One document matched: draft-zhao-mipshop-fmip-pfmip-00.txt




MIPSHOP Group                                                    F. Zhao
Internet-Draft                                                  A. Damle
Expires: April 27, 2009                                          Marvell
                                                        October 24, 2008


                  Interworking between FMIP and PFMIP
                    draft-zhao-mipshop-fmip-pfmip-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 27, 2009.


















Zhao & Damle             Expires April 27, 2009                 [Page 1]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


Abstract

   This document discusses and proposes extensions to enable
   interworking between the FMIP and the PFMIP.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  3
   3.  Handover Scenarios . . . . . . . . . . . . . . . . . . . . . .  4
   4.  Proposals  . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     4.1.  The First Scenario . . . . . . . . . . . . . . . . . . . .  6
       4.1.1.  The Predictive Mode  . . . . . . . . . . . . . . . . .  6
       4.1.2.  The Reactive Mode  . . . . . . . . . . . . . . . . . .  7
     4.2.  The Second Scenario  . . . . . . . . . . . . . . . . . . .  7
       4.2.1.  The Predictive Mode  . . . . . . . . . . . . . . . . .  7
       4.2.2.  The Reactive Mode  . . . . . . . . . . . . . . . . . .  8
   5.  Extensions . . . . . . . . . . . . . . . . . . . . . . . . . .  9
   6.  Security Consideration . . . . . . . . . . . . . . . . . . . . 11
   7.  IANA Consideration . . . . . . . . . . . . . . . . . . . . . . 11
   8.  Conclusions  . . . . . . . . . . . . . . . . . . . . . . . . . 11
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     9.1.  Normative References . . . . . . . . . . . . . . . . . . . 11
     9.2.  Informative References . . . . . . . . . . . . . . . . . . 12
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12
   Intellectual Property and Copyright Statements . . . . . . . . . . 14
























Zhao & Damle             Expires April 27, 2009                 [Page 2]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


1.  Introduction

   As specified in RFC 5268, the FMIP protocol [1] aims to reduce
   handover latency when the MIP is used as the mobility management
   protocol.  Recently, the PFMIP protocol [2] has been proposed to
   reduce handover latency when the PMIP is used.  It is expected that
   both PMIP and MIP will be deployed in networks; however, how to
   reduce handover latency when the MN uses different mobility protocols
   during handover has not addressed.  In this document, we discuss and
   propose some extensions to address this issue.


2.  Terminology

   The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [3].

   Throughout this document, we adopt mobility related terminology used
   in RFC 3775 [4], RFC 5231 [5], RFC 5268 [1], and [2].































Zhao & Damle             Expires April 27, 2009                 [Page 3]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


3.  Handover Scenarios

   A MN may support both the MIP and the PMIP.  There are the following
   two different handover scenarios.

                   +------+                        +------+
                   |  HA  |  HoA/HNP               |  HA  |  HoA/HNP
                   +------+                        +------+
                      /\                              /\
                    /    \           ==>            /    \
                  /        \                      /        \
                /            \                  /            \
             +----+       +-----+            +----+       +-----+
             | AR |       | MAG |            | AR |       | MAG |
             +----+       +-----+            +----+       +-----+
              ~                                              ~
              ~  +----+                          +----+     ~
              ~ =| MN |=                        =| MN |= ~ ~
          CoA    +----+                          +----+


                   Figure 1: The first handover scenario

   As shown in Figure 1, before handover, a MN connects to the access
   network 1 where it gains IP connectivity by using MIP.  When the MN
   detects the access network 2 and decides to perform handover, the MN
   may choose to use the PMIP on the access network 2, for example, due
   to its configuration, preference or policy.  In order to reduce
   handover latency, the MN starts the FMIP procedure on the access
   network 1 and provides the indication of using the PMIP on the access
   network 2, the access router in the access network 1 starts the PFMIP
   procedure with the MAG2 located in the access network 2.  Note that
   it is possible that the access router in the access network 1 has the
   MAG functionality.

















Zhao & Damle             Expires April 27, 2009                 [Page 4]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


                   +------+                        +------+
                   |  HA  |  HoA/HNP               |  HA  |  HoA/HNP
                   +------+                        +------+
                      /\                              /\
                    /    \           ==>            /    \
                  /        \                      /        \
                /            \                  /            \
           +-----+        +----+          +-----+          +----+
           | MAG |        | AR |          | MAG |          | AR |
           +-----+        +----+          +-----+          +----+
              ~                                              ~
              ~  +----+                          +----+     ~
              ~ =| MN |=                        =| MN |= ~ ~
                 +----+                          +----+   CoA

                  Figure 2: The second handover scenario

   As shown in Figure 2, before handover, a MN connects to the access
   network 1 where it gains IP connectivity by using PMIP.  When the MN
   detects the access network 2 and decides to perform handover, the MN
   may choose to use the MIP on the access network 2, for example, due
   to its configuration, preference or policy.  In order to reduce
   handover latency, with some indication, the MAG on the access network
   1 starts the FMIP procedure.

   Note that a general discussion on the interaction between MIP and
   PMIP is provided in [13].
























Zhao & Damle             Expires April 27, 2009                 [Page 5]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


4.  Proposals

4.1.  The First Scenario

4.1.1.  The Predictive Mode


          MN                    AR(PAR)                MAG(NAR)
           |                     |                      |
      1)   |------RtSolPr------->|                      |
      2)   |<-----PrRtAdv--------|                      |
      3)   |------FBU----------->|                      |
      4)   |                     |----------HI--------->|
      5)   |                     |<--------HAck---------|
      6)   |          <--FBack---|---FBack-->           |
      7)   |                  ......                    |

      Figure 3: The predictive fast handover procedure for the first
                                 scenario

   The Figure 3 shows the predictive fast handover procedure for the
   first scenario.

      1) When the MN detects available new access network by using some
      link layer specific mechanisms, it may request more information by
      sending a RtSolPr message.  Note that this message may be skipped
      if the MN knows about this new access network based on the AP-ID.

      2) The MN may receive the PrRtAdv message either as a response or
      as an unsolicited message sent by the AR.  The MN chooses to
      perform handover and maintain session continuity by using the PMIP
      on the new access network.  How the MN selects the mobility
      protocol is not specified in this document.  For example, the MN
      may be pre-configured with the information regarding the AP-ID,
      including if the PMIP should be used on such access network, or
      the PrRtAdv message provides such indication to the MN.

      3) The MN sends a FBU message to the AR (i.e. the PAR) to register
      a binding between its home address and the current PCoA (the home
      address from the perspective of the AR).  In addition, the MN
      indicates that the AR should perform the PFMIP with the MAG (i.e.
      NAR) in the access network 2.  The information provided by the MN
      in this message includes the MN_ID, MN-HoA, MN IID, the HA address
      etc.  Therefore, data packets sent to the MN through the HA, i.e.
      HA->CoA || CN->HoA, will be encapsulated by the AR firstly, i.e.,
      AR->HoA || HA->CoA|| CN->HoA, and then forwarded through the
      tunnel between the AR and the MAG.




Zhao & Damle             Expires April 27, 2009                 [Page 6]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


      4) The AR sends a HI message to the MAG based on the PFMIP
      protocol.

      5) The MAG replies with a HAck message based on the PFMIP
      protocol.

      6) The AR may send a FBack message once it receives the HAck
      message.

      7) The rest of the procedure is the same as described in the PFMIP
      protocol.  Note that when the AR sends the HI message to indicate
      that the packet forwarding is completed, the AR also deletes the
      binding between the CoA (i.e. the PCoA) and the HoA.  The MN may
      send the FBU through the access network 2 to trigger such actions
      at the AR, for example after a configurable length of time.

4.1.2.  The Reactive Mode

   The procedure in the reactive mode for the first handover scenario is
   similar to that described in the PFMIP protocol.

4.2.  The Second Scenario

4.2.1.  The Predictive Mode


          MN                  MAG(PAR)                AR(NAR)
           |                     |                      |
      1)   |-Report/HO Initiate->|                      |
      2)   |                     |----------HI--------->|
      3)   |                     |<--------HAck---------|
      4)   |       <-HO Response-|-HO Response->        |
      5)   |                  ......                    |

      Figure 4: The predictive fast handover procedure for the second
                                 scenario

   The Figure 4 shows the predictive fast handover procedure for the
   second scenario.

      1) When the MN detects available new access network by using some
      link layer specific mechanisms, it may decide to perform handover.
      Besides what is described in the PFMIP protocol, the MN may
      provide the indication of using the MIP on the target access
      network.  How the MN make such decision is not specified in this
      document.  Furthermore, additional information may be provided to
      the MAG to trigger the FMIP protocol in a link specific way or in
      one or more appropriate signaling messages.  A binding between the



Zhao & Damle             Expires April 27, 2009                 [Page 7]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


      HoA and the NCoA can be considered being created at the MAG.

      2) The MAG sends the HI message to the AR as specified in the FMIP
      protocol.

      3) The AR replies with a HAck message as specified in the FMIP
      protocol.

      4) The MAG provides some notification to the MN in a similar way
      to the FBack message.  Such notification may be provided in a link
      specific way or in one or more appropriate signaling messages.

      5) The rest of the procedure is similar to what is specified in
      the FMIP protocol.

4.2.2.  The Reactive Mode

   The procedure in the reactive mode for the first handover scenario is
   similar to that described in the FMIP protocol.
































Zhao & Damle             Expires April 27, 2009                 [Page 8]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


5.  Extensions

   The PFMIP protocol has described some options for both ICMP messages
   and the Mobility Headers.  Such options can be used in the FBU
   message.  However, it is not clear how the MN indicates to the AR
   that certain packets need to be forwarded through a tunnel
   established between the AR and the (new) MAG.  In the following, we
   show the format of a forwarding IP address mobility option that can
   be used in either the FBU message or the FBA message.  When such
   option is present, the Alt-CoA option MUST not be used.


       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                      |       Type    |     Length    |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   Status     | Prefix Length  |P|          Reserved           |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                                                               |
      +                                                               +
      |                                                               |
      +                      forwarding IP Address                    +
      |                                                               |
      +                                                               +
      |                                                               |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                  Figure 5: Forwarding IP Address option

      P (1 bit)

         This bit MUST be set to 1 when the MN requests the traffic
         destined at this forwarding IP address must be forwarded
         through a tunnel set up by the PFMIP protocol.

      The Forwarding IP address

         One IPv6 or one IPv4 address used for packet forwarding.  It
         can be the home address of the MN.  The type of the address in
         this field can be determined by the Length field.

      Status

         The status of such request.






Zhao & Damle             Expires April 27, 2009                 [Page 9]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


      Prefix Length

         The length of the included forwarding IP address.  Such prefix
         information may be needed in the HI/HAck messages for the
         target MAG to know the prefix length.

   One new status code is defined for the FBA message.

      132: The Alt-CoA option is missing the received FBU message.

   This can be used for the MN to detect that the AR does not support
   the forwarding IP address option since normally with the FMIP
   protocol, the Alt-CoA option must be included in the FBU message if
   sent from the PAR link, and with the extension described in this
   document, the forwarding IP address option replaces the Alt-CoA
   option.



































Zhao & Damle             Expires April 27, 2009                [Page 10]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


6.  Security Consideration

   The extensions described in this document do not introduce any new
   vulnerability.  The security related issues are discussed in the
   "Security Considerations" section of RFC 5268, and [2].


7.  IANA Consideration

   TBD.


8.  Conclusions

   In this document, we discuss and propose extensions to enable the
   interworking of the FMIP protocol and the PFMIP protocol.


9.  References

9.1.  Normative References

   [1]   Koodli, R., "Mobile IPv6 Fast Handovers", RFC 5268, June 2008.

   [2]   Yokota, H., Chowdhury, K., Koodli, R., Patil, B., and F. Xia,
         "Fast Handovers for PMIPv6", draft-yokota-mipshop-pfmipv6-03
         (work in progress), July 2008.

   [3]   Bradner, S., "Key words for use in RFCs to Indicate Requirement
         Levels", RFC 2119, March 1997.

   [4]   Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
         IPv6", RFC 3775, June 2004.

   [5]   Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., and
         B. Patil, "Proxy Mobile IPv6", RFC 5213, August 2008.

   [6]   Devarapalli, V., Wakikawa, R., Petrescu, A., and P. Thubert,
         "Network Mobility (NEMO) Basic Support Protocol", RFC 3963,
         January 2005.

   [7]   Devarapalli, V. and F. Dupont, "Mobile IPv6 Operation with
         IKEv2 and the Revised IPsec Architecture", RFC 4877,
         April 2007.

   [8]   Hinden, R. and S. Deering, "IP Version 6 Addressing
         Architecture", RFC 4291, February 2006.




Zhao & Damle             Expires April 27, 2009                [Page 11]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


   [9]   Conta, A., Deering, S., and M. Gupta, "Internet Control Message
         Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6)
         Specification", RFC 4443, March 2006.

   [10]  Wakikawa, R., Devarapalli, V., Ernst, T., and K. Nagami,
         "Multiple Care-of Addresses Registration",
         draft-ietf-monami6-multiplecoa-09 (work in progress),
         August 2008.

   [11]  Soliman, H., Montavont, N., Fikouras, N., and K. Kuladinithi,
         "Flow Bindings in Mobile IPv6 and Nemo Basic Support",
         draft-ietf-mext-flow-binding-00 (work in progress), May 2008.

   [12]  Xia, F. and B. Sarikaya, "Prefix Management for Mobile IPv6
         Fast Handover on Point-to-Point Links",
         draft-xia-mipshop-fmip-ptp-02 (work in progress),
         February 2008.

9.2.  Informative References

   [13]  Giaretta, G., "Interactions between PMIPv6 and MIPv6: scenarios
         and related issues", draft-giaretta-netlmm-mip-interactions-02
         (work in progress), November 2007.

   [14]  Lim, B., Ng, C., Aso, K., and S. Krishnan, "Verification of
         Care-of Addresses in Multiple Bindings Registration",
         draft-lim-mext-multiple-coa-verify-02 (work in progress),
         July 2008.


Authors' Addresses

   Fan Zhao
   Marvell Semiconductor, Inc.
   5488 Marvell Lane
   Santa Clara, CA  95054
   US

   Email: fanzhao@marvell.com












Zhao & Damle             Expires April 27, 2009                [Page 12]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


   Ameya Damle
   Marvell Semiconductor, Inc.
   5488 Marvell Lane
   Santa Clara, CA  95054
   US

   Email: adamle@marvell.com












































Zhao & Damle             Expires April 27, 2009                [Page 13]

Internet-Draft     Interworking between FMIP and PFMIP      October 2008


Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.











Zhao & Damle             Expires April 27, 2009                [Page 14]



PAFTECH AB 2003-20262026-04-24 04:48:39