One document matched: draft-korhonen-mobopts-mobility-policy-00.txt
Network Working Group J. Korhonen
Internet-Draft TeliaSonera
Expires: April 3, 2008 V. Devarapalli
Azaire
G. Giaretta
Telecom Italia
R. Koodli
Nokia
October 2007
IP Mobility and Policy Control
draft-korhonen-mobopts-mobility-policy-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 3, 2008.
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
The IETF has developed many IP Mobility protocols, some of which have
been successfully deployed. There has also been work done on
enabling fast and efficient handovers at L3 and extensions to access
Korhonen, et al. Expires April 3, 2008 [Page 1]
Internet-Draft IP Mobility and Policy Control October 2007
control protocols to enable fast handovers. One aspect that has not
been considered so far is the policies that a user is subjected to
when accessing a subscribed network. These policies, defined by the
network operator, have a significant impact on the user's mobility
experience. This document aims to provide a discussion document on
policy control and IP Mobility in controlled operator networks.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. IP Mobility in IETF . . . . . . . . . . . . . . . . . . . . . 5
4. Policies in Operator Controlled Environments . . . . . . . . . 6
4.1. Policy Taxonomy . . . . . . . . . . . . . . . . . . . . . 6
4.2. Firewall Protected Networks . . . . . . . . . . . . . . . 7
4.3. Deployment Model Originating Restrictions . . . . . . . . 7
4.4. Controlled Access to Services . . . . . . . . . . . . . . 8
4.5. Service Access Through Multiple Accesses . . . . . . . . . 9
4.6. Location of the Policy Enforcement . . . . . . . . . . . . 9
4.7. Example - 3GPP PCC Architecture . . . . . . . . . . . . . 9
5. Issues in Integrating IP Mobility and Policies . . . . . . . . 13
5.1. Mandatory Reverse Tunneling through the Mobility Anchor . 13
5.2. Firewalling at Multiple Layers . . . . . . . . . . . . . . 13
5.3. Binding of Service Flows . . . . . . . . . . . . . . . . . 14
6. Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 14
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
8. Security Considerations . . . . . . . . . . . . . . . . . . . 15
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 15
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
10.1. Normative References . . . . . . . . . . . . . . . . . . . 15
10.2. Informative References . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 17
Intellectual Property and Copyright Statements . . . . . . . . . . 19
Korhonen, et al. Expires April 3, 2008 [Page 2]
Internet-Draft IP Mobility and Policy Control October 2007
1. Introduction
The IETF has developed many IP Mobility protocols, some of which have
been successfully deployed. There has also been work done on
enabling fast and efficient handovers at L3 and extensions to access
control protocols to enable fast handovers. One aspect that has not
been considered so far is the policies that a user is subjected to
when accessing a subscribed network. These policies, defined by the
network operator, have a significant impact on the user's mobility
experience.
The policies configured on a network may govern what kind of service
the user is allowed, which access network the user is allowed to
attach to, enforce a particular quality of service (QoS) and restrict
the user to certain mobility protocols. The main purpose of this
document is to describe the problems encountered when applying IP
Mobility protocols to networks where such policies and the resulting
constraints exist. This would be useful to protocol designers who
can make better choices when designing IP Mobility protocols and to
network designers who develop the policy architecture and configure
the policies.
This document also includes a case study on a well known policy
architecture, developed by 3GPP, that is expected to be deployed in
various architectures developed in different standards organizations.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [1].
Application Function (AF)
A service such as a SIP application server.
Home PCEF (H-PCEF)
A PCEF located in the Home PLMN.
General Packet Radio Service (GPRS)
GPRS is a mobile data service available to users of GSM and IS-136
mobile phones. 2G cellular systems combined with GPRS are often
described as "2.5G", that is, a technology between the second (2G)
and third (3G) generations of mobile telephony
Korhonen, et al. Expires April 3, 2008 [Page 3]
Internet-Draft IP Mobility and Policy Control October 2007
IP Connectivity Access Network (IP-CAN)
The collection of network entities and interfaces that provide the
underlying IP transport connectivity for the mobile node.
Policy and Charging Enforcement Function (PCEF)
A policy enforcement point like entity in the 3GPP Policy and
Charging Control framework that encompasses service IP flow
detection, policy enforcement and IP flow based charging
functionalities.
Policy and Charging Rules Function (PCRF)
A policy decision point like entity in the 3GPP Policy and
Charging Control framework that encompasses policy control
decision and IP flow based charging control functionalities.
Subscription Profile Repository (SPR):
A logical entity that contains all subscriber & subscription
related information needed for subscription-based policies and
access level policy and charging rules by the PCRF.
Visited PCEF (V-PCEF)
A PCEF located in the Visited PLMN.
Policy Decision Function (PDF)
A point where policy decisions are made.
Policy Enforcement Point (PEP)
A point where the policy decisions are actually enforced.
Public Land Mobile Network (PLMN)
A telecommunications network providing mobile cellular services.
Korhonen, et al. Expires April 3, 2008 [Page 4]
Internet-Draft IP Mobility and Policy Control October 2007
3. IP Mobility in IETF
This section reviews a few IP Mobility solutions being developed in
IETF.
IP Mobility support may be divided into several technical layers and
also categories depending on the nature of mobility. In this
document, we consider mobility solutions and protocols starting from
the network layer (layer 3 in the OSI stack) and up.
Mobility is inherently tied with the way nodes are addressed in a
distributed network. In this document, we present two different ways
to address mobile nodes: addresses with combined location and
identity, and addresses with a distinct locator and an identity.
There is a third way, content-based addressing [2][3], however that
is not typically within the scope of IETF. The first addressing
model is traditionally used by the IP based protocols. The second
model is an extension of the first and used, for example, in the Host
Identity Protocol (HIP) [4].
The most fundamental host controlled network-level protocols for
supporting mobile hosts are the family of Mobile IP protocols (
Mobile IPv4 [5] and Mobile IPv6 [6]). Another related network-level
solution reusing Mobile IP signaling is Network Mobility (NEMO) [7],
in which complete subnetworks may change location as well as single
hosts. It is also possible manage the IP Mobility completely on the
access network side without mobile host's involvement. In this case
mobility could also be handled locally, typically within one
administrative domain. Network based Localized Mobility management
(NetLMM) is a recent such example. Protocol proposals exist for both
Mobile IPv6 based solution [8] and Mobile IPv4 based solution [9].
It is also possible to have mobility handled on the transport layer.
Transport Layer Seamless Handover (TraSH), Datagram Congestion
Control Protocol (DCCP) and mobile-SCTP are recent examples of such
solutions. Yet another way of managing host mobility is the mobility
aware Virtual Private Network (VPN) such as MOBIKE [10] based IPSec
VPN. Protocols such as the Session Initiation Protocol (SIP) may
provide fine-grained mobility at the application level and they do
not assume underlying transport or network level mobility support.
There has been recent work on various enhancements to the existing IP
mobility protocols. Hierarchical Mobile IP (HMIPv6) [11] and Mobile
IPv4 Regional Registration [12] are examples of such protocol
enhancements that attempt to reduce signaling latencies based on
localized mobility agents. Furthermore, Fast Handovers for Mobile IP
(FMIPv6 [13] and FMIPv4 [14]) minimize the period during the handover
to a new access router where the MN is not able to send and/or
Korhonen, et al. Expires April 3, 2008 [Page 5]
Internet-Draft IP Mobility and Policy Control October 2007
receive IP packets due to the normal handover procedures. These
handover procedures include the Mobile IP based location update, IP
address configuration and movement detection.
Mobile IP for IPv4 and IPv4 are separate protocols, and in order to
solve the IP version migration there is ongoing work to introduce
dual-stack extensions to both Mobile IPv4 [15] and Mobile IPv6 [16].
The rationale for dual-stack solutions have been that MNs will anyway
have dual-stack support once Mobile IP gets deployed in large scale
and the IP version migration is more of an access network problem.
Depending what is the selected mobility management protocol version
these solutions function more efficiently in terms of tunneling
overhead and available functionality, such as route optimization,
over their native IP version in the access network. In case of IP
version migration the network controlled mobility management approach
could have less impact on MNs. They just use their native IP version
and the access network takes care of the migration. However, in this
approach the impact on the access networks is huge and unavoidable.
4. Policies in Operator Controlled Environments
Operator networks are typically well managed and controlled
networking environments. The cellular operators especially have
great interest in "managing" their subscribers access and services.
This has both regulatory and charging based background in general.
This section discusses some background related to the policies in
mobile operator type of network deployments. We also provide
examples of existing policy control frameworks that have been defined
for mobile operator space.
4.1. Policy Taxonomy
More text TBD.
Bearer Binding - The association between a service data flow and the
IP-CAN bearer transporting that service data flow.
Binding Mechanism - The method for creating, modifying and deleting
bindings. The binding mechanism is the procedure that associates
a service data flow, to the IP-CAN bearer deemed to transport the
service data flow. Thus, the binding mechanism shall associate
the application/service session information with the IP-CAN bearer
that is intended to carry the service data flow
Korhonen, et al. Expires April 3, 2008 [Page 6]
Internet-Draft IP Mobility and Policy Control October 2007
authorized QoS - The maximum QoS that is authorized for a service
data flow. In case of an aggregation of multiple service data
flows within one IP-CAN bearer, the combination of the Authorized
QoS information of the individual service data flows is the
"Authorized QoS" for the IP-CAN bearer.
service data flow - An aggregate set of packet flows.
packet flow - A specific user data flow carried through the policy
enforcement point. A packet flow can be an IP flow.
IP CAN bearer - An IP transmission path of defined capacity, delay
and bit error rate, etc.
4.2. Firewall Protected Networks
Today in typical operator network deployments everything is protected
with firewalls operating at various OSI layers. Even the so-called
public hotspot and residential broadband accesses are protected from
unknown inbound traffic from the Internet towards the access network
and the mobile node respectively. Issues regarding firewalls and
Mobile IPv6 have been discussed in detail in [17] and [18].
Furthermore, as a general case, discarding inbound IP-in-IP tunneled
and ESP encapsulated traffic is common even if the mobile node inside
the firewall protected network initiates the communication. This has
lead to the use of various UDP based NAT traversal solutions to solve
firewall issues as well.
It is becoming common in operator networks to extend the firewall
from the OSI layer-3 to upper layers. This leads quickly to cases
where, for example, the application layer protocol uses mobile node's
HoA for something and embeds the actual IP address inside the
protocol payload or header. Now if the firewall compares the outmost
IP addresses of the IP flow and those IP addresses embedded inside
the upper layer protocol it is possible there is a mismatch and the
firewall discards the packet.
4.3. Deployment Model Originating Restrictions
Original triangular routing of IP packets in case of Mobile IP was
soon enhanced with a capability to reverse tunnel all IP packets
through the Home Agent (HA). In general, reverse tunneling prohibits
the natural IP routing even more than the triangular routing as all
Korhonen, et al. Expires April 3, 2008 [Page 7]
Internet-Draft IP Mobility and Policy Control October 2007
IP packets must always go through the HA regardless of the
topological location of the HA. Reverse tunneling option remains
even in Mobile IPv6, which specifies a route optimization mode.
However, in commercial operator management networks there is no
urgency seen to deploy any of the available solutions that would
allow IP packets to bypass the HA, either to downlink or to uplink.
There are no insurmountable technical reasons to restrict the Mobile
IP deployment models to HA-centric one. The reason is basically the
same in case of Mobile IP that has hindered the deployment and the
use of visited PLMN GGSNs in GPRS networks [19]. Operators desire
control over the media flows that are related to their services and
offerings. Eventually, it is the requirement from an operator to
control access to services and bill for those services that appears
to dominate over technically superior solutions. If all IP packets
must be routed through a central controlling gateway (in this context
the HA) then the operator has total control and does not possibly
need to depend on visited networks and roaming partners when it comes
to billing information and services policy enforcement.
4.4. Controlled Access to Services
Some wireless access technologies, such as GPRS, allow services
categorization and access control based on the requested and the
initiated service. Eventually the selected service affects the
routing decision in the operator service selection gateway and also
allows binding service related policies to the specific access or the
IP flow.
It can be questioned whether this kind of approach is actually
feasible anymore in multi-radio terminals and in generic
heterogeneous networking environment where the operator might not be
the sole owner of all provided access technologies and services. In
such a multi-access environment, there is no uniform way of
performing service selection during the network access establishment
across different access technologies. Also, binding service level
policies to a specific access type in an access specific gateway
might not meet all new multi-access requirements where changing the
access technology during the application session is highly probable.
Furthermore, it is likely that the terminal runs multiple
applications and services simultaneously, and each of them having
different requirements for their access. Thus, binding policies to a
single access based on a single application's needs is unlikely to
work flawlessly.
Korhonen, et al. Expires April 3, 2008 [Page 8]
Internet-Draft IP Mobility and Policy Control October 2007
4.5. Service Access Through Multiple Accesses
Most of the existing policy control mechanisms has been designed with
static service scenario in mind. With static we mean that the MN's
IP address remains constant during the user session, and once
activated through some access (i.e. bearer) it is assumed that the
bearer does not change. If the bearer changes mid session, the
policy framework is likely to fall back to a default behavior rather
than attempt any optimization. It is also possible that the policy
control mechanism in question supports mid session updates on
policies.
4.6. Location of the Policy Enforcement
In many mobile networks a logical place for the Policy Enforcement
Point (PEP) is the gateway that terminates the user plane traffic.
Depending on the network deployment, there might be a number of
gateways terminating the user plane traffic. This is especially the
case in heterogeneous networks with multiple access technologies and
multihomed terminals. With multiple PEPs, policy enforcement for
service flows is obviously more challenging. For one IP flow one PEP
is active at given time.
The location of the PEP also matters in inter-operator roaming cases.
As mentioned earlier operators prefer to have total control over
their subscribers' service flows. This has lead to a situation where
basically all IP traffic gets forcibly routed back to home network's
anchoring gateways, even if the MN is roaming on the other side of
the world. Allowing the visited network also to apply policy rules
on behalf of the home operator is something that should be carefully
considered as a part of the general policy framework design.
4.7. Example - 3GPP PCC Architecture
Figure 1 shows overall architecture of 3GPP defined Policy and
Charging Control (PCC) (roaming) architecture that was defined for
the 3GPP Release-7 [20]. The solution has yet since raised interest
also outside 3GPP for other networking systems as a generic policy
framework. The PCC architecture makes extensive use of Diameter [21]
and especially the Credit Control [22] and NASREQ application
commands [23]. However, the usage of Diameter in the PCC has heavily
been altered and is basically 3GPP specific application [24][25] at
the moment. The PCC aims to be access technology agnostic but as of
its current state it requires more abstraction or either more
possibilities how to handle different types of access technologies.
From 3GPP point of view one of the issues is that the PCC needs also
address the policy solutions defined in earlier releases of the
general architecture [26].
Korhonen, et al. Expires April 3, 2008 [Page 9]
Internet-Draft IP Mobility and Policy Control October 2007
+--------------------------+ +--------------------------+
| +--------+ | | +--------------+ |
| | Proxy |--------------------------------------| OCS | |
| | OCS | | | | | |
| +--------+ | | +----+ +--------------+ |
| | | | | AF | |
| | | | +----+ |
| | | | | |
| | | | | |
| | +--------+ | | +--------+ +-----+ |
| | | V-PCRF |----------------| H-PCRF |--| SPR | |
| | +--------+ | | +--------+ +-----+ |
| | | | | |
| | | | | |
| +----------------------+ | | |
| | V-PCEF & GW | | | |
| +----------------------+ | | |
| | | | |
| | | | |
| +------+ +--------+ | | +--------+ |
| | OFCS |------| BSyst |----------------| BSyst | |
| +------+ +--------+ | | +--------+ |
| | | |
+--------------------------+ +--------------------------+
Figure 1: Logical PCC Architecture when the PCEF is in visited
network
Another issue that needs to be kept in mind concerning the policy
frameworks relates to generic access network deployments and inter-
operator connectivity. Typically, for example, GSM (GPRS) operators
have had a total control over the access networks, and the
interconnection and roaming traffic. This can still be seen from the
PCC framework. Today, GSM operators are connected through isolated
roaming and interconnection IP backbone network [27] with strict
Service Level Agreements (SLA) and rules that define how the roaming
must be deployed. This model works for services that are all within
the control of operators (mobile networks or even external networks
in some cases).
Within the PCC framework there are numerous different signaling
scenarios depending on for example:
Korhonen, et al. Expires April 3, 2008 [Page 10]
Internet-Draft IP Mobility and Policy Control October 2007
o Who initiates the bearer setup and/or update.
o Which node terminates session.
o Whether event notifications are used.
o Whether application function affects policies.
This document does not try to go through them all. Consult [20] and
[28] for more details. Figure 2 shows one example signaling
sequences for a policy download to the policy enforcement point after
the MN has established IP connectivity to the networking and service
system. The same signaling sequence can also be applied almost as is
to bearer update procedures.
Korhonen, et al. Expires April 3, 2008 [Page 11]
Internet-Draft IP Mobility and Policy Control October 2007
+------------+ +--------+ +-----+ +-----+ +-----+
| GW & PCEF | | PCRF | | SPR | | AF | | OCS |
+------------+ +--------+ +-----+ +-----+ +-----+
| | | | |
| | (1. App & Serv | info) | |
| |<------------------------| |
| | | | |
| | (2. Ack) | | |
3. Bearer | |------------------------>| |
signaling req | | | | |
--------------->| | | | |
| 4. Request or | | | |
| Indication | | | |
|-------------->| | | |
| | (5. Event info)| | |
| |------------------------>| |
| | | | |
| | (6. Ack) | | |
| |<------------------------| |
| | | | |
| | (7. Profile | req) | |
| |--------------->| | |
| | | | |
| | (8. Profile | rep) | |
| |<---------------| | |
| | | | |
| +--------------+ | | |
| | 9. Policy | | | |
| | decision | | | |
| | | | | |
| +--------------+ | | |
| | | | |
| 10. Ack & push| | | |
| policies | | | |
|<--------------| | | |
| | | | |
| 11. Credit req| | | |
|------------------------------------------------->|
| | | | |
| 12. Credit rep| | | |
|<-------------------------------------------------|
11. rep | | | | |
<---------------| | | | |
| | | | |
Figure 2: An overall 3GPP PCC signaling overview
Korhonen, et al. Expires April 3, 2008 [Page 12]
Internet-Draft IP Mobility and Policy Control October 2007
The first two steps assume that the MN has already established
connectivity and the initial policy might also have been established.
These step are relevant when the application function (e.g. some SIP-
based service) needs to update policies for a reason or another.
1) The application function provides service related information to
the PCRF (PDF). The trigger for the application function to
originates from the applications that the MN is using.
2) The PCRF (PDF) stores the service related information and
acknowledges the application function.
Rest of the signaling sequence details TBD later.
5. Issues in Integrating IP Mobility and Policies
This section discussed about identified issues when it comes to
policies and IP mobility. The background is mostly based on the
operator and network architecture assumptions discussed in previous
chapters.
5.1. Mandatory Reverse Tunneling through the Mobility Anchor
As already briefly discussed earlier mobile network operators prefer
routing all service relates IP traffic through their home network
independent where the MN is located. In IP Mobility sense this means
all IP traffic must traverse through the HA to both uplink and
downlink directions.
The model of described here has a number of issues. Firstly,
mandatory reverse tunneling effectively prohibits for example Mobile
IPv6 Route Optimization. The implications of this will be discussed
in more detail in section TBD. Secondly, another related issue is
the desire to use the mobility anchor located in the home network.
This kind of deployment decision affects inter-operator roaming cases
and effectively prohibits the use of local breakouts in the visited
networks. The implications of this issue will be discussed further
in section TBD.
5.2. Firewalling at Multiple Layers
In operator network environments it is common that firewalling is not
only applied to application level user traffic. Especially in inter-
operator roaming cases it is typical that operator also do rather (or
try to) intense packet analysis on received traffic. It is not
entirely clear what are the implications of this, if any, when MNs
Korhonen, et al. Expires April 3, 2008 [Page 13]
Internet-Draft IP Mobility and Policy Control October 2007
and possibly visited network gateways providing proxy mobility
services [8] for MNs change their point of attachment to the network
frequently.
More text TBD.
5.3. Binding of Service Flows
Policies that are tightly integrated to a specific access or a bearer
might make handovers rather inefficient. All service flows are bound
to a specific bearer and the binding needs to be updated when a
handover takes place. The update mechanism is typically reactive,
which means that both PEP and PDF react after the bearer has changed.
At least this could be the case for host controlled mobility, where
the policy update is partially triggered at the application rather
than only at the access level. After that the service flows need to
re-bound to the new bearer. Clearly this is not the most optimal
possible approach.
As mentioned earlier the trigger to update policies and binding may
also originate from the application (and application server).
However, if the mobility management functionality keeps the IP layer
intact the application does not really have a simple uniform way to
discover the change of bearer. Based on this, it is highly possible
that the trigger to update policies and binding always originates
from the gateway/mobility management function, after the handover has
taken place.
If the PEP and gateway functionality are separated from the first
user plane termination point and the access network specific
information gets abstracted completely away some new signaling is
required to inform the mobility management entity (e.g. the HA) about
the characteristics of the new bearer. Currently Mobile IP does not
have this functionality. This issue is discussed further in section
TBD.
6. Conclusions
TBD
7. IANA Considerations
This document does not define any new name spaces to be managed by
IANA. This document does not either reserve any new numbers or names
under any existing name space managed by IANA.
Korhonen, et al. Expires April 3, 2008 [Page 14]
Internet-Draft IP Mobility and Policy Control October 2007
8. Security Considerations
TBD
9. Acknowledgments
TBD
10. References
10.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", RFC 2119, March 1997.
10.2. Informative References
[2] Carzaniga, A., Rosenblum, D., and A. Wolf, "Achieving
expressiveness and scalability in an internet-scale event
notification service", Nineteenth ACM Symposium on Principles
of Distributed Computing (PODC2000), July 2000.
[3] Muhl, G., Ulbrich, A., Herrman, K., and T. Weis, "Disseminating
information to mobile clients using publish/subscribe", IEEE
Internet Computing 46-53, May 2004.
[4] Moskowitz, R. and P. Nikander, "Host Identity Protocol (HIP)
Architecture", RFC 4423, May 2006.
[5] Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
August 2002.
[6] Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004.
[7] Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert,
"Network Mobility (NEMO) Basic Support Protocol", RFC 3963,
January 2005.
[8] Gundavelli, S., "Proxy Mobile IPv6",
draft-sgundave-mip6-proxymip6-01 (work in progress),
January 2007.
[9] Leung, K., "Mobility Management using Proxy Mobile IPv4",
draft-leung-mip4-proxy-mode-02 (work in progress),
January 2007.
Korhonen, et al. Expires April 3, 2008 [Page 15]
Internet-Draft IP Mobility and Policy Control October 2007
[10] Eronen, P., "IKEv2 Mobility and Multihoming Protocol (MOBIKE)",
RFC 4555, June 2006.
[11] Soliman, H., Castelluccia, C., El Malki, K., and L. Bellier,
"Hierarchical Mobile IPv6 Mobility Management (HMIPv6)",
RFC 4140, August 2005.
[12] Fogelstroem, E., "Mobile IPv4 Regional Registration",
draft-ietf-mip4-reg-tunnel-04 (work in progress), October 2006.
[13] Koodli, R., "Fast Handovers for Mobile IPv6", RFC 4068,
July 2005.
[14] Koodli, R. and C. Perkins, "Mobile IPv4 Fast Handovers",
draft-ietf-mip4-fmipv4-03 (work in progress), February 2007.
[15] Tsirtsis, G., "Dual Stack Mobile IPv4",
draft-ietf-mip4-dsmipv4-01 (work in progress), December 2006.
[16] Soliman, H. and G. Tsirtsis, "Problem Statement: Dual Stack
Mobility", draft-ietf-mip6-dsmip-problem-03 (work in progress),
January 2007.
[17] Le, F., Faccin, S., Patil, B., and H. Tschofenig, "Mobile IPv6
and Firewalls: Problem Statement", RFC 4487, May 2006.
[18] Chen, X., "Problem Statement for MIPv6 Interactions with GPRS/
UMTS Packet Filtering", draft-chen-mip6-gprs-07 (work in
progress), February 2007.
[19] 3GPP, "General Packet Radio Service (GPRS); Service
description; Stage 2", 3GPP TS 23.060 7.2.0, September 2006.
[20] 3GPP, "Policy and charging control architecture", 3GPP
TS 23.203 7.0.0, October 2006.
[21] Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. Arkko,
"Diameter Base Protocol", RFC 3588, September 2003.
[22] Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., and J.
Loughney, "Diameter Credit-Control Application", RFC 4006,
August 2005.
[23] Calhoun, P., Zorn, G., Spence, D., and D. Mitton, "Diameter
Network Access Server Application", RFC 4005, August 2005.
[24] 3GPP, "Policy and charging control over Gx reference point",
3GPP TS 29.212 1.0.0, December 2006.
Korhonen, et al. Expires April 3, 2008 [Page 16]
Internet-Draft IP Mobility and Policy Control October 2007
[25] 3GPP, "Policy and charging control over Rx reference point",
3GPP TS 29.214 1.0.0, December 2006.
[26] 3GPP, "Policy control over Go interface", 3GPP TS 29.207 6.5.0,
September 2005.
[27] GSM Association, "Inter-PLMN Backbone Guidelines", Public
Reference Document IR.34, April 2006.
[28] 3GPP, "Policy and charging control signalling flows and Quality
of Service (QoS) parameter mapping", 3GPP TS 29.213 1.0.0,
December 2006.
Authors' Addresses
Jouni Korhonen
TeliaSonera
P.O. Box 970
FIN-00051 Sonera
Finland
Email: jouni.korhonen@teliasonera.com
Vijay Devarapalli
Azaire Networks
4800 Great America Pkwy
Santa Clara, CA 95054
USA
Email: vijay.devarapalli@azaire.com
Gerardo Giaretta
Telecom Italia
via Reiss Romoli 274
Torino 10148
Italy
Email: gerardo.giaretta@gmail.com
Korhonen, et al. Expires April 3, 2008 [Page 17]
Internet-Draft IP Mobility and Policy Control October 2007
Rajeev Koodli
Nokia
313 Fairchild Drive
Mountain View, CA 94043
USA
Email: rajeev.koodli@nokia.com
Korhonen, et al. Expires April 3, 2008 [Page 18]
Internet-Draft IP Mobility and Policy Control October 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Korhonen, et al. Expires April 3, 2008 [Page 19]
| PAFTECH AB 2003-2026 | 2026-04-24 07:38:58 |