Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
Frank Xia <xiayangsong@huawei.com> Thu, 24 September 2009 14:17 UTC
Return-Path: <xiayangsong@huawei.com>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F302228C105 for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 07:17:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H2+9lYUP-bn4 for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 07:17:08 -0700 (PDT)
Received: from usaga04-in.huawei.com (usaga04-in.huawei.com [206.16.17.180]) by core3.amsl.com (Postfix) with ESMTP id CC32128C115 for <mipshop@ietf.org>; Thu, 24 Sep 2009 07:17:07 -0700 (PDT)
Received: from huawei.com (usaga04-in [172.18.4.101]) by usaga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQH00E53BQFKQ@usaga04-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 09:18:16 -0500 (CDT)
Received: from X24512z ([10.124.12.62]) by usaga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQH00IHLBQ9QY@usaga04-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 09:18:15 -0500 (CDT)
Date: Thu, 24 Sep 2009 09:18:09 -0500
From: Frank Xia <xiayangsong@huawei.com>
To: Hidetoshi Yokota <yokota@kddilabs.jp>, "Koodli, Rajeev" <rkoodli@starentnetworks.com>, Ahmad Muhanna <amuhanna@nortel.com>
Message-id: <001f01ca3d21$da22f6a0$3e0c7c0a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Outlook Express 6.00.2900.3598
Content-type: text/plain; format="flowed"; charset="ISO-2022-JP"; reply-type="original"
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal
References: <4A93F739.5050006@piuha.net> <4A97EEAB.9070606@kddilabs.jp> <4A9F4222.8070107@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com> <4AAE38F6.2010600@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com> <4AB2AE87.6030801@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com> <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com> <4AB8CF19.70905@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E20597C0A@zrc2hxm0.corp.nortel.com> <4D35478224365146822AE9E3AD4A26660C18B2AC$0001@exchtewks3.starentnetworks.com> <4ABB2DC8.4050906@kddilabs.jp>
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2009 14:17:12 -0000
Hi Ahmad, Hidetoshi, and Rajeev I have followed the discussion, and agreed with Rajeev's proposal. BR Frank ----- Original Message ----- From: "Hidetoshi Yokota" <yokota@kddilabs.jp> To: "Koodli, Rajeev" <rkoodli@starentnetworks.com> Cc: "Mipshop" <mipshop@ietf.org>; <draft-ietf-mipshop-pfmipv6@tools.ietf.org> Sent: Thursday, September 24, 2009 3:28 AM Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > Hi Rajeev and Ahmad, > > Thanks Rajeev for your input. It seems that all of the questions and > ambiguity pointed out by Ahmad lead to one issue: PMIPv6 defines > multiple encapsulation methods; therefore the inter-MAG tunnel must > specify which method should be used. If Rajeev's input is acceptable. > I'll come up with some text along that line. > > Regards, > -- > Hidetoshi > > Koodli, Rajeev wrote: >> >> Hi Ahmad, >> >> Let me see if I could understand your concern. >> >> RFC 5568 assumes that tunneling is IPv6-in-IPv6 based on RFC 3775. So, >> it does not need to specify how/which encapsulation mode is used. >> >> PFMIP6, on the other hand, is for PMIP6 which does support multiple >> encapsulation modes. Hence, PFMIP6 needs to specify how/which >> encapsulation mode is used. Is this right? >> >> If so, here is my input. PFMIP6 must state what encapsulation modes MUST >> be supported. The encapsulation modes should be configurable. Which >> particular mode is used is dependent on the particular deployment. There >> must be text stating that deployments MUST configure the encapsulation >> modes on MAGs to be the same, and it is recommended to use the same >> encapsulation modes as in MAG-LMA communication whenever feasible for >> operational uniformity. If the deployments fail to configure the >> encapsulation modes to be the same across all MAGs, then the protocol >> will not work correctly. >> >> How does this sound? >> >> Regards, >> >> -Rajeev >> >> >>> -----Original Message----- >>> From: Ahmad Muhanna [mailto:amuhanna@nortel.com] >>> Sent: Tuesday, September 22, 2009 10:58 PM >>> To: Hidetoshi Yokota >>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org >>> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 >>> >>> Hi Hidetoshi, >>> >>> Thanks for your thoughts on this. >>> I expected a little more serious ones:), but please see some >>> more of the same thoughts inline! :) >>> >>> Regards, >>> Ahmad >>>> -----Original Message----- >>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp] >>>> Sent: Tuesday, September 22, 2009 6:20 AM >>>> To: Muhanna, Ahmad (RICH1:2H10) >>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org >>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 >>>> >>>> Hi Ahmad, >>>> >>>> Thanks for your detailed thoughts. Below, we try to answer your >>>> questions as best we can. >>>> >>>> Ahmad Muhanna wrote: >>>>> Hi Hidetoshi, >>>>> >>>>> Looking one more time into the draft I found the following under >>>>> section >>>>> 4.1: >>>>> >>>>> " >>>>> The encapsulation type for these user packets SHOULD >>>> follow that used >>>>> in the tunnel between the LMA and MAG (IPv6-in-IPv6 as >>>> specified in >>>>> [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in >>>>> [IPv4PMIPv6], TLV-header UDP tunneling as specified in >>>> [GREKEY] or >>>>> any new method defined in the future). >>>>> " >>>> The intention here is that the inter-MAG tunnel should >>> support all the >>>> encapsulation types that are mentioned in RFC5213. >>> [Ahmad] >>> Well, whatever it is this document supports, it needs to make >>> it clear and ensure that it works. My question is the >>> following: Does this document support ONLY IPv6-in-IPv6 >>> tunneling between the MAG and the LMA? or it also supports >>> the different tunneling that the document claims to support >>> as quoted above? >>> >>> If it only supports IPv6-in-IPv6, this document MUST document >>> that clearly. On the other hand, if it supports the above >>> listed tunneling protocols, it MUST document how forwarding >>> these packets over the inter-MAG tunnel works. >>> >>>>> IMO, this is a very broad statement that underestimates its >>>> content. >>>>> It is way underspecified how these tunneling protocols will >>>> be used to >>>>> successfully map the traffic from the MAG-LMA tunnel to >>> the MAG-MAG >>>>> tunnel. In this regard, I have the following questions: >>>>> >>>>> 1. Is it documented any where how this mapping would work >>>> for all of >>>>> these tunneling/encapsulation mechanisms? >>>> It seems that the mapping of these flows is rather implementation >>>> specific. Is there anything that should be considered in >>> addition to >>>> RFC5568? >>> [Ahmad] >>> Of course. I guess you need to get out of the mode that this >>> document is nothing but few tweaks to make FMIP6 works for >>> PMIPv6. In RFC5568, it clearly assumes that protocol is used >>> for fast handover when IP Mobility based on MIP6 as described >>> in RFC3775. In that sense, only IPv6-in-IPv6 is assumed. >>> >>> Again, the above claim of supporting all these tunneling >>> mechanisms should either be removed and clearly document that >>> this protocol works ONLY when the tunneling between the MAG >>> and LMA is IPv6-in-IPv6 or explain how they will work..... >>> >>>>> 2. Is the tunneling mode (between the PMAG and the LMA) >>>>> negotiated/communicated between the PMAG-MAGs? >>>> If the tunneling mode is determined between the LMA and >>> PMAG, which is >>>> in the scope of RFC5213, that of the inter-MAG tunnel should follow >>>> it. >>>> It is also assumed that the same type of tunneling will be used >>>> between the LMA and NMAG. >>> [Ahmad] >>> Sure, but your document claim that it supports all of these >>> tunneling mechanisms (as per the quoted text from section >>> 4.1) and at the same time documents nothing about how these >>> should work across the inter-MAG tunnel. >>> >>>>> 3. If the tunneling between the PMAG-LMA is >>>> IPv6-in-IPv4-UDP, Does it >>>>> mean the tunneling between the PMAG-NMAG is also going to >>>> use the same >>>>> encapsulation? >>>> Yes, that is the basic idea. >>> [Ahmad] >>> Good. Then How that should work? >>> Is there anything in your document which specify that? I am >>> all ears, just point me to the text. >>> >>>>> 4. If the UDP tunneling between the two MAGs is not needed, >>>> what kind >>>>> of tunneling will be used between the two MAGs to correctly >>>> map the MN >>>>> traffic and successfully deliver it to the MN? >>>> That mode has not been considered. It will be possible, but >>> is there >>>> any reason that a different type of tunneling should be used? >>> [Ahmad] >>> I am not suggesting to use a different tunneling mechanism >>> between the PMAG and the NMAG; However, You are saying that, >>> e.g., IPv6-in-IPv4-UDP is naturally extended over the >>> PMAG-NMAG tunnel without saying how it should work. That what >>> I was speculating that you probably use a specific tunneling, >>> of course, other than IPv6-in-IPv6 to make it work. >>> >>> So, again, if PMAG-NMAG interface does support all these >>> tunneling mechanisms, then we need to know how it works? That is all. >>> >>>>> 5. Do these tunneling mechanisms include plain GRE >>>> Encapsulation with >>>>> GRE keys or only GRE with TLV-header UDP tunneling? >>>> <draft-ietf-netlmm-grekey-option> supports both modes, so >>>> PFMIPv6 should also support them. >>> [Ahmad] >>> That is a clear answer. Thanks. >>> Could you please make sure that your document clarify and >>> clearly document it. >>> >>>>> 5.1. If plain GRE encapsulation with keys is used, then the >>>> document >>>>> needs to clearly specify if there are two sets of GRE >>> keys for the >>>>> same mobility session or only one set? i.e., GRE Keys between the >>>>> PMAG-LMA, GRE Keys for PMAG-NMAG or one set is used. It is >>>> not clear >>>>> in the current document. >>>> PFMIPv6 describes only GRE keys for the inter-MAG tunnel >>> (PMAG-NMAG), >>>> which I think is clarified in Section 4.2. As far as GRE >>> Key Option is >>>> used, it is difficult to transport multiple sets of keys at >>> one time. >>> [Ahmad] >>> Well, >>> 1. It is not clarified nor clear under section 4.2. but, >>> could you please point me to the text you are talking about? >>> 2. As far as of multiple GRE keys exchange, currently that is >>> a limitation of the PMIPv6 protocol. Right? Then, when you >>> need multiple GRE keys, how these GRE keys are communicated? >>> Is that explained in the document? >>> >>>>> 5.2. same question as in 4, if there is GRE with TLV-header UDP >>>>> tunneling between the PMAG and the LMA, Is that needed >>> between the >>>>> PMAG-NMAG? If NOT, what encapsulation mechanism is being >>>> used and how >>>>> is the mapping works? >>>> The working assumption is "yes". >>> [Ahmad] >>> That is a huge CLAIM that is NOT backed by any technical >>> data! How that should work? Can you document that some where >>> in the specification? If it is already document, please point >>> me to the text. >>> >>>>> 6. Is the assumption here that the NMAG and the PMAG have >>> the same >>>>> transport with the LMA? >>>> For the sake of simplicity, the answer should be "yes". >>>> If not, the network between MAGs should provide the transparent >>>> environment (e.g., by another tunneling). >>>> >>>>> 7. with respect to "any new method defined in the future" >>>> what is the >>>>> constraints on this statement? It seems to me an >>>> overstatement of the >>>>> capabilities of this protocol and an underestimate of the future >>>>> tunneling mechanism. May be you need to make sure that the >>>> wording is >>>>> correct by having some conditional restrictions. >>>> The intention here is that if a new tunneling mechanism is >>> specified >>>> for PMIPv6, PFMIPv6 should also support it. If this is too >>> vague, it >>>> could be removed. >>> [Ahmad] >>> Sure, please remove it. Unless, you propose a dynamic >>> tunneling mechanism that is forward compatible and capable to >>> address future tunneling between the PMAG and LMA. >>> >>>>> In addition, >>>>> ============ >>>>> IMO and based on a quick review of this draft, I find it >>> very vague >>>>> and does not have the details for an Interoperable >>>> protocol. I believe >>>>> the draft SHOULD CLEARLY address the following points: >>>>> >>>>> Decide whether it needs to specify/support a single tunneling >>>>> encapsulation mechanism between the PMAG-NMAG or more than one. >>>>> >>>>> >>>>> SINGLE tunneling and encapsulation mechanism between PMAG-NMAG: >>>>> =============================================================== >>>>> 1. This *protocol* needs to specify the exact details of how this >>>>> tunneling mechanism is dynamically established to address >>>> the nature >>>>> of the problem being address in this *handover optimization >>>> protocol*. >>>> >>>> The nature of the specification and its performance is based on >>>> RFC5568. >>> [Ahmad] >>> That is part of the problem not to be sited here as a >>> supporting argument! >>> As I said earlier, RFC5568 assumes that there is always >>> IPv6-in-IPv6 tunneling between the mobile node and the home >>> agent. In the case of >>> PMIPv6 that assumption is INVALID. >>> >>>> Whether the establishment of the tunneling mechanism is dynamic or >>>> static is operation-specific. >>> [Ahmad] >>> That is NOT true. This document is supposedly offering a fast >>> handover mechanism for PMIPv6 which dynamically does >>> (implicitly or explicitly) negotiates tunneling between the >>> MAG and the LMA. So, how a statically configured tunnel >>> between the PMAG and the NMAG tunnels a mobile node traffics >>> when the mobile node traffic between the PMAG and LMA for the >>> same mobile node was dynamically negotiated? >>> >>> >>>>> 1.1. for example, if GRE with Keys is being used, then it MUST be >>>>> clear how the GRE keys are exchanged between the PMAG-NMGA, >>>> similar to PMIPv6. >>>> >>>> The current text proposal for Section 4.2 tries to clarify it >>>> regarding who selects the key and how it is transferred. >>> [Ahmad] >>> Hmmm.. Tries to clarify ... I guess we need a clear >>> specification that documents an Interoperable solution. We >>> can not just propose a standard track document that is some >>> what clear in the mind of some. Right? >>> >>>>> 2. How the chosen PMAG-NMAG tunneling protocol is able to >>> interwork >>>>> with all tunneling mechanisms that are currently supported >>>> by PMIPv6, >>>>> e.g., IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc. >>>> between the >>>>> PMAG-LMA as is being claimed under section 4.2 of this draft. >>>> Basically, it is supposed that the same tunneling protocol as that >>>> between the LMA and MAG is used. The tunneling type between the LMA >>>> and MAG should be determined in advance. >>> [Ahmad] >>> I guess this answer is more confusing .... One time you said >>> that the tunnel can be static and can be dynamic. Now, you >>> just said that the tunnel should be STATIC? I mean what is >>> it? It needs clarification...... >>> >>> >>>>> 3. This *protocol* needs to clearly specify how the >>>> different mobility >>>>> sessions are being mapped between the PMAG-LMA tunneling to the >>>>> PMAG-NMAG tunneling? Somewhat similar to 2 above. >>>> The basic mechanism is the same as in RFC5568. >>> [Ahmad] >>> Again, in the case of RFC5568 it is straight forward. Only >>> IPv6-in-IPv6 is supported as per RFC3775. Not the case for PMIPv6. >>> >>>> If a GRE >>>> tunnel further differentiates the session, the GRE key will be used. >>> [Ahmad] >>> Good. Which GRE Key then? >>> 1. Is that a statically configured GRE key? >>> 2. Is it the same set of GRE keys between the PMAG and LMA? >>> 3. If none of the above, how these GRE keys are generated and >>> exchanged between the PMAG and the NMAG? >>> >>>>> Multiple Tunneling and encapsulation mechanisms between the >>>> PMAG-NMAG: >>> ====================================================================== >>>>> If the choice as being claimed under section 4.1, is to >>>> support all of >>>>> the current tunneling mechanisms between PMAG-LMA on the >>> PMAG-NMAG >>>>> interface, then the protocol needs to address the following: >>>>> >>>>> 1. Provide a good analysis why that option is the best >>> option? What >>>>> are the advantages and the disadvantages? >>>> I think that is the most workable solution. >>> {Ahmad] >>> What do you have to technically back up this statement. >>> Otherwise, it is just another statement. >>> >>>> Since the >>>> tunneling mechanism selected for the PMIPv6 tunnel is supported by >>>> both the PMAG and NMAG, no extra capability is required for the >>>> inter-MAG tunnel. >>> [Ahmad] >>> OK. I am not disputing that the PMAG and the NMAG supports >>> the same sets of tunneling mechanisms or not. It is more of >>> which tunnel to use for which mobile node session and what >>> parameter is needed for this inter-MAG tunnel to correctly >>> tunnel the mobile node traffic and deliver it to the end of >>> the tunnel in a non ambiguous way. >>> >>> For example: >>> Tunneling Case 1: >>> ================= >>> 1. PMAG and the LMA negotiates the GRE encapsulation and the >>> GRE keys using the PBU and PBA for each applicable mobility session. >>> 2. It is very well understood that both the PMAG and the NMAG >>> support GRE tunneling with GRE keys + GRE keys exchange using >>> PMIPv6 signaling with the LMA. >>> 3. Now: for the inter-MAG tunnel and for the same mobility >>> session, how GRE tunneling and GRE keys are negotiated >>> between the PMAG and NMAG? Of course, using HI and HAck, right? >>> 4. Okay, we need the exact details for this specific case. >>> >>> Tunneling Case 2: >>> ================= >>> 1. Let us assume IPv6-in-IPv4 UDP is used for MN1. Okay 2. >>> That tunneling is implicitly negotiated between the PMAG and >>> LMA during the PBU/PBA exchange, right? >>> 3. How that is negotiated between the PMAG and the NMAG? We >>> need the details.. >>> >>> And so on.... >>> >>>> Also, I don't see any specific reason to use a special tunneling >>>> mechanism for the inter-MAG tunnel. >>> [Ahmad] >>> Good. This means you would use the same tunneling between the >>> PMAG and LMA over inter-MAG tunneling. In this case, we need >>> the details for negotiating that tunneling mechanism between >>> the PMAG and the NMAG. >>> >>>>> 2. How this *protocol* dynamically negotiates the tunneling >>>> mechanism >>>>> type? >>>> If the tunneling mechanism between the LMA and MAG is determined in >>>> advance, the same mechanism is used for the inter-MAG >>> tunnel. So, it >>>> is not on-demand and no negotiation is assumed. If the tunneling >>>> mechanism between the LMA and MAG is determined on demand, >>> then that >>>> is a different story... >>> [Ahmad] >>> Well, what do you mean? The tunneling between the PMAG and >>> the LMA is NOT on demand? >>> I believe IPv4 support for PMIPv6 and GRE key for PMIPv6 >>> drafts will be helpful in answering this question. >>> >>>>> 3. How that should work, for example if the tunneling mechanism >>>>> between the PMAG-LMA is IPv6 in IPv4 UDP, how that >>>> tunneling will be >>>>> extended to go over the PMAG-NMAG interface and how it is >>>> supposed to work. >>>> >>>> In this case, both the PMAG and NMAG should be dual-stack >>> and the IP >>>> addresses in the IPv4 outer header are those of the PMAG and NMAG. >>>> IPv6 inner header should be kept intact. >>>> >>> Okay..... Then if the NMAG sends the first packet over the >>> NMAG-PMAG tunnel! Which encapsulation mechanism is going to >>> use to encapsulate that packet? >>> >>> Also, Do you agree that there is a specific reason for the >>> traffic between the PMAG and the LMA to be IPv6-in-IPv4-UDP. >>> Right? That reason may NOT be VALID between the PMAG and the >>> NMAG. Right? >>> Then why to use the same tunneling here? Just out of curiosity! >>> >>>>> Finally, the draft could have some restrictions and define the >>>>> PMAG-NMAG tunneling/encapsulation mechanism and could >>>> define a set of >>>>> PMAG-LMA tunneling mechanism that are being >>>> supported/interwork over >>>>> the PMAG-NMAG tunneling/encapsulation. >>>> What kind of restrictions do you foresee? Do you also have any >>>> specific mechanism for the inter-MAG tunnel in mind? >>> [Ahmad] >>> I guess, you need to answer many of the above comments before >>> we talk about this. A clear understanding of this tunneling >>> is needed and I do not see it documented in this draft. >>> >>> BTW: Under section 4, this specification says: >>> >>> " >>> In order to further improve the performance during the >>> handover, the >>> PFMIPv6 protocol in this document specifies a bi-directional tunnel >>> between the Previous MAG (PMAG) and the New MAG (NMAG) to tunnel >>> packets meant for the mobile node. >>> " >>> >>> Which bi-directional tunnel? Where? What are the details? >>> >>>>> One more note: I found defining and describing a protocol >>>> based on a >>>>> call flow, is not the most easy to follow. But, that could >>>> just be me. >>>> >>>> What do you think could improve the readability of the document? >>> [Ahmad] >>> Quite some of them... But I gave up after a while.... >>> >>>> Regards, >>>> -- >>>> Hidetoshi >>>> >>>>> Regards, >>>>> Ahmad >>>>> >>>>> >>>>>> -----Original Message----- >>>>>> From: mipshop-bounces@ietf.org >>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad >>>>>> (RICH1:2H10) >>>>>> Sent: Thursday, September 17, 2009 9:23 PM >>>>>> To: Hidetoshi Yokota >>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org >>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 >>>>>> >>>>>> Hi Hidetoshi, >>>>>> Please see inline. >>>>>> >>>>>> Regards, >>>>>> Ahmad >>>>>> >>>>>>> -----Original Message----- >>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp] >>>>>>> Sent: Thursday, September 17, 2009 4:48 PM >>>>>>> To: Muhanna, Ahmad (RICH1:2H10) >>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org; >>> Jari Arkko >>>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 >>>>>>> >>>>>>> Hi Ahmad, >>>>>>> >>>>>>> Here is the proposed revision: >>>>>>> >>>>>>> In Section 4.2: >>>>>>> [... message with the same sequence number.] The necessary >>>>>>> information MUST be transferred in the HI/HAck messages to >>>>>>> distinguish MN's packets for forwarding in advance or at >>>>>> this time. >>>>>>> Such information includes the MN ID and/or GRE key(s). >>>>>> Typically, >>>>>>> the NMAG selects the GRE key for the downlink packets >>>>>> and the PMAG >>>>>>> selects that for the uplink packets. Each key is >>> conveyed in >>>>>>> either >>>>>>> the HI or HAck message separately when GRE Key Option >>>> [GREKEY] is >>>>>>> used. [For the downlink ...] >>>>>>> >>>>>> [Ahmad] >>>>>> In addition to what Vijay mentioned with respect to >>>> Typically (which >>>>>> should be removed), I believe the draft needs to be clear on the >>>>>> mechanism that is used for exchanging the GRE keys. When you say >>>>>> "...when the GRE Key Option [GREKEY] is used." What >>> happens if the >>>>>> GRE key option is NOT used. Is there another mechanism? >>>>>> >>>>>> Since the GRE keys are necessary to establish the lateral >>>> tunnel and >>>>>> identify the MN traffic, the draft must specify a default >>>> mechanism. >>>>>> Other mechanisms can be used or specified some where else >>>> if needed, >>>>>> but we need a default one here. Right? >>>>>> >>>>>> Also, you replaced the **HoA of the MN** with the **MN ID**. >>>>>> What is the reason for this change? >>>>>> And how this should work NOW while you have ".. and/or GRE Keys"? >>>>>> >>>>>>> If the above description is acceptable, I will submit >>> the revised >>>>>>> version by the end of the week. >>>>>>> >>>>>>> Regards, >>>>>>> -- >>>>>>> Hidetoshi >>>>>>> >>>>>>> Ahmad Muhanna wrote: >>>>>>>> Hi Hidetoshi, >>>>>>>> >>>>>>>>> -----Original Message----- >>>>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp] >>>>>>>>> Sent: Monday, September 14, 2009 7:37 AM >>>>>>>>> To: Muhanna, Ahmad (RICH1:2H10) >>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org; >>>>>> Jari Arkko >>>>>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 >>>>>>>>> >>>>>>>>> Hi Ahmad, >>>>>>>>> >>>>>>>>> Thanks for your comment. I'm glad to hear an opinion from >>>>>>> a GRE key >>>>>>>>> expert. Please see inline: >>>>>>>>> >>>>>>>>> Ahmad Muhanna wrote: >>>>>>>>>> Hi Hidetoshi, >>>>>>>>>> >>>>>>>>>> I just have one quick comment and question. >>>>>>>>>> >>>>>>>>>> Reading the draft, it seems to me that the GRE keys are >>>>>>>>> somehow sent >>>>>>>>>> from the NAR to PAR in the HI (section 4.2). Is that the >>>>>>> case? This >>>>>>>>>> means both the DL and UP GRE keys for the bilateral >>>>>>> tunnels between >>>>>>>>>> the two AR(s). Is my understanding correct? It also >>>>>>>>> mentions that the >>>>>>>>>> format >>>>>>>>> In terms of the GRE keys for the bilateral tunnel, >>> the working >>>>>>>>> assumption is that the DL key is selected by the NAR and >>>>>>> the UL key >>>>>>>>> is selected by the PAR. Depending on the fast handover >>>>>> mode, those >>>>>>>>> keys are transferred to the other MAG via either the >>> HI or Hack. >>>>>>>>>> of these keys are based on the GRE keys for PMIPv6 >>>>>> draft (section >>>>>>>>>> 6.2.6). >>>>>>>>> Correct. >>>>>>>>> >>>>>>>>>> It seems to me that there should be more text to define >>>>>>> which keys >>>>>>>>>> exchange in the HI and which in the HaCK >>>>>>>>> If the above assumption works, I would like to add more >>>>>> text along >>>>>>>>> that line. >>>>>>>> [Ahmad] >>>>>>>> That is great. Please add some clarification text to >>>>>>> clearly indicate >>>>>>>> that only one key in the HI and the other in the HACK. >>>>>>>> Since some specification in 3GPP2 depends on this draft, I >>>>>>> appreciate >>>>>>>> if you can publish an updated version before the end of >>>> the week. >>>>>>>> Thanks in advance! >>>>>>>> >>>>>>>>>> If both keys are exchanged in the same HI, How these >>> keys are >>>>>>>>>> identified at the pAR? >>>>>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key is included >>>>>>>>> in the PBU >>>>>>>>>> and the uplink GRE key in included in the PBA. They never >>>>>>>>> exist in the >>>>>>>>>> same message and that way there is no confusing. >>>>>>>>> So far, each key is conveyed by either the HI or HAck. >>>>>>>>> However, I haven't explored all of the possibilities. >>>> If you can >>>>>>>>> think of any case that two keys must be conveyed in one >>>> message, >>>>>>>>> please let me know. >>>>>>>> [Ahmad] >>>>>>>> I do not see any reason for this case (one key per >>>>>> message) not to >>>>>>>> work for all implementation. >>>>>>>> >>>>>>>>>> In addition, DL and UP GRE keys are generated by NAR and >>>>>>>>> sent inside >>>>>>>>>> the HI, my question: Is there any specific reason for >>>>>> the NAR to >>>>>>>>>> specify both GRE keys for the bilateral tunnels? >>>>>>>>> It would be more problematic that the NAR determines the >>>>>> both keys >>>>>>>>> and I would rather like to avoid it. >>>>>>>>> >>>>>>>>>> Sorry for this comment to be so late but hope that you have >>>>>>>>> the chance >>>>>>>>>> to take a look at it. >>>>>>>>> That's ok. The draft is under the review process. Your >>>>>> comment is >>>>>>>>> highly appreciated. >>>>>>>>> >>>>>>>>> Regards, >>>>>>>>> -- >>>>>>>>> Hidetoshi >>>>>>>>> >>>>>>>>> >>>>>>>>>> Thanks! >>>>>>>>>> >>>>>>>>>> Regards, >>>>>>>>>> Ahmad >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> -----Original Message----- >>>>>>>>>>> From: mipshop-bounces@ietf.org >>>>>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of >>>> Hidetoshi Yokota >>>>>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM >>>>>>>>>>> To: Jari Arkko >>>>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org >>>>>>>>>>> Subject: Re: [Mipshop] AD review of >>> draft-ietf-mipshop-pfmipv6 >>>>>>>>>>> Hi Jari, >>>>>>>>>>> >>>>>>>>>>> Thanks for your patience. The attached revised document is >>>>>>>>> supposed to >>>>>>>>>>> reflect the rest of your comments. Please also see inline, >>>>>>>>> where the >>>>>>>>>>> revised part is explained item by item. If there is no >>>>>>> outstanding >>>>>>>>>>> issue there, we will upload it shortly. >>>>>>>>>>> >>>>>>>>>>> [Apologize if you received it twice. Since the size just >>>>>>>>> exceeded the >>>>>>>>>>> limit of this ML, this mail is reposted without the >>>>>> attachment.] >>>>>>>>>>> Hidetoshi Yokota wrote: >>>>>>>>>>>> Hi Jari, >>>>>>>>>>>> >>>>>>>>>>>> Appreciate your detailed review. The editorial corrections >>>>>>>>>>> are mostly >>>>>>>>>>>> done and the revised version is attached to this mail. >>>>>>>>> Regarding the >>>>>>>>>>>> technical comments, only the policies for the correction >>>>>>>>>>> are listed for >>>>>>>>>>>> now. The complete correction will be posted as soon as >>>>>>>>>>> possible. Please >>>>>>>>>>>> see inline for the responses to your questions and >>> comments: >>>>>>>>>>>> Jari Arkko wrote: >>>>>>>>>>>>> I have reviewed this document. It was generally in good >>>>>>>>>>> shape and easy >>>>>>>>>>>>> to read. I did find a number of issues though. Please >>>>>>>>>>> discuss them with >>>>>>>>>>>>> me on this thread and/or revise the draft accordingly. >>>>>>>>>>>>> >>>>>>>>>>>>> Technical: >>>>>>>>>>>>> >>>>>>>>>>>>> I do not understand the IP host aspects of the >>>>>>> handover. For an >>>>>>>>>>>>> unmodified host, what kind of interfaces exist on the >>>>>>> host, what >>>>>>>>>>>>> addresses they have, and at what time are interfaces >>>>>>>>>>> removed or added? >>>>>>>>>>>>> Is this exactly the same as in RFC 5213, or does PFMIPv6 >>>>>>>>>>> introduce some >>>>>>>>>>>>> change here? >>>>>>>>>>>> The basic principle would be that this specification does >>>>>>>>>>> not require >>>>>>>>>>>> any additional IP-level function to the MN running in the >>>>>>>>>>> PMIPv6 domain. >>>>>>>>>>>> This MN should therefore be the same as defined in RFC5213. >>>>>>>>>>>> >>>>>>>>>>>> A typical network interface would be one with the >>>>>>>>> cellular network, >>>>>>>>>>>> where the network basically controls the movement of the >>>>>>>>>>> MN. Different >>>>>>>>>>>> types of interfaces could be involved such as different >>>>>>>>>>> generations (3G >>>>>>>>>>>> and 3.9G) or different radio access systems. Any type of >>>>>>>>> IP address >>>>>>>>>>>> could be assigned (IPv4/v6 or global/private), but the >>>>>>>>>>> assigned address >>>>>>>>>>>> must be preserved before and after the handover. PFMIPv6 >>>>>>>>>>> should be able >>>>>>>>>>>> to handle the single radio situation, where only one >>>>>>>>>>> interface is active >>>>>>>>>>>> at any given time. This is a tougher situation in terms of >>>>>>>>>>> packet loss >>>>>>>>>>>> and delay. >>>>>>>>>>>> >>>>>>>>>>>>> I would like to see a new section on manageability >>>>>>>>>>> considerations. For >>>>>>>>>>>>> instance, Section 5 talks about some >>> configuration issues. >>>>>>>>>>> These should >>>>>>>>>>>>> be mentioned, and there should be a description of what >>>>>>>>>>> the operator >>>>>>>>>>>>> needs to configure in order to set up a PFMIPv6 network. >>>>>>>>>>>> We will add a new section for manageability considerations >>>>>>>>>>> to clarify >>>>>>>>>>>> the above and to reflect your suggestion. >>>>>>>>>>> A new subsection is added in Section 5 describing the >>>>>>>>> above aspects: >>>>>>>>>>> ------------------- >>>>>>>>>>> 5. PMIPv6-related Fast Handover Issues >>>>>>>>>>> >>>>>>>>>>> 5.1. Manageability Considerations >>>>>>>>>>> >>>>>>>>>>> This specification does not require any >>> additional IP-level >>>>>>>>>>> functionality on the LMA and the MN running in >>> the PMIPv6 >>>>>>>>>>> domain. A >>>>>>>>>>> typical network interface that the MN could be >>>>>>> assumed to have >>>>>>>>>>> is one >>>>>>>>>>> with the cellular network, where the network >>> controls the >>>>>>>>>>> movement of >>>>>>>>>>> the MN. Different types of interfaces could be >>>>>>> involved such as >>>>>>>>>>> different generations (3G and 3.9G) or different >>>>>> radio access >>>>>>>>>>> systems. This specification supports a MN with the >>>>>>> single radio >>>>>>>>>>> mode, where only one interface is active at any given >>>>>>> time. The >>>>>>>>>>> assigned IP address is preserved whether the physical >>>>>>> interface >>>>>>>>>>> changes or not and the MN can identify which >>>>>>> interface should be >>>>>>>>>>> used >>>>>>>>>>> if there are multiple ones. >>>>>>>>>>> -------------------- >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>>>> If the new router's interface is configured to >>> respond to >>>>>>>>>>>>>> queries sent to link-layer addresses than its >>>>>>>>>>> own (e.g., >>>>>>>>>>>>>> set to promiscuous mode), then it can respond to the >>>>>>> NUD probe, >>>>>>>>>>>>>> providing its link-layer address in the >>> solicited Neighbor >>>>>>>>>>>>>> Advertisement. >>>>>>>>>>>>> Is this according to RFC 5213? I seem to recall that RFC >>>>>>>>>>> 5213 operated >>>>>>>>>>>>> on the same link layer addresses. >>>>>>>>>>>> I think your observation is correct... I'll check with the >>>>>>>>>>> other authors >>>>>>>>>>>> to see if it is ok to rewrite it. >>>>>>>>>>> The new text doesn't mention the promiscuous mode and >>>>>>>>> emphasizes the >>>>>>>>>>> common link-layer address among all MAGs in the >>> PMIPv6 domain: >>>>>>>>>>> --------------- >>>>>>>>>>> 5.2. Expedited Packet Transmission >>>>>>>>>>> >>>>>>>>>>> [...] >>>>>>>>>>> >>>>>>>>>>> The protocol specified in this document is applicable >>>>>>>>> regardless of >>>>>>>>>>> whether link-layer addresses are used between a MN and >>>>>>>>> its access >>>>>>>>>>> router. A MN should be able to continue sending >>>>>>> packets on the >>>>>>>>>>> uplink even when it changes link. When link-layer >>>>>>> addresses are >>>>>>>>>>> used, the MN performs Neighbor Unreachability >>>>>> Detection (NUD) >>>>>>>>>>> [RFC4861], after attaching to a new link, probing the >>>>>>>>>>> reachability of >>>>>>>>>>> its default router. The new router should respond >>>>>> to the NUD >>>>>>>>>>> probe, >>>>>>>>>>> providing its link-layer address in the >>> solicited Neighbor >>>>>>>>>>> Advertisement, which is common in the PMIPv6 domain. >>>>>>>>>>> Implementations >>>>>>>>>>> should allow the MN to continue to send uplink packets >>>>>>>>> while it is >>>>>>>>>>> performing NUD. >>>>>>>>>>> ---------------- >>>>>>>>>>> >>>>>>>>>>>>>> At least one mobility option MUST uniquely identify >>>>>>> the target >>>>>>>>>>>>>> MN (e.g., the Mobile Node >>>>>>>>> Identifier >>>>>>>>>>>>>> Option defined in RFC4283 >>>>>>>>>>> <http://tools.ietf.org/html/rfc4283>) and >>>>>>>>>>>>>> the transferred context MUST be for one MN per message. >>>>>>>>>>>>>> >>>>>>>>>>>>> I would like the required options to be specified in more >>>>>>>>>>> detail. Which >>>>>>>>>>>>> identity options are sufficient to satisfy the MUST? >>>>>>>>>>>> The required option should be the MN Identifier in the >>>>>>> Mobile Node >>>>>>>>>>>> Identifier Option. >>>>>>>>>>> The above description is added in Section 6.1.1: >>>>>>>>>>> >>>>>>>>>>> --------- >>>>>>>>>>> Requested option >>>>>>>>>>> In order to uniquely identify the target >>>>>> MN, the MN >>>>>>>>>>> Identifier MUST be contained in the >>> Mobile Node >>>>>>>>>>> Identifier >>>>>>>>>>> Option. >>>>>>>>>>> --------- >>>>>>>>>>> >>>>>>>>>>>>>> If a default set of context information is defined >>>>>> and always >>>>>>>>>>>>>> sufficient, this option is not mandatory. This >>>>>>>>>>> option is more >>>>>>>>>>>>>> useful to retrieve additional or dynamically >>>>>> selected context >>>>>>>>>>>>>> information. >>>>>>>>>>>>>> >>>>>>>>>>>>>> Context Request Option is typically used for the >>>>>>> reactive (NAR- >>>>>>>>>>>>>> initiated) fast handover mode to retrieve the context >>>>>>>>> information >>>>>>>>>>>>>> from the PAR. When this option is included in the HI >>>>>>>>> message, all >>>>>>>>>>>>>> the requested context information SHOULD be included >>>>>>> in the HAck >>>>>>>>>>>>>> message in the corresponding mobility option(s) (e.g., >>>>>>>>>>> HNP, LMAA or >>>>>>>>>>>>>> MN-IID mobility options). >>>>>>>>>>>>>> >>>>>>>>>>>>> Please specify what the default set of context >>>>>>>>> information is, by >>>>>>>>>>>>> listing the required options when the CRO is not present. >>>>>>>>>>>> The default context information to request is the Home >>>>>>>>>>> Network Prefix >>>>>>>>>>>> Option. If the Mobile Node link-layer is available and >>>>>>>>>>> used, the Mobile >>>>>>>>>>>> Node Link-layer Identifier Option MUST also be requested. >>>>>>>>>>> With these two >>>>>>>>>>>> options and the MN identifier, the NMAG can >>>> construct the PBU. >>>>>>>>>>> The above description is added in Section 6.2.1: >>>>>>>>>>> >>>>>>>>>>> ---------- >>>>>>>>>>> The default context information to request is the >>>>>>> Home Network >>>>>>>>>>> Prefix >>>>>>>>>>> Option. If the Mobile Node link-layer is available and >>>>>>>>> used, the >>>>>>>>>>> Mobile Node Link-layer Identifier Option MUST also be >>>>>>> requested. >>>>>>>>>>> ---------- >>>>>>>>>>> >>>>>>>>>>>>> Editorial: >>>>>>>>>>>>> >>>>>>>>>>>>>> HO-Initiate: >>>>>>>>>>>>>> A generic signaling message, sent from the P-AN >>>>>>>>>>> to the PMAG that >>>>>>>>>>>>>> indicates a MN handover. While this signaling is >>>>>>>>>>> dependent on >>>>>>>>>>>>>> the access technology, it is assumed that >>>>>>>>>>> HO-Initiate can carry >>>>>>>>>>>>>> the information to identify the MN and to >>>>>>>>> assist the PMAG >>>>>>>>>>>>>> resolve the NMAG and the new access point or the >>>>>>>>>>> base station to >>>>>>>>>>>>>> which the MN is moving to. The details of this >>>>>>>>>>> message are >>>>>>>>>>>>>> outside the scope of this document. >>>>>>>>>>>>>> >>>>>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview >>>>>>>>>>>>> Section 4 would probably benefit from an additional >>>>>>>>>>> paragraph at the >>>>>>>>>>>>> beginning to explain what assumptions there exist about >>>>>>>>>>> lower layer >>>>>>>>>>>>> functionality. >>>>>>>>>>>> Yes, the predictive fast handover relies on the >>> lower layer >>>>>>>>>>>> functionality to trigger to send the HI. A new paragraph >>>>>>>>>>> will be added >>>>>>>>>>>> to clarify it. >>>>>>>>>>> ------------- >>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview >>>>>>>>>>> >>>>>>>>>>> If the MAGs can be informed of the detachment and/or >>>>>>>>> attachment of >>>>>>>>>>> the MN in a timely manner via e.g. the lower layer >>>>>>> signaling, it >>>>>>>>>>> will >>>>>>>>>>> become possible to optimize the handover procedure, >>>>>>>>> which involves >>>>>>>>>>> establishing a connection on the new link and >>>>>>> signaling between >>>>>>>>>>> mobility agents, compared to the baseline specification >>>>>>>>> of PMIPv6. >>>>>>>>>>> [...] >>>>>>>>>>> ------------- >>>>>>>>>>> >>>>>>>>>>> All the other corrections pointed out below have also been >>>>>>>>>>> reflected in the revised document. >>>>>>>>>>> >>>>>>>>>>> Regards, >>>>>>>>>>> -- >>>>>>>>>>> Hidetoshi >>>>>>>>>>> >>>>>>>>>>>>>> A new flag 'P' is defined for the HI and HAck >>> messages to >>>>>>>>>>>>>> distinguish from those in [RFC5268bis >>>>>>>>>>>>>> >>> <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref- >>>>>>>>>>> RFC5268bis>] >>>>>>>>>>>>>> and thus MUST >>>>>>>>>>>>>> be set in the entire document. >>>>>>>>>>>>>> >>>>>>>>>>>>> This would be more readable as " ... those in >>>>>>>>>>> [RFC5268bis]. This flag >>>>>>>>>>>>> MUST be ..." >>>>>>>>>>>> Revised. >>>>>>>>>>>> >>>>>>>>>>>>>> and the NAR creates a proxy NCE to receive those >>>>>>>>>>> packets for the NCoA >>>>>>>>>>>>> The term NCE has not been introduced at this stage yet. >>>>>>>>>>>> Spelled out as "Neighbor Cache Entry". >>>>>>>>>>>> >>>>>>>>>>>>>> address that is used by the MN is MN-HoA. Hence the >>>>>>>>>>> PAR forwards >>>>>>>>>>>>> The term MN-HOA has not been introduced before. >>>>>>>>>>>> Added the unabbreviated form "Mobile Node's Home Address" >>>>>>>>> before it. >>>>>>>>>>>>>> The access network to which the MN is attached >>>>>>>>>>> after handover. >>>>>>>>>>>>> New term MN, not introduced before. >>>>>>>>>>>>> >>>>>>>>>>>> Added "Mobile Node" before it. >>>>>>>>>>>> >>>>>>>>>>>>>> specifies forwarding when the MN uses HoA as its >>>>>>> on-link address >>>>>>>>>>>>> New term HoA... >>>>>>>>>>>> Changed to "Home Address". >>>>>>>>>>>> >>>>>>>>>>>>>> as MN's NAI, Home Network Prefix (HNP), IPv4 Home >>>>>>>>> Address, are >>>>>>>>>>>>> New term NAI... >>>>>>>>>>>> Added "Network Access Identifier" before it. >>>>>>>>>>>> >>>>>>>>>>>>>> flag set and include the MN ID, the MN-HNP, the >>>>>>>>>>> MN-IID and the >>>>>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not >>>>>>>>>>> appear in their >>>>>>>>>>>>> MN-XXX form before this point). >>>>>>>>>>>> Modified "MN-HNP" to "HNP" for consistency. >>>>>>>>>>>> >>>>>>>>>>>>>> Inner destination address: HNP or IPv4-MN-HoA >>>>>>>>>>>>> IPv4-MN-HoA not defined earlier... >>>>>>>>>>>> Added "Mobile Node's IPv4 Home" before it. >>>>>>>>>>>> >>>>>>>>>>>>>> between the PCoA and NCoA to forward packets for the >>>>>>>>>>> MN to the NAR, >>>>>>>>>>>>> New terms PCoA and NCoA... there's probably more undefined >>>>>>>>>>> terms in the >>>>>>>>>>>>> document, please check! >>>>>>>>>>>> Added "Previous Care-of Address" and "New Care-of >>> Address". >>>>>>>>>>> Will read >>>>>>>>>>>> through it to see if there is any other undefined acronym. >>>>>>>>>>>> >>>>>>>>>>>>>> In (i), >>>>>>>>>>>>> In Step (i), >>>>>>>>>>>> Revised including other parts. >>>>>>>>>>>> >>>>>>>>>>>>>> |(MN ID, Old AP ID) | (MN ID, Old >>> AP ID) >>>>>>>>>>> | | >>>>>>>>>>>>> Old AP ID? AN ID? AR ID? >>>>>>>>>>>> AP ID stands for "Access Point Identifier", which is >>>>>>>>>>> defined in RFC5568. >>>>>>>>>>>> Added the unabbreviated form and citation. >>>>>>>>>>>> >>>>>>>>>>>> The rest of the part will be revised soon. >>>>>>>>>>>> >>>>>>>>>>>> Regards, >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>> -------------------------------------------------------------- >>>>>>>>>>> ---------- >>>>>>>>>>>> _______________________________________________ >>>>>>>>>>>> Mipshop mailing list >>>>>>>>>>>> Mipshop@ietf.org >>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> Mipshop mailing list >>>>>>>>>>> Mipshop@ietf.org >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop >>>>>>>>>>> >>>>>>>> >>>>>>> -- >>>>>>> Hidetoshi Yokota >>>>>>> >>>>>>> Mobile Network Lab >>>>>>> KDDI R&D Laboratories, Inc. >>>>>>> e-mail:yokota@kddilabs.jp >>>>>>> >>>>>>> >>>>>> _______________________________________________ >>>>>> Mipshop mailing list >>>>>> Mipshop@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/mipshop >>>>>> >>>>> >>>>> >>>> >> >> >> This email and any attachments may contain legally privileged and/or >> confidential information of Starent Networks, Corp. and is intended only >> for the individual or entity named in the message. The information >> transmitted may not be used to create or change any contractual >> obligations of Starent Networks, Corp. Any review, retransmission, >> dissemination or other use of, or taking of any action in reliance upon >> this e-mail and its attachments by persons or entities other than the >> intended recipient is prohibited. If you are not the intended recipient, >> please notify the sender immediately -- by replying to this message or by >> sending an email to postmaster@starentnetworks.com -- and destroy all >> copies of this message and any attachments without reading or disclosing >> their contents. Thank you. >> >> >> >
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 Jari Arkko
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Jari Arkko
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Vijay Devarapalli
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Koodli, Rajeev
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Frank Xia
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Frank Xia
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Frank Xia
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- [Mipshop] FW: AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- [Mipshop] FW: AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna