TOC |
|
By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on October 10, 2008.
Proposed fast handover solutions for Mobile IPv4 depend on the presence of Foreign Agents (FA) in the networks between which the Mobile Node (MN) moves to ensure their operation. However, in many situations the MN moves into networks without FAs. This document proposes a solution that includes fast handover mechanisms involving a direct connection to the Home Agent (HA). This solution is not a full fledged fast handover proposal, but rather a complement to RFC 4881: Low-Latency Handovers in Mobile IPv4, and RFC 4988: Mobile IPv4 Fast Handover.
1.
Introduction
2.
Terminology
3.
Protocol
3.1.
Predictive Handover
3.2.
Reactive Handover
4.
Handover Using RFC 4881 Mechanisms
4.1.
Network with FA to Network without FA
4.2.
Network without FA to Network without FA
4.3.
Network without FA to Network with FA
5.
Handover Using RFC 4988 Mechanisms
5.1.
Network with FA to Network without FA
5.2.
Network without FA to Network without FA
5.3.
Network without FA to Network with FA
6.
Security Considerations
6.1.
NAT Considerations
6.2.
Security associations
7.
IANA Considerations
8.
References
8.1.
Normative References
8.2.
Informative References
§
Authors' Addresses
§
Intellectual Property and Copyright Statements
TOC |
The mobile IPv4 specification [rfc3344] (Perkins, C., “IP Mobility Support for IPv4,” August 2002.) allows for a Mobile Node (MN) to perform IPv4-layer handover when passing between different subnets whether a Foreign Agent (FA) is present or not. However, methods to achieve low-latency (or fast) handover between subnets described in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) and [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.) only describe situations where FAs are present. While the presence of FAs is almost certainly necessary to accommodate for real-time services on a MN, the case will almost certainly present itself where a mobile node will pass onto a subnet without an FA. And while it may not me possible to offer a perfect service in the cases where no FAs are present, this document describes the methods with which such handovers may be done faster and with less packet loss then otherwise.
The purpose of this document is not to describe a new fast-handover method, but rather to complement those described in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) and rfc4988 (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.) [rfc4988], and as such it is assumed that the reader is familiar with the basic operations and terminology of those RFCs. The general new protocol mechanisms to be introduced are described in Section 3 (Protocol), Section 4 (Handover Using RFC 4881 Mechanisms) presents the adaptations using [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) messages and protocol mechanisms, while Section 5 (Handover Using RFC 4988 Mechanisms) deals with handovers with the [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.) scheme. Finally, Section 6 (Security Considerations) addresses security considerations, and Section 7 (IANA Considerations) addresses IANA considerations.
Some concepts are common to [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) and [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.), but are described with different terms. The terms that are borrowed from one RFC, but have a different name in the other are described in Section 2 (Terminology). Terms introduced in this document are also described in that section.
TOC |
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [rfc2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).
In addition, this document introduces or redefines the following terms:
NwFA: Network with a FA that supports fast handovers.
NwoFA: Network without a FA, or with an FA that doesn’t have fast handover capability.
oFA: old Foreign Agent (as in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.)), corresponds to the PAR in rfc4988 (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.) [rfc4988].
nFA: new Foreign Agent (as in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.)), corresponds to the NAR in [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.).
Handover: A process of terminating existing connectivity and obtaining new IP connectivity (as described in [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.)), corresponds to “handoff” in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.).
TOC |
The protocol can roughly be divided into three parts: the handover from a network with an FA (NwFA) to a network without an FA (NwoFA), the handover from a NwoFA to another NwoFA, and the handover from a NwoFA to a NwFA. In all cases, to achieve better handovers the protocol relies on the following mechanisms:
The handover from a NwFA to another NwFA is the standard case covered in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) and [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.). For all cases, one can distinguish the situation where the MN or the networkpredicts the handover (predictive situation) from the situation where the handover happens abruptly (reactive situation).
TOC |
The basic concepts for predictive handovers are simple:
The general case of a MN moving from a NwFA to a NwoFA (predictive) is presented in greater detail in Figure 1:
+-----+ 4: ask to buffer +-----+ | | ------------------> | HA | | oFA | | | +-----+ +-----+ ^ | ^ ^ /\ 2| |3 | | || | | |4: trigger 7| || 8: buffer + | | | (optional)| | || tunneled data | v | | v \/ +-----+ | +-----+ | MN | | | MN | +-----+ - - - - |- - > +-----+ Movement | | NwFA | NwoFA
Figure 1 |
The predictive handover from a NwoFA to another NwoFA is similar, to only difference being that the HA also plays the role of the oFA. However, as it is not possible for the HA to receive L2 triggers, the handover has to be initiated by the MN.
The general predictive handover from a NwoFA to a NwFA is depicted in Figure 2:
+-----+ 5 +-----+ | | <-----------------> | nFA | | HA | ------------------> | | +-----+ 6 ---> +-----+ ^ | ^ / ^ /\ 2| |3 |4b ----------/ | || | | | / 4a 7| || 8: buffer + | | | / | | || tunneled data | v | / | | \/ +-----+ | +-----+ | MN | | | MN | +-----+ - - - - |- - > +-----+ Movement | | NwoFA | NwFA
Figure 2 |
- 4a.
- in the case of [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) it is the nFA (tunnelled via the HA)
- 4b.
- in the case of [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.) it is the HA.
In many cases, a MN may have the option to switch to several networks. Although the exact mechanism a MN uses to determine to which network it will attach itself is beyond the scope of this document, the presence of an FA FA supporting fast handovers SHOULD be taken into consideration.
TOC |
A reactive situation occurs as the handover happens before the MN has time to complete a predictive handover. The reactive situation as the MN moves to or from a NwoFA is the following:
The reactive situation is in fact almost identical to normal registration as described in [rfc3344] (Perkins, C., “IP Mobility Support for IPv4,” August 2002.), the only difference being the buffer which is maintained and sent by the HA. As such, its working doesn’t need to be described in terms of [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) or [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.).
TOC |
This section details the better than nothing fast handover protocol as described in Section 3.1 (Predictive Handover) using the same message patterns as in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.). In all cases, we will describe the handover with both the PRE-REGISTRATION and POST-REGISTRATION methods if possible. The PRE-REGISTRATION method normally allows the MN to register its next connection in advance with the HA, while the POST-REGISTRATION method normally allows a tunnel to be created between the oFA and the nFA to ensure that the communication remains unbroken during handover. Unfortunately, it is not possible to pre-register when moving to a network without a FA, and it is not possible either to create a tunnel from an old network to a new one without both an oFA and a nFA. However, the messages used in PRE-REGISTRATION and POST-REGISTRATION may sent to the HA in order for it to buffer information or send it to a nFA. Also, unlike normal POST-REGISTRATION situations, it is either impossible or undesirable to have three party handover situations.
The [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.) protocol also describes a combined method with the mechanisms of both PRE- and POST-REGISTRATION. This combined method makes no sense in a situation where at least one of the networks doesn’t have an FA, as both PRE- and POST-REGISTRATION messages have the same effect. The only difference is that POST-REGISTRATION uses L2-triggers to allow the handover to happen without a message from the MN.
TOC |
Moving from an NwFA to an NwoFA allows the use of both PRE-REGISTRATION and POST-REGISTRATION messages to communicate with the HA. Figure 3 presents the PRE-REGISTRATION situation:
MN oFA HA | | | |-------PrRtSol------>| | |<------PrRtAdv-------| | | | | |--------------RegReq (via oFA)----------->| <~buffer |<-------RegReply (error, via oFA)---------| | | | | | | disconnect | | | | | connect | | |--------------- RegRequest--------------->| |<-------------- RegReply------------------| |<==================================== deliver packets | | |
Figure 3 |
The situation with POST-REGISTRATION methods is depicted in figure 4:
MN oFA HA | | | | L2-ST ~~~>|-------HRqst------->|<~buffer | |<------HRply--------| | | | | | | disconnect L2-LD ~~~>| | | | | | | | | | | connect | | L2-LU ~~~>|--------- RegRequest--------------------->| |<------- RegReply-------------------------| |<=================================== deliver packets | | |
Figure 4 |
TOC |
When a MN moves from a network without FA to another NwoFA, POST-REGISTRATION is impossible as the HA cannot receive a L2 trigger. PRE-REGISTRATION messages can however be used to inform the HA that it needs to buffer. The message exchange is depicted in Figure 5:
MN HA | | |------RtSolPr------->| |<-----PrRtAdv--------| | | |------RegRequest---->|<~buffer | | |<--RegReply(error)---| | | disconnect | | | | | | | connect | | | |-------RegRequest--->| |<------RegReply------| |<================ deliver packets | |
Figure 5 |
TOC |
This movement uses the PRE-REGISTRATION handover system, with the HA in the role of the oFA. Since there is no oFA, it is unlikely that there can be a source triggered handover, but a target triggered handover and a mobile triggered handover are possible. The mechanism is described in figure 6:
MN HA nFA | | | | |------PrRtSol------>| | |<-----PrRtAdv-------| | | | |-------PrRtSol------>| | |<------PrRtAdv-------| | | | | |-----------RegReq (tunneled via HA)------>| | |<------ RegReq------| | |----- RegReply----->|<~buffer | | | | forward | | packets===============>| disconnect | | | | | connect | | | | | |-----------Agent Solicitation------------>| |<=================================== deliver packets | | (including RegReply) | | |
Figure 6 |
The ‘S’ bit MAY be set in the registration message from the MN (in 3), in which case all data is sent both to the nFA and to the MN. In this case, buffering by the nFA may not be necessary, or even beneficial.
The situation with POST-REGISTRATION methods is depicted in figure 7:
MN nFA HA | | | | L2-TT ~~~>|-------HRqst------->| | |<------HRply--------| | buffer~>|<================ deliver packets | | | disconnect L2-LD ~~~>| | | | | | | | | | | connect | | |<==deliver packets==>|<~~~ L2-LU | L2-LU ~~~>|--------- RegRequest--------------------->| |<-------- RegReply------------------------| |<=================================== deliver new packets | | (via nFA) | | |
Figure 7 |
TOC |
This section details the better than nothing fast handover protocol as described in Section 3.1 (Predictive Handover) using the same messages and message patterns as in [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.).
TOC |
Figure 8 shows the timeline for the predictive mode of operation:
MN oFA HA | | | |------RtSolPr------->| | |<-----PrRtAdv--------| | | | | |------FBU----------->|--------HI--------->| | |<------HAck---------| | <--FBack---|--FBack---> |<~buffer | | | disconnect | | | | | | | | | | | connect | | | | | |--------- RegRequest--------------------->| |<-------- RegReply------------------------| |<=================================== deliver packets | | (including FBack)
Figure 8 |
TOC |
Figure 9 shows the timeline for the predictive mode of operation:
MN HA | | |------RtSolPr------->| |<-----PrRtAdv--------| | | |------FBU----------->| | | | <--FBack---|<~buffer | | disconnect | | | | | | | connect | | | |-------RegRequest--->| |<------RegReply------| |<================deliver packets | (including FBack)
Figure 9 |
TOC |
Figure 10 shows the timeline for the predictive mode of operation:
MN HA nFA | | | |------RtSolPr------->| | |<-----PrRtAdv--------| | | | | |------FBU----------->|--------HI--------->| | |<------HAck---------| | <--FBack---|--FBack---> |<~buffer | | | disconnect forward | | packets===============>| | | | | | | connect | | | | | |--------- FBU --------------------------->| |<=================================== deliver packets | | (including FBack) | |<-----FBU-----------| |-----RegRequest----->| | |<----RegReply--------| |
Figure 10 |
TOC |
TOC |
A FA that supports fast handover MUST either have a public address or, if it really must be behind a NAT, there MUST be a mechanism whereby all mobile IP traffic is relayed to the FA. A simple way to accomplish this may simply be to forward all traffic on UDP port 434 to the FA, but mechanisms such as STUN [rfc3489] may also be used. In any case, a FA behind a NAT MUST implement [rfc3519], in which case all fast handover registration messages must carry either the UDP Tunnel Request or UDP Tunnel Reply extension.
TOC |
In addition to the mobile IP communications defined in [rfc3344] (Perkins, C., “IP Mobility Support for IPv4,” August 2002.), fast handovers (as defined in [rfc4881] (El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” June 2007.), [rfc4988] (Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” October 2007.) and this document) feature extra messages that are solely between the FA and HA or in between two FAs. In order to prevent attacks such as traffic redirection and denial of service, those messages MUST be secured. However, having a security association between FAs and HAs may be problematic. For local communications, such as between neighbouring FAs, or for mobile IP elements belonging to a same organisation, the security association may simply be a statically input shared secret. However, this documents stipulates that the HA must be able to dynamically discover and create security associations with FAs (Section 3 (Protocol)). The CARD protocol [rfc4066] (Liebsch, M., Singh, A., Chaskar, H., Funato, D., and E. Shim, “Candidate Access Router Discovery (CARD),” July 2005.) already describes how its security associations are to be implemented, but other possible methods include using IKEv2 [rfc4306] (Kaufman, C., “Internet Key Exchange (IKEv2) Protocol,” December 2005.) or an AAA infrastructure such as Diameter [rfc3588] (Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. Arkko, “Diameter Base Protocol,” Septemper 2003.) whose use is specified in relation to mobile IPv4 (as described in [rfc4004] (Calhoun, P., Johansson, T., Perkins, C., Hiller, T., and P. McCann, “Diameter Base Protocol,” August 2005.)).
TOC |
This document does not allocate any numbers, so there are no IANA considerations.
TOC |
TOC |
[rfc2119] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” RFC 2119, BCP 14, March 1997. |
[rfc3344] | Perkins, C., “IP Mobility Support for IPv4,” RFC 3344, August 2002. |
[rfc3519] | Levkowetz, H. and S. Vaarala, “Mobile IP Traversal of Network Address Translation (NAT) Devices,” RFC 3519, April 2003. |
[rfc3588] | Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J. Arkko, “Diameter Base Protocol,” RFC 3588, Septemper 2003. |
[rfc4004] | Calhoun, P., Johansson, T., Perkins, C., Hiller, T., and P. McCann, “Diameter Base Protocol,” RFC 4004, August 2005. |
[rfc4066] | Liebsch, M., Singh, A., Chaskar, H., Funato, D., and E. Shim, “Candidate Access Router Discovery (CARD),” RFC 4066, July 2005. |
[rfc4306] | Kaufman, C., “Internet Key Exchange (IKEv2) Protocol,” RFC 4306, December 2005. |
[rfc4433] | Kulkarni, M., Patel, A., and K. Leung, “Mobile IPv4 Dynamic Home Agent (HA) Assignment,” March 2006. |
[rfc4881] | El Malki, K., “Low-Latency Handoffs in Mobile IPv4,” RFC 4881, June 2007. |
[rfc4988] | Koodli, R. and C. Perkins, “Mobile IPv4 Fast Handovers,” RFC 4988, October 2007. |
TOC |
[rfc4068] | Koodli, R., “Fast Handovers for Mobile IPv6,” RFC 4068, July 2005. |
TOC |
Alistair Doswald (editor) | |
Haute Ecole d'Ingénieurie et de Gestion du Canton de Vaud | |
Route de Cheseaux 1 | |
Yverdon-les-Bains, VD 1401 | |
CH | |
Email: | alistair.doswald@heig-vd.ch |
URI: | http://www.heig-vd.ch/ |
Stephan Robert | |
Haute Ecole d'Ingénieurie et de Gestion du Canton de Vaud | |
Route de Cheseaux 1 | |
Yverdon-les-Bains, VD 1401 | |
CH | |
Email: | stephan.robert@heig-vd.ch |
URI: | http://www.heig-vd.ch/ |
TOC |
Copyright © The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions contained in BCP 78 and at http://www.rfc-editor.org/copyright.html, and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.