TOC |
|
By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 9, 2009.
A vertical handover occurs in heterogeneous networks when a session media is moved among different access network technologies within the same device. This document analyses the issue of handling the vertical handover using the Session Initiation Protocol (SIP) (Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol,” June 2002.) [1].
1.
Introduction
2.
Terminology
3.
Scenario for vertical handover
4.
Requirements for Vertical Handovers
5.
Taxonomy of possible approaches
6.
Conclusions
7.
Security considerations
8.
IANA Considerations
9.
References
9.1.
Normative References
9.2.
Informative References
§
Authors' Addresses
§
Intellectual Property and Copyright Statements
TOC |
Let us consider a terminal (hereafter named "Mobile Host" or MH), possibly equipped with different network interfaces (i.e. a subset of WiFi, Bluetooth, GPRS, 3G, fixed Ethernet, WiMax). A user will be able to access the Internet using the same MH. This seems to be the trend for the foreseeable future, i.e. we will be surrounded by a heterogeneous network where several access networks (ANs) supplement each other. Each interface of the MH will receive an IP address from the corresponding AN. Therefore the mobile host will have a set of different IP addresses and will have to select which one to use when running multimedia sessions with correspondent terminals. While the mobile host moves, the "selected" interface may become not available due to loss of signal, or could suffer high packet loss or packet delay. Under these circumstances, the MH would like to switch to another interface (using a different IP address) keeping the running sessions active, and might adjust the service quality to be optimal depending on circumstances. Even with a single interface the connected access network can become not available anymore and the terminal could connect to another Access Network (in this case on the same technology), which provides a different IP address. If the switch to the new AN is fast enough, the MH could also be interested in keeping the running session active.
This problem has been addressed with different approaches. One approach is based on "network level" mobility solutions like Mobile IP or MobileIPv6. Another approach is based on "application level" mobility solution. The main advantage of application level mobility solutions is that they do not require any support at the network level from the different access networks, which only needs to provide plain IP connectivity. Application level mobility can conduct flexible mobility management, which is another advantage. This document details the issues and the requirements regarding an "application level" mobility solution, in particular considering the solution that exploits the SIP protocol. The aim of SIP based application level mobility is to keep active a multimedia session that has been established with SIP, while the terminal switches from one network interface to another or it changes IP address on the same interface.
TOC |
This section presents a few terms used throughout the document.
TOC |
The figure below shows a Mobile Host that wants to communicate with a "Correspondent Host" (CH). The Mobile Host can connect to different Access Networks (AN1, AN2, AN3 are represented in the figure). The different ANs could have different wireless or wired techologies and difference bandwidth/delay, and the Mobile Host could be connected to more than one Access Network at the same time if it has more than one physical network interface. Note that the Access Networks can provide public or private addresses to the mobile host (in most typical scenarios the Access Networks are likely to provide private IP addresses). For example in the figure below AN 1 and AN 3 provide a private address (as shown by the NAT box), while AN2 provides a public address. Similarly, the Correspondent Host can have a public address (like CH 1 in the figure) or a private IP address (like CH 2 in the figure).
+-------+ | AN1 |-----+ ----| | NAT | +--------+ / +-------+-----+ |Corresp.| +-------+ __________ | Host 1 | | Mobile| +-------+ / \ +--------+ | Host | | AN2 | / \ +-------+ ----| | | INTERNET | + - - - + \ / \__________/ \ +-------+ +--------+ ----| AN3 |-----+ +-----|Corresp.| | | NAT | | NAT | Host 2 | +-------+-----+ +-----+--------+
Figure 1 - Network architecture for vertical handover |
The goal of the handover mechanism is to let the MH roam among different Access Networks in a seamless way. The mobility management mechanism should consider the roaming of the MH both "off call" and during an active call. The MH should be able to dynamically choose among the available ANs the one that better suits its needs (e.g. perceived quality of media flows and cost) in a given moment. It is important to notice that this draft does not address the criteria and tools for selection of the "best" access network, it only details the issues and the requirements regarding the mobility management and handover execution mechanims.
TOC |
In this session we discuss a set of requirements that a mobility management solution based on SIP should have. The requirements are divided into two types, i.e., mandatory requirements and optional requirements.
Mandatory Requirements
Optional Desirable Requirements
TOC |
The application level terminal mobility solutions based on SIP can be classified in "Correspondent host based" or "Intermediate Element based". In addition, a session (service) mobility is introduced just for reference.
RFC 3261 [1] (Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol,” June 2002.) has a built in mechanism for mobility management. The "off-call" mobility management consists in the Registration process. The "on-call" handover is performed using RE-INVITE messages towards the Corresponding Node [7] (Schulzrinne, H. and E. Wedlund, “Application-Layer Mobility Using SIP,” July 2000.). No intermediate entities are directly involved in the handover process. This has the advantage that no additional procedure for the handover needs to be implemented in network elements, and that there is no additional load in the networks due to the handovers. On the other hand, the procedure requirese that the Corresponding Node (which in general is not a mobile host) supports the RE-INVITE mechanism. A second drawback is that the handover delay is directly proportional to the end-to-end delay, and this could be higher with respect to the delay occurring between a mobile node and an intermediate entity.
In order to overcome the drawbacks of the Correspondent Host based solutions, "intermediate" entities that take an active role in the handover can be introduced. Several proposals can be found in the literature, but to our knowledge no internet draft has been proposed in this respect. Hereafter we mention some of the existing proposals. In [6] (Banerjee, N. and et. al, “Seamless SIP-Based Mobility for Multimedia Applications,” March/April 2006.), intermediate entities are used only to speed up the handover process, but the handover procedure still involves the Corresponding Node as well. A similar approach is followed in [11] (Tsiakkouris, S. and I. Tsiakkouris, “PROFITIS: architecture for location-based vertical handovers supporting real-time applications,” April 2006.), which also deals with location based selection of the "optimal" intermediate entity and of wireless access points. In [10] (Salsano, S., “SIP-based Mobility Management in Next Generation Networks,” April 2008.) the intermediate entities fully handle the user mobility, hiding the mobility to the Corresponding Nodes. In [12] (Izumikawa, H., Fukuhara, T., Matsunaka, T., and K. Sugiyama, “User-centric Seamless Handover Scheme for Realtime Applications,” September 2007.), the intermediate entities are used to support MH's mobility as well as adjusting service quality to the MH's target access network.
Concerning session (service) mobility using SIP, [7] (Schulzrinne, H. and E. Wedlund, “Application-Layer Mobility Using SIP,” July 2000.) has examined through the use of both Third-Party Call Control (3PCC) (Rosenberg, J., Peterson, J., Schulzrinne, H., and G. Camarillo, “Best Current Practices for Third Party Call Control (3pcc) in the Session Initiation Protocol (SIP),” April 2004.) [4] as well as SIP's REFER [5] (Sparks, R., “The Session Initiation Protocol (SIP) Refer Method,” April 2003.) method as possible solutions. In addition, more recently, [8] (Shacham, R., “Session Initiation Protocol (SIP) Session Mobility,” November 2007.) has expanded upon this work and demonstrated the suitability of employing either 3PCC or SIP's REFER request as suitable mechanisms for session (service) mobility between mobile devices.
Although such session (service) mobility [7] (Schulzrinne, H. and E. Wedlund, “Application-Layer Mobility Using SIP,” July 2000.) [8] (Shacham, R., “Session Initiation Protocol (SIP) Session Mobility,” November 2007.) can maintain a media session even while changing terminal through the use of 3PCC [4] (Rosenberg, J., Peterson, J., Schulzrinne, H., and G. Camarillo, “Best Current Practices for Third Party Call Control (3pcc) in the Session Initiation Protocol (SIP),” April 2004.) or SIP's REFER [5] (Sparks, R., “The Session Initiation Protocol (SIP) Refer Method,” April 2003.) method, there can be a service interruption during the hard swithing (handover). Therefore, it is necessary to look into a fast/seamless handover for SIP-based terminal mobility where the existing media session seamlessly continues on the same device after a handover.
TOC |
As a concluding remark, we believe that it is important to consider a new solution for vertical handover that meets the set of requirements that has been analysed. This solution will help providing seamless handover to SIP based application with a better performance and overcoming some shortcomings of the current solution based on [1] (Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol,” June 2002.).
TOC |
The security considerations should be taken into account in the design of the handover solution, so that no new additional security issues will be introduced.
TOC |
This memo includes no request to IANA.
TOC |
TOC |
[1] | Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol,” RFC 3261, June 2002 (TXT). |
[2] | Perkins, C., “Mobility Support in IPv6,” RFC 3344, August 2002 (TXT). |
[3] | Johnson, D., Perkins, C., and J. Arkko, “IP Mobility Support for IPv4,” RFC 3775, June 2004 (TXT). |
[4] | Rosenberg, J., Peterson, J., Schulzrinne, H., and G. Camarillo, “Best Current Practices for Third Party Call Control (3pcc) in the Session Initiation Protocol (SIP),” BCP 85, RFC 3725, April 2004 (TXT). |
[5] | Sparks, R., “The Session Initiation Protocol (SIP) Refer Method,” RFC 3515, April 2003 (TXT). |
TOC |
[6] | Banerjee, N. and et. al, “Seamless SIP-Based Mobility for Multimedia Applications,” IEEE Network , March/April 2006. |
[7] | Schulzrinne, H. and E. Wedlund, “Application-Layer Mobility Using SIP,” ACM Mobile Computing and Communications Review Vol.4, No.3, July 2000. |
[8] | Shacham, R., “Session Initiation Protocol (SIP) Session Mobility,” draft-shacham-sipping-session-mobility-05 (work in progress), November 2007 (TXT). |
[9] | Salsano, S., “Architecture and testbed implementation of vertical handovers based on SIP Session Border Controllers,” Wireless Personal Communications, Springer , November 2007. |
[10] | Salsano, S., “SIP-based Mobility Management in Next Generation Networks,” IEEE Wireless Communication , April 2008. |
[11] | Tsiakkouris, S. and I. Tsiakkouris, “PROFITIS: architecture for location-based vertical handovers supporting real-time applications,” 25th IEEE International Performance, Computing, and Communications Conference (IPCCC 2006), April 2006. |
[12] | Izumikawa, H., Fukuhara, T., Matsunaka, T., and K. Sugiyama, “User-centric Seamless Handover Scheme for Realtime Applications,” IEEE Internation Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), September 2007. |
TOC |
Saverio Niccolini | |
Network Laboratories, NEC Europe Ltd. | |
Kurfuersten-Anlage 36 | |
Heidelberg 69115 | |
Germany | |
Phone: | +49 (0) 6221 43 42 118 |
Email: | saverio.niccolini@netlab.nec.de |
URI: | http://www.netlab.nec.de |
Stefano Salsano | |
DIE, University of Rome "TorVergata" | |
Via Politecnico, 1 | |
Rome 00156 | |
Italy | |
Phone: | +39 06 7259 7770 |
Email: | stefano.salsano@uniroma2.it |
URI: | http://netgroup.uniroma2.it/Stefano_Salsano |
Haruki Izumikawa | |
KDDI Labs | |
2-1-15 Ohara | |
Fujimino 356-8502 | |
Japan | |
Phone: | +81-49-278-7866 |
Email: | izumikawa@kddilabs.jp |
Ross Lillie | |
Motorola Labs | |
1301 East Algonquin Road, IL02/2240 | |
Schaumburg, IL 60196 | |
US | |
Phone: | +1 847 576 0012 |
Email: | ross.lillie@motorola.com |
Luca Veltri | |
DII, University of Parma | |
Parco Area delle Scienze 181/A | |
Parma 43100 | |
Italy | |
Phone: | +39 0521 90 5768 |
Email: | luca.veltri@unipr.it |
URI: | http://www.tlc.unipr.it/veltri |
Yoji Kishi | |
KDDI Labs | |
2-1-15 Ohara | |
Fujimino 356-8502 | |
Japan | |
Email: | kishi@kddilabs.jp |
TOC |
Copyright © The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org.