Internet DRAFT - draft-wanghui-netlmm-protocol

draft-wanghui-netlmm-protocol



NETLMM                                                          Hui Wang 
Internet Draft                                             Yanfeng Zhang 
Draft-wanghui-netlmm-protocol-00.txt                            Yong Xia 
                                                          NEC Labs China 
Expires: Oct. 2006                                        April 10, 2006 
                                   
 
                                      
                              NETLMM Protocol 
                   draft-wanghui-netlmm-protocol-00.txt 


Status of this Memo 

   By submitting this Internet-Draft, each author represents that       
   any applicable patent or other IPR claims of which he or she is       
   aware have been or will be disclosed, and any of which he or she       
   becomes aware will be disclosed, in accordance with Section 6 of       
   BCP 79. 

   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-Drafts. 

   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 

   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 

   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html 

   This Internet-Draft will expire on July 2006. 

Copyright Notice 

   Copyright (C) The Internet Society (2006).  All Rights Reserved. 

Abstract 

   This document specifies a network-based localized mobility management 
   (NETLMM) protocol which enables mobile nodes remaining reachable 
   while moving across different access routers in a certain access 
   network zone called Edge Mobility Domain (EMD). This protocol 
   requires no extra host stack support and no complex security and 
 
 
 
H. Wang               Expires October 10, 2006                [Page 1] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   signaling interactions between mobile node and the access network. 
   Especially, by utilizing the neighbor Access Router (AR) information, 
   NETLMM can achieve very fast and smooth handover performance to fit 
   the requirements of most real-time and interactive multimedia 
   applications.  

    

Conventions used in this document 

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in RFC-2119 [1]. 

Table of Contents 

    
   1. Introduction................................................2 
   2. Terminology.................................................3 
   3. Protocol Overview...........................................4 
      3.1. MN Attaching Procedure..................................5 
      3.2. Communication Initialization Procedure..................6 
      3.3. Fast Handover Procedure.................................7 
   4. Protocol Specification......................................11 
      4.1. Conceptual Data Structures.............................11 
      4.2. Access Router Operation................................11 
      4.3. Edge Mobility Anchor Point Operation...................13 
   5. Security Considerations.....................................14 
   6. IANA Considerations........................................14 
   7. Acknowledgments............................................14 
   8. References.................................................14 
   Author's Addresses............................................16 
   Intellectual Property Statement................................16 
   Disclaimer of Validity........................................17 
   Copyright Statement...........................................17 
   Acknowledgment................................................17 
    
1. Introduction 

   A number of protocol proposals for terminal mobility management have 
   been proposed in IETF, such as MIPv6 [2], HIP [9] and MOBIKE [10]. 
   They could be view as global mobility protocols, which allow a mobile 
   node to maintain reach-ability when changing its attaching access 
   routers, by updating the address mapping between the home address and 
   care-of address at the global mobility anchor point, or even changing 
   the mapping directly at the corresponding node end to end. Global 
   mobility management protocols can be used between access routers to 
 
 
H. Wang               Expires October 10, 2006                [Page 2] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   handle local mobility. However there are many well-known problems, 
   such as possibly long location update latency, large signaling cost 
   and etc. An extensive discussion on these problems can be found in 
   [5]. Instead of using a global mobility management protocol on each 
   IP link move, a protocol to localize the management of topologically 
   small movements is more preferable to handle local movements. And the 
   requirements and gap analysis for IP local mobility are discussed in 
   [6]. 

   This document describes a Network-based Localized Mobility Management 
   (NETLMM) protocol, which is aimed to achieve the goals proposed in [5] 
   and [6]. This document describes the efficient support for mobile 
   nodes communicating with peers both outside and inside the same 
   mobility domain when mobile nodes moves across different access 
   routers, which requires no extra host stack support, no complex 
   security and signaling interactions between mobile node and the 
   access network. By utilizing the neighbor Access Router information, 
   NETLMM can achieve very fast and smooth handover performance to fit 
   the requirements of most real-time and interactive multimedia 
   applications.  

2. Terminology  

      Access Router (AR) 

      A router in an Edge Mobility Domain, which handles the movement 
   events of a mobile node, registers the association of a mobile node 
   with its point of attachment to an Edge Mobility Anchor Point and 
   provides routing services to mobile nodes.  

      Edge Mobility Anchor Point (EMAP)  

      EMAP is a light location server in an Edge Mobility Domain, which 
   maintains current location (the attaching AR) for a mobile node when 
   the mobile node is in an Edge Mobility Domain. EMAP is generally 
   embedded in the gateway of an Edge Mobility Domain, and thus it also 
   takes the role of delivering the packets to mobile hosts. 

      Edge Mobility Domain (EMD)  

      An administrative network composed of Access Routers and Edge 
   Mobility Anchor Points. Besides ARs and EMAPs, an EMD can also 
   contain other internal networking components, such as a common router, 
   to construct the whole EMD. But the common routers cannot provide 
   access service with mobility support.  


 
 
H. Wang               Expires October 10, 2006                [Page 3] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

3. Protocol Overview 

   NETLMM protocol, operating within an Edge Mobility Domain (EMD), is a 
   network-based localized mobility management protocol, which supports 
   both IPv6 and IPv4. In this draft, we use IPv6 for illustration. The 
   IP address configuration for a mobile node (MN) is the same as in 
   standard IPv6 system, by either using DHCP or stateless IP address 
   configuration. As for DHCP method, the DHCP server will assign the 
   same subnet address to all mobile nodes; as for stateless IP address 
   configuration, each AR advertises the same prefix which is called the 
   EMD subnet prefix, so that a MN keeps its IP address unchanged when 
   it moves among different ARs within an EMD. 

   This section describes an overview of NETLMM protocol configuration. 
   It is assumed that only one single EMAP exists within this EMD.  The 
   architecture model is shown in Figure 1. The communications between 
   both MN-CN and MN1-MN2 will be discussed, with the fast handover 
   procedure. NETLMM utilizes link layer identifier to help to do fast 
   and efficient handover. The architecture model in Figure 1 is a 
   little different from the network model depicted as Figure 1 in the 
   problem statement document [5]. Compared with the later, the Access 
   Points (APs) is omitted on Figure 1 in this draft.  The reason is 
   that when the MN moves between two APs belonging to the same AR, the 
   AR knows nothing about this movement. Since this NETLMM protocol is 
   focusing on layer 3 handover between ARs, we just simply this 
   architecture model. From this point of view, the architecture model 
   in this draft is consistent with that in the problem statement draft 
   [5]. 

                        +----------------------+  
                        | Edge Mobility Domain |  +----------+  
                        |                      |  |          |  
               +-----+  |  +----+     +------+ |  | External |   +----+  
               | MN1 |-+---| AR |--+--| EMAP |-------------------| CN |  
               +-----+  |  +----+  |  +------+ |  | Network  |   +----+  
                        |          |           |  |          |  
               +-----+  |  +----+  |           |  +----------+  
               | MN2 |-+---| AR |--+           | 
               +-----+  |  +----+              |   
                        |                      | 
                        +----------------------+  
                       Figure 1 : Architecture Model  

   The EMAP works as a local domain location server, managing mapping of 
   the MN's address to the AR's address where the MN attaches. On one 
   hand, the mapping is used to manage a bi-directional tunnel between a 
   particular MN's current AR and its EMAP for forwarding packets 
 
 
H. Wang               Expires October 10, 2006                [Page 4] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   between a correspondent node (CN) outside the EMD and the MN. On the 
   other hand, while for support intra EMD communications between local 
   mobile nodes, this mapping will provide a location information to 
   help to build the bi-directional tunnel to forward data between the 
   two ARs which the MNs attaching to. The detailed processes will be 
   given below.  

    

3.1. MN Attaching Procedure 

   Figure 2 gives the procedure when a MN newly attaches to an AR in an 
   EMD. When a MN attaches to the AR just after its power-on, the MN 
   first starts a link layer association process with AR. In the real 
   deployment, other link layer devices such as access points may be 
   used between AR and MN, in this case MN directly associates with an 
   AP; and then AP will send this association event to AR and/or AR will 
   actively sense this event. For example, the multiple 802.11 access 
   points are interconnected by means of a distribution system - 
   typically an Ethernet which an AR attaches to. When the MN associates 
   with one of the APs, a layer-2 update frame is broadcasted in order 
   to register the mobile node's current location with all bridges and 
   switches in the distribution system. And the AR can learn those 
   events at the same time. The association process is radio technology 
   specific, which is beyond the scope of this draft. To make the 
   discussion clearer, we just say that MN directly does association/de-
   association/re-associations with AR in the following. And we assume 
   that when those association/re-association/de-association/ events are 
   accomplished, AR is able to recognize them and know the peer link 
   layer ID (for example, if the 802.11 technology is adopted, the link 
   layer ID is MAC address of the mobile node's wireless interface). We 
   will use MN-ID to denote the mobile node's ID. 

   After the link layer association process is finished, MN will try to 
   acquire its IP address through a conventional mechanism, such as 
   stateless [7] or stateful configuration [8] via the attaching AR. On 
   the network side, the AR will recognize this attaching and know the 
   mapping of MN's IP address (MN-IP) and its MN-ID. For stateless 
   configuration, AR can learn MN's IP address through many ways such as 
   Router Solicitation, Neighbor Solicitation for Duplicated Address 
   Detection (DAD) and so on. If stateful IP address configuration is 
   used, AR acts as DHCP relay between DHCP server and MN, so it can 
   know MN-IP and MN-ID naturally. The default route/gateway in MN is 
   set to be the same default router/gateway of this EMD. Thus, when MN 
   moves among different ARs, the layer 3 configurations, including its 
   IP address and the default router, will always keep unchanged. 

 
 
H. Wang               Expires October 10, 2006                [Page 5] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   After the MN-IP is configured, AR1 takes that the MN has connected to 
   it. Then AR1 sends a Location Registration Request (LR Req) message 
   to the EMAP within the EMD. The message includes the MN's identifier 
   (MN-ID), the MN's IP address (MN-IP) and the AR's IP address (AR-IP). 
   And then, AR1 creates a cache entry of "Local Registered MN List (LR 
   List)". The cache entry includes mapping among the MN-ID, the MN-IP 
   and the EMAP's address, which makes the AR1 know which MN is 
   attaching to it. 

   When the EMAP receives the LR Req message, the EMAP creates a cache 
   entry of mapping between the MN's IP address and AR1's address, which 
   is called "Location Registration Cache (LR Cache)" in this document. 
   And then, the EMAP sends a Location Registration Acknowledgement (LR 
   Ack) back to AR1.  

   After the LR Req/Ack exchange, the EMAP and AR1 establish a bi- 
   directional tunnel between the EMAP and AR1. The tunnel is used for 
   forwarding packets from/to the MN, and enables MN to visit the 
   Internet through this EMD. But the intra EMD communication will not 
   go through EMAP (refer to next section 3.2).  

                 MN                AR1                  EMAP  
                  |                  |                     |  
            Link layer association   |                     |  
                  |----------------->| {AR1 gets MN-ID}    |  
            Configure IP address     |                     |  
                  |<---------------->| {AR1 gets MN-IP}    |  
                  |                  |                     |  
                  |                  |                     |  
                  |              Location Registration Request  
                  |                  |-------------------->|  
                  |                  |(MN-ID, MN-IP, AR1-IP)  
                  |                  |                     |  
                  |          Location Registration Acknowledgement  
                  |                  |<--------------------|  
                  |                  |                     |  
                  |                  |                     |  
        
                      Figure 2 : Attachment procedure 

3.2. Communication Initialization Procedure 

   If MN wants to send packets to a CN outside of his EMD (i.e. CN and 
   MN have different IP subnet prefix), MN will send the packets to its 
   default router - the EMD default router/gateway. When MN sends 
   Neighbor Solicitation (IPv6) or ARP Request (IPv4) for the default 
   router/gateway, the attaching AR will reply to it as to cheat the MN 
 
 
H. Wang               Expires October 10, 2006                [Page 6] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   that it is the default router. Then AR will forward the intercepted 
   packets via the bi-tunnel to the real default router of this EMD, 
   normally, the EMAP. EMAP, acting the gateway of this EMD, will 
   further forward the packets to external network.  

   If CN and MN are in the same EMD, there will be a little difference. 
   Figure 3 denotes the basic process. Since MN and CN have the same IP 
   subnet prefix, MN will send Neighbor Solicitation (IPv6) or ARP 
   Request (IPv4) message to resolve the link layer address of CN before 
   sending the real data packets. On receiving such messages, the 
   attaching AR (AR1) will check its Local Registered MN List to see if 
   he has the binding information for this CN-IP. If it has no entry 
   with this CN-IP, AR1 will send a CN Location Query message to EMAP 
   with the key of CN-IP. On receiving this CN Location Query message, 
   EMAP will look up its local Location Registration Cache and return 
   back the current attaching AR-IP (AR2) of the CN-IP via a CN Location 
   Reply message. Then AR1 gets the AR2-IP, and it sends Tunnel Setup 
   Request message to AR2 with the information of "MN-IP, AR1-IP, CN-IP, 
   AR2-IP". Optionally, AR2 will send a Tunnel Built Acknowledgement 
   message back to AR1. After this procedure, a bi-tunnel between AR1 
   and AR2 is built up. AR1 and AR2 sends reply to MN's Neighbor 
   Solicitation or ARP request, and then intercept the packets destined 
   to CN and MN respectively. And thus MN can build data communication 
   with CN via the bi-tunnel between AR1 and AR2.  

         MN       AR1            EMAP           AR2           CN 
         |         |              |              |             | 
         |-------->| {MN sends Neighbor Solicitation message}  | 
         |         |              |              |             | 
         |      CN Location Query (CN-IP)        |             | 
         |         |------------->|              |             | 
         |      CN Location Reply (CN-IP, AR2-IP)|             | 
         |         |<-------------|              |             | 
         |    Tunnel Setup Request (MN-IP, AR1-IP, CN-IP, AR2-IP) 
         |         |---------------------------->|             | 
         |    Tunnel Built Acknowledgement       |             | 
         |         |<----------------------------|             | 
         |         |                             |             | 
         |<~~~~~~~>|<===========================>|<~~~~~~~~~~~>|  
         |         |                             |             | 
              
     Figure 3 : Communication process when MN & CN are in the same EMD 

3.3. Fast Handover Procedure  

   NETLMM implements a neighbor AR information assisted fast handover 
   scheme. First, neighboring AR can build neighbor information with 
 
 
H. Wang               Expires October 10, 2006                [Page 7] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   each other through other methods such as neighbor information 
   broadcast or CARD protocols [11]. How to build the neighborhood 
   relationship will not be discussed in this draft. The entire neighbor 
   ARs are considered to be the possible candidate ARs when a MN moves 
   out of current AR. By utilizing the neighbor AR information, NETLMM 
   can achieve a very fast and smooth handover to fit the requirements 
   of most real-time and interactive multimedia applications. 

   The procedure of handover is shown in Figure 4 and Figure 5. Figure 4 
   gives the scenario when CN is outside the EMD, while Figure 5 depicts 
   the scenario when CN is in the same EMD as MN. The operations for 
   both scenarios can be combined together as seen in section 4 - 
   protocol specification.  

                                                                Neighbor 
      MN        AR2                   AR1                  EMAP    ARs 
      |         |    {Link layer de-association}            |       | 
      0<-------------- X ------------>|{AR1 gets the MN-ID} |       | 
      |         |                     |{AR1 starts to buffer data}  | 
      |         |    MN Movement Notification & MN's context|       | 
      |         |<--------------------|---------------------------->|  
      |         |           (MN-ID, MN-IP, AR1-IP)          |       | 
      |         |                     |                     |       | 
      0-------->|{Link layer (re-)association}              |       | 
      |         |{AR2 gets the MN-ID} |                     |       | 
      |         |                     |                     |       | 
      |         | MN Fast Handover Notification (MN-ID, MN-IP, AR2-IP) 
      |         |-------------------->|                     |       | 
      |         |   Buffered data     |                     |       | 
      |<~~~~~~~~|<====================|                     |       | 
      |         |                     |                     |       | 
      |         | MN Location Update Request (AR2-IP, MN-IP)|       | 
      |         |------------------------------------------>|       | 
      |         |                     | MN Location Update  |       | 
      |         |                     |<--------------------|       | 
      |         |                     |   (MN-ID, MN-IP)    |       | 
      |         |                     |                     |       | 
      |         |   Location Registration Acknowledgement   |       | 
      |         |<------------------------------------------|       | 
      |         |                     |                     |       | 
      |<~~~~~~~>|<=========================================>|       | 
        
                     Figure 4 : Handover procedure (1) 

   Figure 4 gives the handover procedure when the MN moves from AR1 to 
   AR2. First, MN performs link layer de-association with AR1. AR1 
   immediately recognizes this de-association and knows the MN-ID. Then 
 
 
H. Wang               Expires October 10, 2006                [Page 8] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   AR1 starts to buffer the packets destined to MN-IP (MN-ID), and sends 
   a MN Movement Notification message and MN's context to its 
   neighboring ARs, containing the MN-ID and MN-IP. At the same time, 
   MN's movement causes its link layer do re-associations with new AR 
   (say, AR2). Once the re-association completes, AR2 recognizes the new 
   attachment with the MN-ID. Since AR2 has already received a MN 
   Movement Notification message with this MN-ID, AR2 knows this MN has 
   moved to its service coverage area and is not a new joiner for the 
   EMD. AR2 sends a MN Fast Handover Notification message to AR1, and 
   also a MN Location Update Request to EMAP as described in section 3.1. 
   On receiving the MN Fast Handover Notification message, AR1 will 
   first forward the buffered packets to AR2 (and then the packets will 
   be forwarded to MN). Before the new data path between EMAP and AR has 
   been setup, AR1 will keep forwarding the packets destined to MN-IP 
   (MN-ID) as to keep the handover packet lossless. On the other hand, 
   once EMAP receives the MN Location Update Request message, EMAP will 
   look up its "Location Registration Cache" and updates the Location 
   Registration Cache with the new AR-IP for this MN-IP and build new 
   bi-tunnel between EMAP and AR2 to forward data from/to MN-IP. After 
   tunnel is setup, EMAP will send a MN Location Update message to AR1 
   to update the "Local Registered MN List" in AR1 and the tunnel 
   between AR1 and EMAP for this MN will be removed. Thus the handover 
   process completes. 

   Figure 5 gives the handover procedure when the communication is 
   between two MN inside the same EMD. The basic process is the same. 
   After the detection of MN-ID's link layer de-association, AR1 
   performs the same as described in Figure 4: buffer the packets 
   destined to MN-IP (MN-ID), and sends a MN Movement Notification 
   message and MN's context to its neighboring ARs. Also when AR2 
   detects the link layer attachment of MN-ID, it performs the same: 
   sends a MN Fast Handover Notification message to AR1, and a MN 
   Location Update Request to EMAP. On one hand, EMAP deals with this MN 
   Location Update Request message the same way as in Figure 4. On the 
   other hand, on receiving the MN Fast Handover Notification message, 
   AR1 not only forwards the buffered data to AR2, but also sends a 
   Tunnel Update Request message to AR3 (CN is attaching to AR3) 
   containing the MN-IP, AR1-IP, CN-IP and AR2-IP. AR3 acts to this 
   Tunnel Update Request message by sending a Tunnel Setup Request 
   message to AR2 with AR3-IP, CN-IP, AR2-IP and MN-IP. AR2 will return 
   a Tunnel Built Acknowledgement message to AR3. On receiving the 
   Tunnel Built Acknowledgement message from AR2, AR3 will remove the 
   old bi-tunnel setting between AR3 and AR1, and then send a Tunnel 
   Remove message to notify AR1 to remove the related bi-tunnel between 
   AR1 and AR3. Thus the new bi-tunnel between AR2 and AR3 is built to 
   forward packets between MN and CN. And the whole handover process 
   completes. 
 
 
H. Wang               Expires October 10, 2006                [Page 9] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   When the procedure which a MN detaches from an EMD such as power-off 
   happens, an EMAP and an AR should delete the cache entry and the 
   associated tunnel for the MN. The detail of the detach procedure is 
   undefined in this document now. But the AR may send the EMAP a 
   message for deletion of the cache entry or the EMAP and the AR may 
   have a lifetime in each cache entry. 

    MN          AR2          AR1          EMAP           AR3          CN  
   |            |             |             |             |            |  
   |Data Packet |             |             |             |            |  
   |<~~~~~~~~~~~~~~~~~~~~~~~~>|<=========================>|<~~~~~~~~~~>|  
   |            |             |             |             |            |  
   0 ---------X-------------->|{Link layer de-association,AR1 gets MN-ID} 
   |            |             |{AR1 starts to buffer data}|            | 
   |            |             |             |             |            | 
   |            |< ---------- |MN movement notification & MN's context | 
   |            |             |             |             |            |  
   |   {Link layer (re-)association with AR2; AR2 gets MN-ID}          |  
   0----------->|             |             |             |            | 
   |     MN Fast Handover Notification (MN-ID, MN-IP, AR2-IP)          | 
   |            |------------>|             |             |            |  
   |            | MN Location Update Request (AR2-IP, MN-IP)           | 
   |            |-------------------------->|             |            | 
   |            |             |             |             |            |  
   |            |Buffered data|             |             |            |  
   |<~~~~~~~~~~~|<============|             |             |            |  
   |            |             |             |             |            |  
   |            |             | Tunnel Update Request     |            |  
   |            |             |-------------------------->|            |  
   |            |             | (MN-IP, AR2-IP, AR3-IP, CN-IP)         |  
   |            |             |             |             |            |  
   |            | Tunnel Setup Request (AR3-IP, CN-IP, AR2-IP, MN-IP)  |  
   |            |<----------------------------------------|            |  
   |            |             |             |             |            |  
   |     Tunnel Built Acknowledgement (AR3-IP, CN-IP, AR2-IP, MN-IP)   |  
   |            |---------------------------------------->|            |  
   |            |             |             |             |            |  
   |     Tunnel Remove Notification (AR3-IP, CN-IP, AR1-IP, MN-IP)     |  
   |            |             |<--------------------------|            |  
   |            |             |             |             |            |  
   |Data Packet |             |             |             |            |  
   |<~~~~~~~~~~>|<=======================================>|<~~~~~~~~~~>|  
                     Figure 5 : Handover procedure (2) 




 
 
H. Wang               Expires October 10, 2006               [Page 10] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

4. Protocol Specification  

   As described in the previous sections, the entities that are 
   introduced in NETLMM protocol are the Access Router (AR) and the Edge 
   Mobility Anchor Point (EMAP): the detailed operation of both of them 
   is described in following sections. Before that, the conceptual data 
   structures that AR and EMAP need to implement are described. 

4.1. Conceptual Data Structures  

   The conceptual data structures used in this protocol are the 
   following.  

       - MN Location Registration Cache (LR Cache)  

       - MN Location Registration List (LR List)  

   LR Cache keeps the bindings between the MN and the AR where the MN 
   attaches to for each MH, which is maintained by the EMAP. One LR 
   Cache entry contains the following fields:  

       - The Identifier which identifies a MN (MN-ID). In this protocol, 
   link layer specific ID such as MAC address is assumed to be the MN-ID.  

       - The IP address of the MN (MN-IP).  

       - The IP address of the AR where the MN is attaching to. (AR-IP) 

   The LR List is maintained in each AR, which records all the MH that 
   attaches to this AR. Each LR List entry contains the following fields: 
   MN-ID, MN-IP, EMAP-IP (the EMAP the MN location is registered). The 
   LR List can be seen as a subset of the LR Cache in EMAP. 

4.2. Access Router Operation  

   All ARs within an EMD send Router Advertisement which includes the 
   same prefix as the EMD subnet prefix. Also the AR advertise the EMAP 
   or the gateway of this EMD to be the default router for the MN, which 
   allows no any L3 change to the MN (IP address and the default router) 
   when it moves among different ARs.  

   An AR sends a MN Location Registration Request (LR Req) to an EMAP 
   whenever a new MN attaches on its link. The LR Req includes the MN-ID, 
   MN-IP and AR-IP. When sending the LR Req to the EMAP, the AR creates 
   the corresponding LR List entry.  


 
 
H. Wang               Expires October 10, 2006               [Page 11] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   When the AR receives a Location Registration Acknowledgement with a 
   status code indicating successful registration, it sets up a bi-
   directional tunnel with EMAP for the MN.  

   When the AR receives a LR Ack with a status code indicating an error, 
   it must remove the LR List entry. In particular, if the error code 
   indicates DAD failed, it must notify the MN that the IP address 
   currently in use is no longer valid. 

   When AR catches the Neighbor Solicitation (IPv6) or ARP Request 
   message from MN (IPv4), it must send a CN Location Query message to 
   EMAP with the CN-IP embedded. And afterwards, when it receives the CN 
   Location Reply from the EMAP with a successful code, AR (AR1) can 
   know the AR (AR2) which CN is now attaching to. Then AR1 sends a 
   Tunnel Setup Request message to AR2 containing (MN-IP, AR1-IP, CN-IP, 
   AR2-IP). 

   When the AR receives a Tunnel Setup Request from another AR, it must 
   setup a tunnel using the endpoint information (MN-IP, CN-IP, AR1-IP, 
   and AR2-IP) contained in the request message, and then send back a 
   Tunnel Built Acknowledgement.  

   Traffic from/to the MN goes through a bi-directional tunnel between 
   the AR and the EMAP, or between the two ARs. So, the AR encapsulates 
   and decapsultes packets from/to the MN.  

   When AR1 receives a link layer de-association event from MN-ID, it 
   must buffer the packets that are destined to MN-ID and send MN 
   Movement Notification message to all of its neighboring ARs 
   containing MN-ID, MN-IP and AR1-IP.  

   When AR2 receives a link layer (re-)association event from MN-ID, it 
   looks up local MN movement notification list. If the MN-ID is 
   notified earlier from AR1, it must send MN Fast Handover Notification 
   message (MN-ID, MN-IP, AR2-IP) to AR1. At the same time, it must send 
   MN Location Registration Request to EMAP with (AR2-IP,MN-IP). 

   On receiving a MN Fast Handover Notification message, AR1 must 
   forward the buffered data to AR2. And at the same time, AR1 must 
   check to see if there exists bi-tunnel with other ARs for this MN-ID. 
   If this kind of bi-tunnels exists, AR1 must send Tunnel Update 
   Request message, containing the new endpoint (say, AR2) of this 
   tunnel (MN-IP, AR2-IP, AR3-IP, CN-IP), to AR3 that is the other 
   endpoint of this bi-tunnel. 

   On receiving a Tunnel Update Request message from the peer endpoint 
   of a bi-tunnel, AR (AR3) must sends a Tunnel Setup Request message to 
 
 
H. Wang               Expires October 10, 2006               [Page 12] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   AR2. On receiving Tunnel Setup Request message, AR2 must setup bi-
   tunnel with AR3 to forward packet from MN-IP and CN-IP, and send back 
   a Tunnel Built Acknowledgement message to AR3. When AR3 gets this 
   acknowledgement message, it must remove the current bi-tunnel with 
   AR1 and send a Tunnel Remove Notification to AR1 which lets AR1 to 
   remove the related tunnel setting. 

   On receiving a MN Location Update message from EMAP, AR must update 
   its local LR List and remove the related bi-tunnel setting. 

4.3. Edge Mobility Anchor Point Operation 

   When an EMAP receives a MN Location Registration Request including 
   MN-IP, MN-ID and AR-IP, it must verify the MN-IP is unique or not in 
   the EMD by means of searching LR Caches using the MN-ID and/or MN-IP 
   as a key. If the LR Req message is valid, EMAP must create a new 
   entry in its LR Cache for this MN or update its existing LR Cache 
   entry, if the entry already exists.  

   If MN obtains its IP address through stateless IPv6 address 
   configuration, and unless this EMAP already has a LR Cache entry for 
   the MN, the EMAP must lookup to see if there is already a same IP 
   address in the LR Caches before returning the LR Ack. Since the LR 
   Caches in EMAP contain all the MN's information (MAC-ID, MN-IP, AR-
   IP), this lookup operation ensures that no other node is using the 
   same IP address inside this EMD and the Duplicate Address Detection 
   process can be skipped. If this lookup returns that there is 
   collision for the MN's address, the EMAP must send the AR a LR Ack 
   with a status code indicating Duplicate Address Detection failure. If 
   MN's IP address is configured through stateful address configuration 
   protocols by a center DHCP server, the above DAD procedure can be 
   removed. In fact, we can put the DHCP server inside EMAP. The EMAP 
   sends the AR a LR Ack with successful code if all checks performed 
   after receiving the LR Req have been successful.   

   On receiving the Location Update Request message from ARs, EMAP just 
   updates the LR cache, removes its local tunnel settings related to 
   the old AR for this MN and sends a MN Location Update message to the 
   AR in the cache to remove the cache entry on the AR. 

   On receiving the Location Query message (MN-IP) from ARs, EMAP 
   performs a lookup of the LR Caches with the key of MN-IP. If it finds 
   an entry for this MN-IP, EMAP returns a MN Location Reply message to 
   the AR containing the MH-IP and AR-IP; if it fails to find the 
   related entry, it returns a MN Location Reply message to the AR 
   containing a failure code. 

 
 
H. Wang               Expires October 10, 2006               [Page 13] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   Normally, EMAP is embedded in the gateway, so the bi-tunnel between 
   AR and EMAP is setup to enable MN to visit Internet. The EMAP should 
   de-capsulate packets from the MN to the Internet and encapsulates 
   packets from the Internet to the MN on the other hand. 

5. Security Considerations 

   Since NETLMM provides mobility support without any extra signaling 
   between the mobile node and network, it requires no extra security 
   association between the mobile node and the network entity that 
   protect such kind of signaling messages. Also removing mobile node 
   involvement in localized mobility management limits the possibility 
   of DoS attacks on network infrastructural elements [6]. 

   The security problem between the entities among NETLMM network side 
   is to protect the NETLMM signaling messages. IPSec can be applied 
   here to guarantee the messages. The security associations between 
   NETLMM entities can be built through static configuration or from 
   other infrastructures, which is currently not analyzed in this draft. 

6. IANA Considerations 

   This document will register with the IANA the protocol parameters set; 
   details of these registrations will appear in a later version of the 
   draft. 

7. Acknowledgments 

   The authors would like to thank Jinling Wang, Yichuan Wu, Yingang 
   Yuan for their reviews and comments on this document. 

8. References 

   [1]  Bradner, S., "Key words for use in RFCs to Indicate Requirement 
         Levels", BCP 14, RFC 2119, March 1997.  

   [2]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in 
         IPv6", RFC 3775, June 2004.  

   [3]  Aboba, et. al., B., "The Network Access Identifier", RFC2486, 
         Jan. 1999.   

   [4]  Narten, T., Nordmark, E. and W. Simpson, "Neighbor Discovery 
         for IP Version 6 (IPv6)", RFC 2461, December 1998.   



 
 
H. Wang               Expires October 10, 2006               [Page 14] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   [5]  Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, G., 
         Liebsch, M., "Problem Statement for IP Local Mobility", 
         Internet-Draft, draft-ietf-netlmm-nohost-ps-00, Feburary, 2006, 
         working in progress.  

   [6]  Kempf, J., Leung, K., Roberts, P., Nishida, K., Giaretta, G., 
         Liebsch, M., "Requirements and Gap Analysis for IP Local 
         Mobility", Internet-Draft, draft-ietf-netlmm-nohost-req-00, 
         Feburary, 2006, working in progress.   

   [7]  Thomson, S., Narten, T., Jinmei, T., "IPv6 Stateless Address 
         Autoconfiguration", Internet-Draft, draft-ietf-ipv6-rfc2462bis-
         08, May 2005.  

   [8]  Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, 
         M., "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", 
         RFC 3315, July 2003.  

   [9]  Moskowitz, R., Nikander, P., Jokela, P., and Henderson, T., 
         "Host Identity Protocol", Internet Draft, work in progress.   

   [10] Kivinen, T., and Tschopfening, H., "Design of the MOBIKE 
         Protocol", Internet Draft, work in progress. 

   [11] Marco Liebsch, et al. "Candidate Access Router Discovery", 
         Internet Draft, draft-ietf-seamoby-card-protocol-08.txt, work 
         in progress 



















 
 
H. Wang               Expires October 10, 2006               [Page 15] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

Author's Addresses 

   Hui Wang  
   NEC Laboratories China  
   11/F, Bldg.A, Innovation Plaza, Tsinghua Science Park  
   No.1, Zhong Guan Chun East Road, Beijing 
   China 
   Phone: +81 10 6270 5962 ext# 323 
   Email: wanghui@research.nec.com.cn 
        
   Yanfeng Zhang  
   NEC Laboratories China  
   11/F, Bldg.A, Innovation Plaza, Tsinghua Science Park  
   No.1, Zhong Guan Chun East Road, Beijing 
   China 
   Phone: +81 10 6270 5962 ext# 210 
   Email: zhangyanfeng@research.nec.com.cn 
    
   Yong Xia  
   NEC Laboratories China  
   11/F, Bldg.A, Innovation Plaza, Tsinghua Science Park  
   No.1, Zhong Guan Chun East Road, Beijing 
   China 
   Phone: +81 10 6270 5962 ext# 320 
   Email: xiayong@research.nec.com.cn 
    
   Comments are solicited and should be addressed to the working group's 
   mailing list at netlmm@ngnet.it and/or the author(s) 
    

Intellectual Property Statement 

   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 

   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 
 
 
H. Wang               Expires October 10, 2006               [Page 16] 

Internet-Draft             NETLMM Protocol                  April 2006 
    

   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at 
   ietf-ipr@ietf.org 

Disclaimer of Validity 

   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 

Copyright Statement 

   Copyright (C) The Internet Society (2006). 

   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights. 

Acknowledgment 

   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 

    
















 
 
H. Wang               Expires October 10, 2006               [Page 17]