RE: [Mipshop] FMIPv6 Reactive Handover - HI/HAck

"Junghoon Jee" <jhjee@etri.re.kr> Tue, 23 August 2005 02:15 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E7OKE-0006P6-LR; Mon, 22 Aug 2005 22:15:42 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E7OKB-0006Ob-Ve for mipshop@megatron.ietf.org; Mon, 22 Aug 2005 22:15:40 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA19759 for <mipshop@ietf.org>; Mon, 22 Aug 2005 22:15:37 -0400 (EDT)
Received: from email1.etri.re.kr ([129.254.16.131] helo=email1.etri.info) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E7OKC-0003C3-3G for mipshop@ietf.org; Mon, 22 Aug 2005 22:15:41 -0400
Received: from FLY ([129.254.12.66]) by email1.etri.info with Microsoft SMTPSVC(6.0.3790.211); Tue, 23 Aug 2005 11:17:11 +0900
From: Junghoon Jee <jhjee@etri.re.kr>
To: 'Narayanan Vidya-CVN065' <vidya@motorola.com>, mipshop@ietf.org
Subject: RE: [Mipshop] FMIPv6 Reactive Handover - HI/HAck
Date: Tue, 23 Aug 2005 11:15:21 +0900
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <1B631E11D496D711BB2800065BFCB6A11B7A7321@il02exm13>
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.2527
thread-index: AcWnZA+WxVuRRZfcTuSvKX3wLR7TCwAGABqA
Message-ID: <EMAIL107XOq3JkrKdMU00005c30@email1.etri.info>
X-OriginalArrivalTime: 23 Aug 2005 02:17:11.0616 (UTC) FILETIME=[C538EC00:01C5A788]
X-Spam-Score: 1.0 (+)
X-Scan-Signature: 5fb88b8381f3896aeacc5a021513237b
Cc:
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: mipshop.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0945680983=="
Sender: mipshop-bounces@ietf.org
Errors-To: mipshop-bounces@ietf.org

Hi Vidya,
I made the same question through DNA WG recently regarding FMIP-DNA I-D.
 
You can find the previous discussion through the attached message.
 
I am still questioning why HI/HAck for the access control is required after
MN has already attached to NAR in the reactive case.
 
Junghoon
 
> -----Original Message-----
> From: Rajeev Koodli [mailto:rajeev@iprg.nokia.com] 
> Sent: Tuesday, July 19, 2005 8:46 AM
> To: Junghoon Jee
> Cc: 'Syam Madanapalli'; dna@eng.monash.edu.au; smadanapalli@gmail.com
> Subject: Re: [DNA] draft-koodli-dna-fmip-00.txt
> 
> 
> 
> 
> Junghoon Jee wrote:
> 
> > Rajeev,
> >  
> > 
> >>For both predictive and reactive modes, HI/HAck can be useful for 
> >>access control. NAR can forward packets for the MN without forcing 
> >>access control, through HI/HAck.
> > 
> 
> One could use HI/HAck for CT, but I am not referring to that.
> 
> When FBU processing is successful, PAR's message (HI) to NAR 
> can allow NAR to "validate" the ND cache entry for NCoA.
> No Context Transfer is involved. The fields in HI (PCoA, NCoA,
> LLA) are sufficient for the purpose.
> 
> -Rajeev
> 
> 
> 
> 
> 
> > 
> > Are you saying about context transfer by HI/HAck ?
> > 
> > Regards,
> > Junghoon
> > 
> > 
> >>(If it is not clear, FMIP-DNA is applicable when DNA+oDAD is 
> >>available,
> >>  and no neighborhood information is available for FMIP)
> >>
> >>-Rajeev
> >>
> >>
> >>
> >>Syam Madanapalli wrote:
> >>
> >>
> >>>Hello Junghoon,
> >>>
> >>>Thanks for reviewing the draft.
> >>>
> >>>
> >>>>Hi Syam,
> >>>>It's an interesting work.
> >>>>After reviewing this I-D, I've come up with a following question.
> >>>>
> >>>>About the role of HI/HACK in this reactive FMIPv6-DNA :
> >>>>I thought that these messages are required to confirm the MN's 
> >>>>prospective NCoA in predictive mode.
> >>>>In the FMIPv6-DNA, MN configures the NCoA by optimistic 
> DAD in the 
> >>>>reactive mode, so why do those messages needed to be
> >>
> >>transferred and
> >>
> >>>>what's their roles ?
> >>>>Just to prepare for future optional behavior the same as
> >>
> >>specified in
> >>
> >>>>the draft-ietf-mipshop-fast-mipv6-03 ?
> >>>>I guess that my question may also apply to the reactive mode of 
> >>>>draft-ietf-mipshop-fast-mipv6-03.
> >>>
> >>>
> >>>As you mentioned, currently there is no new use of HI/HACK
> >>
> >>other than
> >>
> >>>what is mentioned in FMIPv6 RFC.  That is, NAR can make use of the 
> >>>knowledge that its trusted peer (i.e., PAR) has a trust
> >>
> >>relationship
> >>
> >>>with the
> >>>MN.
> >>>
> >>>
> >>>
> >>>>Regards,
> >>>>Junghoon
> >>>>
> >>>
> > 
> 
_______________________________________________
Mipshop mailing list
Mipshop@ietf.org
https://www1.ietf.org/mailman/listinfo/mipshop