Re: [DMM] Comments on DMM Gap Analysis.

<karagian@cs.utwente.nl> Wed, 19 September 2012 11:11 UTC

Return-Path: <karagian@cs.utwente.nl>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 616CA21F8754 for <dmm@ietfa.amsl.com>; Wed, 19 Sep 2012 04:11:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.504
X-Spam-Level:
X-Spam-Status: No, score=-0.504 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AC5fx3GSI6Yf for <dmm@ietfa.amsl.com>; Wed, 19 Sep 2012 04:11:07 -0700 (PDT)
Received: from EXEDGE01.ad.utwente.nl (exedge01.ad.utwente.nl [130.89.5.48]) by ietfa.amsl.com (Postfix) with ESMTP id 663B421F86FC for <dmm@ietf.org>; Wed, 19 Sep 2012 04:11:05 -0700 (PDT)
Received: from EXHUB02.ad.utwente.nl (130.89.4.229) by EXEDGE01.ad.utwente.nl (130.89.5.48) with Microsoft SMTP Server (TLS) id 14.1.339.1; Wed, 19 Sep 2012 13:11:10 +0200
Received: from EXMBX04.ad.utwente.nl ([169.254.4.4]) by EXHUB02.ad.utwente.nl ([130.89.4.229]) with mapi id 14.01.0339.001; Wed, 19 Sep 2012 13:11:04 +0200
From: karagian@cs.utwente.nl
To: jouni.nospam@gmail.com, dmm@ietf.org, h.anthony.chan@huawei.com, JuanCarlos.Zuniga@interdigital.com
Thread-Topic: [DMM] Comments on DMM Gap Analysis.
Thread-Index: AQHNa/boI0rituCWdkGdrm+e/9iWcJeRf28AgABUdWA=
Date: Wed, 19 Sep 2012 11:11:03 +0000
Message-ID: <FF1A9612A94D5C4A81ED7DE1039AB80F2CBF944D@EXMBX04.ad.utwente.nl>
References: <CAB2CD_UeQC57JtTBZ46zqdHub0epr2PXQqWok0SPiXuzm6M8hQ@mail.gmail.com> <A8ED1DF8-21D6-4770-91BC-3A8363124B43@gmail.com>
In-Reply-To: <A8ED1DF8-21D6-4770-91BC-3A8363124B43@gmail.com>
Accept-Language: nl-NL, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [130.89.12.129]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: dmm-chairs@tools.ietf.org
Subject: Re: [DMM] Comments on DMM Gap Analysis.
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Sep 2012 11:11:08 -0000

Hi Jouni, Hi all, 

After discussing this issue with Carlos Jesús Bernardos and Juan Carlos Zuniga, we concluded that the following set of possible technologies could be included in the Gap analysis draft:

=> Shim6: Level 3 Multihoming Shim Protocol for IPv6 
http://www.rfc-editor.org/rfc/rfc5533.txt


=> LISP Mobile Node
http://www.ietf.org/id/draft-meyer-lisp-mn-07.txt
Locator/ID Separation Protocol (LISP) 
http://www.ietf.org/id/draft-ietf-lisp-23.txt

=> Mobile IPv6 Fast Handovers
http://tools.ietf.org/id/draft-ietf-mipshop-rfc5268bis-01.txt
This is the draft that became then RFC5568, so no need to mention it.
http://www.rfc-editor.org/rfc/rfc5568.txt


=> Fast Handovers for Proxy Mobile IPv6 
http://www.rfc-editor.org/rfc/rfc5949.txt

=> Host Identity Protocol
http://www.rfc-editor.org/rfc/rfc4423.txt
http://www.rfc-editor.org/rfc/rfc5201.txt
http://www.rfc-editor.org/rfc/rfc6253.txt
http://www.rfc-editor.org/rfc/rfc5206.txt



=> IKEv2 Mobility and Multihoming Protocol (MOBIKE) 
http://www.rfc-editor.org/rfc/rfc4555.txt


=> GTPv2-C: 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 3GPP Evolved Packet System (EPS);  
Evolved General Packet Radio Service (GPRS) Tunnelling Protocol for Control plane (GTPv2-C); Stage 3 (Release 11)
http://www.3gpp.org/ftp/Specs/archive/29_series/29.274/29274-b30.zip

Please inform us if this list makes sense to you?

Best regards,
Georgios


> -----Original Message-----
> From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of
> jouni korhonen
> Sent: woensdag 19 september 2012 9:58
> To: dmm@ietf.org; h chan; Juan Carlos Zuniga
> Cc: dmm-chairs@tools.ietf.org
> Subject: Re: [DMM] Comments on DMM Gap Analysis.
> 
> 
> Folks,
> 
> It has been rather silent on the list recently. Regarding the "explosion" of
> possible technologies in the GAP analysis, we discussed (chairs) that it is
> better to scope the area "a bit". The charter today has the assumption that
> we build on top of existing _IP_ _Mobility_ protocols (and bunch of IETF
> defined examples follow). So, to tighten the scope, the Gap Analysis should
> leave all routing, session  (SIP, ..), transport (MPTCP, SCTP, DCCP, ..),
> locator/identifier split (HIP, Lisp, ..), naming (DNS tricks, ..) etc based
> solutions out. Coarse but should help us to make progress. We could discuss
> whether transport layer solution like SCTP fit in but I do not see them as end-
> 2-end solutions being deployable in Internet at the moment.
> 
> Let us stick with  technologies out there that have/had a place in sun: few
> MIP variants, MOBIKE, stuff in 3GPP(2) (oops.. but I think this deserves to be
> evaluated since they are somewhat popular), and what applications do
> (reconnecting..). This analysis should be down to earth practical and realistic
> on what is already out there to play with.
> 
> - Jouni & Julien
> 
> 
> 
> On Jul 27, 2012, at 3:53 PM, Jong-Hyouk Lee wrote:
> 
> > Dear Anthony and Juan.
> >
> > I enjoyed the both gap analysis documents (draft-chan-dmm-framework-
> gap-analysis-02 and draft-zuniga-dmm-gap-analysis-01). Here I give some
> comments that should be used directly in the gap analysis documents if you
> guys like.
> >
> > Kindly consider the followings during the gap analysis discussion (since I will
> not be attending the IETF meeting this time).
> >
> > 1. Comment on address (resource) management in a DMM environment.
> > 2. Comment on a deployment of a client-based mobility solution (i.e.,
> MIPv6) in a DMM environment.
> > 3. Commnet on neighbor mobility anchors' information in a DMM
> environment.
> > 4. Commnet on an establishment of security associations in a DMM
> environment.
> >
> > === 1. Comment on address (resource) management in a DMM
> environment.
> > === When existing IP mobility support protocols (e.g., MIPv6 and PMIPv6)
> are considered to be deployed in a DMM environment, a mobile node (MN)
> is allowed to configure a new address while keeping its previous address(es).
> It introduces the following differences with the address (resource)
> management of the existing ones:
> >
> > MN's address configured at the interface with a DMM environment: n =
> > (IP address at the current access network + previously configured IP
> > address(es) with ongoing sessions) MN's address configured at the
> > interface without a DMM environment: 1 = (care-of address in MIPv6 or
> > MN's home address in PMIPv6)
> >
> > This leads a couple of considerations we didn't have with the existing
> > IP mobility support protocols. For instance,
> >
> > 1) MN's address management: use of a newly configured address at the
> current access network for new communication sessions while a proper
> address selection for previously established ongoing communication
> sessions.
> >
> > 2) Additional treatment for ingress filtering: Ingress filtering is widely used
> against source address spoofing. The source addresses (especially, the
> network prefix part) of incoming packets are strictly checked to make sure
> that those packets are actually from the network that they claim to be from.
> As the MN are allowed to send data packets with the previously configured
> address(es) at the new access network, those data packets would be filtered
> at the ingress filtering place because the source address of those data
> packets is not belonging to the new access network. Accordingly, an
> additional treatment for ingress filtering is required.
> >
> > 3) MN's address increase at the MN's interface: Recall the number of MN's
> address configured at an interface is n. Then, n is increased, as the MN
> changes its point of attachment while keeping its ongoing communication
> sessions. It brings the question: "How many addresses are currently possible
> to be configured at an interface?"
> >
> > 4) Routing entry increase at the serving mobility anchor: Let the serving
> mobility anchor is the mobility anchor serves the MN. Traffic associated to
> the MN travels via the serving mobility anchor. The increase of the addresses
> associated to the MN, n, is not only concerning to the MN, but also
> concerning the serving mobility anchor as it contributes the increase of
> routing entries for the MN.
> >
> > === 2. Comment on a deployment of a client-based mobility solution
> > (i.e., MIPv6) in a DMM environment. === When a client-based mobility
> solution (i.e., MIPv6) is consiered to be deployed in a DMM environment, an
> MN is involved in mobility signaling such as Binding Update and
> Acknowledgement messages. This is the big difference with the network-
> based mobility solution (i.e., PMIPv6). As the MN send signaling to inform its
> movement to its mobility anchor, the client-based mobility solution allows
> the MN to supply client-centric decision for mobility management.
> >
> > Suppose that the origin mobility anchor is the mobility anchor where the
> MN has configured its IP address and established ongoing communication
> sessions with the IP address. The number of origin mobility anchors are n - 1.
> Recall that the serving mobility anchor is the mobility anchor where the MN is
> being served by. Then, the MN's involvement in mobility signaling brings us
> the questions: "Should we let the MN send mobilty signaling to its all mobility
> anchors?" or "Would it make sense that the MN only sends mobility signaling
> to its serving mobility anchor?" Depending on the choice, we will have
> different results:
> >
> > 1) "MN sends mobility signaling to its all mobility anchors" causes:
> > 1.1 increased mobility signaling load, e.g., signaling * (n - 1).
> > 1.2 bidirectional tunnels are established between the MN and its mobility
> anchors.
> > 1.3 tunneling overhead over the air is present.
> > 1.4 but the tunnels are terminated at the MN so that the MN has control
> over the tunnels.
> >
> > 2) "MN sends mobility signaling only to its serving mobility anchor" causes:
> > 2.1 reduced mobility signaling load, e.g., signaling * 1.
> > 2.2 bidirectional tunnels are established between the serving mobility
> anchors and origin mobility anchors.
> > 2.3 tunneling overhead over the air can be avoided.
> > 2.4 but the MN does not have control over the tunnels so it might affect to
> NEtwork MObility (NEMO) as the MN (i.e., MR in NEMO) loses the tunneling
> control.
> >
> > === 3. Neighbor mobility anchors' information in a DMM environment.
> > === In the client-based mobility solution such as MIPv6, the network
> topology information does not required to be known to the mobility anchor,
> i.e., home agent (HA), since the HA is informed the current location of the
> MN. As the HA knows the current location of the MN, it is able to tunnel
> packets associated to the MN. In the network-based mobility solution such
> as PMIPv6, the similar things happen, i.e., the tunnel between the local
> mobility anchor (LMA) and the mobile access gateway (MAG) is established
> for a given MN.
> >
> > However, as mobility anchors are distributed and bidirectional tunnels (for
> a given MN) between the distributed mobility anchors are required, the
> neighbor mobility anchors' information should be provided to the MN or the
> mobility anchor for the establishment of the directional tunnels or the
> update of the MN's current location.
> >
> > Decoupling the data plane and control plane while keeping a centralized
> node maintaining the mobility context including neighbor mobility anchors'
> information (e.g., identification, IP address, etc) in a DMM environment is
> one of possible solutions.
> >
> > === 4. Comment on an establishment of security associations in a DMM
> > environment. === For each IP mobility support protocol, different security
> associations (SAs) are required for providing secure mobility services to MNs
> as follows:
> >
> > 1) MIPv6
> > 1.1 SA between MN and HA.
> > 1.2 SA between MN and serving access router (AR) providing wireless link
> to the MN.
> >
> > 2) Fast Handover MIPv6 (FMIPv6)
> > 2.1 SA between MN and HA.
> > 2.2 SA between MN and serving AR.
> > 2.3 SA between previous and new ARs.
> >
> > 3) PMIPv6
> > 3.1 SA between MN and serving MAG.
> > 3.2 SA between serving MAG and LMA.
> >
> > 4) Fast Handover PMIPv6 (FPMIPv6)
> > 4.1 SA between MN and serving MAG.
> > 4.2 SA between serving MAG and LMA.
> > 4.3 SA between previous and new MAGs.
> >
> > Note that the above ones do not consider the cases of SA with a security-
> backend server (e.g., AAA server) and with a correspondent node (CN).
> >
> > However, depending on DMM solutions, SAs are configured that are
> > different from those of the existing IP mobility support protocols.
> > For instance,
> >
> > 1) the case of "MN sends mobility signaling to its all mobility
> > anchors" (client-based mobility solution)
> > 1.1 SA between MN and serving mobility anchor providing wireless link to
> the MN.
> > 1.2 SA between MN and origin mobility anchors, i.e., (n - 1) SAs required
> with MN and origin mobility anchors.
> >
> > 2) the case of "MN sends mobility signaling only to its serving
> > mobility anchor" (client-based mobility solution)
> > 2.1 SA between MN and serving mobility anchor.
> > 2.2 SA between serving mobility anchor and origin mobility anchors, i.e., (n
> - 1) SAs required with serving mobility anchor and origin mobility anchors.
> >
> > 3) the case of "serving mobility anchor sends signaling on behalf of
> > the MN to origin mobility anchors" (network-based mobility solution)
> > 3.1 SA between MN and serving mobility anchor.
> > 3.2 SA between serving mobility anchor and origin mobility anchors, i.e., (n
> - 1) SAs required with serving mobility anchor and origin mobility anchors.
> >
> > Note that as like before SAs with a security-backend server (e.g., AAA
> server) and with a CN are not presented.
> >
> > As shown above, DMM solutions (that relies on bidirectional tunnelings for
> packet forwarding between MN and mobility anchors or between just
> mobility anchors) might bring the key management issues to establish such
> SAs.
> >
> > Since it's a holiday season, I cannot fully address all of them in my mind, but
> kindly consider these ones.
> >
> > Cheers.
> >
> > --
> > RSM Department, TELECOM Bretagne, France Jong-Hyouk Lee, living
> > somewhere between /dev/null and /dev/random
> >
> > #email: jonghyouk (at) gmail (dot) com
> > #webpage: http://sites.google.com/site/hurryon/
> >
> > _______________________________________________
> > dmm mailing list
> > dmm@ietf.org
> > https://www.ietf.org/mailman/listinfo/dmm
> 
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm