Re: [DMM] Comments on DMM Gap Analysis.
liu dapeng <maxpassion@gmail.com> Thu, 20 September 2012 03:47 UTC
Return-Path: <maxpassion@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7B4421E8037 for <dmm@ietfa.amsl.com>; Wed, 19 Sep 2012 20:47:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Me42NHbz0xKg for <dmm@ietfa.amsl.com>; Wed, 19 Sep 2012 20:47:29 -0700 (PDT)
Received: from mail-ob0-f172.google.com (mail-ob0-f172.google.com [209.85.214.172]) by ietfa.amsl.com (Postfix) with ESMTP id A54A911E80A6 for <dmm@ietf.org>; Wed, 19 Sep 2012 20:47:29 -0700 (PDT)
Received: by obbwc20 with SMTP id wc20so1891343obb.31 for <dmm@ietf.org>; Wed, 19 Sep 2012 20:47:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=Vv/8trVlpq0J5/LFtT7/XUukPk6X9pXVjDDSrE58MoI=; b=t3ep+PiJiD3O+obVC9lAXRr+cBKVUAb35BtN574kHzPeQ0Rgbyk3W271R9/20o6pjI Pkwve0CKSSsMx2H0GJ1sqYXTvzub6vCG4GMjL2KAM6dnKN3eaSD4Cm2FNHmeFZQoujhI ZuqfasB/wCH7vDPoKRSK3R7zZvDQ1acYha2KbReMm2Q9kLs4BOBkFonqIT+9oZQM4uqS hY7AjrVBzZI0DSkfn3HKlxmN/aCWjTWyDa/Uc8KOwlryXMGOlGxU88nuaqX5Fa/owjFL d8F9ZeYhs+fwdDFOyBX9SyhlCi5beupuInGZR75rdad2QkfSIbR4Yt3MnWoTtMXBbp8g JyvA==
MIME-Version: 1.0
Received: by 10.60.1.135 with SMTP id 7mr346443oem.40.1348112849125; Wed, 19 Sep 2012 20:47:29 -0700 (PDT)
Received: by 10.76.162.41 with HTTP; Wed, 19 Sep 2012 20:47:28 -0700 (PDT)
In-Reply-To: <13040_1348059786_5059C28A_13040_17047_1_81C77F07008CA24F9783A98CFD706F71038847@PEXCVZYM12.corporate.adroot.infra.ftgroup>
References: <CAB2CD_UeQC57JtTBZ46zqdHub0epr2PXQqWok0SPiXuzm6M8hQ@mail.gmail.com> <A8ED1DF8-21D6-4770-91BC-3A8363124B43@gmail.com> <FF1A9612A94D5C4A81ED7DE1039AB80F2CBF944D@EXMBX04.ad.utwente.nl> <13040_1348059786_5059C28A_13040_17047_1_81C77F07008CA24F9783A98CFD706F71038847@PEXCVZYM12.corporate.adroot.infra.ftgroup>
Date: Thu, 20 Sep 2012 11:47:28 +0800
Message-ID: <CAKcc6Ae47VQuqeH75RrYvHiJM0qxcmb+7UN3=K7TNNR+vPeVag@mail.gmail.com>
From: liu dapeng <maxpassion@gmail.com>
To: pierrick.seite@orange.com, "jouni.nospam" <jouni.nospam@gmail.com>, Julien Laganier <julien.ietf@gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: "dmm@ietf.org" <dmm@ietf.org>, "dmm-chairs@tools.ietf.org" <dmm-chairs@tools.ietf.org>
Subject: Re: [DMM] Comments on DMM Gap Analysis.
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Sep 2012 03:47:31 -0000
Hello All, I also have the similar thinking that we should first document and agree on the "practices for the deployment of existing mobility protocols in a distributed mobility management environment". After that, if we find that there indeed some "gap" existing, we can then move to "gap analysis". Best Regards, Dapeng 2012/9/19, pierrick.seite@orange.com <pierrick.seite@orange.com>: > Hi Jouni and Julien, > > > Sorry for jumping into the discussion but I'm a little bit confused with > recent discussions in DMM. So, let me ask for clarifications about the scope > of the gap analysis... > > The WG is now tackling with the work item 'Practices and Gap Analysis' and, > in my understanding, we are expected to provide a gap analysis regarding the > use of mobility protocols in a distributed mobility management environment. > However, it seems that the scope of discussions on gap analysis is > different.... and I'm confused :-) > > Actually, in the charter, we agreed to firstly "document practices for the > deployment of existing mobility protocols in a distributed mobility > management environment" and, then, to make the gap analysis. However, > considering current discussions on "gap analysis": the document on practices > has been omitted and discussions are about vanilla mobility protocols and > architectures with respect to DMM requirements. So, maybe, such > considerations are interesting in the scope of the problem statement, but it > seems to me that it is not the goal of the gap analysis, as initially > intended in the charter. Am I missing something? > > If I refer to previous DMM charter (because current DMM charter is empty... > BTW, is there a reason for an empty charter?), one Work item was: "Document > practices for the deployment of existing mobility protocols in a distributed > mobility management environment". Is this document still in DMM stuff? If > yes, shouldn't we document practices before going into the gap analysis? > > BR, > Pierrick > >> -----Message d'origine----- >> De : dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] De la part de >> karagian@cs.utwente.nl >> Envoyé : mercredi 19 septembre 2012 13:11 >> À : jouni.nospam@gmail.com; dmm@ietf.org; h.anthony.chan@huawei.com; >> JuanCarlos.Zuniga@interdigital.com >> Cc : dmm-chairs@tools.ietf.org >> Objet : Re: [DMM] Comments on DMM Gap Analysis. >> >> Hi Jouni, Hi all, >> >> After discussing this issue with Carlos Jesús Bernardos and Juan Carlos >> Zuniga, we concluded that the following set of possible technologies >> could be included in the Gap analysis draft: >> >> => Shim6: Level 3 Multihoming Shim Protocol for IPv6 http://www.rfc- >> editor.org/rfc/rfc5533.txt >> >> >> => LISP Mobile Node >> http://www.ietf.org/id/draft-meyer-lisp-mn-07.txt >> Locator/ID Separation Protocol (LISP) >> http://www.ietf.org/id/draft-ietf-lisp-23.txt >> >> => Mobile IPv6 Fast Handovers >> http://tools.ietf.org/id/draft-ietf-mipshop-rfc5268bis-01.txt >> This is the draft that became then RFC5568, so no need to mention it. >> http://www.rfc-editor.org/rfc/rfc5568.txt >> >> >> => Fast Handovers for Proxy Mobile IPv6 >> http://www.rfc-editor.org/rfc/rfc5949.txt >> >> => Host Identity Protocol >> http://www.rfc-editor.org/rfc/rfc4423.txt >> http://www.rfc-editor.org/rfc/rfc5201.txt >> http://www.rfc-editor.org/rfc/rfc6253.txt >> http://www.rfc-editor.org/rfc/rfc5206.txt >> >> >> >> => IKEv2 Mobility and Multihoming Protocol (MOBIKE) >> http://www.rfc-editor.org/rfc/rfc4555.txt >> >> >> => GTPv2-C: 3rd Generation Partnership Project; Technical Specification >> Group Core Network and Terminals; 3GPP Evolved Packet System (EPS); >> Evolved General Packet Radio Service (GPRS) Tunnelling Protocol for >> Control plane (GTPv2-C); Stage 3 (Release 11) >> http://www.3gpp.org/ftp/Specs/archive/29_series/29.274/29274-b30.zip >> >> Please inform us if this list makes sense to you? >> >> Best regards, >> Georgios >> >> >> > -----Original Message----- >> > From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of >> > jouni korhonen >> > Sent: woensdag 19 september 2012 9:58 >> > To: dmm@ietf.org; h chan; Juan Carlos Zuniga >> > Cc: dmm-chairs@tools.ietf.org >> > Subject: Re: [DMM] Comments on DMM Gap Analysis. >> > >> > >> > Folks, >> > >> > It has been rather silent on the list recently. Regarding the >> "explosion" of >> > possible technologies in the GAP analysis, we discussed (chairs) that >> it is >> > better to scope the area "a bit". The charter today has the >> assumption that >> > we build on top of existing _IP_ _Mobility_ protocols (and bunch of >> IETF >> > defined examples follow). So, to tighten the scope, the Gap Analysis >> should >> > leave all routing, session (SIP, ..), transport (MPTCP, SCTP, DCCP, >> ..), >> > locator/identifier split (HIP, Lisp, ..), naming (DNS tricks, ..) etc >> based >> > solutions out. Coarse but should help us to make progress. We could >> discuss >> > whether transport layer solution like SCTP fit in but I do not see >> them as end- >> > 2-end solutions being deployable in Internet at the moment. >> > >> > Let us stick with technologies out there that have/had a place in >> sun: few >> > MIP variants, MOBIKE, stuff in 3GPP(2) (oops.. but I think this >> deserves to be >> > evaluated since they are somewhat popular), and what applications do >> > (reconnecting..). This analysis should be down to earth practical and >> realistic >> > on what is already out there to play with. >> > >> > - Jouni & Julien >> > >> > >> > >> > On Jul 27, 2012, at 3:53 PM, Jong-Hyouk Lee wrote: >> > >> > > Dear Anthony and Juan. >> > > >> > > I enjoyed the both gap analysis documents (draft-chan-dmm- >> framework- >> > gap-analysis-02 and draft-zuniga-dmm-gap-analysis-01). Here I give >> some >> > comments that should be used directly in the gap analysis documents >> if you >> > guys like. >> > > >> > > Kindly consider the followings during the gap analysis discussion >> (since I will >> > not be attending the IETF meeting this time). >> > > >> > > 1. Comment on address (resource) management in a DMM environment. >> > > 2. Comment on a deployment of a client-based mobility solution >> (i.e., >> > MIPv6) in a DMM environment. >> > > 3. Commnet on neighbor mobility anchors' information in a DMM >> > environment. >> > > 4. Commnet on an establishment of security associations in a DMM >> > environment. >> > > >> > > === 1. Comment on address (resource) management in a DMM >> > environment. >> > > === When existing IP mobility support protocols (e.g., MIPv6 and >> PMIPv6) >> > are considered to be deployed in a DMM environment, a mobile node >> (MN) >> > is allowed to configure a new address while keeping its previous >> address(es). >> > It introduces the following differences with the address (resource) >> > management of the existing ones: >> > > >> > > MN's address configured at the interface with a DMM environment: n >> = >> > > (IP address at the current access network + previously configured >> IP >> > > address(es) with ongoing sessions) MN's address configured at the >> > > interface without a DMM environment: 1 = (care-of address in MIPv6 >> or >> > > MN's home address in PMIPv6) >> > > >> > > This leads a couple of considerations we didn't have with the >> existing >> > > IP mobility support protocols. For instance, >> > > >> > > 1) MN's address management: use of a newly configured address at >> the >> > current access network for new communication sessions while a proper >> > address selection for previously established ongoing communication >> > sessions. >> > > >> > > 2) Additional treatment for ingress filtering: Ingress filtering is >> widely used >> > against source address spoofing. The source addresses (especially, >> the >> > network prefix part) of incoming packets are strictly checked to make >> sure >> > that those packets are actually from the network that they claim to >> be from. >> > As the MN are allowed to send data packets with the previously >> configured >> > address(es) at the new access network, those data packets would be >> filtered >> > at the ingress filtering place because the source address of those >> data >> > packets is not belonging to the new access network. Accordingly, an >> > additional treatment for ingress filtering is required. >> > > >> > > 3) MN's address increase at the MN's interface: Recall the number >> of MN's >> > address configured at an interface is n. Then, n is increased, as the >> MN >> > changes its point of attachment while keeping its ongoing >> communication >> > sessions. It brings the question: "How many addresses are currently >> possible >> > to be configured at an interface?" >> > > >> > > 4) Routing entry increase at the serving mobility anchor: Let the >> serving >> > mobility anchor is the mobility anchor serves the MN. Traffic >> associated to >> > the MN travels via the serving mobility anchor. The increase of the >> addresses >> > associated to the MN, n, is not only concerning to the MN, but also >> > concerning the serving mobility anchor as it contributes the increase >> of >> > routing entries for the MN. >> > > >> > > === 2. Comment on a deployment of a client-based mobility solution >> > > (i.e., MIPv6) in a DMM environment. === When a client-based >> mobility >> > solution (i.e., MIPv6) is consiered to be deployed in a DMM >> environment, an >> > MN is involved in mobility signaling such as Binding Update and >> > Acknowledgement messages. This is the big difference with the >> network- >> > based mobility solution (i.e., PMIPv6). As the MN send signaling to >> inform its >> > movement to its mobility anchor, the client-based mobility solution >> allows >> > the MN to supply client-centric decision for mobility management. >> > > >> > > Suppose that the origin mobility anchor is the mobility anchor >> where the >> > MN has configured its IP address and established ongoing >> communication >> > sessions with the IP address. The number of origin mobility anchors >> are n - 1. >> > Recall that the serving mobility anchor is the mobility anchor where >> the MN is >> > being served by. Then, the MN's involvement in mobility signaling >> brings us >> > the questions: "Should we let the MN send mobilty signaling to its >> all mobility >> > anchors?" or "Would it make sense that the MN only sends mobility >> signaling >> > to its serving mobility anchor?" Depending on the choice, we will >> have >> > different results: >> > > >> > > 1) "MN sends mobility signaling to its all mobility anchors" >> causes: >> > > 1.1 increased mobility signaling load, e.g., signaling * (n - 1). >> > > 1.2 bidirectional tunnels are established between the MN and its >> mobility >> > anchors. >> > > 1.3 tunneling overhead over the air is present. >> > > 1.4 but the tunnels are terminated at the MN so that the MN has >> control >> > over the tunnels. >> > > >> > > 2) "MN sends mobility signaling only to its serving mobility >> anchor" causes: >> > > 2.1 reduced mobility signaling load, e.g., signaling * 1. >> > > 2.2 bidirectional tunnels are established between the serving >> mobility >> > anchors and origin mobility anchors. >> > > 2.3 tunneling overhead over the air can be avoided. >> > > 2.4 but the MN does not have control over the tunnels so it might >> affect to >> > NEtwork MObility (NEMO) as the MN (i.e., MR in NEMO) loses the >> tunneling >> > control. >> > > >> > > === 3. Neighbor mobility anchors' information in a DMM environment. >> > > === In the client-based mobility solution such as MIPv6, the >> network >> > topology information does not required to be known to the mobility >> anchor, >> > i.e., home agent (HA), since the HA is informed the current location >> of the >> > MN. As the HA knows the current location of the MN, it is able to >> tunnel >> > packets associated to the MN. In the network-based mobility solution >> such >> > as PMIPv6, the similar things happen, i.e., the tunnel between the >> local >> > mobility anchor (LMA) and the mobile access gateway (MAG) is >> established >> > for a given MN. >> > > >> > > However, as mobility anchors are distributed and bidirectional >> tunnels (for >> > a given MN) between the distributed mobility anchors are required, >> the >> > neighbor mobility anchors' information should be provided to the MN >> or the >> > mobility anchor for the establishment of the directional tunnels or >> the >> > update of the MN's current location. >> > > >> > > Decoupling the data plane and control plane while keeping a >> centralized >> > node maintaining the mobility context including neighbor mobility >> anchors' >> > information (e.g., identification, IP address, etc) in a DMM >> environment is >> > one of possible solutions. >> > > >> > > === 4. Comment on an establishment of security associations in a >> DMM >> > > environment. === For each IP mobility support protocol, different >> security >> > associations (SAs) are required for providing secure mobility >> services to MNs >> > as follows: >> > > >> > > 1) MIPv6 >> > > 1.1 SA between MN and HA. >> > > 1.2 SA between MN and serving access router (AR) providing wireless >> link >> > to the MN. >> > > >> > > 2) Fast Handover MIPv6 (FMIPv6) >> > > 2.1 SA between MN and HA. >> > > 2.2 SA between MN and serving AR. >> > > 2.3 SA between previous and new ARs. >> > > >> > > 3) PMIPv6 >> > > 3.1 SA between MN and serving MAG. >> > > 3.2 SA between serving MAG and LMA. >> > > >> > > 4) Fast Handover PMIPv6 (FPMIPv6) >> > > 4.1 SA between MN and serving MAG. >> > > 4.2 SA between serving MAG and LMA. >> > > 4.3 SA between previous and new MAGs. >> > > >> > > Note that the above ones do not consider the cases of SA with a >> security- >> > backend server (e.g., AAA server) and with a correspondent node (CN). >> > > >> > > However, depending on DMM solutions, SAs are configured that are >> > > different from those of the existing IP mobility support protocols. >> > > For instance, >> > > >> > > 1) the case of "MN sends mobility signaling to its all mobility >> > > anchors" (client-based mobility solution) >> > > 1.1 SA between MN and serving mobility anchor providing wireless >> link to >> > the MN. >> > > 1.2 SA between MN and origin mobility anchors, i.e., (n - 1) SAs >> required >> > with MN and origin mobility anchors. >> > > >> > > 2) the case of "MN sends mobility signaling only to its serving >> > > mobility anchor" (client-based mobility solution) >> > > 2.1 SA between MN and serving mobility anchor. >> > > 2.2 SA between serving mobility anchor and origin mobility anchors, >> i.e., (n >> > - 1) SAs required with serving mobility anchor and origin mobility >> anchors. >> > > >> > > 3) the case of "serving mobility anchor sends signaling on behalf >> of >> > > the MN to origin mobility anchors" (network-based mobility >> solution) >> > > 3.1 SA between MN and serving mobility anchor. >> > > 3.2 SA between serving mobility anchor and origin mobility anchors, >> i.e., (n >> > - 1) SAs required with serving mobility anchor and origin mobility >> anchors. >> > > >> > > Note that as like before SAs with a security-backend server (e.g., >> AAA >> > server) and with a CN are not presented. >> > > >> > > As shown above, DMM solutions (that relies on bidirectional >> tunnelings for >> > packet forwarding between MN and mobility anchors or between just >> > mobility anchors) might bring the key management issues to establish >> such >> > SAs. >> > > >> > > Since it's a holiday season, I cannot fully address all of them in >> my mind, but >> > kindly consider these ones. >> > > >> > > Cheers. >> > > >> > > -- >> > > RSM Department, TELECOM Bretagne, France Jong-Hyouk Lee, living >> > > somewhere between /dev/null and /dev/random >> > > >> > > #email: jonghyouk (at) gmail (dot) com >> > > #webpage: http://sites.google.com/site/hurryon/ >> > > >> > > _______________________________________________ >> > > dmm mailing list >> > > dmm@ietf.org >> > > https://www.ietf.org/mailman/listinfo/dmm >> > >> > _______________________________________________ >> > dmm mailing list >> > dmm@ietf.org >> > https://www.ietf.org/mailman/listinfo/dmm >> _______________________________________________ >> dmm mailing list >> dmm@ietf.org >> https://www.ietf.org/mailman/listinfo/dmm > > _________________________________________________________________________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu > ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages > electroniques etant susceptibles d'alteration, > France Telecom - Orange decline toute responsabilite si ce message a ete > altere, deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and > delete this message and its attachments. > As emails may be altered, France Telecom - Orange is not liable for messages > that have been modified, changed or falsified. > Thank you. > > _______________________________________________ > dmm mailing list > dmm@ietf.org > https://www.ietf.org/mailman/listinfo/dmm > -- ------ Best Regards, Dapeng Liu
- [DMM] Comments on DMM Gap Analysis. Jong-Hyouk Lee
- Re: [DMM] Comments on DMM Gap Analysis. jouni korhonen
- Re: [DMM] Comments on DMM Gap Analysis. karagian
- Re: [DMM] Comments on DMM Gap Analysis. pierrick.seite
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya
- Re: [DMM] Comments on DMM Gap Analysis. Zuniga, Juan Carlos
- Re: [DMM] Comments on DMM Gap Analysis. Peter McCann
- Re: [DMM] Comments on DMM Gap Analysis. Zuniga, Juan Carlos
- Re: [DMM] Comments on DMM Gap Analysis. liu dapeng
- Re: [DMM] Comments on DMM Gap Analysis. pierrick.seite
- Re: [DMM] Comments on DMM Gap Analysis. Jouni Korhonen
- Re: [DMM] Comments on DMM Gap Analysis. pierrick.seite
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya
- Re: [DMM] Comments on DMM Gap Analysis. karagian
- Re: [DMM] Comments on DMM Gap Analysis. jouni korhonen
- Re: [DMM] Comments on DMM Gap Analysis. Konstantinos Pentikousis
- Re: [DMM] Comments on DMM Gap Analysis. pierrick.seite
- Re: [DMM] Comments on DMM Gap Analysis. Marco Liebsch
- Re: [DMM] Comments on DMM Gap Analysis. pierrick.seite
- Re: [DMM] Comments on DMM Gap Analysis. Wesley Eddy
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya
- Re: [DMM] Comments on DMM Gap Analysis. Wesley Eddy
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya
- Re: [DMM] Comments on DMM Gap Analysis. jouni korhonen
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya
- Re: [DMM] Comments on DMM Gap Analysis. Charles E. Perkins
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya
- Re: [DMM] Comments on DMM Gap Analysis. Wesley Eddy
- Re: [DMM] Comments on DMM Gap Analysis. Behcet Sarikaya