One document matched: draft-singh-netlmm-protocol-02.txt
Differences from draft-singh-netlmm-protocol-01.txt
IETF NETLMM Working Group Anand Bedekar
Internet Draft Ajoy Singh
Vinod Kumar
Suresh Kalyanasundaram
Motorola
draft-singh-netlmm-protocol-02.txt
Expires: September 05, 2007 March 05, 2007
A Protocol for Network-based Localized Mobility Management
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
This document suggests a localized mobility solution controlled
by the network within a local mobility domain. The proposed
solution is based on Proxy Mobile IPv6 (PMIP) technique and
employs a PMIP client that generates a Proxy Binding Update
message. The solution allows for a clean separation between the
bearer and signaling paths, and reuse of MIPv6 home agent as the
local mobility anchor. The security association between the
Singh et. al Expires September 5, 2007 [Page 1]
Internet-Draft A Protocol for NETLMM March 5, 2007
network elements for executing the local mobility is also
discussed.
TABLE OF CONTENTS
1.0 INTRODUCTION...............................................3
2.0 TERMINOLOGY................................................3
3.0 BRIEF DESCRIPTION OF SOLUTION..............................5
4.0 PROTOCOL DETAILS...........................................7
4.1 INITIAL ATTACHMENT........................................7
4.2 INTRA-LMD MOBILITY........................................9
4.3 SECURITY ASSOCIATION BETWEEN PMIP CLIENT AND LMA..........11
4.4 INTER-LMA MOBILITY.......................................12
4.5 RELOCATION OF PMIP CLIENT.................................12
4.6 HANDLING OF MIPv6 CAPABLE MNs IN THE LMD..................12
4.7 PMIP CLIENT CONSIDERATIONS................................13
4.8 LMA CONSIDERATIONS........................................13
4.9 MAG - PMIP CLIENT INTERACTION.............................14
4.9.1 TRIGGER MESSAGE.........................................14
4.9.2 NOTIFICATION MESSAGE....................................15
4.9.3. MAG-PMIP client Transport..............................16
4.9.4. MAG-PMIP client Security...............................17
5.0 IANA CONSIDERATIONS........................................17
6.0 SECURITY CONSIDERATIONS....................................17
7.0 NORMATIVE REFERENCES.......................................18
8.0 INFORMATIVE REFERENCES.....................................18
9.0 AUTHORS' ADDRESSES.........................................19
APPENDIX A. pHoA ASSIGNMENT BY LMA UNDER STATEFUL ADDRESS CONFIGURATION
............................................................20
APPENDIX B. STATELESS ADDRESS AUTO-CONFIGURATION AND DUPLICATE ADDRESS
DETECTION......................................................20
APPENDIX C. AAA-BASED MECHANISM FOR ESTABLISHING PER-MN SA.....21
APPENDIX D. CONTEXT TRANSFER AND DATA FORWARDING between MAGs 22
APPENDIX E. FUTURE EXTENSIONS..................................23
E.1 PMIP CLIENT RELOCATION.....................................23
E.2 IPV4 DATA TUNNELING INSIDE IPV6
E.3 USAGE OF PER-MN PREFIXES
Singh et. al. Expires Septemeber 5, 2007 [Page 2]
Internet-Draft A Protocol for NETLMM March 5, 2007
IPR STATEMENTS................................................25
Disclaimer of Validity........................................25
COPYRIGHT NOTICE..............................................25
Acknowledgment.............................................. 26
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
documents are to be interpreted as described in RFC-2119 [1].
1.0 INTRODUCTION
In this draft, we describe a localized mobility management
solution that is network controlled and does not involve change in
IP address of the mobile node (MN) as it moves within a local
mobility domain (LMD). The IP address of the MN may be its Home IP
address (HoA) or a care-of-address (CoA) that has been obtained by
the MN for global mobility management. As long as the MN is within
one LMD, it is reachable on the same IP address, be it its HoA or
its CoA. We propose a localized mobility management solution that
employs a Mobile IPv6 home agent (HA), compliant with RFC 3775
[2], acting as the local mobility anchor (LMA). The proposed
mechanism allows a clean separation of the signaling function of
generating binding updates (BU) from the data plane function of
terminating the local mobility tunnel, while retaining RFC
compliance of MIPv6 HA. The entity generating BUs for a given
mobile node is fixed within the LMD and this allows for efficient
management of state information during mobility within the LMD.
2.0 TERMINOLOGY
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
in this document are to be interpreted as described in RFC 2119
[1].
The following terminology and abbreviations are used
Mobile Node (MN)
An IPv6 host that may or may not be capable of Mobile IPv6.
Singh et. al. Expires September 5, 2007 [Page 3]
Internet-Draft A Protocol for NETLMM March 5, 2007
Mobile Access Gateway (MAG)
A functional IPv6 entity that terminates a specific edge link
towards the MN. The MAG also terminates host routed data traffic
from the Local Mobility Anchor for MNs currently located within
the edge link under the MAG's control, and forwards traffic from
MNs on the edge link under its control to the Local Mobility
Anchor.
Global Mobility Anchor (GMA)
A standard Mobile IPv6 Home Agent (HA) as described in RFC 3775
[2], capable of RADIUS [8] and can fetch MN-AAA keys from the AAA
server [9].
Local Mobility Anchor (LMA)
A standard Mobile IPv6 Home Agent (HA) as described in RFC 3775
[2] responsible for receiving Proxy Binding Updates (PBU)
from the PMIP client within a local mobility domain (LMD).
Local Mobility Domain (LMD)
An administrative network that contains several MAGs within which
an MN can maintain its IP address.
Proxy Binding Update (PBU)
A standard Mobile IPv6 Binding Update (BU) message, as described
in RFC 3775 [2], sent by the PMIP client whenever the MNs move
across MAGs within a local mobility domain (LMD).
Proxy Binding Acknowledgment (PBAck)
A standard Mobile IPv6 Binding Acknowledgment (BAck), as described
in RFC 3775 [2], message sent by the local mobility agent (LMA) in
response to a PBU message.
PMIP Client
A functional entity responsible for sending Proxy
Binding Update (PBU) message to the local mobility anchor (LMA)
on behalf of the MN whenever the MN moves across MAGs within a
local mobility domain (LMD).
Singh et. al. Expires September 5, 2007 [Page 4]
Internet-Draft A Protocol for NETLMM March 5, 2007
Local AAA Server
A standard AAA server located within a local mobility domain (LMD),
responsible for generating security keys required by the PMIP
client and local mobility anchor (LMA) for performing IKE.
Local AAA Client
A standard AAA client function located at the local mobility
anchor (LMA) and PMIP client, used for fetching the keys from
the local AAA server.
Proxy Home Address (pHoA)
An IP address acquired by the MN when it enters the LMD. This IP
address does not change as long as the MN remains within the LMD.
Proxy Care-of-Address (pCoA)
Refers to the IP address of the MAG to which the MN is currently
attached. Traffic destined for the MN's pHoA is tunneled to pCoA
by the LMA.
3.0 BRIEF DESCRIPTION OF SOLUTION
The proposed solution is based on a proxy Mobile IP (PMIP)
Technique, wherein a PMIP client sends binding update messages to
a local mobility anchor (LMA) to establish a mapping between the
MN's IP address and the IP address of the current MAG through
which the MN is reachable. A given LMA has several MAGs under it,
and these MAGs may or may not be co-located with base stations or
access points that terminate the layer 2 protocol with the MN.
The MN may be Mobile IP capable and may send BU messages for
inter-LMD mobility, i.e., global mobility. For local mobility, the
MAGs within an LMD make the MN believe that it is still within the
same subnet, and thus prevent the MN from initiating Mobile IP
messages. The MAGs in an LMD advertise the same prefix to the MN
in their router advertisement messages as the MN moves across
different MAGs. The figure 1 describes a local mobility domain
with standalone PMIP client.
Singh et. al. Expires September 5, 2007 [Page 5]
Internet-Draft A Protocol for NETLMM March 5, 2007
+-------+
| GMA |
+-------+
/ \
/ \
/ \
/ \
/ \
/ \
+-------+ +-------+
| LMA1 | | LMA2 |
+-------+ +-------+
/ \ |
/ \ |
+-------+ / \ |
| PMIP | / \ |
| client| / \ |
+-------+ / \ |
+-----+ +-----+ +-----+
| MAG1| | MAG2| | MAG |
+-----+ +-----+ +-----+
+--+ +--+
|MN|------------->|MN|
+--+ +--+
Figure 1) Local Mobility Domain with a stand alone PMIP client
This draft proposes a solution where the LMA is a Mobile IPv6 Home
Agent[2]. This allows reuse of existing standard IETF components
and avoids additional work of standardizing a new mobility anchor.
When an MAG realizes that an MN has made an L2 handoff to a cell
that it serves, the MAG triggers the PMIP client to initiate and
send a PBU to the LMA, which will establish a mapping between the
MN's current IP address and the MAG's IP address.
In general, the PMIP client may or may not be co-located with the
MAG. However, to avoid the security keys associated with the MN
from being transferred from one MAG to the other as the MN hands
off from one cell to another, this draft requires the PMIP client
to be fixed for a given MN for the duration that the MN is within
Singh et. al. Expires September 5, 2007 [Page 6]
Internet-Draft A Protocol for NETLMM March 5, 2007
that LMD. The sections that follow explain in detail the
procedures used in localized mobility management.
4.0 PROTOCOL DETAILS
The protocol consists of two parts: Procedures used during
initial attachment of an MN to the LMD, and procedures used during
intra-LMD mobility.
4.1 INITIAL ATTACHMENT
When the MN first connects to a MAG in the LMD, it is assumed to
have acquired an IP address from the GMA called its Home Address
(HoA). The process of obtaining HoA from the GMA is beyond the
scope of this document. This HoA may be required for the MN for
global mobility management using MIPv6. Note that the MN need not
be MIPv6 capable for localized mobility management to operate
within the LMD. We consider the general case where the MN is
MIPv6-capable, and the GMA and the LMA are different.
Figure 2 shows the set of procedures involved when the MN first
connects to a MAG, say MAG1, in the LMD.
1. The MN performs L2 attachment with an access point under MAG1.
The MAG1 obtains the MN identifier [3] based on this L2 attachment
procedure. The exact means by which MAG1 obtains the MN identifier
is outside the scope of this document.
2. After receiving the prefix as part of the router advertisement
from MAG1, the MN attempts to acquire another IP address, called
the Proxy Home Address (pHoA) associated with the advertised
prefix. The MN issues a DHCP request and a DHCP server assigns a
pHoA consistent with the advertised prefix. The MAG can act as
DHCP relay and learn the IP address assigned to the MN by
observing the response from the DHCP server. Another address
assignment mechanism where the pHoA is assigned by the LMA can
also be used as outlined in Appendix A. Alternatively, the pHoA
may instead be acquired through stateless auto-configuration as
described in Appendix B.
3. The MAG1 sends a trigger message to the PMIP client to send a
PBU message to the LMA. The trigger message contains the MN
identifier and the pHoA acquired by the MN. When there are
Singh et. al. Expires September 5, 2007 [Page 7]
Internet-Draft A Protocol for NETLMM March 5, 2007
multiple PMIP clients in the LMD, the PMIP client for an MN can be
assigned statically (e.g. based on the MN identifier) or
dynamically chosen by MAG1 by means outside the scope of this
draft.
4. The PMIP client constructs a PBU message to bind the MN's
acquired pHoA with the MAG1's IP address (pCoA). The PBU message
also contains the MN identifier option as specified in [3]. This
assumes that the PMIP client has established the required security
association (SA) with the LMA after suitably acquiring the keys
required for such an association.
The PMIP client sends the PBU message directly to the LMA and sets
the Alternate CoA field to the MAG1's IP address (pCoA), and the
source address will be the PMIP client's address
After the reception of PBU, the LMA processes the message
according to RFC 3775. After successful validation, the LMA
creates a binding to tunnel all packets destined for MN's pHoA to
the MAG1's IP address (pCoA), and also generates an appropriate
PBAck message destined to the PMIP client.
6. The PMIP client sends the PBAck Verification Status message to
the MAG1 after verifying the status of the PBack message sent by
the LMA within a suitably encapsulated container message. The
information in the PBAck message enables the MAG1 to start de-
tunneling any tunneled packets received from the LMA and
forwarding them to the MN.
7. A MIPv6 capable MN can then send a MIPv6 binding update (BU) to
the GMA for global mobility, thus establishing a binding between
the MN's HoA and the pHoA acquired by the MN in the LMD. The
MIPv6-capable MN subsequently receives a binding
acknowledgment(BAck) from the GMA.
Singh et. al. Expires September 5, 2007 [Page 8]
Internet-Draft A Protocol for NETLMM March 5, 2007
MN MAG1 PMIP LMA GMA
client
| | | | |
| | | | |
1.MN performs | | | |
L2 attachment | | | |
| | | | |
|<-2.Router Adv-| | | |
| | | | |
| 2.pHoA | | | |
|<=============>| | | |
| acquisition | | | |
| | | | |
| |--3.Trigger-->| | |
| | (MN ID, pHoA)| | |
| | |----4.PBU---->| |
| | |(MN ID,pHoA,pCoA) |
| | | | |
| | |<---5.PBAck---| |
| | | | |
| |<---6.PBAck---| | |
| | verification | | |
| | status | | |
| | | | |
|-------------------------7.BU----------------------------->|
| | | | |
|<-----------------------7.BAck-----------------------------|
| | | | |
| | forward packets | |
|<==============|<============================|<============|
| | | | |
Figure 2) Procedure for MN's initial attachment to LMD
4.2 INTRA-LMD MOBILITY
Figure 3 shows the procedures involved when the MN moves across
MAGs within the LMD.
1. When the MN hands off from MAG1 to MAG2, the MAG2 also
advertises the same prefix to the MN as was sent by MAG1 in its
router advertisement to that MN. Due to this, the MN does not try
to acquire a new address or invoke global mobility procedures. The
MAG1 transfers the MN's context and potentially data packets to
MAG2. For example, context transfer can be performed using Context
Transfer Protocol (CXTP) [10]. The MN's context will contain the
MN identifier, the pHoA that was configured by the MN during its
initial attachment to the LMD, and the location of the PMIP client
Singh et. al. Expires September 5, 2007 [Page 9]
Internet-Draft A Protocol for NETLMM March 5, 2007
for the MN. The location of the PMIP client need not be
transferred if there is only one PMIP client in the LMD or if the
PMIP client can be determined based on the MN identifier.
2. The MAG2 triggers the PMIP client to send a PBU. The trigger to
the PMIP client, as before, contains the MN identifier and the
pHoA. The PMIP client will check whether the same MN identifier -
pHoA combination exists in its cache. In the intra-LMD mobility
case, the cache entry will be found. If the cache entry is found,
the PMIP client will use this trigger to send a new PBU.
3. The PMIP client constructs and sends a PBU message to the LMA
for binding the pHoA to the MAG2's IP address (new pCoA). The MN
identifier need not be sent as part of this PBU message.
4. The LMA now binds the MN's pHoA to MAG2's IP address (new pCoA)
and responds with a PBAck message. Henceforth, the packets
destined to MN's pHoA will be tunneled to the MAG2's address.
5. The PBAck verification status is sent to MAG2 as a response to
the trigger message.
The PMIP client can be a separate entity as shown in Figure 1
having a centralized control of the security keys involved in
sending the PBU messages. Alternatively, the PMIP client can be
co-located at one of the MAGs. This MAG, for example can be the
one where the MN first acquired its IP address in the LMD. Even in
this case the security keys involved in the Mobile IP signaling
shall be anchored at a single MAG. During handoffs, only the
tunnel end-point (i.e. the data plane) will be migrated to the new
MAG, whereas the PBU message (i.e. the control-plane signaling)
will still be generated at the anchored MAG. In addition, the
security keys associated with the signaling shall not be
transferred across MAGs during the handoff. Because the PBUs for a
given MN always originate from the same PMIP client as long as the
MN is within the LMD, the sequence numbers in the PBU messages as
defined in RFC3775 [2] are sufficient to ensure ordering of
messages. Thus there is no need to add extensions to the MIPv6 BU
or BAck messages, such as timestamp extensions, to resolve any
potential race conditions that might arise if multiple entities
send BUs for a given MN.
Singh et. al. Expires September 5, 2007 [Page 10]
Internet-Draft A Protocol for NETLMM March 5, 2007
MN MAG1 MAG2 PMIP LMA
client
| | | | |
|----------1.L2 Handoff------->| | |
| | | | |
| | 1.MN context | | |
| |<====&data===>| | |
| | transfer | | |
| | |---2.Trigger-->| |
| | | (MN ID, pHoA) | |
| | | | |
| | | |---3.PBU--->|
| | | |(pHoA, pCoA)|
| | | | |
| | | |<--4.PBAck--|
| | | | |
| | |<---5.PBAck----| |
| | | verification | |
| | | status | |
| | | | |
| | forward packets | |
|<=============================|<===========================|
| | | | |
Figure 3) Intra-LMD handoff procedure
4.3 SECURITY ASSOCIATION BETWEEN PMIP CLIENT AND LMA
Security is provided for the PBU messages by having the LMA
maintain a separate SA for each MN. The method by which the PMIP
client obtains the security credentials of the MN is outside the
scope of this document. However, one mechanism that depends on AAA
infrastructure is shown in Appendix C. It is possible that the LMA
can be accessed through different PMIP clients, for example, if
the PMIP client is co-located at the MAG. For these cases, the
mechanism described in Appendix C is well suited as it is scalable
with the number of PMIP clients in the LMD. The fact that the PMIP
client obtained the security keys corresponding to the MN
automatically implies that the PMIP client is authorized to send
PBUs on behalf of the MN.
Alternatively, instead of using per-MN SAs, security associations
between every PMIP client and the LMA can be established. While
using per-MN SA is fully compliant with RFC 3775 and hence allows
complete reuse of MIPv6 HA as the LMA, using per-PMIP client SA
may reduce the number of SAs required but will require
modifications to the MIPv6 HA before it can be used as the LMA.
Singh et. al. Expires September 5, 2007 [Page 11]
Internet-Draft A Protocol for NETLMM March 5, 2007
4.4 INTER-LMA MOBILITY
We assume a general situation where a given MAG may be able to
have tunnels with multiple LMAs, so that LMD can be overlapping.
When it is desired to change the anchor point of the mobile to a
new LMA (either when a mobile hands over to a different MAG, or
even when the mobile remains under the same MAG), the presence of
the new LMA is made known to the MN by advertising a different
prefix to the MN. Such a change of LMAs can be carried out for
routing efficiency reason. The PMIP client used to establish a
proxy binding to the new LMA may be the same as with the old LMA,
or a new PMIP client may be invoked. In either case, a new MN-
specific SA may need to be established between the appropriate
PMIP client and the new LMA for securing PBU messages when per-MN
SA is used. The MN also needs to acquire a new pHoA consistent
with the new link prefix advertised by the MAG. As an alternative,
the same AAA based mechanism as described in Appendix B can be
used.
4.5 RELOCATION OF PMIP CLIENT
The mobility management solution proposed in this document allows
multiple PMIP clients to be present in the LMD. But the PMIP
client for a given MN is fixed within the LMD for the lifetime of
the MN. This ensures that the security keys for that MN is
anchored at a single node and not transferred between PMIP clients
when per-MN SA is used to secure PBU messages. The data plane,
however, is migrated to a different MAG when the MN moves across
MAGs. In addition, data forwarding is supported from source MAG to
target MAG during handoff and hence no packet losses are expected
due to the signaling exchange between the current MAG and the PMIP
client. The MN continues to receive the packets forwarded from the
source to target MAG while the LMA is being updated. In case
relocation of PMIP client is required for other reasons, a
mechanism as described in Appendix E.1 may be used.
4.6 HANDLING OF MIPv6 CAPABLE MNs IN THE LMD
In the solution proposed above, all the MAGs in the LMD advertise
the same link prefix to a given MN. All MNs, irrespective of
whether or not they are MIPv6 capable, are managed by PMIP-based
localized mobility management solution as long as they remain
Singh et. al. Expires September 5, 2007 [Page 12]
Internet-Draft A Protocol for NETLMM March 5, 2007
within the LMD. The MIPv6 capability of an MN is used only when it
moves across LMDs, in order to update the binding with the GMA.
4.7 PMIP CLIENT CONSIDERATIONS
The PMIP client functional entity is responsible for sending PBU
messages to the LMA for binding the pHoA of the MN with the IP
address of the MAG (pCoA) to which the MN is currently connected.
The PMIP client sends the PBU message after receiving the trigger
from the MAG. The trigger can be for an MN that is performing
initial attachment or for an MN that has moved to a different MAG
within the LMD. The trigger provides the MN identifier (and the pHoA
of the MN, if acquired by DHCP).
The PMIP client first checks if it has already sent a PBU for the MN
with the received MN identifier. This can be done, for example, by
maintaining a binding cache that contains the MN identifier, pHoA,
and the MAG's IP address (pCoA) for those MNs for whom PBUs have
been sent and by checking if the MN identifier received as part of
the trigger already exists in the cache.
If no entry exists in the cache for the received MN identifier, the
PMIP client considers this MN as performing initial attachment to
the LMD. It then forms a PBU message and sends it to the LMA. In
case an entry exists in its cache for the received MN identifier,
the PMIP client further checks if the pHoA in the received trigger
matches with the pHoA against this MN identifier in the cache. If it
does not, this is considered as an error and an error status is
reported to the MAG. In case the right combination of MN identifier
and pHoA exists, the MN is considered to have moved to a different
MAG within the LMD. Consequently, an appropriate PBU message is sent
to the LMA.
After receiving the PBAck message from the LMA, the PMIP client
needs to process it and respond to the MAG with appropriate status
information.
4.8 LMA CONSIDERATIONS
The mobility management solution described in this document allows
reusing MIPv6 HA as the LMA without any additional modifications.
Some of the mechanisms described in the appendices may require
modifications to the MIPv6 HA behaviour, as indicated in the
relevant appendices.
Singh et. al. Expires September 5, 2007 [Page 13]
Internet-Draft A Protocol for NETLMM March 5, 2007
4.9 MAG - PMIP CLIENT INTERACTION
This document describes clean separation between PMIP client that
generates the PBU signaling and the MAG that acts as the tunnel
end-point. It also suggests that PMIP client for a given MN must
be anchored at a single entity while the MN moves from one MAG to
other. A light-weight protocol is defined between PMIP client and
MAG to enable interaction between them. The protocol between PMIP
client and MAG defines two messages, namely Trigger and
Notification. Trigger Message is used by MAG to inform PMIP client
that an MN has associated with it, either during initial network
entry or after inter-MAG handoff. Notification Message is used by
PMIP client to inform MAG that the Binding Update procedure with
LMA has been completed. As part of Notification message, PMIP
client encapsulates the Binding Ack / Error message received from
the LMA and delivers it to MAG. After receiving the Binding Ack
through the Notification Message, the MAG creates the appropriate
tunnel state required for tunneling and de-tunneling of bearer
packets between MAG and LMA. A Transaction Number is used to
correlate Trigger and Notification messages.
The format of Trigger and Notification messages are defined the
in following sections
4.9.1 TRIGGER MESSAGE
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |Ver| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Transaction Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - - -
Fields:
Type : 0x1
Length of message in units of octets
Version: 3 bit versions. For this specification ver. is set to 1.
Singh et. al. Expires September 5, 2007 [Page 14]
Internet-Draft A Protocol for NETLMM March 5, 2007
Reserved: Initialized to zero and ignored on receipt
Transaction number: Allows the notification message to be matched
with the trigger message
4.9.2 NOTIFICATION MESSAGE
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length |Ver| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Transaction Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Options
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - - -
Fields:
Type : 0x2
Length of message in units of octets
Version: 3 bit versions. For this specification ver. is set to 1.
Reserved: Initialized to zero and ignored on receipt
Transaction number: Allows the notification message to be matched
with the trigger message
4.9.3. Options Format
All options are of the following form:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Option Type| Option Len | Option Data . . .
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type: 8-bit identifier of the type of option. The options
defined in this document are L2-ID option, IP address option and
container option. L2-ID option is used to encode MN Identifier, IP
Singh et. al. Expires September 5, 2007 [Page 15]
Internet-Draft A Protocol for NETLMM March 5, 2007
address option is used to encode MN home address, and container
sub-option is used to encapsulate PBAck messages from PMIP client
to MAG.
4.9.3. MAG-PMIP client Transport
This document suggests that implementation of PMIP client MAG
protocol SHOULD use the Stream Control Transport Protocol (SCTP) [5]
as the transport protocol. SCTP supports congestion control,
fragmentation, and partial retransmission based on a programmable
retransmission timer. The SCTP Payload Data Chunk carries the
Trigger and Notification messages. User Data part of each SCTP
message contains the Trigger and Notification messages as described
above. A single stream is used for PMIP-MAG protocol with in-
sequence delivery of SCTP messages. Each message, unless
fragmented, corresponds to a single Trigger or Notification message.
A single stream provides simplicity. The Payload Protocol Identifier
in the SCTP header is 'PMIP-MAG'. PMIP-MAG interface uses a PMIP-
MAG SCTP port to be identified by IANA. The format of Payload Data
Chunk taken from SCTP RFC is shown in the following diagram.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type = 0 | Reserved|U|B|E| Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| TSN |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Stream Identifier S | Stream Sequence Number n |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Payload Protocol Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
\ \
/ User Data (seq n of Stream S) /
\ \
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
'U' bit The Unordered bit. MUST be set to 0 (zero).
'B' bit The Beginning fragment bit. See [5].
'E' bit The Ending fragment bit. See [5].
TSN Transmission Sequence Number. See [5].
Singh et. al. Expires September 5, 2007 [Page 16]
Internet-Draft A Protocol for NETLMM March 5, 2007
Stream Identifier S
Identifies the SCTP stream.
Stream Sequence Number n
Sequence number. See [5].
Payload Protocol Identifier
Set to 'PMIP-MAG'.
User Data Contains the PMIP message.
4.9.4. MAG-PMIP client Security
To prevent the information from being compromised, the Trigger
and Notification messages between PMIP client and MAG MUST be
authenticated. The messages MAY also be encrypted for privacy of
the information, if required. The PMIP client and the MAG engaging
in the PMIP-MAG protocol MUST use IKE [7] to negotiate an IPsec ESP
[6] security association for message authentication. If
confidentiality is desired, the PMIP client and the MAG MUST
additionally negotiate an ESP security association for encryption.
Replay protection SHOULD also be enabled with IKE. To protect PMIP
client-MAG protocol messages between PMIP client and MAG, IPsec ESP
MUST be used with a non-null integrity protection and origin
authentication algorithm and SHOULD be used with a non-null
encryption algorithm for protecting the confidentiality of the
Trigger and Notify message.
5.0 IANA CONSIDERATIONS
This document defines a transport protocol that runs over SCTP
between PMIP client and MAG. So, the PMIP client and MAG would
need a well known SCTP port to communicate with each other. The
port number for the SCTP port for PMIP client-MAG protocol use
should be defined by IANA.
6.0 SECURITY CONSIDERATIONS
To avoid security vulnerabilities, the security keys and the
IPSec SA are anchored at a single node, i.e., PMIP client, for
handoffs. Even when the PMIP client is at a MAG, there is an
Singh et. al. Expires September 5, 2007 [Page 17]
Internet-Draft A Protocol for NETLMM March 5, 2007
anchored MAG that holds the MN's security keys, which may be
different for different MNs. There is a separate IPSec SA for each
MN, even though several MNs may use the same LMA and PMIP
client. Alternatively, a single IPSec SA between a PMIP client and
an LMA may be used to protect the signaling for all the MNs being
handled by the PMIP client. IPSEC ESP is used to protect PMIP
client to MAG protocol as defined in section 4.9.4.
7.0 NORMATIVE REFERENCES
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997
[2] D. Johnson et al., "Mobility Support in IPv6", RFC 3775, June
2004
[3] A. Patel et al., "Mobile Node Identifier Option for Mobile IPv6
(MIPv6) ", RFC 4283, November 2005
[4] J. Arkko et al., "Using IPSec to Protect Mobile IPv6 Signaling
between Mobile Nodes and Home Agents", RFC 3776, June 2004
[5]Stewart, R. et al. "Stream Control Transmission Protocol",
RFC 2960, October 2000.
[6] Kent, S. and R. Atkinson, "IP Encapsulating Security
Payload (ESP)", RFC 2406, November 1998.
[7] D. Harkins et al., "The Internet Key Exchange (IKE)", RFC 2409,
November 1998
8.0 INFORMATIVE REFERENCES
[8] C. Rigney et al., "Remote Authentication Dial In User Service
(RADIUS)", RFC 2865, June 2000
[9] C. de Laat et al., "Generic AAA Architecture", RFC 2903, August
2000
[10] J. Loughney et al., "Context Transfer Protocol", RFC 4067, July
2005
Singh et. al. Expires Sepetember 5, 2007 [Page 18]
Internet-Draft A Protocol for NETLMM March 5, 2007
[11] S. Thomson et al., "IPv6 Stateless Address Autoconfiguration",
RFC 2462, December 1998
[12] P. Calhoun et al., "Diameter Base Protocol", RFC 3588,September
9.0 AUTHORS' ADDRESSES
Anand Bedekar
Motorola Inc
1501 West Shure Dr,
Arlington Heights 60004
USA
Phone: +1 847-632-3046
Email: anand.bedekar@motorola.com
Ajoy Singh
Motorola Inc
1501 West Shure Dr,
Arlington Heights 60004
USA
Phone: +1 847-632-6941
Email: asingh1@email.mot.com
Vinod Kumar
Motorola India Electronics Limited
66/1, Plot No. 5,
Bagmane Tech Park
CV Raman Nagar Post
Bangalore 560093
India
Phone: +91-80-26012308
Email: vinodkumar@motorola.com
Suresh Kalyanasundaram
Motorola India Electronics Limited
66/1, Plot No. 5,
Bagmane Tech Park
CV Raman Nagar Post
Bangalore 560093
India
Phone: +91-80-26012308
Singh et. al. Expires Sepetember 5, 2007 [Page 19]
Internet-Draft A Protocol for NETLMM March 5, 2007
Email: Suresh.Kalyanasundaram@motorola.com
APPENDIX A. pHoA ASSIGNMENT BY LMA UNDER STATEFUL ADDRESS CONFIGURATION
Under stateful pHoA address configuration, the MN issues a
DHCP request. The MAG to which the MN is currently attached acts
as a proxy DHCP server. That is, it receives the DHCP request and
will send a DHCP reply to the MN, but it will obtain the address
to assign to the MN in the following manner. The MAG sends a
Trigger message to the PMIP client to send a PBU on behalf of the
MN. This Trigger message contains the MN identifier that may be
obtained when the MN makes L2 attachment. The PBU sent to the LMA
contains the MN identifier but pHoA field remains ALL-ZEROS. The
LMA, as part of the PBAck message, assigns a pHoA for the MN. This
address is communicated by the PMIP client to the MAG in the
Notification message. The MAG, sends this address as part of the
DHCP reply to the MN. This method of LMA assigning IP addresses
for the MN requires that the MIPv6 HA support dynamic home address
assignment, a capability not present in [2].
APPENDIX B. STATELESS ADDRESS AUTO-CONFIGURATION AND DUPLICATE ADDRESS
DETECTION
Instead of the DHCP-based procedure, the pHoA can be acquired
by an MN during initial attachment using stateless address auto-
configuration. In stateless configuration, the MN configures its
own pHoA based on the prefix advertised by the MAG and sends a
Neighbor Solicitation (NS) message as specified in [11]. The MAG
to which the MN is currently attached triggers the PMIP client to
send a PBU. The trigger contains a flag indicating to the PMIP
client whether the address is acquired through stateful or
stateless configuration and hence determines the need for DAD. The
PMIP client verifies if the pHoA configured by the MN is unique by
checking its cache and determining if any MN with a different MN
identifier has already acquired the same address. If no
conflicting address is found, and if there are multiple PMIP
clients in the LMD, the PMIP client sends a "conflict detection
request" to other PMIP clients in the LMD to check for uniqueness.
This request can also be sent immediately after receiving the
trigger from the MAG. The request contains the MN identifier and
the pHoA configured by the MN.
Singh et. al. Expires September 5, 2007 [Page 20]
Internet-Draft A Protocol for NETLMM March 5, 2007
The other PMIP clients in the LMD check for uniqueness in a
similar fashion as above and respond with "conflict detected" or
"no conflict" message to the original PMIP client. In case the
address is not unique, the PMIP client informs the MAG with PBAck
verification status message that has "address conflict detected"
as the reason. Otherwise, the PMIP client sends PBU for the MN.
Thus address conflicts are detected by the PMIP client (if there
is only one in the LMD), or by inter-PMIP client interaction (if
there are multiple PMIP clients in the LMD).
Note that when the LMA receives the PBU, it will perform DAD as
described in RFC 3775 to ensure that no other MN for whom the LMA
is acting as MIPv6 HA is using the same address. If the prefixes
advertised to the MNs are such that a particular prefix is
routable only to a single LMA, then the PMIP client can depend on
the DAD performed by the LMA itself, and no further action by the
PMIP client is required. The execution of DAD by the PMIP client
(or by interaction of multiple PMIP clients) is required only if
any particular prefix may be routable to more than one LMA.
If the MAGs in the LMD advertise the LMA's prefix, the addresses
acquired using stateless auto-configuration will be suitable for
point-to-point links between the MN and MAG. Another alternative
is for the MAG to send a separate prefix for each MN and the MN
can acquire pHoA consistent with this per-MN prefix. A prefix of
length 128 bits eliminates the need for DAD and does not invoke
any shared-link procedures while a shorter prefix will lead to
wastage of address space.
APPENDIX C. AAA-BASED MECHANISM FOR ESTABLISHING PER-MN SA
The following mechanism can be used to dynamically establish per-MN
SA between the PMIP client and the LMA. For carrying out this
mechanism the LMA and the PMIP client shall have local AAA client
function. This scheme can be used when the PMIP client is either a
stand-alone entity or co-located with the MAG. This scheme uses a
separate key for a separate IPSec SA for each MN as in [4], even
when they use the same PMIP client and LMA. Note that we assume that
the PMIP client for a given MN remains fixed after the binding is
established for that MN at the LMA.
The AAA client colocated with the PMIP client can fetch the key
required for establishing the SA with the LMA from the local AAA
Singh et. al. Expires September 5, 2007 [Page 21]
Internet-Draft A Protocol for NETLMM March 5, 2007
server. The key fetch transaction may be triggered by other events
related to the MN's attempt to access the MAG, for example the
authentication of the MN for access to the domain. In cases where
the local AAA server is either the home AAA server of the MN or a
AAA proxy server in the MN's authentication, further synchronization
of the key fetching with the MN's authentication process may be
possible.
After getting the key from the local AAA server, the PMIP client
should initiate Internet Key Exchange (IKE) [7] with the LMA. The
LMA in turn, using its associated AAA client, queries the local AAA
server and fetches the key required for the IKE processing. The
local AAA server should remember the key that has been sent to the
PMIP client until the LMA asks for it. Following IKE, the PMIP
client can send the PBU message. The IPSec endpoint corresponding to
the MN's pHoA for the SA is at the PMIP client instead of the MN.
For the interaction between the local AAA server, PMIP client, and
LMA, standard AAA protocols, such as, RADIUS [8] or DIAMETER [12]
can be used.
When the MN-specific SA is used, the key for this SA is provided to
the PMIP client by the AAA server only after verifying that the PMIP
client is authorized to send PBUs for that MN (e.g., at the time the
MN is authenticated in to the domain for link-layer access). The
fact that the AAA server provides the MN-specific key for that PMIP
client to the LMA during IKE procedure also serves as validation
that the PMIP client is authorized to send BUs for that MN. In this
model of PMIP client anchored for a given MN, the LMA will have to
contact the AAA server once per MN.
In the alternative model where there is a single SA between a PMIP
client and an LMA to protect the BUs for all MNs, this AAA procedure
can be used to bootstrap the IPSec security association between the
PMIP client and the LMA. This mainly helps in simplifying network
configuration, by avoiding the need to pre-distribute shared keys
for every pair of PMIP client and LMA. In this model, if there are
multiple PMIP clients in the domain (e.g. if each MAG is collocated
with a PMIP client), the HA may additionally need to contact the AAA
server once per MN in order to obtain a list of PMIP clients that
are authorized to send BUs for that MN.
APPENDIX D. CONTEXT TRANSFER AND DATA FORWARDING between MAGs
Singh et. al. Expires September 5, 2007 [Page 22]
Internet-Draft A Protocol for NETLMM March 5, 2007
As noted in section 4.2, when an MN hands over from MAG1 to MAG2,
MAG2 will send a trigger message to the PMIP client for that MN to
send a PBU to the LMA. MAG2 minimally needs the MN identifier in
order to send the trigger message to the PMIP client. This may be
obtained by MAG2 directly from the MN through L2 attachment
procedures. However, in terms of handover latency, it would be
beneficial if MAG2 could obtain the MN Identifier prior to the
completion of the L2 attach procedure. Additionally, if there are
multiple PMIP clients in the domain (e.g. if each MAG is
collocated with a PMIP client), then MAG2 needs to know the
address of the PMIP client for that MN in order to send the PMIP
Furthermore, it would be useful for the MAG2 to provide the pHoA
of the MN in the trigger message to aid the PMIP client in
performing some error checks. Since all these information elements
are available at MAG1, MAG1 should forward such context
information for the MN to MAG2. The Context Transfer Protocol
(CXTP) [10] can be used to accomplish this, using suitably defined
feature profile types for CXTP.
In addition to context transfer, it is also useful to have data
forwarding from MAG1 to MAG2 during the MN's handover. In the
absence of such data forwarding, the MN would not receive any data
through MAG2 until the PBU message was processed at the LMA,
resulting in increased handover latency. In order to eliminate
this latency, MAG1 should forward data for the MN to MAG2 during
the handover. This data forwarding should include data buffered at
MAG1 at the time of initiation of the handover, plus any
subsequent data that arrived at the MAG1. Thus data flow for the
MN can be resumed immediately on completion of the L2 attachment
procedures, without waiting for completion of the PBU signaling to
the LMA.
APPENDIX E. FUTURE EXTENSIONS
E.1 PMIP CLIENT RELOCATION
If there are multiple PMIP clients in the domain, and if PMIP
client relocation for a given MN is required, the MAG can choose a
new PMIP client to serve the MN. The PMIP client has to establish
a new MN-specific SA with the LMA if per-MN SA is employed. The
new PMIP client can use the AAA-based solution as specified in
Appendix C for establishing this SA. This will again require
modifications to the behavior of a MIPv6 HA in order to function
Singh et. al. Expires September 5, 2007 [Page 23]
Internet-Draft A Protocol for NETLMM March 5, 2007
as an LMA, since the LMA will now receive PBUs for the same MN
through different SAs.
E.2 IPV4 DATA TUNNELING INSIDE IPV6
While the situation considered in the draft assumes only IPv6
capability at all the elements, it may be of interest to support
IPv4-capable mobiles with IPv6-enabled network elements. For
example, it may be of interest to support access to the IPv4
Internet for an IPv4-capable mobile, even when all the network
elements in the LMD are IPv6-capable. One possible solution for
this scenario is to use a dual-stack LMA that acts as a gateway to
the IPv4 Internet while providing network localized mobility using
IPv6 inside the LMD. For example, the PBU sent by the PMIP client
to the LMA can include extensions to carry the IPv4 address of the
MN for which IPv4 access is desired. The LMA would then tunnel all
IPv4 packets destined to this IPv4 address to the pCoA of the PBU
(i.e. the address of the MAG). The MAG would de-tunnel the IPv6
packets received from the LMA to recover the IPv4 packet, and
forward the IPv4 packet to the MN.
Note that in order to provide this functionality, extensions need
to be defined to Mobile IPv6 messages and modifications to the
behavior of a MIPv6 HA are required in order to provide such
capabilities.
E.3 USAGE OF PER-MN PREFIXES
In some situations it may be of interest to allocate each MN a
unique prefix, instead of advertising a single prefix (e.g. the
LMA's prefix) to multiple MNs. This would be useful, for example,
when the MN itself is a router for a moving subnet, or when the MN
may have multiple interfaces on the same link, etc. Another reason
to use per-MN prefixes is to avoid the need for DAD and NS in
situations where the physical link is shared by multiple MNs
(rather than a point-to-point link between the MN and the MAG).
This can create the illusion of non-overlapping links for
individual MNs even when the physical link is shared between
multiple MNs. The allocation of per-MN prefixes can be
accommodated by the model of this draft.
One way to handle tunneling for multiple addresses configured by
the MN from the per-MN prefix is to include the entire prefix
Singh et. al. Expires September 5, 2007 [Page 24]
Internet-Draft A Protocol for NETLMM March 5, 2007
(rather than just a single pHoA) in the PBU sent by the PMIP
client to the LMA. The LMA would then install a route for the
entire prefix, rather than a route for a single pHoA. This can be
accommodated in the model proposed in this draft by a suitable
extension to the Mobile IPv6 messages to carry prefixes, and a
suitable modification to the MIPv6 HA behavior for use as the LMA.
IPR STATEMENTS
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
COPYRIGHT NOTICE
Singh et. al. Expires September 5, 2007 [Page 25]
Internet-Draft A Protocol for NETLMM March 5, 2007
"Copyright (C) The IETF Trust (2007). All Rights Reserved.
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
Acknowledgment
We would like to thank Vijay Raman for editing first version of this
draft. We would also like to thank Sebastian Thalanany, Pierrick SEITE,
Christian Vogt, Pete McCann, Petrescu Alexandru, Julien Laganier, Behcet
Sarikaya, Phil Roberts, Vidya Narayanan, Marco Liebsch and other members of
NETLMM WG for reviewing and providing feedback on the draft.
Singh et. al. Expires September 5, 2007 [Page 26]
| PAFTECH AB 2003-2026 | 2026-04-23 10:59:22 |