Internet DRAFT - draft-giaretta-netlmm-protocol

draft-giaretta-netlmm-protocol










      
      
     NETLMM BOF                                                G. Giaretta 
     Internet Draft                                            I. Guardini 
     Expires: April 14, 2006                                    E. Demaria 
                                                                     Tilab 
                                                          October 14, 2005 
                                         
      
                                          
               Network-based localized mobility management (NETLMM)             
                         with distributed anchor routers 
                     <draft-giaretta-netlmm-protocol-00.txt> 


     Status of this Memo 

        By submitting this Internet-Draft, each author represents that any 
        applicable patent or other IPR claims of which he or she is aware 
        have been or will be disclosed, and any of which he or she becomes 
        aware will be disclosed, in accordance with Section 6 of BCP 79. 

        Internet-Drafts are working documents of the Internet Engineering 
        Task Force (IETF), its areas, and its working groups.  Note that 
        other groups may also distribute working documents as Internet-
        Drafts. 

        Internet-Drafts are draft documents valid for a maximum of six 
        months and may be updated, replaced, or obsoleted by other 
        documents at any time.  It is inappropriate to use Internet-Drafts 
        as reference material or to cite them other than as "work in 
        progress." 

        The list of current Internet-Drafts can be accessed at 
             http://www.ietf.org/ietf/1id-abstracts.txt 

        The list of Internet-Draft Shadow Directories can be accessed at 
             http://www.ietf.org/shadow.html 

        This Internet-Draft will expire on April 14, 2006. 

     Copyright Notice 

        Copyright (C) The Internet Society (2005). All Rights Reserved. 

     Abstract 

        This document describes a network-based local mobility management 
        protocol that implies minimal host involvement in mobility  
        management procedures and fulfills the requirements provided in 
        draft-kempf-netlmm-nohost-req-00. 



      
      
      
     Giaretta, et al.        Expires April 14, 2006            [Page 1] 
      






     Internet-Draft             NETLMM Protocol               October 2005 
         

     Conventions used in this document 

        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL 
        NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" 
        in this document are to be interpreted as described in RFC-2119 
        [1]. 

      











































      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 2] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     Table of Contents 

        1. Introduction...................................................4 
        2. Terminology....................................................5 
        3. Reference architecture.........................................6 
        4. Protocol Overview..............................................7 
        5. Protocol Specification........................................11 
           5.1. Conceptual Data Structures...............................11 
           5.2. Visited Access Router Operation..........................12 
              5.2.1. HAR discovery.......................................12 
              5.2.2. Sending Location Updates............................13 
              5.2.3. Receiving Location Acknowledgements.................13 
              5.2.4. Packet processing...................................13 
           5.3. Home Anchor Router Operation.............................14 
              5.3.1. Receiving Location Updates..........................14 
              5.3.2. Sending Location Acknowledgements...................14 
              5.3.3. Packet Processing...................................14 
        6. Allocation of a centralized HAR within the LMMD...............16 
        7. Neighbor Discovery Considerations.............................17 
        8. Host Considerations...........................................19 
           8.1. Access through Neighbor Discovery........................19 
           8.2. Access through PANA/DHCP.................................23 
        9. Packets Formats...............................................27 
        10. Security Considerations......................................28 
        11. References...................................................29 
           11.1. Normative References....................................29 
           11.2. Informative References..................................29 
        12. Appendix A: Support for Route Optimization...................31 
           12.1. Basic Operation.........................................31 
           12.2. Management of host movements............................34 
           12.3. Recovery from error conditions..........................35 
        Authors' Addresses...............................................38 
        Intellectual Property Statement..................................39 
        Disclaimer of Validity...........................................39 
        Copyright Statement..............................................39 
        Acknowledgment...................................................39 
      














      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 3] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     1. Introduction 

        draft-kempf-netlmm-nohost-ps-00 [8] briefly describes the local 
        mobility problem and describes the two most serious issues with 
        existing protocols: the requirement for host support, and the  
        complex security interactions required between the host and the 
        network. A more complete list of requirements for a localized 
        mobility management solution is provided in [9]. 

        This document describes a network-based mobility management  
        protocol that implies minimal host involvement in mobility  
        management procedures and fulfills the requirements provided  
        in [9].  

        The document is organized as follows: section 3 describes the 
        reference network architecture and the reference scenario. Section 
        4 provides an overview of the protocol and section 5 describes the 
        detailed protocol specification and related data structures. 
        Section 6 describes an optional feature of the protocol to 
        increase the degree of location privacy provided to hosts and 
        section 7 raises some possible issues with standard Neighbor 
        Discovery. Section 9 lists some approaches that can be used by 
        hosts to configure their addresses and to trigger mobility 
        management procedures. Finally, appendix A gives an overview on 
        how the protocol may be extended to provide optimal routing to 
        data packets. 

         

         





















      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 4] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     2. Terminology 

        General mobility terminology can be found in [4]. The following 
        additional terms are used here: 

        HAR 
            Home Anchor Router. A router that provides mobility anchor 
            point functionalities to a host. The HAR can be co-located 
            with the Access Router where the host switches on or can be a 
            separate node different from any Access Router.  

        VAR 
            Visited Access Router. The Access Router where the host is 
            located. The VAR provides the HAR with the current location of 
            the host. 

        Location Cache 
            This cache contains an entry for each host which the node is 
            acting as HAR for. Its purpose and format are very similar to 
            Mobile IPv6 Binding Cache. 

        Location Update List 
            This cache contains an entry for each host the Access Router  
            acts as VAR. Its purpose and format are very similar to Mobile 
            IPv6 Binding Update List. 

         
























      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 5] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     3. Reference architecture 

        The protocol described in this document can be used to handle IP 
        mobility within an Localized Mobility Management Domain (LMMD). 
        The reference network architecture is shown in Figure 1. 

        A single LMMD can span a whole administrative domain (e.g. the 
        network of an operator) or part of it. The edge of the LMMD is 
        made of Access Routers (ARs) and Border Gateways (BGs). An AR can 
        manage one or more IP links (i.e. layer 2 access networks), each 
        one univocally associated with at least an IPv6 prefix. It 
        represents  
        the first IP router encountered by the mobile node on the way to 
        the destination. The BGs are used to interconnect the LMMD with 
        external networks, which can be traditional IP networks like the 
        Internet or other LMMDs. There are no constraints on the internal 
        topology of an LMMD. 

                                                                           
               +--------------------------------+                          
               |                                |    +-----------------+   
               |            LMM               +---+  |    External     |   
               |           Domain             |BG |--|    Network      |   
               |                              +---+  | (e.g. Internet) |   
               |                                |    +-----------------+   
               |   +---+     +---+     +---+    |           |              
               +---|AR1|-----|AR2|-----|AR3|----+           |              
                   +---+     +---+     +---+               +--+            
                     |         |         |                 |CN|            
               L2    |         |         |                 +--+            
             Access  |         |         |                                 
                  -+-+-+-   -+-+-+-   -+-+-+-                              
                   |   |     |   |     |   |    Base                       
                   O   O     O   O     O   O   Stations                    
                  Prefix-1  Prefix-2  Prefix-3                             
                                                                           
                 +--+                     +--+                             
                 |MN| ---->               |CN|                             
                 +--+   Movement          +--+                             
                                                                           
              MN's address:                                                
                 IP-MN                                                     
                                                                           
                        Figure 1 - Reference architecture 
         
        As long as the mobile node remains within the same LMMD, it can 
        keep on using the same IP address even if it happens to change the 
        AR it is attached to. 



      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 6] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     4. Protocol Overview 

        Each AR sends Router Advertisement messages as described in [2]. 
        These RAs include one or more prefix options that are specific to  
        the link. In case stateless auto-configuration can be used, the  
        bit A in the prefix option is set to one.  

        When a mobile node (MN) powers up on a link, it configures an  
        address through an address configuration mechanism: stateless 
        autoconfiguration [3], DHCP [7] or a AAA-based mechanism can be 
        used for this purpose. The address configured by the host is  
        topologically correct since it belongs to the network prefix 
        announced by the Access Router. As soon as the host has configured  
        an address, the Access Router receives an indication of the 
        presence of the host. This is depicted in Figure 2 as an activate 
        message. This message may be a Router Solicitation, a Neighbor 
        Solicitation, an unsolicited Neighbor Advertisement or it can be a 
        network trigger after the address configuration procedure.  

        Figure 2 depicts the host and AR operation when the host activates  
        on a link. When the AR receives an activate message including an 
        IP address that belongs to one of its network prefixes, it does 
        not need to perform any mobility management procedure. The traffic 
        to and from the host is delivered using standard IP routing, which  
        means that it is not tunneled. This is an important feature of the 
        protocol since it does not introduce any packet or signaling  
        overhead for nodes that are not moving or for nodes with limited 
        mobility requirements.  This scenario is similar to the case of a 
        Mobile IPv6 MN located in the home network. 
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
         
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 7] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                         
           +--+           +---+            +---+                 +--+      
           |MN|           |AR1|            |AR2|                 |CN|      
           +--+           +---+            +---+                 +--+      
            |               |                |                    |        
            | /-----------\ |                |                    |        
            |/   Address   \|                |                    |        
            |\    conf.    /|                |                    |        
            | \-----------/ |                |                    |        
            |               |                |                    |        
            |Activate (IP-MN)                |                    |        
            |-------------->|                |                    |        
            |               |                |                    |        
            |          Plain data packets (no tunneling)          |        
            |<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~>|        
                                                                           
         Figure 2 - MN bootstrapping and routing from/to the home network 
                                          
        When the MN moves to another link, it sends an activate message to 
        the new AR (AR2 in Figure 3) with an indication of the IP address 
        used on the previous link. The type of indication depends on the 
        implementation of the activate message: some examples are 
        described in section 8. The AR acts as the Visited Access Router 
        for the host. Based on the IP address provided by the host the VAR 
        discovers its HAR: this can be done based on an exchange with a 
        topology server (i.e. a data-base maintaining the correspondence 
        between prefixes and HARs) or based on records already present in 
        the VAR. Once identified the HAR of the host, the VAR sends a 
        Location Update message to the HAR including its own address and 
        the IP address of the host. The HAR adds a new entry in its 
        Location Cache and replies with a Location Acknowledgement 
        message. The result of this message exchange is the set up of a 
        bi-directional tunnel between HAR and VAR. HAR intercepts all 
        packets sent to the host and forwards them to the tunnel 
        interface. From an implementation point of view, since several 
        hosts can share the same HAR and can be on the same VAR's link at 
        the same time, HAR and VAR can share an unique tunnel for all 
        these hosts. 
         
         
         
         
         
         
         
         
         
         
         
         
         
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 8] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                           
                        HAR of MN        VAR of MN                         
           +--+           +---+            +---+                 +--+      
           |MN|           |AR1|            |AR2|                 |CN|      
           +--+           +---+            +---+                 +--+      
            |               |                |                    |        
           Moves            |                |                    |        
           to AR2           |                |                    |        
            |        Activate (IP-MN)        |                    |        
            |------------------------------->|                    |        
            |               |                |                    |        
            |           Location Update (IP-MN,AR2)               |        
            |               |<---------------|                    |        
            |           +--------+           |                    |        
            |           |Location|           |                    |        
            |           | Cache  |           |                    |        
            |           | Update |           |                    |        
            |           +--------+           |                    |        
            |               |  Location Ack. |                    |        
            |               |--------------->|                    |        
            |               |                |                    |        
            |               |   Plain data packets (no tunneling) |        
            |               O<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|        
            |               O      Tunnel    |                    |        
            |               O===============>O                    |        
            |               |                O                    |        
            |<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O                    |        
                                                                                   
                 Figure 3 - First MN movement and Location Update 
                                          
        Subsequent MN's movements are handled in the same way as the 
        described in Figure 3. The only difference is highlighted in 
        Figure 4: when the HAR receives a Location Update message from a 
        new VAR, it updates its Location Cache and should send a Move 
        Notify message to the old VAR (AR2 in Figure 4) including the IP 
        address of the host. This can be needed in networks where AR2 does 
        not have an explicit indication that host has moved. When it 
        receives a Move Notify message, the VAR must delete the host-
        specific entry in its Location Update List. 
         
         
         
         
         
         
         
         
         
         
         
         
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 9] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                    
                       HAR of MN                      VAR of MN             
         +--+           +---+         +---+            +---+          +--+  
         |MN|           |AR1|         |AR2|            |AR3|          |CN|  
         +--+           +---+         +---+            +---+          +--+  
           |               |             |                |             |   
          Moves            |             |                |             |   
          to AR3           |             |                |             |   
           |               Activate (IP-MN)               |             |   
           |--------------------------------------------->|             |   
           |               |             |                |             |   
           |               |  Location Update (IP-MN,AR3) |             |   
           |               |<-----------------------------|             |   
           |               |             |                |             |   
           |           +--------+        |                |             |   
           |           |Location|        |                |             |   
           |           | Cache  |        |                |             |   
           |           | Update |        |                |             |   
           |           +--------+        |                |             |   
           |               |      Location Acknowledge    |             |   
           |               |----------------------------->|             |   
           |               |             |                |             |   
           |              Move Notify (IP-MN)             |             |   
           |               |------------>|                |             |   
           |               |             |                |             |   
           |               |   Move Ack. |                |             |   
           |               |<------------|                |             |   
           |               |             |                |             |   
           |               |      Plain data packets (no tunneling)     |   
           |               O<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|   
           |               O        HAR-VAR tunnel        |             |   
           |               O=============================>O             |   
           |               |             |                O             |   
           |<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O             |   
           |               |             |                |             |   
                                                                            
                        Figure 4 - Subsequent MN movements 














      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 10] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     5. Protocol Specification 

        This section provides the detailed description of the protocol. As 
        mentioned in the overview, the entities that are introduced in 
        this document are the Visited Access Router (VAR) and the Home 
        Anchor Router (HAR): the detailed operation of both of them is 
        described in following sections. Before that, the data structures 
        that VAR and HAR need to implement are described. 
         

     5.1. Conceptual Data Structures 

        The conceptual data structures introduced in this document are: 
        the Location Cache (LC), the Location Update List (LUL), the 
        Prefix Cache (PC) and the Active Visitors List (AVL).  
        The Location Cache must be implemented by each HAR. Its purpose 
        and format are very similar to Mobile IPv6 Binding Cache. It 
        contains an entry for each host which the node is acting as HAR 
        for. Conceptually, each Location Cache entry contains the 
        following fields: 

        o  the IP address of the host for which this is the Location Cache 
           entry; 

        o  the IP address of the VAR where the host is located. This is 
           updated based on Location Update messages received by the HAR; 

        o  a lifetime value, indicating the remaining lifetime for this 
           Location Cache entry. The lifetime value is initialized from 
           the Lifetime field in the Location Update message; 

        o  the maximum value of the Sequence Number field received in 
           previous Location Updates. 

        The Location Update List must be implemented by each VAR. Its  
        purpose and format are very similar to Mobile IPv6 Binding Update 
        List. It contains an entry for each host the Access Router acts as 
        VAR. Each Location Update List entry conceptually contains the 
        following fields: 

        o  the IP address of the host for which this is the Location 
           Update List entry; 

        o  the IP address of the HAR of the host; 

        o  the value of the Lifetime field sent in the last Location 
           Update message; 

        o  the remaining lifetime for this Location Update List entry. 
           This value is used by the VAR to schedule subsequent Location 
           Update messages; 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 11] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        o  the maximum value of the Sequence Number field sent in previous 
           Location Updates to this HAR. 

        The Prefix Cache must be implemented by each VAR. The purpose of  
        this cache is to bind network prefixes to Home Anchor Routers. It 
        is used by VARs to determine the HAR of the host that has sent an 
        activate message. Prefix Cache entries can be statically 
        configured or dynamically created based on queries to a topology 
        server or based on some other protocols. The specification of the 
        mechanisms used by Access Routers to fill this cache is out of the 
        scope of this document. Each entry of the Prefix Cache 
        conceptually contains the following fields: 
         
        o  the network prefix for which this is the Prefix Cache Entry. 
          This field is used as the key for searching the Home Anchor 
          Router of a host; 
         
        o  the IP address of node that acts as Home Anchor Router for the 
           network prefix in the Prefix field; 

        o  the remaining lifetime of that matching. 

        The Activate Visitors List must be implemented by all VARs. It 
        contains an entry for each host connected to the VAR. This list is 
        updated through activate messages and therefore can be implemented 
        as part of Neighbor Discovery specific caches (e.g. Destination 
        Cache, Neighbor Cache). This list is used if the link layer does 
        not provide any hint on the presence of the host. Conceptually, 
        each Activate Visitors List entry contains the following fields: 
         
        o  the IP address of the host the entry is related; 

        o  the time of the last hint of host's presence received by the 
           VAR; 

        o  the remaining lifetime: this field is re-initialized when the 
           VAR receives a hint of host presence. When this lifetime 
           expires, the VAR removes the entry. 

         

     5.2. Visited Access Router Operation 

     5.2.1. HAR discovery 

        When a host attaches to a new link, it sends an activate 
        notification. This notification can be a neighbor discovery 
        message (e.g. Router Solicitation) or a network trigger after the 
        authentication procedure (e.g. PANA Bind Answer, an internal 
        trigger from the AAA infrastructure) and must contain the global 
        IP address of the host. Based on the global IP address provided by 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 12] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        the host, the VAR must identify a HAR for that host. This 
        information is gathered from the Prefix Cache. The key for 
        searching this information is the network prefix of the host 
        address: since the VAR cannot be aware of the prefix length, a 
        longest prefix match approach is applied. Once the VAR has 
        identified a HAR for a host, it sends a Location Update.  
         
     5.2.2. Sending Location Updates 

        A VAR sends a Location Update message whenever a new host attaches  
        on its link or when the remaining lifetime field of a Location  
        Update List entry is going to expire. The Location Update message 
        is sent to the HAR of the host: this is discovered through the  
        procedure described in section 5.2.1 for the initial Location 
        Update and is gathered from the HAR field in the Location Update 
        List entry for subsequent Location Updates. 

        The Location Update message includes the IP address provided by 
        the host, a sequence number and a lifetime value.  

        By means of the Location Update the VAR requests the Home Anchor 
        Router to serve as the Home Anchor Router for the given IP ddress. 
        When sending the Location Update to the HAR, the VAR must also  
        create or update the corresponding Location Update List entry. The 
        last Sequence Number value sent to the HAR in a Location Update is 
        stored by the VAR in its Location Update List entry. If the 
        sending VAR has no Location Update List entry, the Sequence Number 
        should start at a random value.  

     5.2.3. Receiving Location Acknowledgements 

        When the VAR receives a Location Acknowledgement (LA) with Status 
        0 (success), it should track this in the Location Update List and 
        it must start tunneling the packets from the host to the HAR. The 
        outcome of a successful LU-LA exchange is the set up of a bi-
        directional tunnel between VAR and HAR that carries all packets 
        from/to the host. 

        When the VAR receives a Location Acknowledgement with Status 
        greater than 128 it must remove the entry in the Location Update 
        List. In particular, if the Status is 129 (DAD failed), it must 
        notify the host that the IP address currently in use is no longer 
        valid and another IP address has to be configured. The way this 
        notification is delivered depend on the access protocol employed 
        between MN and VAR (e.g. Neighbor Discovery, DHCP, PANA). 
         
     5.2.4. Packet processing 

        As mentioned before, the outcome of a LU-LA exchange is the set-up  
        of a bi-directional tunneling between the VAR and HAR. The tunnel 
        end-points are the IP address of the VAR and the IP address of the 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 13] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        HAR. The same tunnel can be shared by all hosts; in this case, 
        after a LU-LA exchange, the VAR needs only to update its 
        forwarding table so that all traffic from and to the host is 
        tunneled through the HAR. 

         

     5.3. Home Anchor Router Operation 

     5.3.1. Receiving Location Updates 

        When a HAR receives a Location Update, it validates it checking 
        that the host's IP address belongs to one of the network prefixes 
        it announces and the sequence number is a correct one.  

        If the Location Update is valid, the HAR searches in its Location 
        Cache using the host's IP address as a key. If an entry is 
        present, the HAR updates the entry. If no entry is present in the 
        Location Cache for the IP address of the host and the Location 
        Update has been validated, the HAR MUST create a new entry in its 
        Location Cache for the host. In this case, before returning the 
        Location Acknowledgement, the HAR MUST perform Duplicate Address 
        Detection. This ensures that no other node on the link is using 
        the host's address. If this Duplicate Address Detection fails for 
        the given address, then the HAR MUST reject the complete Location 
        Update, remove the Location Cache entry and MUST return a Location 
        Acknowledgement to the VAR with the Status field set to 129 (DAD 
        failed).   
         
     5.3.2. Sending Location Acknowledgements 

        If all checks performed after receiving a Location Update has been 
        successful, the HAR sends to the VAR a Location Acknowledgment 
        with Status field set to 0. 

        The HAR may refuse a Location Update. In this case it must send a 
        Location Acknowledgement with Status field greater than 128. In 
        particular, if the DAD for the IP address of the host has failed,  
        the HAR must send a Location Acknowledgement with Status 129 (DAD 
        failed).   

     5.3.3. Packet Processing 

        When the HAR has a valid Location Cache entry in its Location 
        Cache, it starts performing proxy Neighbor Discovery and defending 
        the host's IP address. Moreover, the HAR must intercept packets 
        that are addressed to the host. This is done in the same way a 
        Mobile IPv6 Home Agent intercepts Mobile Node's packets [10]. When 
        the HAR intercepts a packet to a host, it must lookup in its 
        Location Cache to get the location of the host (i.e. the VAR) and 
        must tunnel the packet to the VAR. 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 14] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        The HAR must also handle reverse tunneled packets since VAR 
        tunnels packets from the host to the HAR. The HAR must decapsulate 
        the packet and forward it to the actual destination. As in Mobile 
        IPv6, the HAR MUST verify that the Source Address in the tunnel IP 
        header is the host's IP address present in the Location Cache 
        entry. 
      












































      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 15] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     6. Allocation of a centralized HAR within the LMMD 

        The protocol described in this document can be used also in 
        network scenarios where the HAR assigned to the MN is not co-
        located with any of the available ARs, but is implemented as a 
        dedicated piece of equipment associated with the whole LMMD. 
        In this case, at power on (or the first time it enters the LMMD) 
        the MN has to be configured with an IP address belonging to the 
        "virtual link" managed by the centralized HAR. Standard Neighbor 
        Discovery (ND) cannot be used for that purpose, in that the 
        network prefix for stateless autoconfiguration is different from 
        the one announced by the AR on the access interface. Instead, 
        these are some possible suitable solutions: 

        o  the inclusion of a HAR Option in Router Advertisement (RA) 
           messages. This option, which is similar to the MAP Option 
           defined for Mobility Anchor Point discovery in HMIPv6 [10], 
           could be used to carry the IP address of the HAR and the 
           related prefix information; 

        o  the usage of standard DHCPv6; 

        o  the usage of PANA or EAP for assigning a global IPv6 address 
           during the authentication procedure for network access. In this 
           case the IPv6 address, and the correspondent HAR, to be 
           allocated to the MN can be selected by the AAA server and then 
           delivered to the MN by means of some newly defined AVPs/TLVs. 

        Maintaining one or more HARs separated from the ARs has the  
        advantage of improving location privacy, in that the IP address 
        assigned to the MN does not disclose any information on the actual 
        point of attachment of the MN within the LMMD. The drawback of 
        this architecture is that data traffic exchanged by the MN gets 
        always tunneled in the fixed network (i.e. higher overhead), since 
        the MN can never be connected to its HAR (i.e. it is attached to a 
        VAR at any time). 















      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 16] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     7. Neighbor Discovery Considerations 

        Based on the protocol described in this document the host does not 
        change its IP address after an IP handover. This implies that 
        within a Localized Mobility Management Domain the host maintains 
        the same IP address independently from its movements and its 
        actual location. This feature of the protocol may arise some 
        issues related to Neighbor Discovery and how the address 
        resolution is made by hosts.  

        When the host powers up on a link it gets an IP address specific 
        to that link. The correspondent nodes that belong to the same IP 
        link can send packets to the host directly after performing an 
        address resolution procedure based on [2]. This is true if the 
        prefixes announced by the Access Router have the bit L set, which 
        implies that the prefix is used by hosts for on-link 
        determination. When the host has moved, the scenario is similar to 
        a movement of a Mobile IPv6 MN from the home network to a foreign 
        network. The HAR starts performing Proxy Neighbor Discovery and 
        the packets to the host are intercepted by the HAR and forwarded 
        to the host itself.  

        A scenario that may arise some issues related to Neighbor 
        Discovery is the following: the host moves from one foreign 
        network to another. While in the first foreign network, the host 
        may communicate with a correspondent node located in the same 
        link. In this case, if the prefix option sent by the VAR has the L 
        bit set, the host understands that the correspondent node is in 
        the same link. Therefore, it may perform an address resolution 
        procedure with a Neighbor Solicitation and Neighbor Advertisement 
        exchange in order to get the link local address of the 
        correspondent node. In the Neighbor Solicitation message, based on 
        [2], the host MUST include its link-layer address in a Source 
        Link-Layer Address option. This implies that the correspondent 
        node is aware of the link-layer address of the host and the 
        communication takes place directly, without any involvement of the 
        VAR. However, as soon as the host moves to another link, the 
        correspondent node does not have any mechanism to quickly 
        understand that the host is no more in its link. The unique tool 
        provided by Neighbor Discovery for that purpose is the Neighbor 
        Unreachability Detection procedure [2] but it requires a large 
        amount of time that may disrupt real-time on-going communications.  

        To avoid these problems, the VAR SHOULD send Router Advertisements 
        with the L flag unset in the prefix option: this implies that 
        hosts do not perform address resolution procedures with its 
        correspondent nodes and therefore the communication always occurs 
        through the Access Router. 

        Based on the same motivations, the Access Router SHOULD NOT send 
        Redirect messages to the correspondent nodes to inform them that 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 17] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        the host is on-link. The Access Router MAY send Redirect messages 
        only if it is aware that both host and correspondent node are 
        fixed and thus the issue described above does not apply. 
















































      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 18] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     8. Host Considerations 

        The mobility management protocol specified in this document is 
        independent from the procedure followed by the mobile node to gain 
        access to the network, and is therefore applicable to several 
        deployment scenarios (ISP, enterprise, etc.). 

        Movement detection can be carried out using unsolicited Router 
        Advertisements (RAs) with Interval Option, as specified in [10], 
        or exploiting available optimizations to further reduce the 
        handoff latency, such as DNA protocol [13][14][15][18] or L2 
        triggers. 

        The impacts on the mobile node are minimal and are limited to 
        slight modifications in the way IP addresses are renewed across 
        mobility events. After any link change, a host compliant with this 
        specification SHOULD always try to keep the IP address used in the 
        previous point of attachment, unless an explicit indication to 
        release it is received from the network. 

        In order to enable this model, the employed access protocol(s) 
        MUST be compliant with the following assumptions: 

        o  it MUST be possible for the MN to request the confirmation of 
           the IP address used in a previously visited link; 

        o  it MUST be possible for the network (e.g. AR) to signal to the 
          MN that an IP address cannot be reconfirmed and has to be 
          immediately released (e.g. the MN has moved to a new LMMD). 

        Possible access protocols that fulfill these requirements include: 

        o  Neighbor Discovery (ND), eventually coupled with CGAs for 
           testing address ownership; 

        o  the usage of PANA together with DHCP. 

        A few examples showing how to use ND and/or PANA in conjunction 
        with the protocol described in this document are provided in the  
        following sections. 

        Other viable options may be the sole usage of DHCP or the 
        exploitation of L2 protocols (or triggers) specific of the radio 
        technology employed in the access network. 

         

     8.1. Access through Neighbor Discovery 

        MN bootstrap using ND can be carried out as shown in Figure 5. 

      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 19] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                            
              +--+                    +---+                     +---+       
              |MN|                    |AR1|                     |AR2|       
              +--+                    +---+                     +---+       
               |                        |                         |         
           +--------+                   |                         |         
           | Build  |                   |                         |         
           |LL addr.|                   |                         |         
           +--------+                   |                         |         
               |      NS (LL addr.)     | DAD for link-local      |         
               |----------------------->| address                 |         
               |                        |                         |         
           +--------+                   |                         |         
           | Conf.  |                   |                         |         
           |LL addr.|                   |                         |         
           +--------+                   |                         |         
               |      RS                |                         |         
               |----------------------->|                         |         
               |                        |                         |         
               | RA (Prefix-1,bit A=1,  |                         |         
               | lifetime=infinite)     | RA can be unsolicited   |         
               |<-----------------------| Valid and Preferred     |         
               |                        | lifetimes of advert.    |         
           +--------+                   | prefixes are infinite   |         
           | Build  |                   |                         |         
           | global |                   |                         |         
           +--------+                   |                         |         
               |      NS (IP-MN)        | DAD for global          |         
               |----------------------->| address                 |         
               |                        |                         |         
               |             +----------------------+             |         
               |             |Verify addr. ownership|             |         
               |             |  (if IP-MN is CGA)   |             |         
               |             +----------------------+             |         
               |                        |                         |         
               |                  +------------+                  |         
           +--------+             |Enable IP-MN|                  |         
           | Conf.  |             +------------+                  |         
           | global |                   |                         |         
           +--------+                   |                         |         
               |                        |                         |         
                                                                            
                           Figure 5 - ND: MN bootstrap 
         

        The procedure involves the following steps: 

        o  at power-on the MN builds a link-local address and performs 
           Duplicate Address Detection (DAD). If the address proves to be 
           unique, the MN configures it on its network interface; 

      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 20] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        o  MN performs router discovery sending a Router Solicitation (RS) 
          to the all routers multicast address; 

        o  AR responds with a solicited Router Advertisement (RA) 
           including one or more Prefix Options, listing the IPv6 
           prefixes that can be used by the MN to build a valid global 
           address through stateless autoconfiguration (i.e. bit A set 
           to 1). Each prefix SHOULD be advertised with Valid and 
           Preferred lifetimes set to infinite; 

        o  MN builds one or more global addresses through stateless 
           autoconfiguration and performs a DAD check for each of them; 

        o  AR uses the Neighbor Solicitation (NS) message delivered as 
           part of the DAD procedure as a trigger indicating the MN is 
           asking the activation of a specific global address (i.e. IP-MN 
           in Figure 5); 

        o  if the global address is a CGA (Cryptographically Generated 
           Address) [6], AR can use the validity check specified in [5] to 
           verify whether the MN is entitled to claim the ownership of the 
           address. Otherwise, based on policy rules defined by the 
           network administrator, the AR can decide to reject the request 
           or to accept it all the same; 

        o  upon successful verification of the address ownership, AR 
           enables the global address claimed by MN (e.g. adjustment of 
           ingress filtering rules); 

        o  at the expiration of the time-out involved by the DAD procedure 
           [3], the MN configures the global address on its network 
           interface and starts using it. 

        As long as the MN remains connected to the AR where it switched 
        on, any communication can be carried out using standard IP 
        routing, since the MN is using a topologically correct address. 
        Subsequent movements can be handled as shown in Figure 6. 
         

         

         

         

         

         

         

      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 21] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                          
             +--+                    +---+                     +---+      
             |MN|                    |AR1|                     |AR2|      
             +--+                    +---+                     +---+      
              |                        |                         |        
            Moves                      |                         |        
            to AR2                     |                         |        
              |                        |                         |        
        +------------+                 |                         |        
        |Detect loss |                 |                         |        
        |of RAs from |                 |                         |        
        |AR1 through |                 |                         |        
        |int. option |                 |                         |        
        +------------+                 |                         |        
              |        NS (AR1)        |                         |        
              |----------------->X  Neighbor Unreachability      |        
              |-------------->X     Detection (NUD) for AR1      |        
              |                        |                         |        
        +------------+                 |                         |        
        |No replies: |                 |                         |        
        |detects mov.|                 |                         |        
        +------------+                 |                         |        
              |        RS              |                         |        
              |------------------------------------------------->|        
              |        RA (Prefix-2,Flag A=1,Lifetime=Infinite)  |        
              |<-------------------------------------------------|        
              |                        |                         |        
              |        NS (IP-MN)      |                         | DAD for 
              |------------------------------------------------->| IP-MN  
              |                        |                         |        
              |                        |             +-------------------+ 
              |                        |             |Verify addr. owner.| 
              |                        |             |(if IP-MN is CGA)  | 
              |                        |             +-------------------+ 
              |                        | /---------------------\ |         
              |             AR1 is HAR |/       NETLMM          \|         
              |               for MN   |\      Protocol         /|         
              |                        | \---------------------/ |         
              |                        |                   +------------+  
              |                        |                   |Enable IP-MN|  
              |                        |                   +------------+  
              |                        |                         |         
                                                                           
                             Figure 6 - ND: mobility 
         






      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 22] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        The procedure involves the following steps: 

        o  MN detects the movement as described in [10], and therefore, 
           after having discovered the loss of a sequence of RAs, performs 
           Neighbor Unreachability Detection (NUD) for the previous AR. 
           Other approaches for movement detection may be suitable as well 
           and the choice does not impact on the rest of the procedure; 

        o  MN performs router discovery on the new link sending a Router 
           Solicitation (RS) to the all routers multicast address; 

        o  the AR available on the new link (i.e. AR2 in the example of 
           Figure 6) responds with a solicited Router Advertisement (RA) 
           including one or more Prefix Options. Optionally the MN can use 
           this fresh prefix information to build one or more 
           topologically valid global addresses through stateless 
           autoconfiguration; 

        o  MN signals that it is willing to keep the previous global 
           address performing a new DAD check for it. Optimistic DAD 
           solutions [16] can be applied to shorten DAD latency and enable 
           fast handovers; 

        o  at the reception of the NS sent out as part of the DAD 
           procedure, the AR verifies the ownership of the global address 
           claimed by the MN (if the address is a CGA) and then triggers 
           the NETLMM Protocol to adjust host routing within the Localized 
           Mobility Management Domain (LMMD). The HAR of the MN is the AR 
           where the MN switched on (i.e. AR1 in the example of Figure 6); 

        o  if the NETLMM protocol completes successfully, the AR enables 
           the global address and the MN can start using it for exchanging 
           data traffic with its correspondents. 

     8.2. Access through PANA/DHCP 

        In case the MN has to authenticate itself for gaining network 
        access and the authentication procedure is carried out relaying on 
        PANA [17], the bootstrap phase can be handled as described in 
        Figure 7. The procedure involves the following steps: 

        o  at power-on the MN undertakes a full PANA authentication. The 
           MN is the PANA Authentication Client (PAC) and the AR is the 
           PANA Authentication Agent (PAA). The PAA works as a pass-
           through for EAP authentication, that involves the PAC and a 
           backend AAA server; 

        o  at the end of the authentication phase, the backend AAA server 
           verifies if the MN has to be handled using the NETLMM protocol. 
           This check can be performed based on the subscription 
           information included in the user service profile; 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 23] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        o  if NETLMM protocol has to be enabled, the AAA server selects a 
           suitable HAR and allocates a global address. The selected HAR 
           can be co-located on the AR visited by the MN or can be a 
           dedicated machine located somewhere else within the LMMD; 

        o  the AAA server communicates to the AR the global address 
           allocated to the MN (and related lifetimes) inserting a NETLMM 
           AVP in the RADIUS (or Diameter) Access-Accept message. This AVP 
           may optionally include also the address of the correspondent 
           HAR, so that the AR does not have to discover it afterwards; 

        o  at the reception of the Access-Accept message, the AR delivers 
           to the MN a PANA-Bind-Request including a Post PANA Address 
           Configuration (PPAC) AVP [17]. The Flag D included in the PPAC 
           AVP is set to 1, indicating that the MN is expected to 
           configure a Post PANA Address using DHCP; 

        o  the MN responds with a PANA-Bind-Answer and then, as mandated 
           by the previous PANA-Bind-Request, undertakes a DHCP handshake 
           to get a valid global address; 

        o  the AR works as a local DHCP server and offers to the MN the 
           global address previously received from the AAA server; 

        o  the MN confirms that it is willing to accept the configuration 
           offered by the AR in the DHCP Request; 

        o  at the reception of the DHCP Request, the AR activates the 
           NETLMM protocol to adjust host routing within the LMMD; 

        o  if the NETLMM protocol terminates successfully, the AR enables 
           the global address assigned to the MN (e.g. tuning of ingress 
           filtering policies) and sends the DHCP Reply. 

         

         

         

         

         

         

         

         

         
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 24] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                               
        +--+                 +---+        +---+            +---+     +---+   
        |MN|                 |AR1|        |AR2|            |AAA|     |HAR|   
        +--+                 +---+        +---+            +---+     +---+   
         |  PANA Start Req.    |            |                |         |     
         |<--------------------|            |                |         |     
         |  PANA Start Answ.   |            |                |         |     
         |-------------------->|            |                |         |     
         | /-----------------\ | /-------------------------\ |         |     
         |/  PANA authentic.  \|/          RADIUS           \|         |     
         |\  (N round trips)  /|\        or Diameter        /|         |     
         | \-----------------/ | \-------------------------/ |         |     
         |                     |            |                |         |     
         |  PANA-Auth-Answer   |            |                |         |     
         |  (EAP-Response)     |   RADIUS Access-Request     |         |     
         |-------------------->|      (EAP-Response)         |         |     
         |                     |---------------------------->|         |     
         |                     |            |             +---------+  |     
         |                     |            |             |Authoriz.|  |     
         |                     |            |             | & addr. |  |     
         |  PANA-Bind-Request  |   RADIUS Access-Accept   |selection|  |     
         | (EAP-Success,PPAC   |  (EAP-Success,NETLMM AVP)+---------+  |     
         |  with Flag D=1)     |<---------------|------------|         |     
         |<--------------------|            |   |            |         |     
         |  PANA-Bind-Answer   |            |   |   +--------------+   |     
         |-------------------->|            |   |   |IP address    |   |     
         |  DHCP Solicit       |            |   +-->|to be assigned|   |     
         |-------------------->|            |       |to MN (IP-MN) |   |     
         |  DHCP Advertise     |            |       +--------------+   |     
         |<--------------------|            |                |         |     
         |  DHCP Request       |            |                |         |     
         |-------------------->|            |                |         |     
         |                     | /-----------------------------------\ |     
         |                     |/              NETLMM                 \|     
         |                     |\             Protocol                /|     
         |                     | \-----------------------------------/ |     
         |               +------------+     |                |         |     
         |               |Enable IP-MN|     |                |         |     
         |  DHCP Reply   +------------+     |                |         |     
         |<--------------------|            |                |         |     
         |                     |            |                |         |     
                                                                             
                        Figure 7 - PANA/DHCP: MN bootstrap 
         

        Any subsequent movement of the MN can be handled as depicted in 
        Figure 8. The procedure involves the following steps: 

        o  after having attached to a new link, the MN has to repeat the 
           PANA authentication procedure; 

      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 25] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        o  as part of the authorization phase, the AAA server verifies 
           whether the new AR (i.e. the PAA) is located within the same 
           LMMD from which the previous access took place. If this is the 
           case, the AAA server delivers to the new AR (through the NETLMM 
           AVP) the IP address that was previously allocated to the MN. 
           Otherwise, the AAA server allocates to the MN a new global 
           address valid within the new LMMD; 

        o  the MN tries to keep the same IP address used in the previous 
           link sending a DHCP Confirm; 

        o  at the reception of the DHCP Confirm, the AR verifies whether 
           the IP address claimed by the MN is the same received from the 
           AAA infrastructure. If this is the case, the AR activates the 
           NETLMM protocol, enables the address and delivers a successful 
           DHCP Reply to the MN. 

                                                                             
        +--+                 +---+        +---+            +---+     +---+   
        |MN|                 |AR1|        |AR2|            |AAA|     |HAR|   
        +--+                 +---+        +---+            +---+     +---+   
         |                     |            |                |         |     
        Moves                  |            |                |         |     
        to AR2                 |            |                |         |     
         | /------------------------------\ | /------------\ |         |     
         |/              PANA              \|/   RADIUS or  \|         |     
         |\             session            /|\   Diameter   /|         |     
         | \------------------------------/ | \------------/ |         |     
         |                     |            |                |         |     
         |       DHCP Confirm (IP-MN)       |                |         |     
         |--------------------------------->|                |         |     
         |                     |            | /----------------------\ |     
         |                     |            |/        NETLMM          \|     
         |                     |            |\        Protocol        /|     
         |                     |            | \----------------------/ |     
         |                     |      +------------+         |         |     
         |                     |      |Enable IP-MN|         |         |     
         |       DHCP Reply    |      +------------+         |         |     
         |<---------------------------------|                |         |     
         |                     |            |                |         |     
                          Figure 8 - PANA/DHCP: mobility 










      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 26] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     9. Packets Formats 

        To be completed. 
         















































      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 27] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     10. Security Considerations 

        Location Update and Location Acknowledgement messages MUST be 
        authenticated, integrity protected and optionally encrypted. IPsec 
        MUST be used between HAR and VAR to protect the protocol 
        signaling. The IPsec Security Associations shared by the ARs may 
        be configured manually or dynamically set-up. Moreover, as 
        mentioned in the draft, each IPsec Security Association can be 
        used for traffic related to any MN since it is not MN-specific. 
        This limits the number of SAs required by the protocol. 
         
        This document does not specify a protocol for the interface 
        between the Mobile Node and the Access Router. Some examples 
        (Neighbor Discovery and PANA/DHCPv6) to implement this interface 
        have been provided in this document but a deep security analysis 
        has not been performed. 
         
        Nonetheless, since any NETLMM solution implies that the MN does 
        not change its IP address while moving across Access Routers that 
        belong to the same LMMD, some generic issues related to MN-AR 
        interface may arise. In particular, the Activate message, that is 
        used by the MN  
        to trigger NETLMM protocol operation, MUST be authenticated. 
        Moreover, the Access Router must be sure that the IP address  
        provided by the MN in the Activate Message has not been spoofed 
        and is owned by the MN itself. Cryptographically Generated 
        Addresses may be useful for this purpose but a AAA-based solution 
        should be also investigated. It is worthwhile to mention that 
        these issues are not specific to this NETLMM protocol, but apply 
        to any NETLMM solution. 
         
         
         


















      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 28] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     11. References 

     11.1. Normative References 

        [1]   Bradner, S., "Key words for use in RFCs to Indicate 
              Requirement Levels", BCP 14, RFC 2119, March 1997. 

        [2]   Narten, T., Nordmark, E., Simpson, W., Soliman, H., 
              "Neighbor Discovery for IP version 6 (IPv6)", Internet-
              Draft, draft-ietf-ipv6-2461bis-04, July 2005. 

        [3]   Thomson, S., Narten, T., Jinmei, T., "IPv6 Stateless 
              Address Autoconfiguration", Internet-Draft, draft-ietf-
              ipv6-rfc2462bis-08, May 2005. 

     11.2. Informative References 

        [4]   Manner, J., Kojo, M., "Mobility Related Terminology", RFC 
              3753, June 2004. 

        [5]   Arkko, J., Kempf, J., Zill, B., Nikander, P., "SEcure 
              Neighbor Discovery (SEND)", RFC 3971, March 2005. 

        [6]   Aura, T., "Cryptographically Generated Addresses (CGA)", 
              RFC 3972, March 2005. 

        [7]   Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., 
              Carney, M., "Dynamic Host Configuration Protocol for IPv6 
              (DHCPv6)", RFC 3315, July 2003. 

        [8]   Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, 
              G., Liebsch, M., "Problem Statement for IP Local Mobility", 
              Internet-Draft, draft-kempf-netlmm-nohost-ps-00, June 2005. 

        [9]   Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, 
              G., Liebsch, M., "Requirements and Gap Analysis for IP 
              Local Mobility", Internet-Draft, draft-kempf-netlmm-nohost-
              req-00, July 2005. 

        [10]  Johnson, D., Perkins, C. and J. Arkko, "Mobility Support in 
              IPv6", RFC 3775, June 2004. 

        [11]  Koodli, R., "Fast Handovers for Mobile IPv6", RFC 4068, 
              July 2005. 

        [12]  Soliman, H., Castelluccia, C., El Malki, K., Bellier, L., 
              "Hierarchical Mobile IPv6 mobility management (HMIPv6)", 
              RFC 4140, August 2005. 

        [13]  Choi, J., Nordmark, E., "DNA solution framework", Internet-
              Draft, draft-ietf-dna-soln-frame-00, April 2005. 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 29] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        [14]  Narayanan, S., Daley, G., Montavont, N., "Detecting Network 
              Attachment in IPv6 - Best Current Practices for hosts", 
              Internet-Draft, draft-ietf-dna-hosts-01, June 2005. 

        [15]  Choi, J., Nordmark, E., "DNA with unmodified routers: 
              Prefix list based approach", Internet-Draft, draft-ietf-
              dna-cpl-01, April 2005. 

        [16]  Moore, N., "Optimistic Duplicate Address Detection for 
              IPv6", Internet-Draft, draft-ietf-ipv6-optimistic-dad-05, 
              February 2005. 

        [17]  Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., Yegin, 
              A., "Protocol for Carrying Authentication for Network 
              Access (PANA)", Internet-Draft, draft-ietf-pana-pana-10, 
              July 2005. 

        [18]  Kempf, J., Narayanan, S., Nordmark, E., Pentland, B., 
              "Detecting Network Attachment in IPv6 Networks (DNAv6)", 
              Internet-Draft, draft-pentland-dna-protocol-01, July 2005. 

      





























      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 30] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     12. Appendix A: Support for Route Optimization 

        The basic protocol operation described in the previous sections 
        may lead to sub-optimized routing paths, since data traffic 
        addressed to a MN connected to a Visited Access Router (VAR) is 
        always forwarded by the MN's Home Anchor Router (HAR). If the 
        Localized Mobility Management Domain (LMMD) is very large, such as 
        in the case of an LMMD spanning the whole network of an operator, 
        this sub-optimal routing may generate an unacceptable increase in 
        the end-to-end transfer latency as well as a significant waste of 
        network resources. 

        In order to solve these performance issues, the proposed protocol 
        architecture has been extended with a route optimization 
        procedure, that can be used to promptly switch to the shortest 
        routing path, limiting transit through HAR to the first few data 
        packets exchanged between MN and CN. 

        The performance improvements of the route optimization procedure 
        may depend on the network topology: if the HAR is not co-located 
        with an Access Router (as described in section 6.1) and a star 
        network topology is in place, it is possible that all packets are 
        routed to the HAR anyway and therefore the route optimization 
        procedure does not involve any performance improvement. 

         

     12.1. Basic Operation 

        The basic route optimization procedure is shown in Figure 9. 

        The first data packet transmitted from CN to MN is delivered using 
        standard IP routing and therefore gets to MN's HAR, which tunnels 
        it to MN's VAR. The need to perform forwarding through tunneling 
        is treated by MN's HAR as an explicit indication that the origin 
        of data traffic is not aware of the actual location visited by the 
        MN. This triggers the route optimization procedure.Inspecting the 
        source of received data packets, MN's HAR identifies the IP 
        address of the CN. This information is used to discover the edge 
        router that is injecting into the LMMD the data flow coming  
        from the CN. This edge router can be: 

        o  the Access Router (AR) the CN is attached to, if the CN is an 
           internal node connected to the same LMMD of the MN (this is the 
           assumption made in the example of Figure 9), 

        o  or a Border Gateway (BG), if the CN is a node located in an 
           external network. 

        How to carry out this discovery procedure is out of the scope of 
        the present specification. Possible technical approaches include: 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 31] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        o  manual configuration on all ARs and BGs; 

        o  wild-card search within a data-base maintaining the list of 
           available prefixes and correspondent HARs; 

        o  exploitation of topology information advertised within the 
           routing protocol (e.g. iBGP, OSPF). 

                                                                             
                 HAR or MN    VAR of MN                                      
        +--+       +---+        +---+                     +---+       +--+   
        |MN|       |AR1|        |AR2|                     |AR4|       |CN|   
        +--+       +---+        +---+                     +---+       +--+   
         |           |            |                         |          |     
         |           |     First data packet from CN (no tunneling)    |     
         | Triggers  O<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O<~~~~~~~~~|     
         | delivery  O   Tunnel   |                         |          |     
         |  or RU    O===========>O                         |          |     
         |           |            O                         |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~O                         |          |     
         |           |            |                         |          |     
         |           |   Route Update (IP-CN,IP-MN,AR2)     | Explicit |     
         |           |------------------------------------->| ack. not |     
         |           |            |                         | needed   |     
         |           |            |                         |          |     
         |   Plain data packets   |         Tunnel          |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~O<========================O<~~~~~~~~~|     
         |           |            |                         |          |     
                                                                             
                  Figure 9 - Route optimization: basic operation 
         
        After the identification of the edge router on the CN side (i.e. 
        the CN's AR, if the CN is located in the same LMMD of the MN, or 
        the CN BG, if the CN is located in an external network), MN's HAR 
        sends to it a Route Update (RU) message containing: 

        o  the IP address of the CN that triggered the route optimization 
           procedure; 

        o  the IP address of the host; 

        o  the IP address of the current host's VAR (AR2 in the example of 
           Figure 9). 

        This Route Update message does not need to be explicitly 
        acknowledged, in that, in case it gets lost, retransmissions are 
        automatically triggered by the continuous arrival of non route 
        optimized data packets on MN's HAR. 

        At the reception of the RU message, the edge router on the CN side 
        stores its content in a local cache and begins to tunnel data  
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 32] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        packets addressed to the MN directly to the MN's VAR (i.e. the 
        current visited location), thus restoring the shortest routing 
        path. This local cache is similar to the Binding Cache that Mobile 
        IPv6 correspondent nodes implement. 

        It is important to note that the location information contained in 
        the Route Update message can be applied to any CN willing to 
        establish a communication session with the MN, and not only to the 
        one that triggered the route optimization procedure on the host's 
        HAR. This approach has the following advantages: 

        o  reduction of signaling overhead, since it is not necessary to 
           trigger the delivery of a fresh Route Update any time the MN 
           starts a new communication session. Instead, all the CNs 
           communicating with the MN through the same edge router can 
           share the location information included in the first Route 
           Update received from the MN's HAR; 

        o  minimization of memory consumption on the edge routers, since 
           they are not required to maintain any specific state related to 
           the CN's the MN is communicating with. 

        In case the CN is a mobile host, by just inspecting the source of 
        received data traffic the MN's HAR can discover CN's HAR, but 
        cannot figure out whether the CN is at home or attached to a VAR. 
        Therefore as shown in Figure 10, the MN's HAR always sends the 
        Route Update message to the CN's HAR. If the CN happens to be 
        visiting a VAR, the CN's HAR looks up the actual location of the 
        correspondent node in its Location Cache (LC) and immediately 
        forwards the Route Update received from the MN's HAR to the CN's 
        VAR. This allows to complete the route optimization procedure 
        regardless of the actual position of the CN and without the need 
        to disclose it to the MN's HAR. 

        MN's HAR retransmits Route Update messages at regular intervals, 
        in order to refresh location information on the receiving party. 
        Edge routers are expected to immediately remove any Route 
        Optimization state related to the MN at the expiration of its 
        lifetime. This causes the restoration of traffic routing through 
        the MN's HAR (i.e. anchor-based routing). 

         
         
         
         
         
         
         
         
         
         
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 33] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                             
                 HAR or MN    VAR of MN    HAR of CN    VAR of CN            
        +--+       +---+        +---+        +---+        +---+       +--+   
        |MN|       |AR1|        |AR2|        |AR4|        |AR5|       |CN|   
        +--+       +---+        +---+        +---+        +---+       +--+   
         |           |            |            |            |          |     
         |           |     First data packet from CN (no tunneling)    |     
         | Triggers  O<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O<~~~~~~~~~|     
         | delivery  O   Tunnel   |            |            |          |     
         |  or RU    O===========>O            |            |          |     
         |           |            O            |            |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~O            |            |          |     
         |           |            |            |            |          |     
         |           |  RU (IP-CN,IP-MN,AR2)   |            |          |     
         |           |------------------------>|            |          |     
         |           |            |        +------+         |          |     
         |           |            |        |Lookup|         |          |     
         |           |            |        |in LC |         |          |     
         |           |            |        +------+         |          |     
         |           |            |            |            |          |     
         |           |            |         RU (IP-CN,IP-MN,AR2)       |     
         |           |            |            |----------->|          |     
         |           |            |            |            |          |     
         |   Plain data packets   |        Tunnel           |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~O<========================O<~~~~~~~~~|     
         |           |            |            |            |          |     
                                                                             
            Figure 10 - Route optimization: mobile CN roaming in a VAR 

                                          

     12.2. Management of host movements 

        In order not to break route optimization any time the host moves 
        to a new location, the MN's HAR proactively re-transmits Route 
        Update messages whenever it receives a Location Update showing 
        that the MN has attached to a new VAR (see Figure 11).For that 
        purpose, the host's HAR is required to keep a local cache listing 
        all the CNs that have triggered route optimization towards the MN. 
        This cache is similar to the Binding Update List that a Mobile 
        IPv6 Mobile Node must implement for route optimization operation. 
         
         
         
         
         
         
         
         
         
         
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 34] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                            
                 HAR or MN     Old VAR      New VAR                          
        +--+       +---+        +---+        +---+        +---+       +--+   
        |MN|       |AR1|        |AR2|        |AR3|        |AR4|       |CN|   
        +--+       +---+        +---+        +---+        +---+       +--+   
         |           |            |            |            |          |     
         |  Plain data packets    |        Tunnel           |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~O<========================O<~~~~~~~~~|     
        Moves        |            |            |            |          |    
        to AR3       |            |            |            |          |     
         |         Activate (IP-MN)            |            |          |     
         |------------------------------------>|            |          |     
         |           |            |            |            |          |     
         |           |       LU (IP-MN,AR3)    |            |          |     
         |           |<------------------------|            |          |     
         |           |            |            |            |          |     
         |           |        LA  |            |            |          |     
         |           |------------------------>|            |          |     
         |           |            |            |            |          |     
         |           |    Route Update (IP-CN,IP-MN,AR3)    |          |     
         |           |------------------------------------->|          |     
         |           |            |            |            |          |     
         |    Plain data packets  |            |    Tunnel  |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O<===========O<~~~~~~~~~|     
         |           |            |            |            |          |     
                                                                             
            Figure 11 - Route optimization: management of MN movements 
         
        The MN's HAR stops proactive re-transmission of Route Update  
        messages for a specific CN when it discovers that the 
        communication session between MN and CN is terminated. Since with 
        route optimization in place MN's HAR is not traversed by data 
        traffic, this is done under explicit indication of the edge router 
        on the CN side (i.e. AR or BG), that is required to continuously 
        monitor the traffic exchanged with the MN. 

        When the time elapsed since the last data packet sent to the MN, 
        or received from the MN, overcomes a certain activity threshold, 
        the edge router on the CN side replies to the Route Update with a 
        Route Acknowledgement indicating that there are no on-going 
        communications with the MN. At the reception of such an 
        indication, the MN's HAR immediately stops the delivery of 
        unsolicited RUs towards that edge router, and removes from its 
        local cache all the state related to the CN. 

     12.3. Recovery from error conditions 

        When operating in route optimization, the location information  
        stored on the CN's edge router may happen to become outdated. In  
        this case, data traffic generated by the CN gets erroneously  
        tunneled to a VAR where the MN is no longer present. 
      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 35] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

        This routing anomaly may occur at least in the following cases: 

        o  the MN moves to a new location but the proactive Route Update 
           (RU) message sent by MN's HAR gets lost (as shown in the 
           example of Figure 12). In this case, the CN's edge router 
           continues to tunnel data packets to the old VAR, since it 
           cannot detect that the MN has left it; 

        o  route optimization on a specific edge router has been triggered 
           by a CN that afterwards has moved to a new location. In this 
           case the MN's HAR stops delivering proactive Route Update 
           messages to that edge router, whose location state may 
           therefore become outdated if the MN changes its point of 
           attachment. As a consequence, if a new CN starts communicating 
           with the MN from that edge router before the expiration of its 
           outdated route optimization state, data traffic gets 
           erroneously delivered to the old MN's VAR. 

        The solution that has been designed to recover from this routing 
        anomaly is shown in Figure 12. If a VAR (AR2 in the example)  
        receives tunneled data packets addressed to a MN that has moved  
        away, it decapsulates the packets and forwards them using standard  
        IP routing. As a consequence, the traffic gets to the MN'HAR that, 
        after tunneling it to the right VAR, triggers the route 
        optimization procedure. This involves the immediate delivery of 
        fresh Route Update towards the CN's edge router, which causes it 
        to adjust its route optimization state, thus recovering the 
        shortest routing path. 

        This approach ensures that data traffic sent from CN to MN is 
        always delivered to the destination, even when outdated route 
        optimization state is stored on some edge routers. The drawback is 
        that for short transition periods the routing path followed by 
        data packets may become sub-optimized, causing additional jitter 
        and, depending on network topology and transfer delays, potential 
        out of sequence delivery. 

         

         

         

         

         

         

         

      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 36] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

                                                                             
                 VAR or MN     Old VAR      New VAR                          
        +--+       +---+        +---+        +---+        +---+       +--+   
        |MN|       |AR1|        |AR2|        |AR3|        |AR4|       |CN|   
        +--+       +---+        +---+        +---+        +---+       +--+   
         |           |            |            |            |          |     
         |   Plain data packets   |        Tunnel           |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~O<========================O<~~~~~~~~~|     
        Moves        |            |            |            |          |     
        to AR3       |            |            |            |          |     
         |         Activate (IP-MN)            |            |          |     
         |------------------------------------>|            |          |     
         |           |      LU (IP-MN)         |            |          |     
         |           |<------------------------|            |          |     
         |           |         LA |            |            |          |     
         |           |------------------------>|            |          |     
         |           |            |            |            |          |     
         |           |    RU (IP-MN,IP-CN,AR3) |            |          |     
         |           |------------------------------->X     |          |     
         |           |            |            |  RU does   |          |     
         |           | Move Notify|            |  not get   |          |     
         |           |----------->|            |  to AR4    |          |     
         |           |  Move Ack. |            |            |          |     
         |           |<-----------|     AR4 continues to    |          |     
         |           |            |  tunnel packets to AR2  |          |     
         |  Triggers O<~~~~~~~~~~~O<========================O<~~~~~~~~~|     
         |  delivery O            |            |            |          |     
         |  of RU    O========================>O            |          |     
         |           |            |            O            |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O            |          |     
         |           |            |            |            |          |     
         |           |    RU (IP-MN,IP-CN,AR3) |            |          |     
         |           |------------------------------------->|          |     
         |           |            |            |            |          |     
         |         Plain data packets          |   Tunnel   |          |     
         |<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~O<===========O<~~~~~~~~~|     
         |           |            |            |            |          |     
                                                                             
             Figure 12 - Route optimization: recovery from loss of RU 












      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 37] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

      

     Authors' Addresses 

        Gerardo Giaretta 
        Telecom Italia Lab 
        via Reiss Romoli 274 
        10148 Torino 
        Italy 
            
        Phone: +39 011 228 6904 
        Email: gerardo.giaretta@tilab.com 
         
         
         
        Ivano Guardini 
        Telecom Italia Lab 
        via Reiss Romoli 274 
        10148 Torino 
        Italy 
            
        Phone: +39 011 228 5424 
        Email: ivano.guardini@tilab.com 
         
         
         
        Elena Demaria 
        Telecom Italia Lab 
        via Reiss Romoli 274 
        10148 Torino 
        Italy 
            
        Phone: +39 011 228 5403 
        Email: elena.demaria@tilab.com 
         

      
      
      
         











      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 38] 
         






     Internet-Draft             NETLMM Protocol               October 2005 
         

     Intellectual Property Statement 

        The IETF takes no position regarding the validity or scope of any 
        Intellectual Property Rights or other rights that might be claimed  
        to pertain to the implementation or use of the technology 
        described in this document or the extent to which any license 
        under such rights might or might not be available; nor does it 
        represent that it has made any independent effort to identify any 
        such rights.  Information on the procedures with respect to rights 
        in RFC documents can be found in BCP 78 and BCP 79. 

        Copies of IPR disclosures made to the IETF Secretariat and any 
        assurances of licenses to be made available, or the result of an 
        attempt made to obtain a general license or permission for the use  
        of such proprietary rights by implementers or users of this 
        specification can be obtained from the IETF on-line IPR repository  
        at http://www.ietf.org/ipr. 

        The IETF invites any interested party to bring to its attention 
        any copyrights, patents or patent applications, or other 
        proprietary rights that may cover technology that may be required 
        to implement this standard.  Please address the information to the 
        IETF at ietf-ipr@ietf.org 

     Disclaimer of Validity 

        This document and the information contained herein are provided on  
        an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE 
        REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND 
        THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, 
        EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT 
        THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR 
        ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A 
        PARTICULAR PURPOSE. 

     Copyright Statement 

        Copyright (C) The Internet Society (2005). 

        This document is subject to the rights, licenses and restrictions 
        contained in BCP 78, and except as set forth therein, the authors 
        retain all their rights. 

     Acknowledgment 

        Funding for the RFC Editor function is currently provided by the 
        Internet Society. 




      
      
     Giaretta, et al.        Expires April 14, 2006             [Page 39]