Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
Frank Xia <xiayangsong@huawei.com> Thu, 24 September 2009 16:00 UTC
Return-Path: <xiayangsong@huawei.com>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F3773A6A04 for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 09:00:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ezNSkfQ1ebTG for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 09:00:20 -0700 (PDT)
Received: from usaga04-in.huawei.com (usaga04-in.huawei.com [206.16.17.180]) by core3.amsl.com (Postfix) with ESMTP id 3006E3A6883 for <mipshop@ietf.org>; Thu, 24 Sep 2009 09:00:16 -0700 (PDT)
Received: from huawei.com (usaga04-in [172.18.4.101]) by usaga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQH00E5XGICKQ@usaga04-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 11:01:25 -0500 (CDT)
Received: from X24512z ([10.124.12.62]) by usaga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQH00IZ2GIAQY@usaga04-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 11:01:24 -0500 (CDT)
Date: Thu, 24 Sep 2009 11:01:22 -0500
From: Frank Xia <xiayangsong@huawei.com>
To: Ahmad Muhanna <amuhanna@nortel.com>, Hidetoshi Yokota <yokota@kddilabs.jp>
Message-id: <00b701ca3d30$442ced40$3e0c7c0a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Outlook Express 6.00.2900.3598
Content-type: text/plain; format="flowed"; charset="iso-8859-1"; reply-type="original"
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal
References: <4A93F739.5050006@piuha.net> <4A97EEAB.9070606@kddilabs.jp> <4A9F4222.8070107@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com> <4AAE38F6.2010600@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com> <4AB2AE87.6030801@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com> <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com> <4AB8CF19.70905@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E20597C0A@zrc2hxm0.corp.nortel.com> <4D35478224365146822AE9E3AD4A26660C18B2AC$0001@exchtewks3.starentnetworks.com> <4ABB2DC8.4050906@kddilabs.jp> <001f01ca3d21$da22f6a0$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8D28@zrc2hxm0.corp.nortel.com> <009001ca3d2e$d9d0a500$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8F4F@zrc2hxm0.corp.nortel.com>
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2009 16:00:24 -0000
Hi Ahmad Sorry not studying every words from you, even though I have followed the thread. If I can bother you give me some different brief information other than Hidetoshi's summary, you are appreciated. Let's try to be more constructive. BR Frank ----- Original Message ----- From: "Ahmad Muhanna" <amuhanna@nortel.com> To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota" <yokota@kddilabs.jp> Cc: "Mipshop" <mipshop@ietf.org>; <draft-ietf-mipshop-pfmipv6@tools.ietf.org> Sent: Thursday, September 24, 2009 10:53 AM Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 Hi Frank, It is confusing.. You just said in your earlier email that you have been following the discussion! :) Probably the best way for you is to go and look it over. Regards, Ahmad > -----Original Message----- > From: Frank Xia [mailto:xiayangsong@huawei.com] > Sent: Thursday, September 24, 2009 8:51 AM > To: Muhanna, Ahmad (RICH1:2H10); Hidetoshi Yokota > Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > > Hi Ahmad > > I thought Hidetoshi had a good summary of you comments. > Could you give me a brief information of your concerns? > because I have similar understanding as Hidetoshi. > > BR > Frank > > ----- Original Message ----- > From: "Ahmad Muhanna" <amuhanna@nortel.com> > To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota" > <yokota@kddilabs.jp> > Cc: "Mipshop" <mipshop@ietf.org>; > <draft-ietf-mipshop-pfmipv6@tools.ietf.org> > Sent: Thursday, September 24, 2009 9:31 AM > Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > > > Hi Frank, > Please see my latest response to Hidetoshi. > > Regards, > Ahmad > > > > -----Original Message----- > > From: Frank Xia [mailto:xiayangsong@huawei.com] > > Sent: Thursday, September 24, 2009 7:18 AM > > To: Hidetoshi Yokota; Koodli, Rajeev; Muhanna, Ahmad (RICH1:2H10) > > Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org > > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > > > > Hi Ahmad, Hidetoshi, and Rajeev > > > > I have followed the discussion, and agreed with Rajeev's proposal. > > > > BR > > Frank > > > > ----- Original Message ----- > > From: "Hidetoshi Yokota" <yokota@kddilabs.jp> > > To: "Koodli, Rajeev" <rkoodli@starentnetworks.com> > > Cc: "Mipshop" <mipshop@ietf.org>; > > <draft-ietf-mipshop-pfmipv6@tools.ietf.org> > > Sent: Thursday, September 24, 2009 3:28 AM > > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > > > > > > > Hi Rajeev and Ahmad, > > > > > > Thanks Rajeev for your input. It seems that all of the > > questions and > > > ambiguity pointed out by Ahmad lead to one issue: PMIPv6 defines > > > multiple encapsulation methods; therefore the inter-MAG > tunnel must > > > specify which method should be used. If Rajeev's input is > > acceptable. > > > I'll come up with some text along that line. > > > > > > Regards, > > > -- > > > Hidetoshi > > > > > > Koodli, Rajeev wrote: > > >> > > >> Hi Ahmad, > > >> > > >> Let me see if I could understand your concern. > > >> > > >> RFC 5568 assumes that tunneling is IPv6-in-IPv6 based on > RFC 3775. > > >> So, it does not need to specify how/which encapsulation > > mode is used. > > >> > > >> PFMIP6, on the other hand, is for PMIP6 which does support > > multiple > > >> encapsulation modes. Hence, PFMIP6 needs to specify how/which > > >> encapsulation mode is used. Is this right? > > >> > > >> If so, here is my input. PFMIP6 must state what > > encapsulation modes > > >> MUST be supported. The encapsulation modes should be > configurable. > > >> Which particular mode is used is dependent on the particular > > >> deployment. There must be text stating that deployments MUST > > >> configure the encapsulation modes on MAGs to be the same, > > and it is > > >> recommended to use the same encapsulation modes as in MAG-LMA > > >> communication whenever feasible for operational > uniformity. If the > > >> deployments fail to configure the encapsulation modes to > > be the same > > >> across all MAGs, then the protocol will not work correctly. > > >> > > >> How does this sound? > > >> > > >> Regards, > > >> > > >> -Rajeev > > >> > > >> > > >>> -----Original Message----- > > >>> From: Ahmad Muhanna [mailto:amuhanna@nortel.com] > > >>> Sent: Tuesday, September 22, 2009 10:58 PM > > >>> To: Hidetoshi Yokota > > >>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org > > >>> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > > >>> > > >>> Hi Hidetoshi, > > >>> > > >>> Thanks for your thoughts on this. > > >>> I expected a little more serious ones:), but please see > > some more of > > >>> the same thoughts inline! :) > > >>> > > >>> Regards, > > >>> Ahmad > > >>>> -----Original Message----- > > >>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp] > > >>>> Sent: Tuesday, September 22, 2009 6:20 AM > > >>>> To: Muhanna, Ahmad (RICH1:2H10) > > >>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org > > >>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 > > >>>> > > >>>> Hi Ahmad, > > >>>> > > >>>> Thanks for your detailed thoughts. Below, we try to > answer your > > >>>> questions as best we can. > > >>>> > > >>>> Ahmad Muhanna wrote: > > >>>>> Hi Hidetoshi, > > >>>>> > > >>>>> Looking one more time into the draft I found the > > following under > > >>>>> section > > >>>>> 4.1: > > >>>>> > > >>>>> " > > >>>>> The encapsulation type for these user packets SHOULD > > >>>> follow that used > > >>>>> in the tunnel between the LMA and MAG (IPv6-in-IPv6 as > > >>>> specified in > > >>>>> [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in > > >>>>> [IPv4PMIPv6], TLV-header UDP tunneling as specified in > > >>>> [GREKEY] or > > >>>>> any new method defined in the future). > > >>>>> " > > >>>> The intention here is that the inter-MAG tunnel should > > >>> support all the > > >>>> encapsulation types that are mentioned in RFC5213. > > >>> [Ahmad] > > >>> Well, whatever it is this document supports, it needs > to make it > > >>> clear and ensure that it works. My question is the > > >>> following: Does this document support ONLY IPv6-in-IPv6 > tunneling > > >>> between the MAG and the LMA? or it also supports the different > > >>> tunneling that the document claims to support as quoted above? > > >>> > > >>> If it only supports IPv6-in-IPv6, this document MUST > > document that > > >>> clearly. On the other hand, if it supports the above listed > > >>> tunneling protocols, it MUST document how forwarding > > these packets > > >>> over the inter-MAG tunnel works. > > >>> > > >>>>> IMO, this is a very broad statement that underestimates its > > >>>> content. > > >>>>> It is way underspecified how these tunneling protocols will > > >>>> be used to > > >>>>> successfully map the traffic from the MAG-LMA tunnel to > > >>> the MAG-MAG > > >>>>> tunnel. In this regard, I have the following questions: > > >>>>> > > >>>>> 1. Is it documented any where how this mapping would work > > >>>> for all of > > >>>>> these tunneling/encapsulation mechanisms? > > >>>> It seems that the mapping of these flows is rather > > implementation > > >>>> specific. Is there anything that should be considered in > > >>> addition to > > >>>> RFC5568? > > >>> [Ahmad] > > >>> Of course. I guess you need to get out of the mode that this > > >>> document is nothing but few tweaks to make FMIP6 works > > for PMIPv6. > > >>> In RFC5568, it clearly assumes that protocol is used for fast > > >>> handover when IP Mobility based on MIP6 as described in > > RFC3775. In > > >>> that sense, only IPv6-in-IPv6 is assumed. > > >>> > > >>> Again, the above claim of supporting all these tunneling > > mechanisms > > >>> should either be removed and clearly document that this > protocol > > >>> works ONLY when the tunneling between the MAG and LMA is > > >>> IPv6-in-IPv6 or explain how they will work..... > > >>> > > >>>>> 2. Is the tunneling mode (between the PMAG and the LMA) > > >>>>> negotiated/communicated between the PMAG-MAGs? > > >>>> If the tunneling mode is determined between the LMA and > > >>> PMAG, which is > > >>>> in the scope of RFC5213, that of the inter-MAG tunnel > > should follow > > >>>> it. > > >>>> It is also assumed that the same type of tunneling > will be used > > >>>> between the LMA and NMAG. > > >>> [Ahmad] > > >>> Sure, but your document claim that it supports all of these > > >>> tunneling mechanisms (as per the quoted text from section > > >>> 4.1) and at the same time documents nothing about how > > these should > > >>> work across the inter-MAG tunnel. > > >>> > > >>>>> 3. If the tunneling between the PMAG-LMA is > > >>>> IPv6-in-IPv4-UDP, Does it > > >>>>> mean the tunneling between the PMAG-NMAG is also going to > > >>>> use the same > > >>>>> encapsulation? > > >>>> Yes, that is the basic idea. > > >>> [Ahmad] > > >>> Good. Then How that should work? > > >>> Is there anything in your document which specify that? I am all > > >>> ears, just point me to the text. > > >>> > > >>>>> 4. If the UDP tunneling between the two MAGs is not needed, > > >>>> what kind > > >>>>> of tunneling will be used between the two MAGs to correctly > > >>>> map the MN > > >>>>> traffic and successfully deliver it to the MN? > > >>>> That mode has not been considered. It will be possible, but > > >>> is there > > >>>> any reason that a different type of tunneling should be used? > > >>> [Ahmad] > > >>> I am not suggesting to use a different tunneling > > mechanism between > > >>> the PMAG and the NMAG; However, You are saying that, e.g., > > >>> IPv6-in-IPv4-UDP is naturally extended over the > PMAG-NMAG tunnel > > >>> without saying how it should work. That what I was > > speculating that > > >>> you probably use a specific tunneling, of course, other than > > >>> IPv6-in-IPv6 to make it work. > > >>> > > >>> So, again, if PMAG-NMAG interface does support all these > > tunneling > > >>> mechanisms, then we need to know how it works? That is all. > > >>> > > >>>>> 5. Do these tunneling mechanisms include plain GRE > > >>>> Encapsulation with > > >>>>> GRE keys or only GRE with TLV-header UDP tunneling? > > >>>> <draft-ietf-netlmm-grekey-option> supports both modes, so > > >>>> PFMIPv6 should also support them. > > >>> [Ahmad] > > >>> That is a clear answer. Thanks. > > >>> Could you please make sure that your document clarify > and clearly > > >>> document it. > > >>> > > >>>>> 5.1. If plain GRE encapsulation with keys is used, then the > > >>>> document > > >>>>> needs to clearly specify if there are two sets of GRE > > >>> keys for the > > >>>>> same mobility session or only one set? i.e., GRE Keys > > between the > > >>>>> PMAG-LMA, GRE Keys for PMAG-NMAG or one set is used. It is > > >>>> not clear > > >>>>> in the current document. > > >>>> PFMIPv6 describes only GRE keys for the inter-MAG tunnel > > >>> (PMAG-NMAG), > > >>>> which I think is clarified in Section 4.2. As far as GRE > > >>> Key Option is > > >>>> used, it is difficult to transport multiple sets of keys at > > >>> one time. > > >>> [Ahmad] > > >>> Well, > > >>> 1. It is not clarified nor clear under section 4.2. but, > > could you > > >>> please point me to the text you are talking about? > > >>> 2. As far as of multiple GRE keys exchange, currently that is a > > >>> limitation of the PMIPv6 protocol. Right? Then, when you need > > >>> multiple GRE keys, how these GRE keys are communicated? > > >>> Is that explained in the document? > > >>> > > >>>>> 5.2. same question as in 4, if there is GRE with > TLV-header UDP > > >>>>> tunneling between the PMAG and the LMA, Is that needed > > >>> between the > > >>>>> PMAG-NMAG? If NOT, what encapsulation mechanism is being > > >>>> used and how > > >>>>> is the mapping works? > > >>>> The working assumption is "yes". > > >>> [Ahmad] > > >>> That is a huge CLAIM that is NOT backed by any technical > > data! How > > >>> that should work? Can you document that some where in the > > >>> specification? If it is already document, please point > me to the > > >>> text. > > >>> > > >>>>> 6. Is the assumption here that the NMAG and the PMAG have > > >>> the same > > >>>>> transport with the LMA? > > >>>> For the sake of simplicity, the answer should be "yes". > > >>>> If not, the network between MAGs should provide the > transparent > > >>>> environment (e.g., by another tunneling). > > >>>> > > >>>>> 7. with respect to "any new method defined in the future" > > >>>> what is the > > >>>>> constraints on this statement? It seems to me an > > >>>> overstatement of the > > >>>>> capabilities of this protocol and an underestimate of > > the future > > >>>>> tunneling mechanism. May be you need to make sure that the > > >>>> wording is > > >>>>> correct by having some conditional restrictions. > > >>>> The intention here is that if a new tunneling mechanism is > > >>> specified > > >>>> for PMIPv6, PFMIPv6 should also support it. If this is too > > >>> vague, it > > >>>> could be removed. > > >>> [Ahmad] > > >>> Sure, please remove it. Unless, you propose a dynamic tunneling > > >>> mechanism that is forward compatible and capable to > > address future > > >>> tunneling between the PMAG and LMA. > > >>> > > >>>>> In addition, > > >>>>> ============ > > >>>>> IMO and based on a quick review of this draft, I find it > > >>> very vague > > >>>>> and does not have the details for an Interoperable > > >>>> protocol. I believe > > >>>>> the draft SHOULD CLEARLY address the following points: > > >>>>> > > >>>>> Decide whether it needs to specify/support a single tunneling > > >>>>> encapsulation mechanism between the PMAG-NMAG or more > than one. > > >>>>> > > >>>>> > > >>>>> SINGLE tunneling and encapsulation mechanism between > PMAG-NMAG: > > >>>>> > =============================================================== > > >>>>> 1. This *protocol* needs to specify the exact details > > of how this > > >>>>> tunneling mechanism is dynamically established to address > > >>>> the nature > > >>>>> of the problem being address in this *handover optimization > > >>>> protocol*. > > >>>> > > >>>> The nature of the specification and its performance is > based on > > >>>> RFC5568. > > >>> [Ahmad] > > >>> That is part of the problem not to be sited here as a > supporting > > >>> argument! > > >>> As I said earlier, RFC5568 assumes that there is always > > >>> IPv6-in-IPv6 tunneling between the mobile node and the > > home agent. > > >>> In the case of > > >>> PMIPv6 that assumption is INVALID. > > >>> > > >>>> Whether the establishment of the tunneling mechanism is > > dynamic or > > >>>> static is operation-specific. > > >>> [Ahmad] > > >>> That is NOT true. This document is supposedly offering a fast > > >>> handover mechanism for PMIPv6 which dynamically does > > (implicitly or > > >>> explicitly) negotiates tunneling between the MAG and > the LMA. So, > > >>> how a statically configured tunnel between the PMAG and > the NMAG > > >>> tunnels a mobile node traffics when the mobile node > > traffic between > > >>> the PMAG and LMA for the same mobile node was dynamically > > >>> negotiated? > > >>> > > >>> > > >>>>> 1.1. for example, if GRE with Keys is being used, then > > it MUST be > > >>>>> clear how the GRE keys are exchanged between the PMAG-NMGA, > > >>>> similar to PMIPv6. > > >>>> > > >>>> The current text proposal for Section 4.2 tries to clarify it > > >>>> regarding who selects the key and how it is transferred. > > >>> [Ahmad] > > >>> Hmmm.. Tries to clarify ... I guess we need a clear > specification > > >>> that documents an Interoperable solution. We can not just > > propose a > > >>> standard track document that is some what clear in the > > mind of some. > > >>> Right? > > >>> > > >>>>> 2. How the chosen PMAG-NMAG tunneling protocol is able to > > >>> interwork > > >>>>> with all tunneling mechanisms that are currently supported > > >>>> by PMIPv6, > > >>>>> e.g., IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc. > > >>>> between the > > >>>>> PMAG-LMA as is being claimed under section 4.2 of this draft. > > >>>> Basically, it is supposed that the same tunneling > > protocol as that > > >>>> between the LMA and MAG is used. The tunneling type > > between the LMA > > >>>> and MAG should be determined in advance. > > >>> [Ahmad] > > >>> I guess this answer is more confusing .... One time you > said that > > >>> the tunnel can be static and can be dynamic. Now, you > > just said that > > >>> the tunnel should be STATIC? I mean what is it? It needs > > >>> clarification...... > > >>> > > >>> > > >>>>> 3. This *protocol* needs to clearly specify how the > > >>>> different mobility > > >>>>> sessions are being mapped between the PMAG-LMA > tunneling to the > > >>>>> PMAG-NMAG tunneling? Somewhat similar to 2 above. > > >>>> The basic mechanism is the same as in RFC5568. > > >>> [Ahmad] > > >>> Again, in the case of RFC5568 it is straight forward. Only > > >>> IPv6-in-IPv6 is supported as per RFC3775. Not the case > for PMIPv6. > > >>> > > >>>> If a GRE > > >>>> tunnel further differentiates the session, the GRE key > > will be used. > > >>> [Ahmad] > > >>> Good. Which GRE Key then? > > >>> 1. Is that a statically configured GRE key? > > >>> 2. Is it the same set of GRE keys between the PMAG and LMA? > > >>> 3. If none of the above, how these GRE keys are generated and > > >>> exchanged between the PMAG and the NMAG? > > >>> > > >>>>> Multiple Tunneling and encapsulation mechanisms between the > > >>>> PMAG-NMAG: > > >>> > > ==================================================================== > > >>> == > > >>>>> If the choice as being claimed under section 4.1, is to > > >>>> support all of > > >>>>> the current tunneling mechanisms between PMAG-LMA on the > > >>> PMAG-NMAG > > >>>>> interface, then the protocol needs to address the following: > > >>>>> > > >>>>> 1. Provide a good analysis why that option is the best > > >>> option? What > > >>>>> are the advantages and the disadvantages? > > >>>> I think that is the most workable solution. > > >>> {Ahmad] > > >>> What do you have to technically back up this statement. > > >>> Otherwise, it is just another statement. > > >>> > > >>>> Since the > > >>>> tunneling mechanism selected for the PMIPv6 tunnel is > > supported by > > >>>> both the PMAG and NMAG, no extra capability is > required for the > > >>>> inter-MAG tunnel. > > >>> [Ahmad] > > >>> OK. I am not disputing that the PMAG and the NMAG > > supports the same > > >>> sets of tunneling mechanisms or not. It is more of which > > tunnel to > > >>> use for which mobile node session and what parameter is > > needed for > > >>> this inter-MAG tunnel to correctly tunnel the mobile > node traffic > > >>> and deliver it to the end of the tunnel in a non ambiguous way. > > >>> > > >>> For example: > > >>> Tunneling Case 1: > > >>> ================= > > >>> 1. PMAG and the LMA negotiates the GRE encapsulation > and the GRE > > >>> keys using the PBU and PBA for each applicable mobility session. > > >>> 2. It is very well understood that both the PMAG and the NMAG > > >>> support GRE tunneling with GRE keys + GRE keys exchange using > > >>> PMIPv6 signaling with the LMA. > > >>> 3. Now: for the inter-MAG tunnel and for the same > > mobility session, > > >>> how GRE tunneling and GRE keys are negotiated between the > > PMAG and > > >>> NMAG? Of course, using HI and HAck, right? > > >>> 4. Okay, we need the exact details for this specific case. > > >>> > > >>> Tunneling Case 2: > > >>> ================= > > >>> 1. Let us assume IPv6-in-IPv4 UDP is used for MN1. Okay 2. > > >>> That tunneling is implicitly negotiated between the > PMAG and LMA > > >>> during the PBU/PBA exchange, right? > > >>> 3. How that is negotiated between the PMAG and the NMAG? > > We need the > > >>> details.. > > >>> > > >>> And so on.... > > >>> > > >>>> Also, I don't see any specific reason to use a special > tunneling > > >>>> mechanism for the inter-MAG tunnel. > > >>> [Ahmad] > > >>> Good. This means you would use the same tunneling between > > the PMAG > > >>> and LMA over inter-MAG tunneling. In this case, we need > > the details > > >>> for negotiating that tunneling mechanism between the > PMAG and the > > >>> NMAG. > > >>> > > >>>>> 2. How this *protocol* dynamically negotiates the tunneling > > >>>> mechanism > > >>>>> type? > > >>>> If the tunneling mechanism between the LMA and MAG is > > determined in > > >>>> advance, the same mechanism is used for the inter-MAG > > >>> tunnel. So, it > > >>>> is not on-demand and no negotiation is assumed. If the > tunneling > > >>>> mechanism between the LMA and MAG is determined on demand, > > >>> then that > > >>>> is a different story... > > >>> [Ahmad] > > >>> Well, what do you mean? The tunneling between the PMAG > > and the LMA > > >>> is NOT on demand? > > >>> I believe IPv4 support for PMIPv6 and GRE key for PMIPv6 > > drafts will > > >>> be helpful in answering this question. > > >>> > > >>>>> 3. How that should work, for example if the tunneling > mechanism > > >>>>> between the PMAG-LMA is IPv6 in IPv4 UDP, how that > > >>>> tunneling will be > > >>>>> extended to go over the PMAG-NMAG interface and how it is > > >>>> supposed to work. > > >>>> > > >>>> In this case, both the PMAG and NMAG should be dual-stack > > >>> and the IP > > >>>> addresses in the IPv4 outer header are those of the PMAG > > and NMAG. > > >>>> IPv6 inner header should be kept intact. > > >>>> > > >>> Okay..... Then if the NMAG sends the first packet over > > the NMAG-PMAG > > >>> tunnel! Which encapsulation mechanism is going to use to > > encapsulate > > >>> that packet? > > >>> > > >>> Also, Do you agree that there is a specific reason for > > the traffic > > >>> between the PMAG and the LMA to be IPv6-in-IPv4-UDP. > > >>> Right? That reason may NOT be VALID between the PMAG and > > the NMAG. > > >>> Right? > > >>> Then why to use the same tunneling here? Just out of curiosity! > > >>> > > >>>>> Finally, the draft could have some restrictions and > define the > > >>>>> PMAG-NMAG tunneling/encapsulation mechanism and could > > >>>> define a set of > > >>>>> PMAG-LMA tunneling mechanism that are being > > >>>> supported/interwork over > > >>>>> the PMAG-NMAG tunneling/encapsulation. > > >>>> What kind of restrictions do you foresee? Do you also have any > > >>>> specific mechanism for the inter-MAG tunnel in mind? > > >>> [Ahmad] > > >>> I guess, you need to answer many of the above comments > before we > > >>> talk about this. A clear understanding of this tunneling > > is needed > > >>> and I do not see it documented in this draft. > > >>> > > >>> BTW: Under section 4, this specification says: > > >>> > > >>> " > > >>> In order to further improve the performance during the > > handover, > > >>> the > > >>> PFMIPv6 protocol in this document specifies a > > bi-directional tunnel > > >>> between the Previous MAG (PMAG) and the New MAG (NMAG) > > to tunnel > > >>> packets meant for the mobile node. > > >>> " > > >>> > > >>> Which bi-directional tunnel? Where? What are the details? > > >>> > > >>>>> One more note: I found defining and describing a protocol > > >>>> based on a > > >>>>> call flow, is not the most easy to follow. But, that could > > >>>> just be me. > > >>>> > > >>>> What do you think could improve the readability of the > document? > > >>> [Ahmad] > > >>> Quite some of them... But I gave up after a while.... > > >>> > > >>>> Regards, > > >>>> -- > > >>>> Hidetoshi > > >>>> > > >>>>> Regards, > > >>>>> Ahmad > > >>>>> > > >>>>> > > >>>>>> -----Original Message----- > > >>>>>> From: mipshop-bounces@ietf.org > > >>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad > > >>>>>> (RICH1:2H10) > > >>>>>> Sent: Thursday, September 17, 2009 9:23 PM > > >>>>>> To: Hidetoshi Yokota > > >>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org > > >>>>>> Subject: Re: [Mipshop] AD review of > draft-ietf-mipshop-pfmipv6 > > >>>>>> > > >>>>>> Hi Hidetoshi, > > >>>>>> Please see inline. > > >>>>>> > > >>>>>> Regards, > > >>>>>> Ahmad > > >>>>>> > > >>>>>>> -----Original Message----- > > >>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp] > > >>>>>>> Sent: Thursday, September 17, 2009 4:48 PM > > >>>>>>> To: Muhanna, Ahmad (RICH1:2H10) > > >>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org; > > >>> Jari Arkko > > >>>>>>> Subject: Re: [Mipshop] AD review of > draft-ietf-mipshop-pfmipv6 > > >>>>>>> > > >>>>>>> Hi Ahmad, > > >>>>>>> > > >>>>>>> Here is the proposed revision: > > >>>>>>> > > >>>>>>> In Section 4.2: > > >>>>>>> [... message with the same sequence number.] > > The necessary > > >>>>>>> information MUST be transferred in the HI/HAck > messages to > > >>>>>>> distinguish MN's packets for forwarding in advance or at > > >>>>>> this time. > > >>>>>>> Such information includes the MN ID and/or GRE key(s). > > >>>>>> Typically, > > >>>>>>> the NMAG selects the GRE key for the downlink packets > > >>>>>> and the PMAG > > >>>>>>> selects that for the uplink packets. Each key is > > >>> conveyed in > > >>>>>>> either > > >>>>>>> the HI or HAck message separately when GRE Key Option > > >>>> [GREKEY] is > > >>>>>>> used. [For the downlink ...] > > >>>>>>> > > >>>>>> [Ahmad] > > >>>>>> In addition to what Vijay mentioned with respect to > > >>>> Typically (which > > >>>>>> should be removed), I believe the draft needs to be > > clear on the > > >>>>>> mechanism that is used for exchanging the GRE keys. > > When you say > > >>>>>> "...when the GRE Key Option [GREKEY] is used." What > > >>> happens if the > > >>>>>> GRE key option is NOT used. Is there another mechanism? > > >>>>>> > > >>>>>> Since the GRE keys are necessary to establish the lateral > > >>>> tunnel and > > >>>>>> identify the MN traffic, the draft must specify a default > > >>>> mechanism. > > >>>>>> Other mechanisms can be used or specified some where else > > >>>> if needed, > > >>>>>> but we need a default one here. Right? > > >>>>>> > > >>>>>> Also, you replaced the **HoA of the MN** with the **MN ID**. > > >>>>>> What is the reason for this change? > > >>>>>> And how this should work NOW while you have ".. and/or > > GRE Keys"? > > >>>>>> > > >>>>>>> If the above description is acceptable, I will submit > > >>> the revised > > >>>>>>> version by the end of the week. > > >>>>>>> > > >>>>>>> Regards, > > >>>>>>> -- > > >>>>>>> Hidetoshi > > >>>>>>> > > >>>>>>> Ahmad Muhanna wrote: > > >>>>>>>> Hi Hidetoshi, > > >>>>>>>> > > >>>>>>>>> -----Original Message----- > > >>>>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp] > > >>>>>>>>> Sent: Monday, September 14, 2009 7:37 AM > > >>>>>>>>> To: Muhanna, Ahmad (RICH1:2H10) > > >>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org; > > >>>>>> Jari Arkko > > >>>>>>>>> Subject: Re: [Mipshop] AD review of > > draft-ietf-mipshop-pfmipv6 > > >>>>>>>>> > > >>>>>>>>> Hi Ahmad, > > >>>>>>>>> > > >>>>>>>>> Thanks for your comment. I'm glad to hear an opinion from > > >>>>>>> a GRE key > > >>>>>>>>> expert. Please see inline: > > >>>>>>>>> > > >>>>>>>>> Ahmad Muhanna wrote: > > >>>>>>>>>> Hi Hidetoshi, > > >>>>>>>>>> > > >>>>>>>>>> I just have one quick comment and question. > > >>>>>>>>>> > > >>>>>>>>>> Reading the draft, it seems to me that the GRE keys are > > >>>>>>>>> somehow sent > > >>>>>>>>>> from the NAR to PAR in the HI (section 4.2). Is that the > > >>>>>>> case? This > > >>>>>>>>>> means both the DL and UP GRE keys for the bilateral > > >>>>>>> tunnels between > > >>>>>>>>>> the two AR(s). Is my understanding correct? It also > > >>>>>>>>> mentions that the > > >>>>>>>>>> format > > >>>>>>>>> In terms of the GRE keys for the bilateral tunnel, > > >>> the working > > >>>>>>>>> assumption is that the DL key is selected by the NAR and > > >>>>>>> the UL key > > >>>>>>>>> is selected by the PAR. Depending on the fast handover > > >>>>>> mode, those > > >>>>>>>>> keys are transferred to the other MAG via either the > > >>> HI or Hack. > > >>>>>>>>>> of these keys are based on the GRE keys for PMIPv6 > > >>>>>> draft (section > > >>>>>>>>>> 6.2.6). > > >>>>>>>>> Correct. > > >>>>>>>>> > > >>>>>>>>>> It seems to me that there should be more text to define > > >>>>>>> which keys > > >>>>>>>>>> exchange in the HI and which in the HaCK > > >>>>>>>>> If the above assumption works, I would like to add more > > >>>>>> text along > > >>>>>>>>> that line. > > >>>>>>>> [Ahmad] > > >>>>>>>> That is great. Please add some clarification text to > > >>>>>>> clearly indicate > > >>>>>>>> that only one key in the HI and the other in the HACK. > > >>>>>>>> Since some specification in 3GPP2 depends on this draft, I > > >>>>>>> appreciate > > >>>>>>>> if you can publish an updated version before the end of > > >>>> the week. > > >>>>>>>> Thanks in advance! > > >>>>>>>> > > >>>>>>>>>> If both keys are exchanged in the same HI, How these > > >>> keys are > > >>>>>>>>>> identified at the pAR? > > >>>>>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key > is included > > >>>>>>>>> in the PBU > > >>>>>>>>>> and the uplink GRE key in included in the PBA. They never > > >>>>>>>>> exist in the > > >>>>>>>>>> same message and that way there is no confusing. > > >>>>>>>>> So far, each key is conveyed by either the HI or HAck. > > >>>>>>>>> However, I haven't explored all of the possibilities. > > >>>> If you can > > >>>>>>>>> think of any case that two keys must be conveyed in one > > >>>> message, > > >>>>>>>>> please let me know. > > >>>>>>>> [Ahmad] > > >>>>>>>> I do not see any reason for this case (one key per > > >>>>>> message) not to > > >>>>>>>> work for all implementation. > > >>>>>>>> > > >>>>>>>>>> In addition, DL and UP GRE keys are generated by NAR and > > >>>>>>>>> sent inside > > >>>>>>>>>> the HI, my question: Is there any specific reason for > > >>>>>> the NAR to > > >>>>>>>>>> specify both GRE keys for the bilateral tunnels? > > >>>>>>>>> It would be more problematic that the NAR determines the > > >>>>>> both keys > > >>>>>>>>> and I would rather like to avoid it. > > >>>>>>>>> > > >>>>>>>>>> Sorry for this comment to be so late but hope > that you have > > >>>>>>>>> the chance > > >>>>>>>>>> to take a look at it. > > >>>>>>>>> That's ok. The draft is under the review process. Your > > >>>>>> comment is > > >>>>>>>>> highly appreciated. > > >>>>>>>>> > > >>>>>>>>> Regards, > > >>>>>>>>> -- > > >>>>>>>>> Hidetoshi > > >>>>>>>>> > > >>>>>>>>> > > >>>>>>>>>> Thanks! > > >>>>>>>>>> > > >>>>>>>>>> Regards, > > >>>>>>>>>> Ahmad > > >>>>>>>>>> > > >>>>>>>>>> > > >>>>>>>>>>> -----Original Message----- > > >>>>>>>>>>> From: mipshop-bounces@ietf.org > > >>>>>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of > > >>>> Hidetoshi Yokota > > >>>>>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM > > >>>>>>>>>>> To: Jari Arkko > > >>>>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org > > >>>>>>>>>>> Subject: Re: [Mipshop] AD review of > > >>> draft-ietf-mipshop-pfmipv6 > > >>>>>>>>>>> Hi Jari, > > >>>>>>>>>>> > > >>>>>>>>>>> Thanks for your patience. The attached revised > document is > > >>>>>>>>> supposed to > > >>>>>>>>>>> reflect the rest of your comments. Please also > see inline, > > >>>>>>>>> where the > > >>>>>>>>>>> revised part is explained item by item. If there is no > > >>>>>>> outstanding > > >>>>>>>>>>> issue there, we will upload it shortly. > > >>>>>>>>>>> > > >>>>>>>>>>> [Apologize if you received it twice. Since the size just > > >>>>>>>>> exceeded the > > >>>>>>>>>>> limit of this ML, this mail is reposted without the > > >>>>>> attachment.] > > >>>>>>>>>>> Hidetoshi Yokota wrote: > > >>>>>>>>>>>> Hi Jari, > > >>>>>>>>>>>> > > >>>>>>>>>>>> Appreciate your detailed review. The editorial > > corrections > > >>>>>>>>>>> are mostly > > >>>>>>>>>>>> done and the revised version is attached to this mail. > > >>>>>>>>> Regarding the > > >>>>>>>>>>>> technical comments, only the policies for the > correction > > >>>>>>>>>>> are listed for > > >>>>>>>>>>>> now. The complete correction will be posted as soon as > > >>>>>>>>>>> possible. Please > > >>>>>>>>>>>> see inline for the responses to your questions and > > >>> comments: > > >>>>>>>>>>>> Jari Arkko wrote: > > >>>>>>>>>>>>> I have reviewed this document. It was > generally in good > > >>>>>>>>>>> shape and easy > > >>>>>>>>>>>>> to read. I did find a number of issues though. Please > > >>>>>>>>>>> discuss them with > > >>>>>>>>>>>>> me on this thread and/or revise the draft accordingly. > > >>>>>>>>>>>>> > > >>>>>>>>>>>>> Technical: > > >>>>>>>>>>>>> > > >>>>>>>>>>>>> I do not understand the IP host aspects of the > > >>>>>>> handover. For an > > >>>>>>>>>>>>> unmodified host, what kind of interfaces exist on the > > >>>>>>> host, what > > >>>>>>>>>>>>> addresses they have, and at what time are interfaces > > >>>>>>>>>>> removed or added? > > >>>>>>>>>>>>> Is this exactly the same as in RFC 5213, or > does PFMIPv6 > > >>>>>>>>>>> introduce some > > >>>>>>>>>>>>> change here? > > >>>>>>>>>>>> The basic principle would be that this > specification does > > >>>>>>>>>>> not require > > >>>>>>>>>>>> any additional IP-level function to the MN > running in the > > >>>>>>>>>>> PMIPv6 domain. > > >>>>>>>>>>>> This MN should therefore be the same as defined > > in RFC5213. > > >>>>>>>>>>>> > > >>>>>>>>>>>> A typical network interface would be one with the > > >>>>>>>>> cellular network, > > >>>>>>>>>>>> where the network basically controls the > movement of the > > >>>>>>>>>>> MN. Different > > >>>>>>>>>>>> types of interfaces could be involved such as different > > >>>>>>>>>>> generations (3G > > >>>>>>>>>>>> and 3.9G) or different radio access systems. > Any type of > > >>>>>>>>> IP address > > >>>>>>>>>>>> could be assigned (IPv4/v6 or global/private), but the > > >>>>>>>>>>> assigned address > > >>>>>>>>>>>> must be preserved before and after the > handover. PFMIPv6 > > >>>>>>>>>>> should be able > > >>>>>>>>>>>> to handle the single radio situation, where only one > > >>>>>>>>>>> interface is active > > >>>>>>>>>>>> at any given time. This is a tougher situation > > in terms of > > >>>>>>>>>>> packet loss > > >>>>>>>>>>>> and delay. > > >>>>>>>>>>>> > > >>>>>>>>>>>>> I would like to see a new section on manageability > > >>>>>>>>>>> considerations. For > > >>>>>>>>>>>>> instance, Section 5 talks about some > > >>> configuration issues. > > >>>>>>>>>>> These should > > >>>>>>>>>>>>> be mentioned, and there should be a > description of what > > >>>>>>>>>>> the operator > > >>>>>>>>>>>>> needs to configure in order to set up a > PFMIPv6 network. > > >>>>>>>>>>>> We will add a new section for manageability > > considerations > > >>>>>>>>>>> to clarify > > >>>>>>>>>>>> the above and to reflect your suggestion. > > >>>>>>>>>>> A new subsection is added in Section 5 describing the > > >>>>>>>>> above aspects: > > >>>>>>>>>>> ------------------- > > >>>>>>>>>>> 5. PMIPv6-related Fast Handover Issues > > >>>>>>>>>>> > > >>>>>>>>>>> 5.1. Manageability Considerations > > >>>>>>>>>>> > > >>>>>>>>>>> This specification does not require any > > >>> additional IP-level > > >>>>>>>>>>> functionality on the LMA and the MN running in > > >>> the PMIPv6 > > >>>>>>>>>>> domain. A > > >>>>>>>>>>> typical network interface that the MN could be > > >>>>>>> assumed to have > > >>>>>>>>>>> is one > > >>>>>>>>>>> with the cellular network, where the network > > >>> controls the > > >>>>>>>>>>> movement of > > >>>>>>>>>>> the MN. Different types of interfaces could be > > >>>>>>> involved such as > > >>>>>>>>>>> different generations (3G and 3.9G) or different > > >>>>>> radio access > > >>>>>>>>>>> systems. This specification supports a MN with the > > >>>>>>> single radio > > >>>>>>>>>>> mode, where only one interface is active at any given > > >>>>>>> time. The > > >>>>>>>>>>> assigned IP address is preserved whether the physical > > >>>>>>> interface > > >>>>>>>>>>> changes or not and the MN can identify which > > >>>>>>> interface should be > > >>>>>>>>>>> used > > >>>>>>>>>>> if there are multiple ones. > > >>>>>>>>>>> -------------------- > > >>>>>>>>>>> > > >>>>>>>>>>> > > >>>>>>>>>>>>>> If the new router's interface is configured to > > >>> respond to > > >>>>>>>>>>>>>> queries sent to link-layer addresses than its > > >>>>>>>>>>> own (e.g., > > >>>>>>>>>>>>>> set to promiscuous mode), then it can respond to the > > >>>>>>> NUD probe, > > >>>>>>>>>>>>>> providing its link-layer address in the > > >>> solicited Neighbor > > >>>>>>>>>>>>>> Advertisement. > > >>>>>>>>>>>>> Is this according to RFC 5213? I seem to > recall that RFC > > >>>>>>>>>>> 5213 operated > > >>>>>>>>>>>>> on the same link layer addresses. > > >>>>>>>>>>>> I think your observation is correct... I'll > > check with the > > >>>>>>>>>>> other authors > > >>>>>>>>>>>> to see if it is ok to rewrite it. > > >>>>>>>>>>> The new text doesn't mention the promiscuous mode and > > >>>>>>>>> emphasizes the > > >>>>>>>>>>> common link-layer address among all MAGs in the > > >>> PMIPv6 domain: > > >>>>>>>>>>> --------------- > > >>>>>>>>>>> 5.2. Expedited Packet Transmission > > >>>>>>>>>>> > > >>>>>>>>>>> [...] > > >>>>>>>>>>> > > >>>>>>>>>>> The protocol specified in this document is applicable > > >>>>>>>>> regardless of > > >>>>>>>>>>> whether link-layer addresses are used > between a MN and > > >>>>>>>>> its access > > >>>>>>>>>>> router. A MN should be able to continue sending > > >>>>>>> packets on the > > >>>>>>>>>>> uplink even when it changes link. When link-layer > > >>>>>>> addresses are > > >>>>>>>>>>> used, the MN performs Neighbor Unreachability > > >>>>>> Detection (NUD) > > >>>>>>>>>>> [RFC4861], after attaching to a new link, > probing the > > >>>>>>>>>>> reachability of > > >>>>>>>>>>> its default router. The new router should respond > > >>>>>> to the NUD > > >>>>>>>>>>> probe, > > >>>>>>>>>>> providing its link-layer address in the > > >>> solicited Neighbor > > >>>>>>>>>>> Advertisement, which is common in the PMIPv6 domain. > > >>>>>>>>>>> Implementations > > >>>>>>>>>>> should allow the MN to continue to send > uplink packets > > >>>>>>>>> while it is > > >>>>>>>>>>> performing NUD. > > >>>>>>>>>>> ---------------- > > >>>>>>>>>>> > > >>>>>>>>>>>>>> At least one mobility option MUST uniquely identify > > >>>>>>> the target > > >>>>>>>>>>>>>> MN (e.g., the Mobile Node > > >>>>>>>>> Identifier > > >>>>>>>>>>>>>> Option defined in RFC4283 > > >>>>>>>>>>> <http://tools.ietf.org/html/rfc4283>) and > > >>>>>>>>>>>>>> the transferred context MUST be for one MN > per message. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>> I would like the required options to be > > specified in more > > >>>>>>>>>>> detail. Which > > >>>>>>>>>>>>> identity options are sufficient to satisfy the MUST? > > >>>>>>>>>>>> The required option should be the MN Identifier in the > > >>>>>>> Mobile Node > > >>>>>>>>>>>> Identifier Option. > > >>>>>>>>>>> The above description is added in Section 6.1.1: > > >>>>>>>>>>> > > >>>>>>>>>>> --------- > > >>>>>>>>>>> Requested option > > >>>>>>>>>>> In order to uniquely identify the target > > >>>>>> MN, the MN > > >>>>>>>>>>> Identifier MUST be contained in the > > >>> Mobile Node > > >>>>>>>>>>> Identifier > > >>>>>>>>>>> Option. > > >>>>>>>>>>> --------- > > >>>>>>>>>>> > > >>>>>>>>>>>>>> If a default set of context information is defined > > >>>>>> and always > > >>>>>>>>>>>>>> sufficient, this option is not mandatory. This > > >>>>>>>>>>> option is more > > >>>>>>>>>>>>>> useful to retrieve additional or dynamically > > >>>>>> selected context > > >>>>>>>>>>>>>> information. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> Context Request Option is typically used for the > > >>>>>>> reactive (NAR- > > >>>>>>>>>>>>>> initiated) fast handover mode to retrieve the context > > >>>>>>>>> information > > >>>>>>>>>>>>>> from the PAR. When this option is included in the HI > > >>>>>>>>> message, all > > >>>>>>>>>>>>>> the requested context information SHOULD be included > > >>>>>>> in the HAck > > >>>>>>>>>>>>>> message in the corresponding mobility > option(s) (e.g., > > >>>>>>>>>>> HNP, LMAA or > > >>>>>>>>>>>>>> MN-IID mobility options). > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>> Please specify what the default set of context > > >>>>>>>>> information is, by > > >>>>>>>>>>>>> listing the required options when the CRO is > > not present. > > >>>>>>>>>>>> The default context information to request is the Home > > >>>>>>>>>>> Network Prefix > > >>>>>>>>>>>> Option. If the Mobile Node link-layer is available and > > >>>>>>>>>>> used, the Mobile > > >>>>>>>>>>>> Node Link-layer Identifier Option MUST also be > requested. > > >>>>>>>>>>> With these two > > >>>>>>>>>>>> options and the MN identifier, the NMAG can > > >>>> construct the PBU. > > >>>>>>>>>>> The above description is added in Section 6.2.1: > > >>>>>>>>>>> > > >>>>>>>>>>> ---------- > > >>>>>>>>>>> The default context information to request is the > > >>>>>>> Home Network > > >>>>>>>>>>> Prefix > > >>>>>>>>>>> Option. If the Mobile Node link-layer is > available and > > >>>>>>>>> used, the > > >>>>>>>>>>> Mobile Node Link-layer Identifier Option MUST also be > > >>>>>>> requested. > > >>>>>>>>>>> ---------- > > >>>>>>>>>>> > > >>>>>>>>>>>>> Editorial: > > >>>>>>>>>>>>> > > >>>>>>>>>>>>>> HO-Initiate: > > >>>>>>>>>>>>>> A generic signaling message, sent > from the P-AN > > >>>>>>>>>>> to the PMAG that > > >>>>>>>>>>>>>> indicates a MN handover. While this > > signaling is > > >>>>>>>>>>> dependent on > > >>>>>>>>>>>>>> the access technology, it is assumed that > > >>>>>>>>>>> HO-Initiate can carry > > >>>>>>>>>>>>>> the information to identify the MN and to > > >>>>>>>>> assist the PMAG > > >>>>>>>>>>>>>> resolve the NMAG and the new access > > point or the > > >>>>>>>>>>> base station to > > >>>>>>>>>>>>>> which the MN is moving to. The > details of this > > >>>>>>>>>>> message are > > >>>>>>>>>>>>>> outside the scope of this document. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview > > >>>>>>>>>>>>> Section 4 would probably benefit from an additional > > >>>>>>>>>>> paragraph at the > > >>>>>>>>>>>>> beginning to explain what assumptions there > exist about > > >>>>>>>>>>> lower layer > > >>>>>>>>>>>>> functionality. > > >>>>>>>>>>>> Yes, the predictive fast handover relies on the > > >>> lower layer > > >>>>>>>>>>>> functionality to trigger to send the HI. A new > paragraph > > >>>>>>>>>>> will be added > > >>>>>>>>>>>> to clarify it. > > >>>>>>>>>>> ------------- > > >>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview > > >>>>>>>>>>> > > >>>>>>>>>>> If the MAGs can be informed of the detachment and/or > > >>>>>>>>> attachment of > > >>>>>>>>>>> the MN in a timely manner via e.g. the lower layer > > >>>>>>> signaling, it > > >>>>>>>>>>> will > > >>>>>>>>>>> become possible to optimize the handover procedure, > > >>>>>>>>> which involves > > >>>>>>>>>>> establishing a connection on the new link and > > >>>>>>> signaling between > > >>>>>>>>>>> mobility agents, compared to the baseline > specification > > >>>>>>>>> of PMIPv6. > > >>>>>>>>>>> [...] > > >>>>>>>>>>> ------------- > > >>>>>>>>>>> > > >>>>>>>>>>> All the other corrections pointed out below have > > also been > > >>>>>>>>>>> reflected in the revised document. > > >>>>>>>>>>> > > >>>>>>>>>>> Regards, > > >>>>>>>>>>> -- > > >>>>>>>>>>> Hidetoshi > > >>>>>>>>>>> > > >>>>>>>>>>>>>> A new flag 'P' is defined for the HI and HAck > > >>> messages to > > >>>>>>>>>>>>>> distinguish from those in [RFC5268bis > > >>>>>>>>>>>>>> > > >>> <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref- > > >>>>>>>>>>> RFC5268bis>] > > >>>>>>>>>>>>>> and thus MUST > > >>>>>>>>>>>>>> be set in the entire document. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>> This would be more readable as " ... those in > > >>>>>>>>>>> [RFC5268bis]. This flag > > >>>>>>>>>>>>> MUST be ..." > > >>>>>>>>>>>> Revised. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> and the NAR creates a proxy NCE to receive those > > >>>>>>>>>>> packets for the NCoA > > >>>>>>>>>>>>> The term NCE has not been introduced at this > stage yet. > > >>>>>>>>>>>> Spelled out as "Neighbor Cache Entry". > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> address that is used by the MN is MN-HoA. > Hence the > > >>>>>>>>>>> PAR forwards > > >>>>>>>>>>>>> The term MN-HOA has not been introduced before. > > >>>>>>>>>>>> Added the unabbreviated form "Mobile Node's > Home Address" > > >>>>>>>>> before it. > > >>>>>>>>>>>>>> The access network to which the MN > is attached > > >>>>>>>>>>> after handover. > > >>>>>>>>>>>>> New term MN, not introduced before. > > >>>>>>>>>>>>> > > >>>>>>>>>>>> Added "Mobile Node" before it. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> specifies forwarding when the MN uses HoA as its > > >>>>>>> on-link address > > >>>>>>>>>>>>> New term HoA... > > >>>>>>>>>>>> Changed to "Home Address". > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> as MN's NAI, Home Network Prefix (HNP), IPv4 Home > > >>>>>>>>> Address, are > > >>>>>>>>>>>>> New term NAI... > > >>>>>>>>>>>> Added "Network Access Identifier" before it. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> flag set and include the MN ID, the > MN-HNP, the > > >>>>>>>>>>> MN-IID and the > > >>>>>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not > > >>>>>>>>>>> appear in their > > >>>>>>>>>>>>> MN-XXX form before this point). > > >>>>>>>>>>>> Modified "MN-HNP" to "HNP" for consistency. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> Inner destination address: HNP or IPv4-MN-HoA > > >>>>>>>>>>>>> IPv4-MN-HoA not defined earlier... > > >>>>>>>>>>>> Added "Mobile Node's IPv4 Home" before it. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> between the PCoA and NCoA to forward > packets for the > > >>>>>>>>>>> MN to the NAR, > > >>>>>>>>>>>>> New terms PCoA and NCoA... there's probably > > more undefined > > >>>>>>>>>>> terms in the > > >>>>>>>>>>>>> document, please check! > > >>>>>>>>>>>> Added "Previous Care-of Address" and "New Care-of > > >>> Address". > > >>>>>>>>>>> Will read > > >>>>>>>>>>>> through it to see if there is any other > > undefined acronym. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> In (i), > > >>>>>>>>>>>>> In Step (i), > > >>>>>>>>>>>> Revised including other parts. > > >>>>>>>>>>>> > > >>>>>>>>>>>>>> |(MN ID, Old AP ID) | (MN ID, Old > > >>> AP ID) > > >>>>>>>>>>> | | > > >>>>>>>>>>>>> Old AP ID? AN ID? AR ID? > > >>>>>>>>>>>> AP ID stands for "Access Point Identifier", which is > > >>>>>>>>>>> defined in RFC5568. > > >>>>>>>>>>>> Added the unabbreviated form and citation. > > >>>>>>>>>>>> > > >>>>>>>>>>>> The rest of the part will be revised soon. > > >>>>>>>>>>>> > > >>>>>>>>>>>> Regards, > > >>>>>>>>>>>> > > >>>>>>>>>>>> > > >>>>>>>>>>>> > > >>> -------------------------------------------------------------- > > >>>>>>>>>>> ---------- > > >>>>>>>>>>>> _______________________________________________ > > >>>>>>>>>>>> Mipshop mailing list > > >>>>>>>>>>>> Mipshop@ietf.org > > >>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop > > >>>>>>>>>>> _______________________________________________ > > >>>>>>>>>>> Mipshop mailing list > > >>>>>>>>>>> Mipshop@ietf.org > > >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop > > >>>>>>>>>>> > > >>>>>>>> > > >>>>>>> -- > > >>>>>>> Hidetoshi Yokota > > >>>>>>> > > >>>>>>> Mobile Network Lab > > >>>>>>> KDDI R&D Laboratories, Inc. > > >>>>>>> e-mail:yokota@kddilabs.jp > > >>>>>>> > > >>>>>>> > > >>>>>> _______________________________________________ > > >>>>>> Mipshop mailing list > > >>>>>> Mipshop@ietf.org > > >>>>>> https://www.ietf.org/mailman/listinfo/mipshop > > >>>>>> > > >>>>> > > >>>>> > > >>>> > > >> > > >> > > >> This email and any attachments may contain legally > > privileged and/or > > >> confidential information of Starent Networks, Corp. and is > > intended > > >> only for the individual or entity named in the message. The > > >> information transmitted may not be used to create or change any > > >> contractual obligations of Starent Networks, Corp. Any review, > > >> retransmission, dissemination or other use of, or taking of any > > >> action in reliance upon this e-mail and its attachments by > > persons or > > >> entities other than the intended recipient is prohibited. > > If you are > > >> not the intended recipient, please notify the sender > > immediately -- > > >> by replying to this message or by sending an email to > > >> postmaster@starentnetworks.com -- and destroy all copies of this > > >> message and any attachments without reading or disclosing > > their contents. Thank you. > > >> > > >> > > >> > > > > > > > > >
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- [Mipshop] AD review of draft-ietf-mipshop-pfmipv6 Jari Arkko
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Jari Arkko
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Vijay Devarapalli
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Koodli, Rajeev
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Frank Xia
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Frank Xia
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Frank Xia
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Hidetoshi Yokota
- Re: [Mipshop] AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- [Mipshop] FW: AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna
- [Mipshop] FW: AD review of draft-ietf-mipshop-pfm… Ahmad Muhanna