Internet DRAFT - draft-haddad-mipshop-omm
draft-haddad-mipshop-omm
MIPSHOP Working Group W. Haddad
Internet-Draft S. Krishnan
Expires: January 18, 2006 Ericsson Research
H. Soliman
Flarion
G. Daley
Monash University CTIE
H. Tschofenig
Siemens AG
July 17, 2005
Optimizing Micromobility Management for Active and Dormant Mobile Nodes
draft-haddad-mipshop-omm-01
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 18, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
Micromobility protocols address mobile nodes (MN) movements within a
particular IP network domain. This document introduces a new
Haddad, et al. Expires January 18, 2006 [Page 1]
Internet-Draft OMM July 2005
protocol "Optimized Micromobility Management" (OMM), to manage
Micromobility for active and dormant mobile nodes. The suggested
solution is based on the Hierarchical Mobile IPv6 (HMIPv6) proposal
and aims to increase the mobility performance by reducing the
handover latency and the packet loss.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Conventions used in this document . . . . . . . . . . . . . . 4
3. Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Overview of HMIPv6 . . . . . . . . . . . . . . . . . . . . . . 8
5. Problem, Motivation and Requirements . . . . . . . . . . . . . 9
6. Overview of the OMM Protocol . . . . . . . . . . . . . . . . . 11
7. OMM Protocol Description . . . . . . . . . . . . . . . . . . . 14
8. Mobility for Dormant Mode Mobile Nodes . . . . . . . . . . . . 17
9. OMM New Bits, Options and Messages Structure . . . . . . . . . 19
9.1 The Address Check Information Option (ACIO) . . . . . . . 19
9.2 The Optimized Micro-Mobility Information Option (OMMIO) . 19
9.3 Paging Zone Identifier Option (PZIO) . . . . . . . . . . . 20
9.4 The VMAP (V) Bit . . . . . . . . . . . . . . . . . . . . . 20
9.5 Modified Router Solicitation message format . . . . . . . 21
9.6 Modified Binding Acknowledgement message format . . . . . 22
9.7 The Routing Path Update (RPU) Message . . . . . . . . . . 22
9.8 The Location Update (LU) Message . . . . . . . . . . . . . 23
9.9 The Location Acknowledgement (LA) Message . . . . . . . . 23
10. Security Considerations . . . . . . . . . . . . . . . . . . 24
11. Normative References . . . . . . . . . . . . . . . . . . . . 25
12. Informative References . . . . . . . . . . . . . . . . . . . 26
13. References . . . . . . . . . . . . . . . . . . . . . . . . . 26
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 27
Intellectual Property and Copyright Statements . . . . . . . . 28
Haddad, et al. Expires January 18, 2006 [Page 2]
Internet-Draft OMM July 2005
1. Introduction
Managing Micromobility has been addressed in many different ways.
Among existing proposals (e.g., [HMIPv6], [CIP], [HAWAII], etc), only
the HMIPv6 proposal has been adopted by the IETF.
This document introduces a new protocol, i.e., OMM, to manage
Micromobility for active and dormant mobile nodes. The suggested
solution is entirely based on the Hierarchical Mobile IPv6 (HMIPv6)
proposal and aims to increase the mobility performance by reducing
the handover latency and packet loss. For these purposes, the OMM
protocol uses Virtual Mobility Anchor Points (VMAPs) and splits the
handover event into two successive phases triggered by the network
and the mobile node (MN). For dormant MNs, OMM uses the VMAP nodes
as Paging Agents (PA) and allows to page multiple MNs concurrently,
in order to optimize the bandwidth usage and minimize the call setup
delay.
Haddad, et al. Expires January 18, 2006 [Page 3]
Internet-Draft OMM July 2005
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Haddad, et al. Expires January 18, 2006 [Page 4]
Internet-Draft OMM July 2005
3. Glossary
+---------------------+---------------------------------------------+
| Term | Definition |
+---------------------+---------------------------------------------+
| Mobility Anchor | A Mobility Anchor Point is a router located |
| Point (MAP) | in a network visited by the mobile node. |
| | One or more MAPs can exist within a visited |
| | domain. |
| | |
| Virtual MAP (VMAP) | A virtual MAP is a router located inside |
| | the IP network domain (i.e., a MAP is also |
| | a VMAP), which implements a set of |
| | features, which includes a subset of the |
| | MAP features. A VMAP node stores the MN's |
| | Regional Care-of Address (RCoA) and current |
| | Local Care-of Address (LCoA) for a limited |
| | period of time (e.g., the binding |
| | lifetime), computes the new MN's LCoA and |
| | encapsulates when needed data packets sent |
| | by the CN to the MN's current location. At |
| | any particular time during an ongoing |
| | session(s), the mobile node should have AT |
| | MOST one VMAP encapsulating data packets |
| | and fowarding them to its new current |
| | location. As mentioned earlier, each VMAP |
| | carries the PA functionalities and defines |
| | its own Paging Zone (PZ). |
| | |
| Access Router (AR) | The mobile node's default router. The AR |
| | aggregates the outbound traffic of mobile |
| | nodes. An AR can also be a MAP/VMAP. |
| | |
| Regional Care-of | An RCoA is an IPv6 address obtained by the |
| Address (RCoA) | mobile node from the visited network. An |
| | RCoA is an address on the MAP's subnet. It |
| | is auto-configured by the MN when receiving |
| | the MAP option. |
| | |
| On Link Care-of | The LCoA is the on-link CoA configured on a |
| Address (LCoA) | mobile node's interface based on the prefix |
| | is advertised by its default router. |
| | |
Haddad, et al. Expires January 18, 2006 [Page 5]
Internet-Draft OMM July 2005
| Tree Architecture | An IP network domain has a tree |
| | architecture when any router located inside |
| | the domain (i.e., except the ARs and the |
| | root gateway(s)) has only one uplink and |
| | one or more downlink(s). Such topology has |
| | no mesh links. |
| | |
| Mesh Architecture | A mesh network topology is defined as a |
| | pure tree topology with additional mesh |
| | links. This means that in a mesh topology, |
| | at least one router located inside the |
| | domain has one or more mesh link(s) in |
| | addition to its uplink and downlink(s) |
| | channels. |
| | |
| Random Architecture | A random network topology is used to |
| | indicate a mesh topology with additional |
| | uplinks. This means that in a random |
| | topology, at least one router located |
| | inside the domain has more than one |
| | uplink(s), in addition to its downlink(s) |
| | and mesh link(s) channels. |
| | |
| Local Binding | The Mobile Node sends a Local Binding |
| Update (LBU) | Update (LBU) message to the MAP in order to |
| Message | establish a binding between the RCoA and |
| | the LCoA. |
| | |
| Routing Path Update | A Routing Path Update Message is sent by |
| (RPU) Message | the new MN's New Access Router to the MN's |
| | Previous LCoA (pLCoA). The RPU message is |
| | used to trigger a Network Handover, which |
| | is totally transparent to the MN. |
| | |
| Network Handover | A Network Handover can be defined in the |
| (NH) | context of the OMM protocol, as the process |
| | triggered by the network, of re-routing |
| | data packets flow(s) sent to a particular |
| | mobile node to its new location before the |
| | MN sends an LBU message to the MAP. The NH |
| | process aims to minimize the handover |
| | latency as well as the packet loss. |
| | |
| Dormant Mode | A state in which the mobile node restricts |
| | its ability to receive normal IP traffic by |
| | reducing monitoring of radio channels. This |
| | allows the mobile node to save power and |
| | reduces signaling load on the network. |
Haddad, et al. Expires January 18, 2006 [Page 6]
Internet-Draft OMM July 2005
| Paging | As a consequence of a mobile-bound packet |
| | destined for a mobile currently in dormant |
| | mode, signaling by the network through |
| | radio access points directed to locating |
| | the mobile and alerting it to establish a |
| | last hop connection. |
| | |
| Paging Zone | A Paging Zone is the set of Access Points |
| | (APs) attached to one particular VMAP. Note |
| | that this definition applies only when the |
| | particular VMAP is an access router, which |
| | is the case in most random architecture. A |
| | mobile node in dormant mode may be required |
| | to signal to the network when it crosses a |
| | paging zone boundary, in order that the |
| | network network can maintain a rough idea |
| | of where the mobile is located. |
| | |
| Location Update | A Location Update Message is sent by the |
| (LU) Message | Paging Agent to the MAP to update it with |
| | the current Paging Zone of a particular MN |
| | while being in a dormant state. |
| | |
| Location | A Location Acknowledgment Message is sent |
| Acknowledgment (LA) | by the MAP to one particular VMAP to |
| Message | acknowledge the receipt of a Location |
| | Update Message sent earlier by the same |
| | VMAP. |
| | |
| Paging Message (PM) | A Paging Message is broadcasted by the VMAP |
| | to all mobile nodes located within its |
| | Paging Zone. The PM message carries among |
| | others, an 128-bits parameters representing |
| | the set of all targeted mobile nodes, and a |
| | set of hash functions, which allow all |
| | mobile nodes within the PZ to check if they |
| | belong to the set of the targeted nodes. |
+---------------------+---------------------------------------------+
Table 1: Glossary
For more details about terms defined above, please refer to [HMIPv6],
[TOMOP] and [Paging].
Haddad, et al. Expires January 18, 2006 [Page 7]
Internet-Draft OMM July 2005
4. Overview of HMIPv6
The two main goals behind designing the [HMIPv6] protocol are to
reduce both the heavy amount of signaling messages generated by the
MIPv6 protocol and the handover latency. A third goal is to enable
the MN to hide its movements and current location from the CN and the
HA.
HMIPv6 consists on deploying one or more special nodes called
Mobility Anchor Point, i.e, MAP, within the IP network domain. A MAP
can be defined as a local home agent, which intercepts all packets
addressed to registered mobile nodes and tunnels them to the MN.
When a MN enters to an HMIPv6 domain, it starts by selecting, then
registering itself with the appropriate MAP. This is done by
processing special information sent by the MN's AR in the Router
Advertisement (RtAdv) message. These information allow the MN to
auto-configure a regional care-of address (RCoA), which will be used
by the MAP to capture packets sent from outside the domain to the
MN's care-of address (i.e., RCoA), and a link care-of address
(LCoA), which will be used by the MAP to locate the MN inside the MAP
domain.
It should be noted at this stage that HMIPv6 recommends that the MN
selects the furthest MAP to avoid frequent MAP changes, which in turn
implies going through the time consuming MAP registration procedure
during the handover.
Each time the MN moves to a new AR, it has to configure a new LCoA
and registers it with the MAP. This is done by sending a Local
Binding Update (LBU) message to the MAP. The LBU message allows the
MAP to bind the new LCoA to the MN's RCoA.
Haddad, et al. Expires January 18, 2006 [Page 8]
Internet-Draft OMM July 2005
5. Problem, Motivation and Requirements
HMIPv6 protocol succeeds in eliminating redundant signaling messages
in MIPv6, i.e., the HoTI/HoT and CoTI/CoT messages, while keeping
only critical mobility messages, i.e., local binding update (LBU) and
binding acknowledgement (BA) messages, exchanged between the MN and
the MAP.
However, HMIPv6 partially succeeds in reducing the handover latency
since the LBU message sent from the MN to the MAP will most likely
have to travel on a relatively long path within the domain before
reaching the MAP (being supposedly static), in order to trigger a re-
routing of the data packets flow to the MN's new LCoA (nLCoA). Such
delay may result in packet loss, which becomes more alarming if the
MN is moving at a high speed within the MAP domain while running time
sensitive applications.
This is mainly due to the fact that HMIPv6 recommends avoiding
changing the MAP as much as possible. Consequently, HMIPv6 suggests
choosing the furthest MAP in the hierarchical domain, which is in
most cases the domain gateway node(s).
In addition, HMIPv6 practically converts any network topology (i.e.,
mesh or random) to a tree topology, which if deployed alone, lacks
both robustness and load balancing features.
Based on that, HMIPv6 does not take any advantage from a mesh or
random topology since all signaling messages are sent on the shortest
uplink path to the root of the tree topology, i.e., the furthest MAP
gateway.
But it should be noted that HMIPv6 provides the lowest handover
latency among other micromobility proposals (e.g., HAWAII and CIP)
for the first handover only, i.e., when the MN enters into an HMIPv6
domain. But when the MN starts moving within the MAP domain then the
handover performance start decreasing when compared to the two other
proposals ([TOMOP], [MIPS]).
Note that, although the mobility performance may increase in both CIP
and HAWAII proposals, the CIP protocol continuously involves every
node on the path between the gateway and the MN, and requires being
implemented in the base station. On the other hand, the HAWAII
proposal relies on sub-optimal routing path(s), which in turn can
lead to an unoptimized load balancing in the access network.
Haddad, et al. Expires January 18, 2006 [Page 9]
Internet-Draft OMM July 2005
Based on the above, the requirements for a new optimized micro-
mobility protocol, which offer the main advantages of each of the
above protocol, are:
a. The load of signaling messages required during the handoff
procedure should be minimized as much as possible.
b. In order to minimize or eliminate the handoff latency and packet
loss, the load of signaling messages should be concentrated only
near the involved MN's new AR.
c. As it is the case in HMIPv6, the handoff procedure should result
at the end in a new optimal path between the MAP and the new MN's
location.
d. Any new node in the MAP domain which may be involved in the
handoff procedure should be maintained in soft-state so that
invalid bindings/keys are deleted automatically.
e. All signaling Messages exchanged between routers and between
routers and the MAP are authenticated.
The above requirements led to the design of a simple proposal, which
is totally built on top of HMIPv6 and increases the performance of IP
handovers, which occur within an HMIPv6 domain. In addition, the OMM
protocol takes full advantage from a mesh/random topology.
Haddad, et al. Expires January 18, 2006 [Page 10]
Internet-Draft OMM July 2005
6. Overview of the OMM Protocol
The OMM protocol aims to bring key advantages provided by some
existing micromobility proposals, like CIP, HAWAII and HMIPv6, while
minimizing/eliminating their different drawbacks. The OMM protocol
fulfills requirements a), b) and c) by adding at most one message
between the MN's nAR and one special node (i.e., VMAP) located
nearby. Moreover, the OMM protocol allows the MN to skip the DAD or,
in the worst case, to perform it in parallel with exchanging data.
In short, the OMM protocol splits the IP handover into two successive
events. The first one is a network handover (NH) and is triggered by
the infrastructure itself (i.e., the MN's new AR). Note that the NH
greatly benefits from a random network topology, i.e., it relies on
sub-optimal routing of data packets (as in HAWAII) sent to the MN, in
exchange for a shorter latency and minimum packets loss.
The main goals behind triggering first a network handover are to
reduce the latency and packet loss as much as possible. In other
words, the NH aims to eliminate the latency variable from the second
event, which is the handover triggered by the MN itself according to
HMIPv6 protocol.
For these purposes, the OMM protocol requires implementing a limited
set of the MAP features on routers located between the MAP and the
ARs, i.e., in order to convert them to VMAPs. Each time the MAP gets
an LBU message from the MN, it sends a BA message, which is used also
to store the MN's RCoA in the VMAP(s) located near the MN and on the
path between the MAP and the MN. Note that these signaling data are
stored in VMAP(s) in a soft state and must be removed immediatley
after the expiration of the Binding Update Lifetime set by the MN in
the LBU message.
Each time, the network infrastructure triggers a NH, the VMAP
simulates the MAP role for a limited period of time, i.e., until the
second event is completed, thus significantly reducing the latency
and packets loss.
It becomes clear from the above that, in order to get the best
performance from the NH, the selected VMAP must be located as close
as possible to the MN's new AR (or within the nAR itself depending on
the network topology).
In the OMM protocol, the second event, i.e., handover triggered by
the MN, aims only to re-direct data packets flow sent to the MN to a
more optimal path. Such step is needed, especially that the first
event, i.e., NH, may use a sub-optimal path to pull data packets flow
to the MN's new LCoA. As described in HMIPv6, the second event
Haddad, et al. Expires January 18, 2006 [Page 11]
Internet-Draft OMM July 2005
updates the MAP BCE with the new MN's LCoA in order to allow the MAP
to tunnel data packets to the new MN's LCoA.
Finally, it should be noted that the worst case scenario in OMM
protocol is the failure of the NH, which means having only the
handover triggered by the MN itself, as defined in HMIPv6. This lead
us to the HMIPv6 case.
The following figure shows the VMAPs location in a full random
hierarchical domain topology:
+-----------+
| MAP |
+-----------+
/ \
/ \
/ \
+---+ +---+
| R |.................| R |
+---+ # +---+
/ \ # / \
/ \ # / \
+--+ +--+ # +--+ +--+
|R |.........|R |.....|R |.........|R |
+--+# +--+ +--+ +--+
/ \ # / \ / \ / \
+--+ +--+ #+--+ +--+ +--+ +--+ +--+ +--+
|V |...|V |...|V |.|V |.|V |..|V |...|V |.|V |
+--+ +--+ +--+ +--+ +--+ +--+ +--+ +--+
****** ****** **** **** **** **** ***** *****
Where:
- R represents a router
- V reprsents a Virtual MAP (VMAP)
- ... represents a mesh link, i.e., mesh topology
- ### represents a random link, i.e., random topology
- * represents an AP
Note that having a full mesh topology only at the lowest level of the
hierarchical domain topology requires converting only the ARs to
Haddad, et al. Expires January 18, 2006 [Page 12]
Internet-Draft OMM July 2005
VMAPs in order to obtain maximum performance.
Haddad, et al. Expires January 18, 2006 [Page 13]
Internet-Draft OMM July 2005
7. OMM Protocol Description
As mentioned earlier, OMM protocol consists on implementing a limited
set of MAP features (and one new feature) in routers located between
the MAP and the ARs. A router with the added set of MAP features is
called a virtual MAP (VMAP). A VMAP enabled router MUST provide the
two following features:
o Store the MN's IPv6 addresses (i.e., RCoA and LCoA) in its Virtual
Binding Cache Entry (VBCE). This is performed upon receiving a BA
message carrying a binding hop-by-hop message.
o Check the ownership of the old MN's old LCoA (oLCoA), computes the
new MN's LCoA (nLCoA) and tunnel data packets sent to the MN's
nLCoA. This is performed upon receiving a Routing Path Update
(RPU) message.
The techniques proposed in this document work at their best when the
following conditions are met:
o The MAP domain has a random network topology.
o Messages exchanged between routers (i.e., VMAPs and ARs), located
within the same MAP domain are authenticated.
o All routers located in the same MAP domain can be converted to
VMAPs. This assumption applies also for the ARs. Note that this
is not a required condition. If there are no VMAPs on the path
between the nAR and the pLCoA the situation boils down to the base
HMIPv6 case.
However, it should be noted that adding links between ARs and
converting some or all of them to VMAPs can bring additional
performance to the OMM protocol and help avoiding updating all
exiting VMAPs located between the MAP and the MN each time the MN
switches to a new AR.
HMIPv6 protocol requires the ARs to add the MAP functions data to
their RtAdv messages sent to the MN. These information allow the MN
to select the furthest MAP, auto-configure an RCoA and an LCoA and
send them to the MAP in an LBU message. The two addresses enable the
MAP to create the binding and to intercept data packets sent to the
MN's RCoA and tunnel them to the MN's current location.
When the MN enters for the first time to an HMIPv6 domain, it MUST
follow the HMIPv6 protocol. The first new step introduced by the OMM
protocol consists on alerting the MN of the support for the OMM
protocol. This is done by setting the Optimization (O) bit (defined
Haddad, et al. Expires January 18, 2006 [Page 14]
Internet-Draft OMM July 2005
in 8.10) in the RtAdv message sent by the AR.
The second step starts when the MAP sends a BA message after
receiving an LBU message from the MN. The MAP MUST insert in the BA
message a new hop-by-hop option called "Virtual Binding" (VB). The
VB must carry the MN's two IPv6 addresses sent to the MAP in the BU,
the binding lifetime and the "Address Management Key" (Kam). Note
that the Kam SHOULD be derived from hashing the shared secret
established between the MN and the MAP so that the MN does not need
to store a new Key.
Finally, the MAP MUST authenticate the VB option with the Kam and
MUST encrypt the Kam field with a shared key pre-computed between the
MAP and the VMAPs.
Upon receiving a BA message carrying a VB hop-by-hop option, the VMAP
starts by checking if its VBCE has an entry corresponding to the MN's
LCoA. If this is the case, the VMAP should update any existing value
(e.g., binding lifetime) with the new one carried in the VB option.
In case there is no entry, the VMAP MUST create one, which includes
all data sent in the VB.
The third step occurs when the MN switches to a new link. In such
scenario, the MN starts by sending a RtSol message, which MUST
contain its RCoA, its pLCoA and a proof of ownership of the two
addresses.
The proof is carried in a new option (i.e., "Address Check" (AC)
option defined in Section 9.1) and is presented as the result of the
following:
Proof = First[64, HMAC(Kam, (RCoA | pLCoA)]
The MN's addresses and the proof of ownership are carried in two
different options defined in Section 9.1 and Section 9.2
The VMAP MUST delete from its VBCE all information related to one
particular MN upon the expiration of the binding lifetime, unless
another BA is sent by the MAP carrying a new binding lifetime (i.e.,
the MN has sent a new LBU message carrying the same LCoA to the MAP).
The next step in the OMM protocol consists on triggering a network
handover (NH). This is done by the MN's nAR upon receiving a RtSol
message, which contains the two options. In such scenario, the AR
SHOULD send in parallel a Route Path Update (RPU) message to the MN's
pLCoA (carried by the RtSol message) and a RtAdv message to the MN.
Note that the RPU message MUST be signed by the nAR.
Haddad, et al. Expires January 18, 2006 [Page 15]
Internet-Draft OMM July 2005
When a VMAP receives an RPU message, it starts by checking its VBCE
for an entry which contains the couple (RCoA, pLCoA). If an entry is
found, the VMAP fisrct hecks whether the proof contained in the
message is valid. If so, it computes the MN's nLCoA IID and updates
its VBCE with the new MN's nLCoA. The same IID MUST be computed by
the MN and in the same following way:
nLCoA(IID) = First[64, HMAC(Kam, (RCoA | pLCoA | New_Subnet_Prefix)]
After updating its VBCE, the VMAP starts tunnelling data packets sent
by the MAP to the MN's pLCoA to its new location (i.e., nLCoA). The
VMAP MUST delete the MN's correponding entry from its VBCE at the
expiration of the routing binding lifetime (RBL) sent by the MN's nAR
in the RPU message. Note that the RBL value may be predefined.
After the MN gets a new LCoA, it MUST send an LBU message to the MAP.
The LBU message updates the MAP's BCE, re-route the data traffic by
using a more optimized route between the MAP and the MN and update
the VMAP (i.e., via the BA message) on the new path between the MN
and the MAP. It should be noted that many VMAPs may be updated by
one specific BA message. However, the decision to turn on/off more
than one VMAP on a particular path should be taken based on the
network topology around that path.
Haddad, et al. Expires January 18, 2006 [Page 16]
Internet-Draft OMM July 2005
8. Mobility for Dormant Mode Mobile Nodes
In addition to the micro-mobility optimization described for active
MNs, this proposal introduces a new technique to page MNs while being
in dormant mode and moving across different Paging Zones (PZ). Our
approach applies the hash-based paging procedure using bloom filters
[HBP] to the OMM protocol. Note that such technique can be used to
page several MNs located in the same PZ concurrently, thus
significantly reducing the paging bandwidth consumption and the call
setup delays.
As mentioned earlier, our solutions consists on adding Paging Agent
(PA) functionalities to the VMAPs. In addition, the suggested
solution introduces a new Paging Zone Identifier (PZI), which allows
the MN to detect when entering to a new PZ. The PZI MUST be carried
in the RtAdv message.
When a MN in a dormant mode detects that the PZI has changed, it MUST
send a RtSol message to the AR. The RtSol message MUST carry its HoA
and the PZI. The latter is used to notify the AR, i.e., VMAP, that
the MN is in a dormant mode. Upon receiving the RtSol message, the
AR sends an LU message to the MAP to notify it about the new location
of the MN. The LU message MUST contain the MN's RCoA and MUST be
authenticated by the VMAP. When the MAP receives an LU message, it
creates/updates the MN's corresponding BCE with the new source
address, i.e., VMAP, sent in the LU message. After that the MAP MAY
send back an LA message to the VMAP
When an incoming call arrives to the MN's RCoA address, the MAP
starts by checking the corresponding BCE and tunnels the packet to
the corresponding VMAP. The receipt of a packet carrying a VMAP
address as destination address serves to notify the VMAP that the
inner destination address, i.e., RCoA, carried by the packet needs to
be paged. For this purpose, the VMAP will periodically, e.g., every
1 second, generate an 128-bit parameter using all RCoAs that need to
be paged, i.e., to empty its queue. The computed parameter and all
hash functions used to generate it are carried by the paging message
sent by the VMAP to all nodes in its PZ. Upon receiving paging
message, a MN SHOULD process it in the following way:
o If the MN is in active mode, then it SHOULD discard the message.
o If the MN is in dormant mode, then it can detect if it is being
paged by checking the bits positions {H1(RCoA), H2(RCoA), ...,
Hk(RCoA)} in the 128-bit parameter sent in the Pmes. Note that
{H1(), H2(), ...} are the hash functions used by the PA to compute
the parameter from the set of RCoAs which are waiting in the queue
to be paged. If any of the bit position is 0, then the
Haddad, et al. Expires January 18, 2006 [Page 17]
Internet-Draft OMM July 2005
corresponding RCoA is not paged. Otherwise, the MN's RCoA is
paged and MUST proceed according in the same way described above
for an active MN.
Haddad, et al. Expires January 18, 2006 [Page 18]
Internet-Draft OMM July 2005
9. OMM New Bits, Options and Messages Structure
As it has been shown above, the OMM Protocol defines 4 new bits, 6
new options and introduces 1 new message.
OMM defines new bit and options to be carried by the RtSol message.
The new bit and options are the following:
9.1 The Address Check Information Option (ACIO)
This option is used to carry the address check proof created by the
mobile node. This option is used to verify whether the mobile node
is really the owner of the addresses carried in the OMMIO option The
format of the option is the following:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Address Proof |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type
<To Be Assigned By IANA>
Option Length
Length of the option.
Option Data
This contains the proof of ownership of the pLCoA and the RCoA
9.2 The Optimized Micro-Mobility Information Option (OMMIO)
The Optimized Micro-Mobility Information Option (OMMIO) is a new
option carried by the RtSol message sent by the MN upon receiving an
RtAdv message from the AP. When used, the OMMIO MUST carry the MN's
pLCoA and the RCoA.
Haddad, et al. Expires January 18, 2006 [Page 19]
Internet-Draft OMM July 2005
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Option Type | Option Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. pLCoA .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. RCoA .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Option Type
<To Be Assigned By IANA>
Option Length
Length of the option.
Option Data
This contains the pLCoA and the RCOA of the mobile node
9.3 Paging Zone Identifier Option (PZIO)
The PZI option will be specified in a future version of this
document.
9.4 The VMAP (V) Bit
The VMAP bit is a new bit used in the OMM proposal to request VMAP
node(s) located between the MAP and the MN's current location to
store the MN's addresses (i.e., RCoA and LCoA) and the binding
lifetime in their VBCE(s). The VMAP bit MUST be set by the MAP in
the BA message each time the MAP receives a valid LBU message from
the MN. Note that the MN MUST ignore such bit.
Haddad, et al. Expires January 18, 2006 [Page 20]
Internet-Draft OMM July 2005
9.5 Modified Router Solicitation message format
The modified Router Solication sent from a MN supporting this
specification would look like this
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Code | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. ACIO .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. OMMIO .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
IP Fields:
Source Address
The Source Address MUST be the MN's nLCoA.
Destination Address
Typically the all-routers multicast address.
Hop Limit 255
ICMP Fields:
Type 133
Code 0
Checksum The ICMP checksum. See [ICMPv6].
Reserved This field is unused. It MUST be initialized
to zero by the sender and MUST be ignored by
the receiver.
Haddad, et al. Expires January 18, 2006 [Page 21]
Internet-Draft OMM July 2005
9.6 Modified Binding Acknowledgement message format
When the binding acknowledgement message sent by the MAP it contains
the VMAP (v) bit as described. The modified BA looks like this.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Status |K|V| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence # | Lifetime |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Mobility options .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
9.7 The Routing Path Update (RPU) Message
The Routing Path Update message sent from a nAR supporting this
specification would look like this
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Code | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. ACIO .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. OMMIO .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
IP Fields:
Source Address
The Source Address MUST be one of nARs addresses.
Destination Address
The pLCoA of the MN.
Haddad, et al. Expires January 18, 2006 [Page 22]
Internet-Draft OMM July 2005
ICMP Fields:
Type <To Be Assigned By IANA>
Code 0
Checksum The ICMP checksum. See [ICMPv6].
Reserved This field is unused. It MUST be initialized to zero
by the sender and MUST be ignored by the receiver.
ACIO The Address check information option as specified above
OMMIO The OMM information option as specified above
9.8 The Location Update (LU) Message
The location update message will be specified in a future version of
this document.
9.9 The Location Acknowledgement (LA) Message
The location acknowledgment message will be specified in a future
version of this document.
Haddad, et al. Expires January 18, 2006 [Page 23]
Internet-Draft OMM July 2005
10. Security Considerations
The OMM protocol assumes that all signaling messages exchanged
between routers (e.g., VMAPs) located within a MAP domain are
authenticated.
The OMM protocol does not introduce nor amplify any new or existing
attacks or threats. However, it should be noted that triggering a
network handover without providing a proof of ownership of the
previous LCoA mentioned in the RtSol message sent by the MN to the
nAR may allow to re-direct/steal data packets sent to another node
attached to the MN's previous AR.
Haddad, et al. Expires January 18, 2006 [Page 24]
Internet-Draft OMM July 2005
11. Normative References
[EAR] J. Choi, D., Shin, "Fast Router Discovery with RA
Caching", draft-jinchoi-dna-frd-00, July 2004.
[ICMPv6] A. Conta, S. Deering, M. Gupta, "Internet Control
Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification",
draft-ietf-ipngwg-icmp-v3-06, November 2004.
[HMIPv6] H. Soliman, K. elMalki, C. Castelluccia, L. Bellier,
"Hierarchical Mobile IPv6 mobility management
(HMIPv6)", draft-ietf-mipshop-hmipv6-04, December 2004.
[MIP6] D. Johnson, C. Perkins, J. Arkko, "Mobility Support in
IPv6", RFC 3775, June 2004.
[NDIS] T. Narten, E. Nordmark, W. Simpson, H. Soliman,
"Neighbor Discovery for IP Version 6 (IPv6)",
draft-ietf-ipv6-2461bis-01, October 2004.
[SEND] J. Arkko, J. Kempf, B. Sommerfield, B. Zill,
P. Nikander, Secure Neighbor Discovery (SEND),
draft-ietf-send-ndopt-06, July, 2004.
[TERM] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Haddad, et al. Expires January 18, 2006 [Page 25]
Internet-Draft OMM July 2005
12. Informative References
[CIP] A. Valko, "Cellular IP: A New Approach to Internet Host
Mobility", ACM Computer Communication Review, January
1999.
[HAWAII] R. Ramjee, K. Varadhan, L. Salgarelli, S. Thuel, S.Y.
Wang, T. La Porta, "HAWAII: A Domain-based Approach for
Supporting Mobility in Wide-Area Wireless Networks,"
IEEE/ACM Transactions on Networking, , Vol 10, No. 3,
June, 2002.
[HBP] P. Mutaf and C. Castelluccia, "Hash-Based Paging and
Location Update Using Bloom Filters", ACM/Kluwer
Journal on Mobile Networks and Applications, (MONET),
Vol. 10, No. 2, December 2004.
[TOMOP] L. Peters, I. Moerman, B. Dhoedt, P. Demeester,
"Influence of the Topology on the Performance of
Micromobility Protocols", Proceedings of WiOpt'03,
March 2003, Sophia Antipolis, France.
[MIPS] D. Saha, A. Mukherjee, I. Misra, M. Chakraborty, N.
Subhash, "Mobility Support in IP: A Survey of Related
Protocols", IEEE Network, Vol. 18 No. 6, November 2004.
[Paging] J. Kempf, "Dormant Mode Host Alerting ("IP Paging")
Problem Statement", RFC 3132, June 2001.
13. References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.
[RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", RFC 2460, December 1998.
Haddad, et al. Expires January 18, 2006 [Page 26]
Internet-Draft OMM July 2005
Authors' Addresses
Wassim Haddad
Ericsson Research
8400 Decarie Blvd.
Town of Mount Royal, QC
Canada
Phone: +1 514 345 7900 #2334
Email: Wassim.Haddad@ericsson.com
Suresh Krishnan
Ericsson Research
8400 Decarie Blvd.
Town of Mount Royal, QC
Canada
Email: Suresh.Krishnan@ericsson.com
Hesham Soliman
Flarion
Email: H.Soliman@flarion.com
Greg Daley
Monash University CTIE
Centre for Telecommunications and Information Engineering
Department of Electrical and Computer Systems Engineering
Monash University, Clayton, Victoria 3800
Australia
Phone: +61 3 9905 4655
Email: Greg.Daley@eng.monash.edu.au
Hannes Tschofenig
Siemens AG
Otto-Hahn-Ring 6
81739 Munich
Germany
Email: Hannes.Tschofenig@siemens.com
Haddad, et al. Expires January 18, 2006 [Page 27]
Internet-Draft OMM July 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Haddad, et al. Expires January 18, 2006 [Page 28]