same, one can consider the
   autoconfiguration mechanism is well designed.

   This matter can be decided theoretically mainly through an analysis
   of the induced medium overhead.  It can be evaluated experimentally
   and through simulations.  To achieve this, scenarios with various
   sizes and various densities must be tested to determine the domain of
   correct functioning.

3.8.3  Evaluation

   Scalability is one of the most important criteria.  A comprehensive
   mechanism applicable to ten nodes at most is mostly not preferred.  
   The domain of correct functioning is a premiere feature of a mechanism.
































Clausen, et al.         Expires January 12, 2006               [Page 15]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


4.  Usability Criteria

   Usability criteria aim at characterizing the way the mechanism will
   be adapted to its use.  This means the adaptability to the whole
   environment including users and other protocols.

4.1  Simple Prerequisites

4.1.1  Presentation

   All mechanisms are based on assumptions that must be specified and
   should aim at being as general as possible to allow a widespread
   implementation.  




4.1.2  Measurement

   This criterium consists in a theoretical assessment of the
   assumptions upon which the mechanism is based.

4.1.3  Evaluation

   This criterium indicates whether a mechanism is useful, i.e. whether
   it is worth implementing.  If the prerequisites are too strict,
   interest is greatly diminished.

4.2  User Interventions

4.2.1  Presentation

   As an autoconfiguration system aims at automatically managing and
   configuring addresses, its design must make it user independent, i.e.
   should allow its correct functioning without any user intervention.
   There should never be situations when nodes are blocked without any
   access to the network.  Errors should be handled automatically.

4.2.2  Measurement

   This criterium can be theoretically evaluated.  If a situation has no
   adequate specified treatment, unresolved problems can occur.

   Simulations and experiments with detection of unresolved problems can
   also be very helpful to perform the evaluation of a mechanism through
   this criterium.  This approach assumes the definition of a problem
   detection system especially in a simulation environment.



Clausen, et al.         Expires January 12, 2006               [Page 16]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


4.2.3  Evaluation

   This criterium is based on the assumption that the user will want to
   have to perform as few maintenance operations as possible.  This is
   not always the case.  However, a mechanism allowing a very low user
   intervention can have modes with additional controls available and
   therefore be adaptable to all degrees of wishes from the point of
   view of user intervention.

4.3  Interoperability

4.3.1  Presentation

   In fact, an ideal autoconfiguration system should both allow user-
   free configuration and manual configuration.  An autoconfiguration
   system should also be able to comply to different environments such
   as networks totally lacking infrastructure and more centralized
   networks, with servers providing a stable resource.  For instance, a
   DHCP server or a gateway to the internet.

   An autoconfiguration system should be able to carry out all the
   address management tasks while tolerating user interventions.  For
   instance, an autoconfiguration mechanism designed to assign addresses
   to incoming nodes in a network should additionaly be able to handle
   manually configured nodes.  Adaptability is the key goal here.

   Additionally, it can be required of an autoconfiguration mechanism
   that it allows the use of completely different mechanisms such as
   stateless IPv6 autoconfiguration mechanism.

4.3.2  Measurement

   Scenarios with mixed nodes, implementing several protocols can be
   staged to test such a criterium.

4.3.3  Evaluation

   Interoperability can be the key to a successful deployment of such a
   mechanism as the MANETs implementing it are likely to encounter
   environments implementing different protocols.

4.4  Independence from the routing protocol

4.4.1  Presentation

   A good autoconfiguration mechanism should be based on as few
   assumptions as possible, allowing its applicability on a large
   variety of routing protocols.  An autoconfiguration



Clausen, et al.         Expires January 12, 2006               [Page 17]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


   mechanism should consist in a series of guidelines applicable to a
   whole class of routing protocols.  Implementations would slightly
   differ due to differences between protocols but those differences
   should not be more than optimizations.

4.4.2  Measurement

   This criterium has a theoretic basis.  If a mechanism uses features
   of a routing protocol as its core, it cannot be adapted easily to
   another routing protocol.

4.4.3  Evaluation

   This criterium is not essential.  However it characterizes a degree
   of universality of the considered mechanism.  This is to be taken
   into account when comparing 2 different mechanisms.  It is obvious
   that a mechanism well rated according to all other criteria but
   limited in its use to one single routing protocol will not be as
   widely used as the one complying to this particular criterium.

4.5  Simplicity

4.5.1  Presentation

   To ensure an actual implementation of a mechanism can be performed
   simplicity remains a key criterium.  Algorithms must not be too
   complex, nor involve computations whose termination is not
   guarantied.  Complex semantic analyses should not be necessary to
   efficiently fulfill the goal of an autoconfiguration mechanism.

4.5.2  Measurement

   Specifications should fit in a few pages and the mechanism must 
   be easy to test and deploy.

4.5.3  Evaluation

   Non terminating algorithms are useless in real systems and too
   complicated a specification makes it difficult to properly implement
   and even evaluate a mechanism.











Clausen, et al.         Expires January 12, 2006               [Page 18]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


Authors' Addresses

   Thomas Heide Clausen
   LIX, Ecole Polytechnique, France

   Phone: +33 6 6058 9349
   Email: T.Clausen@computer.org
   URI:   http://www.lix.polytechnique.fr/Labo/Thomas.Clausen/


   Julien Garnier
   LIX, Ecole Polytechnique, France

   Email: Julien.Garnier@polytechnique.org


   Shubhranshu Singh
   Samsung AIT, South Korea

   Phone: +82 10 2799 8296
   Email: shubranshu@gmail.com


   Christopher
   Baesystems, UK

   Email: chris.dearlove@computer.org
























Clausen, et al.         Expires January 12, 2006               [Page 19]

Internet-Draft              AUTOCONFCRITERIA                   July 2005


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2005).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Clausen, et al.         Expires January 12, 2006               [Page 20]