One document matched: draft-oneill-ema-02.txt
Differences from draft-oneill-ema-01.txt
Personal A. O'Neill
G. Tsirtsis
BT
Internet Draft S. Corson
Document: draft-oneill-ema-02.txt Ansible Systems
Category: Informational July 2000
Edge Mobility Architecture
<draft-oneill-ema-02.txt>
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. Internet-Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and its working groups. Note that other groups may also distribute
working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This draft outlines a system for domain-based routing and
addressing support in handling edge mobility such as encountered in
cellular systems and Internet roaming. The system includes novel
features for IP session, address and localised host redirect route
management which promise significant scaling benefits compared to
other micro-mobility solutions. In addition, the system is closely
integrated with the Mobile IP architecture for both signalling and
data forwarding, so that a rich set of capabilities and Internet
Services are possible, and incremental deployment of EMA is possible
within and between AS's. The draft also suggests a specific protocol
based on TORA for the implementation of such an architecture. It
advocates the creation of a specific IETF working group to address
an overall architecture for edge mobility routing, specific
extensions to existing routing protocols to accomplish that
architecture, and extensions to existing Internet technologies such
as Mobile IP to support this architecture.
O'Neill, Corson, Tsirtsis 1
Internet Draft EMA July 2000
INDEX
1. Introduction
2. Mobile Routing Architecture
2.1 Mobile Session Start-Up. . . . . . . . . . . . . . . . .
2.2 IP Session Dynamics. . . . . . . . . . . . . . . . . . .
2.3 Mobile Node States . . . . . . . . . . . . . . . . . . .
2.3.1 EMA Active . . . . . . . . . . . . . . . . . . . .
2.3.2 EMA Hot Standby. . . . . . . . . . . . . . . . . .
2.3.3 EMA Cold Standby . . . . . . . . . . . . . . . . .
2.3.4 EMA off . . . . . . . . . . . . . . . . . . . . .
2.4 EMA Intra-domain Hand-over Messaging . . . . . . . . . .
2.5 Break Before Make - BBM. . . . . . . . . . . . . . . . .
2.6 Make Before Break - MBB. . . . . . . . . . . . . . . . .
2.7 Hybrid Model . . . . . . . . . . . . . . . . . . . . . .
2.8 Mobile IP Session Completion . . . . . . . . . . . . . .
2.9 EMA Inter-domain considerations. . . . . . . . . . . . .
3. TORA-based Mobile Enhanced Routing (MER)
3.1 TORA Concepts. . . . . . . . . . . . . . . . . . . . . .
3.2 TORA Hand-over Processing. . . . . . . . . . . . . . . .
4. EMA and Mobile IP Convergence
4.1 EMA / MIP Architectural Considerations . . . . . . . . .
4.2 Converged EMA / Mobile IP Addressing . . . . . . . . . .
5. Scalability Characteristics of EMA:TORA
5.1 Temporary Session IP addresses . . . . . . . . . . . . .
5.2 Aggregate Prefix Routes. . . . . . . . . . . . . . . . .
5.3 Localised Host Redirect Routes . . . . . . . . . . . . .
5.4 In-session Dynamics. . . . . . . . . . . . . . . . . . .
5.5 TORA MER . . . . . . . . . . . . . . . . . . . . . . . .
5.6 Performance. . . . . . . . . . . . . . . . . . . . . . .
6. Comparison to Alternatives
6.1 Mobile IP. . . . . . . . . . . . . . . . . . . . . . . .
6.2 Cellular IP. . . . . . . . . . . . . . . . . . . . . . .
6.3 HAWAII . . . . . . . . . . . . . . . . . . . . . . . . .
6.4 OBAST. . . . . . . . . . . . . . . . . . . . . . . . . .
7. Security Considerations
7.1 Authenticating users within a domain. . . . . . . . . .
8. References
O'Neill, Corson, Tsirtsis 2
Internet Draft EMA July 2000
1. Introduction
Telecommunications networks are rapidly transitioning towards an
all-IP architecture. This trend is not restricted to fixed
networks. Second generation cellular networks have been modified to
provide limited data services, and third generation systems
undergoing rollout now have been designed to deliver IP connectivity
to the end user. These system continue to support mobility based on
the continuing advancements in wireless technology. However, with IP
routing technology being pushed out to the network's edge, it
becomes less cost effective to support the various modes of layer 2
edge mobility management that accompany today's cellular and PCS
technologies. Rather, unified solutions become advantageous to
domain operators, wherein mobility management becomes an integral
component of an IP layer routing protocol and associated hand-over
mechanisms.
Internet routing protocols have been traditionally designed from an
assumption that the location of an IP interface in the topology is
static. In addition, they assume that address allocation within the
topology will aim to provide multiple levels of IP address
aggregation such that routing protocols can deal with address
prefixes, rather than large numbers of host routes. Within this
framework, traditional intra-domain protocols, such as OSPF, need
only react to infrequent changes to the network due to link or outer
failures or permanent modifications to the addressing scheme or the
topology.
Mobile Ad hoc NETwork (MANET) routing protocols have been developed
to address what could be considered to be an extreme scenario,
whereby the mobile nodes have permanent IP addresses which can
rapidly roam through an ad hoc topology, leading to the need for
alternative routing technology and the general loss of aggregation
opportunities.
A third family of routing protocols is now under investigation for
the case in which the core topology is essentially fixed but the end
systems are mobile. This is the classical edge mobility scenario
that is today supported by cellular networks, primarily as part of
the cellular technology elements (GSM, GPRS etc). Migrating this
routing function to the layer 3 IP routing protocol, to release all
the end-to-end internetworking benefits which has aided the
deployment of the Internet, would tend to suggest a fusion of the
MANET and traditional routing protocol architectures. The primary
aim is to move the IP interface location in the routing topology as
the mobile changes base stations so that active IP sessions are
maintained. We refer to this form of routing as Mobile Enhanced
Routing(MER), its intra-domain deployment providing Edge Mobility
support within that domain. This is clearly only one of the possible
models and this draft does not make any judgments as to the pro's
and con's of this particular mobility model, but is simply using it
as a precursor for the discussion of the related hand-over
architecture.
O'Neill, Corson, Tsirtsis 3
Internet Draft EMA July 2000
External BGP Peerings To the Internet
| * |
| * |
Allocating | * | Roaming
Domain _|_ * _|_ Domain
Border-->| |---------------------------| |<--Border
Router |HBR| * |FBR| Router
|___| * |___|
MER | * | MER or
Protocol _|_ * _|_ OSPF etc)
| | * | |
,--|HIR|--, * ,--|FIR|--,
| |___| | * | |___| |
_|_ _|_ * _|_ _|_
| | | | * | | | |
|HAR| |HAR| * |FAR| |FAR|
|___|<--->|___|<------*------> |___|<--->|___|
*
Movement Movement Movement
intra-domain inter-domain intra-domain
Figure 1: Edge Mobility Domains as part of the Internet
These edge mobility domains as shown in figure 1, can be considered
to have a single IP routing protocol which runs between routers in
the EMA domain, with some of those routers being the edge access
routers (ARs) equipped with, or connected to a (potential) diversity
of radio base station technologies such as CDMA, TDMA and Radio LANs
etc. The radio layers are assumed to provide the well known layer 2
hand-over models and other capabilities including break-before-make,
make-before-break, power measurement, mobile assisted hand-over,
paging and security features. To facilitate internetworking, inter-
access router co-ordination is assumed to use IP-based communication
using messages which are abstractions of the messages which are
today carried in cellular technology-specific messages, often via
central processing elements.
This draft proposes a general approach to the support of this edge
mobility function, with the aim of being generic enough to support a
range of different routing protocols, as well as enabling hand-over
between diverse types of cellular technology through capability
exchange between radio-equipped access routers. It does not deal
with the details of these mechanisms as they are specific to the
type of routing protocol selected. This draft does also not discuss
the effects of the architecture on DNS, DHCP and infrastructure
services, nor does it contribute to the debate on the appropriate
layer and model for mobile terminal paging.
O'Neill, Corson, Tsirtsis 4
Internet Draft EMA July 2000
In section 2, we describe an Edge Mobility Architecture (EMA) for
the support of edge mobility, with the aim of being general enough
to support a range of different routing protocols, as well as
enabling hand-over between diverse types of cellular technology
through capability exchange between radio-equipped ARs In section 3
we provide a description of one proposed approach for Mobile
Enhanced Routing, and compare it with alternative proposals for IP
mobility support in section 6. In section 4 we overview the
convergence of EMA with Mobile IP resulting in mutual benefits. In
section 5 we look at the scalability of our solution and performance
based on simulations that have been implemented. Finally, in section
7 we outline the emerging security solution for user authentication.
It will become clear that the routing approach put forth here needs
to be coupled with a companion paging architecture for location
management, the details of which are not covered in this draft, but
is nearing completion.
2. Mobile Routing Architecture
The architecture proposed assumes that modifications to either MANET
or traditional routing protocols are possible which will enable
these protocols to comply with this architecture and hence
facilitate a message set and control model which has a degree of
protocol independence. Clearly, the actual detailed mechanisms,
message content/timing and performance are going to be dependent on
the type of intra-domain routing protocol that forms the basis for
the mobility extensions.
The architecture has six main components, these being the use of;
a) the provision of a modified intra-domain routing protocol which
provides prefix-based routing within a domain, with each prefix
representing a block of IP addresses allocated to each access router
(AR) in the domain, as well as host routes to support mobile
terminal migration away from the allocating (IP address)access
router,
b) the provision and use of a virtual link for routing exchange and
messaging between cooperating access routers to exchange
capabilities, and to effectively and locally manage the hand-over of
the responsibility for, and routing of, the mobile terminal and its
associated IP address,
c) the provision and use of a temporary tunnel to redirect packets
in flight between the old access router and the new access router
whilst routing converges, and
d) the ability to inject a host route for the mobile,
e) a method to return the allocated IP address to the allocating
access router on mobile session termination at a different base
station in the same domain.
O'Neill, Corson, Tsirtsis 5
Internet Draft EMA July 2000
f) the use of mobile IP across provider boundaries to facilitate the
temporary movement of an IP address (on a mobile terminal interface)
away from its home domain whilst maintaining active sessions. The
mobile IP tunnel is located on an access router in the old domain
(HA), across the inter-domain boundary to the access router in the
new domain (FA). In the foreign domain, the tunnel is extended to
further access routers in the foreign domain using normal Mobile IP
foreign agent mechanisms. The details are covered in section 2.9 and
in [EMA-MIP]
The reasons for each of these components will be explained in the
following sections that will also give examples for CDMA (make-
before- break) and TDMA (break-before-make) hand-over.
2.1 Mobile Session Start-Up
When the mobile host (MH) either has data to send or has been paged
due to incoming traffic, the MN connects to the nearest AR and is
brought into the IP routing domain by requesting and being allocated
an IP address out of the block of addresses managed by that access
router. This Allocating Access Router (AAR) will be advertising the
IP address prefix associated with that address block into the intra-
domain routing protocol such that 'at home' mobiles have a
proactively and permanently advertised route, and are immediately
reachable to all hosts in the internet. Note that end hosts
statically attached to the EMA domain via Network Access Servers can
be viewed as "at home" mobiles who never move. As the MH moves
access routers, this IP address moves with them so that higher-layer
sessions are unaffected. This is accomplished by modifying the
intra-domain routing using hosts routes (longest mach) to overrule
or overwrite the underlying proactive prefix routing to the AAR.
Specifically, as the MN wanders away from the AAR, a host redirect
route is locally injected, during hand-off, between geographically
adjacent ARs. This ensures that any traffic on the aggregated AAR
route is 'peeled-off' and redirected to the new AR. Subsequent
movement results in additional host redirect routes that
progressively 'peel' the incoming traffic away from both the prefix
route for the AAR, and the previous host redirect route. Hence, the
further we wander at the edge, the further that the sequence of host
redirect routes will extend the redirection away from the aggregated
AAR prefix route (and associated AR).
Placing an appropriate set of messages over IP ensures that a wide
range of radio technology specific hand-over models can be
accommodated within a single IP model to allow for internetworking
of IP over those diverse technologies.
O'Neill, Corson, Tsirtsis 6
Internet Draft EMA July 2000
2.2 IP Session Dynamics
When the mobile is inactive for short periods during an IP session,
the radio layer has mechanisms and timers which enable the radio
resources to be released to other users. An IP session timer is used
in the AR and MN to identify sufficient inactivity (which could be
application, terminal, user or service class (tariff) specific) to
terminate the dynamic IP session, so releasing the associated radio
resources, temporary host address and associated routing state. This
enables high multiplexing of the temporary IP address space, and
better utilisation of routing and radio system resources. For mobile
users wishing to be able to maintain the temporary IP address for
long periods for application, business, usage pattern reasons etc,
the IP session timer can be set very long (with potential tariff
implications). This could result in long term host specific IP
routing state in the system which is clearly undesirable as a
general mass-market service. This is therefore clearly a per user
policy decision as to the appropriate value for this timer, but a
large default value can also act as a safety mechanism.
2.3 Mobile Node States
We summarise below the IP view of the state of a mobile in EMA which
may be mapped to existing cellular states. We use our own
terminology here due to confusion in naming between the various
global standards in existence, and because we wish to focus on the
various inactivity timers whose lengths are related to the users
profile/privileges, and whose expiry move the mobile between
specific states.
2.3.1 EMA Active
The mobile is presently sending and receiving IP data traffic. The
MN has a local IP address and has a route pointing to it throughout
the EMA domain. The radio layer (L2) and IP layer (L3) are obviously
UP and movement between Access Routers generates an EMA IP hand-
over.
2.3.2 EMA Hot Standby
The MN moves to Hot Standby when it's L2 inactivity timer (not
sending / receiving IP data) expires. This takes the L2 DOWN
temporarily whilst the L3 is still UP, which releases the radio
layer resources to other users. The MN therefore maintains the
current IP address, has an EMA route for that address in the EMA
domain, and movement between Access Routers generates an EMA IP
hand-over. This feature further improves the utilisation of the
radio-layer by decouping the IP address and layer 3 resources from
the L2 radio resources.
O'Neill, Corson, Tsirtsis 7
Internet Draft EMA July 2000
2.3.3 EMA Cold Standby
On expiry of the IP address inactivity timer, the address is
returned to the AAR and any EMA host redirect state is flushed. The
MN now optionally only has it's home address from it's home link.
The L2 is DOWN and movement generates location updates only to the
global paging system because the MN now has no AAR and local fast
route set-up is not required. This feature is designed to avoid
hoarding of IP addresses when the user is inactive, so that the
address can be returned to the AAR for another user.
2.3.4 EMA Off
The MN is switched off and is neither sending location updates nor
is pageable.
2.4 EMA Intra-domain Hand-over Messaging
A hand-over can be initiated either by a MN or the network, and can
be rooted (i.e. initiated) at either the old or new Access Router.
The Old Access Router (OAR) is used to co-ordinate a forward hand-
over when the New Access Router (NAR) is known in advance as a
result of either network or MN-based movement prediction and
associated performance measurements. The NAR is used to co-ordinate
a reverse hand-over when the NAR is not known in advance by the MN
or the network, as a result of either network failure (e.g. old
radio link lost), insufficient network intelligence (no inter-
technology hand-over signalling) or unpredictable user behaviour
(swapping PCMCIA cards). Specifically, in certain wireless
technologies (e.g. GSM), hand-overs can be predicted based on
signal-to-interference measurements at nearby ARs (radio interface
in router) or attached downstream base stations (remote BS's).
After the appropriate hand-over criteria are reached, a hand-over
procedure can be initiated from an Old Access Router (OAR) to a New
Access Router (NAR) in response to a known topological change. In
other instances, e.g. with technologies not supporting hand-over
prediction, the unanticipated loss of a link should not be
immediately interpreted at the OAR as an undesirable link failure.
Instead, the OAR should wait for a time to see if the MH reappears,
connected either to itself or to a NAR. If it appears at a NAR, the
OAR again treats this as a known topological change and reacts
accordingly. If it does not appear, the OAR eventually declares
link failure and reacts accordingly. The generalised message set of
EMA described below and shown in Figure 2, may be mapped to a range
of AAA protocols/models, cellular signaling and routing technology
etc. to enable a specific solution to be designed. The aim of the
description is to capture the essence of the model in terms of
responsibilities and timings for IP hand-over.
O'Neill, Corson, Tsirtsis 8
Internet Draft EMA July 2000
|>>>>>>>>>>>>>>> 5.RUA >>>>>>>>>>>>>>>|
| |<<<<<<<<<<<<< 4.RU <<<<<<<<<<<<<| |
| | | |
|_| |_|
| | -----------> 3.HI/D --------> | |
|OAR| <----------- 2.HR <---------- |NAR|
|___| -----------> 1.TIN ---------> |___|
Figure 2: Basic EMA Hand-over Messaging
If MH movement is predicted, then the OAR may be informed by the MH
(if mobile assisted operation is implemented) with a Host Tunnel
INitiation (H-TIN) packet or via a layer 2 signal. This causes the
OAR to build a temporary, soft-state tunnel towards the NAR and to
send a Tunnel INitiation (TIN) packet to the NAR. This message may
give the NAR advance warning of hand-over. The tunnel can serve to
help avoid packet loss during any link dead-time. This sequence of
events and the tunnel's construction are optional. What is not
optional is the construction of a virtual link at the OAR. If hand-
over is predicted, this virtual link is accompanied by a tunnel and
is terminated at the NAR. If hand-over is not predicted and the
link to the MH is suddenly lost, a virtual link to the MH itself is
retained for some time while the OAR awaits notification of the MH's
location.
Otherwise, the EMA hand-over model has its focus at the NAR and all
mandatory messaging begins there. On arrival at the NAR, the MH
(operating in mobile-assist mode) brings up a new link for IP
purposes (i.e. Make) to the NAR. This triggers the NAR to send a
Hand-over Request (HR) message to the OAR which can contain MH
credentials and privileges. The OAR responds with either a Hand-
over Initiation (HI) (i.e. AAA information and associated state)
packet if hand-over is permitted, or else with a Hand-over Denial
(HD) packet.
The HR packet is repeatedly sent until either a HI or HD is
received, or it is determined that the OAR is unreachable. If hand-
over is permitted, the HI packet begins a three-way handshake to
transfer control of the mobile to the NAR. On receipt of the HI,
the NAR initiates routing redirection by sending a Routing Update
(RU) towards the OAR. This is sent reliably hop-by-hop towards the
OAR, and may be resent multiple times until a RU Acknowledgement
(RUA) is received at the NAR or the OAR is determined to be
unreachable. This message exchange remains the same for both BBM
and MBB hand-over, whether or not the hand-over can be predicted.
O'Neill, Corson, Tsirtsis 9
Internet Draft EMA July 2000
2.5 Break Before Make - BBM
TDMA technology such as GSM only allows the mobile to be connected
to a single access router at a time, with a data path dead-time
incurred during hand-over. To minimise the potential for packet loss
while maintaining efficient routing, the inject/poison route
features are delayed and invoked only after the Make event occurs at
the NAR thereby ensuring that the link to the OAR is used until the
break occurs. When the mobile disconnects at the radio layer from
the old AR (Break), the new AR, through the inter-AR virtual link or
tunnel (if present), is immediately known to be the next best hop,
and packets hitting the old AR are immediately redirected down the
tunnel to the new AR. If a tunnel is not present (unanticipated
break), then packets may be cached at the OAR in anticipation of a
hand-over, or simply dropped. Some time later the mobile will
attach to the new AR (Make) and, if the tunnel is in place, will
immediately receive in-flight and locally cached packets.
Once the Make event occurs, the new AR informs the old AR of the
need to commence hand-over. The two ARs now collaborate to locally
inject the new route into the routing domain and poison the old
route. Packets to the mobile will then head towards the new AR
route. This route redirect process will typically converge during
the data path dead-time ensuring that only a small number of packets
(if any) will need to be tunnelled from old to new AR. Once routing
has converged, the old AR will eliminate the redirect state
associated with the temporary tunnel. The reception of the mobile
at the new AR is then confirmed through acknowledgement messages to
the old AR which is used to confirm hand-over of responsibility for
the mobile and it's IP address in the system.
The following steps outline the break-before-make (BBM) procedure of
EMA, which is also shown in figure 3:
1) Detect imminent hand-over and inform new and old ARs
(optional).
2) Build a temporary tunnel from old AR to new AR (optional).
(Break event occurs)
3) Await Make event at new AR.
4) On Make event, inject new route to the new AR.
5) Tear down tunnel at old AR (if present).
O'Neill, Corson, Tsirtsis 10
Internet Draft EMA July 2000
OAR NAR OAR======NAR OAR======NAR
| | | | |
| | | | |
MH-> MH-> MH->
a)Before Handover b)sensing new link c) Tunnel Data
build tunnel on break
^
|
OAR======NAR OAR NAR
| |
| |
MH-> MH->
d)Inject new routing e)Routing converges
on make, forward tear down tunnel
cached data (if any)
Figure 3: Basic EMA BBM Hand-over (with temporary tunnel)
The first two steps are optional because it is not always possible
to predict a hand-over in advance. An unanticipated link failure
may occur between the old AR and the mobile host prior to its
arrival at the new AR. The "inject/poison" route features of EMA can
be invoked only after the old and new ARs have been identified, and
have agreed to the hand-over by creating the dynamic, temporary
redirect tunnel between them. Note that for efficiency purposes a
single redirect tunnel could be pre-configured between adjacent
access routers to support all inter-access router hand-overs, and
dynamic mobile-specific redirect tunnel state temporarily installed
against that aggregate tunnel.
2.6 Make Before Break - MBB
CDMA technology enables a mobile terminal to be connected to two
base stations at the same time and to undertake measurements to
establish the preferred channel and hand-over time. This hand-over
time determines the timing of the Make event. As with TDMA, it is
desirable to wait until the Make event occurs before injecting the
new host route. However, unlike TDMA, packets continue to arrive at
the mobile via the link to the old AR prior to the Make event.
Thus, the temporary tunnel is typically not needed in CDMA, but it
is constructed in case an unexpected early break occurs with the
added benefit that in so doing the same hand-over state machine can
be used for both BBM and MBB modes.
The following steps outline the make-before-break (MBB) procedure of
EMA which is also shown in figure 4:
O'Neill, Corson, Tsirtsis 11
Internet Draft EMA July 2000
1) Detect imminent hand-over and inform new and old ARs
(optional).
2) Build a temporary tunnel from old AR to new AR (optional).
3) Await Make event.
(Make event occurs)
4) On Make event, inject new route to the new AR.
(Break event occurs)
5) Tear down tunnel at old AR (if present) and remove state of
poisoned route.
^
|
OAR NAR OAR=====NAR OAR=====NAR
| | | | |
| | | | |
MH-> MH-> MH->
a)Before Handover b)sensing new link c)Inject new routing
build tunnel on make
OAR=====NAR OAR NAR
| | |
| | |
MH-> MH->
d)Routing converges e)Break occurs
tear down tunnel
Figure 4: Basic EMA MBB Hand-over (with temporary tunnel)
We are not directly addressing IP layer support for CDMA soft hand-
over. While feasible in terms of IP layer routing and copying, this
mode of CDMA-based hand-over requires highly synchronised packet
delivery over the air interface(s) to the mobile which may not be
compatible with a heterogeneous IP network infrastructure. Soft
hand-over can still be achieved however if the underlying layer 2
(ATM AAL) has the required timing and cell duplication functionality
as presently proposed in 3G systems. This is achieved for example by
the IP layer at the OAR handing responsibility for soft hand-over to
the ATM layer which duplicates and times cell delivery to the
multiple neighbor NAR(s).
2.7 Hybrid Model
When a hybrid node is able to support both TDMA and CDMA (or other
combinations of technology) then a consistent set of access router
and Mobile IP messages makes hand-over of the concurrent sessions
between TDMA and CDMA access routers possible. This is achieved by
the access routers understanding each other's capabilities, and
holding up and synchronising the inject stages as appropriate.
O'Neill, Corson, Tsirtsis 12
Internet Draft EMA July 2000
2.8 Mobile IP Session Completion
It is clear that the migration of IP addresses away from the
allocating access router can lead to address exhaustion and a
gradual degradation over time of the usefulness of the proactively
advertised access router address block prefix. It is therefore
critical that at the moment that the mobile finishes active
sessions, at a distant access router, that the IP address is
returned to the AAR. This can be modeled as a virtual mobile moving
from the distant access router back to the AAR and then locally
returning the IP address. This can be accomplished using similar
mechanisms which are used to support real inter-access router hand-
overs, with the access routers acting as proxies for the virtual
mobile. Their aim is to co-ordinate the removal of all host specific
routing entries in the domain as a result of previous mobility away
from the home access router.
2.9 EMA Inter-domain considerations
In both the BBM and MBB case above if the NAR is in a different
administrative domain from the OAR, we set-up a Mobile IP (MIP)
tunnel between the OAR (playing the role of a Home Agent) and the MN
(playing the role of a Foreign Agent). This is independent of
whether the destination domain supports an EMA-MER protocol or a
traditional routing protocol such as OSPF. In addition, we further
allow this temporary tunnel to be replaced by a persistent tunnel
back to the AAR when leaving an EMA-enabled domain so that the host
route between the AART and OAR in that domain can be removed. The
AAR then becomes the HA for the CCoA from the EMA domain which is
then termed a Co-located Roaming Care of Address.
In either case, the end of the MIP tunnel in the new domain is the
MN (rather than the NAR) which means that if the mobile continues
moving in the new domain, and the domain does not support EMA-MER,
then this end of the MIP tunnel needs to move with it. This requires
re-registration of the mobile to its Home Agent (OAR/AAR) at every
hop leading to lower hand-over performance without Mobile IP fast-
hand-over extensions. However, we favor this approach because it
keeps the mobile simple and reasonably aware of intra/inter-domain
changes. This does however potentially lead to tunneling over the
expensive air interface but this is assumed to be necessary in the
majority of cases for MIPv4, MIPv6 anyway and so appropriate Header
compression solutions will be developed.
The NAR is involved with the MN in the MIP/EMA signalling plane
which strikes the best balance in the overall flexibility and
control of hand-over, supporting both MN assisted and network
assisted models. This also allows the mobile to potentially run
Mobile IP, using a Co-located Care of Address, back to a third HA
(in say the corporate LAN) for its own orthogonal purposes.
O'Neill, Corson, Tsirtsis 13
Internet Draft EMA July 2000
If the new domain also supports MER then a hybrid mode of Mobile IP
and EMA-MER becomes possible which avoids Mobile IP re-registration
at each new AR within that new EMR domain. [MobileIP] with the
extensions described in [MIPAAA] should be used for inter-domain
tunnelling so that integrated AAA functionality can be provided for
roaming users between domains.
3. TORA-based Mobile Enhanced Routing (MER)
The preceding architecture does not specify how an MER algorithm
creates or modifies its host and prefix-specific IP forwarding
entries, and various approaches are possible. The problem of EMA
routing is divided into two sub-problems: inter-AR routing and host-
specific routing. The inter-AR routing should be continuously
maintained, i.e. proactively, whereas host-specific routing should
be maintained only as needed, i.e. on-demand or reactively, for
scalability reasons.
Inter-AR routing is prefix-based, i.e. each AR advertises a prefix
address into the FMC domain covering a block of host addresses that
it controls. Each host is allocated an interface address covered by
the allocating AR network prefix. While the host is "at home",
packets are routed to the host via this network prefix. This is
undertaken so that packets can be efficiently routed to both fixed
and 'at home' mobile hosts and a virtual, bi-directional link exists
between any pair of cooperating ARs for their communication during
mobile handover.
Host specific routing is required only when the mobile host moves
away from its allocating AR. Host-specific state is injected in the
network during handover to overrule (via longest prefix match
forwarding) a mobile host's 'at home' prefix based route, which
redirects packets to that mobile hosts current AR location.
With the objective of building a large-scale EMA domain, the
Temporally-Ordered Routing Algorithm (TORA) appears potentially
well-suited for use as a EMA:MER algorithm [TORA]
3.1 TORA Concepts
TORA was originally specified as an on-demand routing algorithm, but
this mode of operation is not generally required and a proactive
mode has been specified. Because TORA proceeds independently for
each destination, it may operate proactively for certain
destinations and reactively for others. In the proposed FMC
context, separate versions of TORA will proceed proactively for each
AR and proceed reactively for each mobile host in an edge mobility-
enhanced mode as necessary.
TORA operates with respect to "nodes". Each node is assumed to have
a unique Node ID (NID). A Node ID (NID) is a polymorphic identifier,
and may be either a Router ID (RID) or a Destination ID (DID)
depending on the context. In a manner similar to OSPF, TORA uses a
O'Neill, Corson, Tsirtsis 14
Internet Draft EMA July 2000
Router ID (RID) to uniquely identify a TORA router separately from
its interfaces. A destination identifier in TORA is a destination
network prefix, composed of an interface IP address and a network
mask. Consequently, the neighbor set Ni that lists a node's
neighbors by NID may actually contain two different identifiers. A
neighbor may be identified as a router (by its RID) or as a
destination (by its network prefix) or frequently as both with
multiple entries in the neighbor set table. For the subsequent
discussion, we assume each node i is always aware of its neighbors
in the set Ni.
TORA proactively and/or reactively builds, and then maintains, a
Directed Acyclic Graph (DAG) rooted at a destination. For a given
destination, each participating node i is assigned a height defined
as an ordered quintuple Hi = (ti, oidi, ri, di, i). No two nodes may
have the same height (i.e. the set of heights is totally-ordered).
Height comparisons are performed lexicographically. Starting with
the 'ti' value, comparison tests are for "less than" or "greater
than", with equality resulting in the comparison proceeding element-
wise towards the final element, the NID i. Information may flow from
nodes with higher heights to nodes with lower heights over
'directed' links. Each link is assumed to allow two-way
communication (i.e., nodes connected by a link can communicate with
each other in either direction).
Each initially undirected link may subsequently be assigned one of
three states; (1) undirected, (2) directed from node i to node j, or
(3) directed from node j to node i. If a link is directed from node
i to node j, node i is said to be "upstream" from node j while node
j is said to be "downstream" from node i. Conceptually, information
can be thought of as a fluid that may only flow downhill over
downstream links (see Figure 4). By maintaining a set of totally-
ordered heights at all times, it is easy to see how loop-free,
multipath routing is assured. Information would have to flow uphill
to form a loop, and this is not permitted. Due to the mobility of
some nodes, the set of active links in the system is changing with
time (i.e., new links can be established and existing links can be
severed).
Conceptually, the height quintuple associated with each node is
combined into two parameters: a reference level, and a delta with
respect to the reference level. The reference level is represented
by the first three values in the quintuple (a triple), while the
delta is represented by the last two values (a double). The first
value in the reference level, 'ti', has three meanings. If equal to
zero, it indicates that the height value has remained "unchanged"
since the DAG was initially constructed or was last optimized (this
is the state of all heights in Figure 4). If positive, it is a time
tag representing the "time" of a link failure somewhere in the
network. If negative, it represents a route "freshness" value (the
more negative the fresher the route) generated in response to
handover-induced mobility.
O'Neill, Corson, Tsirtsis 15
Internet Draft EMA July 2000
Much of TORA's original protocol mechanism deals with reaction to
link and node failures. Many of these details are not relevant to
the discussion here, and we refer the reader to [TORA, TORAdraft]
for this information. Here we focus on the aspects of TORA
necessary to understand its operation as a FMC algorithm within the
EMA. Under appropriate topological conditions, TORA's reaction to
link additions and failures can be highly localized. This is a key
property which we exploit based on the realization that, viewed
abstractly, the "make" and "break" operations in cellular networks
correspond to link "additions" and "failures", respectively, in a
unified mobile host/fixed router network. The subsequent lack of
large amounts of far-reaching control message propagation-a feature
common to shortest-path algorithms-afford TORA its relatively quick
convergence and consequent stability.
These properties appear desirable for the design of large-scale
routed domains without any consideration for mobility support. We
can therefore have a separate version of TORA, running on each AR,
build and proactively maintain an aggregated DAG for each prefix
owned by that AR. The AR aggregated DAGs are then maintained via a
combination of the aforementioned proactive mechanism and normal
TORA reactive processing, giving us large-scale routing support for
both fixed, and 'at home' mobile, hosts. To support the movement of
the mobile hosts, through the injection of the host routes, we seek
a mechanism that operates in harmony with TORA's notion of height-
based routing, and permits a large degree of flexibility and
scalability concerning the method and scope of host-specific state
injection. The design objective is to localize the scope of
handover-induced messaging so as to reduce the processing load on
routers as much as possible, while maintaining routing efficiency.
Domain scalability is clearly the end goal and the resulting
mechanisms are outlined below.
3.2 TORA Handover Processing
TORA MER differentiates nodes into two classes: routers and hosts.
Routers execute the full MER protocol while hosts execute only a
limited state machine that does not involve packet forwarding. Base
stations (AR) are routers, and mobile hosts (MH) are handed over
between routers. In general, routers may also be mobile (e.g.
mobile ad hoc networks), but we will not consider that case here.
The Mobile enhanced TORA protocol operates reactively, both in terms
of initial route construction and route maintenance in response to
unforeseen topological changes. We have already seen how TORA's
route construction process can be made proactive. Now, we will show
how TORA can respond to known topological changes, whether foreseen
or unforeseen but anticipated.
O'Neill, Corson, Tsirtsis 16
Internet Draft EMA July 2000
@ @
@@@@@@@@@@ @@@@@@@@@@
@ .------CR-------. @ .------CR-------.
@ | (0002) | @ | (0002) |
@ | | @ |I>>>>>>>>>>>>>I|
@ | | @ |I TIN I|
@ | | @ |I v|
@ OAR NAR @ OAR=============NAR
@(0001) (0003) @(0001) (0003)
@ | @ |I
@ | @ |I
@ | @ |I H-TIN
@ | @ |I
@ | @ |I
@@ MH-> @@ MH->
(0000) (-1000)
(a) (b)
@ @
@@@@@@@@@@ @@@@@@@@@@@@
@ .------CR-------. .------CR-------. @
@ | (-1002) | | (-1002) | @
@ | <<<<<<<<<I| |I<<<<< | @
@ | UDU I| |I UDU | @
@ | I| |v | @
@ OAR=============NAR OAR NAR @
@(0001) (-1001) (-1003) (-1001)@
@@@@@@@@@@@@@@@@@@@| | @
@| | @
@| | @
@| | @
MH-> MH@@
(-1000) (-1000)
(c) (d)
Figure 6: Anticipated BBM hand-over
As mentioned, at any given time the destination has the "lowest"
height w.r.t. the remaining TORA DAG. To enable "arbitrary"
destination mobility within the DAG (i.e. mobility between "any" two
points in the DAG), the destination should also "lower" its height
each time it moves and connects to a new point in the DAG. This
action preserves the DAG's loop-free, multipath routing property
while localising the communication necessary to re-orient the DAG.
A special case of such destination mobility is mobile handover in a
cellular network. We now illustrate how the TORA height concept
operates with the EMA message framework with a "GSM-like" scenario
of BBM hand-over shown in Figure 6.
O'Neill, Corson, Tsirtsis 17
Internet Draft EMA July 2000
The TORA protocol defines an unicast-directed update (UDU) packet
that replaces the RU message of the EMA. Similarly, an unicast-
directed update acknowledgement packet (UDUA) replaces the EMA's RUA
packet.
We can only show a portion of the message exchange due to space
constraints. The H-TIN packet initiates tunnel creation and
transmission of the TIN packet. The Make event is seen in Figure
6c, which initiates UDU transmission (we skip the HR and HI phases
here) to redirect routing via injection of host-specific routing
state (shown next to the OAR prefix DAG state). The UDU redirects
packet flow at each router it passes (via height "lowering" in the
DAG) towards the NAR. Since it is sent to the OAR, it eventually
re-directs all packets destined for the OAR towards the NAR.
Meanwhile, packets have been tunnelled towards the NAR since the
Break event. Packet flow for the ongoing call in the example is
redirected in Figure 6d after the UDU hits the call's crossover
router, and the tunnel comes down when the UDU hits the OAR. We
also omit the UDUA phase due to space limitations. The numbers below
each router in the figure represent that router's height, and show
that the set of heights become negative (i.e. lower) as handover
progresses. See [FMCTR] for more details.
As the mobile migrates, a similar sequence will be repeated at each
hand-over, with the mobile's height getting progressively lower.
Hopefully the reader will be able to construct similar message
diagrams for the other cases involving unanticipated BBM,
anticipated MBB and unanticipated MBB from what we have presented
(see [FMCTR] for more details). These hand-over forms may occur as
the mobile moves between different types of layer 2 technologies
(e.g. GSM to Bluetooth hand-over) generating different hand-over
event sequences.
Recall, it will also be necessary to re-allocate the IP address back
to the AAR after a sequence of hand-overs. This is accomplished via
a sequence of messages very similar to the hand-over processing
(only in reverse) where the IP address is handed back to the AAR and
all host-specific state is erased from the network which we cannot
show due to space limitations.
4. EMA and Mobile IP Convergence - text from [EMA-MIP] draft
Mobile IP (MIP) (versions 4 and 6) provides for the potential
movement of a Home IP address throughout the Internet, from a home
domain subnet, throughout foreign domain subnets equipped with MIP.
It does so by providing a Mobile Node (MN) with a local and
potentially short term IP Care of Address (CoA) in a foreign domain,
towards which packets can be indirectly tunnelled. This CoA is
reported back to a Home Agent (HA), who then tunnels packets, sent
O'Neill, Corson, Tsirtsis 18
Internet Draft EMA July 2000
by any Correspondent Node (CN) to the Home address, towards this
CoA. In addition, direct tunnelled communication, bypassing the HA,
can be achieved through additional signalling between the MN and the
CN. A Foreign Agent (FA) entity can also optionally exist to assist
the MN in the foreign domain by terminating tunnels and acting as a
proxy CoA, a CoA allocator and a proxy signalling point for MIP
signalling.
This section outlines the inter-working architecture for EMA and
Mobile IPv6/v4 that provides mutual co-existence and benefits, both
for the user and the operator.
4.1 EMA / MIP Architectural Considerations
Firstly, the EMA envisages a rich set of hand-over capabilities that
encompass a range of existing, predictive (cellular) and non-
predictive (inter-technology) hand-over models and requirements. The
EMA signalling requirements are a super-set of existing MIP hand-
over capabilities as will be described in detail later, which
indicates that some additions will be required in MIP if EMA is to
solely rely on MIP signalling. Specifically, MIP does not presently
support forward hand-over rooted at the OAR, nor does it provide the
required information exchange between neighbouring ARs to facilitate
such forward hand-over in an all-IP solution. There have however
been drafts and discussions suggesting such additions and these are
in line with the desire for MIP take a significant role in 3G/4G
cellular solutions.
Secondly, the MIP architecture assumes a MN is from an arbitrary
home domain, and an arbitrary HA within that domain. We therefore
cannot make any assumptions in EMA as to whether or not this Home
Domain is equipped with a MER protocol. Equally, we know that any
visited foreign domain may be either MER or non-MER equipped, and we
need to ensure that MIP continues to operate as normal as a MN moves
through MER and non-MER domains. The conclusion therefore is that
MIP functionality related to the Home Address as a source /
destination address, covering CoA registration, HA capabilities and
route optimisation/binding features, must be orthogonal to EMA. EMA
is instead associated with the CoA, FA/Care of Router (CoR), MN-AR
signalling, and the temporary forwarding (between CoA's on hand-
over) features of MIP. The specific details change slightly between
MIPv6 and MIPv4, and depend on the type of CoA (Co-located or not).
Each scenario is broadly described in the following sections.
Thirdly, and finally, the types of Internet access supported by MIP
and MER functionality are very different and are part of the overall
commercial opportunity. MIP facilitates roaming into foreign domains
and links, from a Home link within a Home Domain. Associated AAA
interfaces are used to control access to the foreign links where
necessary, and may also be used to install policy as to how user
traffic is forwarded. These forwarding options provide for IP
traffic associated with a home session address to go to and from the
O'Neill, Corson, Tsirtsis 19
Internet Draft EMA July 2000
Home Domain (forward and reverse HA tunnelling) as in the remote
access model. The other options allow for direct tunnelled
communication between CN and MN (HA bypass) through
optimisation/binding, and in the case of Co-located Care of
Addresses (CCoA) based sessions, native communication independent of
the home address and MIP tunnelling features (as in local or roaming
access). The MIP CCoA is however only a valid session address on a
specific foreign link, and the utility of this address for native
service is consequently severely limited, and it's use therefore
actively discouraged in Mobile IP.
Some movement of this CCoA address is, however, supported in MIP
through the use of temporary tunnelling between ARs, with the
current CCoA at the old AR being treated like a Home Address, and a
new CCoA from the new AR acting as the tunnel endpoint. To aid
subsequent discussions we describe temporary tunnel forwarding
between adjacent ARs as "Horizontal" MIP forwarding, whereas
standard indirect tunnel forwarding via the MN's HA in its Home
Domain, or direct from a CN using optimisation, is termed
"Vertical" MIP forwarding.
MER also enables native communication using the CCoA as a normal
source (destination) session address, but with significantly
increased utility, as a result of the MER ability to update the
routing tables in the domain to enable the CCoA to move with the MN.
The combination of MIP and MER can therefore support both native and
remote access models, along with hybrid combinational models. From
the perspective of a foreign ISP, a roaming MN can be offered native
service and/or non-optimised/optimised remote access depending on
the user's/home operator's privileges in the foreign domain,
assuming appropriate AAA support features are developed.
In the existing UMTS model, the benefit of the co-existence of these
models is clear because the present UMTS network can only support
the remote access model from the MN back through SGSN and GGSN to
the external 'Home' ISP (today via GTP tunnels). This external ISP
provides both the non-routable 'Home' IP address to the MN, and all
associated IP services and onward connectivity to the wider
Internet. Significant benefits would accrue to both the UMTS network
operator and to users if, in addition, the UMTS network could
support native IP services using local IP addresses, local IP
service infrastructure, and direct connectivity between users on
that network and out to the wider Internet. This commercial context
provides additional justification for the co-existence of MIP
(remote access) and EMA:MER (as an efficient means to support native
forwarding) within a future all-IP 3G/4G solution. The details below
will illustrate this in more detail.
O'Neill, Corson, Tsirtsis 20
Internet Draft EMA July 2000
4.2 Converged EMA / Mobile IP Addressing
EMA Access Routers provide a temporary address to the MN in any
domain in which it roams, with the address changing on a per IP
session basis. This temporary address is allocated by the AAR when
the MN has data to send, or when the MN has been paged for incoming
traffic. In IPv6 the MN can automatically and rapidly build a
temporary address by simply appending it's EUI to the advertised
prefixes from it's chosen AAR. This temporary address (and
associated service restriction) is similar to the address that is
today allocated to the majority of dial-up users. These users do not
need permanent IP addresses because they only utilise applications
which are initialised through a client server process...(WEB, mail,
newsgroups, ICQ etc) in which outgoing traffic informs the servers
(and any onward users) of the users IP address. This temporary
address is not however sufficient for users with servers who must be
able to advertise the server address (e.g. DNS), for corporate
roamers who require a valid address from their home network, and for
users of peers to peer applications who wish to receive incoming
calls.
Therefore, in addition to the temporary session address, the MN may
also have a persistent IP address allocated via DHCP (or whatever)
which is used at the IP layer as a globally unique, stable and hence
advertised identifier. This IP address is associated with, and
allocated by, the home ISP or corporate, and is associated with the
home link of the MN. This address may be installed into DNS and SIP
systems for example, and cached by knowledgeable users. When
compared to cellular systems, the persistent address is in concept
similar to the IMSI, whilst the temporary address is in concept
similar to the T-IMSI.
The converged Mobile IP / EMA addressing architecture requires that
the persistent address is used as the Mobile IP Home address to
ensure that the MN may be contacted when roaming using normal Mobile
IP mechanisms. The local temporary address is used as the Mobile IP
Co-located Care of Address (CCoA) and enables this address to be
used for MIP tunnelling as well as for native IP service. The
benefits of this co-existence may be summarised as following;
Mobile IP is used to provide global roaming of a global address
whilst EMA provides routable local addresses.
The local address can be used by the mobile node to source traffic
from any AR within the EMA domain due to the EMA host redirect
routes and IP hand-over. The local address can also act as a sink of
traffic from anyone in the Internet who learns the address (MN
initiated is easy of course), limited only then by the scope of the
address (global, site local, link local, private etc). The MN
persistent home address can be used to sink traffic from any
Internet host either via Home agent or Correspondent Node tunnelling
to the CCoA. The MN persistent home address can be used to source
traffic directly to Correspondent Nodes or via reverse tunneling to
the Home agent and Home domain.
O'Neill, Corson, Tsirtsis 21
Internet Draft EMA July 2000
Further details of the benefits of this co-existence are described
in [EMA-MIP]
5. Scalability Characteristics of EMA:TORA
This is achieved due a number of novel design decisions which should
enable EMA to be supported across large AS's, equivalent to today's
OSPF / IS-IS interior routed domains (many thousands of routers).
5.1 Temporary Session Addresses
The temporary session address means that a MN always starts any IP
session being routable on a prefix route. A host route is only
required for subsequent movement away from this first access router
whilst in-session. When the session ends, the address and associated
host state can be removed. When the mobile is not in-session, there
is no implication on either the domain routing tables or the
addressing resources.
5.2 Aggregate Prefix Routes
The use of prefix routes means that the network can grow to be a big
domain with a large number of access routers, supporting both mobile
and fixed access technologies. Mobility becomes a delta on top of
the prefix fabric rather than having host routes replicate the job
of the prefix route in a very inefficient way.
5.3 Localised Host Redirect Routes
The presence of the prefix aggregate route, and the use of the
temporary session address results in the host route only being
required for in-session mobility. The directivity of the host
redirect, between the NAR and the OAR, and the chaining of such
redirects, results in significant localisation of mobility induced
routing messaging and host route state, instead of a domain wide
host routes. The degree of localisation is dependent on the IP
topology, associated routing metrics and even traffic engineering
based TORA route selection.
The degree of router meshing and the number of levels in the router
hierarchy affect the potential reach of redirect host routes. Higher
degrees of meshing, lower in the network, results in a more direct
horizontal path between adjacent access routers for the hand-over
message and the resulting redirect host route. This causes incoming
packets from the core, and from most other access routers, to take
longer to reach the host redirect state. However it will be seen
sooner by packets coming from any intermediate AR (and associated
connected sources) between the AAR and the present AR of the mobile
due to the installed 'shallow' host route.
O'Neill, Corson, Tsirtsis 22
Internet Draft EMA July 2000
A more tree like structure results in a more triangular path between
adjacent nodes going higher into the core. This will mean that
incoming packets from the core and from most other access routers
will see the redirect later whilst the intermediate AR packets will
see the redirect earlier. In addition, the use of preferential route
metrics can be used to 'steer' the host redirect routes either
higher or lower in the infrastructure as required, giving increased
control above and beyond that 'implied' by the topology.
5.4 In-session Dynamics
It is clear that an 'always on' mobile can be roaming anywhere over
long periods of time. Any mobile routing solution that allocates
persistent IP addresses, is forced to track that address in the
routing/paging system leading to scaling problems. We instead
separate the paging system from the mobiles care-of-address. In
addition, we only track the mobile in the routing system during
active IP sessions, which is likely to be a small proportion of the
'always on' mobile activation time. Further, whilst in-session, most
internet applications require that the user becomes relatively
stationary in the topology because it would be uncommon to drive,
walk or generally concentrate on other things whilst, in parallel,
browsing the web. There are certainly situations in which this
application assumption is incorrect but in those cases it is other
factors that limit the impact of host routes. For example, in the
case of IP telephone calls where people are occasionally driving or
walking, the call durations are short and the associated hand-over
statistics are both well-known (GSM) and of little concern. In the
case of planes and trains, we can simply support such 'rare' hosts
routes within the localised cellular infrastructure and access
routers along major routes through suitable dimensioning and
associated tariffing. However, it is likely that in time IP
infrastructure will be installed in such moving platforms resulting
in a single aggregated host prefix for all those co-located nodes
moving in sympathy.
Further, the use of the MobileIP Permanent Home address and bindings
ensures that the user is always reachable if the host route needs to
be removed (either route hold timer expiry or CCoA reset). Finally,
the profile specific IP session, address and route hold timers
ensure that we can use tariffing to tune and control the impact of
in-session mobility and usage patterns on the overall routing
system.
5.5 TORA MER
TORA was originally conceived as a MANET routing algorithm where it
is intended for use in large-scale, dynamic, bandwidth-constrained
MANETs. The principle objective behind its design is the
achievement of "flat scalability", i.e. achieving a high degree of
scalability (measured as the number of routers in a domain) with a
"flat", non-hierarchical routing algorithm. In its operation the
O'Neill, Corson, Tsirtsis 23
Internet Draft EMA July 2000
algorithm attempts to suppress, to the greatest extent possible, the
generation of far-reaching control message propagation.
With TORA, such suppression may or may not be feasible depending on
the topology. As we will see subsequently, a key to achieving
highly-scaled EMA routing with TORA turns out to be an issue of
"topology control". Under appropriate topological conditions, TORA's
reaction to link additions and failures can be highly localised,
with smooth delocalisation as we move to more adverse topologies.
This is a key property which we exploit based on the realisation
that, viewed abstractly, the "make" and "break" operations in
cellular networks correspond to link "additions" and "failures",
respectively, in a unified mobile host/fixed router network. The
subsequent lack of large amounts of far-reaching control message
propagation--a feature common to shortest-path algorithms--afford
TORA its relatively quick convergence and consequent stability.
These properties appear desirable for the design of large-scale
routed domains without any consideration for mobility support. In
the most recent Internet Architecture Board (IAB) report on network
layer issues [IAB99], the IAB concluded that the scalability
bottleneck of presently deployed routing technology stems not from
storage considerations but rather from long convergence times. These
convergence delays are due to the time required to distribute table
routing information updates (communication complexity) and the time
required to re-compute routing tables (computational complexity).
Operating in a suitable topology, TORA can have relatively low
communication and computational complexity due to the nature of its
distributed computation that forgoes shortest path computation.
TORA also supports loop-free, multipath routing realised as a
consequence of the usage of temporally, totally-ordered "heights".
The provision of multipath routing makes the protocol amenable for
load sharing and traffic engineering. The algorithm also has the
potential to support fast restore via its link reversal mechanism
based on the availability of fine-grained link status sensing,
possibly from layer 2 mechanisms or from layer 3 mechanisms such as
[FLIP].
5.6 Performance
Operating as an EMA-MER protocol, initial simulation results
indicate that TORA may be well-suited for use in hierarchical mesh
topologies [FMCTR]. Hierarchical mesh topologies have a limited
number fully-meshed core routers, a greater number of intermediate
routers (each dual-homed to two core routers), an even greater
number of edge routers (each dual-homed to two intermediate routers)
and a large number of access routers (each single-homed to an edge
router). Such topologies have characteristics of both mesh and tree
networks, which vary as a function of the hierarchical fan-out (the
O'Neill, Corson, Tsirtsis 24
Internet Draft EMA July 2000
greater number of routers at each lower level) and the amount of
multi-homing between levels.
Proper topology design for TORA involves a balance between tree-like
and mesh- like characteristics. The more tree-like the network, the
better the routing efficiency of TORA relative to a shortest path
routing algorithm due to the reduction in the number of potential
preferred paths between ARs because of the route aggregation effects
of hierarchical topologies. Simulation results obtained thus far
indicate that routing efficiency deviates no more than 5% from
optimal (i.e. shortest path) [FMCTR]. However, the more mesh-like
the network, the greater the degree of control message localisation
that can be obtained during handover. The objective of the
localised hand-over model is to keep host-specific state out of the
core and as far towards the network edge as possible. Simulation
results indicate that with GSM call and mobility statistics for a
domain with 1600 ARs, the mesh-like character achieved with dual-
homing keeps host-specific state completely out of the core routers,
distributing it to routers lower in the hierarchy [FMCTR].
The potential scalability of the proposed TORA EMA-MER approach is
indirectly indicated by a comparison of simulation times for
alternative approaches. Results for TORA EMA-MER operating over a
domain with 1760 routers took little more than a day to simulate.
However, to compare against an approach using a shortest-path
computation (imagine a mobile overlay approach atop OSPF in a domain
this large), it is estimated from observed simulation progress that
it would have taken the same computer approximately 84 days to
simply compute the dijkstra computations (one per router) to
initialize the simulation. The TORA approach forgoes support for
shortest-path routing and sacrifices an amount of routing efficiency
to achieve highly-scaled operation in large domains.
6. Comparison to Alternatives
6.1 Mobile IP
Mobile IP [MobileIP] is a well known technique for supporting edge
mobility through the use of stateful intelligence and the permanent
use of tunnels. Mobile IP is used in our proposal as the only
credible means to support hand-over between Autonomous Systems
whilst trying to preserve the current IP interface address and
dependent IP sessions. It is also required to support subsequent
roaming within a non-MER domain through re-registration and to
provide signalling and temporary tunnelling services during hand-
over Mobile IP takes the position that IP routing should not
inherently try to support IP interface movement due to the
implications on the scaling of the intra-domain routing. It is
therefore deemed better to add functionality to hide the interface
movement from the routing protocol(s). The authors of this draft
fully concur with this position for traditional routing protocols
such as OSPF, where the consequence of mobility in any reasonable
O'Neill, Corson, Tsirtsis 25
Internet Draft EMA July 2000
domain is clearly disastrous for routing state and message overhead.
However, we believe other routing approaches can achieve sufficient
scaling to be commercially useful, and the case for Mobile IP
against a routing solution becomes a more detailed comparison of
interactions with other IP / cellular protocol features, system
reliability, system overhead, time to market and ultimately cost
etc. We believe that with suitable routing technology, the Mobile IP
solution will in many cases be inappropriate, and we would encourage
others to work on such technology, in competition to our detailed
proposals that will be published when finished. In addition, to
support the full set of cases, a converged solution employing both
EMA:MER and MIP clearly provides substantial benefits to the overall
system as shown in [EMA-MIP]
6.2 Cellular IP
Cellular IP [CellularIP] is an existing proposal which to some
extent fits aspects of this architecture, in particular in that it
uses Mobile IP inter-domain and advocates use of a constant in-
session address. It provides for hand-over-based redirection and
soft state-based maintenance of host-specific routing and paging
entries. These entries point to a central domain router, and the
redirections modify a set of default routes collectively forming a
tree.
6.3 HAWAII
HAWAII [HAWAII] is another proposal similar to Cellular IP. It also
advocates the use of a constant in-session address and Mobile IP
inter-domain. It also provides for hand-over-based redirection of
host-specific routing paths rooted at a central core router,
although its hand-over and paging mechanisms are more complex than
those of Cellular IP.
Cellular IP and HAWAII differ from the proposed architecture in
their use of a central routing tree. In EMA-MER approach, host
routes modify a traditional, prefix-routed mesh topology and form
route sets other than trees leading to reduced configuration,
greater resilience, shorter data path lengths and topological design
freedom. In addition, these approaches appear not to make provision
for the temporary tunnelling of packets in flight whilst redirect
routing converges, which can lead to data packet loss depending on
topology, convergence time, link speeds, control packet loss
recovery times and traffic load.
More fundamentally, EMA-MER requires a full routing algorithm,
employing hard state for both host-specific and prefix-based
forwarding entries, rather than a soft-state overlay technique for
mobile hosts independent of the underlying fixed routing. Trust is
placed in the host-specific entries, and periodic soft-state
reconfirmation is not utilized. The proposed system is designed to
scale. Central to this design objective is the limitation of
network control signaling, with the understanding that control
O'Neill, Corson, Tsirtsis 26
Internet Draft EMA July 2000
message processing is a principal bottleneck to system scalability.
Frequent route verification may potentially overload routers in the
domain sizes we envision which further supports our design
decisions.
6.4 OBAST
While not a direct alternative to the EMA, a recent proposal on Open
Base Station Transport (OBAST) [OBAST] is similar in spirit to the
work behind EMA. A driving force behind both works is the
development of a seamless IP layer hand-over model where radio layer
specifics are hidden from hand-over processing. Whereas EMA then
focuses more on specific routing and tunneling trade-offs within its
proposed location management architecture, OBAST is somewhat larger
in scope (e.g. it considers some transport layer issues) and puts
forth a network architecture for wireless access mirroring that of
the existing fixed Internet. The two proposals are similar in this
latter sense as well in that EMA (at the network layer) advocates
full convergence of fixed and mobile routing through the development
of mobility-enhanced routing algorithms that permit natively-routed
host mobility together with fixed host routing. Both approaches
also view Mobile IP as useful for supporting inter-domain terminal
mobility. Regarding hand-over control, EMA permits both network and
mobile-controlled hand-over. OBAST is currently silent on the issue
of MN-controlled hand-over, but intends support for a distributed
form of BS-assisted hand-over elected "call anchors". OBAST also
strongly prefers to consider only IPv6 whereas EMA prefers IPv6 but
intends support for IPv4 as well.
7. Security
This draft is too general to explicitly address security issues.
Certainly host and router authentication must be handled in the
architecture, and various mechanisms already exist for these
purposes. For example, host authentication during dynamic address
assignment is possible via [RADIUS]. Router authentication could be
handled via shared key exchange as is common in many routing
algorithms. Additionally, source address checking would be necessary
and is assumed at all AR's.
The MIP mechanisms described above can re-use mobile IP and AAA
mechanisms as proposed in [AAAMIP] and [CIP] since the requirements
and level of security required are the same. We specifically outline
below the method of authenticating users in the signalling plane
within an EMA domain due to the critical nature and hence threat of
false hand-overs.
O'Neill, Corson, Tsirtsis 27
Internet Draft EMA July 2000
7.1 Authenticating users within a domain
Associated with each mobile node (MN) is a unique identifier known
as its Mobile ID (MID). This is taken here to be an IP address
(which may or may not be associated with an interface), but which
may also be a Network Access Identifier (NAI).
On arrival at a NAR, a MN must first either furnish proof of prior
authentication within the domain, or be initially authenticated
before it may send or receive any form of control or data traffic.
Proof of prior authentication may be readily available in the form
of a pre-paid SIM card or from a MN's private authentication key (as
described subsequently).
To perform an authentication check, the MN must present its
credentials (including its MID) to the NAR. The method to conceal
these items over the air interface is not addressed here.
This transmission also advertises its current CCoA (if any) which it
may have auto-generated on arrival at this NAR. Consequently, this
authentication information may be passed to the NAR with a CCoA
(IPv6), or with a NULL source address (IPv4) as is commonly done
with DHCP. In the latter case the NAR (acting as a proxy for the
MN) substitutes its address for the NULL address. The NAR then
forwards the information to the local authentication server with
which it already has a Security Association (SA).
The local authentication server may then contact other servers as
necessary to perform the authentication check. The outcome of the
check (along with the MN's public key) is returned to the NAR. If
successful, the NAR computes a Private Authentication Key (PAK) for
the MN as an MD5 hash of the MN's MID and the domain's private
"network key" known to all domain ARs. The computation of PAK and
PIK herein are based on the PID scheme of [CIP]. The PAK forms a
shared secret known only to the MN and the network, and serves as
proof of MN authentication to other NARs in the domain.
Unsuccessful authentication results in service denial.
After a successful authentication, the NAR checks the MN's CCoA and,
if NULL (IPv4), allocates a new CCoA for the MN. Using the resultant
CCoA, the NAR computes a Private Identification Key (PIK) for the MN
as an MD5 hash of the MN's CCoA and the domain's private "network
key" known to all domain ARs, encrypts the PIK and PAK with the MN's
public key, and sends these to the MN along with the network's
public key and the MN's CCoA. Being keyed to the MN's CCoA, the PIK
is valid as long as the MN uses this CCoA. The PIK can be used to
authenticate (and optionally to encrypt) IP control packets over the
air interface. Authentication is performed by creating a short hash
from the (PIK, timestamp, packet content) triple that is placed into
the transmitted packets. The validity of each packet can be easily
checked by any NAR even immediately after a handoff and without
prior communication with the MN or with the OAR.
O'Neill, Corson, Tsirtsis 28
Internet Draft EMA July 2000
In addition to authenticating control packets, the PIK can
optionally also be used to provide security for data packets
transmitted over the wireless link. To this avail, any known,
shared secret-based security mechanism can be used where the PIK
serves as the shared secret.
8. References
[EMA-MIP] A. O'Neill, S. Corson, G. Tsirtsis, "EMA Enhanced Mobile
IPv6/IPv4", Internet-Draft,draft-oneill-ema-mip-00.txt, July 2000.
[CellularIP] A. Valko, ``Cellular IP: A New Approach to Internet
Host Mobility," ACM Computer Communication Review, Vol. 29, No. 1,
January 1999.
[CellularIPdraft] A. Campbell, J. Gomez, C-Y. Wan, Z. Turanyi and
A.Valko, "Cellular IP", Internet-Draft (work in progress), draft-
valko-cellularip-01.txt, October 1999.
[FLIP] H.Sandick et al., "Fast LIveness Protocol (FLIP)", Internet-
Draft (work in progress), February 2000.
[FMCTR] M. S. Corson, A. O'Neill, "An Approach to Fixed/Mobile
Converged Routing", University of Maryland, Institute for Systems
Research Technical Report, TR-2000-5, March 2000,
http://www.isr.umd.edu/TechReports/ISR/2000/TR_2000-5/TR_2000-
5.phtml
[HAWAII] R. Ramjee, T. La Porta, S. Thuel, K. Varadhan and
L.Salgarelli, ``IP micro-mobility support using HAWAII," Internet
Draft, Work in Progress, June 1999.
[HAWAIIdraft] R. Ramjee, T. La Porta, S. Thuel, K. Varadhan and
L.Salgarelli, ``IP micro-mobility support using HAWAII," Internet-
Draft (work in progress), draft-ietf-mobileip-hawaii-00.txt, June
1999.
[IAB99] M. Kaat, "Overview of 1999 IAB Network Layer Workshop",
Internet-Draft, draft-ietf-iab-ntwlyrws-over-01.txt, Oct. 1999.
[MIPAAA] S. Glass et. all, "Mobile IP Authentication, Authorization,
and Accounting Requirements", <draft-ietf-mobileip-aaa-reqs-01.txt>,
work in progress, January 2000.
[MobileIP] C.E. Perkins, ``IP Mobility Support," Internet RFC 2002,
Oct 1996.
[OBAST] P. Neumiller et. all, "Open Base Station Transport (OBAST)",
Internet Draft (work in progress), <draft-neumiller-obast-reqs-
01.txt>, June 2000
O'Neill, Corson, Tsirtsis 29
Internet Draft EMA July 2000
[RADIUS] C. Rigney, A. Rubens, W. Simpson and S. Willens, ``Remote
Authentication Dial in User Service (RADIUS),'' Request for Comments
2138, Apr 1997.
[TORA] V. Park, M. S. Corson, "The Temporally-Ordered Routing
Algorithm", Proc. IEEE INFOCOM '97, Kobe, Japan, April 1997.
[TORAdraft] V. Park, M. S. Corson, "Temporally-Ordered Routing
Algorithm (TORA) Version 1 Functional Specification", Internet-Draft
(work in progress), draft-ietf-manet-tora-spec-02.txt, October 1999.
[TORAthesis] V. Park, "A Highly Adaptive Distributed Routing
Algorithm for Mobile Wireless Networks", Masters Thesis, University
of Maryland, College Park, Maryland, 1997.
Appendix A -- IPR Statement
British Telecommunications plc has patent applications relevant to
the architecture mentioned in this draft and to modifications of
routing protocols. The modifications seek to achieve the scaling and
performance objectives required for commercial cellular IP systems.
British Telecommunications plc is currently considering giving an
undertaking to the IETF to grant licences under the patents
resulting from the patent applications on fair and reasonable terms
so that vendors can develop systems based on IETF specifications for
commercial deployment in a timely and cost-effective manner.
British Telecommunications plc would also encourage the IETF to seek
similar undertakings from others re licensing of their patents which
could otherwise hamper the development and deployment of the IETF
specifications related to this technology.
Author's Addresses
Alan O'Neill
BT
(+44) 1473-646459
alan.w.oneill@bt.com
M. Scott Corson
University of Maryland
Ansible Systems
(+1) 301-405-6630
corson@isr.umd.edu
George Tsirtsis
BT
(+44) 020 88260073
george.tsirtsis@bt.com
gtsirt@hotmail.com
O'Neill, Corson, Tsirtsis 30
Internet Draft EMA July 2000
Full Copyright Statement
"Copyright (C) The Internet Society (date). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph
are included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into
O'Neill, Corson, Tsirtsis 31
Internet Draft EMA July 2000
O'Neill, Corson, Tsirtsis 32
| PAFTECH AB 2003-2026 | 2026-04-24 04:28:04 |