Internet DRAFT - draft-kempf-mipshop-nhood-discovery

draft-kempf-mipshop-nhood-discovery





                                                                James Kempf 
  Internet Draft                                            DoCoMo Labs USA 
  Document: draft-kempf-mipshop-nhood-discovery-00.txt        Rajeev Koodli 
                                                             Nokia Research 
                                                                     Center 
  Expires: December, 2005                                        June, 2005 
      
      
                  NEighborhood Discovery (NED) for Wireless Networks  
      
  Status of this Memo 
   
     By submitting this Internet-Draft, each author represents that any 
     applicable patent or other IPR claims of which he or she is aware have been 
     or will be disclosed, and any of which he or she becomes aware will be 
     disclosed, in accordance with Section 6 of BCP 79.  
      
     Internet-Drafts are working documents of the Internet Engineering Task Force 
     (IETF), its areas, and its working groups. Note that other groups may also 
     distribute working documents as Internet-Drafts.  
      
     Internet-Drafts are draft documents valid for a maximum of six months and 
     may be updated, replaced, or obsoleted by other documents at any time. It is 
     inappropriate to use Internet-Drafts as reference material or to cite them 
     other than as "work in progress."  
   
     The list of current Internet-Drafts can be accessed at 
     http://www.ietf.org/ietf/1id-abstracts.txt.  
   
     The list of Internet-Draft Shadow Directories can be accessed at 
     http://www.ietf.org/shadow.html. 
   
  Abstract 
      
     In wireless networks, there is a need to discover what types of 
     networks are around a particular node. This need arises both when a 
     node connects initially to a network and when a node needs to perform 
     handover. Characteristics such as type of wireless technology, service 
     provider, bandwidth availability, etc. may all be of interest in making 
     a network connection or handover decision. In addition, a mobile node 
     may require a mapping between the Layer 2 access point identifier and 
     IP link information such as the Mobile IPv4 foreign agent address, or 
     IPv6 access router address and subnet prefixes, so that the node can 
     configure itself for the new IP link prior to moving. This document 
     describes the Neighborhood information Elements Discovery (NED) 
     protocol, for representing information elements that contain 
     neighborhood information. The packet format presented in this document 
     is independent of transport so that multiple mobility protocols can 
     make use of it.  
   
  Table of Contents 
   
     1.0  Introduction.....................................................2 
     2.0  Previous Work....................................................3 

      
     Kempf & Koodli          Expires December, 2005                      [Page 1] 

     Internet Draft              NED                                   June, 2005 
      
     3.0  Potential Uses...................................................5 
     4.0  Neighborhood Discovery Protocol Overview.........................6 
     5.0  Protocol Messages................................................7 
     6.0  Security Considerations.........................................13 
     7.0  IANA Considerations.............................................13 
     8.0  Normative References............................................13 
     9.0  Informative References..........................................14 
     10.0 Author Information..............................................14 
     11.0 IPR Statements..................................................14 
     13. Disclaimer of Validity...........................................15 
     14. Copyright Notice.................................................15 
      
   
   1.0    Introduction 
      
     With wireless networks increasing in heterogeneity and availability, 
     nodes must be able to discover what types of network connectivity are 
     available to them. Example characteristics of a network that influence 
     whether a mobile node chooses to connect to that network include 
     whether the type of link technology matches one of the network 
     interface cards on the node, whether the user has credentials for 
     authenticating with the offered network service provider(s), or whether 
     the available bandwidth on the network matches what the node needs for 
     expected application use, etc. The connection decision might be an 
     initial decision, about whether to actually connect with the network, 
     or it might be a handover decision, about whether to switch to a new 
     network link type from an existing one. 
      
     An example of such a network available today is an 802.11 WLAN hotspot 
     network with multiple service providers sharing access points, and with 
     multiple types of 802.11 link service available (a, b, and g). The 
     hotspot network could additionally be overlaid on multiple wide-area 
     GPRS networks run by multiple different cellular carriers, some of whom 
     also offer service on the hotspot network. Perhaps the cellular 
     carriers also share UMTS base stations as they do with 802.11 access 
     points. In the future, the widespread availability of interfaces for 
     802.11 next generation networks, 802.16 WiMax, and 802.15 device 
     networks on laptops and portable devices may add to the complexity of 
     network choices facing a node and its user. 
      
     In addition, the ability of a wireless node to optimize handover at the 
     IP layer may require information on neighboring IP links prior to 
     handover. For example, the wireless node may require information on IP 
     link configuration information, such as the link layer address of the 
     access router, or it may require security information about the router, 
     such as a router certificate. This information can be used to 
     preconfigure the node for the new link prior to handover, and thereby 
     expedite handover by reducing the signaling needed to obtain 
     connectivity on the new link. If this information is not available to 
     the wireless node prior to handover, the performance of IP handover can 
     be severely impacted. 
      
      
     Kempf & Koodli         Expires December 2005                       [Page 2] 

     Internet Draft              NED                                   June, 2005 
      
     In this document, we describe a transport independent network 
     information representation format that allows a node to discover 
     information about surrounding networks using a suitable transport 
     protocol. The format is designed so that, like the Extensible 
     Authentication Protocol [RFC3748], it can be used over a Layer 2.5 as 
     well as a Layer 3 transport. The protocol can also be used between 
     network elements, such as routers, switches, and access points, to 
     exchange information about these IP links. Because the protocol allows 
     nodes to discover information about their neighborhoods between subnets 
     the framework is called the Neighborhood information Elements Discovery 
     (NED).  
      
  1.1 Terminology 
      
     Mobility related terminology is taken from RFC 3773 [RFC3773].  
      
     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
     "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
     document are to be interpreted as described in RFC 2119 [RFC2119]. 
      
     Additional terminology is the following: 
      
     IP link 
       A collection of IP nodes connected via a broadcast domain and 
       including routing capability to the Internet or an outside network. 
       In IPv4, this is often called a "subnet" but since IPv6 allows 
       multiple subnet prefixes to be assigned to a single link, the term 
       "IP link" is more accurate. 
      
   2.0    Previous Work 
      
     A majority of the network selection decisions today are based on three 
     criteria: 
      
     1) In an initial attachment scenario, does the node have an active 
        network interface card that can passively read or actively scan for 
        a beacon from an access point, and does that beacon contain Layer 2 
        network identifying information appropriate to the node? In 802.11 
        WLAN networks, the Layer 2 network identifying information is the 
        SSID. 
     2) In an initial attachment scenario, does the node have credentials 
        available to authenticate with one of the service providers offering 
        network access, and, if the node has credentials with more than one 
        service provider, which is the most appropriate for the user's task 
        set? These criteria involve decision making based on network access 
        authentication and are discussed in [EAPSEL]. 
     3) In a handover scenario, which access point supporting the link 
        technology currently in use by the node exhibits the best signal 
        strength or other Layer 2 criteria for the node? For some wireless 
        link technologies and implementations, the measurement and handover 
        decision is embodied in the interface card firmware and not subject 
        to any involvement by higher layers in the network stack; while for 
        others, it is feasible for higher layer policy to control the 
        handover decision. 
      
     Kempf & Koodli         Expires December 2005                       [Page 3] 

     Internet Draft              NED                                   June, 2005 
      
      
     These criteria need to be contrasted with the design goals of this 
     document. 1) involves decision making that, while automated at a higher 
     level on some laptops today, nevertheless involves link layer criteria 
     of fairly limited semantic scope. 2) involves an initial authentication 
     decision that is determined by pre-configuration on the node and the 
     user's task set. 3) involves fast decision making at the link level 
     based on the characteristics of the wireless connection between the 
     node and access point that have nothing to do with higher level 
     criteria.  
      
     The existing experimental IETF protocols were developed to extend this 
     basic neighborhood discovery scenario to include the following two 
     functions: 
      
     1) Provide basic information whereby the L2 addresses of access points 
        in neighboring subnets obtained through "scans" can be resolved to 
        subnet information sufficient to pre-configure the wireless node for 
        the neighboring IP subnet. Such a pre-configuration can accelerate 
        IP handover. The pre-configured L2 information is typically the L2 
        address of an access router in the neighboring subnet, and the pre-
        configured L3 information includes foreign agent address for Mobile 
        IPv4 [MIP4], subnet prefix for IPv6 [MIP6] in order to do address 
        auto-preconfiguration, or access router certificate for SEND [SEND] 
        to avoid having to obtain the certificate after handover. 
     2) Provide more advanced information about neighboring subnets that, 
        together with some policy constraints on the wireless node, guide 
        the handover decision-making. Examples of such information are the 
        identity of the service providers, cost of service, or available 
        bandwidth. 
      
     The three existing experimental IETF protocols are CARD [CARD], FMIPv6 
     [FMIP], and LLH [LLMIP]. 
      
     The Seamoby Working Group developed a protocol called Candidate Access 
     Router Discovery [CARD] that is designed specifically to identify access 
     routers in surrounding networks by their access points. CARD addresses the 
     scenario where heterogeneous wireless networks are available, a wireless 
     node with a link to one of them is interested in finding out the types and 
     characteristics of links are available in its neighborhood for handover in 
     order to optimize handover. A wireless node solicits the information from 
     its access router. The node can either use the results of scans to request 
     the information by access point link layer address, or it can ask for a 
     comprehensive report of what types of links are available and their 
     characteristics. This information is used to select target access routers 
     for handover, and, when a candidate for handover is selected, a protocol 
     such as FMIP can be used to optimize the handover. The same information 
     format used between an access router and a wireless node can also be used 
     between access routers to allow an access router to develop a map of the 
     characteristics of networks in its neighborhood. 
      
     The Fast Mobile IPv6 [FMIP] protocol and the Low Latency Mobile IPv4 Handoff 
     protocol [LLMIP] provide messages that allow a wireless node to map an 
     access point's link address to the neighborhood subnet information including 
      
     Kempf & Koodli         Expires December 2005                       [Page 4] 

     Internet Draft              NED                                   June, 2005 
      
     the L2 address, IP address and the network prefix. The Fast Handover 
     protocol refers to this as the (AP-ID, AR-Info) tuple. The solicited 
     information, which resembles performing inverse IPv6 Neighbor Discovery but 
     for an off-link address, is restricted to subnet configuration information 
     necessary to pre-configure the wireless node for the neighboring subnet 
     (i.e., the access router L2 and IP address and, for IPv6, subnet prefix). No 
     other characteristics of the neighborhood subnets are defined since subnet 
     information is sufficient for route update purposes. 
      
     The difference between FMIP/LLMIP and CARD can be summarized as follows. The 
     fast handover protocols are primarily interested in new subnet information 
     for initiating route updates for optimizing handover delay and packet loss. 
     CARD, on the other hand, enables a wireless node to gather attributes 
     associated with the target subnets so that a suitable target access router 
     can be selected for handover. Once such an access router is selected, the 
     fast handover protocols actually effect the routing changes. 
      
     The purpose of NED is to define unified packet formats for use by protocols 
     defined in [FMIP], [LLMP], and [CARD] and make the functions independent of 
     transport protocol, so neighborhood discovery can be done over IP transport 
     of both versions. In addition, NED has been designed to satisfy the 
     requirements of 802.21 [802.21] for transport-independent network discovery.  
      
   3.0    Potential Uses 
      
     This section describes three potential uses for NED. 
      
  3.1 IEEE 802.21 
      
     As a functional and architectural requirement for its Media Independent 
     Handover (MIH) service, IEEE 802.21 is defining an Information Service in 
     Section 4.3 of [802.21]. The purpose of this Information Service is to 
     assist a node in obtaining information such as link access and utilization, 
     link quality, cost, security mechanisms, provider information and other 
     information elements relevant for a selecting an appropriate network 
     interface and for mobility. An important requirement for this information 
     service is access independence, so that the service can be provided on 
     multiple networks, including IEEE 802.11, 802.15, 802.16 as well as cellular 
     networks. Such an access-independent service can be best served by messages 
     with generic binary formats for supporting individual information element 
     queries. For example, a simple Request and Reply message sequence with a 
     generic option format can be used to query the link quality parameter on any 
     network that supports the IEEE 802.21 MIH service. NED can provide the 
     substrate upon which the types of information defined in [802.21] is 
     specified. 
      
  3.2 IP Mobility Handover Support 
      
     One of the original motivations behind CARD was to support decision making 
     on the mobile node for selection of a handover target router for FMIPv6 and 
     LLMIPv4. NED provides a more general link information format, having some 
     backward compatibility with CARD. 
      

      
     Kempf & Koodli         Expires December 2005                       [Page 5] 

     Internet Draft              NED                                   June, 2005 
      
  3.3 Information Distribution on Link Characteristics 
      
     The other motivation behind CARD was to support distribution of information 
     between access routers, so an access router can advertise information about 
     surrounding subnets. The same information elements used between the access 
     router and mobile node are also used between access routers for this 
     purpose. The NED information elements can serve the same purpose. CARD 
     defines SCTP as the transport protocol between access routers, the same 
     protocol can be used for NED. 
       
   4.0    Neighborhood Discovery Protocol Overview 
      
     Because NED can be used over multiple transports, the protocol only 
     defines the wire format of requests for neighborhood information and 
     responses containing the neighborhood information, just as in EAP 
     [RFC3748]. Other protocol considerations, such as the details of 
     message transmission, are determined by the respective transport. For a 
     complete protocol, this specification MUST be paired with an 
     appropriate transport specification describing how NED is used over the 
     transport, including such issues as retransmission and fragmentation. 
      
     NED information elements are defined as attribute/value pairs (AVPs). 
     NED AVPs are defined defined for particular applications, such as 
     router discovery or link identification. The AVPs are identified by an 
     attribute type and are registered with the Internet Assigned Numbers 
     Authority in the Seamoby CARD Parameters AVP Type Registry. The 
     wireless access technology identifiers are defined there as well, in 
     the Layer 2 Access Technology Identifier Registry. The Seamoby CARD 
     Parameters registries can be found in [REG]. Section 7.0 describes how 
     to standardize a new AVP type. 
      
     In typical usage, a NED-capable node solicits a peer for information on 
     its neighborhood by sending a Neighborhood Discovery Request (NED-RQST) 
     message containing a list of Network Information Request Options. Each 
     option contains a list of Layer 2 access point addresses and a list of 
     AVP type codes. The elements in the Layer 2 access point identifier 
     list consist of the following two objects: 
      
     1) A wireless access technology identifier indicating the type of 
        wireless link technology on the interface where the access point 
        identifiers were observed, 
     2) A list of Layer 2 addresses for wireless access points in the 
        identified network discovered during passive or during active 
        scanning.  
      
     If the list of AVP type codes is empty, the soliciting node is requesting 
     that all available information on the network associated with the access 
     points should be provided. 
      
     The peer replies with a Neighborhood Discovery Reply (NED-RPLY) 
     containing a list of Network Information Reply Options. Each option 
     contains a list of Layer 2 access point addresses having the same 
     format, but possibly different content, as the NED-RQST list, and a 
     list of AVP values with the requested information for the network with 
      
     Kempf & Koodli         Expires December 2005                       [Page 6] 

     Internet Draft              NED                                   June, 2005 
      
     which the access points are associated. If the information is not 
     available, the AVP list is empty and a status bit in the option header 
     indicates the reason. 
      
     A wireless node, an access point, a router, or a switch may solicit all 
     information available to a particular peer in order to provide a 
     database of such information. The database can be used for handover, 
     initial access decision making, or in the case of support nodes such as 
     routers, access points, and switches, to support wireless nodes on the 
     link. Additionally, a node may push information to a peer unsolicited 
     if a change in the characteristics of its network occurs, and if 
     unsolicited transfer is supported by the transport. NED itself does not 
     provide the details about how these information exchanges are 
     conducted, that is up to the transport protocol specification. 
      
   5.0    Protocol Messages 
      
     This section describes the wire format of NED protocol messages. 
      
  5.1 Protocol Header 
      
     The basic protocol format is modeled after the Extensible Authentication 
     Protocol [RFC3748]. The following describes the protocol header. 
      
           0                   1                   2                   3  
           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
          |     Type      |Vers.|  Rsrved.|          Length               | 
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
          |              Options . . . 
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
          
        Fields:  
             
           Type:     
      
                 0      Neighborhood Discovery Request (NED-RQST) 
                  
                 1      Neighborhood Discovery Reply (NED-RPLY) 
                  
                 Since NED only defines codes 0 and 1, all other packets 
                 MUST be discarded by peers. 
          
           Vers.:   
      
                 A three bit version number indicating the version of the 
                 protocol. For this document, the version number is 0. 
                  
           Rsrvd.: 
      
                 Set to zero on transmission and ignored on reception. 
      
           Length:  
      
      
     Kempf & Koodli         Expires December 2005                       [Page 7] 

     Internet Draft              NED                                   June, 2005 
      
                 Two octet length of the NED message, including header, in 
                 octets. 
                  
           Options: 
                  
                 A list of Option objects. For a NED-RQST, the list MUST 
                 consist only of Network Information Request Options. For 
                 NED-RPLY, the list MUST consist only of Network Information 
                 Reply Options. 
                  
                  
  5.2 Network Information Request Option 
      
     The Network Information Request Option can only appear in the NED-RQST 
     message. It has the following format: 
      
           0                   1                   2                   3  
           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   
          |  Option Type  |    Reserved   |       Option Length           |    
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |                                                               |    
          +                                                               + 
          |    Layer 2 Access Point Identifier List Field (variable)      | 
          +                                                               + 
          |                      ...                                      | 
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
          |                                                               |    
          +                                                               + 
          |         Attribute Type Code List Field (variable)             | 
          +                                                               + 
          |                      ...                                      | 
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
        Fields:  
             
           Option Type:   
      
                 TBD1 (assigned by IANA) 
        
           Reserved: 
      
                 Set to zero on transmission and ignored on reception. 
      
           Option Length:  
      
                 Two octet length of the option, including header, in 
                 octets. 
                  
           Layer 2 Access Point Identifier List Field: 
                  
                 A variable length field containing a list of Layer 2 access 
                 point address identifiers in the network for which 
      
     Kempf & Koodli         Expires December 2005                       [Page 8] 

     Internet Draft              NED                                   June, 2005 
      
                 information is desired. The format of the list is described 
                 in Section 5.4. 
                  
           Attribute Type Code List Field: 
                  
                 A variable length field containing a list of attribute type 
                 codes for which information is desired. The format of the 
                 list is described in Section 5.5. If the requestor wants 
                 all information associated with the network, the list is 
                 empty. 
                  
      
  5.3 Network Information Reply Option 
      
     The Network Information Reply Option can only appear in the NED-REPLY 
     message. It has the following format: 
      
           0                   1                   2                   3  
           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   
          |  Option Type  |    Status   |       Option Length           |    
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |                                                               |    
          +                                                               + 
          |     Layer 2 Access Point Identifier List Field (variable)     | 
          +                                                               + 
          |                      ...                                      | 
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
          |                                                               |    
          +                                                               + 
          |               AVP List Field (variable)                       | 
          +                                                               + 
          |                      ...                                      | 
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          
        Fields:  
             
           Option Type:   
      
                 TBD2 (assigned by IANA) 
        
           Reserved: 
      
                 Status code indicating the status of the request. Defined 
                 values are given in Section 5.7. 
      
           Option Length:  
      
                 Two octet length of the option, including header, in 
                 octets. 
                  
           Layer 2 Access Point Identifier List Field: 
                  
      
     Kempf & Koodli         Expires December 2005                       [Page 9] 

     Internet Draft              NED                                   June, 2005 
      
                 A variable length field containing a list of Layer 2 access 
                 point address identifiers in the network for which 
                 information is desired. The format of the list is described 
                 in Section 5.4. 
                  
           AVP List Field: 
                  
                 A variable length field containing a list of 
                 attribute/value pairs containing information for the 
                 network in which the access points are located. The format 
                 of the list is described in Section 5.6. If list is empty, 
                 no information is available on the network in which the 
                 access points are located. 
                  
  5.4 Layer 2 Access Point Identifier List Field 
      
     The size of the Layer 2 Access Point Identifier List Field is variable, 
     depending on the number of Layer 2 access point address identifiers in the 
     list, and on the length of the individual identifiers. The size of the 
     individual Layer 2 access point address identifiers depends on the Layer 2 
     technology. The Layer 2 Access Point Identifier List Field has the following 
     format: 
      
           0                   1                   2                   3  
           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   
          |      Field Length             |  Layer 2 Access Technology ID |    
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |  Layer 2 Access Point ID...                                       
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |  Layer 2 Access Point ID...                                       
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |                                 ...                                      
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
        Fields:  
             
           Field Length:   
      
                 Two octet length of the field, including header, in octets. 
        
           Layer 2 Access Technology ID:  
      
                 Two octet identifier for the Layer 2 access technology 
                 utilized by the access points whose address identifiers are 
                 in the list. The access technology identifier is taken from 
                 the Layer 2 Technology Identifier Registry in the Seamoby 
                 IANA registry at [REG].  
                  
           Layer 2 Access Point ID: 
                  
                 A variable length field containing the Layer 2 access point 
                 address identifier. The length of the identifier depends on 

      
     Kempf & Koodli         Expires December 2005                       [Page 10] 

     Internet Draft              NED                                   June, 2005 
      
                 the Layer 2 access technology type, specified by the Layer 
                 2 Access Technology ID.  
                  
  5.5   Attribute Type Code List Field 
      
     The size of the Attribute Type Code List Field is variable, depending on the 
     number of two octet attribute type codes included in the list. The Attribute 
     Type Code List Field has the following format: 
      
           0                   1                   2                   3  
           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   
          |      Field Length             |     Attribute Type Code       |    
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |     Attribute Type Code       |     Attribute Type Code       |          
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |                                 ...                                      
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
        Fields:  
             
           Field Length:   
      
                 Two octet length of the field, including header, in octets. 
        
           Attribute Type Code:  
      
                 Two octet identifier attribute type code. The attribute 
                 type code is taken from the AVP Type Registry in the 
                 Seamoby IANA registry at [REG].  
                  
                  
  5.6 AVP List Field 
      
     The size of the AVP List Field is variable, depending on the number of AVPs 
     in the list, and on the length of the individual AVP objects. The size of 
     the individual AVP objects depends on the attribute type. The AVP List Field 
     has the following format: 
      
           0                   1                   2                   3  
           0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1  
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+   
          |      Field Length             |  Reserved                     |    
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |  AVP Object...                                       
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |  AVP Object...                                       
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
          |                                 ...                                      
          +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
         
        Fields:  
             
           Field Length:   
      
     Kempf & Koodli         Expires December 2005                       [Page 11] 

     Internet Draft              NED                                   June, 2005 
      
      
                 Two octet length of the field, including header, in octets. 
        
           Reserved:  
      
                 Set to zero on transmission and ignored on reception. 
                  
           AVP object: 
                  
                 A variable length field containing the AVP object. Section 
                 5.6.1 describes the AVP object format. 
                  
  5.6.1   AVP Object 
   
     The AVP Object is of variable length, depending on the value data. The AVP 
     Object has the following format: 
   
        0                   1                   2                   3 
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
       |           AVP Code            |           AVP Length          | 
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 
       |      Value Data ...  
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - - -  
        
      
        Fields:  
             
           AVP Code: 
      
                 Two octet AVP type code, from [REG]. 
                  
           AVP Length:  
      
                 Two octet length of the AVP, including header, in octets. 
      
           Value Data:  
      
                 A variable length field containing the AVP data. AVPs are 
                 defined and registered with IANA as described in [RFC4065]. 
        
        
                  
      
  5.7  Status Code Values 
      
     This specification defines the following status code values for NED-REPLY: 
      
            Code                  Meaning 
            ----                  ------- 
              0           Request was successfully completed, AVPs follow 
              1           Request denied for administrative reasons 
              2           Request was unsuccessful because no information is 
                          available on the requested access point identifiers. 
      
     Kempf & Koodli         Expires December 2005                       [Page 12] 

     Internet Draft              NED                                   June, 2005 
      
              3           Request has been partially completed, AVPs follow 
      
      
      
   6.0    Security Considerations 
      
     NED depends on the transport to provide security for the NED 
     transaction. A transport definition for NED MUST provide data origin 
     authentication and replay protection on the NED-REPLY to ensure that 
     the source of the provided information is a trusted node. The transport 
     definition MUST provide data origin authentication and replay 
     protection on the NED-RQST and confidentiality protection on both the 
     NED-RPLY and NED-RQST if the information is being distributed between 
     network nodes that are acting as authoritative sources of network 
     neighborhood information for other nodes, such as between routers, 
     switches, and access points.   
      
   7.0    IANA Considerations 
      
     NED Layer 2 Access Technology identifiers are defined in the IANA 
     Seamoby Layer 2 Access Technology Identifier registry [REG]. 
      
     NED AVPs have the same format as CARD Capability AVPs and are defined 
     in the IANA Seamboy CARD AVP Type Registry [REG]. 
      
     New Layer 2 Access Technology identifiers and AVPs are registered with 
     IANA as described in [RFC4065]. 
      
     NED Option types require the definition of a new IANA registry called 
     "NED Options Registry", and the assignment of two option numbers for 
     Network Information Request Option and Network Information Reply 
     Option, TBD1 and TBD2 above. Future NED options can be added through 
     the method of IETF Standards Action, as defined in [RFC2434].  
      
     NED status codes require the definition of a new IANA registry called 
     "NED Status Codes". Future NED status codes can be added through the 
     method of IETF Standards Action, as defined in [RFC2534]. 
      
   8.0    Normative References 
      
     [RFC3773] Manner, J., and Kojo, M., "Mobility Related Terminology", RFC 
               3773, June 2004. 
      
      
     [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 
               Requirement Levels", BCP 14, RFC 2119, March 1997. 
      
     [RFC4065] Kempf, J., "Instructions for Seamoby and Experimental Mobility 
               Protocol IANA Allocations", RFC 4065, May, 2005. 
      
     [RFC2434] Narten, T., and Alvestrand, H., "Guidelines for Writing an IANA 
               Considerations Section in RFCs", RFC 2434, October, 1998. 
      

      
     Kempf & Koodli         Expires December 2005                       [Page 13] 

     Internet Draft              NED                                   June, 2005 
      
   9.0    Informative References 
      
     [RFC3748]  Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and 
                Levkowetz, H., "Extensible Authentication Protocol (EAP)", 
                RFC 3748, June, 2004. 
      
     [EAPSEL]  Aboba, B., and Arkko, J., "Network Discovery and Selection 
               Problem", Internet Draft, work in progress. 
      
     [MIP4] Perkins, C., editor, "Mobility Support for IPv4," RFC 3344, 
               August, 2002. 
      
     [MIP6] Johnson, D., Perkins, C., and Arkko, J., "Mobility Support in 
               IPv6," RFC 3775, June, 2004 
      
     [SEND] Arkko, J., Kempf, J., Zill, B., and Nikander, P., "SEcure 
               Neighbor Discovery (SEND)", RFC 3971, March, 2005. 
      
     [CARD] Liebsch, M., Singh, A., Chaskar, H., Funato, D., and Shim, E., 
            "Candidate Access Router Discovery", Internet Draft, approved for 
            publication October 2004. 
      
     [FMIP] Koodli, R., editor, "Fast Handovers for Mobile IPv6", Internet 
            Draft, work in progress. 
      
     [LLMP] El Malki, K., "Low Latency Handoffs in Mobile IPv4", Internet 
            Draft, work in progress. 
      
     [802.21] Gupta, V., (Editor), "IEEE P802.21 Media Independent Handover 
            Service Draft Technical Requirements", IEEE, September 2004. 
      
     [REG] http://www.iana.org/assignments/card-parameters 
      
   10.0   Author Information 
      
     James Kempf                          Phone: +1 408 451 4711 
     DoCoMo Labs USA                      Email: kempf@docomolabs-usa.com 
     181 Metro Drive 
     Suite 300 
     San Jose, CA 
     95110 
     USA 
      
     Rajeev Koodli                        Phone: +1 650 625 2359 
     Nokia Research Center                Fax: +1 650 625 2502 
     313 Fairchild Drive                  Email: Rajeev.Koodli@nokia.com 
     Mountain View, CA 
     94043 
     USA 
      
   11.0     IPR Statements 
   
     The IETF takes no position regarding the validity or scope of any 
     Intellectual Property Rights or other rights that might be claimed to 
      
     Kempf & Koodli         Expires December 2005                       [Page 14] 

     Internet Draft              NED                                   June, 2005 
      
     pertain to the implementation or use of the technology described in this 
     document or the extent to which any license under such rights might or might 
     not be available; nor does it represent that it has made any independent 
     effort to identify any such rights. Information on the procedures with 
     respect to rights in RFC documents can be found in BCP 78 and BCP 79. 
    
     Copies of IPR disclosures made to the IETF Secretariat and any assurances of 
     licenses to be made available, or the result of an attempt made to obtain a 
     general license or permission for the use of such proprietary rights by 
     implementers or users of this specification can be obtained from the IETF 
     on-line IPR repository at http://www.ietf.org/ipr. 
    
     The IETF invites any interested party to bring to its attention any 
     copyrights, patents or patent applications, or other proprietary rights that 
     may cover technology that may be required to implement this standard.  
     Please address the information to the IETF at ietf-ipr@ietf.org.  
      
  13. Disclaimer of Validity 
   
     This document and the information contained herein are provided on an "AS 
     IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS 
     SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING 
     TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT 
     LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT 
     INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS 
     FOR A PARTICULAR PURPOSE.  
       
  14. Copyright Notice 
   
     Copyright (C) The Internet Society (2005).  This document is subject to the 
     rights, licenses and restrictions contained in BCP 78, and except as set 
     forth therein, the authors retain all their rights. 






















      
     Kempf & Koodli         Expires December 2005                       [Page 15]