Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6

Hidetoshi Yokota <yokota@kddilabs.jp> Tue, 22 September 2009 13:20 UTC

Return-Path: <yokota@kddilabs.jp>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0A3103A6971 for <mipshop@core3.amsl.com>; Tue, 22 Sep 2009 06:20:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.369
X-Spam-Level:
X-Spam-Status: No, score=-2.369 tagged_above=-999 required=5 tests=[AWL=0.230, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wK6ovzbqcmjK for <mipshop@core3.amsl.com>; Tue, 22 Sep 2009 06:20:07 -0700 (PDT)
Received: from mandala.kddilabs.jp (mandala.kddilabs.jp [IPv6:2001:200:601:12::16]) by core3.amsl.com (Postfix) with ESMTP id 1620F3A67EF for <mipshop@ietf.org>; Tue, 22 Sep 2009 06:20:06 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mandala.kddilabs.jp (Postfix) with ESMTP id C1273EC8B8; Tue, 22 Sep 2009 22:21:05 +0900 (JST)
Received: from ultra.mip.kddilabs.jp (ultra.mip.kddilabs.jp [2001:200:601:402::145]) by mandala.kddilabs.jp (Postfix) with ESMTP id 048F4EC87D; Tue, 22 Sep 2009 22:21:03 +0900 (JST)
Received: from [127.0.0.1] (unknown [10.8.0.6]) by ultra.mip.kddilabs.jp (Postfix) with ESMTP id 7288E1BFFB; Tue, 22 Sep 2009 22:15:50 +0900 (JST)
Message-ID: <4AB8CF19.70905@kddilabs.jp>
Date: Tue, 22 Sep 2009 22:20:25 +0900
From: Hidetoshi Yokota <yokota@kddilabs.jp>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Ahmad Muhanna <amuhanna@nortel.com>
References: <4A93F739.5050006@piuha.net> <4A97EEAB.9070606@kddilabs.jp><4A9F4222.8070107@kddilabs.jp><C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com><4AAE38F6.2010600@kddilabs.jp><C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com><4AB2AE87.6030801@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com> <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com>
In-Reply-To: <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com>
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: by amavisd-new
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Sep 2009 13:20:10 -0000

Hi Ahmad,

Thanks for your detailed thoughts. Below, we try to answer your
questions as best we can.

Ahmad Muhanna wrote:
> Hi Hidetoshi,
> 
> Looking one more time into the draft I found the following under section
> 4.1:
> 
> "
>    The encapsulation type for these user packets SHOULD follow that used
>    in the tunnel between the LMA and MAG (IPv6-in-IPv6 as specified in
>    [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in
>    [IPv4PMIPv6], TLV-header UDP tunneling as specified in [GREKEY] or
>    any new method defined in the future).
> "

The intention here is that the inter-MAG tunnel should support all the
encapsulation types that are mentioned in RFC5213.

> IMO, this is a very broad statement that underestimates its content. It
> is way underspecified how these tunneling protocols will be used to
> successfully map the traffic from the MAG-LMA tunnel to the MAG-MAG
> tunnel. In this regard, I have the following questions:
> 
> 1. Is it documented any where how this mapping would work for all of
> these tunneling/encapsulation mechanisms?

It seems that the mapping of these flows is rather implementation
specific. Is there anything that should be considered in addition to
RFC5568?

> 2. Is the tunneling mode (between the PMAG and the LMA)
> negotiated/communicated between the PMAG-MAGs?

If the tunneling mode is determined between the LMA and PMAG, which is
in the scope of RFC5213, that of the inter-MAG tunnel should follow it.
It is also assumed that the same type of tunneling will be used between
the LMA and NMAG.

> 3. If the tunneling between the PMAG-LMA is IPv6-in-IPv4-UDP, Does it
> mean the tunneling between the PMAG-NMAG is also going to use the same
> encapsulation?

Yes, that is the basic idea.

> 4. If the UDP tunneling between the two MAGs is not needed, what kind of
> tunneling will be used between the two MAGs to correctly map the MN
> traffic and successfully deliver it to the MN?

That mode has not been considered. It will be possible, but is there any
reason that a different type of tunneling should be used?

> 5. Do these tunneling mechanisms include plain GRE Encapsulation with
> GRE keys or only GRE with TLV-header UDP tunneling?

<draft-ietf-netlmm-grekey-option> supports both modes, so PFMIPv6 should
also support them.

> 5.1. If plain GRE encapsulation with keys is used, then the document
> needs to clearly specify if there are two sets of GRE keys for the same
> mobility session or only one set? i.e., GRE Keys between the PMAG-LMA,
> GRE Keys for PMAG-NMAG or one set is used. It is not clear in the
> current document.

PFMIPv6 describes only GRE keys for the inter-MAG tunnel (PMAG-NMAG),
which I think is clarified in Section 4.2. As far as GRE Key Option is
used, it is difficult to transport multiple sets of keys at one time.

> 5.2. same question as in 4, if there is GRE with TLV-header UDP
> tunneling between the PMAG and the LMA, Is that needed between the
> PMAG-NMAG? If NOT, what encapsulation mechanism is being used and how is
> the mapping works?

The working assumption is "yes".

> 6. Is the assumption here that the NMAG and the PMAG have the same
> transport with the LMA?

For the sake of simplicity, the answer should be "yes".
If not, the network between MAGs should provide the transparent
environment (e.g., by another tunneling).

> 7. with respect to "any new method defined in the future" what is the
> constraints on this statement? It seems to me an overstatement of the
> capabilities of this protocol and an underestimate of the future
> tunneling mechanism. May be you need to make sure that the wording is
> correct by having some conditional restrictions. 

The intention here is that if a new tunneling mechanism is specified for
 PMIPv6, PFMIPv6 should also support it. If this is too vague, it could
be removed.

> In addition,
> ============ 
> IMO and based on a quick review of this draft, I find it very vague and
> does not have the details for an Interoperable protocol. I believe the
> draft SHOULD CLEARLY address the following points:
> 
> Decide whether it needs to specify/support a single tunneling
> encapsulation mechanism between the PMAG-NMAG or more than one.
> 
> 
> SINGLE tunneling and encapsulation mechanism between PMAG-NMAG:
> ===============================================================
> 1. This *protocol* needs to specify the exact details of how this
> tunneling mechanism is dynamically established to address the nature of
> the problem being address in this *handover optimization protocol*.

The nature of the specification and its performance is based on RFC5568.
Whether the establishment of the tunneling mechanism is dynamic or
static is operation-specific.

> 1.1. for example, if GRE with Keys is being used, then it MUST be clear
> how the GRE keys are exchanged between the PMAG-NMGA, similar to PMIPv6.

The current text proposal for Section 4.2 tries to clarify it regarding
who selects the key and how it is transferred.

> 2. How the chosen PMAG-NMAG tunneling protocol is able to interwork with
> all tunneling mechanisms that are currently supported by PMIPv6, e.g.,
> IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc. between the PMAG-LMA
> as is being claimed under section 4.2 of this draft.

Basically, it is supposed that the same tunneling protocol as that
between the LMA and MAG is used. The tunneling type between the LMA and
MAG should be determined in advance.

> 3. This *protocol* needs to clearly specify how the different mobility
> sessions are being mapped between the PMAG-LMA tunneling to the
> PMAG-NMAG tunneling? Somewhat similar to 2 above.

The basic mechanism is the same as in RFC5568. If a GRE tunnel further
differentiates the session, the GRE key will be used.

> Multiple Tunneling and encapsulation mechanisms between the PMAG-NMAG:
> ======================================================================
> If the choice as being claimed under section 4.1, is to support all of
> the current tunneling mechanisms between PMAG-LMA on the PMAG-NMAG
> interface, then the protocol needs to address the following:
> 
> 1. Provide a good analysis why that option is the best option? What are
> the advantages and the disadvantages?

I think that is the most workable solution. Since the tunneling
mechanism selected for the PMIPv6 tunnel is supported by both the PMAG
and NMAG, no extra capability is required for the inter-MAG tunnel.
Also, I don't see any specific reason to use a special tunneling
mechanism for the inter-MAG tunnel.

> 2. How this *protocol* dynamically negotiates the tunneling mechanism
> type?

If the tunneling mechanism between the LMA and MAG is determined in
advance, the same mechanism is used for the inter-MAG tunnel. So, it is
not on-demand and no negotiation is assumed. If the tunneling mechanism
between the LMA and MAG is determined on demand, then that is a
different story...

> 3. How that should work, for example if the tunneling mechanism between
> the PMAG-LMA is IPv6 in IPv4 UDP, how that tunneling will be extended to
> go over the PMAG-NMAG interface and how it is supposed to work.

In this case, both the PMAG and NMAG should be dual-stack and the IP
addresses in the IPv4 outer header are those of the PMAG and NMAG. IPv6
inner header should be kept intact.

> Finally, the draft could have some restrictions and define the PMAG-NMAG
> tunneling/encapsulation mechanism and could define a set of PMAG-LMA
> tunneling mechanism that are being supported/interwork over the
> PMAG-NMAG tunneling/encapsulation.

What kind of restrictions do you foresee? Do you also have any specific
mechanism for the inter-MAG tunnel in mind?

> One more note: I found defining and describing a protocol based on a
> call flow, is not the most easy to follow. But, that could just be me.

What do you think could improve the readability of the document?

Regards,
-- 
Hidetoshi

> 
> Regards,
> Ahmad
>  
> 
>> -----Original Message-----
>> From: mipshop-bounces@ietf.org 
>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad 
>> (RICH1:2H10)
>> Sent: Thursday, September 17, 2009 9:23 PM
>> To: Hidetoshi Yokota
>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>>
>> Hi Hidetoshi,
>> Please see inline.
>>
>> Regards,
>> Ahmad
>>
>>> -----Original Message-----
>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
>>> Sent: Thursday, September 17, 2009 4:48 PM
>>> To: Muhanna, Ahmad (RICH1:2H10)
>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org; Jari Arkko
>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>>>
>>> Hi Ahmad,
>>>
>>> Here is the proposed revision:
>>>
>>> In Section 4.2:
>>>       [... message with the same sequence number.] The necessary
>>>    information MUST be transferred in the HI/HAck messages to
>>>    distinguish MN's packets for forwarding in advance or at 
>> this time.
>>>    Such information includes the MN ID and/or GRE key(s).  
>> Typically,
>>>    the NMAG selects the GRE key for the downlink packets 
>> and the PMAG
>>>    selects that for the uplink packets.  Each key is conveyed in 
>>> either
>>>    the HI or HAck message separately when GRE Key Option [GREKEY] is
>>>    used. [For the downlink ...]
>>>
>> [Ahmad]
>> In addition to what Vijay mentioned with respect to Typically 
>> (which should be removed), I believe the draft needs to be 
>> clear on the mechanism that is used for exchanging the GRE 
>> keys. When you say "...when the GRE Key Option [GREKEY] is 
>> used." What happens if the GRE key option is NOT used. Is 
>> there another mechanism?
>>
>> Since the GRE keys are necessary to establish the lateral 
>> tunnel and identify the MN traffic, the draft must specify a 
>> default mechanism.
>> Other mechanisms can be used or specified some where else if 
>> needed, but we need a default one here. Right?
>>
>> Also, you replaced the **HoA of the MN** with the **MN ID**. 
>> What is the reason for this change?
>> And how this should work NOW while you have ".. and/or GRE Keys"?
>>
>>> If the above description is acceptable, I will submit the revised 
>>> version by the end of the week.
>>>
>>> Regards,
>>> --
>>> Hidetoshi
>>>
>>> Ahmad Muhanna wrote:
>>>> Hi Hidetoshi,
>>>>
>>>>> -----Original Message-----
>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
>>>>> Sent: Monday, September 14, 2009 7:37 AM
>>>>> To: Muhanna, Ahmad (RICH1:2H10)
>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org; 
>> Jari Arkko
>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>>>>>
>>>>> Hi Ahmad,
>>>>>
>>>>> Thanks for your comment. I'm glad to hear an opinion from
>>> a GRE key
>>>>> expert. Please see inline:
>>>>>
>>>>> Ahmad Muhanna wrote:
>>>>>> Hi Hidetoshi,
>>>>>>
>>>>>> I just have one quick comment and question.
>>>>>>
>>>>>> Reading the draft, it seems to me that the GRE keys are
>>>>> somehow sent
>>>>>> from the NAR to PAR in the HI (section 4.2). Is that the
>>> case? This
>>>>>> means both the DL and UP GRE keys for the bilateral
>>> tunnels between
>>>>>> the two AR(s). Is my understanding correct? It also
>>>>> mentions that the
>>>>>> format
>>>>> In terms of the GRE keys for the bilateral tunnel, the working 
>>>>> assumption is that the DL key is selected by the NAR and
>>> the UL key
>>>>> is selected by the PAR. Depending on the fast handover 
>> mode, those 
>>>>> keys are transferred to the other MAG via either the HI or Hack.
>>>>>
>>>>>> of these keys are based on the GRE keys for PMIPv6 
>> draft (section 
>>>>>> 6.2.6).
>>>>> Correct.
>>>>>
>>>>>> It seems to me that there should be more text to define
>>> which keys
>>>>>> exchange in the HI and which in the HaCK
>>>>> If the above assumption works, I would like to add more 
>> text along 
>>>>> that line.
>>>> [Ahmad]
>>>> That is great. Please add some clarification text to
>>> clearly indicate
>>>> that only one key in the HI and the other in the HACK.
>>>> Since some specification in 3GPP2 depends on this draft, I
>>> appreciate
>>>> if you can publish an updated version before the end of the week. 
>>>> Thanks in advance!
>>>>
>>>>>> If both keys are exchanged in the same HI, How these keys are 
>>>>>> identified at the pAR?
>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key is included
>>>>> in the PBU
>>>>>> and the uplink GRE key in included in the PBA. They never
>>>>> exist in the
>>>>>> same message and that way there is no confusing.
>>>>> So far, each key is conveyed by either the HI or HAck. 
>>>>> However, I haven't explored all of the possibilities. If you can 
>>>>> think of any case that two keys must be conveyed in one message, 
>>>>> please let me know.
>>>> [Ahmad]
>>>> I do not see any reason for this case (one key per 
>> message) not to 
>>>> work for all implementation.
>>>>  
>>>>>> In addition, DL and UP GRE keys are generated by NAR and
>>>>> sent inside
>>>>>> the HI, my question: Is there any specific reason for 
>> the NAR to 
>>>>>> specify both GRE keys for the bilateral tunnels?
>>>>> It would be more problematic that the NAR determines the 
>> both keys 
>>>>> and I would rather like to avoid it.
>>>>>
>>>>>> Sorry for this comment to be so late but hope that you have
>>>>> the chance
>>>>>> to take a look at it.
>>>>> That's ok. The draft is under the review process. Your 
>> comment is 
>>>>> highly appreciated.
>>>>>
>>>>> Regards,
>>>>> --
>>>>> Hidetoshi
>>>>>
>>>>>
>>>>>> Thanks!
>>>>>>
>>>>>> Regards,
>>>>>> Ahmad
>>>>>>  
>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: mipshop-bounces@ietf.org
>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Hidetoshi Yokota
>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM
>>>>>>> To: Jari Arkko
>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
>>>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>>>>>>>
>>>>>>> Hi Jari,
>>>>>>>
>>>>>>> Thanks for your patience. The attached revised document is
>>>>> supposed to
>>>>>>> reflect the rest of your comments. Please also see inline,
>>>>> where the
>>>>>>> revised part is explained item by item. If there is no
>>> outstanding
>>>>>>> issue there, we will upload it shortly.
>>>>>>>
>>>>>>> [Apologize if you received it twice. Since the size just
>>>>> exceeded the
>>>>>>> limit of this ML, this mail is reposted without the 
>> attachment.]
>>>>>>> Hidetoshi Yokota wrote:
>>>>>>>> Hi Jari,
>>>>>>>>
>>>>>>>> Appreciate your detailed review. The editorial corrections
>>>>>>> are mostly
>>>>>>>> done and the revised version is attached to this mail. 
>>>>> Regarding the
>>>>>>>> technical comments, only the policies for the correction
>>>>>>> are listed for
>>>>>>>> now. The complete correction will be posted as soon as
>>>>>>> possible. Please
>>>>>>>> see inline for the responses to your questions and comments:
>>>>>>>>
>>>>>>>> Jari Arkko wrote:
>>>>>>>>> I have reviewed this document. It was generally in good
>>>>>>> shape and easy
>>>>>>>>> to read. I did find a number of issues though. Please
>>>>>>> discuss them with
>>>>>>>>> me on this thread and/or revise the draft accordingly.
>>>>>>>>>
>>>>>>>>> Technical:
>>>>>>>>>
>>>>>>>>> I do not understand the IP host aspects of the
>>> handover. For an
>>>>>>>>> unmodified host, what kind of interfaces exist on the
>>> host, what
>>>>>>>>> addresses they have, and at what time are interfaces
>>>>>>> removed or added? 
>>>>>>>>> Is this exactly the same as in RFC 5213, or does PFMIPv6
>>>>>>> introduce some
>>>>>>>>> change here?
>>>>>>>> The basic principle would be that this specification does
>>>>>>> not require
>>>>>>>> any additional IP-level function to the MN running in the
>>>>>>> PMIPv6 domain.
>>>>>>>> This MN should therefore be the same as defined in RFC5213.
>>>>>>>>
>>>>>>>> A typical network interface would be one with the
>>>>> cellular network,
>>>>>>>> where the network basically controls the movement of the
>>>>>>> MN. Different
>>>>>>>> types of interfaces could be involved such as different
>>>>>>> generations (3G
>>>>>>>> and 3.9G) or different radio access systems. Any type of
>>>>> IP address
>>>>>>>> could be assigned (IPv4/v6 or global/private), but the
>>>>>>> assigned address
>>>>>>>> must be preserved before and after the handover. PFMIPv6
>>>>>>> should be able
>>>>>>>> to handle the single radio situation, where only one
>>>>>>> interface is active
>>>>>>>> at any given time. This is a tougher situation in terms of
>>>>>>> packet loss
>>>>>>>> and delay.
>>>>>>>>
>>>>>>>>> I would like to see a new section on manageability
>>>>>>> considerations. For
>>>>>>>>> instance, Section 5 talks about some configuration issues. 
>>>>>>> These should
>>>>>>>>> be mentioned, and there should be a description of what
>>>>>>> the operator
>>>>>>>>> needs to configure in order to set up a PFMIPv6 network.
>>>>>>>> We will add a new section for manageability considerations
>>>>>>> to clarify
>>>>>>>> the above and to reflect your suggestion.
>>>>>>> A new subsection is added in Section 5 describing the
>>>>> above aspects:
>>>>>>> -------------------
>>>>>>> 5.  PMIPv6-related Fast Handover Issues
>>>>>>>
>>>>>>> 5.1.  Manageability Considerations
>>>>>>>
>>>>>>>    This specification does not require any additional IP-level
>>>>>>>    functionality on the LMA and the MN running in the PMIPv6 
>>>>>>> domain.  A
>>>>>>>    typical network interface that the MN could be
>>> assumed to have
>>>>>>> is one
>>>>>>>    with the cellular network, where the network controls the 
>>>>>>> movement of
>>>>>>>    the MN.  Different types of interfaces could be
>>> involved such as
>>>>>>>    different generations (3G and 3.9G) or different 
>> radio access
>>>>>>>    systems.  This specification supports a MN with the
>>> single radio
>>>>>>>    mode, where only one interface is active at any given
>>> time.  The
>>>>>>>    assigned IP address is preserved whether the physical
>>> interface
>>>>>>>    changes or not and the MN can identify which
>>> interface should be
>>>>>>> used
>>>>>>>    if there are multiple ones.
>>>>>>> --------------------
>>>>>>>
>>>>>>>
>>>>>>>>>> If the new router's interface is configured to respond to 
>>>>>>>>>> queries sent to link-layer addresses than its
>>>>>>> own (e.g.,
>>>>>>>>>> set to promiscuous mode), then it can respond to the
>>> NUD probe,
>>>>>>>>>> providing its link-layer address in the solicited Neighbor 
>>>>>>>>>> Advertisement.
>>>>>>>>> Is this according to RFC 5213? I seem to recall that RFC
>>>>>>> 5213 operated
>>>>>>>>> on the same link layer addresses.
>>>>>>>> I think your observation is correct... I'll check with the
>>>>>>> other authors
>>>>>>>> to see if it is ok to rewrite it.
>>>>>>> The new text doesn't mention the promiscuous mode and
>>>>> emphasizes the
>>>>>>> common link-layer address among all MAGs in the PMIPv6 domain:
>>>>>>>
>>>>>>> ---------------
>>>>>>> 5.2.  Expedited Packet Transmission
>>>>>>>
>>>>>>>    [...]
>>>>>>>
>>>>>>>    The protocol specified in this document is applicable
>>>>> regardless of
>>>>>>>    whether link-layer addresses are used between a MN and
>>>>> its access
>>>>>>>    router.  A MN should be able to continue sending
>>> packets on the
>>>>>>>    uplink even when it changes link.  When link-layer
>>> addresses are
>>>>>>>    used, the MN performs Neighbor Unreachability 
>> Detection (NUD)
>>>>>>>    [RFC4861], after attaching to a new link, probing the 
>>>>>>> reachability of
>>>>>>>    its default router.  The new router should respond 
>> to the NUD 
>>>>>>> probe,
>>>>>>>    providing its link-layer address in the solicited Neighbor
>>>>>>>    Advertisement, which is common in the PMIPv6 domain.  
>>>>>>> Implementations
>>>>>>>    should allow the MN to continue to send uplink packets
>>>>> while it is
>>>>>>>    performing NUD.
>>>>>>> ----------------
>>>>>>>
>>>>>>>>>> At least one mobility option MUST uniquely identify
>>> the target
>>>>>>>>>> MN (e.g., the Mobile Node
>>>>> Identifier
>>>>>>>>>> Option defined in RFC4283
>>>>>>> <http://tools.ietf.org/html/rfc4283>) and
>>>>>>>>>> the transferred context MUST be for one MN per message.
>>>>>>>>>>   
>>>>>>>>> I would like the required options to be specified in more
>>>>>>> detail. Which
>>>>>>>>> identity options are sufficient to satisfy the MUST?
>>>>>>>> The required option should be the MN Identifier in the
>>> Mobile Node
>>>>>>>> Identifier Option.
>>>>>>> The above description is added in Section 6.1.1:
>>>>>>>
>>>>>>> ---------
>>>>>>>    Requested option
>>>>>>>              In order to uniquely identify the target 
>> MN, the MN
>>>>>>>              Identifier MUST be contained in the Mobile Node 
>>>>>>> Identifier
>>>>>>>              Option.
>>>>>>> ---------
>>>>>>>
>>>>>>>>>> If a default set of context information is defined 
>> and always 
>>>>>>>>>> sufficient, this option is not mandatory.  This
>>>>>>> option is more
>>>>>>>>>> useful to retrieve additional or dynamically 
>> selected context 
>>>>>>>>>> information.
>>>>>>>>>>
>>>>>>>>>> Context Request Option is typically used for the
>>> reactive (NAR-
>>>>>>>>>> initiated) fast handover mode to retrieve the context
>>>>> information
>>>>>>>>>> from the PAR.  When this option is included in the HI
>>>>> message, all
>>>>>>>>>> the requested context information SHOULD be included
>>> in the HAck
>>>>>>>>>> message in the corresponding mobility option(s) (e.g.,
>>>>>>> HNP, LMAA or
>>>>>>>>>> MN-IID mobility options).
>>>>>>>>>>   
>>>>>>>>> Please specify what the default set of context
>>>>> information is, by
>>>>>>>>> listing the required options when the CRO is not present.
>>>>>>>> The default context information to request is the Home
>>>>>>> Network Prefix
>>>>>>>> Option. If the Mobile Node link-layer is available and
>>>>>>> used, the Mobile
>>>>>>>> Node Link-layer Identifier Option MUST also be requested. 
>>>>>>> With these two
>>>>>>>> options and the MN identifier, the NMAG can construct the PBU.
>>>>>>> The above description is added in Section 6.2.1:
>>>>>>>
>>>>>>> ----------
>>>>>>>    The default context information to request is the
>>> Home Network
>>>>>>> Prefix
>>>>>>>    Option.  If the Mobile Node link-layer is available and
>>>>> used, the
>>>>>>>    Mobile Node Link-layer Identifier Option MUST also be
>>> requested.
>>>>>>> ----------
>>>>>>>
>>>>>>>>> Editorial:
>>>>>>>>>
>>>>>>>>>>    HO-Initiate:
>>>>>>>>>>         A generic signaling message, sent from the P-AN
>>>>>>> to the PMAG that
>>>>>>>>>>         indicates a MN handover.  While this signaling is
>>>>>>> dependent on
>>>>>>>>>>         the access technology, it is assumed that
>>>>>>> HO-Initiate can carry
>>>>>>>>>>         the information to identify the MN and to
>>>>> assist the PMAG
>>>>>>>>>>         resolve the NMAG and the new access point or the
>>>>>>> base station to
>>>>>>>>>>         which the MN is moving to.  The details of this
>>>>>>> message are
>>>>>>>>>>         outside the scope of this document.
>>>>>>>>>>
>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview
>>>>>>>>> Section 4 would probably benefit from an additional
>>>>>>> paragraph at the
>>>>>>>>> beginning to explain what assumptions there exist about
>>>>>>> lower layer
>>>>>>>>> functionality.
>>>>>>>> Yes, the predictive fast handover relies on the lower layer 
>>>>>>>> functionality to trigger to send the HI. A new paragraph
>>>>>>> will be added
>>>>>>>> to clarify it.
>>>>>>> -------------
>>>>>>> 4.  Proxy-based FMIPv6 Protocol Overview
>>>>>>>
>>>>>>>    If the MAGs can be informed of the detachment and/or
>>>>> attachment of
>>>>>>>    the MN in a timely manner via e.g. the lower layer
>>> signaling, it
>>>>>>> will
>>>>>>>    become possible to optimize the handover procedure,
>>>>> which involves
>>>>>>>    establishing a connection on the new link and
>>> signaling between
>>>>>>>    mobility agents, compared to the baseline specification
>>>>> of PMIPv6.
>>>>>>>   [...]
>>>>>>> -------------
>>>>>>>
>>>>>>> All the other corrections pointed out below have also been 
>>>>>>> reflected in the revised document.
>>>>>>>
>>>>>>> Regards,
>>>>>>> --
>>>>>>> Hidetoshi
>>>>>>>
>>>>>>>>>> A new flag 'P' is defined for the HI and HAck messages to 
>>>>>>>>>> distinguish from those in [RFC5268bis
>>>>>>>>>>
>>>>>>> <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref-
>>>>>>> RFC5268bis>]
>>>>>>>>>> and thus MUST
>>>>>>>>>> be set in the entire document.
>>>>>>>>>>   
>>>>>>>>> This would be more readable as " ... those in
>>>>>>> [RFC5268bis]. This flag
>>>>>>>>> MUST be ..."
>>>>>>>> Revised.
>>>>>>>>
>>>>>>>>>>    and the NAR creates a proxy NCE to receive those
>>>>>>> packets for the NCoA
>>>>>>>>> The term NCE has not been introduced at this stage yet.
>>>>>>>> Spelled out as "Neighbor Cache Entry".
>>>>>>>>
>>>>>>>>>>    address that is used by the MN is MN-HoA.  Hence the
>>>>>>> PAR forwards
>>>>>>>>> The term MN-HOA has not been introduced before.
>>>>>>>> Added the unabbreviated form "Mobile Node's Home Address" 
>>>>> before it.
>>>>>>>>>>         The access network to which the MN is attached
>>>>>>> after handover.
>>>>>>>>> New term MN, not introduced before.
>>>>>>>>>
>>>>>>>> Added "Mobile Node" before it.
>>>>>>>>
>>>>>>>>>> specifies forwarding when the MN uses HoA as its
>>> on-link address
>>>>>>>>> New term HoA...
>>>>>>>> Changed to "Home Address".
>>>>>>>>
>>>>>>>>>>    as MN's NAI, Home Network Prefix (HNP), IPv4 Home
>>>>> Address, are
>>>>>>>>> New term NAI...
>>>>>>>> Added "Network Access Identifier" before it.
>>>>>>>>
>>>>>>>>>>         flag set and include the MN ID, the MN-HNP, the
>>>>>>> MN-IID and the
>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not
>>>>>>> appear in their
>>>>>>>>> MN-XXX form before this point).
>>>>>>>> Modified "MN-HNP" to "HNP" for consistency.
>>>>>>>>
>>>>>>>>>>         Inner destination address: HNP or IPv4-MN-HoA
>>>>>>>>> IPv4-MN-HoA not defined earlier...
>>>>>>>> Added "Mobile Node's IPv4 Home" before it.
>>>>>>>>
>>>>>>>>>>    between the PCoA and NCoA to forward packets for the
>>>>>>> MN to the NAR,
>>>>>>>>> New terms PCoA and NCoA... there's probably more undefined
>>>>>>> terms in the
>>>>>>>>> document, please check!
>>>>>>>> Added "Previous Care-of Address" and "New Care-of Address". 
>>>>>>> Will read
>>>>>>>> through it to see if there is any other undefined acronym.
>>>>>>>>
>>>>>>>>>>    In (i),
>>>>>>>>> In Step (i),
>>>>>>>> Revised including other parts.
>>>>>>>>
>>>>>>>>>>           |(MN ID, Old AP ID) |     (MN ID, Old AP ID)    
>>>>>>>  |        |
>>>>>>>>> Old AP ID? AN ID? AR ID?
>>>>>>>> AP ID stands for "Access Point Identifier", which is
>>>>>>> defined in RFC5568.
>>>>>>>> Added the unabbreviated form and citation.
>>>>>>>>
>>>>>>>> The rest of the part will be revised soon.
>>>>>>>>
>>>>>>>> Regards,
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>> --------------------------------------------------------------
>>>>>>> ----------
>>>>>>>> _______________________________________________
>>>>>>>> Mipshop mailing list
>>>>>>>> Mipshop@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
>>>>>>> _______________________________________________
>>>>>>> Mipshop mailing list
>>>>>>> Mipshop@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
>>>>>>>
>>>>>>
>>>>
>>>>
>>> --
>>> Hidetoshi Yokota
>>>
>>> Mobile Network Lab
>>> KDDI R&D Laboratories, Inc.
>>> e-mail:yokota@kddilabs.jp
>>>
>>>
>> _______________________________________________
>> Mipshop mailing list
>> Mipshop@ietf.org
>> https://www.ietf.org/mailman/listinfo/mipshop
>>
> 
> 
>