1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
|
Network Working Group B. Adamson
Request for Comments: 1677 Naval Research Laboratory
Category: Informational August 1994
Tactical Radio Frequency Communication Requirements for IPng
Status of this Memo
This memo provides information for the Internet community. This memo
does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.
Abstract
This document was submitted to the IETF IPng area in response to RFC
1550. Publication of this document does not imply acceptance by the
IPng area of any ideas expressed within. Comments should be
submitted to the big-internet@munnari.oz.au mailing list.
Executive Summary
The U.S. Navy has several efforts exploring the applicability of
commercial internetworking technology to tactical RF networks. Some
these include the NATO Communication System Network Interoperability
(CSNI) project, the Naval Research Laboratory Data/Voice Integration
Advanced Technology Demonstration (D/V ATD), and the Navy
Communication Support System (CSS) architecture development.
Critical requirements have been identified for security, mobility,
real-time data delivery applications, multicast, and quality-of-
service and policy based routing. Address scaling for Navy
application of internet technology will include potentially very
large numbers of local (intra-platform) distributed information and
weapons systems and a smaller number of nodes requiring global
connectivity. The flexibility of the current Internet Protocol (IP)
for supporting widely different communication media should be
preserved to meet the needs of the highly heterogeneous networks of
the tactical environment. Compact protocol headers are necessary for
efficient data transfer on the relatively-low throughput RF systems.
Mechanisms which can enhance the effectiveness of an internet
datagram protocol to provide resource reservation, priority, and
service quality guarantees are also very important. The broadcast
nature of many RF networks and the need for broad dissemination of
information to warfighting participants makes multicast the general
case for information flow in the tactical environment.
Adamson [Page 1]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
Background
This paper describes requirements for Internet Protocol next
generation (IPng) candidates with respect to their application to
military tactical radio frequency (RF) communication networks. The
foundation for these requirements are experiences in the NATO
Communication System Network Interoperability (CSNI) project, the
Naval Research Laboratory Data/Voice Integration Advanced Technology
Demonstration (D/V ATD), and the Navy Communication Support System
(CSS) architecture development.
The goal of the CSNI project is to apply internetworking technology
to facilitate multi-national interoperability for typical military
communication applications (e.g., electronic messaging, tactical data
exchange, and digital voice) on typical tactical RF communication
links and networks. The International Standard Organization (ISO)
Open Systems Interconnect (OSI) protocol suite, including the
Connectionless Network Protocol (CLNP), was selected for this project
for policy reasons. This paper will address design issues
encountered in meeting the project goals with this particular
protocol stack.
The D/V ATD is focused on demonstrating a survivable, self-
configuring, self-recovering RF subnetwork technology capable of
simultaneously supporting data delivery, including message transfer,
imagery, and tactical data, and real-time digital voice applications.
Support for real-time interactive communication applications was
extended to include a "white board" and other similar applications.
IP datagram delivery is also planned as part of this demonstration
system.
The CSS architecture will provide U.S. Navy tactical platforms with a
broad array of user-transparent voice and data information exchange
services. This will include support for sharing and management of
limited platform communication resources among multiple warfighting
communities. Emphasis is placed on attaining interoperability with
other military services and foreign allies. Utilization of
commercial off-the-shelf communications products to take advantage of
existing economies of scale is important to make any resulting system
design affordable. It is anticipated that open, voluntary standards,
and flexible communication protocols, such as IP, will play a key
role in meeting the goals of this architecture.
Introduction
Before addressing any IPng requirements as applied to tactical RF
communications, it is necessary to define what this paper means by
"IPng requirements". To maintain brevity, this paper will focus on
Adamson [Page 2]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
criteria related specifically to the design of an OSI model's Layer 3
protocol format and a few other areas suggested by RFC 1550. There
are several additional areas of concern in applying internetwork
protocols to the military tactical RF setting including routing
protocol design, address assignment, network management, and resource
management. While these areas are equally important, this paper will
attempt to satisfy the purpose of RFC 1550 and address issues more
directly applicable to selection of an IPng candidate.
Scaling
The projection given in RFC 1550 that IPng should be able to deal
with 10 to the 12th nodes is more than adequate in the face of
military requirements. More important is that it is possible to
assign addresses efficiently. For example, although a military
platform may have a relatively small number of nodes with
requirements to communicate with a larger, global infrastructure,
there will likely be applications of IPng to management and control
of distributed systems (e.g., specific radio communications equipment
and processors, weapons systems, etc.) within the platform. This
local expansion of address space requirements may not necessarily
need to be solved by "sheer numbers" of globally-unique addresses but
perhaps by alternate delimitation of addressing to differentiate
between globally-unique and locally-unique addressing. The
advantages of a compact internet address header are clear for
relatively low capacity RF networks.
Timescale, Transition and Deployment
The U.S. Navy and other services are only recently (the last few
years) beginning to design and deploy systems utilizing open systems
internetworking technology. From this point of view, the time scale
for selection of IPng must be somewhat rapid. Otherwise, two
transition phases will need to be suffered, 1) the move from unique,
"stove pipe" systems to open, internetworked (e.g., IP) systems, and
then 2) a transition from deployed IP-based systems to IPng. In some
sense, if an IPng is quickly accepted and widely implemented, the
transition for tactical military systems will be somewhat easier than
the enterprise Internet where a large investment in current IP
already exists. However, having said this, the Department of Defense
as a whole already deploys a large number of IP-capable systems, and
the issue of transition from IP to IPng remains significant.
Security
As with any military system, information security, including
confidentiality and authenticity of data, is of paramount importance.
With regards to IPng, network layer security mechanisms for tactical
Adamson [Page 3]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
RF networks generally important for authentication purposes,
including routing protocol authentication, source authentication, and
user network access control. Concerns for denial of service attacks,
traffic analysis monitoring, etc., usually dictate that tactical RF
communication networks provide link layer security mechanisms.
Compartmentalization and multiple levels of security for different
users of common communication resources call for additional security
mechanisms at the transport layer or above. In the typical tactical
RF environment, network layer confidentiality and, in some cases,
even authentication becomes redundant with these other security
mechanisms.
The need for network layer security mechanisms becomes more critical
when the military utilizes commercial telecommunications systems or
has tactical systems inter-connected with commercial internets.
While the Network Encryption Server (NES) works in this role today,
there is a desire for a more integrated, higher performance solution
in the future. Thus, to meet the military requirement for
confidentiality and authentication, an IPng candidate must be capable
of operating in a secure manner when necessary, but also allow for
efficient operation on low-throughput RF links when other security
mechanisms are already in place.
In either of these cases, key management is extremely important.
Ideally, a common key management system could be used to provide key
distribution for security mechanisms at any layer from the
application to the link layer. As a result, it is anticipated,
however, that key distribution is a function of management, and
should not dependent upon a particular IPng protocol format.
Mobility
The definition of most tactical systems include mobility in some
form. Many tactical RF network designs provide means for members to
join and leave particular RF subnets as their position changes. For
example, as a platform moves out of the RF line-of-sight (LOS) range,
it may switch from a typical LOS RF media such as the ultra-high
frequency (UHF) band to a long-haul RF media such as high frequency
(HF) or satellite communication (SATCOM).
In some cases, such as the D/V ATD network, the RF subnet will
perform its own routing and management of this dynamic topology.
This will be invisible to the internet protocol except for
(hopefully) subtle changes to some routing metrics (e.g., more or
less delay to reach a host). In this instance, the RF subnetwork
protocols serve as a buffer to the internet routing protocols and
IPng will not need to be too concerned with mobility.
Adamson [Page 4]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
In other cases, however, the platform may make a dramatic change in
position and require a major change in internet routing. IPng must
be able to support this situation. It is recognized that an internet
protocol may not be able to cope with large, rapid changes in
topology. Efforts will be made to minimize the frequency of this in
a tactical RF communication architecture, but there are instances
when a major change in topology is required.
Furthermore, it should be realized that mobility in the tactical
setting is not limited to individual nodes moving about, but that, in
some cases, entire subnetworks may be moving. An example of this is
a Navy ship with multiple LANs on board, moving through the domains
of different RF networks. In some cases, the RF subnet will be
moving, as in the case of an aircraft strike force, or Navy
battlegroup.
Flows and Resource Reservation
The tactical military has very real requirements for multi-media
services across its shared and inter-connected RF networks. This
includes applications from digital secure voice integrated with
applications such as "white boards" and position reporting for
mission planning purposes to low-latency, high priority tactical data
messages (target detection, identification, location and heading
information). Because of the limited capacity of tactical RF
networks, resource reservation is extremely important to control
access to these valuable resources. Resource reservation can play a
role in "congestion avoidance" for these limited resources as well as
ensuring that quality-of-service data delivery requirements are met
for multi-media communication.
Note there is more required here than can be met by simple quality-
of-service (QoS) based path selection and subsequent source-routing
to get real-time data such as voice delivered. For example, to
support digital voice in the CSNI project, a call setup and resource
reservation protocol was designed. It was determined that the QoS
mechanisms provided by the CLNP specification were not sufficient for
our voice application path selection. Voice calls could not be
routed and resources reserved based on any single QoS parameter
(e.g., delay, capacity, etc.) alone. Some RF subnets in the CSNI
test bed simply did not have the capability to support voice calls.
To perform resource reservation for the voice calls, the CLNP cost
metric was "hijacked" as essentially a Type of Service identifier to
let the router know which datagrams were associated with a voice
call. The cost metric, concatenated with the source and destination
addresses were used to form a unique identifier for voice calls in
the router and subnet state tables. Voice call paths were to be
selected by the router (i.e. the "cost" metric was calculated) as a
Adamson [Page 5]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
rule-based function of each subnet's capability to support voice, its
delay, and its capacity. While source routing provided a possible
means for voice datagrams to find their way from router to router,
the network address alone was not explicit enough to direct the data
to the correct interface, particularly in cases where there were
multiple communication media interconnecting two routers along the
path. Fortunately, exclusive use of the cost QoS indicator for voice
in CSNI was able to serve as a flag to the router for packets
requiring special handling.
While a simple Type of Service field as part of an IPng protocol can
serve this purpose where there are a limited number of well known
services (CSNI has a single special service - 2400 bps digital
voice), a more general technique such as RSVP's Flow Specification
can support a larger set of such services. And a field, such as the
one sometimes referred to as a Flow Identification (Flow ID), can
play an important role in facilitating inter-networked data
communication over these limited capacity networks.
For example, the D/V ATD RF sub-network provides support for both
connectionless datagram delivery and virtual circuit connectivity.
To utilize this capability, an IPng could establish a virtual circuit
connection across this RF subnetwork which meets the requirements of
an RSVP Flow Specification. By creating an association between a
particular Flow ID and the subnetwork header identifying the
established virtual circuit, an IPng gateway could forward data
across the low-capacity while removing most, if not all, of the IPng
packet header information. The receiving gateway could re- construct
these fields based on the Flow Specification of the particular Flow
ID/virtual circuit association.
In summary, a field such as a Flow Identification can serve at least
two important purposes:
1) It can be used by routers (or gateways) to identify
packets with special, or pre-arranged delivery
requirements. It is important to realize that it may
not always be possible to "peek" at internet packet
content for this information if certain security
considerations are met (e.g., an encrypted transport
layer).
2) It can aid mapping datagram services to different
types of communication services provided by
specialized subnet/data link layer protocols.
Adamson [Page 6]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
Multicast
Tactical military communication has a very clear requirement for
multicast. Efficient dissemination of information to distributed
warfighting participants can be the key to success in a battle. In
modern warfare, this information includes imagery, the "tactical
scene" via tactical data messages, messaging information, and real-
time interactive applications such as digital secure voice. Many of
the tactical RF communication media are broadcast by nature, and
multicast routing can take advantage of this topology to distribute
critical data to a large number of participants. The throughput
limitations imposed by these RF media and the physics of potential
electronic counter measures (ECM) dictate that this information be
distributed efficiently. A multicast architecture is the general
case for information flow in a tactical internetwork.
Quality of Service and Policy-Based Routing
Quality of service and policy based routing are of particular
importance in a tactical environment with limited communication
resources, limited bandwidth, and possible degradation and/or denial
of service. Priority is a very important criteria in the tactical
setting. In the tactical RF world of limited resources (limited
bandwidth, radio assets, etc.) there will be instances when there is
not sufficient capacity to provide all users with their perception of
required communication capability. It is extremely important for a
shared, automated communication system to delegate capacity higher
priority users. Unlike the commercial world, where everyone has a
more equal footing, it is possible in the military environment to
assign priority to users or even individual datagrams. An example of
this is the tactical data exchange. Tactical data messages are
generally single-datagram messages containing information on the
location, bearing, identification, etc., of entities detected by
sensors. In CSNI, tactical data messages were assigned 15 different
levels of CLNP priority. This ensured that important messages, such
as a rapidly approaching enemy missile's trajectory, were given
priority over less important messages, such as a friendly, slow-
moving tanker's heading.
Applicability
There will be a significant amount of applicability to tactical RF
networks. The current IP and CLNP protocols are being given
considerable attention in the tactical RF community as a means to
provide communication interoperability across a large set of
heterogeneous RF networks in use by different services and countries.
The applicability of IPng can only improve with the inclusion of
features critical to supporting QoS and Policy based routing,
Adamson [Page 7]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
security, real-time multi-media data delivery, and extended
addressing. It must be noted that it is very important that the IPng
protocol headers not grow overly large. There is a sharp tradeoff
between the value added by these headers (interoperability, global
addressing, etc.) and the degree of communication performance
attainable on limited capacity RF networks. Regardless of the data
rate that future RF networks will be capable of supporting, there is
always a tactical advantage in utilizing your resources more
efficiently.
Datagram Service
The datagram service paradigm provides many useful features for
tactical communication networks. The "memory" provided by datagram
headers, provides an inherent amount of survivability essential to
the dynamics of the tactical communication environment. The
availability of platforms for routing and relaying is never 100%
certain in a tactical scenario. The efficiency with which multi-cast
can be implemented in a connectionless network is highly critical in
the tactical environment where rapid, efficient information
dissemination can be a deciding factor. And, as has been proven,
with several different Internet applications and experiments, a
datagram service is capable of providing useful connection-oriented
and real-time communication services.
Consideration should be given in IPng to how it can co-exist with
other architectures such as switching fabrics which offer demand-
based control over topology and connectivity. The military owns many
of its own communication resources and one of the large problems in
managing the military communication infrastructure is directing those
underlying resources to where they are needed. Traditional
management (SNMP, etc.) is of course useful here, but RF
communication media can be somewhat dynamically allocated. Circuit
switching designs offer some advantages here. Dial-up IP routing is
an example of an integrated solution. The IPng should be capable of
supporting a similar type of operation.
Support of Communication Media
The tactical communication environment includes a very broad spectrum
of communication media from shipboard fiber-optic LANs to very low
data rate (<2400 bps) RF links. Many of the RF links, even higher
speed ones, can exhibit error statistics not necessarily well-
serviced by higher layer reliable protocols (i.e., TCP). In these
cases, efficient lower layer protocols can be implemented to provide
reliable datagram delivery at the link layer, but at the cost of
highly variable delay performance.
Adamson [Page 8]
^L
RFC 1677 IPng Tactical RF Requirements August 1994
It is also important to recognize that RF communication cannot be
viewed from the IPng designer as simple point-to-point links.
Often, highly complex, unique subnetwork protocols are utilized to
meet requirements of survivability, communications performance with
limited bandwidth, anti- jam and/or low probability of detection
requirements. In some of these cases IPng will be one of several
Layer 3 protocols sharing the subnetwork.
It is understood that IPng cannot be the panacea of Layer 3
protocols, particularly when it comes to providing special mechanisms
to support the endangered-specie low data rate user. However, note
that there are many valuable low data rate applications useful to the
tactical user. And low user data rates, coupled with efficient
networking protocols can allow many more users share limited RF
bandwidth. As a result, any mechanisms which facilitate compression
of network headers can be considered highly valuable in an IPng
candidate.
Security Considerations
Security issues are discussed throughout this memo.
Author's Address
R. Brian Adamson
Communication Systems Branch
Information Technology Division
Naval Research Laboratory
NRL Code 5523
Washington, DC 20375
EMail: adamson@itd.nrl.navy.mil
Adamson [Page 9]
^L
|