Browse Prior Art Database

Enhanced Duplicate Address Detection (RFC7527) Disclosure Number: IPCOM000241427D
Original Publication Date: 2015-Apr-01
Included in the Prior Art Database: 2015-Apr-25
Document File: 22 page(s) / 25K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Asati: AUTHOR [+5]


IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are discussed in Appendix A of [RFC4862]. That specification mentions a hardware-assisted mechanism to detect looped back DAD messages. If hardware cannot suppress looped back DAD messages, a software solution is required. One specific DAD message is the Neighbor Solicitation (NS), specified in [RFC4861]. The NS is issued by the network interface of an IPv6 node for DAD. Another message involved in DAD is the Neighbor Advertisement (NA). The Enhanced DAD algorithm specified in this document focuses on detecting an NS looped back to the transmitting interface during the DAD operation. Detecting a looped back NA does not solve the looped back DAD

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 11% of the total text.

Internet Engineering Task Force (IETF)                          R. Asati Request for Comments: 7527                                      H. Singh Updates: 4429, 4861, 4862                                      W. Beebee Category: Standards Track                                   C. Pignataro ISSN: 2070-1721                                      Cisco Systems, Inc.                                                                  E. Dart                                    Lawrence Berkeley National Laboratory                                                                W. George                                                        Time Warner Cable                                                               April 2015

                   Enhanced Duplicate Address Detection


   IPv6 Loopback Suppression and Duplicate Address Detection (DAD) are    discussed in Appendix A of RFC 4862.  That specification mentions a    hardware-assisted mechanism to detect looped back DAD messages.  If    hardware cannot suppress looped back DAD messages, a software    solution is required.  Several service provider communities have    expressed a need for automated detection of looped back Neighbor    Discovery (ND) messages used by DAD.  This document includes    mitigation techniques and outlines the Enhanced DAD algorithm to    automate the detection of looped back IPv6 ND messages used by DAD.    For network loopback tests, the Enhanced DAD algorithm allows IPv6 to    self-heal after a loopback is placed and removed.  Further, for    certain access networks, this document automates resolving a specific    duplicate address conflict.  This document updates RFCs 4429, 4861,    and 4862.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at

Asati, et al.                Standards Track                    [Page 1]
 RFC 7527                      Enha...