One document matched: draft-calhoun-mobileip-proactive-fa-02.txt
Differences from draft-calhoun-mobileip-proactive-fa-01.txt
INTERNET DRAFT Pat R. Calhoun
Category: Standards Track Sun Microsystems, Inc.
Title: draft-calhoun-mobileip-proactive-fa-02.txt Tom Hiller
Date: September 2000 Lucent Technologies
James Kempf
Sun Microsystems, Inc.
Peter J. McCann
Lucent Technologies
Chandana Pairla
University of Illinois
Ajoy Singh
Sebastian Thalanany
Motorola
Foreign Agent Assisted Hand-off
Status of this Memo
This document is an individual contribution for consideration by the
Mobile IP Working Group of the Internet Engineering Task Force.
Comments should be submitted to the mobile-
ip@standards.nortelnetworks.com mailing list.
Distribution of this memo is unlimited.
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at:
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at:
http://www.ietf.org/shadow.html.
Calhoun et al. expires February 2001 [Page 1]
INTERNET DRAFT September 2000
Copyright (C) The Internet Society 2000. All Rights Reserved.
Abstract
The Mobile IP protocol allows a Mobile Node to continue using the
same home address even after changing its point of attachment to the
Internet. This provides transparency to most existing applications
that assume a fixed address and a fixed point of attachment.
However, new applications, such as voice-over-IP, have additional
real-time requirements such that a change in the point of attachment
will cause a noticeable degradation of service unless additional
steps are taken to reduce the latency of a handoff event.
This specification proposes extensions to the Mobile IP protocol that
may be used by Foreign Agents to set up a Mobile Node's visitor
entry, and forward its packets, prior to receiving a formal
Registration Request from the Mobile Node. This enables a very rapid
establishment of service at the new point of attachment so that the
effect of the handoff on real-time applications is minimized.
Table of Contents
1.0 Introduction
1.1 Requirements language
1.2 Terminology
1.3 Fast handoffs
2.0 Registration Latency
2.1 Gateway Foreign Agents
2.2 Anchor Foreign Agent
3.0 Movement Detection
3.1 Ping-Pong effect
4.0 Reverse Tunneling Support
5.0 Security Relationships
6.0 Power Consumption
7.0 Operation
7.1 Foreign Agent Considerations
7.2 Gateway/Anchor Foreign Agent Considerations
8.0 Binding Update extensions
9.0 Link Layer Address NAI
9.1 CDMA 2000 Link Layer Address Extension
9.2 Ethernet Link Layer Address Extension
10.0 Error Values
11.0 IANA Considerations
12.0 Security Considerations
13.0 References
14.0 Acknowledgements
15.0 Authors' Addresses
Calhoun et al. expires February 2001 [Page 2]
INTERNET DRAFT September 2000
16.0 Full Copyright Statement
Calhoun et al. expires February 2001 [Page 3]
INTERNET DRAFT September 2000
1.0 Introduction
This specification proposes extensions to the Mobile IP protocol that
may be used by Foreign Agents to set up a Mobile Node's visitor
entry, and forward its packets, prior to receiving a formal
Registration Request from the Mobile Node. This enables a very rapid
establishment of service at the new point of attachment so that the
effect of the handoff on real-time applications is minimized. The
proposed extensions make a few minimal assumptions about support
available from the link layer. These assumptions are fairly broad and
abstract. Although they address the kinds of link layer support
available in existing radio link layers, the assumptions are not
based on any specific radio link protocol.
The extensions handle both intra-domain and inter-domain handoff.
While intra-domain handoff MAY make use of pre-configured security
associations between Mobility Agents, inter-domain handoffs MAY make
use of the AAA infrastructure. In the case of inter-technology
handoff, active involvement by the mobile is necessary to switch from
one network interface to another; however, the delivery of the agent
advertisements, indicating the availability of a mobility agent on a
new network interface, is still controlled by network assisted
handoff.
In summary, this draft covers a hand-off scenario not addressed by
RFC 2002: that of a pro-active, network-controlled, anchor-chained
hand-off.
1.1 Requirements language
In this document, the key words "MAY", "MUST, "MUST NOT", "optional",
"recommended", "SHOULD", and "SHOULD NOT", are to be interpreted as
described in [4].
1.2 Terminology
This document frequently uses the following terms:
AAA
Authentication, accounting and authorization.
Anchor Foreign Agent (AFA)
A foreign agent with publicly routable IP address that acts as
an anchor point when a mobile moves to a new foreign agent.
Upon successful global registration (registration with home
agent) of a mobile node, the anchor foreign agent supports
Calhoun et al. expires February 2001 [Page 4]
INTERNET DRAFT September 2000
local registration when the mobile node changes its point of
attachment to some other neighboring foreign agents.
cdma2000
This is a wide-band radio transmission technology standard,
that uses CDMA(code division multiple access) technology, to
meet the demands of a third-generation wireless communication
system.
Connection ID
A number used to differentiate different link layer connections
originated from the same device.
Dormant mode
Certain wireless technologies support dormancy, which allows
the mobile to go into power saving mode. This typically occurs
when the mobile has been idle for some time, but could be
initiated by the network.
Foreign Agent IP Address Derivation
The derivation of the IP address of a source foreign agent or a
target foreign agent based on the receipt of a link layer
trigger at the target foreign agent or the source foreign agent
respectively.
Gateway Foreign Agent(GFA)
A foreign agent with publicly routable IP address that acts as
a concentration point for other foreign agents within an
administrative domain. Upon successful global registration
(registration with Home agent) of a mobile node, the GFA
supports local registration when the mobile node changes its
point of Attachment to some other foreign agent of the same
administrative Domain.
Home Domain
The domain where the home network [1] and home agent [1] are
located.
International Mobile Subscriber information (IMSI)
A number used for identifying a mobile subscriber station.
Link layer
A link layer specifies a protocol used by communicating nodes
to exchange information over a physical link. A mobile node
attaches itself to a mobile access network, before it can be
served by a foreign agent. A mobile node's link layer address
is the media access control(MAC) address of the mobile node's
network interface.
Calhoun et al. expires February 2001 [Page 5]
INTERNET DRAFT September 2000
Mobility Agent
A foreign agent or a home agent. The foreign agent types
include an anchor foreign agent and a gateway foreign agent.
Mobility Advertisement
An advertisement message constructed by attaching a special
extension to a router advertisement message.
Movement Detection
A detection of a movement in the link layer attachement of the
mobile node to a mobile access network.
Ping-Pong Handoff
The rapid oscillation of a mobile node among coverage area of
two or more foreign agents.
Proactive Foreign agent
A foreign agent that initiates mobile/IP registration on behalf
of a mobile node due to reception of some link layer trigger
event.
Source Trigger
A signal received by the source foreign agent mobile/IP stack,
via the link layer, when the mobile node departs from the
serving area of the source foreign agent.
Target Trigger
A signal received by the target foreign agent mobile/IP stack,
via the link layer, when the mobile node arrives at the serving
area of the target foreign agent.
Trigger
The link layer signal used by wireless link layer to inform
inter foreign agent handoff event to Mobile/IP stack.
Visited Domain
An administrative domain, visited by a Mobile IP client, and
containing the AAA infrastructure needed to carry out the
necessary operations enabling Mobile IP registrations. From
the point of view of the foreign agent, the foreign domain is
the local domain.
1.2 Fast handoffs
MNs connect to FAs via direct, link-layer connections. Because an FA
is directly connected to the link-layer, it may obtain link-layer
information such as power measurements that might indicate the
Calhoun et al. expires February 2001 [Page 6]
INTERNET DRAFT September 2000
necessity of a hand-off to a new FA. The FA can also gain assurance
of the MN's identity through link-layer authentication, and can
authenticate the stream of traffic coming from the MN, including any
power measurements or other indications used for hand-off.
In this document, we will assume that the link-layer events are
signaled to the Foreign Agent as "triggers". The acquisition of a
"trigger" to signal that a hand-off is necessary may be more
difficult when the technologies differ. We assume that any such
triggers will be sufficient to derive the IP addresses of the Foreign
Agents that will receive or send the hand-off. If such a trigger is
not available or if the MN decides on its own that a hand-off is to
take place, then one of the FAs can often still derive the identity
(IP address) of the other from link-layer messages.
In order for the Mobile IP protocol to provide fast hand-off, the
following problems must be addressed:
1. Reducing the latency involved in the registration process.
Although optimization of the Registration process is not
typically considered a Hand-Off problem, this proposal assumes
that such a mechanism is in place.
2. Reducing the latency involved in the Mobile Node's movement
detection process.
3. "Bi-casting" the Mobile Node's traffic to two (or more) points
of attachment, ensuring that the mobile's traffic is delivered
as soon as the link layer hand-off is completed.
4. Support for Reverse Tunneling, which MAY be required for
private addresses.
5. The Security Relationships between the mobility entities for
inter-domain hand-offs.
6. Does not increase mobile power consumption
2.0 Registration Latency
The Mobile IP protocol [1] requires that a Mobile Node registers with
a Foreign Agent, and subsequently its Home Agent, in order to have
its packets delivered to its current point of attachment. The Mobile
IP Regional Registration [6] specification proposes optimized
registration approaches using two different methods:
1. Gateway Foreign Agents (GFA), which are mobility agents that
act as concentration points for Foreign Agents within an
Administrative Domain.
2. Anchor Foreign Agents (AFA), where a previously used Foreign
Agent becomes an anchor point when a mobile moves to a new
Foreign Agent.
Calhoun et al. expires February 2001 [Page 7]
INTERNET DRAFT September 2000
Both GFAs and AFAs allow a Mobile Node's registration message to be
processed by a Mobility Agent in the local domain, eliminating the
need to contact the Home Agent, which MAY be topologically distant.
2.1 Gateway Foreign Agents
The Mobile IP Regional Registration specification introduces the
Gateway Foreign Agent (GFA), as a mobility agent that two Foreign
Agents providing service to a Mobile Node have in common. Figure 1
provides an example of a Mobile's initial registration, through the
GFA. Given this is the first registration message, the message MUST
be forwarded to the Home Agent. All packets destined for the mobile
will be delivered to the GFA, which in turn will forward the packets
to the Foreign Agent servicing the Mobile Node.
Reg Req +-----+ Reg Req
+----------->| oFA |--------------+
| +-----+ |
| v
+----+ +-----+ Reg Req +----+
| MN | | GFA |<------->| HA |
+----+ +-----+ +----+
+-----+
| nFA |
+-----+
Figure 1 - Initial Registrations through GFA
In the event that the mobile moves to a new Foreign Agent that is
serviced by a GFA that is common with oFA, the Mobile Node MAY issue
a Regional Registration Request (see Figure 2). The Regional
Registration message does not need to be forwarded to the Home Agent,
since the mobile's traffic can still be delivered to the same GFA.
This optimized approach effectively reduces the latency involved in
the registration process.
Calhoun et al. expires February 2001 [Page 8]
INTERNET DRAFT September 2000
+-----+
| oFA |
+-----+
+----+ +-----+ +----+
| MN | | GFA | | HA |
+----+ +-----+ +----+
| ^
| +-----+ |
+------------>| nFA |-------------+
Regional Reg +-----+ Regional Reg
Figure 2 - Regional Registration through GFA
2.2 Anchor Foreign Agent
The Mobile IP Regional Registration specification introduces what
this document will call the Anchor Foreign Agent, which is similar to
[7]. The Anchor Foreign Agent operates very similarly to the GFA,
with the exception that the mobile's old Foreign Agent acts as an
anchor point for the Mobile Node.
In order to minimize the latency involved in the registration
process, the Mobile Node MAY issues a Regional Registration message,
setting the old Foreign Agent as the GFA, as shown in Figure 3. Once
completed, the Mobile Node MAY issue an additional RFC 2002 compliant
Registration Messages to eliminate the routing leg through the anchor
Foreign Agent.
+-----+ +----+
| oFA | | HA |
+-----+ +----+
^
+----+ |
| MN | | Regional
+----+ | Reg
| |
| +-----+
+------------>| nFA |
Regional Reg +-----+
Figure 3 - Regional Registrations through an AFA
3.0 Movement Detection
The Mobile IP protocol [1] and the Regional Registration extension
[6] require Mobile Nodes to listen for, or solicit, advertisements in
order to detect that a movement to a new IP subnet has occurred. This
Calhoun et al. expires February 2001 [Page 9]
INTERNET DRAFT September 2000
movement detection mechanism introduces significant latency into the
hand-off process, which causes service degradation, especially for
real-time services. Service is further impacted given the additional
latency introduced through the registration process that follows the
movement detection, since the mobile's traffic can only be delivered
once all of the registration has completed.
There have been many solutions proposed to solve this problem,
including increasing the advertisement frequency. In networks where
radio spectrum is expensive or bandwidth is limited, the additional
signaling required for increasing advertisement frequency is a
serious issue impacting deployability.
+-----+
| GFA |
+-----+
^ |
2b. Regional Reg | | 3b. Regional Reply
| |
| v
+-----+ 1. Binding Update +-----+
| | -----------------> | |
| oFA | 2a. Regional Reg | nFA |
| | <----------------- | |
+-----+ 3a. Regional Reply +-----+
----------------->
+-----+ Movement +-----+
| MN | - - - - - - - - -> | MN |
+-----+ +-----+
Figure 4 - "source trigger" hand-off using either AFA or GFA
In this document, we propose that the Foreign Agent take a pro-active
approach and issue the Regional Registration message on behalf of the
Mobile Node (acting as a surrogate of sorts). When a Foreign Agent is
aware that a hand-off is occurring at the link-layer, a trigger is
sent to the Mobile IP protocol stack. This trigger could occur either
at old Foreign agent (see Figure 4), or at the new Foreign agent(see
Figure 5). The source trigger can be obtained at the old FA once the
link layer detects that the MN is departing from the old FA coverage
area. The target trigger can be obtained at the new FA once the link
layer detects that the MN is arriving at the new FA coverage area.
Both the source and target trigger may be available before the actual
completion of the link layer handoff.
Calhoun et al. expires February 2001 [Page 10]
INTERNET DRAFT September 2000
+-----+
| GFA |
+-----+
^ |
3b. Regional Reg | | 4b. Regional Reply
| |
1. Binding Request | v
+-----+ <---------------- +-----+
| | 2. Binding Update | |
| oFA | -----------------> | nFA |
| | 3a. Regional Reg | |
+-----+ <----------------- +-----+
4a. Regional Reply
----------------->
+-----+ Movement +-----+
| MN | - - - - - - - - -> | MN |
+-----+ +-----+
Figure 5 - "target trigger" hand-off using either AFA or GFA
Figures 4 & 5 provide an example of network initiated hand-off using
both an Anchor Foreign Agent and a Gateway Foreign Agent. The
messages whose numbers end with 'a' (e.g. 3a) are used with Anchor
Foreign Agents, while the messages with a 'b' are used with Gateway
Foreign Agents. The fact that both the AFA and the GFA are present in
Figures 4 & 5 are purely for illustrative purposes, as a network
would only use one method for a given mobile.
In Figure 4, oFA obtains link-layer information, such as power
measurements, that indicates the necessity of a hand-off to nFA. This
causes a trigger on oFA, which results in the transmission of a
Binding Update to nFA.
In Figure 5, if a GFA is being used, the nFA must issue a Binding
Request to oFA when it receives a trigger that indicates that a
link-layer handoff has occured. This is needed in order to determine
the GFA's address, if one was used. Upon receipt of a Binding
Request, oFA MUST reply with a Binding Update.
In both cases, the receipt of a Binding Update causes a Regional
Registration Request to be sent from nFA to either oFA (which acts as
the anchor FA) or the GFA. The associated Regional Registration Reply
contains the information required by nFA to establish its local
visitor entry.
In the event that the GFA information was provided by the link-layer,
the Binding Request and Update messages do not need to be exchanged
in the "target trigger" case. If this mechanism is used, the need for
Calhoun et al. expires February 2001 [Page 11]
INTERNET DRAFT September 2000
GRE and Reverse Tunneling would also have to be contained within the
link-layer messages. The need for modifying the link-layer messages
to carry such information is out of the scope of this specification.
The end result is that the new Foreign Agent already has a visitor
entry for the Mobile Node prior to the RFC 2002 Registration
procedure. The Mobile Node's packets may be delivered as soon as it
enters nFA's service area, and establishes the necessary air
interface channel.
3.1 Ping-Pong effect
Some link-layers are subject to rapid motion of MNs between two FAs.
For example, even though link-layer power measurements may indicate
that a hand-off is necessary, the mobile may fail to attach to the
new point of attachment, and return almost immediately to its old
point of attachment. This event is known as a "ping-pong" effect.
Data +-----+ Data
+-------------| oFA |<-------------+
| +-----+ |
v |
+----+ +-----+ Data +----+
| MN | | GFA |<--------| HA |
+----+ +-----+ +----+
^ |
| +-----+ |
+-------------| nFA |<-------------+
Data +-----+ Data
Figure 6 - Bi-Casting using a Gateway Foreign Agent
In such situations, it does not benefit the Mobile to issue a
registration in the new service area, and then move back to its old
point of attachment. To avoid problems with ping ponging, this
proposal makes use of the 'S' bit (Simultaneous Binding) in the
Regional Registration message, allowing the user's traffic to be
"Bi-Casted" to two or more Foreign Agents (see Figures 6 & 7).
Calhoun et al. expires February 2001 [Page 12]
INTERNET DRAFT September 2000
Data +-----+ Data +----+
+-------------| oFA |<--------------------------| HA |
| +-----+ +----+
v |
+----+ |
| MN | | Data
+----+ |
^ v
| +-----+
+-------------| nFA |
Data +-----+
Figure 7 - Bi-Casting using an Anchor Foreign Agent
When simultaneous bindings are in effect, and a ping-pong event
occurs, the mobile's service is guaranteed not to experience any
additional latency beyond that imposed by the link-layer handoff. It
is also possible for Foreign Agents to issue Regional Registrations
with the 'S' bit enabled in order to provide for a smooth hand-off
between service areas.
4.0 Reverse Tunneling Support
In the event the Mobile Node requested Reverse Tunneling [12]
support, by setting the 'T' bit in its Registration Request, the
Binding Update (see Section 8.0) from either oFA or the GFA includes
the 'T' bit enabled to inform nFA to establish a bi-directional
tunnel for the visitor entry.
5.0 Security Relationships
The Mobile IP Regional Registration specification [6] requires that
the communicating Mobility Agents exchange authenticated messages.
This imposes a requirement for Mobility Agents to share a pre-
established security association. This assumption is valid for
intra-domain mobility (mobility within an Administrative Domain).
However, such a requirement introduces a scaling problem when the
Mobility Agents are owned by separate Administrative Domains (ADs).
Given that the existing AAA infrastructure is used to establish
dynamic security associations between Foreign and Home Agents in
different ADs, the same infrastructure could be used to establish the
required security association for the purposes of inter-domain hand-
offs (see Figure 8).
Calhoun et al. expires February 2001 [Page 13]
INTERNET DRAFT September 2000
+-----+ +-----+
| AAA |-------------->| AAA |
+-----+ +-----+
^ |
| |
| AAA |
| Hand-Off |
| Req |
| v
+-----+ +-----+
| oFA | | nFA |
+-----+ +-----+
+-----+ Movement +-----+
| MN | - - - - - - > | MN |
+-----+ +-----+
Figure 8 - Inter-FA communication using AAA
Note that it is possible for geographically neighboring Foreign
Agents owned by different Administrative Domains to have a pre-
established security association, which would reduce the latency
introduced by the AAA infrastructure traversal. Given that such
geographically neighboring FAs MAY be small in number, such an
approach MAY be reasonable.
6.0 Power Consumption
An additional benefit that derives from this proposal is the
potential for tracking mobile nodes while in dormant mode, if the
radio link supports it, allowing significant power saving without
adding additional complexity to the network layer protocol in the
wired network. One of the primary innovations proposed here, namely
to allow the Foreign Agents to set up visitor entries prior to the
Mobile Node's registration, is also useful for power saving. Certain
radio link layers allow the mobile node to enter dormant mode when
idle. Allowing the network to control the handoff ensures that the
mobiles do not have to be removed out of dormant mode in order to
establish a Mobile IP handoff.
Limiting power consumption is a requirement for certain wireless
Standards Defining Organizations (SDOs), and a Mobile IP fast handoff
proposal MUST satisfy this requirement.
7.0 Operation
A Foreign Agent can receive two different types of triggers informing
Calhoun et al. expires February 2001 [Page 14]
INTERNET DRAFT September 2000
it of a handoff (The event that causes the trigger may be derived via
link layer messaging assistance from the network or from the mobile):
- a "source trigger" is when the old FA is informed of an
upcoming link-layer handoff,
- a "target trigger" occurs at the new FA when it is informed
that a link layer handoff is in progress.
It is also possible that a particular kind of link layer technology
can support both source and target triggers.
The method by which such triggers occur are link-layer specific, and
are outside the scope of this document.
When the new Foreign Agent receives a "target trigger" event
notification, it SHOULD issue a Binding Request [5] message to the
old Foreign Agent. This is necessary in order to determine whether a
GFA was used.
When the old Foreign Agent receives a "source trigger" event
notification, or a Binding Request, it MUST issue a Binding Update
[5] message to the new Foreign Agent. The Binding Update contains the
Mobile Node's home address, any security association information [8],
as well as the identity of either the Gateway Foreign Agent (GFA) or
the Anchor Foreign Agent (AFA). The Mobile's link-layer address MUST
also be provided within the Binding Update (see Section 9).
The new Foreign Agent MUST issue a Regional Registration Request
message to either the AFA, or the GFA, upon receipt of a Binding
Update message. The Regional registration message MUST include the
mobile's link-layer address, as specified in Section 9. The Regional
Registration message MAY have the 'S' bit enabled, depending upon
local policy (see Section 3.1). The Regional Registration's lifetime
field specifies the proposed GFA or AFA's visitor entry duration.
Should the GFA or AFA not receive a new Regional Registration
message, or a Registration Request message from the Mobile Node prior
to the expiration of the lifetine, it SHOULD expire the visitor entry
tied to the new Foreign Agent.
The Regional Registration Reply message from the AFA or GFA MUST
include the Mobile Node's Home Address, Home Agent Address, any
security associations used with those nodes, visitor entry lifetime,
and the flags that were agreed upon at registration time.
Once the Mobile Node establishes a link layer channel with the new
Foreign Agent, its traffic will be immediately delivered along with a
Mobility Advertisement message [1]. Upon receipt of the Advertisement
message, the Mobile Node MUST issue a Registration Message to update
Calhoun et al. expires February 2001 [Page 15]
INTERNET DRAFT September 2000
its Home Agent's binding table.
Note that the Foreign Agent MAY delay sending the Mobility
Advertisement message, especially to reduce noticeable service
disruption during a ping-pong effect. However, when doing so, it MAY
need to re-issue a new Regional Registration message to either the
AFA or GFA, to extend the visitor entry's lifetime. This procedure
MAY also be used in wireless technologies that support dormant
mobiles, in order to eliminate the need for the mobile to wake up and
perform a Mobile IP registration. In the case of a dormant mobile, or
a mobile outside of the local service area, incoming data destined
for the Mobile Node MAY require the Foreign Agent to cause a
transmission of a link-layer page message.
Given that a Mobile Node's packets will be delivered prior to
registration, a Mobile Node is free to discard all packets received
from Foreign Agents with which it hasn't registered.
If GFAs are used, and a Foreign Agent determines that a Mobile Node
is no longer in its service area, it SHOULD issue a Regional
Registration message with the lifetime set to zero (0), which will
remove the current visitor entry on the GFA. Foreign Agents MAY
decide to not issue this message immediately when a link-layer
trigger is received, in order to support smooth service during a
ping-pong event.
If AFAs are used, a Foreign Agent MUST issue a Regional Registration
message with a zero lifetime to the AFA once a successful
Registration Reply is received from the Mobile Node's Home Agent.
This will effectively change the Mobile Node's anchor point to the
new Foreign Agent.
7.1 Foreign Agent Considerations
Upon receipt of a "target trigger" event, the Foreign Agent MAY issue
a Binding Request [5] message to the Foreign Agent to whom the mobile
is being handed off.
Upon receipt of either a Binding Request or a "source trigger" event,
the Foreign Agent MUST issue a Binding Update message [5] to the
Foreign Agent to which the mobile is being handed off. The Binding
Update's Mobile Node Home Address field MUST be set to the recipient
of the message, while the Care-Of address field MUST be set to the
local address. The Binding Update message MUST include a Link Layer
Address NAI extension (Section 9). If the Foreign Agent made use of a
GFA for the mobile, the GFA IP Address Extension [6] MUST be present.
Calhoun et al. expires February 2001 [Page 16]
INTERNET DRAFT September 2000
Upon receipt of a Binding Update, the Foreign Agent MUST issue a
Regional Registration Request to either the GFA (if the GFA IP
Address Extension was present in the Binding Update), or the sender
of the Binding Update. The Regional Registration Request's Care-Of
address field MUST be set to the local Foreign Agent's address, while
the GFA IP Address MUST be set to the address of the recipient of the
request. The Link-Layer Address NAI (Section 9) extension MUST be
present. The request's lifetime field is set to an administratively
configured value, that is used to inform the recipient of the
expected lifetime for the visitor entry.
The above procedures require Foreign Agents to resolve the handoff
peer's link layer address to an IP address, and this particular
process is outside the scope of this document.
The GFA or AFA MUST reply with a Regional Registration Reply, which
MUST include the Link Layer Address NAI extension (Section 9), as
well as the Mobile Node's home and Home Agent addresses, the
remaining tunnel lifetime, as well as any flags that were set in the
Mobile Node's registration request message. If the code field
indicates a successful registration, the local Foreign Agent MUST
create a visitor entry for the Mobile Node.
In the event that a Foreign Agent handling a particular Mobile Node's
visitor entry is soon to expire, and the Mobile Node has not yet
issued a Registration Request, the FA has the option to transmit a
new Regional Registration message to either the GFA or AFA. Whether
the FA transmits a new Regional Registration is a policy decision up
to the network administrator.
A Foreign Agent MAY receive packets for a Mobile Node to which it
does not have a direct link layer connection. At this point, the
Foreign Agent MAY:
1. Drop all packets for the Mobile Node
2. Buffer packets for the Mobile Node
3. Attempt to establish a link-layer connection with the mobile
4. Issue a Regional Registration Request with a zero lifetime
When a Foreign Agent determines that it is no longer servicing a
Mobile Node, it SHOULD issue a Regional Registration Request message
with the lifetime field set to zero (0). This will cause the
associated visitor entry on the AFA or GFA to be expired.
If a Regional Registration Reply message is received with the code
field set to DO_NOT_SERVICE_MN (Section 10), the Foreign Agent SHOULD
NOT provide service to the Mobile Node. The Foreign Agent MAY enforce
this by closing the Link-Layer connection (if possible), not issuing
any Mobility Advertisements to the Mobile Node (assuming a point-to-
Calhoun et al. expires February 2001 [Page 17]
INTERNET DRAFT September 2000
point Link Layer), or simply denying all Registration Requests with
the error code set to 65 (Administratively Prohibited) [1].
7.2 Gateway/Anchor Foreign Agent Considerations
Upon receipt of a Regional Registration Request, a GFA or AFA MUST
create a visitor entry indicating the Mobile Node's current point of
attachment. In the event that a visitor entry already exists, the GFA
or AFA SHOULD be able to create multiple visitor entries for the same
Mobile Nodes with different Care-Of addresses. If the 'S' bit was
enabled in the Regional Registration Request, the GFA MUST be able to
forward the mobile's packets to all Foreign Agents in the visitor
entries.
When constructing the Regional Registration Reply, the AFA or GFA
SHOULD include the FA-FA authentication extension [6], and set the
lifetime field to the lesser of:
1. number of seconds before the Mobile Node's Registration with
its Home Agent will expire.
2. The lifetime of the locally created Visitor Entry.
In the event that the Regional Registration Request's lifetime field
was set to zero (0), the GFA or AFA MUST remove the visitor entry
associated with the Care-Of address in the message.
Should the GFA or AFA decide that the Foreign Agent is not to
provide service to the Mobile Node, it MUST issue a Regional
Registration Reply message, with the code field set to
DO_NOT_SERVICE_MN (see Section 10).
8.0 Binding Update extensions
This specification has identified a need for Reverse Tunneling to be
communicated in the Binding Update from oFA to nFA (see Figures 4 &
5).
Calhoun et al. expires February 2001 [Page 18]
INTERNET DRAFT September 2000
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type |A|I|M|G|T| Rsvd| Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Mobile Node Home Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Care-of Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
+ Identification +
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Extensions ...
+-+-+-+-+-+-+-+-
The only change to the Binding Update [5] is the additional 'T'
bit:
T nFA must establish a reverse tunnel for the visitor
entry
9.0 Generalized Link Layer Address Extension
This section defines the Generalized Link Layer Address (LLA)
Extension, used by any that needs to communicate Link Layer
Addresses. The format of the extension follows MIER [13], and each
sub-type of link-layer address defines its own sub-structure. This
draft defines two sub-types, the cdma2000 IMSI and the Ethernet
Address. Future RFCs should allocate their own sub-type and define
their own address formats.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | LLA ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
TBD (skippable) [1]
Length
The length of the Link Layer Address + the one octet Sub-Type field
Calhoun et al. expires February 2001 [Page 19]
INTERNET DRAFT September 2000
Sub-Type
This field contains the Link Layer sub-type identifier
LLA
Contains the Link Layer Address
In this document, two subtypes are defined:
1 cdma2000 International Mobile Station Identity [14]
2 Ethernet 48 bit MAC address [15]
9.1 cdma2000 Link Layer Address Extension
The cdma2000 Link Layer Address Extension contains the International
Mobile Station Identity, as defined in [14].
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | IMSI ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
TBD (skippable) [1]
Length
The length of the IMSI field + the one octet Sub-Type field
Sub-Type
1
IMSI
Contains the IMSI, in the form:
<IMSI>:<Connection Id>
Where the <IMSI> is an ASCII-based representation of the
International Mobile Station Identifier, most significant digit
first, ":" is ASCII 0x3a, and the Connection ID is the ASCII
representation of a small, decimal number used for
distinguishing different link-layer connections from the same
Calhoun et al. expires February 2001 [Page 20]
INTERNET DRAFT September 2000
device.
9.2 Ethernet Link Layer Address Extension
The Ethernet Link Layer Address Extension contains the 48 bit
Ethernet MAC Address, as defined in [15].
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Sub-Type | MAC ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type
TBD (skippable) [1]
Length
7 (includes the Sub-Type field)
Sub-Type
2
MAC
Contains the 48 bit Ethernet MAC Address.
10.0 Error Values
The following table contains the name of Code [9] to be returned in a
Registration Reply, the value for the Code, and the section in which
the error is first mentioned in this specification.
Error Name Value Section of Document
---------------------- ----- -------------------
DO_NOT_SERVICE_MN TBD 7.1
11.0 IANA Considerations
The number for the Generalized Link Layer Address Extension is taken
from the numbering space defined for Mobile IP registration
extensions defined in RFC 2002 [1]. These MUST NOT conflict with any
numbers used in RFC 2002[1], RFC 2344 [12], RFC 2356 [16], Mobile IP
Calhoun et al. expires February 2001 [Page 21]
INTERNET DRAFT September 2000
Challenge/Response Extension [17], Mobile IP Network Access
Identifier Extensions Draft[18]. The Code values specified for
errors, listed in section 10, MUST NOT conflict with any other code
values listed in RFC 2002[1], RFC 2344 [12], RFC 2356 [16], Mobile IP
Challenge/Response Extensions[7], or Mobile IP Network Access
Identifier Extensions Draft [18].
The new 'T' flag in the Binding Update message MUST NOT conflict with
any other flags defined in the message in [5].
12.0 Security Considerations
Similar to [6] and [7], this specification assumes that the local
Foreign Agent, and the GFA (or AFA) inherently trust each other. This
MAY be achieved through the use of a long lived security association.
This specification introduces a new change to Mobile IP, which is the
ability for a Mobile Node to receive packets from a Foreign Agent to
which it has not yet registered. In the event that the Mobile Node
does not wish to receive packets from unknown Foreign Agents, it MAY
drop them.
Although this document does not specify how Foreign Agents can
identify, or track, Mobile Nodes, it is assumed that the wireless
link layer be sufficiently secure in order to correctly identify a
Mobile Node. Wireless networks that do not provide such features will
be subjected to impersonation attacks, where malicious nodes could
cause the Foreign Agents to believe that a Mobile Node has moved to
other service areas.
13.0 References
[1] C. Perkins, Editor. "IP Mobility Support". RFC 2002. October
1996.
[2] T. Hiller et al. "Cdma2000 Wireless Data Requirements for AAA".
draft-hiller-cdma2000-AAA-00.txt (work in progress). October
1999.
[3] U. Black. "2nd Generation Wireless Networks". Prentice-Hall.
New York. 1999.
[4] S. Bradner. "Key words for use in RFCs to Indicate Requirement
Levels". BCP 14. RFC 2119. March 1997.
Calhoun et al. expires February 2001 [Page 22]
INTERNET DRAFT September 2000
[5] C. Perkins and D. Johnson. "Route Optimization in Mobile IP".
draft-ietf-mobileip-optim-08.txt (work in progress). February
1999.
[6] E. Gustafsson, A. Jonsson, C. Perkins. "Mobile IP Regional
Registration", draft-ietf-mobileip-reg-tunnel-02.txt (work in
progress), March 2000.
[7] G. Dommety. "Local and Indirect Registration for Anchoring Hand-
offs", draft-dommety-mobileip-anchor-handoff-00.txt (work in
progress), March 2000.
[8] P. Calhoun, H. Akhtar, E. Qaddoura, N. Asokan, "Foreign Agent
Keys Encoded as Opaque Tokens for use in Hand-off Process",
draft-calhoun-mobileip-fa-tokens-00.txt (work in progress),
March 2000.
[9] S. Hanks, T. Li, D. Farinacci, and P. Traina. Generic Routing
Encapsulation (GRE). Request for Comments (Informational) 1701,
Internet Engineering Task Force, October 1994.
[10] C. Perkins. Minimal Encapsulation within IP. Request for Com-
ments (Proposed Standard) 2004, Internet Engineering Task Force,
October 1996.
[11] Mohamed M.Khalil, Emad Qaddoura, Haseeb Akhtar, Pat R. Calhoun,
"Generalized NAI Extension (GNAIE)", draft-ietf-mobileip-gnaie-
00.txt (work in progress), February 2000.
[12] G. Montenegro, "Reverse Tunneling for Mobile IP", RFC 2344, May
1998.
[13] Khalil, and et. al. Mobile IP Extensions Rationalization (MIER)
draft-ietf-mobileip-mier-00.txt, Dec 1999.
[14] TIA/EIA/IS-95-B
[15] D. Plummer, "An Ethernet Address Resolution Protocol - or - Con-
verting Network Protocol Addresses to 48.bit Ethernet Address
for Transmission on Ethernet Hardware", RFC 826, Symbolics,
Inc., November 1982.
[16] Montenegro, G. and V. Gupta, "Sun's SKIP Firewall Traversal for
Mobile IP", RFC 2356, June 1998.
[17] P. Calhoun, C. Perkins, "Mobile IP Network Access Identifier
Extension", RFC 2794, March 2000.
Calhoun et al. expires February 2001 [Page 23]
INTERNET DRAFT September 2000
[18] C. Perkins, P. Calhoun. Mobile IP Challenge/Response Exten-
sions. draft-ietf-mobileip-challenge-13.txt, June 2000.
14.0 Acknowledgements
The authors would like to thank Charles Perkins for his valuable
feedback.
15.0 Authors' Addresses
Questions about this memo can be directed to:
Pat R. Calhoun
Network and Security Research Center, Sun Labs
Sun Microsystems, Inc.
15 Network Circle
Menlo Park, California, 94025
USA
Phone: +1 650 786 7733
Fax: +1 650 786 6445
E-mail: pcalhoun@eng.sun.com
Tom Hiller
Lucent Technologies
Rm 2F-218
263 Shuman Blvd
Naperville, IL 60566-7050
USA
Phone: +1 630 979 7673
FAX: +1 630 979 7673
E-Mail: tom.hiller@lucent.com
James Kempf
Network and Security Research Center, Sun Labs
Sun Microsystems, Inc.
15 Network Circle
Menlo Park, California, 94025
USA
Phone: +1 650 786 5890
Fax: +1 650 786 6445
E-mail: james.kempf@eng.sun.com
Calhoun et al. expires February 2001 [Page 24]
INTERNET DRAFT September 2000
Peter J. McCann
Lucent Technologies
Rm 2Z-305
263 Shuman Blvd
Naperville, IL 60566-7050
USA
Phone: +1 630 713 9359
FAX: +1 630 713 4982
E-Mail: mccap@lucent.com
Chandana Pairla
University of Illinois - Urbana Champaign
3315, DCL,
1304, W. Springfield Ave.,
Urbana, IL 61801
USA
Phone: +1 217 244 7117
E-mail: pairla@uiuc.edu
Sebastian Thalanany
Motorola
1475 West Shure Drive
Arlington Heights, IL - 60004
USA
Phone: +1 847 435 9296
E-mail: sthalan1@email.mot.com
Ajoy Singh
Motorola
1501 West Shure Drive
Arlington Heights, IL ô 60004
USA
Phone: +1 847 632 6941
E-mail: asingh1@email.mot.com
16.0 Full Copyright Statement
Copyright (C) The Internet Society (2000). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
Calhoun et al. expires February 2001 [Page 25]
INTERNET DRAFT September 2000
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this docu-
ment itself may not be modified in any way, such as by removing the
copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of develop-
ing Internet standards in which case the procedures for copyrights
defined in the Internet Standards process must be followed, or as
required to translate it into languages other than English. The lim-
ited permissions granted above are perpetual and will not be revoked
by the Internet Society or its successors or assigns. This document
and the information contained herein is provided on an "AS IS" basis
and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DIS-
CLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT
INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE."
Calhoun et al. expires February 2001 [Page 26]
| PAFTECH AB 2003-2026 | 2026-04-23 03:22:32 |