Italiano English
Modifica History Actions

attachment:bmfreadme.txt di ZeroconfServices

Allegato "bmfreadme.txt"

Scarica

   1 BASIC MULTICAST FORWARDING PLUGIN FOR OLSRD
   2 by Erik Tromp (erik.tromp@nl.thalesgroup.com, erik_tromp@hotmail.com)
   3 Version 1.4
   4 
   5 1. Introduction
   6 ---------------
   7 
   8 The Basic Multicast Forwarding Plugin floods IP-multicast and
   9 IP-local-broadcast traffic over an OLSRD network. It uses the
  10 Multi-Point Relays (MPRs) as identified by the OLSR protocol
  11 to optimize the flooding of multicast and local broadcast packets
  12 to all the hosts in the network. To prevent broadcast storms, a
  13 history of packets is kept; only packets that have not been seen
  14 in the past 3-6 seconds are forwarded.
  15 
  16 
  17 2. How to build and install
  18 ---------------------------
  19 
  20 Download the olsr-bmf-v1.4.tar.gz file and save it into your OLSRD
  21 base install directory.
  22 
  23 Change directory (cd) to your OLSRD base install directory.
  24 
  25 At the command prompt, type:
  26 
  27   tar -zxvf ./olsr-bmf-v1.4.tar.gz
  28 
  29 then type:
  30 
  31   make build_all
  32 
  33 followed by:
  34 
  35   make install_all
  36 
  37 Next, turn on the possibility to create a tuntap interface (see also
  38 /usr/src/linux/Documentation/networking/tuntap.txt):
  39 
  40   mkdir /dev/net # if it doesn't exist already
  41   mknod /dev/net/tun c 10 200
  42   
  43 Set permissions, e.g.:
  44 
  45   chmod 0700 /dev/net/tun
  46 
  47 To configure BMF in OLSR, you must edit the file /etc/olsrd.conf
  48 to load the BMF plugin. For example, add the following lines:
  49 
  50   LoadPlugin "olsrd_bmf.so.1.4"
  51   {
  52     # No PlParam entries required for basic operation
  53   }
  54 
  55 
  56 3. How to run
  57 -------------
  58 
  59 After building and installing OLSRD with the BMF plugin, run the
  60 olsrd daemon by entering at the shell prompt:
  61 
  62   olsrd
  63 
  64 Look at the output; it should list the BMF plugin, e.g.:
  65 
  66   ---------- Plugin loader ----------
  67   Library: olsrd_bmf.so.1.4
  68   OLSRD Basic Multicast Forwarding plugin 1.4 (Mar 30 2007 14:30:57)
  69     (C) Thales Communications Huizen, Netherlands
  70     Erik Tromp (erik.tromp@nl.thalesgroup.com)
  71   Checking plugin interface version...  4 - OK
  72   Trying to fetch plugin init function... OK
  73   Trying to fetch param function... OK
  74   Sending parameters...
  75   "NonOlsrIf"/"eth0"... OK
  76   Running plugin_init function...
  77   OLSRD Basic Multicast Forwarding (BMF) plugin: opened 6 sockets
  78   ---------- LIBRARY LOADED ----------
  79 
  80 
  81 4. How to check if it works
  82 ---------------------------
  83 
  84 Enter the following command on the command prompt:
  85   
  86   ping 224.0.0.1
  87 
  88 All OLSR-BMF hosts in the OLSR network should respond. For example,
  89 assume we have three hosts, with IP addresses 192.168.151.50,
  90 192.168.151.53 and 192.168.151.55. On host 192.168.151.50 we enter
  91 the following ping command:
  92 
  93 root@IsdbServer:~# ping 224.0.0.1
  94 PING 224.0.0.1 (224.0.0.1) 56(84) bytes of data.
  95 64 bytes from 192.168.151.50: icmp_seq=1 ttl=64 time=0.511 ms
  96 64 bytes from 192.168.151.53: icmp_seq=1 ttl=64 time=4.67 ms (DUP!)
  97 64 bytes from 192.168.151.55: icmp_seq=1 ttl=63 time=10.7 ms (DUP!)
  98 64 bytes from 192.168.151.50: icmp_seq=2 ttl=64 time=0.076 ms
  99 64 bytes from 192.168.151.53: icmp_seq=2 ttl=64 time=1.23 ms (DUP!)
 100 64 bytes from 192.168.151.55: icmp_seq=2 ttl=63 time=1.23 ms (DUP!)
 101 64 bytes from 192.168.151.50: icmp_seq=3 ttl=64 time=0.059 ms
 102 64 bytes from 192.168.151.53: icmp_seq=3 ttl=64 time=2.94 ms (DUP!)
 103 64 bytes from 192.168.151.55: icmp_seq=3 ttl=63 time=5.62 ms (DUP!)
 104 64 bytes from 192.168.151.50: icmp_seq=4 ttl=64 time=0.158 ms
 105 64 bytes from 192.168.151.53: icmp_seq=4 ttl=64 time=1.14 ms (DUP!)
 106 64 bytes from 192.168.151.55: icmp_seq=4 ttl=63 time=1.16 ms (DUP!)
 107 
 108 We can see the response from the originating host (192.168.151.50)
 109 (it is normal behaviour for hosts sending multicast packets to
 110 receive their own packets). We can also see the responses by the
 111 other hosts (correctly seen as DUPlicates by ping).
 112 
 113 Note: when using an older version of ping than the standard from
 114 iputils-20020927, as found in most current Linux distributions, you may want
 115 to test BMF by specifying the output interface to the ping command:
 116 
 117   ping -I bmf0 224.0.0.1
 118 
 119 Older versions of 'ping' (e.g. as found in iputils-20020124) may bind to the
 120 autoselected source address, which may be incorrect. Since BMF re-uses
 121 one of the existing IP addresses for the "bmf0" network interface, the
 122 older-version ping command may 'autobind' to the wrong interface.
 123 
 124 See also the note in the iputils-20020927/RELNOTES file:
 125 "* Mads Martin Jørgensen <mmj@suse.de>: ping should not bind to autoselected
 126   source address, it used to work when routing changes. Return classic
 127   behaviour, option -B is added to enforce binding."
 128 
 129 
 130 5. How does it work
 131 -------------------
 132 
 133 In the IP header there is room for only two IP-addresses:
 134 * the destination IP address (in our case either a multicast
 135   IP-address 224.0.0.0...239.255.255.255, or a local broadcast
 136   address e.g. 192.168.1.255), and
 137 * the source IP address (the originator).
 138 
 139 For optimized flooding, however, we need more information. Let's
 140 assume we are the BMF process on one host. We will need to know which
 141 host forwarded the IP packet to us. Since OLSR keeps track of which
 142 hosts select our host as MPR (see the olsr_lookup_mprs_set(...) function),
 143 we can determine if the host that forwarded the packet, has selected us as
 144 MPR. If so, we must also forward the packet, changing the 'forwarded-by'
 145 IP-address to that of us. If not, we do not forward the packet.
 146 
 147 Because we need more information than fits in a normal IP-header, the
 148 original packets are encapsulated into a new IP packet. Encapsulated
 149 packets are transported in UDP, port 50698. The source address of the
 150 encapsulation packet is set to the address of the forwarder instead of
 151 the originator. Of course, the payload of the encapsulation packet is
 152 the original IP packet.
 153 
 154 For local reception, each received encapsulated packets is unpacked
 155 and passed into a tuntap interface which is specially created for
 156 this purpose.
 157 
 158 There are other flooding solutions available that do not use
 159 encapsulation. The problem with these solutions is that they cannot
 160 prevent duplicates of forwarded packets to enter the IP stack. For
 161 example, if a host is receiving flooded (unencapsulated, native IP)
 162 packets via two MPR hosts, there is no way to stop the reception of
 163 the packets coming in via the second MPR host. To prevent this, BMF
 164 uses a combination of encapsulated flooding and local reception via
 165 a tuntap interface.
 166 
 167 Here is in short how the flooding works (see also the
 168 BmfEncapsulatedPacketReceived(...) function; details with respect to
 169 the forwarding towards non-OLSR enabled hosts are omitted):
 170   
 171   On all OLSR-enabled interfaces, setup reception of packets
 172     on UDP port 50698.
 173   Upon reception of such a packet:
 174     If the received packet was sent by myself, drop it.
 175     If the packet was recently seen, drop it.
 176     Unpack the encapsulated packet and send a copy to myself via the
 177       TunTap interface.
 178     If I am an MPR for the host that forwarded the packet to me,
 179       forward the packet to all OLSR-enabled interfaces *including*
 180       the interface on which it was received.
 181 
 182 
 183 6. Advanced configuration
 184 -------------------------
 185 
 186 All configuration of BMF is done via the "LoadPlugin" section in
 187 the /etc/olsrd.conf file.
 188 
 189 The following gives an overview of all plugin parameters that can be
 190 configured:
 191 
 192   LoadPlugin "olsrd_bmf.so.1.4"
 193   {
 194     # Specify the name of the BMF network interface.
 195     # Defaults to "bmf0".
 196     PlParam "BmfInterface" "mybmf0"
 197 
 198     # Specify the type of the BMF network interface: either "tun" or
 199     # "tap". Defaults to "tun".
 200     PlParam "BmfInterfaceType" "tap"
 201 
 202     # Specify the IP address and mask for the BMF network interface.
 203     # By default, the IP address of the first OLSR interface is copied.
 204     # The default prefix length is 32.
 205     PlParam "BmfInterfaceIp" "10.10.10.234/24"
 206 
 207     # Enable or disable the flooding of local broadcast packets
 208     # (e.g. packets with IP destination 192.168.1.255). Either "yes"
 209     # or "no". Defaults to "yes".
 210     PlParam "DoLocalBroadcast" "no"
 211 
 212     # Enable or disable the capturing packets on the OLSR-enabled
 213     # interfaces (in promiscuous mode). Either "yes" or "no". Defaults
 214     # to "no".
 215     # The multicast (and, if configured, local broadcast) packets sent on
 216     # the non-OLSR network interfaces and on the BMF network interface will
 217     # always be flooded over the OLSR network.
 218     # If this parameter is "yes", also the packets sent on the OLSR-enabled
 219     # network interfaces will be flooded over the OLSR network.
 220     # NOTE: This parameter should be set consistently on all hosts throughout
 221     # the network. If not, hosts may receive multicast packets in duplicate.
 222     PlParam "CapturePacketsOnOlsrInterfaces" "yes"
 223 
 224     # The forwarding mechanism to use. Either "Broadcast" or
 225     # "UnicastPromiscuous". Defaults to "Broadcast".
 226     # In the "UnicastPromiscuous" mode, packets are forwarded (unicast) to the
 227     # best candidate neighbor; other neighbors listen promiscuously. IP-local
 228     # broadcast is not used. This saves air time on 802.11 WLAN networks,
 229     # on which unicast packets are usually sent at a much higher bit rate
 230     # than broadcast packets (which are sent at a basic bit rate).
 231     PlParam "BmfMechanism" "UnicastPromiscuous"
 232 
 233     # List of non-OLSR interfaces to include
 234     PlParam     "NonOlsrIf"  "eth2"
 235     PlParam     "NonOlsrIf"  "eth3"
 236   }
 237 
 238 BmfInterfaceIp
 239 --------------
 240 
 241 By default, the BMF network interface will get the IP address of the
 242 first OLSR interface, with a prefix length of 32. Having two network
 243 interfaces with the same IP address may seem strange, but it is not
 244 a problem, since the BMF network interface is not used in any point-to-
 245 point routing.
 246 
 247 The advantage of assigning a known OLSR IP address to the BMF network
 248 interface is that multicast packets, sent via the BMF network interface,
 249 get a known IP source address, to which the receivers of the packets
 250 can reply. That is useful when using, for example, the command
 251 "ping 224.0.0.1".
 252 
 253 An advantage of using a prefix length of 32 is that the Linux IP
 254 stack will not automatically enter a subnet routing entry (via the BMF
 255 network interface) into the kernel routing table. Such a routing entry
 256 would be useless, because the BMF network interface does not forward
 257 point-to-point traffic.
 258 
 259 If you configure a specific IP address and mask via the "BmfInterfaceIp"
 260 parameter, BMF will cause the specified IP host address to be advertised
 261 into the OLSR network via the HNA mechanism, so that the other hosts in
 262 the network know how to route back.
 263 
 264 CapturePacketsOnOlsrInterfaces
 265 ------------------------------
 266 
 267 If "CapturePacketsOnOlsrInterfaces" is set to "yes", any multicast
 268 or local broadcast IP packet, sent by an application on *any* OLSR
 269 interface, will be flooded over the OLSR network. Each OLSR host
 270 will receive the packet on its BMF network interface, "bmf0". The
 271 OLSR-interfaces will be in promiscuous mode to capture the multicast
 272 or local broadcast packets.
 273 
 274 For example, if "eth1" is an OLSR interface, the following command
 275 will result in one response from each OLSR host in the network:
 276 
 277   ping -I eth1 224.0.0.1
 278 
 279 A disadvantage of this configuration is that a host may, in rare
 280 cases, receive a multicast packet twice. This is best explained
 281 by looking at the following network diagram:
 282 
 283         eth0   eth0
 284       A ----------- B
 285  eth1 |            / eth1
 286       |           /
 287  eth0 |          /
 288       C --------+
 289         eth1
 290 
 291 Suppose host A is running a ping session that is sending ping
 292 packets on "eth1". The BMF process on host A will see the outgoing
 293 packets on "eth1", encapsulates these packets and sends the
 294 encapsulated packets on "eth0". Let's assume we are using the link
 295 quality extensions of OLSR, and the 2-hop path A - B - C is better
 296 (in terms of ETX) than the 1-hop path A - C. In that case host B is
 297 an MPR for host A. Host B receives the encapsulated packets of host A
 298 on its "eth0" interface, and, since it is an MPR, it decides to
 299 forward them on "eth1".
 300 
 301 In most cases, host C will receive the original, unencapsulated
 302 ping packet on its "eth0" interface before the encapsulated
 303 ping packet from host B arrives on its "eth1" interface. When the
 304 encapsulated packet from B arrives, the BMF process will then see
 305 that it is a duplicate and discard it.
 306 
 307 However, in the IP world, there are no guarantees, so it may
 308 happen that host C receives the encapsulated packet from host B
 309 first. That packet is then unpacked and locally delivered to the
 310 BMF network interface "bmf0". When the original, unencapsulated
 311 packet then comes in on "eth0", there is no way to stop it from
 312 being received (for a second time) by the Linux IP stack.
 313 
 314 As said, this may be a rare case. Besides, most applications
 315 can deal with a duplicate reception of the same packet. But if
 316 you're a purist and want everything to work correct, you should
 317 leave "CapturePacketsOnOlsrInterfaces" to its default value "no".
 318 
 319 A disadvantage of leaving "CapturePacketsOnOlsrInterfaces" to its
 320 default value "no" is that all multicast traffic must go via the
 321 BMF network interface "bmf0". However, this should not be a problem,
 322 since a route to all multicast addresses via the BMF network
 323 interface "bmf0" is automatically added when BMF is started.
 324 
 325 
 326 7. Adding non-OLSR interfaces to the multicast flooding
 327 -------------------------------------------------------
 328 
 329 As a special feature, it is possible to also forward from and to
 330 non-OLSR interfaces.
 331 
 332 If you have network interfaces on which OLSR is *not* running, but you *do*
 333 want to forward multicast and local-broadcast IP packets, specify these
 334 interfaces one by one as "NonOlsrIf" parameters in the BMF plugin section
 335 of /etc/olsrd.conf. For example:
 336 
 337   LoadPlugin "olsrd_bmf.so.1.4"
 338   {
 339     # Non-OLSR interfaces to participate in the multicast flooding
 340     PlParam     "NonOlsrIf"  "eth2"
 341     PlParam     "NonOlsrIf"  "eth3"
 342   }
 343 
 344 If an interface is listed both as "NonOlsrIf" for BMF, and in the
 345 Interfaces { ... } section of olsrd.conf, it will be seen by BMF
 346 as an OLSR-enabled interface.
 347 
 348 
 349 8. Interworking with other multicast routers
 350 --------------------------------------------
 351 
 352 In a typical interworking configuration there is a network of OLSR hosts
 353 in which one host acts as a gateway to a fixed infrastructure network.
 354 Usually that host will be advertising a default route via the HNA
 355 mechanism, e.g. by adding the following lines to its /etc/olsrd.conf
 356 file:
 357 
 358   Hna4
 359   {
 360   #   Internet gateway:
 361       0.0.0.0      0.0.0.0
 362   }
 363 
 364 Alternatively, the gateway is running OLSRDs dynamic internet gateway
 365 plugin; read the file ../../lib/dyn_gw/README_DYN_GW .
 366 
 367 The gateway host will usually have at least one OLSR-interface, and
 368 at least one non-OLSR interface, running a third-party routing protocol
 369 like OSPF.
 370 
 371 It is beyond the scope of this document to deal with the interworking
 372 between BMF and all possible multicast routing daemons. As an example,
 373 let's assume the gateway is running the mrouted multicast daemon (which
 374 implements the DVMRP protocol). Also, assume that all the IP addresses
 375 in the OLSR network are within the IP subnet 10.0.0.0/8 . Then mrouted
 376 on the gateway needs to be configured to accept IGMP requests from IP
 377 clients within the 10.0.0.0/8 subnet on the BMF network interface
 378 ("bmf0"). This is easily configured by adding a line to the
 379 /etc/mrouted.conf configuration file:
 380 
 381   phyint bmf0 altnet 10.0.0.0/8
 382 
 383 Not strictly necessary, but clean, is to disable the DVMRP protocol
 384 on the OLSR interfaces, as no DVMRP routers are expected inside the
 385 OLSR network. Suppose the gateway is running OLSR on "eth1", then
 386 add the following line /etc/mrouted.conf :
 387 
 388   phyint eth1 disable
 389 
 390 Finally, mrouted does not accept interfaces with prefix length 32.
 391 Therefore, override the default IP address and prefix length of
 392 the BMF network interface, by editing the /etc/olsrd.conf file.
 393 For example:
 394 
 395   LoadPlugin "olsrd_bmf.so.1.4"
 396   {
 397       PlParam "BmfInterfaceIp" "10.10.10.4/24"
 398   }
 399 
 400 Note that it is not necessary, and even incorrect, to pass the
 401 non-OLSR interface to BMF as a "NonOlsrIf" parameter in the
 402 "LoadPlugin" section of the gateway host. When the mrouted
 403 multicast daemon is running, the forwarding of multicast traffic
 404 between the OLSR interface and the non-OLSR interface is done by
 405 the Linux kernel.
 406 
 407 The remaining text in this section has nothing to do with BMF or
 408 OLSR, but is added to give a number of helpful hints you might
 409 need when your multicast interworking, for some reason, is not working.
 410 
 411 When using the mrouted multicast daemon, there is a useful command,
 412 mrinfo, that gives information about what mrouted thinks of its
 413 neighbor hosts. For example:
 414 
 415   root@node-4:/# mrinfo
 416   127.0.0.1 (localhost.localdomain) [DVMRPv3 compliant]:
 417     10.1.2.4 -> 10.1.2.2 (10.1.2.2) [1/1/querier]
 418     10.0.6.4 -> 0.0.0.0 (local) [1/1/disabled]
 419     10.255.255.253 -> 0.0.0.0 (local) [1/1/querier/leaf]
 420 
 421 In this example, the line starting with "10.1.2.4" is for the
 422 non-OLSR interface "eth0", on which mrouted has found an
 423 mrouted-neighbor host "10.1.2.2". The next line is for the OLSR
 424 interface "eth1", which is disabled for mrouted. The last line
 425 is for the BMF interface "bmf0". It is clear that mrouted sees no
 426 mrouted-neighbors on that interface (leaf).
 427 
 428 To see what multicast traffic has flown through the gateway, view
 429 the files /proc/net/ip_mr_vif and /proc/net/ip_mr_cache:
 430 
 431   root@node-4:/# cat /proc/net/ip_mr_vif
 432   Interface      BytesIn  PktsIn  BytesOut PktsOut Flags Local    Remote
 433    0 eth0          27832      98     14200      50 00000 0402010A 00000000
 434    2 bmf0          14484      51     13916      49 00000 FDFFFF0A 00000000
 435   root@node-4:/# cat /proc/net/ip_mr_cache
 436   Group    Origin   Iif     Pkts    Bytes    Wrong Oifs
 437   4D4237EA C747010A 0         51    14484        0  2:1
 438   4D4237EA C702010A 0         51    14484        0  2:1
 439   4D4237EA C84C000A 2         53    15052        0  0:1
 440 
 441 From the above we can deduce that traffic from input interface 0
 442 (Iif 0, "eth0") is forwarded on output interface 2 (Oifs 2, = "bmf0"),
 443 and traffic from input interface 2 (Iif 2, "bmf0") is forwarded on
 444 output interface 0 (Oifs 0, "eth0"). The ":1" behind the Oifs numbers
 445 indicates the TTL thresholds, in this case packets with TTL value 1
 446 or less will not be forwarded.
 447 
 448 When you are connecting an OLSR-BMF network to another multicast network
 449 (e.g. a DVMRP network), you might be surprised that, when you ping the
 450 all-routers multicast address 224.0.0.1 from within the OLSR network,
 451 only the OLSR hosts respond. This is, however, compliant behaviour:
 452 packets with their destination IP address in the range 224.0.0.0 -
 453 224.0.0.255 are not routed by normal multicast protocols (i.e. their
 454 TTL is implicitly assumed to be 1).
 455 
 456 
 457 9. Testing in a lab environment
 458 -------------------------------
 459 
 460 When using equipment like switches or hubs, usually all the hosts see each
 461 other. In an OLSR lab environment, we sometimes want to simulate the
 462 situation that some hosts in the network cannot directly see other hosts
 463 (as 1-hop neighbors) but only indirectly (as 2- or more-hop neighbors).
 464 To simulate that situation, the iptables tool is often used (see
 465 www.netfilter.org). For BMF, however, that is nog enough.
 466 
 467 For OLSR testing, setup iptables on each host to drop packets from
 468 all other hosts which are not direct (1-hop) neigbors. For example, to
 469 drop all packets from the hosts with MAC addresses 00:0C:29:51:32:88,
 470 00:0C:29:61:34:B7 and 00:0C:29:28:0E:CC, enter at the shell prompt:
 471 
 472   iptables -A INPUT -m mac --mac-source 00:0C:29:51:32:88 -j DROP
 473   iptables -A INPUT -m mac --mac-source 00:0C:29:61:34:B7 -j DROP
 474   iptables -A INPUT -m mac --mac-source 00:0C:29:28:0E:CC -j DROP
 475 
 476 For BMF testing, edit the file /etc/olsrd.conf, and specify the MAC
 477 addresses of the hosts we do not want to see. (Even though packets from
 478 these hosts are dropped by iptables, they are still received on network
 479 interfaces if they are in promiscuous mode.) For example:
 480 
 481   LoadPlugin "olsrd_bmf.so.1.4"
 482   {
 483     # Drop all packets received from the following MAC sources
 484     PlParam     "DropMac"    "00:0C:29:51:32:88" # RemoteClient1
 485     PlParam     "DropMac"    "00:0C:29:61:34:B7" # SimpleClient1
 486     PlParam     "DropMac"    "00:0C:29:28:0E:CC" # SimpleClient2
 487   }
 488 
 489 See also the notes in the 'packet' manpage ("Packet sockets are not
 490 subject to the input or output firewall chains").
 491 
 492 
 493 10. Common problems, FAQ
 494 ------------------------
 495 
 496 ---------
 497 Question:
 498 On which platforms does BMF currently compile?
 499 
 500 Answer:
 501 Only on Linux. No compilation on Windows (yet). The oldest Linux
 502 kernel on which the BMF plugin was tested was version 2.4.18.
 503 
 504 
 505 ---------
 506 Question:
 507 When starting OLSRD with the BMF plugin, I can see the following
 508 error message:
 509 
 510 OLSRD Basic Multicast Forwarding (BMF) plugin: error opening /dev/net/tun: No such file or directory
 511 
 512 Wat to do?
 513 
 514 Answer:
 515 Turn on the possibility to create a tuntap interface; see section 2 of this
 516 file.
 517 
 518 
 519 ---------
 520 Question:
 521 When starting OLSRD with the BMF plugin, I can see the following
 522 error message:
 523 
 524 OLSRD Basic Multicast Forwarding (BMF) plugin: error opening /dev/net/tun: No such device
 525 
 526 Wat to do?
 527 
 528 Answer:
 529 First, turn on the possibility to create a tuntap interface; see section 2 of this
 530 file. Check if the device is there:
 531  
 532   ~ # ls -l /dev/net/tun
 533   crw-------    1 root     root      10, 200 Sep  9  2006 /dev/net/tun
 534 
 535 If the device is there, but the error message remains to appear, the
 536 tap/tun device is not compiled in your kernel. Try the command:
 537 
 538   modprobe tun
 539 
 540 If "modprobe tun" says something like "modprobe: Can't locate module tun", then either
 541 it is not compiled at all or it is not compiled into the kernel. 
 542 
 543 Note: if you do not want to receive multicast packets, only forward the packets
 544 that other hosts send, then you do not need the tuntap interface. This could be the
 545 case if your host is purely an OLSR router; normally no traffic will be directed
 546 to the router itself. In that case you can ignore this error message. Beware, though,
 547 that you will then not be able to do the simple 'ping 224.0.0.1' test (as described in
 548 section 4. How to check if it works) to check for the presence of all OLSR-BMF routers
 549 in the network. 
 550 
 551 
 552 ---------
 553 Question:
 554 I have enabled BMF, but my multicast application is not receiving any
 555 multicast packets.
 556 
 557 Answer:
 558 Many multicast applications must be configured to listen to a specific
 559 network interface. Make sure that your multicast application is listening on
 560 the BMF network interface, either by specifying the interface name itself
 561 (e.g. "bmf0") or by specifying its IP address.
 562 
 563 
 564 11. Version history
 565 -------------------
 566 
 567 31 Mar 2007: Version 1.4
 568 * Optimized the standard forwarding mechanism in such a way that
 569   retransmissions of packets are only done on those network interfaces
 570   that make a host a multi-point relay (MPR) for the sender. I.e.:
 571   retransmitting a packet on a network interface is not done if that
 572   does not lead to any new hosts being reached.
 573 * Optimized the standard forwarding mechanism such that, if the network
 574   topology indicates there is only one neighbor on an interface, packets are
 575   sent to the specific IP address (unicast) of that neighbor. If the network
 576   topology indicates there are multiple neighbors, then BMF will still send
 577   packets to the IP local-broadcast address.
 578 * Introduced a new forwarding mechanism, using only IP-unicast to
 579   forward packets. Packets are forwarded to the best candidate neighbor;
 580   other neighbors listen promiscuously. IP-local broadcast is not used.
 581   This saves air time on 802.11 WLAN networks, on which unicast packets are
 582   usually sent at a much higher bit rate than broadcast packets (which are
 583   sent at a basic bit rate).
 584   This mechanism can be activated by specifying the following plugin
 585   parameter:
 586     PlParam "BmfMechanism" "UnicastPromiscuous"
 587   See also section 6 - Advanced configuration.
 588 
 589 18 Dec 2006: Version 1.3
 590 * Added the possibility to configure the BMF network interface:
 591   name (e.g. "bmf0"), type (tun or tap), IP address and subnet
 592   mask.
 593 * Flooding of local broadcast packets (e.g. with destination
 594   IP address 192.168.1.255) can now be turned off by configuration.
 595 * When an application sends packets to the BMF network interface, BMF
 596   also floods these packets over the OLSR network.
 597 * Removed the TTL decrementing so that equipment connected to
 598   a non-OLSR interface can still send their IGMP messages (TTL = 1)
 599   to a fixed multicast router (running e.g. mrouted - DVMRP)
 600   connected to a non-OLSR interface on another host in
 601   the OLSR network. In this way, a whole OLSR network, including
 602   its non-OLSR capable hosts, can be made multicast-routable
 603   from a fixed multicast-enabled IP network.
 604   For an example of such a configuration read section 8 above.
 605 * Removed the check for 'IsNullMacAddress' when creating a network
 606   interface object. The check was not necessary and prevented
 607   BMF to work on non-ethernet interfaces such as ppp.
 608 * Bug fix: in case there are multiple OLSR interfaces, when an
 609   application sends packets to one OLSR interface, BMF did not
 610   flood these packets via the other OLSR interfaces. This is
 611   fixed. Also, packets sent to an OLSR interface are transmitted
 612   on the non-OLSR interfaces.
 613 
 614 23 Oct 2006: Version 1.2
 615 * Packets to a local broadcast destination have their destination
 616   IP address adapted to the subnet on which they are forwarded.
 617   This makes it possible to use broadcast-based services (such as
 618   NetBIOS) across different IP subnets.
 619 * The code to relate fragments with their main IP packet did not
 620   work when the fragment arrived earlier than the main packet.
 621   This would cause fragments of BMF-packets to be falsely forwarded.
 622   For now, removed the forwarding of IP fragments. (Who's using
 623   IP-fragments anyway?)
 624 * Packets are forwarded from one non-OLSR interface to the other
 625   non-OLSR interfaces.
 626 * Various small optimizations and style improvements.
 627 
 628 12 Jul 2006: Version 1.1
 629 * Major updates in code forwarding from and to non-OLSR enabled
 630   network interfaces.
 631 * Debug level 9 gives a better indication of what happens to each
 632   handled multicast/broadcast packet. To run the olsr daemon with
 633   debug level 9, run "olsrd -d 9"; if you're only interested in
 634   BMF debug messages, run "olsrd -d 9 | grep -i bmf".
 635 * Can now deal with network interface removal ("ifdown eth1") and
 636   addition ("ifup eth1").
 637 * CRC-calculation for duplicate detection is done over first 256
 638   bytes in packet instead of over full packet length.
 639 * CRC calculated only on captured packets, and is subsequently
 640   passed on in a special OLSR-BMF encapsulation header.
 641 * Deals correctly with fragmented packets
 642 
 643 27 Apr 2006: Version 1.0.1
 644 * First release.

Nuovo allegato

File da caricare
Rinominare come
Sostituire un allegato dallo stesso nome
Di che colore era il cavallo bianco di Napoleone?

Allegati

Per riferirsi agli allegati di una pagina, usare attachment:NOME_FILE, come mostrato qui sotto nell'elenco degli allegati. NON usare l'URL che si trova in corrispondenza del collegamento [scarica], potrebbe cambiare in futuro.
  • [scarica | mostra] (2007-05-14 21:26:12, 25.9 KB) [[attachment:bmfreadme.txt]]