Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6

Frank Xia <xiayangsong@huawei.com> Thu, 24 September 2009 16:00 UTC

Return-Path: <xiayangsong@huawei.com>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F3773A6A04 for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 09:00:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ezNSkfQ1ebTG for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 09:00:20 -0700 (PDT)
Received: from usaga04-in.huawei.com (usaga04-in.huawei.com [206.16.17.180]) by core3.amsl.com (Postfix) with ESMTP id 3006E3A6883 for <mipshop@ietf.org>; Thu, 24 Sep 2009 09:00:16 -0700 (PDT)
Received: from huawei.com (usaga04-in [172.18.4.101]) by usaga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQH00E5XGICKQ@usaga04-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 11:01:25 -0500 (CDT)
Received: from X24512z ([10.124.12.62]) by usaga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQH00IZ2GIAQY@usaga04-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 11:01:24 -0500 (CDT)
Date: Thu, 24 Sep 2009 11:01:22 -0500
From: Frank Xia <xiayangsong@huawei.com>
To: Ahmad Muhanna <amuhanna@nortel.com>, Hidetoshi Yokota <yokota@kddilabs.jp>
Message-id: <00b701ca3d30$442ced40$3e0c7c0a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Outlook Express 6.00.2900.3598
Content-type: text/plain; format="flowed"; charset="iso-8859-1"; reply-type="original"
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal
References: <4A93F739.5050006@piuha.net> <4A97EEAB.9070606@kddilabs.jp> <4A9F4222.8070107@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com> <4AAE38F6.2010600@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com> <4AB2AE87.6030801@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com> <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com> <4AB8CF19.70905@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E20597C0A@zrc2hxm0.corp.nortel.com> <4D35478224365146822AE9E3AD4A26660C18B2AC$0001@exchtewks3.starentnetworks.com> <4ABB2DC8.4050906@kddilabs.jp> <001f01ca3d21$da22f6a0$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8D28@zrc2hxm0.corp.nortel.com> <009001ca3d2e$d9d0a500$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8F4F@zrc2hxm0.corp.nortel.com>
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2009 16:00:24 -0000

Hi Ahmad

Sorry not studying every words from you,
even though I have followed the thread.

If  I can bother you give me some different brief
information other than Hidetoshi's summary,
you are appreciated.

Let's try to be more constructive.

BR
Frank

----- Original Message ----- 
From: "Ahmad Muhanna" <amuhanna@nortel.com>
To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota" 
<yokota@kddilabs.jp>
Cc: "Mipshop" <mipshop@ietf.org>; 
<draft-ietf-mipshop-pfmipv6@tools.ietf.org>
Sent: Thursday, September 24, 2009 10:53 AM
Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6


Hi Frank,
It is confusing..
You just said in your earlier email that you have been following the
discussion! :)
Probably the best way for you is to go and look it over.

Regards,
Ahmad


> -----Original Message-----
> From: Frank Xia [mailto:xiayangsong@huawei.com]
> Sent: Thursday, September 24, 2009 8:51 AM
> To: Muhanna, Ahmad (RICH1:2H10); Hidetoshi Yokota
> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>
> Hi Ahmad
>
> I thought Hidetoshi had a good summary of you comments.
> Could you give me a brief information of your concerns?
> because I have similar understanding as Hidetoshi.
>
> BR
> Frank
>
> ----- Original Message -----
> From: "Ahmad Muhanna" <amuhanna@nortel.com>
> To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota"
> <yokota@kddilabs.jp>
> Cc: "Mipshop" <mipshop@ietf.org>;
> <draft-ietf-mipshop-pfmipv6@tools.ietf.org>
> Sent: Thursday, September 24, 2009 9:31 AM
> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>
>
> Hi Frank,
> Please see my latest response to Hidetoshi.
>
> Regards,
> Ahmad
>
>
> > -----Original Message-----
> > From: Frank Xia [mailto:xiayangsong@huawei.com]
> > Sent: Thursday, September 24, 2009 7:18 AM
> > To: Hidetoshi Yokota; Koodli, Rajeev; Muhanna, Ahmad (RICH1:2H10)
> > Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >
> > Hi  Ahmad, Hidetoshi, and Rajeev
> >
> > I have followed the discussion, and agreed with Rajeev's proposal.
> >
> > BR
> > Frank
> >
> > ----- Original Message -----
> > From: "Hidetoshi Yokota" <yokota@kddilabs.jp>
> > To: "Koodli, Rajeev" <rkoodli@starentnetworks.com>
> > Cc: "Mipshop" <mipshop@ietf.org>;
> > <draft-ietf-mipshop-pfmipv6@tools.ietf.org>
> > Sent: Thursday, September 24, 2009 3:28 AM
> > Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >
> >
> > > Hi Rajeev and Ahmad,
> > >
> > > Thanks Rajeev for your input. It seems that all of the
> > questions and
> > > ambiguity pointed out by Ahmad lead to one issue: PMIPv6 defines
> > > multiple encapsulation methods; therefore the inter-MAG
> tunnel must
> > > specify which method should be used. If Rajeev's input is
> > acceptable.
> > > I'll come up with some text along that line.
> > >
> > > Regards,
> > > --
> > > Hidetoshi
> > >
> > > Koodli, Rajeev wrote:
> > >>
> > >> Hi Ahmad,
> > >>
> > >> Let me see if I could understand your concern.
> > >>
> > >> RFC 5568 assumes that tunneling is IPv6-in-IPv6 based on
> RFC 3775.
> > >> So, it does not need to specify how/which encapsulation
> > mode is used.
> > >>
> > >> PFMIP6, on the other hand, is for PMIP6 which does support
> > multiple
> > >> encapsulation modes. Hence, PFMIP6 needs to specify how/which
> > >> encapsulation mode is used. Is this right?
> > >>
> > >> If so, here is my input. PFMIP6 must state what
> > encapsulation modes
> > >> MUST be supported. The encapsulation modes should be
> configurable.
> > >> Which particular mode is used is dependent on the particular
> > >> deployment. There must be text stating that deployments MUST
> > >> configure the encapsulation modes on MAGs to be the same,
> > and it is
> > >> recommended to use the same encapsulation modes as in MAG-LMA
> > >> communication whenever feasible for operational
> uniformity. If the
> > >> deployments fail to configure the encapsulation modes to
> > be the same
> > >> across all MAGs, then the protocol will not work correctly.
> > >>
> > >> How does this sound?
> > >>
> > >> Regards,
> > >>
> > >> -Rajeev
> > >>
> > >>
> > >>> -----Original Message-----
> > >>> From: Ahmad Muhanna [mailto:amuhanna@nortel.com]
> > >>> Sent: Tuesday, September 22, 2009 10:58 PM
> > >>> To: Hidetoshi Yokota
> > >>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >>> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >>>
> > >>> Hi Hidetoshi,
> > >>>
> > >>> Thanks for your thoughts on this.
> > >>> I expected a little more serious ones:), but please see
> > some more of
> > >>> the same thoughts inline! :)
> > >>>
> > >>> Regards,
> > >>> Ahmad
> > >>>> -----Original Message-----
> > >>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > >>>> Sent: Tuesday, September 22, 2009 6:20 AM
> > >>>> To: Muhanna, Ahmad (RICH1:2H10)
> > >>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> > >>>>
> > >>>> Hi Ahmad,
> > >>>>
> > >>>> Thanks for your detailed thoughts. Below, we try to
> answer your
> > >>>> questions as best we can.
> > >>>>
> > >>>> Ahmad Muhanna wrote:
> > >>>>> Hi Hidetoshi,
> > >>>>>
> > >>>>> Looking one more time into the draft I found the
> > following under
> > >>>>> section
> > >>>>> 4.1:
> > >>>>>
> > >>>>> "
> > >>>>>    The encapsulation type for these user packets SHOULD
> > >>>> follow that used
> > >>>>>    in the tunnel between the LMA and MAG (IPv6-in-IPv6 as
> > >>>> specified in
> > >>>>>    [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in
> > >>>>>    [IPv4PMIPv6], TLV-header UDP tunneling as specified in
> > >>>> [GREKEY] or
> > >>>>>    any new method defined in the future).
> > >>>>> "
> > >>>> The intention here is that the inter-MAG tunnel should
> > >>> support all the
> > >>>> encapsulation types that are mentioned in RFC5213.
> > >>> [Ahmad]
> > >>> Well, whatever it is this document supports, it needs
> to make it
> > >>> clear and ensure that it works. My question is the
> > >>> following: Does this document support ONLY IPv6-in-IPv6
> tunneling
> > >>> between the MAG and the LMA? or it also supports the different
> > >>> tunneling that the document claims to support as quoted above?
> > >>>
> > >>> If it only supports IPv6-in-IPv6, this document MUST
> > document that
> > >>> clearly. On the other hand, if it supports the above listed
> > >>> tunneling protocols, it MUST document how forwarding
> > these packets
> > >>> over the inter-MAG tunnel works.
> > >>>
> > >>>>> IMO, this is a very broad statement that underestimates its
> > >>>> content.
> > >>>>> It is way underspecified how these tunneling protocols will
> > >>>> be used to
> > >>>>> successfully map the traffic from the MAG-LMA tunnel to
> > >>> the MAG-MAG
> > >>>>> tunnel. In this regard, I have the following questions:
> > >>>>>
> > >>>>> 1. Is it documented any where how this mapping would work
> > >>>> for all of
> > >>>>> these tunneling/encapsulation mechanisms?
> > >>>> It seems that the mapping of these flows is rather
> > implementation
> > >>>> specific. Is there anything that should be considered in
> > >>> addition to
> > >>>> RFC5568?
> > >>> [Ahmad]
> > >>> Of course. I guess you need to get out of the mode that this
> > >>> document is nothing but few tweaks to make FMIP6 works
> > for PMIPv6.
> > >>> In RFC5568, it clearly assumes that protocol is used for fast
> > >>> handover when IP Mobility based on MIP6 as described in
> > RFC3775. In
> > >>> that sense, only IPv6-in-IPv6 is assumed.
> > >>>
> > >>> Again, the above claim of supporting all these tunneling
> > mechanisms
> > >>> should either be removed and clearly document that this
> protocol
> > >>> works ONLY when the tunneling between the MAG and LMA is
> > >>> IPv6-in-IPv6 or explain how they will work.....
> > >>>
> > >>>>> 2. Is the tunneling mode (between the PMAG and the LMA)
> > >>>>> negotiated/communicated between the PMAG-MAGs?
> > >>>> If the tunneling mode is determined between the LMA and
> > >>> PMAG, which is
> > >>>> in the scope of RFC5213, that of the inter-MAG tunnel
> > should follow
> > >>>> it.
> > >>>> It is also assumed that the same type of tunneling
> will be used
> > >>>> between the LMA and NMAG.
> > >>> [Ahmad]
> > >>> Sure, but your document claim that it supports all of these
> > >>> tunneling mechanisms (as per the quoted text from section
> > >>> 4.1) and at the same time documents nothing about how
> > these should
> > >>> work across the inter-MAG tunnel.
> > >>>
> > >>>>> 3. If the tunneling between the PMAG-LMA is
> > >>>> IPv6-in-IPv4-UDP, Does it
> > >>>>> mean the tunneling between the PMAG-NMAG is also going to
> > >>>> use the same
> > >>>>> encapsulation?
> > >>>> Yes, that is the basic idea.
> > >>> [Ahmad]
> > >>> Good. Then How that should work?
> > >>> Is there anything in your document which specify that? I am all
> > >>> ears, just point me to the text.
> > >>>
> > >>>>> 4. If the UDP tunneling between the two MAGs is not needed,
> > >>>> what kind
> > >>>>> of tunneling will be used between the two MAGs to correctly
> > >>>> map the MN
> > >>>>> traffic and successfully deliver it to the MN?
> > >>>> That mode has not been considered. It will be possible, but
> > >>> is there
> > >>>> any reason that a different type of tunneling should be used?
> > >>> [Ahmad]
> > >>> I am not suggesting to use a different tunneling
> > mechanism between
> > >>> the PMAG and the NMAG; However, You are saying that, e.g.,
> > >>> IPv6-in-IPv4-UDP is naturally extended over the
> PMAG-NMAG tunnel
> > >>> without saying how it should work. That what I was
> > speculating that
> > >>> you probably use a specific tunneling, of course, other than
> > >>> IPv6-in-IPv6 to make it work.
> > >>>
> > >>> So, again, if PMAG-NMAG interface does support all these
> > tunneling
> > >>> mechanisms, then we need to know how it works? That is all.
> > >>>
> > >>>>> 5. Do these tunneling mechanisms include plain GRE
> > >>>> Encapsulation with
> > >>>>> GRE keys or only GRE with TLV-header UDP tunneling?
> > >>>> <draft-ietf-netlmm-grekey-option> supports both modes, so
> > >>>> PFMIPv6 should also support them.
> > >>> [Ahmad]
> > >>> That is a clear answer. Thanks.
> > >>> Could you please make sure that your document clarify
> and clearly
> > >>> document it.
> > >>>
> > >>>>> 5.1. If plain GRE encapsulation with keys is used, then the
> > >>>> document
> > >>>>> needs to clearly specify if there are two sets of GRE
> > >>> keys for the
> > >>>>> same mobility session or only one set? i.e., GRE Keys
> > between the
> > >>>>> PMAG-LMA, GRE Keys for PMAG-NMAG or one set is used. It is
> > >>>> not clear
> > >>>>> in the current document.
> > >>>> PFMIPv6 describes only GRE keys for the inter-MAG tunnel
> > >>> (PMAG-NMAG),
> > >>>> which I think is clarified in Section 4.2. As far as GRE
> > >>> Key Option is
> > >>>> used, it is difficult to transport multiple sets of keys at
> > >>> one time.
> > >>> [Ahmad]
> > >>> Well,
> > >>> 1. It is not clarified nor clear under section 4.2. but,
> > could you
> > >>> please point me to the text you are talking about?
> > >>> 2. As far as of multiple GRE keys exchange, currently that is a
> > >>> limitation of the PMIPv6 protocol. Right? Then, when you need
> > >>> multiple GRE keys, how these GRE keys are communicated?
> > >>> Is that explained in the document?
> > >>>
> > >>>>> 5.2. same question as in 4, if there is GRE with
> TLV-header UDP
> > >>>>> tunneling between the PMAG and the LMA, Is that needed
> > >>> between the
> > >>>>> PMAG-NMAG? If NOT, what encapsulation mechanism is being
> > >>>> used and how
> > >>>>> is the mapping works?
> > >>>> The working assumption is "yes".
> > >>> [Ahmad]
> > >>> That is a huge CLAIM that is NOT backed by any technical
> > data! How
> > >>> that should work? Can you document that some where in the
> > >>> specification? If it is already document, please point
> me to the
> > >>> text.
> > >>>
> > >>>>> 6. Is the assumption here that the NMAG and the PMAG have
> > >>> the same
> > >>>>> transport with the LMA?
> > >>>> For the sake of simplicity, the answer should be "yes".
> > >>>> If not, the network between MAGs should provide the
> transparent
> > >>>> environment (e.g., by another tunneling).
> > >>>>
> > >>>>> 7. with respect to "any new method defined in the future"
> > >>>> what is the
> > >>>>> constraints on this statement? It seems to me an
> > >>>> overstatement of the
> > >>>>> capabilities of this protocol and an underestimate of
> > the future
> > >>>>> tunneling mechanism. May be you need to make sure that the
> > >>>> wording is
> > >>>>> correct by having some conditional restrictions.
> > >>>> The intention here is that if a new tunneling mechanism is
> > >>> specified
> > >>>> for  PMIPv6, PFMIPv6 should also support it. If this is too
> > >>> vague, it
> > >>>> could be removed.
> > >>> [Ahmad]
> > >>> Sure, please remove it. Unless, you propose a dynamic tunneling
> > >>> mechanism that is forward compatible and capable to
> > address future
> > >>> tunneling between the PMAG and LMA.
> > >>>
> > >>>>> In addition,
> > >>>>> ============
> > >>>>> IMO and based on a quick review of this draft, I find it
> > >>> very vague
> > >>>>> and does not have the details for an Interoperable
> > >>>> protocol. I believe
> > >>>>> the draft SHOULD CLEARLY address the following points:
> > >>>>>
> > >>>>> Decide whether it needs to specify/support a single tunneling
> > >>>>> encapsulation mechanism between the PMAG-NMAG or more
> than one.
> > >>>>>
> > >>>>>
> > >>>>> SINGLE tunneling and encapsulation mechanism between
> PMAG-NMAG:
> > >>>>>
> ===============================================================
> > >>>>> 1. This *protocol* needs to specify the exact details
> > of how this
> > >>>>> tunneling mechanism is dynamically established to address
> > >>>> the nature
> > >>>>> of the problem being address in this *handover optimization
> > >>>> protocol*.
> > >>>>
> > >>>> The nature of the specification and its performance is
> based on
> > >>>> RFC5568.
> > >>> [Ahmad]
> > >>> That is part of the problem not to be sited here as a
> supporting
> > >>> argument!
> > >>> As I said earlier, RFC5568 assumes that there is always
> > >>> IPv6-in-IPv6 tunneling between the mobile node and the
> > home agent.
> > >>> In the case of
> > >>> PMIPv6 that assumption is INVALID.
> > >>>
> > >>>> Whether the establishment of the tunneling mechanism is
> > dynamic or
> > >>>> static is operation-specific.
> > >>> [Ahmad]
> > >>> That is NOT true. This document is supposedly offering a fast
> > >>> handover mechanism for PMIPv6 which dynamically does
> > (implicitly or
> > >>> explicitly) negotiates tunneling between the MAG and
> the LMA. So,
> > >>> how a statically configured tunnel between the PMAG and
> the NMAG
> > >>> tunnels a mobile node traffics when the mobile node
> > traffic between
> > >>> the PMAG and LMA for the same mobile node was dynamically
> > >>> negotiated?
> > >>>
> > >>>
> > >>>>> 1.1. for example, if GRE with Keys is being used, then
> > it MUST be
> > >>>>> clear how the GRE keys are exchanged between the PMAG-NMGA,
> > >>>> similar to PMIPv6.
> > >>>>
> > >>>> The current text proposal for Section 4.2 tries to clarify it
> > >>>> regarding who selects the key and how it is transferred.
> > >>> [Ahmad]
> > >>> Hmmm.. Tries to clarify ... I guess we need a clear
> specification
> > >>> that documents an Interoperable solution. We can not just
> > propose a
> > >>> standard track document that is some what clear in the
> > mind of some.
> > >>> Right?
> > >>>
> > >>>>> 2. How the chosen PMAG-NMAG tunneling protocol is able to
> > >>> interwork
> > >>>>> with all tunneling mechanisms that are currently supported
> > >>>> by PMIPv6,
> > >>>>> e.g., IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc.
> > >>>> between the
> > >>>>> PMAG-LMA as is being claimed under section 4.2 of this draft.
> > >>>> Basically, it is supposed that the same tunneling
> > protocol as that
> > >>>> between the LMA and MAG is used. The tunneling type
> > between the LMA
> > >>>> and MAG should be determined in advance.
> > >>> [Ahmad]
> > >>> I guess this answer is more confusing .... One time you
> said that
> > >>> the tunnel can be static and can be dynamic. Now, you
> > just said that
> > >>> the tunnel should be STATIC? I mean what is it? It needs
> > >>> clarification......
> > >>>
> > >>>
> > >>>>> 3. This *protocol* needs to clearly specify how the
> > >>>> different mobility
> > >>>>> sessions are being mapped between the PMAG-LMA
> tunneling to the
> > >>>>> PMAG-NMAG tunneling? Somewhat similar to 2 above.
> > >>>> The basic mechanism is the same as in RFC5568.
> > >>> [Ahmad]
> > >>> Again, in the case of RFC5568 it is straight forward. Only
> > >>> IPv6-in-IPv6 is supported as per RFC3775. Not the case
> for PMIPv6.
> > >>>
> > >>>> If a GRE
> > >>>> tunnel further differentiates the session, the GRE key
> > will be used.
> > >>> [Ahmad]
> > >>> Good. Which GRE Key then?
> > >>> 1. Is that a statically configured GRE key?
> > >>> 2. Is it the same set of GRE keys between the PMAG and LMA?
> > >>> 3. If none of the above, how these GRE keys are generated and
> > >>> exchanged between the PMAG and the NMAG?
> > >>>
> > >>>>> Multiple Tunneling and encapsulation mechanisms between the
> > >>>> PMAG-NMAG:
> > >>>
> > ====================================================================
> > >>> ==
> > >>>>> If the choice as being claimed under section 4.1, is to
> > >>>> support all of
> > >>>>> the current tunneling mechanisms between PMAG-LMA on the
> > >>> PMAG-NMAG
> > >>>>> interface, then the protocol needs to address the following:
> > >>>>>
> > >>>>> 1. Provide a good analysis why that option is the best
> > >>> option? What
> > >>>>> are the advantages and the disadvantages?
> > >>>> I think that is the most workable solution.
> > >>> {Ahmad]
> > >>> What do you have to technically back up this statement.
> > >>> Otherwise, it is just another statement.
> > >>>
> > >>>> Since the
> > >>>> tunneling mechanism selected for the PMIPv6 tunnel is
> > supported by
> > >>>> both the PMAG and NMAG, no extra capability is
> required for the
> > >>>> inter-MAG tunnel.
> > >>> [Ahmad]
> > >>> OK. I am not disputing that the PMAG and the NMAG
> > supports the same
> > >>> sets of tunneling mechanisms or not. It is more of which
> > tunnel to
> > >>> use for which mobile node session and what parameter is
> > needed for
> > >>> this inter-MAG tunnel to correctly tunnel the mobile
> node traffic
> > >>> and deliver it to the end of the tunnel in a non ambiguous way.
> > >>>
> > >>> For example:
> > >>> Tunneling Case 1:
> > >>> =================
> > >>> 1. PMAG and the LMA negotiates the GRE encapsulation
> and the GRE
> > >>> keys using the PBU and PBA for each applicable mobility session.
> > >>> 2. It is very well understood that both the PMAG and the NMAG
> > >>> support GRE tunneling with GRE keys + GRE keys exchange using
> > >>> PMIPv6 signaling with the LMA.
> > >>> 3. Now: for the inter-MAG tunnel and for the same
> > mobility session,
> > >>> how GRE tunneling and GRE keys are negotiated between the
> > PMAG and
> > >>> NMAG? Of course, using HI and HAck, right?
> > >>> 4. Okay, we need the exact details for this specific case.
> > >>>
> > >>> Tunneling Case 2:
> > >>> =================
> > >>> 1. Let us assume IPv6-in-IPv4 UDP is used for MN1. Okay 2.
> > >>> That tunneling is implicitly negotiated between the
> PMAG and LMA
> > >>> during the PBU/PBA exchange, right?
> > >>> 3. How that is negotiated between the PMAG and the NMAG?
> > We need the
> > >>> details..
> > >>>
> > >>> And so on....
> > >>>
> > >>>> Also, I don't see any specific reason to use a special
> tunneling
> > >>>> mechanism for the inter-MAG tunnel.
> > >>> [Ahmad]
> > >>> Good. This means you would use the same tunneling between
> > the PMAG
> > >>> and LMA over inter-MAG tunneling. In this case, we need
> > the details
> > >>> for negotiating that tunneling mechanism between the
> PMAG and the
> > >>> NMAG.
> > >>>
> > >>>>> 2. How this *protocol* dynamically negotiates the tunneling
> > >>>> mechanism
> > >>>>> type?
> > >>>> If the tunneling mechanism between the LMA and MAG is
> > determined in
> > >>>> advance, the same mechanism is used for the inter-MAG
> > >>> tunnel. So, it
> > >>>> is not on-demand and no negotiation is assumed. If the
> tunneling
> > >>>> mechanism between the LMA and MAG is determined on demand,
> > >>> then that
> > >>>> is a different story...
> > >>> [Ahmad]
> > >>> Well, what do you mean? The tunneling between the PMAG
> > and the LMA
> > >>> is NOT on demand?
> > >>> I believe IPv4 support for PMIPv6 and GRE key for PMIPv6
> > drafts will
> > >>> be helpful in answering this question.
> > >>>
> > >>>>> 3. How that should work, for example if the tunneling
> mechanism
> > >>>>> between the PMAG-LMA is IPv6 in IPv4 UDP, how that
> > >>>> tunneling will be
> > >>>>> extended to go over the PMAG-NMAG interface and how it is
> > >>>> supposed to work.
> > >>>>
> > >>>> In this case, both the PMAG and NMAG should be dual-stack
> > >>> and the IP
> > >>>> addresses in the IPv4 outer header are those of the PMAG
> > and NMAG.
> > >>>> IPv6 inner header should be kept intact.
> > >>>>
> > >>> Okay..... Then if the NMAG sends the first packet over
> > the NMAG-PMAG
> > >>> tunnel! Which encapsulation mechanism is going to use to
> > encapsulate
> > >>> that packet?
> > >>>
> > >>> Also, Do you agree that there is a specific reason for
> > the traffic
> > >>> between the PMAG and the LMA to be IPv6-in-IPv4-UDP.
> > >>> Right? That reason may NOT be VALID between the PMAG and
> > the NMAG.
> > >>> Right?
> > >>> Then why to use the same tunneling here? Just out of curiosity!
> > >>>
> > >>>>> Finally, the draft could have some restrictions and
> define the
> > >>>>> PMAG-NMAG tunneling/encapsulation mechanism and could
> > >>>> define a set of
> > >>>>> PMAG-LMA tunneling mechanism that are being
> > >>>> supported/interwork over
> > >>>>> the PMAG-NMAG tunneling/encapsulation.
> > >>>> What kind of restrictions do you foresee? Do you also have any
> > >>>> specific mechanism for the inter-MAG tunnel in mind?
> > >>> [Ahmad]
> > >>> I guess, you need to answer many of the above comments
> before we
> > >>> talk about this. A clear understanding of this tunneling
> > is needed
> > >>> and I do not see it documented in this draft.
> > >>>
> > >>> BTW: Under section 4, this specification says:
> > >>>
> > >>> "
> > >>>    In order to further improve the performance during the
> > handover,
> > >>> the
> > >>>    PFMIPv6 protocol in this document specifies a
> > bi-directional tunnel
> > >>>    between the Previous MAG (PMAG) and the New MAG (NMAG)
> > to tunnel
> > >>>    packets meant for the mobile node.
> > >>> "
> > >>>
> > >>> Which bi-directional tunnel? Where? What are the details?
> > >>>
> > >>>>> One more note: I found defining and describing a protocol
> > >>>> based on a
> > >>>>> call flow, is not the most easy to follow. But, that could
> > >>>> just be me.
> > >>>>
> > >>>> What do you think could improve the readability of the
> document?
> > >>> [Ahmad]
> > >>> Quite some of them... But I gave up after a while....
> > >>>
> > >>>> Regards,
> > >>>> --
> > >>>> Hidetoshi
> > >>>>
> > >>>>> Regards,
> > >>>>> Ahmad
> > >>>>>
> > >>>>>
> > >>>>>> -----Original Message-----
> > >>>>>> From: mipshop-bounces@ietf.org
> > >>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad
> > >>>>>> (RICH1:2H10)
> > >>>>>> Sent: Thursday, September 17, 2009 9:23 PM
> > >>>>>> To: Hidetoshi Yokota
> > >>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >>>>>> Subject: Re: [Mipshop] AD review of
> draft-ietf-mipshop-pfmipv6
> > >>>>>>
> > >>>>>> Hi Hidetoshi,
> > >>>>>> Please see inline.
> > >>>>>>
> > >>>>>> Regards,
> > >>>>>> Ahmad
> > >>>>>>
> > >>>>>>> -----Original Message-----
> > >>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > >>>>>>> Sent: Thursday, September 17, 2009 4:48 PM
> > >>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> > >>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> > >>> Jari Arkko
> > >>>>>>> Subject: Re: [Mipshop] AD review of
> draft-ietf-mipshop-pfmipv6
> > >>>>>>>
> > >>>>>>> Hi Ahmad,
> > >>>>>>>
> > >>>>>>> Here is the proposed revision:
> > >>>>>>>
> > >>>>>>> In Section 4.2:
> > >>>>>>>       [... message with the same sequence number.]
> > The necessary
> > >>>>>>>    information MUST be transferred in the HI/HAck
> messages to
> > >>>>>>>    distinguish MN's packets for forwarding in advance or at
> > >>>>>> this time.
> > >>>>>>>    Such information includes the MN ID and/or GRE key(s).
> > >>>>>> Typically,
> > >>>>>>>    the NMAG selects the GRE key for the downlink packets
> > >>>>>> and the PMAG
> > >>>>>>>    selects that for the uplink packets.  Each key is
> > >>> conveyed in
> > >>>>>>> either
> > >>>>>>>    the HI or HAck message separately when GRE Key Option
> > >>>> [GREKEY] is
> > >>>>>>>    used. [For the downlink ...]
> > >>>>>>>
> > >>>>>> [Ahmad]
> > >>>>>> In addition to what Vijay mentioned with respect to
> > >>>> Typically (which
> > >>>>>> should be removed), I believe the draft needs to be
> > clear on the
> > >>>>>> mechanism that is used for exchanging the GRE keys.
> > When you say
> > >>>>>> "...when the GRE Key Option [GREKEY] is used." What
> > >>> happens if the
> > >>>>>> GRE key option is NOT used. Is there another mechanism?
> > >>>>>>
> > >>>>>> Since the GRE keys are necessary to establish the lateral
> > >>>> tunnel and
> > >>>>>> identify the MN traffic, the draft must specify a default
> > >>>> mechanism.
> > >>>>>> Other mechanisms can be used or specified some where else
> > >>>> if needed,
> > >>>>>> but we need a default one here. Right?
> > >>>>>>
> > >>>>>> Also, you replaced the **HoA of the MN** with the **MN ID**.
> > >>>>>> What is the reason for this change?
> > >>>>>> And how this should work NOW while you have ".. and/or
> > GRE Keys"?
> > >>>>>>
> > >>>>>>> If the above description is acceptable, I will submit
> > >>> the revised
> > >>>>>>> version by the end of the week.
> > >>>>>>>
> > >>>>>>> Regards,
> > >>>>>>> --
> > >>>>>>> Hidetoshi
> > >>>>>>>
> > >>>>>>> Ahmad Muhanna wrote:
> > >>>>>>>> Hi Hidetoshi,
> > >>>>>>>>
> > >>>>>>>>> -----Original Message-----
> > >>>>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> > >>>>>>>>> Sent: Monday, September 14, 2009 7:37 AM
> > >>>>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> > >>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> > >>>>>> Jari Arkko
> > >>>>>>>>> Subject: Re: [Mipshop] AD review of
> > draft-ietf-mipshop-pfmipv6
> > >>>>>>>>>
> > >>>>>>>>> Hi Ahmad,
> > >>>>>>>>>
> > >>>>>>>>> Thanks for your comment. I'm glad to hear an opinion from
> > >>>>>>> a GRE key
> > >>>>>>>>> expert. Please see inline:
> > >>>>>>>>>
> > >>>>>>>>> Ahmad Muhanna wrote:
> > >>>>>>>>>> Hi Hidetoshi,
> > >>>>>>>>>>
> > >>>>>>>>>> I just have one quick comment and question.
> > >>>>>>>>>>
> > >>>>>>>>>> Reading the draft, it seems to me that the GRE keys are
> > >>>>>>>>> somehow sent
> > >>>>>>>>>> from the NAR to PAR in the HI (section 4.2). Is that the
> > >>>>>>> case? This
> > >>>>>>>>>> means both the DL and UP GRE keys for the bilateral
> > >>>>>>> tunnels between
> > >>>>>>>>>> the two AR(s). Is my understanding correct? It also
> > >>>>>>>>> mentions that the
> > >>>>>>>>>> format
> > >>>>>>>>> In terms of the GRE keys for the bilateral tunnel,
> > >>> the working
> > >>>>>>>>> assumption is that the DL key is selected by the NAR and
> > >>>>>>> the UL key
> > >>>>>>>>> is selected by the PAR. Depending on the fast handover
> > >>>>>> mode, those
> > >>>>>>>>> keys are transferred to the other MAG via either the
> > >>> HI or Hack.
> > >>>>>>>>>> of these keys are based on the GRE keys for PMIPv6
> > >>>>>> draft (section
> > >>>>>>>>>> 6.2.6).
> > >>>>>>>>> Correct.
> > >>>>>>>>>
> > >>>>>>>>>> It seems to me that there should be more text to define
> > >>>>>>> which keys
> > >>>>>>>>>> exchange in the HI and which in the HaCK
> > >>>>>>>>> If the above assumption works, I would like to add more
> > >>>>>> text along
> > >>>>>>>>> that line.
> > >>>>>>>> [Ahmad]
> > >>>>>>>> That is great. Please add some clarification text to
> > >>>>>>> clearly indicate
> > >>>>>>>> that only one key in the HI and the other in the HACK.
> > >>>>>>>> Since some specification in 3GPP2 depends on this draft, I
> > >>>>>>> appreciate
> > >>>>>>>> if you can publish an updated version before the end of
> > >>>> the week.
> > >>>>>>>> Thanks in advance!
> > >>>>>>>>
> > >>>>>>>>>> If both keys are exchanged in the same HI, How these
> > >>> keys are
> > >>>>>>>>>> identified at the pAR?
> > >>>>>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key
> is included
> > >>>>>>>>> in the PBU
> > >>>>>>>>>> and the uplink GRE key in included in the PBA. They never
> > >>>>>>>>> exist in the
> > >>>>>>>>>> same message and that way there is no confusing.
> > >>>>>>>>> So far, each key is conveyed by either the HI or HAck.
> > >>>>>>>>> However, I haven't explored all of the possibilities.
> > >>>> If you can
> > >>>>>>>>> think of any case that two keys must be conveyed in one
> > >>>> message,
> > >>>>>>>>> please let me know.
> > >>>>>>>> [Ahmad]
> > >>>>>>>> I do not see any reason for this case (one key per
> > >>>>>> message) not to
> > >>>>>>>> work for all implementation.
> > >>>>>>>>
> > >>>>>>>>>> In addition, DL and UP GRE keys are generated by NAR and
> > >>>>>>>>> sent inside
> > >>>>>>>>>> the HI, my question: Is there any specific reason for
> > >>>>>> the NAR to
> > >>>>>>>>>> specify both GRE keys for the bilateral tunnels?
> > >>>>>>>>> It would be more problematic that the NAR determines the
> > >>>>>> both keys
> > >>>>>>>>> and I would rather like to avoid it.
> > >>>>>>>>>
> > >>>>>>>>>> Sorry for this comment to be so late but hope
> that you have
> > >>>>>>>>> the chance
> > >>>>>>>>>> to take a look at it.
> > >>>>>>>>> That's ok. The draft is under the review process. Your
> > >>>>>> comment is
> > >>>>>>>>> highly appreciated.
> > >>>>>>>>>
> > >>>>>>>>> Regards,
> > >>>>>>>>> --
> > >>>>>>>>> Hidetoshi
> > >>>>>>>>>
> > >>>>>>>>>
> > >>>>>>>>>> Thanks!
> > >>>>>>>>>>
> > >>>>>>>>>> Regards,
> > >>>>>>>>>> Ahmad
> > >>>>>>>>>>
> > >>>>>>>>>>
> > >>>>>>>>>>> -----Original Message-----
> > >>>>>>>>>>> From: mipshop-bounces@ietf.org
> > >>>>>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of
> > >>>> Hidetoshi Yokota
> > >>>>>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM
> > >>>>>>>>>>> To: Jari Arkko
> > >>>>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> > >>>>>>>>>>> Subject: Re: [Mipshop] AD review of
> > >>> draft-ietf-mipshop-pfmipv6
> > >>>>>>>>>>> Hi Jari,
> > >>>>>>>>>>>
> > >>>>>>>>>>> Thanks for your patience. The attached revised
> document is
> > >>>>>>>>> supposed to
> > >>>>>>>>>>> reflect the rest of your comments. Please also
> see inline,
> > >>>>>>>>> where the
> > >>>>>>>>>>> revised part is explained item by item. If there is no
> > >>>>>>> outstanding
> > >>>>>>>>>>> issue there, we will upload it shortly.
> > >>>>>>>>>>>
> > >>>>>>>>>>> [Apologize if you received it twice. Since the size just
> > >>>>>>>>> exceeded the
> > >>>>>>>>>>> limit of this ML, this mail is reposted without the
> > >>>>>> attachment.]
> > >>>>>>>>>>> Hidetoshi Yokota wrote:
> > >>>>>>>>>>>> Hi Jari,
> > >>>>>>>>>>>>
> > >>>>>>>>>>>> Appreciate your detailed review. The editorial
> > corrections
> > >>>>>>>>>>> are mostly
> > >>>>>>>>>>>> done and the revised version is attached to this mail.
> > >>>>>>>>> Regarding the
> > >>>>>>>>>>>> technical comments, only the policies for the
> correction
> > >>>>>>>>>>> are listed for
> > >>>>>>>>>>>> now. The complete correction will be posted as soon as
> > >>>>>>>>>>> possible. Please
> > >>>>>>>>>>>> see inline for the responses to your questions and
> > >>> comments:
> > >>>>>>>>>>>> Jari Arkko wrote:
> > >>>>>>>>>>>>> I have reviewed this document. It was
> generally in good
> > >>>>>>>>>>> shape and easy
> > >>>>>>>>>>>>> to read. I did find a number of issues though. Please
> > >>>>>>>>>>> discuss them with
> > >>>>>>>>>>>>> me on this thread and/or revise the draft accordingly.
> > >>>>>>>>>>>>>
> > >>>>>>>>>>>>> Technical:
> > >>>>>>>>>>>>>
> > >>>>>>>>>>>>> I do not understand the IP host aspects of the
> > >>>>>>> handover. For an
> > >>>>>>>>>>>>> unmodified host, what kind of interfaces exist on the
> > >>>>>>> host, what
> > >>>>>>>>>>>>> addresses they have, and at what time are interfaces
> > >>>>>>>>>>> removed or added?
> > >>>>>>>>>>>>> Is this exactly the same as in RFC 5213, or
> does PFMIPv6
> > >>>>>>>>>>> introduce some
> > >>>>>>>>>>>>> change here?
> > >>>>>>>>>>>> The basic principle would be that this
> specification does
> > >>>>>>>>>>> not require
> > >>>>>>>>>>>> any additional IP-level function to the MN
> running in the
> > >>>>>>>>>>> PMIPv6 domain.
> > >>>>>>>>>>>> This MN should therefore be the same as defined
> > in RFC5213.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>> A typical network interface would be one with the
> > >>>>>>>>> cellular network,
> > >>>>>>>>>>>> where the network basically controls the
> movement of the
> > >>>>>>>>>>> MN. Different
> > >>>>>>>>>>>> types of interfaces could be involved such as different
> > >>>>>>>>>>> generations (3G
> > >>>>>>>>>>>> and 3.9G) or different radio access systems.
> Any type of
> > >>>>>>>>> IP address
> > >>>>>>>>>>>> could be assigned (IPv4/v6 or global/private), but the
> > >>>>>>>>>>> assigned address
> > >>>>>>>>>>>> must be preserved before and after the
> handover. PFMIPv6
> > >>>>>>>>>>> should be able
> > >>>>>>>>>>>> to handle the single radio situation, where only one
> > >>>>>>>>>>> interface is active
> > >>>>>>>>>>>> at any given time. This is a tougher situation
> > in terms of
> > >>>>>>>>>>> packet loss
> > >>>>>>>>>>>> and delay.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>> I would like to see a new section on manageability
> > >>>>>>>>>>> considerations. For
> > >>>>>>>>>>>>> instance, Section 5 talks about some
> > >>> configuration issues.
> > >>>>>>>>>>> These should
> > >>>>>>>>>>>>> be mentioned, and there should be a
> description of what
> > >>>>>>>>>>> the operator
> > >>>>>>>>>>>>> needs to configure in order to set up a
> PFMIPv6 network.
> > >>>>>>>>>>>> We will add a new section for manageability
> > considerations
> > >>>>>>>>>>> to clarify
> > >>>>>>>>>>>> the above and to reflect your suggestion.
> > >>>>>>>>>>> A new subsection is added in Section 5 describing the
> > >>>>>>>>> above aspects:
> > >>>>>>>>>>> -------------------
> > >>>>>>>>>>> 5.  PMIPv6-related Fast Handover Issues
> > >>>>>>>>>>>
> > >>>>>>>>>>> 5.1.  Manageability Considerations
> > >>>>>>>>>>>
> > >>>>>>>>>>>    This specification does not require any
> > >>> additional IP-level
> > >>>>>>>>>>>    functionality on the LMA and the MN running in
> > >>> the PMIPv6
> > >>>>>>>>>>> domain.  A
> > >>>>>>>>>>>    typical network interface that the MN could be
> > >>>>>>> assumed to have
> > >>>>>>>>>>> is one
> > >>>>>>>>>>>    with the cellular network, where the network
> > >>> controls the
> > >>>>>>>>>>> movement of
> > >>>>>>>>>>>    the MN.  Different types of interfaces could be
> > >>>>>>> involved such as
> > >>>>>>>>>>>    different generations (3G and 3.9G) or different
> > >>>>>> radio access
> > >>>>>>>>>>>    systems.  This specification supports a MN with the
> > >>>>>>> single radio
> > >>>>>>>>>>>    mode, where only one interface is active at any given
> > >>>>>>> time.  The
> > >>>>>>>>>>>    assigned IP address is preserved whether the physical
> > >>>>>>> interface
> > >>>>>>>>>>>    changes or not and the MN can identify which
> > >>>>>>> interface should be
> > >>>>>>>>>>> used
> > >>>>>>>>>>>    if there are multiple ones.
> > >>>>>>>>>>> --------------------
> > >>>>>>>>>>>
> > >>>>>>>>>>>
> > >>>>>>>>>>>>>> If the new router's interface is configured to
> > >>> respond to
> > >>>>>>>>>>>>>> queries sent to link-layer addresses than its
> > >>>>>>>>>>> own (e.g.,
> > >>>>>>>>>>>>>> set to promiscuous mode), then it can respond to the
> > >>>>>>> NUD probe,
> > >>>>>>>>>>>>>> providing its link-layer address in the
> > >>> solicited Neighbor
> > >>>>>>>>>>>>>> Advertisement.
> > >>>>>>>>>>>>> Is this according to RFC 5213? I seem to
> recall that RFC
> > >>>>>>>>>>> 5213 operated
> > >>>>>>>>>>>>> on the same link layer addresses.
> > >>>>>>>>>>>> I think your observation is correct... I'll
> > check with the
> > >>>>>>>>>>> other authors
> > >>>>>>>>>>>> to see if it is ok to rewrite it.
> > >>>>>>>>>>> The new text doesn't mention the promiscuous mode and
> > >>>>>>>>> emphasizes the
> > >>>>>>>>>>> common link-layer address among all MAGs in the
> > >>> PMIPv6 domain:
> > >>>>>>>>>>> ---------------
> > >>>>>>>>>>> 5.2.  Expedited Packet Transmission
> > >>>>>>>>>>>
> > >>>>>>>>>>>    [...]
> > >>>>>>>>>>>
> > >>>>>>>>>>>    The protocol specified in this document is applicable
> > >>>>>>>>> regardless of
> > >>>>>>>>>>>    whether link-layer addresses are used
> between a MN and
> > >>>>>>>>> its access
> > >>>>>>>>>>>    router.  A MN should be able to continue sending
> > >>>>>>> packets on the
> > >>>>>>>>>>>    uplink even when it changes link.  When link-layer
> > >>>>>>> addresses are
> > >>>>>>>>>>>    used, the MN performs Neighbor Unreachability
> > >>>>>> Detection (NUD)
> > >>>>>>>>>>>    [RFC4861], after attaching to a new link,
> probing the
> > >>>>>>>>>>> reachability of
> > >>>>>>>>>>>    its default router.  The new router should respond
> > >>>>>> to the NUD
> > >>>>>>>>>>> probe,
> > >>>>>>>>>>>    providing its link-layer address in the
> > >>> solicited Neighbor
> > >>>>>>>>>>>    Advertisement, which is common in the PMIPv6 domain.
> > >>>>>>>>>>> Implementations
> > >>>>>>>>>>>    should allow the MN to continue to send
> uplink packets
> > >>>>>>>>> while it is
> > >>>>>>>>>>>    performing NUD.
> > >>>>>>>>>>> ----------------
> > >>>>>>>>>>>
> > >>>>>>>>>>>>>> At least one mobility option MUST uniquely identify
> > >>>>>>> the target
> > >>>>>>>>>>>>>> MN (e.g., the Mobile Node
> > >>>>>>>>> Identifier
> > >>>>>>>>>>>>>> Option defined in RFC4283
> > >>>>>>>>>>> <http://tools.ietf.org/html/rfc4283>) and
> > >>>>>>>>>>>>>> the transferred context MUST be for one MN
> per message.
> > >>>>>>>>>>>>>>
> > >>>>>>>>>>>>> I would like the required options to be
> > specified in more
> > >>>>>>>>>>> detail. Which
> > >>>>>>>>>>>>> identity options are sufficient to satisfy the MUST?
> > >>>>>>>>>>>> The required option should be the MN Identifier in the
> > >>>>>>> Mobile Node
> > >>>>>>>>>>>> Identifier Option.
> > >>>>>>>>>>> The above description is added in Section 6.1.1:
> > >>>>>>>>>>>
> > >>>>>>>>>>> ---------
> > >>>>>>>>>>>    Requested option
> > >>>>>>>>>>>              In order to uniquely identify the target
> > >>>>>> MN, the MN
> > >>>>>>>>>>>              Identifier MUST be contained in the
> > >>> Mobile Node
> > >>>>>>>>>>> Identifier
> > >>>>>>>>>>>              Option.
> > >>>>>>>>>>> ---------
> > >>>>>>>>>>>
> > >>>>>>>>>>>>>> If a default set of context information is defined
> > >>>>>> and always
> > >>>>>>>>>>>>>> sufficient, this option is not mandatory.  This
> > >>>>>>>>>>> option is more
> > >>>>>>>>>>>>>> useful to retrieve additional or dynamically
> > >>>>>> selected context
> > >>>>>>>>>>>>>> information.
> > >>>>>>>>>>>>>>
> > >>>>>>>>>>>>>> Context Request Option is typically used for the
> > >>>>>>> reactive (NAR-
> > >>>>>>>>>>>>>> initiated) fast handover mode to retrieve the context
> > >>>>>>>>> information
> > >>>>>>>>>>>>>> from the PAR.  When this option is included in the HI
> > >>>>>>>>> message, all
> > >>>>>>>>>>>>>> the requested context information SHOULD be included
> > >>>>>>> in the HAck
> > >>>>>>>>>>>>>> message in the corresponding mobility
> option(s) (e.g.,
> > >>>>>>>>>>> HNP, LMAA or
> > >>>>>>>>>>>>>> MN-IID mobility options).
> > >>>>>>>>>>>>>>
> > >>>>>>>>>>>>> Please specify what the default set of context
> > >>>>>>>>> information is, by
> > >>>>>>>>>>>>> listing the required options when the CRO is
> > not present.
> > >>>>>>>>>>>> The default context information to request is the Home
> > >>>>>>>>>>> Network Prefix
> > >>>>>>>>>>>> Option. If the Mobile Node link-layer is available and
> > >>>>>>>>>>> used, the Mobile
> > >>>>>>>>>>>> Node Link-layer Identifier Option MUST also be
> requested.
> > >>>>>>>>>>> With these two
> > >>>>>>>>>>>> options and the MN identifier, the NMAG can
> > >>>> construct the PBU.
> > >>>>>>>>>>> The above description is added in Section 6.2.1:
> > >>>>>>>>>>>
> > >>>>>>>>>>> ----------
> > >>>>>>>>>>>    The default context information to request is the
> > >>>>>>> Home Network
> > >>>>>>>>>>> Prefix
> > >>>>>>>>>>>    Option.  If the Mobile Node link-layer is
> available and
> > >>>>>>>>> used, the
> > >>>>>>>>>>>    Mobile Node Link-layer Identifier Option MUST also be
> > >>>>>>> requested.
> > >>>>>>>>>>> ----------
> > >>>>>>>>>>>
> > >>>>>>>>>>>>> Editorial:
> > >>>>>>>>>>>>>
> > >>>>>>>>>>>>>>    HO-Initiate:
> > >>>>>>>>>>>>>>         A generic signaling message, sent
> from the P-AN
> > >>>>>>>>>>> to the PMAG that
> > >>>>>>>>>>>>>>         indicates a MN handover.  While this
> > signaling is
> > >>>>>>>>>>> dependent on
> > >>>>>>>>>>>>>>         the access technology, it is assumed that
> > >>>>>>>>>>> HO-Initiate can carry
> > >>>>>>>>>>>>>>         the information to identify the MN and to
> > >>>>>>>>> assist the PMAG
> > >>>>>>>>>>>>>>         resolve the NMAG and the new access
> > point or the
> > >>>>>>>>>>> base station to
> > >>>>>>>>>>>>>>         which the MN is moving to.  The
> details of this
> > >>>>>>>>>>> message are
> > >>>>>>>>>>>>>>         outside the scope of this document.
> > >>>>>>>>>>>>>>
> > >>>>>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview
> > >>>>>>>>>>>>> Section 4 would probably benefit from an additional
> > >>>>>>>>>>> paragraph at the
> > >>>>>>>>>>>>> beginning to explain what assumptions there
> exist about
> > >>>>>>>>>>> lower layer
> > >>>>>>>>>>>>> functionality.
> > >>>>>>>>>>>> Yes, the predictive fast handover relies on the
> > >>> lower layer
> > >>>>>>>>>>>> functionality to trigger to send the HI. A new
> paragraph
> > >>>>>>>>>>> will be added
> > >>>>>>>>>>>> to clarify it.
> > >>>>>>>>>>> -------------
> > >>>>>>>>>>> 4.  Proxy-based FMIPv6 Protocol Overview
> > >>>>>>>>>>>
> > >>>>>>>>>>>    If the MAGs can be informed of the detachment and/or
> > >>>>>>>>> attachment of
> > >>>>>>>>>>>    the MN in a timely manner via e.g. the lower layer
> > >>>>>>> signaling, it
> > >>>>>>>>>>> will
> > >>>>>>>>>>>    become possible to optimize the handover procedure,
> > >>>>>>>>> which involves
> > >>>>>>>>>>>    establishing a connection on the new link and
> > >>>>>>> signaling between
> > >>>>>>>>>>>    mobility agents, compared to the baseline
> specification
> > >>>>>>>>> of PMIPv6.
> > >>>>>>>>>>>   [...]
> > >>>>>>>>>>> -------------
> > >>>>>>>>>>>
> > >>>>>>>>>>> All the other corrections pointed out below have
> > also been
> > >>>>>>>>>>> reflected in the revised document.
> > >>>>>>>>>>>
> > >>>>>>>>>>> Regards,
> > >>>>>>>>>>> --
> > >>>>>>>>>>> Hidetoshi
> > >>>>>>>>>>>
> > >>>>>>>>>>>>>> A new flag 'P' is defined for the HI and HAck
> > >>> messages to
> > >>>>>>>>>>>>>> distinguish from those in [RFC5268bis
> > >>>>>>>>>>>>>>
> > >>> <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref-
> > >>>>>>>>>>> RFC5268bis>]
> > >>>>>>>>>>>>>> and thus MUST
> > >>>>>>>>>>>>>> be set in the entire document.
> > >>>>>>>>>>>>>>
> > >>>>>>>>>>>>> This would be more readable as " ... those in
> > >>>>>>>>>>> [RFC5268bis]. This flag
> > >>>>>>>>>>>>> MUST be ..."
> > >>>>>>>>>>>> Revised.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>    and the NAR creates a proxy NCE to receive those
> > >>>>>>>>>>> packets for the NCoA
> > >>>>>>>>>>>>> The term NCE has not been introduced at this
> stage yet.
> > >>>>>>>>>>>> Spelled out as "Neighbor Cache Entry".
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>    address that is used by the MN is MN-HoA.
>  Hence the
> > >>>>>>>>>>> PAR forwards
> > >>>>>>>>>>>>> The term MN-HOA has not been introduced before.
> > >>>>>>>>>>>> Added the unabbreviated form "Mobile Node's
> Home Address"
> > >>>>>>>>> before it.
> > >>>>>>>>>>>>>>         The access network to which the MN
> is attached
> > >>>>>>>>>>> after handover.
> > >>>>>>>>>>>>> New term MN, not introduced before.
> > >>>>>>>>>>>>>
> > >>>>>>>>>>>> Added "Mobile Node" before it.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>> specifies forwarding when the MN uses HoA as its
> > >>>>>>> on-link address
> > >>>>>>>>>>>>> New term HoA...
> > >>>>>>>>>>>> Changed to "Home Address".
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>    as MN's NAI, Home Network Prefix (HNP), IPv4 Home
> > >>>>>>>>> Address, are
> > >>>>>>>>>>>>> New term NAI...
> > >>>>>>>>>>>> Added "Network Access Identifier" before it.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>         flag set and include the MN ID, the
> MN-HNP, the
> > >>>>>>>>>>> MN-IID and the
> > >>>>>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not
> > >>>>>>>>>>> appear in their
> > >>>>>>>>>>>>> MN-XXX form before this point).
> > >>>>>>>>>>>> Modified "MN-HNP" to "HNP" for consistency.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>         Inner destination address: HNP or IPv4-MN-HoA
> > >>>>>>>>>>>>> IPv4-MN-HoA not defined earlier...
> > >>>>>>>>>>>> Added "Mobile Node's IPv4 Home" before it.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>    between the PCoA and NCoA to forward
> packets for the
> > >>>>>>>>>>> MN to the NAR,
> > >>>>>>>>>>>>> New terms PCoA and NCoA... there's probably
> > more undefined
> > >>>>>>>>>>> terms in the
> > >>>>>>>>>>>>> document, please check!
> > >>>>>>>>>>>> Added "Previous Care-of Address" and "New Care-of
> > >>> Address".
> > >>>>>>>>>>> Will read
> > >>>>>>>>>>>> through it to see if there is any other
> > undefined acronym.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>    In (i),
> > >>>>>>>>>>>>> In Step (i),
> > >>>>>>>>>>>> Revised including other parts.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>>>           |(MN ID, Old AP ID) |     (MN ID, Old
> > >>> AP ID)
> > >>>>>>>>>>>  |        |
> > >>>>>>>>>>>>> Old AP ID? AN ID? AR ID?
> > >>>>>>>>>>>> AP ID stands for "Access Point Identifier", which is
> > >>>>>>>>>>> defined in RFC5568.
> > >>>>>>>>>>>> Added the unabbreviated form and citation.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>> The rest of the part will be revised soon.
> > >>>>>>>>>>>>
> > >>>>>>>>>>>> Regards,
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>
> > >>>>>>>>>>>>
> > >>> --------------------------------------------------------------
> > >>>>>>>>>>> ----------
> > >>>>>>>>>>>> _______________________________________________
> > >>>>>>>>>>>> Mipshop mailing list
> > >>>>>>>>>>>> Mipshop@ietf.org
> > >>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > >>>>>>>>>>> _______________________________________________
> > >>>>>>>>>>> Mipshop mailing list
> > >>>>>>>>>>> Mipshop@ietf.org
> > >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > >>>>>>>>>>>
> > >>>>>>>>
> > >>>>>>> --
> > >>>>>>> Hidetoshi Yokota
> > >>>>>>>
> > >>>>>>> Mobile Network Lab
> > >>>>>>> KDDI R&D Laboratories, Inc.
> > >>>>>>> e-mail:yokota@kddilabs.jp
> > >>>>>>>
> > >>>>>>>
> > >>>>>> _______________________________________________
> > >>>>>> Mipshop mailing list
> > >>>>>> Mipshop@ietf.org
> > >>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> > >>>>>>
> > >>>>>
> > >>>>>
> > >>>>
> > >>
> > >>
> > >> This email and any attachments may contain legally
> > privileged and/or
> > >> confidential information of Starent Networks, Corp. and is
> > intended
> > >> only for the individual or entity named in the message.  The
> > >> information transmitted may not be used to create or change any
> > >> contractual obligations of Starent Networks, Corp.  Any review,
> > >> retransmission, dissemination or other use of, or taking of any
> > >> action in reliance upon this e-mail and its attachments by
> > persons or
> > >> entities other than the intended recipient is prohibited.
> > If you are
> > >> not the intended recipient, please notify the sender
> > immediately --
> > >> by replying to this message or by sending an email to
> > >> postmaster@starentnetworks.com -- and destroy all copies of this
> > >> message and any attachments without reading or disclosing
> > their contents. Thank you.
> > >>
> > >>
> > >>
> > >
> >
> >
>
>