Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6

Frank Xia <xiayangsong@huawei.com> Thu, 24 September 2009 15:50 UTC

Return-Path: <xiayangsong@huawei.com>
X-Original-To: mipshop@core3.amsl.com
Delivered-To: mipshop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 495A53A6915 for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 08:50:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, STOX_REPLY_TYPE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IdSgAeRxv3h2 for <mipshop@core3.amsl.com>; Thu, 24 Sep 2009 08:50:09 -0700 (PDT)
Received: from usaga02-in.huawei.com (usaga02-in.huawei.com [206.16.17.70]) by core3.amsl.com (Postfix) with ESMTP id BB4F03A63D3 for <mipshop@ietf.org>; Thu, 24 Sep 2009 08:50:09 -0700 (PDT)
Received: from huawei.com (localhost [127.0.0.1]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQH00BJ1G1HOB@usaga02-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 08:51:18 -0700 (PDT)
Received: from X24512z ([10.124.12.62]) by usaga02-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQH009LVG1GVG@usaga02-in.huawei.com> for mipshop@ietf.org; Thu, 24 Sep 2009 08:51:16 -0700 (PDT)
Date: Thu, 24 Sep 2009 10:51:15 -0500
From: Frank Xia <xiayangsong@huawei.com>
To: Ahmad Muhanna <amuhanna@nortel.com>, Hidetoshi Yokota <yokota@kddilabs.jp>
Message-id: <009001ca3d2e$d9d0a500$3e0c7c0a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Outlook Express 6.00.2900.3598
Content-type: text/plain; format="flowed"; charset="iso-8859-1"; reply-type="original"
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal
References: <4A93F739.5050006@piuha.net> <4A97EEAB.9070606@kddilabs.jp> <4A9F4222.8070107@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2025022D@zrc2hxm0.corp.nortel.com> <4AAE38F6.2010600@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E2038AF1D@zrc2hxm0.corp.nortel.com> <4AB2AE87.6030801@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E204B8C6F@zrc2hxm0.corp.nortel.com> <C5A96676FCD00745B64AE42D5FCC9B6E2050008C@zrc2hxm0.corp.nortel.com> <4AB8CF19.70905@kddilabs.jp> <C5A96676FCD00745B64AE42D5FCC9B6E20597C0A@zrc2hxm0.corp.nortel.com> <4D35478224365146822AE9E3AD4A26660C18B2AC$0001@exchtewks3.starentnetworks.com> <4ABB2DC8.4050906@kddilabs.jp> <001f01ca3d21$da22f6a0$3e0c7c0a@china.huawei.com> <C5A96676FCD00745B64AE42D5FCC9B6E205D8D28@zrc2hxm0.corp.nortel.com>
Cc: Mipshop <mipshop@ietf.org>, draft-ietf-mipshop-pfmipv6@tools.ietf.org
Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
X-BeenThere: mipshop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <mipshop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mipshop>
List-Post: <mailto:mipshop@ietf.org>
List-Help: <mailto:mipshop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mipshop>, <mailto:mipshop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Sep 2009 15:50:13 -0000

Hi Ahmad

I thought Hidetoshi had a good summary of
you comments.  Could you give me a brief
information of your concerns? because I have
similar understanding as Hidetoshi.

BR
Frank

----- Original Message ----- 
From: "Ahmad Muhanna" <amuhanna@nortel.com>
To: "Frank Xia" <xiayangsong@huawei.com>; "Hidetoshi Yokota" 
<yokota@kddilabs.jp>
Cc: "Mipshop" <mipshop@ietf.org>; 
<draft-ietf-mipshop-pfmipv6@tools.ietf.org>
Sent: Thursday, September 24, 2009 9:31 AM
Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6


Hi Frank,
Please see my latest response to Hidetoshi.

Regards,
Ahmad


> -----Original Message-----
> From: Frank Xia [mailto:xiayangsong@huawei.com]
> Sent: Thursday, September 24, 2009 7:18 AM
> To: Hidetoshi Yokota; Koodli, Rajeev; Muhanna, Ahmad (RICH1:2H10)
> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>
> Hi  Ahmad, Hidetoshi, and Rajeev
>
> I have followed the discussion, and agreed with Rajeev's proposal.
>
> BR
> Frank
>
> ----- Original Message -----
> From: "Hidetoshi Yokota" <yokota@kddilabs.jp>
> To: "Koodli, Rajeev" <rkoodli@starentnetworks.com>
> Cc: "Mipshop" <mipshop@ietf.org>;
> <draft-ietf-mipshop-pfmipv6@tools.ietf.org>
> Sent: Thursday, September 24, 2009 3:28 AM
> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
>
>
> > Hi Rajeev and Ahmad,
> >
> > Thanks Rajeev for your input. It seems that all of the
> questions and
> > ambiguity pointed out by Ahmad lead to one issue: PMIPv6 defines
> > multiple encapsulation methods; therefore the inter-MAG tunnel must
> > specify which method should be used. If Rajeev's input is
> acceptable.
> > I'll come up with some text along that line.
> >
> > Regards,
> > --
> > Hidetoshi
> >
> > Koodli, Rajeev wrote:
> >>
> >> Hi Ahmad,
> >>
> >> Let me see if I could understand your concern.
> >>
> >> RFC 5568 assumes that tunneling is IPv6-in-IPv6 based on RFC 3775.
> >> So, it does not need to specify how/which encapsulation
> mode is used.
> >>
> >> PFMIP6, on the other hand, is for PMIP6 which does support
> multiple
> >> encapsulation modes. Hence, PFMIP6 needs to specify how/which
> >> encapsulation mode is used. Is this right?
> >>
> >> If so, here is my input. PFMIP6 must state what
> encapsulation modes
> >> MUST be supported. The encapsulation modes should be configurable.
> >> Which particular mode is used is dependent on the particular
> >> deployment. There must be text stating that deployments MUST
> >> configure the encapsulation modes on MAGs to be the same,
> and it is
> >> recommended to use the same encapsulation modes as in MAG-LMA
> >> communication whenever feasible for operational uniformity. If the
> >> deployments fail to configure the encapsulation modes to
> be the same
> >> across all MAGs, then the protocol will not work correctly.
> >>
> >> How does this sound?
> >>
> >> Regards,
> >>
> >> -Rajeev
> >>
> >>
> >>> -----Original Message-----
> >>> From: Ahmad Muhanna [mailto:amuhanna@nortel.com]
> >>> Sent: Tuesday, September 22, 2009 10:58 PM
> >>> To: Hidetoshi Yokota
> >>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> >>> Subject: RE: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >>>
> >>> Hi Hidetoshi,
> >>>
> >>> Thanks for your thoughts on this.
> >>> I expected a little more serious ones:), but please see
> some more of
> >>> the same thoughts inline! :)
> >>>
> >>> Regards,
> >>> Ahmad
> >>>> -----Original Message-----
> >>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> >>>> Sent: Tuesday, September 22, 2009 6:20 AM
> >>>> To: Muhanna, Ahmad (RICH1:2H10)
> >>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> >>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >>>>
> >>>> Hi Ahmad,
> >>>>
> >>>> Thanks for your detailed thoughts. Below, we try to answer your
> >>>> questions as best we can.
> >>>>
> >>>> Ahmad Muhanna wrote:
> >>>>> Hi Hidetoshi,
> >>>>>
> >>>>> Looking one more time into the draft I found the
> following under
> >>>>> section
> >>>>> 4.1:
> >>>>>
> >>>>> "
> >>>>>    The encapsulation type for these user packets SHOULD
> >>>> follow that used
> >>>>>    in the tunnel between the LMA and MAG (IPv6-in-IPv6 as
> >>>> specified in
> >>>>>    [RFC2473], IPv6-in-IPv4, IPv6-in-IPv4-UDP as specified in
> >>>>>    [IPv4PMIPv6], TLV-header UDP tunneling as specified in
> >>>> [GREKEY] or
> >>>>>    any new method defined in the future).
> >>>>> "
> >>>> The intention here is that the inter-MAG tunnel should
> >>> support all the
> >>>> encapsulation types that are mentioned in RFC5213.
> >>> [Ahmad]
> >>> Well, whatever it is this document supports, it needs to make it
> >>> clear and ensure that it works. My question is the
> >>> following: Does this document support ONLY IPv6-in-IPv6 tunneling
> >>> between the MAG and the LMA? or it also supports the different
> >>> tunneling that the document claims to support as quoted above?
> >>>
> >>> If it only supports IPv6-in-IPv6, this document MUST
> document that
> >>> clearly. On the other hand, if it supports the above listed
> >>> tunneling protocols, it MUST document how forwarding
> these packets
> >>> over the inter-MAG tunnel works.
> >>>
> >>>>> IMO, this is a very broad statement that underestimates its
> >>>> content.
> >>>>> It is way underspecified how these tunneling protocols will
> >>>> be used to
> >>>>> successfully map the traffic from the MAG-LMA tunnel to
> >>> the MAG-MAG
> >>>>> tunnel. In this regard, I have the following questions:
> >>>>>
> >>>>> 1. Is it documented any where how this mapping would work
> >>>> for all of
> >>>>> these tunneling/encapsulation mechanisms?
> >>>> It seems that the mapping of these flows is rather
> implementation
> >>>> specific. Is there anything that should be considered in
> >>> addition to
> >>>> RFC5568?
> >>> [Ahmad]
> >>> Of course. I guess you need to get out of the mode that this
> >>> document is nothing but few tweaks to make FMIP6 works
> for PMIPv6.
> >>> In RFC5568, it clearly assumes that protocol is used for fast
> >>> handover when IP Mobility based on MIP6 as described in
> RFC3775. In
> >>> that sense, only IPv6-in-IPv6 is assumed.
> >>>
> >>> Again, the above claim of supporting all these tunneling
> mechanisms
> >>> should either be removed and clearly document that this protocol
> >>> works ONLY when the tunneling between the MAG and LMA is
> >>> IPv6-in-IPv6 or explain how they will work.....
> >>>
> >>>>> 2. Is the tunneling mode (between the PMAG and the LMA)
> >>>>> negotiated/communicated between the PMAG-MAGs?
> >>>> If the tunneling mode is determined between the LMA and
> >>> PMAG, which is
> >>>> in the scope of RFC5213, that of the inter-MAG tunnel
> should follow
> >>>> it.
> >>>> It is also assumed that the same type of tunneling will be used
> >>>> between the LMA and NMAG.
> >>> [Ahmad]
> >>> Sure, but your document claim that it supports all of these
> >>> tunneling mechanisms (as per the quoted text from section
> >>> 4.1) and at the same time documents nothing about how
> these should
> >>> work across the inter-MAG tunnel.
> >>>
> >>>>> 3. If the tunneling between the PMAG-LMA is
> >>>> IPv6-in-IPv4-UDP, Does it
> >>>>> mean the tunneling between the PMAG-NMAG is also going to
> >>>> use the same
> >>>>> encapsulation?
> >>>> Yes, that is the basic idea.
> >>> [Ahmad]
> >>> Good. Then How that should work?
> >>> Is there anything in your document which specify that? I am all
> >>> ears, just point me to the text.
> >>>
> >>>>> 4. If the UDP tunneling between the two MAGs is not needed,
> >>>> what kind
> >>>>> of tunneling will be used between the two MAGs to correctly
> >>>> map the MN
> >>>>> traffic and successfully deliver it to the MN?
> >>>> That mode has not been considered. It will be possible, but
> >>> is there
> >>>> any reason that a different type of tunneling should be used?
> >>> [Ahmad]
> >>> I am not suggesting to use a different tunneling
> mechanism between
> >>> the PMAG and the NMAG; However, You are saying that, e.g.,
> >>> IPv6-in-IPv4-UDP is naturally extended over the PMAG-NMAG tunnel
> >>> without saying how it should work. That what I was
> speculating that
> >>> you probably use a specific tunneling, of course, other than
> >>> IPv6-in-IPv6 to make it work.
> >>>
> >>> So, again, if PMAG-NMAG interface does support all these
> tunneling
> >>> mechanisms, then we need to know how it works? That is all.
> >>>
> >>>>> 5. Do these tunneling mechanisms include plain GRE
> >>>> Encapsulation with
> >>>>> GRE keys or only GRE with TLV-header UDP tunneling?
> >>>> <draft-ietf-netlmm-grekey-option> supports both modes, so
> >>>> PFMIPv6 should also support them.
> >>> [Ahmad]
> >>> That is a clear answer. Thanks.
> >>> Could you please make sure that your document clarify and clearly
> >>> document it.
> >>>
> >>>>> 5.1. If plain GRE encapsulation with keys is used, then the
> >>>> document
> >>>>> needs to clearly specify if there are two sets of GRE
> >>> keys for the
> >>>>> same mobility session or only one set? i.e., GRE Keys
> between the
> >>>>> PMAG-LMA, GRE Keys for PMAG-NMAG or one set is used. It is
> >>>> not clear
> >>>>> in the current document.
> >>>> PFMIPv6 describes only GRE keys for the inter-MAG tunnel
> >>> (PMAG-NMAG),
> >>>> which I think is clarified in Section 4.2. As far as GRE
> >>> Key Option is
> >>>> used, it is difficult to transport multiple sets of keys at
> >>> one time.
> >>> [Ahmad]
> >>> Well,
> >>> 1. It is not clarified nor clear under section 4.2. but,
> could you
> >>> please point me to the text you are talking about?
> >>> 2. As far as of multiple GRE keys exchange, currently that is a
> >>> limitation of the PMIPv6 protocol. Right? Then, when you need
> >>> multiple GRE keys, how these GRE keys are communicated?
> >>> Is that explained in the document?
> >>>
> >>>>> 5.2. same question as in 4, if there is GRE with TLV-header UDP
> >>>>> tunneling between the PMAG and the LMA, Is that needed
> >>> between the
> >>>>> PMAG-NMAG? If NOT, what encapsulation mechanism is being
> >>>> used and how
> >>>>> is the mapping works?
> >>>> The working assumption is "yes".
> >>> [Ahmad]
> >>> That is a huge CLAIM that is NOT backed by any technical
> data! How
> >>> that should work? Can you document that some where in the
> >>> specification? If it is already document, please point me to the
> >>> text.
> >>>
> >>>>> 6. Is the assumption here that the NMAG and the PMAG have
> >>> the same
> >>>>> transport with the LMA?
> >>>> For the sake of simplicity, the answer should be "yes".
> >>>> If not, the network between MAGs should provide the transparent
> >>>> environment (e.g., by another tunneling).
> >>>>
> >>>>> 7. with respect to "any new method defined in the future"
> >>>> what is the
> >>>>> constraints on this statement? It seems to me an
> >>>> overstatement of the
> >>>>> capabilities of this protocol and an underestimate of
> the future
> >>>>> tunneling mechanism. May be you need to make sure that the
> >>>> wording is
> >>>>> correct by having some conditional restrictions.
> >>>> The intention here is that if a new tunneling mechanism is
> >>> specified
> >>>> for  PMIPv6, PFMIPv6 should also support it. If this is too
> >>> vague, it
> >>>> could be removed.
> >>> [Ahmad]
> >>> Sure, please remove it. Unless, you propose a dynamic tunneling
> >>> mechanism that is forward compatible and capable to
> address future
> >>> tunneling between the PMAG and LMA.
> >>>
> >>>>> In addition,
> >>>>> ============
> >>>>> IMO and based on a quick review of this draft, I find it
> >>> very vague
> >>>>> and does not have the details for an Interoperable
> >>>> protocol. I believe
> >>>>> the draft SHOULD CLEARLY address the following points:
> >>>>>
> >>>>> Decide whether it needs to specify/support a single tunneling
> >>>>> encapsulation mechanism between the PMAG-NMAG or more than one.
> >>>>>
> >>>>>
> >>>>> SINGLE tunneling and encapsulation mechanism between PMAG-NMAG:
> >>>>> ===============================================================
> >>>>> 1. This *protocol* needs to specify the exact details
> of how this
> >>>>> tunneling mechanism is dynamically established to address
> >>>> the nature
> >>>>> of the problem being address in this *handover optimization
> >>>> protocol*.
> >>>>
> >>>> The nature of the specification and its performance is based on
> >>>> RFC5568.
> >>> [Ahmad]
> >>> That is part of the problem not to be sited here as a supporting
> >>> argument!
> >>> As I said earlier, RFC5568 assumes that there is always
> >>> IPv6-in-IPv6 tunneling between the mobile node and the
> home agent.
> >>> In the case of
> >>> PMIPv6 that assumption is INVALID.
> >>>
> >>>> Whether the establishment of the tunneling mechanism is
> dynamic or
> >>>> static is operation-specific.
> >>> [Ahmad]
> >>> That is NOT true. This document is supposedly offering a fast
> >>> handover mechanism for PMIPv6 which dynamically does
> (implicitly or
> >>> explicitly) negotiates tunneling between the MAG and the LMA. So,
> >>> how a statically configured tunnel between the PMAG and the NMAG
> >>> tunnels a mobile node traffics when the mobile node
> traffic between
> >>> the PMAG and LMA for the same mobile node was dynamically
> >>> negotiated?
> >>>
> >>>
> >>>>> 1.1. for example, if GRE with Keys is being used, then
> it MUST be
> >>>>> clear how the GRE keys are exchanged between the PMAG-NMGA,
> >>>> similar to PMIPv6.
> >>>>
> >>>> The current text proposal for Section 4.2 tries to clarify it
> >>>> regarding who selects the key and how it is transferred.
> >>> [Ahmad]
> >>> Hmmm.. Tries to clarify ... I guess we need a clear specification
> >>> that documents an Interoperable solution. We can not just
> propose a
> >>> standard track document that is some what clear in the
> mind of some.
> >>> Right?
> >>>
> >>>>> 2. How the chosen PMAG-NMAG tunneling protocol is able to
> >>> interwork
> >>>>> with all tunneling mechanisms that are currently supported
> >>>> by PMIPv6,
> >>>>> e.g., IPv6-in-IPv6, IPv6-in-IPv4, IPv6-in-IPv4 UDP, etc.
> >>>> between the
> >>>>> PMAG-LMA as is being claimed under section 4.2 of this draft.
> >>>> Basically, it is supposed that the same tunneling
> protocol as that
> >>>> between the LMA and MAG is used. The tunneling type
> between the LMA
> >>>> and MAG should be determined in advance.
> >>> [Ahmad]
> >>> I guess this answer is more confusing .... One time you said that
> >>> the tunnel can be static and can be dynamic. Now, you
> just said that
> >>> the tunnel should be STATIC? I mean what is it? It needs
> >>> clarification......
> >>>
> >>>
> >>>>> 3. This *protocol* needs to clearly specify how the
> >>>> different mobility
> >>>>> sessions are being mapped between the PMAG-LMA tunneling to the
> >>>>> PMAG-NMAG tunneling? Somewhat similar to 2 above.
> >>>> The basic mechanism is the same as in RFC5568.
> >>> [Ahmad]
> >>> Again, in the case of RFC5568 it is straight forward. Only
> >>> IPv6-in-IPv6 is supported as per RFC3775. Not the case for PMIPv6.
> >>>
> >>>> If a GRE
> >>>> tunnel further differentiates the session, the GRE key
> will be used.
> >>> [Ahmad]
> >>> Good. Which GRE Key then?
> >>> 1. Is that a statically configured GRE key?
> >>> 2. Is it the same set of GRE keys between the PMAG and LMA?
> >>> 3. If none of the above, how these GRE keys are generated and
> >>> exchanged between the PMAG and the NMAG?
> >>>
> >>>>> Multiple Tunneling and encapsulation mechanisms between the
> >>>> PMAG-NMAG:
> >>>
> ====================================================================
> >>> ==
> >>>>> If the choice as being claimed under section 4.1, is to
> >>>> support all of
> >>>>> the current tunneling mechanisms between PMAG-LMA on the
> >>> PMAG-NMAG
> >>>>> interface, then the protocol needs to address the following:
> >>>>>
> >>>>> 1. Provide a good analysis why that option is the best
> >>> option? What
> >>>>> are the advantages and the disadvantages?
> >>>> I think that is the most workable solution.
> >>> {Ahmad]
> >>> What do you have to technically back up this statement.
> >>> Otherwise, it is just another statement.
> >>>
> >>>> Since the
> >>>> tunneling mechanism selected for the PMIPv6 tunnel is
> supported by
> >>>> both the PMAG and NMAG, no extra capability is required for the
> >>>> inter-MAG tunnel.
> >>> [Ahmad]
> >>> OK. I am not disputing that the PMAG and the NMAG
> supports the same
> >>> sets of tunneling mechanisms or not. It is more of which
> tunnel to
> >>> use for which mobile node session and what parameter is
> needed for
> >>> this inter-MAG tunnel to correctly tunnel the mobile node traffic
> >>> and deliver it to the end of the tunnel in a non ambiguous way.
> >>>
> >>> For example:
> >>> Tunneling Case 1:
> >>> =================
> >>> 1. PMAG and the LMA negotiates the GRE encapsulation and the GRE
> >>> keys using the PBU and PBA for each applicable mobility session.
> >>> 2. It is very well understood that both the PMAG and the NMAG
> >>> support GRE tunneling with GRE keys + GRE keys exchange using
> >>> PMIPv6 signaling with the LMA.
> >>> 3. Now: for the inter-MAG tunnel and for the same
> mobility session,
> >>> how GRE tunneling and GRE keys are negotiated between the
> PMAG and
> >>> NMAG? Of course, using HI and HAck, right?
> >>> 4. Okay, we need the exact details for this specific case.
> >>>
> >>> Tunneling Case 2:
> >>> =================
> >>> 1. Let us assume IPv6-in-IPv4 UDP is used for MN1. Okay 2.
> >>> That tunneling is implicitly negotiated between the PMAG and LMA
> >>> during the PBU/PBA exchange, right?
> >>> 3. How that is negotiated between the PMAG and the NMAG?
> We need the
> >>> details..
> >>>
> >>> And so on....
> >>>
> >>>> Also, I don't see any specific reason to use a special tunneling
> >>>> mechanism for the inter-MAG tunnel.
> >>> [Ahmad]
> >>> Good. This means you would use the same tunneling between
> the PMAG
> >>> and LMA over inter-MAG tunneling. In this case, we need
> the details
> >>> for negotiating that tunneling mechanism between the PMAG and the
> >>> NMAG.
> >>>
> >>>>> 2. How this *protocol* dynamically negotiates the tunneling
> >>>> mechanism
> >>>>> type?
> >>>> If the tunneling mechanism between the LMA and MAG is
> determined in
> >>>> advance, the same mechanism is used for the inter-MAG
> >>> tunnel. So, it
> >>>> is not on-demand and no negotiation is assumed. If the tunneling
> >>>> mechanism between the LMA and MAG is determined on demand,
> >>> then that
> >>>> is a different story...
> >>> [Ahmad]
> >>> Well, what do you mean? The tunneling between the PMAG
> and the LMA
> >>> is NOT on demand?
> >>> I believe IPv4 support for PMIPv6 and GRE key for PMIPv6
> drafts will
> >>> be helpful in answering this question.
> >>>
> >>>>> 3. How that should work, for example if the tunneling mechanism
> >>>>> between the PMAG-LMA is IPv6 in IPv4 UDP, how that
> >>>> tunneling will be
> >>>>> extended to go over the PMAG-NMAG interface and how it is
> >>>> supposed to work.
> >>>>
> >>>> In this case, both the PMAG and NMAG should be dual-stack
> >>> and the IP
> >>>> addresses in the IPv4 outer header are those of the PMAG
> and NMAG.
> >>>> IPv6 inner header should be kept intact.
> >>>>
> >>> Okay..... Then if the NMAG sends the first packet over
> the NMAG-PMAG
> >>> tunnel! Which encapsulation mechanism is going to use to
> encapsulate
> >>> that packet?
> >>>
> >>> Also, Do you agree that there is a specific reason for
> the traffic
> >>> between the PMAG and the LMA to be IPv6-in-IPv4-UDP.
> >>> Right? That reason may NOT be VALID between the PMAG and
> the NMAG.
> >>> Right?
> >>> Then why to use the same tunneling here? Just out of curiosity!
> >>>
> >>>>> Finally, the draft could have some restrictions and define the
> >>>>> PMAG-NMAG tunneling/encapsulation mechanism and could
> >>>> define a set of
> >>>>> PMAG-LMA tunneling mechanism that are being
> >>>> supported/interwork over
> >>>>> the PMAG-NMAG tunneling/encapsulation.
> >>>> What kind of restrictions do you foresee? Do you also have any
> >>>> specific mechanism for the inter-MAG tunnel in mind?
> >>> [Ahmad]
> >>> I guess, you need to answer many of the above comments before we
> >>> talk about this. A clear understanding of this tunneling
> is needed
> >>> and I do not see it documented in this draft.
> >>>
> >>> BTW: Under section 4, this specification says:
> >>>
> >>> "
> >>>    In order to further improve the performance during the
> handover,
> >>> the
> >>>    PFMIPv6 protocol in this document specifies a
> bi-directional tunnel
> >>>    between the Previous MAG (PMAG) and the New MAG (NMAG)
> to tunnel
> >>>    packets meant for the mobile node.
> >>> "
> >>>
> >>> Which bi-directional tunnel? Where? What are the details?
> >>>
> >>>>> One more note: I found defining and describing a protocol
> >>>> based on a
> >>>>> call flow, is not the most easy to follow. But, that could
> >>>> just be me.
> >>>>
> >>>> What do you think could improve the readability of the document?
> >>> [Ahmad]
> >>> Quite some of them... But I gave up after a while....
> >>>
> >>>> Regards,
> >>>> --
> >>>> Hidetoshi
> >>>>
> >>>>> Regards,
> >>>>> Ahmad
> >>>>>
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: mipshop-bounces@ietf.org
> >>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of Muhanna, Ahmad
> >>>>>> (RICH1:2H10)
> >>>>>> Sent: Thursday, September 17, 2009 9:23 PM
> >>>>>> To: Hidetoshi Yokota
> >>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> >>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >>>>>>
> >>>>>> Hi Hidetoshi,
> >>>>>> Please see inline.
> >>>>>>
> >>>>>> Regards,
> >>>>>> Ahmad
> >>>>>>
> >>>>>>> -----Original Message-----
> >>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> >>>>>>> Sent: Thursday, September 17, 2009 4:48 PM
> >>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> >>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> >>> Jari Arkko
> >>>>>>> Subject: Re: [Mipshop] AD review of draft-ietf-mipshop-pfmipv6
> >>>>>>>
> >>>>>>> Hi Ahmad,
> >>>>>>>
> >>>>>>> Here is the proposed revision:
> >>>>>>>
> >>>>>>> In Section 4.2:
> >>>>>>>       [... message with the same sequence number.]
> The necessary
> >>>>>>>    information MUST be transferred in the HI/HAck messages to
> >>>>>>>    distinguish MN's packets for forwarding in advance or at
> >>>>>> this time.
> >>>>>>>    Such information includes the MN ID and/or GRE key(s).
> >>>>>> Typically,
> >>>>>>>    the NMAG selects the GRE key for the downlink packets
> >>>>>> and the PMAG
> >>>>>>>    selects that for the uplink packets.  Each key is
> >>> conveyed in
> >>>>>>> either
> >>>>>>>    the HI or HAck message separately when GRE Key Option
> >>>> [GREKEY] is
> >>>>>>>    used. [For the downlink ...]
> >>>>>>>
> >>>>>> [Ahmad]
> >>>>>> In addition to what Vijay mentioned with respect to
> >>>> Typically (which
> >>>>>> should be removed), I believe the draft needs to be
> clear on the
> >>>>>> mechanism that is used for exchanging the GRE keys.
> When you say
> >>>>>> "...when the GRE Key Option [GREKEY] is used." What
> >>> happens if the
> >>>>>> GRE key option is NOT used. Is there another mechanism?
> >>>>>>
> >>>>>> Since the GRE keys are necessary to establish the lateral
> >>>> tunnel and
> >>>>>> identify the MN traffic, the draft must specify a default
> >>>> mechanism.
> >>>>>> Other mechanisms can be used or specified some where else
> >>>> if needed,
> >>>>>> but we need a default one here. Right?
> >>>>>>
> >>>>>> Also, you replaced the **HoA of the MN** with the **MN ID**.
> >>>>>> What is the reason for this change?
> >>>>>> And how this should work NOW while you have ".. and/or
> GRE Keys"?
> >>>>>>
> >>>>>>> If the above description is acceptable, I will submit
> >>> the revised
> >>>>>>> version by the end of the week.
> >>>>>>>
> >>>>>>> Regards,
> >>>>>>> --
> >>>>>>> Hidetoshi
> >>>>>>>
> >>>>>>> Ahmad Muhanna wrote:
> >>>>>>>> Hi Hidetoshi,
> >>>>>>>>
> >>>>>>>>> -----Original Message-----
> >>>>>>>>> From: Hidetoshi Yokota [mailto:yokota@kddilabs.jp]
> >>>>>>>>> Sent: Monday, September 14, 2009 7:37 AM
> >>>>>>>>> To: Muhanna, Ahmad (RICH1:2H10)
> >>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org;
> >>>>>> Jari Arkko
> >>>>>>>>> Subject: Re: [Mipshop] AD review of
> draft-ietf-mipshop-pfmipv6
> >>>>>>>>>
> >>>>>>>>> Hi Ahmad,
> >>>>>>>>>
> >>>>>>>>> Thanks for your comment. I'm glad to hear an opinion from
> >>>>>>> a GRE key
> >>>>>>>>> expert. Please see inline:
> >>>>>>>>>
> >>>>>>>>> Ahmad Muhanna wrote:
> >>>>>>>>>> Hi Hidetoshi,
> >>>>>>>>>>
> >>>>>>>>>> I just have one quick comment and question.
> >>>>>>>>>>
> >>>>>>>>>> Reading the draft, it seems to me that the GRE keys are
> >>>>>>>>> somehow sent
> >>>>>>>>>> from the NAR to PAR in the HI (section 4.2). Is that the
> >>>>>>> case? This
> >>>>>>>>>> means both the DL and UP GRE keys for the bilateral
> >>>>>>> tunnels between
> >>>>>>>>>> the two AR(s). Is my understanding correct? It also
> >>>>>>>>> mentions that the
> >>>>>>>>>> format
> >>>>>>>>> In terms of the GRE keys for the bilateral tunnel,
> >>> the working
> >>>>>>>>> assumption is that the DL key is selected by the NAR and
> >>>>>>> the UL key
> >>>>>>>>> is selected by the PAR. Depending on the fast handover
> >>>>>> mode, those
> >>>>>>>>> keys are transferred to the other MAG via either the
> >>> HI or Hack.
> >>>>>>>>>> of these keys are based on the GRE keys for PMIPv6
> >>>>>> draft (section
> >>>>>>>>>> 6.2.6).
> >>>>>>>>> Correct.
> >>>>>>>>>
> >>>>>>>>>> It seems to me that there should be more text to define
> >>>>>>> which keys
> >>>>>>>>>> exchange in the HI and which in the HaCK
> >>>>>>>>> If the above assumption works, I would like to add more
> >>>>>> text along
> >>>>>>>>> that line.
> >>>>>>>> [Ahmad]
> >>>>>>>> That is great. Please add some clarification text to
> >>>>>>> clearly indicate
> >>>>>>>> that only one key in the HI and the other in the HACK.
> >>>>>>>> Since some specification in 3GPP2 depends on this draft, I
> >>>>>>> appreciate
> >>>>>>>> if you can publish an updated version before the end of
> >>>> the week.
> >>>>>>>> Thanks in advance!
> >>>>>>>>
> >>>>>>>>>> If both keys are exchanged in the same HI, How these
> >>> keys are
> >>>>>>>>>> identified at the pAR?
> >>>>>>>>>> In GRE keys for PMIPv6 draft, downlink GRE key is included
> >>>>>>>>> in the PBU
> >>>>>>>>>> and the uplink GRE key in included in the PBA. They never
> >>>>>>>>> exist in the
> >>>>>>>>>> same message and that way there is no confusing.
> >>>>>>>>> So far, each key is conveyed by either the HI or HAck.
> >>>>>>>>> However, I haven't explored all of the possibilities.
> >>>> If you can
> >>>>>>>>> think of any case that two keys must be conveyed in one
> >>>> message,
> >>>>>>>>> please let me know.
> >>>>>>>> [Ahmad]
> >>>>>>>> I do not see any reason for this case (one key per
> >>>>>> message) not to
> >>>>>>>> work for all implementation.
> >>>>>>>>
> >>>>>>>>>> In addition, DL and UP GRE keys are generated by NAR and
> >>>>>>>>> sent inside
> >>>>>>>>>> the HI, my question: Is there any specific reason for
> >>>>>> the NAR to
> >>>>>>>>>> specify both GRE keys for the bilateral tunnels?
> >>>>>>>>> It would be more problematic that the NAR determines the
> >>>>>> both keys
> >>>>>>>>> and I would rather like to avoid it.
> >>>>>>>>>
> >>>>>>>>>> Sorry for this comment to be so late but hope that you have
> >>>>>>>>> the chance
> >>>>>>>>>> to take a look at it.
> >>>>>>>>> That's ok. The draft is under the review process. Your
> >>>>>> comment is
> >>>>>>>>> highly appreciated.
> >>>>>>>>>
> >>>>>>>>> Regards,
> >>>>>>>>> --
> >>>>>>>>> Hidetoshi
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>>> Thanks!
> >>>>>>>>>>
> >>>>>>>>>> Regards,
> >>>>>>>>>> Ahmad
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>>> -----Original Message-----
> >>>>>>>>>>> From: mipshop-bounces@ietf.org
> >>>>>>>>>>> [mailto:mipshop-bounces@ietf.org] On Behalf Of
> >>>> Hidetoshi Yokota
> >>>>>>>>>>> Sent: Wednesday, September 02, 2009 11:12 PM
> >>>>>>>>>>> To: Jari Arkko
> >>>>>>>>>>> Cc: Mipshop; draft-ietf-mipshop-pfmipv6@tools.ietf.org
> >>>>>>>>>>> Subject: Re: [Mipshop] AD review of
> >>> draft-ietf-mipshop-pfmipv6
> >>>>>>>>>>> Hi Jari,
> >>>>>>>>>>>
> >>>>>>>>>>> Thanks for your patience. The attached revised document is
> >>>>>>>>> supposed to
> >>>>>>>>>>> reflect the rest of your comments. Please also see inline,
> >>>>>>>>> where the
> >>>>>>>>>>> revised part is explained item by item. If there is no
> >>>>>>> outstanding
> >>>>>>>>>>> issue there, we will upload it shortly.
> >>>>>>>>>>>
> >>>>>>>>>>> [Apologize if you received it twice. Since the size just
> >>>>>>>>> exceeded the
> >>>>>>>>>>> limit of this ML, this mail is reposted without the
> >>>>>> attachment.]
> >>>>>>>>>>> Hidetoshi Yokota wrote:
> >>>>>>>>>>>> Hi Jari,
> >>>>>>>>>>>>
> >>>>>>>>>>>> Appreciate your detailed review. The editorial
> corrections
> >>>>>>>>>>> are mostly
> >>>>>>>>>>>> done and the revised version is attached to this mail.
> >>>>>>>>> Regarding the
> >>>>>>>>>>>> technical comments, only the policies for the correction
> >>>>>>>>>>> are listed for
> >>>>>>>>>>>> now. The complete correction will be posted as soon as
> >>>>>>>>>>> possible. Please
> >>>>>>>>>>>> see inline for the responses to your questions and
> >>> comments:
> >>>>>>>>>>>> Jari Arkko wrote:
> >>>>>>>>>>>>> I have reviewed this document. It was generally in good
> >>>>>>>>>>> shape and easy
> >>>>>>>>>>>>> to read. I did find a number of issues though. Please
> >>>>>>>>>>> discuss them with
> >>>>>>>>>>>>> me on this thread and/or revise the draft accordingly.
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> Technical:
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> I do not understand the IP host aspects of the
> >>>>>>> handover. For an
> >>>>>>>>>>>>> unmodified host, what kind of interfaces exist on the
> >>>>>>> host, what
> >>>>>>>>>>>>> addresses they have, and at what time are interfaces
> >>>>>>>>>>> removed or added?
> >>>>>>>>>>>>> Is this exactly the same as in RFC 5213, or does PFMIPv6
> >>>>>>>>>>> introduce some
> >>>>>>>>>>>>> change here?
> >>>>>>>>>>>> The basic principle would be that this specification does
> >>>>>>>>>>> not require
> >>>>>>>>>>>> any additional IP-level function to the MN running in the
> >>>>>>>>>>> PMIPv6 domain.
> >>>>>>>>>>>> This MN should therefore be the same as defined
> in RFC5213.
> >>>>>>>>>>>>
> >>>>>>>>>>>> A typical network interface would be one with the
> >>>>>>>>> cellular network,
> >>>>>>>>>>>> where the network basically controls the movement of the
> >>>>>>>>>>> MN. Different
> >>>>>>>>>>>> types of interfaces could be involved such as different
> >>>>>>>>>>> generations (3G
> >>>>>>>>>>>> and 3.9G) or different radio access systems. Any type of
> >>>>>>>>> IP address
> >>>>>>>>>>>> could be assigned (IPv4/v6 or global/private), but the
> >>>>>>>>>>> assigned address
> >>>>>>>>>>>> must be preserved before and after the handover. PFMIPv6
> >>>>>>>>>>> should be able
> >>>>>>>>>>>> to handle the single radio situation, where only one
> >>>>>>>>>>> interface is active
> >>>>>>>>>>>> at any given time. This is a tougher situation
> in terms of
> >>>>>>>>>>> packet loss
> >>>>>>>>>>>> and delay.
> >>>>>>>>>>>>
> >>>>>>>>>>>>> I would like to see a new section on manageability
> >>>>>>>>>>> considerations. For
> >>>>>>>>>>>>> instance, Section 5 talks about some
> >>> configuration issues.
> >>>>>>>>>>> These should
> >>>>>>>>>>>>> be mentioned, and there should be a description of what
> >>>>>>>>>>> the operator
> >>>>>>>>>>>>> needs to configure in order to set up a PFMIPv6 network.
> >>>>>>>>>>>> We will add a new section for manageability
> considerations
> >>>>>>>>>>> to clarify
> >>>>>>>>>>>> the above and to reflect your suggestion.
> >>>>>>>>>>> A new subsection is added in Section 5 describing the
> >>>>>>>>> above aspects:
> >>>>>>>>>>> -------------------
> >>>>>>>>>>> 5.  PMIPv6-related Fast Handover Issues
> >>>>>>>>>>>
> >>>>>>>>>>> 5.1.  Manageability Considerations
> >>>>>>>>>>>
> >>>>>>>>>>>    This specification does not require any
> >>> additional IP-level
> >>>>>>>>>>>    functionality on the LMA and the MN running in
> >>> the PMIPv6
> >>>>>>>>>>> domain.  A
> >>>>>>>>>>>    typical network interface that the MN could be
> >>>>>>> assumed to have
> >>>>>>>>>>> is one
> >>>>>>>>>>>    with the cellular network, where the network
> >>> controls the
> >>>>>>>>>>> movement of
> >>>>>>>>>>>    the MN.  Different types of interfaces could be
> >>>>>>> involved such as
> >>>>>>>>>>>    different generations (3G and 3.9G) or different
> >>>>>> radio access
> >>>>>>>>>>>    systems.  This specification supports a MN with the
> >>>>>>> single radio
> >>>>>>>>>>>    mode, where only one interface is active at any given
> >>>>>>> time.  The
> >>>>>>>>>>>    assigned IP address is preserved whether the physical
> >>>>>>> interface
> >>>>>>>>>>>    changes or not and the MN can identify which
> >>>>>>> interface should be
> >>>>>>>>>>> used
> >>>>>>>>>>>    if there are multiple ones.
> >>>>>>>>>>> --------------------
> >>>>>>>>>>>
> >>>>>>>>>>>
> >>>>>>>>>>>>>> If the new router's interface is configured to
> >>> respond to
> >>>>>>>>>>>>>> queries sent to link-layer addresses than its
> >>>>>>>>>>> own (e.g.,
> >>>>>>>>>>>>>> set to promiscuous mode), then it can respond to the
> >>>>>>> NUD probe,
> >>>>>>>>>>>>>> providing its link-layer address in the
> >>> solicited Neighbor
> >>>>>>>>>>>>>> Advertisement.
> >>>>>>>>>>>>> Is this according to RFC 5213? I seem to recall that RFC
> >>>>>>>>>>> 5213 operated
> >>>>>>>>>>>>> on the same link layer addresses.
> >>>>>>>>>>>> I think your observation is correct... I'll
> check with the
> >>>>>>>>>>> other authors
> >>>>>>>>>>>> to see if it is ok to rewrite it.
> >>>>>>>>>>> The new text doesn't mention the promiscuous mode and
> >>>>>>>>> emphasizes the
> >>>>>>>>>>> common link-layer address among all MAGs in the
> >>> PMIPv6 domain:
> >>>>>>>>>>> ---------------
> >>>>>>>>>>> 5.2.  Expedited Packet Transmission
> >>>>>>>>>>>
> >>>>>>>>>>>    [...]
> >>>>>>>>>>>
> >>>>>>>>>>>    The protocol specified in this document is applicable
> >>>>>>>>> regardless of
> >>>>>>>>>>>    whether link-layer addresses are used between a MN and
> >>>>>>>>> its access
> >>>>>>>>>>>    router.  A MN should be able to continue sending
> >>>>>>> packets on the
> >>>>>>>>>>>    uplink even when it changes link.  When link-layer
> >>>>>>> addresses are
> >>>>>>>>>>>    used, the MN performs Neighbor Unreachability
> >>>>>> Detection (NUD)
> >>>>>>>>>>>    [RFC4861], after attaching to a new link, probing the
> >>>>>>>>>>> reachability of
> >>>>>>>>>>>    its default router.  The new router should respond
> >>>>>> to the NUD
> >>>>>>>>>>> probe,
> >>>>>>>>>>>    providing its link-layer address in the
> >>> solicited Neighbor
> >>>>>>>>>>>    Advertisement, which is common in the PMIPv6 domain.
> >>>>>>>>>>> Implementations
> >>>>>>>>>>>    should allow the MN to continue to send uplink packets
> >>>>>>>>> while it is
> >>>>>>>>>>>    performing NUD.
> >>>>>>>>>>> ----------------
> >>>>>>>>>>>
> >>>>>>>>>>>>>> At least one mobility option MUST uniquely identify
> >>>>>>> the target
> >>>>>>>>>>>>>> MN (e.g., the Mobile Node
> >>>>>>>>> Identifier
> >>>>>>>>>>>>>> Option defined in RFC4283
> >>>>>>>>>>> <http://tools.ietf.org/html/rfc4283>) and
> >>>>>>>>>>>>>> the transferred context MUST be for one MN per message.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>> I would like the required options to be
> specified in more
> >>>>>>>>>>> detail. Which
> >>>>>>>>>>>>> identity options are sufficient to satisfy the MUST?
> >>>>>>>>>>>> The required option should be the MN Identifier in the
> >>>>>>> Mobile Node
> >>>>>>>>>>>> Identifier Option.
> >>>>>>>>>>> The above description is added in Section 6.1.1:
> >>>>>>>>>>>
> >>>>>>>>>>> ---------
> >>>>>>>>>>>    Requested option
> >>>>>>>>>>>              In order to uniquely identify the target
> >>>>>> MN, the MN
> >>>>>>>>>>>              Identifier MUST be contained in the
> >>> Mobile Node
> >>>>>>>>>>> Identifier
> >>>>>>>>>>>              Option.
> >>>>>>>>>>> ---------
> >>>>>>>>>>>
> >>>>>>>>>>>>>> If a default set of context information is defined
> >>>>>> and always
> >>>>>>>>>>>>>> sufficient, this option is not mandatory.  This
> >>>>>>>>>>> option is more
> >>>>>>>>>>>>>> useful to retrieve additional or dynamically
> >>>>>> selected context
> >>>>>>>>>>>>>> information.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> Context Request Option is typically used for the
> >>>>>>> reactive (NAR-
> >>>>>>>>>>>>>> initiated) fast handover mode to retrieve the context
> >>>>>>>>> information
> >>>>>>>>>>>>>> from the PAR.  When this option is included in the HI
> >>>>>>>>> message, all
> >>>>>>>>>>>>>> the requested context information SHOULD be included
> >>>>>>> in the HAck
> >>>>>>>>>>>>>> message in the corresponding mobility option(s) (e.g.,
> >>>>>>>>>>> HNP, LMAA or
> >>>>>>>>>>>>>> MN-IID mobility options).
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>> Please specify what the default set of context
> >>>>>>>>> information is, by
> >>>>>>>>>>>>> listing the required options when the CRO is
> not present.
> >>>>>>>>>>>> The default context information to request is the Home
> >>>>>>>>>>> Network Prefix
> >>>>>>>>>>>> Option. If the Mobile Node link-layer is available and
> >>>>>>>>>>> used, the Mobile
> >>>>>>>>>>>> Node Link-layer Identifier Option MUST also be requested.
> >>>>>>>>>>> With these two
> >>>>>>>>>>>> options and the MN identifier, the NMAG can
> >>>> construct the PBU.
> >>>>>>>>>>> The above description is added in Section 6.2.1:
> >>>>>>>>>>>
> >>>>>>>>>>> ----------
> >>>>>>>>>>>    The default context information to request is the
> >>>>>>> Home Network
> >>>>>>>>>>> Prefix
> >>>>>>>>>>>    Option.  If the Mobile Node link-layer is available and
> >>>>>>>>> used, the
> >>>>>>>>>>>    Mobile Node Link-layer Identifier Option MUST also be
> >>>>>>> requested.
> >>>>>>>>>>> ----------
> >>>>>>>>>>>
> >>>>>>>>>>>>> Editorial:
> >>>>>>>>>>>>>
> >>>>>>>>>>>>>>    HO-Initiate:
> >>>>>>>>>>>>>>         A generic signaling message, sent from the P-AN
> >>>>>>>>>>> to the PMAG that
> >>>>>>>>>>>>>>         indicates a MN handover.  While this
> signaling is
> >>>>>>>>>>> dependent on
> >>>>>>>>>>>>>>         the access technology, it is assumed that
> >>>>>>>>>>> HO-Initiate can carry
> >>>>>>>>>>>>>>         the information to identify the MN and to
> >>>>>>>>> assist the PMAG
> >>>>>>>>>>>>>>         resolve the NMAG and the new access
> point or the
> >>>>>>>>>>> base station to
> >>>>>>>>>>>>>>         which the MN is moving to.  The details of this
> >>>>>>>>>>> message are
> >>>>>>>>>>>>>>         outside the scope of this document.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> 4. Proxy-based FMIPv6 Protocol Overview
> >>>>>>>>>>>>> Section 4 would probably benefit from an additional
> >>>>>>>>>>> paragraph at the
> >>>>>>>>>>>>> beginning to explain what assumptions there exist about
> >>>>>>>>>>> lower layer
> >>>>>>>>>>>>> functionality.
> >>>>>>>>>>>> Yes, the predictive fast handover relies on the
> >>> lower layer
> >>>>>>>>>>>> functionality to trigger to send the HI. A new paragraph
> >>>>>>>>>>> will be added
> >>>>>>>>>>>> to clarify it.
> >>>>>>>>>>> -------------
> >>>>>>>>>>> 4.  Proxy-based FMIPv6 Protocol Overview
> >>>>>>>>>>>
> >>>>>>>>>>>    If the MAGs can be informed of the detachment and/or
> >>>>>>>>> attachment of
> >>>>>>>>>>>    the MN in a timely manner via e.g. the lower layer
> >>>>>>> signaling, it
> >>>>>>>>>>> will
> >>>>>>>>>>>    become possible to optimize the handover procedure,
> >>>>>>>>> which involves
> >>>>>>>>>>>    establishing a connection on the new link and
> >>>>>>> signaling between
> >>>>>>>>>>>    mobility agents, compared to the baseline specification
> >>>>>>>>> of PMIPv6.
> >>>>>>>>>>>   [...]
> >>>>>>>>>>> -------------
> >>>>>>>>>>>
> >>>>>>>>>>> All the other corrections pointed out below have
> also been
> >>>>>>>>>>> reflected in the revised document.
> >>>>>>>>>>>
> >>>>>>>>>>> Regards,
> >>>>>>>>>>> --
> >>>>>>>>>>> Hidetoshi
> >>>>>>>>>>>
> >>>>>>>>>>>>>> A new flag 'P' is defined for the HI and HAck
> >>> messages to
> >>>>>>>>>>>>>> distinguish from those in [RFC5268bis
> >>>>>>>>>>>>>>
> >>> <http://tools.ietf.org/html/draft-ietf-mipshop-pfmipv6-08#ref-
> >>>>>>>>>>> RFC5268bis>]
> >>>>>>>>>>>>>> and thus MUST
> >>>>>>>>>>>>>> be set in the entire document.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>> This would be more readable as " ... those in
> >>>>>>>>>>> [RFC5268bis]. This flag
> >>>>>>>>>>>>> MUST be ..."
> >>>>>>>>>>>> Revised.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>    and the NAR creates a proxy NCE to receive those
> >>>>>>>>>>> packets for the NCoA
> >>>>>>>>>>>>> The term NCE has not been introduced at this stage yet.
> >>>>>>>>>>>> Spelled out as "Neighbor Cache Entry".
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>    address that is used by the MN is MN-HoA.  Hence the
> >>>>>>>>>>> PAR forwards
> >>>>>>>>>>>>> The term MN-HOA has not been introduced before.
> >>>>>>>>>>>> Added the unabbreviated form "Mobile Node's Home Address"
> >>>>>>>>> before it.
> >>>>>>>>>>>>>>         The access network to which the MN is attached
> >>>>>>>>>>> after handover.
> >>>>>>>>>>>>> New term MN, not introduced before.
> >>>>>>>>>>>>>
> >>>>>>>>>>>> Added "Mobile Node" before it.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>> specifies forwarding when the MN uses HoA as its
> >>>>>>> on-link address
> >>>>>>>>>>>>> New term HoA...
> >>>>>>>>>>>> Changed to "Home Address".
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>    as MN's NAI, Home Network Prefix (HNP), IPv4 Home
> >>>>>>>>> Address, are
> >>>>>>>>>>>>> New term NAI...
> >>>>>>>>>>>> Added "Network Access Identifier" before it.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>         flag set and include the MN ID, the MN-HNP, the
> >>>>>>>>>>> MN-IID and the
> >>>>>>>>>>>>> New terms MN-HNP and MN-IID (or at least they do not
> >>>>>>>>>>> appear in their
> >>>>>>>>>>>>> MN-XXX form before this point).
> >>>>>>>>>>>> Modified "MN-HNP" to "HNP" for consistency.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>         Inner destination address: HNP or IPv4-MN-HoA
> >>>>>>>>>>>>> IPv4-MN-HoA not defined earlier...
> >>>>>>>>>>>> Added "Mobile Node's IPv4 Home" before it.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>    between the PCoA and NCoA to forward packets for the
> >>>>>>>>>>> MN to the NAR,
> >>>>>>>>>>>>> New terms PCoA and NCoA... there's probably
> more undefined
> >>>>>>>>>>> terms in the
> >>>>>>>>>>>>> document, please check!
> >>>>>>>>>>>> Added "Previous Care-of Address" and "New Care-of
> >>> Address".
> >>>>>>>>>>> Will read
> >>>>>>>>>>>> through it to see if there is any other
> undefined acronym.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>    In (i),
> >>>>>>>>>>>>> In Step (i),
> >>>>>>>>>>>> Revised including other parts.
> >>>>>>>>>>>>
> >>>>>>>>>>>>>>           |(MN ID, Old AP ID) |     (MN ID, Old
> >>> AP ID)
> >>>>>>>>>>>  |        |
> >>>>>>>>>>>>> Old AP ID? AN ID? AR ID?
> >>>>>>>>>>>> AP ID stands for "Access Point Identifier", which is
> >>>>>>>>>>> defined in RFC5568.
> >>>>>>>>>>>> Added the unabbreviated form and citation.
> >>>>>>>>>>>>
> >>>>>>>>>>>> The rest of the part will be revised soon.
> >>>>>>>>>>>>
> >>>>>>>>>>>> Regards,
> >>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>>>
> >>> --------------------------------------------------------------
> >>>>>>>>>>> ----------
> >>>>>>>>>>>> _______________________________________________
> >>>>>>>>>>>> Mipshop mailing list
> >>>>>>>>>>>> Mipshop@ietf.org
> >>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> >>>>>>>>>>> _______________________________________________
> >>>>>>>>>>> Mipshop mailing list
> >>>>>>>>>>> Mipshop@ietf.org
> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> >>>>>>>>>>>
> >>>>>>>>
> >>>>>>> --
> >>>>>>> Hidetoshi Yokota
> >>>>>>>
> >>>>>>> Mobile Network Lab
> >>>>>>> KDDI R&D Laboratories, Inc.
> >>>>>>> e-mail:yokota@kddilabs.jp
> >>>>>>>
> >>>>>>>
> >>>>>> _______________________________________________
> >>>>>> Mipshop mailing list
> >>>>>> Mipshop@ietf.org
> >>>>>> https://www.ietf.org/mailman/listinfo/mipshop
> >>>>>>
> >>>>>
> >>>>>
> >>>>
> >>
> >>
> >> This email and any attachments may contain legally
> privileged and/or
> >> confidential information of Starent Networks, Corp. and is
> intended
> >> only for the individual or entity named in the message.  The
> >> information transmitted may not be used to create or change any
> >> contractual obligations of Starent Networks, Corp.  Any review,
> >> retransmission, dissemination or other use of, or taking of any
> >> action in reliance upon this e-mail and its attachments by
> persons or
> >> entities other than the intended recipient is prohibited.
> If you are
> >> not the intended recipient, please notify the sender
> immediately -- 
> >> by replying to this message or by sending an email to
> >> postmaster@starentnetworks.com -- and destroy all copies of this
> >> message and any attachments without reading or disclosing
> their contents. Thank you.
> >>
> >>
> >>
> >
>
>