Re: [MIPSHOP-MIH-DT] PS doc -- 01 version

Telemaco Melia <telemaco.melia@netlab.nec.de> Fri, 27 April 2007 07:13 UTC

Return-path: <mipshop-mih-dt-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HhKdk-0005v8-U3; Fri, 27 Apr 2007 03:13:12 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HhKdk-0005v0-1w for mipshop-mih-dt@ietf.org; Fri, 27 Apr 2007 03:13:12 -0400
Received: from kyoto.netlab.nec.de ([195.37.70.21]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HhKdf-0000ti-Fy for mipshop-mih-dt@ietf.org; Fri, 27 Apr 2007 03:13:12 -0400
Received: from [127.0.0.1] (unknown [212.145.148.56]) by kyoto.netlab.nec.de (Postfix) with ESMTP id 0A85513CF81; Fri, 27 Apr 2007 09:13:05 +0200 (CEST)
Message-ID: <4631A288.5010906@netlab.nec.de>
Date: Fri, 27 Apr 2007 09:13:13 +0200
From: Telemaco Melia <telemaco.melia@netlab.nec.de>
User-Agent: Thunderbird 1.5.0.10 (Windows/20070221)
MIME-Version: 1.0
To: mipshop-mih-dt@ietf.org
Subject: Re: [MIPSHOP-MIH-DT] PS doc -- 01 version
References: <462F854D.2040609@netlab.nec.de>
In-Reply-To: <462F854D.2040609@netlab.nec.de>
X-Spam-Score: 2.8 (++)
X-Scan-Signature: f2a42a2af3bbcd3f35e4f1de597f9a9f
Cc:
X-BeenThere: mipshop-mih-dt@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: MIPSHOP Media Independent Handover Design Team List <mipshop-mih-dt.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mipshop-mih-dt>, <mailto:mipshop-mih-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www1.ietf.org/mailman/private/mipshop-mih-dt>
List-Post: <mailto:mipshop-mih-dt@ietf.org>
List-Help: <mailto:mipshop-mih-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mipshop-mih-dt>, <mailto:mipshop-mih-dt-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1766095815=="
Errors-To: mipshop-mih-dt-bounces@ietf.org

Hi folks,

Sorry to insist but we need to push this forward.
Can we get consensus soon (today?) about the introduced changes, 
especially section 5.2?

telemaco

Telemaco Melia wrote:
> Hi all,
>
> Please find attached a revised version of the PS document. Comments 
> from people should be hopefully  reflected.
> I told Stefano that a final version for submission will be ready by 
> Friday, so please send comments with proposed text to avoid lengthly 
> discussions.
> Please pay particular attention to section 5.2 (see Yoshi's email). 
> Also the title of the doc is changed according to Alper's comment (it 
> is in line with the terminology agreed in Prague).
>
> cheers,
> telemaco
>
>
>
> ------------------------------------------------------------------------
>
>
>
>
> MIPSHOP                                                         T. Melia
> Internet-Draft                                                       NEC
> Intended status: Informational                               E. Hepworth
> Expires: October 27, 2007                    Siemens Roke Manor Research
>                                                          S. Sreemanthula
>                                                    Nokia Research Center
>                                                                  Y. Ohba
>                                                                  Toshiba
>                                                                 G. Vivek
>                                                                    Intel
>                                                              J. Korhonen
>                                                              TeliaSonera
>                                                                R. Aguiar
>                                                                       IT
>                                                        Sam(Zhongqi). Xia
>                                                                   HUAWEI
>                                                           April 25, 2007
>
>
>              Mobility Services Transport: Problem Statement
>                       draft-ietf-mipshop-mis-ps-01
>
> Status of this Memo
>
>    By submitting this Internet-Draft, each author represents that any
>    applicable patent or other IPR claims of which he or she is aware
>    have been or will be disclosed, and any of which he or she becomes
>    aware will be disclosed, in accordance with Section 6 of BCP 79.
>
>    Internet-Drafts are working documents of the Internet Engineering
>    Task Force (IETF), its areas, and its working groups.  Note that
>    other groups may also distribute working documents as Internet-
>    Drafts.
>
>    Internet-Drafts are draft documents valid for a maximum of six months
>    and may be updated, replaced, or obsoleted by other documents at any
>    time.  It is inappropriate to use Internet-Drafts as reference
>    material or to cite them other than as "work in progress."
>
>    The list of current Internet-Drafts can be accessed at
>    http://www.ietf.org/ietf/1id-abstracts.txt.
>
>    The list of Internet-Draft Shadow Directories can be accessed at
>    http://www.ietf.org/shadow.html.
>
>    This Internet-Draft will expire on October 27, 2007.
>
> Copyright Notice
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 1]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    Copyright (C) The IETF Trust (2007).
>
> Abstract
>
>    There are on-going activities in the networking community to develop
>    solutions that aid in IP handover mechanisms between heterogeneous
>    wired and wireless access systems including, but not limited to, IEEE
>    802.21.  Intelligent access selection, taking into account link layer
>    attributes, requires the delivery of a variety of different
>    information types to the terminal from different sources within the
>    network and vice-versa.  The protocol requirements for this
>    signalling have both transport and security issues that must be
>    considered.  The signalling must not be constrained to specific link
>    types, so there is at least a common component to the signalling
>    problem which is within the scope of the IETF.  This draft presents a
>    problem statement for this core problem.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 2]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> Table of Contents
>
>    1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
>    2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  4
>    3.  Definition of Mobility Services  . . . . . . . . . . . . . . .  5
>    4.  Deployment Scenarios for MoS . . . . . . . . . . . . . . . . .  5
>      4.1.  End-to-End Signalling and Transport over IP  . . . . . . .  6
>      4.2.  End-to-End Signalling and Partial Transport over IP  . . .  6
>      4.3.  End-to-End Signalling with a Proxy . . . . . . . . . . . .  7
>      4.4.  End-to-End Network-to-Network Signalling . . . . . . . . .  7
>    5.  MoS Transport Protocol Splitting . . . . . . . . . . . . . . .  8
>      5.1.  Payload Formats and Extensibility Considerations . . . . .  9
>      5.2.  Requirements on the Mobility Service Transport Layer . . .  9
>    6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 14
>    7.  Conclusions  . . . . . . . . . . . . . . . . . . . . . . . . . 15
>    8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 15
>    Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 16
>    Intellectual Property and Copyright Statements . . . . . . . . . . 18
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 3]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> 1.  Introduction
>
>    This Internet Draft provides a problem statement for the exchange of
>    information to support handover in heterogeneous link environments.
>    This mobility support service allows more sophisticated handover
>    operations by making available information about network
>    characteristics, neighboring networks and associated characteristics,
>    indications that a handover should take place, and suggestions for
>    suitable target networks to which to handover.  The mobility support
>    services work complementarily with IP mobility mechanisms to enhance
>    the overall performance and usability perception.
>
>    There are two key attributes to the handover support service problem
>    for inter-technology handovers:
>
>    1.  The Information: the information elements being exchanged.  The
>        messages could be of different nature, such as Information,
>        Command or Event, potentially being defined following a common
>        structure.
>
>    2.  The Underlying Transport: the transport mechanism to support
>        exchange of the information elements mentioned above.  This
>        transport mechanism includes information transport, discovery of
>        peers, and the securing of this information over the network.
>
>    This draft has been motivated by on-going work within IEEE 802.21
>    [1], but the following description intentionally describes the
>    problem from a more general perspective.  This document represents
>    the views of the authors, and does not represent the official view of
>    IEEE 802.21.
>
>    The structure of this document is as follows.  Section 3 defines
>    mobility services.  Section 4 provides a simple model for the
>    protocol entities involved in the signalling and their possible
>    relationships.  Section 5 describes a decomposition of the signalling
>    problem into service specific parts and a generic transport part.
>    Section 5.2 describes more detailed requirements for the transport
>    component.  Section 6 provides security considerations, and Section 7
>    summarizes the conclusions and open issues.
>
>
> 2.  Terminology
>
>    The following abbreviations are used in the document:
>
>    o  MIH: media independent handover
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 4]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    o  MN: mobile node
>
>    o  NN: network node, intended to represent some device in the network
>       (the location of the node e.g. in the access network, home network
>       is not specified, and for the moment it is assumed that they can
>       reside anywhere).
>
>    o  EP: endpoint, intended to represent the terminating endpoints of
>       the transport protocol used to support the signalling exchanges
>       between nodes.
>
>
> 3.  Definition of Mobility Services
>
>    As mentioned in the introduction mobility (handover) support in
>    heterogeneous wireless environments requires functional components
>    located either in the mobile terminal or in the (access) network to
>    exchange information and eventually to take decisions upon this
>    information exchange.  For instance traditional host-based handover
>    solutions could be complemented with more sophisticated network-
>    centric solutions reducing terminal complexity.  Also, neighborhood
>    discovery, potentially a complex operation in heterogeneous wireless
>    scenarios, can result in a more simple step if implemented with an
>    unified interface towards the access network.
>
>    In this document the different supporting functions for media
>    independent handover (MIH) management are generally referred as
>    Mobility Services (MoS) having in common different requirements for
>    the transport protocol.  These requirements and associated
>    functionalities are the focus of this document
>
>
> 4.  Deployment Scenarios for MoS
>
>    The deployment scenarios are outlined in the following sections.
>    Note: while MN-to-MN signalling exchanges are theoretically possible,
>    these are not currently being considered.
>
>    The following scenarios are discussed for understanding the overall
>    problem of transporting MIH protocol.  Although these are all
>    possible scenarios and MIH services can be delivered through link-
>    layer specific solutions and/or through a "layer 3 or above"
>    protocol, this problem statement focuses on the delivery of
>    information for MIH services for the latter case only.
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 5]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> 4.1.  End-to-End Signalling and Transport over IP
>
>    In this case, the end-to-end signalling used to exchange the handover
>    information elements (the Information Exchange) runs end-to-end
>    between MN and NN.  The underlying transport is also end-to-end
>
>            +------+                              +------+
>            |  MN  |                              |  NN  |
>            | (EP) |                              | (EP) |
>            +------+                              +------+
>                         Information Exchange
>                <------------------------------------>
>
>                /------------------------------------\
>               <          Transport over IP           >
>                \------------------------------------/
>
>                Figure 1: End-to-end Signalling and Transport
>
> 4.2.  End-to-End Signalling and Partial Transport over IP
>
>    As before, the Information Exchange runs end-to-end between the MN
>    and the second NN.  However, in this scenario, some other transport
>    means than IP is used from the MN to the first NN, and the transport
>    over IP is used only between NNs.  This is analogous to the use of
>    EAP end-to-end between Supplicant and Authentication Server, with an
>    upper-layer multihop protocol such as RADIUS used as a backhaul
>    transport protocol between an Access Point and the Authentication
>    Server.
>
>
>            +------+           +------+           +------+
>            |  MN  |           |  NN  |           |  NN  |
>            |      |           | (EP) |           | (EP) |
>            +------+           +------+           +------+
>                         Information Exchange
>                <------------------------------------>
>
>                 (Transport over  /------------------\
>                <--------------->< Transport over IP  >
>                     e.g. L2)     \------------------/
>
>                         Figure 2: Partial Transport
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 6]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> 4.3.  End-to-End Signalling with a Proxy
>
>    In the final case, a number of proxies are inserted along the path
>    between the two transport endpoints.  The use of proxies is possible
>    in both cases 1 and 2 above, but distinguished here as there are a
>    number of options as to how the proxy may behave with regard to the
>    transport and end-to-end signalling exchange.
>
>    In this case, the proxy performs some processing on the Information
>    Exchange before forwarding the information on.  This can be viewed as
>    concatenating signalling exchanges between a number of EPs.
>
>            +------+         +---------+          +------+
>            |  MN  |         | ProxyNN |          |  NN  |
>            | (EP) |         |   (EP)  |          | (EP) |
>            +------+         +---------+          +------+
>                        Information Exchange
>               ------------------>
>                                 ------------------->
>                                 <-------------------
>               <------------------
>               /---------------\     /----------------\
>              <    Transport    >   <    Transport     >
>               \---------------/     \----------------/
>
>                   Figure 3: Information Exchange Approach
>
>    The Proxy NN might process all layers of the protocol suite in the
>    same way as an ordinary EP.
>
>    There is a possibility for realizing other proxy scenarios.
>
> 4.4.  End-to-End Network-to-Network Signalling
>
>    In this case NN to NN signalling is envisioned.  Such model should
>    allow different network components to gather information from each
>    other.  This is useful for instance in conditions where network
>    components need to take decisions and instruct mobile terminals of
>    operation to be executed.
>
>
>
>
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 7]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>                  +------+          +------+
>                  |  NN  |          |  NN  |
>                  | (EP) |          | (EP) |
>                  +------+          +------+
>                     Information Exchange
>                     ------------------->
>                     <-------------------
>
>                     /----------------\
>                    <    Transport     >
>                     \----------------/
>
>             Figure 4: Information Exchange between different NN
>
>    Network nodes exchange information about connected terminals status.
>
>
> 5.  MoS Transport Protocol Splitting
>
>    Figure 5 shows a model where the Information Exchanges are
>    implemented by a signalling protocol specific to a particular
>    mobility service, and these are relayed over a generic transport
>    layer (the Mobility Service Transport Layer).
>
>
>                           +----------------+          ^
>                           |Mobility Support|          |
>                           |   Service 2    |          |
>        +----------------+ |                |          | Mobility Service
>        |Mobility Support| +----------------+          |    Signaling
>        |    Service 1   |    +----------------+       |      Layer
>        |                |    |Mobility Support|       |
>        +----------------+    |   Service 3    |       |
>                              |                |       |
>                              +----------------+       V
>      ================================================
>         +---------------------------------------+     ^ Mobility Service
>         |  Mobility Service Transport Protocol  |     |    Transport
>         +---------------------------------------+     V      Layer
>      ================================================
>         +---------------------------------------+
>         |                   IP                  |
>         +---------------------------------------+
>
>                     Figure 5: Handover Services over IP
>
>    The Mobility Service Transport Layer provides certain functionality
>    (outlined in Section 5.2) to the higher layer mobility support
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 8]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    services in order to support the exchange of information between
>    communicating mobility service functions.  The transport layer
>    effectively provides a container capability to mobility support
>    services, as well as any required transport and security operations
>    required to provide communication without regard to the protocol
>    semantics and data carried in the specific mobility services.
>
>    The Mobility Support Services themselves may also define certain
>    protocol exchanges to support the exchange of service specific
>    Information Elements.  It is likely that the responsibility for
>    defining the contents and significance of the Information Elements is
>    the responsibility of other standards bodies other than the IETF.
>    Example mobility services include the Information Services, Event and
>    Command services.
>
> 5.1.  Payload Formats and Extensibility Considerations
>
>    The format of the Mobility Service Transport Protocol is as follows:
>
>    +----------------+----------------------------------------+
>    |Mobility Service|           Opaque Payload               |
>    |Transport Header|     (Mobility Support Service)         |
>    +----------------+----------------------------------------+
>
>                        Figure 6: Protocol Structure
>
>    The opaque payload encompasses the Mobility Support Service
>    information that is to be transported.  The definition of the
>    Mobility Service Transport Header is something that is best addressed
>    within the IETF.  MSTP does not inspect the payload and any required
>    information will be provided by the MSTP users.
>
> 5.2.  Requirements on the Mobility Service Transport Layer
>
>    The following section outlines some of the general transport
>    requirements that should be supported by the Mobility Service
>    Transport Protocol.  Analysis has suggested that at least the
>    following need to be taken into account:
>
>    Discovery:  Discovery: MNs need the ability to either discover nodes
>       that support certain services, or discover services provided by a
>       certain node.  The service discovery can be dealt with messages as
>       defined in [1].  This section refers to node-discovery in either
>       scenario.  There are no assumptions about the location of these
>       mobility services within the network, therefore the discovery
>       mechanism needs to operate across administrative boundaries.
>       Issues such as speed of discovery, protection against spoofing,
>       when discovery needs to take place, and the length of time over
>
>
>
> Melia, et al.           Expires October 27, 2007                [Page 9]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>       which the discovery information may remain valid all need to be
>       considered.  Approaches include:
>
>       *  Hard coding information into the MN, indicating either the IP
>          address of the NN, or information about the NN that can be
>          resolved onto an IP address.  The configuration information
>          could be managed dynamically, but assumes that the NN is
>          independent of the access network to which the MN is currently
>          attached.
>
>       *  Pushing information to the MN, where the information is
>          delivered to the MN as part of other configuration operations,
>          for example, in a Router Discovery exchange.  The benefit of
>          this approach is that no additional exchanges with the network
>          would be required, but the limitations associated with
>          modifying these protocols may limit applicability of the
>          solution.
>
>       *  MN dynamically requesting information about a node, which may
>          require both MN and NN support for a particular service
>          discovery mechanism.  This may require additional support by
>          the access network (e.g. multicast or anycast) even when it may
>          not be supporting the service directly itself.
>
>       Numerous directory and configuration services already exist, and
>       reuse of these mechanisms may be appropriate.  There is an open
>       question about whether multiple methods of discovery would be
>       needed, and whether NNs would also need to discover other NNs.
>       The definition of a service also needs to be determined, including
>       the granularity of the description (for example, should the MN
>       look for an "IS" service, or "IS-local information", and "IS-home
>       network information" services.
>
>    Information from a trusted source:  The MN uses the Mobility Service
>       information to make decisions about what steps to take next.  It
>       is essential that there is some way to ensure that the information
>       received is from a trustworthy source.  This requirement should
>       reuse trust relationships that have already been established in
>       the network, for example, on the relationships established by the
>       AAA infrastructure after a mutual authentication, or on the
>       certificate infrastructure required to support SEND [9].  The
>       security mechanism must provide mutual authentication of MN and NN
>       and it may provide one way authentication of either of MN and NN.
>
>    Security association management:  A common security association
>       negotiation method, independent of any specific MSTP user, must be
>       implemented.  The solution must also work in case on MN mobility.
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 10]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    Low latency:  Some of the Mobility Services generate time sensitive
>       information.  Therefore, there is a need to deliver the
>       information over quite short timescales, and the required lifetime
>       of a connection might be quite short lived.  For reliable
>       delivery, short-lived connections could be set up as and when
>       needed, although there is a connection setup latency associated
>       with this approach.  Alternatively, a long-lived connection could
>       be used, but this requires advanced warning of being needed and
>       some way to maintain the state associated with the connection.  It
>       also assumes that the relationships between devices supporting the
>       mobility service are fairly stable.  Another alternative is
>       connectionless operation, but this has interactions with other
>       requirements such as reliable delivery.
>
>    Reliability:  Reliable delivery for some of the mobility services may
>       be essential, but it is difficult to trade this off against the
>       low latency requirement.  It is also quite difficult to design a
>       robust, high performance mechanism that can operate in
>       heterogeneous environments, especially one where the link
>       characteristics can vary quite dramatically.  There are two main
>       approaches that could be adopted:
>
>       1.  Assume the transport cannot be guaranteed to support reliable
>           delivery.  In this case, the Mobility Support Service itself
>           will have to provide some sort of reliability mechanism to
>           allow communicating endpoints to acknowledge receipt of
>           information.
>
>       2.  Assume the underlying transport will deal with most error
>           situations, and provide a very basic acknowledgement mechanism
>           that (if no acknowledgement is received) will indicate that
>           something more serious has occurred than a packet drop (since
>           these other types of error conditions are dealt with at the
>           transport layer).
>
>    Congestion Control:  A Mobility Service may optionally wish to
>       transfer large amounts of data, placing a requirement for
>       congestion control in the transport.  There is an interaction
>       between this requirement and that of the requirement for low
>       latency since ways to deal with timely delivery of smaller
>       asynchronous messages around the larger datagrams is required
>       (mitigation of head of line blocking etc.).
>
>    Secure delivery:  The Mobility Service information must be delivered
>       securely (integrity and confidentiality) between trusted peers,
>       where the transport may pass though untrusted intermediate nodes
>       and networks.  The Mobility Service information must also be
>       protected against replay attacks and denial of service attacks.
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 11]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    Multiplexing:  The transport service needs to be able to support
>       different mobility services.  This may require multiplexing and
>       the ability to manage multiple discovery operations and peering
>       relationships in parallel.
>
>    Multihoming:  For some information services exchanged with the MN,
>       there is a possibility that the request and response messages can
>       be carried over two different links e.g. a handover command
>       request is on the current link while the response could be
>       delivered on the new link.  Depending on the IP mobility
>       mechanism, there is some impact on the transport option for the
>       mobility information services.  This may potentially have some
>       associated latency and security issues, for example, if the
>       transport is over IP there is some transparency but Mobile IP may
>       introduce additional delay and both TCP and UDP must use the
>       permanent address of the MN.
>
>    IPv4 and IPv6 support:  The MSTP must support both IPv4 and IPv6
>       including NAT traversal for IPv4 networks and firewall pass-
>       through for IPv4 and IPv6 networks.
>
>    In addition to the above, it may be necessary for the transport to
>    support multiple applications (or modes of operation) to support the
>    particular requirements of the Information Exchange being carried out
>    between nodes.  This may require the ability to multiplex multiple
>    information exchanges into a single transport exchange (see figure
>    Figure 7) .
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 12]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> +==================================+
> |                                  |
> | +------------+  +-----------+    |
> | |    MIH     |  |   MIH     |    |
> | |   User 1   |  |  User 2   |... |
> | |  e.g. MIP  |  |  e.g. SIP |    |
> | ++++++++++++++  +++++++++++++    |  _    ..............
> |      \                /          |   \__ :    MIH     :
> |       \              /           |  _/   :Multiplexing:
> |     +++++++++++++++++++++        |       :............:
> |     |   MIH Function    |        |
> |     |    (e.g. MIS)     |        |
> |     +++++++++++++++++++++        |
> |               /\                 |
> |               ||                 |          ..............
> |               ||                 |          : Transport  :
> |               \/                 |          :Multiplexing:
> |     +++++++++++++++++++++        |          :............:    +---------+
> |     |     Transport     |        |               ____/\____   |   MIH   |
> |     | (e.g. TCP, UDP)   |        |              /          \  |.........|
> |     +++++++++++++++++++++        |                            |Transport|
> |               /\                 |                            |.........|
> |               ||                 |                       _____|   IP    |
> |               ||                 |                      /     +=========+
> |               ||                 |                     /
> |               \/                 |    ^+++++++++^     /       +---------+
> |     +++++++++++++++++++++        |   /           \   /        |   MIH   |
> |     |         IP        |--------|--<  Internet   > -----     |.........|
> |     +++++++++++++++++++++        |   \           /   |   \    |Transport|
> |                                  |    v+++++++++v    |    \   |.........|
> |                                  |                   |     \__|   IP    |
> +==================================+                   |        +=========+
>                                                        |             :
>                                                        |             :
>                                                        |        +---------+
>                                                        |        |   MIH   |
>                                                        |        |.........|
>                                                        |        |Transport|
>                                                        |        |.........|
>                                                        |________|   IP    |
>                                                                 +=========+
>
>                       Figure 7: Multiplexing examples
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 13]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> 6.  Security Considerations
>
>    Network supported mobility services aim at improving decision making
>    and management of dynamically connected hosts.  The control and
>    maintenance of mobile nodes becomes challenging where authentication
>    and authorization credentials used to access a network are
>    unavailable for the purpose of bootstrapping a security association
>    for handover services.
>
>    Information Services may not require authorization of the client, but
>    both event and command services must authenticate message sources,
>    particularly if they are mobile.  Network side service entities will
>    typically need to provide proof of authority to serve visiting
>    devices.  Where signalling or radio operations can result from
>    received messages, significant disruption may result from processing
>    bogus or modified messages.  The effect of processing bogus messages
>    depends largely upon the content of the message payload, which is
>    handled by the handover services application.  Regardless of the
>    variation in effect, message delivery mechanisms need to provide
>    protection against tampering, and spoofing.
>
>    Sensitive and identifying information about a mobile device may be
>    exchanged during handover service message exchange.  Since handover
>    decisions are to be made based upon message exchanges, it may be
>    possible to trace an user's movement between cells, or predict future
>    movements, by inspecting handover service messages.  In order to
>    prevent such tracking, message confidentiality should be available.
>    This is particularly important since many mobile devices are
>    associated with only one user, as divulgence of such information may
>    violate the user's privacy.  Additionally, identifying information
>    may be exchanged during security association construction.  As this
>    information may be used to trace users across cell boundaries,
>    identity protection should be available if possible, when
>    establishing SAs.
>
>    In addition, the user should not have to disclose its identity to the
>    network (any more than it needed to during authentication) in order
>    to access the Mobility Support Services.  For example, if the local
>    network is just aware that an anonymous user with a subscription to
>    operatorXYX.com is accessing the network, the user should not have to
>    divulge their true identity in order to access the Mobility Support
>    Services available locally.
>
>    Finally, the network nodes themselves will potentially be subject to
>    denial of service attacks from MNs and these problems will be
>    exacerbated if operation of the mobility service protocols imposes a
>    heavy computational load on the NNs.  The overall design has to
>    consider at what stage (e.g. discovery, transport layer
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 14]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    establishment, service specific protocol exchange) denial of service
>    prevention or mitigation should be built in.
>
>
> 7.  Conclusions
>
>    This Internet draft outlined a broad problem statement for the
>    signalling of information elements across a network to support media
>    independent handover services.  In order to enable this type of
>    signalling service, a need for a generic transport solution with
>    certain transport and security properties were outlined.  Whilst the
>    motivation for considering this problem has come from work within
>    IEEE 802.21, a desirable goal is to ensure that solutions to this
>    problem are applicable to a wider range of mobility services.
>
>    It would be valuable to establish realistic performance goals for the
>    solution to this common problem (i.e. transport and security aspects)
>    using experience from previous IETF work in this area and knowledge
>    about feasible deployment scenarios.  This information could then be
>    used as an input to other standards bodies in assisting them to
>    design mobility services with feasible performance requirements.
>
>    Much of the functionality required for this problem is available from
>    existing IETF protocols or combination thereof.  This document takes
>    no position on whether an existing protocol can be adapted for the
>    solution or whether new protocol development is required.  In either
>    case, we believe that the appropriate skills for development of
>    protocols in this area lie in the IETF.
>
>
> 8.  References
>
>    [1]  "Draft IEEE Standard for Local and Metropolitan Area Networks:
>         Media Independent Handover Services", IEEE LAN/MAN Draft  IEEE
>         P802.21/D05.00, April 2007.
>
>    [2]  Aboba, B., "Architectural Implications of Link Indications",
>         draft-iab-link-indications-10 (work in progress), March 2007.
>
>    [3]  Perkins, C., "IP Mobility Support for IPv4", RFC 3344,
>         August 2002.
>
>    [4]  Johnson, D., Perkins, C., and J. Arkko, "Mobility Support in
>         IPv6", RFC 3775, June 2004.
>
>    [5]  Moskowitz, R. and P. Nikander, "Host Identity Protocol (HIP)
>         Architecture", RFC 4423, May 2006.
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 15]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    [6]  Eronen, P., "IKEv2 Mobility and Multihoming Protocol (MOBIKE)",
>         RFC 4555, June 2006.
>
>    [7]  3GPP, "3GPP system architecture evolution (SAE): Report on
>         technical options and conclusions", 3GPP TR 23.882 0.10.1,
>         February 2006.
>
>    [8]  Koodli, R., "Fast Handovers for Mobile IPv6", RFC 4068,
>         July 2005.
>
>    [9]  Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
>         Neighbor Discovery (SEND)", RFC 3971, March 2005.
>
>
> Authors' Addresses
>
>    Telemaco Melia
>    NEC Europe Network Laboratories
>    Kufuerstenanlage 36
>    Heidelberg  69115
>    Germany
>
>    Phone: +49 6221 90511 42
>    Email: telemaco.melia@netlab.nec.de
>
>
>    Eleanor Hepworth
>    Siemens Roke Manor Research
>    Roke Manor
>    Romsey,   SO51 5RE
>    UK
>
>    Email: eleanor.hepworth@roke.co.uk
>
>
>    Srivinas Sreemanthula
>    Nokia Research Center
>    6000 Connection Dr.
>    Irving,   TX 75028
>    USA
>
>    Email: srinivas.sreemanthula@nokia.com
>
>
>
>
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 16]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
>    Yoshihiro Ohba
>    Toshiba America Research, Inc.
>    1 Telcordia Drive
>    Piscateway  NJ 08854
>    USA
>
>    Email: yohba@tari.toshiba.com
>
>
>    Vivek Gupta
>    Intel Corporation
>    2111 NE 25th Avenue
>    Hillsboro, OR  97124
>    USA
>
>    Phone: +1 503 712 1754
>    Email: vivek.g.gupta@intel.com
>
>
>    Jouni Korhonen
>    TeliaSonera Corporation.
>    P.O.Box 970
>    FIN-00051 Sonera
>    FINLAND
>
>    Phone: +358 40 534 4455
>    Email: jouni.korhonen@teliasonera.com
>
>
>    Rui L.A. Aguiar
>    Instituto de Telecomunicacoes Universidade de Aveiro
>    Aveiro  3810
>    Portugal
>
>    Phone: +351 234 377900
>    Email: ruilaa@det.ua.pt
>
>
>    Sam(Zhongqi) Xia
>    Huawei Technologies Co.,Ltd
>    HuaWei Bld., No.3 Xinxi Rd. Shang-Di Information Industry Base,Hai-Dian District Beijing
>    100085
>    P.R. China
>
>    Phone: +86-10-82836136
>    Email: xiazhongqi@huawei.com
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 17]
> 
> Internet-Draft         Mobility Services Transport            April 2007
>
>
> Full Copyright Statement
>
>    Copyright (C) The IETF Trust (2007).
>
>    This document is subject to the rights, licenses and restrictions
>    contained in BCP 78, and except as set forth therein, the authors
>    retain all their rights.
>
>    This document and the information contained herein are provided on an
>    "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
>    OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
>    THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
>    OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
>    THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
>    WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
>
>
> Intellectual Property
>
>    The IETF takes no position regarding the validity or scope of any
>    Intellectual Property Rights or other rights that might be claimed to
>    pertain to the implementation or use of the technology described in
>    this document or the extent to which any license under such rights
>    might or might not be available; nor does it represent that it has
>    made any independent effort to identify any such rights.  Information
>    on the procedures with respect to rights in RFC documents can be
>    found in BCP 78 and BCP 79.
>
>    Copies of IPR disclosures made to the IETF Secretariat and any
>    assurances of licenses to be made available, or the result of an
>    attempt made to obtain a general license or permission for the use of
>    such proprietary rights by implementers or users of this
>    specification can be obtained from the IETF on-line IPR repository at
>    http://www.ietf.org/ipr.
>
>    The IETF invites any interested party to bring to its attention any
>    copyrights, patents or patent applications, or other proprietary
>    rights that may cover technology that may be required to implement
>    this standard.  Please address the information to the IETF at
>    ietf-ipr@ietf.org.
>
>
> Acknowledgment
>
>    Funding for the RFC Editor function is provided by the IETF
>    Administrative Support Activity (IASA).
>
>
>
>
>
> Melia, et al.           Expires October 27, 2007               [Page 18]
> 
>
>   
> ------------------------------------------------------------------------
>
> _______________________________________________
> MIPSHOP-MIH-DT mailing list
> MIPSHOP-MIH-DT@ietf.org
> https://www1.ietf.org/mailman/listinfo/mipshop-mih-dt
>   


-- 
Dr. Telemaco Melia			telemaco.melia@netlab.nec.de
Senior Research Staff Member		Tel: +49 (0) 6221 4342- 142
NEC Europe Ltd.				Fax: +49 (0) 6221 4342- 155
Network Laboratories			Web: http://www.netlab.nec.de
Kurfuersten-Anlage 36			       
69115 Heidelberg
GERMANY   

NEC Europe Limited | Registered Office: NEC House, 1 Victoria Road, London W3 6BL | Registered in England 2832014 

_______________________________________________
MIPSHOP-MIH-DT mailing list
MIPSHOP-MIH-DT@ietf.org
https://www1.ietf.org/mailman/listinfo/mipshop-mih-dt