Re: [Mipshop] FMIPv6 Reactive Handover - HI/HAck

Rajeev Koodli <rajeev@iprg.nokia.com> Tue, 23 August 2005 17:35 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E7cgM-0003RA-O0; Tue, 23 Aug 2005 13:35:30 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E7cgL-0003R0-FA for mipshop@megatron.ietf.org; Tue, 23 Aug 2005 13:35:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA17425 for <mipshop@ietf.org>; Tue, 23 Aug 2005 13:35:28 -0400 (EDT)
Received: from darkstar.iprg.nokia.com ([205.226.5.69]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E7cgU-0003hD-M3 for mipshop@ietf.org; Tue, 23 Aug 2005 13:35:39 -0400
Received: (from root@localhost) by darkstar.iprg.nokia.com (8.11.0/8.11.0-DARKSTAR) id j7NH21h30944; Tue, 23 Aug 2005 10:02:01 -0700
X-mProtect: <200508231702> Nokia Silicon Valley Messaging Protection
Received: from mvdhcp14157.americas.nokia.com (172.18.141.57, claiming to be "[127.0.0.1]") by darkstar.iprg.nokia.com smtpdqT56Hs; Tue, 23 Aug 2005 10:01:59 PDT
Message-ID: <430B5E07.3@iprg.nokia.com>
Date: Tue, 23 Aug 2005 10:33:59 -0700
From: Rajeev Koodli <rajeev@iprg.nokia.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Narayanan Vidya-CVN065 <vidya@motorola.com>
Subject: Re: [Mipshop] FMIPv6 Reactive Handover - HI/HAck
References: <1B631E11D496D711BB2800065BFCB6A11B7A7324@il02exm13>
In-Reply-To: <1B631E11D496D711BB2800065BFCB6A11B7A7324@il02exm13>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 225414c974e0d6437992164e91287a51
Content-Transfer-Encoding: 7bit
Cc: 'Junghoon Jee' <jhjee@etri.re.kr>, mipshop@ietf.org
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: mipshop.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
Sender: mipshop-bounces@ietf.org
Errors-To: mipshop-bounces@ietf.org

Hello folks,


Narayanan Vidya-CVN065 wrote:

> Hi Rajeev, Junghoon,
> Actually, that is where I was going with this. It seems like HI/HAck is 
> not really a MUST for reactive handover. The FBU from the MN will be 

They are not a MUST for use. Anyway, I will have an issue tracker for it.


> authenticated by the PAR. As long as the NAR knows that the FBAck was 
> successful, isn't that all that is needed for tunnel state 
> creation/enablement?

Requiring NAR to know that FBack is successful is not such a good
idea. FBack is never sent to NAR (an ASCII picture may not be able
to best illustrate the point, so please read the text).


> I can see the need for a message exchange with the AH between the ARs - 
> but, seems to me like the FBU/FBAck can be extended to carry that - no?

No, to set up AH?!
In any case, I don't see why FBU and FBAck should need to be touched.

-Rajeev



>  
> Vidya
> 
>     -----Original Message-----
>     From: Junghoon Jee [mailto:jhjee@etri.re.kr]
>     Sent: Monday, August 22, 2005 9:15 PM
>     To: Narayanan Vidya-CVN065; mipshop@ietf.org
>     Subject: RE: [Mipshop] FMIPv6 Reactive Handover - HI/HAck
> 
>     Hi Vidya,
>     I made the same question through DNA WG recently regarding FMIP-DNA I-D.
>      
>     You can find the previous discussion through the attached message.
>      
>     I am still questioning why HI/HAck for the access control is
>     required after MN has already attached to NAR in the reactive case.
>      
>     Junghoon
>      
>>  -----Original Message-----
>>  From: Rajeev Koodli [mailto:rajeev@iprg.nokia.com]
>>  Sent: Tuesday, July 19, 2005 8:46 AM
>>  To: Junghoon Jee
>>  Cc: 'Syam Madanapalli'; dna@eng.monash.edu.au
>     <mailto:dna@eng.monash.edu.au>; smadanapalli@gmail.com
>     <mailto:smadanapalli@gmail.com>
>>  Subject: Re: [DNA] draft-koodli-dna-fmip-00.txt
>>
>>
>>
>>
>>  Junghoon Jee wrote:
>>
>>  > Rajeev,
>>  > 
>>  >
>>  >>For both predictive and reactive modes, HI/HAck can be useful for
>>  >>access control. NAR can forward packets for the MN without forcing
>>  >>access control, through HI/HAck.
>>  >
>>
>>  One could use HI/HAck for CT, but I am not referring to that.
>>
>>  When FBU processing is successful, PAR's message (HI) to NAR
>>  can allow NAR to "validate" the ND cache entry for NCoA.
>>  No Context Transfer is involved. The fields in HI (PCoA, NCoA,
>>  LLA) are sufficient for the purpose.
>>
>>  -Rajeev
>>
>>
>>
>>
>>
>>  >
>>  > Are you saying about context transfer by HI/HAck ?
>>  >
>>  > Regards,
>>  > Junghoon
>>  >
>>  >
>>  >>(If it is not clear, FMIP-DNA is applicable when DNA+oDAD is
>>  >>available,
>>  >>  and no neighborhood information is available for FMIP)
>>  >>
>>  >>-Rajeev
>>  >>
>>  >>
>>  >>
>>  >>Syam Madanapalli wrote:
>>  >>
>>  >>
>>  >>>Hello Junghoon,
>>  >>>
>>  >>>Thanks for reviewing the draft.
>>  >>>
>>  >>>
>>  >>>>Hi Syam,
>>  >>>>It's an interesting work.
>>  >>>>After reviewing this I-D, I've come up with a following question.
>>  >>>>
>>  >>>>About the role of HI/HACK in this reactive FMIPv6-DNA :
>>  >>>>I thought that these messages are required to confirm the MN's
>>  >>>>prospective NCoA in predictive mode.
>>  >>>>In the FMIPv6-DNA, MN configures the NCoA by optimistic
>>  DAD in the
>>  >>>>reactive mode, so why do those messages needed to be
>>  >>
>>  >>transferred and
>>  >>
>>  >>>>what's their roles ?
>>  >>>>Just to prepare for future optional behavior the same as
>>  >>
>>  >>specified in
>>  >>
>>  >>>>the draft-ietf-mipshop-fast-mipv6-03 ?
>>  >>>>I guess that my question may also apply to the reactive mode of
>>  >>>>draft-ietf-mipshop-fast-mipv6-03.
>>  >>>
>>  >>>
>>  >>>As you mentioned, currently there is no new use of HI/HACK
>>  >>
>>  >>other than
>>  >>
>>  >>>what is mentioned in FMIPv6 RFC.  That is, NAR can make use of the
>>  >>>knowledge that its trusted peer (i.e., PAR) has a trust
>>  >>
>>  >>relationship
>>  >>
>>  >>>with the
>>  >>>MN.
>>  >>>
>>  >>>
>>  >>>
>>  >>>>Regards,
>>  >>>>Junghoon
>>  >>>>
>>  >>>
>>  >
>>  
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Mipshop mailing list
> Mipshop@ietf.org
> https://www1.ietf.org/mailman/listinfo/mipshop


_______________________________________________
Mipshop mailing list
Mipshop@ietf.org
https://www1.ietf.org/mailman/listinfo/mipshop