RE: [Mipshop] FMIPv6 Reactive Handover - HI/HAck

Narayanan Vidya-CVN065 <vidya@motorola.com> Tue, 23 August 2005 04:19 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E7QFY-0007FB-Gr; Tue, 23 Aug 2005 00:19:00 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E7QFW-0007Ba-FW for mipshop@megatron.ietf.org; Tue, 23 Aug 2005 00:18:58 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA28455 for <mipshop@ietf.org>; Tue, 23 Aug 2005 00:18:55 -0400 (EDT)
Received: from ftpbox.mot.com ([129.188.136.101]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E7QFY-0006Sp-SP for mipshop@ietf.org; Tue, 23 Aug 2005 00:19:01 -0400
Received: from az33exr02.mot.com (az33exr02.mot.com [10.64.251.232]) by ftpbox.mot.com (Motorola/Ftpbox) with ESMTP id j7N4IjtZ026930 for <mipshop@ietf.org>; Mon, 22 Aug 2005 21:18:46 -0700 (MST)
Received: from il02exm13.corp.mot.com (il02exm13.corp.mot.com [10.0.111.24]) by az33exr02.mot.com (8.13.1/8.13.0) with ESMTP id j7N4O6OC012205 for <mipshop@ietf.org>; Mon, 22 Aug 2005 23:24:06 -0500 (CDT)
Received: by il02exm13 with Internet Mail Service (5.5.2657.72) id <N417T7GC>; Mon, 22 Aug 2005 23:18:44 -0500
Message-ID: <1B631E11D496D711BB2800065BFCB6A11B7A7325@il02exm13>
From: Narayanan Vidya-CVN065 <vidya@motorola.com>
To: 'Subba Reddy' <subbareddy@samsung.com>, 'Junghoon Jee' <jhjee@etri.re.kr>, mipshop@ietf.org
Subject: RE: [Mipshop] FMIPv6 Reactive Handover - HI/HAck
Date: Mon, 22 Aug 2005 23:18:43 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
X-Spam-Score: 1.8 (+)
X-Scan-Signature: 1a2f5df4c6f30e0d5df43748fb095119
Cc:
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: mipshop.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1490203291=="
Sender: mipshop-bounces@ietf.org
Errors-To: mipshop-bounces@ietf.org

Hi Subba Reddy,
 
Actually, that is where I was going with this. It seems like HI/HAck is not really a MUST for reactive handover. The FBU from the MN will be authenticated by the PAR. As long as the NAR knows that the FBAck was successful, isn't that all that is needed for tunnel state creation/enablement? 
 
--> As per my understanding, FBack is sent to MN's NCoA (sec 6.3.2). But in the figure, it is showing to NAR.  
 
------> It does seem that the FBAck is sent to the NCoA (as per the IP destination value in 6.3.2, although this doesn't make much sense if it is sent on the old link itself, as in the predictive handoff case). Nevertheless, we could take advantage of the fact that it is going through the NAR for sure in the case of reactive handovers. 
 
Vidya
 
 
Thanks & Regards,
Subba Reddy

 
Again, CT is a different story - so, I'm not referring to that. 
 
I think the text can be made clearer in the protocol description to alleviate ambiguity. But, regardless, why is there a need to mandate these messages for reactive mode? 
 
I can see the need for a message exchange with the AH between the ARs - but, seems to me like the FBU/FBAck can be extended to carry that - no? 
 
Vidya

-----Original Message-----
From: Junghoon Jee [mailto:jhjee@etri.re.kr] 
Sent: Monday, August 22, 2005 9:15 PM
To: Narayanan Vidya-CVN065; mipshop@ietf.org
Subject: RE: [Mipshop] FMIPv6 Reactive Handover - HI/HAck 


Hi Vidya,
I made the same question through DNA WG recently regarding FMIP-DNA I-D.
 
You can find the previous discussion through the attached message.
 
I am still questioning why HI/HAck for the access control is required after MN has already attached to NAR in the reactive case.
 
Junghoon
 
> -----Original Message-----
> From: Rajeev Koodli [mailto:rajeev@iprg.nokia.com] 
> Sent: Tuesday, July 19, 2005 8:46 AM
> To: Junghoon Jee
> Cc: 'Syam Madanapalli'; dna@eng.monash.edu.au <mailto:dna@eng.monash.edu.au> ; smadanapalli@gmail.com <mailto:smadanapalli@gmail.com> 
> Subject: Re: [DNA] draft-koodli-dna-fmip-00.txt
> 
> 
> 
> 
> Junghoon Jee wrote:
> 
> > Rajeev,
> >  
> > 
> >>For both predictive and reactive modes, HI/HAck can be useful for 
> >>access control. NAR can forward packets for the MN without forcing 
> >>access control, through HI/HAck.
> > 
> 
> One could use HI/HAck for CT, but I am not referring to that.
> 
> When FBU processing is successful, PAR's message (HI) to NAR 
> can allow NAR to "validate" the ND cache entry for NCoA.
> No Context Transfer is involved. The fields in HI (PCoA, NCoA,
> LLA) are sufficient for the purpose.
> 
> -Rajeev
> 
> 
> 
> 
> 
> > 
> > Are you saying about context transfer by HI/HAck ?
> > 
> > Regards,
> > Junghoon
> > 
> > 
> >>(If it is not clear, FMIP-DNA is applicable when DNA+oDAD is 
> >>available,
> >>  and no neighborhood information is available for FMIP)
> >>
> >>-Rajeev
> >>
> >>
> >>
> >>Syam Madanapalli wrote:
> >>
> >>
> >>>Hello Junghoon,
> >>>
> >>>Thanks for reviewing the draft.
> >>>
> >>>
> >>>>Hi Syam,
> >>>>It's an interesting work.
> >>>>After reviewing this I-D, I've come up with a following question.
> >>>>
> >>>>About the role of HI/HACK in this reactive FMIPv6-DNA :
> >>>>I thought that these messages are required to confirm the MN's 
> >>>>prospective NCoA in predictive mode.
> >>>>In the FMIPv6-DNA, MN configures the NCoA by optimistic 
> DAD in the 
> >>>>reactive mode, so why do those messages needed to be
> >>
> >>transferred and
> >>
> >>>>what's their roles ?
> >>>>Just to prepare for future optional behavior the same as
> >>
> >>specified in
> >>
> >>>>the draft-ietf-mipshop-fast-mipv6-03 ?
> >>>>I guess that my question may also apply to the reactive mode of 
> >>>>draft-ietf-mipshop-fast-mipv6-03.
> >>>
> >>>
> >>>As you mentioned, currently there is no new use of HI/HACK
> >>
> >>other than
> >>
> >>>what is mentioned in FMIPv6 RFC.  That is, NAR can make use of the 
> >>>knowledge that its trusted peer (i.e., PAR) has a trust
> >>
> >>relationship
> >>
> >>>with the
> >>>MN.
> >>>
> >>>
> >>>
> >>>>Regards,
> >>>>Junghoon
> >>>>
> >>>
> > 
> 



  _____  




_______________________________________________
Mipshop mailing list
Mipshop@ietf.org
https://www1.ietf.org/mailman/listinfo/mipshop


_______________________________________________
Mipshop mailing list
Mipshop@ietf.org
https://www1.ietf.org/mailman/listinfo/mipshop